8.From the Firewall Policy section, select the policy from the in drop-down list through which inbound traffic on this port must pass.

9.Select the policy from the out drop-down list through which outbound traffic on this port must pass.

10.Select the policy To apply a policy to this session’s traffic on this port and VLAN, select the policy from the session drop-down list.

11.Click Apply.

In the CLI

In this example,

(host) (config) #interface range fastethernet 1/2

(host) (config-if)#switchport mode access

(host) (config-if)#no trusted

(host) (config-if)#switchport access vlan 2

(host) (config-if)#no trusted vlan 2

(host) (config-if)#ip access-group ap-acl session vlan 2

(host) (config-if)#ip access-group validuserethacl in

(host) (config-if)#ip access-group validuserethacl out

(host) (config-if)#ip access-group validuser session

Configuring Trusted and Untrusted Ports and VLANs in Trunk Mode

The following procedures configure a range of Ethernet ports as untrusted native trunks ports, assign VLANs and make them untrusted and designate a policy through which VLAN traffic on the ports must pass.

In the WebUI

1.Navigate to the Configuration > Network > Ports window.

2.In the Port Selection section, click the port you want to configure.

3.For Port Mode select Trunk.

4.To specify the native VLAN, select a VLAN from the Native VLAN drop-down list and click the <-- arrow.

5.Choose one of the following options to control the type of traffic the port carries:

n Allow All VLANS Except– The port carries traffic for all VLANs except the ones from this drop-down list. n Allow VLANs – The port carries traffic for all VLANs selected from this drop-down list.

n Remove VLANs – The port does not carry traffic for any VLANs selected from this drop-down list.

6.To designate untrusted VLANs on this port, click Trusted except. In the corresponding VLAN field enter a range of VLANs that you want to make untrusted. (In this format, for example: 200-300, 401-500 and so on). Only VLANs listed in this range are untrusted. Or, to make only one VLAN untrusted, select a VLAN from the drop- down menu.

7.To designate trusted VLANs on this port, click Untrusted except. In the corresponding VLAN field enter a range of VLANs that you want to make trusted. (In this format, for example: 200-300, 401-500 and so on). Only VLANs listed in this range are trusted. Or, to make only one VLAN trusted, select a VLAN from the drop-down menu.

8.To remove a VLAN, click the Remove VLANs option and select the VLAN you want to remove from the drop- down list and click the left arrow to add it to the list.

9.To designate the policy through which VLAN traffic must pass, click New under the Session Firewall Policy field.

10.Enter the VLAN ID or select it from the associated drop-down list. Then select the policy, through which the VLAN traffic must pass, from the Policy drop-down list and click Add. Both the selected VLAN and the policy appear in the Session Firewall Policy field.

Dell PowerConnect W-Series ArubaOS 6.2 User Guide

Network Configuration Parameters 116

Page 116
Image 116
Dell 6.2 manual This example, For Port Mode select Trunk

6.2 specifications

Dell 6.2 is an advanced enterprise solution that caters to the needs of businesses seeking robust performance and efficiency. As a part of Dell's commitment to innovation, the 6.2 series combines cutting-edge technologies and features that enhance productivity and deliver reliable computing experiences.

One of the standout features of the Dell 6.2 is its impressive processing power. Equipped with the latest Intel processors, it offers exceptional speed and multitasking capabilities. This allows businesses to run demanding applications effortlessly, making it ideal for data-intensive tasks such as data analysis, software development, and virtualization. The series also supports substantial RAM configurations, enabling users to manage extensive workloads without experiencing slowdowns.

In terms of storage, the Dell 6.2 line includes advanced SSD options that significantly boost data access speeds compared to traditional hard drives. This rapid access to information is vital for businesses that require quick retrieval of large datasets. Furthermore, the devices support RAID configurations, which enhances data redundancy and security, protecting critical business information from loss.

Connectivity is another critical aspect of the Dell 6.2 series. It includes multiple USB ports, HDMI outputs, and high-speed Ethernet options, ensuring that users can easily connect to various peripherals and networks. The integration of Wi-Fi 6 technology enables faster wireless connections, resulting in improved internet speeds and bandwidth efficiency, which is crucial in today’s increasingly connected workplaces.

Dell has also prioritized security in the 6.2 series. It features enhanced biometric authentication and advanced encryption methods, safeguarding sensitive data from unauthorized access. Additionally, the system's BIOS protection and automatic updates provide an added layer of security, ensuring that the device remains safe from emerging threats.

The design of the Dell 6.2 is not only sleek and modern but also built for durability. Its robust chassis is engineered to withstand the rigors of daily use, making it suitable for various business environments. This durability ensures that the investment in Dell 6.2 will last for years while maintaining performance integrity.

In summary, the Dell 6.2 series embodies a blend of speed, storage efficiency, connectivity, and security, making it a top choice for enterprises looking to enhance their computing capabilities. With its modern features and durable design, Dell 6.2 is positioned as a reliable partner in driving business success.