Authentication

Description

Method

 

Attack

direction. You should not enable this option unless instructed to do so by a Dell representative.

 

Default: Disabled

 

 

Session Mirror

Destination (IPv4 address or controller port) to which mirrored session packets are sent. You

Destination

can configure IPv6 flows to be mirrored with the session ACL “mirror” option. This option is

 

used only for troubleshooting or debugging.

 

Default: N/A

 

 

Session Idle Timeout

Set the time, in seconds, that a non-TCP session can be idle before it is removed from the

 

session table. Specify a value in the range 16–259 seconds. You should not set this option unless

 

instructed to do so by a Dell representative.

 

Default: 30 seconds

 

 

Per-packet Logging

Enables logging of every packet if logging is enabled for the corresponding session rule.

 

Normally, one event is logged per session. If you enable this option, each packet in the session

 

is logged. You should not enable this option unless instructed to do so by a Dell representative,

 

as doing so may create unnecessary overhead on the controller.

 

Default: Disabled (per-session logging is performed)

 

 

Ipv6 Enable

 

 

 

The following examples configure attack rates and the session timeout for IPv6 traffic.

To configure the firewall function via the WebUI:

1.Navigate to the Configuration > Advanced Services > Stateful Firewall > Global Setting page.

2.Under the IPv6 column, enter the following: For Monitor Ping Attack, enter 15

For Monitor IP Session Attack, enter 25 For Session Idle Timeout, enter 60

3.Click Apply.

To configure firewall functions using the command line interface, issue the following commands in config mode:

ipv6 firewall attack-rate ping 15 ipv6 firewall attack-rate session 25 ipv6 firewall session-idle-timeout 60

Understanding Firewall Policies

A user role, which determines a client’s network privileges, is defined by one or more firewall policies. A firewall policy consists of one or more rules that define the source, destination, and service type for specific traffic and whether you want the controller to permit or deny traffic that matches the rule.

You can configure firewall policies for IPv4 traffic or for IPv6 traffic and apply IPv4 and IPv6 firewall policies to the same user role. For example, if you have employees that are using both IPv4 and IPv6 clients you can configure both IPv4 and IPv6 firewall policies and apply them both to the “employee” user role.

The procedure to configure an IPv6 firewall policy rule is similar to configuring a firewall policy rule for IPv4 traffic, but with some differences. Table 18 describes required and optional parameters for an IPv6 firewall policy rule.

143 IPv6 Support

Dell PowerConnect W-Series ArubaOS 6.2 User Guide

Page 143
Image 143
Dell 6.2 manual Understanding Firewall Policies

6.2 specifications

Dell 6.2 is an advanced enterprise solution that caters to the needs of businesses seeking robust performance and efficiency. As a part of Dell's commitment to innovation, the 6.2 series combines cutting-edge technologies and features that enhance productivity and deliver reliable computing experiences.

One of the standout features of the Dell 6.2 is its impressive processing power. Equipped with the latest Intel processors, it offers exceptional speed and multitasking capabilities. This allows businesses to run demanding applications effortlessly, making it ideal for data-intensive tasks such as data analysis, software development, and virtualization. The series also supports substantial RAM configurations, enabling users to manage extensive workloads without experiencing slowdowns.

In terms of storage, the Dell 6.2 line includes advanced SSD options that significantly boost data access speeds compared to traditional hard drives. This rapid access to information is vital for businesses that require quick retrieval of large datasets. Furthermore, the devices support RAID configurations, which enhances data redundancy and security, protecting critical business information from loss.

Connectivity is another critical aspect of the Dell 6.2 series. It includes multiple USB ports, HDMI outputs, and high-speed Ethernet options, ensuring that users can easily connect to various peripherals and networks. The integration of Wi-Fi 6 technology enables faster wireless connections, resulting in improved internet speeds and bandwidth efficiency, which is crucial in today’s increasingly connected workplaces.

Dell has also prioritized security in the 6.2 series. It features enhanced biometric authentication and advanced encryption methods, safeguarding sensitive data from unauthorized access. Additionally, the system's BIOS protection and automatic updates provide an added layer of security, ensuring that the device remains safe from emerging threats.

The design of the Dell 6.2 is not only sleek and modern but also built for durability. Its robust chassis is engineered to withstand the rigors of daily use, making it suitable for various business environments. This durability ensures that the investment in Dell 6.2 will last for years while maintaining performance integrity.

In summary, the Dell 6.2 series embodies a blend of speed, storage efficiency, connectivity, and security, making it a top choice for enterprises looking to enhance their computing capabilities. With its modern features and durable design, Dell 6.2 is positioned as a reliable partner in driving business success.