24
D
YNAMICALLY
A
PPLY
ACL
BY
RADIUS
S
ERVER
C
ONFIGURATION
Introduction to
Dynamically Apply
ACL by RADIUS Server
The switch can dynamically provide pre-defined ACL rules for one or one group of
authenticated user(s) through the combination of Dynamically Apply ACL by RADIUS
Server function and 802.1x authentication function.
After you have passed the 802.1x authentication mode, the switch will dynamically
issue the corresponding ACLs to your login port according to the matching
relationship between the user name and the ACL configured on the RADIUS server.
The Dynamically Apply ACL by RADIUS Server function of the switch can restrict the
resource that the 802.1x users can access, such as the destination networks.
Introduction to
Dynamically Apply
ACL by RADIUS Server
Configurations
Figure 148
Dynamically Apply ACL by RADIUS Server Configurations
\
Table 590 describes the Dynamically Apply ACL by RADIUS Server configurations:
Table 590
Configuring Dynamically Apply ACL by RADIUS Server
Device
Configuration
Configuration link
RADIUS
server
Configure user authentication information
-
Configure the matching relationship between
ACL number and the user name
One ACL can match with more than
one users
Switch
Enable the 802.1x authentication function:
The global 802.1x authentication function is
enabled and 802.1x authentication function is
enabled on the user access port
Refer to
10-Security Operation
module in this manual for the
related configuration procedure
Configure AAA and RADIUS:
Configure the RADIUS scheme,
Configure domain, specify the RADIUS scheme
used by the domain.
Refer to
10-Security Operation
module in this manual for the
related configuration procedure
Configure ACL:
The ACLs are pre-defined according the
restriction requirement of user.
Refer to
07-QACL Operation
module
in this manual for the related
configuration procedure
AAA Server
Switch
User
Network
AAA Server
Switch
User
Network
Network
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...