xStack® DES-3528/DES-3552 Series Layer 2 Managed Stackable Fast Ethernet Switch CLI Reference Guide
605
If the user has configured the VLAN attribute of the RADIUS server (for example, VID 3) and the 802.1X, MAC based
Access Control, or WAC authentication is successful, the port will be assigned to VLAN 3. However, if the user does
not configure the VLAN attributes, when the port is not a guest VLAN member, it will be kept in its current
authentication VLAN. When the port is guest VLAN member, it will be assigned to its original VLAN.
To assign
ACL by RADIUS Server
, the proper parameters should be configured on the RADIUS Server. The table
below shows the parameters for an ACL. The RADIUS ACL assignment is only used in 802.1X, WAC, JWAC and
MAC-based Access Control.
The parameters of the Vendor-Specific Attribute are:
RADIUS Tunnel Attribute
Description
Value
Usage
Vendor-ID
Defines the vendor.
171 (DLINK)
Required
Vendor-Type
Defines the attribute.
12 (for ACL profile)
13 (for ACL rule)
Required
Attribute-Specific Field
Used to assign the ACL profile or
rule.
ACL Command
For example:
ACL profile: create
access_profile profile_id
100 profile_name 100
ethernet vlan 0xFFF;
ACL rule: config
access_profile profile_id
100 add access_id
auto_assign ethernet
vlan default port all
deny;
Required
If the user has configured the ACL attribute of the RADIUS server (for example, ACL profile:
create access_profile
profile_id 100 profile_name 100 ethernet vlan 0xFFF
; ACL rule:
config access_profile profile_id 100 add
access_id auto_assign ethernet vlan default port all deny
), and the MAC-based Access Cotntrol authentication is
successful, the device will assign the ACL profiles and rules according to the RADIUS server. For more information
about the ACL module, please refer to the ‘Access Control List (ACL) Commands’ section.
Summary of Contents for DES-3528 - xStack Switch - Stackable
Page 1: ......