
8-37
Special Features
Identity Driven Management
IDM ACL
RADIUS-assigned ACLs provide Layer-3 filtering of inbound IP traffic from
authenticated stations. A unique username/password pair or station MAC
address identifies these ACLs and applies only to traffic from stations authen-
ticated with the same unique credentials. Implementing this feature requires:
■
RADIUS authentication using 802.1X or station MAC authentication.
■
Configuring RADIUS-assigned ACLs, each ACL assigned the username/
password pair or MAC address of the stations to support.
Using RADIUS ACLs benefits the access point, because it improves system
performance and provides a less complex network edge filtering method than
the VLAN ACLs network core filtering method.
Configuring an ACL in a RADIUS Server
This section provides general guidelines for configuring a RADIUS server to
specify RADIUS-based ACLs; refer to the RADIUS server documentation for
details. A RADIUS-based ACL configuration has the following:
■
Vendor and ACL identifiers:
•
ProCurve (HP) Vendor-Specific ID: 11
•
Vendor-Specific Attribute for ACLs: 61 (string = HP-IP-FILTER-RAW)
•
Setting: HP-IP-FILTER-RAW = < “permit” or “deny” (Access Control
Entry (ACE)>
N o t e
“Permit” forwards inbound packets, “deny” drops packets.
■
ACL configuration, including:
•
One or more explicit “permit” and/or “deny” ACEs created by the
system operator
•
Implicit “deny” of any ACE automatically active after the last operator
created ACE.
IDM Rate Limiting
User traffic on the inbound direction is restricted by the use of this feature of
IDM. The traffic limit is mentioned in Kbps. The inbound traffic limit is sent
in the RADIUS Accept message using Vendor Specific attribute as follows:
•
ProCurve (HP) Vendor-Specific ID: 11
•
VSA: 46 (integer = HP)
•
Setting: HP-RATE-LIMIT =
< bandwidth-in-Kbps >
Summary of Contents for 530 - Notebook PC
Page 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Page 2: ......
Page 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Page 21: ...1 1 1 Getting Started ...
Page 29: ...2 1 2 Selecting a Management Interface ...
Page 35: ...3 1 3 Using the Command Line Interface CLI ...
Page 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Page 85: ...5 1 5 General System Configuration ...
Page 152: ...5 68 General System Configuration Managing Group Configuration ...
Page 194: ...6 42 Wireless Interface Configuration Managing Multiple WLAN BSS SSID Interfaces ...
Page 195: ...7 1 7 Wireless Security Configuration ...
Page 270: ...7 76 Wireless Security Configuration Web Authentication for Mobile Users ...
Page 271: ...8 1 8 Special Features ...
Page 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Page 309: ...9 1 9 Command Line Reference ...
Page 476: ...9 168 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Page 477: ...A 1 A File Uploads Downloads and Resets ...
Page 498: ...A 22 File Uploads Downloads and Resets Disabling the Access Point Push Buttons ...
Page 499: ...B 1 B Defaults ...
Page 512: ...B 14 Defaults Wireless Distribution System WDS This page is intentionally unused ...
Page 513: ...C 1 C Adaptive Tx Power Control Use Cases ...
Page 523: ...D 1 D Open Source Licenses ...
Page 556: ...D 34 Open Source Licenses ...
Page 561: ......