7-35
Configuring RADIUS Server Support for Switch Services
Configuring and Using Dynamic (RADIUS-Assigned) Access Control Lists
Configuring the Switch To Support RADIUS-Assigned
ACLs
An ACL configured in a RADIUS server is identified by the authentication
credentials of the client or group of clients the ACL is designed to support.
When a client authenticates with credentials associated with a particular ACL,
the switch applies that ACL to the switch port the client is using. To enable
the switch to forward a client’s credentials to the RADIUS server, you must
first configure RADIUS operation and an authentication method on the switch.
1.
Configure RADIUS operation on the switch:
Syntax:
radius-server host <
ipv4-address
> key <
key-string
>
This command configures the IPv4 address and encryption key of a
RADIUS server. The server should be accessible to the switch and
configured to support authentication requests from clients using the
switch to access the network. For more on RADIUS configuration,
refer to chapter 6,“RADIUS Authentication and Accounting”.
2.
Configure RADIUS network accounting on the switch (optional).
aaa accounting network < start-stop | stop-only > radius
You can also view ACL counter hits using either of the following com-
mands:
show access-list radius <
port-list
>
show port-access < authenticator | mac-based | web-based > <
port-list
>
clients detailed
N o t e
Refer to the documentation provided with your RADIUS server for infor-
mation on how the server receives and manages network accounting
information, and how to perform any configuration steps necessary to
enable the server to support network accounting data from the switch.
3.
Configure an authentication method. Options include 802.1X, Web authen-
tication, and MAC authentication. (You can configure 802.1X, Web authen-
tication, and/or MAC authentication to operate simultaneously on the
same ports.)
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......