Configuring RADIUS Server Support for Switch Services
Configuring and Using RADIUS-Assigned Access Control Lists
•
RADIUS-assigned ACL: dynamic ACL assigned to a port by a RADIUS
server to filter inbound traffic from an authenticated client on that
port
An ACL can be configured on an interface as a static port ACL. (RADIUS
assigned ACLs are configured on a RADIUS server.)
ACL Mask:
Follows a destination IP address listed in an ACE. Defines which
bits in a packet’s corresponding IP addressing must exactly match the IP
addressing in the ACE, and which bits need not match (wildcards).
DA:
The acronym for
Destination IP Address
. In an IP packet, this is the
destination IP address carried in the header, and identifies the destination
intended by the packet’s originator.
Deny:
An ACE configured with this action causes the switch to drop a packet
for which there is a match within an applicable ACL.
Deny Any Any:
An abbreviated form of
deny in ip from any to any
, which denies
any inbound IP traffic from any source to any destination.
Dynamic Port ACL:
See RADIUS-Assigned ACL.
Implicit Deny:
If the switch finds no matches between an inbound packet
and the configured criteria in an applicable ACL, then the switch denies
(drops) the packet with an implicit “deny IP any/any” operation. You can
preempt the implicit “deny IP any/any” in a given ACL by configuring
permit in ip from any to any
as the last explicit ACE in the ACL. Doing so
permits any inbound IP packet that is not explicitly permitted or denied
by other ACEs configured sequentially earlier in the ACL. Unless other
wise noted, “implicit deny IP any” refers to the “deny” action enforced by
both standard and extended ACLs.
Inbound Traffic:
For the purpose of defining where the switch applies ACLs
to filter traffic, inbound traffic is any IP packet that
enters the switch
from
a given client on a given port.
NAS (Network Attached Server):
In this context, refers to a ProCurve
switch configured for RADIUS operation.
Outbound Traffic:
For defining the points where the switch applies an ACL
to filter traffic, outbound traffic is routed traffic
leaving the switch
through a VLAN interface (or a subnet in a multinetted VLAN). “Outbound
traffic” can also apply to switched traffic leaving the switch on a VLAN
interface.
6-10
Summary of Contents for PROCURVE 2910AL
Page 1: ...Access Security Guide ProCurve Switches W 14 03 2910al www procurve com ...
Page 2: ......
Page 3: ...HP ProCurve 2910al Switch February 2009 W 14 03 Access Security Guide ...
Page 84: ...Configuring Username and Password Security Front Panel Security 2 36 ...
Page 156: ...TACACS Authentication Operating Notes 4 30 ...
Page 288: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup 8 22 ...
Page 416: ...Configuring Advanced Threat Protection Using the Instrumentation Monitor 10 28 ...
Page 572: ...Using Authorized IP Managers Operating Notes 14 14 ...
Page 592: ...12 Index ...
Page 593: ......