
Configuring RADIUS Server Support for Switch Services
Configuring and Using RADIUS-Assigned Access Control Lists
Configuring ACE Syntax in RADIUS Servers
The following syntax and operating information applies to ACLs configured
in a RADIUS server.
ACE Syntax
Nas-filter-Rule =”< permit | deny > in <ip |
ip-protocol-value
> from any to
(Standard
< any |
ip-addr
|
ipv4-addr
/
mask
> [ <
tcp/udp-port
|
tcp/udp-port range >
|
icmp-type
] [cnt ]”
Attribute-92)
ACE Syntax
HP-Nas-filter-Rule=”< permit | deny > in <ip |
ip-protocol-value
> from any to
(Legacy VSA-
< any |
ip-addr
|
ipv4-addr
/
mask
> [ <
tcp/udp-port
|
tcp/udp-port range >
|
icmp-type
] [cnt ]”
61)
Nas-filter-Rule =
: Standard attribute for filtering inbound IPv4 traffic from an authenticated
client. Refer also to table 6-4, “Nas-Filter-Rule Attribute Options” on page 6-18.
HP-Nas-filter-Rule =
:
Legacy HP VSA for filtering inbound IPv4 traffic from an authenticated
client. Refer also to table 6-4, “Nas-Filter-Rule Attribute Options” on page 6-18.
“
. . .
“
:
Must be used to enclose and identifies a complete permit or deny ACE syntax
statement. For example:
Nas-filter-Rule=”deny in tcp from any to 0.0.0.0/0 23”
< permit | deny >:
Specifies whether to forward or drop the identified IP traffic type from the
authenticated client. (For information on explicitly permitting or denying all inbound IP
traffic from an authenticated client, or for implicitly denying all such IP traffic not already
permitted or denied, refer to “Configuration Notes” on page 6-24.)
in:
Required keyword specifying that the ACL applies only to the traffic inbound from the
authenticated client.
< ip |
ip-protocol-value
>:
Options for specifying the type of traffic to filter.
ip:
Applies the ACE to all IP traffic from the authenticated client.
ip-protocol-value:
This option applies the ACE to the type of IP traffic specified by either
a protocol number or by
tcp
,
udp
,
icmp
, or (for IPv4-only)
igmp
.
The range of protocol
numbers is 0-255. (Protocol numbers are defined in RFC 2780. For a complete listing,
refer to “Protocol Registries” on the Web site of the Internet Assigned Numbers
Authority at www.iana.com.) Some examples of protocol numbers include:
1 = ICMP
17 = UDP
2 = IGMP (IPv4 only)
6 = TCP*IPv4 traffic only.
from any:
Required keywords specifying the (authenticated) client source. (Note that a
RADIUS-assigned ACL assigned to a port filters only the inbound traffic having a source
MAC address that matches the MAC address of the client whose authentication invoked the
ACL assignment.)
to:
Required destination keyword.
6-19
Summary of Contents for PROCURVE 2910AL
Page 1: ...Access Security Guide ProCurve Switches W 14 03 2910al www procurve com ...
Page 2: ......
Page 3: ...HP ProCurve 2910al Switch February 2009 W 14 03 Access Security Guide ...
Page 84: ...Configuring Username and Password Security Front Panel Security 2 36 ...
Page 156: ...TACACS Authentication Operating Notes 4 30 ...
Page 288: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup 8 22 ...
Page 416: ...Configuring Advanced Threat Protection Using the Instrumentation Monitor 10 28 ...
Page 572: ...Using Authorized IP Managers Operating Notes 14 14 ...
Page 592: ...12 Index ...
Page 593: ......