494
C
HAPTER
21: C
ONFIGURING
AAA
FOR
N
ETWORK
U
SERS
All of the authorization attributes listed in Table 40 on page 448 can be
specified in a service profile except
ssid
.
Assigning a Security
ACL to a User or a
Group
Once a security access control list (ACL) is defined and committed, it can
be applied dynamically and automatically to users and user groups
through the 802.1X authentication and authorization process. When you
assign a Filter-Id attribute to a user or group, the security ACL name value
is entered as an authorization attribute into the user or group record in
the local WX database or RADIUS server.
If the Filter-Id value returned through the authentication and
authorization process does not match the name of a committed security
ACL in the WX, the user fails authorization and cannot be connected.
(For details about security ACLs, see Chapter 19, “Configuring and
Managing Security ACLs,” on page 377.)
Assigning a Security ACL Locally
To use the local WX database to restrict a user, a MAC user, or a group of
users or MAC users to the permissions stored within a committed security
ACL, use the commands shown in Table 44.
Table 44
Commands for Assigning a Security ACL Locally
Security ACL Target Commands
User authenticated
by a password
set user
username
attr filter-id
acl-name
.in
set user
username
attr filter-id
acl-name
.out
Group of users
authenticated by a
password
set usergroup
groupname
attr filter-id
acl-name
.in
set usergroup
groupname
attr filter-id
acl-name
.out
User authenticated
by a MAC address
set mac-user
username
attr filter-id
acl-name
.in
set mac-user
username
attr filter-id
acl-name
.out
Group of users
authenticated by a
MAC address
set mac-usergroup
groupname
attr filter-id
acl-name
.in
set mac-usergroup
groupname
attr filter-id
acl-name
.out
Содержание 3CRWX120695A
Страница 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Страница 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Страница 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Страница 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Страница 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Страница 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Страница 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Страница 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Страница 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Страница 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Страница 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Страница 706: ...706 GLOSSARY ...