5-17
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
Chapter 5 Shared Profile Components
Network Access Restrictions
About IP-based NAR Filters
For IP-based NAR filters, ACS uses the following attributes, depending upon the
AAA protocol of the authentication request:
•
If you are using
—The
rem_addr
field from the start
packet body is used.
Note
When an authentication request is forwarded by proxy to a
Cisco Secure ACS, any NARs for requests are applied to
the IP address of the forwarding AAA server, not to the IP address of
the originating AAA client.
•
If you are using RADIUS IETF
—The
calling-station-id
(attribute 31)
and
called-station-id
(attribute 30) fields are used.
AAA clients that do not provide sufficient IP address information (for example,
some types of firewall) do not support full NAR functionality.
Other attributes for
IP-based
restrictions, per protocol, include the following
NAR fields:
•
If you are using
—The NAR fields listed in Cisco Secure ACS use
the following values:
–
AAA client
—The
NAS-IP-address
is taken from the source address in
the socket between Cisco Secure ACS and the client.
–
Port
—The
port
field is taken from the start packet body.
•
If you are using RADIUS
—The NAR fields listed in Cisco Secure ACS use
the following values:
–
AAA client
—The
NAS-IP-address
(attribute 4) or, if NAS-IP-address
does not exist,
NAS-identifier
(attribute 32) is used.
–
Port
—The
NAS-port
(attribute 5) or, if NAS-port does not exist,
NAS-port-ID
(attribute 87) is used.