Configuring a Downloadable Policy
Beginning in privileged EXEC mode:
SUMMARY STEPS
1.
configure terminal
2.
access-list access-list-number { deny | permit } { hostname | any | host } log
3.
interface interface-id
4.
ip access-group acl-id in
5.
exit
6.
aaa new-model
7.
aaa authorization network default group radius
8.
ip device tracking
9.
ip device tracking probe
[
count
|
interval
|
use-svi
]
10.
radius-server vsa send authentication
11.
end
DETAILED STEPS
Purpose
Command or Action
Enters the global configuration mode.
configure terminal
Example:
Switch#
configure terminal
Step 1
Defines the default port ACL.
access-list access-list-number { deny | permit
} { hostname | any | host } log
Step 2
The access-list-number is a decimal number from 1 to 99 or 1300 to
1999.
Example:
Switch(config)#
access-list 1 deny any
log
Enter
deny
or
permit
to specify whether to deny or permit access if
conditions are matched.
The source is the source address of the network or host that sends a
packet, such as this:
•
hostname
: The 32-bit quantity in dotted-decimal format.
•
any
: The keyword any as an abbreviation for source and
source-wildcard value of 0.0.0.0 255.255.255.255. You do not
need to enter a source-wildcard value.
•
host
: The keyword host as an abbreviation for source and
source-wildcard of source 0.0.0.0.
(Optional) Applies the source-wildcard wildcard bits to the source.
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
OL-29434-01
291
Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Authentication with Downloadable ACLs and Redirect URLs