15-118
Catalyst 6500 Series Switch Software Configuration Guide—Release 8.7
OL-8978-04
Chapter 15 Configuring Access Control
Downloadable ACLs
----- ------------------ ------------------------
5/35 32 0
Step 6
Authenticate the dot1x port and that the downloadable ACL is downloaded and the child ACL is
generated. Check the authentication status.
Console> (enable)
show port dot1x 5/35
Port Auth-State BEnd-State Port-Control Port-Status
----- ------------------- ---------- ------------------- -------------
5/35 authenticated idle auto authorized
Port Port-Mode Re-authentication Shutdown-timeout Control-Mode
admin oper
----- ------------- ----------------- ---------------- ---------------
5/35 SingleAuth disabled disabled Both Both
Port Posture-Token Critical-Status Termination action Session-timeout
----- ------------- --------------- ------------------ ---------------
5/35 - no NoReAuth -
Port Session-Timeout-Override Url-Redirect
----- ------------------------ ----------------------------------
5/35 disabled -
Port Critical Port-Name
----- -------- ---------
5/35 disabled -
Port Downloaded ACL
----- -------------------------------------------
5/35 ACSACL#-IP-test-44bb6f49
Note
If the dot1x Auth-state is in the ipawaiting state, add IP to the host (through DHCP or ARP or the
addition of static DHCP snooping bindings). A downloadable ACL will be downloaded and a child ACL
will be created.
If an MSFC is the router, to obtain DHCP-snooping bindings, map the DHCP-snooping ACL to the
authenticated host VLAN. If an external router configuration is used, map the DHCP-snooping ACL to
the host and DHCP-server port.
Sample Output of show Commands
The following sample outputs of
show
commands that are used for displaying the child ACL and
downloaded ACL after authentication:
•
Displays the system-generated ACL information:
Console> (enable)
show security acl info dacl1x_5_35
set security acl ip dacl1x_5_35
---------------------------------------------------
arp permit
1. permit arp-inspection any any
2. permit dhcp-snooping
3. permit ip host 9.6.6.104 10.76.255.85 255.255.255.0
4. deny ip host 9.6.6.104 64.104.129.189 255.255.0.0
5. permit tcp host 9.6.6.104 eq 21 host 10.76.255.25
6. deny ip host 9.6.6.104 6.104.129.189 255.255.0.0