7-38
Configuring RADIUS Server Support for Switch Services
Configuring and Using Dynamic (RADIUS-Assigned) Access Control Lists
Figure 7-12. Example Showing a RADIUS-Assigned ACL Application to a Currently Active Client Session
HP Switch(config)# show access-list radius b1
Radius-configured Port-based ACL for
Port 1, Client -- 0017A4E6D787
IPv6 ACLs enabled (HP-Nas-Rules-Ipv6): FALSE
deny in tcp from any to 10.30.248.184 23 cnt
Packet Hit Counter : 1
deny in tcp from any to 10.30.248.184 80 cnt
Packet Hit Counter : 10
permit in tcp from any to 10.30.248.184 7
permit in udp from any to 10.30.248.184 7
deny in tcp from any to 10.30.248.184 161 cnt
Packet Hit Counter : 25
deny in udp from any to 10.30.248.184 161 cnt
Packet Hit Counter : 7
permit in ip from any to any
Indicates MAC address identity of the authenticated
client on the specified port. This data identifies the
client to which the ACL applies.
Lists “deny” ACE for Inbound Telnet (23 = TCP port
number) traffic, with counter configured to show the
number of matches detected.
Lists current counter for the preceding “Deny” ACE.
Lists “permit” ACEs for inbound TCP and UDP traffic,
with no counters configured.
Note that the implicit “deny any/any” included
automatically at the end of every ACL is not visible in
ACL listings generate by the switch.
Indicates that IPv6 traffic filtering is not enabled for
the ACL assigned to the authenticated client.
Syntax:
show port-access < web-based | mac-based | authenticator > clients <
port-list
> detailed
For ports, in
<
port-list
>
configured for authentication, shows the details of the RADIUS-
assigned features listed below that are active as the result of a client authentication. (Ports
in
<
port-list
>
that are not configured for authentication are not listed.)
Client Base Details:
Port:
Port number of port configured for authentication.
Session Status:
Indicates whether there is an authenticated client session active on the
port. Options include
authenticated
and
unauthenticated
.
Username:
During an authenticated session, shows the user name of the authenticated
client. If the client is not authenticated, this field is empty.
IP:
Shows the authenticated client’s IP address, if available. Requires DHCP snooping
enabled on the switch. When “
n/a
” appears in the field, the switch has not been able to
acquire the client’s IP address. (Where the client IP address is available to the switch,
it can take a minute or longer for the switch to learn the address.) For more on this
topic, refer to “Configuring RADIUS Accounting on page 6-53.
Session Time (sec):
For an unauthenticated session, indicates the elapsed time in seconds
since the client was detected on the port. For an authenticated session, indicates the
elapsed time in seconds since the client was authenticated on the port.
MAC Address:
During an authenticated session, shows the MAC address of the authen-
ticated client.
— Continued on the Next Page —
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......