7-28
Configuring RADIUS Server Support for Switch Services
Configuring and Using Dynamic (RADIUS-Assigned) Access Control Lists
Example Using the Standard Attribute (92) In an IPv4 ACL
The Standard attribute (92), when used in an ACL without the HP-Nas-Rules-
IPv6 VSA, filters IPv4 traffic inbound from the authenticated client. (Any IPv6
traffic inbound from the client is dropped.) This example illustrates configur-
ing RADIUS-assigned IPv4 ACL support on FreeRADIUS using the standard
attribute for two different client identification methods (username/password
and MAC address).
1.
Enter the ACL standard attribute in the FreeRADIUS
dictionary.rfc4849
file.
ATTRIBUTE Nas-FILTER-Rule 92
2.
Enter the switch IP address, NAS (Network Attached Server) type, and
the key used in the FreeRADIUS
clients.conf
file. For example, if the
switch IP address is 10.10.10.125 and the key (“secret”) is “1234”, you
would enter the following in the server’s
clients.conf
file:
host <
ipv6-addr
>:
Specifies a single destination IPv6 address.
Note:
Filtering IPv6 traffic requires the Standard Attribute (Nas-Filter-Rule) with the HP-Nas-Rules-IPv6
VSA set to
1
. (Refer to table 7-7 on page 7-24.)
<
ipv6-addr
/<
prefix
>:
Specifies a series of contiguous destination addresses or all
destination addresses in a subnet. The
< prefix >
specifies the number of leftmost bits
in a packet’s destination IPv6 address that must match the corresponding bits in the
destination IPv6 address listed in the ACE. For example, a destination of
FE80::1b:127/112 in the ACE means that a match occurs when an inbound packet
(of the designated IPv6 type) from the authenticated client has a destination IPv6
address where the first 112 are FE80::1b. (The last 16 bits in the address configured
in the ACE form a “wildcard”, and can be any value from 0 to FFFF.) Also, see
Note
,
above.
[
tcp/udp-port
|
tcp/udp-port-range
]:
Optional TCP or UDP port specifier. Used when the ACE
is intended to filter client TCP or UDP traffic with one or more specific TCP or UDP
destination port numbers. You can specify port numbers as individual values and/or
ranges. For example, the following ACE shows two ways to deny any UDP traffic from an
authenticated client that has a DA of any address and a UDP destination port of 135, 137-
139, or 445:
deny in udp from any to any 135, 137-139, 445
deny in 17 from any to any 135, 137-139, 445
[
icmp-type
|
icmpv6-type
]
:
Optional ICMP type specifier. This can be either a keyword or an
ICMP type number. For a listing of numbers and types, refer to table 7-8, “ICMP Type
Numbers and Keywords” on page 7-42.
[ cnt ]:
Optional counter specifier for a RADIUS-assigned ACE. When used, the counter
increments each time there is a “match” with the ACE. This option does not require that
you configure the switch for RADIUS accounting.
Содержание HP ProCurve Series 6600
Страница 2: ......
Страница 6: ...iv ...
Страница 26: ...xxiv ...
Страница 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Страница 204: ...4 72 Web and MAC Authentication Client Status ...
Страница 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Страница 756: ...16 8 Key Management System Configuring Key Chain Management ...
Страница 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Страница 777: ......