ProCurve 6200yl User's Guide Page 217

  • Download
  • Add to my manuals
  • Print
  • Page
    / 596
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 216
7-11
Configuring RADIUS Server Support for Switch Services
Configuring and Using RADIUS-Assigned Access Control Lists
Overview of RADIUS-Assigned, Dynamic Port ACLs
Dynamic port ACLs enhance network and switch management access security
and traffic control by permitting or denying authenticated client access to
specific network resources and to the switch management interface. This
includes preventing clients from using TCP or UDP applications (such as
Telnet, SSH, Web browser, and SNMP) if you do not want their access privi-
leges to include these capabilities.
This feature is designed for use on the network edge to accept RADIUS-
assigned, per-port ACLs (dynamic port ACLs) for Layer-3 filtering of IP traffic
entering the switch from authenticated clients. A given dynamic port ACL is
identified by a unique username/password pair or client MAC address, and
applies only to IP traffic entering the switch from clients that authenticate
with the unique credentials. The switch allows multiple dynamic port ACLs
on a given port, up to the maximum number of authenticated clients allowed
on the port. Also, dynamic port ACLs can be assigned regardless of whether
other ACLs affecting the same port are statically configured on the switch.
(For information on statically configured ACLs and application methods, refer
to chapter 10, “Access Control Lists (ACLs)”.)
A dynamic port ACL filters IP traffic entering the switch from the client whose
authentication initiated the ACL assignment. Filtering criteria is based on
destination and/or IP traffic type (such as TCP and UDP traffic) and traffic
counter options. Implementing the feature requires:
RADIUS authentication using the 802.1X, Web authentication, or MAC
authentication services available on the switch to provide client
authentication services
configuring the ACLs on the RADIUS server (instead of the switch),
and assigning each ACL to the username/password pair or MAC
address of the clients you want the ACLs to support
Using RADIUS to dynamically apply per-port ACLs to edge ports enables the
switch to filter IP traffic coming from outside the network, thus removing
unwanted IP traffic as soon as possible and helping to improve system
performance. Also, applying dynamic port ACLs to ports on the network edge
is likely to be less complex than configuring static port and VLAN-based ACLs
in the network core to filter unwanted IP traffic that could have been filtered
at the edge.
Page view 216
1 2 ... 212 213 214 215 216 217 218 219 220 221 222 ... 595 596

Comments to this Manuals

No comments