ProCurve 6200yl User's Guide Page 223

  • Download
  • Add to my manuals
  • Print
  • Page
    / 596
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 222
7-17
Configuring RADIUS Server Support for Switch Services
Configuring and Using RADIUS-Assigned Access Control Lists
Note If a dynamic port ACL permits an authenticated client’s inbound IP packet,
but the client port is also configured with a static port ACL and/or belongs to
a VLAN for which there is an inbound, VLAN-based ACL configured on the
switch, then the packet will also be filtered by these other ACLs. If there is a
match with a deny ACE in any of these ACLs, the switch drops the packet. (If
the packet is also subject to ACL mirroring, the mirroring action occurs
regardless of whether a permit or deny match occurs with any other ACL.)
Caution ACLs can enhance network security by blocking selected IP traffic, and can
serve as one aspect of maintaining network security. However, because ACLs
do not provide user or device authentication, or protection from malicious
manipulation of data carried in IP packet transmissions, they should not
be relied upon for a complete security solution.
Operating Rules for Dynamic Port ACLs
Relating a Client to a Dynamic Port ACL: A dynamic port ACL
for a particular client must be configured in the RADIUS server under
the authentication credentials the server should expect for that client.
(If the client must authenticate using 802.1X and/or Web Authentica-
tion, the username/password pair forms the credential set. If authen-
tication is through MAC Authentication, then the client MAC address
forms the credential set.) For more on this topic, refer to “Configuring
an ACL in a RADIUS Server” on page 7-18.
Multiple Clients Using the Same Username/Password Pair:
Multiple clients using the same username\password pair will use
duplicate instances of the same ACL.
Limits for ACEs in Dynamic Port ACLs: The switch supports up
to 80 characters in a single ACE. Exceeding this limit causes the
related client authentication to fail.
Effect of Other, Statically Configured ACLs: Suppose that port
“X” belongs to VLAN “Y” and has a dynamic port ACL assignment from
a RADIUS server to filter inbound traffic from an authenticated client.
Port “X” is also configured with a static port ACL, and VLAN “Y” is
statically configured with a VACL. Any IP traffic entering the switch
on port “X” from the client and having a match with a deny ACE
configured in any of these ACLs will be dropped. If an inbound RACL
Page view 222
1 2 ... 218 219 220 221 222 223 224 225 226 227 228 ... 595 596

Comments to this Manuals

No comments