ProCurve 6200yl User's Guide Page 222

  • Download
  • Add to my manuals
  • Print
  • Page
    / 596
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 221
7-16
Configuring RADIUS Server Support for Switch Services
Configuring and Using RADIUS-Assigned Access Control Lists
General ACL Features, Planning, and Configuration
These steps suggest a process for using dynamic port ACLs to establish access
policies for client IP traffic.
1. Determine the polices you want to enforce for authenticated client traffic
inbound on the switch.
2. Plan ACLs to execute traffic policies:
Apply ACLs on a per-client basis where individual clients need differ-
ent traffic policies or where each client must have a different user-
name/password pair or will authenticate using MAC authentication.
Apply ACLs on a client group basis where all clients in a given group
can use the same traffic policy and the same username/password pair.
3. Configure the ACLs on a RADIUS server accessible to the intended clients.
4. Configure the switch to use the desired RADIUS server and to support the
desired client authentication scheme. Options include 802.1X, Web
authentication, or MAC authentication. (Note that the switch supports the
option of simultaneously using 802.1X with either Web or MAC authenti-
cation.)
5. Test client access on the network to ensure that your RADIUS-based ACL
application is properly enforcing your policies.
For further information common to all ACL applications, refer to the following
sections in chapter 10, “Access Control Lists (ACLs)”:
“Features Common to All ACL Applications” on page 10-22
“General Steps for Planning and Configuring ACLs” on page 10-24
“Planning an ACL Application” on page 10-30
The Packet-filtering Process
Packet-Filtering in an applied ACL is sequential, from the first ACE in the ACL
to the implicit “deny any” following the last explicit ACE. This operation is the
same regardless of whether the ACL is applied dynamically from a RADIUS
server or statically in the switch configuration. For details of this process,
refer to “ACL Operation” in the chapter 10, “Access Control Lists (ACLs)”.
Page view 221
1 2 ... 217 218 219 220 221 222 223 224 225 226 227 ... 595 596

Comments to this Manuals

No comments