Enhancements

Release M.10.02 Enhancements

Client’s Username (802.1X or Web Authentication)

Client’s Password (802.1X or Web Authentication)

mobile011 Auth-Type:= Local, User-Password == run101112 HP-IP-FILTER-RAW = “permit in tcp from any to 10.10.10.101”,

HP-IP-FILTER-RAW += “deny in tcp from any to any”, HP-IP-FILTER-RAW += “permit in ip from any to any”

Client’s Username (MAC Authentication)

 

Client’s Password ((MAC Authentication)ti ti )

 

 

 

 

 

 

 

 

08E99C4F0019 Auth-Type:= Local, User-Password == 08E99C4F0019 HP-IP-FILTER-RAW = “permit in tcp from any to 10.10.10.101”,

HP-IP-FILTER-RAW += “deny in tcp from any to any”, HP-IP-FILTER-RAW += “permit in ip from any to any”

Note that when the client MAC address is used for authentication, this address is used in both the username and password spaces in the entry.

Figure 8. Example of Configuring the FreeRADIUS Server To Support ACLs for the Indicated Clients

Format Details for ACEs Configured in a RADIUS-Based ACL.

Any instance of a RADIUS-Based ACL is structured to filter authenticated client traffic as follows:

Applies only to inbound client traffic on the switch port the authenticated client is using.

Allows only the “any” source address (for any authenticated IP device connected to the port).

Applies to all IP traffic from the authenticated client or to a specific type of IP traffic type from the client. Options include TCP, UDP, or any other type of IP traffic that is identified by an IP protocol number. (More information on protocol numbers is provided in the following ACL syntax description.)

Has one of the following destination types:

A specific IP address

A contiguous series of IP address or an entire subnet

Any IP address

Where the traffic type is either TCP or UDP, the ACE can optionally include one or more TCP or UDP port numbers.

60