Configuring and managing security ACLs 497
Nortel WLAN—Security Switch 2300 Series Configuration Guide

Mapping user-based security ACLs

When you configure administrator or user authentication, you can set a Filter-Id authorization attribute at the
RADIUS server or at the WSS’s local database. The Filter-Id attribute is a security ACL name with the
direction of the packets appended—for example, acl-name.in or acl-name.out. The security ACL mapped by
Filter-Id instructs the WSS to use its local definition of the ACL, including the flow direction, to filter packets
for the authenticated user.
To map a security ACL to a user session, follow these steps:
1Create the security ACL. For example, to filter packets coming from 192.168.253.1 and going
to 192.168.253.12, type the following command:
WSS# set security acl ip acl-222 permit ip 192.168.253.1 0.0.0.0 198.168.253.12
0.0.0.0 hits
2Commit the security ACL to the running configuration. For example, to commit acl-222, type
the following command:
WSS# commit security acl acl-222
success: change accepted.
3Apply the Filter-Id authentication attribute to a user’s session via an external RADIUS server.
For instructions, see the documentation for your RADIUS server.
4Alternatively, authenticate the user with the Filter-Id attribute in the WSS’s local database. Use
one of the following commands. Specify .in for incoming packets or .out for outgoing packets.
When assigned the Filter-Id attribute, an authenticated user with a current session receives
packets based on the security ACL. For example, to restrict incoming packets for Natasha to
those specified in acl-222, type the following command:
WSS# set user Natasha attr filter-id acl-222.in
success: change accepted.
Note. The Filter-Id attribute is more often received by the WSS through an external AAA
RADIUS server than applied through the local database.
Note. If the Filter-Id value returned through the authentication and authorization
process does not match the name of a committed security ACL in the WSS, the
user fails authorization and cannot be authenticated.
Mapping Target Commands
User authenticated by a
password set user username attr filter-id acl-name.in
set user username attr filter-id acl-name.out
User authenticated by a
MAC address set mac-user username attr filter-id acl-name.in
set mac-user username attr filter-id acl-name.out