HP 2530 Manual Supplement page 4

Table of Contents

Advertisement

Introduction..................................................................................................................36
RADIUS-assigned, dynamic ACLs....................................................................................36
Traffic applications........................................................................................................37
Contrasting RADIUS-assigned and static ACLs...................................................................38
Multiple clients sharing the same RADIUS-assigned ACL................................................40
Effect of multiple ACL application types on an interface.................................................40
ACL features, planning, and configuration........................................................................40
The packet-filtering process.............................................................................................41
Operating rules for RADIUS-assigned ACLs.......................................................................41
Configuring an ACL in a RADIUS server...........................................................................42
Nas-Filter-Rule-Options...................................................................................................42
ACE syntax in RADIUS servers........................................................................................44
Example using the standard attribute in an IPv4 ACL..........................................................46
Example using HP VSA 63 to assign IPv6 or IPv4 ACLs......................................................47
Example using HP VSA 61 to assign IPv4 ACLs.................................................................49
Configuration notes.......................................................................................................51
Explicitly deny inbound traffic from an authenticated client.............................................51
Implicitly deny any IP traffic........................................................................................51
Configuring the switch to support RADIUS-assigned ACLs...................................................51
Displaying current RADIUS-assigned ACL activity on the switch............................................52
Event log messages.......................................................................................................55
Access Control Lists (ACLs).......................................................................................................57
Introduction.......................................................................................................................57
ACL applications...............................................................................................................58
RADIUS-assigned ACLs.......................................................................................................58
General application options................................................................................................58
IPv6 ACLs..............................................................................................................................58
Concurrent IPv4 and IPv6 ACLs............................................................................................59
ACL inbound application points...........................................................................................59
VACL applications..............................................................................................................59
RADIUS-assigned (dynamic) port ACL applications.................................................................60
RADIUS-assigned ACLs when multiple clients use the same port...........................................60
802.1X user-based and port-based applications................................................................61
Considerations..................................................................................................................61
IPv6 applications...............................................................................................................62
Planning and configuring ACLs.................................................................................................63
ACL operation........................................................................................................................63
Packet-filtering...................................................................................................................64
Planning an ACL application....................................................................................................68
Switch resource usage........................................................................................................68
Prioritizing and monitoring ACL and QoS feature usage..........................................................68
ACL resource usage and monitoring.....................................................................................68
Rule usage........................................................................................................................68
Managing ACL resource consumption...................................................................................69
Oversubscribing available resources................................................................................69
Troubleshooting shortage of resources..............................................................................70
Example of ACL resource usage......................................................................................70
Viewing current rule usage.............................................................................................70
Traffic management and improved network performance.............................................................70
4
Contents

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents