Setup Guide
NOTE: The system displays error when both the lter-ID and RADIUS Filter Rule attributes are sent in the same RADIUS Access-
Accept frame.
RADIUS NAS-Filter-Rule attribute
The switch or NAS saves the RADIUS-assigned DACL rules under a lter name derived from the supplicant MAC addresses. The NAS
dynamically generates a lter for the rules downloaded through the RADIUS NAS-Filter-Rule attribute. The names of the downloaded lter
rules have a prex __Rad followed by the supplicant MAC addresses.
The RADIUS NAS-Filter-Rule attribute indicates the lter rules to be applied for a specic supplicant. The RADIUS server includes the
RADIUS NAS-Filter-Rule attribute in the Access-Accept frame sent to the switch.
Dell EMC Networking OS supports only the certain lters when conguring the ACLs in the RADIUS server.
Supported lters in RADIUS-assigned DACLs are:
• L3 protocol number
• Source IP address
• Destination IP address
• TCP and UDP port numbers
• DSCP
• ECN
• ICMP type
• Fragments
Radius-assigned DACLs have a unique name based on the supplicant MAC address.
The ACLs downloaded from the RADIUS server must match the syntax of Dell EMC Networking OS. The system discards any rule that
does not match the syntax. For more information about ACL conguration, see Dell EMC Conguration Guide and Dell EMC Command Line
Reference Guide .
NOTE
: Do not modify the downloaded RADIUS-assigned DACLs using the OS9 CLI as they are generated dynamically from the
RADIUS server.
NOTE: Any change in the lter such as adding a new lter rule and removing a lter rule take eect only after re-authentication
of the supplicant.
View RADIUS-assigned DACL
To view the RADIUS-assigned DACL, use show ip accounting access-list or show dot1x interface commands.
show ip accounting access-list output:
DellEMC#show ip accounting access-list
!
Extended Ingress IP access list test on GigabitEthernet 1/1
Total cam count 15
seq 5 permit ip host 1.1.1.1 host 2.2.2.2
seq 6 permit ip host 4.4.4.4 host 5.5.5.5
seq 12 deny ip host 1.1.1.1 host 2.2.2.2
seq 17 permit ip host 100.0.0.1 host 150.0.0.100 count (0 packets)
seq 22 deny ip host 100.0.0.1 host 200.0.0.100 count (0 packets)
seq 27 deny ip any any count (0 packets)
seq 32 permit tcp 1.1.1.1 1.1.1.1 eq 65535 2.2.2.2 2.2.2.2 eq 65535 monitor no-drop order 254
seq 37 permit ip host 1.1.1.1 host 2.2.2.2 dscp 63 ecn 3 fragments log monitor no-drop order
254
seq 42 permit ip any host 150.0.0.100 dscp 63 ecn 3
seq 47 permit ip 100.0.0.0/28 200.0.0.0/23
seq 52 permit ip 100.0.0.0/16 any
seq 57 permit icmp host 1.1.1.1 200.0.0.0/23
seq 62 permit icmp any 200.0.0.0/27
seq 67 permit icmp host 1.1.1.1 any
Security
795