Specifications

Mapping Security ACLs
RoamAbout Mobility System Software Configuration Guide 15-13
Mapping Security ACLs
AnACLdoesnottakeeffectuntilyoucommititandmapittoauseroraninterface.
UserbasedsecurityACLsaremappedtoanIEEE802.1Xauthenticatedsessiondu ringtheAAA
process.Youcanspecifythatoneoftheauthorizationattributesreturnedduringauthenticationis
anamedsecurity
ACL.TheRASmapsthenamedACLautomaticallytotheusersauthenticated
session.
SecurityACLscanalsobemappedstaticallytoVLANs,virtualports,orDistributedAPs.User
basedACLsareprocessedbeforetheseACLs,becausetheyaremorespecificandclosertothe
networkedge.
Mapping User-Based Security ACLs
Whenyouconfigureadministratororuserauthentication,youcansetaFilterIdauthorization
attributeattheRADI USserverorattheRoamAboutSwit ch’slocaldatabase.TheFilterIdattribute
isasecurityACLnamewiththedirectionofthepacketsappended—forexample,aclname.inor
aclname.out.The
securityACLmappedbyFilterIdinstructstheRAStouseitslocaldefinitionof
theACL,includingtheflowdirection,tofilterpacketsfortheauthenticateduser.
Example
TomapasecurityACLtoausersession,followthesesteps:
1. CreatethesecurityACL.Forexample,tofilterpacketscomingfrom192.168.253.1andgoingto
192.168.253.12, typethefollowingcommand:
RBT-8100# set security acl ip acl-222 permit ip 192.168.253.1 0.0.0.0
198.168.253.12 0.0.0.0 hits
2. CommitthesecurityACLtotherunningconfiguration.Forexample,tocommitacl222,type
thefollowingcommand:
RBT-8100# commit security acl acl-222
success: change accepted.
3. ApplytheFilterIdauthenticationatt ributetoauserssessionviaanexternalRADIUSserver.
Forinstructions,seethedocumentationforyourRADIUSserver.
4. Alternatively,authenticatetheuserwiththeFilterIdattributeintheRoamAboutSwitch’s
localdatabase.Useoneofthefollowingcommands.Specify.inforincomingpacketsor
.out
foroutgoingpackets.
Note: The Filter-Id attribute is more often received by the RAS through an external AAA RADIUS
server than applied through the local database.
Note: If the Filter-Id value returned through the authentication and authorization process does not
match the name of a committed security ACL in the RAS, the user fails authorization and cannot be
authenticated.
Mapping Target Commands
User authenticated by a password set user username attr filter-id acl-name.in
set user username attr filter-id acl-name.out