Specifications
Mapping Security ACLs
15-14 Configuring and Managing Security ACLs
WhenassignedtheFilter‐Idattribute,anauthenticateduserwithacurrentsessionreceives
packetsbasedonthesecurityACL.Forexample,torestrictincomingpacketsforNatashato
thosespecifiedinacl‐222,typethefollowingcommand:
RBT-8100# set user Natasha attr filter-id acl-222.in
success: change accepted.
YoucanalsomapasecurityACLtoausergroup.Fordetails,see“AssigningaSecurityACLtoa
UseroraGroup”onpage 17‐48.Formoreinformationaboutauthenticatingand authorizing
users,see“AboutAdministrativeAccess”onpage 3‐4and“AAAToolsforNetworkUsers”
on
page 17‐8.
Mapping Security ACLs to VLANs, Virtual Ports, or
Distributed APs
SecurityACLscanbemappedtoVLANs,virtualports,andDistributedAPs.Usethefollowing
command:
set security acl map acl-name {vlan vlan-id | port port-list [tag tag-value] |
dap dap-num} {in | out}
SpecifythenameoftheACL,VLAN,tagvalue(s)ofthevirtualport,orthenumberofthe
DistributedAPtowhichtheACListobemapped,andthedirectionforpacketfiltering.For
virtualportsorDistri butedAPs,youcanspecifyasinglevalue,acomma‐separatedlistof
values,
ahyphen‐separatedrange,oranycombination,withnospaces.
Example
TomapsecurityACLacl‐222tovirtualports 1through3and5onport 2tofilterincomingpackets,
typethefollowingcommand:
RBT-8100# set security acl map acl-222 port 2 tag 1-3,5 in
success: change accepted.
PlanyoursecurityACLmapstoVLANs,virtualports,andDistributedAPssothatonlyone
securityACLfiltersaflowofpackets.IfmorethanonesecurityACLfi ltersthesametraffic,you
cannotguaranteetheorderinwhichtheACErulesareapplied.
User authenticated by a MAC address set mac-user username attr filter-id
acl-name.in
set mac-user username attr filter-id
acl-name.out
Mapping Target Commands