Specifications
Security ACL Configuration Scenario
RoamAbout Mobility System Software Configuration Guide 15-29
3. ConfigureanACEthatdeniesallIPtrafficfromanyIPaddressinthe10.10.11.0/24subnetto
anyaddressinthesamesubnet.
set security acl ip c2c deny ip 10.10.11.0 0.0.0.255 10.10.11.0 0.0.0.255
4. ConfigureanACEthatpermitsalltrafficthatdoesnotmatchtheACEsconfiguredabove:
set security acl ip c2c permit 0.0.0.0 255.255.255.255
5. CommittheACLtotheconfiguration:
commit security acl c2c
6. MaptheACLtotheoutboundandinboundtrafficdirectionsofVLANvlan‐1:
set security acl map c2c vlan vlan-1 out
set security acl map c2c vlan vlan-1 in
Security ACL Configuration Scenario
ThefollowingscenarioillustrateshowtocreateasecurityACLnamedacl‐99thatconsistsofone
ACEtopermitincomingpacketsfromoneIPaddress,andhowtomaptheACLtoaportanda
user:
1. TypethefollowingcommandtocreateandnameasecurityACLandadd
anACEtoit.
RBT-8100# set security acl ip acl-99 permit 192.168.1.1 0.0.0.0
2. ToviewtheACEyouhaveentered,typethefollowingcommand:
RBT-8100# show security acl editbuffer
ACL Type Status
---------------------------------- ---- -------------
acl-99 IP Not committed
3. Tosaveacl‐99anditsassociatedACEtotheconfiguration,typethefollowingcommand:
RBT-8100# commit security acl acl-99
success: change accepted.
4. Tomapacl‐99toport 9tofilterincomingpackets,typethefollowingcommand:
RBT-8100# set security acl map acl-99 port 9 in
mapping configuration accepted
BecauseeverysecurityACLinclud esan implicitruledenyingalltrafficthatisnotpermitted,
port 9nowacceptspacketsonlyfrom192.168.1.1,anddeniesallotherpackets.
5. Tomapacl‐99touserNatasha’ssessionswhenyouareusingthelocalRASdatabasefor
authentication,configureNatashainthe databasewith
theFilter‐Idattribu te.Typethe
followingcommands:
RBT-8100# set authentication dot1x Natasha local
success: change accepted.
RBT-8100# set user natasha attr filter-id acl-99.in
success: change accepted.
6. Alternatively,youcanmapacl‐99toNatasha’ssessionswhenyouareusingaremoteRADIUS
serverforauthentication.ToconfigureNatashaforpass‐throughauthenticationtothe
RADIUSservershorebirds,typethefollowingcommand:
Note: The commands in steps 1 and 2 permit traffic to and from the gateway. If the subnet has more
than one gateway, add a similar pair of ACEs for each gateway. Add the gateway ACEs before the
ACEs that block all traffic to and from addresses within the subnet.