User Guide

Table Of Contents
366 Configuring and Managing Security ACLs
320657-A
Mapping User-Based Security ACLs
When you configure administrator or user authentication, you can set a Filter-Id authorization attribute at the RADIUS
server or at the WSS switch’s local database. The Filter-Id attribute is a security ACL name with the direction of the
packets appended—for example, acl-name.in or acl-name.out. The security ACL mapped by Filter-Id instructs the WSS
switch to use its local definition of the ACL, including the flow direction, to filter packets for the authenticated user.
To map a security ACL to a user session, follow these steps:
1 Create the security ACL. For example, to filter packets coming from 192.168.253.1 and going to
192.168.253.12, type the following command:
23x0# set security acl ip acl-222 permit ip 192.168.253.1 0.0.0.0 198.168.253.12 0.0.0.0
hits
2 Commit the security ACL to the running configuration. For example, to commit acl-222, type the
following command:
23x0# commit security acl acl-222
success: change accepted.
3 Apply the Filter-Id authentication attribute to a user’s session through an external RADIUS server. For
instructions, see the documentation for your RADIUS server.
4 Alternatively, authenticate the user with the Filter-Id attribute in the WSS switch’s local database. Use
one of the following commands. Specify .in for incoming packets or .out for outgoing packets.
When assigned the Filter-Id attribute, an authenticated user with a current session receives packets based
on the security ACL. For example, to restrict incoming packets for Natasha to those specified in acl-222,
type the following command:
23x0# set user Natasha attr filter-id acl-222.in
success: change accepted.
Note. The Filter-Id attribute is more often received by the WSS through an external AAA
RADIUS server than applied through the local database.
Note. If the Filter-Id value returned through the authentication and authorization
process does not match the name of a committed security ACL in the WSS, the
user fails authorization and cannot be authenticated.
Mapping Target Commands
User authenticated by a
password
set user username attr filter-id acl-name.in
set user username attr filter-id acl-name.out
User authenticated by a
MAC address
set mac-user username attr filter-id acl-name.in
set mac-user username attr filter-id acl-name.out