HP (Hewlett-Packard) W.14.03 Switch User Manual


 
Configuring RADIUS Server Support for Switch Services
Configuring and Using RADIUS-Assigned Access Control Lists
Displaying the Current RADIUS-Assigned ACL Activity
on the Switch
These commands output data indicating the current ACL activity imposed per-
port by RADIUS server responses to client authentication.
Syntax: show access-list radius < port-list >
For the specified ports, this command lists the explicit ACEs, switch
port, and client MAC address for each ACL dynamically assigned by
a RADIUS server as a response to client authentication. If cnt
(counter) is included in an ACE, then the output includes the current
number of inbound packet matches the switch has detected in the
current session for that ACE.
Note: If a client authenticates but the server does not return a
RADIUS-assigned ACL to the client port, then the server does not have
a valid ACL configured and assigned to that client’s authentication
credentials.
For example, the following output shows that a RADIUS server has assigned
an ACL to port B1 to filter inbound traffic from an authenticated client
identified by a MAC address of 00-11-85-C6-54-7D.
Indicates MAC address identity of the authenticated
client on the specified port. This data identifies the
client to which the ACL applies.
Lists “deny” ACE for Inbound Telnet (23 = TCP port
number) traffic, with counter configured to show the
number of matches detected.
Lists current counter for the preceding “Deny” ACE.
Lists “permit” ACEs for inbound TCP and UDP traffic,
with no counters configured.
Note that the implicit “deny any/any” included
automatically at the end of every ACL is not visible in
ACL listings generate by the switch.
Figure 6-7. Example Showing a RADIUS-assigned ACL Application to a Currently Active Client Session
6-26