D-Link DGS-1510 User Manual - Page 466

Tag field value, String field format, RADIUS Tunnel Attribute, Description, Value, Usage

Page 466 highlights

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide Tag field value (0x00, 0x03 ~ 0x1F, >0x1F) String field format VLAN IDs and check if there is one matched. If the switch can find one matched, it will move to that VLAN. If the switch cannot find the matched VLAN ID, it will think the VLAN setting string as a "VLAN Name". Then it will check that it can find out a matched VLAN Name. NOTE: A tag field of greater than 0x1F is interpreted as the first octet of the following field. If the user has configured the VLAN attribute of the RADIUS server (for example, VID 3), and the 802.1X, MAC-based Access Control, JWAC or WAC authentication is successful, the port will be assigned to VLAN 3. However if the user does not configure the VLAN attributes, when the port is not guest VLAN member, it will be kept in its current authentication VLAN, and when the port is guest VLAN member, it will be assigned to its original VLAN. To assign the ACL by the RADIUS server, the proper parameters should be configured on the RADIUS server. The table below shows the parameters for an ACL. VSA14 ACL Script The parameters of the Vendor-Specific Attribute are: RADIUS Tunnel Attribute Description Vendor-ID Defines the vendor. Vendor-Type Defines the attribute. Attribute-Specific Field Used to assign the ACL script. The format is based on Access Control List (ACL) Commands. Value Usage 171 (DLINK) Required 14 (for ACL script) Required ACL Script Required For example: ip access-list a1;permit host 10.90.90.100;exit; mac access-list extended m1;permit host 00-00-00-01-90-10 any; exit; If the user has configured the ACL attribute of the RADIUS server (for example, ACL script: ip access- list a1;permit host 10.90.90.100;exit; mac access-list extended m1;permit host 00-00-00-01-90-10 any; exit;), and the 802.1X, MAC-based Access Control, JWAC or WAC authentication is successful, the device will assign the ACL script according to the RADIUS server. The enter Access-List Configuration Mode and exit Access-List Configuration Mode must be a pair, otherwise the ACP script will be reject. For more information about the ACL module, please refer to Access Control List (ACL) Commands chapter. NAS-Filter-Rule (92) The table below shows the parameters for NAS-Filter-Rule: RADIUS Tunnel Attribute Description NAS-Filter-Rule This attribute indicates the filter rules to be applied for the user. Value Usage A string (concatenating the Required individual filter rules, separated by a NULL (0x00) octet) 455

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide
455
Tag field value
String field format
(0x00, 0x03 ~ 0x1F, >0x1F)
VLAN IDs and check if there is one matched. If the switch can find
one matched, it will move to that VLAN. If the switch cannot find the
matched VLAN ID, it will think the VLAN setting string as a “VLAN
Name”. Then it will check that it can find out a matched VLAN
Name.
NOTE:
A tag field of greater than 0x1F is interpreted as the first octet of the following
field.
If the user has configured the VLAN attribute of the RADIUS server (for example, VID 3), and the
802.1X, MAC-based Access Control, JWAC or WAC authentication is successful, the port will be
assigned to VLAN 3. However if the user does not configure the VLAN attributes, when the port is not
guest VLAN member, it will be kept in its current authentication VLAN, and when the port is guest
VLAN member, it will be assigned to its original VLAN.
To assign the
ACL
by the RADIUS server, the proper parameters should be configured on the
RADIUS server. The table below shows the parameters for an ACL.
VSA14 ACL Script
The parameters of the Vendor-Specific Attribute are:
RADIUS Tunnel Attribute
Description
Value
Usage
Vendor-ID
Defines the vendor.
171 (DLINK)
Required
Vendor-Type
Defines the attribute.
14 (for ACL script)
Required
Attribute-Specific Field
Used to assign the ACL
script. The format is based
on
Access Control List
(ACL) Commands
.
ACL Script
For example:
ip access-list a1;permit
host 10.90.90.100;exit;
mac access-list
extended m1;permit host
00-00-00-01-90-10 any;
exit;
Required
If the user has configured the ACL attribute of the RADIUS server (for example, ACL script: ip access-
list a1;permit host 10.90.90.100;exit; mac access-list extended m1;permit host 00-00-00-01-90-10
any; exit;), and the 802.1X, MAC-based Access Control, JWAC or WAC authentication is successful,
the device will assign the ACL script according to the RADIUS server. The enter
Access-List
Configuration Mode
and exit
Access-List Configuration Mode
must be a pair, otherwise the ACP
script will be reject. For more information about the ACL module, please refer to
Access Control List
(ACL) Commands
chapter.
NAS-Filter-Rule (92)
The table below shows the parameters for NAS-Filter-Rule:
RADIUS Tunnel Attribute
Description
Value
Usage
NAS-Filter-Rule
This attribute indicates the
filter rules to be applied for
the user.
A string (concatenating the
individual filter rules,
separated by a NULL
(0x00) octet)
Required