D-Link DGS-1520 User Manual - Page 594
Control List ACL Commands, Access-List Configuration Mode
View all D-Link DGS-1520 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 594 highlights
DGS-1520 Series Gigabit Ethernet Smart Managed Switch Web UI Reference Guide does not configure the VLAN attributes, when the port is not guest VLAN member, it will be kept in its current authentication VLAN, and when the port is guest VLAN member, it will be assigned to its original VLAN. To assign the ACL by the RADIUS server, the proper parameters should be configured on the RADIUS server. The table below shows the parameters for an ACL. VSA14 ACL Script The parameters of the Vendor-Specific Attribute are: RADIUS Tunnel Attribute Vendor-ID Vendor-Type Attribute-Specific Field Description Defines the vendor. Defines the attribute. Used to assign the ACL script. The format is based on Access Control List (ACL) Commands. Value 171 (DLINK) 14 (for ACL script) ACL Script For example: ip access-list a1;permit host 10.90.90.100;exit; mac accesslist extended m1;permit host 00-00-00-01-90-10 any; exit; Usage Required Required Required If the user has configured the ACL attribute of the RADIUS server (for example, ACL script: ip access-list a1;permit host 10.90.90.100;exit; mac access-list extended m1;permit host 00-00-00-01-90-10 any; exit;), and the 802.1X, MAC- based Access Control, JWAC or WAC authentication is successful, the device will assign the ACL script according to the RADIUS server. The enter Access-List Configuration Mode and exit Access-List Configuration Mode must be a pair, otherwise the ACP script will be reject. For more information about the ACL module, please refer to Access Control List (ACL) Commands chapter. NAS-Filter-Rule (92) The table below shows the parameters for NAS-Filter-Rule: RADIUS Tunnel Attribute NAS-Filter-Rule Description This attribute indicates the filter rules to be applied for the user. Value A string (concatenating the individual filter rules, separated by a NULL (0x00) octet) Usage Required Filter Rule Format Use the permit command to add a permit entry. Use the deny command to add a deny entry. {permit | deny} in tcp from any to {any | DST-IP-ADDR | DST-IP-NET-ADDR | DST-IPV6-ADDR | DST-IPV6-NETADDR} [TCP-PORT-RANGE] {permit | deny} in udp from any to {any | DST-IP-ADDR | DST-IP-NET-ADDR | DST-IPV6-ADDR | DST-IPV6-NETADDR} [UDP-PORT-RANGE] {permit | deny} in icmp from any to {any | DST-IP-ADDR | DST-IP-NET-ADDR | DST-IPV6-ADDR | DST-IPV6-NETADDR} [ICMP-TYPE] {permit | deny} in ip from any to {any | DST-IP-ADDR | DST-IP-NET-ADDR | DST-IPV6-ADDR | DST-IPV6-NETADDR} {permit | deny} in IP-PROT-VALUE from any to {any | DST-IP-ADDR | DST-IP-NET-ADDR | DST-IPV6-ADDR | DST-IPV6-NET-ADDR} Parameters Parameter in Description Specifies the ingress traffic. 584