Terminology - HP ProCurve 6400cl Series Access Security Manual

Hide thumbs Also See for ProCurve 6400cl Series:
Table of Contents

Advertisement

RADIUS-Based (Dynamic) ACLs
Supports only extended ACLs. (Refer to Terminology.)
The ACL filters only the IP traffic it receives inbound from
the authenticated client corresponding to that ACL, and
does not filter traffic inbound from other authenticated
clients.(The traffic source is not a configurable setting.)
Can contain up to 30 ACEs.
Requires client authentication by a RADIUS server
configured to dynamically assign an ACL to the client port,
based on client credentials.
ACEs allow a counter (cnt) option that causes a counter to
increment when there is a packet match.
Configuring a RADIUS Server To Specify Per-Port CoS and Rate-Limiting Services

Terminology

ACE: See Access Control Entry, below.
Access Control Entry (ACE): An ACE is a policy consisting of a packet-
handling action and criteria to define the packets on which to apply the action.
For RADIUS-based ACLs, the elements composing the ACE include:
permit or drop (action)
i n < ip-packet-type > from any (source)
to < ip-address [/ mask ] | any > (destination)
[ port-# ] (optional TCP or UDP application port numbers used when
the packet type is TCP or UDP)
ACL: See Access Control List, below.
Access Control List (ACL): A list (or set) consisting of one or more
explicitly configured Access Control Entries (ACEs) and terminating with an
implicit "deny" default which drops any packets that do not have a match with
any explicit ACE in the named ACL.
ACL Mask: Follows a destination IP address listed in an ACE. Defines which
bits in a packet's corresponding IP addressing must exactly match the IP
addressing in the ACE, and which bits need not match (wildcards).
DA: The acronym for Destination IP Address. In an IP packet, this is the
destination IP address carried in the header, and identifies the destination
intended by the packet's originator.
RADIUS Authentication and Accounting
VLAN-Based (Static) ACLs
Supports standard, extended, and connection-rate ACLs,
and applies these ACLs to traffic on all ports belonging to
the VLAN.
An ACL applied inbound on a VLAN filters all IP traffic
received on any member port from any source in the same
VLAN, as long as the traffic is either routed by the switch to
another VLAN or subnet, or has a DA on the switch itself. An
ACL applied outbound on a VLAN filters all routed IP traffic
leaving the switch on any member port.
Can contain up to 1024 ACEs per 5300xl switch.
Configured in the switch and statically applied to filter IP
traffic on all ports in the specified VLAN, regardless of other
factors.
ACEs allow a log option that generates a log message
whenever there is a packet match with a "deny" ACE.
6-27

Advertisement

Table of Contents
loading

Table of Contents