beautypg.com

Brocade FastIron Ethernet Switch Security Configuration Guide User Manual

Page 189

background image

Syntax: [no] global-filter-strict-security

To disable strict security mode for a specific interface, enter commands such as the following.

device(config)#interface e 1

device(config-if-e1000-1)#dot1x disable-filter-strict-security

To re-enable strict security mode for an interface, enter the following command.

device(config-if-e1000-1)#no dot1x disable-filter-strict-security

Syntax: [no] dot1x disable-filter-strict-security

The output of the show dot1x and show dot1x config commands has been enhanced to indicate
whether strict security mode is enabled or disabled globally and on an interface. Refer to

Displaying the

status of strict security mode

on page 208.

Dynamically applying existing ACLs or MAC address filters

When a port is authenticated using 802.1X security, an IP ACL or MAC address filter that exists in the
running-config on the Brocade device can be dynamically applied to the port. To do this, you configure
the Filter-ID (type 11) attribute on the RADIUS server. The Filter-ID attribute specifies the name or
number of the Brocade IP ACL or MAC address filter.

The following is the syntax for configuring the Filter-ID attribute to refer to a Brocade IP ACL or MAC
address filter.

Value

Description

ip.number .in

Applies the specified numbered ACL to the 802.1X authenticated port in the inbound direction.

ip.name .in

Applies the specified named ACL to the 802.1X authenticated port in the inbound direction.

mac.number .in Applies the specified numbered MAC address filter to the 802.1X authenticated port in the

inbound direction.

The following table lists examples of values you can assign to the Filter-ID attribute on the RADIUS
server to refer to IP ACLs and MAC address filters configured on a Brocade device.

Possible values for the filter ID
attribute on the RADIUS server

ACL or MAC address filter configured on the Brocade device

ip.2.in

access-list 2 permit host 10.48.0.3access-list 2 permit 10.0.0.0
0.255.255.255

ip.102.in

access-list 102 permit ip 10.0.0.0 0.255.255.255 any

ip.fdry_filter.in

ip access-list standard fdry_filter permit host 10.48.0.3

mac.2.in

mac filter 2 permit 3333.3333.3333 ffff.ffff.ffff any

mac.3.in

mac filter 3 permit 2222.2222.2222 ffff.ffff.ffff any

Dynamically applying existing ACLs or MAC address filters

FastIron Ethernet Switch Security Configuration Guide

189

53-1003088-03