Support is automatically enabled when all of the required conditions are met.
The following describes the conditions and feature limitations:
• On Layer 3 router code, dynamic IP ACLs are allowed on physical ports when ACL-per-port-per-
vlan is enabled.
• On Layer 3 router code, dynamic IP ACLs are allowed on tagged and dual-mode ports when ACL-
per-port-per-vlan is enabled. If ACL-per-port-per-vlan is not enabled, dynamic IP ACLs are not
allowed on tagged or dual-mode ports.
• Dynamic IP ACLs can be added to tagged/untagged ports in a VLAN with or without a VE, as long
as the tagged/untagged ports do not have configured ACLs assigned to them. The following shows
some example scenarios where dynamic IP ACLs would not apply:
‐ A port is a tagged/untagged member of VLAN 20, VLAN 20 includes VE 20, and an ACL is
bound to VE 20.
‐ A port is a tagged/untagged member of VLAN 20, VLAN 20 includes VE 20, and a per-
port-per-vlan ACL is bound to VE 20 and to a subset of ports in VE 20
In the above scenarios, dynamic IP ACL assignment would not apply in either instance, because a
configured ACL is bound to VE 20 on the port. Consequently, the MAC session would fail.
Configuration considerations and guidelines for multi-device port authentication
• On FastIron X Series devices, dynamic ARP inspection (DAI) and DHCP Snooping are supported
together with dynamic ACLs.
• Dynamic IP ACLs with multi-device port authentication are supported. Dynamic MAC address filters
with multi-device port authentication are not supported.
• In the Layer 2 switch code, dynamic IP ACLs are not supported when ACL-per-port-per-vlan is
enabled on a global-basis.
• The RADIUS Filter ID (type 11) attribute is supported. The Vendor-Specific (type 26) attribute is not
supported.
• The dynamic ACL must be an extended ACL. Standard ACLs are not supported.
• Multi-device port authentication and 802.1x can be used together on the same port. However,
Brocade does not support the use of multi-device port authentication and 802.1X with dynamic
ACLs together on the same port. If a single supplicant requires both 802.1x and multi-device port
authentication, and if both 802.1x and multi-device port authentication try to install different dynamic
ACLs for the same supplicant, the supplicant will fail authentication.
• Dynamically assigned IP ACLs are subject to the same configuration restrictions as non-
dynamically assigned IP ACLs. One caveat is that ports with VE interfaces cannot have assigned
user-defined ACLs. For example, a user-defined ACL bound to a VE or a port on a VE is not
allowed. There are no restrictions on ports that do not have VE interfaces.
• Dynamic ACL filters are supported only for the inbound direction. Dynamic outbound ACL filters are
not supported.
• Dynamic ACL assignment with multi-device port authentication is not supported in conjunction with
any of the following features:
‐ IP source guard
‐ Rate limiting
‐ Protection against ICMP or TCP Denial-of-Service (DoS) attacks
‐ Policy-based routing
‐ 802.1X dynamic filter
Configuring the RADIUS server to support dynamic IP ACLs
When a port is authenticated using multi-device port authentication, an IP ACL filter that exists in the
running-config file on the Brocade device can be dynamically applied to the port. To do this, you
Configuration considerations and guidelines for multi-device port authentication
266 FastIron Ethernet Switch Security Configuration Guide
53-1003088-03
Comentarios a estos manuales