Procedure to support RADIUS-assigned ACLs

An ACL configured in a RADIUS server is identified by the authentication credentials of the client or group of clients the ACL is designed to support. When a client authenticates with credentials associated with a particular ACL, the switch applies that ACL to the switch port the client is using. To enable the switch to forward a client's credentials to the RADIUS server, you must first configure RADIUS operation and an authentication method on the switch.

  1. Configure RADIUS operation on the switch:
    radius-server host <ipv4-address> key <key-string>
  2. This command configures the IPv4 address and encryption key of a RADIUS server. The server should be accessible to the switch and configured to support authentication requests from clients using the switch to access the network.
  3. Configure RADIUS network accounting on the switch (optional).
    aaa accounting network {<start-stop | stop-only> radius}
  4. You can also view ACL counter hits using either of the following commands:
    show access-list radius port-list
    show port-access {<authenticator | mac-based | web-based>} port-list clients detailed

    See the documentation provided with your RADIUS server for information on how the server receives and manages network accounting information, and how to perform any configuration steps necessary to enable the server to support network accounting data from the switch.

  5. Configure an authentication method. Options include 802.1X, web-based authentication, and MAC authentication. You can configure 802.1X, web-based authentication, and MAC authentication to operate simultaneously on the same ports. For 802.1X authentication, see User authentication methods. For web-based authentication and MAC authentication, see Prerequisites for web-based or MAC authentication.