.. _example_interfaces_ethernet_authenticator_aaa_authorization_aclid: ###### Acl Id ###### .. sidebar:: Contents .. contents:: :depth: 2 :local: This scenario shows how to install traffic policies from received RADIUS messages (using the "Filter-Id" attribute and according to RFC2865). .. image:: acl.svg :width: 400 ************************* Test 802.1x Filter-ID ACL ************************* Description =========== DUT0 is configured with an 802.1x-authenticated interface and DUT1 is configured as a supplicant. A traffic policy is automatically configured in DUT0 after the supplicant is authenticated. Scenario ======== .. include:: aclid/test802.1xfilter-idacl .. raw:: html
********************************* Test 802.1x Filter-ID ACL And CoA ********************************* Description =========== In this scenario, DUT1 is successfully authenticated and a traffic policy is configured from a "Filter-ID" attribute. A CoA message is then received from the authentication server that changes the configured traffic policy to drop non-ICMP traffic. Scenario ======== .. include:: aclid/test802.1xfilter-idaclandcoa .. raw:: html
********************** Test MAB Filter-ID ACL ********************** Description =========== DUT0 is configured with a MAB-authenticated interface. A traffic policy is automatically configured in DUT0 after the supplicant is authenticated via MAC address. Scenario ======== .. include:: aclid/testmabfilter-idacl .. raw:: html
****************************** Test MAB Filter-ID ACL And CoA ****************************** Description =========== In this scenario, DUT1 is successfully authenticated via MAC address and a traffic policy is configured from a "Filter-ID" attribute. A CoA message is then received from the authentication server that changes the configured traffic policy to drop non-ICMP traffic. Scenario ======== .. include:: aclid/testmabfilter-idaclandcoa .. raw:: html