Users Guide

Table Of Contents
Authentication, Authorization, and Accounting 317
If there is an error applying the ACL to the port, a WARN log message
indicating same is issued (Interface X/X/X not authorized.
Application of downloaded ACL XXX did not complete due
to resource exhaustion) and the Access-Accept is treated as an
Access-Reject. The port is not authorized. Any previously configured ACLs
are added back to the port. If Accounting is enabled, the Acct-Start packet is
not sent and an EAP-Failure packet is sent to the 802.1X client.
The VSA av-pair is coded as follows: Attribute 26, Vendor ID 9, Vendor sub-
type 9.
Predefined ACL Selection
Send the vendor proprietary VSA (009/001) AV-pair (26) attribute syntax
from the RADIUS server in the Access-Accept message to select an ACL that
is already configured on the switch, but is not necessarily associated to the
authenticating interface. The ACL must be preconfigured on the switch. The
extended-access-control-list-name is the name or number of an existing ACL.
The standard-access-control-list-name is the number of an existing ACL. The
ACL need not be statically preconfigured on the port prior to RADIUS
configuring the ACL when authorizing the port. All statically-configured
ACLs on a port are disassociated from the port prior to configuring the
dynamic ACL and authorizing the port. The ACL applied is considered state,
not configuration and is not shown in the running-config.
Syntax
ip:inacl={standard-access-control-list-name | extended-access-
control-list-name }
ipv6:inacl={standard-access-control-list-name | extended-access-
control-list-name }
The ip token before the colon indicates an existing IPv4 ACL name or
number follows the equals sign.
The ipv6 token before the colon indicates an IPv6 ACL name or number
follows the equals sign.
The token standard-access-control-list-name means a Dell EMC Standard
ACL identified by the decimal number after the equals sign.