General RADIUS Configurations Configuration Guide, Cisco IOS XE Release 3S
ACL Default Direction
ACL Default Direction
Last Updated: March 25, 2013
The ACL Default Direction feature allows the filter direction to be changed on the server (where the filter direction is not specified) to inbound packets (packets coming into the network) only.
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for ACL Default Direction
Before you can change the default direction of filters from RADIUS, you must perform the following tasks:
For more information, refer to the AAA chapters of the Cisco IOS Security Configuration Guide: Securing User Services, Release 12.4T and the Cisco IOS Dial Technologies Configuration Guide, Release 12.4T .
For more information, see Cisco IOS IP Addressing Services Configuration Guide , Release 12.4T.
Information About ACL Default Direction
The radius-server attribute 11 direction default Command
The radius-server attribute 11 direction default command allows you to change the default direction of filters for your ACLs via RADIUS. (RADIUS attribute 11 (Filter-Id) indicates the name of the filter list for the user.) Enabling this command allows you to change the filter direction to inbound--which stops traffic from entering a router, and reduces resource consumption--rather than keeping the outbound default direction, where filtering occurs only as the traffic is about to leave the network.
How to Configure ACL Default Direction
Configuring the ACL Default Direction from RADIUS via Attribute 11 Filter-Id
2. configure terminal
3. radius-server attribute 11 direction default [inbound | outbound]
Verifying the ACL Default Direction from RADIUS via Attribute 11 Filter-Id
Perform this task to verify the default direction of filters from RADIUS and to verify that RADIUS attribute 11 is being sent in access accept requests.
2. more system:running-config
3. debug radius
Configuration Examples for ACL Default Direction
Default Direction of Filters via RADIUS Attribute 11 Filter-Id Example
RADIUS User Profile with Filter-Id Example
The following is an example of a RADIUS user profile (Merit Daemon format) that includes RADIUS attribute 11 (Filter-Id):
client Password = "password1" Service-Type = Framed, Framed-Protocol = PPP, Filter-Id = "myfilter.out"
The RADIUS user profile shown in this example produces the following reply from the NAS:
RADIUS: Send to unknown id 79 10.51.13.4:1645, Access-Request, len 85 RADIUS: authenticator 84 D3 B5 7D C2 5B 70 AD - 1E 5C 56 E8 3A 91 D0 6E RADIUS: User-Name  8 "client" RADIUS: CHAP-Password  19 * RADIUS: NAS-Port  6 20030 RADIUS: NAS-Port-Type  6 ISDN  RADIUS: Called-Station-Id  6 "4321" RADIUS: Calling-Station-Id  6 "1234" RADIUS: Service-Type  6 Framed  RADIUS: NAS-IP-Address  6 10.1.73.74 RADIUS: Received from id 79 10.51.13.4:1645, Access-Accept, len 46 RADIUS: authenticator 9C 6C 66 E2 F1 42 D6 4B - C1 7D D4 5E 9D 09 BB A1 RADIUS: Service-Type  6 Framed  RADIUS: Framed-Protocol  6 PPP  RADIUS: Filter-Id  14 RADIUS: 6D 79 66 69 6C 74 65 72 2E 6F 75 74 [myfilter.out]
Feature Information for ACL Default Direction
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
© 2013 Cisco Systems, Inc. All rights reserved.