Restrictions for Configuring FQDN ACL
The Configuring FQDN ACL feature is supported only on IPv4 wireless sessions.
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This document describes how to configure an access control lists (ACL) using a fully qualified domain name (FQDN). The Configuring an FQDN ACL feature allows you to configure and apply an ACL to a wireless session based on the domain name system (DNS). The domain names are resolved to IP addresses, the IP addresses are given to the client as part of the DNS response, and the FQDN is then mapped to an ACL based on the IP address.
The Configuring FQDN ACL feature is supported only on IPv4 wireless sessions.
When access control lists (ACLs) are configured using a fully qualified domain name (FQDN), ACLs can be applied based on the destination domain name. The destination domain name is then resolved to an IP address, which is provided to the client as a part of the DNS response.
Guest users can log in using web authentication with a parameter map that consists of an FQDN ACL name.
Configure an IP access list.
Configure an IP domain name list.
Map an FQDN ACL with a domain name.
You can apply an access list to a specific domain by configuring the RADIUS server to send the fqdn-acl-name AAA attribute to the controller. The operating system checks for the passthrough domain list and its mapping, and permits the FQDN. The FQDN ACL allows clients to access only configured domains without authentication.
Note |
By default, an IP access list name is configured with the same name as the pass-through domain name. To override the default name, you can use the access-session passthrou-access-group access-group-name passthrou-domain-list domain-list-name command in global configuration mode. |
Command or Action | Purpose | |
---|---|---|
Step 1 |
ip access-list extended name Example:
|
Creates the IP access list. |
Step 2 |
permit ip any any Example:
|
Specifies the domains to be allowed for the wireless client. The domains are specified in the domain name list. |
You can configure a domain name list that contains a list of domain names that are allowed for DNS snooping by the access point. The DNS domain list name string must be identical to the extended access list name.
Command or Action | Purpose | |
---|---|---|
Step 1 |
passthrou-domain-list name Example:
|
Configures a passthrough domain name list. |
Step 2 |
match word Example:
|
Configures a passthrough domain list. Adds a list of websites that the client is allowed to query for access without first being required to be authenticated through the RADIUS server. |
Command or Action | Purpose | |
---|---|---|
Step 1 |
access-session passthrou-access-group access-group-name passthrou-domain-list domain-list-name Example:
|
Maps the FQDN ACL AAA attribute name with the domain name list. Use this command when configuring central web authentication. |
Step 2 |
parameter-map type webauth domain-list-name and login-auth-bypass fqdn-acl-name acl-name domain-name domain-name Example:
|
Maps an FQDN ACL name with the domain name list. Use the command when configuring local authentication on the controller. The RADIUS server can be configured to return an FQDN ACL name as part of the authenticated user profile. The controller dynamically applies the FQDN ACL to the user if the FQDN ACL is defined on the controller. |
The following commands can be used to monitor FQDN ACLs.
Command |
Purpose |
show access-session interface interface-name details |
Displays the FQDN ACL information configured on the interface. |
show access-session fqdn fqdn-maps |
Displays the FQDN ACL mapped to the domain name list. |
show access-session fqdn list-domain domain-name |
Displays the domain names. |
show access-session fqdn passthru-domain-list |
Displays the domains that are configured. |
# config terminal
(config)# ip access-list extended abc
(config-ext-nacl)# permit ip any any
(config-ext-nacl)# end
# show ip access-list abc
# config terminal
(config)# passthrou-domain-list abc
(config-fqdn-acl-domains)# match play.google.com
(config-fqdn-acl-domains)# end
# show access-session fqdn fqdn-maps
# config terminal
(config)# access-session passthrou-access-group abc passthrou-domain-list abc
(config)# end
# show access-session interface vlan 20
# config terminal
(config)# parameter-map type webauth abc
(config-params-parameter-map)# login-auth-bypass fqdn-acl-name abc domain-name abc
(config-params-parameter-map)# end
# show access-session fqdn fqdn-maps
Related Topic |
Document Title |
---|---|
Cisco IOS commands |
|
Security commands |
|
ACL configuration guide |
Security Configuration Guide: Access Control Lists |
Description |
Link |
---|---|
The Cisco Support and Documentation website provides online resources to download documentation, software, and tools. Use these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password. |
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Feature Name |
Releases |
Feature Information |
---|---|---|
Configuring an FQDN ACL |
The Configuring an FQDN ACL feature allows you to configure and apply an access control lists (ACL) to a wireless session based on the domain name system (DNS). The domain names are resolved to IP addresses, where the IP addresses are given to the client as part of the DNS response; the FQDN is then mapped to an ACL based on the IP address. The following commands were introduced or modified: access session passthrou access group , login-auth-bypass , parameter-map type webauth global , pass throu domain list name , show access-session fqdn . |