Dynamic Access Control Lists (ACL)
    
    
        The dynamic policy access control lists (ACL) feature uses the existing RADIUS
            change of authorization (CoA) mechanism to override existing policy rules associated
            with a user by including a new vendor specific attribute (VSA) in the CoA. When a CoA
            request to apply a particular set of match conditions and actions (or an action-set) is
            received, a look-up is performed to determine which policy profile the specified user
            was authenticated in, and the action-set ID specified in the CoA is applied in that
            user‘s profile.

Note   
You must configure
                VCAP partitioning to use dynamic ACL (see 
VCAP Partitioning).
 
 
        Dynamic ACLs and Layer 7 policy share the slices not used by TCI
            overwrite-enabled as one shared resource pool (see VCAP Partitioning). Dynamic ACLs have a higher priority to override Layer 7 policy
            (DNS) entry matches. 
        The following match conditions can be used:
                - ipv4src ipv4source/mask-length
 
                - ipv4dst ipv4dest/mask-length
 
                - ipproto ipproto
                    (TCP or UDP)
 
                - l4srcport l4sourceport/mask-length
                     (requires ipproto)
 
                - l4dstport l4destport/mask-length
                     (requires ipproto)
 
            
 
        The following actions can be used:
                - CoS (not valid if “drop” is
                    specified)
 
                - Drop (not valid if “forward” is
                    specified)
 
                - Forward (not valid if “drop” is
                    specified)
 
                - Syslog
 
                - Mirror
 
            
 
        Supported Platforms
            
            ExtremeSwitching X450-G2,
                X460-G2, X670-G2, X440-G2, X465, X590, X620, X690, X695, X870 series
                switches.
        
        Limitations
            
            
                - ACL style policy must be
                    selected.
 
                - Only a subset of the existing
                    policy rules is allowed. 
 
                - SNMP is not supported.