<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Format for ACS 5 Downloadable ACL? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/format-for-acs-5-downloadable-acl/m-p/1342952#M338326</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's what I think is the relevant detail from the ACS RADIUS auth report (for a successful authentication, but the downloadable ACL does not appear to be functioning):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User-Name=8021X\robertbarrett&lt;/P&gt;&lt;P&gt; Tunnel-Type=(tag=1) VLAN&lt;/P&gt;&lt;P&gt; Tunnel-Medium-Type=(tag=1) 802&lt;/P&gt;&lt;P&gt; Tunnel-Private-Group-ID=(tag=1) 13&lt;/P&gt;&lt;P&gt; cisco-av-pair=ACS:CiscoSecure-Defined-ACL=#ACSACL#-IP-NoICMPdACL-4a77275c&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Extracted EAP-Response containing EAP-MSCHAP challenge-response for inner method and accepting EAP-MSCHAP as negotiated&lt;/P&gt;&lt;P&gt;Evaluating Identity Policy&lt;/P&gt;&lt;P&gt;Matched rule&lt;/P&gt;&lt;P&gt;Selected Identity Source&lt;/P&gt;&lt;P&gt;Authenticating user against Active Directory&lt;/P&gt;&lt;P&gt;ACS has not been able to confirm previous successful machine/host authentication for user in Active Directory&lt;/P&gt;&lt;P&gt;User's Groups retrieval from Active Directory succeeded&lt;/P&gt;&lt;P&gt;User authentication against Active Directory succeeded&lt;/P&gt;&lt;P&gt;Authentication Passed&lt;/P&gt;&lt;P&gt;Evaluating Group Mapping Policy&lt;/P&gt;&lt;P&gt;Group Mapping Policy not configured&lt;/P&gt;&lt;P&gt;EAP-MSCHAP authentication attempt passed&lt;/P&gt;&lt;P&gt;Prepared EAP-Request with another PEAP challenge&lt;/P&gt;&lt;P&gt;Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;Extracted EAP-Response containing PEAP challenge-response&lt;/P&gt;&lt;P&gt;Extracted EAP-Response for inner method containing MSCHAP challenge-response&lt;/P&gt;&lt;P&gt;Inner EAP-MSCHAP authentication succeeded&lt;/P&gt;&lt;P&gt;Prepared EAP-Success for inner EAP method&lt;/P&gt;&lt;P&gt;PEAP inner method finished successfully&lt;/P&gt;&lt;P&gt;Prepared EAP-Request with another PEAP challenge&lt;/P&gt;&lt;P&gt;Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;Extracted EAP-Response containing PEAP challenge-response&lt;/P&gt;&lt;P&gt;PEAP authentication succeeded&lt;/P&gt;&lt;P&gt;Prepared EAP-Success&lt;/P&gt;&lt;P&gt;External Policy Check Policy not configured&lt;/P&gt;&lt;P&gt;Evaluating Exception Authorization Policy&lt;/P&gt;&lt;P&gt;No rule was matched&lt;/P&gt;&lt;P&gt;Evaluating Authorization Policy&lt;/P&gt;&lt;P&gt;Matched rule&lt;/P&gt;&lt;P&gt;Selected Authorization Profile&lt;/P&gt;&lt;P&gt;Added the dACL specified in the Authorization Profile&lt;/P&gt;&lt;P&gt;Returned RADIUS Access-Accept&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 03 Aug 2009 18:13:43 GMT</pubDate>
    <dc:creator>Robert.N.Barrett_2</dc:creator>
    <dc:date>2009-08-03T18:13:43Z</dc:date>
    <item>
      <title>Format for ACS 5 Downloadable ACL?</title>
      <link>https://community.cisco.com/t5/network-access-control/format-for-acs-5-downloadable-acl/m-p/1342951#M338283</link>
      <description>&lt;P&gt;Our environment is the ACS 5 eval, patched, running under VMWare Server 2 (patched) on Windows Server 2008.  Current policy/profile configurations allow PEAP and EAP-TLS authentication with VLAN assignment coming from ACS to a 3560G switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to test a simple downloadable ACL with ACS 5 and a 3560G switch, but am not sure what the format should look like.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What works:&lt;/P&gt;&lt;P&gt;If I go into Policy Elements -&amp;gt; Auth &amp;amp; Permissions -&amp;gt; Network Access -&amp;gt; Authorization Profile -&amp;gt; ApplydACL (my profile) -&amp;gt; Radius Attributes and create custom radius attributes like below, everything works great:&lt;/P&gt;&lt;P&gt;cisco-av-pair string ip:inacl#1=deny icmp any any echo&lt;/P&gt;&lt;P&gt;cisco-av-pair string ip:inacl#2=deny icmp any any echo-reply&lt;/P&gt;&lt;P&gt;cisco-av-pair string ip:inact#3=permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What doesn't work:&lt;/P&gt;&lt;P&gt;If I go into Policy Elements -&amp;gt; Auth &amp;amp; Permissions -&amp;gt; Network Access -&amp;gt; Authorization Profile -&amp;gt; ApplydACL (my profile) -&amp;gt; Common Tasks and enable the static downloadble ACL (NoICMPdACL), it doesn't work.  I have tried two different downloadable ACL (shown way down below).  Neither ACL takes effect (client can ping others, others can ping client), and we see the following text on the switch console with RADIUS debugging enabled:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RADIUS:  User-Name           [1]   16  "8021X\rnbarret"&lt;/P&gt;&lt;P&gt;RADIUS:  Class               [25]  20&lt;/P&gt;&lt;P&gt;RADIUS:   63 72 72 61 63 73 2F 33 38 36 38 37 35 31 39 2F  [crracs/38687519/]&lt;/P&gt;&lt;P&gt;RADIUS:   32 34                [ 24]&lt;/P&gt;&lt;P&gt;RADIUS:  Tunnel-Type         [64]  6   01:VLAN                   [13]&lt;/P&gt;&lt;P&gt;RADIUS:  Tunnel-Medium-Type  [65]  6   01:ALL_802                [6]&lt;/P&gt;&lt;P&gt;RADIUS:  EAP-Message         [79]  6&lt;/P&gt;&lt;P&gt;RADIUS:   03 6F 00 04                 [ o]&lt;/P&gt;&lt;P&gt;RADIUS:  Message-Authenticato[80]  18&lt;/P&gt;&lt;P&gt;RADIUS:   33 D3 AA 3F 7D 1D A2 C8 D9 08 10 0E 81 6E A8 C0              [ 3?}n]&lt;/P&gt;&lt;P&gt;RADIUS:  Tunnel-Private-Group[81]  5   01:"13"&lt;/P&gt;&lt;P&gt;RADIUS:  Vendor, Cisco       [26]  67&lt;/P&gt;&lt;P&gt;RADIUS:   Cisco AVpair       [1]   61  "ACS:CiscoSecure-Defined-ACL=#ACSACL#-IP-NoICMPdACL-4a77275c"&lt;/P&gt;&lt;P&gt;RADIUS:  Vendor, Microsoft   [26]  58&lt;/P&gt;&lt;P&gt;RADIUS:   MS-MPPE-Send-Key   [16]  52  *&lt;/P&gt;&lt;P&gt;RADIUS:  Vendor, Microsoft   [26]  58&lt;/P&gt;&lt;P&gt;RADIUS:   MS-MPPE-Recv-Key   [17]  52  *&lt;/P&gt;&lt;P&gt;RADIUS(00000023): Received from id 1645/19&lt;/P&gt;&lt;P&gt;RADIUS/DECODE: EAP-Message fragments, 4, total 4 bytes&lt;/P&gt;&lt;P&gt;%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/3, changed state to up&lt;/P&gt;&lt;P&gt;RADIUS: Received from id 1646/51 192.168.2.201:1646, Accounting-response, len 20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this ACL text does not work:&lt;/P&gt;&lt;P&gt;  deny icmp any any echo&lt;/P&gt;&lt;P&gt;  deny icmp any any echo-reply&lt;/P&gt;&lt;P&gt;  permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this ACL text also does not work:&lt;/P&gt;&lt;P&gt;  ip:inacl#1=deny icmp any any echo&lt;/P&gt;&lt;P&gt;  ip:inacl#2=deny icmp any any echo-reply&lt;/P&gt;&lt;P&gt;  ip:inact#3=permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone know what I'm doing wrong?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 23:37:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/format-for-acs-5-downloadable-acl/m-p/1342951#M338283</guid>
      <dc:creator>Robert.N.Barrett_2</dc:creator>
      <dc:date>2019-03-10T23:37:19Z</dc:date>
    </item>
    <item>
      <title>Re: Format for ACS 5 Downloadable ACL?</title>
      <link>https://community.cisco.com/t5/network-access-control/format-for-acs-5-downloadable-acl/m-p/1342952#M338326</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's what I think is the relevant detail from the ACS RADIUS auth report (for a successful authentication, but the downloadable ACL does not appear to be functioning):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User-Name=8021X\robertbarrett&lt;/P&gt;&lt;P&gt; Tunnel-Type=(tag=1) VLAN&lt;/P&gt;&lt;P&gt; Tunnel-Medium-Type=(tag=1) 802&lt;/P&gt;&lt;P&gt; Tunnel-Private-Group-ID=(tag=1) 13&lt;/P&gt;&lt;P&gt; cisco-av-pair=ACS:CiscoSecure-Defined-ACL=#ACSACL#-IP-NoICMPdACL-4a77275c&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Extracted EAP-Response containing EAP-MSCHAP challenge-response for inner method and accepting EAP-MSCHAP as negotiated&lt;/P&gt;&lt;P&gt;Evaluating Identity Policy&lt;/P&gt;&lt;P&gt;Matched rule&lt;/P&gt;&lt;P&gt;Selected Identity Source&lt;/P&gt;&lt;P&gt;Authenticating user against Active Directory&lt;/P&gt;&lt;P&gt;ACS has not been able to confirm previous successful machine/host authentication for user in Active Directory&lt;/P&gt;&lt;P&gt;User's Groups retrieval from Active Directory succeeded&lt;/P&gt;&lt;P&gt;User authentication against Active Directory succeeded&lt;/P&gt;&lt;P&gt;Authentication Passed&lt;/P&gt;&lt;P&gt;Evaluating Group Mapping Policy&lt;/P&gt;&lt;P&gt;Group Mapping Policy not configured&lt;/P&gt;&lt;P&gt;EAP-MSCHAP authentication attempt passed&lt;/P&gt;&lt;P&gt;Prepared EAP-Request with another PEAP challenge&lt;/P&gt;&lt;P&gt;Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;Extracted EAP-Response containing PEAP challenge-response&lt;/P&gt;&lt;P&gt;Extracted EAP-Response for inner method containing MSCHAP challenge-response&lt;/P&gt;&lt;P&gt;Inner EAP-MSCHAP authentication succeeded&lt;/P&gt;&lt;P&gt;Prepared EAP-Success for inner EAP method&lt;/P&gt;&lt;P&gt;PEAP inner method finished successfully&lt;/P&gt;&lt;P&gt;Prepared EAP-Request with another PEAP challenge&lt;/P&gt;&lt;P&gt;Returned RADIUS Access-Challenge&lt;/P&gt;&lt;P&gt;Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;RADIUS is re-using an existing session&lt;/P&gt;&lt;P&gt;Extracted EAP-Response containing PEAP challenge-response&lt;/P&gt;&lt;P&gt;PEAP authentication succeeded&lt;/P&gt;&lt;P&gt;Prepared EAP-Success&lt;/P&gt;&lt;P&gt;External Policy Check Policy not configured&lt;/P&gt;&lt;P&gt;Evaluating Exception Authorization Policy&lt;/P&gt;&lt;P&gt;No rule was matched&lt;/P&gt;&lt;P&gt;Evaluating Authorization Policy&lt;/P&gt;&lt;P&gt;Matched rule&lt;/P&gt;&lt;P&gt;Selected Authorization Profile&lt;/P&gt;&lt;P&gt;Added the dACL specified in the Authorization Profile&lt;/P&gt;&lt;P&gt;Returned RADIUS Access-Accept&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Aug 2009 18:13:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/format-for-acs-5-downloadable-acl/m-p/1342952#M338326</guid>
      <dc:creator>Robert.N.Barrett_2</dc:creator>
      <dc:date>2009-08-03T18:13:43Z</dc:date>
    </item>
    <item>
      <title>Format for ACS 5 Downloadable ACL?</title>
      <link>https://community.cisco.com/t5/network-access-control/format-for-acs-5-downloadable-acl/m-p/1342953#M338408</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Rob,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the same problem and my DACL doesn't work. Were you able to fix the problem? Can you specify how the DACL would take effect? Much appreciated. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Oct 2013 01:35:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/format-for-acs-5-downloadable-acl/m-p/1342953#M338408</guid>
      <dc:creator>amarkhan_1</dc:creator>
      <dc:date>2013-10-08T01:35:15Z</dc:date>
    </item>
  </channel>
</rss>

