<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Paul- in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/2930092#M37976</link>
    <description>&lt;P&gt;Hi Paul-&lt;/P&gt;
&lt;P&gt;A couple of questions:&lt;/P&gt;
&lt;P&gt;1. What version of code are you running on the 3650?&lt;/P&gt;
&lt;P&gt;2. Can you confirm that IP Device Tracking is NOT disabled? Perhaps even post the output from&amp;nbsp;&lt;STRONG&gt;show ip device tracking&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 12 Oct 2016 18:29:02 GMT</pubDate>
    <dc:creator>nspasov</dc:creator>
    <dc:date>2016-10-12T18:29:02Z</dc:date>
    <item>
      <title>ISE dACL downloaded, but not applied to port</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/2930091#M37975</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Hi,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I have configured ISE 2.1 and NAD, a 3650 switch to have a client download a dACL when authorised. The dACL is simply &lt;EM&gt;ip permit any any&amp;nbsp;&lt;/EM&gt;as I just want to see the dACL successfully working before making it specific.&lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I see the dACL is successfully downloaded to the Switch, but is &lt;SPAN style="text-decoration: underline;"&gt;not&lt;/SPAN&gt; applied to the port where the client PC is attached.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Below is the config and testing performed.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;aaa new-model&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;aaa group server radius ISE_Servers&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;server name sbrx-ise-a01&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;server name sbrx-ise-a02&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;aaa authentication login default none&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;aaa authentication login VTY group radius local&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;aaa authentication login ISE-Login group ISE_Servers local&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;aaa authentication dot1x default group ISE_Servers&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;aaa authorization console&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;aaa authorization exec default none &lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;aaa authorization exec VTY group radius local &lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;aaa authorization exec ISE-Login group ISE_Servers local if-authenticated &lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;aaa authorization network default group ISE_Servers &lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;aaa accounting exec default start-stop group ISE_Servers&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;aaa server radius dynamic-author&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;client 172.30.2.170 server-key 7 144621582E24292074272174&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;client 172.30.3.170 server-key 7 0257370829260C2A1C411B58&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;device-sensor accounting&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;device-sensor notify all-changes&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;dot1x system-auth-control&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;interface GigabitEthernet1/0/12&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;switchport access vlan 120&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;switchport mode access&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;switchport voice vlan 102&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;no logging event link-status&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;no logging event power-inline-status&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;authentication event fail action next-method&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;authentication event server dead action authorize vlan 120&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;authentication event server dead action authorize voice&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;authentication event server alive action reinitialize &lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;authentication host-mode multi-auth&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;authentication open&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;authentication order mab dot1x&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;authentication priority dot1x mab&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;authentication port-control auto&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;authentication periodic&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;authentication timer reauthenticate 7200&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;authentication timer inactivity 180&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;authentication violation restrict&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;mab&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;snmp trap mac-notification change added&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;no snmp trap link-status&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;dot1x pae authenticator&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;dot1x timeout tx-period 10&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;spanning-tree portfast&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;radius server sbrx-ise-a01&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;address ipv4 172.30.2.170 auth-port 1645 acct-port 1646&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;timeout 2&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;key 7 091D7D5A3B2514190F5C2B386A&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;radius server sbrx-ise-a02&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;address ipv4 172.30.3.170 auth-port 1645 acct-port 1646&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;timeout 2&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&amp;nbsp;key 7 101F3A4A273711000854053965&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt;Test-Room-F#sh ip access-lists interface gigabitEthernet 1/0/12&lt;BR /&gt;Test-Room-F#&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Test-Room-F#sh ip access-lists &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Extended IP access list CISCO-CWA-URL-REDIRECT-ACL&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 100 deny udp any any eq domain&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 101 deny tcp any any eq domain&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 102 deny udp any eq bootps any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 103 deny udp any any eq bootpc&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 104 deny udp any eq bootpc any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 105 permit tcp any any eq www&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Extended IP access list implicit_deny_acl&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 deny ip any any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Extended IP access list preauth_ipv4_acl (per-user)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 permit udp any any eq domain&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 permit tcp any any eq domain&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 permit udp any eq bootps any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 40 permit udp any any eq bootpc&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 50 permit udp any eq bootpc any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 60 deny ip any any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000; font-size: 10pt;"&gt;Extended IP access list xACSACLx-IP-PERMIT_ALL_TRAFFIC-57452910 (per-user)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000; font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 permit ip any any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Test-Room-F#sh authentication sessions interface gigabitEthernet 1/0/12 detail&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Interface:&amp;nbsp; GigabitEthernet1/0/12&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IIF-ID:&amp;nbsp; 0xC3CA4000000F34&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC Address:&amp;nbsp; b05a.da3a.0b80&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IPv6 Address:&amp;nbsp; Unknown&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IPv4 Address:&amp;nbsp; 172.30.28.123&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; User-Name:&amp;nbsp; YYYY\xxxxx-xxxxx&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status:&amp;nbsp; Authorized&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Domain:&amp;nbsp; DATA&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Oper host mode:&amp;nbsp; multi-auth&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Oper control dir:&amp;nbsp; both&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session timeout:&amp;nbsp; 7200s (local), Remaining: 6895s&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Timeout action:&amp;nbsp; Reauthenticate&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Restart timeout:&amp;nbsp; N/A&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session Uptime:&amp;nbsp; 306s&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Common Session ID:&amp;nbsp; AC1E01B7000013863DD2CF52&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Acct Session ID:&amp;nbsp; Unknown&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Handle:&amp;nbsp; 0x0C000E9B&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Current Policy:&amp;nbsp; POLICY_Gi1/0/12&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Local Policies:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Idle timeout:&amp;nbsp; 180 sec&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Server Policies:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ACS ACL:&amp;nbsp; xACSACLx-IP-PERMIT_ALL_TRAFFIC-57452910&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Method status list: &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Method&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; State&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dot1x&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authc Success&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mab&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Stopped&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Any thoughts on why I&amp;nbsp;don't see the &lt;EM&gt;ip permit any any&lt;/EM&gt; on gi1/0/12&amp;nbsp; after a successful authorisation much appreciated.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:08:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/2930091#M37975</guid>
      <dc:creator>paul1202</dc:creator>
      <dc:date>2019-03-11T07:08:38Z</dc:date>
    </item>
    <item>
      <title>Hi Paul-</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/2930092#M37976</link>
      <description>&lt;P&gt;Hi Paul-&lt;/P&gt;
&lt;P&gt;A couple of questions:&lt;/P&gt;
&lt;P&gt;1. What version of code are you running on the 3650?&lt;/P&gt;
&lt;P&gt;2. Can you confirm that IP Device Tracking is NOT disabled? Perhaps even post the output from&amp;nbsp;&lt;STRONG&gt;show ip device tracking&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2016 18:29:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/2930092#M37976</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-10-12T18:29:02Z</dc:date>
    </item>
    <item>
      <title>Hi Neno,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/2930093#M37977</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Hi Neno,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Thanks for your response.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;The 3650's are running 15.2(2).E4.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I need to double check the current running configuration, but I'm pretty certain that&amp;nbsp;&lt;EM&gt;ip device tracking&lt;/EM&gt; has been enabled, but it does not show up in the config (possibly now the default option??).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I thought it was only&amp;nbsp;used by the switch to substitute the dACL source address of ANY to the specific IP address of the host and shouldn't have any affect on it actually being applied.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I'll confirm tomorrow.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Thanks Paul&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2016 14:59:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/2930093#M37977</guid>
      <dc:creator>paul1202</dc:creator>
      <dc:date>2016-10-13T14:59:02Z</dc:date>
    </item>
    <item>
      <title>IP Device Tracking did become</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/2930094#M37978</link>
      <description>&lt;P&gt;IP Device Tracking did become a default command at some point of Cisco IOS but I don't remember the exact version. If you do "show run all" you can check all default commands that are in the running config. Or if you do "show ip device tracking" If that has any output then you are running it.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And yes, the dACL gets constructed based on the IP Address of the host and the destination address in the ACL. With that said, can you also post the dACL that you are pushing from ISE?&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2016 16:35:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/2930094#M37978</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-10-13T16:35:33Z</dc:date>
    </item>
    <item>
      <title>From my original post you</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/2930095#M37979</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;From my original post you will see that it is just a simple &lt;EM&gt;permit ip any any &lt;/EM&gt;as I just want to prove and see it is being downloaded successfully before being more specific.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000; font-size: 10pt;"&gt;Extended IP access list xACSACLx-IP-PERMIT_ALL_TRAFFIC-57452910 (per-user)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000; font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 permit ip any any&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2016 18:26:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/2930095#M37979</guid>
      <dc:creator>paul1202</dc:creator>
      <dc:date>2016-10-13T18:26:08Z</dc:date>
    </item>
    <item>
      <title>Yes, as I thought, ip device</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/2930096#M37980</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Yes, as I thought,&amp;nbsp;&lt;EM&gt;ip device tracking&lt;/EM&gt; is enabled.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Test-Room-F#sh ip device tracking all&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Global IP Device Tracking for clients = Enabled&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Global IP Device Tracking Probe Count = 3&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Global IP Device Tracking Probe Interval = 30&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Global IP Device Tracking Probe Delay Interval = 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;-----------------------------------------------------------------------------------------------&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; IP Address&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC Address&amp;nbsp;&amp;nbsp; Vlan&amp;nbsp; Interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Probe-Timeout&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; State&amp;nbsp;&amp;nbsp;&amp;nbsp; Source&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;-----------------------------------------------------------------------------------------------&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;172.30.7.183&amp;nbsp;&amp;nbsp;&amp;nbsp; 0800.0f5e.7d81 102&amp;nbsp; GigabitEthernet1/0/26&amp;nbsp; 30&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ACTIVE&amp;nbsp;&amp;nbsp; ARP &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;172.30.28.171&amp;nbsp;&amp;nbsp; 88ae.1db7.3780 120&amp;nbsp; GigabitEthernet1/0/26&amp;nbsp; 30&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ACTIVE&amp;nbsp;&amp;nbsp; ARP &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;172.30.28.176&amp;nbsp;&amp;nbsp; 0018.1c01.964f 120&amp;nbsp; GigabitEthernet1/0/36&amp;nbsp; 30&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ACTIVE&amp;nbsp;&amp;nbsp; ARP &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;172.30.28.139&amp;nbsp;&amp;nbsp; 3863.bbaf.a9b9 120&amp;nbsp; GigabitEthernet1/0/45&amp;nbsp; 30&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; INACTIVE ARP &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;172.30.28.200&amp;nbsp;&amp;nbsp; 84b2.6102.c840 120&amp;nbsp; GigabitEthernet1/0/1&amp;nbsp;&amp;nbsp; 30&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ACTIVE&amp;nbsp;&amp;nbsp; ARP &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;172.30.4.49&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0010.3603.2562 102&amp;nbsp; GigabitEthernet1/0/35&amp;nbsp; 30&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ACTIVE&amp;nbsp;&amp;nbsp; ARP &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;172.30.28.123&amp;nbsp;&amp;nbsp; b05a.da3a.0b80 120&amp;nbsp; GigabitEthernet1/0/12&amp;nbsp; 30&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ACTIVE&amp;nbsp;&amp;nbsp; ARP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Total number interfaces enabled: 46&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Enabled interfaces:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; Gi1/0/1, Gi1/0/2, Gi1/0/3, Gi1/0/4, Gi1/0/5, Gi1/0/6, Gi1/0/7,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; Gi1/0/8, Gi1/0/9, Gi1/0/10, Gi1/0/11, Gi1/0/12, Gi1/0/13, Gi1/0/14,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; Gi1/0/15, Gi1/0/16, Gi1/0/17, Gi1/0/18, Gi1/0/20, Gi1/0/21, Gi1/0/22,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; Gi1/0/23, Gi1/0/24, Gi1/0/25, Gi1/0/26, Gi1/0/27, Gi1/0/28, Gi1/0/29,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; Gi1/0/30, Gi1/0/31, Gi1/0/32, Gi1/0/33, Gi1/0/34, Gi1/0/35, Gi1/0/36,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; Gi1/0/37, Gi1/0/38, Gi1/0/39, Gi1/0/40, Gi1/0/41, Gi1/0/42, Gi1/0/43,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; Gi1/0/44, Gi1/0/45, Gi1/0/46, Gi1/0/47&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Oct 2016 07:02:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/2930096#M37980</guid>
      <dc:creator>paul1202</dc:creator>
      <dc:date>2016-10-14T07:02:02Z</dc:date>
    </item>
    <item>
      <title>I have now found out that the</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/2930097#M37981</link>
      <description>&lt;P&gt;&lt;SPAN style="color: #333300; font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;I have now found out that the c3650/c3850 switches do NOT support&amp;nbsp; the &lt;EM&gt;&lt;FONT color="#ff0000" size="2"&gt;show ip access-lists interface x/x &lt;SPAN style="color: #000000;"&gt;command.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333300; font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;&lt;EM&gt;&lt;FONT color="#ff0000" size="2"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;SPAN style="font-family: 'Calibri',sans-serif; font-size: 11pt;"&gt;show platform acl definition&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;FONT color="#ff0000" size="2"&gt;&lt;SPAN style="color: #000000;"&gt;and&lt;/SPAN&gt;&lt;/FONT&gt;&lt;FONT color="#ff0000" size="2"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;EM&gt; show&lt;/EM&gt; auth sess int &lt;/SPAN&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #003300; font-family: arial,helvetica,sans-serif; font-size: 11pt;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;FONT color="#ff0000" size="2"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Oct 2016 13:42:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/2930097#M37981</guid>
      <dc:creator>paul1202</dc:creator>
      <dc:date>2016-10-14T13:42:46Z</dc:date>
    </item>
    <item>
      <title>Thanks for posting this,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/2930098#M37982</link>
      <description>&lt;P&gt;Thanks for posting this,&lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2017 19:32:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/2930098#M37982</guid>
      <dc:creator>pd-yca</dc:creator>
      <dc:date>2017-03-22T19:32:20Z</dc:date>
    </item>
    <item>
      <title>Re: ISE dACL downloaded, but not applied to port</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/4024894#M37983</link>
      <description>&lt;P&gt;Hi Paul&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you ever managed to solve this issue?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am currently having the same problem with ISE 2.4 (Patch 10) and a 2960X with 15.2(4)E6.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Christian&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 12:17:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/4024894#M37983</guid>
      <dc:creator>Christian Faessler</dc:creator>
      <dc:date>2020-02-06T12:17:48Z</dc:date>
    </item>
    <item>
      <title>Re: ISE dACL downloaded, but not applied to port</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/4099748#M561041</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I'm running ISE 2.6 patch 6 and have a similar issue.&amp;nbsp; My ACLs were applied in ISE 2.3 however now that we are on ISE 2.6 patch 6 and I try to update one the switches don't see the change.&amp;nbsp; Has anyone seen this?&amp;nbsp; I to run 2960x model switches with code version&amp;nbsp;15.2(7)E2.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Pete&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jun 2020 03:17:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/4099748#M561041</guid>
      <dc:creator>pnowikow</dc:creator>
      <dc:date>2020-06-09T03:17:53Z</dc:date>
    </item>
    <item>
      <title>Re: ISE dACL downloaded, but not applied to port</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/4159910#M563128</link>
      <description>&lt;P&gt;Same here, but I am told that the issue is intermittent.&lt;/P&gt;&lt;P&gt;Any help much appreciated, debugs I can use, etc.&lt;/P&gt;&lt;P&gt;C2960X&amp;nbsp;15.2(6)E&lt;/P&gt;&lt;P&gt;ISE 2.4 Patch 5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISE live logs says the dacl was sent to the switch successfully.&lt;/P&gt;&lt;P&gt;"show ip access-list interface gix/x/x" shows a default pre-auth acl instead.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Oct 2020 09:12:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/4159910#M563128</guid>
      <dc:creator>sdfgdfgfddfdfgdf</dc:creator>
      <dc:date>2020-10-01T09:12:57Z</dc:date>
    </item>
    <item>
      <title>Re: ISE dACL downloaded, but not applied to port</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/4160082#M563133</link>
      <description>&lt;P&gt;With dACL's, you must have IP Device Tracking enabled.&amp;nbsp; If the switch is unable to determine the endpoint's IP address, the dACL cannot be applied.&amp;nbsp; Do a "show auth sess int gx/y detail" to see if the authentication/authorization is successful and whether or not the ACL is applied.&amp;nbsp; In that output, make sure the IPv4 field has a correct IP address.&amp;nbsp; Then make sure the status shows authorized.&amp;nbsp; Towards the bottom of that output, you will see what policies were applied from the server.&amp;nbsp; It should show the ACL there with some random naming to keep it unique to the session.&amp;nbsp; You can then do a show ip access-list &amp;lt;name&amp;gt; using that ACL name that shows up in that output.&amp;nbsp; That would be the ACL that is applied to that particular endpoint's session.&lt;/P&gt;&lt;P&gt;If you don't see the session authorized in the show auth sess int gx/y detail output, then something is not working right.&amp;nbsp; Could be authentication failed or the policy from the server could not be applied.&amp;nbsp; For example, if you are trying to do VLAN assignment but the VLAN does not exist on the switch, authorization fails even though authentication was successful.&amp;nbsp; If you are pushing a dACL that has incorrect syntax, that will fail as well.&amp;nbsp; Finally, if there is no IPv4 address shown in that output, then the switch cannot apply the dACL.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Oct 2020 14:25:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/4160082#M563133</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2020-10-01T14:25:11Z</dc:date>
    </item>
    <item>
      <title>Re: ISE dACL downloaded, but not applied to port</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/4293236#M565542</link>
      <description>&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;In my cas the VLAN was not defined in my switch.&lt;/P&gt;&lt;P&gt;So after adding the VLAN, it works perfactley.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 18:32:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/4293236#M565542</guid>
      <dc:creator>abdallah.hanouh</dc:creator>
      <dc:date>2021-02-17T18:32:20Z</dc:date>
    </item>
    <item>
      <title>Re: ISE dACL downloaded, but not applied to port</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/4437242#M568623</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am facing a similar issue.I am having my ISE , Windows 7 machine &amp;amp; vSwitch image ( IOU) inside eve-ng.I see the dacl &amp;amp; VLAN 10 downloaded to the switch but could not see the dacl on the interface.The reason i understand is that switch has not learned endpoint ip address .But i see the status as authorized also could see the ip access list in cli show ip acces-list.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SW-P#show authentication sessions interface gigabitEthernet 1/2 details &lt;BR /&gt;Interface: GigabitEthernet1/2&lt;BR /&gt;MAC Address: 5000.0006.0000&lt;BR /&gt;IPv6 Address: Unknown&lt;BR /&gt;IPv4 Address: Unknown&lt;BR /&gt;User-Name: user&lt;BR /&gt;Status: Authorized&lt;BR /&gt;Domain: DATA&lt;BR /&gt;Oper host mode: multi-auth&lt;BR /&gt;Oper control dir: both&lt;BR /&gt;Session timeout: N/A&lt;BR /&gt;Common Session ID: AC1001FE0000000C00025B70&lt;BR /&gt;Acct Session ID: 0x00000002&lt;BR /&gt;Handle: 0x61000001&lt;BR /&gt;Current Policy: POLICY_Gi1/2&lt;/P&gt;
&lt;P&gt;Local Policies:&lt;BR /&gt;Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)&lt;BR /&gt;Security Policy: Should Secure&lt;BR /&gt;Security Status: Link Unsecure&lt;/P&gt;
&lt;P&gt;Server Policies:&lt;BR /&gt;Vlan Group: Vlan: 10&lt;BR /&gt;Security Policy: None&lt;BR /&gt;&lt;BR /&gt;Security Status: Link Unsecure&lt;/P&gt;
&lt;P&gt;Method status list:&lt;BR /&gt;Method State&lt;BR /&gt;dot1x Authc Success&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SW-P#show ip access-lists &lt;BR /&gt;Extended IP access list preauth_ipv4_acl (per-user)&lt;BR /&gt;10 permit udp any any eq domain&lt;BR /&gt;20 permit tcp any any eq domain&lt;BR /&gt;30 permit udp any eq bootps any&lt;BR /&gt;40 permit udp any any eq bootpc&lt;BR /&gt;50 permit udp any eq bootpc any&lt;BR /&gt;60 deny ip any any&lt;BR /&gt;Extended IP access list xACSACLx-IP-PERMIT_ALL_TRAFFIC-57f6b0d3 (per-user)&lt;BR /&gt;1 permit ip any any&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SW-P#show ip device tracking interface gigabitEthernet 1/2&lt;BR /&gt;--------------------------------------------&lt;BR /&gt;Interface GigabitEthernet1/2 is: STAND ALONE&lt;BR /&gt;IP Device Tracking = Enabled&lt;BR /&gt;IP Device Tracking Probe Count = 3&lt;BR /&gt;IP Device Tracking Probe Interval = 30&lt;BR /&gt;IP Device Tracking Enabled Features:&lt;BR /&gt;HOST_TRACK_CLIENT_SM&lt;BR /&gt;--------------------------------------------&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kindly let me know what is the issue...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Jitendra&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jul 2021 10:35:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/4437242#M568623</guid>
      <dc:creator>jijain</dc:creator>
      <dc:date>2021-07-22T10:35:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE dACL downloaded, but not applied to port</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/4437622#M568638</link>
      <description>&lt;P&gt;Issue is resolved..&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jul 2021 04:34:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/4437622#M568638</guid>
      <dc:creator>jijain</dc:creator>
      <dc:date>2021-07-23T04:34:38Z</dc:date>
    </item>
    <item>
      <title>Re: ISE dACL downloaded, but not applied to port</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/4498271#M570879</link>
      <description>&lt;P&gt;Hi Jijain&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i am facing same , how you fixed that? please note i am running 15.2(2a)E6&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Nov 2021 06:46:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/4498271#M570879</guid>
      <dc:creator>abdul.abbasi</dc:creator>
      <dc:date>2021-11-05T06:46:28Z</dc:date>
    </item>
    <item>
      <title>Re: ISE dACL downloaded, but not applied to port</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/4524156#M571949</link>
      <description>&lt;P&gt;How did you solve that issue?&lt;/P&gt;</description>
      <pubDate>Tue, 28 Dec 2021 00:00:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-downloaded-but-not-applied-to-port/m-p/4524156#M571949</guid>
      <dc:creator>cgmt</dc:creator>
      <dc:date>2021-12-28T00:00:01Z</dc:date>
    </item>
  </channel>
</rss>

