<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: downloadable ACL failing on uauth..... PLEASE HELP!!! in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/downloadable-acl-failing-on-uauth-please-help/m-p/555710#M427432</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can you post the entire config of the module ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;GNT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 14 Apr 2006 14:22:05 GMT</pubDate>
    <dc:creator>globalnettech</dc:creator>
    <dc:date>2006-04-14T14:22:05Z</dc:date>
    <item>
      <title>downloadable ACL failing on uauth..... PLEASE HELP!!!</title>
      <link>https://community.cisco.com/t5/network-access-control/downloadable-acl-failing-on-uauth-please-help/m-p/555708#M427429</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to get DACL's working on my FWSM (2.3(3)) From ACS 4. The users authentication is passes through to an RSA 6.1 token server. The user authenticates fine, however the ACL is not downloading.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The bebug shows the following as the user authenticates:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;alloc_rip 0x1ec7670&lt;/P&gt;&lt;P&gt;    new request 0x345 --&amp;gt; 0 (0x1ec7670)&lt;/P&gt;&lt;P&gt;no user or password - start from getuser&lt;/P&gt;&lt;P&gt;add_req 0x1ec7670 session 0x345 id 0&lt;/P&gt;&lt;P&gt;RADIUS_GET_USER&lt;/P&gt;&lt;P&gt;radius mkreq: 0x345&lt;/P&gt;&lt;P&gt;    old request 0x345 --&amp;gt; 0 (0x1ec7670), state 1&lt;/P&gt;&lt;P&gt;wait user - new user testuser. get pass&lt;/P&gt;&lt;P&gt;RADIUS_GET_PASS&lt;/P&gt;&lt;P&gt;radius mkreq: 0x345&lt;/P&gt;&lt;P&gt;    old request 0x345 --&amp;gt; 0 (0x1ec7670), state 3&lt;/P&gt;&lt;P&gt;wait pass - pass '***'. make request&lt;/P&gt;&lt;P&gt;RADIUS_REQUEST&lt;/P&gt;&lt;P&gt;radius.c: rad_mkpkt_authen&lt;/P&gt;&lt;P&gt;     attribute:&lt;/P&gt;&lt;P&gt;       type 1, length 10, content:&lt;/P&gt;&lt;P&gt;     attribute:&lt;/P&gt;&lt;P&gt;       type 4, length 6, content:&lt;/P&gt;&lt;P&gt;     attribute:&lt;/P&gt;&lt;P&gt;       type 5, length 6, content:&lt;/P&gt;&lt;P&gt;     attribute:&lt;/P&gt;&lt;P&gt;       type 26, length 33, content:&lt;/P&gt;&lt;P&gt;         Vendor ID 0 0 0 9, type=1, len=27:&lt;/P&gt;&lt;P&gt;send pkt 192.168.1.1/1645&lt;/P&gt;&lt;P&gt;rip 0x1ec7670 state 7 id 0&lt;/P&gt;&lt;P&gt;rip 0x14190a0&lt;/P&gt;&lt;P&gt; : chall_state ''&lt;/P&gt;&lt;P&gt; : state 0x7&lt;/P&gt;&lt;P&gt; : timer 0x0&lt;/P&gt;&lt;P&gt; : reqauth:&lt;/P&gt;&lt;P&gt;     fb 18 71 56 d7 c4 ad e2 73 30 a9 2e cf 5c 65 3a &lt;/P&gt;&lt;P&gt; : info 0x345&lt;/P&gt;&lt;P&gt;     session_id 0x345&lt;/P&gt;&lt;P&gt;     request_id 0x0&lt;/P&gt;&lt;P&gt;     user 'testuser'&lt;/P&gt;&lt;P&gt;     response '***'&lt;/P&gt;&lt;P&gt;     app 23&lt;/P&gt;&lt;P&gt;     reason 2&lt;/P&gt;&lt;P&gt;     skey 'key'&lt;/P&gt;&lt;P&gt;     sip 192.168.1.1&lt;/P&gt;&lt;P&gt;     type 1&lt;/P&gt;&lt;P&gt;rad_procpkt: ACCEPT&lt;/P&gt;&lt;P&gt;     attribute:&lt;/P&gt;&lt;P&gt;       type 26, length 61, content:&lt;/P&gt;&lt;P&gt;         Vendor ID 0 0 0 9, type=1, len=55:&lt;/P&gt;&lt;P&gt;     attribute:&lt;/P&gt;&lt;P&gt;       type 25, length 31, content:&lt;/P&gt;&lt;P&gt;RADIUS_REQUEST&lt;/P&gt;&lt;P&gt;radius.c: rad_mkpkt_authen&lt;/P&gt;&lt;P&gt;     attribute:&lt;/P&gt;&lt;P&gt;       type 1, length 27, content:&lt;/P&gt;&lt;P&gt;     attribute:&lt;/P&gt;&lt;P&gt;       type 4, length 6, content:&lt;/P&gt;&lt;P&gt;     attribute:&lt;/P&gt;&lt;P&gt;       type 5, length 6, content:&lt;/P&gt;&lt;P&gt;     attribute:&lt;/P&gt;&lt;P&gt;       type 26, length 33, content:&lt;/P&gt;&lt;P&gt;         Vendor ID 0 0 0 9, type=1, len=27:&lt;/P&gt;&lt;P&gt;send pkt 192.168.1.1/1645&lt;/P&gt;&lt;P&gt;rip 0x1ec7670 state 7 id 0&lt;/P&gt;&lt;P&gt;rip 0x14190a0&lt;/P&gt;&lt;P&gt; : chall_state ''&lt;/P&gt;&lt;P&gt; : state 0x7&lt;/P&gt;&lt;P&gt; : timer 0x0&lt;/P&gt;&lt;P&gt; : reqauth:&lt;/P&gt;&lt;P&gt;     fb 18 71 56 d7 c4 ad e2 73 30 a9 2e cf 5c 65 3a &lt;/P&gt;&lt;P&gt; : info 0x345&lt;/P&gt;&lt;P&gt;     session_id 0x345&lt;/P&gt;&lt;P&gt;     request_id 0x0&lt;/P&gt;&lt;P&gt;     user '#ACSACL#-IP-TEST-443f6681'&lt;/P&gt;&lt;P&gt;     response '***'&lt;/P&gt;&lt;P&gt;     app 23&lt;/P&gt;&lt;P&gt;     reason 2&lt;/P&gt;&lt;P&gt;     skey 'key'&lt;/P&gt;&lt;P&gt;     sip 192.168.1.1&lt;/P&gt;&lt;P&gt;     type 1&lt;/P&gt;&lt;P&gt;rad_procpkt: REJECT&lt;/P&gt;&lt;P&gt;abort request 0x345 (0)&lt;/P&gt;&lt;P&gt;RADIUS_DELETE&lt;/P&gt;&lt;P&gt;remove_req 0x1ec7670 session 0x345 id 0&lt;/P&gt;&lt;P&gt;free_rip 0x1ec7670&lt;/P&gt;&lt;P&gt;radius: send queue empty&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see the radius request is being rejected and ACS shows the following error in its failed attempts log:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"DACL request from device is not acceptable"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the is the configuration on the FWSM relevant to the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ_VENDOR-IN extended permit tcp any host 172.25.25.25 eq telnet &lt;/P&gt;&lt;P&gt;access-list DMZ_VENDOR-IN extended permit tcp any host 172.25.25.25 eq https &lt;/P&gt;&lt;P&gt;access-list DMZ_VENDOR-IN extended deny ip any any &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list UAUTH-ACL extended permit tcp any host 172.25.25.25 eq telnet &lt;/P&gt;&lt;P&gt;access-list UAUTH-ACL extended permit tcp any host 172.25.25.25 eq https&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-group DMZ_VENDOR-IN in interface DMZ_VENDOR per-user-override&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3 &lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa-server RADIUS-GROUP protocol radius &lt;/P&gt;&lt;P&gt;aaa-server RADIUS-GROUP max-failed-attempts 3 &lt;/P&gt;&lt;P&gt;aaa-server RADIUS-GROUP deadtime 10 &lt;/P&gt;&lt;P&gt;aaa-server RADIUS-GROUP (AAA) host 192.168.1.1 KEY timeout 5&lt;/P&gt;&lt;P&gt;aaa-server RADIUS-GROUP (MSFC_FWSM) host 192.168.2.1 KEY timeout 5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication match UAUTH-ACL DMZ_VENDOR RADIUS-GROUP &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;virtual http 172.25.25.25&lt;/P&gt;&lt;P&gt;virtual telnet 172.25.25.25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the ACS acl is very simple for testing purposes:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACL NAME: test&lt;/P&gt;&lt;P&gt;permit ip any host 192.168.100.100&lt;/P&gt;&lt;P&gt;deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the DACL is applied to the users profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thank for any help on this issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 21:32:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/downloadable-acl-failing-on-uauth-please-help/m-p/555708#M427429</guid>
      <dc:creator>dave.jones</dc:creator>
      <dc:date>2019-03-10T21:32:32Z</dc:date>
    </item>
    <item>
      <title>Re: downloadable ACL failing on uauth..... PLEASE HELP!!!</title>
      <link>https://community.cisco.com/t5/network-access-control/downloadable-acl-failing-on-uauth-please-help/m-p/555709#M427430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are probably running into bug CSCsc89235. This issues is resolved in ACS 4.0, but you have to upgrade your FWSM software to minimum version 2.3(3.13).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Apr 2006 21:11:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/downloadable-acl-failing-on-uauth-please-help/m-p/555709#M427430</guid>
      <dc:creator>jhillend</dc:creator>
      <dc:date>2006-04-13T21:11:57Z</dc:date>
    </item>
    <item>
      <title>Re: downloadable ACL failing on uauth..... PLEASE HELP!!!</title>
      <link>https://community.cisco.com/t5/network-access-control/downloadable-acl-failing-on-uauth-please-help/m-p/555710#M427432</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can you post the entire config of the module ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;GNT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Apr 2006 14:22:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/downloadable-acl-failing-on-uauth-please-help/m-p/555710#M427432</guid>
      <dc:creator>globalnettech</dc:creator>
      <dc:date>2006-04-14T14:22:05Z</dc:date>
    </item>
    <item>
      <title>Re: downloadable ACL failing on uauth..... PLEASE HELP!!!</title>
      <link>https://community.cisco.com/t5/network-access-control/downloadable-acl-failing-on-uauth-please-help/m-p/555711#M427434</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The problem appears to be a bug in the FWSM code that we we're running 2.3(3)2 and also in 2.3(2). Version 2.3(4) appears to resolve this issue. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a result of the FWSM generating two RADIUS request packets with the same ID for the ACL instead of one. Subsequently the ACS server will reject the request for the ACL but still authenticate the user. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However ACS requires the access list to have a permit statement to the virtual telnet address to work correctly or it will produce the same ACS log entry. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"DACL request from device is not acceptable"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Apr 2006 14:36:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/downloadable-acl-failing-on-uauth-please-help/m-p/555711#M427434</guid>
      <dc:creator>dave.jones</dc:creator>
      <dc:date>2006-04-19T14:36:14Z</dc:date>
    </item>
  </channel>
</rss>

