<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: redirect ACL and dACL in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/redirect-acl-and-dacl/m-p/4009094#M454679</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199790"&gt;@Jason Kunst&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;I'm not sure if that's 100% accurate as the redirect exemption is required for other posture ports like tcp/udp 8905 and 8909.&lt;/P&gt;
&lt;P&gt;When working with a customer in the past, we found we had to exempt redirection for traffic like Kerberos and LDAP to allow auth comms required for JAMF as well as specific ports used by McAfee EPO.&lt;/P&gt;
&lt;P&gt;Maybe this is dependent on the switch hardware/software version, but I would highly recommend testing the flows in a Non-Prod environment first.&lt;/P&gt;</description>
    <pubDate>Thu, 09 Jan 2020 21:47:26 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2020-01-09T21:47:26Z</dc:date>
    <item>
      <title>redirect ACL and dACL</title>
      <link>https://community.cisco.com/t5/network-access-control/redirect-acl-and-dacl/m-p/4007920#M454674</link>
      <description>&lt;P&gt;I have a list of remediation server which included AD, antivirus and SCCM server. There was more than 60 servers around all sites. I have added all servers IP to dACL in ISE. Do I need to add all servers IP to the redirect ACL in switch? Or I just add AD server IP?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2020 02:55:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/redirect-acl-and-dacl/m-p/4007920#M454674</guid>
      <dc:creator>williamtan</dc:creator>
      <dc:date>2020-01-08T02:55:18Z</dc:date>
    </item>
    <item>
      <title>Re: redirect ACL and dACL</title>
      <link>https://community.cisco.com/t5/network-access-control/redirect-acl-and-dacl/m-p/4007925#M454675</link>
      <description>&lt;P&gt;If the client needs to communicate with remediation servers while the session is in a redirect state (e.g. during a Posture Unknown or NonCompliant state), you will need to exempt those IP addresses from redirection in the Redirect ACL. If a DACL is also being applied by the AuthZ Profile that sends the redirect, it also needs to permit the remediation traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For future reference, this document has some of the best step-by-step details on the Posture flows - &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/210523-ISE-posture-style-comparison-for-pre-and.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/210523-ISE-posture-style-comparison-for-pre-and.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Greg&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2020 04:20:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/redirect-acl-and-dacl/m-p/4007925#M454675</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2020-01-08T04:20:45Z</dc:date>
    </item>
    <item>
      <title>Re: redirect ACL and dACL</title>
      <link>https://community.cisco.com/t5/network-access-control/redirect-acl-and-dacl/m-p/4008590#M454676</link>
      <description>&lt;P&gt;But I have stack switches in my environment, can I configure more than 64 line in redirect ACL?&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2020 06:55:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/redirect-acl-and-dacl/m-p/4008590#M454676</guid>
      <dc:creator>williamtan</dc:creator>
      <dc:date>2020-01-09T06:55:11Z</dc:date>
    </item>
    <item>
      <title>Re: redirect ACL and dACL</title>
      <link>https://community.cisco.com/t5/network-access-control/redirect-acl-and-dacl/m-p/4008601#M454677</link>
      <description>&lt;P&gt;I wouldn't recommend it. Switches have limited TCAM compared to routers or firewalls, so we typically do not recommend ACLs or dACLs with more than 30 ACEs max. Especially if that ACL or dACL has a potential to be applied on multiple switchports at the same time.&lt;/P&gt;
&lt;P&gt;A better option might be to use a separate remediation VLAN and/or transit ACLs on upstream routers/firewalls to restrict access.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2020 07:33:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/redirect-acl-and-dacl/m-p/4008601#M454677</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2020-01-09T07:33:26Z</dc:date>
    </item>
    <item>
      <title>Re: redirect ACL and dACL</title>
      <link>https://community.cisco.com/t5/network-access-control/redirect-acl-and-dacl/m-p/4008884#M454678</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;If the client needs to communicate with remediation servers while the session is in a redirect state (e.g. during a Posture Unknown or NonCompliant state), you will need to exempt those IP addresses from redirection in the Redirect ACL. If a DACL is also being applied by the AuthZ Profile that sends the redirect, it also needs to permit the remediation traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For future reference, this document has some of the best step-by-step details on the Posture flows - &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/210523-ISE-posture-style-comparison-for-pre-and.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/210523-ISE-posture-style-comparison-for-pre-and.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Greg&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;True remember this is for port 80 services only. if the clients are communicating other ports then the URL redirect ACL won't have any impact&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2020 15:36:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/redirect-acl-and-dacl/m-p/4008884#M454678</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2020-01-09T15:36:04Z</dc:date>
    </item>
    <item>
      <title>Re: redirect ACL and dACL</title>
      <link>https://community.cisco.com/t5/network-access-control/redirect-acl-and-dacl/m-p/4009094#M454679</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199790"&gt;@Jason Kunst&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;I'm not sure if that's 100% accurate as the redirect exemption is required for other posture ports like tcp/udp 8905 and 8909.&lt;/P&gt;
&lt;P&gt;When working with a customer in the past, we found we had to exempt redirection for traffic like Kerberos and LDAP to allow auth comms required for JAMF as well as specific ports used by McAfee EPO.&lt;/P&gt;
&lt;P&gt;Maybe this is dependent on the switch hardware/software version, but I would highly recommend testing the flows in a Non-Prod environment first.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2020 21:47:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/redirect-acl-and-dacl/m-p/4009094#M454679</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2020-01-09T21:47:26Z</dc:date>
    </item>
    <item>
      <title>Re: redirect ACL and dACL</title>
      <link>https://community.cisco.com/t5/network-access-control/redirect-acl-and-dacl/m-p/4011647#M454680</link>
      <description>&lt;P&gt;Greg is correct. some dependency on the switch platform and releases.&lt;/P&gt;
&lt;P&gt;In general, there are two ways for the ACLs:&lt;/P&gt;
&lt;P&gt;1) Use redirect ACL only: What needs to allowed through will be defined as deny.&lt;/P&gt;
&lt;P&gt;2) Use redirect ACL and DACL: In this, we may only redirect on TCP 80 (and/or TCP 443), then use DACL to permit other connections. For example:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;ip access-list extended ACL-POSTURE-REMEDIATION
&amp;nbsp;permit tcp any any eq www&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DACL_POSTURE_REMEDIATION&amp;nbsp;contains below, where 10.1.100.21 is ISE and 10.1.129.8 is a remediation server:&lt;/P&gt;
&lt;PRE&gt;permit udp any eq bootpc any eq bootps&lt;BR /&gt;permit udp any any eq domain&lt;BR /&gt;permit icmp any any&lt;BR /&gt;permit tcp any host 10.1.100.21 eq 8443&lt;BR /&gt;permit tcp any host 10.1.100.21 eq 8905&lt;BR /&gt;permit udp any host 10.1.100.21 eq 8905&lt;BR /&gt;permit tcp any host 10.1.129.8 eq 80&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2020 04:23:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/redirect-acl-and-dacl/m-p/4011647#M454680</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2020-01-15T04:23:16Z</dc:date>
    </item>
  </channel>
</rss>

