<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 802.1x port default access list issue in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-802-1x-port-default-access-list-issue/m-p/3945095#M456473</link>
    <description>also make sure to be following the prescriptive wired guide - &lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515&lt;/A&gt; &lt;BR /&gt;this can also happen when ip device tracking is not enabled</description>
    <pubDate>Tue, 22 Oct 2019 08:27:27 GMT</pubDate>
    <dc:creator>Jason Kunst</dc:creator>
    <dc:date>2019-10-22T08:27:27Z</dc:date>
    <item>
      <title>ISE 802.1x port default access list issue</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-802-1x-port-default-access-list-issue/m-p/3940727#M456466</link>
      <description>&lt;P&gt;I have noticed an issue with clients connecting to the network when I apply a default access list to a 802.1x port. The default access list look as if it takes presence on the port over the DACL. If I remove the default access list the clients can connect to all network resources without any issue but if the default access list is applied to the port the clients have no network access.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have anyone experience this issue and knows how to resolve it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P class="p1"&gt;description TEST PC 802.1x CONNECTION&lt;/P&gt;&lt;P class="p1"&gt;switchport access vlan 32&lt;/P&gt;&lt;P class="p1"&gt;switchport mode access&lt;/P&gt;&lt;P class="p1"&gt;ip access-list ACL-DEFAULT in&lt;/P&gt;&lt;P class="p1"&gt;authentication event fail action next-method&lt;/P&gt;&lt;P class="p1"&gt;authentication event server dead action reinitialize vlan 32&lt;/P&gt;&lt;P class="p1"&gt;authentication event server dead action authorize voice&lt;/P&gt;&lt;P class="p1"&gt;authentication host-mode multi-auth&lt;/P&gt;&lt;P class="p1"&gt;authentication open&lt;/P&gt;&lt;P class="p1"&gt;authentication order dot1x mab&lt;/P&gt;&lt;P class="p1"&gt;authentication priority dot1x mab&lt;/P&gt;&lt;P class="p1"&gt;authentication port-control auto&lt;/P&gt;&lt;P class="p1"&gt;authentication periodic&lt;/P&gt;&lt;P class="p1"&gt;authentication timer reauthenticate server&lt;/P&gt;&lt;P class="p1"&gt;authentication timer inactivity server&lt;/P&gt;&lt;P class="p1"&gt;authentication violation restrict&lt;/P&gt;&lt;P class="p1"&gt;mab&lt;/P&gt;&lt;P class="p1"&gt;snmp trap mac-notification change added&lt;/P&gt;&lt;P class="p1"&gt;snmp trap mac-notification change removed&lt;/P&gt;&lt;P class="p1"&gt;dot1x pae authenticator&lt;/P&gt;&lt;P class="p1"&gt;dot1x timeout tx-period 10&lt;/P&gt;&lt;P class="p1"&gt;spanning-tree portfast&lt;/P&gt;&lt;P class="p1"&gt;spanning-tree bpduguard enable&lt;/P&gt;&lt;P class="p1"&gt;ip dhcp snooping limit rate 20&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;nosw-31j-as02#show authentication sessions int g0/2&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Interface:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;GigabitEthernet0/2&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;MAC Address:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;c8d9.d2d2.8524&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;IP Address:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;Unknown&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;User-Name:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;8x8Test@laerdal.com&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Status:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;Authz Success&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Domain:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;DATA&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Oper host mode:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;multi-auth&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Oper control dir:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;both&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Authorized By:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;Authentication Server&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Vlan Group:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;N/A&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;ACS ACL:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;xACSACLx-IP-WIDED_DACL_PERMIT_ANY-5d84c254&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Session timeout:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;N/A&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Idle timeout:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;N/A&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Common Session ID:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;0AB73E2A00000097B9D5203A&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Acct Session ID:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;0x00000BA7&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Handle:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;0xBE000097&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;Runnable methods list:&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Method &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;State&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;dot1x&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Authc Success&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;mab&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Not run&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;nosw-31j-as02#show acc&lt;/P&gt;&lt;P class="p1"&gt;nosw-31j-as02#show acces&lt;/P&gt;&lt;P class="p1"&gt;nosw-31j-as02#show access-lists xACSACLx-IP-WIDED_DACL_PERMIT_ANY-5d84c254&lt;/P&gt;&lt;P class="p1"&gt;Extended IP access list xACSACLx-IP-WIDED_DACL_PERMIT_ANY-5d84c254 (per-user)&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;10 permit ip any any&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;20 permit icmp any any&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;30 permit udp any any&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;40 permit tcp any any&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;ip access-list extended ACL-DEFAULT&lt;/P&gt;&lt;P class="p1"&gt;permit udp any any eq domain&lt;/P&gt;&lt;P class="p1"&gt;permit ip any host 10.183.18.247&lt;/P&gt;&lt;P class="p1"&gt;permit ip any host 10.183.18.248&lt;/P&gt;&lt;P class="p1"&gt;permit udp any eq bootpc any eq bootps&lt;/P&gt;&lt;P class="p1"&gt;permit ip any host 10.183.18.250&lt;/P&gt;&lt;P class="p1"&gt;permit ip any host 10.181.1.115&lt;/P&gt;&lt;P class="p1"&gt;permit ip any host 10.183.18.150&lt;/P&gt;&lt;P class="p1"&gt;permit ip any host 128.1.11.31&lt;/P&gt;&lt;P class="p1"&gt;permit ip any host 10.181.1.34&lt;/P&gt;&lt;P class="p1"&gt;permit ip any host 10.181.1.40&lt;/P&gt;&lt;P class="p1"&gt;permit ip any host 172.16.0.24&lt;/P&gt;&lt;P class="p1"&gt;permit ip any host 10.183.18.88&lt;/P&gt;&lt;P class="p1"&gt;permit icmp any any&lt;/P&gt;&lt;P class="p1"&gt;deny &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;ip any any log&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2019 09:36:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-802-1x-port-default-access-list-issue/m-p/3940727#M456466</guid>
      <dc:creator>Maurice Ball</dc:creator>
      <dc:date>2019-10-15T09:36:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 802.1x port default access list issue</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-802-1x-port-default-access-list-issue/m-p/3940996#M456469</link>
      <description>In my experience this is almost always an IOS bug, where the the session manager shows that the DACL is applied but does not actually pre-pend it to the port acl. I would suggest a tac case.</description>
      <pubDate>Tue, 15 Oct 2019 15:05:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-802-1x-port-default-access-list-issue/m-p/3940996#M456469</guid>
      <dc:creator>CarlCarlson1234</dc:creator>
      <dc:date>2019-10-15T15:05:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 802.1x port default access list issue</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-802-1x-port-default-access-list-issue/m-p/3941170#M456472</link>
      <description>&lt;P&gt;That is what I was thinking also. The only issue is it will forward traffic without any issue with the default access list applied to the port if I connect one of the Lenovo laptops to the port. It fails to forward traffic when I connect a HP Elite laptop or a HP printer if the default access list is applied to the port.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2019 20:10:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-802-1x-port-default-access-list-issue/m-p/3941170#M456472</guid>
      <dc:creator>Maurice Ball</dc:creator>
      <dc:date>2019-10-15T20:10:29Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 802.1x port default access list issue</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-802-1x-port-default-access-list-issue/m-p/3945095#M456473</link>
      <description>also make sure to be following the prescriptive wired guide - &lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515&lt;/A&gt; &lt;BR /&gt;this can also happen when ip device tracking is not enabled</description>
      <pubDate>Tue, 22 Oct 2019 08:27:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-802-1x-port-default-access-list-issue/m-p/3945095#M456473</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-10-22T08:27:27Z</dc:date>
    </item>
  </channel>
</rss>

