<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE pushs DACL but switch port doesn't take it in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-pushs-dacl-but-switch-port-doesn-t-take-it/m-p/3936883#M474715</link>
    <description>There have been a couple bugs discovered since this posting. Your issue might be different depending on the IOS release you are on.  If you are on 16.6 then there are two potential issues.  &lt;BR /&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn81334" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn81334&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvq17759" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvq17759&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;You're best to open a TAC case to ensure you are not facing a different issue.  &lt;BR /&gt;</description>
    <pubDate>Tue, 08 Oct 2019 03:30:12 GMT</pubDate>
    <dc:creator>Damien Miller</dc:creator>
    <dc:date>2019-10-08T03:30:12Z</dc:date>
    <item>
      <title>Cisco ISE pushs DACL but switch port doesn't take it</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-pushs-dacl-but-switch-port-doesn-t-take-it/m-p/3820940#M474708</link>
      <description>&lt;P&gt;Hi Cisco ISE guru,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I ran into a weird scenario for an ISE deployment,&amp;nbsp; &amp;nbsp;I have deployed about 700 endpoint into enforcement mode(low impact).&lt;/P&gt;
&lt;P&gt;2 endpoints passes dot1x auth/authorization and the session receives "permit ip any any" DACL, the dacl shows up in the output of command " show access-session interface g1/x/x detail" , but the endpoint&amp;nbsp; still don't have access to the network.&lt;/P&gt;
&lt;P&gt;only if the pre-auth-acl is removed from this switch port then the network access restores.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have tried to move one of the endpoint to another spare port ( with pre-auth-acl) and the issue seems to be resolved.&lt;/P&gt;
&lt;P&gt;I have asked the client to reboot the switch to see if this could fix the issue, but it will take some time for approval.&lt;/P&gt;
&lt;P&gt;Has anyone ran into same issue?&amp;nbsp; Is this a switch bug related?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 17 Mar 2019 18:06:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-pushs-dacl-but-switch-port-doesn-t-take-it/m-p/3820940#M474708</guid>
      <dc:creator>antonioyan99</dc:creator>
      <dc:date>2019-03-17T18:06:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE pushs DACL but switch port doesn't take it</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-pushs-dacl-but-switch-port-doesn-t-take-it/m-p/3820964#M474709</link>
      <description>Provide us your port config, switch model, and IOS version, there have been some bugs in the past with DACLs but generally they work.  It seems odd that the same switch but different port is working.&lt;BR /&gt;&lt;BR /&gt;One thing that comes to mind is that IP device tracking might not be working correctly.  If IPDT doesn't work, the DACL won't work. If you can recreate the issue, see if the IPDT database has an IP recorded for the endpoint.</description>
      <pubDate>Sun, 17 Mar 2019 19:55:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-pushs-dacl-but-switch-port-doesn-t-take-it/m-p/3820964#M474709</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-03-17T19:55:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE pushs DACL but switch port doesn't take it</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-pushs-dacl-but-switch-port-doesn-t-take-it/m-p/3820996#M474710</link>
      <description>&lt;P&gt;Here is the global config and port level config:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;policy-map type control subscriber DOT1X-DEFAULT&lt;BR /&gt;event session-started match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 authenticate using dot1x retries 2 retry-time 0 priority 10&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;event authentication-failure match-first&lt;BR /&gt;5 class DOT1X_FAILED do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;10 class AAA_SVR_DOWN_UNAUTHD_HOST do-until-failure&lt;BR /&gt;10 activate service-template CRITICAL&lt;BR /&gt;20 activate service-template DEFAULT_CRITICAL_VOICE_TEMPLATE&lt;BR /&gt;30 authorize&lt;BR /&gt;40 terminate dot1x&lt;BR /&gt;50 terminate mab&lt;BR /&gt;60 pause reauthentication&lt;BR /&gt;20 class AAA_SVR_DOWN_AUTHD_HOST do-until-failure&lt;BR /&gt;10 pause reauthentication&lt;BR /&gt;20 authorize&lt;BR /&gt;30 class DOT1X_NO_RESP do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;40 class MAB_FAILED do-until-failure&lt;BR /&gt;10 terminate mab&lt;BR /&gt;20 authentication-restart 60&lt;BR /&gt;60 class always do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 terminate mab&lt;BR /&gt;30 authentication-restart 60&lt;BR /&gt;event agent-found match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 terminate mab&lt;BR /&gt;20 authenticate using dot1x retries 2 retry-time 0 priority 10&lt;BR /&gt;event aaa-available match-all&lt;BR /&gt;10 class IN_CRITICAL_VLAN do-until-failure&lt;BR /&gt;10 clear-session&lt;BR /&gt;20 class NOT_IN_CRITICAL_VLAN do-until-failure&lt;BR /&gt;10 resume reauthentication&lt;BR /&gt;event authentication-success match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 activate service-template DEFAULT_LINKSEC_POLICY_SHOULD_SECURE&lt;BR /&gt;event violation match-all&lt;BR /&gt;10 class always do-until-failure&lt;BR /&gt;10 restrict&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;###switch port configuration&lt;BR /&gt;interface range gi1/0/1 - 46&lt;/P&gt;
&lt;P&gt;device-tracking attach-policy otppipdt_policy&lt;BR /&gt;ip access-group Pre-Auth-ACL in&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;access-session port-control auto&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 10&lt;BR /&gt;service-policy type control subscriber DOT1X-DEFAULT&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The switch is C3850 and the IOS is IXE-16.6.4.&lt;/P&gt;
&lt;P&gt;I am using 'device-tracking policy' command for&amp;nbsp; IP tracking and it is working fine.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2019 14:59:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-pushs-dacl-but-switch-port-doesn-t-take-it/m-p/3820996#M474710</guid>
      <dc:creator>antonioyan99</dc:creator>
      <dc:date>2019-03-18T14:59:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE pushs DACL but switch port doesn't take it</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-pushs-dacl-but-switch-port-doesn-t-take-it/m-p/3936731#M474712</link>
      <description>&lt;P&gt;I seem to have the same issue. Only the ACL-Default access list shows as applied.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2019 21:31:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-pushs-dacl-but-switch-port-doesn-t-take-it/m-p/3936731#M474712</guid>
      <dc:creator>michanna</dc:creator>
      <dc:date>2019-10-07T21:31:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE pushs DACL but switch port doesn't take it</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-pushs-dacl-but-switch-port-doesn-t-take-it/m-p/3936763#M474713</link>
      <description>&lt;P&gt;I saw the same issue at a customer last week, on C3850 IOS 16.09.04.&lt;/P&gt;&lt;P&gt;The interface has a pre-AuthC pACL, but refuses the dACL pushed by ISE, upon successful MAB authentication. I turned on &lt;FONT face="courier new,courier"&gt;debug radius authentication&lt;/FONT&gt; and saw the same error messages that are listed on Cisco bug report CSCvr13213:&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN&gt;068083&lt;/SPAN&gt;: Aug 26 201909:54:47.272 UTC: %SESSION_MGR-5-FAIL: Switch 1 R0/0: sessmgrd: &lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Authorization failed or unapplied for client&lt;/FONT&gt; &lt;/STRONG&gt;(0023.247e.5b91) on Interface GigabitEthernet1/0/3 AuditSessionID EEEBEC0A000077EDCD1FE915&lt;/FONT&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, our circumstances were different:&amp;nbsp; we saw that error with a simple MAB authentication (the bug report is about CWA not accepting the redirect-acl).&amp;nbsp; I applied the fix recommended in the bug report, but it didn't fix the issue at the customer.&amp;nbsp; Cisco engs are there this week, for hopefully, the customer will let me know if prob was fixed.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2019 22:12:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-pushs-dacl-but-switch-port-doesn-t-take-it/m-p/3936763#M474713</guid>
      <dc:creator>cpaquet</dc:creator>
      <dc:date>2019-10-07T22:12:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE pushs DACL but switch port doesn't take it</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-pushs-dacl-but-switch-port-doesn-t-take-it/m-p/3936776#M474714</link>
      <description>Thanks, I will check out that bug notice.&lt;BR /&gt;</description>
      <pubDate>Mon, 07 Oct 2019 22:31:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-pushs-dacl-but-switch-port-doesn-t-take-it/m-p/3936776#M474714</guid>
      <dc:creator>michanna</dc:creator>
      <dc:date>2019-10-07T22:31:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE pushs DACL but switch port doesn't take it</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-pushs-dacl-but-switch-port-doesn-t-take-it/m-p/3936883#M474715</link>
      <description>There have been a couple bugs discovered since this posting. Your issue might be different depending on the IOS release you are on.  If you are on 16.6 then there are two potential issues.  &lt;BR /&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn81334" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn81334&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvq17759" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvq17759&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;You're best to open a TAC case to ensure you are not facing a different issue.  &lt;BR /&gt;</description>
      <pubDate>Tue, 08 Oct 2019 03:30:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-pushs-dacl-but-switch-port-doesn-t-take-it/m-p/3936883#M474715</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-10-08T03:30:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE pushs DACL but switch port doesn't take it</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-pushs-dacl-but-switch-port-doesn-t-take-it/m-p/4167117#M563324</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I had the same issue which got resolved by applying the command on the switch&lt;/P&gt;&lt;P&gt;radius-server vsa send authentication&lt;/P&gt;&lt;P&gt;In my debug radius -&amp;gt; I could see the DACL being downloaded!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2020 00:23:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-pushs-dacl-but-switch-port-doesn-t-take-it/m-p/4167117#M563324</guid>
      <dc:creator>tauk</dc:creator>
      <dc:date>2020-10-15T00:23:06Z</dc:date>
    </item>
  </channel>
</rss>

