<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to eliminate the risk when the non-compliant computer access the AD? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/how-to-eliminate-the-risk-when-the-non-compliant-computer-access/m-p/3530443#M523019</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That ACL will break all sorts of things.  Would definitely not go that route.  Again you need to allow prelogin, login, login scripts, etc. to run before posture status is reported.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul Haferman&lt;/P&gt;&lt;P&gt;Office- 920.996.3011&lt;/P&gt;&lt;P&gt;Cell- 920.284.9250&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 09 Aug 2017 16:36:13 GMT</pubDate>
    <dc:creator>paul</dc:creator>
    <dc:date>2017-08-09T16:36:13Z</dc:date>
    <item>
      <title>How to eliminate the risk when the non-compliant computer access the AD?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-eliminate-the-risk-when-the-non-compliant-computer-access/m-p/3530440#M523016</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Background: It is wired dot1x with machine authentication and posture assessment deployment. &lt;SPAN style="font-size: 10pt;"&gt;My customer has a requirement: network access for computer (including domain/ non-domain) should be restricted before authentication and posture assessment.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I would like to use static port ACL to restrict network access before authentication and posture assessment complete. once the computer passes the authentication and posture assessment, the switch will download the dACL to the port, so that the user can access the production network.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;&lt;SPAN style="color: #ff0000;"&gt;Questions: Since the user login the computer (with no windows account cache) using AD account. The static port ACL should allow the traffic between computer and AD. Hence, when the computer does not pass compliance check, it can access to the AD. How to eliminate the risk when the non-compliant computer access the AD?&lt;/SPAN&gt;&lt;/H2&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Jason Chu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Aug 2017 09:24:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-eliminate-the-risk-when-the-non-compliant-computer-access/m-p/3530440#M523016</guid>
      <dc:creator>jason chu</dc:creator>
      <dc:date>2017-08-09T09:24:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to eliminate the risk when the non-compliant computer access the AD?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-eliminate-the-risk-when-the-non-compliant-computer-access/m-p/3530441#M523017</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;switch config : ip access-list extended (NAME)&lt;/P&gt;&lt;P&gt; permit udp any any eq bootpc bootps (dhcp)&lt;/P&gt;&lt;P&gt;permit ip any host 10.10.10.10 (ise host IP adrees)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think maybe this will be enough to can restrict.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Aug 2017 09:52:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-eliminate-the-risk-when-the-non-compliant-computer-access/m-p/3530441#M523017</guid>
      <dc:creator>ognyan.totev</dc:creator>
      <dc:date>2017-08-09T09:52:08Z</dc:date>
    </item>
    <item>
      <title>Re: How to eliminate the risk when the non-compliant computer access the AD?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-eliminate-the-risk-when-the-non-compliant-computer-access/m-p/3530442#M523018</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Having gone down this road many times you need to reset your customer's expectations and clearly explain to them how posturing actually works.&amp;nbsp; Authentication and Posturing are separate activities.&amp;nbsp; Posture happens very late after the login process has completed.&amp;nbsp; If you start restricting access, you are going to break pre-login access, login access, login scripts, drive mappings, etc.&amp;nbsp; If you start putting together the ACL to allow this stuff to work you will be just short of "permit ip any any".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You posture devices that have authenticated, so you know at some level these are trusted devices which takes the risk down a bit.&amp;nbsp; My philosophy is in the unknown state the restrictions need to be noticeable but not detrimental.&amp;nbsp; I usually block Internet access in the unknown state but allow full Internal access.&amp;nbsp; Again these devices have successfully authenticated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the device proves to not be compliant then you can slam the door shut. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My 2 cents.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Aug 2017 14:58:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-eliminate-the-risk-when-the-non-compliant-computer-access/m-p/3530442#M523018</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-08-09T14:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: How to eliminate the risk when the non-compliant computer access the AD?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-eliminate-the-risk-when-the-non-compliant-computer-access/m-p/3530443#M523019</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That ACL will break all sorts of things.  Would definitely not go that route.  Again you need to allow prelogin, login, login scripts, etc. to run before posture status is reported.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul Haferman&lt;/P&gt;&lt;P&gt;Office- 920.996.3011&lt;/P&gt;&lt;P&gt;Cell- 920.284.9250&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Aug 2017 16:36:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-eliminate-the-risk-when-the-non-compliant-computer-access/m-p/3530443#M523019</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-08-09T16:36:13Z</dc:date>
    </item>
  </channel>
</rss>

