<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Deny access until host authenticates with ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/deny-access-until-host-authenticates-with-ise/m-p/3950624#M542468</link>
    <description>Can you share your interface configs? Are you working with manual interface configs OR are you running IBNS with service templates, etc.? You can accomplish what you are looking for via the use of dacls. Essentially you would have some sort of "base" ACL on your interfaces that then gets overridden by a dacl push from ISE upon successful authc and authz policy. In ISE you can configure dacls here: Policy-&amp;gt;Policy Elements-&amp;gt;Results-&amp;gt;Authorization-&amp;gt;Downloadable ACLs. You can then assign the dacl to your desired authz profile. Good luck &amp;amp; HTH!</description>
    <pubDate>Wed, 30 Oct 2019 17:24:46 GMT</pubDate>
    <dc:creator>Mike.Cifelli</dc:creator>
    <dc:date>2019-10-30T17:24:46Z</dc:date>
    <item>
      <title>Deny access until host authenticates with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/deny-access-until-host-authenticates-with-ise/m-p/3950534#M542456</link>
      <description>&lt;P&gt;Our switches with with ISE but before it authenticates it has access to any network. This is an issue because if someone wants to access our network it just need to unplug/plug LAN cable every 15 seconds.&amp;nbsp; Is there a way to deny all type access unitl the host authenticates with ISE?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Oct 2019 14:49:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/deny-access-until-host-authenticates-with-ise/m-p/3950534#M542456</guid>
      <dc:creator>ocs111992</dc:creator>
      <dc:date>2019-10-30T14:49:03Z</dc:date>
    </item>
    <item>
      <title>Re: Deny access until host authenticates with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/deny-access-until-host-authenticates-with-ise/m-p/3950624#M542468</link>
      <description>Can you share your interface configs? Are you working with manual interface configs OR are you running IBNS with service templates, etc.? You can accomplish what you are looking for via the use of dacls. Essentially you would have some sort of "base" ACL on your interfaces that then gets overridden by a dacl push from ISE upon successful authc and authz policy. In ISE you can configure dacls here: Policy-&amp;gt;Policy Elements-&amp;gt;Results-&amp;gt;Authorization-&amp;gt;Downloadable ACLs. You can then assign the dacl to your desired authz profile. Good luck &amp;amp; HTH!</description>
      <pubDate>Wed, 30 Oct 2019 17:24:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/deny-access-until-host-authenticates-with-ise/m-p/3950624#M542468</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-10-30T17:24:46Z</dc:date>
    </item>
    <item>
      <title>Re: Deny access until host authenticates with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/deny-access-until-host-authenticates-with-ise/m-p/3950659#M542507</link>
      <description>&lt;P&gt;This is the config of the interface:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1&lt;BR /&gt;switchport access vlan 30&lt;BR /&gt;switchport mode access&lt;BR /&gt;authentication event fail action next-method&lt;BR /&gt;authentication event server dead action authorize vlan 30&lt;BR /&gt;authentication event server dead action authorize voice&lt;BR /&gt;authentication event server alive action reinitialize&lt;BR /&gt;authentication host-mode multi-auth&lt;BR /&gt;authentication open&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;authentication violation restrict&lt;BR /&gt;mab&lt;BR /&gt;snmp trap mac-notification change added&lt;BR /&gt;snmp trap mac-notification change removed&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 10&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;spanning-tree bpduguard enable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On DACL, guest users when they connect to LAN have access to internet only but before the computer authenticates with ISE they have access to internal networks and I want to prevent this.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Oct 2019 18:38:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/deny-access-until-host-authenticates-with-ise/m-p/3950659#M542507</guid>
      <dc:creator>ocs111992</dc:creator>
      <dc:date>2019-10-30T18:38:12Z</dc:date>
    </item>
    <item>
      <title>Re: Deny access until host authenticates with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/deny-access-until-host-authenticates-with-ise/m-p/3950684#M542537</link>
      <description>For a better understanding of the #authentication open command see: &lt;A href="https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_8021x/configuration/xe-3se/3650/sec-user-8021x-xe-3se-3650-book/sec-ieee-open-auth.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_8021x/configuration/xe-3se/3650/sec-user-8021x-xe-3se-3650-book/sec-ieee-open-auth.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;You could configure a base_acl like this:&lt;BR /&gt;Extended IP access list Base_ACL&lt;BR /&gt;10 deny ip any any&lt;BR /&gt;Then under your interface add this:&lt;BR /&gt;ip access-group Base_ACL in&lt;BR /&gt;&lt;BR /&gt;Your ISE dacl will override the Base_ACL and allow access with the respective configs in the dacl.</description>
      <pubDate>Wed, 30 Oct 2019 19:32:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/deny-access-until-host-authenticates-with-ise/m-p/3950684#M542537</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-10-30T19:32:28Z</dc:date>
    </item>
  </channel>
</rss>

