<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE C3PL Switch Configuration in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-c3pl-switch-configuration/m-p/4484808#M570357</link>
    <description>&lt;P&gt;With newer platform/software versions, the default setting when using IBNS 2.0 is 'open' authentication (no access-session closed). If your session is getting an ACCESS_ACCEPT response from ISE with no DACL applied, the client getting internet access would be expected (unless it's in a redirect state... we would need more info about your policy/flow).&lt;/P&gt;
&lt;P&gt;Another option to the 'closed' mode suggested by &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;, would be using a Low-Impact Mode approach by configuring a restrictive pre-auth ACL and applying that to the switchport. In your AuthZ Policy result, you would then need to send a permissive DACL that would override the pre-auth ACL.&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;ip access-list extended ACL-PreAuth-v4
 remark Allow TFTP for PXE
 permit udp any any eq tftp
 remark Allow DHCP
 permit udp any eq bootpc any eq bootps
 remark Allow DNS
 permit udp any any eq domain
 remark Deny all else
 deny ip any any
!
interface gig1/0/20
 ip access-group ACL-PreAuth-v4 in&lt;/PRE&gt;
&lt;P&gt;You should also consider using interface templates as they are another benefit from the IBNS 2.0 C3PL feature set. Both of these aspects are covered in detail in the &lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_blank" rel="noopener"&gt;ISE Secure Wired Access Prescriptive Deployment Guide.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Oct 2021 23:13:25 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2021-10-12T23:13:25Z</dc:date>
    <item>
      <title>ISE C3PL Switch Configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-c3pl-switch-configuration/m-p/4483820#M570315</link>
      <description>&lt;P&gt;Hi everyone,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a new-style switches and we are deploying DOT1X auth with cisco AnyConnect , I'm using the next script but users have internet acces even when they are not authenticating , on legacy mode it works correctly I would like if something is missing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius ISE&lt;BR /&gt;server name ISE1&lt;BR /&gt;server name ISE2&lt;BR /&gt;deadtime 15&lt;BR /&gt;!&lt;BR /&gt;aaa authentication dot1x default group ISE&lt;BR /&gt;aaa authorization network default group ISE&lt;BR /&gt;aaa accounting update newinfo periodic 2880&lt;BR /&gt;aaa accounting identity default start-stop group ISE&lt;BR /&gt;!&lt;BR /&gt;aaa server radius dynamic-author&lt;BR /&gt;client 10.x.x.x1 server-key xxxxxxxxxx&lt;BR /&gt;client 10.x.x.x2 server-key xxxxxxxxxx&lt;BR /&gt;server-key R4d1uss3g0b&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;!&lt;BR /&gt;login on-success log&lt;BR /&gt;access-session mac-move deny&lt;BR /&gt;epm logging&lt;BR /&gt;no device-tracking logging theft&lt;BR /&gt;device-tracking tracking&lt;BR /&gt;!&lt;BR /&gt;dot1x system-auth-control&lt;BR /&gt;dot1x critical eapol&lt;BR /&gt;!&lt;BR /&gt;policy-map type control subscriber DOT1X-DEFAULT&lt;BR /&gt;event session-started match-all&lt;BR /&gt;10 class always do-all&lt;BR /&gt;10 authenticate using dot1x priority 10&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;event agent-found match-all&lt;BR /&gt;10 class always do-all&lt;BR /&gt;10 authenticate using dot1x&lt;BR /&gt;!&lt;BR /&gt;service-policy type control subscriber DOT1X-DEFAULT&lt;BR /&gt;!&lt;BR /&gt;ip http server&lt;BR /&gt;no ip http port 8080&lt;BR /&gt;ip http authentication local&lt;BR /&gt;ip http secure-server&lt;BR /&gt;ip http active-session-modules none&lt;BR /&gt;ip http client source-interface Vlan15&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended ISE-REDIRECT&lt;BR /&gt;10 deny ip any host 10.x.x.x1&lt;BR /&gt;20 deny ip any host 10.x.x.x2&lt;BR /&gt;30 deny udp any any eq domain&lt;BR /&gt;40 permit tcp any any eq www&lt;BR /&gt;50 permit tcp any any eq 443&lt;BR /&gt;!&lt;BR /&gt;ip radius source-interface Vlan45&lt;BR /&gt;logging origin-id ip&lt;BR /&gt;logging source-interface Vlan45&lt;BR /&gt;logging host 10.x.x.x1 transport udp port 20514&lt;BR /&gt;logging host 10.x.x.x2 transport udp port 20514&lt;BR /&gt;!&lt;BR /&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 6 support-multiple&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server dead-criteria time 10 tries 3&lt;BR /&gt;radius-server deadtime 30&lt;BR /&gt;radius-server load-balance method least-outstanding&lt;BR /&gt;!&lt;BR /&gt;radius server ISE1&lt;BR /&gt;address ipv4 10.x.x.x1 auth-port 1812 acct-port 1813&lt;BR /&gt;timeout 2&lt;BR /&gt;retransmit 1&lt;BR /&gt;key xxxxxxxxxx&lt;BR /&gt;!&lt;BR /&gt;radius server ISE2&lt;BR /&gt;address ipv4 10.x.x.x2 auth-port 1812 acct-port 1813&lt;BR /&gt;timeout 2&lt;BR /&gt;retransmit 1&lt;BR /&gt;key xxxxxxxxxxx&lt;BR /&gt;!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Oct 2021 17:39:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-c3pl-switch-configuration/m-p/4483820#M570315</guid>
      <dc:creator>lilianamartinez</dc:creator>
      <dc:date>2021-10-11T17:39:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISE C3PL Switch Configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-c3pl-switch-configuration/m-p/4483826#M570317</link>
      <description>&lt;P&gt;Can you also share the configuration you are applying to the access ports.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Oct 2021 17:43:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-c3pl-switch-configuration/m-p/4483826#M570317</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2021-10-11T17:43:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE C3PL Switch Configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-c3pl-switch-configuration/m-p/4483829#M570318</link>
      <description>&lt;P&gt;Sure this is the interface configuration:&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0/20&lt;BR /&gt;description &amp;lt;&amp;lt;PC/Phone&amp;gt;&amp;gt;&lt;BR /&gt;switchport access vlan 20&lt;BR /&gt;switchport mode access&lt;BR /&gt;device-tracking attach-policy IPDT_MAX_10&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;access-session port-control auto&lt;BR /&gt;mab&lt;BR /&gt;trust device cisco-phone&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 10&lt;BR /&gt;auto qos voip cisco-phone&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;spanning-tree bpduguard enable&lt;BR /&gt;service-policy type control subscriber DOT1X-DEFAULT&lt;BR /&gt;service-policy input AutoQos-4.0-CiscoPhone-Input-Policy&lt;BR /&gt;service-policy output AutoQos-4.0-Output-Policy&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Oct 2021 17:46:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-c3pl-switch-configuration/m-p/4483829#M570318</guid>
      <dc:creator>lilianamartinez</dc:creator>
      <dc:date>2021-10-11T17:46:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE C3PL Switch Configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-c3pl-switch-configuration/m-p/4484795#M570356</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/769408"&gt;@lilianamartinez&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You might still try closed mode&lt;/P&gt;
&lt;PRE&gt;access-session closed&lt;/PRE&gt;
&lt;P&gt;The details of your service policy is also important - does it do DOT1X first and then MAB. If you're still struggling then share your policy.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Oct 2021 22:33:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-c3pl-switch-configuration/m-p/4484795#M570356</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2021-10-12T22:33:43Z</dc:date>
    </item>
    <item>
      <title>Re: ISE C3PL Switch Configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-c3pl-switch-configuration/m-p/4484808#M570357</link>
      <description>&lt;P&gt;With newer platform/software versions, the default setting when using IBNS 2.0 is 'open' authentication (no access-session closed). If your session is getting an ACCESS_ACCEPT response from ISE with no DACL applied, the client getting internet access would be expected (unless it's in a redirect state... we would need more info about your policy/flow).&lt;/P&gt;
&lt;P&gt;Another option to the 'closed' mode suggested by &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;, would be using a Low-Impact Mode approach by configuring a restrictive pre-auth ACL and applying that to the switchport. In your AuthZ Policy result, you would then need to send a permissive DACL that would override the pre-auth ACL.&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;ip access-list extended ACL-PreAuth-v4
 remark Allow TFTP for PXE
 permit udp any any eq tftp
 remark Allow DHCP
 permit udp any eq bootpc any eq bootps
 remark Allow DNS
 permit udp any any eq domain
 remark Deny all else
 deny ip any any
!
interface gig1/0/20
 ip access-group ACL-PreAuth-v4 in&lt;/PRE&gt;
&lt;P&gt;You should also consider using interface templates as they are another benefit from the IBNS 2.0 C3PL feature set. Both of these aspects are covered in detail in the &lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_blank" rel="noopener"&gt;ISE Secure Wired Access Prescriptive Deployment Guide.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Oct 2021 23:13:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-c3pl-switch-configuration/m-p/4484808#M570357</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-10-12T23:13:25Z</dc:date>
    </item>
    <item>
      <title>Re: ISE C3PL Switch Configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-c3pl-switch-configuration/m-p/4490052#M570580</link>
      <description>&lt;P&gt;I tried closed mode also , but still the same result.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Oct 2021 17:13:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-c3pl-switch-configuration/m-p/4490052#M570580</guid>
      <dc:creator>lilianamartinez</dc:creator>
      <dc:date>2021-10-21T17:13:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE C3PL Switch Configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-c3pl-switch-configuration/m-p/4490060#M570581</link>
      <description>&lt;P&gt;Im using the same DACL for legacy devices and it works correctly.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Oct 2021 17:20:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-c3pl-switch-configuration/m-p/4490060#M570581</guid>
      <dc:creator>lilianamartinez</dc:creator>
      <dc:date>2021-10-21T17:20:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE C3PL Switch Configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-c3pl-switch-configuration/m-p/4490073#M570582</link>
      <description>&lt;P&gt;I tried with low-impact and it works , thank you so much for your help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Oct 2021 17:36:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-c3pl-switch-configuration/m-p/4490073#M570582</guid>
      <dc:creator>lilianamartinez</dc:creator>
      <dc:date>2021-10-21T17:36:08Z</dc:date>
    </item>
  </channel>
</rss>

