<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Compliant Users - Can't access internal resources using HTTPs in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-compliant-users-can-t-access-internal-resources-using-https/m-p/4640329#M575760</link>
    <description>&lt;P&gt;We have 6 ISE nodes, 2 nodes are PAN and 4 nodes are PSNs.&lt;/P&gt;
&lt;P&gt;we use the below redirection ACL, we removed 443 redirection, but the issue still occurs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip access-list extended ACL_REDIRECT&lt;BR /&gt;deny udp any eq bootpc any eq bootps&lt;BR /&gt;deny udp any any eq domain&lt;BR /&gt;deny ip any host &amp;lt;ISE-IP&amp;gt;&lt;BR /&gt;permit tcp any any eq www&lt;BR /&gt;deny ip any any log&lt;BR /&gt;exit&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have Proxy, but HTTPs internal resources are bypassed from proxy.&lt;/P&gt;</description>
    <pubDate>Tue, 28 Jun 2022 14:57:16 GMT</pubDate>
    <dc:creator>Mostafa hasanin</dc:creator>
    <dc:date>2022-06-28T14:57:16Z</dc:date>
    <item>
      <title>ISE Compliant Users - Can't access internal resources using HTTPs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-compliant-users-can-t-access-internal-resources-using-https/m-p/4528724#M572102</link>
      <description>&lt;P&gt;Dears,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a new deployment of ISE, when users put in compliant state, the internet working normally, but when trying to accessing internal resources using HTTPs, the browser rather than displays certification warning and let users to continue, it displays the below page&lt;/P&gt;&lt;P&gt;"the network you 're using may require you to go to sign-in page"&lt;/P&gt;&lt;P&gt;when I press to connect button, it redirects may to page Like gstatic.com (in Chrome) and edge.microsoft (in Edge).&lt;/P&gt;&lt;P&gt;the issue happens with Edge and Chrome browsers only, internet explorer working fine.&lt;/P&gt;&lt;P&gt;Any HTTPs application that trusted to chrome or Edge, its working fine, but the issue is when the certificate is untrusted for the browser, it not displays the certification warning.&lt;/P&gt;&lt;P&gt;in addition to its happens with Compliant Users and Guest Portal.&lt;/P&gt;&lt;P&gt;We are using ISE 3.0 and Anyconnect supplicant 4.10&lt;/P&gt;&lt;P&gt;how can We resolve that issue ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ISE Issue with Complaint Users.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/140842i3BEE34491F904864/image-size/large?v=v2&amp;amp;px=999" role="button" title="ISE Issue with Complaint Users.png" alt="ISE Issue with Complaint Users.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ISE Issue with Guests.jpeg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/140841i697BE92CA430AD6A/image-size/large?v=v2&amp;amp;px=999" role="button" title="ISE Issue with Guests.jpeg" alt="ISE Issue with Guests.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jan 2022 10:47:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-compliant-users-can-t-access-internal-resources-using-https/m-p/4528724#M572102</guid>
      <dc:creator>Mostafa hasanin</dc:creator>
      <dc:date>2022-01-10T10:47:48Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Compliant Users - Can't access internal resources using HTTPs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-compliant-users-can-t-access-internal-resources-using-https/m-p/4529125#M572120</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is this for a Cisco switch?&lt;/P&gt;
&lt;P&gt;Its sounds like there is still some URL redirection happening, because the switch is being instructed to do so.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It would be helpful to know what the config looks like on that port (see commands below) and also what the Authorization Profile looks like that ISE sends in the case of a "compliant" user session.&lt;/P&gt;
&lt;PRE&gt;show derived-config interface gig x/y/z
show access-session interface gig x/y/z detail&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On switch ports there are three types of ACL that are at play (from what I have discovered)&lt;/P&gt;
&lt;P&gt;- inherent ACL (at least a basic ACL to allow DHCP - ACL is configured on the interface)&lt;/P&gt;
&lt;P&gt;- dACL (downloaded from ISE) used to allow/block user traffic&lt;/P&gt;
&lt;P&gt;- redirection ACL (used to determine what will trigger a http interception/redirection)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am not sure about the precedence of which ACL is processed in what order - but be aware that there is more than one ACL at play!&lt;/P&gt;
&lt;P&gt;Good starting point for &lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_self"&gt;wired NAC is this guide&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jan 2022 22:04:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-compliant-users-can-t-access-internal-resources-using-https/m-p/4529125#M572120</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-01-10T22:04:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Compliant Users - Can't access internal resources using HTTPs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-compliant-users-can-t-access-internal-resources-using-https/m-p/4531772#M572217</link>
      <description>Can you describe your deployment and how you do redirection? Also, are you&lt;BR /&gt;using any proxy for SSL interception/&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 14 Jan 2022 19:20:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-compliant-users-can-t-access-internal-resources-using-https/m-p/4531772#M572217</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2022-01-14T19:20:29Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Compliant Users - Can't access internal resources using HTTPs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-compliant-users-can-t-access-internal-resources-using-https/m-p/4640329#M575760</link>
      <description>&lt;P&gt;We have 6 ISE nodes, 2 nodes are PAN and 4 nodes are PSNs.&lt;/P&gt;
&lt;P&gt;we use the below redirection ACL, we removed 443 redirection, but the issue still occurs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip access-list extended ACL_REDIRECT&lt;BR /&gt;deny udp any eq bootpc any eq bootps&lt;BR /&gt;deny udp any any eq domain&lt;BR /&gt;deny ip any host &amp;lt;ISE-IP&amp;gt;&lt;BR /&gt;permit tcp any any eq www&lt;BR /&gt;deny ip any any log&lt;BR /&gt;exit&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have Proxy, but HTTPs internal resources are bypassed from proxy.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jun 2022 14:57:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-compliant-users-can-t-access-internal-resources-using-https/m-p/4640329#M575760</guid>
      <dc:creator>Mostafa hasanin</dc:creator>
      <dc:date>2022-06-28T14:57:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Compliant Users - Can't access internal resources using HTTPs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-compliant-users-can-t-access-internal-resources-using-https/m-p/4640331#M575761</link>
      <description>&lt;P&gt;Hi Arne,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DACL for compliant users is "permit ip any any"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the below is port configuration&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface g1/0/1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ip access-group ACL_Default in&lt;BR /&gt;&amp;nbsp;authentication event fail action next-method&lt;BR /&gt;&amp;nbsp;authentication host-mode multi-auth&lt;BR /&gt;&amp;nbsp;authentication open&lt;BR /&gt;&amp;nbsp;authentication order dot1x mab&lt;BR /&gt;&amp;nbsp;authentication priority dot1x mab&lt;BR /&gt;&amp;nbsp;authentication port-control auto&lt;BR /&gt;&amp;nbsp;authentication timer reauthenticate server&lt;BR /&gt;&amp;nbsp;mab&lt;BR /&gt;&amp;nbsp;snmp trap mac-notification change added&lt;BR /&gt;&amp;nbsp;snmp trap mac-notification change removed&lt;BR /&gt;&amp;nbsp;dot1x pae authenticator&lt;BR /&gt;&amp;nbsp;dot1x timeout tx-period 10&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;&amp;nbsp;spanning-tree bpduguard enable&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We removed 443 redirection from redirection ACL, but the issue is the same&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jun 2022 15:00:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-compliant-users-can-t-access-internal-resources-using-https/m-p/4640331#M575761</guid>
      <dc:creator>Mostafa hasanin</dc:creator>
      <dc:date>2022-06-28T15:00:37Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Compliant Users - Can't access internal resources using HTTPs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-compliant-users-can-t-access-internal-resources-using-https/m-p/4640491#M575773</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/759226"&gt;@Mostafa hasanin&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does your switch have the global config command to enable URL redirection?&lt;/P&gt;
&lt;PRE&gt;ip http server&lt;/PRE&gt;
&lt;P&gt;This must be there to allow the switch to intercept the HTTP traffic (URL redirection).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you're concerned about securing the switch's web interface then you need to add the commands - below will disable TCP/80 and TCP/443 web access to the switch's web services&lt;/P&gt;
&lt;PRE&gt;ip http active-session-modules none
ip http secure-active-session-modules none
&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jun 2022 20:57:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-compliant-users-can-t-access-internal-resources-using-https/m-p/4640491#M575773</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-06-28T20:57:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Compliant Users - Can't access internal resources using HTTPs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-compliant-users-can-t-access-internal-resources-using-https/m-p/4640503#M575774</link>
      <description>&lt;P&gt;Hi Arne,&lt;/P&gt;
&lt;P&gt;yes, the switch is configured with ip http server&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I disabled HTTPs as I thought that it is caused the issue, but after disabling it the issue still exist.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;could you please help to solve this issue as a lot of users are suffering&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jun 2022 21:36:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-compliant-users-can-t-access-internal-resources-using-https/m-p/4640503#M575774</guid>
      <dc:creator>Mostafa hasanin</dc:creator>
      <dc:date>2022-06-28T21:36:08Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Compliant Users - Can't access internal resources using HTTPs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-compliant-users-can-t-access-internal-resources-using-https/m-p/4640515#M575775</link>
      <description>&lt;P&gt;Need more details. When you have such a situation, have you looked at the session details on the switch? e.g. when the user gets this page, you need to check (using gig 1/0/1 as an example)&lt;/P&gt;
&lt;PRE&gt;show access-session int gig 1/0/1 detail
&lt;/PRE&gt;
&lt;P&gt;Then also, verify the state of all ACLs applied. There is an ACL on the gig 1/0/1, and also, ISE is sending back a dACL - this is a dynamic ACL whose name changes all the time - you can get the exact name of the dACL from the access-session details&lt;/P&gt;
&lt;PRE&gt;show ip access-list int gi 1/0/1
show ip access-list xxxxxxxxx&amp;lt;dACL_Name&amp;gt;xxxxxxx&lt;/PRE&gt;
&lt;P&gt;Then, other basic checks to be performed on the workstation that is suffering - go to command line and check whether users can resolve the portal using DNS - and if you have telnet installed, see what is returned when you try a TCP connection to 443 and 8443 (ISE should re-direct your 443 to 8443)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;nslookup isepsn1.domain.edbe.local
telnet isepsn1.domain.edbe.local 443&lt;BR /&gt;telnet isepsn1.domain.edbe.local 8443&lt;/PRE&gt;
&lt;P&gt;DNS must work. If it doesn't then investigate that first.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jun 2022 21:58:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-compliant-users-can-t-access-internal-resources-using-https/m-p/4640515#M575775</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-06-28T21:58:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Compliant Users - Can't access internal resources using HTTPs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-compliant-users-can-t-access-internal-resources-using-https/m-p/4640569#M575776</link>
      <description>&lt;P&gt;If users are suffering, then this is an urgent issue and you should contact TAC to investigate and help you resolve the issue.&lt;BR /&gt;This Community forum is not TAC and is not suited for this type of urgent support need or troubleshooting complex issues.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2022 00:47:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-compliant-users-can-t-access-internal-resources-using-https/m-p/4640569#M575776</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-06-29T00:47:56Z</dc:date>
    </item>
  </channel>
</rss>

