<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Catalyst Switch 1000 DACL Support in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/catalyst-switch-1000-dacl-support/m-p/4737551#M578805</link>
    <description>&lt;P&gt;Does the C1000 support ACLs in hardware?&lt;/P&gt;
&lt;P&gt;If not, it should at least ignore any attributes for DACL assignments that it does not understand in the form of RADIUS attributes sent from ISE.&lt;/P&gt;
&lt;P&gt;Could also be a switch bug. &lt;/P&gt;</description>
    <pubDate>Tue, 13 Dec 2022 03:47:46 GMT</pubDate>
    <dc:creator>thomas</dc:creator>
    <dc:date>2022-12-13T03:47:46Z</dc:date>
    <item>
      <title>Catalyst Switch 1000 DACL Support</title>
      <link>https://community.cisco.com/t5/network-access-control/catalyst-switch-1000-dacl-support/m-p/4737364#M578792</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;Has anyone successfully integrated a C1000-8T-2G-L with Cisco ISE using dot1x and DACL support?&amp;nbsp; The C1000 has the latest software image (15.2.7E7).&lt;BR /&gt;&lt;BR /&gt;We have found a strange issue that if the authorization profile has a DACL set the user port fails to pass dot1x authentication. Even if the DACL is just a permit any it still fails.&amp;nbsp; When we set the authorization profile with just a VLAN and no DACL then the user port authenticates successfully and the machine can get on the network.&amp;nbsp; We are using the same authorization profile for 2960X, 3560CX, 3850 and 9300 switches and they work with DACLs but this is the 1st time we've added a C1000 on the LAN.&amp;nbsp; MAB also works fine on the C1000.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 20:31:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/catalyst-switch-1000-dacl-support/m-p/4737364#M578792</guid>
      <dc:creator>br15</dc:creator>
      <dc:date>2022-12-12T20:31:14Z</dc:date>
    </item>
    <item>
      <title>Re: Catalyst Switch 1000 DACL Support</title>
      <link>https://community.cisco.com/t5/network-access-control/catalyst-switch-1000-dacl-support/m-p/4737371#M578793</link>
      <description>&lt;P&gt;Why would you deploy a C1000? Why not deploy current standard and avoid the issue?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 20:48:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/catalyst-switch-1000-dacl-support/m-p/4737371#M578793</guid>
      <dc:creator>CcNoE</dc:creator>
      <dc:date>2022-12-12T20:48:13Z</dc:date>
    </item>
    <item>
      <title>Re: Catalyst Switch 1000 DACL Support</title>
      <link>https://community.cisco.com/t5/network-access-control/catalyst-switch-1000-dacl-support/m-p/4737423#M578798</link>
      <description>&lt;P&gt;This should work fine.&amp;nbsp; Note that the C1000 runs IOS not IOS-XE so you will need the legacy device tracking commands on the switch to properly enforce dACLs.&amp;nbsp; These should be the same you are using on your 2960X 3560CX though.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 21:31:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/catalyst-switch-1000-dacl-support/m-p/4737423#M578798</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2022-12-12T21:31:43Z</dc:date>
    </item>
    <item>
      <title>Re: Catalyst Switch 1000 DACL Support</title>
      <link>https://community.cisco.com/t5/network-access-control/catalyst-switch-1000-dacl-support/m-p/4737551#M578805</link>
      <description>&lt;P&gt;Does the C1000 support ACLs in hardware?&lt;/P&gt;
&lt;P&gt;If not, it should at least ignore any attributes for DACL assignments that it does not understand in the form of RADIUS attributes sent from ISE.&lt;/P&gt;
&lt;P&gt;Could also be a switch bug. &lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 03:47:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/catalyst-switch-1000-dacl-support/m-p/4737551#M578805</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2022-12-13T03:47:46Z</dc:date>
    </item>
  </channel>
</rss>

