<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco dACL Not Applying on 2960X in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-dacl-not-applying-on-2960x/m-p/4788796#M580298</link>
    <description>&lt;P&gt;config PACL with same IP under the interface and add deny any any&amp;nbsp;&lt;BR /&gt;then after dACL&amp;nbsp;&lt;BR /&gt;check show ip access-list see if the dACL line add to PACL you config&lt;/P&gt;</description>
    <pubDate>Tue, 07 Mar 2023 15:57:46 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-03-07T15:57:46Z</dc:date>
    <item>
      <title>Cisco dACL Not Applying on 2960X</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-dacl-not-applying-on-2960x/m-p/4788787#M580295</link>
      <description>&lt;P&gt;I'm trying to deploy a dACL from our RADIUS server, I see the dACL being received by the switch, but for some reason it's not present when I run "show ip access-list" or if I look at the access-lists applied to the interface. I also don't see it applied when checking the auth session details. Any suggestions on what I might be missing or what might be going on? My test switch is a little older version - 2960X&amp;nbsp;Version 15.2(2)E3.&lt;/P&gt;&lt;P&gt;132966: Mar 7 10:16:52.909 EST: EPM_SESS_EVENT: Feature (EPM ACL PLUG-IN) has been started (status 2)&lt;BR /&gt;132967: Mar 7 10:16:52.909 EST: EPM_SESS_EVENT: Feature received has acl&lt;BR /&gt;132968: Mar 7 10:16:52.909 EST: EPM_SESS_ERR: *** Download in progress..&lt;BR /&gt;132969: Mar 7 10:16:52.909 EST: EPM_SESS_EVENT: Method list used for download is default&lt;BR /&gt;132970: Mar 7 10:16:52.909 EST: EPM_SESS_EVENT: Local Open Dir Received&lt;BR /&gt;132971: Mar 7 10:16:52.909 EST: EPM_SESS_EVENT: Feature received does not have acl&lt;BR /&gt;132972: Mar 7 10:16:52.912 EST: EPM_SESS_EVENT: Feature (EPM ACL PLUG-IN) Status (1) Notified&lt;BR /&gt;132973: Mar 7 10:16:52.912 EST: EPM_SESS_EVENT: Successful feature attrs provided for EPM ACL PLUG-IN&lt;BR /&gt;132977: Mar 7 10:16:52.947 EST: EPM_SESS_EVENT: Executed [ip access-list extended xACSACLx-IP-Cisco_dACL_Credit_Card-3314-6] command through parse_cmd. Result= 0&lt;BR /&gt;132978: Mar 7 10:16:52.951 EST: EPM_SESS_EVENT: Executed [1 permit udp any any eq bootpc] command through parse_cmd. Result= 0&lt;BR /&gt;132979: Mar 7 10:16:52.951 EST: EPM_SESS_EVENT: Executed [end] command through parse_cmd. Result= 0&lt;BR /&gt;132980: Mar 7 10:16:52.954 EST: EPM_SESS_EVENT: Executed [ip access-list extended xACSACLx-IP-Cisco_dACL_Credit_Card-3314-6] command through parse_cmd. Result= 0&lt;BR /&gt;132981: Mar 7 10:16:52.954 EST: EPM_SESS_EVENT: Executed [2 permit udp any any eq domain] command through parse_cmd. Result= 0&lt;BR /&gt;132982: Mar 7 10:16:52.958 EST: EPM_SESS_EVENT: Executed [end] command through parse_cmd. Result= 0&lt;BR /&gt;132980: Mar 7 10:16:52.954 EST: EPM_SESS_EVENT: Executed [ip access-list extended xACSACLx-IP-Cisco_dACL_Credit_Card-3314-6] command through parse_cmd. Result= 0&lt;BR /&gt;132981: Mar 7 10:16:52.954 EST: EPM_SESS_EVENT: Executed [3 permit ip any any] command through parse_cmd. Result= 0&lt;BR /&gt;132982: Mar 7 10:16:52.958 EST: EPM_SESS_EVENT: Executed [end] command through parse_cmd. Result= 0&lt;BR /&gt;133025: Mar 7 10:16:53.045 EST: EPM_SESS_EVENT: EPM_HA: Size of AAA attrlist 0x29001A8B = 984&lt;BR /&gt;133026: Mar 7 10:16:53.045 EST: EPM_SESS_EVENT: EPM_HA: AAA attrlist 0x29001A8B stored in buffer 0x564A375 with size 984&lt;BR /&gt;133027: Mar 7 10:16:53.045 EST: EPM_SESS_EVENT: IN ACL not configured, checking Default ACL&lt;BR /&gt;133028: Mar 7 10:16:53.048 EST: EPM_SESS_ERR: ACL xACSACLx-IP-Cisco_dACL_Credit_Card-3314-6 provisioning failed!&lt;BR /&gt;133029: Mar 7 10:16:53.048 EST: EPM_SESS_EVENT: Feature (EPM ACL PLUG-IN) Status (2) Notified&lt;BR /&gt;133030: Mar 7 10:16:53.048 EST: EPM_SESS_EVENT: Successful feature attrs provided for EPM MISC PLUG-IN&lt;BR /&gt;133031: Mar 7 10:16:53.048 EST: EPM_SESS_EVENT: Successful feature attrs provided for EPM ACL PLUG-IN&lt;BR /&gt;133032: Mar 7 10:16:53.048 EST: EPM_SESS_EVENT: Successful feature attrs provided for SM Reauth Plugin&lt;BR /&gt;133033: Mar 7 10:16:53.048 EST: EPM_SESS_EVENT: Successful feature attrs provided for EPM VLAN GROUP ASSIGNMENT&lt;BR /&gt;133034: Mar 7 10:16:53.048 EST: EPM_SESS_EVENT: Successful feature attrs provided for SM ACCOUNTING PLUG-IN&lt;BR /&gt;133035: Mar 7 10:16:53.052 EST: EPM_SESS_EVENT: Received IIF ID [0]&lt;BR /&gt;133036: Mar 7 10:16:53.066 EST: EPM_SESS_EVENT: Feature (EPM MISC PLUG-IN) has been terminated&lt;BR /&gt;133037: Mar 7 10:16:53.066 EST: EPM_SESS_EVENT: Feature (EPM ACL PLUG-IN) has been terminated&lt;BR /&gt;133038: Mar 7 10:16:53.066 EST: EPM_SESS_EVENT: Feature (SM Reauth Plugin) has been terminated&lt;BR /&gt;133039: Mar 7 10:16:53.066 EST: EPM_SESS_EVENT: Feature (EPM VLAN GROUP ASSIGNMENT) has been terminated&lt;BR /&gt;133040: Mar 7 10:16:53.066 EST: EPM_SESS_EVENT: Feature (SM ACCOUNTING PLUG-IN) has been terminated&lt;BR /&gt;133041: Mar 7 10:16:53.073 EST: EPM_SESS_ERR: *** Inside Cleanup action ***&lt;BR /&gt;K-11-Buildsw6#&lt;BR /&gt;133042: Mar 7 10:16:53.073 EST: EPM_SESS_EVENT: Un-Installing Named ACL xACSACLx-IP-Cisco_dACL_Credit_Card-3314-6 session_ctx 83E405C feat_ctx 83F4284 feat_conf 83D4260&lt;BR /&gt;133043: Mar 7 10:16:53.076 EST: EPM_SESS_EVENT: EPM_HA: Size of AAA attrlist 0xFB001A9C = 984&lt;BR /&gt;133044: Mar 7 10:16:53.076 EST: EPM_SESS_EVENT: EPM_HA: AAA attrlist 0xFB001A9C stored in buffer 0x5658859 with size 984&lt;BR /&gt;K-11-Buildsw6#&lt;BR /&gt;133045: Mar 7 10:16:53.622 EST: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/0/17, changed state to up&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Buildsw6#show auth sessions interface gigabitEthernet 1/0/17 details&lt;BR /&gt;Interface: GigabitEthernet1/0/17&lt;BR /&gt;MAC Address: 38ef.e37e.3275&lt;BR /&gt;IPv6 Address: Unknown&lt;BR /&gt;IPv4 Address: Unknown&lt;BR /&gt;User-Name: 38efe37e3275&lt;BR /&gt;Status: Unauthorized&lt;BR /&gt;Domain: DATA&lt;BR /&gt;Oper host mode: multi-domain&lt;BR /&gt;Oper control dir: in&lt;BR /&gt;Session timeout: N/A&lt;BR /&gt;Common Session ID: 0A080A2C00000A7050BE706B&lt;BR /&gt;Acct Session ID: 0x00000A5C&lt;BR /&gt;Handle: 0xA900001A&lt;BR /&gt;Current Policy: POLICY_Gi1/0/17&lt;/P&gt;&lt;P&gt;Local Policies:&lt;BR /&gt;Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)&lt;/P&gt;&lt;P&gt;Method status list:&lt;BR /&gt;Method State&lt;BR /&gt;mab Authc Success&lt;/P&gt;&lt;P&gt;Buildsw6#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Buildsw6#show ip access-lists interface gigabitEthernet 1/0/17&lt;BR /&gt;Buildsw6#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2023 15:46:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-dacl-not-applying-on-2960x/m-p/4788787#M580295</guid>
      <dc:creator>mharing</dc:creator>
      <dc:date>2023-03-07T15:46:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco dACL Not Applying on 2960X</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-dacl-not-applying-on-2960x/m-p/4788793#M580297</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/858098"&gt;@mharing&lt;/a&gt; I note in your output there IPv4 address is unknown.&lt;/P&gt;
&lt;P&gt;Do you have device tracking configured and working?&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;The device-tracking configuration is very critical to learn an endpoint’s IP address and map that to its network access session. The &lt;STRONG&gt;device-tracking configuration is also essential for many features, such as downloadable ACLs&lt;/STRONG&gt;, device profiling, URL redirection, and more.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2023 15:54:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-dacl-not-applying-on-2960x/m-p/4788793#M580297</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-03-07T15:54:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco dACL Not Applying on 2960X</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-dacl-not-applying-on-2960x/m-p/4788796#M580298</link>
      <description>&lt;P&gt;config PACL with same IP under the interface and add deny any any&amp;nbsp;&lt;BR /&gt;then after dACL&amp;nbsp;&lt;BR /&gt;check show ip access-list see if the dACL line add to PACL you config&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2023 15:57:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-dacl-not-applying-on-2960x/m-p/4788796#M580298</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-07T15:57:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco dACL Not Applying on 2960X</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-dacl-not-applying-on-2960x/m-p/4788797#M580299</link>
      <description>&lt;P&gt;I do, but you're right it isn't showing properly for that specific client / port -&amp;nbsp;&lt;/P&gt;&lt;P&gt;Buildsw6#show ip device tracking all&lt;BR /&gt;Global IP Device Tracking for clients = Enabled&lt;BR /&gt;Global IP Device Tracking Probe Count = 3&lt;BR /&gt;Global IP Device Tracking Probe Interval = 30&lt;BR /&gt;Global IP Device Tracking Probe Delay Interval = 10&lt;BR /&gt;-----------------------------------------------------------------------------------------------&lt;BR /&gt;IP Address MAC Address Vlan Interface Probe-Timeout State Source&lt;BR /&gt;-----------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;Total number interfaces enabled: 1&lt;BR /&gt;Enabled interfaces:&lt;BR /&gt;Gi1/0/17&lt;BR /&gt;Buildsw6#&lt;/P&gt;&lt;P&gt;Buildsw6#show ip device tracking interface gigabitEthernet 1/0/17&lt;BR /&gt;--------------------------------------------&lt;BR /&gt;Interface GigabitEthernet1/0/17 is: STAND ALONE&lt;BR /&gt;IP Device Tracking = Enabled&lt;BR /&gt;IP Device Tracking Probe Count = 3&lt;BR /&gt;IP Device Tracking Probe Interval = 30&lt;BR /&gt;IPv6 Device Tracking Client Registered Handle: 1&lt;BR /&gt;IP Device Tracking Enabled Features:&lt;BR /&gt;HOST_TRACK_CLIENT_SM&lt;BR /&gt;--------------------------------------------&lt;/P&gt;&lt;P&gt;Buildsw6#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll check that documentation quick and make sure I didn't miss anything.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2023 15:58:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-dacl-not-applying-on-2960x/m-p/4788797#M580299</guid>
      <dc:creator>mharing</dc:creator>
      <dc:date>2023-03-07T15:58:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco dACL Not Applying on 2960X</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-dacl-not-applying-on-2960x/m-p/4790476#M580350</link>
      <description>&lt;P&gt;Thank you all for the help, we were able to figure out the issue. The dACL we were pushing had some invalid lines that was preventing it from applying properly. First, the ACL is "in" only, and in such, the source must always be the connected device (or any which is what we used), second we needed to use wildcard masks, instead of CIDR or standard subnet mask, and finally, the protocols should be the actual port number and not the protocol name such as domain or bootpc. After correcting these in the dACL, it was applied successfully.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For reference, our NAC solution is Aruba ClearPass. Hopefully this helps someone else with the same issue!&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2023 15:07:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-dacl-not-applying-on-2960x/m-p/4790476#M580350</guid>
      <dc:creator>mharing</dc:creator>
      <dc:date>2023-03-09T15:07:09Z</dc:date>
    </item>
  </channel>
</rss>

