<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE 3.2 Secure Wired Access with Catalyst 1000 Series Switch in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-secure-wired-access-with-catalyst-1000-series/m-p/4845885#M582014</link>
    <description>&lt;P&gt;You can do Posture without DHCP.&amp;nbsp; Are dACLs not supported on Catalyst 1000s?&lt;/P&gt;</description>
    <pubDate>Tue, 30 May 2023 19:54:19 GMT</pubDate>
    <dc:creator>ahollifield</dc:creator>
    <dc:date>2023-05-30T19:54:19Z</dc:date>
    <item>
      <title>Cisco ISE 3.2 Secure Wired Access with Catalyst 1000 Series Switches</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-secure-wired-access-with-catalyst-1000-series/m-p/4845157#M582002</link>
      <description>&lt;P&gt;Hi, community,&lt;/P&gt;
&lt;P&gt;we are trying to do PoC with the following requirement and environment&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Requirement/PoC Success Criteria&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Port-based Authentication using&amp;nbsp;IEEE 802.1X&lt;/LI&gt;
&lt;LI&gt;Posture assessment and remediation of Windows 10 endpoint using AnyConnect
&lt;OL class="lia-list-style-type-lower-roman"&gt;
&lt;LI&gt;If the machine is non-compliant then the machine should not get any access except remediation resources like the WSUS server, and AV Server to remediate noncompliant conditions&lt;/LI&gt;
&lt;LI&gt;If the machine is compliant then the machine should get normal access,&lt;/LI&gt;
&lt;LI&gt;if the machine posture status is unknown then redirect it to the client provisioning portal to download AnyConnect Agent&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Environment for PoC&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Cisco Identity Services Engine (ISE)&amp;nbsp;Release 3.2&lt;/LI&gt;
&lt;LI&gt;End user machine - Windows 10&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;User Access Switch -&amp;nbsp;Catalyst 1000 Series Switch C1000-8T-E-2G-L&amp;nbsp; with&amp;nbsp;IOS Release 15.2.7E7&lt;/LI&gt;
&lt;LI&gt;No DHCP in the environment.&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;Endpoint Patch Management Solution -&amp;nbsp;Windows Server Update Services (WSUS)&lt;/LI&gt;
&lt;LI&gt;Endpoint AV Solution - eScan&amp;nbsp;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Challenge for PoC&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Since there is no DHCP how can I create an Authorization profile to quarantine the machine&amp;nbsp; ?&lt;/LI&gt;
&lt;LI&gt;If I try to achieve Authorization using dACL but then I came to know from&amp;nbsp;IOS Release 15.2.7E7 Guide that dynamic ACL are not supported&amp;nbsp;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Can anyone guide me on how can I proceed for Cisco ISE PoC with the above-mentioned requirement of PoC?&lt;/P&gt;</description>
      <pubDate>Tue, 30 May 2023 06:51:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-secure-wired-access-with-catalyst-1000-series/m-p/4845157#M582002</guid>
      <dc:creator>jitendrac</dc:creator>
      <dc:date>2023-05-30T06:51:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.2 Secure Wired Access with Catalyst 1000 Series Switch</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-secure-wired-access-with-catalyst-1000-series/m-p/4845885#M582014</link>
      <description>&lt;P&gt;You can do Posture without DHCP.&amp;nbsp; Are dACLs not supported on Catalyst 1000s?&lt;/P&gt;</description>
      <pubDate>Tue, 30 May 2023 19:54:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-secure-wired-access-with-catalyst-1000-series/m-p/4845885#M582014</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-05-30T19:54:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.2 Secure Wired Access with Catalyst 1000 Series Switch</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-secure-wired-access-with-catalyst-1000-series/m-p/4845891#M582015</link>
      <description>&lt;P&gt;If you can't do dACL, you could try to define an ACL on the switch, and then refer to that ACL by name as part of the Access-Accept. Not sure which RADIUS Attribute that is exactly, but it might be the Filter-ID attribute, or a Cisco AVPair. If this works, then great but,&amp;nbsp; it's an extra burden on the switch admin, who would have to define this ACL on all switches. Perhaps you can push a template via NMS/script to reduce that effort. But if the switch doesn't support dACL, then who knows if it even supports a per-user ACL.&lt;/P&gt;
&lt;P&gt;I saw a blog posting where the following attributes were sent back to the NAS:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;cisco-avpair="ip:inacl#1=deny ip any x",
cisco-avpair="ip:inacl#2=deny ip any x",
cisco-avpair="ip:inacl#3=deny ip any x",
cisco-avpair="ip:inacl#4=deny ip any x",
cisco-avpair="ip:inacl#5=deny ip any x",
cisco-avpair="ip:inacl#6=permit ip host x any",
cisco-avpair="ip:inacl#7=deny ip any any"&lt;/LI-CODE&gt;
&lt;P&gt;Does that switch/IOS support URL redirection? That might be another hurdle to overcome.&lt;/P&gt;
&lt;P&gt;Sounds like a bit more lab work is required &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 May 2023 20:06:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-secure-wired-access-with-catalyst-1000-series/m-p/4845891#M582015</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-05-30T20:06:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.2 Secure Wired Access with Catalyst 1000 Series Switch</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-secure-wired-access-with-catalyst-1000-series/m-p/4846027#M582025</link>
      <description>&lt;P&gt;As per the &lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst1000/software/releases/15_2_7_e/configuration_guides/sec/b_1527e_security_c1000_cg/per-user_ACL_for_8021x.html" target="_blank" rel="noopener"&gt;Security Configuration Guide&lt;/A&gt; for the Cat1000, it does support downloadable per-user ACLs. There are very specific limitations with this platform that are also described, including this important one:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;"Only one 802.1X-authenticated user is supported on a port. If the multiple-hosts mode is enabled on the port, the per-user ACL attribute is disabled for the associated port."&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;The configuration required for the dACLs, however, relies on the 'ip device tracking' feature. The &lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst1000/software/releases/15_2_7_e/configuration_guides/sec/b_1527e_security_c1000_cg/configuirng_ip_src_guard.html?bookSearch=true#concept_ckh_3hw_vjb" target="_blank" rel="noopener"&gt;IP Source Guard&lt;/A&gt; section of the configuration guide states the following, so applying a per-user dACL (1 user per port) should work as long as you have 'ip device tracking' enabled and the host initiates some traffic on the network when connected.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;"IP or MAC bindings are learned from static hosts by ARP and IP packets. They are stored in the device tracking database."&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2023 01:35:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-secure-wired-access-with-catalyst-1000-series/m-p/4846027#M582025</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-05-31T01:35:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.2 Secure Wired Access with Catalyst 1000 Series Switch</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-secure-wired-access-with-catalyst-1000-series/m-p/4846060#M582027</link>
      <description>&lt;P&gt;Hi&amp;nbsp;Greg,&lt;BR /&gt;Thanks for sharing the link where it says support for "• IEEE 802.1x authentication with downloadable ACLs and redirect URLs to allow per-user ACL downloads from a RADIUS server or Cisco Identity Services Engine (ISE) to an authenticated switch."&lt;BR /&gt;I was referring&amp;nbsp;Software Configuration Guide, Cisco IOS Release 15.2(7)E (Catalyst Digital Building Series Switches)&amp;nbsp;where under IPv4 ACL Switch Unsupported Features topic it is mentioned that&amp;nbsp;&lt;BR /&gt;Reflexive ACLs, URL Redirect ACLs, and Dynamic ACLs are not supported (except for some specialized dynamic ACLs used by the switch clustering feature)&lt;BR /&gt;Just look at the screenshot that i was referring.&lt;/P&gt;
&lt;P&gt;Not sure which document i should refer to check the support of dACL for&amp;nbsp;Catalyst 1000 Series Switches C1000-8T-E-2G-L with&amp;nbsp;IOS Release 15.2.7E7&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jitendrac_0-1685505839661.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/186070i0C53F19FB84C72B3/image-size/medium?v=v2&amp;amp;px=400" role="button" title="jitendrac_0-1685505839661.png" alt="jitendrac_0-1685505839661.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2023 04:05:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-secure-wired-access-with-catalyst-1000-series/m-p/4846060#M582027</guid>
      <dc:creator>jitendrac</dc:creator>
      <dc:date>2023-05-31T04:05:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.2 Secure Wired Access with Catalyst 1000 Series Switch</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-secure-wired-access-with-catalyst-1000-series/m-p/4846119#M582030</link>
      <description>&lt;P&gt;Downloadable ACLs are&amp;nbsp;&lt;STRONG&gt;not&lt;/STRONG&gt; the same thing as Dynamic ACLs (also known as "Lock-and-Key" ACLs). These serve completely different functions.&lt;/P&gt;
&lt;P&gt;See the following document for an example of Dynamic ACLs.&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/lock-key/7604-13.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/lock-key/7604-13.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2023 06:46:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-secure-wired-access-with-catalyst-1000-series/m-p/4846119#M582030</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-05-31T06:46:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.2 Secure Wired Access with Catalyst 1000 Series Switch</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-secure-wired-access-with-catalyst-1000-series/m-p/4846146#M582032</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi&amp;nbsp;Greg,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks for correcting my understanding of &lt;U&gt;&lt;STRONG&gt;Downloadable ACLs&lt;/STRONG&gt;&lt;/U&gt; and&amp;nbsp;&lt;U&gt;&lt;STRONG&gt;Dynamic ACLs.&lt;/STRONG&gt;&lt;/U&gt;&amp;nbsp;&lt;BR /&gt;Really appreciate your efforts in the Cisco community.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt; I will update PoC result&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2023 07:36:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-secure-wired-access-with-catalyst-1000-series/m-p/4846146#M582032</guid>
      <dc:creator>jitendrac</dc:creator>
      <dc:date>2023-05-31T07:36:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.2 Secure Wired Access with Catalyst 1000 Series Switch</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-secure-wired-access-with-catalyst-1000-series/m-p/4921446#M583991</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1196021"&gt;@jitendrac&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to check with you if&amp;nbsp;&lt;SPAN&gt;Catalyst 1000 is working with Cisco ISE Anyconnect Posture?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Because I plan to test the Cisco Switch C1000 with Cisco ISE Posture too. Please help to share.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2023 14:24:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-secure-wired-access-with-catalyst-1000-series/m-p/4921446#M583991</guid>
      <dc:creator>teamsothea222</dc:creator>
      <dc:date>2023-09-11T14:24:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.2 Secure Wired Access with Catalyst 1000 Series Switch</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-secure-wired-access-with-catalyst-1000-series/m-p/4921505#M583994</link>
      <description>&lt;P&gt;15.2.7 is still the latest version of IOS available for Catalyst 1000.&amp;nbsp; So nothing should have changed from this link previously shared in this thread:&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst1000/software/releases/15_2_7_e/configuration_guides/sec/b_1527e_security_c1000_cg.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst1000/software/releases/15_2_7_e/configuration_guides/sec/b_1527e_security_c1000_cg.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2023 16:40:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-secure-wired-access-with-catalyst-1000-series/m-p/4921505#M583994</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-09-11T16:40:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.2 Secure Wired Access with Catalyst 1000 Series Switch</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-secure-wired-access-with-catalyst-1000-series/m-p/4953866#M585000</link>
      <description>&lt;P&gt;Yes, it worked perfectly without any issues. Our POC was successful.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 05 Nov 2023 15:50:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-2-secure-wired-access-with-catalyst-1000-series/m-p/4953866#M585000</guid>
      <dc:creator>jitendrac</dc:creator>
      <dc:date>2023-11-05T15:50:15Z</dc:date>
    </item>
  </channel>
</rss>

