<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ISE dACL won't apply to the port in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dacl-won-t-apply-to-the-port/m-p/4956955#M585112</link>
    <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm struggling to configure a switchport to use a dACL configured on Cisco ISE.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Environment:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Cisco ISE 3.1.0.518&amp;nbsp; (VM in VMWare)&lt;/LI&gt;&lt;LI&gt;vios_l2-ADVENTERPRISEK9-M), Version 15.2(4 .0.55)E&amp;nbsp; (inside EVE-NG)&lt;/LI&gt;&lt;LI&gt;Ubuntu Desktop (inside EVE-NG)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Switch Config&lt;/U&gt;&lt;/P&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;aaa new-model&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;dot1x system-auth-control&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;radius server ISER1&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&amp;nbsp; address ipv4 192.168.183.51 auth-port 1812 acct-port 1813&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&amp;nbsp; key radiuskey&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;aaa group server radius ISEG1&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&amp;nbsp; server name ISER1&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&amp;nbsp; ip radius source-interface Vlan1&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;aaa authentication dot1x default group ISEG1&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;aaa authorization network default group ISEG1&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;aaa accounting dot1x default start-stop group ISEG1&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;radius-server vsa send authentication&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;radius-server vsa send accounting&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;radius-server attribute 6 on-for-login-auth&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;radius-server attribute 8 include-in-access-req&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;radius-server attribute 25 access-request include&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;ip device tracking&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;ip device tracking probe delay 10&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;ip dhcp snooping&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;ip dhcp snooping vlan 10&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;ip dhcp snooping vlan 2&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;no ip dhcp snooping information option&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;interface GigabitEthernet0/3&amp;nbsp; &amp;nbsp;// Connected to PC&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;&amp;nbsp; switchport mode access&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;&amp;nbsp; switchport access vlan 2&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;&amp;nbsp; spanning-tree portfast&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;&amp;nbsp; dot1x pae authenticator&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;&amp;nbsp; authentication port-control auto&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;interface GigabitEthernet0/0&amp;nbsp; // Uplink&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;&amp;nbsp; switchport trunk encapsulation dot1q&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;&amp;nbsp; switchport mode trunk&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;&amp;nbsp; ip dhcp snooping trust&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;U&gt;Cisco ISE Configuration&lt;/U&gt;&lt;/DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;the switch is configured in&amp;nbsp;&lt;EM&gt;Network Devices&lt;/EM&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;local users configured in&amp;nbsp;&lt;EM&gt;Identities/ Network Access Users&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;rules configured for 802.1X authentication and authorization&lt;/LI&gt;&lt;LI&gt;authorization profile configured for VLAN assignment and/or dACL&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Just with VLAN assignment and current configuration everything seems to work fine. The port starts in VLAN2, authentication and authorization occur, the port is moved to VLAN10, it gets an IP via DHCP from VLAN10 and it has full connectivity.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="radumihai_0-1699621471068.png" style="width: 975px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/202126iA1E1560F1CEE233C/image-size/large?v=v2&amp;amp;px=999" role="button" title="radumihai_0-1699621471068.png" alt="radumihai_0-1699621471068.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;Switch(config)#do show ip device tracking all&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Global IP Device Tracking for clients = Enabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Global IP Device Tracking Probe Count = 3&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Global IP Device Tracking Probe Interval = 30&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Global IP Device Tracking Probe Delay Interval = 10&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;---------------------------------------------------------------------------------------&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;IP Address MAC Address Vlan Interface Probe-Timeout State Source&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;---------------------------------------------------------------------------------------&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;10.100.10.4 0050.0000.0f00 10 GigabitEthernet0/3 30 ACTIVE ARP&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;If I configure the authorization profile to also push a default dACL (for example&amp;nbsp;&lt;EM&gt;PERMIT_ALL_IPV4_TRAFFIC&lt;/EM&gt;) the switch receives from the ISE &lt;EM&gt;RADIUS&amp;nbsp;&lt;/EM&gt;&lt;EM&gt;Access-Accep&lt;/EM&gt;t and it downloads the dACL but it sends back to the user&amp;nbsp;&lt;EM&gt;EAP - Failure&lt;/EM&gt;. The supplicant tries again, same result and it gives up at some point. There is no entry in&amp;nbsp;&lt;EM&gt;show ip device tracking all.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="radumihai_1-1699621877156.png" style="width: 975px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/202128i41CDD6D650A98549/image-dimensions/975x96?v=v2" width="975" height="96" role="button" title="radumihai_1-1699621877156.png" alt="radumihai_1-1699621877156.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="radumihai_2-1699622110508.png" style="width: 974px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/202129i60896BEA1C5FA904/image-dimensions/974x101?v=v2" width="974" height="101" role="button" title="radumihai_2-1699622110508.png" alt="radumihai_2-1699622110508.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;If I configure to push a custom dACL the AAA process is successful, the supplicant receives the&amp;nbsp;&lt;EM&gt;EAP - Success&lt;/EM&gt; message, it gets an IP address from VLAN10, but it is put in VLAN2 according to the&amp;nbsp;&lt;EM&gt;show ip device tracking&amp;nbsp;&lt;/EM&gt;and there is no connectivity.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="radumihai_3-1699622389802.png" style="width: 909px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/202130iD89F90E26F691BD0/image-dimensions/909x226?v=v2" width="909" height="226" role="button" title="radumihai_3-1699622389802.png" alt="radumihai_3-1699622389802.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="radumihai_4-1699622435583.png" style="width: 922px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/202131i0017AB5EFE963BBC/image-dimensions/922x67?v=v2" width="922" height="67" role="button" title="radumihai_4-1699622435583.png" alt="radumihai_4-1699622435583.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;Switch(config-if)#do show ip device tracking all&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;-------------------------------------------------------------&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;IP Address MAC Address Vlan Interface Probe-Timeout State Source&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;-------------------------------------------------------------&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;10.100.10.4 0050.0000.0f00 &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;2&lt;/STRONG&gt;&lt;/FONT&gt; GigabitEthernet0/3 30 ACTIVE ARP&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;If i configure just the dACL authorization (doesn't matter what kind of dACL is used), the ISE server sends &lt;EM&gt;RADIUS&amp;nbsp;&lt;/EM&gt;&lt;EM&gt;Access-Accept&lt;/EM&gt; for network access and dACL download but the switch sends&amp;nbsp;&lt;EM&gt;EAP-Failure&lt;/EM&gt; to the supplicant.&lt;/P&gt;&lt;P&gt;What could be the problem? I'm not sure if this behavior is caused by my configuration and there is something wrong with it or is caused by the the fact that the switch is virtual, inside EVE-NG, inside VMWare.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advanced,&lt;/P&gt;&lt;P&gt;Radu&lt;/P&gt;</description>
    <pubDate>Fri, 10 Nov 2023 13:43:36 GMT</pubDate>
    <dc:creator>radumihai</dc:creator>
    <dc:date>2023-11-10T13:43:36Z</dc:date>
    <item>
      <title>Cisco ISE dACL won't apply to the port</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dacl-won-t-apply-to-the-port/m-p/4956955#M585112</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm struggling to configure a switchport to use a dACL configured on Cisco ISE.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Environment:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Cisco ISE 3.1.0.518&amp;nbsp; (VM in VMWare)&lt;/LI&gt;&lt;LI&gt;vios_l2-ADVENTERPRISEK9-M), Version 15.2(4 .0.55)E&amp;nbsp; (inside EVE-NG)&lt;/LI&gt;&lt;LI&gt;Ubuntu Desktop (inside EVE-NG)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Switch Config&lt;/U&gt;&lt;/P&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;aaa new-model&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;dot1x system-auth-control&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;radius server ISER1&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&amp;nbsp; address ipv4 192.168.183.51 auth-port 1812 acct-port 1813&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&amp;nbsp; key radiuskey&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;aaa group server radius ISEG1&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&amp;nbsp; server name ISER1&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&amp;nbsp; ip radius source-interface Vlan1&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;aaa authentication dot1x default group ISEG1&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;aaa authorization network default group ISEG1&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;aaa accounting dot1x default start-stop group ISEG1&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;radius-server vsa send authentication&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;radius-server vsa send accounting&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;radius-server attribute 6 on-for-login-auth&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;radius-server attribute 8 include-in-access-req&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;radius-server attribute 25 access-request include&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;ip device tracking&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;ip device tracking probe delay 10&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;ip dhcp snooping&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;ip dhcp snooping vlan 10&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;ip dhcp snooping vlan 2&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;no ip dhcp snooping information option&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;interface GigabitEthernet0/3&amp;nbsp; &amp;nbsp;// Connected to PC&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;&amp;nbsp; switchport mode access&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;&amp;nbsp; switchport access vlan 2&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;&amp;nbsp; spanning-tree portfast&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;&amp;nbsp; dot1x pae authenticator&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;&amp;nbsp; authentication port-control auto&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;interface GigabitEthernet0/0&amp;nbsp; // Uplink&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;&amp;nbsp; switchport trunk encapsulation dot1q&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;&amp;nbsp; switchport mode trunk&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;&amp;nbsp; ip dhcp snooping trust&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;U&gt;Cisco ISE Configuration&lt;/U&gt;&lt;/DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;the switch is configured in&amp;nbsp;&lt;EM&gt;Network Devices&lt;/EM&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;local users configured in&amp;nbsp;&lt;EM&gt;Identities/ Network Access Users&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;rules configured for 802.1X authentication and authorization&lt;/LI&gt;&lt;LI&gt;authorization profile configured for VLAN assignment and/or dACL&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Just with VLAN assignment and current configuration everything seems to work fine. The port starts in VLAN2, authentication and authorization occur, the port is moved to VLAN10, it gets an IP via DHCP from VLAN10 and it has full connectivity.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="radumihai_0-1699621471068.png" style="width: 975px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/202126iA1E1560F1CEE233C/image-size/large?v=v2&amp;amp;px=999" role="button" title="radumihai_0-1699621471068.png" alt="radumihai_0-1699621471068.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;Switch(config)#do show ip device tracking all&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Global IP Device Tracking for clients = Enabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Global IP Device Tracking Probe Count = 3&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Global IP Device Tracking Probe Interval = 30&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Global IP Device Tracking Probe Delay Interval = 10&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;---------------------------------------------------------------------------------------&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;IP Address MAC Address Vlan Interface Probe-Timeout State Source&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;---------------------------------------------------------------------------------------&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;10.100.10.4 0050.0000.0f00 10 GigabitEthernet0/3 30 ACTIVE ARP&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;If I configure the authorization profile to also push a default dACL (for example&amp;nbsp;&lt;EM&gt;PERMIT_ALL_IPV4_TRAFFIC&lt;/EM&gt;) the switch receives from the ISE &lt;EM&gt;RADIUS&amp;nbsp;&lt;/EM&gt;&lt;EM&gt;Access-Accep&lt;/EM&gt;t and it downloads the dACL but it sends back to the user&amp;nbsp;&lt;EM&gt;EAP - Failure&lt;/EM&gt;. The supplicant tries again, same result and it gives up at some point. There is no entry in&amp;nbsp;&lt;EM&gt;show ip device tracking all.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="radumihai_1-1699621877156.png" style="width: 975px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/202128i41CDD6D650A98549/image-dimensions/975x96?v=v2" width="975" height="96" role="button" title="radumihai_1-1699621877156.png" alt="radumihai_1-1699621877156.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="radumihai_2-1699622110508.png" style="width: 974px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/202129i60896BEA1C5FA904/image-dimensions/974x101?v=v2" width="974" height="101" role="button" title="radumihai_2-1699622110508.png" alt="radumihai_2-1699622110508.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;If I configure to push a custom dACL the AAA process is successful, the supplicant receives the&amp;nbsp;&lt;EM&gt;EAP - Success&lt;/EM&gt; message, it gets an IP address from VLAN10, but it is put in VLAN2 according to the&amp;nbsp;&lt;EM&gt;show ip device tracking&amp;nbsp;&lt;/EM&gt;and there is no connectivity.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="radumihai_3-1699622389802.png" style="width: 909px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/202130iD89F90E26F691BD0/image-dimensions/909x226?v=v2" width="909" height="226" role="button" title="radumihai_3-1699622389802.png" alt="radumihai_3-1699622389802.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="radumihai_4-1699622435583.png" style="width: 922px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/202131i0017AB5EFE963BBC/image-dimensions/922x67?v=v2" width="922" height="67" role="button" title="radumihai_4-1699622435583.png" alt="radumihai_4-1699622435583.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;Switch(config-if)#do show ip device tracking all&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;-------------------------------------------------------------&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;IP Address MAC Address Vlan Interface Probe-Timeout State Source&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;-------------------------------------------------------------&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;10.100.10.4 0050.0000.0f00 &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;2&lt;/STRONG&gt;&lt;/FONT&gt; GigabitEthernet0/3 30 ACTIVE ARP&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;If i configure just the dACL authorization (doesn't matter what kind of dACL is used), the ISE server sends &lt;EM&gt;RADIUS&amp;nbsp;&lt;/EM&gt;&lt;EM&gt;Access-Accept&lt;/EM&gt; for network access and dACL download but the switch sends&amp;nbsp;&lt;EM&gt;EAP-Failure&lt;/EM&gt; to the supplicant.&lt;/P&gt;&lt;P&gt;What could be the problem? I'm not sure if this behavior is caused by my configuration and there is something wrong with it or is caused by the the fact that the switch is virtual, inside EVE-NG, inside VMWare.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advanced,&lt;/P&gt;&lt;P&gt;Radu&lt;/P&gt;</description>
      <pubDate>Fri, 10 Nov 2023 13:43:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dacl-won-t-apply-to-the-port/m-p/4956955#M585112</guid>
      <dc:creator>radumihai</dc:creator>
      <dc:date>2023-11-10T13:43:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE dACL won't apply to the port</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dacl-won-t-apply-to-the-port/m-p/4957630#M585145</link>
      <description>&lt;P&gt;Sounds like a groovy lab setup you have there. As much as I love the idea of&amp;nbsp;&lt;SPAN&gt;vios_l2, I always find something about it that seems unreliable and incomplete. I wish Cisco did more updates on it. I suspect it's a race condition.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Have you tried to NOT switch the VLAN, and then see if the dACL is applied correctly?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;BTW, you can see the programming of the ACLs on the interface (how the combination of port ACL and dACL looks)&lt;/SPAN&gt;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;show platform software fed switch 1 acl interface | begin &amp;lt;MAC-address&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;Might not work on vios perhaps.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Nov 2023 22:35:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dacl-won-t-apply-to-the-port/m-p/4957630#M585145</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-11-12T22:35:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE dACL won't apply to the port</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dacl-won-t-apply-to-the-port/m-p/4957910#M585153</link>
      <description>&lt;P&gt;Hi Arne&lt;/P&gt;&lt;P&gt;Thanks for your input. I have tried not to switch the VLAN and just apply a dACL. Unfortunately, it doesn't work either. The ISE servers sends&amp;nbsp;&lt;EM&gt;Access Accept&lt;/EM&gt;, the switch sends a request for the dACL and it is also downloaded (according to ISE Live Logs and packet captures) but the switch sends back to the supplicant&amp;nbsp;&lt;EM&gt;EAP-Failure&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 08:27:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dacl-won-t-apply-to-the-port/m-p/4957910#M585153</guid>
      <dc:creator>radumihai</dc:creator>
      <dc:date>2023-11-13T08:27:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE dACL won't apply to the port</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dacl-won-t-apply-to-the-port/m-p/4958072#M585155</link>
      <description>&lt;P&gt;Do you have CoA configured on the switch?&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 09:49:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dacl-won-t-apply-to-the-port/m-p/4958072#M585155</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-11-13T09:49:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE dACL won't apply to the port</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dacl-won-t-apply-to-the-port/m-p/4958156#M585156</link>
      <description>&lt;P&gt;Hi Aref,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No, I didn't at the moment. By configuring CoA on the switch I managed to see some differences but overall it is not working.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Using CoA and a default dACL (permit ip any any) the supplicant obtains from the switch EAP-Success, it manages to get an IP from the DHCP server (acording to the VLAN assigned using the authorization profile) but any other traffic is not allowed through the port.&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;Switch(config-if)#do show authentication session int gi0/3 det&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Interface: GigabitEthernet0/3&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;MAC Address: 0050.0000.0f00&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;IPv6 Address: Unknown&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;IPv4 Address: 10.100.10.5&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;User-Name: ise.user1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Status: Unauthorized&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Domain: DATA&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Oper host mode: single-host&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Oper control dir: both&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Session timeout: N/A&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Common Session ID: 0A0000020000005A195797DE&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Acct Session ID: 0x00000034&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Handle: 0x4800003C&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Current Policy: POLICY_Gi0/3&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;Local Policies:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Security Policy: Should Secure&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Security Status: Link Unsecure&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;Method status list:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Method State&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;dot1x Authc Success&lt;/FONT&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Using CoA and a custom dACL the switchport sends&amp;nbsp;&lt;EM&gt;EAP Failure&lt;/EM&gt; even if the ISE server sent an accept.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just with a VLAN change configured, everything seems to work fine.&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;Switch(config-if)#do show authentication session int gi0/3 det&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Interface: GigabitEthernet0/3&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;MAC Address: 0050.0000.0f00&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;IPv6 Address: Unknown&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;IPv4 Address: 10.100.10.5&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;User-Name: ise.user1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Status: Authorized&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Domain: DATA&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Oper host mode: single-host&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Oper control dir: both&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Session timeout: N/A&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Common Session ID: 0A0000020000005819538DF2&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Acct Session ID: 0x00000033&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Handle: 0x0D00003A&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Current Policy: POLICY_Gi0/3&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;Local Policies:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Security Policy: Should Secure&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Security Status: Link Unsecure&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;Server Policies:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;Method status list:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;Method State&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;dot1x Authc Success&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 11:02:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dacl-won-t-apply-to-the-port/m-p/4958156#M585156</guid>
      <dc:creator>radumihai</dc:creator>
      <dc:date>2023-11-13T11:02:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE dACL won't apply to the port</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dacl-won-t-apply-to-the-port/m-p/4958166#M585157</link>
      <description>&lt;P&gt;I can't see the dACL reference on the output you shared. Did you enable CoA on the swtich properties in ISE?&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 11:27:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dacl-won-t-apply-to-the-port/m-p/4958166#M585157</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-11-13T11:27:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE dACL won't apply to the port</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dacl-won-t-apply-to-the-port/m-p/4958212#M585159</link>
      <description>&lt;P&gt;How do i enable CoA for the switch in ISE?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have configured the following on the switch in CLI and in ISE i have the device profile configured as&amp;nbsp;&lt;EM&gt;Cisco&lt;/EM&gt; and under RADIUS Authentication Settings is the&amp;nbsp;CoA port configured for 1700&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;aaa server radius dynamic-author&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;&amp;nbsp; client 192.168.183.51 server-key radiuskey&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 13:11:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dacl-won-t-apply-to-the-port/m-p/4958212#M585159</guid>
      <dc:creator>radumihai</dc:creator>
      <dc:date>2023-11-13T13:11:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE dACL won't apply to the port</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dacl-won-t-apply-to-the-port/m-p/4958243#M585160</link>
      <description>&lt;P&gt;It is part of the RADIUS settings in Network Devices in ISE, if you see CoA port 1700 next to the CoA port then that should be enough.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 14:01:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dacl-won-t-apply-to-the-port/m-p/4958243#M585160</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-11-13T14:01:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE dACL won't apply to the port</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dacl-won-t-apply-to-the-port/m-p/4958555#M585167</link>
      <description>&lt;P&gt;The sticking point seems to be the dACL. So let's return to &lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_self"&gt;our trusted reference guide&lt;/A&gt;, and I would suggest adding the following in this order:&lt;/P&gt;
&lt;P&gt;1. Try adding this global command from the Deployment Guide (point 25.) - it wasn't 100% clear to me from the description what it does, but it might help&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;access-session acl default passthrough&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. If that alone doesn't fix it, then try the Low Impact Mode by defining a pre-auth ACL and assigning it to your interface.&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;ip access-list extended IPV4_PRE_AUTH_ACL
  permit udp any eq bootpc any eq bootps
  permit udp any any eq domain
  deny ip any any
!
interface gigabitEthernet 0/3
ip access-group IPV4_PRE_AUTH_ACL in
&lt;/LI-CODE&gt;
&lt;P&gt;Test the auth and&amp;nbsp;monitor the cumulative effect with the show command&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;show ip access-list interface gig0/3&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 22:57:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dacl-won-t-apply-to-the-port/m-p/4958555#M585167</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-11-13T22:57:49Z</dc:date>
    </item>
  </channel>
</rss>

