<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE dacl differnet than what switch is applying in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-dacl-differnet-than-what-switch-is-applying/m-p/4990221#M586079</link>
    <description>&lt;P&gt;That was it - the syntax was valid against the ISE checker with a standard subnet.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 04 Jan 2024 17:20:44 GMT</pubDate>
    <dc:creator>Chris S</dc:creator>
    <dc:date>2024-01-04T17:20:44Z</dc:date>
    <item>
      <title>ISE dacl differnet than what switch is applying</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-differnet-than-what-switch-is-applying/m-p/4989906#M586066</link>
      <description>&lt;P&gt;Deploying ISE and trying to finalize some restrictions.&amp;nbsp; It seems the DACL defined in ISE is not what the switch is applying to the port. Any ideas why the switch is changing the deny statements?&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;ISE 3.1 (patch &lt;span class="lia-unicode-emoji" title=":smiling_face_with_sunglasses:"&gt;😎&lt;/span&gt;&lt;/LI&gt;&lt;LI&gt;C1000-8FP-E-2G-L&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Here is what we have defined in ISE:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise_dacl.jpg" style="width: 373px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/206427i1926C0D5B9D08FF4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ise_dacl.jpg" alt="ise_dacl.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Here is what the switch is applying:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sw_dacl.jpg" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/206428i8948A4E7B23B69F8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="sw_dacl.jpg" alt="sw_dacl.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jan 2024 13:24:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-differnet-than-what-switch-is-applying/m-p/4989906#M586066</guid>
      <dc:creator>Chris S</dc:creator>
      <dc:date>2024-01-04T13:24:20Z</dc:date>
    </item>
    <item>
      <title>Re: ISE dacl differnet than what switch is applying</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-differnet-than-what-switch-is-applying/m-p/4989909#M586067</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/285637"&gt;@Chris S&lt;/a&gt; use the wildcard not the subnet mask when configuring the DACL.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RobIngram_0-1704378645343.png" style="width: 352px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/206446i5EC8A55C08004C30/image-dimensions/352x277?v=v2" width="352" height="277" role="button" title="RobIngram_0-1704378645343.png" alt="RobIngram_0-1704378645343.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Also you can use &lt;STRONG&gt;Check DACL Syntax&lt;/STRONG&gt; to confirm the syntax is correct.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jan 2024 14:31:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-differnet-than-what-switch-is-applying/m-p/4989909#M586067</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-04T14:31:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE dacl differnet than what switch is applying</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-differnet-than-what-switch-is-applying/m-p/4990221#M586079</link>
      <description>&lt;P&gt;That was it - the syntax was valid against the ISE checker with a standard subnet.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jan 2024 17:20:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-differnet-than-what-switch-is-applying/m-p/4990221#M586079</guid>
      <dc:creator>Chris S</dc:creator>
      <dc:date>2024-01-04T17:20:44Z</dc:date>
    </item>
    <item>
      <title>Re: ISE dacl differnet than what switch is applying</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-differnet-than-what-switch-is-applying/m-p/5247117#M594205</link>
      <description>&lt;P&gt;This is clear.&lt;/P&gt;
&lt;P&gt;Based on this documentation:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference-convert/A-H/cmdref1/a2.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference-convert/A-H/cmdref1/a2.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa910/configuration/firewall/asa-910-firewall-config/access-acls.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa910/configuration/firewall/asa-910-firewall-config/access-acls.html&lt;/A&gt;&lt;/P&gt;
&lt;H3 class="title sectiontitle"&gt;Additional Guidelines&lt;/H3&gt;
&lt;UL class="ul"&gt;
&lt;LI id="ID-2069-000000e9__li_659CCCDEBD824BE7ABC60A86DDEA73CA" class="li"&gt;
&lt;P class="p"&gt;When you specify a network mask, the method is different from the Cisco IOS software &lt;STRONG id="ID-2069-000000e9__ID-2069-000000fd" class="ph b"&gt;access-list&lt;/STRONG&gt; command. The ASA uses a network mask (for example, 255.255.255.0 for a Class C mask). The Cisco IOS mask uses wildcard bits (for example, 0.0.0.255).&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;So for switch/wlc you should write down dACL in ISE with wildcard on your mind, but what about ASA in this case ?&lt;/P&gt;
&lt;P&gt;So am I right if I said it has different result when I use the same dACL in one case for:&lt;/P&gt;
&lt;P&gt;- with switch/wlc&lt;/P&gt;
&lt;P&gt;and&lt;/P&gt;
&lt;P&gt;on another case for ASA/FTD ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example in case I need to allow comunication from any to X.Y.0.0/16.&lt;/P&gt;
&lt;P&gt;I should solve it like this:&lt;/P&gt;
&lt;P&gt;permit ip any X.Y.0.0 0.0.255.255 syntax for dacl used in authz prof for switch/wlc.&lt;/P&gt;
&lt;P&gt;but I should use different dACL syntax for ASA/FTD:&lt;/P&gt;
&lt;P&gt;permit ip any X.Y.0.0 255.255.0.0 syntax for dacl used in authz prof for asa/ftd.&lt;/P&gt;
&lt;P&gt;or&lt;/P&gt;
&lt;P&gt;I could use the same dACL for switch/wlc, but than I have to use acl-netmask-convert in AAA radius server group in ASA/FTD either with auto-detect or wildcard.&lt;/P&gt;
&lt;P&gt;I assume using dACL with wildcard syntax needed for switch/wlc in case with ASA breaks thinks with error something like this.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;ERROR: IP address,mask &amp;lt;X.Y.0.0,0.0.255.255&amp;gt; doesn't pair&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Am I right ?&lt;/P&gt;
&lt;SECTION&gt;
&lt;H2 class="pCRC_CmdRefCommand"&gt;acl-netmask-convert&lt;/H2&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1712777" target="_blank"&gt;&lt;/A&gt;To specify how the ASA treats netmasks received in a downloadable ACL from a RADIUS server that is accessed by using the &lt;STRONG class="cCN_CmdName"&gt; aaa-server host &lt;/STRONG&gt; command, use the acl-netmask-convert command in aaa-server host configuration mode. To remove the specified behavior for the ASA, use the &lt;STRONG class="cCN_CmdName"&gt; no&lt;/STRONG&gt; form of this command.&lt;/P&gt;
&lt;P class="pCENB_CmdEnv_NoBold"&gt;&lt;A name="pgfId-1712784" target="_blank"&gt;&lt;/A&gt;&lt;STRONG class="cCN_CmdName"&gt; acl-netmask-convert&lt;/STRONG&gt; {&lt;STRONG class="cCN_CmdName"&gt; auto-detect&lt;/STRONG&gt; | &lt;STRONG class="cCN_CmdName"&gt; standard&lt;/STRONG&gt; | &lt;STRONG class="cCN_CmdName"&gt; wildcard&lt;/STRONG&gt; }&lt;/P&gt;
&lt;P class="pCENB_CmdEnv_NoBold"&gt;&lt;A name="pgfId-1712785" target="_blank"&gt;&lt;/A&gt;&lt;STRONG class="cBold"&gt; no acl-netmask-convert&lt;/STRONG&gt;&lt;/P&gt;
&lt;SECTION&gt;
&lt;H3 class="pCRSD_CmdRefSynDesc"&gt;Syntax Description&lt;/H3&gt;
&lt;SECTION&gt;
&lt;DIV class="tableContainer"&gt;
&lt;TABLE border="1" width="96%" cellspacing="0" cellpadding="3"&gt;
&lt;TBODY&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1712788" target="_blank"&gt;&lt;/A&gt;&lt;STRONG class="cCN_CmdName"&gt; auto-detect&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1712792" target="_blank"&gt;&lt;/A&gt;Specifies that the ASA should attempt to determine the type of netmask expression used. If the ASA detects a wildcard netmask expression, it converts it to a standard netmask expression. See “Usage Guidelines” for more information about this keyword.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1712795" target="_blank"&gt;&lt;/A&gt;standard&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1712799" target="_blank"&gt;&lt;/A&gt;Specifies that the ASA assumes downloadable ACLs received from the RADIUS server contain only standard netmask expressions. No translation from wildcard netmask expressions is performed.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1712802" target="_blank"&gt;&lt;/A&gt;wildcard&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1712806" target="_blank"&gt;&lt;/A&gt;Specifies that the ASA assumes downloadable ACLs received from the RADIUS server contain only wildcard netmask expressions and converts them all to standard netmask expressions when the ACLs are downloaded.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;/SECTION&gt;
&lt;/SECTION&gt;
&lt;SECTION&gt;
&lt;H3 class="pCRD_CmdRefDefaults"&gt;Defaults&lt;/H3&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1712810" target="_blank"&gt;&lt;/A&gt;By default, no conversion from wildcard netmask expressions is performed.&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1712872" target="_blank"&gt;&lt;/A&gt;Usage Guidelines&lt;/P&gt;
&lt;/SECTION&gt;
&lt;/SECTION&gt;
&lt;SECTION&gt;
&lt;SECTION&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1712874" target="_blank"&gt;&lt;/A&gt;Use the &lt;STRONG class="cBold"&gt; acl-netmask-convert&lt;/STRONG&gt; command with the wildcard or auto-detect keywords when a RADIUS server provides downloadable ACLs that contain netmasks in wildcard format. The ASA expects downloadable ACLs to contain standard netmask expressions whereas Cisco VPN 3000 series concentrators expect downloadable ACLs to contain wildcard netmask expressions, which are the reverse of a standard netmas expression. A wildcard mask has ones in bit positions to ignore, zeros in bit positions to match.The &lt;STRONG class="cBold"&gt; acl-netmask-convert&lt;/STRONG&gt; command helps minimize the effects of these differences upon how you configure downloadable ACLs on your RADIUS servers.&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1712878" target="_blank"&gt;&lt;/A&gt;The &lt;STRONG class="cBold"&gt; auto-detect&lt;/STRONG&gt; keyword is helpful when you are uncertain how the RADIUS server is configured; however, wildcard netmask expressions with “holes” in them cannot be unambiguously detected and converted. For example, the wildcard netmask 0.0.255.0 permits anything in the third octet and can be used validly on Cisco VPN 3000 series concentrators, but the ASA may not detect this expression as a wildcard netmask.&lt;/P&gt;
&lt;/SECTION&gt;
&lt;/SECTION&gt;</description>
      <pubDate>Tue, 14 Jan 2025 17:56:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-differnet-than-what-switch-is-applying/m-p/5247117#M594205</guid>
      <dc:creator>stayd</dc:creator>
      <dc:date>2025-01-14T17:56:17Z</dc:date>
    </item>
  </channel>
</rss>

