<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE DACL bi-directional setting in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-dacl-bi-directional-setting/m-p/4993639#M586212</link>
    <description>&lt;P&gt;Maybe the better question would be to ask how everybody handles onboarding new computers to the network?&amp;nbsp; Our method was to have ISE push a default dACL policy to allow minimal access to systems (dns, active directory, cert enrollment, PDQ) .. then once the device would pass posture, ISE would change the dACL to allow for full access.&lt;/P&gt;&lt;P&gt;Default dACL:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;remark PDQ&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;permit tcp any host 172.30.8.106 eq 445&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;permit tcp any eq 445 host 172.30.8.106&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;remark DHCP&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;permit udp any any eq 68&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;remark DNS&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;permit udp any any eq 53&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;permit tcp any any eq 53&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;remark RFC1918&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;deny ip any 172.16.0.0 0.0.240.255&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;deny ip any 192.168.0.0 0.0.255.255&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;deny ip any 10.0.0.0 0.0.0.255&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;remark Internet&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;permit tcp any any eq 80&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;permit tcp any any eq 443&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 10 Jan 2024 13:08:39 GMT</pubDate>
    <dc:creator>Chris S</dc:creator>
    <dc:date>2024-01-10T13:08:39Z</dc:date>
    <item>
      <title>ISE DACL bi-directional setting</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-bi-directional-setting/m-p/4990854#M586111</link>
      <description>&lt;P&gt;I have a DACL being applied allowing 445 access to an internal resource.&amp;nbsp; Is there a way to allow the internal resource reverse access so it can access the restricted device on 445 as well?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2024 21:31:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-bi-directional-setting/m-p/4990854#M586111</guid>
      <dc:creator>Chris S</dc:creator>
      <dc:date>2024-01-05T21:31:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISE DACL bi-directional setting</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-bi-directional-setting/m-p/4990863#M586114</link>
      <description>&lt;P&gt;If I understand you correctly, we do that all of the time. Example (assuming TCP/455):&lt;BR /&gt;&lt;BR /&gt;permit tcp any eq 455 any &amp;lt;--- inbound to port tcp/455 on the endpoint device)&lt;BR /&gt;permit tcp any any eq 455 ---&amp;gt; outbound from the endpoint device to anything on tcp/455.&amp;nbsp; This assumes firewalls in between allow access, of course).&lt;BR /&gt;&lt;BR /&gt;Plus, as you know you can replace "any' with "host A.B.C.D" or subnet/mask "A.B.D.C 255.255.255.0" (etc).&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2024 22:07:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-bi-directional-setting/m-p/4990863#M586114</guid>
      <dc:creator>davidgfriedman</dc:creator>
      <dc:date>2024-01-05T22:07:29Z</dc:date>
    </item>
    <item>
      <title>Re: ISE DACL bi-directional setting</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-bi-directional-setting/m-p/4991411#M586136</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/285637"&gt;@Chris S&lt;/a&gt;&amp;nbsp;Take a look at &lt;A href="https://www.cisco.com/c/en/us/support/docs/lan-switching/8021x/119374-technote-dacl-00.html" target="_self"&gt;Understand 802.1x DACL, Per-User ACL, Filter-ID, and Device Tracking Behavior&lt;/A&gt;&amp;nbsp;.&lt;/P&gt;
&lt;P&gt;DACLs are usually for the access clients only. The network access device will replace the source portion of each ACE with the access client's IP address. For another device to access this client, we would likely need to allow any ports higher than 1024 from the access client's IP.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2024 04:29:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-bi-directional-setting/m-p/4991411#M586136</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2024-01-08T04:29:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISE DACL bi-directional setting</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-bi-directional-setting/m-p/4991549#M586141</link>
      <description>&lt;P&gt;As I know the Per-User ACL use "IN" direction not "OUT"&lt;BR /&gt;and ip tracking resolve the IP of host and add it to dACL, i.e. permit ip any any will resolve by ip tracking to permit ip host x.x.x.x any&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;now you can change the dacl&amp;nbsp;&lt;BR /&gt;instead of permit ip any any&amp;nbsp;&lt;BR /&gt;use &lt;BR /&gt;deny ip any any eq 455&lt;BR /&gt;permit ip any any&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;try this way&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2024 07:26:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-bi-directional-setting/m-p/4991549#M586141</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-08T07:26:09Z</dc:date>
    </item>
    <item>
      <title>Re: ISE DACL bi-directional setting</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-bi-directional-setting/m-p/4993144#M586194</link>
      <description>&lt;P&gt;I have always found this topic confusing, especially because we use the terms "source" and "destination" as if it's meant to be obvious. But it's only obvious if you mention in the same sentence, from whose &lt;EM&gt;perspective&lt;/EM&gt; you're saying source/destination.&lt;/P&gt;
&lt;P&gt;My assumption was always this: an ACL exists on an interface to check/control/protect data from attached endpoints entering the network. In other words, we don't naturally consider what to check/control from the network &lt;EM&gt;towards&lt;/EM&gt; the endpoint.&lt;/P&gt;
&lt;P&gt;What&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/52811"&gt;@davidgfriedman&lt;/a&gt;&amp;nbsp;quite correctly stated earlier, I realised my confusion about the simple word &lt;EM&gt;inbound - &lt;/EM&gt;but, inbound from whose perspective?&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;permit tcp any eq 455 any &amp;lt;--- &lt;STRONG&gt;inbound to port&lt;/STRONG&gt; tcp/455 on the endpoint device)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Ok - the ACL syntax is&amp;nbsp; "source destination" - if I had to translate this into layman's terms I would read it as "accept data from the endpoint from any src addr where the TCP source port is 455, towards any destination address" - but in reality it's the other way around. It means "allow data TO the device on a service that is running on TCP/455".&amp;nbsp; &amp;nbsp;e.g. a Linux server in the data center wants to access an endpoint at TCP/455. Okaaaaaaay .but then why is the source port TCP/455? The TCP connection is established from the data center and the TCP destination port would be 455.&amp;nbsp; My brain starts to hurt and it shuts down.&lt;/P&gt;
&lt;P&gt;With some of the previous explanations it got a bit clearer. I even started having doubts that these ACE entries were perhaps stateful - but now I know they are not.&amp;nbsp;I decided to test things in the lab to sort out my doubts.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I used a C9300 switch that has a raspberry pi as the endpoint attached to Gig 1/0/22 - this interface is enabled for MAB and ISE authorized the session with a dACL. I built up the dACL in various stages to see what worked, and what didn't - e.g.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;from switch: ping the raspi&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;from switch: ssh to the raspi&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;from raspi: ping default gw&lt;/LI&gt;
&lt;LI&gt;from raspi: ssh to an Ubuntu server&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I put this into layman's terms to keep as a reference for myself&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_0-1704842189619.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/206821iDB886D573EE97713/image-size/large?v=v2&amp;amp;px=999" role="button" title="ArneBier_0-1704842189619.png" alt="ArneBier_0-1704842189619.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 23:57:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-bi-directional-setting/m-p/4993144#M586194</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-01-09T23:57:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE DACL bi-directional setting</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-bi-directional-setting/m-p/4993639#M586212</link>
      <description>&lt;P&gt;Maybe the better question would be to ask how everybody handles onboarding new computers to the network?&amp;nbsp; Our method was to have ISE push a default dACL policy to allow minimal access to systems (dns, active directory, cert enrollment, PDQ) .. then once the device would pass posture, ISE would change the dACL to allow for full access.&lt;/P&gt;&lt;P&gt;Default dACL:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;remark PDQ&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;permit tcp any host 172.30.8.106 eq 445&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;permit tcp any eq 445 host 172.30.8.106&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;remark DHCP&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;permit udp any any eq 68&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;remark DNS&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;permit udp any any eq 53&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;permit tcp any any eq 53&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;remark RFC1918&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;deny ip any 172.16.0.0 0.0.240.255&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;deny ip any 192.168.0.0 0.0.255.255&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;deny ip any 10.0.0.0 0.0.0.255&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;remark Internet&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;permit tcp any any eq 80&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;permit tcp any any eq 443&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 13:08:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-bi-directional-setting/m-p/4993639#M586212</guid>
      <dc:creator>Chris S</dc:creator>
      <dc:date>2024-01-10T13:08:39Z</dc:date>
    </item>
    <item>
      <title>Re: ISE DACL bi-directional setting</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-bi-directional-setting/m-p/4993919#M586234</link>
      <description>&lt;P&gt;TL;DR - It depends&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's good to get the ACL/dACL theory out of the way and well understood, and then the sky is the limit, regarding what ACLs to apply to endpoints in various stages of authorization/posture. TCP/445 might be useful for Microsoft workstations, but doesn't benefit other endpoints like cameras, printers, MacOS, etc. - the list goes on.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In practice, when a customer is in low-impact mode wired NAC, there should be a pre-auth ACL hard coded on the interface (access-group PRE_AUTH_ACL in) and this one takes care of controlling what the endpoint can do before ISE declares the session as Authorized (i.e. ISE has finished Authentication) - if ISE sends down a dACL to this session (which it should do as part of low-impact mode) then the pre-auth ACL gets bypassed, because dACL now rules the roost. This is where you apply your next level of ACLs to give the endpoint control of what it can do. Perhaps ISE authorized the endpoint as accurately as it can (e.g. 100% certainty or via 802.1X) or it failed through to the last Rule which is a general catch-all Rule - even this Rule should allow some minimum access to the endpoint to allow profiling (especially in the MAB case).&lt;/P&gt;
&lt;P&gt;In practice, I allow DHCP/DNS/TFTP (pretty much the image I posted earlier, but without the SSH ACEs)&lt;/P&gt;
&lt;P&gt;tftp was added to help the PXEBOOT process (it's used during the PXE process to fetch a config file). Perhaps PXEBOOT is used in your environment?&lt;/P&gt;
&lt;P&gt;My question to&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/285637"&gt;@Chris S&lt;/a&gt;&amp;nbsp;- what type of access does TCP/445 allow ? Does the endpoint then talk to the Domain Controller? Does that help for Machine Auth'd workstations to have some sort of basic SMB comms to the DC? I thought there was more than this required. And also, wouldn't that be a nice open door for hackers?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 20:34:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-bi-directional-setting/m-p/4993919#M586234</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-01-10T20:34:20Z</dc:date>
    </item>
    <item>
      <title>Re: ISE DACL bi-directional setting</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-bi-directional-setting/m-p/4993961#M586237</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;Our pre-auth ACL on the switch ports only allow DHCP/DNS/ISE access - past that nothing.&amp;nbsp; We decided to have a device group for all new workstations .. once ISE is aware of the device, it passes down a dACL that allows for the nessesary resources to setup the machine.&amp;nbsp; 445 allows for the baseline applications to install and update.&amp;nbsp; The 445 is specific to the file server hosting the installation media.&amp;nbsp; We don't use PXEBOOT for anything.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 21:13:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-bi-directional-setting/m-p/4993961#M586237</guid>
      <dc:creator>Chris S</dc:creator>
      <dc:date>2024-01-10T21:13:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE DACL bi-directional setting</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dacl-bi-directional-setting/m-p/4993963#M586238</link>
      <description>&lt;P&gt;friend the dACL is Port-ACL and it INBOUND only&amp;nbsp;&lt;BR /&gt;and the host connect to port always initiate the traffic not the server so you need only&amp;nbsp;&lt;BR /&gt;&lt;EM&gt;permit tcp any host 172.30.8.106 eq 445&lt;/EM&gt;&lt;BR /&gt;&lt;STRIKE&gt;&lt;EM&gt;permit tcp any eq 445 host 172.30.8.106&amp;nbsp;&amp;nbsp;&lt;/EM&gt;&lt;/STRIKE&gt;&lt;EM&gt;&amp;lt;- if the server port dont use 802.1x &lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;if server port use 802.1x then you need this line then you need &amp;lt;&lt;SPAN&gt;permit tcp &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;any&lt;/STRONG&gt;&lt;/FONT&gt; eq 445 &amp;lt;subnet of host &amp;gt;&amp;gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;which is rare since the server always have static IP.&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/EM&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 21:34:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dacl-bi-directional-setting/m-p/4993963#M586238</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-10T21:34:51Z</dc:date>
    </item>
  </channel>
</rss>

