<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Switch No Longer Honors DACL in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168822#M591582</link>
    <description>&lt;P&gt;There was just not for ciscoSystems.&amp;nbsp; It had Microsoft(311)&lt;/P&gt;</description>
    <pubDate>Sat, 31 Aug 2024 21:17:44 GMT</pubDate>
    <dc:creator>ryanbess</dc:creator>
    <dc:date>2024-08-31T21:17:44Z</dc:date>
    <item>
      <title>Switch No Longer Honors DACL</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168309#M591552</link>
      <description>&lt;P&gt;HI all,&lt;/P&gt;&lt;P&gt;I have a cisco switch that no longer gets DACL's from ISE.&amp;nbsp; I've tested radius connectivity and all is fine.&amp;nbsp; When doing a pcap off the PSN i see the name of the DACL called "BLAH" (makes it easy to search for in PCAPS) but i never see the PSN sending the appropriate AV pairs.&amp;nbsp; I've tried removing the switch from ISE and adding it back.&amp;nbsp; The device profile is set to Cisco.&amp;nbsp; Been following&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-blogs/how-the-downloadable-acl-is-pushed-by-cisco-ise-to-the-switch/ba-p/4461339" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-blogs/how-the-downloadable-acl-is-pushed-by-cisco-ise-to-the-switch/ba-p/4461339&lt;/A&gt;&amp;nbsp;to help me understand more but I'm at a loss to what config in ISE is wrong.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help is appreciated.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ryanbess_0-1725039601479.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/227360i5C1D1DA52E4B28CC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ryanbess_0-1725039601479.png" alt="ryanbess_0-1725039601479.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2024 17:43:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168309#M591552</guid>
      <dc:creator>ryanbess</dc:creator>
      <dc:date>2024-08-30T17:43:23Z</dc:date>
    </item>
    <item>
      <title>Re: Switch No Longer Honors DACL</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168310#M591553</link>
      <description>&lt;P&gt;Hi friend&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can I see&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Show authentication session interface x/x detail&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Show ip access-list&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Share both&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also what is SW platform you have ?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2024 17:51:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168310#M591553</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-30T17:51:20Z</dc:date>
    </item>
    <item>
      <title>Re: Switch No Longer Honors DACL</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168317#M591554</link>
      <description>&lt;P&gt;Here you go and thanks.&amp;nbsp; This used to work so trying to learn what i broke.&amp;nbsp;&lt;/P&gt;&lt;P&gt;physical#&lt;BR /&gt;&lt;STRONG&gt;physical#show version&lt;/STRONG&gt;&lt;BR /&gt;Cisco IOS Software, C3560CX Software (C3560CX-UNIVERSALK9-M), Version 15.2(4)E9, RELEASE SOFTWARE (fc2)&lt;BR /&gt;Technical Support: &lt;A href="http://www.cisco.com/techsupport" target="_blank"&gt;http://www.cisco.com/techsupport&lt;/A&gt;&lt;BR /&gt;Copyright (c) 1986-2019 by Cisco Systems, Inc.&lt;BR /&gt;Compiled Mon 23-Sep-19 09:53 by prod_rel_team&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;physical#show auth ses int gi0/4 det&lt;/STRONG&gt;&lt;BR /&gt;Interface: GigabitEthernet0/4&lt;BR /&gt;MAC Address: 5000.0004.0000&lt;BR /&gt;IPv6 Address: Unknown&lt;BR /&gt;IPv4 Address: 172.16.253.10&lt;BR /&gt;User-Name: host/Sub-Win11-01.sub.lab.com&lt;BR /&gt;Status: Authorized&lt;BR /&gt;Domain: DATA&lt;BR /&gt;Oper host mode: multi-auth&lt;BR /&gt;Oper control dir: both&lt;BR /&gt;Session timeout: N/A&lt;BR /&gt;Restart timeout: N/A&lt;BR /&gt;Periodic Acct timeout: 300s (local), Remaining: 181s&lt;BR /&gt;Common Session ID: AC10FD030000003301376F54&lt;BR /&gt;Acct Session ID: 0x00000028&lt;BR /&gt;Handle: 0x93000017&lt;BR /&gt;Current Policy: POLICY_Gi0/4&lt;/P&gt;&lt;P&gt;Local Policies:&lt;BR /&gt;Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)&lt;BR /&gt;Security Policy: Should Secure&lt;BR /&gt;Security Status: Link Unsecure&lt;/P&gt;&lt;P&gt;Server Policies:&lt;/P&gt;&lt;P&gt;Method status list:&lt;BR /&gt;Method State&lt;/P&gt;&lt;P&gt;dot1x Authc Success&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;physical#sho ip access-lists&lt;/STRONG&gt;&lt;BR /&gt;Extended IP access list ACL-ALLOW&lt;BR /&gt;10 permit ip any any&lt;BR /&gt;Extended IP access list ACL-DEFAULT&lt;BR /&gt;10 permit udp any eq bootpc any eq bootps&lt;BR /&gt;20 permit udp any any eq domain&lt;BR /&gt;30 permit icmp any any&lt;BR /&gt;40 permit udp any any eq tftp&lt;BR /&gt;50 deny ip any any log&lt;BR /&gt;Extended IP access list ACL-WEBAUTH-REDIRECT&lt;BR /&gt;10 deny udp any any eq domain&lt;BR /&gt;20 permit tcp any any eq www&lt;BR /&gt;30 permit tcp any any eq 443&lt;BR /&gt;Extended IP access list POSTURE-REDIRECT&lt;BR /&gt;10 deny udp any any eq domain bootps&lt;BR /&gt;20 permit tcp any any eq www&lt;BR /&gt;Extended IP access list POSTURE-REDIRECT-ACL&lt;BR /&gt;10 deny udp any any eq bootps&lt;BR /&gt;20 deny udp any any eq bootpc&lt;BR /&gt;30 deny udp any any eq domain&lt;BR /&gt;40 deny tcp any host 172.16.255.102&lt;BR /&gt;50 deny tcp any host 172.16.255.104&lt;BR /&gt;60 permit tcp any any eq www&lt;BR /&gt;Extended IP access list POSTURE-REDIRECTION-ACL&lt;BR /&gt;10 permit ip any any&lt;BR /&gt;Role-based IP access list Permit IP-00 (downloaded)&lt;BR /&gt;10 permit ip&lt;BR /&gt;Role-based IP access list Permit_IP_Log-00 (downloaded)&lt;BR /&gt;10 permit ip log (4 matches)&lt;BR /&gt;Extended IP access list RYAN&lt;BR /&gt;10 deny udp any any eq bootps&lt;BR /&gt;20 deny udp any any eq bootpc&lt;BR /&gt;30 deny udp any any eq domain&lt;BR /&gt;40 deny tcp any host 172.16.255.102 eq 8443&lt;BR /&gt;50 deny tcp any host 172.16.255.104 eq 8443&lt;BR /&gt;60 permit tcp any any eq www&lt;BR /&gt;70 deny tcp any any eq 445&lt;BR /&gt;80 deny udp any host 172.16.255.102 eq 8443&lt;BR /&gt;90 deny udp any host 172.16.255.104 eq 8443&lt;BR /&gt;100 permit ip any any&lt;BR /&gt;Extended IP access list preauth_ipv4_acl (per-user)&lt;BR /&gt;10 permit udp any any eq domain&lt;BR /&gt;20 permit tcp any any eq domain&lt;BR /&gt;30 permit udp any eq bootps any&lt;BR /&gt;40 permit udp any any eq bootpc&lt;BR /&gt;50 permit udp any eq bootpc any&lt;BR /&gt;60 deny ip any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2024 18:07:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168317#M591554</guid>
      <dc:creator>ryanbess</dc:creator>
      <dc:date>2024-08-30T18:07:17Z</dc:date>
    </item>
    <item>
      <title>Re: Switch No Longer Honors DACL</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168321#M591555</link>
      <description>&lt;P&gt;The port is authz' did yoh config any pre-auth acl?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2024 18:12:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168321#M591555</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-30T18:12:22Z</dc:date>
    </item>
    <item>
      <title>Re: Switch No Longer Honors DACL</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168322#M591556</link>
      <description>&lt;P&gt;no preauth ACL&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2024 18:13:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168322#M591556</guid>
      <dc:creator>ryanbess</dc:creator>
      <dc:date>2024-08-30T18:13:52Z</dc:date>
    </item>
    <item>
      <title>Re: Switch No Longer Honors DACL</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168371#M591557</link>
      <description>&lt;P&gt;The davl is send by ISE as attribute.&lt;/P&gt;
&lt;P&gt;Did you config aaa authz network....?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2024 18:39:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168371#M591557</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-30T18:39:30Z</dc:date>
    </item>
    <item>
      <title>Re: Switch No Longer Honors DACL</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168384#M591559</link>
      <description>&lt;P&gt;yes and in ISE we see the DACL being mentioned.&amp;nbsp; I realize its not the same session but we can see it.&amp;nbsp; What i'm learning is i NEVER see the switch asking for the configs of the DACL...as to why, got me.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ryanbess_0-1725046403385.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/227405iEABF207ECAF2C974/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ryanbess_0-1725046403385.png" alt="ryanbess_0-1725046403385.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2024 19:35:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168384#M591559</guid>
      <dc:creator>ryanbess</dc:creator>
      <dc:date>2024-08-30T19:35:54Z</dc:date>
    </item>
    <item>
      <title>Re: Switch No Longer Honors DACL</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168426#M591563</link>
      <description>&lt;P&gt;The SW not send ask for dacl in separate packet&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The dacl is send from ISE to SW with access-accept (see type in wireshark ypu share)&lt;/P&gt;
&lt;P&gt;Now SW receive dacl but not use it.&lt;/P&gt;
&lt;P&gt;Change host mode from multi-auth into single-host&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2024 21:30:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168426#M591563</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-30T21:30:30Z</dc:date>
    </item>
    <item>
      <title>Re: Switch No Longer Honors DACL</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168523#M591565</link>
      <description>&lt;P&gt;Morning.&amp;nbsp; I have another port on same switch that is in single-host....same behavior.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;physical#show auth ses int gi0/3 det&lt;BR /&gt;Interface: GigabitEthernet0/3&lt;BR /&gt;MAC Address: 5000.0008.0000&lt;BR /&gt;IPv6 Address: Unknown&lt;BR /&gt;IPv4 Address: 172.16.253.5&lt;BR /&gt;User-Name: host/Sub-Win11P-01.sub.lab.com&lt;BR /&gt;Status: Authorized&lt;BR /&gt;Domain: DATA&lt;BR /&gt;Oper host mode: single-host&lt;BR /&gt;Oper control dir: both&lt;BR /&gt;Session timeout: N/A&lt;BR /&gt;Restart timeout: N/A&lt;BR /&gt;Periodic Acct timeout: 300s (local), Remaining: 246s&lt;BR /&gt;Common Session ID: AC10FD030000000E0001531B&lt;BR /&gt;Acct Session ID: 0x00000005&lt;BR /&gt;Handle: 0x26000001&lt;BR /&gt;Current Policy: POLICY_Gi0/3&lt;/P&gt;&lt;P&gt;Local Policies:&lt;BR /&gt;Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)&lt;BR /&gt;Security Policy: Should Secure&lt;BR /&gt;Security Status: Link Unsecure&lt;/P&gt;&lt;P&gt;Server Policies:&lt;/P&gt;&lt;P&gt;Method status list:&lt;BR /&gt;Method State&lt;/P&gt;&lt;P&gt;dot1x Authc Success&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2024 10:19:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168523#M591565</guid>
      <dc:creator>ryanbess</dc:creator>
      <dc:date>2024-08-31T10:19:53Z</dc:date>
    </item>
    <item>
      <title>Re: Switch No Longer Honors DACL</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168553#M591566</link>
      <description>&lt;P&gt;In wireshark AVP (26) is missing&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are you sure you add ACL in&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Downloadable ACL list &amp;lt;&amp;lt;- in ISE?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2024 12:15:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168553#M591566</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-31T12:15:03Z</dc:date>
    </item>
    <item>
      <title>Re: Switch No Longer Honors DACL</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168570#M591567</link>
      <description>&lt;P&gt;yup its in there...it's the oddest thing.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2024 13:44:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168570#M591567</guid>
      <dc:creator>ryanbess</dc:creator>
      <dc:date>2024-08-31T13:44:04Z</dc:date>
    </item>
    <item>
      <title>Re: Switch No Longer Honors DACL</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168580#M591568</link>
      <description>&lt;P&gt;In pcaps (wiresharke) do you see avp 26 and when you open it (avp 26) you see permit/deny lines?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2024 14:01:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168580#M591568</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-31T14:01:18Z</dc:date>
    </item>
    <item>
      <title>Re: Switch No Longer Honors DACL</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168590#M591569</link>
      <description>&lt;P&gt;Nope i don't.&amp;nbsp; I've searched for them as well.&amp;nbsp; Here's the switch config.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;physical#show running-config&lt;BR /&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 6353 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 14:54:38 UTC Fri Aug 30 2024 by ryan&lt;BR /&gt;!&lt;BR /&gt;version 15.2&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;no service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname physical&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;logging buffered 512000&lt;BR /&gt;enable password password&lt;BR /&gt;!&lt;BR /&gt;username ryan privilege 15 password 0 password&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius ise-group&lt;BR /&gt;server name ise-102&lt;BR /&gt;server name ise-104&lt;BR /&gt;ip radius source-interface Vlan1&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login console local&lt;BR /&gt;aaa authentication login vty local&lt;BR /&gt;aaa authentication enable default enable&lt;BR /&gt;aaa authentication dot1x default group ise-group&lt;BR /&gt;aaa authorization exec default local&lt;BR /&gt;aaa authorization exec vty local&lt;BR /&gt;aaa authorization network CTSLIST group ise-group&lt;BR /&gt;aaa authorization auth-proxy default group ise-group&lt;BR /&gt;aaa accounting update periodic 5&lt;BR /&gt;aaa accounting auth-proxy default start-stop group ise-group&lt;BR /&gt;aaa accounting dot1x default start-stop group ise-group&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa server radius dynamic-author&lt;BR /&gt;client 172.16.255.104 server-key Iseradius&lt;BR /&gt;client 172.16.255.102 server-key Iseradius&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;system mtu routing 1500&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip domain-lookup&lt;BR /&gt;ip domain-name sub.lab.com&lt;BR /&gt;ip name-server 172.16.255.240&lt;BR /&gt;ip device tracking probe auto-source&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;cts server test all idle-time 1&lt;BR /&gt;cts server test all deadtime 5&lt;BR /&gt;cts authorization list CTSLIST&lt;BR /&gt;cts role-based enforcement&lt;BR /&gt;cts role-based enforcement vlan-list 1-4094&lt;BR /&gt;dot1x system-auth-control&lt;BR /&gt;!&lt;BR /&gt;spanning-tree mode rapid-pvst&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;vlan internal allocation policy ascending&lt;BR /&gt;!&lt;BR /&gt;lldp run&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description Win11-1&lt;BR /&gt;switchport mode access&lt;BR /&gt;authentication event fail action next-method&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;authentication violation replace&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 3&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;spanning-tree bpduguard enable&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;description Win11-2&lt;BR /&gt;switchport mode access&lt;BR /&gt;authentication event fail action next-method&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;authentication violation replace&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 10&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;spanning-tree bpduguard enable&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;switchport mode access&lt;BR /&gt;authentication event fail action next-method&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;authentication violation replace&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 3&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;spanning-tree bpduguard enable&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;switchport mode access&lt;BR /&gt;authentication event fail action next-method&lt;BR /&gt;authentication host-mode multi-auth&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 3&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;spanning-tree bpduguard enable&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/8&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/9&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/10&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/11&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/12&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/13&lt;BR /&gt;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/14&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/15&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/16&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;ip address 172.16.253.3 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 172.16.253.1&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;!&lt;BR /&gt;ip http server&lt;BR /&gt;ip http secure-server&lt;BR /&gt;ip http secure-active-session-modules none&lt;BR /&gt;ip http active-session-modules none&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 172.16.253.1&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;ip ssh server algorithm encryption aes128-ctr aes192-ctr aes256-ctr&lt;BR /&gt;ip ssh client algorithm encryption aes128-ctr aes192-ctr aes256-ctr&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended ACL-ALLOW&lt;BR /&gt;permit ip any any&lt;BR /&gt;ip access-list extended ACL-DEFAULT&lt;BR /&gt;remark DHCP&lt;BR /&gt;permit udp any eq bootpc any eq bootps&lt;BR /&gt;remark DNS&lt;BR /&gt;permit udp any any eq domai&lt;BR /&gt;remark Ping&lt;BR /&gt;permit icmp any any&lt;BR /&gt;remark PXE / tftp&lt;BR /&gt;permit udp any any eq tftp&lt;BR /&gt;remark Drop all the rest&lt;BR /&gt;deny ip any any log&lt;BR /&gt;remark Drop all the rest&lt;BR /&gt;ip access-list extended ACL-WEBAUTH-REDIRECT&lt;BR /&gt;remark explicitly deny DNS from being redirected to address a bug&lt;BR /&gt;deny udp any any eq domain&lt;BR /&gt;remark redirect all applicable traffic to the ISE server&lt;BR /&gt;permit tcp any any eq www&lt;BR /&gt;permit tcp any any eq 443&lt;BR /&gt;ip access-list extended POSTURE-REDIRECT&lt;BR /&gt;deny udp any any eq domain bootps&lt;BR /&gt;permit tcp any any eq www&lt;BR /&gt;ip access-list extended POSTURE-REDIRECT-ACL&lt;BR /&gt;deny udp any any eq bootps&lt;BR /&gt;deny udp any any eq bootpc&lt;BR /&gt;deny udp any any eq domain&lt;BR /&gt;deny tcp any host 172.16.255.102&lt;BR /&gt;deny tcp any host 172.16.255.104&lt;BR /&gt;permit tcp any any eq www&lt;BR /&gt;ip access-list extended POSTURE-REDIRECTION-ACL&lt;BR /&gt;permit ip any any&lt;BR /&gt;ip access-list extended RYAN&lt;BR /&gt;deny udp any any eq bootps&lt;BR /&gt;deny udp any any eq bootpc&lt;BR /&gt;deny udp any any eq domain&lt;BR /&gt;deny tcp any host 172.16.255.102 eq 8443&lt;BR /&gt;deny tcp any host 172.16.255.104 eq 8443&lt;BR /&gt;permit tcp any any eq www&lt;BR /&gt;deny tcp any any eq 445&lt;BR /&gt;deny udp any host 172.16.255.102 eq 8443&lt;BR /&gt;deny udp any host 172.16.255.104 eq 8443&lt;BR /&gt;permit ip any any&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip radius source-interface Vlan1&lt;BR /&gt;!&lt;BR /&gt;snmp-server trap-source Vlan1&lt;BR /&gt;snmp-server source-interface informs Vlan1&lt;BR /&gt;!&lt;BR /&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 6 support-multiple&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;radius-server attribute 31 mac format ietf upper-case&lt;BR /&gt;radius-server attribute 31 send nas-port-detail&lt;BR /&gt;radius-server dead-criteria tries 3&lt;BR /&gt;radius-server deadtime 3&lt;BR /&gt;!&lt;BR /&gt;radius server ise-104&lt;BR /&gt;address ipv4 172.16.255.104 auth-port 1812 acct-port 1813&lt;BR /&gt;pac key Iseradius&lt;BR /&gt;!&lt;BR /&gt;radius server ise-102&lt;BR /&gt;address ipv4 172.16.255.102 auth-port 1812 acct-port 1813&lt;BR /&gt;pac key Iseradius&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;logging synchronous&lt;BR /&gt;line vty 0 4&lt;BR /&gt;exec-timeout 240 0&lt;BR /&gt;transport input ssh&lt;BR /&gt;line vty 5 15&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2024 14:17:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168590#M591569</guid>
      <dc:creator>ryanbess</dc:creator>
      <dc:date>2024-08-31T14:17:27Z</dc:date>
    </item>
    <item>
      <title>Re: Switch No Longer Honors DACL</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168598#M591570</link>
      <description>&lt;P&gt;So the ISE send only name without AVP 26 (permit/deny line)&lt;/P&gt;
&lt;P&gt;I guess issue in ISE then'&lt;/P&gt;
&lt;P&gt;Make new ACL called it permit and add only one line permit ip any any lastly use ACL permit in authz policy (this step must be after you add new ACL not before it)&lt;/P&gt;
&lt;P&gt;And then checking again&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2024 14:31:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168598#M591570</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-31T14:31:51Z</dc:date>
    </item>
    <item>
      <title>Re: Switch No Longer Honors DACL</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168604#M591571</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1588027"&gt;@ryanbess&lt;/a&gt; the switch is not requesting to download the DACL from ISE because authorisation configuration is missing for the default method list (same method list you use for dot1x authentication). Your authorisation method list "CTSLIST" is related to trustsec.&lt;/P&gt;
&lt;P&gt;Configure authorisation for the default method list:-&lt;/P&gt;
&lt;PRE&gt;aaa authorization network default group ise-group&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2024 14:45:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168604#M591571</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-08-31T14:45:42Z</dc:date>
    </item>
    <item>
      <title>Re: Switch No Longer Honors DACL</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168610#M591572</link>
      <description>&lt;P&gt;you the man!&amp;nbsp; that fixed it.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I guess i now need to make a list for&amp;nbsp;&lt;SPAN&gt;cts authorization list CTSLIST...not sure how the switch would know what ips are in this list (still learning)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2024 15:09:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168610#M591572</guid>
      <dc:creator>ryanbess</dc:creator>
      <dc:date>2024-08-31T15:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: Switch No Longer Honors DACL</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168639#M591573</link>
      <description>&lt;P&gt;Rob, what am i missing.&amp;nbsp; In the link &lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/trustsec/configuration/guide/trustsec/command_sum.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/switches/lan/trustsec/configuration/guide/trustsec/command_sum.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;it says to do as i previously had.&amp;nbsp; .&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3&gt;Usage Guidelines&lt;/H3&gt;&lt;P class=""&gt;This command is only for the seed device. Non-seed devices obtain the TrustSec AAA server list from their TrustSec authenticator peer as a component of their TrustSec environment data.&lt;/P&gt;&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;&lt;H3&gt;Examples&lt;/H3&gt;&lt;P class=""&gt;The following example displays an AAA configuration of a TrustSec seed device:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Switch#&amp;nbsp;&lt;STRONG&gt;cts credentials id Switch1 password Cisco123&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;SPAN&gt;Switch#&amp;nbsp;&lt;STRONG&gt;configure terminal&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;SPAN&gt;Switch(config)#&amp;nbsp;&lt;STRONG&gt;aaa new-model&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;SPAN&gt;Switch(config)#&amp;nbsp;&lt;STRONG&gt;aaa authentication dot1x default group radius&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;SPAN&gt;Switch(config)#&amp;nbsp;&lt;STRONG&gt;aaa authorization network MLIST group radius&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;SPAN&gt;Switch(config)#&amp;nbsp;&lt;STRONG&gt;cts authorization list MLIST&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;SPAN&gt;Switch(config)#&amp;nbsp;&lt;STRONG&gt;aaa accounting dot1x default start-stop group radius&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;SPAN&gt;Switch(config)#&amp;nbsp;&lt;STRONG&gt;radius-server host 10.20.3.1 auth-port 1812 acct-port 1813 pac key AbCe1234&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;SPAN&gt;Switch(config)#&amp;nbsp;&lt;STRONG&gt;radius-server vsa send authentication&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;SPAN&gt;Switch(config)#&amp;nbsp;&lt;STRONG&gt;dot1x system-auth-control&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;SPAN&gt;Switch(config)#&amp;nbsp;&lt;STRONG&gt;exit&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2024 17:23:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168639#M591573</guid>
      <dc:creator>ryanbess</dc:creator>
      <dc:date>2024-08-31T17:23:40Z</dc:date>
    </item>
    <item>
      <title>Re: Switch No Longer Honors DACL</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168645#M591574</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1588027"&gt;@ryanbess&lt;/a&gt; can you confirm what is the problem in regard to the trustsec specific configuration? Or is this still a problem with DACLs?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2024 17:30:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168645#M591574</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-08-31T17:30:33Z</dc:date>
    </item>
    <item>
      <title>Re: Switch No Longer Honors DACL</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168718#M591575</link>
      <description>&lt;P&gt;When i put it back to&amp;nbsp;aaa authorization network &lt;STRONG&gt;default&lt;/STRONG&gt; group ise-group, now CTS stuff doesn't work.&amp;nbsp; For example i can't download new environmental data.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2024 18:21:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168718#M591575</guid>
      <dc:creator>ryanbess</dc:creator>
      <dc:date>2024-08-31T18:21:29Z</dc:date>
    </item>
    <item>
      <title>Re: Switch No Longer Honors DACL</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168732#M591576</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1588027"&gt;@ryanbess&lt;/a&gt; you need both method lists, the CTSMLIST must be then referenced with the &lt;STRONG&gt;cts authorization list CTSMLIST&lt;/STRONG&gt; command. If you still have a problem, provide your updated configuration.&lt;/P&gt;
&lt;P&gt;FYI, it's not recommended nor necessary to use DACLs if you are using TrustSec SGT at the sametime..&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2024 18:36:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-no-longer-honors-dacl/m-p/5168732#M591576</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-08-31T18:36:51Z</dc:date>
    </item>
  </channel>
</rss>

