<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic External Radius with dACL in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/external-radius-with-dacl/m-p/5349012#M599050</link>
    <description>&lt;P&gt;Hello Community,&lt;/P&gt;&lt;P&gt;I am trying to achive the following scenario:&lt;/P&gt;&lt;P&gt;RADIUS requests from "staging Client" should be forwarded to our LAB-ISE.&lt;/P&gt;&lt;P&gt;Sounds simple? Yes, and it works till the point the ACCESS-ACCEPT with a dACL is send back to the Authenticator and the Authenticator tries to download the dACL. At least I can say, the redirection of the request and the external authentication/authorization works fine.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The dACL remains problematic in this case. I already traced and tcpdump'd in that matter and tried to develop a conditions to match the ACCESS-REQUEST for the dACL download.&lt;/P&gt;&lt;P&gt;On a packet level I have the following fields to filter upon:&lt;/P&gt;&lt;P&gt;- Cisco AV-Pairs (aaa:service=ip_admission, val=aaa:event=acl-download)&lt;BR /&gt;- Message-Authenticator&lt;BR /&gt;- User-Name (with the dACL name in it)&lt;BR /&gt;- NAS-IP-Address&lt;/P&gt;&lt;P&gt;I tried my best to match the dACL name to initiate a redirect to the LAB-ISE, I would add something to identify the request by the name.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I already tried the Condition "Radius:User-Name" equals "#ACSACL#-IP-this_very_good_default-3938d9" (along with other operators) or "NetworkAccess:UserName" but that did not work. Redirecting by "NAS-IP-Address" also had no success.&lt;/P&gt;&lt;P&gt;Then I made an endpoint debug to spot any errors/misspellings and the debug output the fieldname sometimes was "UserName".&lt;/P&gt;&lt;P&gt;My customer wants to test their clients anywhere in our infrastructure without changing network devices and without simply trusting the test CA on our production env.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am very &lt;SPAN&gt;curious if someone already ran into the same problem and how it was solved. Do I have to escape something in the string to be able to match it or is it even possible?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Nov 2025 11:42:12 GMT</pubDate>
    <dc:creator>IlikeTrains</dc:creator>
    <dc:date>2025-11-21T11:42:12Z</dc:date>
    <item>
      <title>External Radius with dACL</title>
      <link>https://community.cisco.com/t5/network-access-control/external-radius-with-dacl/m-p/5349012#M599050</link>
      <description>&lt;P&gt;Hello Community,&lt;/P&gt;&lt;P&gt;I am trying to achive the following scenario:&lt;/P&gt;&lt;P&gt;RADIUS requests from "staging Client" should be forwarded to our LAB-ISE.&lt;/P&gt;&lt;P&gt;Sounds simple? Yes, and it works till the point the ACCESS-ACCEPT with a dACL is send back to the Authenticator and the Authenticator tries to download the dACL. At least I can say, the redirection of the request and the external authentication/authorization works fine.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The dACL remains problematic in this case. I already traced and tcpdump'd in that matter and tried to develop a conditions to match the ACCESS-REQUEST for the dACL download.&lt;/P&gt;&lt;P&gt;On a packet level I have the following fields to filter upon:&lt;/P&gt;&lt;P&gt;- Cisco AV-Pairs (aaa:service=ip_admission, val=aaa:event=acl-download)&lt;BR /&gt;- Message-Authenticator&lt;BR /&gt;- User-Name (with the dACL name in it)&lt;BR /&gt;- NAS-IP-Address&lt;/P&gt;&lt;P&gt;I tried my best to match the dACL name to initiate a redirect to the LAB-ISE, I would add something to identify the request by the name.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I already tried the Condition "Radius:User-Name" equals "#ACSACL#-IP-this_very_good_default-3938d9" (along with other operators) or "NetworkAccess:UserName" but that did not work. Redirecting by "NAS-IP-Address" also had no success.&lt;/P&gt;&lt;P&gt;Then I made an endpoint debug to spot any errors/misspellings and the debug output the fieldname sometimes was "UserName".&lt;/P&gt;&lt;P&gt;My customer wants to test their clients anywhere in our infrastructure without changing network devices and without simply trusting the test CA on our production env.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am very &lt;SPAN&gt;curious if someone already ran into the same problem and how it was solved. Do I have to escape something in the string to be able to match it or is it even possible?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Nov 2025 11:42:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/external-radius-with-dacl/m-p/5349012#M599050</guid>
      <dc:creator>IlikeTrains</dc:creator>
      <dc:date>2025-11-21T11:42:12Z</dc:date>
    </item>
    <item>
      <title>Re: External Radius with dACL</title>
      <link>https://community.cisco.com/t5/network-access-control/external-radius-with-dacl/m-p/5368944#M599763</link>
      <description>&lt;P&gt;I have asked TAC about this, and the answer was that these request can not be matched as they do not hit the policy set. The receiving PSN will yield the dACLs directly.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Feb 2026 07:03:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/external-radius-with-dacl/m-p/5368944#M599763</guid>
      <dc:creator>IlikeTrains</dc:creator>
      <dc:date>2026-02-10T07:03:02Z</dc:date>
    </item>
  </channel>
</rss>

