<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hello Gary,You might be aware in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517648#M90157</link>
    <description>&lt;P&gt;Hello Gary,&lt;/P&gt;&lt;P&gt;You might be aware that in CWA the client is authenticated twice. As per my understanding PACL is the ACL-Default you apply on port manually. When you do First authentication then this ACL will be dynamically replaced by DACL. So now this is the acl that govern what traffic can pass through that port. so in this you need to permit DHCP, DNS,port&amp;nbsp; 80,443 and traffic to ISE on port 8443.&lt;/P&gt;&lt;P&gt;Now when the traffic enters the switch Redirect ACL come in to picture. Here you need to permit only traffic that need to be redirected means port 80 and 443 traffic and you need to deny DHCP,DNS and traffic to ISE on port 8443 to get redirect.&lt;/P&gt;&lt;P&gt;So when the user try to access any web page,then first web browser needs to resolve domain name so it will issue a DNS query which dacl is allowing. then it hit redirect acl but it is denying that traffic to get redirected so client will resolve domain name. Now client try to send http traffic to the resolved ip address, http is allowed in DACL, then it hit redirect ACL which is permitting this http traffic to get redirected to ISE on port 8443. so client browser is redirected to new url.&lt;/P&gt;&lt;P&gt;Again DNS query for new url successful. client now send web traffic to ISE on port 8443 which is allowed in DACL, now hit redirect acl where it is denied to get redirected so client will be able to get Guest portal from ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;"Please mark the helpful posts"&lt;/P&gt;</description>
    <pubDate>Thu, 05 Jun 2014 06:02:25 GMT</pubDate>
    <dc:creator>Poonam Garg</dc:creator>
    <dc:date>2014-06-05T06:02:25Z</dc:date>
    <item>
      <title>Cisco ISE - CWA Redirect</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517647#M90155</link>
      <description>&lt;P&gt;Why are the ISE nodes needed to be defined in the web authentication redirect acl that is configured locally on the switch?&lt;/P&gt;&lt;P&gt;All the documentation that I've found states this. I've setup my 2yr old ISE environment this way and was advised in the beginning to do so. But after thinking the whole authentication process through and then testing out my theories I don't understand why the ISE nodes need to be defined in the switch redirect acl. I am now testing with a simple "redirect www &amp;amp; 443" acl and it is working as expected.&lt;/P&gt;&lt;P&gt;The client connects to the network and, for our environment, is requested to do dot1x until that times out and then it shifts to mab. At which point, I do not have an authz rule defined for my test machine and therefore matches my catch-all authz rule of CWA which sends a CWA DACL. The switch lays the acls on the interface in this order: 1. Redirect 2. DACL 3. PACL. In my DACL I have access to the ISE nodes allowed (just to be safe) and the redirection still works because my test machine is not sending any www/443 traffic to the ISE nodes that I'm aware of (CWA is 8443).&lt;/P&gt;&lt;P&gt;Can someone explain (in detail) why a client machine would send www/443 traffic to the ISE nodes and therefore need to be defined in the CWA redirect acl local to the switch.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:46:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517647#M90155</guid>
      <dc:creator>Gary Higgs</dc:creator>
      <dc:date>2019-03-11T04:46:10Z</dc:date>
    </item>
    <item>
      <title>Hello Gary,You might be aware</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517648#M90157</link>
      <description>&lt;P&gt;Hello Gary,&lt;/P&gt;&lt;P&gt;You might be aware that in CWA the client is authenticated twice. As per my understanding PACL is the ACL-Default you apply on port manually. When you do First authentication then this ACL will be dynamically replaced by DACL. So now this is the acl that govern what traffic can pass through that port. so in this you need to permit DHCP, DNS,port&amp;nbsp; 80,443 and traffic to ISE on port 8443.&lt;/P&gt;&lt;P&gt;Now when the traffic enters the switch Redirect ACL come in to picture. Here you need to permit only traffic that need to be redirected means port 80 and 443 traffic and you need to deny DHCP,DNS and traffic to ISE on port 8443 to get redirect.&lt;/P&gt;&lt;P&gt;So when the user try to access any web page,then first web browser needs to resolve domain name so it will issue a DNS query which dacl is allowing. then it hit redirect acl but it is denying that traffic to get redirected so client will resolve domain name. Now client try to send http traffic to the resolved ip address, http is allowed in DACL, then it hit redirect ACL which is permitting this http traffic to get redirected to ISE on port 8443. so client browser is redirected to new url.&lt;/P&gt;&lt;P&gt;Again DNS query for new url successful. client now send web traffic to ISE on port 8443 which is allowed in DACL, now hit redirect acl where it is denied to get redirected so client will be able to get Guest portal from ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;"Please mark the helpful posts"&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2014 06:02:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517648#M90157</guid>
      <dc:creator>Poonam Garg</dc:creator>
      <dc:date>2014-06-05T06:02:25Z</dc:date>
    </item>
    <item>
      <title>Poonam,I appreciate the</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517649#M90159</link>
      <description>&lt;P&gt;Poonam,&lt;/P&gt;&lt;P&gt;I appreciate the response. I understand the process and flow of CWA but I still don't see why the ISE nodes need to be defined (as deny statements or at all) in the redirect acl that is locally configured on the switch. Let me try to explain it better (sorry for the novel):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. a default PACL is statically applied to an unused interface. For my environment our PACL is a simple "permit ip any any" which allows an open fallback in case communication to ISE fails.&lt;/P&gt;&lt;P&gt;2. A client plugs in and the switch begins talking dot1x to the client. During this time the PACL is the ONLY acl that is applied to the interface/client.&lt;/P&gt;&lt;P&gt;3. The client does not run dot1x and therefore the switch eventually fails over to mab. At this time, the CWA authz rule comes into effect and ISE sends the DACL to the switch via radius and also references which RACL (redirect acl) to use.&lt;/P&gt;&lt;P&gt;4. Not many people seem to understand this part....The switch then rebuilds the ACL that is applied to the interface/user. The switch creates an ACL that consists of ALL THREE ACLs. The first portion of this ACL is the RACL with permit statements (which are the deny RACL statements configured on the switch) and then redirect statements (which are the permit RACL statements configured on the switch) and then the DACL from ISE is the next portion of this new ACL and then the very last portion is the original static PACL that is configured on the port.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Again, I've tested this out over and over again on several different platforms (6500, 3700, 3800) and because, during the stage where the interface is in CWA state, the ACL that is applied to the interface is ALL THREE ACLs in the order of RACL&amp;gt;DACL&amp;gt;PACL....it doesn't seem to make sense that you need to define the ISE nodes in the RACL because all you need to define is what traffic you want to redirect. You define what traffic you want allowed in the DACL which is where you state access to the ISE nodes (either complete access or only 8443 access).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me give you this example. Say I have the following confgured:&lt;/P&gt;&lt;P&gt;CONFIGURED SWITCH INTERFACE ACL (PACL)&lt;BR /&gt;&amp;nbsp; ip access-list standard ACL-ALLOW&lt;BR /&gt;&amp;nbsp;&amp;nbsp; permit ip any any&lt;/P&gt;&lt;P&gt;CONFIGURED SWITCH REDIRECT ACL (RACL)&lt;BR /&gt;&amp;nbsp; ip access-list extended ACL-WEBAUTH-REDIRECT&lt;BR /&gt;&amp;nbsp;&amp;nbsp; permit tcp any any eq www 443&lt;/P&gt;&lt;P&gt;CONFIGURED ISE DOWNLOADABLE ACL (DACL)&lt;BR /&gt;&amp;nbsp; permit tcp any host &amp;lt;psn01&amp;gt; eq 8443&lt;BR /&gt;&amp;nbsp; permit udp any host &amp;lt;dns01&amp;gt; eq 53&lt;BR /&gt;&amp;nbsp; deny ip any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then the process would look like this:&lt;/P&gt;&lt;P&gt;1. During dot1x negotiation the acl that is used is this:&lt;/P&gt;&lt;P&gt;permit ip any any&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;PACL&lt;/P&gt;&lt;P&gt;2. Once CWA is in effect then the acl looks like this:&lt;/P&gt;&lt;P&gt;redirect tcp host &amp;lt;host ip&amp;gt; any eq www 443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;RACL&lt;BR /&gt;permit tcp host &amp;lt;host ip&amp;gt; host &amp;lt;psn01 ip&amp;gt; eq 8443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;DACL&lt;BR /&gt;permit udp host &amp;lt;host ip&amp;gt; host &amp;lt;dns01 ip&amp;gt; eq 53&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;DACL&lt;BR /&gt;deny ip any any&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;DACL&lt;BR /&gt;permit ip any any&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;PACL&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jun 2014 03:16:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517649#M90159</guid>
      <dc:creator>Gary Higgs</dc:creator>
      <dc:date>2014-06-06T03:16:56Z</dc:date>
    </item>
    <item>
      <title>Hello Gary,As per my</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517650#M90162</link>
      <description>&lt;P&gt;Hello Gary,&lt;/P&gt;&lt;P&gt;As per my understanding, once the port get authenticated, the order of ACL is 1. dACL 2. Redirect ACL 3. Port ACl.&lt;/P&gt;&lt;P&gt;Secondly &lt;STRONG&gt;why the ISE nodes need to be defined (as deny statements or at all) in the redirect acl &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;When redirect acl is applied to the port, any HTTP or HTTPS traffic that the client sends triggers a web redirection. Deny statement in redirect ACL at first place denies the ISE IP address so traffic to the ISE goes to the ISE and does not redirect in a loop. (In this scenario, deny does not block the traffic; it just does not redirect the traffic)&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jun 2014 11:51:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517650#M90162</guid>
      <dc:creator>Poonam Garg</dc:creator>
      <dc:date>2014-06-06T11:51:09Z</dc:date>
    </item>
    <item>
      <title>In fact, dACL will replace</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517651#M90167</link>
      <description>&lt;P&gt;In fact, dACL will replace the pre-authentication ACL/PACL you have configured on the switchport. Traffic must be first allowed via dACL then it will hit redirect ACL.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jun 2014 12:24:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517651#M90167</guid>
      <dc:creator>Poonam Garg</dc:creator>
      <dc:date>2014-06-06T12:24:41Z</dc:date>
    </item>
    <item>
      <title>I have always seen it rebuild</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517652#M90171</link>
      <description>&lt;P&gt;I have always seen it rebuild the ACL as rACL&amp;gt;dACL&amp;gt;pACL while the switchport is in CWA state.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jun 2014 12:30:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517652#M90171</guid>
      <dc:creator>Gary Higgs</dc:creator>
      <dc:date>2014-06-06T12:30:02Z</dc:date>
    </item>
    <item>
      <title>This goes back to the heart</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517653#M90173</link>
      <description>&lt;P&gt;This goes back to the heart of my question. It does not appear that the client is sending any port 80 or 443 traffic to the ISE nodes. It is only sending 8443 and therefore would not get caught up in the redirect loop. I've tested this out &amp;amp; it works.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jun 2014 12:34:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517653#M90173</guid>
      <dc:creator>Gary Higgs</dc:creator>
      <dc:date>2014-06-06T12:34:07Z</dc:date>
    </item>
    <item>
      <title>If you say rACL is first hit</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517654#M90175</link>
      <description>&lt;P&gt;If you say rACL is first hit then what is the use of dACL on switch port&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jun 2014 12:36:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517654#M90175</guid>
      <dc:creator>Poonam Garg</dc:creator>
      <dc:date>2014-06-06T12:36:39Z</dc:date>
    </item>
    <item>
      <title>The rACL is what provides the</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517655#M90177</link>
      <description>&lt;P&gt;The rACL is what provides the redirect statements in the ACL. Technically, you could put everything in your rACL as deny statements but it doesn't scale well because you have to place it on every switch in your environment whereas if you put it in ISE then it's centrally located/configured. Please test the process out if you have the chance, I promise you this is how it works &amp;amp; why I'm asking this question.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jun 2014 12:43:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517655#M90177</guid>
      <dc:creator>Gary Higgs</dc:creator>
      <dc:date>2014-06-06T12:43:31Z</dc:date>
    </item>
    <item>
      <title>Thanks Gary, I will</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517656#M90179</link>
      <description>&lt;P&gt;Thanks Gary, I will definitely test this out. It was a great discussion. I really appreciate your way of clarifying things.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jun 2014 12:51:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517656#M90179</guid>
      <dc:creator>Poonam Garg</dc:creator>
      <dc:date>2014-06-06T12:51:31Z</dc:date>
    </item>
    <item>
      <title>Thank you for the responses.</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517657#M90181</link>
      <description>&lt;P&gt;Thank you for the responses. Our discussion has brought up two more questions for me that I plan on testing when I get a chance.&lt;/P&gt;&lt;P&gt;1. Why do I even need the pACL if I'm only saying "permit ip any any".&lt;/P&gt;&lt;P&gt;2. Is it possible to place my redirect statements at the beginning of my ISE dACL &amp;amp; eliminating it off the switch config completely. This will allow me to centrally control the ACL via ISE.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jun 2014 13:19:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517657#M90181</guid>
      <dc:creator>Gary Higgs</dc:creator>
      <dc:date>2014-06-06T13:19:17Z</dc:date>
    </item>
    <item>
      <title>Prior to software versions 12</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517658#M90182</link>
      <description>&lt;P&gt;&lt;SPAN class="content"&gt;Prior to software versions 12.2(55)SE on DSBU switches, a port ACL is required for dynamic ACLs from a RADIUS AAA server to be applied. Failure to have a default ACL will result in assigned dACLs being ignored by the switch. With 12.2(55)SE a default ACL will be automatically generated and applied. &lt;/SPAN&gt;An ACL must be configured to prepend dACLs from AAA server.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jun 2014 13:40:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517658#M90182</guid>
      <dc:creator>Poonam Garg</dc:creator>
      <dc:date>2014-06-06T13:40:00Z</dc:date>
    </item>
    <item>
      <title>Hi Gary,Please find the</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517659#M90183</link>
      <description>&lt;P&gt;Hi Gary,&lt;/P&gt;&lt;P&gt;Please find the attached slide from Cisco supporting my above statement that the traffic must first be allowed in dACL or Port ACL (if dACL is not configured as dACL is optional, configured only if you want to restrict access on switch port based user authenticating the network.i.e per-user based) then only it will hit redirect ACL.&lt;/P&gt;&lt;P&gt;Hope that will clear the confusion on which ACL got hit first.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jun 2014 19:32:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517659#M90183</guid>
      <dc:creator>Poonam Garg</dc:creator>
      <dc:date>2014-06-06T19:32:08Z</dc:date>
    </item>
    <item>
      <title>The slide doesn't state which</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517660#M90184</link>
      <description>&lt;P&gt;The slide doesn't state which ACL gets hit first but yes I agree that the static pACL is the first ACL to go into effect &amp;amp; I've stated that before. I don't know how else to explain this because part of my frustration is that the documentation all along has been inaccurate/inadequate &amp;amp; it's created a false understanding of what is actually happening at each stage. Again, I promise that when a port first goes live the pACL is used &amp;amp; when the port goes into "redirect/CWA" state a new ACL gets applied that consists of the rACL&amp;gt;dACL&amp;gt;pACL.&lt;/P&gt;&lt;P&gt;Take a windows laptop, disable dot1x on it, log into your switch with another laptop and then plug your first laptop into a switchport &amp;amp; watch the process. The pACL will be used until dot1x fails &amp;amp; when the port transitions to the CWA state a new ACL will be applied to that port &amp;amp; it will consist of the rACL statements, then the dACL statements, &amp;amp; then the original pACL statements.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jun 2014 19:54:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517660#M90184</guid>
      <dc:creator>Gary Higgs</dc:creator>
      <dc:date>2014-06-06T19:54:05Z</dc:date>
    </item>
    <item>
      <title>I accidentally clicked the</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517661#M90186</link>
      <description>&lt;P&gt;I accidentally clicked the "correct answer" button when trying to click on the attachment. Not sure how to undo the mistake.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jun 2014 20:47:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517661#M90186</guid>
      <dc:creator>Gary Higgs</dc:creator>
      <dc:date>2014-06-06T20:47:08Z</dc:date>
    </item>
    <item>
      <title>Poonam,Attached is a word</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517662#M90191</link>
      <description>&lt;P&gt;Poonam,&lt;/P&gt;&lt;P&gt;Attached is a word document showing the outputs from my 6500 switch while a switchport is transitioning from dot1x over to mab and in "CWA" state. I had to omit several items (IPs, etc) but I tried to provide some explanation. Please let me know your thoughts.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jun 2014 16:23:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517662#M90191</guid>
      <dc:creator>Gary Higgs</dc:creator>
      <dc:date>2014-06-10T16:23:27Z</dc:date>
    </item>
    <item>
      <title>Gary,I have not worked on</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517663#M90195</link>
      <description>&lt;P&gt;Gary,&lt;/P&gt;&lt;P&gt;I have not worked on 6500 switches. Also never used this tcam command. I will study about how tcam display interface acl hit and will let you know about my analysis as in some document I saw the first entry is deny ip any any in the output and still a hit in other ace. See the &lt;A href="http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/interface/command/ir-cr-book/ir-s6.html#wp2363865965"&gt;link&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jun 2014 07:00:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517663#M90195</guid>
      <dc:creator>Poonam Garg</dc:creator>
      <dc:date>2014-06-11T07:00:11Z</dc:date>
    </item>
    <item>
      <title>Hi Gary / Poonam,I find the</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517664#M90198</link>
      <description>&lt;P&gt;Hi Gary / Poonam,&lt;/P&gt;&lt;P&gt;I find the conversation&amp;nbsp;you guys are having&amp;nbsp;very enlightening.&amp;nbsp; I'm having a similar issue with my ISE / Switch deployment. I'm using ISE v1.1.2 and switch 3560x v 15.2(1)E3.&amp;nbsp; Can seem to figure out how&amp;nbsp;the ACL and dACL are applied to the interface.&amp;nbsp; However, I'm using the NAC agent instead of using the CWA option.&lt;/P&gt;&lt;P&gt;Basically, my configuration consists of a Machine AuthZ profile and a User AuthZ profile with the PostureStatus_NotEqual_Compliant.&amp;nbsp; Have you guys successfully deployed a wired solution using the NAC Agent ??&amp;nbsp; FYI, I have a wireless Cisco solution succesfully deployed.&amp;nbsp; It's the Wired part&amp;nbsp;can't seem to figure it out.&lt;/P&gt;&lt;P&gt;Thanks for any suggestions !!&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jun 2014 20:31:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517664#M90198</guid>
      <dc:creator>tonyp8581</dc:creator>
      <dc:date>2014-06-11T20:31:35Z</dc:date>
    </item>
    <item>
      <title>Tony,I rolled out our ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517665#M90200</link>
      <description>&lt;P&gt;Tony,&lt;/P&gt;&lt;P&gt;I rolled out our ISE deployment almost 2 years ago and started off on the wired side first. Once we were able to stabilize our environment (after many patch upgrades on 1.1, upgrading to 1.2, Cisco BU guys doing a DB clean, many more "fun" stuff) we then rolled it out on the wireless side.&lt;/P&gt;&lt;P&gt;I have yet to fully deploy Posture Assessment due to a few quirky issues I've noticed with the NAC agent so for the most part I am just doing Dot1x authentication/authorization and MAB authentication/authorization. Although, the latest version of the NAC agent does seem more promising with regards to eliminating some of the quirky behavior that we've seen.&lt;/P&gt;&lt;P&gt;I am fairly confident that the order of the ACL, once an interface goes into a general "redirect" state whether that be for CWA or Posture Unknown, is rACL&amp;gt;dACL&amp;gt;pACL. For CWA, at least in my environment, I do not have much reason for placing anything else but a general "permit tcp any any eq www 443" in my rACL that is configured locally on the switch. I may have to add deny statements above this general permit statement but that would only be for something such as PC imaging which may communicate on port 80 or 443 which I am testing out now with the team that is responsible for doing PC imaging. For Posture Assessment it is a little bit of a different story, again at least for my environment, because I have to place deny statements for such things as IM &amp;amp; email because there is communication on ports 80 &amp;amp; 443 and if the deny statements are not placed in the rACL then you get certificate errors while the NAC agent is trying to evaluate the machine. The email &amp;amp; IM app are trying to communicate with their respective servers on port 443 and that traffic gets redirected to your PSN and your PSN responds with it's own certificate therefore creating a certificate pop-up message on the client machine. End users hate getting these certificate pop-ups while the NAC agent is running.&lt;/P&gt;&lt;P&gt;What specifically are you having issues with?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jun 2014 21:52:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517665#M90200</guid>
      <dc:creator>Gary Higgs</dc:creator>
      <dc:date>2014-06-11T21:52:04Z</dc:date>
    </item>
    <item>
      <title>Hi Gary,Thanks for your</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517666#M90203</link>
      <description>&lt;P&gt;Hi Gary,&lt;/P&gt;&lt;P&gt;Thanks for your response, it's funny you started on the wired side.&amp;nbsp; I started on the wireless side and barely had any issues. The wired side is another beast.&amp;nbsp; For me anyways,&lt;/P&gt;&lt;P&gt;I'm using 3 Auth profile,&lt;/P&gt;&lt;P&gt;1- Machine Auth, I have a dACL created in ISE with permit DHCP, DNS, and all AD server.&amp;nbsp; Finally a deny all.&lt;/P&gt;&lt;P&gt;2 - User Auth, I have Web Authentication with Posture Discovery (this is the NAC Agent).&amp;nbsp; With this option, ISE forces me to add an ACL which needs to be created on the switch.&amp;nbsp; This is where I get stuck.&lt;/P&gt;&lt;P&gt;I have tried many flavours of ACL's, but presently I'm permitting DHCP, DNS, deny ISE nodes and finally permit all.&lt;/P&gt;&lt;P&gt;3- Finally User Auth, but this time with Posture compliant.&amp;nbsp; I use a pACL with Permit all.&lt;/P&gt;&lt;P&gt;Though, I have noticed by removing all ACL's and use only VLAN assignment, everything works.&amp;nbsp; As soon as I add any types of ACL's with Posture in the mix, I get inconsistent results. In some cases,&amp;nbsp; my workstation doesn't even have a valid IP address (with that I make sure all DHCP request goes through).&lt;/P&gt;&lt;P&gt;Contrary to your switch model, the 3560 doesn't allow me to verity the total ACL's that are applied to the port.&amp;nbsp; The command sh authentication sessions interface gig0/24 shows me the ACL by name but I can't tell if other ACL's are being appended or replaced.&lt;/P&gt;&lt;P&gt;Lately, I'm doing a lot of reading on this subject. As I mentioned before, your thread was most informative.&lt;BR /&gt;I wish Cisco would write a white paper that explains in detail every step of the process. (including how the ACL's are applied with posture assignment).&lt;/P&gt;&lt;P&gt;Thanks for your input !&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jun 2014 15:26:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-cwa-redirect/m-p/2517666#M90203</guid>
      <dc:creator>tonyp8581</dc:creator>
      <dc:date>2014-06-12T15:26:29Z</dc:date>
    </item>
  </channel>
</rss>

