<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access-list (ACL) configuration for ISE PSN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4862464#M1101999</link>
    <description>&lt;P&gt;The only way I know of for restricting access to the ISE on a port or protocol basis is by placing a firewall or router with ZBFW between the admin PC and the ISE.&lt;/P&gt;</description>
    <pubDate>Mon, 26 Jun 2023 12:53:12 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2023-06-26T12:53:12Z</dc:date>
    <item>
      <title>Access-list (ACL) configuration for ISE PSN</title>
      <link>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4862170#M1101988</link>
      <description>&lt;P&gt;I am following the URL below for ISE Hardening, but I am having trouble finding the settings to meet the following requirements.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-security-best-practices-hardening/ta-p/3640651" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-knowledge-base/ise-security-best-practices-hardening/ta-p/3640651&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;Requirement&amp;gt;&lt;BR /&gt;"Configure ACLs that require ISE PSN access to specific ports (8443, 8905, etc, versus ip or tcp any any)."&lt;/P&gt;&lt;P&gt;For IP, I can filter by Administration ==&amp;gt; Admin Access ==&amp;gt; Settings ==&amp;gt; Access ==&amp;gt;IP Access from the GUI, but I cannot specify even the Port number.&lt;/P&gt;&lt;P&gt;I tried to configure it with ACLs as described in the requirements, but the CLI did not appear to have ACL settings.&lt;/P&gt;&lt;P&gt;If anyone knows of a setting, either GUI or CLI, that would allow only a specific Port (a setting that meets the requirements), please let me know.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 07:33:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4862170#M1101988</guid>
      <dc:creator>Suzukikoki</dc:creator>
      <dc:date>2023-06-26T07:33:59Z</dc:date>
    </item>
    <item>
      <title>Re: Access-list (ACL) configuration for ISE PSN</title>
      <link>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4862464#M1101999</link>
      <description>&lt;P&gt;The only way I know of for restricting access to the ISE on a port or protocol basis is by placing a firewall or router with ZBFW between the admin PC and the ISE.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 12:53:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4862464#M1101999</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-06-26T12:53:12Z</dc:date>
    </item>
    <item>
      <title>Re: Access-list (ACL) configuration for ISE PSN</title>
      <link>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4862667#M1102014</link>
      <description>&lt;P&gt;Those ports would be used in the guest traffic flow, the 8443/tcp would be the default port for the guest portal, and the 8905/tcp port would be for client provisioning, so I agree with&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp;, that seems to be referred as a general rule in case there is a security device in between ISE and the endpoint, but I think&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199790"&gt;@Jason Kunst&lt;/a&gt; can add more on this.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 17:06:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4862667#M1102014</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-06-26T17:06:05Z</dc:date>
    </item>
    <item>
      <title>Re: Access-list (ACL) configuration for ISE PSN</title>
      <link>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4862843#M1102020</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Thank you for your response.&lt;BR /&gt;Thank you for the very helpful information. Am I correct in assuming that ISE does not support Port-based ACLs?&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 01:20:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4862843#M1102020</guid>
      <dc:creator>Suzukikoki</dc:creator>
      <dc:date>2023-06-27T01:20:55Z</dc:date>
    </item>
    <item>
      <title>Re: Access-list (ACL) configuration for ISE PSN</title>
      <link>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4862846#M1102021</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your response.&lt;BR /&gt;This is the same additional question as above, but am I correct in assuming that Port-based ACLs are not supported by ISE itself?&lt;/P&gt;&lt;P&gt;We are currently configuring it in the relaying FW, but if it is supported in ISE itself, we may be pointed out to configure it, since double blocking is considered to be stronger security.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 01:25:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4862846#M1102021</guid>
      <dc:creator>Suzukikoki</dc:creator>
      <dc:date>2023-06-27T01:25:44Z</dc:date>
    </item>
    <item>
      <title>Re: Access-list (ACL) configuration for ISE PSN</title>
      <link>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4862858#M1102023</link>
      <description>&lt;P&gt;Port based ACLs are supported but not the way you are trying between PSNs, when you configure dynamic ACL you can configure specific ports to permit or deny.&lt;/P&gt;
&lt;P&gt;The example of best practices point you are referring to means be as precise as you can when configuring ACL.For example when you configure redirect ACL.&lt;/P&gt;
&lt;P&gt;you can write option1 as&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;EM&gt;deny udp any eq bootpc &amp;lt;dhcp serverIP&amp;gt; eq bootps &lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;EM&gt;deny udp any &amp;lt;dns server IP&amp;gt; eq domain &lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;EM&gt;deny tcp any host &amp;lt;ISE SERVER(S) IP ADDRESS&amp;gt; eq 8443&lt;BR /&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;EM&gt;permit tcp any any eq 443&lt;BR /&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;EM&gt;permit tcp any any eq 80&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;EM&gt;Option 2&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;EM&gt;deny ip any &amp;lt;DHCP Server IP&amp;gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;EM&gt;deny udp any any eq domain &lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;EM&gt;deny ip any host &amp;lt;ISE SERVER(S) IP ADDRESS&amp;gt; &lt;BR /&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;EM&gt;permit ip any any&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;EM&gt;both will work but option 1 is more precise, you should try to make it as precise as possible to get the job done.&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 01:56:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4862858#M1102023</guid>
      <dc:creator>Ambuj M</dc:creator>
      <dc:date>2023-06-27T01:56:51Z</dc:date>
    </item>
    <item>
      <title>Re: Access-list (ACL) configuration for ISE PSN</title>
      <link>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4862868#M1102024</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325330"&gt;@Ambuj M&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Thank you for your response.&lt;BR /&gt;I see that it is supported.&lt;/P&gt;&lt;P&gt;I just tried it and the command deny does not seem to exist in config mode.&lt;/P&gt;&lt;P&gt;Do you know what the command would be if we were to implement it from the CLI? Also, is it not possible to configure it in the GUI?&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 02:28:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4862868#M1102024</guid>
      <dc:creator>Suzukikoki</dc:creator>
      <dc:date>2023-06-27T02:28:39Z</dc:date>
    </item>
    <item>
      <title>Re: Access-list (ACL) configuration for ISE PSN</title>
      <link>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4862878#M1102025</link>
      <description>&lt;P&gt;if you don’t mind can you state clearly what is the end goal you are trying to achieve?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 03:20:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4862878#M1102025</guid>
      <dc:creator>Ambuj M</dc:creator>
      <dc:date>2023-06-27T03:20:13Z</dc:date>
    </item>
    <item>
      <title>Re: Access-list (ACL) configuration for ISE PSN</title>
      <link>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4862885#M1102026</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325330"&gt;@Ambuj M&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry for the lack of clarity.&lt;BR /&gt;Company policy requires the following requirements to be met by ISE, but I am being asked if the FW settings alone are sufficient security measures.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-security-best-practices-hardening/ta-p/3640651" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/ise-security-best-practices-hardening/ta-p/3640651&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Even if we say that we are taking countermeasures with FW, we are making this inquiry because we have to explain the basis on which the FW countermeasures are sufficient.&lt;/P&gt;&lt;P&gt;If it is clear that ISE does not provide support, we can explain that the only way is to use FW countermeasures, but if they do provide support, we need to explain why we do not configure them.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 04:11:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4862885#M1102026</guid>
      <dc:creator>Suzukikoki</dc:creator>
      <dc:date>2023-06-27T04:11:46Z</dc:date>
    </item>
    <item>
      <title>Re: Access-list (ACL) configuration for ISE PSN</title>
      <link>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4863021#M1102028</link>
      <description>&lt;P&gt;This really depends on what you mean when you say "does not support Port-based ACLs".&amp;nbsp; It does support port based ACLS for dACL that is pushed to switches to control access.&amp;nbsp; But for management access to the ISE itself this is not supported within the ISE configuration.&amp;nbsp; to restrict access to the ISE based on ports, you would need to use a firewall to perform this restriction.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 07:26:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4863021#M1102028</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-06-27T07:26:00Z</dc:date>
    </item>
    <item>
      <title>Re: Access-list (ACL) configuration for ISE PSN</title>
      <link>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4863113#M1102034</link>
      <description>&lt;P&gt;if you are trying to restrict communication between ise nodes then as Marius mentioned in beginning there has to be some firewall between nodes where you allow only port required for ise to communicate, here are the ports used between different nodes.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IMG_1687.jpeg" style="width: 2720px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/188706i1519621DD4D38074/image-size/medium?v=v2&amp;amp;px=400" role="button" title="IMG_1687.jpeg" alt="IMG_1687.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 11:05:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4863113#M1102034</guid>
      <dc:creator>Ambuj M</dc:creator>
      <dc:date>2023-06-27T11:05:16Z</dc:date>
    </item>
    <item>
      <title>Re: Access-list (ACL) configuration for ISE PSN</title>
      <link>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4863122#M1102036</link>
      <description>&lt;P&gt;As already mentioned by the others, ISE doesn't support restricting the accesses to itself based on ports. The ports shown on the link you provided are used for the guest and client provisioning. There is no such thing on ISE to say allow accesses to port 8443 only from this subnet or IPs. This takes to&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp;original response, this could be done on a security device setting in the middle between the endpoints and ISE.&lt;/P&gt;
&lt;P&gt;The downloadable ACLs (dACLs) are the access lists that you push to the network devices for enforcement, for example, if you are doing posture assessment you can push a dACL restricting the traffic to everything with the exception for a remediation portal where the non compliance endpoints could connect and download the latest antimalware patches, but again those won't be applied to the traffic destined to ISE itself.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 11:24:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-acl-configuration-for-ise-psn/m-p/4863122#M1102036</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-06-27T11:24:45Z</dc:date>
    </item>
  </channel>
</rss>

