<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACL To block Web GUI access But Allow ISE Redirection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-to-block-web-gui-access-but-allow-ise-redirection/m-p/4950899#M1105439</link>
    <description>&lt;P&gt;You can configure the switch per the Best Practices to mitigate the vulnerability.&lt;/P&gt;
&lt;P&gt;As noted in the ISE Secure Wired Access Prescriptive Design Guide:&lt;/P&gt;
&lt;P&gt;Switch’s internal HTTP/HTTPS server is used for redirection process and its highly encouraged to decouple this service from Switch Management if HTTP/HTTPS isn’t used for Switch Management. You can accomplish this using below CLI’s:&lt;/P&gt;
&lt;PRE&gt;c9300-Sw(config)#ip http active-session-modules none
c9300-Sw(config)#ip http secure-active-session-modules none&lt;/PRE&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515#toc-hId--1376429527" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515#toc-hId--1376429527&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 30 Oct 2023 13:40:37 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2023-10-30T13:40:37Z</dc:date>
    <item>
      <title>ACL To block Web GUI access But Allow ISE Redirection</title>
      <link>https://community.cisco.com/t5/network-security/acl-to-block-web-gui-access-but-allow-ise-redirection/m-p/4949955#M1105414</link>
      <description>&lt;P&gt;Hi all,&lt;BR /&gt;&lt;BR /&gt;I need some assistance with ALC's&lt;BR /&gt;So my goal is to have an ACL that blocks access to the switches web gui BUT allows an ISE URL redirection for our guest users.&lt;BR /&gt;In order for the redirect we need to have the http and http secure-server active,&lt;BR /&gt;This is in relation to bug&amp;nbsp;&lt;SPAN&gt;CSCwh87343&lt;/SPAN&gt;&lt;BR /&gt;On our devices we have an ACL for web redirect that allows anyone to access http and 443 so here in lies the rub...&lt;BR /&gt;If anyone has any thoughts that could point me in the right direction that would be great.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Oct 2023 21:40:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-to-block-web-gui-access-but-allow-ise-redirection/m-p/4949955#M1105414</guid>
      <dc:creator>S Leigh</dc:creator>
      <dc:date>2023-10-27T21:40:56Z</dc:date>
    </item>
    <item>
      <title>Re: ACL To block Web GUI access But Allow ISE Redirection</title>
      <link>https://community.cisco.com/t5/network-security/acl-to-block-web-gui-access-but-allow-ise-redirection/m-p/4949959#M1105415</link>
      <description>&lt;P&gt;Cisco has started rolling out patch already for the bug you mentioned&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-dublin-17121/221128-software-fix-availability-for-cisco-ios.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-dublin-17121/221128-software-fix-availability-for-cisco-ios.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;For the guest along with redirect ACL force a dacl from ise that allows port 8443 access to ISE and DNS and deny everything else.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Oct 2023 22:42:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-to-block-web-gui-access-but-allow-ise-redirection/m-p/4949959#M1105415</guid>
      <dc:creator>Ambuj M</dc:creator>
      <dc:date>2023-10-27T22:42:36Z</dc:date>
    </item>
    <item>
      <title>Re: ACL To block Web GUI access But Allow ISE Redirection</title>
      <link>https://community.cisco.com/t5/network-security/acl-to-block-web-gui-access-but-allow-ise-redirection/m-p/4950899#M1105439</link>
      <description>&lt;P&gt;You can configure the switch per the Best Practices to mitigate the vulnerability.&lt;/P&gt;
&lt;P&gt;As noted in the ISE Secure Wired Access Prescriptive Design Guide:&lt;/P&gt;
&lt;P&gt;Switch’s internal HTTP/HTTPS server is used for redirection process and its highly encouraged to decouple this service from Switch Management if HTTP/HTTPS isn’t used for Switch Management. You can accomplish this using below CLI’s:&lt;/P&gt;
&lt;PRE&gt;c9300-Sw(config)#ip http active-session-modules none
c9300-Sw(config)#ip http secure-active-session-modules none&lt;/PRE&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515#toc-hId--1376429527" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515#toc-hId--1376429527&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Oct 2023 13:40:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-to-block-web-gui-access-but-allow-ise-redirection/m-p/4950899#M1105439</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-10-30T13:40:37Z</dc:date>
    </item>
  </channel>
</rss>

