<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAC OOB VIRTUAL GW PROBLEM in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nac-oob-virtual-gw-problem/m-p/1116950#M756288</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It arised to be that the 3550/3560/3750 are not supported for Central Deployment. The problem is solved.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Catalyst 3550/3560/3750 and NAC Appliance In-Band Central Deployment &lt;/P&gt;&lt;P&gt;For Cisco Clean Access (NAC Appliance) in In-Band Central Deployment mode, when a Cisco Catalyst 3560/3750 series switch is used as a Layer 3 switch and if both ports of the Clean Access Server (CAS) are connected to the same 3560/3750 switch, the minimum switch IOS code required is Cisco IOS release 12.2(25)SEE. &lt;/P&gt;&lt;P&gt;Because caveat CSCdu27506 is not fixed on the Catalyst 3550 series switch, when the Catalyst 3550 is used as a Layer 3 switch, it cannot be used in NAC Appliance In-Band Central Deployment. &lt;/P&gt;&lt;P&gt;For further details, refer to switch IOS caveat CSCdu27506: &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=CSCdu27506" target="_blank"&gt;http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=CSCdu27506&lt;/A&gt; &lt;/P&gt;&lt;P&gt;See also Switch Support for CAS Virtual Gateway/VLAN Mapping (IB and OOB). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch Support for CAS Virtual Gateway/VLAN Mapping (IB and OOB) &lt;/P&gt;&lt;P&gt;Table 6 describes Cisco Catalyst switch model support for the Virtual Gateway VLAN Mapping feature of the Clean Access Server for either in-band (IB) or out-of-band deployments (OOB). This table is intended to clarify CAS network deployment options when connecting the CAS in Virtual Gateway (bridge) mode to the switches listed. &lt;/P&gt;&lt;P&gt;Table 6 Switch Support for CAS Virtual Gateway In-Band/OOB VLAN Mapping Feature  	&lt;/P&gt;&lt;P&gt;Cisco Catalyst Switch Model 	Virtual Gateway 	 &lt;/P&gt;&lt;P&gt;	Central Deployment &lt;/P&gt;&lt;P&gt;(both interfaces into same switch) 	Edge Deployment &lt;/P&gt;&lt;P&gt;(each interface into different switch) 	 &lt;/P&gt;&lt;P&gt;6000/6500 	Yes 	Yes 	 &lt;/P&gt;&lt;P&gt;4000/4500 	Yes 	Yes 	 &lt;/P&gt;&lt;P&gt;3750/3560 (L3 switch) 	Yes with 12.2(25) SEE and higher 1 &lt;/P&gt;&lt;P&gt;Yes 	 &lt;/P&gt;&lt;P&gt;3550 (L3 switch) 	No 1 &lt;/P&gt;&lt;P&gt;Yes 	 &lt;/P&gt;&lt;P&gt;3750/3560 (L2 switch) 	Yes 	Yes 	 &lt;/P&gt;&lt;P&gt;3550 (L2 switch) 	Yes 	Yes 	 &lt;/P&gt;&lt;P&gt;2950/2960 	Yes 	Yes 	 &lt;/P&gt;&lt;P&gt;2900XL 	No 2 &lt;/P&gt;&lt;P&gt;Yes 	 &lt;/P&gt;&lt;P&gt;3500XL 	Yes 	Yes 	 &lt;/P&gt;&lt;P&gt;28xx NME 	Yes with 12.2(25) SEE and higher 1 &lt;/P&gt;&lt;P&gt;Yes 	 &lt;/P&gt;&lt;P&gt;1 Due to switch caveat CSCdu27506. See Cisco Catalyst 3550/3560/3750 and NAC Appliance In-Band Central Deployment for details. &lt;/P&gt;&lt;P&gt;2 2900 XL does not support removing VLAN 1 from switch trunks. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 10 Dec 2008 14:30:45 GMT</pubDate>
    <dc:creator>jad.sadek</dc:creator>
    <dc:date>2008-12-10T14:30:45Z</dc:date>
    <item>
      <title>NAC OOB VIRTUAL GW PROBLEM</title>
      <link>https://community.cisco.com/t5/network-security/nac-oob-virtual-gw-problem/m-p/1116946#M756281</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to setup a NAC OOB Virtual GW Scenario (attached is the visio schematic of the setup):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch: 3550 (ios 12.2(46) adv ip serv)&lt;/P&gt;&lt;P&gt;NAC 4130 appliances: v4.1.6 (also tried v4.5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch Configuration of the trunks to the CAS):&lt;/P&gt;&lt;P&gt;- int f0/23 (connected to CAS e0) -&amp;gt; dot1q trunk with native vlan 999 and allowed vlans 199 (mgt vlan of cas) and 10 (hosts access vlan)&lt;/P&gt;&lt;P&gt;- int f0/21 (connected ro CAS e1) -&amp;gt; dot1q trunk with native vlan 998 and allowed vlans 100 (hosts authentication vlan)&lt;/P&gt;&lt;P&gt;- SVIs on switch: 199, 10, 200 (CAM mgt vlan), 99 (dns, dhcp)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem I am facing is that the host once connected to a managed port is able to acquire an ip from the access vlan from the dhcp server but is not redirected to the login page. I tried to follow some hints provided in previous posts but none of them worked for me. I configured the following:&lt;/P&gt;&lt;P&gt;- Login Page&lt;/P&gt;&lt;P&gt;- Configured IP based traffic control on the unautheticated role to permit all traffic (also host based to permit &lt;A class="jive-link-custom" href="https://192.168.199.1" target="_blank"&gt;https://192.168.199.1&lt;/A&gt; -&amp;gt; cas' ip with trusted dns my dns server 192.168.99.1)&lt;/P&gt;&lt;P&gt;- Managed subnet with unused ip in access vlan (192.168.10.253) and vlan id that of the auth vlan (100)&lt;/P&gt;&lt;P&gt;- vlan mapping between untrusted vlan 100 and trusted vlan 10&lt;/P&gt;&lt;P&gt;- tried to access a resolvable website by my dns from the host (as per the suggestion from a previous post for someone who was facing the same prob)&lt;/P&gt;&lt;P&gt;- also tried to access the cas' login page from the host with vain, eventhough it is accessible from trusted subnets&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: I followed the configuration guide of both v4.1.6 and v4.5 and with both versions I was facing the same problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would be very thankful for any hints to help me solve this issue.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Questions: When the host is connected to a managed host (assigned to the managed vlan 100) and it is assigned an ip from the a access vlan 10. Shouldn't I be able to access the managed subnet case I configured ip traffic control policy to permit all traffic from untrusted to trusted? also shouldn't I be able to resolve website's ip with "nslookup x.com" since dns traffic is by default configured and also trusted dns server 192.168.99.1 is configured?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for any help. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 11:09:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nac-oob-virtual-gw-problem/m-p/1116946#M756281</guid>
      <dc:creator>jad.sadek</dc:creator>
      <dc:date>2020-02-21T11:09:34Z</dc:date>
    </item>
    <item>
      <title>Re: NAC OOB VIRTUAL GW PROBLEM</title>
      <link>https://community.cisco.com/t5/network-security/nac-oob-virtual-gw-problem/m-p/1116947#M756282</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try this &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Connect your test machine to vlan 10 &lt;/P&gt;&lt;P&gt;do you get DHCP and DNS and can you browse to a dns resolvable web site&lt;/P&gt;&lt;P&gt;If so move on to &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;" Configured IP based traffic control on the unautheticated role to permit all traffic (also host based to permit &lt;A class="jive-link-custom" href="https://192.168.199.1" target="_blank"&gt;https://192.168.199.1&lt;/A&gt; -&amp;gt; cas' ip with trusted dns my dns server 192.168.99.1) &lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;Rip this out and only allow udp bootpc and bootps as well as ICMP traffic (and the DNS Trusted host in host policy) for the Unauthenticated role&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then make sure you recieve the dhcp address &lt;/P&gt;&lt;P&gt;and ping your Gateway through the CAS (should work as its allowed by policy)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Move your pc to port on vlan 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then open your browser to https:\\192.168.199.1 do you get the login page yes/no?  if yes then &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Flush your dns cache on your machine&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then open your browser to the dns resolvable web site you were able to resolve before (make sure the dns was not cached your trying to send a 53 request which the cas will reply with it's own redirect.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Dec 2008 02:22:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nac-oob-virtual-gw-problem/m-p/1116947#M756282</guid>
      <dc:creator>ROBERT WATSON</dc:creator>
      <dc:date>2008-12-10T02:22:24Z</dc:date>
    </item>
    <item>
      <title>Re: NAC OOB VIRTUAL GW PROBLEM</title>
      <link>https://community.cisco.com/t5/network-security/nac-oob-virtual-gw-problem/m-p/1116948#M756284</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The tests are successful on clan 10.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I connect the host to the managed subnet (vlan 100) I am not able to access the login page &lt;A class="jive-link-custom" href="https://192.168.199.1," target="_blank"&gt;https://192.168.199.1,&lt;/A&gt; neither am I able to ping the gateway's ip (svi 10 on switch) eventhough I permitted icmp any to any from the ip traffic control policy. Also I tried to enable the allow any  for layer 2 traffic on the Ethernet traffic control policy for the unauthenticated role but it didn't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(attached are configuration snapshots of my unauthenticated role traffic control policies and ip config of CAS)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Dec 2008 07:56:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nac-oob-virtual-gw-problem/m-p/1116948#M756284</guid>
      <dc:creator>jad.sadek</dc:creator>
      <dc:date>2008-12-10T07:56:28Z</dc:date>
    </item>
    <item>
      <title>Re: NAC OOB VIRTUAL GW PROBLEM</title>
      <link>https://community.cisco.com/t5/network-security/nac-oob-virtual-gw-problem/m-p/1116949#M756287</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but if you want to connect to the cas. you should type  &lt;A class="jive-link-custom" href="https://ipaddress/admin" target="_blank"&gt;https://ipaddress/admin&lt;/A&gt;&lt;/P&gt;&lt;P&gt;otherwhise you could not reach the login page of CAS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Dec 2008 11:29:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nac-oob-virtual-gw-problem/m-p/1116949#M756287</guid>
      <dc:creator>tuan-nguyen</dc:creator>
      <dc:date>2008-12-10T11:29:18Z</dc:date>
    </item>
    <item>
      <title>Re: NAC OOB VIRTUAL GW PROBLEM</title>
      <link>https://community.cisco.com/t5/network-security/nac-oob-virtual-gw-problem/m-p/1116950#M756288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It arised to be that the 3550/3560/3750 are not supported for Central Deployment. The problem is solved.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Catalyst 3550/3560/3750 and NAC Appliance In-Band Central Deployment &lt;/P&gt;&lt;P&gt;For Cisco Clean Access (NAC Appliance) in In-Band Central Deployment mode, when a Cisco Catalyst 3560/3750 series switch is used as a Layer 3 switch and if both ports of the Clean Access Server (CAS) are connected to the same 3560/3750 switch, the minimum switch IOS code required is Cisco IOS release 12.2(25)SEE. &lt;/P&gt;&lt;P&gt;Because caveat CSCdu27506 is not fixed on the Catalyst 3550 series switch, when the Catalyst 3550 is used as a Layer 3 switch, it cannot be used in NAC Appliance In-Band Central Deployment. &lt;/P&gt;&lt;P&gt;For further details, refer to switch IOS caveat CSCdu27506: &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=CSCdu27506" target="_blank"&gt;http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=CSCdu27506&lt;/A&gt; &lt;/P&gt;&lt;P&gt;See also Switch Support for CAS Virtual Gateway/VLAN Mapping (IB and OOB). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch Support for CAS Virtual Gateway/VLAN Mapping (IB and OOB) &lt;/P&gt;&lt;P&gt;Table 6 describes Cisco Catalyst switch model support for the Virtual Gateway VLAN Mapping feature of the Clean Access Server for either in-band (IB) or out-of-band deployments (OOB). This table is intended to clarify CAS network deployment options when connecting the CAS in Virtual Gateway (bridge) mode to the switches listed. &lt;/P&gt;&lt;P&gt;Table 6 Switch Support for CAS Virtual Gateway In-Band/OOB VLAN Mapping Feature  	&lt;/P&gt;&lt;P&gt;Cisco Catalyst Switch Model 	Virtual Gateway 	 &lt;/P&gt;&lt;P&gt;	Central Deployment &lt;/P&gt;&lt;P&gt;(both interfaces into same switch) 	Edge Deployment &lt;/P&gt;&lt;P&gt;(each interface into different switch) 	 &lt;/P&gt;&lt;P&gt;6000/6500 	Yes 	Yes 	 &lt;/P&gt;&lt;P&gt;4000/4500 	Yes 	Yes 	 &lt;/P&gt;&lt;P&gt;3750/3560 (L3 switch) 	Yes with 12.2(25) SEE and higher 1 &lt;/P&gt;&lt;P&gt;Yes 	 &lt;/P&gt;&lt;P&gt;3550 (L3 switch) 	No 1 &lt;/P&gt;&lt;P&gt;Yes 	 &lt;/P&gt;&lt;P&gt;3750/3560 (L2 switch) 	Yes 	Yes 	 &lt;/P&gt;&lt;P&gt;3550 (L2 switch) 	Yes 	Yes 	 &lt;/P&gt;&lt;P&gt;2950/2960 	Yes 	Yes 	 &lt;/P&gt;&lt;P&gt;2900XL 	No 2 &lt;/P&gt;&lt;P&gt;Yes 	 &lt;/P&gt;&lt;P&gt;3500XL 	Yes 	Yes 	 &lt;/P&gt;&lt;P&gt;28xx NME 	Yes with 12.2(25) SEE and higher 1 &lt;/P&gt;&lt;P&gt;Yes 	 &lt;/P&gt;&lt;P&gt;1 Due to switch caveat CSCdu27506. See Cisco Catalyst 3550/3560/3750 and NAC Appliance In-Band Central Deployment for details. &lt;/P&gt;&lt;P&gt;2 2900 XL does not support removing VLAN 1 from switch trunks. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Dec 2008 14:30:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nac-oob-virtual-gw-problem/m-p/1116950#M756288</guid>
      <dc:creator>jad.sadek</dc:creator>
      <dc:date>2008-12-10T14:30:45Z</dc:date>
    </item>
  </channel>
</rss>

