<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACL / WLC / ISE Question in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/acl-wlc-ise-question/m-p/4019632#M4654</link>
    <description>&lt;P&gt;Well, after rebooting the WLC and the AP last night, the ACL seems to be working as intended now. I am able to print (TCP Destination Port 631) and ping (ICMP) from VLAN 970 this morning on my test device, and another site has just confirmed that printing is working for them as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At least I learned a few things on my way to the reboot. My understanding is that FlexConnect ACL changes should take effect rather instantaneously, as long as the client re-authenticates.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much for taking the time to help and take care.&lt;/P&gt;&lt;P&gt;Cameron&lt;/P&gt;</description>
    <pubDate>Tue, 28 Jan 2020 16:00:22 GMT</pubDate>
    <dc:creator>stelker77</dc:creator>
    <dc:date>2020-01-28T16:00:22Z</dc:date>
    <item>
      <title>ACL / WLC / ISE Question</title>
      <link>https://community.cisco.com/t5/wireless/acl-wlc-ise-question/m-p/4015826#M4647</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;Thanks in advance for taking the time to read this post and for any advice or help offered.&lt;/P&gt;&lt;P&gt;I am a contractor working for a customer. I am familiar enough with Cisco switching, but this is my first exposure to both Cisco wireless/WLC and ISE and both seem a little beyond me right now.&lt;/P&gt;&lt;P&gt;Here is the issue. We need to allow a certain VLAN to send traffic to TCP destination port 631 for printing. I believe it is being blocked by an ACL. I thought I had located the ACL on the WLC and adjusted it properly to allow printing, but my change did not have the intended affect. I created an ACL permit rule to allow ICMP to a test server, and that is not working either.&lt;/P&gt;&lt;P&gt;There is a FlexConnect ACL and a regular ACL configured on the WLC. Both are named "INTERNET_ONLY" and appear to be the same set of permit and deny statements, however config changes to one do not propagate to the other, so I know they are separate. My focus has been on the FlexConnect ACL but I have also tested w/ the regular ACL.&lt;/P&gt;&lt;P&gt;The access point to which our test client is associated is a member of a FlexConnect group. When I navigate to FlexConnect Groups &amp;gt; relevant group &amp;gt; ACL Mapping &amp;gt; AAA VLAN-ACL mapping, I see that Vlan Id 960 has an ingress and egress ACL of "PERMIT_ALL_TRAFFIC". Vlan Id 970 has an ingress ACL of "PERMIT_ALL_TRAFFIC" and an egress ACL of "INTERNET_ONLY". My understanding is that in this context, ingress and egress are opposite to what might be traditionally assumed, so egress ACL would refer to traffic coming FROM the client, and ingress ACL would refer to traffic going TO the client.&lt;/P&gt;&lt;P&gt;I did investigate the ACL "PERMIT_ALL_TRAFFIC" and it is configured to permit source 0.0.0.0/0.0.0.0 to destination 0.0.0.0/0.0.0.0 for all protocols, ports and DSCP settings.&lt;/P&gt;&lt;P&gt;Our clients are authenticating via 802.1x and AD credentials through ISE. If the clients are in a special MAC address whitelist on ISE, they are put into vlan 960. If they are not in that whitelist, they are put into VLAN 970. The test client when put into VLAN 960 does not have any issue printing or accessing other network resources. The test client when put into VLAN 970 cannot print or access most network resources (intended behavior besides not being able to print).&lt;/P&gt;&lt;P&gt;Here is one of the more interesting parts. The ACL in question does appear to be in effect for the VLAN 970 clients. There are some permit statements to allow TCP destination port 80 to some servers, and some of those servers are accessible via the browser on port 80 for the VLAN 970 client. I assume other servers that are not reachable have been decomissioned.&lt;/P&gt;&lt;P&gt;I have checked the VLAN interface on the distribution/layer 3 switch, and no ACLs are applied to either VLAN 960 or 970. I believe the client traffic is locally switched from the AP (rather than tunneling back to the controller), since a Wireshark capture on the spanned access point switchport was able to clearly see printing traffic from VLAN 960 from my test client with no evidence of that traffic being tunneled. TCP traffic to destination port 631 was the only connection or traffic initiated from the client to the printer for a successful print session. Routing should be taking place on said layer 3 switch, as VLAN 960, VLAN 970 and the printer VLAN are directly connected routes on that switch.&lt;/P&gt;&lt;P&gt;ISE also has an INTERNET_ONLY ACL, but it is much shorter and only seems to allow access to the ISE servers for 802.1x authentication.&lt;/P&gt;&lt;P&gt;I believe my ACL rules are sound, but please feel free to review:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;(Cisco Controller) &amp;gt;show flexconnect acl detailed INTERNET_ONLY&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;Source Destination Source Port Dest Port&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Index IP Address/Netmask IP Address/Netmask Prot Range Range DSCP Action&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;------ ------------------------------- ------------------------------- ---- ----------- ----------- ----- -------&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;1 0.0.0.0/0.0.0.0 0.0.0.0/0.0.0.0 17 0-65535 53-53 Any Permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;2 0.0.0.0/0.0.0.0 0.0.0.0/0.0.0.0 17 53-53 0-65535 Any Permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;3 0.0.0.0/0.0.0.0 0.0.0.0/0.0.0.0 17 68-68 67-67 Any Permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;4 0.0.0.0/0.0.0.0 0.0.0.0/0.0.0.0 17 67-67 68-68 Any Permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;5 0.0.0.0/0.0.0.0 [serverA]/255.255.255.255 6 0-65535 443-443 Any Permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;6 0.0.0.0/0.0.0.0 [ISE Server 1]/255.255.255.255 6 0-65535 8443-8443 Any Permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;7 0.0.0.0/0.0.0.0 [ISE Server 2]/255.255.255.255 6 0-65535 8443-8443 Any Permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;8 0.0.0.0/0.0.0.0 [serverB]/255.255.255.255 6 0-65535 80-80 Any Permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;9 0.0.0.0/0.0.0.0 [serverB]/255.255.255.255 6 0-65535 443-443 Any Permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;10 0.0.0.0/0.0.0.0 [serverC]/255.255.255.255 6 0-65535 80-80 Any Permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;11 0.0.0.0/0.0.0.0 [serverC]/255.255.255.255 6 0-65535 443-443 Any Permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;12 0.0.0.0/0.0.0.0 [serverD]/255.255.255.255 6 0-65535 80-80 Any Permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;13 0.0.0.0/0.0.0.0 [serverD]/255.255.255.255 6 0-65535 443-443 Any Permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;14 0.0.0.0/0.0.0.0 [serverE]/255.255.255.255 6 0-65535 80-80 Any Permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;15 0.0.0.0/0.0.0.0 [serverE]/255.255.255.255 6 0-65535 443-443 Any Permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;16 0.0.0.0/0.0.0.0 [serverF]/255.255.255.255 6 0-65535 80-80 Any Permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;17 0.0.0.0/0.0.0.0 [serverF]/255.255.255.255 6 0-65535 443-443 Any Permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;18 0.0.0.0/0.0.0.0 [serverG]/255.255.255.255 6 0-65535 8080-8080 Any Permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;19 0.0.0.0/0.0.0.0 [serverG]/255.255.255.255 6 0-65535 8443-8443 Any Permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;20 0.0.0.0/0.0.0.0 [serverH]/255.255.255.255 6 0-65535 80-80 Any Permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;gt;21 0.0.0.0/0.0.0.0 [test ICMP server]/255.255.255.255 1 0-65535 0-65535 Any Permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;22 0.0.0.0/0.0.0.0 [serverI]/255.255.255.255 6 0-65535 80-80 Any Permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;gt;23 0.0.0.0/0.0.0.0 [test printing]0.0.0.0/0.0.0.0 6 0-65535 631-631 Any Permit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;24 0.0.0.0/0.0.0.0 10.0.0.0/255.0.0.0 Any 0-65535 0-65535 Any Deny&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;25 0.0.0.0/0.0.0.0 172.16.0.0/255.240.0.0 Any 0-65535 0-65535 Any Deny&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;26 0.0.0.0/0.0.0.0 192.168.0.0/255.255.0.0 Any 0-65535 0-65535 Any Deny&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;27 0.0.0.0/0.0.0.0 0.0.0.0/0.0.0.0 Any 0-65535 0-65535 Any Permit&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, here are my questions:&lt;/P&gt;&lt;P&gt;1) Are FlexConnect ACL changes applied immediately, or do I need to do something to update AP configurations so they will take effect?&lt;/P&gt;&lt;P&gt;2) Am I looking in the correct place to see that this ACL is being applied to VLAN 970 clients?&lt;/P&gt;&lt;P&gt;3) Where might alternative ACLs be coming from? My understanding is that ISE might be able to deliver a AAA override ACL on a per client basis. I might be completely misunderstanding this concept.&lt;/P&gt;&lt;P&gt;My confusion mostly stems from believing I have found the ACL responsible for blocking the printer traffic, but also finding that my changes are not allowing the traffic.&lt;/P&gt;&lt;P&gt;Thanks again for taking the time to read and for any help you might be able to provide. Jumping into this has felt like trying to untangle a big knot.&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Cameron&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 18:34:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/acl-wlc-ise-question/m-p/4015826#M4647</guid>
      <dc:creator>stelker77</dc:creator>
      <dc:date>2021-07-05T18:34:40Z</dc:date>
    </item>
    <item>
      <title>Re: ACL / WLC / ISE Question</title>
      <link>https://community.cisco.com/t5/wireless/acl-wlc-ise-question/m-p/4015881#M4648</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;Flex acl is the right place if your ssid is locally switched. &lt;BR /&gt;Your AP can be in flexconnect but your ssid could be in central or local switching (on the advanced tab of the ssid at the bottom left, there's a checkbox to make the ssid centrally switched).&lt;BR /&gt;After you modified your acl, client has to disconnect and reconnect.&lt;BR /&gt;&lt;BR /&gt;On ISE, is any acl pushed dynamically? If so maybe you're modifying the wrong acl.&lt;BR /&gt;&lt;BR /&gt;On your wlc, on the home tab, under client menu (left menu), you can see your client and if you click on the mac address you'll view all details like the acl being applied. Can you verify that you have the correct acl?</description>
      <pubDate>Wed, 22 Jan 2020 04:48:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/acl-wlc-ise-question/m-p/4015881#M4648</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2020-01-22T04:48:53Z</dc:date>
    </item>
    <item>
      <title>Re: ACL / WLC / ISE Question</title>
      <link>https://community.cisco.com/t5/wireless/acl-wlc-ise-question/m-p/4016659#M4649</link>
      <description>&lt;P&gt;Hey&amp;nbsp;Francesco,&lt;/P&gt;&lt;P&gt;Thank you very much for taking the time to read and reply.&lt;/P&gt;&lt;P&gt;We did reauthenticate the test client to the SSID after making the ACL change, even going as far as rebooting the client (which is a Chromebook)&lt;/P&gt;&lt;P&gt;I have discovered something in investigating to find the answers to your questions. There are two WLAN profiles which reference a WLAN SSID name of "workstation". One of the profiles is named "Wireless Data", the other is named "Wireless_Data_ISE".&amp;nbsp;&lt;/P&gt;&lt;P&gt;"Wireless Data" advanced settings:&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="wireless_data_advanced_settings.PNG" style="width: 276px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/65725i670E35AC9070E4F9/image-size/large?v=v2&amp;amp;px=999" role="button" title="wireless_data_advanced_settings.PNG" alt="wireless_data_advanced_settings.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;"Wireless_Data_ISE" advanced settings:&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="wireless_data_ise_advanced_settings.PNG" style="width: 298px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/65726i095887C44034A8D4/image-size/large?v=v2&amp;amp;px=999" role="button" title="wireless_data_ise_advanced_settings.PNG" alt="wireless_data_ise_advanced_settings.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I think this means the SSID is not centrally switched.&lt;/P&gt;&lt;P&gt;Another thing I have noticed is that "Wireless_Data_ISE" has "Allow AAA Override" checked on the Advanced tab, while "Wireless Data" does not.&lt;/P&gt;&lt;P&gt;There is an "INTERNET_ONLY" ACL in ISE, but it does not have permit statements for the few web servers that are working like the ACLs in the WLC have. ISE INTERNET_ONLY ACL:&lt;/P&gt;&lt;P&gt;permit udp any eq bootpc any eq bootps&lt;BR /&gt;permit udp any any eq domain&lt;BR /&gt;permit tcp any host [ISEserver1] eq 8443&lt;BR /&gt;permit tcp any host [ISEserver2] eq 8443&lt;BR /&gt;deny ip any 10.0.0.0 0.255.255.255&lt;BR /&gt;deny ip any 172.16.0.0 0.15.255.255&lt;BR /&gt;deny ip any 192.168.0.0 0.0.255.255&lt;BR /&gt;permit ip any any&lt;/P&gt;&lt;P&gt;For "BYOD", which is the Authorization Profile Result that ISE is matching the client with when we cannot print, under common tasks, only the VLAN option is checked, with "970" in the field. DACL Name is not checked. For "DPS_Workstation", which is the Authorizatoin Profile Result that ISE is matching the client with when we can print, only the VLAN option is checked, with "960" in the field. DACL Name is also not checked.&lt;/P&gt;&lt;P&gt;Here are the ISE Authorization/Authentication results:&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ise_authentications.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/65729i7410737280638344/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise_authentications.PNG" alt="ise_authentications.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you check out the bottom two rows, the "DPS_OSX" authorization policy association is allowed to print and send other traffic, while the "BYOD" authorization policy is not. I think "DPS_OSX" is really just a MAB whitelist of MAC addresses--when we add the client to that list, we get the "DPS_OSX" treatment. Correction: DPS_OSX is the Identity Group where we define which MAC addresses belong to that group. I find ISE to be a bit confusing and haven't worked out all the pieces yet.&lt;/P&gt;&lt;P&gt;We will try to check the ACL being applied to the client ASAP. I am not on site this week so I am working with my colleague to gather info.&lt;/P&gt;&lt;P&gt;Thank you again for taking the time to help!&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Cameron&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2020 00:54:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/acl-wlc-ise-question/m-p/4016659#M4649</guid>
      <dc:creator>stelker77</dc:creator>
      <dc:date>2020-01-23T00:54:10Z</dc:date>
    </item>
    <item>
      <title>Re: ACL / WLC / ISE Question</title>
      <link>https://community.cisco.com/t5/wireless/acl-wlc-ise-question/m-p/4017352#M4650</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;AAA Override is needed when using radius to be able to change attributes based on client authentication.&lt;/P&gt;
&lt;P&gt;On your acl, if it's to only allow internet access without portal authentication/onboarding, the 2 lines for ISE allowing port 8443 are useless.&lt;/P&gt;
&lt;P&gt;The ACL is in ISE right? it's a dACL. On your authorization profile, you have a field airespace_acl which is the name of the ACL hosted on the WLC if any ACL is being pushed. DACL aren't working with wireless. The name of ACL is referring to an acl configured on your wlc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When the user is authenticated, on your wlc, on the client details, you'll see which acl is being applied and this is the one you need to modify.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2020 20:41:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/acl-wlc-ise-question/m-p/4017352#M4650</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2020-01-23T20:41:53Z</dc:date>
    </item>
    <item>
      <title>Re: ACL / WLC / ISE Question</title>
      <link>https://community.cisco.com/t5/wireless/acl-wlc-ise-question/m-p/4018762#M4651</link>
      <description>&lt;P&gt;Hi Francesco,&lt;/P&gt;&lt;P&gt;Thank you again for responding.&lt;/P&gt;&lt;P&gt;I had not noticed the "Airespace ACL Name" option before. However, it is not checked for either of the relevant Authorization Profiles.&lt;/P&gt;&lt;P&gt;I am back onsite today and can do further testing. I am seeing the following for my test client:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="security_settings_for_client.PNG" style="width: 358px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/65942i54B1D213C54C89D3/image-size/large?v=v2&amp;amp;px=999" role="button" title="security_settings_for_client.PNG" alt="security_settings_for_client.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Hopefully this means more to you than it does to me. It doesn't seem too helpful at first glance. The client has been authenticated for several minutes at this point so I would think all relevant information would have time to update.&lt;/P&gt;&lt;P&gt;Compare that to a VLAN 960 client, who has authenticated the same way, but has been placed into VLAN 960 due to its MAC address being in DPS_OSX group in ISE:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="security_settings_for_client_vlan960.PNG" style="width: 384px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/65943iFF1C01638BDD7EAD/image-size/large?v=v2&amp;amp;px=999" role="button" title="security_settings_for_client_vlan960.PNG" alt="security_settings_for_client_vlan960.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;It shows that the IPv4 ACL is applied and active and FlexConnect ACL are applied and active. I am going to poke around in ISE some more for now since I am starting to think that the ACL being applied to the clients is actually hosted there...somewhere.&lt;/P&gt;&lt;P&gt;Any and all help or insight is appreciated--thank you.&lt;/P&gt;&lt;P&gt;Cameron&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2020 13:58:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/acl-wlc-ise-question/m-p/4018762#M4651</guid>
      <dc:creator>stelker77</dc:creator>
      <dc:date>2020-01-27T13:58:47Z</dc:date>
    </item>
    <item>
      <title>Re: ACL / WLC / ISE Question</title>
      <link>https://community.cisco.com/t5/wireless/acl-wlc-ise-question/m-p/4018786#M4652</link>
      <description>&lt;P&gt;Just adding some more info here...I am back to thinking that ISE is not providing the ACL via AAA override based on these authentication results taken from ISE, which, as far as I understand it, should show if an ACL is being provided via RADIUS:&lt;/P&gt;&lt;P&gt;Overview&lt;BR /&gt;Event 5200 Authentication succeeded&lt;BR /&gt;Username test_user&lt;BR /&gt;Endpoint Id 06:5C:D4:29:37:8C&lt;BR /&gt;Endpoint Profile&lt;BR /&gt;Authentication Policy Wireless &amp;gt;&amp;gt; Dot1X &amp;gt;&amp;gt; Default&lt;BR /&gt;Authorization Policy Wireless &amp;gt;&amp;gt; BYOD&lt;BR /&gt;Authorization Result BYOD&lt;/P&gt;&lt;P&gt;Authentication Details&lt;BR /&gt;Source Timestamp 2020-01-27 08:04:04.936&lt;BR /&gt;Received Timestamp 2020-01-27 08:04:04.937&lt;BR /&gt;Policy Server isepan01&lt;BR /&gt;Event 5200 Authentication succeeded&lt;BR /&gt;Failure Reason&lt;BR /&gt;Resolution&lt;BR /&gt;Root cause&lt;BR /&gt;Username test_user&lt;BR /&gt;User Type&lt;BR /&gt;Endpoint Id 06:5C:D4:29:37:8C&lt;BR /&gt;Endpoint Profile&lt;BR /&gt;IP Address&lt;BR /&gt;Authentication Identity Store AD1&lt;BR /&gt;Identity Group&lt;BR /&gt;Audit Session Id 2bc819ac019c1e93c4df2e5e&lt;BR /&gt;Authentication Method dot1x&lt;BR /&gt;Authentication Protocol PEAP (EAP-MSCHAPv2)&lt;BR /&gt;Service Type Framed&lt;BR /&gt;Network Device company_name-WLC_43&lt;BR /&gt;Device Type All Device Types#Wireless Controllers&lt;BR /&gt;Location All Locations#company_name&lt;BR /&gt;NAS IP Address 172.25.200.43&lt;BR /&gt;NAS Port Id&lt;BR /&gt;NAS Port Type Wireless - IEEE 802.11&lt;BR /&gt;Authorization Profile BYOD&lt;BR /&gt;Posture Status&lt;BR /&gt;Security Group&lt;BR /&gt;Response Time 9&lt;/P&gt;&lt;P&gt;Other Attributes&lt;BR /&gt;ConfigVersionId 36&lt;BR /&gt;DestinationPort 1812&lt;BR /&gt;Protocol Radius&lt;BR /&gt;NAS-Port 8&lt;BR /&gt;Framed-MTU 1300&lt;BR /&gt;State 37CPMSessionID=2bc819ac019c1e93c4df2e5e;37SessionID=isepan01/364781611/28154874;&lt;BR /&gt;Acct-Session-Id 5e2edfc4/06:5c:d4:29:37:8c/32432860&lt;BR /&gt;Tunnel-Type (tag=0) VLAN&lt;BR /&gt;Tunnel-Medium-Type (tag=0) 802&lt;BR /&gt;Tunnel-Private-Group-ID (tag=0) 960&lt;BR /&gt;undefined-89 +&lt;BR /&gt;undefined-131&lt;BR /&gt;Airespace-Wlan-Id 17&lt;BR /&gt;AcsSessionID isepan01/364781611/28154874&lt;BR /&gt;SelectedAuthenticationIdentityStores AD1&lt;BR /&gt;SelectedAuthenticationIdentityStores Internal Users&lt;BR /&gt;SelectedAuthenticationIdentityStores Internal Endpoints&lt;BR /&gt;AuthorizationPolicyMatchedRule BYOD&lt;BR /&gt;CPMSessionID 2bc819ac019c1e93c4df2e5e&lt;BR /&gt;EndPointMACAddress 06-5C-D4-29-37-8C&lt;BR /&gt;ISEPolicySetName Wireless&lt;BR /&gt;AllowedProtocolMatchedRule Dot1X&lt;BR /&gt;IdentitySelectionMatchedRule Default&lt;BR /&gt;AD-Domain company_name_domain.local&lt;BR /&gt;AD-User-Candidate-Identities test_user@company_name_domain.local&lt;BR /&gt;AD-User-Join-Point company_name_domain.LOCAL&lt;BR /&gt;AD-User-Resolved-DNs CN=test_user,OU=Employees,OU=People,DC=company_name_domain,DC=local&lt;BR /&gt;AD-Groups-Names company_name_domain.local/IAM Groups/company_name-Staff/District/281-ITD/ACS Full Access&lt;BR /&gt;AD-Groups-Names company_name_domain.local/Groups/Domain Users&lt;BR /&gt;AD-Groups-Names company_name_domain.local/IAM Groups/company_name-Apps/ISE-Admins&lt;BR /&gt;Main Main#company_name&lt;BR /&gt;Location Location#All Locations#company_name&lt;BR /&gt;Device Type Device Type#All Device Types#Wireless Controllers&lt;BR /&gt;IdentityAccessRestricted false&lt;BR /&gt;AD ExternalGroups S-1-5-21-1198204733-3122656313-790680861-329297&lt;BR /&gt;AD ExternalGroups S-1-5-21-1198204733-3122656313-790680861-513&lt;BR /&gt;AD ExternalGroups S-1-5-21-1198204733-3122656313-790680861-323820&lt;BR /&gt;RADIUS Username test_user&lt;BR /&gt;NAS-Identifier company_name-WLC-43&lt;BR /&gt;Device IP Address 172.25.200.43&lt;BR /&gt;Called-Station-ID dc-a5-f4-64-e0-e0:workstation&lt;BR /&gt;CiscoAVPair audit-session-id=2bc819ac019c1e93c4df2e5e,&lt;BR /&gt;mDNS=true&lt;BR /&gt;&lt;BR /&gt;Result&lt;BR /&gt;State ReauthSession:2bc819ac019c1e93c4df2e5e&lt;BR /&gt;Class CACS:2bc819ac019c1e93c4df2e5e:isepan01/364781611/28154874&lt;BR /&gt;Tunnel-Type (tag=1) VLAN&lt;BR /&gt;Tunnel-Medium-Type (tag=1) 802&lt;BR /&gt;Tunnel-Private-Group-ID (tag=1) 970&lt;BR /&gt;MS-MPPE-Send-Key ****&lt;BR /&gt;MS-MPPE-Recv-Key ****&lt;BR /&gt;LicenseTypes 1&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2020 14:37:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/acl-wlc-ise-question/m-p/4018786#M4652</guid>
      <dc:creator>stelker77</dc:creator>
      <dc:date>2020-01-27T14:37:14Z</dc:date>
    </item>
    <item>
      <title>Re: ACL / WLC / ISE Question</title>
      <link>https://community.cisco.com/t5/wireless/acl-wlc-ise-question/m-p/4019201#M4653</link>
      <description>ISE doesn't push any acl that's right and confirmed by the screenshot. &lt;BR /&gt;&lt;BR /&gt;As you're running in flexconnect mode, have you verified if any acl was configured on the svi? Or does this vlan goes through a firewall?&lt;BR /&gt;Can you post the current flexconnect acl and the ssid/flexconnect group config?</description>
      <pubDate>Tue, 28 Jan 2020 02:40:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/acl-wlc-ise-question/m-p/4019201#M4653</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2020-01-28T02:40:18Z</dc:date>
    </item>
    <item>
      <title>Re: ACL / WLC / ISE Question</title>
      <link>https://community.cisco.com/t5/wireless/acl-wlc-ise-question/m-p/4019632#M4654</link>
      <description>&lt;P&gt;Well, after rebooting the WLC and the AP last night, the ACL seems to be working as intended now. I am able to print (TCP Destination Port 631) and ping (ICMP) from VLAN 970 this morning on my test device, and another site has just confirmed that printing is working for them as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At least I learned a few things on my way to the reboot. My understanding is that FlexConnect ACL changes should take effect rather instantaneously, as long as the client re-authenticates.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much for taking the time to help and take care.&lt;/P&gt;&lt;P&gt;Cameron&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2020 16:00:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/acl-wlc-ise-question/m-p/4019632#M4654</guid>
      <dc:creator>stelker77</dc:creator>
      <dc:date>2020-01-28T16:00:22Z</dc:date>
    </item>
    <item>
      <title>Re: ACL / WLC / ISE Question</title>
      <link>https://community.cisco.com/t5/wireless/acl-wlc-ise-question/m-p/5149145#M273689</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/321306"&gt;@Francesco Molino&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;While in the dot1x implementation, Cisco ISE as radius Servers,&amp;nbsp; APs as MAB , I am trying to have APs communicate to network devices , it needs to.&lt;/P&gt;&lt;P&gt;Q#1&amp;nbsp; dACL is defined in ISE and gets assigned as per radius logs and "Essential license" gets consumed. The authentication and authorization is successful, however, there is no IP assigned to the access point in closed mode.&lt;/P&gt;&lt;P&gt;On the other hand, IP gets assigned in Monitor mode.&amp;nbsp; ACL remains same .&lt;/P&gt;&lt;P&gt;Followed this document and created ACL table 5&amp;nbsp; &amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless/5500-series-wireless-controllers/113344-cuwn-ppm.html" target="_blank"&gt;Understand Unified Wireless Network Protocol (CUWN WLC) and Port Matrix - Cisco&lt;/A&gt;&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless/5500-series-wireless-controllers/113344-cuwn-ppm.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/wireless/5500-series-wireless-controllers/113344-cuwn-ppm.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;permit udp any eq 68 any eq 67&lt;BR /&gt;permit udp any any eq 53&lt;BR /&gt;permit ip any (WLC Host)&lt;BR /&gt;permit ip host WLC any&lt;BR /&gt;permit ip any x.x.x.x (radius server)&lt;BR /&gt;permit icmp any any&lt;BR /&gt;deny ip any any&lt;/P&gt;&lt;P&gt;Can you please help , why IP is not getting assigned in closed mode and the purpose is the AP should access necessary devices access for (device authentication essentially) .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2024 15:28:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/acl-wlc-ise-question/m-p/5149145#M273689</guid>
      <dc:creator>Mukesh-Kumar</dc:creator>
      <dc:date>2024-07-23T15:28:06Z</dc:date>
    </item>
  </channel>
</rss>

