cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
696
Views
0
Helpful
1
Replies

Cisco ISE Dynamic VLAN with Microsoft AD

Kevin Raditheo
Level 1
Level 1

Hi all, 

I want to ask some questions. 

Currently I'm using Cisco ISE for dynamic vlan assignment based on group on AD. 

The problem I'm facing is, the user will only get IP address after they put username and password in dot1x supplicant. But sometimes, some user need to contact their domain controller for their windows login and this happens before the endpoint get an IP address. So the endpoint can't contact their DC. 

Any suggestions for this case? 

Thank you very much for your advice. 

1 Reply 1

Rahul Govindan
VIP Alumni
VIP Alumni

You can have a pre-auth ACL to allow certain traffic to the Domain controllers on those ports before the auth is complete. This can get tricky as the AD services use random ports in the high ranges 49152-65535 TCP and UDP for this service.

https://support.microsoft.com/en-us/help/179442/how-to-configure-a-firewall-for-domains-and-trusts

A suggested ACL on the interface is something like this:

ip access-list extended ACL-DFLT-LESS-RESTRICT
remark DHCP, DNS, ICMP
permit udp any eq bootpc any eq bootps !DHCP
permit udp any any eq domain !DNS
permit icmp any any !ICMP Ping
remark Allow Microsoft Ports (used for better login performance)
permit tcp any host <Domain Controller> eq 88 !Kerberos
permit udp any host <Domain Controller> eq 88 !Kerberos
permit udp any host <Domain Controller> eq 123 !NTP
permit tcp any host <Domain Controller> eq 135 !RPC
permit udp any host <Domain Controller> eq 137 !NetBIOS-Nameservice
permit tcp any host <Domain Controller> eq 139 !NetBIOS-SSN
permit tcp any host <Domain Controller> eq 389 !LDAP
permit udp any host <Domain Controller> eq 389 !LDAP
permit tcp any host <Domain Controller> eq 445 !MS-DC/SMB
permit tcp any host <Domain Controller> eq 636 !LDAP w/ SSL
permit udp any host <Domain Controller> eq 636 !LDAP w/ SSL
permit tcp any host <Domain Controller> range 49152-65535 !non-standard RPC
permit tcp any host <Domain Controller> range 49152-65535 !non-standard RPC
remark PXE / TFTP
permit udp any any eq tftp
remark Drop all the rest
deny ip any any log