Showing results for 
Search instead for 
Did you mean: 

dACL issue on Catalyst 1000 Switches

Behzad Sharifi
Level 1
Level 1

I have a customer that have ISE enviorment with to kind of catalyst switches Cisco 9300 and Cisco Model: C1000-version IOS: 15.2(7)E3.

If they take a PC that is alowed to access their organisation and connect to the switchport on the Catalyst 9300 or C1000, the PC will be authenticated and the right dACL will be pushed to the Switch port. And so far this is fine. 
If then they try to diconnect the switch-port and try to connect an unauthrzed PC to the same ports on the 9300 and C1000 then the 

unauthorized PC will be assigned to Guest Vlan which is expected and fine. Here is my question. 
Regarurding to my customer it seems that the Catalyst 1000 keep the dACL remain on the interface even the port has been down and an unauthrzed PC has been connected to gust Vlan. Below here you can se the command that our customer has used on the Cisco 1000. 

#sh platform acl port-info interface gigabitEthernet 1/0/14-04-9
Port : Gi1/0/1
IPV4 : handle = 0x40B0C78
acl_name = RKSK-DEFAULT
dacl_name = EPM_xACSACLx-IP-PERMIT_ALL_TRAFFIC-4fe7f797
is_acl_dacl = 1
is_acl_ipsg = 0
is_Acl_webauth = 0
auth_proxy_vmr = 0x42FD680
overload_vmr_entries = 1
My question are:
  1. why we still seeing the dACL name EPM_xACSACLx-IP-PERMIT_ALL_TRAFFIC-4fe7f797
    even after the port has been disconnected and the new PC is connected to guest Vlan that should not have the dACL?
  2. Is this dACL still activ on the port ?
  3. Is this a kind of BUG that the dACL name still appiered on the interface?
    to be honest I can'nt either find the command " sh platform acl port-info interface X/X/X " on the Cisco
    Platform Command Reference, Cisco IOS Release 15.2(7)Ex (Catalyst 1000 Switches).

I don't have any Cisco 1000 in my test enviorment and I hope that someone can answare my questions. 

Thanks a lot




0 Replies 0