Showing results for 
Search instead for 
Did you mean: 

Default denyaccess

Level 1
Level 1

Hello guys, I noticed that the default deny access ACL does not be (push) download on the interface from the Cisco ISE server. when a default rule on the authorization policy is matched with a denyAccess ACL. The device has an access on the network and also when I check which ACL is applied on the current device interface, we noticed that there is no ACL on the interface though the radius live logs show that the default rule is matched with a DenyAccess ACL. And on the switch with the sh authentication session interface Gy/x, we see that Dot1x and MAB are failed

1 Accepted Solution

Accepted Solutions

The issue was on the switch side

View solution in original post

8 Replies 8

Level 1
Level 1

That is expected behaviour, deny access means just that and no RADIUS attributes are honoured by the switch.

What is your standard port configuration? Do you have pre-auth ACL configured?

I have a default ACL configure on the port

ip access-list extended ACL-DEFAULT
 permit udp any eq bootpc any eq bootps
 permit udp any any eq domain
 permit ip any host
 permit ip any host
 deny   ip any any log
interface GigabitEthernet0/1
 description white cable
 switchport access vlan 3
 switchport mode access
 switchport voice vlan 2
 ip access-group ACL-DEFAULT in
 authentication event fail action next-method
 authentication event server alive action reinitialize 
 authentication host-mode multi-auth
 authentication open
 authentication order dot1x mab
 authentication priority dot1x mab
 authentication port-control auto
 authentication periodic
 authentication timer reauthenticate server
 authentication timer inactivity server
 snmp trap mac-notification change added
 snmp trap mac-notification change removed
 dot1x pae authenticator
 dot1x timeout quiet-period 15
 dot1x timeout tx-period 3
 spanning-tree portfast
 spanning-tree bpduguard enable
 ip dhcp snooping trust

Just to confirm, when you say that the device has network access, do you mean that the ACL-DEFAULT is not in effect, or do you just want the endpoint to have no network access at all - even more restrictive than the ACL-DEFAULT? In that case you would need to pass Access-Accept from ISE with dACL that denies all traffic. Switch would honour the dACL then, if it is passed in RADIUS Access-Accept message.

I just want the endpoint to have no network access at all, like deny ip any any on the current interface when the default rule matched.

OK, in that case just change the authorization profile to Access-Accept, and specify dACL that has deny ip any any. Generally in low impact mode, it is accepted that the services available with the pre-auth ACL are fine, even if the endpoint fails authentication, but if you would like to completely restrict access, this approach will work.

That is the issue because it is not working

And you definitely don't have any problems with dACLS being applied to the hosts that pass normal corporate auth for example (that is dACLS with permit ip any any)?

What is your ip device tracking config? And could you post the Attributes details section of your Authorization profile?

The issue was on the switch side

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: