11-15-2024 07:39 AM
Hi;
Consider the following scenario:
Here is the configuration applied under the interface:
The client boots up and successful authenticates by 802.1X:
Now, the verification steps:
Why the switch applies the highlited ACE from its point o view.
My current environment:
Thanks
Solved! Go to Solution.
11-29-2024 12:07 AM - edited 11-29-2024 12:15 AM
Based on my findings, consider the following statement:
The “access-session acl default passthrough” and its old counterpart “epm access-control open” command are used for hosts without an authorization policy to access ports configured with a dACL. Let’s say that you have several different types of devices connecting to the same interface and some devices are configured to get dACL from ISE while some are not. For instance, you may configure dACL for PC while no dACL is used for IP Phones. As you test different devices on the network you notice that when you connect a PC behind the IP phone, the IP phone loses connectivity to voice gateway until you unplug the PC. You suspect the dACL so you temporarily change the PC dACL to “permit ip any any” to ensure access from any devices on the port, but the problem persists. Then you decide to use “permit ip any any” dACL for the IP phone as well, and now the IP phone does not get disconnected from the voice gateway when the PC is connected behind it. This is also true when a hub is used to authenticate multiple devices behind a single switch interface. If you have devices already connected and authenticated via hub without dACL and a new device connects with a dACL, then all the previously connected devices will lose connectivity to the network as the dACL is only permitted from the endpoint assigned to it and not for the other endpoints on the same interface. There are two main options to address this. One option is to ensure dACL is applied to every permission that will be sharing the same physical port or simply run the following global command, which will dynamically insert “permit ip host x.x.x.x any” in case there is no ACL attached to the session and another device is being connected to the same port with a dACL.
Now consider the following scenario:
As you can see in the above figure, the VM is configured to use 802.1X authentication with a dACL applied to the Interface f0/1 if the authentication is successful. And the physical machine (hosting the VM) is not configured with 802.1X and so the switch uses MAB for it. In this case, after successful MAB authentication, ISE just sends the switch RADIUS Access-Accept message without any authorization policy like dACL. Below is the current fast 0/1 configuration:
The mentioned dACL is configured as follow:
Now, I powered on the both systems and as you can see below, both of them have successfully passed authentication:
Then:
Conclusion: This operation is by design to prevent any situations from occurring for applying a dACL for a session prevents traffic for other session without dACL.
11-18-2024 01:22 PM
I'll hazard a guess here and say it's buggy (IOS 15.0 ... ouch!) - because in every switch that I have checked, once the dACL is applied, the interface ACL is overridden completely - in my case (Low Impact Mode) I have a pre-auth ACL applied on the interface - when I show ip access-lst int x/y/z, all I see is the contents of the pre-auth ACL - it does not include the dACL entries.
11-23-2024 01:32 AM
Seems a bug as I rebooted the switch, everything worked as expected.
11-23-2024 02:26 AM - edited 11-28-2024 11:32 AM
check below
Debug epm all
To see what ISE push to SW' to more sure it not ISE issue but it SW issue
MHM
11-28-2024 11:32 AM
So Cisco mention that you can use mutli-Auth with User dACL
from cisco doc.
""More than one host can be authenticated on MDA-enabled and multiauth ports. The ACL policy applied for one host does not effect the traffic of another host. If only one host is authenticated on a multi-host port, and the other hosts gain network access without authentication, the ACL policy for the first host can be applied to the other connected hosts by specifying any in the source address.""
MHM
11-29-2024 12:07 AM - edited 11-29-2024 12:15 AM
Based on my findings, consider the following statement:
The “access-session acl default passthrough” and its old counterpart “epm access-control open” command are used for hosts without an authorization policy to access ports configured with a dACL. Let’s say that you have several different types of devices connecting to the same interface and some devices are configured to get dACL from ISE while some are not. For instance, you may configure dACL for PC while no dACL is used for IP Phones. As you test different devices on the network you notice that when you connect a PC behind the IP phone, the IP phone loses connectivity to voice gateway until you unplug the PC. You suspect the dACL so you temporarily change the PC dACL to “permit ip any any” to ensure access from any devices on the port, but the problem persists. Then you decide to use “permit ip any any” dACL for the IP phone as well, and now the IP phone does not get disconnected from the voice gateway when the PC is connected behind it. This is also true when a hub is used to authenticate multiple devices behind a single switch interface. If you have devices already connected and authenticated via hub without dACL and a new device connects with a dACL, then all the previously connected devices will lose connectivity to the network as the dACL is only permitted from the endpoint assigned to it and not for the other endpoints on the same interface. There are two main options to address this. One option is to ensure dACL is applied to every permission that will be sharing the same physical port or simply run the following global command, which will dynamically insert “permit ip host x.x.x.x any” in case there is no ACL attached to the session and another device is being connected to the same port with a dACL.
Now consider the following scenario:
As you can see in the above figure, the VM is configured to use 802.1X authentication with a dACL applied to the Interface f0/1 if the authentication is successful. And the physical machine (hosting the VM) is not configured with 802.1X and so the switch uses MAB for it. In this case, after successful MAB authentication, ISE just sends the switch RADIUS Access-Accept message without any authorization policy like dACL. Below is the current fast 0/1 configuration:
The mentioned dACL is configured as follow:
Now, I powered on the both systems and as you can see below, both of them have successfully passed authentication:
Then:
Conclusion: This operation is by design to prevent any situations from occurring for applying a dACL for a session prevents traffic for other session without dACL.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide