The ACL below is configured on a cisco switch but not attached to anything on the Cisco switch.
The NAC will use this ACL as a dynamic ACL to secure the switchports when a client connects to it.
The result in the tests is the opposite of what you would expect.
The deny lines will be permitted and permit any any will block all the rest.
When you add something else with a deny statement in the list it will also be permitted.
Does anybody have any idea why?
following link describes what we had to do on the NAC solution to make the function work and there the inverted acl is used , but not explained why
https://community.arubanetworks.com/t5/Security/Cisco-URL-Redirect/td-p/202713
ip access-list extended Onboard_ACL
deny udp any any eq bootpc
deny udp any any eq bootps
deny tcp any host 10.233.128.15
deny tcp any host 10.233.128.13
deny tcp any host 10.233.128.14
deny udp any any eq domain
permit ip any any
Thank you