A network engineer is configuring the switch to accept downloadable ACLs from a Cisco ISE server. Which two commands should be run to complete the configuration? (Choose two.)
A.
radius-server attribute 8 include-in-access-req
B.
ip device tracking
C.
dot1x system-auth-control
D.
radius server vsa send authentication
E.
aaa authorization auth-proxy default group radius
vsa send vendor specific attribute and has nothing to do with CoA,
radius-server attribute 8 send the attribute to ISE and has nothing to do with the CoW or dACL
but the only 2 commands that has an impact are enabling dot1x globally "C" and device tracking which enable the switch to know the IP address of the endpoints connected to its port which will have impact on the dACL. "B and C"
For me the two answers are dot1x enable globally and the device ip tracking command.
If i don't have dot1x enabled my switch will simply does not use the dot1x feature.
How a switch can download a dynamic acl from ISE if i do not enable the feature that permit to that client to authenticate via ISE and based on what result he got he will receive a result with a dACL?
the ip tracking device feature is enabled for this purpose: per-user ACL with any
SW use ip tracking to re-arrange the ACL to add instead of any to host IP.
What this means is that the device ip tracking command let the switch modify that specific acl with the host ip address /32 address of the device that is connected to that port.
Answer is B and D
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_8021x/configuration/15-mt/sec-user-8021x-15-mt-book/sec-ieee-802x-acl-assign.html
Configuring Downloadable ACLs
To configure a switch to accept downloadable ACLs or redirect URLs from the RADIUS server during authentication of an attached host, perform this task.
SUMMARY STEPS
1. enable
2. configure terminal
3. ip device tracking
4. aaa new-model
5. aaa authorization network default group radius
6. radius-server vsa send authentication
7. interface interface-id
8. ip access-group acl-id in
9. end
10. show running-config interfaceinterface-id
11. copy running-config startup-config
Ok, but first you must enable Dot1x globally to make it work.
So C) "dot1x system-auth-control" has higher preference than sending vendor-specific VSA attributes, which are anyway enabled by default.
"Step 5. Enable vendor-specific attributes (VSAs) on the switch (which may be enabled by default on the switch already):
C9300(config)# radius-server vsa send authentication
C9300(config)# radius-server vsa send accounting
"
The correct answers are.
radius-server attribute 8 include-in-access-req and
dot1x system-auth-control.
The radius-server attribute 8 include-in-access-req command tells the switch to include the RADIUS attribute 8 (user group membership) in the Access-Request packet that is sent to the RADIUS server. This attribute is used by the RADIUS server to determine which downloadable ACL to send to the switch.
The dot1x system-auth-control command enables 802.1X authentication on the switch. This is required for the switch to be able to accept downloadable ACLs from the RADIUS server.
B & D from documentation we have:
Configuring Downloadable ACLs
To configure a switch to accept downloadable ACLs or redirect URLs from the RADIUS server during authentication of an attached host, perform this task.
SUMMARY STEPS
1. enable
2. configure terminal
3. ip device tracking
4. aaa new-model
5. aaa authorization network default group radius
6. radius-server vsa send authentication
7. interface interface-id
8. ip access-group acl-id in
9. end
Talking about DACLs as per
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_8021x/configuration/15-mt/sec-user-8021x-15-mt-book/sec-ieee-802x-acl-assign.html
To configure a switch to accept downloadable ACLs from a Cisco ISE server, the following two commands are required:
B. ip device tracking: This command enables the switch to track IP device information, which is needed for the ISE server to provide dynamic access policies based on a device's IP address.
C. dot1x system-auth-control: This command enables 802.1X authentication on the switch and allows the switch to forward authentication requests to the ISE server.
Option B is correct because it enables the switch to track IP device information, which is required for the ISE server to provide dynamic access policies based on the IP address of the device. Without this command, the switch may not be able to provide the necessary device information to the ISE server for dynamic policy enforcement.
Option C is correct because it enables 802.1X authentication on the switch and allows the switch to forward authentication requests to the ISE server. This is required for the ISE server to authenticate users and authorize access based on the user's identity and the device's posture.
Created by ChatGPT so read with caution
My answer according to this documentation: "https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_8021x/configuration/15-mt/sec-user-8021x-15-mt-book/sec-ieee-802x-acl-assign.html"
I will change it to B and C. After I read this on the official book I think B&C are correct: "The
dot1x system-auth-control command allows for the any source in the provided dACL to be replaced with the IP address of the single device connected to the switch port."
B & C are correct.
A is not because it has nothing to do with dACL
D has been enabled by default since IOS 15.x
E is for enabling the Auth Proxy feature.
See SISE 300-715 Official Cert Guide, pg. 266.
Step 1. Enable dot1x Globally on the Switch
dot1x system-auth-control
Step 2. Enable dACLs to function by entering this command.
IP device tracking
An old document, from 2012, but if they are using this as reference then the answer is B and D.
Configuring Downloadable ACLs
To configure a switch to accept downloadable ACLs or redirect URLs from the RADIUS server during authentication of an attached host, perform this task.
SUMMARY STEPS
1. enable
2. configure terminal
3. ip device tracking
4. aaa new-model
5. aaa authorization network default group radius
6. radius-server vsa send authentication
7. interface interface-id
8. ip access-group acl-id in
9. end
10. show running-config interfaceinterface-id
11. copy running-config startup-config
https://www.cisco.com/en/US/docs/ios-xml/ios/sec_usr_8021x/configuration/15-2mt/sec-ieee-802x-acl-assign.html
Tested on lab on a catalyst switch. dACLs work with A,C commands enabled.
No ip device tracking, no vsa send authentication, no aaa authorization auth-proxy were enabled.
book says B & C. dACL requires ip device tracking and dot1x system-auth-control allows the any source in the dACL to be replaced with the IP of a single device connected to switchport p266
To configure a switch to accept downloadable ACLs or redirect URLs from the RADIUS server during authentication of an attached host, perform this task.
SUMMARY STEPS
3. ip device tracking
4. aaa new-model
5. aaa authorization network default group radius
6. radius-server vsa send authentication
B&C Downloadable access control lists (dACLs) are a very
common enforcement mechanism in ISE
deployments. In order for dACLs to function properly
on a switch, a function called IP device tracking
must be enabled globally. The dot1x system-authcontrol
command allows for the any source in the
provided dACL to be replaced with the IP address of
the single device connected to the switch port.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Natcat
Highly Voted 3 years, 5 months ago327c7c8
Most Recent 3 days, 6 hours agoXBfoundX
7 months, 3 weeks agoDarkArmy
9 months, 1 week agoNikoTomas
4 months, 1 week agofaridh
10 months, 3 weeks agodenverfly
1 year, 1 month agoSlavey
1 year, 2 months agoCnoteone
1 year, 3 months agoJimboOh
1 year, 3 months agoJimboOh
1 year, 3 months agoYmerG
1 year, 4 months agoYmerG
1 year, 4 months agotliz
1 year, 5 months agoRuss
1 year, 7 months agoaHash
1 year, 8 months agothesolarfederation
2 years agoAkiva
2 years, 9 months agoMrCalifornia
3 years, 3 months agomahmoud65446
3 years, 4 months ago