Downloadable ACL
Location in GUI: Work Centers » Network Access » Policy Elements » Results » Downloadable ACLs
Diagram
Section titled “Diagram”Classes
Section titled “Classes”policy_elements (ise.network_access)
Section titled “policy_elements (ise.network_access)”| Name | Type | Constraint | Mandatory | Default Value |
|---|---|---|---|---|
| downloadable_acls | List | [downloadable_acls] | No |
downloadable_acls (ise.network_access.policy_elements)
Section titled “downloadable_acls (ise.network_access.policy_elements)”| Name | Type | Constraint | Mandatory | Default Value |
|---|---|---|---|---|
| name | String | Regex: ^[\w\d_\-\. ]+$ | Yes | |
| description | String | No | ||
| dacl_type | Choice | IPV4, IPV6, IP_AGNOSTIC | No | IPV4 |
| dacl_content | String | Yes |
Examples
Section titled “Examples”Example-1 Network Access Downloadable ACL with IPv4 Restriction to Single Host
This example demonstrates a Cisco ISE network access downloadable ACL (DACL) configured to provide highly restrictive IPv4 network access. The DACL “DACL1” is defined with dacl_type set to IPV4 and contains two access control entries: the first rule permits IP traffic from any source to a single destination host at 192.168.1.1, while the second rule denies all other IP traffic with an implicit deny-all statement.
ise: network_access: policy_elements: downloadable_acls: - name: DACL1 description: My dacl dacl_type: IPV4 dacl_content: | permit ip any host 192.168.1.1 deny ip any anyExample-2 Network Access Downloadable ACL for Guest Internet with Private Network Exclusion
This example demonstrates a Cisco ISE downloadable ACL configured for guest network access with internet-only connectivity while blocking internal corporate resources. The DACL “Guest_Internet_Only” uses dacl_type IPV4 and implements a security policy that permits essential internet services including DNS resolution (UDP port 53), web browsing (TCP ports 80, 443, and 8080 for HTTP, HTTPS, and alternate HTTP), while explicitly denying access to all RFC 1918 private IP address ranges: 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. The final permit statement allows all remaining IP traffic, effectively granting unrestricted internet access while preventing lateral movement into internal corporate networks.
ise: network_access: policy_elements: downloadable_acls: - name: Guest_Internet_Only description: Guest access with internet only, no internal network access dacl_type: IPV4 dacl_content: | permit udp any any eq 53 permit tcp any any eq 80 permit tcp any any eq 443 permit tcp any any eq 8080 deny ip any 10.0.0.0 0.255.255.255 deny ip any 172.16.0.0 0.15.255.255 deny ip any 192.168.0.0 0.0.255.255 permit ip any anyExample-3 Network Access Downloadable ACL for VoIP Phone Communication and Management
This example demonstrates a Cisco ISE downloadable ACL configured specifically for IP phone network access, enabling voice communication and device management services. The DACL “VoIP_Phone_Access” uses dacl_type IPV4 and implements a comprehensive policy that permits Cisco Unified Communications Manager signaling to the voice subnet 10.100.0.0/16 on port 2000 and TCP ports 16384-32767, allows Real-Time Protocol (RTP) media streams on UDP ports 16384-32767 for voice and video transmission, and enables phone provisioning and management through HTTP (port 80), HTTPS (port 443), Cisco IP phone services (port 6970), TFTP for configuration downloads (UDP port 69), DNS resolution (UDP port 53), and NTP time synchronization (UDP port 123). ICMP is permitted for network troubleshooting and reachability testing, with a final explicit deny blocking all other traffic.
- name: VoIP_Phone_Access description: Voice VLAN and call manager access for IP phones dacl_type: IPV4 dacl_content: | permit tcp any 10.100.0.0 0.0.255.255 eq 2000 permit tcp any 10.100.0.0 0.0.255.255 range 16384 32767 permit udp any any range 16384 32767 permit tcp any any eq 443 permit tcp any any eq 80 permit tcp any any eq 6970 permit udp any any eq 53 permit udp any any eq 69 permit udp any any eq 123 permit icmp any any deny ip any anyLocation in GUI: Work Centers » Network Access » Policy Elements » Results » Downloadable ACLs
Diagram
Section titled “Diagram”Classes
Section titled “Classes”policy_elements (ise.network_access)
Section titled “policy_elements (ise.network_access)”| Name | Type | Constraint | Mandatory | Default Value |
|---|---|---|---|---|
| downloadable_acls | List | [downloadable_acls] | No |
downloadable_acls (ise.network_access.policy_elements)
Section titled “downloadable_acls (ise.network_access.policy_elements)”| Name | Type | Constraint | Mandatory | Default Value |
|---|---|---|---|---|
| name | String | Regex: ^[\w\d_\-\. ]+$ | Yes | |
| description | String | No | ||
| dacl_type | Choice | IPV4, IPV6, IP_AGNOSTIC | No | IPV4 |
| dacl_content | String | Yes |
Examples
Section titled “Examples”ise: network_access: policy_elements: downloadable_acls: - name: DACL1 description: My dacl dacl_type: IPV4 dacl_content: permit ip any anyLocation in GUI: Work Centers » Network Access » Policy Elements » Results » Downloadable ACLs
Diagram
Section titled “Diagram”Classes
Section titled “Classes”policy_elements (ise.network_access)
Section titled “policy_elements (ise.network_access)”| Name | Type | Constraint | Mandatory | Default Value |
|---|---|---|---|---|
| downloadable_acls | List | [downloadable_acls] | No |
downloadable_acls (ise.network_access.policy_elements)
Section titled “downloadable_acls (ise.network_access.policy_elements)”| Name | Type | Constraint | Mandatory | Default Value |
|---|---|---|---|---|
| name | String | Regex: ^[\w\d_\-\. ]+$ | Yes | |
| description | String | No | ||
| dacl_type | Choice | IPV4, IPV6, IP_AGNOSTIC | No | IPV4 |
| dacl_content | String | Yes |
Examples
Section titled “Examples”ise: network_access: policy_elements: downloadable_acls: - name: DACL1 description: My dacl dacl_type: IPV4 dacl_content: permit ip any anyLocation in GUI: Work Centers » Network Access » Policy Elements » Results » Downloadable ACLs
Diagram
Section titled “Diagram”Classes
Section titled “Classes”policy_elements (ise.network_access)
Section titled “policy_elements (ise.network_access)”| Name | Type | Constraint | Mandatory | Default Value |
|---|---|---|---|---|
| downloadable_acls | List | [downloadable_acls] | No |
downloadable_acls (ise.network_access.policy_elements)
Section titled “downloadable_acls (ise.network_access.policy_elements)”| Name | Type | Constraint | Mandatory | Default Value |
|---|---|---|---|---|
| name | String | Regex: ^[\w\d_\-\. ]+$ | Yes | |
| description | String | No | ||
| dacl_type | Choice | IPV4, IPV6, IP_AGNOSTIC | No | IPV4 |
| dacl_content | String | Yes |
Examples
Section titled “Examples”ise: network_access: policy_elements: downloadable_acls: - name: DACL1 description: My dacl dacl_type: IPV4 dacl_content: permit ip any any