ACS - host restriction

Hello

How to restrict access to a specific host when a user connects via the VPN.

user account is mapped to ACS as external database (Active Directory - Win3K)

Download ACL works only with the local ACS database.

Help, please.

Thanks Ganesh for your help.

I am not clear with your steps.

Local ACS database users DACL is working.

For Windows AD users what steps I need to restrict for specific host and port.

Hi John,.

Users Windows AD would receive some ip once they are authenticated if outside these ip address pool configuring trusted ip address that can access ACS outside windows authenticated AD users ip address.

Go to the link below will share the stage to restrict the access to ACS using the selected ip address.

http://www.Cisco.com/en/us/docs/net_mgmt/cisco_secure_access_control_server_for_windows/4.0/user/guide/a.html#wp655148

Hope to help

Ganesh.H

Tags: Cisco Security

Similar Questions

  • WLC / ACS / AD - domain and laptops no - domain (802. 1 X / PEAP)

    Hi all

    I implement a solution based on 4404 WLC, 1113 ACS and Microsoft AD. What I want to achieve is to have two WIFI (SSID), that can be used by users on laptops of the domain, the other can be used by the users in the domain on personal laptops. Field portable computers will have full connectivity, but personal laptops will be restricted.

    I created the two SSID using 802. 1 X by ACS / Remote Agent and can authenticate and connection OK.

    I thought I should have user auth and auth machine for laptops of area but just user auth for personal laptops.

    I have unauthenticated machines go to one group ACS or blocked, but I need to enable them in if they are on the SSID restricted. I can't quite understand how to have two SSID is authenticating with the same ACS / AD - one green and the other.

    I'm on the right track?

    Anyone done this before or have any bright ideas?

    See you soon,.

    John

    With the use of WLAN access based on the SSID, users can be authenticated based on the SSID they use to connect to the WLAN. The Cisco Secure ACS server is used to authenticate users. Authentication happens in two stages on the Cisco Secure ACS:

    1 authentication EAP

    2 resulting SSID authentication of network (NARS) on Cisco Secure ACS Access Restrictions

    For the new designation and configuraiton following URL can help you:

    http://www.Cisco.com/en/us/Tech/tk722/tk809/technologies_configuration_example09186a00807669af.shtml

  • ACS 5.3 user authorization based on MAC address

    Hi all

    I hope someone can help me more.

    A short background. Our company SSID is being migrated to use PEAPv0 to EAP - TLS. This limits access only to the books of the company. In addition, we have bar codes scanners used to inventory assets. These devices are not able to use EAP - TLS as they can not be integrated in the field and be unable to make the certificate-based authentication.

    As a solution, we are planning to use a different SSID with access to the same network, but using PEAPv0 as authentication, basically the same SSID but with a different name. As this naturally allows anyone to access the corporate network with a name of user and password valid now, I wanted to add another step in the process of authentication - MAC of the device.

    I know I can do the filtering on the WLAN controller, but as it has a database limited as well as the fact that it is difficult to keep the MAC list on all the controllers of I thought I can do this on our ACS system.

    I am now trying to accomplish the following:

    The user is authenticated via the store of internal users, that is successful. Now, I want to allow the user via the MAC address, which is stored in the internal of the ACS host store, whether access is allowed or not.

    To do this, I created the following strategy:

    Service selection policy-(result rule based selection)

    --(NDG:Device Type dans tous les appareil type: sans fil et RAYON-IETF: Called-Station-ID contient ) | Result: PEAP access

    -Default | Result: DenyAccess

    PEAP access service

    Identity: Internal users-(selection of single result)

    Authorization-(result rule based selection)

    -Host: HostIdentityGroup internal in all groups: Valid_MACs

    When I then try to access the wireless network I don't get authenticated. The error I get when I look in the logs:

    15039 selected authorization profile is DenyAccess

    Is it not possible to use an identity as "attribute based" store to the other identity store?

    Kind regards

    Patrick

    This can use an end station filter

    define the elements of policy > Session Conditions > network Conditions > end Station filters

    Can define a list of MAC addresses; can be imported and exported from a file

    To include in the policy authoirzation; customize the authorization policy to include the status of "End Station filter" and select the object end Station filter defined that you just set

  • RADIUS does not pray attribute filling 4 (NAS-IP-Address)

    I'm trying to get a Cisco 3120 G configured for RADIUS authentication.  I have a lot of other IOS devices with identical configuration of work lines, however, it gives me a hard time.  The strategy of the RADIUS server is configured by NAS-IP-Address.  The configuration of the AAA and RADIUS is as follows:

    AAA new-model
    AAA authentication login default local radius group
    AAA authorization exec default local radius group

    host 10.x.x.x auth-port 1645 1646 RADIUS server acct-port
    Server RADIUS ports source-1645-1646
    Server RADIUS button 7 XXXXXXXXXXXXXX

    See the Flash following debugging information:

    indrc3120a #.
    000284: 8 Feb 14:05:15.447 PST: RADIUS: Pick NAS IP for you = 0x5992EF4 = 0 cfg_addr = 0.0.0.0 tableid
    000285: 8 Feb 14:05:15.447 PST: RADIUS: ustruct sharecount = 1
    000286: Feb 8 14:05:15.447 PST: RADIUS: success radius_port_info() = 1 radius_nas_port = 1
    000287: Feb 8 14:05:15.447 PST: RADIUS (00000000): send 10.x.x.x:1645 id 1645/8, len 84 access request
    000288: Feb 8 14:05:15.447 PST: RADIUS: authenticator 12 5th 7th DF 01 B5 F1 D8 - 40 07 09 76 88 C1 A4 C5
    000289: 8 Feb 14:05:15.447 PST: RADIUS: NAS-IP-Address [4] 6 0.0.0.0
    000290: 8 Feb 14:05:15.447 PST: RADIUS: NAS-Port [5] 6 2
    000291: Feb 8 14:05:15.447 PST: RADIUS: NAS-Port-Type [61] 6 virtual [5]
    000292: 8 Feb 14:05:15.447 PST: RADIUS: username [1] 13 "admin_user '.
    000293: 8 Feb 14:05:15.447 PST: RADIUS: Calling-Station-Id [31] 15 "10.y.y.y".
    000294: 8 Feb 14:05:15.447 PST: RADIUS: User-Password [2] 18 *.
    000295: 8 Feb 14:05:15.505 PST: RADIUS: receipt id 1645/8 10.x.x.x:1645, Access-Reject, len 20
    000296: 8 Feb 14:05:15.505 PST: RADIUS: authenticator 4th EC 8F AB BB 8th F9 BB - 13 67 56 A3 5F F9 99 94
    000297: Feb 8 14:05:15.505 PST: RADIUS: saved the data of permission for the user 5992EF4 to 0

    Note the NAS-IP-Address populated as 0.0.0.0 attribute

    Another switch with an identical Setup returns the following:

    tritc3120a #.
    350554: 8 Feb 14:11:00.916 PST: RADIUS / ENCODE (000155BC): ask "" user name: ".
    350555: 8 Feb 14:11:10.605 PST: RADIUS / ENCODE (000155BC): ask "" password: ".
    350556: 8 Feb 14:11:14.480 PST: RADIUS/ENCODE (000155BC): orig. component type = EXEC
    350557: 8 Feb 14:11:14.480 PST: RADIUS: AAA Attr not supported: interface [170] 4
    350558: 8 Feb 14:11:14.480 PST: RADIUS: 74 74 [tt]
    350559: 8 Feb 14:11:14.480 PST: RADIUS / ENCODE (000155BC): down the type of service, "radius attribute 6 sur-pour-login-auth server" is disabled
    350560: 8 Feb 14:11:14.480 PST: RADIUS (000155BC): Config NAS IP: 0.0.0.0
    350561: 8 Feb 14:11:14.480 PST: RADIUS / ENCODE (000155BC): acct_session_id: 87482
    350562: 8 Feb 14:11:14.480 PST: RADIUS (000155BC): send
    350563: 8 Feb 14:11:14.480 PST: RADIUS/ENCODE: Best 10.x.x.x address IP Local to the 10.y.y.y Radius Server
    350564: 8 Feb 14:11:14.480 PST: RADIUS (000155BC): send 10.y.y.y:1645 id 1645/222, len 90 access request
    350565: 8 Feb 14:11:14.480 PST: RADIUS: authenticator 5F B1 17 DF 72 4B 3D - B6 D8 5 85 66 B9 8 d 7 c A6
    350566: 8 Feb 14:11:14.480 PST: RADIUS: username [1] 13 "admin_user '.
    350567: 8 Feb 14:11:14.480 PST: RADIUS: User-Password [2] 18 *.
    350568: 8 Feb 14:11:14.480 PST: RADIUS: NAS-Port [5] 6 2
    350569: 8 Feb 14:11:14.480 PST: RADIUS: NAS-Port-Id [87] 6 'tty2 '.
    350570: 8 Feb 14:11:14.480 PST: RADIUS: NAS-Port-Type [61] 6 virtual [5]
    350571: 8 Feb 14:11:14.480 PST: RADIUS: Calling-Station-Id [31] 15 "10.z.z.z".
    350572: 8 Feb 14:11:14.480 PST: RADIUS: NAS-IP-Address [4] 6 1.2.3.4
    350573: 8 Feb 14:11:14.556 PST: RADIUS: receipt id 1645/222 10.y.y.y:1645, Access-Accept, len 83
    350574: 8 Feb 14:11:14.556 PST: RADIUS: authenticator 24 D9 F9 E2 BB A3 66 F6 - 73 E8 5 42 8 A5 17 DA
    350575: 8 Feb 14:11:14.556 PST: RADIUS: Type of Service [6] 6 Administrative [6]
    350576: 8 Feb 14:11:14.556 PST: RADIUS: [25] in class 32
    350577: 8 Feb 14:11:14.556 PST: RADIUS: 59 B1 6 06 00 00 01 37 00 01 0a 1st DC 18 01 CB C7 B8 D7 82 CA E2 00 00 00 00 00 00 00 0b [Ym7]
    350578: 8 Feb 14:11:14.556 PST: RADIUS: seller, Cisco [26] 25
    350579: 8 Feb 14:11:14.556 PST: RADIUS: Cisco-AVpair [1] 19 "shell: priv-lvl = 15.
    350580: 8 Feb 14:11:14.556 PST: RADIUS (000155BC): receipt of id 1645/222

    Note that in the above example, the NAS-IP-Address is feeding properly (I just the changed for security reasons)

    If anyone has any advice, it would be greatly appreciated.  Does the switch need a restart? Blow RADIUS server process?

    Thank you

    CSCdx27019">."

    Seems to be a bug,

    CSCdx27019    Pkt sent by CSS access RADIUS request contains no information NAS

    The feature of Cisco ACS NAR (restricted access network) with RADIUS does not work with CSS. This is because the radius NAS-IP-Address attribute is set to 0.0.0.0 in the Radius authentication request.

    Rgds, jousset

    Note the useful messages

  • ASA as a customer Radius in ACA

    Hi all

    I added ASA as Radius (version 8.0) client to the ACS (version 4.2) server. When I do "test the aaa authentication" on SAA and run 'debug RADIUS', I got this error message:

    aaa authentication ACS host 10.1.2.25 test test passwo username $
    INFO: Attempt to <10.1.2.25>IP address authentication test (timeout: 12 seconds)
    Ray mkreq: 0x6cb
    alloc_rip 0x29f79044
    new application 0x6cb--> 221 (0x29f79044)
    obtained the user 'test '.
    has obtained the password
    add_req 0x29f79044 0x6cb 221 session id
    RADIUS_REQUEST
    RADIUS.c: rad_mkpkt

    RADIUS packet decode (authentication request)

    --------------------------------------
    Data of raw packets (length = 62)...
    01 dd 00 3F 11 76 77 02 13 50 49 6f 7 c 4F 4 d e4 |  ... > .vw. M... PINo |
    05 5 a 8 b 68 01 06 74 65 73 74 02 12 11 ca 28 65 |  . Z.h.. test... (e
    A4 49 ee 8 a 76 46 29 10 3rd f9 3f 04 06 ac 1B 1f |  . I have... FV). >. ? .....
    FB 02 05 06 00 00 00 28 06 00 00 00 05 3d |  ....... (=.....

    Packet analyzed data...
    RADIUS: Code = 1 (0x01)
    RADIUS: Identifier = 221 (0xDD)
    RADIUS: Length = 62 (0x003E)
    RADIUS: Vector: 117677E44D021350494E6F7C055A8B68
    RADIUS: Type = 1 (0x01) - user name
    RADIUS: Length = 6 (0x06)
    RADIUS: Value (String) =
    74 65 73 74                                        |  test
    RADIUS: Type = 2 (0x02) username-password
    RADIUS: Length = 18 (0x12)
    RADIUS: Value (String) =
    11 ca 28 65 a4 49 ee 8 a 76 46 29 10 3rd f9 3f 1f |  .. (EI. FV). >. ?.
    RADIUS: Type = 4 NAS-IP-Address (0x04)
    RADIUS: Length = 6 (0x06)
    RADIUS: Value (IP address) = 172.27.251.2 (0xAC1BFB02)
    RADIUS: Type = 5 (0x05) NAS-Port
    RADIUS: Length = 6 (0x06)
    RADIUS: Value (Hex) = 0 x 28
    RADIUS: Type = 61 (0x3D) NAS-Port-Type
    RADIUS: Length = 6 (0x06)
    RADIUS: Value (Hex) = 0x5
    Send 10.1.2.25/1645 pkt
    RIP 0x29f79044 id State 7 221
    rad_vrfy(): bad auth req
    rad_procpkt: radvrfy failed
    RADIUS_DELETE
    remove_req 0x29f79044 0x6cb 221 session id
    free_rip 0x29f79044
    RADIUS: send empty queue
    ERROR: Authentication server is unresponsive: failure of decoding AAA... secret server incompatibility

    and I know not secret shared is the match between the ASA and ACS. any suggestions would be much appreciated.

    Thank you

    Alex

    Hi Alex,

    The ASA is defined in any NDG to GBA?

    If so, please remove the secret shared the NDG and try once again to test authentication please.

    Let me know how it goes.

    Kind regards

    Anisha

    PS: Please mark this thread solved if you think that your query is answered.

  • Restrict calls remote modem with ACS

    Hello..

    Using ACS I try to limit the reverse telnet access to a modem which will later be used by TTYredirector. I want users to have access to the modem only. We are on 3.01 ACS (yes I know old)...

    When to use access to the network with device restrictions: 2065: * (being the assigned line port 2065) subscribe to the denied service service = raccess tty65 in the journal of the attempts failed.

    Do I need to add this service to the GANYMEDE + under Interface Config?... What is the params? I tried to just raccess in services which added a section under user/group that I chose but nothing else.

    I have the router:

    AAA for authorization Ganymede + default reverse-access group

    Welcome tips, google has attracted so far zero.

    Paul

    Paul

    It's not the NAR causing the problem-, this would result in a message 'filtered user' in the failed attempts.

    Looks like the problem is that your group configuration is not allow the raccess service.

    Because this isn't a standard service preset in ACS you config sys goto then Ganymede + (ACS) and define a service personalized Ganymede. Call it "raccess". In the settings group, you will then be to activate and define all the attributes you need.

    Mounira

  • Machine access restrictions in ACS 3.3

    Can someone tell me how to implement on a device ACS 3.3 Machine access restrictions?

    Machine must be a member of the domain / company before access to the wireless local area network is permitted...

    DRM

    Remco

    The configuration you have the GBA:

    -Authentication verified machine

    -MAR activated, i.e. you checked, 'group authentication successful without authentication card machine' to a group, generally «»

    Configuration of the client/supplicant:

    -Client configured to send authentication of the computer information.

    You take a computer that is part of the AD and was introduced on the network. This is the first time.

    Start the computer to the top (for the first time).

    Computer is configured to send credentials to the Machine, so he sends to the switch, sends switch ACS, ACS verifies whether or not the machine is a valid machine.

    If this is the case, put in cache 'Calling-Station-Id' for the interval configured in this section.

    (End user still cannot do anything yet, because MAR is still in process)

    Computer has completed the guest of GINA.

    End user presses Ctrl + Alt + Delete.

    Type username/password (first time).

    Computer transmits the credentials of the user to switch, then switch to ACS, ACS gets it checked against AD.

    If the user is a valid user, the user is mapped to an ACS group, according to the mapping and is in.

    IF the user authentication fails, even if the computer authentication succeeded.

    Now, it was one of the scenarios, other is,

    Your machine is NOT part of the AD, so eventually Machine authentication will fail. Suppose that the user trying to connect in network has a name of user and password valid, but the computer using the the it is not a part of the AD.

    Then, you will get an error during the machine on "supplicant" as authentication.

    You cannot connect blah blah area...

    But you will be allowed to provide your name of user and password combination.

    Generally MAR is implemented to restrict this access, i.e. users trying to connect into the corporate network using non-active society, who are the majority of the infected by the virus at the time.

    It is the point where this option comes into play,

    "Group card for user authentication successful without authentication machine."

    So even if the authenticated user successfully, but from the machine that is not part of the AD, the user will be mapped to the group according to the above option.

    What 'Calling-Station-Id' caching.

    Even if the authentication was successful. ACS will check if the Calling-Station-Id is cached for the machine from where comes the good name of username/password? If this isn't the case, you use a wrong machine to connect to the network.

    HTH

    Kind regards

    Prem

  • Cisco ACS restrict a user to specific routers

    Hello

    We have ACS v3.2 in our network, I created a new user and added to a group, is it possible in this group to specify what routers / switches to the user is able to telnet, with some sort of ACL or something? I read something on:

    Filter access network (NAF)

    which is available in 4.0, should I upgrade to be able to do this?

    I tried to put a group defined Network Access Restrictions, but this seems to be what network you are telenting from?

    Sorry, please have patience, I'm new on ACS

    Thank you!

    Hello

    I use ACS v4.2 so don't know if you'll get the same features, but you can select the NDG your routers reside in slot per group defined Network Access Restrictions > drop-down list AAA Client? If so simply select each NDG, you want this group to have access to the break-in * in the Port and * address. This will allow any IP address telnet/ssh power for devices in each NDG you enter.

    If you wish you can control the IP addresses that access your routers by placing an access on each router list (stops messing around with that stuff, if you're not familiar with it).

    I hope this helps...

    Tony

  • Import of host internship ACS 5.0

    Hi all!

    I would like to import some hosts of GBA. I know, the ACS gives a model in a CSV file, but I do not download anything. Can you help me?

    Model:

    MACAddress:String (64): Required, description: String (1024), "enabled:Boolean(true,false):Required", HostIdentityGroup:String (256)

    Regads,

    Gyuri

    This is the process for importing hosts in ACS 5.0

    1) go to

    Users and identity stores:... > internal identity stores > hosts, press "Import" and then "Download Template".

    (2) open the model file. The first line should be left unchanged. Underneath, the records must be added with a record for each host

    An example of the minimum value that must be set for a host is illustrated below:

    11-22-33-44-55-66,,true, / / / group identity is left blank and the top-level node is assigned

    Format of each line is,

    Each record occupies a single line. Save the file

    (3) once the documents are created, press "import." Select the file 'step 2', then press 'Start Import'. Import the host records should begin. All errors will be displayed in the progress window

    Note that ACS 5.0 allows to add new rcords. the ACS 5.1, can also modify existing records and export. ACS 5.1

  • ACS network access Restriction does not. He denies it, but allow.

    I have a problem with the restrictions of access to the network on the Group of ACS configuration.

    I configured the NAR in a group field and set it to deny access besed on client AAA, a wireless LAN controller.

    But users of this group is still able to connect wireless controller.

    Newspapers in GBA shows that the fields are right. the right user in the right of the group in good AAA client, but does not deny.

    Put in place DNIS also supports the restriction. This is how it should be configured,

    -Procedure for the configuration of NAR:

    (1) go to User Configuration---> select the user name that you want to restrict.

    2) go into Restrictions on access network (OAN) option.

    (3) by user defined network access Restrictions.

    (4) check "define CLI/DNIS-based access restrictions.

    (5) select "reject the call or Access Point.

    (6) in the dropdown AAA client list - select the name of the device on which the user does not connect.

    (7) for Port - Development *.

    (8) in CLI - use *.

    (9) for DNIS - development *.

    (10) click on submit

    Kind regards

    ~ JG

    Note the useful messages

  • Cisco Secure ACS appliance - impossible to edit... Reason: The host no longer exists.

    Hi team,

    I have 2 camera which I am not able to remove a group of network devices home device.

    When I try to remove the device after error is thrown

    Impossible to edit INMUM-VPE-T1-3rdFloor-3750-S...  Reason: The host no longer exists.

    Running on Version: Cisco Secure ACS4.2.0.124

    One would come in all of these issues. someone knows the solution.

    Concerning

    Vineeth

    Hi Vineeth

    Yes, you can do through GUI.

    The GUI:

    1 ACS gui > network configuration > click on 'Search', then click 'Search' again.

    2. complete list of all network devices. On top, you will see an option "Download".

    Download the complete file.

    Let me know if it helps.

    Thank you

    Nelson Saha

  • Maximum 'Accounts internal hosts' on ACS 5.2

    Is there a maximum number of 'Account of internal hosts' IDs which can manage the local database to an ACS 5.2?

    Thank you...

    Although I cannot point to any reference in the user documentation, I know that ACS 5.2 has been tested with 50000 endpoints or the internal hosts

  • Cisco Secure ACS 4.1 - blocking attempts to authenticate to a specific host

    We use the application of RADIUS of ACS 4.1 for both wireless 802. 1 x and for our old PIX 515E authentication, as well as a few other features.

    We try to migrate users off the PIX and want a method of disabling their ability to connect through the PIX once we have them migrated to the new method of remote access.

    Authentication in ACS logs show the IP address of our PIX under "NAS-IP-Address" as the source of the authentication attempt.

    Is there a relatively simple/easy way to block this IP address attempts (which causes these attempts fail) all by allowing wireless systems and others to proceed as usual on a per user basis?

    Brian:

    If I have understood correctly, you must allow users to connect to the wifi but prevent users to connect via PIX.

    What you can do is to create a configuration of access network (OAN) Restriction under the config görüş (or under Configuration user if each user).

    See this image:

    If you don't see the network access restrictions config under the user and/or group config, you can activate the Interface-> advanced options configuration.

    HTH

    Amjad

    Rating of useful answers is more useful to say "thank you".

  • ACS 5.3 use LDAP. for one SSID and use IS HOST. for a different SSID

    I have 2 SSID on WLCs

    I wish I had 1 point SSID to the radius of the acs using LDAP store and the 2nd point SSID to the radius of the acs using identity store of the host for mac filtering.

    both scenarios are working, but not all.

    If I set the order of the rule I can get an SSID, but then the other fails.

    Authentication failed                                                                                 :

    22056 object was not found in the identity of the point of sale.

    Access matched Service selection rule:

    Rule-1

    Comparative political identity rule:

    Rule-1

    Some identity stores:

    RBLDAP

    Evaluate the politics of identity

    15004 Matched rule

    15013 selected identity store-

    24031 sending request to the primary LDAP server

    24017 Looking up host in LDAP - 04-xx-xx-xx-xx-xx Server

    24009 host not found in the LDAP server

    22056 object was not found in the identity of the point of sale.

    22058 advanced option that is configured for a unknown user is used.

    22061 the option 'Refuse' Advanced is set in the case of a request for authentication has failed.

    11003 returned RADIUS Access-Reject

    If I move the mac add rule before the rule of ldap, but then the ldap authentication fails

    Request for access received RADIUS 11001

    11017 RADIUS creates a new session

    11027 detected host Lookup UseCase (Service-Type = check call (10))

    Assess Service selection strategy

    15004 Matched rule

    Access to Selected 15012 - MAC filter network access service

    Evaluate the politics of identity

    15004 Matched rule

    15013 selected identity Store - internal hosts

    24209 Looking internal host IDStore host - 04-xx-xx-xx-xx-xx

    24211 found internal host IDStore host

    Authentication 22037 spent

    I tried to install the following without result.

    It seems to me that there should be a simple process to do what happens. I thought that if the rule does not match it would be to move on to the next rule etc...

    I might be able to live with the first ldap control and if it does not pass to the db of the local host, but seemingly ineffective.

    https://supportforums.Cisco.com/thread/2133704

    You can create a sequence of identity store so that if the end point is not present in the ldap database, then it can check its database of the local host.

    Or you can create a condition in your selection of service such as if rule called-station-id ends with (AIDS) then you can have it match the rule that uses the appropriate rule pointing to ldap, another rule when called-station-id ends with (ssidB) match the rule that points to the rule that uses the database of the local host.

    Here is the section on the configuration of the sequence of identity store, don't forget to select continue if user not found.

    http://www.Cisco.com/en/us/docs/net_mgmt/cisco_secure_access_control_sys...

    Thank you

    Sent by Cisco Support technique iPad App

  • ESXi on the host system with a physical restriction of the MAC

    Hi all!

    We have installed on a host system, located in the data center with restriction of MAC on a physical map of ESXi.

    Earlier, we have VMWare Server 2 with bridged network, it was not a problem.

    All virtual servers is accessible via port forwarding.

    About ESXi I can't found any solution to create the bridged network.

    Please give me a tip on how to solve this problem.

    Create a vswitch with no physical cards.  To connect VM to that (and a management vmkernel ESXi).

    Next, install a virtual firewall as vyatta connected to the vswitch isolated and the default vswitch with the physical card.  Then configure port forwarding rules as required.

Maybe you are looking for