<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: restrict non-domain computers in Web Security</title>
    <link>https://community.cisco.com/t5/web-security/restrict-non-domain-computers/m-p/941302#M232</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe you could put these PCs into a different subnet and create a policy based on the subnet.&lt;BR /&gt;&lt;BR /&gt;I think so anyway.&lt;BR /&gt;&lt;BR /&gt;-&lt;BR /&gt;Jason&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 14 May 2008 22:13:07 GMT</pubDate>
    <dc:creator>jason.spangler</dc:creator>
    <dc:date>2008-05-14T22:13:07Z</dc:date>
    <item>
      <title>restrict non-domain computers</title>
      <link>https://community.cisco.com/t5/web-security/restrict-non-domain-computers/m-p/941301#M231</link>
      <description>&lt;P&gt;Does anyone know if it is possible to restrict access based on domain membership or an AD Group?  &lt;BR /&gt;&lt;BR /&gt;The purpose is to restrict non-domain computers even if the client has a legitimate domain credential to use for authentication.&lt;/P&gt;</description>
      <pubDate>Wed, 14 May 2008 01:52:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/restrict-non-domain-computers/m-p/941301#M231</guid>
      <dc:creator>charles_ironport</dc:creator>
      <dc:date>2008-05-14T01:52:56Z</dc:date>
    </item>
    <item>
      <title>Re: restrict non-domain computers</title>
      <link>https://community.cisco.com/t5/web-security/restrict-non-domain-computers/m-p/941302#M232</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe you could put these PCs into a different subnet and create a policy based on the subnet.&lt;BR /&gt;&lt;BR /&gt;I think so anyway.&lt;BR /&gt;&lt;BR /&gt;-&lt;BR /&gt;Jason&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 May 2008 22:13:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/restrict-non-domain-computers/m-p/941302#M232</guid>
      <dc:creator>jason.spangler</dc:creator>
      <dc:date>2008-05-14T22:13:07Z</dc:date>
    </item>
    <item>
      <title>Re: restrict non-domain computers</title>
      <link>https://community.cisco.com/t5/web-security/restrict-non-domain-computers/m-p/941303#M233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is correct. The only way to restrict these computers would be to make a rule (above your auth group policies), that states the specific IPs / subnets are granted certain / no access.&lt;BR /&gt;&lt;BR /&gt;As long as the rule is above all your auth rules, it will trigger first and take precedence. Be sure to disable WBRS for this rule as well, since there is a potential for +6 sites to be allowed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 May 2008 23:07:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/restrict-non-domain-computers/m-p/941303#M233</guid>
      <dc:creator>jowolfer</dc:creator>
      <dc:date>2008-05-14T23:07:28Z</dc:date>
    </item>
  </channel>
</rss>

