<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACS 5.2: Service Selection Rules - Jump to next rule? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-5-2-service-selection-rules-jump-to-next-rule/m-p/2236213#M126307</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for explaining!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 23 Jul 2013 13:46:15 GMT</pubDate>
    <dc:creator>Daryn Utesbayev</dc:creator>
    <dc:date>2013-07-23T13:46:15Z</dc:date>
    <item>
      <title>ACS 5.2: Service Selection Rules - Jump to next rule?</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-service-selection-rules-jump-to-next-rule/m-p/2236211#M126305</link>
      <description>&lt;P style="margin: 0cm; margin-bottom: .0001pt;"&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I looked for on internet and i could not find a awnser. Please help me to solve my issue.&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm; margin-bottom: .0001pt;"&gt;Questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm; margin-bottom: .0001pt;"&gt;Creating more complex access services and policies, I mean in server selection rules have a several access policies.&amp;nbsp; And each access policy has rules.&amp;nbsp; Example: the first access policy for engineer groups. Second the access policy for sales groups. etс. After creating policies with the same devices and locations groups, the second access policy doesn’t work. I put logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;Why is not ACCCESS POLICY showing a group of Sales? It seems selection policy rules are looking at the group of engineer. I maybe It will not work. Because using the same devices, locations and protocol TACACS+. Is it possible to solve issue only with protocol TACACS+? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE id="__TOC_2" style="border-bottom: #808080 1px solid; border-left: #808080 1px solid; margin: 10pt 0pt 0pt; width: 100%; border-collapse: collapse; font-family: sans-serif; empty-cells: show; font-size: small; border-top: #e3e3e3 1px; border-right: #808080 1px solid;"&gt;&lt;TBODY&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Received TACACS+ Authentication START&amp;nbsp; Request&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #ebebeb; font-style: normal; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; text-decoration: underline; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Service Selection Policy&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;Matched rule&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;Selected Access Service - engineer&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Returned TACACS+ Authentication&amp;nbsp; Reply&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Received TACACS+ Authentication CONTINUE&amp;nbsp; Request&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Using previously selected Access&amp;nbsp; Service&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #ebebeb; font-style: normal; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; text-decoration: underline; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Identity Policy&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;Matched rule&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Selected Identity Store - Internal&amp;nbsp; Users&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Looking up User in Internal Users IDStore -&amp;nbsp; testsales&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Found User in Internal Users&amp;nbsp; IDStore&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;TACACS+ will use the password prompt from global&amp;nbsp; TACACS+ configuration.&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Returned TACACS+ Authentication&amp;nbsp; Reply&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Received TACACS+ Authentication CONTINUE&amp;nbsp; Request&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Using previously selected Access&amp;nbsp; Service&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #ebebeb; font-style: normal; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; text-decoration: underline; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Identity Policy&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;Matched rule&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Selected Identity Store - Internal&amp;nbsp; Users&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Looking up User in Internal Users IDStore -&amp;nbsp; testsales&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Found User in Internal Users&amp;nbsp; IDStore&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;Authentication Passed&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #ebebeb; font-style: normal; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; text-decoration: underline; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Group Mapping Policy&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #ebebeb; font-style: normal; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; text-decoration: underline; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Evaluating Exception Authorization&amp;nbsp; Policy&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;No rule was matched&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #ebebeb; font-style: normal; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; text-decoration: underline; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Authorization Policy&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;Matched Default Rule&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Selected Shell Profile is&amp;nbsp; DenyAccess&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Returned TACACS+ Authentication&amp;nbsp; Reply&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE id="__TOC_3" style="border-bottom: #808080 1px solid; border-left: #808080 1px solid; margin: 10pt 0pt 0pt; width: 100%; border-collapse: collapse; font-family: sans-serif; empty-cells: show; font-size: small; border-top: #e3e3e3 1px; border-right: #808080 1px solid;"&gt;&lt;TBODY&gt;&lt;TR align="left" style="text-transform: none; font-family: arial; color: #000000; font-size: 10pt; font-weight: bold;"&gt;&lt;TH align="center" style="border-bottom: #8499a2 1px solid; border-left: #8499a2 1px solid; background-color: #d9e3e9; padding-left: 2pt; padding-right: 2pt; font-family: arial; font-size: 10pt; border-top: #8499a2 1px solid; font-weight: normal; border-right: #ffffff 1px solid; padding-top: 1pt;"&gt;&lt;P id="AUTOGENBOOKMARK_44"&gt;Additional Details&lt;/P&gt;&lt;/TH&gt; &lt;/TR&gt;&lt;TR align="left" style="border-bottom: #8499a2 thin; border-left: #8499a2 thin solid; padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; border-top: #8499a2 thin; font-weight: normal; border-right: #8499a2 thin solid; padding-top: 1pt;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;A _jive_internal="true" href="/avreports/servlet/GenericRedirector?command=submit&amp;amp;__requesttype=immediate&amp;amp;invokeSubmit=true&amp;amp;__executableName=/home/dutesbayev/AAA_Protocol/AAA_Diagnostics.rptdesign&amp;amp;rptAcsSessionId=alma-acs-1/153065421/3828&amp;amp;rptDay=06/28/2013 12:52:26.283 PM&amp;amp;rptSeverity=DEBUG&amp;amp;rptDiagnosticTimeRange=custom&amp;amp;__locale=en_US&amp;amp;iportalID=VPHHTISSRYQ&amp;amp;__masterpage=false&amp;amp;__newWindow=false" id="AUTOGENBOOKMARK_45" name="AUTOGENBOOKMARK_45" rel="nofollow" style="display: block;" target="_self"&gt;Diagnostics&lt;/A&gt; &lt;A _jive_internal="true" href="/avreports/servlet/GenericRedirector?command=submit&amp;amp;__requesttype=immediate&amp;amp;invokeSubmit=true&amp;amp;__executableName=/home/dutesbayev/ACS_Instance/ACS_Configuration_Audit.rptdesign&amp;amp;rptTimeRange=custom&amp;amp;rptEndDate=06/28/2013 12:52:26.283 PM&amp;amp;rptStartDate=06/28/2013 12:52:26.283 PM&amp;amp;__locale=en_US&amp;amp;iportalID=VPHHTISSRYQ&amp;amp;__masterpage=false&amp;amp;__newWindow=false" id="AUTOGENBOOKMARK_46" name="AUTOGENBOOKMARK_46" rel="nofollow" style="display: block; padding-top: 1pt;" target="_self"&gt;ACS Configuration Changes&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:35:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-service-selection-rules-jump-to-next-rule/m-p/2236211#M126305</guid>
      <dc:creator>Daryn Utesbayev</dc:creator>
      <dc:date>2019-03-11T03:35:30Z</dc:date>
    </item>
    <item>
      <title>ACS 5.2: Service Selection Rules - Jump to next rule?</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-service-selection-rules-jump-to-next-rule/m-p/2236212#M126306</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello. Service selection rules and authorization rules are like access-lists, they have multiple entries which are evaluated top-down, if the packet matches the first rule it wil never evaluate the second rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Most of the times the default service selection rule called "default device admin" is good as it is, and what you need to customize are the authorization rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please post your rules to see what are you trying to achieve.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Jul 2013 04:49:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-service-selection-rules-jump-to-next-rule/m-p/2236212#M126306</guid>
      <dc:creator>Eduardo Aliaga</dc:creator>
      <dc:date>2013-07-05T04:49:37Z</dc:date>
    </item>
    <item>
      <title>ACS 5.2: Service Selection Rules - Jump to next rule?</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-service-selection-rules-jump-to-next-rule/m-p/2236213#M126307</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for explaining!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Jul 2013 13:46:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-service-selection-rules-jump-to-next-rule/m-p/2236213#M126307</guid>
      <dc:creator>Daryn Utesbayev</dc:creator>
      <dc:date>2013-07-23T13:46:15Z</dc:date>
    </item>
  </channel>
</rss>

