<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Identity Group Assignment in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-identity-group-assignment/m-p/2238006#M136826</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Additional Information and Question:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently my Authorization Policy has this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/1/8/3/138381-Authorization%20Policy.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The result is that any user trying to acesss the Guest Service can see the Guest Portal, introduce Credentials and if they are valid, the AUP is displayed, after that if the device is in the Blacklist, service is denied and the Guest Portal is displayed again, but any message about the situation is indicated to the user. I wonder if I can generate a message and even avoid the AUP if the device is in the blacklist.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any comment will be greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;Daniel Escalante&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 06 May 2013 21:44:46 GMT</pubDate>
    <dc:creator>descalante2007</dc:creator>
    <dc:date>2013-05-06T21:44:46Z</dc:date>
    <item>
      <title>ISE Identity Group Assignment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-identity-group-assignment/m-p/2238005#M136789</link>
      <description>&lt;P&gt;I need to avoid a large set of devices to get access to Internet through the Wireless Guest Service. I had made some test and know I can block a MAC address through the Policy Authorization (If Blacklist then DenyAccess).&lt;/P&gt;&lt;P&gt;In order to blacklist a large set I would like to import the MAC list and include in the CSV the Identity Group Assignment. It appears it is not possible ... I can have an easy way to change the Identity Group Assignment instead of one by one?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Daniel Escalante.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:24:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-identity-group-assignment/m-p/2238005#M136789</guid>
      <dc:creator>descalante2007</dc:creator>
      <dc:date>2019-03-11T03:24:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Identity Group Assignment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-identity-group-assignment/m-p/2238006#M136826</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Additional Information and Question:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently my Authorization Policy has this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/1/8/3/138381-Authorization%20Policy.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The result is that any user trying to acesss the Guest Service can see the Guest Portal, introduce Credentials and if they are valid, the AUP is displayed, after that if the device is in the Blacklist, service is denied and the Guest Portal is displayed again, but any message about the situation is indicated to the user. I wonder if I can generate a message and even avoid the AUP if the device is in the blacklist.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any comment will be greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;Daniel Escalante&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 May 2013 21:44:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-identity-group-assignment/m-p/2238006#M136826</guid>
      <dc:creator>descalante2007</dc:creator>
      <dc:date>2013-05-06T21:44:46Z</dc:date>
    </item>
    <item>
      <title>ISE Identity Group Assignment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-identity-group-assignment/m-p/2238007#M136861</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Kindly review the below link:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/en/US/docs/solutions/Enterprise/Security/TrustSec_2.0/trustsec_2.0_dig.pdf"&gt;https://www.cisco.com/en/US/docs/solutions/Enterprise/Security/TrustSec_2.0/trustsec_2.0_dig.pdf &lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 May 2013 09:37:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-identity-group-assignment/m-p/2238007#M136861</guid>
      <dc:creator>manjeets</dc:creator>
      <dc:date>2013-05-15T09:37:42Z</dc:date>
    </item>
  </channel>
</rss>

