<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Michael,it works like in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-what-does-quot-multiple-matched-rule-applies-quot-mean/m-p/2028283#M172633</link>
    <description>&lt;P&gt;Michael,&lt;/P&gt;&lt;P&gt;it works like designed: multiple match is a first match out based on the AuthZ Parameters. E.g.:&lt;/P&gt;&lt;P&gt;- Rule 1: DACL1, VLAN10&lt;/P&gt;&lt;P&gt;- Rule 2: DACL 2, Timeout X&lt;/P&gt;&lt;P&gt;... the AuthZ Result is DACL1, VLAN10 and Timeout X&lt;/P&gt;&lt;P&gt;It is not a Merger of DACL1 and DACL2.&lt;/P&gt;&lt;P&gt;From my perspective DAP doesn´t offer a Merger of functions as well. The final result is based on the Order of Operation: DAP -&amp;gt; User -&amp;gt; Group Policy -&amp;gt; Default Group Policy.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Edgar&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 25 Oct 2014 10:33:40 GMT</pubDate>
    <dc:creator>edgar.reinke</dc:creator>
    <dc:date>2014-10-25T10:33:40Z</dc:date>
    <item>
      <title>Cisco ISE - What does "Multiple Matched Rule Applies" mean?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-what-does-quot-multiple-matched-rule-applies-quot-mean/m-p/2028274#M172624</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In Cisco ISE authroiztion policy configuration, what does the option "multiple matched rule applies" mean? I can understand the "first matched rule", but in "multiple matched rule" how is the "permissions picked if multiple rules match? Or, what is the logic involved in picking up the permissions, if multiple rules are matched in authorization policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No where in cisco document I see any explaination for this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would appreciate if any one can point me to&amp;nbsp; a document or explain me the login in selecting the persmissions if multiple rules are matched. Also, what would the use-case for this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Mohan&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:34:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-what-does-quot-multiple-matched-rule-applies-quot-mean/m-p/2028274#M172624</guid>
      <dc:creator>muthumohan</dc:creator>
      <dc:date>2019-03-11T02:34:12Z</dc:date>
    </item>
    <item>
      <title>Cisco ISE - What does "Multiple Matched Rule Applies" mean?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-what-does-quot-multiple-matched-rule-applies-quot-mean/m-p/2028275#M172625</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Moham&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means that ISE just doesnt stop if you meet the first rule condition it keeps processing till you match all the rules...one case I can think of. UserA is a member of groupA and groupB.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is your authz policies&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rule 1 - if memberOf GroupA = accessreject&lt;/P&gt;&lt;P&gt;rule2 - if memberOf GroupB = accessaccept&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the access-accept should be applied to the user session.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even though it makes sense to prioritize your rules correctly, the intent of this in my opinion is to limit any "corner issues".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Sep 2012 23:27:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-what-does-quot-multiple-matched-rule-applies-quot-mean/m-p/2028275#M172625</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-09-20T23:27:00Z</dc:date>
    </item>
    <item>
      <title>Cisco ISE - What does "Multiple Matched Rule Applies" mean?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-what-does-quot-multiple-matched-rule-applies-quot-mean/m-p/2028276#M172626</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks again Tarik. 2 things...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. So, what is the logic in selecting the permissions if multiple rules are matched? Is it the last match (as per your example) or it will logical OR all the matched permissions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Can a user A belong to two groups, GroupA and GroupB?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appreiate your help again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Mohan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Sep 2012 13:38:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-what-does-quot-multiple-matched-rule-applies-quot-mean/m-p/2028276#M172626</guid>
      <dc:creator>muthumohan</dc:creator>
      <dc:date>2012-09-21T13:38:04Z</dc:date>
    </item>
    <item>
      <title>Cisco ISE - What does "Multiple Matched Rule Applies" mean?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-what-does-quot-multiple-matched-rule-applies-quot-mean/m-p/2028277#M172627</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mohan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I havent tested this feature so I am not sure I understand which policy gets applied if they are both set to permit access. However there is a bug where the access-reject takes presedence over access-accept which was a bug and should not have happened:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the bug details from 1.0.4 - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp215286table185570" width="80%"&gt;&lt;TBODY&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt; CSCtn99145 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp229328"&gt;&lt;/A&gt;&lt;P&gt; An authorization policy matching multiple rules does not appropriately match the existing ACCESS_ACCEPT rule &lt;/P&gt;&lt;A name="wp229329"&gt;&lt;/A&gt;&lt;P&gt; When an authorization policy use the "multiple rule match" option, and &lt;EM&gt;any&lt;/EM&gt; of the matched policy rules contain ACCESS_REJECT, the ACCESS_REJECT&amp;nbsp; rule overrides the ACCESS_ACCEPT rule, regardless of where the two rules&amp;nbsp; appear in relation to one another. &lt;/P&gt;&lt;A name="wp229330"&gt;&lt;/A&gt;&lt;P&gt; &lt;STRONG&gt;Workaround&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;There is no known workaround for this issue. &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However when I spoke about multiple groups I was referrring to group membership simliar to an AD environment. You can have a user mapped to multiple groups and you can use that scenario to match the mulitple match scenario.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your best bet at this point will be to open a TAC case to get better clarification as to which access-accept policy is used when multiple rules are matched.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Sep 2012 21:33:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-what-does-quot-multiple-matched-rule-applies-quot-mean/m-p/2028277#M172627</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-09-21T21:33:47Z</dc:date>
    </item>
    <item>
      <title>Cisco ISE - What does "Multiple Matched Rule Applies" mean?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-what-does-quot-multiple-matched-rule-applies-quot-mean/m-p/2028278#M172628</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Tarik. Appreciate your response. I will share if I find more information on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Mohan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Sep 2012 05:42:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-what-does-quot-multiple-matched-rule-applies-quot-mean/m-p/2028278#M172628</guid>
      <dc:creator>muthumohan</dc:creator>
      <dc:date>2012-09-23T05:42:29Z</dc:date>
    </item>
    <item>
      <title>Cisco ISE - What does "Multiple Matched Rule Applies" mean?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-what-does-quot-multiple-matched-rule-applies-quot-mean/m-p/2028279#M172629</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not a problem, please do not forget to rate any helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Sep 2012 06:02:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-what-does-quot-multiple-matched-rule-applies-quot-mean/m-p/2028279#M172629</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-09-23T06:02:43Z</dc:date>
    </item>
    <item>
      <title>Cisco ISE - What does "Multiple Matched Rule Applies" mean?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-what-does-quot-multiple-matched-rule-applies-quot-mean/m-p/2028280#M172630</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After testing the feature it seems to be that it is only collection AuthZ parameters to built the final AuthZ profile via the matched rules. An already assigned parameter (e. g. DACL) will not been overriten by the same parameter (here: DACL) of a following matched rule. It is like a first-match-out per AuthZ parameter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That´s juts the result of doing some tests. Therefore, it might be wrong. Nevertheless, I do not know if there is a use-case for this feature ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards // Edgar &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Feb 2013 23:17:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-what-does-quot-multiple-matched-rule-applies-quot-mean/m-p/2028280#M172630</guid>
      <dc:creator>edgar.reinke</dc:creator>
      <dc:date>2013-02-19T23:17:45Z</dc:date>
    </item>
    <item>
      <title>Cisco ISE - What does "Multiple Matched Rule Applies" mean?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-what-does-quot-multiple-matched-rule-applies-quot-mean/m-p/2028281#M172631</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I agree with tarik &amp;amp; also this might be helpful for you:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An authorization policy can&amp;nbsp; consist of a single rule or a set of rules that are user-defined. These&amp;nbsp; rules act to create a specific policy. For example, a standard policy&amp;nbsp; can include the rule name using an If-Then convention that links a value&amp;nbsp; entered for identity groups with specific condition(s) or attributes to&amp;nbsp; produce a specific set of permissions that create a unique&amp;nbsp; authorization profile. There are two authorization policy options you&amp;nbsp; can set:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; •First Matched Rules Apply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; •Multiple Matched Rule Applies&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; These two options direct Cisco ISE&amp;nbsp; to use either the first matched or the multiple matched rule type&amp;nbsp; listed in the standard policy table when it matches the user's set of&amp;nbsp; permissions. These are the two types of authorization policies that you&amp;nbsp; can configure:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; •Standard&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; •Exception&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Standard policies are policies&amp;nbsp; created to remain in effect for long periods of time, to apply to a&amp;nbsp; larger group of users or devices or groups, and allow access to specific&amp;nbsp; or all network endpoints. Standard policies are intended to be stable&amp;nbsp; and apply to a large groups of users, devices, and groups that share a&amp;nbsp; common set of privileges.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Standard policies can be used as&amp;nbsp; templates in which you modify the original values to serve the needs of a&amp;nbsp; specific identity group, using specific conditions or permissions to&amp;nbsp; create another type of standard policy to meet the needs of new&amp;nbsp; divisions, or groups of users, devices, or groups in your network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; By contrast, exception policies&amp;nbsp; are appropriately named because this type of policy acts as an exception&amp;nbsp; to the standard policies. Exception polices are intended for&amp;nbsp; authorizing limited access that is based on a variety of factors&amp;nbsp; (short-term policy duration, specific types of network devices, network&amp;nbsp; endpoints or groups, or the need to meet special conditions or&amp;nbsp; permissions or an immediate requirement).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Exception policies are created to&amp;nbsp; meet an immediate or short-term need such as authorizing a limited&amp;nbsp; number of users, devices, or groups to access network resources. An&amp;nbsp; exception policy lets you create a specific set of customized values for&amp;nbsp; an identity group, condition, or permission that are tailored for one&amp;nbsp; user or a subset of users. This allows you to create different or&amp;nbsp; customized policies to meet your corporate, group, or network needs. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_authz_polprfls.html"&gt;http://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_authz_polprfls.html&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Apr 2013 07:31:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-what-does-quot-multiple-matched-rule-applies-quot-mean/m-p/2028281#M172631</guid>
      <dc:creator>vikasyad</dc:creator>
      <dc:date>2013-04-11T07:31:40Z</dc:date>
    </item>
    <item>
      <title>I need ISE to behave like DAP</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-what-does-quot-multiple-matched-rule-applies-quot-mean/m-p/2028282#M172632</link>
      <description>&lt;P&gt;I need ISE to behave like DAP does and aggregate multiple authorization policies when a VPN user authenticates. In my testing with ISE Authorization Policies set to multiple match, only applies the DACL from the first match and does not create a dynamic ACL of all &amp;nbsp;the matched policies.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are trying to use ISE instead of DAP since these deployment is spreadspread accross &amp;nbsp;several global data centers. ISE is more scalable than DAP even if configured using Cisco Security Manager.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Oct 2014 23:53:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-what-does-quot-multiple-matched-rule-applies-quot-mean/m-p/2028282#M172632</guid>
      <dc:creator>Michael ONeil</dc:creator>
      <dc:date>2014-10-14T23:53:41Z</dc:date>
    </item>
    <item>
      <title>Michael,it works like</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-what-does-quot-multiple-matched-rule-applies-quot-mean/m-p/2028283#M172633</link>
      <description>&lt;P&gt;Michael,&lt;/P&gt;&lt;P&gt;it works like designed: multiple match is a first match out based on the AuthZ Parameters. E.g.:&lt;/P&gt;&lt;P&gt;- Rule 1: DACL1, VLAN10&lt;/P&gt;&lt;P&gt;- Rule 2: DACL 2, Timeout X&lt;/P&gt;&lt;P&gt;... the AuthZ Result is DACL1, VLAN10 and Timeout X&lt;/P&gt;&lt;P&gt;It is not a Merger of DACL1 and DACL2.&lt;/P&gt;&lt;P&gt;From my perspective DAP doesn´t offer a Merger of functions as well. The final result is based on the Order of Operation: DAP -&amp;gt; User -&amp;gt; Group Policy -&amp;gt; Default Group Policy.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Edgar&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Oct 2014 10:33:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-what-does-quot-multiple-matched-rule-applies-quot-mean/m-p/2028283#M172633</guid>
      <dc:creator>edgar.reinke</dc:creator>
      <dc:date>2014-10-25T10:33:40Z</dc:date>
    </item>
    <item>
      <title>Hi Michael,We have faced a</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-what-does-quot-multiple-matched-rule-applies-quot-mean/m-p/2028284#M172634</link>
      <description>&lt;P&gt;Hi Michael,&lt;/P&gt;&lt;P&gt;We have faced a similar challenge, and much to our dismay we had to find the same - even with multiple match only the first dACL was used.&lt;/P&gt;&lt;P&gt;We managed to get it to work on the ASA while having to abandon dACL's.&lt;/P&gt;&lt;P&gt;If you use multiple match, and pass the access list entries to the NAD as a part of the Advanced Attribute Setting (eg.):&lt;/P&gt;&lt;P&gt;Cisco:cisco-av-pair = ip:inacl#=permit ip any 10.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;they will get concatenated into a single ACL, provided multiple results will be matched.&lt;/P&gt;&lt;P&gt;The remaining issue is, to my knowledge You cannot use Multiple match AND Policy Sets. Hence whatever else you do in the policy, You need to harden the rules carefully so you only get multiple matches withing the intended scope.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jul 2015 10:10:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-what-does-quot-multiple-matched-rule-applies-quot-mean/m-p/2028284#M172634</guid>
      <dc:creator>Michal Kalinowski</dc:creator>
      <dc:date>2015-07-27T10:10:25Z</dc:date>
    </item>
  </channel>
</rss>

