<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACS NDG nesting in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-ndg-nesting/m-p/1796189#M213776</link>
    <description>&lt;P&gt;I have a admin who nested a Network device group inside another network device group. Is that reccomended? For instance, there is a NDG for Asia, and inside asia he put other NDG for Routers, another for switches, and yet another for firewalls. This seems way too complicated for Tacacs authentication use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have seen Cisco Security manager balk at these nested groups and not be able to see down into the nested groups to see if a device is setup in ACS .&lt;/P&gt;&lt;P&gt;I would like to restructure the group for Asia to be one big NDG containing all IPs of devices under one heading. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you reccommend?&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 01:31:30 GMT</pubDate>
    <dc:creator>Michael ONeil</dc:creator>
    <dc:date>2019-03-11T01:31:30Z</dc:date>
    <item>
      <title>ACS NDG nesting</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-ndg-nesting/m-p/1796189#M213776</link>
      <description>&lt;P&gt;I have a admin who nested a Network device group inside another network device group. Is that reccomended? For instance, there is a NDG for Asia, and inside asia he put other NDG for Routers, another for switches, and yet another for firewalls. This seems way too complicated for Tacacs authentication use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have seen Cisco Security manager balk at these nested groups and not be able to see down into the nested groups to see if a device is setup in ACS .&lt;/P&gt;&lt;P&gt;I would like to restructure the group for Asia to be one big NDG containing all IPs of devices under one heading. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you reccommend?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:31:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-ndg-nesting/m-p/1796189#M213776</guid>
      <dc:creator>Michael ONeil</dc:creator>
      <dc:date>2019-03-11T01:31:30Z</dc:date>
    </item>
    <item>
      <title>ACS NDG nesting</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-ndg-nesting/m-p/1796190#M213808</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Michael&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't think there is wrong or right way. I'm currently in testing stages of our new ACS roll out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I have done is to create 3 NDG and set them up as follows&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Location - COntinent - COuntry - Town - Office location&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Device Type - Type of device - Vendor name&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Department - department who manages the device&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can then use these in my policies to allow read only access based on device type and location. I can also use the department ndg to allow admin access to devices if its managed by a different team other than ours.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This seems to work ok based on the bit of testing I have done so far. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Nov 2011 15:39:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-ndg-nesting/m-p/1796190#M213808</guid>
      <dc:creator>c-computershare</dc:creator>
      <dc:date>2011-11-03T15:39:34Z</dc:date>
    </item>
  </channel>
</rss>

