<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE  DNAC PXGRID requirements in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-dnac-pxgrid-requirements/m-p/3829323#M474407</link>
    <description>Adding to hslai's comment, even if you need pxgrid functionality based on the use case (which is nice to have with assurance), this could be collocated on an existing node. Depends on the design and scale, you might not need a dedicated pxgrid node is all.</description>
    <pubDate>Sat, 30 Mar 2019 15:46:30 GMT</pubDate>
    <dc:creator>Damien Miller</dc:creator>
    <dc:date>2019-03-30T15:46:30Z</dc:date>
    <item>
      <title>ISE  DNAC PXGRID requirements</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dnac-pxgrid-requirements/m-p/3829015#M474348</link>
      <description>&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;If a customer is planning to use ISE in their environment as a TACACS+ server, and DNAC for assurance and image management. Will they need&amp;nbsp; pxgrid&amp;nbsp; and a pxgrid node to support that functionality?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 19:04:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dnac-pxgrid-requirements/m-p/3829015#M474348</guid>
      <dc:creator>mpeeters</dc:creator>
      <dc:date>2020-02-21T19:04:13Z</dc:date>
    </item>
    <item>
      <title>Re: ISE  DNAC PXGRID requirements</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dnac-pxgrid-requirements/m-p/3829150#M474406</link>
      <description>&lt;P&gt;The pxGrid services are not required, if customers using ISE as RADIUS/T+ servers but not using its integration with DNAC for the work flows of group-based policies or related, and if not configuring Assurance to collect data from ISE.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2019 22:12:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dnac-pxgrid-requirements/m-p/3829150#M474406</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-03-29T22:12:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE  DNAC PXGRID requirements</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dnac-pxgrid-requirements/m-p/3829323#M474407</link>
      <description>Adding to hslai's comment, even if you need pxgrid functionality based on the use case (which is nice to have with assurance), this could be collocated on an existing node. Depends on the design and scale, you might not need a dedicated pxgrid node is all.</description>
      <pubDate>Sat, 30 Mar 2019 15:46:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dnac-pxgrid-requirements/m-p/3829323#M474407</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-03-30T15:46:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE  DNAC PXGRID requirements</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dnac-pxgrid-requirements/m-p/3829333#M474408</link>
      <description>&lt;P&gt;I am not clear as to what is the use case for any information dna assurance would gather from ISE via PXGRID.&amp;nbsp; Would you provide some context of what would be lost if there was no ise dna assurance pxgrid linkage.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2019 16:13:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dnac-pxgrid-requirements/m-p/3829333#M474408</guid>
      <dc:creator>mpeeters</dc:creator>
      <dc:date>2019-03-30T16:13:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE  DNAC PXGRID requirements</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dnac-pxgrid-requirements/m-p/3829335#M474409</link>
      <description>I understand that there is a pxgrid exchange of data for  Trustsec aspects.  What would be the benefits of pxgrid between dnac and ise if trustsec is in play.&lt;BR /&gt;</description>
      <pubDate>Sat, 30 Mar 2019 16:16:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dnac-pxgrid-requirements/m-p/3829335#M474409</guid>
      <dc:creator>mpeeters</dc:creator>
      <dc:date>2019-03-30T16:16:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE  DNAC PXGRID requirements</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dnac-pxgrid-requirements/m-p/3829342#M474410</link>
      <description>I've never played with assurance without ISE integration so I can't be 100% on what would be missing. It was my understanding thay ISE shares user and machine information it learns via pxgrid integration. Seeing as there are other ways to get user information from switches and WLC's maybe DNA can pull this through alternate means. I've seen machine OS in assurance which you wouldn't get from anywhere but ISE. &lt;BR /&gt;&lt;BR /&gt;For now I would plan on integrating with ISE if it's authenticsting users in the environment, it takes little time. If someone knows different I'm keen on hearing it. &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Sat, 30 Mar 2019 16:52:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dnac-pxgrid-requirements/m-p/3829342#M474410</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-03-30T16:52:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE  DNAC PXGRID requirements</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dnac-pxgrid-requirements/m-p/3829387#M474411</link>
      <description>&lt;P&gt;I believe you are correct that the pxGrid use for DNAC is on scalable groups. DNAC also uses ERS to get data from ISE.&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2019 21:37:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dnac-pxgrid-requirements/m-p/3829387#M474411</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-03-30T21:37:37Z</dc:date>
    </item>
    <item>
      <title>Re: ISE  DNAC PXGRID requirements</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dnac-pxgrid-requirements/m-p/3829705#M474412</link>
      <description>&lt;P&gt;If a customer wants to use ISE as TACACS+ server, DNA-c &amp;amp; ISE integration will automate the Network device on-boarding(Addition) in ISE with shared secret via ERS services during the discovery phase.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please refer to this &lt;A href="https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/digital-network-architecture/nb-06-cisco-dna-assurance-technical-ebook-cte-en.pdf" target="_self"&gt;document&lt;/A&gt;, if&amp;nbsp;the customer needs only Assurance. ISE integration with DNA Assurance is optional. However, with ISE integration, Assurance gets usernames of the clients.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Aravind&lt;/P&gt;</description>
      <pubDate>Mon, 01 Apr 2019 06:40:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dnac-pxgrid-requirements/m-p/3829705#M474412</guid>
      <dc:creator>Aravind Ravichandran</dc:creator>
      <dc:date>2019-04-01T06:40:45Z</dc:date>
    </item>
    <item>
      <title>Re: ISE  DNAC PXGRID requirements</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dnac-pxgrid-requirements/m-p/3829881#M474415</link>
      <description>In my opinion, the main benefit of integrating dnac &amp;amp; ise via pxgrid is the automation aspect in regard to network policy and the ability to centrally manage it all via dnac. Integrating the two will allow you to easily manage your CTS configuration including access contracts, SGTs, host on-boarding, &amp;amp; ip access control policies (L4 SGACLs). All of this information will be shared/imported to ISE using the pxgrid connection. As mentioned by others it is fairly easy and straight forward to configure. I agree with &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/35704"&gt;@Damien&lt;/a&gt;.Miller, if you are authenticating users into the environment I would connect the two platforms. I do not see/know of benefits from keeping the two separate.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 01 Apr 2019 11:52:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dnac-pxgrid-requirements/m-p/3829881#M474415</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-04-01T11:52:24Z</dc:date>
    </item>
  </channel>
</rss>

