<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RBAC requirement in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/rbac-requirement/m-p/3695324#M494901</link>
    <description>Eeerm, what is it exactly that you’re trying to do (as opposed to how)? It sounds like you are describing ISE Policy sets, but it’s not clear.</description>
    <pubDate>Mon, 27 Aug 2018 07:33:17 GMT</pubDate>
    <dc:creator>RichardAtkin</dc:creator>
    <dc:date>2018-08-27T07:33:17Z</dc:date>
    <item>
      <title>RBAC requirement</title>
      <link>https://community.cisco.com/t5/network-access-control/rbac-requirement/m-p/3695255#M494900</link>
      <description>&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;RBAC requirement&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;1. Is it possible to implement some kind of virtual profile on the ACS so that if the request is from a certain set of ip addresses it redirects the request to a different profile in ACS. Physically it will be single appliance but virtually there will be 2; one for underlay AAA requirements and second for overall AAA requirements.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Aug 2018 03:29:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/rbac-requirement/m-p/3695255#M494900</guid>
      <dc:creator>jineshrd</dc:creator>
      <dc:date>2018-08-27T03:29:40Z</dc:date>
    </item>
    <item>
      <title>Re: RBAC requirement</title>
      <link>https://community.cisco.com/t5/network-access-control/rbac-requirement/m-p/3695324#M494901</link>
      <description>Eeerm, what is it exactly that you’re trying to do (as opposed to how)? It sounds like you are describing ISE Policy sets, but it’s not clear.</description>
      <pubDate>Mon, 27 Aug 2018 07:33:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/rbac-requirement/m-p/3695324#M494901</guid>
      <dc:creator>RichardAtkin</dc:creator>
      <dc:date>2018-08-27T07:33:17Z</dc:date>
    </item>
    <item>
      <title>Re: RBAC requirement</title>
      <link>https://community.cisco.com/t5/network-access-control/rbac-requirement/m-p/3695499#M494902</link>
      <description>&lt;P&gt;I agree with Richard it sounds like you are asking put Policy Sets in ISE, but if you are asking about ACS then you are talking about Access Service definitions.&amp;nbsp; Both ISE and ACS allow you to carve up the configuration into different rule sets based on a wide variety of definitions (NAD type, NAD IPs, locations, SSID name, VPN tunnel group, RADIUS attributes, etc.)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Aug 2018 13:13:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/rbac-requirement/m-p/3695499#M494902</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-08-27T13:13:09Z</dc:date>
    </item>
  </channel>
</rss>

