<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA DAP functionality in ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/asa-dap-functionality-in-ise/m-p/3591035#M509333</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;Do we have a way to support a customer that is currently using DAP on ASA with ISE?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;The customer is using DAP to assign "Basic VPN Connectivity" ACL based on LDAP group, then provide additional access with a network ACL above and beyond if they are part of a different LDAP group. They would like to centralize everything with ISE. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 05 Jun 2018 13:48:24 GMT</pubDate>
    <dc:creator>gjw_csco</dc:creator>
    <dc:date>2018-06-05T13:48:24Z</dc:date>
    <item>
      <title>ASA DAP functionality in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-dap-functionality-in-ise/m-p/3591035#M509333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;Do we have a way to support a customer that is currently using DAP on ASA with ISE?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;The customer is using DAP to assign "Basic VPN Connectivity" ACL based on LDAP group, then provide additional access with a network ACL above and beyond if they are part of a different LDAP group. They would like to centralize everything with ISE. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2018 13:48:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-dap-functionality-in-ise/m-p/3591035#M509333</guid>
      <dc:creator>gjw_csco</dc:creator>
      <dc:date>2018-06-05T13:48:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA DAP functionality in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-dap-functionality-in-ise/m-p/3591036#M509334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Gregory,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you seen the response to a similar question?&amp;nbsp; This might be what the customer is looking for:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://supportforums.cisco.com/t5/vpn/asa-5525x-anyconnect-configuration-with-ise-2-1/td-p/2997585" rel="nofollow" target="_blank"&gt;https://supportforums.cisco.com/t5/vpn/asa-5525x-anyconnect-configuration-with-ise-2-1/td-p/2997585&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2018 14:00:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-dap-functionality-in-ise/m-p/3591036#M509334</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2018-06-05T14:00:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA DAP functionality in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-dap-functionality-in-ise/m-p/3591037#M509338</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, ISE can return an attribute like Class 25 which contains the Group Policy name.&amp;nbsp; There is a section in DAP that allows mapping of RADIUS attributes to DAP policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Jun 2018 14:17:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-dap-functionality-in-ise/m-p/3591037#M509338</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-06-06T14:17:38Z</dc:date>
    </item>
  </channel>
</rss>

