<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: scale information about ISE2.2 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/scale-information-about-ise2-2/m-p/3584182#M525050</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Additionally, under ISE 2.2 we validated the following specific to auth policy rules...&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image" height="111" src="https://community.cisco.com/legacyfs/online/fusion/107120_pastedImage_1.png" style="width: 329.172px; height: 111px;" width="329" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 10 May 2017 18:25:17 GMT</pubDate>
    <dc:creator>Craig Hyps</dc:creator>
    <dc:date>2017-05-10T18:25:17Z</dc:date>
    <item>
      <title>scale information about ISE2.2</title>
      <link>https://community.cisco.com/t5/network-access-control/scale-information-about-ise2-2/m-p/3584180#M525045</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Q1. Max number of Endpoint identity groups we can configure.&lt;/P&gt;&lt;P&gt;customer needs 200 endpoint identity groups.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Q2. Max number of Authorization profiles we can configure.&lt;/P&gt;&lt;P&gt;customer needs 400 &lt;SPAN style="font-size: 13.3333px;"&gt;Authorization profiles.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 May 2017 07:35:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/scale-information-about-ise2-2/m-p/3584180#M525045</guid>
      <dc:creator>naogawa</dc:creator>
      <dc:date>2017-05-08T07:35:21Z</dc:date>
    </item>
    <item>
      <title>Re: scale information about ISE2.2</title>
      <link>https://community.cisco.com/t5/network-access-control/scale-information-about-ise2-2/m-p/3584181#M525047</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;500 EP ID groups; 600 authz profiles.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 May 2017 00:32:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/scale-information-about-ise2-2/m-p/3584181#M525047</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-05-09T00:32:22Z</dc:date>
    </item>
    <item>
      <title>Re: scale information about ISE2.2</title>
      <link>https://community.cisco.com/t5/network-access-control/scale-information-about-ise2-2/m-p/3584182#M525050</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Additionally, under ISE 2.2 we validated the following specific to auth policy rules...&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image" height="111" src="https://community.cisco.com/legacyfs/online/fusion/107120_pastedImage_1.png" style="width: 329.172px; height: 111px;" width="329" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 May 2017 18:25:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/scale-information-about-ise2-2/m-p/3584182#M525050</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-05-10T18:25:17Z</dc:date>
    </item>
    <item>
      <title>Re: scale information about ISE2.2</title>
      <link>https://community.cisco.com/t5/network-access-control/scale-information-about-ise2-2/m-p/3584183#M525052</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you so much! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 May 2017 00:40:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/scale-information-about-ise2-2/m-p/3584183#M525052</guid>
      <dc:creator>naogawa</dc:creator>
      <dc:date>2017-05-11T00:40:39Z</dc:date>
    </item>
    <item>
      <title>Re: scale information about ISE2.2</title>
      <link>https://community.cisco.com/t5/network-access-control/scale-information-about-ise2-2/m-p/3584184#M525053</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank yo so much. your information is really helpful.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 May 2017 00:41:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/scale-information-about-ise2-2/m-p/3584184#M525053</guid>
      <dc:creator>naogawa</dc:creator>
      <dc:date>2017-05-11T00:41:05Z</dc:date>
    </item>
    <item>
      <title>Re: scale information about ISE2.2</title>
      <link>https://community.cisco.com/t5/network-access-control/scale-information-about-ise2-2/m-p/3584185#M525054</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 12px; font-family: arial; color: #3d3d3d;"&gt;customer demand us they need over 1000 identity groups.&lt;/P&gt;&lt;P style="font-size: 12px; font-family: arial; color: #3d3d3d;"&gt;is there any roadmap to increase the scale?&lt;/P&gt;&lt;P style="font-size: 12px; font-family: arial; color: #3d3d3d;"&gt;we need the information o respond RFP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Aug 2017 05:27:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/scale-information-about-ise2-2/m-p/3584185#M525054</guid>
      <dc:creator>naogawa</dc:creator>
      <dc:date>2017-08-30T05:27:28Z</dc:date>
    </item>
    <item>
      <title>Re: scale information about ISE2.2</title>
      <link>https://community.cisco.com/t5/network-access-control/scale-information-about-ise2-2/m-p/3584186#M525055</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please contact ISE PM team on roadmap inquiries.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Aug 2017 05:51:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/scale-information-about-ise2-2/m-p/3584186#M525055</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-08-30T05:51:34Z</dc:date>
    </item>
    <item>
      <title>Re: scale information about ISE2.2</title>
      <link>https://community.cisco.com/t5/network-access-control/scale-information-about-ise2-2/m-p/3584187#M525056</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The original post was about Auth Policy (Policy Sets, AuthC Rules, AuthZ Rules).&amp;nbsp; Your last request was about Identity Groups.&amp;nbsp;&amp;nbsp; I recommend reassessing the need for so many identity groups.&amp;nbsp; Did you know that ISE 2.1 and above support endpoint custom attributes?&amp;nbsp; You could assign unique values to the custom attribute that can translate into unique group value, and then apply policy based on that.&amp;nbsp; However, you still do not want a policy where you get into "If Group=X" or "If CustomAttr1=X", then permit..., because you would have a rule explosion.&amp;nbsp; It is best to have policy leverage dynamic attributes where the value assignment is based on value assigned to internal or external ID store.&amp;nbsp; Example:&amp;nbsp; Set VLAN or SGT based on value assigned to customer attribute, or to AD/LDAP attribute for given user/endpoint.&amp;nbsp; This way you consolidate many rules into one or few.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Aug 2017 13:05:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/scale-information-about-ise2-2/m-p/3584187#M525056</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-08-30T13:05:31Z</dc:date>
    </item>
    <item>
      <title>Re: scale information about ISE2.2</title>
      <link>https://community.cisco.com/t5/network-access-control/scale-information-about-ise2-2/m-p/3584188#M525057</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your comments.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;I would like to know how to set &lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;endpoint custom attribute based &lt;/SPAN&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;LDAP attribute for given user/endpoint.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I want to set unique &lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;endpoint custom attribute based on &lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;LDAP attribute for given user/endpoint.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;is it possible using authorization policy rule?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;customer wants to handle and &lt;/SPAN&gt;assignment&lt;SPAN style="font-size: 10pt;"&gt; 1000VLANs &lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;based on &lt;/SPAN&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;LDAP attribute for given user/endpoint.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;but Identity Groups's limit is 500 so, I 'm thinking using also custom attributes.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;your comments would be really appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Customer's authentication/authorization flow, &lt;/P&gt;&lt;P&gt;1.When an endpoint accesses to network first time,&lt;/P&gt;&lt;P&gt;the endpoint's mac address authentication is failed because it is not un-registered&lt;/P&gt;&lt;P&gt;and is authorized by CWA with LDAP user/password. &lt;/P&gt;&lt;P&gt;2.During this time, register the endpoints to Identity Groups and&lt;/P&gt;&lt;P&gt;(want to set custom attributes also but i don't know how to set this) &lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;based on &lt;/SPAN&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;LDAP attribute for given user/endpoint&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;3.&lt;SPAN style="font-size: 13.3333px;"&gt;Assign VLAN based on &lt;/SPAN&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;LDAP attribute for given user/endpoint&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;4. on the 2nd network access of the &lt;/SPAN&gt;endpoints,&lt;SPAN style="font-size: 10pt;"&gt; &lt;SPAN style="font-size: 13.3333px;"&gt;the endpoint's mac address authentication is passed &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;and&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt; assign VLAN based on Identity Group and Custom attribute &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Nana&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Sep 2017 07:40:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/scale-information-about-ise2-2/m-p/3584188#M525057</guid>
      <dc:creator>naogawa</dc:creator>
      <dc:date>2017-09-08T07:40:34Z</dc:date>
    </item>
    <item>
      <title>Re: scale information about ISE2.2</title>
      <link>https://community.cisco.com/t5/network-access-control/scale-information-about-ise2-2/m-p/3584189#M525058</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You cannot dynamically assign custom attribute today based on auth result, unless performed some external scripting to perform such update.&amp;nbsp; Such scripting is outside the scope of forum but could be triggered based on RADIUS auth log events.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that most cases, the endpoint will continue to Authorization anyway even if not yet learned by ISE, so authorization policy matching ends up being the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If already know the VLAN that you want user to be assigned to, then add that as a field in their AD/LDAP record and then configure Authorization Profile to set VLAN dynamically based on the attribute value.&amp;nbsp; In example below, the user record in AD was updated so that the PostalCode attribute had the VLAN number or name for the user.&amp;nbsp; Same applies to LDAP.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/111101_pastedImage_2.png" style="max-width: 1200px; max-height: 900px;" /&gt;&lt;/P&gt;&lt;P&gt;/Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Sep 2017 12:40:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/scale-information-about-ise2-2/m-p/3584189#M525058</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-09-08T12:40:01Z</dc:date>
    </item>
  </channel>
</rss>

