<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE with ip source-guard in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-with-ip-source-guard/m-p/3594572#M538387</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="http://www.ciscopress.com/articles/article.asp?p=1181682&amp;amp;seqNum=7"&gt;IP Source Guard&lt;/A&gt;&lt;SPAN style="font-size: 10pt;"&gt; is a security feature on Cisco IOS switches but not on ISE so you should consult with the support and product teams on Cisco IOS switch platforms. There is no report on its conflicting with DOT1X so it should be safe to use.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;A href="http://packetlife.net/blog/2009/may/25/ip-source-guard-without-dhcp/"&gt;IP source guard without DHCP - PacketLife.net&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt; shows it requires DHCP snooping enabled for static IP addresses.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 03 Jul 2016 20:49:28 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2016-07-03T20:49:28Z</dc:date>
    <item>
      <title>ISE with ip source-guard</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-with-ip-source-guard/m-p/3594571#M538386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are &lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;there are best practices around using ISE with source-guard, since source-guard will apply a port ACL, what do we recommend in terms of deployment in these cases?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jun 2016 19:15:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-with-ip-source-guard/m-p/3594571#M538386</guid>
      <dc:creator>jaosgood</dc:creator>
      <dc:date>2016-06-30T19:15:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE with ip source-guard</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-with-ip-source-guard/m-p/3594572#M538387</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="http://www.ciscopress.com/articles/article.asp?p=1181682&amp;amp;seqNum=7"&gt;IP Source Guard&lt;/A&gt;&lt;SPAN style="font-size: 10pt;"&gt; is a security feature on Cisco IOS switches but not on ISE so you should consult with the support and product teams on Cisco IOS switch platforms. There is no report on its conflicting with DOT1X so it should be safe to use.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;A href="http://packetlife.net/blog/2009/may/25/ip-source-guard-without-dhcp/"&gt;IP source guard without DHCP - PacketLife.net&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt; shows it requires DHCP snooping enabled for static IP addresses.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Jul 2016 20:49:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-with-ip-source-guard/m-p/3594572#M538387</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2016-07-03T20:49:28Z</dc:date>
    </item>
    <item>
      <title>Re: ISE with ip source-guard</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-with-ip-source-guard/m-p/3840842#M538388</link>
      <description>&lt;P&gt;Hi Hsai,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To stop mac spoofing normally recommendation is to enable Dynamic Arp inspection and IP source guard.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1)Will there be any issue to function ISE with dot1x ,if we enable above DAI and source guard.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) Do we really need to enable DAI and Source guard ,in a ISE enabled environment. Can't ISE itself detect mac spoofing&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2019 06:47:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-with-ip-source-guard/m-p/3840842#M538388</guid>
      <dc:creator>hasitha siriwardhana</dc:creator>
      <dc:date>2019-04-18T06:47:51Z</dc:date>
    </item>
  </channel>
</rss>

