<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using endpoint IP address as an AuthZ condition in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/using-endpoint-ip-address-as-an-authz-condition/m-p/3584011#M539242</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Robert, it is not possible with current condition set on ISE as you described. Have you looked into whether ASA can define different profiles or VLANs based on their source IP address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hosuk&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 08 Apr 2016 15:10:23 GMT</pubDate>
    <dc:creator>howon</dc:creator>
    <dc:date>2016-04-08T15:10:23Z</dc:date>
    <item>
      <title>Using endpoint IP address as an AuthZ condition</title>
      <link>https://community.cisco.com/t5/network-access-control/using-endpoint-ip-address-as-an-authz-condition/m-p/3584010#M539240</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am looking for a way to use the IP address of the endpoint in an AuthZ policy.&amp;nbsp; I could use Radius-Framed-IP-Address, but the only option is "Equals" or "Not Equal To" and does not give me things like "Starts with".&amp;nbsp; Network Access - Device IP Address has the same issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How would we go about using the endpoint address in a policy?&amp;nbsp; The particular use case is around internal vs external VPN connections and using the source address as the way to determine the origin of the VPN connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any guidance is appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Apr 2016 19:38:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-endpoint-ip-address-as-an-authz-condition/m-p/3584010#M539240</guid>
      <dc:creator>bperciac</dc:creator>
      <dc:date>2016-04-07T19:38:00Z</dc:date>
    </item>
    <item>
      <title>Re: Using endpoint IP address as an AuthZ condition</title>
      <link>https://community.cisco.com/t5/network-access-control/using-endpoint-ip-address-as-an-authz-condition/m-p/3584011#M539242</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Robert, it is not possible with current condition set on ISE as you described. Have you looked into whether ASA can define different profiles or VLANs based on their source IP address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hosuk&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Apr 2016 15:10:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-endpoint-ip-address-as-an-authz-condition/m-p/3584011#M539242</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2016-04-08T15:10:23Z</dc:date>
    </item>
    <item>
      <title>Re: Using endpoint IP address as an AuthZ condition</title>
      <link>https://community.cisco.com/t5/network-access-control/using-endpoint-ip-address-as-an-authz-condition/m-p/3584012#M539243</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bob, have you considered using tunnel groups on the ASA use case instead of IP address?&amp;nbsp; That way you can match on Tunnel-Group-Name in the AuthZ policy to provide differentiated results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sample:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/94445_pastedImage_0.png" style="max-width: 1200px; max-height: 900px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Apr 2016 16:50:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-endpoint-ip-address-as-an-authz-condition/m-p/3584012#M539243</guid>
      <dc:creator>gbekmezi-DD</dc:creator>
      <dc:date>2016-04-08T16:50:10Z</dc:date>
    </item>
    <item>
      <title>Re: Using endpoint IP address as an AuthZ condition</title>
      <link>https://community.cisco.com/t5/network-access-control/using-endpoint-ip-address-as-an-authz-condition/m-p/3584013#M539244</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Public IP address of the client is sent by the ASA in Calling-Station-ID attribute. You will be able to use all the normal operands on that in ISE.&lt;/P&gt;&lt;P&gt;Framed-IP-Address stores the assign IP address from the VPN pool.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Apr 2016 18:51:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-endpoint-ip-address-as-an-authz-condition/m-p/3584013#M539244</guid>
      <dc:creator>vibobrov</dc:creator>
      <dc:date>2016-04-08T18:51:12Z</dc:date>
    </item>
  </channel>
</rss>

