<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Yes, ISE can do all this with in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/aaa-with-ise/m-p/2671531#M54754</link>
    <description>&lt;P&gt;Yes, ISE can do all this with one exception, TACACS is not supported yet (will be this year), so you would need to use radius for switch logins, and if you need to have different levels of access you will need to use privilege level instead of command authorization in tacacs.&lt;/P&gt;</description>
    <pubDate>Wed, 15 Jul 2015 16:50:31 GMT</pubDate>
    <dc:creator>jan.nielsen</dc:creator>
    <dc:date>2015-07-15T16:50:31Z</dc:date>
    <item>
      <title>AAA with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-with-ise/m-p/2671530#M54751</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We are putting new LAN in our 10 new sites and planning to authenticate all our network devices ( router, switches, AP, laptop and desktop).&lt;/P&gt;&lt;P&gt;We also need AAA ( TACACS or Radius) access for network devices.&lt;/P&gt;&lt;P&gt;Do we need separate ACS for this purposes to work with ISE?&lt;/P&gt;&lt;P&gt;can ISE do this all ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:54:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-with-ise/m-p/2671530#M54751</guid>
      <dc:creator>mohammedrafiq</dc:creator>
      <dc:date>2019-03-11T05:54:30Z</dc:date>
    </item>
    <item>
      <title>Yes, ISE can do all this with</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-with-ise/m-p/2671531#M54754</link>
      <description>&lt;P&gt;Yes, ISE can do all this with one exception, TACACS is not supported yet (will be this year), so you would need to use radius for switch logins, and if you need to have different levels of access you will need to use privilege level instead of command authorization in tacacs.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2015 16:50:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-with-ise/m-p/2671531#M54754</guid>
      <dc:creator>jan.nielsen</dc:creator>
      <dc:date>2015-07-15T16:50:31Z</dc:date>
    </item>
  </channel>
</rss>

