<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE - Policy Set query in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-policy-set-query/m-p/4111044#M561472</link>
    <description>&lt;P&gt;Hello All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;While planning i came across this scenario and just want to cross check with the community.&lt;/P&gt;&lt;P&gt;Hypothetical situation:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If i have two vendor supporting my network devices ( say two vendors X and Y )&lt;/P&gt;&lt;P&gt;X supports security devices say ASA firewalls&lt;/P&gt;&lt;P&gt;Y supports LAN/WAN devices say Switches and ISR routers&lt;/P&gt;&lt;P&gt;They both should not be able to login into each others managed devices.&lt;/P&gt;&lt;P&gt;X should not be able to login with a ssh into ISR&lt;/P&gt;&lt;P&gt;Y should not be able to ssh into ASA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On ISE:&lt;/P&gt;&lt;P&gt;-I define two NDG - Security_Devices and IOS_Devices&lt;/P&gt;&lt;P&gt;-I define two DAG - X_Staff and Y_Staff&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way i can set a authentication policy that blocks X_Staff to authenticate on IOS_Devices ? and vice versa?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As far as i understand, authentication&amp;nbsp; can not be conditioned using "DAG" and I have no way to restrict authentication of X_Staff on IOS devices ? I can limit/deny authorization but not authentication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does that sound correct? Anyone can "authenticate" into any device as long as they are part of same identity source ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks in advance&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 30 Jun 2020 01:31:37 GMT</pubDate>
    <dc:creator>Rajiv Mishra</dc:creator>
    <dc:date>2020-06-30T01:31:37Z</dc:date>
    <item>
      <title>ISE - Policy Set query</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-policy-set-query/m-p/4111044#M561472</link>
      <description>&lt;P&gt;Hello All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;While planning i came across this scenario and just want to cross check with the community.&lt;/P&gt;&lt;P&gt;Hypothetical situation:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If i have two vendor supporting my network devices ( say two vendors X and Y )&lt;/P&gt;&lt;P&gt;X supports security devices say ASA firewalls&lt;/P&gt;&lt;P&gt;Y supports LAN/WAN devices say Switches and ISR routers&lt;/P&gt;&lt;P&gt;They both should not be able to login into each others managed devices.&lt;/P&gt;&lt;P&gt;X should not be able to login with a ssh into ISR&lt;/P&gt;&lt;P&gt;Y should not be able to ssh into ASA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On ISE:&lt;/P&gt;&lt;P&gt;-I define two NDG - Security_Devices and IOS_Devices&lt;/P&gt;&lt;P&gt;-I define two DAG - X_Staff and Y_Staff&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way i can set a authentication policy that blocks X_Staff to authenticate on IOS_Devices ? and vice versa?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As far as i understand, authentication&amp;nbsp; can not be conditioned using "DAG" and I have no way to restrict authentication of X_Staff on IOS devices ? I can limit/deny authorization but not authentication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does that sound correct? Anyone can "authenticate" into any device as long as they are part of same identity source ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks in advance&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jun 2020 01:31:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-policy-set-query/m-p/4111044#M561472</guid>
      <dc:creator>Rajiv Mishra</dc:creator>
      <dc:date>2020-06-30T01:31:37Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Policy Set query</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-policy-set-query/m-p/4116637#M561626</link>
      <description>&lt;P&gt;Sounds like a perfect use-case for using SGTs. Define groups for Vendors and groups for different access devices. Set enforcement as necessary.&lt;/P&gt;
&lt;P&gt;If it's purely for authentication then have you looked at TACACS?&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jul 2020 14:38:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-policy-set-query/m-p/4116637#M561626</guid>
      <dc:creator>jeaves@cisco.com</dc:creator>
      <dc:date>2020-07-10T14:38:35Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Policy Set query</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-policy-set-query/m-p/4116788#M561632</link>
      <description>&lt;P&gt;I think what you need is to configure authorization policies you can set permission to enter only the network elements you define.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jul 2020 19:00:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-policy-set-query/m-p/4116788#M561632</guid>
      <dc:creator>aosorno</dc:creator>
      <dc:date>2020-07-10T19:00:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Policy Set query</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-policy-set-query/m-p/4117035#M561640</link>
      <description>&lt;P&gt;You are correct and both responders Joff and aosomo provided some inputs.&lt;/P&gt;
&lt;P&gt;If you need some example, see&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-documents/ise-device-administration-tacacs/ta-p/3621655" target="_self"&gt;ISE Device Administration resources for TACACS+ and RADIUS&lt;/A&gt;&amp;nbsp;especially&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-documents/ise-device-administration-prescriptive-deployment-guide/ta-p/3738365" target="_self"&gt;ISE Device Administration Prescriptive Deployment Guide&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Jul 2020 18:19:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-policy-set-query/m-p/4117035#M561640</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2020-07-11T18:19:02Z</dc:date>
    </item>
  </channel>
</rss>

