<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DNAC and ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/dnac-and-ise/m-p/4428181#M568318</link>
    <description>&lt;P&gt;Honest question.&lt;/P&gt;&lt;P&gt;If I have a global ISE solution running (v2.7p3) 802.1X authentication with PKI certificates really well and want to develop an access-layer SDA policy using TrustSec SGT's to provide simple business entity level segmentation, why do I need DNAC?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have all of my access-layer switches and WLAN controllers in ISE already and the endpoint clients are running a TEAP/EAP-chain enabled supplicant.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not seeing the need here other than activity based policy assurance.&amp;nbsp; I'm also running pxGrid that allows Tanium to quarantine endpoints that fail its compliance policy.&amp;nbsp; All working well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Happy to be proved wrong, just need to understand the benefit of the investment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
    <pubDate>Mon, 05 Jul 2021 16:34:39 GMT</pubDate>
    <dc:creator>DaveHenderson22596</dc:creator>
    <dc:date>2021-07-05T16:34:39Z</dc:date>
    <item>
      <title>DNAC and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-and-ise/m-p/4428181#M568318</link>
      <description>&lt;P&gt;Honest question.&lt;/P&gt;&lt;P&gt;If I have a global ISE solution running (v2.7p3) 802.1X authentication with PKI certificates really well and want to develop an access-layer SDA policy using TrustSec SGT's to provide simple business entity level segmentation, why do I need DNAC?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have all of my access-layer switches and WLAN controllers in ISE already and the endpoint clients are running a TEAP/EAP-chain enabled supplicant.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not seeing the need here other than activity based policy assurance.&amp;nbsp; I'm also running pxGrid that allows Tanium to quarantine endpoints that fail its compliance policy.&amp;nbsp; All working well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Happy to be proved wrong, just need to understand the benefit of the investment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 16:34:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-and-ise/m-p/4428181#M568318</guid>
      <dc:creator>DaveHenderson22596</dc:creator>
      <dc:date>2021-07-05T16:34:39Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-and-ise/m-p/4428295#M568330</link>
      <description>&lt;P&gt;The Community is intended more for technical questions rather than a sales channel. I will say, however, that there are big differences between a traditional TrustSec network deployment where inline tagging must be used for every hop in the path and an SDA fabric which runs on top of the overlay and simplifies the Propagation of the SGT within the fabric. SDA without DNAC is not supported, likely due to the complexity of connecting all devices in the underlay (routing via IS-IS), building and maintaining the LISP and VXLAN overlays, etc.&lt;/P&gt;
&lt;P&gt;Some other key benefits can be found in the &lt;A href="https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/software-defined-access/solution-overview-c22-739012.html" target="_blank" rel="noopener"&gt;SDA Solution Overview&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;You might also review some of the &lt;A href="https://www.cisco.com/c/en/us/solutions/enterprise-networks/network-architecture-customer-success-stories.html?flt2_general-table0=Cisco%2520SD-Access&amp;amp;flt3_general-table0=null#~case-studies" target="_blank" rel="noopener"&gt;Case Studies&lt;/A&gt; from customers that have deployed DNAC/SDA as well as the various presentations available on &lt;A href="https://www.ciscolive.com/" target="_blank" rel="noopener"&gt;ciscolive.com&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 23:43:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-and-ise/m-p/4428295#M568330</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-07-05T23:43:07Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-and-ise/m-p/4428559#M568343</link>
      <description>&lt;P&gt;Adding additional information:&amp;nbsp;&lt;A href="https://community.cisco.com/t5/networking-documents/cisco-sd-access-resources/ta-p/4196271#Design" target="_blank"&gt;Cisco SD-Access Resources - Cisco Community&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jul 2021 12:58:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-and-ise/m-p/4428559#M568343</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2021-07-06T12:58:59Z</dc:date>
    </item>
  </channel>
</rss>

