<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dynamic Variable Scalability in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/dynamic-variable-scalability/m-p/4436999#M568605</link>
    <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/192011"&gt;@paul&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;I didn't find a &lt;STRONG&gt;Dynamic Variable&lt;/STRONG&gt; performance/scale info, but please take a look at: &lt;A href="https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2020/pdf/R6BGArNQ/TECSEC-3416.pdf" target="_blank" rel="noopener"&gt;TECSEC-3416&lt;/A&gt;, search for: &lt;STRONG&gt;Dynamic Variable Substitution&lt;/STRONG&gt; (rule reduction) and &lt;STRONG&gt;Auth Policy Scale&lt;/STRONG&gt;.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;</description>
    <pubDate>Wed, 21 Jul 2021 23:34:16 GMT</pubDate>
    <dc:creator>Marcelo Morais</dc:creator>
    <dc:date>2021-07-21T23:34:16Z</dc:date>
    <item>
      <title>Dynamic Variable Scalability</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-variable-scalability/m-p/4436770#M568589</link>
      <description>&lt;P&gt;I have a large customer looking to leverage dynamic variables on their endpoints to lock certain endpoints into a particular department (serviced by a set of IDF), certain switches and potentially a certain port on a switch.&amp;nbsp; I can do all this easily using dynamic variable matching, but the customer asked how does this scale.&amp;nbsp; Do we have any data on dynamic variable performance?&amp;nbsp; The majority of the matches would use the Contains logic, but I do have one doing a MATCHES (Regex).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As an example I use the version under the network device to tag it with departments serviced by that switch "HR-Legal-IT-Any".&amp;nbsp; Then on the endpoint I add 3 custom attributes:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Department code&lt;/LI&gt;&lt;LI&gt;Switch&lt;/LI&gt;&lt;LI&gt;Port&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Then my rules simply says:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Device:Version Contains Endpoint:Department Code&lt;/LI&gt;&lt;LI&gt;Network Access:Network Device Name Matches Endpoint:Switch&lt;/LI&gt;&lt;LI&gt;RADIUS:NAS-Port-ID Contains Endpoint:Port&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;So under the endpoint I can set the 3 attributes to say:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;HR&lt;/LI&gt;&lt;LI&gt;.*&lt;/LI&gt;&lt;LI&gt;Ethernet&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;That would allow the device to connect to any switch coded for HR on any port.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can set another endpoint like this:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Any&lt;/LI&gt;&lt;LI&gt;IDF-1&lt;/LI&gt;&lt;LI&gt;1/0/1&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;To lock the device into the IDF-1 switch on port 1/0/1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just not sure how to measure scalability.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jul 2021 15:46:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-variable-scalability/m-p/4436770#M568589</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2021-07-21T15:46:59Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Variable Scalability</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-variable-scalability/m-p/4436999#M568605</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/192011"&gt;@paul&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;I didn't find a &lt;STRONG&gt;Dynamic Variable&lt;/STRONG&gt; performance/scale info, but please take a look at: &lt;A href="https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2020/pdf/R6BGArNQ/TECSEC-3416.pdf" target="_blank" rel="noopener"&gt;TECSEC-3416&lt;/A&gt;, search for: &lt;STRONG&gt;Dynamic Variable Substitution&lt;/STRONG&gt; (rule reduction) and &lt;STRONG&gt;Auth Policy Scale&lt;/STRONG&gt;.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jul 2021 23:34:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-variable-scalability/m-p/4436999#M568605</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2021-07-21T23:34:16Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Variable Scalability</title>
      <link>https://community.cisco.com/t5/network-access-control/dynamic-variable-scalability/m-p/4445762#M568908</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/192011"&gt;@paul&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;First, I love your use of Endpoint Customer Attributes to solve this problem!&lt;/P&gt;
&lt;P&gt;As you probably already know, we don't have any specific performance info for string matching using CONTAINS vs REGEX. You gave a couple great examples but I don't know how many of these you have in total. We do have some policy maximums&amp;nbsp; @ &lt;A href="https://cs.co/ise-scale" target="_blank"&gt;https://cs.co/ise-scale&lt;/A&gt; to keep in mind so you don't get too crazy with the number or rules.&lt;/P&gt;
&lt;TABLE style="font-size: 0.8em; width: 100%;" border="1" width="99.8891352549889%" cellspacing="0" cellpadding="1"&gt;
&lt;TBODY&gt;
&lt;TR style="vertical-align: top;"&gt;
&lt;TH style="text-align: center; vertical-align: bottom;" width="29.60088691796009%"&gt;&lt;STRONG&gt;Attribute&lt;/STRONG&gt;&lt;/TH&gt;
&lt;TH style="text-align: center; vertical-align: bottom;" width="24.390243902439025%"&gt;&lt;STRONG&gt;ISE 2.2 Maximums&lt;/STRONG&gt;&lt;/TH&gt;
&lt;TH style="text-align: center; vertical-align: bottom;" width="22.9490022172949%"&gt;&lt;STRONG&gt;ISE 2.4 Maximums&lt;/STRONG&gt;&lt;/TH&gt;
&lt;TH style="text-align: center; vertical-align: bottom;" width="22.9490022172949%"&gt;&lt;STRONG&gt;ISE 2.6&lt;/STRONG&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;TR style="vertical-align: top;"&gt;
&lt;TD width="29.60088691796009%"&gt;Maximum Policy Sets&lt;/TD&gt;
&lt;TD width="24.390243902439025%" align="right"&gt;100&lt;/TD&gt;
&lt;TD width="22.9490022172949%" align="right"&gt;200&lt;/TD&gt;
&lt;TD width="22.9490022172949%" align="right"&gt;200&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="vertical-align: top;"&gt;
&lt;TD width="29.60088691796009%"&gt;Maximum Authentication Rules&lt;/TD&gt;
&lt;TD width="24.390243902439025%" align="right"&gt;Simple Policy Mode: 100&lt;BR /&gt;Policy Set Mode: 200&lt;/TD&gt;
&lt;TD width="22.9490022172949%" align="right"&gt;Policy Set Mode: 1000&lt;/TD&gt;
&lt;TD width="22.9490022172949%" align="right"&gt;Policy Set Mode: 1000&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="vertical-align: top;"&gt;
&lt;TD width="29.60088691796009%"&gt;Maximum Authorization Rules&lt;/TD&gt;
&lt;TD width="24.390243902439025%" align="right"&gt;Simple Policy Mode: 600 &lt;BR /&gt;Policy Set Mode: 700&lt;/TD&gt;
&lt;TD width="22.9490022172949%" align="right"&gt;Policy Set Mode: 3,000&lt;BR /&gt;(3200 Authz profiles)&lt;/TD&gt;
&lt;TD width="22.9490022172949%" align="right"&gt;Policy Set Mode: 3,000&lt;BR /&gt;(3200 Authz profiles)&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Suggestions:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;You said you're doing this by Department ... I highly recommend assigning each Network Device with Network Device Groups (NDGs) with it's respective Department rather than repurposing the Software Version field and doing a string compare! This is exactly what NDGs were meant for!&lt;/LI&gt;
&lt;LI&gt;With NDGs in place, it &lt;EM&gt;may&lt;/EM&gt; help to split some (all?!?) Departments into their own Policy Sets to branch by Network Device Group totally eliminate compares for other Departments.&lt;/LI&gt;
&lt;LI&gt;Review your Policy Set(s) Hit Counts and move the rules with the higher counts to the top for faster matching and fewer compares overall&lt;/LI&gt;
&lt;LI&gt;Shorter strings ("HR") match faster than longer strings ("Human Resources") so use shorter strings when possible without sacrificing human readability. It looks like you're doing this with HR and eliminating "GigabitEthernet" from your port name but you asked about performance so I wanted to confirm this is good!&lt;/LI&gt;
&lt;LI&gt;For rules with similar hit counts, move the first order compares with shorter strings to the top&lt;/LI&gt;
&lt;LI&gt;For timing data, look at your LiveLog Details for total authentication time to compare your different methods&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 07 Aug 2021 03:27:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dynamic-variable-scalability/m-p/4445762#M568908</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2021-08-07T03:27:58Z</dc:date>
    </item>
  </channel>
</rss>

