<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 2.4 Authentication Policy - Multiple Rules and Options in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-4-authentication-policy-multiple-rules-and-options/m-p/4460249#M569492</link>
    <description>&lt;P&gt;Hi Muhammed,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just to confirm the continue action is added to the first rule so that if not matched will move to the second rule?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Andrew&lt;/P&gt;</description>
    <pubDate>Mon, 06 Sep 2021 08:05:03 GMT</pubDate>
    <dc:creator>Anubis71</dc:creator>
    <dc:date>2021-09-06T08:05:03Z</dc:date>
    <item>
      <title>ISE 2.4 Authentication Policy - Multiple Rules and Options</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-authentication-policy-multiple-rules-and-options/m-p/4459587#M569457</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am wanting to configure multiple Authentication Policy rules under a policy set, allowing for different certificates authorities. There is already a policy with a certificate authority (Legacy AD Domain) configured but we need to add a new one for a new AD domain as well. If I add a another rule to the Authentication Policy and unfortunately can only place above the current rule, and it matches this rule then all good but if it doesn't does it move to the next rule automatically or do I need to configure the options to be 'continue' rather than 'reject'/'drop'?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Need this during the transition stage between the AD domains.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope this makes sense if not please ping me and I will add more information.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Fri, 03 Sep 2021 17:10:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-authentication-policy-multiple-rules-and-options/m-p/4459587#M569457</guid>
      <dc:creator>Anubis71</dc:creator>
      <dc:date>2021-09-03T17:10:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 Authentication Policy - Multiple Rules and Options</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-authentication-policy-multiple-rules-and-options/m-p/4459616#M569460</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1053315"&gt;@Anubis71&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;you can have many &lt;STRONG&gt;Rules&lt;/STRONG&gt; in an &lt;STRONG&gt;Authentication Policy&lt;/STRONG&gt;.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;Each &lt;STRONG&gt;Rule&lt;/STRONG&gt; has a&amp;nbsp;&lt;STRONG&gt;Condition&lt;/STRONG&gt;&amp;nbsp;and the following &lt;STRONG&gt;Options&lt;/STRONG&gt;: &lt;STRONG&gt;If Auth Fail&lt;/STRONG&gt;, &lt;STRONG&gt;If User Not Found&lt;/STRONG&gt; and &lt;STRONG&gt;If Process Fail&lt;/STRONG&gt;.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;Each &lt;STRONG&gt;Option&lt;/STRONG&gt; can have the following "suboptions":&lt;/P&gt;&lt;P class="lia-align-justify"&gt;. &lt;STRONG&gt;Continue:&amp;nbsp;&lt;/STRONG&gt;jumps to &lt;STRONG&gt;Authorization Policy&lt;/STRONG&gt;, &lt;U&gt;not to the next &lt;STRONG&gt;Rule&lt;/STRONG&gt; of the &lt;STRONG&gt;Authentication Policy&lt;/STRONG&gt;&lt;/U&gt;.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;. &lt;STRONG&gt;Reject:&amp;nbsp;&lt;/STRONG&gt;sends back a reject request&lt;/P&gt;&lt;P class="lia-align-justify"&gt;. &lt;STRONG&gt;Drop:&amp;nbsp;&lt;/STRONG&gt;drop the packet.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;Note: for future reference take a look at&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-7/admin_guide/b_ise_27_admin_guide/b_ISE_admin_27_segmentation.html" target="_blank" rel="noopener"&gt;ISE Administration Guide 2.7&lt;/A&gt;, search for &lt;STRONG&gt;Authentication Failures - Police Result Options&lt;/STRONG&gt; for details of the actions: &lt;STRONG&gt;Continue&lt;/STRONG&gt;, &lt;STRONG&gt;Reject&lt;/STRONG&gt; and &lt;STRONG&gt;Drop&lt;/STRONG&gt;.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Mon, 06 Sep 2021 14:47:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-authentication-policy-multiple-rules-and-options/m-p/4459616#M569460</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2021-09-06T14:47:56Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 Authentication Policy - Multiple Rules and Options</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-authentication-policy-multiple-rules-and-options/m-p/4459795#M569470</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;What I suggest is to put all actions as continue (if auth fail, if user not&lt;BR /&gt;found, if process fail). This will ensure that users are evaluated against&lt;BR /&gt;both ADs until your migration is completed.&lt;BR /&gt;&lt;BR /&gt;Otherwise, it won't move to next rule automatically.&lt;BR /&gt;&lt;BR /&gt;***** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Sat, 04 Sep 2021 06:58:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-authentication-policy-multiple-rules-and-options/m-p/4459795#M569470</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2021-09-04T06:58:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 Authentication Policy - Multiple Rules and Options</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-authentication-policy-multiple-rules-and-options/m-p/4460246#M569491</link>
      <description>&lt;P&gt;Hi Marcelo,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the response.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Sep 2021 07:58:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-authentication-policy-multiple-rules-and-options/m-p/4460246#M569491</guid>
      <dc:creator>Anubis71</dc:creator>
      <dc:date>2021-09-06T07:58:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 Authentication Policy - Multiple Rules and Options</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-authentication-policy-multiple-rules-and-options/m-p/4460249#M569492</link>
      <description>&lt;P&gt;Hi Muhammed,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just to confirm the continue action is added to the first rule so that if not matched will move to the second rule?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Andrew&lt;/P&gt;</description>
      <pubDate>Mon, 06 Sep 2021 08:05:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-authentication-policy-multiple-rules-and-options/m-p/4460249#M569492</guid>
      <dc:creator>Anubis71</dc:creator>
      <dc:date>2021-09-06T08:05:03Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 Authentication Policy - Multiple Rules and Options</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-authentication-policy-multiple-rules-and-options/m-p/4460365#M569505</link>
      <description>Yes, that is correct.&lt;BR /&gt;&lt;BR /&gt;*** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Mon, 06 Sep 2021 11:20:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-authentication-policy-multiple-rules-and-options/m-p/4460365#M569505</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2021-09-06T11:20:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 Authentication Policy - Multiple Rules and Options</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-authentication-policy-multiple-rules-and-options/m-p/4460448#M569519</link>
      <description>&lt;P&gt;Thanks Mohammed.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Sep 2021 14:03:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-authentication-policy-multiple-rules-and-options/m-p/4460448#M569519</guid>
      <dc:creator>Anubis71</dc:creator>
      <dc:date>2021-09-06T14:03:08Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 Authentication Policy - Multiple Rules and Options</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-authentication-policy-multiple-rules-and-options/m-p/4460609#M569543</link>
      <description>&lt;P&gt;No, that is not correct. As&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/17232"&gt;@Marcelo Morais&lt;/a&gt; states in his previous message, the CONTINUE option for 'If user not found' results in the session 'falling-through' the Authentication Policy to be evaluated in the Authorization Policy.&lt;/P&gt;
&lt;P&gt;This is basically bypassing Authentication for any session that matches your AuthC Policy conditions. This is a pretty big security gap for an 802.1x session, so it should only be used temporarily if needed. The 'If user found = CONTINUE' option is typically used for MAB endpoints to fall-through the AuthC policy to hit the AuthZ policy for profiling.&lt;/P&gt;
&lt;P&gt;With your scenario, you need to look at what conditions would be different between the sessions for your different use cases. If you have different CAs, you should have something different in the certificate that you can match on (Issuer CN, SN, etc) to create differentiated AuthC Policies. Those AuthC Policies could have different CAPs, use different Identity Source Sequences using the different AD join points, etc.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Sep 2021 00:33:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-authentication-policy-multiple-rules-and-options/m-p/4460609#M569543</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-09-07T00:33:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 Authentication Policy - Multiple Rules and Options</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-authentication-policy-multiple-rules-and-options/m-p/4460665#M569548</link>
      <description>Thx &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt; for correcting me.&lt;BR /&gt;</description>
      <pubDate>Tue, 07 Sep 2021 02:22:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-authentication-policy-multiple-rules-and-options/m-p/4460665#M569548</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2021-09-07T02:22:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 Authentication Policy - Multiple Rules and Options</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-authentication-policy-multiple-rules-and-options/m-p/4460954#M569570</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;that changes my AuthC policy quite a bit. Will look into this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Sep 2021 10:24:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-authentication-policy-multiple-rules-and-options/m-p/4460954#M569570</guid>
      <dc:creator>Anubis71</dc:creator>
      <dc:date>2021-09-07T10:24:22Z</dc:date>
    </item>
  </channel>
</rss>

