<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE - Creating complex policy set rules in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-creating-complex-policy-set-rules/m-p/4530323#M572171</link>
    <description>&lt;P&gt;Hi Marcelo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes thats it, so can create but curious to understand how the condition rules link to the correct result profile when have multiple selected. Ive uploaded an example that we are trying to build&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 12 Jan 2022 16:43:00 GMT</pubDate>
    <dc:creator>Marc0</dc:creator>
    <dc:date>2022-01-12T16:43:00Z</dc:date>
    <item>
      <title>Cisco ISE - Creating complex policy set rules</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-creating-complex-policy-set-rules/m-p/4530186#M572163</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have ISE 2.7 and trying to create policy set rules in line with 802.1x rollout which is fairly straight forward.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, im trying to find out if ISE will allow the creation of a single authorization policy rule with multiple conditions rules but mapping them to multiple results profiles?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone know if this is possible and&amp;nbsp;If so, are there instructions on on doing this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jan 2022 13:07:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-creating-complex-policy-set-rules/m-p/4530186#M572163</guid>
      <dc:creator>Marc0</dc:creator>
      <dc:date>2022-01-12T13:07:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Creating complex policy set rules</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-creating-complex-policy-set-rules/m-p/4530255#M572166</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/493111"&gt;@Marc0&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;something like this:&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MultipleResults.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/141009i0A03080453E205F0/image-size/large?v=v2&amp;amp;px=999" role="button" title="MultipleResults.png" alt="MultipleResults.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jan 2022 15:06:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-creating-complex-policy-set-rules/m-p/4530255#M572166</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2022-01-12T15:06:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Creating complex policy set rules</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-creating-complex-policy-set-rules/m-p/4530323#M572171</link>
      <description>&lt;P&gt;Hi Marcelo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes thats it, so can create but curious to understand how the condition rules link to the correct result profile when have multiple selected. Ive uploaded an example that we are trying to build&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jan 2022 16:43:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-creating-complex-policy-set-rules/m-p/4530323#M572171</guid>
      <dc:creator>Marc0</dc:creator>
      <dc:date>2022-01-12T16:43:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Creating complex policy set rules</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-creating-complex-policy-set-rules/m-p/4530537#M572181</link>
      <description>&lt;P&gt;See a related discussion here - &lt;A href="https://community.cisco.com/t5/network-access-control/authorization-permissions-in-one-or-multiple-authorization/m-p/3717336" target="_blank" rel="noopener"&gt;Authorization permissions in one or multiple authorization profiles&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you 'stack' AuthZ Profiles, they are all applied to the session so you want to ensure there are no overlapping attributes (dACL, dVLAN, etc) as there is no way to specify the order in which they are applied.&lt;/P&gt;
&lt;P&gt;For your example, both AuthZ Profiles would be applied to any session that matches any of your OR conditions.&lt;/P&gt;
&lt;P&gt;I've personally never stacked AuthZ Profiles on any customer deployments as I feel they add more complexity rather than reducing it.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jan 2022 23:47:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-creating-complex-policy-set-rules/m-p/4530537#M572181</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-01-12T23:47:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Creating complex policy set rules</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-creating-complex-policy-set-rules/m-p/4530653#M572183</link>
      <description>&lt;P&gt;Thanks Greg for the response.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So if the view is not to stack the AuthZ profiles, is there a limitation on the number of AuthZ profiles that can be held in one policy set rule?&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jan 2022 08:28:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-creating-complex-policy-set-rules/m-p/4530653#M572183</guid>
      <dc:creator>Marc0</dc:creator>
      <dc:date>2022-01-13T08:28:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - Creating complex policy set rules</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-creating-complex-policy-set-rules/m-p/4531152#M572196</link>
      <description>&lt;P&gt;As per the &lt;A href="https://cs.co/ise-scale" target="_blank" rel="noopener"&gt;Scalability Guide&lt;/A&gt;... "It is not recommended to have more than 600 authorization rules in a single policy set"&lt;/P&gt;
&lt;P&gt;If you have a 1:1 ratio of AuthZ Profiles to AuthZ Policy rules, the recommended max AuthZ Profiles per Policy Set would also be 600.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jan 2022 21:55:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-creating-complex-policy-set-rules/m-p/4531152#M572196</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-01-13T21:55:42Z</dc:date>
    </item>
  </channel>
</rss>

