<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE - Multiple dACL in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-multiple-dacl/m-p/4709635#M577916</link>
    <description>&lt;P&gt;That's... A lot of work...&lt;BR /&gt;Thank you for your help.&lt;/P&gt;</description>
    <pubDate>Tue, 25 Oct 2022 17:12:28 GMT</pubDate>
    <dc:creator>mjrduarte</dc:creator>
    <dc:date>2022-10-25T17:12:28Z</dc:date>
    <item>
      <title>ISE - Multiple dACL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-multiple-dacl/m-p/4709623#M577912</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;I have a scenario where ISE controls VPN access from a ASA.&lt;BR /&gt;Each user belongs to a certain AD group, and I want to configure different Authorization Profiles based on membership.&lt;BR /&gt;Those profiles push dACL to the client.&lt;/P&gt;&lt;P&gt;My question is if it's possible for a client to receive more than one dACL.&lt;BR /&gt;I have several ACLs that are common to everyone (like DNS resolution, or AD authentication).&lt;BR /&gt;I tried to add more than one Profiles on the Authorization Profile in the Policy Set, but it seems that only one gets pushed.&lt;/P&gt;&lt;P&gt;Thanks in advance for any help.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Oct 2022 16:55:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-multiple-dacl/m-p/4709623#M577912</guid>
      <dc:creator>mjrduarte</dc:creator>
      <dc:date>2022-10-25T16:55:19Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Multiple dACL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-multiple-dacl/m-p/4709626#M577913</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/227765"&gt;@mjrduarte&lt;/a&gt; only one DACL would be applied to a session. You'd have to create additional DACLs that combine all the rules that you want to apply.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Oct 2022 17:04:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-multiple-dacl/m-p/4709626#M577913</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-10-25T17:04:44Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Multiple dACL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-multiple-dacl/m-p/4709629#M577914</link>
      <description>&lt;P&gt;I never tested it but I am pretty sure that this is the expected behaviour. You need to build "complete" ACLs for each context.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Oct 2022 17:05:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-multiple-dacl/m-p/4709629#M577914</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2022-10-25T17:05:44Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Multiple dACL</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-multiple-dacl/m-p/4709635#M577916</link>
      <description>&lt;P&gt;That's... A lot of work...&lt;BR /&gt;Thank you for your help.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Oct 2022 17:12:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-multiple-dacl/m-p/4709635#M577916</guid>
      <dc:creator>mjrduarte</dc:creator>
      <dc:date>2022-10-25T17:12:28Z</dc:date>
    </item>
  </channel>
</rss>

