<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISFW in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/isfw/m-p/4923241#M584038</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/306956"&gt;@bluesea2010&lt;/a&gt;&amp;nbsp;a DACL would certainly be the simplest to implement.&lt;/P&gt;
&lt;P&gt;You could place VLANs B and C in one VRF and VLAN A on another and setup routing so you must route through the firewall to communicate between VRFs.&lt;/P&gt;
&lt;P&gt;Or you could look at TrustSec to segment traffic between VLANs.&lt;/P&gt;</description>
    <pubDate>Thu, 14 Sep 2023 07:01:21 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2023-09-14T07:01:21Z</dc:date>
    <item>
      <title>ISFW</title>
      <link>https://community.cisco.com/t5/network-access-control/isfw/m-p/4923054#M584036</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I have Cisco ISE, and our access layer operates at Layer 3. We have VLANs A, B, and C, and our objective is to prevent traffic from VLANs B and C from reaching VLAN A.&lt;/P&gt;&lt;P&gt;All our access layer switches are configured as Layer 3. Is it possible to implement a Dynamic Access Control List (DACL) for this purpose, or should I consider pushing traffic to an Internal Segmentation Firewall (ISFW)? If the latter is feasible, could you please provide guidance on how to set it up?&lt;/P&gt;&lt;P&gt;Additionally, I'm curious about the use of Virtual Routing and Forwarding (VRF) for achieving this segmentation.&lt;/P&gt;&lt;P&gt;I would greatly appreciate any advice or recommendations you can offer on these topics. Thank you in advance for your assistance&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2023 02:41:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/isfw/m-p/4923054#M584036</guid>
      <dc:creator>bluesea2010</dc:creator>
      <dc:date>2023-09-14T02:41:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISFW</title>
      <link>https://community.cisco.com/t5/network-access-control/isfw/m-p/4923241#M584038</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/306956"&gt;@bluesea2010&lt;/a&gt;&amp;nbsp;a DACL would certainly be the simplest to implement.&lt;/P&gt;
&lt;P&gt;You could place VLANs B and C in one VRF and VLAN A on another and setup routing so you must route through the firewall to communicate between VRFs.&lt;/P&gt;
&lt;P&gt;Or you could look at TrustSec to segment traffic between VLANs.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2023 07:01:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/isfw/m-p/4923241#M584038</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-09-14T07:01:21Z</dc:date>
    </item>
  </channel>
</rss>

