<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE Policy Set in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-set/m-p/4956993#M585114</link>
    <description>Ahh, I think I see what you're referring to now! Thanks a ton. I'll go&lt;BR /&gt;ahead and setup new profiler conditions.&lt;BR /&gt;</description>
    <pubDate>Fri, 10 Nov 2023 14:33:11 GMT</pubDate>
    <dc:creator>Wyatt Tegg</dc:creator>
    <dc:date>2023-11-10T14:33:11Z</dc:date>
    <item>
      <title>Cisco ISE Policy Set</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-set/m-p/4956527#M585095</link>
      <description>&lt;P&gt;Hopefully there is an easy explanation for this, but I have had the worst experience using Cisco ISE Policy Sets Conditions Studio. Selecting an attribute for a condition seems to almost never search properly and doesn't find half of the attributes I'm looking for.&lt;/P&gt;&lt;P&gt;For example, I would like to use "DHCP:host-name" or "IP:FQDN" within my condition, but I haven't been able to locate it within the Conditions Studio yet. If I go to Authorization Profiles area since it allows for advanced attributes settings and search within there, it finds it immediately, but I didn't find it anywhere within the drop downs that are given.&lt;/P&gt;&lt;P&gt;I'd assume I don't fully understand what I'm doing or am doing something wrong, but seems pretty logical that those options would be present within the Conditions Studio in my opinion.&lt;/P&gt;&lt;P&gt;This is while running ver 3.1.0.518&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2023 16:16:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-set/m-p/4956527#M585095</guid>
      <dc:creator>Wyatt Tegg</dc:creator>
      <dc:date>2023-11-09T16:16:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Policy Set</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-set/m-p/4956545#M585096</link>
      <description>&lt;P&gt;I do have a workaround for now, but am still would like to figure out why I'm not able to find more attributes within the conditions studio. If I check the MAC address I can see they're listed under "other attributes" containing the value I'd like to set a condition with.&lt;/P&gt;&lt;P&gt;I do understand that it may not be the most secure way of doing it, but all I'm using it for is an additional check. You could relate it to a belt with suspenders.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2023 16:34:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-set/m-p/4956545#M585096</guid>
      <dc:creator>Wyatt Tegg</dc:creator>
      <dc:date>2023-11-09T16:34:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Policy Set</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-set/m-p/4956599#M585097</link>
      <description>&lt;P&gt;Why not use profiling for this instead?&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2023 18:07:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-set/m-p/4956599#M585097</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-11-09T18:07:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Policy Set</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-set/m-p/4956971#M585113</link>
      <description>Thank you for the recommendation ahollifield.&lt;BR /&gt;&lt;BR /&gt;I am using a profiling policy for this and wanted to add an additional&lt;BR /&gt;check. The device I'm working with has a manufacturer that produces&lt;BR /&gt;devices that do different tasks, but ISE was profiling all of their&lt;BR /&gt;devices as one. What my goal was to do is to assign DACLs to each product&lt;BR /&gt;type to limit their communication.&lt;BR /&gt;&lt;BR /&gt;My workaround was to create a sub profiling policy, then I referred to&lt;BR /&gt;that within my policy set. I would have preferred to do this a different&lt;BR /&gt;way, so if you have any recommendations I would be happy to hear them.&lt;BR /&gt;&lt;BR /&gt;I guess I was mostly looking for an explanation on why attributes are so&lt;BR /&gt;difficult to locate within the conditions studio.&lt;BR /&gt;&lt;BR /&gt;Thank you!&lt;BR /&gt;</description>
      <pubDate>Fri, 10 Nov 2023 14:06:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-set/m-p/4956971#M585113</guid>
      <dc:creator>Wyatt Tegg</dc:creator>
      <dc:date>2023-11-10T14:06:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Policy Set</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-set/m-p/4956993#M585114</link>
      <description>Ahh, I think I see what you're referring to now! Thanks a ton. I'll go&lt;BR /&gt;ahead and setup new profiler conditions.&lt;BR /&gt;</description>
      <pubDate>Fri, 10 Nov 2023 14:33:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-set/m-p/4956993#M585114</guid>
      <dc:creator>Wyatt Tegg</dc:creator>
      <dc:date>2023-11-10T14:33:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Policy Set</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-set/m-p/4957637#M585146</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1477676"&gt;@Wyatt Tegg&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hear what you're saying. I think Cisco did that intentionally, because the specific types of attribute class you're asking for is handled by Profiling, as &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199513"&gt;@ahollifield&lt;/a&gt;&amp;nbsp;mentioned. It would be a doubling up of functionality if you could access those attributes directly in the Conditions editor (but I agree, it would be handy) . Perhaps also a partial reason is that, during RADIUS Authentication, those attributes are not (yet) present - thus ISE would not have access to them. Attributes like Hostname, OS etc. are learned via the Profiling probes AFTER authentication. And Cisco wants you to pay for the Profiling "premium" feature, whilst other NAC vendors throw that in the base license.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Nov 2023 23:08:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-policy-set/m-p/4957637#M585146</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-11-12T23:08:15Z</dc:date>
    </item>
  </channel>
</rss>

