<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: BeyondTrust Remote Support dACL in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/beyondtrust-remote-support-dacl/m-p/5292907#M596420</link>
    <description>&lt;P&gt;This is extremely challenging to do using a dACL for SaaS products since IPs and domain names can change constantly. I would recommending allowing internet access within the dACL and controlling access via an edge firewall instead. You can integrate said firewall with ISE via pxGrid for user/tag data and control access based on application groups with an NGFW.&lt;/P&gt;</description>
    <pubDate>Thu, 22 May 2025 12:07:35 GMT</pubDate>
    <dc:creator>ahollifield</dc:creator>
    <dc:date>2025-05-22T12:07:35Z</dc:date>
    <item>
      <title>BeyondTrust Remote Support dACL</title>
      <link>https://community.cisco.com/t5/network-access-control/beyondtrust-remote-support-dacl/m-p/5292675#M596405</link>
      <description>&lt;P&gt;Has anyone created a dACL for BeyondTrust Remote Support when machines are in a non-compliant status?&amp;nbsp; By non-compliant, I'm referring to machine authentication only with either failed user login or no user login.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 16:42:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/beyondtrust-remote-support-dacl/m-p/5292675#M596405</guid>
      <dc:creator>dsykes</dc:creator>
      <dc:date>2025-05-21T16:42:44Z</dc:date>
    </item>
    <item>
      <title>Re: BeyondTrust Remote Support dACL</title>
      <link>https://community.cisco.com/t5/network-access-control/beyondtrust-remote-support-dacl/m-p/5292907#M596420</link>
      <description>&lt;P&gt;This is extremely challenging to do using a dACL for SaaS products since IPs and domain names can change constantly. I would recommending allowing internet access within the dACL and controlling access via an edge firewall instead. You can integrate said firewall with ISE via pxGrid for user/tag data and control access based on application groups with an NGFW.&lt;/P&gt;</description>
      <pubDate>Thu, 22 May 2025 12:07:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/beyondtrust-remote-support-dacl/m-p/5292907#M596420</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-05-22T12:07:35Z</dc:date>
    </item>
  </channel>
</rss>

