<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE ACL merging? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ise-acl-merging/m-p/3180047#M434041</link>
    <description>Hi&lt;BR /&gt;&lt;BR /&gt;Did you found any solution ?</description>
    <pubDate>Tue, 05 Sep 2017 11:14:33 GMT</pubDate>
    <dc:creator>Darius</dc:creator>
    <dc:date>2017-09-05T11:14:33Z</dc:date>
    <item>
      <title>ISE ACL merging?</title>
      <link>https://community.cisco.com/t5/network-security/ise-acl-merging/m-p/2003141#M434040</link>
      <description>&lt;P&gt;Hello all, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like ask you about some technology help&amp;nbsp; .. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Customer would like create policy model for remote-access services based on „roles“. For example :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User1 is member of GroupA in LDAP and is member of GroupB as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Security GroupA specify access to some resources (can be represented as ACL, ACL-A), security GroupB is represented as other pool of resources (as well can be represented as ACL, for example ACL-B).&lt;/P&gt;&lt;P&gt;Final status is, if VPN client will connect, he will get authorization based on both ACL-A and ACL-B. &lt;/P&gt;&lt;P&gt;How can we dynamicaly provide „merging“ of ACLs ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACL merging can’t be provided manualy, because there can be more then 2 security groups and there are more VPN users, which can have various combination of security groups membership. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot for your help, &lt;/P&gt;&lt;P&gt;Regards, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Peter&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 12:39:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-acl-merging/m-p/2003141#M434040</guid>
      <dc:creator>peter-marcek</dc:creator>
      <dc:date>2020-02-21T12:39:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE ACL merging?</title>
      <link>https://community.cisco.com/t5/network-security/ise-acl-merging/m-p/3180047#M434041</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;Did you found any solution ?</description>
      <pubDate>Tue, 05 Sep 2017 11:14:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-acl-merging/m-p/3180047#M434041</guid>
      <dc:creator>Darius</dc:creator>
      <dc:date>2017-09-05T11:14:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE ACL merging?</title>
      <link>https://community.cisco.com/t5/network-security/ise-acl-merging/m-p/3180236#M434043</link>
      <description>&lt;P&gt;You can only apply a single Authorization Result for a given Authorization Profile.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You could create separate custom results and have the profile check for the various combinations and permutations of groups to which a user belongs. That could quickly get out of hand though as there are potentially n*(n-1) of those.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Sep 2017 17:55:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-acl-merging/m-p/3180236#M434043</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-09-05T17:55:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE ACL merging?</title>
      <link>https://community.cisco.com/t5/network-security/ise-acl-merging/m-p/3180451#M434044</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Main challange I have that I need to implement multimatch of AD groups. Like user 1 belongs to A and B group and user 2 to B group and gets access correspondingly. There will be alot of users and conbinations of access, so I can't define all the conditions. I can't see any option on ISE to do that..&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2017 06:46:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-acl-merging/m-p/3180451#M434044</guid>
      <dc:creator>Darius</dc:creator>
      <dc:date>2017-09-06T06:46:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE ACL merging?</title>
      <link>https://community.cisco.com/t5/network-security/ise-acl-merging/m-p/3180629#M434046</link>
      <description>&lt;P&gt;I am wondering how do they restrict access for those users when they are connected locally?&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2017 13:48:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-acl-merging/m-p/3180629#M434046</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-09-06T13:48:39Z</dc:date>
    </item>
  </channel>
</rss>

