12-08-2014 07:28 AM - edited 03-10-2019 10:15 PM
I am about embark on a large service provider ACS migration / installation and I suspect I am going to need more than 320 authorization rules, which is the limit stated in ACS v5.5 release notes.
Is the limit for the maximum number of rules for an Access Service, or for the ACS totally?
10-02-2015 11:28 AM
Impressive is 2000 NDGs and over 600 NDGs in one Device Filter.
I agree the window is too small, and will not scroll left or right (@cisco please fix it)
Yes I have had no issues in editing anywhere in the list - top, bottom, middle; except when the names are similar, and it can be difficult to select the correct entry, as above not able to scroll horizontally, no stability issues with this. ACSv5.6 patch 2
The good thing about using the compound conditions is everything is visible in the access policy, if using Device Filters it kinda of hidden, but sometimes there's no choice.
I have not noticed any additional delay on rules at the bottom of the access policy, which is probably the best indicator.
10-02-2015 12:36 PM
We ended up solving our issue by adding an attribute for each customer account in our LDAP that matched the NDG name. Meaning there's an NDG (Network Devices and AAA Clients rule) called custX and a field in LDAP for customercode which is set for custX. Another customer account has customer custY in LDAP for "customercode" and NDG custY in the ACS. We then have a compound condition (dynamic) rule that says if LDAP customercode = NDG name then.
Example:
LDAP-ldap_name:customercode equals System:NetworkDeviceName
We also combined that with an access level since we have multiple access levels per customer.
This saved us a ton of complex rules and makes provisioning accounts really easy. Not sure if you use LDAP/AD for your user store, but since we did this makes things much easier.
10-03-2015 08:41 AM
I like the idea of using LDAP, it at least removes the hassle of modifying ACS, and like you say if its already there.
In our case the service provider wanted like for like, in an upgrade from ACSv4.2.1, no LDAP, no AD, there is RSA SecurID external auth but that does not assist.
I did try to add an additional user attribute with the value of the NDG name, but it would not allow me to create the dynamic rule, if I recall the correctly, it would not allow multiple hierarchies to be used.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide