Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
I know this is an old post, but multiple people are still looking into mixing ISE and port-security. I agree that it is rare for an authenticated device to flood the network. However, a MAC address flood attack on an ISE-protected port in multi-auth ...