After the conditions are matched, the rule now dictates which authentication protocols are permitted. Looking at the predefined MAB rule, this rule uses the Default Network Access list of allowed protocols (which is almost every supported authentication protocol). You can create multiple allowed protocols list, using a different one in each authentication policy rule.
Let’s examine the default allowed protocols. From the ISE GUI, do the following:
Step 1. Navigate to Policy > Policy Elements > Results > Authentication > Allowed Protocols.
Step 2. Select Default Network Access.
As Figure 10-6 shows, the list of supported protocols ...