<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TrustSec deployment in large environment in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3459232#M490835</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Karthik and Damien, please include me in the mtg/discussion @ CiscoLive. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ken&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 01 Jun 2018 13:39:21 GMT</pubDate>
    <dc:creator>khook@cisco.com</dc:creator>
    <dc:date>2018-06-01T13:39:21Z</dc:date>
    <item>
      <title>TrustSec deployment in large environment</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3459222#M490772</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Hi,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;I have a large implementation of TrustSec micro-segmentation using ISE in a distributed deployment with 2 ISEs for PAN and 2 for MnT and centralized PSNs in multiple regions which will cover alot of branches.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;I still need to understand more about the enforcement of TrustSec&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt; text-decoration: underline;"&gt;Q1:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;if there an employee in BR1 and another one in BR2 and my policy says that employee tag can't talk to another employee tag "regardless of their IPs".&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;so my question if we assume that we let the core switches at every BR do the enforcement , how does this switch know that the destination tag is for employee , is it will be IP-SGT mapping enforced by ISE ? if yes what if I have a large number of branches "more that 1000" should i send all employees IP-SGT mapping to each core to enforce the policy ? is there any other solution ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline; font-size: 12pt;"&gt;Q2:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Is there any tool to calculate the WAN traffic needed between PSNs and the switches in the branches ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline; font-size: 12pt;"&gt;Q3:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Does anyone know if Viptela SD-WAN solution will allow propagation for SGT from branch to another one without any problem ? "I know it will but i want to make sure if someone face that scenario"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Thanks in advance.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Mar 2019 08:38:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3459222#M490772</guid>
      <dc:creator>john5</dc:creator>
      <dc:date>2019-03-11T08:38:27Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec deployment in large environment</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3459223#M490792</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Q1: in order to enforce, an enforcement point must be told to enforce (cts role-based enforcement), it must have an IP:SGT mapping for the source, must have an IP:SGT mapping for the destination and it must have a policy to enforce from source to destination. &lt;/P&gt;&lt;P&gt;So, your question should relate to the source as well i.e. how does the core learn of the destination tag and the source tag in order to enforce.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firstly, let's talk about the way the technology was designed. It is designed for egress enforcement, for good reason. The switch at egress needs to protect the mappings/groups that it knows about (directly connected). It already knows the destination mappings (as they are directly connected using static or dynamic classification) so it only needs to download policy for those directly connected groups. This is how we scale, policy is only downloaded for mappings that are known about and only when needed.&lt;/P&gt;&lt;P&gt;So, in your case it would be best to enforce at egress on the access switches because then all you would need to do is propagate the source SGT from one switch to another. This could be achieved using inline tagging for example where the SGT is carried in the L2 frame of every packet originated from the source.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to enforce on the core for one reason or another then you still need to propagate the source SGT from BR1 to the core. This could be achieved using inline tagging, SXP from BR1 or SXP from ISE. You also need to propagate the destination SGT from BR2 to the core and this could be achieved using SXP from BR2 or SXP from ISE. You're right, sending mappings from ISE will not scale for 1000 branches so the recommendation would be to 'template' the configuration for SXP on each branch (to make config rollout easier), and send mappings from the access switches to the branch core.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Q2: There is a bandwidth calculator linked below but this doesn't actually include Bandwidth required for general RADIUS auth and accounting traffic. RADIUS traffic is generally less significant than PSN-PSN traffic and the actual requirement is highly contingent on multiple factors including total active endpoints, reauth intervals, and the authentication protocols used. To read the general message about bandwidth, see here: &lt;A href="https://community.cisco.com/docs/DOC-64317"&gt;ISE Latency and Bandwidth Calculators&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Q3: Yes, SD-WAN will transport the SGT but today you'll need to use DMVPN and insert the SGT into the DMVPN header.&lt;/P&gt;&lt;P&gt;The teams are looking at ways to integrate more fully but today you need to use DMVPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards, Jonothan.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2018 11:43:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3459223#M490792</guid>
      <dc:creator>jeaves@cisco.com</dc:creator>
      <dc:date>2018-05-25T11:43:19Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec deployment in large environment</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3459224#M490802</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a lot Jonothan.&lt;/P&gt;&lt;P&gt;it's clear now except for the point ( &lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;'template' the configuration for SXP on each branch ) , I need an example or a document that illustrate this point "if available" &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2018 12:58:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3459224#M490802</guid>
      <dc:creator>john5</dc:creator>
      <dc:date>2018-05-25T12:58:17Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec deployment in large environment</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3459225#M490810</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just meant that SXP will need to be configured on ~1000 branches, from access switches to core. But apart from IP addresses etc the config will be the same on each branch. So, you could create some sort of script that substitutes IP addresses etc into the config needed to add SXP and use that to help in provisioning:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cts sxp enable&lt;/P&gt;&lt;P&gt;cts sxp default source-ip xx &lt;/P&gt;&lt;P&gt;cts sxp default password xx&lt;/P&gt;&lt;P&gt;cts sxp connection peer xx source xx password default mode local speaker&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2018 14:39:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3459225#M490810</guid>
      <dc:creator>jeaves@cisco.com</dc:creator>
      <dc:date>2018-05-25T14:39:46Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec deployment in large environment</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3459226#M490818</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just going to drop a note here.&amp;nbsp; I have had a very frustrating time trying to scale SXP even with dedicated ASR hardware "reflectors".&amp;nbsp; I'm not sure how far along you are in the planning your enforcement strategy but i'm certainly open to discussing some real world scenarios with you.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 May 2018 02:25:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3459226#M490818</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2018-05-31T02:25:39Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec deployment in large environment</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3459227#M490825</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a lot Damien, actually I'm struggling right now with my 1000 branches.&lt;/P&gt;&lt;P&gt;I was thinking that I can scale SXP using ISE as a listener and speaker to other branches but I was wrong after I found that ISE can only have maximum 200 SXP connection with v2.1 in release 6.3 system bulletin.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so please if you have solutions it will be appreciated to share with me &lt;IMG src="https://community.cisco.com/legacyfs/online/emoticons/happy.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 May 2018 14:12:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3459227#M490825</guid>
      <dc:creator>john5</dc:creator>
      <dc:date>2018-05-31T14:12:54Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec deployment in large environment</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3459228#M490829</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Damien, I totally understand your frustration. I hope things are fine after the path length filtering you enabled on those SXP reflectors. Let me know if you have any other scaling issues with SXP. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 May 2018 19:23:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3459228#M490829</guid>
      <dc:creator>kthumula</dc:creator>
      <dc:date>2018-05-31T19:23:13Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec deployment in large environment</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3459229#M490831</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;John, Make sure to enable path length filtering on the routers if you are planning to go with the SXP reflectors route. I would recommend configuring the maximum paths as 2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: 6.0pt; margin-left: .75in; text-indent: -.32in; text-align: left;"&gt;&lt;SPAN style="font-size: 16.0pt; font-family: Arial; color: #676767;"&gt;cts sxp limit export peer-sequence-nodes 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: 6.0pt; margin-left: .75in; text-indent: -.32in; text-align: left;"&gt;&lt;SPAN style="font-size: 16.0pt; font-family: Arial; color: #676767;"&gt;cts sxp limit import peer-sequence-nodes 2&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 May 2018 19:26:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3459229#M490831</guid>
      <dc:creator>kthumula</dc:creator>
      <dc:date>2018-05-31T19:26:08Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec deployment in large environment</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3459230#M490833</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Lets discuss offline if you're around at Cisco Live, we have had some developments since I talked to you at the security sevt.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 May 2018 19:40:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3459230#M490833</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2018-05-31T19:40:21Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec deployment in large environment</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3459231#M490834</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure Damien. We can discuss offline. I will be there at Cisco Live.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 May 2018 19:44:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3459231#M490834</guid>
      <dc:creator>kthumula</dc:creator>
      <dc:date>2018-05-31T19:44:45Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec deployment in large environment</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3459232#M490835</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Karthik and Damien, please include me in the mtg/discussion @ CiscoLive. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ken&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Jun 2018 13:39:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3459232#M490835</guid>
      <dc:creator>khook@cisco.com</dc:creator>
      <dc:date>2018-06-01T13:39:21Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec deployment in large environment</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3847155#M490836</link>
      <description>&lt;P&gt;I am in the process of designing a similar solution with a mix of nexus 7700/F3/8.1.1 and Cisco catalyst 9300's at the access layer. There will be some basic enforcement from the branch to the data center, but largely the enforcement will be between devices at the location and between locations with enforcement being on the 9300. I'm looking for some of details regarding scaling you are mentioning. I'm considering a reflector approach, with the reflection being done on either a couple nexus 7700's or a couple ASR 1002x's. Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2019 13:22:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3847155#M490836</guid>
      <dc:creator>ngriffin@bankozarks.com</dc:creator>
      <dc:date>2019-04-29T13:22:03Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec deployment in large environment</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3847290#M490837</link>
      <description>How many sites and SGT mappings are you looking at?  It could be beneficial to leverage ISE as the SXP reflector (or simply the speaker), rather than dedicating some expensive hardware to it. We managed ~130 bidirectional connections on dedicated ASR's with approximately 40k IP-SGT mappings. The CPU's on both ASR's were 90%+ at this point.  This was the point where we stopped adding SXP connections, enforcement across the WAN from that point forward required an overlay and inline tagging. SXP across the WAN was a temporary measure here. &lt;BR /&gt;&lt;BR /&gt;I would try to stay away from designing anything at scale with bidirectional SXP connections as they are extremely resource intensive.  I would actually avoid SXP in any form at scale since it just isn't a great protocol.  It works great in limited deployment, point to point such as WLC to core, or access to access spanning a wireless bridge.  When you start adding connections and mappings together to cross the WAN it just isn't efficient.&lt;BR /&gt;&lt;BR /&gt;I would strongly urge an overlay and inline tagging across the WAN.  That's not to say SXP won't work for you, but it adds a scaling component.  I would start that discussion with endpoint counts and and number sites/connections required.</description>
      <pubDate>Mon, 29 Apr 2019 16:21:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3847290#M490837</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-04-29T16:21:55Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec deployment in large environment</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3847307#M490838</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Therein lies the rub. I agree with you. +/- 260 sites. We will have somewhere in the neighborhood of 400-500 9300 remote edge switches participating. We are also actively designing Cisco SD-wan so we will be able to handle the tagging natively long-term. The problem is the short term segmentation deadline. I’ve done my homework on SXP and ISE and the amount of compute necessary to get to the max of 800 sessions is massive and not doable. What am I planning doing is seeding the ip to sgt mappings from ISE to either a set of nexus switches are a set of ASR routers, and then I have listen only sxp sessions to the remote 9300 switches from the n7k/a1k. The nexus switches learn about the dynamic sessions from auth policies via ISE/SXP, and then the 9300’s learn the static mappings from the SXP reflectors. I’m leaning towards the A1K for SXP reflection since it seems to have the “cts sxp limit” commands that are recommended. &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2019 16:40:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3847307#M490838</guid>
      <dc:creator>ngriffin@bankozarks.com</dc:creator>
      <dc:date>2019-04-29T16:40:50Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec deployment in large environment</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3847361#M490839</link>
      <description>&lt;P&gt;You could simplify this by having ISE be the central speaker of all IP-SGT mappings and no return SXP connections. ISE will already be the source of truth for IP-SGT mappings since it knows them/learns them during authentication, you do not need to communicate them back to ISE.&lt;/P&gt;
&lt;P&gt;Building SXP connections from reflectors to the access layer isn't a requirement if you are willing to utilize inline tagging in the LAN. Take this as an example of what may help it scale better.&lt;/P&gt;
&lt;P&gt;You send these IP-SGT mappings to an ASR 1k with a speaker connection from ISE, then use the ASR 1k to speak them down to the WAN edge at sites. To scale this out a bit better, you could create a three tier topology, ISE speaker &amp;gt; ASR speaker &amp;gt; ISR 4k listener. Then within the LAN you leverage cts manual to perform inline tagging throughout the site. The ISR 4k utilizing the SXP IP-SGT mappings it learns, will retag any traffic egressing it's LAN interfaces. The core/distribution/access would be configured for inline tagging and sgacl enforcement. It doesn't have to be an ISR 4k either, they are just a reasonably scalable platform when it comes to mappings, this would work with legacy ISR G2 platforms.&lt;/P&gt;
&lt;P&gt;This assumes you have inline tagging capable hardware from the remote site WAN edge down to the access layer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2019 17:34:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3847361#M490839</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-04-29T17:34:18Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec deployment in large environment</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3847423#M490840</link>
      <description>&lt;P&gt;I'm not sure I'm following you completely, still digging into the technology a bit. To clarify currently I have a similar setup in a lab as you described, in that I have ISE configured to be a speaker to a nexus switch that is then a speaker to the access layer 9300 switches. The Nexus learns the dynamic mappings from the auth sessions via SXP and then the 9300 learns the static ip-&amp;gt;sgt mappings via SXP from the nexus reflector(s), in addition to the local dynamic mappings. What I am trying to do in the short term is keep most of the SGT configurations on the 9300's versus the 4k routers since they technically will be replaced with sd-wan devices, I don't want any dependencies on the wan routers that drives the code version I deploy on the sd-wan boxes, at least not initially.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2019 19:15:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3847423#M490840</guid>
      <dc:creator>ngriffin@bankozarks.com</dc:creator>
      <dc:date>2019-04-29T19:15:05Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec deployment in large environment</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3847475#M490841</link>
      <description>The only reason I suggested leveraging WAN edge was because it would fewer SXP connections than going to each access switch which can be a scaling issue.  Total mappings support on the Cat 9k's is also quite limited, they can only handle 10,000 IP-SGT mappings where as an ISR can support 125,000+. It sounds like you have a fairly large environment, so 10k mappings could easily be a scale issue.  &lt;BR /&gt;&lt;BR /&gt;I would want to inline tag everything in the LAN to enable east west enforcement anyways.  You would be dealing with fewer connections and no inline tagging work to add in for the future state.  When (if) SDWAN ever supports native SGT inline tagging, then you would still need inline tagging in the LAN up to the router, you would just be dropping the SXP connections on the router when moving to SDWAN inline tagging. I have not spun up the SDWAN code on an ISR, but I know the commands are there for inline tagging, not sure if SXP is still in there, I would want to go this route if possible. I haven't tested it on SDWAN code, but after this discussion I think I will when I get time in the next couple of weeks.  &lt;BR /&gt;&lt;BR /&gt;Your understanding of the mapping flow sounds correct, ISE will speak all static mappings you manually create as well as dynamic mappings created during authorization.  It is a single point of truth for all IP-SGT mappings regardless of how they are generated, unless manually tagged on NADs.</description>
      <pubDate>Mon, 29 Apr 2019 20:25:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-deployment-in-large-environment/m-p/3847475#M490841</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-04-29T20:25:26Z</dc:date>
    </item>
  </channel>
</rss>

