<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco Trustsec Implmentation in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-trustsec-implmentation/m-p/3188245#M553729</link>
    <description>&lt;P&gt;Are you planning to use ISE to propagate the SGT Mappings/SGACL or are you just going to statically define them on the switch?&lt;/P&gt;</description>
    <pubDate>Fri, 22 Sep 2017 18:47:14 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2017-09-22T18:47:14Z</dc:date>
    <item>
      <title>Cisco Trustsec Implmentation</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-trustsec-implmentation/m-p/3186489#M553725</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to implement Cisco Trustsec on Catalyst 6500 Series Supervisor Engine 2T to control access between the PCI system and non PCI system in the same subnet/VLAN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Question: Can you configure classfication/progatation/enforcement in a single device?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please refer to attached diagram.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Eric&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:34:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-trustsec-implmentation/m-p/3186489#M553725</guid>
      <dc:creator>chong.eric</dc:creator>
      <dc:date>2020-02-21T18:34:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trustsec Implmentation</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-trustsec-implmentation/m-p/3187600#M553726</link>
      <description>&lt;P&gt;Hi Eric,&lt;/P&gt;&lt;P&gt;Yes, I don't see why not. As long as the 6500 has the IP to SGT bindings and an SGACL then yes you can enforce. You'd probably want to confirm you are running a validated firmware as per the trustsec matrix &lt;A href="https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/trustsec/platform-capability-matrix.pdf" target="_self"&gt;https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/trustsec/platform-capability-matrix.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2017 18:03:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-trustsec-implmentation/m-p/3187600#M553726</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2017-09-21T18:03:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trustsec Implmentation</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-trustsec-implmentation/m-p/3187866#M553728</link>
      <description>&lt;P&gt;Will you able to share the configuration please?&lt;/P&gt;</description>
      <pubDate>Fri, 22 Sep 2017 05:13:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-trustsec-implmentation/m-p/3187866#M553728</guid>
      <dc:creator>chong.eric</dc:creator>
      <dc:date>2017-09-22T05:13:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trustsec Implmentation</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-trustsec-implmentation/m-p/3188245#M553729</link>
      <description>&lt;P&gt;Are you planning to use ISE to propagate the SGT Mappings/SGACL or are you just going to statically define them on the switch?&lt;/P&gt;</description>
      <pubDate>Fri, 22 Sep 2017 18:47:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-trustsec-implmentation/m-p/3188245#M553729</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2017-09-22T18:47:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trustsec Implmentation</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-trustsec-implmentation/m-p/3188368#M553730</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am planning to configure in switch statically&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 23 Sep 2017 01:44:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-trustsec-implmentation/m-p/3188368#M553730</guid>
      <dc:creator>chong.eric</dc:creator>
      <dc:date>2017-09-23T01:44:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trustsec Implmentation</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-trustsec-implmentation/m-p/3188431#M553731</link>
      <description>&lt;P&gt;I don't have a 6500 to verify this configuration, but the following commands work on a CSR with Loopback interfaces. Note the ACL below is not a standard/extended ACL but rather a role-based ACL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip access-list role-based DENY&lt;BR /&gt;&amp;nbsp;deny ip&lt;BR /&gt;&lt;BR /&gt;cts role-based sgt-map 192.168.1.10 sgt 10&lt;BR /&gt;cts role-based sgt-map 192.168.1.20 sgt 20&lt;BR /&gt;cts role-based sgt-map 192.168.1.30 sgt 30&lt;BR /&gt;cts role-based permissions from 10 to 20 DENY&lt;BR /&gt;cts role-based permissions from 10 to 30 DENY&lt;BR /&gt;cts role-based enforcement&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Use the commands "show cts role-based counters" to verify hits increase for denies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any traffic not explictly denied is permitted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'd suggest obviously to test the commands in the lab before implementing in production.&lt;/P&gt;</description>
      <pubDate>Sat, 23 Sep 2017 10:00:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-trustsec-implmentation/m-p/3188431#M553731</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2017-09-23T10:00:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trustsec Implmentation</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-trustsec-implmentation/m-p/3188868#M553732</link>
      <description>&lt;P&gt;Thanks. It works on 6506 too.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Sep 2017 09:07:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-trustsec-implmentation/m-p/3188868#M553732</guid>
      <dc:creator>chong.eric</dc:creator>
      <dc:date>2017-09-25T09:07:40Z</dc:date>
    </item>
  </channel>
</rss>

