<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TrustSec deployment without 802.1x in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-without-802-1x/m-p/4059416#M559414</link>
    <description>&lt;DIV&gt;&lt;SPAN&gt;Thanks for the info.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Yes, unless you want to do&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;static classification by VLAN/subnet/IP which would not involve ISE but CLI configuration on each of your network access devices.&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;Here are your options:&lt;/SPAN&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In regards to “static classification by vlan/subnet without ISE, are you saying ISE is still involved as far as the SGT/SGACL to the routers, just not from an authentication standpoint, or that ISE would not be used at all in that scenario?&amp;nbsp; Can you still deploy the SGT/SGACL from ISE to the layer 3 network devices, without having to configure 802.1X down the switchport?&lt;/P&gt;</description>
    <pubDate>Sun, 05 Apr 2020 16:50:32 GMT</pubDate>
    <dc:creator>awatson20</dc:creator>
    <dc:date>2020-04-05T16:50:32Z</dc:date>
    <item>
      <title>TrustSec deployment without 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-without-802-1x/m-p/4057727#M559368</link>
      <description>&lt;P&gt;We are looking into TrustSec at a high level for network segmentation purposes.&amp;nbsp; Is it possible to deploy Trustsec without doing 802.1x on the layer 2 devices?&amp;nbsp; Could it be used to deploy SGACLS and TAGS to layer 3 routers for segmentation without authenticating clients and doing dot1x on the switch ports?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2020 15:09:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-deployment-without-802-1x/m-p/4057727#M559368</guid>
      <dc:creator>awatson20</dc:creator>
      <dc:date>2020-04-02T15:09:36Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec deployment without 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-without-802-1x/m-p/4058008#M559371</link>
      <description>&lt;P&gt;You may assign Scalable Group Tags (SGTs) using any authorization rule in ISE, regardless of mechanics of the authentication. Since you mention Layer-2, your options would be 802.1X or MAC Authentication Bypass (MAB), so MAB it is! This would be most common for non-authenticating devices that you profile or put into a static endpoint group (printers, cameras, etc.) or with every new Guest (until they complete the appropriate guest flow) or otherwise Unknown devices that fall through and hit the Default.&lt;/P&gt;
&lt;P&gt;I suggest reading &lt;A href="http://cs.co/ise-resources#Segmentation" target="_blank"&gt;http://cs.co/ise-resources#Segmentation&lt;/A&gt; &amp;gt; &lt;A href="http://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/trustsec/branch-segmentation.pdf" target="_self" rel="nofollow noopener noreferrer noopener noreferrer"&gt;Campus / Branch Segmentation Design Guide&lt;/A&gt;. This should cover the full details of what is needed for Classification (assign SGT) at the edge and Propagating the information to your routers for Enforcement.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2020 23:17:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-deployment-without-802-1x/m-p/4058008#M559371</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2020-04-02T23:17:10Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec deployment without 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-without-802-1x/m-p/4058302#M559385</link>
      <description>A scenario we are looking at is to prevent endpoints in SGT-1 from&lt;BR /&gt;communicating with endpoints in SGT-2. We would want to push the SGACL&lt;BR /&gt;from ISE to the routers at these branch offices. If I understand what you&lt;BR /&gt;are saying, you would still have to authenticate the devices using MAB auth&lt;BR /&gt;in ISE?&lt;BR /&gt;</description>
      <pubDate>Fri, 03 Apr 2020 12:12:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-deployment-without-802-1x/m-p/4058302#M559385</guid>
      <dc:creator>awatson20</dc:creator>
      <dc:date>2020-04-03T12:12:48Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec deployment without 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-without-802-1x/m-p/4059365#M559413</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&amp;gt; prevent endpoints in SGT-1 from communicating with endpoints in SGT-2&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This is simple and addressed in the TrustSec matrix by assigning Deny IP between the two tags :&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/70791iABDC97426FD04E94/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;gt; We would want to push the SGACL from ISE to the routers at these branch offices.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;You need to ensure your network devices are registered in ISE as TrustSec network devices in order to receive the SGT and SGACL updates you provisioned above.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 290px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/70790i0E289236520E0429/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;gt; you would still have to authenticate the devices using MAB auth in ISE?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Yes, unless you want to do static classification by VLAN/subnet/IP which would not involve ISE but CLI configuration on each of your network access devices. Here are your options:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/70792i03E46A50B04E11B6/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 05 Apr 2020 15:06:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-deployment-without-802-1x/m-p/4059365#M559413</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2020-04-05T15:06:41Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec deployment without 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-without-802-1x/m-p/4059416#M559414</link>
      <description>&lt;DIV&gt;&lt;SPAN&gt;Thanks for the info.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Yes, unless you want to do&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;static classification by VLAN/subnet/IP which would not involve ISE but CLI configuration on each of your network access devices.&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;Here are your options:&lt;/SPAN&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In regards to “static classification by vlan/subnet without ISE, are you saying ISE is still involved as far as the SGT/SGACL to the routers, just not from an authentication standpoint, or that ISE would not be used at all in that scenario?&amp;nbsp; Can you still deploy the SGT/SGACL from ISE to the layer 3 network devices, without having to configure 802.1X down the switchport?&lt;/P&gt;</description>
      <pubDate>Sun, 05 Apr 2020 16:50:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-deployment-without-802-1x/m-p/4059416#M559414</guid>
      <dc:creator>awatson20</dc:creator>
      <dc:date>2020-04-05T16:50:32Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec deployment without 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-deployment-without-802-1x/m-p/4060459#M559447</link>
      <description>&lt;P&gt;It is possible to use TrustSec without authenticating/authorising the endpoints at the access layer, but this makes for a much less dynamic environment.&lt;/P&gt;
&lt;P&gt;There are different types of Static Classification available for TrustSec, including:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Static IP- or Subnet-SGT mappings configured in ISE and pushed to the network device performing Enforcement via SGACL.&lt;/LI&gt;
&lt;LI&gt;Static VLAN-SGT, Port-SGT, IP-SGT, Subnet-SGT, L3IF-SGT bindings configured on the network device; these cannot be configured/managed by ISE.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;SGACLs can be configured manually on the network device or pushed by ISE, depending on the device platform capabilities. Keep in mind that the Enforcement point must know the IP- or Subnet-SGT mappings for both the Source and Destination to apply the SGACL or SGFW controls.&lt;/P&gt;
&lt;P&gt;Also be aware that you may need to use SGFW (via Zone-Based Policy Firewall) if your router platform does not support SGACL. See the current &lt;A href="https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/trustsec/software-platform-capability-matrix.pdf" target="_self"&gt;TrustSec Platform Capability Matrix&lt;/A&gt;&amp;nbsp; for more info.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is a vast amount of information and caveats that need to be understood when designing/deploying TrustSec, so I would recommend viewing the following CiscoLive presentations:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.ciscolive.com/global/on-demand-library.html?search=brksec-2203#/session/1507104235117001jtUq" target="_self"&gt;Software-Defined Access Controls and Segmentation for Enterprise and Cloud - BRKSEC-2203&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="collapsed" href="https://www.ciscolive.com/global/on-demand-library.html?%2Fsession%2F1564527372216001c7HJ=undefined&amp;amp;search.event=ciscoliveemea2020&amp;amp;search=3690#/session/1564527372216001c7HJ" target="_self"&gt;Advanced Security Group Tags: The Detailed Walk Through - BRKSEC-3690&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Apr 2020 23:36:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-deployment-without-802-1x/m-p/4060459#M559447</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2020-04-06T23:36:42Z</dc:date>
    </item>
  </channel>
</rss>

