<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Enforcing external SDA fabric traffic in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/enforcing-external-sda-fabric-traffic/m-p/4391697#M566832</link>
    <description>&lt;P&gt;Take a look at the CTS allow-list model (default deny IP) with SDA:&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/cloud-systems-management/dna-center/215516-trustsec-whitelist-model-with-sda.html#anc0" target="_blank"&gt;Cisco ISE TrustSec Allow-List Model (Default Deny IP) With SDA - Cisco&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;HTH!&lt;/P&gt;</description>
    <pubDate>Thu, 22 Apr 2021 17:20:45 GMT</pubDate>
    <dc:creator>Mike.Cifelli</dc:creator>
    <dc:date>2021-04-22T17:20:45Z</dc:date>
    <item>
      <title>Enforcing external SDA fabric traffic</title>
      <link>https://community.cisco.com/t5/network-access-control/enforcing-external-sda-fabric-traffic/m-p/4315427#M566503</link>
      <description>&lt;P&gt;Hey all,&lt;/P&gt;&lt;P&gt;I'm learning how to enforce a network with Trustsec. I understand how to enforce within the fabric, but I don't fully understand enforcing outside the fabric.&lt;/P&gt;&lt;P&gt;My goal is to deny a certain SGT from communicating with anything outside the fabric (towards the internet for example) while allowing other SGTs to do so.&lt;/P&gt;&lt;P&gt;Currently, I'm denying certain services to the internet with my dACL enforcement, using "deny ip any any" at the end.&lt;/P&gt;&lt;P&gt;Is this possible to do this with Trustsec? Do I have to configure this on my perimeter firewall?&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Dolev&lt;/P&gt;</description>
      <pubDate>Mon, 29 Mar 2021 12:40:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enforcing-external-sda-fabric-traffic/m-p/4315427#M566503</guid>
      <dc:creator>Dolevha</dc:creator>
      <dc:date>2021-03-29T12:40:35Z</dc:date>
    </item>
    <item>
      <title>Re: Enforcing external SDA fabric traffic</title>
      <link>https://community.cisco.com/t5/network-access-control/enforcing-external-sda-fabric-traffic/m-p/4391697#M566832</link>
      <description>&lt;P&gt;Take a look at the CTS allow-list model (default deny IP) with SDA:&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/cloud-systems-management/dna-center/215516-trustsec-whitelist-model-with-sda.html#anc0" target="_blank"&gt;Cisco ISE TrustSec Allow-List Model (Default Deny IP) With SDA - Cisco&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;HTH!&lt;/P&gt;</description>
      <pubDate>Thu, 22 Apr 2021 17:20:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enforcing-external-sda-fabric-traffic/m-p/4391697#M566832</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2021-04-22T17:20:45Z</dc:date>
    </item>
    <item>
      <title>Re: Enforcing external SDA fabric traffic</title>
      <link>https://community.cisco.com/t5/network-access-control/enforcing-external-sda-fabric-traffic/m-p/4391705#M566833</link>
      <description>&lt;P&gt;That's a serious world of hurt I wouldn't wish on anyone.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Apr 2021 17:29:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enforcing-external-sda-fabric-traffic/m-p/4391705#M566833</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2021-04-22T17:29:10Z</dc:date>
    </item>
  </channel>
</rss>

