<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Trustsec enforcement to hosts in ESXi not working in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/trustsec-enforcement-to-hosts-in-esxi-not-working/m-p/4442167#M568796</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/320219"&gt;@Damien Miller&lt;/a&gt;&amp;nbsp;also, had the same issue from the clients connecting wireless, so just had to add dot1x to the port connecting to AP, that solved the problem too&lt;/P&gt;&lt;P&gt;interface GigabitEthernet4/0/2&lt;BR /&gt;description from-ap&lt;BR /&gt;switchport access vlan 10&lt;BR /&gt;switchport mode access&lt;BR /&gt;authentication host-mode multi-auth&lt;BR /&gt;authentication open&lt;BR /&gt;authentication order mab dot1x&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;end&lt;/P&gt;</description>
    <pubDate>Sat, 31 Jul 2021 06:48:47 GMT</pubDate>
    <dc:creator>viveknath.mangalat1</dc:creator>
    <dc:date>2021-07-31T06:48:47Z</dc:date>
    <item>
      <title>Trustsec enforcement to hosts in ESXi not working</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-enforcement-to-hosts-in-esxi-not-working/m-p/4442160#M568792</link>
      <description>&lt;P&gt;Hello all,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SGACL is not getting enforced for hosts that are located in the esxi network.&lt;/P&gt;&lt;P&gt;Like for testing, we are trying to block icmp from a BYOD tagged user to the DOMAIN Controller (which is tagged static)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Enforcement wont work, please suggest, I am attaching some screenshots.&lt;/P&gt;</description>
      <pubDate>Sat, 31 Jul 2021 06:16:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-enforcement-to-hosts-in-esxi-not-working/m-p/4442160#M568792</guid>
      <dc:creator>viveknath.mangalat1</dc:creator>
      <dc:date>2021-07-31T06:16:39Z</dc:date>
    </item>
    <item>
      <title>Re: Trustsec enforcement to hosts in ESXi not working</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-enforcement-to-hosts-in-esxi-not-working/m-p/4442162#M568793</link>
      <description>&lt;P&gt;hello all, was able to fix the issue, since the interface to esxi was a trunk port, we need to enable dot1x on trunk ports as well&lt;/P&gt;&lt;P&gt;is there any other solution, please let me know,&lt;/P&gt;&lt;P&gt;SW-02#show run int Gi4/0/45&lt;BR /&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 339 bytes&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet4/0/45&lt;BR /&gt;description from esxi-1&lt;BR /&gt;switchport trunk encapsulation dot1q&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;authentication host-mode multi-auth&lt;BR /&gt;authentication open&lt;BR /&gt;authentication order mab dot1x&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Sat, 31 Jul 2021 06:37:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-enforcement-to-hosts-in-esxi-not-working/m-p/4442162#M568793</guid>
      <dc:creator>viveknath.mangalat1</dc:creator>
      <dc:date>2021-07-31T06:37:42Z</dc:date>
    </item>
    <item>
      <title>Re: Trustsec enforcement to hosts in ESXi not working</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-enforcement-to-hosts-in-esxi-not-working/m-p/4442165#M568794</link>
      <description>&lt;P&gt;TrustSec enforcement happens on egress only when the network device knows both the source and destination IP-SGT binding. What you have set up and included screenshots is fine, but what you're not showing us is if the switch knows that the DC 192.168.10.2 = SGT 11.&lt;/P&gt;
&lt;P&gt;Because the DC is a static binding configured on ISE, in order for this enforcement to take place, the switch you are expecting to enforce this would have to receive this DC IP-SGT binding via SXP from ISE.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Typically we do not configure SXP to every device due to scaling issues. The enforcement point is usually a capable (and scalable) device that endpoint traffic passes through prior to the DC. Either a WAN router at the DC edge, or a DC aggregation point.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;The command "show cts role-based sgt-map all" will very quickly tell you if the NAD knows both the source and destination SGT. But unless you configured an SXP connection to advertise it, the DC won't be there.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 31 Jul 2021 06:42:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-enforcement-to-hosts-in-esxi-not-working/m-p/4442165#M568794</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2021-07-31T06:42:20Z</dc:date>
    </item>
    <item>
      <title>Re: Trustsec enforcement to hosts in ESXi not working</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-enforcement-to-hosts-in-esxi-not-working/m-p/4442166#M568795</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/320219"&gt;@Damien Miller&lt;/a&gt;&amp;nbsp;&lt;SPAN&gt;was able to fix the issue, since the interface to esxi was a trunk port, we need to enable dot1x on trunk ports&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is this the correct approach?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SW-02(config-if)#do show cts role-based sgt-map all&lt;BR /&gt;Active IPv4-SGT Bindings Information&lt;/P&gt;&lt;P&gt;IP Address SGT Source&lt;BR /&gt;============================================&lt;BR /&gt;192.168.1.36 3 INTERNAL&lt;BR /&gt;192.168.10.2 11 CLI&lt;BR /&gt;192.168.10.26 3 INTERNAL&lt;BR /&gt;192.168.10.132 2 LOCAL&lt;BR /&gt;192.168.20.9 3 INTERNAL&lt;BR /&gt;192.168.20.130 15 SXP&lt;BR /&gt;192.168.20.131 15 LOCAL&lt;/P&gt;&lt;P&gt;IP-SGT Active Bindings Summary&lt;BR /&gt;============================================&lt;BR /&gt;Total number of CLI bindings = 1&lt;BR /&gt;Total number of SXP bindings = 1&lt;BR /&gt;Total number of LOCAL bindings = 2&lt;BR /&gt;Total number of INTERNAL bindings = 3&lt;BR /&gt;Total number of active bindings = 7&lt;/P&gt;</description>
      <pubDate>Sat, 31 Jul 2021 06:46:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-enforcement-to-hosts-in-esxi-not-working/m-p/4442166#M568795</guid>
      <dc:creator>viveknath.mangalat1</dc:creator>
      <dc:date>2021-07-31T06:46:08Z</dc:date>
    </item>
    <item>
      <title>Re: Trustsec enforcement to hosts in ESXi not working</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-enforcement-to-hosts-in-esxi-not-working/m-p/4442167#M568796</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/320219"&gt;@Damien Miller&lt;/a&gt;&amp;nbsp;also, had the same issue from the clients connecting wireless, so just had to add dot1x to the port connecting to AP, that solved the problem too&lt;/P&gt;&lt;P&gt;interface GigabitEthernet4/0/2&lt;BR /&gt;description from-ap&lt;BR /&gt;switchport access vlan 10&lt;BR /&gt;switchport mode access&lt;BR /&gt;authentication host-mode multi-auth&lt;BR /&gt;authentication open&lt;BR /&gt;authentication order mab dot1x&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Sat, 31 Jul 2021 06:48:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-enforcement-to-hosts-in-esxi-not-working/m-p/4442167#M568796</guid>
      <dc:creator>viveknath.mangalat1</dc:creator>
      <dc:date>2021-07-31T06:48:47Z</dc:date>
    </item>
    <item>
      <title>Re: Trustsec enforcement to hosts in ESXi not working</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-enforcement-to-hosts-in-esxi-not-working/m-p/4442171#M568797</link>
      <description>&lt;P&gt;That is one solution, the other is to build an SXP speaker connection from ISE to the network device, and a SXP listen on the network device.&amp;nbsp;&lt;BR /&gt;The third option is to define an ip-sgt binding for the DC directly on the network device CLI.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 31 Jul 2021 07:04:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-enforcement-to-hosts-in-esxi-not-working/m-p/4442171#M568797</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2021-07-31T07:04:17Z</dc:date>
    </item>
    <item>
      <title>Re: Trustsec enforcement to hosts in ESXi not working</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-enforcement-to-hosts-in-esxi-not-working/m-p/4442174#M568798</link>
      <description>&lt;P&gt;ok thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/320219"&gt;@Damien Miller&lt;/a&gt;&amp;nbsp;for your time&lt;/P&gt;</description>
      <pubDate>Sat, 31 Jul 2021 07:29:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-enforcement-to-hosts-in-esxi-not-working/m-p/4442174#M568798</guid>
      <dc:creator>viveknath.mangalat1</dc:creator>
      <dc:date>2021-07-31T07:29:57Z</dc:date>
    </item>
  </channel>
</rss>

