<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Trustsec questions in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/trustsec-questions/m-p/4738130#M578818</link>
    <description>&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/113005"&gt;@hslai&lt;/a&gt; said, we covered a lot of these topics in this ISE Webinar. Jonathan also points you to the &lt;A title="https://community.cisco.com/t5/security-documents/segmentation-strategy/ta-p/3757424" href="https://community.cisco.com/t5/security-documents/segmentation-strategy/ta-p/3757424" data-from-md="" target="_blank"&gt;Cisco Segmentation Strategy&lt;/A&gt; document.&lt;/P&gt;
&lt;H2 id="20220804-arrow_forward-group-based-segmentation-basics" data-source-line="864"&gt;&lt;A class="" title="https://youtu.be/rq7bSgO_GPg" href="https://youtu.be/rq7bSgO_GPg" data-from-md="" target="_blank"&gt;Group-Based Segmentation Basics&lt;/A&gt;&lt;/H2&gt;
&lt;P data-source-line="866"&gt;Speaker: Jonathan Eaves, Technical Marketing Engineer&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=80s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=80s" data-from-md="" target="_blank"&gt;01:20&lt;/A&gt; Where to Start : &lt;A title="https://community.cisco.com/t5/security-documents/segmentation-strategy/ta-p/3757424" href="https://community.cisco.com/t5/security-documents/segmentation-strategy/ta-p/3757424" data-from-md="" target="_blank"&gt;Cisco Segmentation Strategy&lt;/A&gt;&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=215s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=215s" data-from-md="" target="_blank"&gt;03:35&lt;/A&gt; Intent is Unclear with IP ACLs&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=285s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=285s" data-from-md="" target="_blank"&gt;04:45&lt;/A&gt; Security Groups and Security Group Tags (SGTs)&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=337s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=337s" data-from-md="" target="_blank"&gt;05:37&lt;/A&gt; Business Intent is clear with groups in the CLI&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=461s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=461s" data-from-md="" target="_blank"&gt;07:41&lt;/A&gt; Classification | Propagation | Enforcement&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=651s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=651s" data-from-md="" target="_blank"&gt;10:51&lt;/A&gt; Source and Destination Groups for Group-Based Policies&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=691s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=691s" data-from-md="" target="_blank"&gt;11:31&lt;/A&gt; Use 802.1X or MAB to Dynamically Classify Endpoints with SGTs for Visibility&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=948s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=948s" data-from-md="" target="_blank"&gt;15:48&lt;/A&gt; Visibility/Classification Scenario Demo Overview&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1008s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1008s" data-from-md="" target="_blank"&gt;16:48&lt;/A&gt; - ISE Policy and Catalyst 9300 Initial State (CTS == Cisco TrustSec)&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1115s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1115s" data-from-md="" target="_blank"&gt;18:35&lt;/A&gt; - Doctor Authentication on Gig1/0/2&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1164s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1164s" data-from-md="" target="_blank"&gt;19:24&lt;/A&gt; - IP-to-SGT Mapping&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1175s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1175s" data-from-md="" target="_blank"&gt;19:35&lt;/A&gt; - ISE LiveLogs&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1204s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1204s" data-from-md="" target="_blank"&gt;20:04&lt;/A&gt; - ISE SXP Mapping Table&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1250s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1250s" data-from-md="" target="_blank"&gt;20:50&lt;/A&gt; - Switch Configuration Reference&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1263s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1263s" data-from-md="" target="_blank"&gt;21:03&lt;/A&gt; Switch Configuration for Enforcement :&lt;/P&gt;
&lt;DIV class="joplin-editable"&gt;
&lt;PRE class="hljs"&gt;&lt;CODE&gt;cts credentials &lt;SPAN class="hljs-keyword"&gt;id&lt;/SPAN&gt; {&lt;SPAN class="hljs-built_in"&gt;id&lt;/SPAN&gt;} &lt;SPAN class="hljs-keyword"&gt;password&lt;/SPAN&gt; {&lt;SPAN class="hljs-literal"&gt;password&lt;/SPAN&gt;}
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;cts&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;credentials&lt;/SPAN&gt;
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;cts&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;pac&lt;/SPAN&gt;
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;cts&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;environment&lt;/SPAN&gt;-data&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P data-source-line="891"&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1378s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1378s" data-from-md="" target="_blank"&gt;22:58&lt;/A&gt; Dynamic Group Policy Download from ISE for Enforcement at Egress&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1563s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1563s" data-from-md="" target="_blank"&gt;26:03&lt;/A&gt; Enforcement Demo&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1568s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1568s" data-from-md="" target="_blank"&gt;26:08&lt;/A&gt; - ISE TrustSec Policy Matrix&lt;/P&gt;
&lt;DIV class="joplin-editable"&gt;
&lt;PRE class="hljs"&gt;&lt;CODE&gt;&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; cts pac
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; cts environment-data
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; auth sessions
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; auth &lt;SPAN class="hljs-keyword"&gt;session&lt;/SPAN&gt; interface {interface} details
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; cts &lt;SPAN class="hljs-keyword"&gt;role&lt;/SPAN&gt;-based sgt-map &lt;SPAN class="hljs-keyword"&gt;all&lt;/SPAN&gt;
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; cts &lt;SPAN class="hljs-keyword"&gt;role&lt;/SPAN&gt;-based permissions&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P data-source-line="904"&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1653s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1653s" data-from-md="" target="_blank"&gt;27:33&lt;/A&gt; - Enable Scanner&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1667s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1667s" data-from-md="" target="_blank"&gt;27:47&lt;/A&gt; - ISE LiveLogs&lt;/P&gt;
&lt;DIV class="joplin-editable"&gt;
&lt;PRE class="hljs"&gt;&lt;CODE&gt;&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; auth &lt;SPAN class="hljs-keyword"&gt;session&lt;/SPAN&gt; mac {mac} details
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; cts &lt;SPAN class="hljs-keyword"&gt;role&lt;/SPAN&gt; sgt-map &lt;SPAN class="hljs-keyword"&gt;all&lt;/SPAN&gt;
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; cts &lt;SPAN class="hljs-keyword"&gt;role&lt;/SPAN&gt;-based permissions
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; cts &lt;SPAN class="hljs-keyword"&gt;role&lt;/SPAN&gt;-based counters&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P data-source-line="914"&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1801s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1801s" data-from-md="" target="_blank"&gt;30:01&lt;/A&gt; - Change SGACL in ISE From &lt;CODE class="inline-code"&gt;permit ip&lt;/CODE&gt; to &lt;CODE class="inline-code"&gt;deny ip&lt;/CODE&gt;&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1872s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1872s" data-from-md="" target="_blank"&gt;31:12&lt;/A&gt; Enforcement on Multiple Platforms&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2047s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2047s" data-from-md="" target="_blank"&gt;34:07&lt;/A&gt; Peer-to-Peer SXP (SGT-to-IP Exchange Protocol)&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2108s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2108s" data-from-md="" target="_blank"&gt;35:08&lt;/A&gt; SXP from ISE&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2135s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2135s" data-from-md="" target="_blank"&gt;35:35&lt;/A&gt; IP-to-SGT Propagation Options: SXP, pxGrid, Inline Tagging, WAN protocols, VXLAN&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2246s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2246s" data-from-md="" target="_blank"&gt;37:26&lt;/A&gt; SXP Propagation and Enforcement: Doctors and Cameras&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2416s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2416s" data-from-md="" target="_blank"&gt;40:16&lt;/A&gt; - Add Propagation from ISE to the Destination Switch&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2473s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2473s" data-from-md="" target="_blank"&gt;41:13&lt;/A&gt; - Add SXP to Destination Switch&lt;/P&gt;
&lt;DIV class="joplin-editable"&gt;
&lt;PRE class="hljs"&gt;&lt;CODE&gt;show cts sxp connections brief
cts sxp connection &lt;SPAN class="hljs-keyword"&gt;peer&lt;/SPAN&gt; {&lt;SPAN class="hljs-literal"&gt;ip&lt;/SPAN&gt;} &lt;SPAN class="hljs-keyword"&gt;source&lt;/SPAN&gt; {&lt;SPAN class="hljs-literal"&gt;ip&lt;/SPAN&gt;} &lt;SPAN class="hljs-keyword"&gt;password&lt;/SPAN&gt; {&lt;SPAN class="hljs-literal"&gt;password&lt;/SPAN&gt;} &lt;SPAN class="hljs-keyword"&gt;mode&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;local&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;listener&lt;/SPAN&gt;
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;cts&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;role&lt;/SPAN&gt;-based sgt-map all&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P data-source-line="929"&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2638s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2638s" data-from-md="" target="_blank"&gt;43:58&lt;/A&gt; - Change and Deploy Updated Group Policy in ISE&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2669s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2669s" data-from-md="" target="_blank"&gt;44:29&lt;/A&gt; Demo: Inline Tagging Propagation and Enforcement (manual/static configuration)&lt;/P&gt;
&lt;DIV class="joplin-editable"&gt;
&lt;PRE class="hljs"&gt;&lt;CODE&gt;cts manual &lt;SPAN class="hljs-keyword"&gt;policy&lt;/SPAN&gt; static sgt &lt;SPAN class="hljs-number"&gt;2&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;trusted&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P data-source-line="936"&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2855s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2855s" data-from-md="" target="_blank"&gt;47:35&lt;/A&gt; - Monitor Capture:&lt;/P&gt;
&lt;DIV class="joplin-editable"&gt;
&lt;PRE class="hljs"&gt;&lt;CODE&gt;monitor capture {name} interface {interface} both&lt;SPAN class="hljs-built_in"&gt;
monitor &lt;/SPAN&gt;capture {name} match any&lt;SPAN class="hljs-built_in"&gt;
monitor &lt;/SPAN&gt;capture {name} clear&lt;SPAN class="hljs-built_in"&gt;
monitor &lt;/SPAN&gt;capture {name} start&lt;SPAN class="hljs-built_in"&gt;
monitor &lt;/SPAN&gt;capture {name} stop&lt;SPAN class="hljs-built_in"&gt;
monitor &lt;/SPAN&gt;capture {name} buffer | include ICMP&lt;SPAN class="hljs-built_in"&gt;
monitor &lt;/SPAN&gt;capture {name} buffer detail | begin frame {&lt;SPAN class="hljs-comment"&gt;#}&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P data-source-line="948"&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2974s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2974s" data-from-md="" target="_blank"&gt;49:34&lt;/A&gt; Best Practices for Enforcement Design:&lt;BR /&gt;Assets ~ Classification Mechanism ~ Enforcement Points ~ Propagation Methods&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=3075s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=3075s" data-from-md="" target="_blank"&gt;51:15&lt;/A&gt; Cisco DNAC with AI Endpoint Analytics&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=3174s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=3174s" data-from-md="" target="_blank"&gt;52:54&lt;/A&gt; ISE Resources and Related Documents&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-source-line="953"&gt;&lt;A title="https://community.cisco.com/t5/security-documents/segmentation-strategy/ta-p/3757424" href="https://community.cisco.com/t5/security-documents/segmentation-strategy/ta-p/3757424" data-from-md="" target="_blank"&gt;Cisco Segmentation Strategy&lt;/A&gt;&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=3211s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=3211s" data-from-md="" target="_blank"&gt;53:31&lt;/A&gt; Question: DNAC and Stealthwatch&lt;/LI&gt;
&lt;/UL&gt;</description>
    <pubDate>Tue, 13 Dec 2022 22:14:30 GMT</pubDate>
    <dc:creator>thomas</dc:creator>
    <dc:date>2022-12-13T22:14:30Z</dc:date>
    <item>
      <title>Trustsec questions</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-questions/m-p/4728213#M578504</link>
      <description>&lt;P&gt;Hi guys&lt;/P&gt;&lt;P&gt;I have some questions on trustsec&lt;/P&gt;&lt;P&gt;Can the tag be carried in IP packets or is via the L2 cmd field only?&lt;/P&gt;&lt;P&gt;if L3 what field is it?&lt;/P&gt;&lt;P&gt;why do we need SXP? Is it for sharing ip to sgt mappings? What happens if we don’t have it,,is that where inline tagging has to be used?&lt;/P&gt;&lt;P&gt;Where does the sxp map from ip to sgt come from normally, is it from ISE?&lt;/P&gt;&lt;P&gt;Where does the policy for the sgacl get pulled from, is it Cisco ISE?&lt;/P&gt;&lt;P&gt;Do all switches need to talk to Cisco use to pull the policy if so?&lt;/P&gt;&lt;P&gt;are these sgacls pulled when the switch is added to ise?&lt;/P&gt;&lt;P&gt;Does the policy look like an acl on the switch?&lt;/P&gt;&lt;P&gt;Can the sgacl be viewed from the switch ?&lt;/P&gt;&lt;P&gt;is there a limit on number of sgacl similar to acl limits due to the tcam space?&lt;/P&gt;&lt;P&gt;cheers&lt;/P&gt;</description>
      <pubDate>Fri, 25 Nov 2022 18:26:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-questions/m-p/4728213#M578504</guid>
      <dc:creator>carl_townshend</dc:creator>
      <dc:date>2022-11-25T18:26:28Z</dc:date>
    </item>
    <item>
      <title>Re: Trustsec questions</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-questions/m-p/4736689#M578767</link>
      <description>&lt;P&gt;Please first review the &lt;A href="http://cs.co/ise-webinars" target="_self"&gt;ISE webinars&lt;/A&gt; on&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Group-Based Segmentation Basics&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI class="is-required" title="Is required" data-aura-rendered-by="16076:363;a"&gt;&lt;SPAN&gt;Group-Based Segmentation Advanced&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV class="is-required" title="Is required" data-aura-rendered-by="16076:363;a"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Sun, 11 Dec 2022 23:18:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-questions/m-p/4736689#M578767</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2022-12-11T23:18:20Z</dc:date>
    </item>
    <item>
      <title>Re: Trustsec questions</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-questions/m-p/4738130#M578818</link>
      <description>&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/113005"&gt;@hslai&lt;/a&gt; said, we covered a lot of these topics in this ISE Webinar. Jonathan also points you to the &lt;A title="https://community.cisco.com/t5/security-documents/segmentation-strategy/ta-p/3757424" href="https://community.cisco.com/t5/security-documents/segmentation-strategy/ta-p/3757424" data-from-md="" target="_blank"&gt;Cisco Segmentation Strategy&lt;/A&gt; document.&lt;/P&gt;
&lt;H2 id="20220804-arrow_forward-group-based-segmentation-basics" data-source-line="864"&gt;&lt;A class="" title="https://youtu.be/rq7bSgO_GPg" href="https://youtu.be/rq7bSgO_GPg" data-from-md="" target="_blank"&gt;Group-Based Segmentation Basics&lt;/A&gt;&lt;/H2&gt;
&lt;P data-source-line="866"&gt;Speaker: Jonathan Eaves, Technical Marketing Engineer&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=80s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=80s" data-from-md="" target="_blank"&gt;01:20&lt;/A&gt; Where to Start : &lt;A title="https://community.cisco.com/t5/security-documents/segmentation-strategy/ta-p/3757424" href="https://community.cisco.com/t5/security-documents/segmentation-strategy/ta-p/3757424" data-from-md="" target="_blank"&gt;Cisco Segmentation Strategy&lt;/A&gt;&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=215s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=215s" data-from-md="" target="_blank"&gt;03:35&lt;/A&gt; Intent is Unclear with IP ACLs&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=285s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=285s" data-from-md="" target="_blank"&gt;04:45&lt;/A&gt; Security Groups and Security Group Tags (SGTs)&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=337s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=337s" data-from-md="" target="_blank"&gt;05:37&lt;/A&gt; Business Intent is clear with groups in the CLI&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=461s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=461s" data-from-md="" target="_blank"&gt;07:41&lt;/A&gt; Classification | Propagation | Enforcement&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=651s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=651s" data-from-md="" target="_blank"&gt;10:51&lt;/A&gt; Source and Destination Groups for Group-Based Policies&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=691s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=691s" data-from-md="" target="_blank"&gt;11:31&lt;/A&gt; Use 802.1X or MAB to Dynamically Classify Endpoints with SGTs for Visibility&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=948s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=948s" data-from-md="" target="_blank"&gt;15:48&lt;/A&gt; Visibility/Classification Scenario Demo Overview&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1008s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1008s" data-from-md="" target="_blank"&gt;16:48&lt;/A&gt; - ISE Policy and Catalyst 9300 Initial State (CTS == Cisco TrustSec)&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1115s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1115s" data-from-md="" target="_blank"&gt;18:35&lt;/A&gt; - Doctor Authentication on Gig1/0/2&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1164s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1164s" data-from-md="" target="_blank"&gt;19:24&lt;/A&gt; - IP-to-SGT Mapping&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1175s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1175s" data-from-md="" target="_blank"&gt;19:35&lt;/A&gt; - ISE LiveLogs&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1204s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1204s" data-from-md="" target="_blank"&gt;20:04&lt;/A&gt; - ISE SXP Mapping Table&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1250s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1250s" data-from-md="" target="_blank"&gt;20:50&lt;/A&gt; - Switch Configuration Reference&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1263s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1263s" data-from-md="" target="_blank"&gt;21:03&lt;/A&gt; Switch Configuration for Enforcement :&lt;/P&gt;
&lt;DIV class="joplin-editable"&gt;
&lt;PRE class="hljs"&gt;&lt;CODE&gt;cts credentials &lt;SPAN class="hljs-keyword"&gt;id&lt;/SPAN&gt; {&lt;SPAN class="hljs-built_in"&gt;id&lt;/SPAN&gt;} &lt;SPAN class="hljs-keyword"&gt;password&lt;/SPAN&gt; {&lt;SPAN class="hljs-literal"&gt;password&lt;/SPAN&gt;}
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;cts&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;credentials&lt;/SPAN&gt;
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;cts&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;pac&lt;/SPAN&gt;
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;cts&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;environment&lt;/SPAN&gt;-data&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P data-source-line="891"&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1378s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1378s" data-from-md="" target="_blank"&gt;22:58&lt;/A&gt; Dynamic Group Policy Download from ISE for Enforcement at Egress&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1563s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1563s" data-from-md="" target="_blank"&gt;26:03&lt;/A&gt; Enforcement Demo&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1568s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1568s" data-from-md="" target="_blank"&gt;26:08&lt;/A&gt; - ISE TrustSec Policy Matrix&lt;/P&gt;
&lt;DIV class="joplin-editable"&gt;
&lt;PRE class="hljs"&gt;&lt;CODE&gt;&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; cts pac
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; cts environment-data
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; auth sessions
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; auth &lt;SPAN class="hljs-keyword"&gt;session&lt;/SPAN&gt; interface {interface} details
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; cts &lt;SPAN class="hljs-keyword"&gt;role&lt;/SPAN&gt;-based sgt-map &lt;SPAN class="hljs-keyword"&gt;all&lt;/SPAN&gt;
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; cts &lt;SPAN class="hljs-keyword"&gt;role&lt;/SPAN&gt;-based permissions&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P data-source-line="904"&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1653s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1653s" data-from-md="" target="_blank"&gt;27:33&lt;/A&gt; - Enable Scanner&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1667s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1667s" data-from-md="" target="_blank"&gt;27:47&lt;/A&gt; - ISE LiveLogs&lt;/P&gt;
&lt;DIV class="joplin-editable"&gt;
&lt;PRE class="hljs"&gt;&lt;CODE&gt;&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; auth &lt;SPAN class="hljs-keyword"&gt;session&lt;/SPAN&gt; mac {mac} details
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; cts &lt;SPAN class="hljs-keyword"&gt;role&lt;/SPAN&gt; sgt-map &lt;SPAN class="hljs-keyword"&gt;all&lt;/SPAN&gt;
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; cts &lt;SPAN class="hljs-keyword"&gt;role&lt;/SPAN&gt;-based permissions
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; cts &lt;SPAN class="hljs-keyword"&gt;role&lt;/SPAN&gt;-based counters&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P data-source-line="914"&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1801s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1801s" data-from-md="" target="_blank"&gt;30:01&lt;/A&gt; - Change SGACL in ISE From &lt;CODE class="inline-code"&gt;permit ip&lt;/CODE&gt; to &lt;CODE class="inline-code"&gt;deny ip&lt;/CODE&gt;&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1872s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=1872s" data-from-md="" target="_blank"&gt;31:12&lt;/A&gt; Enforcement on Multiple Platforms&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2047s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2047s" data-from-md="" target="_blank"&gt;34:07&lt;/A&gt; Peer-to-Peer SXP (SGT-to-IP Exchange Protocol)&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2108s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2108s" data-from-md="" target="_blank"&gt;35:08&lt;/A&gt; SXP from ISE&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2135s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2135s" data-from-md="" target="_blank"&gt;35:35&lt;/A&gt; IP-to-SGT Propagation Options: SXP, pxGrid, Inline Tagging, WAN protocols, VXLAN&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2246s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2246s" data-from-md="" target="_blank"&gt;37:26&lt;/A&gt; SXP Propagation and Enforcement: Doctors and Cameras&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2416s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2416s" data-from-md="" target="_blank"&gt;40:16&lt;/A&gt; - Add Propagation from ISE to the Destination Switch&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2473s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2473s" data-from-md="" target="_blank"&gt;41:13&lt;/A&gt; - Add SXP to Destination Switch&lt;/P&gt;
&lt;DIV class="joplin-editable"&gt;
&lt;PRE class="hljs"&gt;&lt;CODE&gt;show cts sxp connections brief
cts sxp connection &lt;SPAN class="hljs-keyword"&gt;peer&lt;/SPAN&gt; {&lt;SPAN class="hljs-literal"&gt;ip&lt;/SPAN&gt;} &lt;SPAN class="hljs-keyword"&gt;source&lt;/SPAN&gt; {&lt;SPAN class="hljs-literal"&gt;ip&lt;/SPAN&gt;} &lt;SPAN class="hljs-keyword"&gt;password&lt;/SPAN&gt; {&lt;SPAN class="hljs-literal"&gt;password&lt;/SPAN&gt;} &lt;SPAN class="hljs-keyword"&gt;mode&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;local&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;listener&lt;/SPAN&gt;
&lt;SPAN class="hljs-keyword"&gt;show&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;cts&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;role&lt;/SPAN&gt;-based sgt-map all&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P data-source-line="929"&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2638s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2638s" data-from-md="" target="_blank"&gt;43:58&lt;/A&gt; - Change and Deploy Updated Group Policy in ISE&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2669s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2669s" data-from-md="" target="_blank"&gt;44:29&lt;/A&gt; Demo: Inline Tagging Propagation and Enforcement (manual/static configuration)&lt;/P&gt;
&lt;DIV class="joplin-editable"&gt;
&lt;PRE class="hljs"&gt;&lt;CODE&gt;cts manual &lt;SPAN class="hljs-keyword"&gt;policy&lt;/SPAN&gt; static sgt &lt;SPAN class="hljs-number"&gt;2&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;trusted&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P data-source-line="936"&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2855s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2855s" data-from-md="" target="_blank"&gt;47:35&lt;/A&gt; - Monitor Capture:&lt;/P&gt;
&lt;DIV class="joplin-editable"&gt;
&lt;PRE class="hljs"&gt;&lt;CODE&gt;monitor capture {name} interface {interface} both&lt;SPAN class="hljs-built_in"&gt;
monitor &lt;/SPAN&gt;capture {name} match any&lt;SPAN class="hljs-built_in"&gt;
monitor &lt;/SPAN&gt;capture {name} clear&lt;SPAN class="hljs-built_in"&gt;
monitor &lt;/SPAN&gt;capture {name} start&lt;SPAN class="hljs-built_in"&gt;
monitor &lt;/SPAN&gt;capture {name} stop&lt;SPAN class="hljs-built_in"&gt;
monitor &lt;/SPAN&gt;capture {name} buffer | include ICMP&lt;SPAN class="hljs-built_in"&gt;
monitor &lt;/SPAN&gt;capture {name} buffer detail | begin frame {&lt;SPAN class="hljs-comment"&gt;#}&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P data-source-line="948"&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2974s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=2974s" data-from-md="" target="_blank"&gt;49:34&lt;/A&gt; Best Practices for Enforcement Design:&lt;BR /&gt;Assets ~ Classification Mechanism ~ Enforcement Points ~ Propagation Methods&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=3075s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=3075s" data-from-md="" target="_blank"&gt;51:15&lt;/A&gt; Cisco DNAC with AI Endpoint Analytics&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=3174s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=3174s" data-from-md="" target="_blank"&gt;52:54&lt;/A&gt; ISE Resources and Related Documents&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-source-line="953"&gt;&lt;A title="https://community.cisco.com/t5/security-documents/segmentation-strategy/ta-p/3757424" href="https://community.cisco.com/t5/security-documents/segmentation-strategy/ta-p/3757424" data-from-md="" target="_blank"&gt;Cisco Segmentation Strategy&lt;/A&gt;&lt;BR /&gt;&lt;A title="https://youtu.be/rq7bSgO_GPg&amp;amp;t=3211s" href="https://youtu.be/rq7bSgO_GPg&amp;amp;t=3211s" data-from-md="" target="_blank"&gt;53:31&lt;/A&gt; Question: DNAC and Stealthwatch&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 13 Dec 2022 22:14:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-questions/m-p/4738130#M578818</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2022-12-13T22:14:30Z</dc:date>
    </item>
  </channel>
</rss>

