<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VLAN SVI unreachable after enabling CTS VLAN enforcement in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/vlan-svi-unreachable-after-enabling-cts-vlan-enforcement/m-p/4833291#M581686</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;After running the &lt;EM&gt;cts role-based enforcement vlan-list 200&amp;nbsp;&lt;/EM&gt;in an access switch, the devices can no longer reach its gateway (SVI in a distribution switch) Without reachability to the gateway, outside connectivity is also lost.&lt;/P&gt;&lt;P&gt;The uplink between the access switch and the distribution switch has CTS enabled. The trustsec matrix allows traffic to "unknown" (untagged) traffic, although I presume this has nothing to&amp;nbsp; do since the distribution switch is not enforcing any traffic. It is configured as&amp;nbsp;&lt;EM&gt;cts role-based monitor all&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;As soon as we remove the vlan enforcement, reachability is recovered, however the traffic is not enforced for hosts in the same VLAN with the same tag even if there is a SGACL applied at the switch that denies all the traffic from/to the same SGT.&lt;/P&gt;&lt;P&gt;Any idea?&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
    <pubDate>Thu, 11 May 2023 13:29:49 GMT</pubDate>
    <dc:creator>Antonio Macia</dc:creator>
    <dc:date>2023-05-11T13:29:49Z</dc:date>
    <item>
      <title>VLAN SVI unreachable after enabling CTS VLAN enforcement</title>
      <link>https://community.cisco.com/t5/network-access-control/vlan-svi-unreachable-after-enabling-cts-vlan-enforcement/m-p/4833291#M581686</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;After running the &lt;EM&gt;cts role-based enforcement vlan-list 200&amp;nbsp;&lt;/EM&gt;in an access switch, the devices can no longer reach its gateway (SVI in a distribution switch) Without reachability to the gateway, outside connectivity is also lost.&lt;/P&gt;&lt;P&gt;The uplink between the access switch and the distribution switch has CTS enabled. The trustsec matrix allows traffic to "unknown" (untagged) traffic, although I presume this has nothing to&amp;nbsp; do since the distribution switch is not enforcing any traffic. It is configured as&amp;nbsp;&lt;EM&gt;cts role-based monitor all&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;As soon as we remove the vlan enforcement, reachability is recovered, however the traffic is not enforced for hosts in the same VLAN with the same tag even if there is a SGACL applied at the switch that denies all the traffic from/to the same SGT.&lt;/P&gt;&lt;P&gt;Any idea?&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2023 13:29:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vlan-svi-unreachable-after-enabling-cts-vlan-enforcement/m-p/4833291#M581686</guid>
      <dc:creator>Antonio Macia</dc:creator>
      <dc:date>2023-05-11T13:29:49Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN SVI unreachable after enabling CTS VLAN enforcement</title>
      <link>https://community.cisco.com/t5/network-access-control/vlan-svi-unreachable-after-enabling-cts-vlan-enforcement/m-p/4833305#M581687</link>
      <description>&lt;P&gt;Could you share the SGACL policy enforced on VLAN list 200? Also, what is the SGT for source and destination here?&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2023 13:41:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vlan-svi-unreachable-after-enabling-cts-vlan-enforcement/m-p/4833305#M581687</guid>
      <dc:creator>Nancy Saini</dc:creator>
      <dc:date>2023-05-11T13:41:17Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN SVI unreachable after enabling CTS VLAN enforcement</title>
      <link>https://community.cisco.com/t5/network-access-control/vlan-svi-unreachable-after-enabling-cts-vlan-enforcement/m-p/4833317#M581688</link>
      <description>&lt;P&gt;The SGT is 94 and the intent is to block horizontal traffic while allowing north-south:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;show cts role-based permissions from 94 to 94&lt;/EM&gt;&lt;BR /&gt;IPv4 Role-based permissions from group 94:DUMMY_SGT to group 94:DUMMY_SGT:&lt;BR /&gt;Deny IP-00&lt;/P&gt;&lt;P&gt;&lt;EM&gt;show cts rbacl&lt;/EM&gt;&lt;BR /&gt;CTS RBACL Policy&lt;BR /&gt;================&lt;BR /&gt;RBACL IP Version Supported: IPv4 &amp;amp; IPv6&lt;BR /&gt;name = Deny IP-00&lt;BR /&gt;IP protocol version = IPV4, IPV6&lt;BR /&gt;refcnt = 46&lt;BR /&gt;flag = 0xC1000000&lt;BR /&gt;stale = FALSE&lt;BR /&gt;RBACL ACEs:&lt;BR /&gt;deny ip&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;EM&gt;show cts role-based permissions from 94 to unknown&lt;/EM&gt;&lt;BR /&gt;IPv4 Role-based permissions from group 94:DUMMY_SGT to group Unknown:&lt;BR /&gt;Permit IP-00&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;EM&gt;show cts rbacl&lt;/EM&gt;&lt;BR /&gt;CTS RBACL Policy&lt;BR /&gt;================&lt;BR /&gt;name = Permit IP-00&lt;BR /&gt;IP protocol version = IPV4, IPV6&lt;BR /&gt;refcnt = 6&lt;BR /&gt;flag = 0xC1000000&lt;BR /&gt;stale = FALSE&lt;BR /&gt;RBACL ACEs:&lt;BR /&gt;permit ip&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2023 13:53:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vlan-svi-unreachable-after-enabling-cts-vlan-enforcement/m-p/4833317#M581688</guid>
      <dc:creator>Antonio Macia</dc:creator>
      <dc:date>2023-05-11T13:53:52Z</dc:date>
    </item>
  </channel>
</rss>

