<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IP static SGT mapping in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ip-static-sgt-mapping/m-p/4888898#M582965</link>
    <description>&lt;P&gt;I will check.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 20 Jul 2023 23:16:19 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-07-20T23:16:19Z</dc:date>
    <item>
      <title>IP static SGT mapping</title>
      <link>https://community.cisco.com/t5/network-access-control/ip-static-sgt-mapping/m-p/4887596#M582919</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I contact you regarding a basic question regarding SGT use case.&lt;BR /&gt;We have a network composed of:&lt;BR /&gt;- Core switch (Cisco) in our Cisco Fabric, that manage access to all other switches and servers&lt;BR /&gt;- Access switches (Cisco) in our Cisco Fabric too for end-users/systems&lt;BR /&gt;- Cisco ISE to manage 802.1x authentication, SGT, etc.&lt;BR /&gt;- Cisco DNA Center to manage the whole system&lt;/P&gt;&lt;P&gt;Currently SGT is used, configured and working, but we are using it by associating an SGT to a VLAN.&lt;BR /&gt;This is configured and pushed through our DNA Center.&lt;/P&gt;&lt;P&gt;What we want is to assign only one IP to a specific SGT.&lt;BR /&gt;The goal is to dedicate a SGT to a system (compose of one or more clients/servers) to control communication to-from this system to-from the other systems, and to avoid using global configuration, or using more VLAN segmentation (like dedicating a smaller VLAN to this system).&lt;/P&gt;&lt;P&gt;For this, I have used the IP SGT Static Mapping of Cisco ISE (so associated my required IP to the SGT I need, in the correct VN), and pushed this configuration to our network.&lt;BR /&gt;As all is managed by the Cisco ISE and DNA, I indeed can see the configuration in the running-config and in the result of "show cts role-based sgt-map all" (source = CLI).&lt;BR /&gt;But unfortunately, the rules I applied through the matrix for this SGT are not working (basically, I tested to block the communication from a management server to this specific IP using the default Deny_IP_Log), so the static mapping is not working.&lt;/P&gt;&lt;P&gt;Perhaps I missed a basic point of the configuration ?&lt;BR /&gt;Do I need to refresh something after pushing the configuration ?&lt;BR /&gt;Can you help me for this ?&lt;/P&gt;&lt;P&gt;Have a good day !&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2023 09:24:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ip-static-sgt-mapping/m-p/4887596#M582919</guid>
      <dc:creator>UNVC</dc:creator>
      <dc:date>2023-07-19T09:24:53Z</dc:date>
    </item>
    <item>
      <title>Re: IP static SGT mapping</title>
      <link>https://community.cisco.com/t5/network-access-control/ip-static-sgt-mapping/m-p/4887650#M582923</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1532400"&gt;@UNVC&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; I believe is possible to achieve what you intent but you need to put this device in a specific VN alone. By creating the SGT, the information we have to attach this SGT to the network is the VN, you can not add an IP address there.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FlavioMiranda_0-1689767095108.png" style="width: 1060px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/191824iE3972B77B3BF8C96/image-dimensions/1060x480?v=v2" width="1060" height="480" role="button" title="FlavioMiranda_0-1689767095108.png" alt="FlavioMiranda_0-1689767095108.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2023 11:47:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ip-static-sgt-mapping/m-p/4887650#M582923</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-07-19T11:47:06Z</dc:date>
    </item>
    <item>
      <title>Re: IP static SGT mapping</title>
      <link>https://community.cisco.com/t5/network-access-control/ip-static-sgt-mapping/m-p/4888125#M582942</link>
      <description>&lt;P&gt;I could be wrong, but I don't believe it's possible to enforce static IP-SGT mappings within the VXLAN/LISP fabric used by SDA. &lt;BR /&gt;If the system is within the fabric, you would need to assign it an SGT based on either 802.1x or MAB-based authorization policy.&lt;BR /&gt;If the system is outside the fabric, you would need to propagate the IP-SGT mappings to either the border node or another external system (like a fusion router or firewall) using pxGrid or SXP and have that platform do the enforcement.&lt;BR /&gt;See the following example of doing that propagation and enforcement on the Border Node.&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/policy-enforcement-within-sda-border/ta-p/3646816#toc-hId--1069166528" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/policy-enforcement-within-sda-border/ta-p/3646816#toc-hId--1069166528&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Keep in mind that, with TrustSec, you should be performing enforcement as close to the &lt;STRONG&gt;destination&lt;/STRONG&gt; as possible to scale the solution properly.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2023 22:41:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ip-static-sgt-mapping/m-p/4888125#M582942</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-07-19T22:41:19Z</dc:date>
    </item>
    <item>
      <title>Re: IP static SGT mapping</title>
      <link>https://community.cisco.com/t5/network-access-control/ip-static-sgt-mapping/m-p/4888898#M582965</link>
      <description>&lt;P&gt;I will check.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2023 23:16:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ip-static-sgt-mapping/m-p/4888898#M582965</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-07-20T23:16:19Z</dc:date>
    </item>
  </channel>
</rss>

