<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE SGT's Not Being Enforced in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-sgt-s-not-being-enforced/m-p/5008839#M586873</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1588027"&gt;@ryanbess&lt;/a&gt; is the switch configured correctly and has received the TrustSec environment data? Run &lt;SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;show cts environment-data&lt;/EM&gt;&lt;/STRONG&gt; to confirm.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 30 Jan 2024 08:58:29 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2024-01-30T08:58:29Z</dc:date>
    <item>
      <title>Cisco ISE SGT's Not Being Enforced</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-sgt-s-not-being-enforced/m-p/5008537#M586870</link>
      <description>&lt;P&gt;First off thanks for everyone who has helped answer questions in the past.&amp;nbsp; I'm now starting the CTS part of my ISE learning.&amp;nbsp; In the matrix i have enabled the default permission to be disabled, thus all SGTs should not be able to communicate with each other.&amp;nbsp; I then configured 2 windows 11 computers so they they would get different SGTs but for some reason they can still ping each other and connect to other ports.&amp;nbsp; Can someone point me in the direction for where to look to see what's going on?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When i run "show cts role-based permissions" i see&amp;nbsp; the below.&amp;nbsp; The Permit IP-00 should be a deny i &lt;STRONG&gt;think&lt;/STRONG&gt; since in the matrix (per the above) i set it to disabled (see attached print screen).&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show cts role-based p&lt;BR /&gt;sw02#show cts role-based permissions&lt;BR /&gt;IPv4 Role-based permissions default:&lt;BR /&gt;&lt;STRONG&gt;Permit IP-00&lt;/STRONG&gt;&lt;BR /&gt;RBACL Monitor All for Dynamic Policies : FALSE&lt;BR /&gt;RBACL Monitor All for Configured Policies : FALSE&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 02:23:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-sgt-s-not-being-enforced/m-p/5008537#M586870</guid>
      <dc:creator>ryanbess</dc:creator>
      <dc:date>2024-01-30T02:23:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE SGT's Not Being Enforced</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-sgt-s-not-being-enforced/m-p/5008839#M586873</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1588027"&gt;@ryanbess&lt;/a&gt; is the switch configured correctly and has received the TrustSec environment data? Run &lt;SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;show cts environment-data&lt;/EM&gt;&lt;/STRONG&gt; to confirm.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 08:58:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-sgt-s-not-being-enforced/m-p/5008839#M586873</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-30T08:58:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE SGT's Not Being Enforced</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-sgt-s-not-being-enforced/m-p/5008881#M586876</link>
      <description>&lt;P&gt;In addition to what &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;mentioned, could you please share the output of the commands "show cts pacs" and "show cts rbacl" for review?&lt;/P&gt;
&lt;P&gt;Also, what version of ISE you are using? please note that as of ISE 3.1+ TLS 1.0 is disabled by default. In that case the CTS environment and PAC data won't be transferred over the traditional way (RADIUS) and you would need to enable HTTPS with REST API to transfer those data and stay away from TLS 1.0.&lt;/P&gt;
&lt;P&gt;You also need to apply some configs on the NAD and the NAD has to be running&amp;nbsp; a 16.2.2 release or higher. I can provide the required configs on the NAD if that is the case.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 09:47:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-sgt-s-not-being-enforced/m-p/5008881#M586876</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-01-30T09:47:24Z</dc:date>
    </item>
  </channel>
</rss>

