<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SGT tagging to inbound third party partner traffic on Firepower in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/sgt-tagging-to-inbound-third-party-partner-traffic-on-firepower/m-p/5135095#M590236</link>
    <description>&lt;P&gt;Thanks Damien.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 24 Jun 2024 05:18:52 GMT</pubDate>
    <dc:creator>BINU KR</dc:creator>
    <dc:date>2024-06-24T05:18:52Z</dc:date>
    <item>
      <title>SGT tagging to inbound third party partner traffic on Firepower</title>
      <link>https://community.cisco.com/t5/network-access-control/sgt-tagging-to-inbound-third-party-partner-traffic-on-firepower/m-p/5134916#M590223</link>
      <description>&lt;P&gt;In my case, the customer wants to tag the third party (parnters) traffic connected to the company. The third parties are connected via MPLS or Internet IPSec tunnels to a perimeter router and the traffic is then filtered on Firepower. At this point, the traffic must be tagged with SGT for later monitoring with SNA integration. The Cisco ISE is already in place assigning SGTs to the Enterprise devices and SNA is integrated with FMC. Is this a possible scenario and any references would be appreciated.&lt;/P&gt;</description>
      <pubDate>Sun, 23 Jun 2024 02:13:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sgt-tagging-to-inbound-third-party-partner-traffic-on-firepower/m-p/5134916#M590223</guid>
      <dc:creator>BINU KR</dc:creator>
      <dc:date>2024-06-23T02:13:57Z</dc:date>
    </item>
    <item>
      <title>Re: SGT tagging to inbound third party partner traffic on Firepower</title>
      <link>https://community.cisco.com/t5/network-access-control/sgt-tagging-to-inbound-third-party-partner-traffic-on-firepower/m-p/5134917#M590224</link>
      <description>&lt;P&gt;I don't know if you can do this on a firepower. I like the use case though, I would feature request static sgt mappings for vpn tunnels if it doesn't exist.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One way I know that you could do this is to force the tunnel traffic to route through an ASR or switch on specific interfaces. On the router/switch interfaces you would assign a static sgt to the port of your choosing. This would tag all traffic on ingress from the third party tunnels.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 23 Jun 2024 02:54:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sgt-tagging-to-inbound-third-party-partner-traffic-on-firepower/m-p/5134917#M590224</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2024-06-23T02:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: SGT tagging to inbound third party partner traffic on Firepower</title>
      <link>https://community.cisco.com/t5/network-access-control/sgt-tagging-to-inbound-third-party-partner-traffic-on-firepower/m-p/5135095#M590236</link>
      <description>&lt;P&gt;Thanks Damien.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jun 2024 05:18:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sgt-tagging-to-inbound-third-party-partner-traffic-on-firepower/m-p/5135095#M590236</guid>
      <dc:creator>BINU KR</dc:creator>
      <dc:date>2024-06-24T05:18:52Z</dc:date>
    </item>
  </channel>
</rss>

