<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SGT assignment on C9300 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/sgt-assignment-on-c9300/m-p/4449880#M1082908</link>
    <description>&lt;P&gt;Hi Gents&lt;/P&gt;&lt;P&gt;i've setup campus with ISE-driven SGTs (not SXP). Canmus's NADs &amp;amp; FW r configured for TrustSec on ISE. They get authorized &amp;amp; pushed back with SGT-map configured&amp;nbsp; only for this campus on ISE. Something like belowis visible on the switches with "sho cts role-based sgt-map all":&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;...&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;10.225.10.0/26 7 CLI&lt;BR /&gt;...&lt;BR /&gt;10.225.10.128/26 5 CLI&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;...&lt;/P&gt;&lt;P&gt;FW (ASA) which is L3-GW for most of subnets also has table of SGTs from ISE (but w/o IP mapping which is strange but is not relevant to my main problem).&lt;/P&gt;&lt;P&gt;The problem: with capture on FW-facing portchannel i intercepted traffic of interest &amp;amp; noticed interesting thing:&lt;/P&gt;&lt;P&gt;In most of cases i can see SGT tag added to the source packet as expected (i believe it's done by access switch of endpoint ). F.e. i can see packets sourced from 10.225.10.132 having SGT==5. BUT... in some packets i can see SGT==0 for the similar packet (meaning that src&amp;amp;dst IP&amp;amp;ports r the same)...&amp;nbsp;&lt;/P&gt;&lt;P&gt;SGT assignment is not enforced on the ISE in AuthZ profiles yet. But switches seem to be assigning SGT already based on the tables they have.&lt;/P&gt;&lt;P&gt;All interconnects between network HW r configured with "cts manual" to carry frames with SGT.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anybody can explain me this behavior pls?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;UPD1: just checked other sources &amp;amp; found the there some subnets getting SGT==0 assigned all the time which is actually expected from my pov.&lt;/P&gt;&lt;P&gt;I'm curious...&lt;/P&gt;&lt;P&gt;UPD2: after some investigations i've found that my core C9500 does following:&lt;/P&gt;&lt;P&gt;if it receives frame w/o metadata (because of interconnect to access switch is not configured for cts) it adds to egress frame metadata field with SGT assigned according to SGT-map it receives from ISE.&lt;/P&gt;&lt;P&gt;any clues?&lt;/P&gt;</description>
    <pubDate>Thu, 19 Aug 2021 11:02:53 GMT</pubDate>
    <dc:creator>Andrii Oliinyk</dc:creator>
    <dc:date>2021-08-19T11:02:53Z</dc:date>
    <item>
      <title>SGT assignment on C9300</title>
      <link>https://community.cisco.com/t5/network-security/sgt-assignment-on-c9300/m-p/4449880#M1082908</link>
      <description>&lt;P&gt;Hi Gents&lt;/P&gt;&lt;P&gt;i've setup campus with ISE-driven SGTs (not SXP). Canmus's NADs &amp;amp; FW r configured for TrustSec on ISE. They get authorized &amp;amp; pushed back with SGT-map configured&amp;nbsp; only for this campus on ISE. Something like belowis visible on the switches with "sho cts role-based sgt-map all":&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;...&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;10.225.10.0/26 7 CLI&lt;BR /&gt;...&lt;BR /&gt;10.225.10.128/26 5 CLI&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;...&lt;/P&gt;&lt;P&gt;FW (ASA) which is L3-GW for most of subnets also has table of SGTs from ISE (but w/o IP mapping which is strange but is not relevant to my main problem).&lt;/P&gt;&lt;P&gt;The problem: with capture on FW-facing portchannel i intercepted traffic of interest &amp;amp; noticed interesting thing:&lt;/P&gt;&lt;P&gt;In most of cases i can see SGT tag added to the source packet as expected (i believe it's done by access switch of endpoint ). F.e. i can see packets sourced from 10.225.10.132 having SGT==5. BUT... in some packets i can see SGT==0 for the similar packet (meaning that src&amp;amp;dst IP&amp;amp;ports r the same)...&amp;nbsp;&lt;/P&gt;&lt;P&gt;SGT assignment is not enforced on the ISE in AuthZ profiles yet. But switches seem to be assigning SGT already based on the tables they have.&lt;/P&gt;&lt;P&gt;All interconnects between network HW r configured with "cts manual" to carry frames with SGT.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anybody can explain me this behavior pls?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;UPD1: just checked other sources &amp;amp; found the there some subnets getting SGT==0 assigned all the time which is actually expected from my pov.&lt;/P&gt;&lt;P&gt;I'm curious...&lt;/P&gt;&lt;P&gt;UPD2: after some investigations i've found that my core C9500 does following:&lt;/P&gt;&lt;P&gt;if it receives frame w/o metadata (because of interconnect to access switch is not configured for cts) it adds to egress frame metadata field with SGT assigned according to SGT-map it receives from ISE.&lt;/P&gt;&lt;P&gt;any clues?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Aug 2021 11:02:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sgt-assignment-on-c9300/m-p/4449880#M1082908</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2021-08-19T11:02:53Z</dc:date>
    </item>
    <item>
      <title>Re: SGT assignment on C9300</title>
      <link>https://community.cisco.com/t5/network-security/sgt-assignment-on-c9300/m-p/4454058#M1083112</link>
      <description>&lt;P&gt;It all depends on what re-classification you have within the receiving network device. As per the other community post, if you email me we could organise a chat.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Aug 2021 10:43:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sgt-assignment-on-c9300/m-p/4454058#M1083112</guid>
      <dc:creator>jeaves@cisco.com</dc:creator>
      <dc:date>2021-08-24T10:43:34Z</dc:date>
    </item>
    <item>
      <title>Re: SGT assignment on C9300</title>
      <link>https://community.cisco.com/t5/network-security/sgt-assignment-on-c9300/m-p/4454166#M1083119</link>
      <description>&lt;P&gt;Tnx Jonny!&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-security/cts-amp-sgt-behavior-in-c9k-environment/m-p/4454160#M1083117" target="_blank"&gt;https://community.cisco.com/t5/network-security/cts-amp-sgt-behavior-in-c9k-environment/m-p/4454160#M1083117&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Aug 2021 14:21:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sgt-assignment-on-c9300/m-p/4454166#M1083119</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2021-08-24T14:21:25Z</dc:date>
    </item>
  </channel>
</rss>

