<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SDA closed authentication / IP-SGT mapping delivery in Software-Defined Access (SD-Access)</title>
    <link>https://community.cisco.com/t5/software-defined-access-sd-access/sda-closed-authentication-ip-sgt-mapping-delivery/m-p/4655950#M1953</link>
    <description>&lt;P&gt;Hi Michal,&lt;/P&gt;
&lt;P&gt;The Edge switch should be properly provisioned to the Fabric Site, it should have obtained the AAA configuration from DNAC, should be able to reach Cisco ISE, and it should show as a network device on ISE as well.&lt;/P&gt;
&lt;P&gt;Try running the following commands for validation:&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;show run | sec aaa|radius
test aaa group dnac-client-radius-group &amp;lt;user&amp;gt; &amp;lt;password&amp;gt; legacy
show authentication sessions interface GiX/Y/Z detail &amp;lt;&amp;lt;&amp;lt;  For interfaces connecting to endpoints
show cts pacs
show cts environment-data
show cts role-based sgt-map vrf &amp;lt;vrf or VN name&amp;gt; all det &amp;lt;&amp;lt;&amp;lt;&amp;lt; This should show the IP-SGT mapping for endpoints connected locally at least if any&lt;/LI-CODE&gt;
&lt;P&gt;If you are having Group-Based Policies configured in DNAC, and clients connected to the Edge belonging to the destination SGT, then you can also run:&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;show cts role-based permissions
show cts role-based counters&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;I hope this verification helps.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
    <pubDate>Sat, 23 Jul 2022 14:59:42 GMT</pubDate>
    <dc:creator>andresfr</dc:creator>
    <dc:date>2022-07-23T14:59:42Z</dc:date>
    <item>
      <title>SDA closed authentication / IP-SGT mapping delivery</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/sda-closed-authentication-ip-sgt-mapping-delivery/m-p/4651072#M1944</link>
      <description>&lt;P&gt;I want to use closed authentication on some ports in SDA environment so I've configured appropriate ISE authorization rules with SGT included. Authorization works fine but it seems EDGE switches are not aware of IP-SGT mappings. How EDGE switch could know about IP-SGT mapping when SGT is applied by ISE authorization rule?&lt;/P&gt;</description>
      <pubDate>Fri, 15 Jul 2022 08:55:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/sda-closed-authentication-ip-sgt-mapping-delivery/m-p/4651072#M1944</guid>
      <dc:creator>Michal Rzepecki</dc:creator>
      <dc:date>2022-07-15T08:55:01Z</dc:date>
    </item>
    <item>
      <title>Re: SDA closed authentication / IP-SGT mapping delivery</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/sda-closed-authentication-ip-sgt-mapping-delivery/m-p/4654228#M1949</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;The IP-SGT mapping should be provided from the authorization policy from ISE. IP is provided in the form of IP pool and also ISE provides the SGT membership according the succesfull authorization.&lt;/P&gt;
&lt;P&gt;Marek&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2022 21:59:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/sda-closed-authentication-ip-sgt-mapping-delivery/m-p/4654228#M1949</guid>
      <dc:creator>marek.golha</dc:creator>
      <dc:date>2022-07-20T21:59:37Z</dc:date>
    </item>
    <item>
      <title>Re: SDA closed authentication / IP-SGT mapping delivery</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/sda-closed-authentication-ip-sgt-mapping-delivery/m-p/4655950#M1953</link>
      <description>&lt;P&gt;Hi Michal,&lt;/P&gt;
&lt;P&gt;The Edge switch should be properly provisioned to the Fabric Site, it should have obtained the AAA configuration from DNAC, should be able to reach Cisco ISE, and it should show as a network device on ISE as well.&lt;/P&gt;
&lt;P&gt;Try running the following commands for validation:&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;show run | sec aaa|radius
test aaa group dnac-client-radius-group &amp;lt;user&amp;gt; &amp;lt;password&amp;gt; legacy
show authentication sessions interface GiX/Y/Z detail &amp;lt;&amp;lt;&amp;lt;  For interfaces connecting to endpoints
show cts pacs
show cts environment-data
show cts role-based sgt-map vrf &amp;lt;vrf or VN name&amp;gt; all det &amp;lt;&amp;lt;&amp;lt;&amp;lt; This should show the IP-SGT mapping for endpoints connected locally at least if any&lt;/LI-CODE&gt;
&lt;P&gt;If you are having Group-Based Policies configured in DNAC, and clients connected to the Edge belonging to the destination SGT, then you can also run:&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;show cts role-based permissions
show cts role-based counters&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;I hope this verification helps.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Sat, 23 Jul 2022 14:59:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/sda-closed-authentication-ip-sgt-mapping-delivery/m-p/4655950#M1953</guid>
      <dc:creator>andresfr</dc:creator>
      <dc:date>2022-07-23T14:59:42Z</dc:date>
    </item>
  </channel>
</rss>

