<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do you apply an SGACL to an SD-Access port? in Software-Defined Access (SD-Access)</title>
    <link>https://community.cisco.com/t5/software-defined-access-sd-access/how-do-you-apply-an-sgacl-to-an-sd-access-port/m-p/5023110#M3042</link>
    <description>&lt;P&gt;Guessing based on experiences with other users: after changing Group-Based Policies don't forget to "deploy" from either from the Catalyst Center UI or ISE UI.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jedolphi_0-1708643429112.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/210900iCF1BF7BA6A9DF4A5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="jedolphi_0-1708643429112.png" alt="jedolphi_0-1708643429112.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 22 Feb 2024 23:10:56 GMT</pubDate>
    <dc:creator>jedolphi</dc:creator>
    <dc:date>2024-02-22T23:10:56Z</dc:date>
    <item>
      <title>How do you apply an SGACL to an SD-Access port?</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/how-do-you-apply-an-sgacl-to-an-sd-access-port/m-p/5022682#M3038</link>
      <description>&lt;P&gt;I'm trying to apply SGACLs to do micro-segmentation in SD-Access.&lt;/P&gt;&lt;P&gt;Right now I have 2 ports with statically assigned SGTs, one is "Employees" and one is "Guests", both in the same VN (subnet).&lt;/P&gt;&lt;P&gt;I have a Policy created in DNA-C that says SGT "Guests" to "Employees" should be denied and logged.&lt;/P&gt;&lt;P&gt;ISE learns this from the DNA Center (see attached), but I don't see anywhere to actually apply the ACL to the switches themselves.&lt;/P&gt;&lt;P&gt;What is the final step in the configuration for this? If I'm not doing dot1x, does ISE have no way to trigger the download of the ACL?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 13:42:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/how-do-you-apply-an-sgacl-to-an-sd-access-port/m-p/5022682#M3038</guid>
      <dc:creator>bmcgahan</dc:creator>
      <dc:date>2024-02-22T13:42:23Z</dc:date>
    </item>
    <item>
      <title>Re: How do you apply an SGACL to an SD-Access port?</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/how-do-you-apply-an-sgacl-to-an-sd-access-port/m-p/5022727#M3039</link>
      <description>&lt;P&gt;The Fabric Edge should automatically request any relevant SGACLs whenever a host is onboarded with SGTs or a static SGT port comes up.&amp;nbsp; You shouldn't have to do anything to trigger this as the provisioning process will add the Fabric Edge as a CTS client.&lt;/P&gt;
&lt;P&gt;You can verify this on the Fabric Edge with this command:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;show cts role-based permissions&lt;/LI-CODE&gt;
&lt;P&gt;I hope that helps!&lt;/P&gt;
&lt;P&gt;Roddie&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 14:28:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/how-do-you-apply-an-sgacl-to-an-sd-access-port/m-p/5022727#M3039</guid>
      <dc:creator>Roddie Hasan</dc:creator>
      <dc:date>2024-02-22T14:28:03Z</dc:date>
    </item>
    <item>
      <title>Re: How do you apply an SGACL to an SD-Access port?</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/how-do-you-apply-an-sgacl-to-an-sd-access-port/m-p/5022888#M3041</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/192041"&gt;@bmcgahan&lt;/a&gt;&amp;nbsp; How did you define the ACL rules? &amp;nbsp;I think they need to be defined as Subnet-SGT mappings for this scenario.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 17:30:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/how-do-you-apply-an-sgacl-to-an-sd-access-port/m-p/5022888#M3041</guid>
      <dc:creator>Preston Chilcote</dc:creator>
      <dc:date>2024-02-22T17:30:24Z</dc:date>
    </item>
    <item>
      <title>Re: How do you apply an SGACL to an SD-Access port?</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/how-do-you-apply-an-sgacl-to-an-sd-access-port/m-p/5023110#M3042</link>
      <description>&lt;P&gt;Guessing based on experiences with other users: after changing Group-Based Policies don't forget to "deploy" from either from the Catalyst Center UI or ISE UI.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jedolphi_0-1708643429112.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/210900iCF1BF7BA6A9DF4A5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="jedolphi_0-1708643429112.png" alt="jedolphi_0-1708643429112.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 23:10:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/how-do-you-apply-an-sgacl-to-an-sd-access-port/m-p/5023110#M3042</guid>
      <dc:creator>jedolphi</dc:creator>
      <dc:date>2024-02-22T23:10:56Z</dc:date>
    </item>
    <item>
      <title>Re: How do you apply an SGACL to an SD-Access port?</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/how-do-you-apply-an-sgacl-to-an-sd-access-port/m-p/5545504#M4372</link>
      <description>&lt;P&gt;This is what the AI gave regarding this question--- Edge devices uses RADIUS to download from ISE&lt;/P&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;n Cisco SD-Access, SGTs and SGACLs are downloaded from Cisco ISE to switches&amp;nbsp;&lt;/SPAN&gt;via RADIUS during client authentication or device onboarding. Catalyst Center (DNAC) orchestrates the policy, while ISE pushes environment data and SGACLs to switches, enabled by the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;cts role based enforcement&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;command for enforcement.&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Cisco&lt;/SPAN&gt;&lt;SPAN class=""&gt;&amp;nbsp;+3&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;STRONG&gt;Key SGT and SGACL Download Mechanism:&lt;/STRONG&gt;&lt;/DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN class=""&gt;&lt;STRONG&gt;Centralized Policy Creation:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Policies are created in Cisco Catalyst Center and pushed to Cisco ISE using REST APIs, where ISE serves as the authoritative policy engine.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;&lt;STRONG&gt;Authentication Flow:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;When a user/device joins the network, the edge node authenticates it with ISE.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;&lt;STRONG&gt;Dynamic Download:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;ISE dynamically sends the SGT (metadata) and the relevant SGACLs to the switch through RADIUS during this process.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;&lt;STRONG&gt;Role-Based Enforcement:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;cts role based enforcement&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;command must be enabled on the switch to enforce these downloaded policies.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;&lt;STRONG&gt;Environment Data:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Switches download environment data from ISE, which includes the SGT list.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Now, the other related question I have is: Does this work in CISCO ACI in the data center? from where the Cisco SD Access is inherited, how does EPGs and Contracts are downloaded to the Fabric Edge? what protocol is being used by APIC and Leaf and what about the COOP protocol ???? Sorry lots of questions, but related and interesting&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 11:50:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/how-do-you-apply-an-sgacl-to-an-sd-access-port/m-p/5545504#M4372</guid>
      <dc:creator>YDOT1Q</dc:creator>
      <dc:date>2026-04-15T11:50:43Z</dc:date>
    </item>
    <item>
      <title>Re: How do you apply an SGACL to an SD-Access port?</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/how-do-you-apply-an-sgacl-to-an-sd-access-port/m-p/5545532#M4373</link>
      <description>&lt;P&gt;ACI doesnt use Trustsec/SGT approach. EPGs&amp;amp;Contracts are pushed to switches with leverage of Infrastructure Fabric Messaging (secure, internal management protocol over the infra tenant) by APIC.&amp;nbsp;Data Management Engine on the switch receives validated model &amp;amp; programs it in HW.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 13:28:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/how-do-you-apply-an-sgacl-to-an-sd-access-port/m-p/5545532#M4373</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2026-04-15T13:28:42Z</dc:date>
    </item>
    <item>
      <title>Re: How do you apply an SGACL to an SD-Access port?</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/how-do-you-apply-an-sgacl-to-an-sd-access-port/m-p/5545553#M4374</link>
      <description>&lt;P&gt;Thank you for the response.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, VXLAN header does not have any role in carrying SGT in the ACI fabric?&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the case of SD Access, the SGT is carried in the VXLAN header.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="YDOT1Q_0-1776263834543.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/280539i418D7D1037BA23EF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="YDOT1Q_0-1776263834543.png" alt="YDOT1Q_0-1776263834543.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 14:37:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/how-do-you-apply-an-sgacl-to-an-sd-access-port/m-p/5545553#M4374</guid>
      <dc:creator>YDOT1Q</dc:creator>
      <dc:date>2026-04-15T14:37:22Z</dc:date>
    </item>
    <item>
      <title>Re: How do you apply an SGACL to an SD-Access port?</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/how-do-you-apply-an-sgacl-to-an-sd-access-port/m-p/5545555#M4375</link>
      <description>&lt;P&gt;&lt;SPAN&gt;"So, VXLAN header does not have any role in carrying SGT in the ACI fabric? "&lt;BR /&gt;No&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 14:49:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/how-do-you-apply-an-sgacl-to-an-sd-access-port/m-p/5545555#M4375</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2026-04-15T14:49:46Z</dc:date>
    </item>
  </channel>
</rss>

