<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco SDA edge switch hooked to another switch in Software-Defined Access (SD-Access)</title>
    <link>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237640#M3833</link>
    <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/869"&gt;@flavio&lt;/a&gt;&amp;nbsp;from reviewing your rockwell link provided, it appears that the 5800 is the only one supported.&amp;nbsp; We have a 5700 in place currently, we do have some 5200's but they were not slated to be used for this project.&lt;BR /&gt;From the doc you provided:&lt;BR /&gt;TrustSec is only supported on catalog numbers 1783-MMS10AR, 1783-MMS10EAR, &lt;BR /&gt;1783-MMX8EA, 1783-MMX8TA, 1783-MMX8SA&lt;/P&gt;
&lt;P&gt;Those line up to the 5800's.&lt;/P&gt;</description>
    <pubDate>Mon, 16 Dec 2024 20:38:18 GMT</pubDate>
    <dc:creator>michael-w</dc:creator>
    <dc:date>2024-12-16T20:38:18Z</dc:date>
    <item>
      <title>Cisco SDA edge switch hooked to another switch</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237604#M3828</link>
      <description>&lt;P&gt;&lt;SPAN&gt;In our SDA deployment we have a cisco 9300 fabric edge switch which is connected to a stratix 5700.&amp;nbsp; The stratix port is an access layer port and we have STP BPDU guard and filter disabled.&amp;nbsp; With the ISE policies configured on the port we see the MACs show up in ISE, but we cannot ping the devices hooked to the stratix or the stratix itself and they do not show in the arp table of the 9300.&amp;nbsp; Once the policies are disabled on the 9300 port then we are able to ping.&amp;nbsp; Is there a way to enforce SGT assignment in this design where end devices are behind another switch?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 19:29:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237604#M3828</guid>
      <dc:creator>michael-w</dc:creator>
      <dc:date>2024-12-16T19:29:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco SDA edge switch hooked to another switch</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237606#M3829</link>
      <description>&lt;P&gt;Replied to wrong thread on this board, still need the above answered.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 19:33:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237606#M3829</guid>
      <dc:creator>michael-w</dc:creator>
      <dc:date>2024-12-16T19:33:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco SDA edge switch hooked to another switch</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237617#M3830</link>
      <description>&lt;P&gt;SGACLs are evaluated on egress based on the tag set on ingress. In the setup you are describing there is no way to extend the policy enforcement to the stratix switch, but you should be able to set a static SGT on your edge node access port and use that for all devices attached to the stratix switch.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 19:43:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237617#M3830</guid>
      <dc:creator>Torbjørn</dc:creator>
      <dc:date>2024-12-16T19:43:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco SDA edge switch hooked to another switch</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237622#M3831</link>
      <description>&lt;P&gt;Is there a way to enforce this from ISE?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 19:54:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237622#M3831</guid>
      <dc:creator>michael-w</dc:creator>
      <dc:date>2024-12-16T19:54:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco SDA edge switch hooked to another switch</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237636#M3832</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1819368"&gt;@michael-w&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It seems Stratix switch support &lt;SPAN data-huuid="5716328698608000921"&gt;"Security Group Tag Exchange Protocol (SXP)". Have you tried to add this device on ISE and apply SGT on it? &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://literature.rockwellautomation.com/idc/groups/literature/documents/um/1783-um012_-en-p.pdf" target="_blank"&gt;https://literature.rockwellautomation.com/idc/groups/literature/documents/um/1783-um012_-en-p.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/solutions/Verticals/CPwE/5-1/Network_Security/DIG/CPwE-5-1-NetworkSecurity-DIG.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/solutions/Verticals/CPwE/5-1/Network_Security/DIG/CPwE-5-1-NetworkSecurity-DIG.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 20:30:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237636#M3832</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2024-12-16T20:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco SDA edge switch hooked to another switch</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237640#M3833</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/869"&gt;@flavio&lt;/a&gt;&amp;nbsp;from reviewing your rockwell link provided, it appears that the 5800 is the only one supported.&amp;nbsp; We have a 5700 in place currently, we do have some 5200's but they were not slated to be used for this project.&lt;BR /&gt;From the doc you provided:&lt;BR /&gt;TrustSec is only supported on catalog numbers 1783-MMS10AR, 1783-MMS10EAR, &lt;BR /&gt;1783-MMX8EA, 1783-MMX8TA, 1783-MMX8SA&lt;/P&gt;
&lt;P&gt;Those line up to the 5800's.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 20:38:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237640#M3833</guid>
      <dc:creator>michael-w</dc:creator>
      <dc:date>2024-12-16T20:38:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco SDA edge switch hooked to another switch</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237641#M3834</link>
      <description>&lt;P&gt;Indeed, I&amp;nbsp; missed that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 20:41:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237641#M3834</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2024-12-16T20:41:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco SDA edge switch hooked to another switch</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237670#M3839</link>
      <description>&lt;P&gt;In the configuration I described the policy will be enforced on the SDA edge node like any other traffic in the fabric. It will not require any additional configuration of ISE outside of what you do for the policy in the SDA fabric.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 22:05:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237670#M3839</guid>
      <dc:creator>Torbjørn</dc:creator>
      <dc:date>2024-12-16T22:05:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco SDA edge switch hooked to another switch</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237753#M3840</link>
      <description>&lt;P&gt;u didnt declare how your stratix is connected to C9300 EN. Assuming it's access (untagged) interface in arbitrary VLAN just follow what&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/964504"&gt;@Torbjørn&lt;/a&gt;&amp;nbsp;told u: onboard the stratix as user endhost with static SGT. Otherwise if the interface is .1q trunk with multiple VLAN u still may create static IP- or VLAN-to-SGT entries on the EdgeNode with stratix attached.&amp;nbsp;&lt;BR /&gt;cheers&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Dec 2024 05:49:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237753#M3840</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2024-12-17T05:49:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco SDA edge switch hooked to another switch</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237904#M3841</link>
      <description>&lt;P&gt;Thanks, 9300 port is an access port same as the stratix port.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Dec 2024 12:36:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237904#M3841</guid>
      <dc:creator>michael-w</dc:creator>
      <dc:date>2024-12-17T12:36:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco SDA edge switch hooked to another switch</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237906#M3842</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/964504"&gt;@Torbjørn&lt;/a&gt;&amp;nbsp;what I should have said was, is there a way to push this configuration from ISE instead of manually doing it at the edge switch?&lt;/P&gt;</description>
      <pubDate>Tue, 17 Dec 2024 12:38:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237906#M3842</guid>
      <dc:creator>michael-w</dc:creator>
      <dc:date>2024-12-17T12:38:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco SDA edge switch hooked to another switch</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237940#M3843</link>
      <description>&lt;P&gt;No this needs to be set on the switchport. Preferably configured as a static port under host onboarding in your fabric on Cat-C.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Dec 2024 13:18:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237940#M3843</guid>
      <dc:creator>Torbjørn</dc:creator>
      <dc:date>2024-12-17T13:18:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco SDA edge switch hooked to another switch</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237941#M3844</link>
      <description>&lt;P&gt;it still should be possible, but i'm not sure DOT1X will work with this setup. but MAB must work with standard policy (i'd say it would be&amp;nbsp;policy-map PMAP_DefaultWiredDot1xClosedAuth_MAB_1X instead of&amp;nbsp;PMAP_DefaultWiredDot1xClosedAuth_1X_MAB).&lt;BR /&gt;u need MACs behind the port on the C9300 to be AuthZ'ed (with needed SGTs returned in AccessAccept) on the ISE in proper manner. If u do stuff properly connectivity has to be in place.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Dec 2024 13:20:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5237941#M3844</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2024-12-17T13:20:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco SDA edge switch hooked to another switch</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5238850#M3857</link>
      <description>&lt;P&gt;I wanted to follow back up on this in case anyone else has this situation.&amp;nbsp; We were trying to minimize the configuration on the stratix side, but we changed the ports to trunks on our side and the stratix side.&amp;nbsp; We made the native vlan to match the vlan we were using for our VN and we were then able to apply SGTs based on the MACs of devices behind the stratix without applying policy manually at the port level.&amp;nbsp; We tested having 2 different SGTs applied to 2 different devices behind the stratix successfully.&amp;nbsp; Of course they can intercommunicate within the stratix but once it hits our edge switch port it applies separate SGT policies.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Dec 2024 13:04:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5238850#M3857</guid>
      <dc:creator>michael-w</dc:creator>
      <dc:date>2024-12-19T13:04:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco SDA edge switch hooked to another switch</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5238893#M3858</link>
      <description>&lt;P&gt;could u pls clarify:&lt;BR /&gt;1) did u remove AAA from the port on EdgeNode? i'd assume u did as interface get transitioned to trunk.&lt;BR /&gt;2) do u assign SGTs on the stratix via AAA with ISE or ...?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Dec 2024 14:26:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-edge-switch-hooked-to-another-switch/m-p/5238893#M3858</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2024-12-19T14:26:02Z</dc:date>
    </item>
  </channel>
</rss>

