<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco SDA Trustsec Concept in Software-Defined Access (SD-Access)</title>
    <link>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-trustsec-concept/m-p/5274152#M4000</link>
    <description>&lt;P&gt;check the design guide :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/solutions/CVD/Campus/cisco-sda-design-guide.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/solutions/CVD/Campus/cisco-sda-design-guide.html&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 22 Mar 2025 12:52:52 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2025-03-22T12:52:52Z</dc:date>
    <item>
      <title>Cisco SDA Trustsec Concept</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-trustsec-concept/m-p/5274141#M3999</link>
      <description>&lt;P&gt;Hi, Lets say i have ISE, DNAC, edge, intermediate, border and fusion firewall non cisco. Outside all of this doesnt support trustsec. 1. Where policy SGACL enforcement should be applied? Please tell me the most common practice 2. When packet return from outside fabric entering to fabric, should the packet tagged again? Which device should tag it?&lt;/P&gt;</description>
      <pubDate>Sat, 22 Mar 2025 11:33:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-trustsec-concept/m-p/5274141#M3999</guid>
      <dc:creator>Newbie..9109</dc:creator>
      <dc:date>2025-03-22T11:33:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco SDA Trustsec Concept</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-trustsec-concept/m-p/5274152#M4000</link>
      <description>&lt;P&gt;check the design guide :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/solutions/CVD/Campus/cisco-sda-design-guide.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/solutions/CVD/Campus/cisco-sda-design-guide.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 22 Mar 2025 12:52:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-trustsec-concept/m-p/5274152#M4000</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2025-03-22T12:52:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco SDA Trustsec Concept</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-trustsec-concept/m-p/5274222#M4001</link>
      <description>&lt;P&gt;everyhing non cisco &amp;amp; quering&amp;nbsp; for trusysec make 0 sense&lt;/P&gt;
&lt;P&gt;make align to what u need&lt;/P&gt;</description>
      <pubDate>Sat, 22 Mar 2025 22:55:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-trustsec-concept/m-p/5274222#M4001</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2025-03-22T22:55:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco SDA Trustsec Concept</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-trustsec-concept/m-p/5274252#M4002</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;I mean only firewall is non cisco. The others like edge, intermediate, border is cisco. Please help to answer my two questions&lt;/P&gt;</description>
      <pubDate>Sun, 23 Mar 2025 03:01:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-trustsec-concept/m-p/5274252#M4002</guid>
      <dc:creator>Newbie..9109</dc:creator>
      <dc:date>2025-03-23T03:01:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco SDA Trustsec Concept</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-trustsec-concept/m-p/5274488#M4004</link>
      <description>&lt;P&gt;Microsegmentation policy is applied on Edge Nodes toward wired and fabric wireless endpoints, this is automatically enabled by the SDA automation, you don't need to do anything to make this work. For traffic from fabric towards external networks you can choose to manually enable policy enforcement on the Border Node. If you do this then you will need to map external networks to SGTs on the Border Nodes.&lt;/P&gt;
&lt;P&gt;If a packet is returning from the external network without a tag then a tag can be added by the Border Node before VXLAN encapsulation. Again this would require external networks to be mapped to SGTs on the Border Node.&lt;/P&gt;
&lt;P&gt;If you map networks to SGTs on BN via SXP then you should note the IP:SGT binding limits on the BN switching platform.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 10:56:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/cisco-sda-trustsec-concept/m-p/5274488#M4004</guid>
      <dc:creator>jedolphi</dc:creator>
      <dc:date>2025-03-24T10:56:04Z</dc:date>
    </item>
  </channel>
</rss>

