08-25-2021 08:20 AM
I am looking to enable the above feature between a 9500 (Border Router) and a switch (9300) that sits between two deployed fabrics in order to preserve SGT values between the two fabric deployments.
However I notice that whilst the 9300 allows the "CTS manual" command to be applied to either the physical interface OR the Vlan interface the 9500 only allows apply of command to the Physical interface. As the routed transit is an SVI and not a routed port will the CTS manual command when applied to the 9500 physical interface be honoured for the traffic passing over the routed SVI?
Solved! Go to Solution.
08-25-2021 03:02 PM - edited 08-25-2021 04:19 PM
Hi @trickyg
Yes this will work without any issues. I have installed a number of Catalyst 9500 borders that handoff to either a Catalyst 9300/9500 that is acting a shared services/fusion switch with SGT inline tagging to propagate SGTs to a perimeter firewall.
In my deployments I use Border Handoff automation so DNA Center configures the routed transit for each VN as an SVI (VLAN ID 3XXX). This is an example config that I apply to my border to shared services/fusion handoff interface.
interface FortyGigabitEthernet1/0/22
description Link to Shared Services
switchport mode trunk
switchport trunk allowed vlan 3001-3004
cts manual
policy static sgt 2 trusted
08-25-2021 03:02 PM - edited 08-25-2021 04:19 PM
Hi @trickyg
Yes this will work without any issues. I have installed a number of Catalyst 9500 borders that handoff to either a Catalyst 9300/9500 that is acting a shared services/fusion switch with SGT inline tagging to propagate SGTs to a perimeter firewall.
In my deployments I use Border Handoff automation so DNA Center configures the routed transit for each VN as an SVI (VLAN ID 3XXX). This is an example config that I apply to my border to shared services/fusion handoff interface.
interface FortyGigabitEthernet1/0/22
description Link to Shared Services
switchport mode trunk
switchport trunk allowed vlan 3001-3004
cts manual
policy static sgt 2 trusted
08-25-2021 03:26 PM
For my own curiosity and perhaps education, how come an SDA Transit network between borders doesn't solve this problem. I thought that carrying SGT between fabrics is what it was designed for.
08-25-2021 04:18 PM
This was for two SDA fabrics that were connected via a common fusion switch using IP-based transit. I have just checked and I think that end to end policy using SGTs was maintained using SXP and not inline CTS. Inline CTS was used for SGT propagation to a firewall that was connected to the common fusion switch.
I suppose that SDA transit was designed for this type of deployment, however as this was only two sites, SDA transit was not initially opted for. I have corrected my original post.
Out of interest, can SGT policy between multiple fabric sites with IP-Transit handoff/VRF-lite be maintained with CTS inline tagging or is SXP the only supported option?
Thanks,
Will
08-25-2021 04:34 PM
@willwetherman I can't remember hearing any updates regarding carrying SGTs inline over IP-Transit. Instead, there was work done to carry it in VXLAN natively (over SDA transit), or in one of the protocols involved in SD-WAN (maybe IPSEC?). Both of those eliminate the need for SXP, which improves scale and hopefully reduces complexity.
08-26-2021 01:51 AM
Thanks for the clarification regarding inline tagging on physical interface configured as trunk.
"can SGT policy between multiple fabric sites with IP-Transit handoff/VRF-lite be maintained with CTS inline tagging or is SXP the only supported option?"
This is what I am trying to achieve. My understanding is that the SGT value in the source packet being transmitted over the IP transit will be preserved and included in the additional header attached to the packet. The receiving fabric will then be able to apply fabric policy to this packet as SGT still intact?
08-26-2021 01:45 AM
That's OK if all intermediate devices between the two fabrics are SDA enabled but in my scenario this is not the case hence why I am using IP based transit
07-04-2022 12:10 AM
I am doing something very similar, with 9500 borders peering via to 9500 shared/services fusion switches, which then peer to a connected FTD firewall pair, and want to pass the SGTs though to the firewalls.
Did you also need to apply these commands on all physical interfaces on the 9500 shared/services fusion switches in the path to the firewalls?
cts manual
policy static sgt 2 trusted
Cheers,
Dave
07-05-2022 12:36 AM
Can this configuration be applied on routed interfaces?
I've got a C3560CX and a C3560X in the lab and have never been able to get a link to come with just this:
cts manual policy static sgt 4 trusted propagate sgt
Both switches are running the latest IOS versions.
07-05-2022 01:21 AM
Inline SGT tagging not supported on 3560-CX. Please review the TrustSec platform and capability matrix -> https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/trustsec/policy-platform-capability-matrix.pdf
07-05-2022 02:34 AM
I'm fairly certain it is supported on C3560CX & C3560X series:
07-05-2022 07:43 AM
As mentioned, inline tagging is not supported on the 3560. Page 3 of the document jedolphi shared shows which TrustSec features are available on the 3560 platform. I can confirm this is accurate.
https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/trustsec/software-platform-capability-matrix.pdf
07-13-2022 03:41 AM - edited 07-13-2022 03:42 AM
OK. I'm getting my technologies mixed up here...
MACSEC is supported on C3560CX, but not CTS inline tagging it seems.
So on the C3560CX platform we can't do SGT based access-control? Or am I missing something here? The RADIUS server pushes the cisco-av-pair for the SGT tag and I can see this in the 'Server Policies' when looking at the authentication status of the interface. Would SGT only be applicable within the switch? i.e. two hosts attached to the C3560CX get different SGT values and a policy could implement micro-segmentation within the switch between the two hosts, but the SGT can't propagate out of the switch?
09-29-2022 01:02 AM
Hi Andrew,
You're right, there is two differents things : you can use SGT and do filtering on 3560CX, but it doesn't do VXLAN so it can't exchange SGT with other switches.
10-03-2022 01:08 AM
SGT inline tagging and VXLAN are different things. SGT inline tagging is an Ethernet frame with the Ethertype set to 0x8909 which indicates a CiscoMetaData header is present. The CiscoMetaData header contains the SGT. VXLAN is a generic encapsulation. Cisco put two things in the VXLAN header - the VNID and the SGT.
Solved: SGT Tag vs VxLAN tag - Cisco Community
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide