08-21-2014 02:55 AM - edited 03-10-2019 09:57 PM
Hi Team,
Can someone give me a real time example or exaplin me in simple language "What is Trust SEC"?
Minakshi
08-21-2014 08:33 PM
have you gone through
http://www.cisco.com/c/en/us/solutions/enterprise-networks/trustsec/index.html
08-21-2014 10:37 PM
Hi Saurabh,
Thanks for you reply!! I have gone through the link. However, I don't want a link. Can you explain in simple words With an example.
Minakshi
08-22-2014 03:22 AM
Example of trustsec use :
Cisco TrustSec capabilities are embedded in Cisco ®switches, wireless LAN (WLAN) controllers, routers, and firewalls. With TrustSec, when a user's traffic enters the network, it is classified according to characteristics such as user authentication, analysis of the device being used and it's network location. Based on these criteria, a user's endpoint is classified as a member of a particular security group; for example, it could be added to a group called Retail-Manager. Cisco switches and routers then propagate the security group information to policy-enforcement devices
08-22-2014 03:10 AM
The Cisco TrustSec solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that are based on network topology, Cisco TrustSec policies use logical groupings. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks. Decoupling access entitlements from IP addresses and VLANs simplifies security
policy maintenance tasks, lowers operational costs, and allows common access policies to be consistently applied to wired, wireless, and VPN access. Cisco TrustSec classification and policy enforcement functions are embedded in Cisco switching, routing, wireless LAN, and firewall products. By classifying traffic according to the contextual identity of the endpoint instead of its IP address, the Cisco TrustSec solution enables more flexible access controls for dynamic networking environments and data centers.
The ultimate goal of Cisco TrustSec technology is to assign a tag (known as a Security Group Tag, or SGT) to the user’s or device’s traffic at ingress (inbound into the network), and then enforce the access policy based on the tag elsewhere in the infrastructure (in the data center, for example). This SGT is used by switches, routers, and firewalls to make forwarding decisions. For instance, an SGT may be assigned to a Guest user, so that Guest
traffic may be isolated from non-Guest traffic throughout the infrastructure. Here is a list
of some very common security groups:
●Network Infrastructure: This SGT gets assigned to all the switches, routers, WLCs, and firewalls within the organization
●Network Services: This SGT is assigned to the servers providing common services (Domain Name System, Dynamic Host Configuration Protocol, Network Time Protocol, etc.) that most everyone should be able to reach
●Executive: Many organizations classify their executives with a separate SGT, simply to ensure that Executives will never be denied access to anything
●Sales
●Finance
●HR
●Line of Business 1: SGTs are used quite often when an umbrella company has many lines of business and those lines of business cannot have access to each other’s data
●Line of Business 2, 3, and so on: See the previous entry
Note: Each end user or end device may be assigned only one SGT
For real time example please refer the document attached.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide