02-07-2018 11:14 PM
I have a customer that is looking to deploy ISE in switching environment that is utilizing Private VLANs. If memory serves me right, dot1x was NOT supported on PVLAN enabled port. However, I was checking out the latest 3750/3850 configuration guide and it appears that this is no longer the case:
With that being said, I have a few questions:
Neno
Solved! Go to Solution.
02-08-2018 07:46 AM
It will depend on the switch support as covered here for Cat4500: Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide, 12.2(31)SG - Configuring 802.1X Port-Based Authentic…
This document also covers restrictions and methods to configure.
Be sure to read closely any caveats and restrictions listed under the appropriate switch configuration guide.
02-08-2018 07:46 AM
It will depend on the switch support as covered here for Cat4500: Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide, 12.2(31)SG - Configuring 802.1X Port-Based Authentic…
This document also covers restrictions and methods to configure.
Be sure to read closely any caveats and restrictions listed under the appropriate switch configuration guide.
02-08-2018 08:00 AM
Have you considered segmenting traffic using SGTs with Trustsec?
02-08-2018 09:40 PM
Thank you for the suggestion Jason.
My initial thought was TrustSec. However, they also have a requirement where they also want to be able to allow exceptions for particular users/machines so they are allowed to communicate with each other. Essentially, combining SGTs with additional attributes such as IPs, MACs, AD Groups, for a switch level enforcement. This does not appear to be possible based on my research and another thread that I opened.. Here is an example:
Permit
Src_sgt_10 and ad_user=User1 to Dst_sgt_10 and ad_user=User2
Deny
Src_sgt_10 to Dst_sgt_10
The other two alternatives that we considered are:
Private VLANs:
- No support for dynamic PVLANs
- No support for Voice VLANs
DACLs
- DACL Entries could potentially become too long and exhaust TCAM resources
Neno
02-09-2018 04:11 AM
You have same question under Trustsec Community please work thru with them first and if no solution continue here
https://communities.cisco.com/message/281661<https://communities.cisco.com/message/281661?mobileredirect=true>
02-12-2018 07:27 PM
Thank you Jason. I closed the other thread as it appears that TrustSec would not be able to satisfy the requirements. I think DACLs are the only option here as I can't think of anything else.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide