cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
171
Views
1
Helpful
2
Replies

SGT tagging to inbound third party partner traffic on Firepower

BINU KR
Level 1
Level 1

In my case, the customer wants to tag the third party (parnters) traffic connected to the company. The third parties are connected via MPLS or Internet IPSec tunnels to a perimeter router and the traffic is then filtered on Firepower. At this point, the traffic must be tagged with SGT for later monitoring with SNA integration. The Cisco ISE is already in place assigning SGTs to the Enterprise devices and SNA is integrated with FMC. Is this a possible scenario and any references would be appreciated.

2 Accepted Solutions

Accepted Solutions

Damien Miller
VIP Alumni
VIP Alumni

I don't know if you can do this on a firepower. I like the use case though, I would feature request static sgt mappings for vpn tunnels if it doesn't exist.

 

One way I know that you could do this is to force the tunnel traffic to route through an ASR or switch on specific interfaces. On the router/switch interfaces you would assign a static sgt to the port of your choosing. This would tag all traffic on ingress from the third party tunnels. 

View solution in original post

BINU KR
Level 1
Level 1
2 Replies 2

Damien Miller
VIP Alumni
VIP Alumni

I don't know if you can do this on a firepower. I like the use case though, I would feature request static sgt mappings for vpn tunnels if it doesn't exist.

 

One way I know that you could do this is to force the tunnel traffic to route through an ASR or switch on specific interfaces. On the router/switch interfaces you would assign a static sgt to the port of your choosing. This would tag all traffic on ingress from the third party tunnels. 

BINU KR
Level 1
Level 1

Thanks Damien.