07-05-2016 01:48 AM - edited 03-10-2019 11:54 PM
Hi everybody,
I'm trying to fully understand the trustsec technology and things are getting confusing... so I'm asking for a bit of help :)
Don't hesitate to correct me if I'm wrong (that's the goal indeed).
I have the following architecture to implement :
From what I understood, ISE is doing the authentication first (classification) and returns the SGT tag to switches. That permits the switches to tag ingress properly (propagation) before coming to enforcement (which will be done by ASA firewall).
But what I don't understand is how the WLC is getting tags from ISE? It's not SGT capable, so it will work with SXP peering as a speaker. So it can only send mapping tables right (ip to sgt)? How can it map anything if it cannot receive tags from ISE authentication (saying user A is in SGT "employee" for example)? It has to be only static mapping on WLC (then yes ok, but trustsec starts getting useless...)?
I'm really confused, so I guess I misunderstood the principle of trustsec...
Thanks a lot for reading and if you can help,
Best regards,
Basile
Solved! Go to Solution.
07-05-2016 05:41 AM
When a wireless client connects to the network as part of the auth policy it was also provide the SGT. The WLC as the SXP speaker will forward the IP-SGT mapping to the SXP listener. the listener inserts the SGT into the packet on behalf of the WLC.
I hope that makes sense. It is confusing :)
07-05-2016 05:41 AM
When a wireless client connects to the network as part of the auth policy it was also provide the SGT. The WLC as the SXP speaker will forward the IP-SGT mapping to the SXP listener. the listener inserts the SGT into the packet on behalf of the WLC.
I hope that makes sense. It is confusing :)
07-05-2016 06:01 AM
Yes it makes more sense to me now! :)
Thank you!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide