I have built a TrustSec infrastructure, assigning SGT to all users connecting via wireless, wired or VPN.
On the ASA, where the Anyconnect clients connect, the ISE assigns an SGT to each users, as expected.
Now, on this ASA I've configured an access-list (in the outbound direction towards the inside network) using the SGTs: it works well until I use the SGTs assigned dynamically by the ISE, and also those statically configured on the ASA.
I'd like to use the predefined SGT ANY, whose numeric value is 65535, but it does not work at all: when I use it in a access-list entry, the rule is never matched.
Is there anything I should know about that? Why is it present if it does not work? Can anybody help me? It would be definitely useful to take advantage of this SGT.
Thanks in advance.
PS: A couple of remarks:
1) I noticed that this SGT ANY is ** not ** defined on the ISE, but I see it present both on the ASA and the WLC.
2) I didn't configure inline tagging on the ASA interfaces: there is a SXP connection between the ASA (speaker) and the ISE (listener), just to keep the ISE informed about the connected VPN clients.
Enable full visibilityCreating first policy setUnderstanding ISE Live Log status
These are few tips that will help you with your first deployment of ISE. For advanced tips, please visit: https://community.cisco.com/t5/security-documents/advanced-i...
This guide helps in troubleshooting the IBM QRadar pxGrid App. It is assumed that the ISE pxGrid App has already been installed in QRadar. The official IBM QRadar pxGrid App How-to Guide can be downloaded from: https://exchange.xforce.ibmcloud.com/...
Join us live on Tuesday, July 16 at 10 am PT to learn how integration and automation are the key to successful security designs. We’ll answer questions about Threat Response and also do a quick demo of our browser plugin and our latest integration wi...
Hello and welcome to the repository for the Monthly Webinar Series put together by our Desert Plains Operation Security Architecture team.
Our sessions are NOT recorded -- however you'll find historical slide decks attached as well as futu...
In June we have had new additions to our growing list of Machine-Learning-powered Confirmed Threat detections provided by the Cognitive Intelligence engine. Thanks to the improvement made to our Machine Learning backend (see Machine Learning Backend Impro...