Hi Cisco Community
 
We have used some C3560CX as office extenders and now want to activate SGT. 
Unfortunately this does not work and we do not yet understand the reasons. A new C9200CX works perfectly.
 
There are contradictory announcements and many tests are not positive. 
 
!-- Office Extender:
 
HW: WS-C3560CX-12PD-S, 15.2(7)E5 - do not work
HW: C9200CX-12P-2X2G, 17.09.05 - works well
 
Here the current example of my testing and logdata. (see below):
 
Uplink from FE C9300-FE-053 to extender node C3560CX:
 
interface Port-channel9
 switchport mode trunk
!
interface GigabitEthernet1/0/15
 switchport mode trunk
 channel-group 9 mode desirable
 service-policy output DNA-dscp#APIC_QOS_Q_OUT
 
 
C9300-FE-053#show cts interface GigabitEthernet1/0/15
Interface GigabitEthernet1/0/15:
    CTS is disabled.
 
    L3 IPM:   disabled.
 
!-- Office Exender node WS-C3560CX-12PD-S (C3560CX):
 
Uplink from extender node C3560CX to C9300-FE-053
 
aaa authentication login dnac-cts-list group dnac-client-radius-group local
aaa authorization network dnac-cts-list group dnac-client-radius-group 
cts authorization list cts-list
!
interface Port-channel1
 switchport mode trunk
!
interface GigabitEthernet1/0/13
 switchport mode trunk
 srr-queue bandwidth share 1 55 37 7
 priority-queue out 
 channel-group 1 mode desirable
!
radius server dnac-radius_10.x.x.x
 address ipv4 10.x.x.x auth-port 1812 acct-port 1813
 timeout 5
 retransmit 3
 automate-tester username dummy ignore-acct-port probe-on
 pac key 7 xxxxxxx
 
 
!-- Office Exender node C9200CX-12P-2X2G:
 
 
Uplink from FE C9300-FE-051 to exender node C9200CX:
 
interface Port-channel2
 switchport mode trunk
!
interface TenGigabitEthernet1/1/7
 switchport mode trunk
 cts manual
  policy static sgt 8000 trusted
 channel-group 2 mode desirable
 service-policy output DNA-dscp#APIC_QOS_Q_OUT
 
Uplink to C9300-FE-051:
 
aaa authentication login dnac-cts-list group dnac-client-radius-group local
aaa authorization network dnac-cts-list group dnac-client-radius-group 
cts authorization list dnac-cts-list
!
cts role-based enforcement
cts role-based enforcement vlan-list 1021,1023-1024,1026-1028,1036-1040,1042,1044-1048,2045-2047
!
radius server dnac-radius_10.x.x.x
 address ipv4 10.x.x.x auth-port 1812 acct-port 1813
 timeout 5
 retransmit 3
 automate-tester username dummy ignore-acct-port probe-on
 pac key 7 xxxx
!
interface Port-channel1
 switchport mode trunk
 ip dhcp snooping trust
!
interface GigabitEthernet1/1/1
 switchport mode trunk
 cts manual
  policy static sgt 8000 trusted
 channel-group 1 mode desirable
 service-policy output DNA-dscp#APIC_QOS_Q_OUT
 ip dhcp snooping trust
 
 
Logdate:
 
 
 
Logdate from C9300-FE-051 with C9200CX:
 
C9300-FE-051#show cts interface TenGigabitEthernet1/1/7
Global Dot1x feature is Disabled
Interface TenGigabitEthernet1/1/7:
    CTS is enabled, mode:    MANUAL
    IFC state:               OPEN
    Interface Active for      6d17h
    Authentication Status:   NOT APPLICABLE
        Peer identity:       "unknown"
        Peer's advertised capabilities: ""
    Authorization Status:    SUCCEEDED
        Peer SGT:            8000
        Peer SGT assignment: Trusted
    SAP Status:              NOT APPLICABLE
    Propagate SGT:           Enabled
    Cache Info:
        Expiration            : N/A
        Cache applied to link : NONE
 
    Statistics:
        authc success:              0
        authc reject:               0
        authc failure:              0
        authc no response:          0
        authc logoff:               0
        sap success:                0
        sap fail:                   0
        authz success:              0
        authz fail:                 0
        port auth fail:             0
 
    L3 IPM:   disabled.
 
 
Logdate from C9300-FE-051 with C3560CX:
 
C9300-FE-053#show cts interface GigabitEthernet1/0/15
Interface GigabitEthernet1/0/15:
    CTS is disabled.
 
    L3 IPM:   disabled.
 
Note: The entire configuration is generated using DNAC (CC).
 
Thank you for your input.
 
Markus