EasyManuals Logo

Cisco TrustSec User Manual

Cisco TrustSec
208 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #54 background imageLoading...
Page #54 background image
3-18
Cisco TrustSec Configuration Guide
OL-22192-02
Chapter 3 Configuring Identities, Connections, and SGTs
Manually Configuring IP-Address-to-SGT Mapping
Step 7
[no] shutdown
Example:
TS_switch(config-if)# no shutdown
Enables the SVI.
Step 8
exit
Example:
TS_switch(config-if)# exit
TS_switch(config)#
Exits VLAN Interface Configuration mode into
Global Configuration mode.
Step 9
cts role-based sgt-map vlan-list vlan_id
sgt sgt_number
Example:
TS_switch(config)# cts role-based sgt-map
vlan-list 100 sgt 10
Assigns the specified SGT to the specified VLAN.
Step 10
ip device tracking probe [count count |
delay seconds | interval length]
Example:
TS-switch(config)# ip device tracking
Enables IP device tracking. When active hosts are
detected, the switch adds the following entries to an
IP Device Tracking table:
IP address of host
MAC address of host
VLAN of the host
The interface on which the switch detected the
host
The state of the host (Active or Inactive)
The host added to the IP Device Tracking table is
monitored with periodic ARP probes. Hosts that fail
to respond are removed from the table.
Step 11
exit
Example:
TS_switch(config)# exit
TS_switch#
Exits Global configuration mode.
Step 12
show cts role-based sgt-map {ipv4_netaddr
| ipv4_netaddr/prefix | ipv6_netaddr|
ipv6_netaddr/prefix | all [ipv4 | ipv6] |
host {ipv4__addr | ipv6_addr} | summary
[ipv4 | ipv6]
Example:
TS_switch# cts role-based sgt-map all
(Optional) Displays the VLAN to SGT mappings.
Command Purpose

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco TrustSec and is the answer not in the manual?

Cisco TrustSec Specifications

General IconGeneral
CategoryNetwork Security
FunctionalityProvides role-based access control, network segmentation, and policy enforcement.
Key ComponentsSecurity Group Tags (SGT), Security Exchange Protocol (SXP).
Authentication Methods802.1X, MAC Authentication Bypass (MAB), Web Authentication
Security Group Tagging (SGT)Assigns security group tags to users and devices for identity-based segmentation.
Security Exchange Protocol (SXP)A protocol used to propagate SGT information across network devices.
Policy EnforcementEnforces security policies based on SGTs and SGACLs.
BenefitsEnhanced security, simplified policy management, and improved compliance.
EncryptionSupports encryption for data in transit through IPsec and MACsec.
ScalabilityScalable to large enterprise networks with thousands of devices.
CompatibilityCompatible with a wide range of Cisco network devices.
DescriptionCisco TrustSec is a security architecture framework designed to build secure networks. It uses identity-based access control to segment the network and enforce policies based on user roles and device types, rather than relying solely on IP addresses.

Related product manuals