EasyManuals Logo

Cisco TrustSec User Manual

Cisco TrustSec
208 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #6 background imageLoading...
Page #6 background image
Contents
vi
Cisco TrustSec Configuration Guide
OL-22192-01
Manually Configuring SGACL Policies 5-4
Manually Configuring and Applying IPv4 SGACL Policies 5-4
Configuration Examples for Manually Configuring SGACL Policies 5-5
Displaying SGACL Policies 5-6
Refreshing the Downloaded SGACL Policies 5-7
Configuring Endpoint Admission Control 6-1
Information About Endpoint Admission Control 6-1
Basic EAC Configuration Sequence 6-2
802.1X Authentication Configuration 6-2
Verifying the 802.1X Configuration 6-2
MAC Authentication Bypass Configuration 6-3
Verifying the MAB Configuration 6-3
Web Authentication Proxy Configuration 6-4
Verifying Web Authentication Proxy Configuration 6-4
Flexible Authentication Sequence and Failover Configuration 6-5
802.1X Host Modes 6-5
Pre-Authentication Open Access 6-5
DHCP Snooping and SGT Assignment 6-6
Verifying the SGT to Endpoint Host Binding 6-6
Cisco TrustSec Endpoint Access Control Feature Histories 6-7
Cisco TrustSec Command Summary 7-1
Notes for Catalyst 3000 and 2000 Series Switches and WLC 5700 Series Wireless LAN
Controllers A-1
Supported Hardware and Software A-1
Configuration Guidelines and Restrictions A-1
Global Cat3K Restrictions A-1
Catalyst 3850 and Catalyst 3650 Switches, and WLC 5700 Wireless LAN Controllers A-2
Catalyst 3750-X and Catalyst 3560-X switches A-2
Notes for Catalyst 4500 Series Switches B-1
Supported Hardware and Software B-1
TrustSec SGT and SGACL Configuration Guidelines and Limitations B-1

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco TrustSec and is the answer not in the manual?

Cisco TrustSec Specifications

General IconGeneral
CategoryNetwork Security
FunctionalityProvides role-based access control, network segmentation, and policy enforcement.
Key ComponentsSecurity Group Tags (SGT), Security Exchange Protocol (SXP).
Authentication Methods802.1X, MAC Authentication Bypass (MAB), Web Authentication
Security Group Tagging (SGT)Assigns security group tags to users and devices for identity-based segmentation.
Security Exchange Protocol (SXP)A protocol used to propagate SGT information across network devices.
Policy EnforcementEnforces security policies based on SGTs and SGACLs.
BenefitsEnhanced security, simplified policy management, and improved compliance.
EncryptionSupports encryption for data in transit through IPsec and MACsec.
ScalabilityScalable to large enterprise networks with thousands of devices.
CompatibilityCompatible with a wide range of Cisco network devices.
DescriptionCisco TrustSec is a security architecture framework designed to build secure networks. It uses identity-based access control to segment the network and enforce policies based on user roles and device types, rather than relying solely on IP addresses.

Related product manuals