EasyManua.ls Logo

Cisco TrustSec User Manual

Cisco TrustSec
208 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #84 background imageLoading...
Page #84 background image
6-6
Cisco TrustSec Configuration Guide
OL-22192-01
Chapter 6 Configuring Endpoint Admission Control
DHCP Snooping and SGT Assignment
DHCP Snooping and SGT Assignment
After the authentication process, authorization of the device occurs (for example, dynamic VLAN
assignment, ACL programming, etc.). For TrustSec networks, a Security Group Tag (SGT) is assigned
per the user configuration in the Cisco ACS. The SGT is bound to traffic sent from that endpoint through
DHCP snooping and the IP device tracking infrastructure.
The following example enables DHCP snooping and IP device tracking on an access switch:
switch# conf t
Enter configuration commands, one per line. End with CNTL/Z.
switch(config)# ip dhcp snooping
switch(config)# ip dhcp snooping vlan 10
switch(config)# no ip dhcp snooping information option
switch(config)# ip device tracking
For more detailed information on DHCP snooping and IP device tracking configuration, see the
configuration guide for your access switch.
Verifying the SGT to Endpoint Host Binding
To verify that hosts are visible to DHCP Snooping and IP Device Tracking, use the
show ip dhcp snooping binding and show ip device tracking commands.
switch# show ip dhcp snooping binding
MacAddress IpAddress Lease(sec) Type VLAN Interface
------------------ --------------- ---------- ------------- ---- --------------------
00:0C:29:3A:04:8E 10.252.10.10 84814 dhcp-snooping 10 GigabitEthernet2/1
Total number of bindings: 1
switch# show ip device tracking all
IP Device Tracking = Enabled
IP Device Tracking Probe Count = 3
IP Device Tracking Probe Interval = 30
--------------------------------------------------------------
IP Address MAC Address Interface STATE
--------------------------------------------------------------
10.252.10.10 000c.293a.048e GigabitEthernet2/1 ACTIVE
To verify that the correct SGT is bound to an endpoint IP address, use the show cts role-based sgt-map
command.
switch# show cts role-based sgt-map all
Active IP-SGT Bindings Information
IP Address SGT Source
============================================
1.1.1.1 7 INTERNAL
10.252.10.1 7 INTERNAL
10.252.10.10 3 LOCAL
10.252.100.1 7 INTERNAL
172.26.208.31 7 INTERNAL
IP-SGT Active Bindings Summary
============================================
Total number of LOCAL bindings = 1
Total number of INTERNAL bindings = 4
Total number of active bindings = 5

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Cisco TrustSec and is the answer not in the manual?

Cisco TrustSec Specifications

General IconGeneral
CategoryNetwork Security
FunctionalityProvides role-based access control, network segmentation, and policy enforcement.
Key ComponentsSecurity Group Tags (SGT), Security Exchange Protocol (SXP).
Authentication Methods802.1X, MAC Authentication Bypass (MAB), Web Authentication
Security Group Tagging (SGT)Assigns security group tags to users and devices for identity-based segmentation.
Security Exchange Protocol (SXP)A protocol used to propagate SGT information across network devices.
Policy EnforcementEnforces security policies based on SGTs and SGACLs.
BenefitsEnhanced security, simplified policy management, and improved compliance.
EncryptionSupports encryption for data in transit through IPsec and MACsec.
ScalabilityScalable to large enterprise networks with thousands of devices.
CompatibilityCompatible with a wide range of Cisco network devices.
DescriptionCisco TrustSec is a security architecture framework designed to build secure networks. It uses identity-based access control to segment the network and enforce policies based on user roles and device types, rather than relying solely on IP addresses.

Summary

Cisco TrustSec Overview

Information about Cisco TrustSec Architecture

Describes the elements and processes that create the Cisco TrustSec network.

Authentication

Covers topics related to device and user authentication within Cisco TrustSec.

Security Group-Based Access Control

Details access control policies based on security groups and SGTs.

Configuring the Cisco TrustSec Solution

Configuring Identities, Connections, and SGTs

Configuring Credentials and AAA for a Cisco TrustSec Seed Device

Details steps to configure credentials and AAA for a Cisco TrustSec seed device.

Configuring Credentials and AAA for a Cisco TrustSec Non-Seed Device

Details steps to configure credentials and AAA for a Cisco TrustSec non-seed device.

Enabling Cisco TrustSec Authentication and MACsec in 802.1X Mode on an Uplink Port

Explains how to enable TrustSec authentication and MACsec using 802.1X on an uplink port.

Configuring Cisco TrustSec and MACsec in Manual Mode on an Uplink Port

Guides on manually configuring Cisco TrustSec and MACsec on an uplink port.

Manually Configuring IP-Address-to-SGT Mapping

Discusses mapping IP addresses to SGTs manually.

Subnet to SGT Mapping

Details mapping SGTs to all host addresses within a specified subnet.

VLAN to SGT Mapping

Explains binding SGTs to packets from a specified VLAN.

Layer 3 Logical Interface to SGT Mapping (L3IF–SGT Mapping)

Maps SGTs to traffic of any Layer 3 interface.

Configuring SGT Exchange Protocol over TCP (SXP) and Layer 3 Transport

Configuring Cisco TrustSec SXP

Describes how to configure the SGT Exchange Protocol (SXP) on switches.

Configuring an SXP Peer Connection

Details how to configure SXP peer connections on both devices.

Configuring Layer 3 SGT Transport Between Cisco TrustSec Domains

Guides on configuring Layer 3 SGT Transport for cross-domain traffic.

Configuring SGACL Policies

SGACL Policy Configuration Process

Outlines the steps to configure and enable Cisco TrustSec SGACL policies.

Manually Configuring SGACL Policies

Guides on manually configuring SGACL policies by binding ACLs to SGTs.

Configuring Endpoint Admission Control

Information About Endpoint Admission Control

Explains endpoint authentication and authorization methods in TrustSec networks.

802.1X Authentication Configuration

Details the basic 802.1X configuration for a Gigabit Ethernet port.

MAC Authentication Bypass Configuration

Explains MAC Authentication Bypass (MAB) for non-802.1X capable clients.

Cisco TrustSec Command Summary

Related product manuals