BRKCRS 2891 PDF
BRKCRS 2891 PDF
BRKCRS 2891 PDF
This session provides an overview of the Cisco TrustSec solution for Enterprise network
segmentation and Role-Based Access Control. SGA allows for simplified network
segmentation based on User Identity/Role and allows for secure access and consistent
security policies across Wired/Wireless networks.
We will cover SGA solution on the Catalyst, Nexus Switching and Routing
(ASR1K/CSR/ISR) platforms, including converged wired/wireless with a focus on the
deployment use cases in a campus, data center & branch networks. The session covers
an architectural overview of SGA and benefits of TrustSec role based policies, elements of
Cisco TrustSec such as user identification with 802.1x, device identification, role
classification using Security Group Tagging (SGT) and enforcement using Security Group
Access Control List (SGACL).
This session is for Network Architects, Pre-Sales Engineers and Technical Decision
Makers. Previous knowledge or experience is recommended in campus design, Internet
edge design, routing protocol design, and Layer 2 and Layer 3 switching.
BRKCRS-2981
hari_holla
Agenda
1
Network Segmentation
The past present and future of network segmentation
TrustSec Deep-dive
Deploying TrustSec
Key takeaways
For Your
Reference
Authenticated
User
CCSSEC-2002
Cisco IT Identity
Services Engine (ISE)
Deployment and
Best Practices
(Thurs 12:30pm).
BRKSEC-3697
Advanced ISE
Services, Tips and
Tricks
(Tues 1:00pm)
(Wed 1:00pm)
BRKSEC-2695 - Building an Enterprise Access Control Architecture using ISE and TrustSec
(Mon 10:00 am + Thur 8:00 am)
BRKSEC-2203
Deploying TrustSec
Security Group
Tagging
(Wed 3:30pm)
BRKSEC-3690
Advanced Security
Group Tags: The
Detailed Walk Through
(Thur 10:00am)
Network Segmentation
Deploying
TrustSec
Network
Segmentation
Start
TrustSec
Deep-dive
Key
Take-aways
Use-cases &
Scenarios
It all starts
with
registration
Enforcers
refer the
policy
Enforcers grant access to
places you are authorized for
http://www.ciscolive.com/us/registration-packages/
Medical Device
Other
Network
Doctor
Staff
Hospital Network
Bring-Your-Own-Device
Multi-Tenancy
Traditional Segmentation
Segment to segment
communication governed by
IP routes and IP based
policies
Classify assets in to VLAN,
transport context in L2 (VLAN
tag) / L3 (IP address / VRF),
Enforce based on IP-ACLs
Enforcement
IP based policies.
ACLs, Firewall
rules
Propagation
Carry segment
context over
the network
through VLAN
tags / IP
address / VRF
Classify
Static /
Dynamic VLAN
assignments
VLAN
10
VLAN
20
VRF-20
VRF-10
Campus LAN
Subnet
10.10.X.X
VLAN-10
Subnet
10.20.X.X
VLAN-20
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
102
102
102
102
102
102
102
102
102
102
Traditional Segmentation
ACL
Aggregation Layer
VLAN
Addressing
Redundancy
Quarantine
DHCP Scope
Routing
Static ACL
Access Layer
Voice
Data
Suppliers
Guest
Simple
More Policies
Segmentation
using more
with VLANs
2 VLANs
Steps replicated across floors, buildings and sites
TrustSec Overview
HR Group : SGT-05
ENG Group : SGT-06
AD
ISE
IP
SG
SGT
Address Name #
10.0.0.1 HR
10.0.0.1
SRC \ DST
HR-Servers (11)
ENG-Servers (12)
Group-HR (5)
Group-ENG (6)
HR-Servers (11)
ENG-Servers (12)
10.0.1.1
HR Servers
Switch/WLC
(Inline SGT)
S: 10.0.0.1
SGT=5
D: 10.0.1.1
SGT=11
S: 10.0.0.1
D: 10.0.1.1
Employee1
(HR Group)
S: 10.0.0.2
D: 10.0.1.1
Switch
Employee2
(ENG Group)
10.0.0.2
IP
SG
SGT
Address Name #
Classify
S: 10.0.0.2
D: 10.0.1.1
Firewall
SXP
IP:10.0.0.2 = SGT:6
Switch/WLC
(No SGT)
10.0.0.2 ENG
DC SW
SGT=12
S: 10.0.0.2
SGT=6
D:
10.0.1.1
S: 10.0.0.2
D: 10.0.1.1
S: 10.0.0.1
D: 10.0.1.1
ENG Servers
10.0.1.2
IP
SG
SGT
Address Name #
10.0.0.2 ENG
Transport
Enforce
Data Center
Data Center
Firewall
Campus Core
Access Layer
Employee Tag
Supplier Tag
Guest Tag
Quarantine Tag
Voice
Building 3
WLAN Data VLAN
Voice
Employee Suppliers
Guest Quarantine
Main Building
Data VLAN
Data Center
Data Center
Firewall
Campus Core
Access Layer
Employee Tag
Supplier Tag
Guest Tag
Quarantine Tag
Voice
Building 3
Data VLAN (200)
Voice
Main Building
Data VLAN (100)
TrustSec Deep-dive
(WHAT is TrustSec)
Deploying
TrustSec
Network
Segmentation
Start
TrustSec
Deep-dive
Key
Take-aways
Use-cases &
Scenarios
NDAC
SGACL /
Name table
SGT and
SGT Names
Sources
Destinations
PCI Clients
PCI Servers
Prod. Servers
Rogue
Device(s)
802.1X
Dynamic SGT
Assignment
ISE authenticates
Wired/Wireless/VPN
clients and assigns
Security Group Tags
(SGT)
TrustSec Functions
5
Employee
Voice
Partner
Classification
Assigning SGTs
Static Assignments
Dynamic Assignments
A
Propagation
Inline SGT
SXP
WAN Options
Enforcement
Security Group ACL
SG Firewall
SG Zone Based FW
Classification
Static Assignments
VLAN-10
Employee_SGT
10.1.1.0/24
MAB
(VLAN-10 = LAN-A_SGT)
Subnet to SGT
(10.1.1.0/24 = SiteA_SGT)
Phone_SGT
0/1
0/2
Guest_SGT
IP to SGT
1.1.1.1=PROD, 1.1.1.2=PCI
1.1.1.2
Classification
Joint
Ventures
Business
Partners
Route Updates
17.1.1.0/24
g3/0/1
g3/0/2
Route Updates
43.1.1.0/24
49.1.1.0/24
Hypervisor SW
Classification
Static
C2960-S
C3750X
**C3850/WL
C 5760
C4500
C6x00
ISR/ASR1000
WLC
802.1X
MAB
Web Auth
VLAN/SGT
X*
X*
Subnet/SGT
Layer 3
Interface
Mapping
Classification
TrustSec Functions
5
Employee
Voice
Partner
Classification
Assigning SGTs
Static Assignments
Dynamic Assignments
A
Propagation
Inline SGT
SXP
WAN Options
Enforcement
Security Group ACL
SG Firewall
SG Zone Based FW
Propagation
MACsec Frame
Destination MAC
CMD EtherType
Destination MAC
Source MAC
Version
Source MAC
802.1Q
Length
CMD
No impact to QoS, IP
MTU/Fragmentation
PAYLOAD
802.1AE Header
802.1Q
CMD
ETHTYPE
PAYLOAD
CRC
Ethernet Frame
AES-GCM 128bit
Encryption
ETHTYPE:0x8909
802.1AE Header
CRC
ETHTYPE:0x88E5
Propagation
MACSEC
MACSEC Pairwise
Master Key (PMK)
MACSEC Pairwise
Transient Key (PTK)
Encryption Cipher
Selection
(no-encap, null, GCM,
GMAC)
Trust/Propagation
Policy for Tags
cts dot1x
Dynamic
Dynamic
Negotiated
Dynamic from
ISE/configured
cts manual
with encryption
Static
Dynamic
Static
Static
cts manual no
encryption
N/A
N/A
N/A
Static
Propagation
Source-Group Tag
eXchange Protocol (SXP)
IETF Draft
http://tinyurl.com/sxp-draft
Listener
(SXP Aggregation)
Speaker
Switch
Switch
Router
Propagation
SXP Versions
Version 1, This is the initial SXP version supports IPv4 binding propagation.
Version 2, includes support for IPv6 binding propagation and version negotiation.
(Older switch and router IOS prior March 2013, WLC)
Version 3, adds support for Subnet/SGT bindings propagation and expansion.
(6K only). If speaking to a lower version listener will expand the subnet
Version 4, Loop Detection and Prevention, Capability Exchange, built-in Keep
Alive mechanism. (New switch and router IOS After March 13)
Propagation
SXP
Listener
Speaker
Non-TrustSec Domain
SGT Capable HW
SXP
Multi-Hop SXP
Speaker
SXP
Listener
SXP
Enabled SW
Speaker
SXP
SXP Enabled SW/WLC
Speaker
Listener
SGT Capable HW
Propagation
ASIC
ASIC
IP Address
SGT
10.1.100.98
50
ASIC
L2 Ethernet Frame
SRC: 10.1.100.98
Optionally Encrypted
Campus Access
Distribution
Core
DC Core
EOR
DC Access
Enterprise
Backbone
SXP
SRC: 10.1.100.98
Hypervisor SW
WLC
FW
IP Address
SGT
SRC
10.1.100.98
50
Local
Propagation
CTS Link
OTP
Finance
Guest Server
Posture
Profiler
ISE
Catalyst Switch
WLC
Nexus 5000/2000
Enterprise LAN
BYOD
Internet
SXP
DMVPN
Catalyst 6500
Catalyst Switch
Nexus 7000
Catalyst Switch
Admin
GETVPN
Ent. MPLS
HR
Multiple options for SGT transport over non CTS Layer 3 networks
DMVPN for Internet based VPNS
GETVPN for security private MPLS clouds
Over The Top (OTP) for private enterprise networks (1HCY15)
Data Center
TrustSec Functions
5
Employee
Voice
Partner
Classification
Assigning SGTs
Static Assignments
Dynamic Assignments
A
Propagation
Inline SGT
SXP
WAN Options
Enforcement
Security Group ACL
SG Firewall
SG Zone Based FW
Enforcement
Cat3750X
Cat6500
Cat6500
Nexus 7000
Nexus 5500
Nexus 2248
Enterprise
Backbone
5
SRC: 10.1.10.220
FIB Lookup
Destination MAC/Port SGT 20
Web_Dir
DST: 10.1.100.52
SGT: 20
SRC:10.1.10.220
DST: 10.1.100.52
SGT: 5
Nexus 2248
WLC5508
SRC\DST
Web_Dir
(20)
CRM (30)
Marketing
(5)
SGACLA
SGACL-B
BYOD (7)
Deny
Deny
CRM
DST: 10.1.200.100
SGT: 30
Enforcement
Source
Destination
Policy Representing
Source = Empoloye_SGT
Destination=CreditCard_Server
Policy = Deny IP
Enforcement
Enforcement
SGACL is an access
control list to filter
traffic based on
security group
No IP address in
syntax
IP version agnostic
Permit_Mail_Traffic
permit tcp dst
permit tcp dst
permit tcp dst
permit tcp dst
permit tcp dst
permit tcp dst
permit tcp dst
deny all log
eq
eq
eq
eq
eq
eq
eq
110
143
25
465
585
993
995
Enforcement
Enforcement
Propagation
Catalyst 2960-S/-C/-Plus/-X/-XR
Catalyst 2960-S/-C/-Plus/-X/-XR
SXP
Catalyst 3560-E/-C/-X
Catalyst 3750-E/-X
Catalyst 3850, 3650
WLC 5760
Catalyst 4500E (Sup6E/7E)
Catalyst 4500E (8E)
Catalyst 6500E (Sup720/2T), 6880X
Wireless LAN Controller
2500/5500/WiSM2
Nexus 7000
Nexus 6000
Nexus 5600
Nexus 5500
SXP
SXP
SGT
SXP
SGT
SXP
SGT
SXP
SGT
SXP
SGT
SXP
SGT
WLC 5760
SXP
SGT
Nexus 1000v
SXP
SGT
SXP
SGT
Nexus 5600/6000
SXP
SGT
SXP
SGT
GETVPN
DMVPN
ISRG2, CGR2000
SXP
SGT
GETVPN
DMVPN
ASR1000,
SGT
SGACL
Catalyst 3560-X
Catalyst 3750-X
Catalyst 3850, 3650
WLC 5760
Catalyst 4500E (Sup7E)
Catalyst 4500E (Sup8E)
Catalyst 6500E (Sup2T) / 6880X
Nexus 7000
SGACL
SGACL
Nexus 6000
Nexus 5600
Nexus 5500
Nexus 1000v
SGACL
SGFW
SGACL
SXP
SGACL
SXP
SXP
Enforcement
ASA5500(X), ASAv
SGFW
SGFW
Deploying TrustSec
(HOW to deploy TrustSec)
Deploying
TrustSec
Network
Segmentation
Start
TrustSec
Deep-dive
Key
Take-aways
Use-cases &
Scenarios
Internet
Term
App1
Chat
Find
Cloud App
Mgmt
DB
File
Nam
e
Dir.
Cloud App
Cloud App
App2
SSO
Cloud App
Write it down on
a spreadsheet!
IP-SGT
MAB
Web
Auth
ISE
Profiling
NX-OS/ VLAN-SGT
UCS Dir/
Hypervisors
Port-SGT
802.1X
RA-VPN
SG
T
SG
T
SG
T
SG
T
IOS/Routing
Port
Profile
SG
T
Prefix
Learning
(L3IF-SGT)
Subnet-SGT
VLAN-SGT
Branch Office-2
WAN
Datacenter
Campus Core
Internet Edge
Internet
Campus Access
Branch Office-2
WAN
Datacenter
Campus Core
Internet Edge
Internet
Campus Access
Enabling SGT/SGACL
Configure ISE 1.x to the point where you can perform 802.1X authentication (bootstrap, certificate,
AD integration, basic authentication & authorization rules)
Configure Device SGT (Policy > Policy Elements > Results > Trustsec > Security Group)
All SGTs should have access to Device_SGT by policy (ARP needs to work )
Under Policy > Trustsec > Network Device Authorization, assign Device SGT created in step (2)
to default condition
Optionally under Admin > System > Settings > Protocols > EAP-FAST > EAP-FAST Settings, change A-ID
description to something meaningful, so that you can recognize which ISE you are receiving PAC file on the switch
CLI.
Under Admin > Network Resources > Network Devices, create AAA client entry for
Cat6500 Sup2T
After the first device (called the seed device) authenticates with
the authentication server to begin the Cisco TrustSec domain,
each new device added to the domain is authenticated by its
peer devices already within the domain.
Configure RADIUS
secret. Also Advanced
Trustsec Settings,
check Use Device ID
for Trustsec, then type
device password. This
ID and Password needs
to be exactly same as
you define on network
device CLI
Update seed device (closest device to ISE) with list of multiple servers it can fall back
to in case first PDP becomes unavailable. You can set such list under Admin >
Network Resources > Trustsec AAA Servers. This data is available via CTS
Environment Data (show cts environment-data)
2
1
Select Permission
Known Limitation: Cat6K Sup2T supports multiple SGACLs in the policy. Nexus 7K only supports single
SGACL therefore best practice is to select one SGACL and add explicit deny or permit in the SGACL
itself, not in Final Catch Rule
Source View
Filter Applied
Only SGT/DGT with SGACL shown
as default in source/destination tree
view
Branch Office-2
WAN
Datacenter
Campus Core
Internet Edge
Internet
Campus Access
Monitor Mode
Egress Enforcement
Security Group ACL
PCI Server
Campus
Network
Users,
Endpoints
Monitor Mode
authentication port-control auto
authentication open
dot1x pae authenticator
Production Server
Catalyst Switches/WLC
(3K/4K/6K)
N7K
AUTH=OK
SGT= PCI User (10)
SRC \ DST
Development Server
PCI Server (111)
Dev User(8)
Deny all
Permit all
Permit all
Permit all
Unknown (0)
Deny all
Deny all
Following CLI is required to turn on NDAC (to authenticate device to ISE and
receive policies including SGACL from ISE)
Enabling AAA
Switch#config t
Enter configuration commands, one per line.
Switch(config)#aaa new-model
Use default AAA group for 802.1X and defined authz list for authorization
Switch(config)#dot1x system-auth-control
Define device credential (EAP-FAST I-ID), which must match ones in ISE AAA client configuration
Note: remember that device credential under IOS is configured in Enable mode, not in
config mode. This is different CLI command level between IOS and NX-OS, where you
need to configure device credential in config mode
Verification - PAC
Use show cts pac to verify whether PAC is provisioned or not. Key points are that A-ID matches to
one that is found in environment data with IP address. Also check to see your I-ID is the one you
setup in Device ID, and A-ID-Info matches one you configured on ISE (EAP-FAST configuration)
TS2-6K-DIST#show cts pacs
AID: 04FB30FE056125FE90A340C732ED9530
PAC-Info:
PAC-type = Cisco Trustsec
AID: 04FB30FE056125FE90A340C732ED9530
I-ID: TS2-6K-DIST
A-ID-Info: ISE PAP
Credential Lifetime: 00:54:33 UTC Dec 21 2011
PAC-Opaque:
000200B0000300010004001004FB30FE056125FE90A340C732ED95300006009400030100980BC43B8BDAB7ECC3B12C04D2D3CA6E
000000134E7A69FD00093A80AD1F972E0C67757D29DBF9E8452EDC3E0A46858429C8E4714315533061DAD4FB2F31346FE4408579
D4F55B3813ADA9876F04ACC1656DE2F476ED3CBC96A0DB937403AC3B0CAB64EEC15A1BD6E351A005A8DE6E6F894DEE619F4EFFF0
31BC7E7BD9C8B230885093FF789BAECB152E3617986D3E0B
Refresh timer is set for 12w0d
3750
cts sxp enable
cts sxp connection peer 10.1.44.1 source
10.1.11.44 password default mode local
! SXP Peering to Cat6K
6K
cts sxp enable
cts sxp default password cisco123
!
cts sxp connection peer 10.1.11.44 source
10.1.44.1 password default mode local listener
hold-time 0 0
! ^^ Peering to Cat3K
cts sxp connection peer 10.1.44.44 source
10.1.44.1 password default mode local listener
hold-time 0 0
! ^^ SXP Peering to WLC
IP Address
Security Group
Source
======================================================================
10.10.11.1
2:device_sgt
INTERNAL
10.10.11.100
3:Full_Access
LOCAL
C6K2T-CORE-1#show cts sxp connections brief
SXP
: Enabled
Highest Version Supported: 4
Default Password : Set
Default Source IP: Not Set
Connection retry open period: 120 secs
Reconcile period: 120 secs
Retry open timer is not running
----------------------------------------------------------------------------Peer_IP
Source_IP
Conn Status
Duration
----------------------------------------------------------------------------10.1.11.44
10.1.44.1
On
11:28:14:59 (dd:hr:mm:sec)
10.1.44.44
10.1.44.1
On
22:56:04:33 (dd:hr:mm:sec)
Total num of SXP Connections = 2
C6K2T-CORE-1#show cts role-based sgt-map all details
Active IP-SGT Bindings Information
IP Address
Security Group
Source
======================================================================
10.1.40.10
5:PCI_Servers
CLI
10.1.44.1
2:Device_sgt
INTERNAL
--- snip --10.0.200.203
4:GUEST
SXP
10.10.11.100
3:Full_Access
SXP
After setting up SGT/SGACL on ISE, you can now enable SGACL Enforcement
on IOS switch
Defining IP to SGT mapping for servers
Switch(config)#cts role-based sgt-map 10.1.40.10 sgt 5
Switch(config)#cts role-based sgt-map 10.1.40.20 sgt 6
Switch(config)#cts role-based sgt-map 10.1.40.30 sgt 7
Enabling SGACL Enforcement Globally and for VLAN
Switch(config)#cts role-based enforcement
Switch(config)#cts role-based enforcement vlan-list 40
group 5:
group 5:
group 6:
group 6:
group 7:
group 7:
counters
HW-Denied
0
53471
0
0
3773
0
0
SW-Permitted
48002
0
0
0
0
0
0
HW_Permitted
369314
0
3777
53350
0
From *
0
0
Server_A
(111 / 006F )
Server_B
(222 / 00DE )
User_Group_A
(10 / 000A )
Permit_All
SGACL_C
SGACL_A
User_Group_B
(11 / 000B )
Deny_All
SGACL_B
Server_A
(111 / 006F )
Server_B
(222 / 00DE )
User_Group_A
(10 / 000A )
Permit_All
SGACL_C
SGACL_A
User_Group_B
(11 / 000B )
Deny_All
SGACL_B
Policy Update
Campus
Network
WAN
CoA
ISE
Branch Office-2
WAN
Datacenter
Campus Core
Internet Edge
Internet
Campus Access
TrustSec on Wireless
Platform
SGT Classification
& Mapping
SXP Support
(role / version)
Inline SGT
Tagging
SGT
Enforcement
Minimum Version
(License)
802.1X
MAB
WEB AUTH
Speaker *
(version 2)
No
No
802.1X
MAB
WEB AUTH
Speaker *
(version 2)
No
No
No
No
No
No
No
802.1X
MAB
WEB AUTH
IP-to-SGT
VLAN-to-SGT
Port-to-SGT
Subnet-to-SGT
Speaker,
Listener
(version 4)
SGT over
Ethernet
SGACL
03.06.00E
(IP Base K9)
Switch / FW
Inline SGT
5760
Cisco ISE
Assign
OR
Sources
SGT
Destinations
State
Authc Success
Switch / FW
SXP (IP-SGT)
5508
Cisco ISE
Assign
Destinations
Sources
SGT
No SG based enforcement locally on the controller. IPSGT sent over SXP to enforcers / Aggregators
* Not supported on 7500 & vWLC
Switch / FW
SXP (IP-SGT)
5508
Cisco ISE
Assign
Destinations
Sources
SGT
No SG based enforcement locally on the controller. IPSGT sent over SXP to enforcers / Aggregators
* Not supported on 7500 & vWLC
Branch Office-2
WAN
Datacenter
Campus Core
Internet Edge
Internet
Campus Access
SGT Classification
& Mapping
SXP Support
(role / version)
Inline SGT
Tagging
SGT
Enforcement
Minimum Version
(License)
IP-to-SGT
VLAN-to-SGT
Port-to-SGT
PortProfile-to-SGT
(Known limitation:
vPC/Fabric Path
are not supported
with some TrustSec
Features)
Speaker
Listener
(version 1)
SGT over
Ethernet,
SGT over
MACsec
(MACsec
supported on
all line cards
except F1,
F2, and F3
40/100G line
cards)
SGACL
Port-to-SGT
Speaker
(version 1)
SGT over
Ethernet
SGACL
Cisco NX-OS
7.0(1)N1(1)
IP-to-SGT
Port-to-SGT
Speaker
(version 1)
SGT over
Ethernet
SGACL
Cisco NX-OS
6.0(2)N2(5)
Port-Profile to SGT
Speaker
(version 1)
SGT over
Ethernet
SGACL
Cisco NX-OS
5.2(1)SV3(1.1)
Core Network
Data Center
Nexus 7000s
VMs/Baremetal
Nexus 55XXs
Nexus 6XXXs
Security Server
(444)
SGACL: PCILOB1-ACL
PCI DB (111)
LOB1 DB (222)
LOB2 DB (333)
ISE
SRC \ DST
PCI DB(111)
LOB1 DB (222)
LOB2 DB
(333)
Security Server
(444)
PCI DB (111)
Permit all
PCI-LOB1-ACL
PCI-LOB2-ACL
Deny All
LOB1 DB
(222)
PCI-LOB1ACL
Permit All
Deny All
Deny All
LOB2 DB
(333)
PCI-LOB2ACL
Deny All
Permit All
Deny All
Security
Server (444)
Deny All
Deny All
Deny All
Deny All
feature cts
feature dot1x
cts device-id N7K-DST1 password trustsec
radius-server 10.39.1.120 key trustsec pac
aaa group server ISE
server 10.39.1.120
aaa authentication dot1x default group ISE
aaa authorization cts default group ISE
aaa accounting dot1x default group ISE
feature cts
feature dot1x
cts device-id N55KA password trustsec
radius-server 10.39.1.120 key trustsec pac
aaa group server ISE
server 10.39.1.120
use-vrf management
aaa authentication dot1x default group ISE
aaa authorization cts default group ISE
aaa accounting dot1x default group ISE
Port-Profile: NOTE: Port-Profile on N7K will only work on NON-FEX ports. 5K/6K dont have support yet. N1KV supported
N7K-DST1(config)#
N7K-DST1(config)#
N7K-DST1(config)#
N7K-DST1(config)#
N7K-DST1(config)#
N7K-DST1(config)#
VLAN to SGT
N7K-DST1(config)# (config)# vlan 100
N7K-DST1(config-vlan)# cts role-based sgt 17
Verify Configuration
Verify environmental data
sgt:unknown dgt:19
[41677]
rbacl:Deny IP
deny ip [41677]
sgt:unknown dgt:24
[13269]
rbacl:Deny IP
deny ip [13269]
sgt:4 dgt:3
[0]
rbacl:Deny IP
deny ip [0]
sgt:6 dgt:12
[0]
rbacl:Deny IP
deny ip [0]
sgt:7 dgt:3
[53769]
rbacl:Deny IP
deny ip [53769]
Nexus 5K/6K
PCI_DB
(10.30.1.10)
LOB1_DB
(10.40.1.10)
feature cts
cts role-based
cts role-based
cts role-based
cts role-based
counters enable
sgt-map 10.30.1.10 111
sgt-map 10.40.1.10 222
enforcement
Nexus 7K
SGT Caching
SRC:10.65.1.9
DST: 10.1.100.52
SGT: 8
Service Chaining
Possible 3rd party devices for Server
Load Balancing (SLB), Intrusion
Prevention Services (IPS), etc.
DC Access Layer
IP Address
SGT
10.65.1.9
8 (Employee_Full)
Untagged Traffic
Physical Servers
Physical Servers
SGACL enabled Device
SG Firewall enabled Device
SXP
VRF/VLAN
vrf:1
vrf:1
vrf:1
vrf:1
vrf:1
SGT CONFIGURATION
Cached
Cached
Cached
Cached
Cached
Without enforcement its just converting from data plane to control plane
at a mid point in the network
Typically Deployed at an aggregation layer where there is no
enforcement
With enforcement is for when the N7K is the enforcement point and
needs to convert from data plane to control plane.
N7K will ask ISE for relevant policies of all its SGTs when it
receives an IP/SGT update
Detailed debugs:
TrustSec on Edge
Branch Office-1
Branch Office-2
WAN
Datacenter
Campus Core
Internet Edge
Internet
Campus Access
TrustSec on Edge
(1)
Platform
SGT Classification
& Mapping
SXP Support
(role /
version)
SGT
Enforcement
Minimum Version
(License)
Cisco 890
IP-to-SGT
Subnet-to-SGT
L3IF-to-SGT
Speaker
Listener
(version 4)
SGFW
IP-to-SGT
Subnet-to-SGT
L3IF-to-SGT
Speaker
Listener
(version 4)
SGFW
IP-to-SGT
Subnet-to-SGT
L3IF-to-SGT
Speaker
Listener
(version 4)
SGFW
802.1X
MAB
WEB AUTH
IP-to-SGT
VLAN-to-SGT
Speaker
Listener
(version 4)
SGACL
IP-to-SGT
Subnet-to-SGT
L3IF-to-SGT
Speaker
Listener
(version 4)
SGFW
TrustSec on Edge
(2)
Platform
SXP Support
(role/version)
Inline SGT
Tagging
SGT
Enforcement
Minimum Version
(License)
IP-to-SGT
Subnet-to-SGT
L3IF-to-SGT
Speaker
Listener
(version 4)
SGT over
Ethernet, SGT
over GETVPN,
IPsec VPN,
DMVPN
SGFW
IOS XE 3.13.0S
(ASR1000 SECFW)
IP-to-SGT
Subnet-to-SGT
L3IF-to-SGT
Speaker
Listener
(version 4)
SGT over
Ethernet, SGT
over GETVPN,
IPsec VPN,
DMVPN
SGFW
IOS XE 3.13. 0S
(ASR1000 SECFW)
Speaker
Listener
(version 2)
SGFW
ASA 9.0.1,
ASDM 7.1.6
Cisco ASAv
Speaker
Listener
(version 2)
SGT over
Ethernet
SGFW
Speaker
Listener
(version 2)
SGT over
Ethernet
SGFW
ASA 9.3.1,
ASDM 7.1.6
ISRG2
SGT over
GET-VPN,
DM-VPN or
IPsec VPN
HQ
ISRG2
e.g. 2951/3945
ASR1000
Router
Inline SGT
Branch A
Can also use SGT-aware Zone-based Firewall in branch & DC WAN edge for reasons like PCI
compliance
SGT is used only as a source criteria only in ISR G2 Zone-Based Firewall
Data Center
N7K
IP Address
SGT
10.1.10.1
Contractor - 10
10.1.10.4
Employee - 30
10.1.254.1
Contractor - 10
10.1.254.4
Employee - 30
Cat6K
ASR1K
ASR1K
Listener-1
Allows ASR1000 to be an
IP/SGT relay from remote
to remote
SXP is a full replication
model each remote
router will learn all IP/SGT
bindings
Cat6K
Listener-2
SXPv4
WAN
SXPv4
Speaker-1
IP Address
SGT
10.1.10.1
Contractor - 10
10.1.10.4
Employee - 30
10.1.254.1
Contractor - 10
10.1.254.4
Employee - 30
Speaker-300
...
IP Address
SGT
10.1.10.1
10.1.254.1
Contractor - 10
10.1.10.4
10.1.254.4
Employee - 30
10.1.254.1
Contractor - 10
10.1.254.4
Employee - 30
If the Key Server is configured for tagging, Group Members must be registering
using GETVPN software version 1.0.5 or higher to be accepted.
Router# show crypto gdoi feature cts-sgt
Group Name: GETVPN
Key Server ID
Version
Feature Supported
10.0.5.2
1.0.5
Yes
10.0.6.2
1.0.5
Yes
Group Member ID
Version
Feature Supported
10.0.1.2
1.0.2
No
10.0.2.5
1.0.3
No
10.0.3.1
1.0.5
Yes
10.0.3.2
1.0.5
Yes
req-failed 0
Branch Office-2
WAN
Datacenter
Campus Core
Internet Edge
Internet
Campus Access
Interface vlan 10
ip flow monitor cts-mon input
ip flow monitor cts-mon output
Interface vlan 20
ip flow monitor cts-mon input
ip flow monitor cts-mon output
Interface vlan 30
ip flow monitor cts-mon input
ip flow monitor cts-mon output
Interface vlan 40
ip flow monitor cts-mon input
ip flow monitor cts-mon output
Normal
4096
1438
1632
33831
32393
0
32393
0
0
0
192.168.30.209
192.168.200.156
60952
80
Output
30
200
6
56
1
192.168.20.140
192.168.200.104
8233
80
Output
20
200
6
56
1
http://www.plixer.com/blog/netflow/cisco-trustsec-netflow-support/
When
What
Where
Security
Group
How
Who
Security
Group
Network
Segmentation
Start
TrustSec
Deep-dive
Key
Take-aways
Use-cases &
Scenarios
Data Center
Segmentation
Zoning & Micro-segmentation
Production vs Development
Server segmentation
Compliance requirements, PCI,
HIPAA
Firewall rule automation
Branch Office-2
WAN
Datacenter
Campus Core
Internet Edge
Branch to DC Segmentation
Business 1
Business 2
Guest
B1
User can authenticate to
network, but cant be
authorized due to unavailability of the VLAN locally
Business 79
Business 80
Guest
Site VLAN
Guest VLAN
B1
User authenticates successfully,
gets local IP address & BU-SGT
assigned, has consistent
access from remote site.
Site VLAN
Guest VLAN
IPv6
Source-Group Tag
eXchange Protocol (SXP)
IETF Draft
http://tinyurl.com/sxp-draft
IPv4
15.2(2)E/
3.6.0E
Listener
(SXP Aggregation)
Speaker
Switch
Switch
IPv6
Switch
Router
Before Authentication
Cisco ISE
Infra Server
(DHCP, DNS, AD)
SGT=3
Access Switch
15.2(2)E
Speaker
172.20.252.102
2001:DB8:254::10
C6500
SXP
Listener
Campus LAN
172.20.252.100
Student1
2001:DB8:100:0:7CB0:3B1D:2F77:16A6
2001:DB8:100:0:9112:EB74:784F:E88B
To Infra Server
To Lab Server
Lab Server
2001:DB8:254::12
After Authentication
Cisco ISE
Infra Server
(DHCP, DNS, AD)
SGT=3
Access Switch
15.2(2)E
Speaker
172.20.252.102
2001:DB8:254::10
C6500
SXP
Listener
Campus LAN
172.20.252.100
Student1
2001:DB8:100:0:7CB0:3B1D:2F77:16A6
2001:DB8:100:0:9112:EB74:784F:E88B
To Infra Server
To Lab Server
Lab Server
2001:DB8:254::12
Branch Office
Campus D
10.4.150.0/24 = SGT 7
10.5.1.0/24 = SGT 22
Campus C
10.39.22.0/24 = SGT 6
Corporate
Network
Internet
16.34.22.0/24 = SGT 10
Cat6500VSS
System
Sup2T
WiSM2
WiSM2
Sup2T
WiSM2
WiSM2
SXP
ISE
VSS
CAPWAP Tunnel
Access Points
Non-Compliant
Mobile Device
SGT 2: Limited Access
Compliant
Corporate Asset
SGT 3: Full Access
SGT=4
SGT=5
SGT=3
Enterprise
Backbone
SGACL
Enforcement
Web_Server
(SGT=7)
SGACL
Enforcement
Time_Stamp_Server
(SGT=10)
Key Takeaways
(WHEN to-do TrustSec? NOW!)
Deploying
TrustSec
Network
Segmentation
Start
TrustSec
Deep-dive
Key
Take-aways
Use-cases &
Scenarios
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
102
102
102
102
102
102
102
102
102
Cisco TrustSec
Segmentation
Policy
Switch
Router
DC FW
DC Switch
Gartner on TrustSec
logical source and destination security groups are
more flexible, are easier to maintain and reduce
runtime overhead in the networks switching fabric.
There is much to like about Ciscos ambitious and
innovative initiative.
Cisco has made great strides in integrating support for
the TrustSec framework across its product lines
Flexibility to Segregate Resources Without Physical
Segmentation or Managing VLANs
Reduction in ACL Maintenance, Complexity and
Overhead
http://blogs.cisco.com/security/gartners-perspective-on-ciscotrustsec
http://www.cisco.com/c/dam/en/us/solutions/collateral/borderless-networks/trustsec/trustsec_pci_validation.pdf
Legend:
DATA CENTRE
Server
Data Center
Network
Segmentation enforcement
PCI scope
WAN
BRANCH
Register
Workstation
TrustSec is :
Flexible
Efficient
Ubiquitous
Ready
Make a choice!
caranddriver.com
bcarwallpapers.com
Promote your favorite speaker through Twitter and you could win $200 of Cisco
Press products (@CiscoPress)
You can submit an entry for more than one of your favorite speakers
Table Topics
Related sessions
Thank you
Description
Focuses on the design, implementation, and monitoring of a comprehensive
security policy, using Cisco IOS security features
Cisco Certification
CCNA Security
Configure Cisco perimeter edge security solutions utilizing Cisco Switches, Cisco
Routers, and Cisco Adaptive Security Appliance (ASA) Firewalls
Deploy Ciscos Next Generation Firewall (NGFW) as well as Web Security, Email
Security and Cloud Web Security
Deploy Ciscos Identity Services Engine and 802.1X secure network access
Protect data traversing a public or shared infrastructure such as the Internet by
implementing and maintaining Cisco VPN solutions
Designed for professional security analysts, the course covers essential areas of
competency including event monitoring, security event/alarm/traffic analysis, and
incident response
For official product training on Ciscos latest security products, including Adaptive
Security Appliances, NGIPS, Advanced Malware Protection, Identity Services
Engine, Email and Web Security Appliances see
www.cisco.com/go/securitytraining
Description
Cisco Certification
Configure, implement and troubleshoot local and wide-area IPv4 and IPv6
networks. Also available in self study eLearning format with Cisco Learning
Lab.
Description
CCNP Wireless
CCNA Wireless
Cisco Certification
Description
Cisco Certification
Prepare for your CCIE Data Center practical exam with hands on lab
exercises running on a dedicated comprehensive topology
Obtain the skills to deploy complex virtualized Data Center Fabric and
Computing environments with Nexus and Cisco UCS.
Learn basic data center technologies and how to build a data center
infrastructure.
Get a deep understanding of the Cisco data center product line including
the Cisco Nexus9K in ACI and NexusOS modes