BRKCRS-2662 (2013)
BRKCRS-2662 (2013)
BRKCRS-2662 (2013)
BRKCRS-2662
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
Abstract
This session provides an overview of the Cisco TrustSec Security Group Access
(SGA) solution for Role-Based Access Control with focus on Campus Network.
SGA allows for simplified network segmentation based on User Identity/Role and
allows for secure access and consistent security policies across Wired/Wireless
networks. SGA helps define BYOD policies through security policies based on
User/Role/Device/Location.
The session covers SGA on the Catalyst Switching platforms, including
converged wired/wireless. The session covers an architectural overview of SGA
and benefits of a converged wired/wireless network, elements of Cisco TrustSec
such as user identification with 802.1x, device identification, role classification
using Security Group Tagging (SGT) and enforcement using Security Group
Access Control List (SGACL). We also discuss various SGA deployment use
cases in a campus network. This session is for Network Architects, Pre-Sales
Engineers and Technical Decision Makers.
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Why Should You Care About TrustSec
Got
TrustSec?
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Agenda
TrustSec Overview
Campus Deployment Use Cases
Migration Path
Wireless Integration
How to Deploy
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Session Objectives
Not Covered
Directory
Service
Access
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Segmentation
The Challenge of Traditional Security Enforcement
permit tcp 1.1.1.1 100.1.1.1 eq https permit tcp 1.1.1.1 100.1.1.1 eq https
permit tcp 1.1.1.1 100.1.1.1 eq 8081 permit tcp 1.1.1.1 100.1.1.1 eq 8081
permit tcp 1.1.1.1 100.1.1.1 eq 445 permit tcp 1.1.1.1 100.1.1.1 eq 445
deny ip 1.1.1.1 100.1.1.2 deny ip 1.1.1.1 100.1.1.2
permit tcp 1.1.1.1 100.1.1.2
deny ip 1.1.1.1 100.1.1.2
eq https permit tcp 1.1.1.1 100.1.1.2
deny ip 1.1.1.1 100.1.1.2
eq https
Access Control with
permit tcp 1.1.1.1 150.1.1.2 eq https permit tcp 1.1.1.1 150.1.1.2 eq https
deny ip 1.1.1.1 150.1.1.2
permit tcp 1.1.1.1 200.1.1.1 eq https
deny ip 1.1.1.1 150.1.1.2
permit tcp 1.1.1.1 200.1.1.1 eq https Core permit tcp any 100.1.1.1 eq https
deny ip all
IP Access Control Lists
deny ip 1.1.1.1 200.1.1.1 deny ip 1.1.1.1 200.1.1.1
Access
Directory
Service
WLC
Identity
VLANIT10 Finance
VLAN 20 Doctor
VLAN 30 Service
3.1.1.1 2.1.1.1 1.1.1.1 Engine
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Comprehensive End-to-End Security
Cisco TrustSec
What When
Who How
IDENTITY
MACsec Encryption
Role-Based Access Control with Security Topology Independent Segmentation with
Group Tagging (SGT) Secure Group Access (SGA)
Network Device Admission Control
(NDAC)
Identify, Profile Devices
with Device Sensor
802.1X Authentication
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Context-Aware Control
User Authentication: 802.1X
Authentication Features
Monitor Mode
• Unobstructed access
• No impact on productivity
• Gain visibility
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Context-Aware Control
Device Sensor
Identity
Service
Engine
Device-Aware Identity- Aware
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Where
Segmentation Who
What When
How
Access
Directory
Service
WLC
IT Finance Doctor Identity
3.1.1.1 2.1.1.1 1.1.1.1 Service
Engine
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Protect Network Infrastructure
Network Device Admission Control (NDAC)
Cisco
Switch4 TrustSec Domain Switch1 Identity
Service
Engine
Switch5
Platform Release
Cat3Kx 15.0(2)SE
Cat4K 3.3.0SG
Cat6K 15.0(1)SY
VLAN BRKCRS-2662
110 VLAN 120 VLAN 130 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Protect Network Infrastructure
MAC Security (MACSec)
Cisco
TrustSec Domain Identity
Service
Engine
SGT
SGT
Platform Release
Cat3Kx 15.0(2)SE
VLAN 110 VLAN 120 VLAN 130
Cat4K 3.3.0SG
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public Cat6K 15.0(1)SY 15
Protect Network Infrastructure
MAC Security (MACSec)
Cisco
TrustSec Domain Identity
Service
Engine
MACSec Enabled
&^*RTW#(*J^*&*sd#J$%UJ&(&^*RTW#(*J^*&*sd#J$
Platform Release
Cat3Kx 15.0(2)SE
VLAN 110 VLAN 120 VLAN 130
Cat4K 3.3.0SG
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public Cat6K 15.0(1)SY 16
How Cisco TrustSec Works
Segmentation
Security Group Tagging (SGT) and SGACL
Dynamic Assignment or Map VLANs or SGACL Enforcement
IP Subnets to SGT Values SGT SGT SGT SGT SGT
cts role-based sgt-map VLAN-list 10 sgt 10 cts role-based permissions from 10 to 111
permit tcp dst eq 443
cts role-based sgt-map 192.168.10.0/24 sgt 10 permit tcp dst eq 80
deny ip
Cisco
TrustSec Domain
Identity
Service
Engine
IP Phone NA Voice
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Role Identification (SGT Assignment)
Campus/Mobile Endpoints
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
How SGT Assignment Works
SGACL Download
cts role-based permissions from 6 to 20
permit tcp dst eq 443
deny ip
IP-to-SGT Assignment
Dynamic SGT Assignment Cisco cts role-based sgt-map 192.168.1.1 sgt 20
10.1.1.102 = SGT 6
TrustSec Domain Identity
Service
Engine
ACCESS-ACCEPT
RADIUS
SGT=6
192.168.1.1
10.1.1.102
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
How SGACL Enforcement Works
SGACL Download
cts role-based permissions from 6 to 20
permit tcp dst eq 443
deny ip
IP-to-SGT Assignment
Dynamic SGT Assignment Cisco cts role-based sgt-map 192.168.1.1 sgt 20
10.1.1.102 = SGT 6
TrustSec Domain Identity
Service
Engine
192.168.1.1
10.1.1.102
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
RADIUS Access-Request Frame Format
User Authentication Request
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
RADIUS Access-Accept Frame Format
User Authentication With Downloadable ACL
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
RADIUS Access-Accept Frame Format
User Authentication With SGT Assignment
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
RADIUS Access-Request Frame Format
Device Authentication Request
Switch sends
request to
authenticate itself
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
RADIUS Access-Request Frame Format
Device Authentication & SGACL requests
Subsequent
requests include
SGTs found in the
switch
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
RADIUS Access-Accept Frame Format
Device Authentication
Switch
authenticated
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
RADIUS Access-Accept Frame Format
Device Authentication, SGACL & SGACL Matrix Download
SGACLs matching
destination
downloaded
SGACLs
downloaded
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Cisco TrustSec Supported L2 Ethernet
Frame Types
MAC Payload
Ethernet Preamble
MAC DA MAC SA
46 – 1500 bytes
CRC
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
SGA Deployment Use Cases
SGA Deployment Use Cases
User A User B
Access
Campus Reference Design
Cat4500
Cat3750-X
Access, Distribution & Core
Data Centre
Dist
Cat6500 Cat6500
Core
Deployment Modes Cat6500 Cat6500
Data Center
Statically configured SGT
N5K
Assignment
Directory
Service
Migration Scenarios
File Server WEB Server SQL Server
ISE 1.1
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Campus LAN Deployment User A User B
Campus Access
Use Case
N5K
Directory
Service
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Campus LAN Deployment User A
VLAN 10
User B
VLAN 20
How is it done today without SGA Campus Access
Assigned/Downloaded VLAN,
Use Case ACL via 802.1X, MAB
Access Layer
User VLAN statically defined or assigned Enforced Cat6500 Cat6500
during 802.1X or MAB Authentication
ACL statically defined or downloaded
Cat6500 Cat6500
during Authentication Data Center
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Campus LAN Deployment User A User B
Cat3Kx 15.0(2)SE
Cat4K Indus*
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public Cat6K 15.0(1)SY 35
Access Layer Enforcement User A User B Guest
Campus Access 10 20 30
Cat3750-X
Segmentation between users/resources in campus Cat3750-X
mapping
Cat6500 Cat6500
Data Center
SGACL enforcement at egress access switch
Nexus 7010
Cat4K Indus*
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public Cat6K 15.0(1)SY 36
Campus Migration Path
Challenges Migrating to a TrustSec
Network
End device authentication
‒ Different authentication mechanisms for device types
‒ Multiple devices per per port
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
SGA with Monitor Mode ISE
Zero Enforcement Egress Enforcement
Security Group ACL
HR Server
SGT SGT
Campus ACME Server
Network
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
SGA with Monitor Mode ISE
SGACL Enforcement Egress Enforcement
Security Group ACL
HR Server
SGT SGT
Campus ACME Server
Network
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
VLAN-to-SGT Mapping 10 20 30 Campus Access
Partners Guest
SGT Assignment via VLAN-to-SGT Employees
mapping VLAN 20 VLAN 30
VLAN 10
Use Case
Cat3Kx 15.0(2)SE
Cat4K Indus*
BRKCRS-2662 © 2013 Cisco and/or its affiliates.
Cat6KAll rights reserved.
15.0(1)SY Cisco Public 41
VLAN-to-SGT Mapping Company A
10 20
Company Mergers Campus Access Campus Access
VLAN 30 VLAN 40
30
Cat3750-X Cat3750-X
Cat3750-X
Access Layer
Tagging
Cat6500 Cat6500
Company B Cat6500 Cat6500
TrustSec
Data Centre Cat6500
Cat6500 Domain Cat6500 Cat6500
Data Centre
SRC(SGT)
SRC(SGT) / FileFile
Server
Server Public
Public Portal File Server
/ Guest (30)
Guest (20)(211)
DST(DGT) (111)
(111) Portal (222)
(222)
DST(DGT)
N5K
Emp(10) Permit all Permit Web Deny all SGACL_E Directory
Emp (10) Permit all Permit Web Deny all Service
Guest(20) Deny all Permit Web SGACL-B Permit Web
Guest (20) Deny all Permit Web SGACL-B 211
Emp_B(30) Deny all Deny all Deny all Permit all
File Server Public Portal File Server Public Portal SQL Server ISE 1.1
Platform Release
111 222 SGACL Enforcement
Cat3Kx 15.0(2)SE
Cat4K Indus*
BRKCRS-2662 © 2013 Cisco and/or its affiliates.
Cat6K All rights reserved.
15.0(1)SY Cisco Public 42
Campus Access
Subnet-to-SGT Mapping
SGT Assignment via Subnet-to-SGT Employees Partners Guest
mapping
1.1.1.0 2.1.1.0 3.1.1.0
Use Case
Cat3750
Migration path – Subnet-to-SGT mapping Cat4500
SGACL enforcement at Dist switch & data centre egress Nexus 7010
switch
SRC(SGT)
File Server Public Partners
/ Guest (30)
(111) Portal (222) (20)
DST(DGT) N5K
Directory
Emp (10) Permit all Permit Web SGACL-A Deny all Service
Prtnr (20) Permit Web Permit Web Deny all Deny all
File Server Public Portal SQL Server ISE 1.1
Guest (30) Deny all Permit Web Deny all SGACL-B
111 222 SGACL Enforcement
Platform Release
Cat4K Indus*
Cat6K 15.0(1)SY
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
10 20
IP-to-SGT Mapping
Campus Access
31
SGT Assignment via IP-to-SGT
mapping Employees Partners
10.1.1.1
VLAN 10 VLAN 20
Use Case
10.1.1.2
Cat3750-X
IP-to-SGT mapping
Cat3750-X
32
Source SGT assigned via IP-to-SGT mapping
IP Device Tracking must be enabled 10.1.1.1 = 31
TrustSec
Cat6500 Cat6500
Cat4K Indus*
Cat3750-X
Port-to-SGT mapping
File
SRC(SGT) / File Server File Server Public
Server
DST(DGT) (112) (113) Portal (222)
(111)
Prtnr1 (10) Permit all Deny all Deny all Permit Web N5K
Directory
Service
Prtnr2 (20) Deny all Permit all Deny all Permit Web
Prtnr3 (30) Deny all Deny all Permit all Permit Web
File Servers Public Portal SQL Server ISE 1.1
Cat4K Indus*
IT Portal (SGT 4)
Users, 10.1.100.10
SXP
Endpoints
Listener
If the switch supports SXP, switch can send IP-to-SGT binding table to
SGT capable device (e.g. Catalyst 6500 with Sup2T)
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
SGTagging based on SXP
Doctor (SGT 7)
IP-to-SGT Binding Table
IP Address SGT Source
Active
802.1X Catalyst® 2960S N7K ISE 1.1 Directory
Cat6500 Sup2T
MAB Distribution/Core
Agent-less Device Untagged Frame Tagged Frame
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
What if my Dist/Core Switch isn’t Capable of
SGTagging
Locally Learned
Doctor (SGT 7)
IP Address SGT Source
10.1.10.102 5 LOCAL
IT Portal (SGT 4)
Users, 10.1.100.10
SXP
Endpoints
LWA VLAN100
Campus Network
Active
802.1X Catalyst® 2960S ISE 1.1 Directory
Cat6500 Sup720 N7K
MAB Distribution/Core
Speaker
Agent-less Device Listener
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
What if I Received Multiple SGT Assignments
SGT Assignment Priorities
The current priority enforcement order, from highest to lowest:
INTERNAL—Bindings between locally configured IP addresses and the device own SGT
LOCAL—Bindings of authenticated hosts which are learned via IPM and device tracking. This type of binding also
include individual hosts that are learned via ARP snooping on L2 [I]PM configured ports.
IP_ARP—Bindings learned when tagged ARP packets are received on a CTS capable link.
SXP—Bindings learned from SXP peers.
New
Layer 3 Interface—(L3IF) Bindings added due to FIB forwarding entries that have paths through one or more
interfaces with consistent L3IF-SGT mapping or Identity Port Mapping on routed ports.
CLI— Address bindings configured using the IP-SGT form of the cts role-based sgt-map global
configuration command. (Hosts and subnets)
VLAN—Bindings learned from snooped ARP packets on a VLAN that has VLAN-SGT mapping configured.
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
SGT Transport over non-TrustSec Domain
Cisco
Use Case TrustSec Domain
Payload
SGT is carried in the ESP Payload Domain
IP Network or
ESP SGT
No Payload Encryption WAN
IP Header
Original Packet
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
TrustSec: Best Practices
SGA and Monitor Mode
Campus
Network
Users, Catalyst® Switches Nexus® 7000
Endpoints (3K/4K/6K)
Monitor Mode
ISE 1.1
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
MACSec and SGA
SGT SGT SGT SGT SGT
Cisco
TrustSec Domain Identity
Service
Engine
MACSec Enabled
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
SGA and RADIUS COA
Why Radius COA
SGT SGT SGT SGT SGT
SGACL Enforcement
cts role-based
cts role-based permissions
permissions from
from 10
10 to
to 222
222
permit tcp
permit tcp dst
dst eq 443
deny iptcp dst eq 80
permit
deny ip
Cisco
TrustSec Domain Identity
Service
Engine
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
SGA and RADIUS COA
With Radius COA
SGT SGT SGT SGT SGT
SGACL Enforcement
10 to
cts role-based permissions from 10 to 222
222
permit tcp dst eq 443
deny iptcp dst eq 80
permit
deny ip
Cisco
TrustSec Domain Identity
Service
Engine
Configuration Commands:
aaa new-model
radius server ise
address ipv4 <ip address> auth-port 1812 acct-port 1813
pac key <password>
aaa authentication dot1x default group radius Seed device includes
aaa authorization network cts group radius RADIUS info
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
How To Deploy NDAC
NDAC – Non-Seed Device Switch Configurations
Configuration Commands:
aaa new-model
aaa authentication dot1x default group radius
aaa authorization network default group radius
aaa session-id common
dot1x system-auth-control
!
Interface t5/1 Non-Seed device need not include RADIUS info
switchport mode trunk Dynamically learns RADIUS info from Seed Device
cts dot1x
!
<exec mode> cts credentials id <userid> password <password>
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Configuring Network Device Admission Control (NDAC) on ISE
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
SGT Assignment for Roles
Doctor (SGT 7)
Static
SGT Assignment
IT Admin (SGT 6) For
SGT=7 SGT Enforcement
Servers
IT Portal (SGT 4)
Users,
Endpoints SXP 10.1.100.10
LWA VLAN100
Campus Network
Active
802.1X, MAB, LWA Catalyst® 3750-X Catalyst 6K Nexus® 7000 Catalyst® 4948 ISE 1.1 Directory
Core Distribution
MAB
Agent-less Device
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
VLAN to SGT Mapping
VLAN to SGT mapping uses IP
Device Tracking mechanism to ip device tracking
!
cts role-based sgt-map vlan-list 10 sgt 10
dynamically create IP to SGT cts role-based sgt-map vlan-list 20 sgt 20
cts role-based sgt-map vlan-list 30 sgt 30
bindings per VLAN cts role-based sgt-map
cts role-based sgt-map
vlan-list
vlan-list
40 sgt 40
200 sgt 200
VLAN 10
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
IP Subnet to SGT Mapping
Layer 3 interface mapping to SGT (L3IF) is supported on the
following L3 logical or physical interfaces:
SGT-MAP CLI Example
Routed port cts role-based sgt-map 192.168.10.0/24 sgt 10
cts role-based sgt-map 192.168.20.0/24 sgt 20
SVI (VLAN interface) cts role-based sgt-map 192.168.30.0/24 sgt 30
cts role-based sgt-map 192.168.40.0/24 sgt 40
cts role-based sgt-map 192.168.200.0/24 sgt 200
L3 subinterface of L2 port
Tunnel interface
• Dynamically adds Destination Group Tag (DGT) to the FIB entries matching the SGT-MAP
configured prefixes
SJC01#show platform hardware cef 192.168.10.10 detail
Codes: M - mask entry, V - value entry, A - adjacency index, NR- no_route bit
LS - load sharing count, RI - router_ip bit, DF: default bit
CP - copy_to_cpu bit, AS: dest_AS_number, DGTv - dgt_valid bit
DGT: dgt/others value
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Sup2T SGT L3 Transport
Configure L3 Transport on the interface
Router(config)# interface TenGigabitEthernet 6/1
Router(config-if)# cts layer3 ipv4 trustsec forwarding
Configure policy with explicit list of addresses in
CTS domain to determine which packets need
L3 CTS processing
Packets sent with “transport mode” ESP to carry Policy for allowed traffic
SGT without encryption or data authentication ip access-list extended l3-cts-policy
permit ip any 171.71.0.0/16
Simple H/W operations: encap/decap of ESP permit ip any 171.72.0.0/16
with NULL transform permit ip any 171.73.0.0/16
!
cts policy layer3 ipv4 traffic l3-cts-policy
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Monitoring SGT Mapping
SJC01#show cts role-based sgt-map all
Active IP-SGT Bindings Information
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Monitoring SGACL Packet Drops with CLI
SJC01#show cts role-based permissions
IPv4 Role-based permissions from group 10 to group 200 (configured):
rbac1
IPv4 Role-based permissions from group 20 to group 200 (configured):
rbac1
IPv4 Role-based permissions from group 30 to group 200 (configured):
rbac1
IPv4 Role-based permissions from group 40 to group 200 (configured):
rbac1
SJC01#
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Monitoring SGACL Packet Drops with
Flexible Netflow
flow record cts-v4 Interface vlan 10
match ipv4 protocol ip flow monitor cts-mon input
match ipv4 source address ip flow monitor cts-mon output
match ipv4 destination address
match transport source-port
match transport destination-port
Interface vlan 20
match flow direction ip flow monitor cts-mon input
match flow cts source group-tag ip flow monitor cts-mon output
match flow cts destination group-tag
collect counter bytes Interface vlan 30
collect counter packets ip flow monitor cts-mon input
ip flow monitor cts-mon output
flow exporter EXP1
destination 10.2.44.15
Interface vlan 40
source GigabitEthernet3/1
ip flow monitor cts-mon input
flow monitor cts-mon ip flow monitor cts-mon output
record cts-v4
exporter EXP1
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Monitoring SGACL Packet Drops with
Flexible Netflow SJC01#show flow mon cts-mon cache
Cache type:
Cache size:
Normal
4096
Current entries: 1438
High Watermark: 1632
Flows added: 33831
Flows aged: 32393
- Active timeout ( 1800 secs) 0
- Inactive timeout ( 15 secs) 32393
- Event aged 0
- Watermark aged 0
- Emergency aged 0
http://www.plixer.com/blog/netflow/cisco-trustsec-netflow-support/
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
How To Create SGA Policy
Destination
SGT
Web
Web Web No Access
File Share
Doctor (SGT 7)
IT Maintenance ACL
Webpermit tcp dstWebeq 443 SSH
SSHpermit tcp dstSSH
eq 80
Full Access
permit tcp dst eq 22 RDP
RDPpermit tcp dstRDPeq 3389
IT Admin (SGT 6) permit tcp dst eq 135 File Share
File Share
deny ip File Share
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Configuring Security Group ACLs on ISE
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Security Group based Access Control
How Enforcement Works
Access-3K#show cts role-based permissions
IPv4 Role-based permissions default:
Permit IP-00 CTS7K-DC# show cts role-based counters sgt 5
IPv4 Role-based permissions from group 11:CTS_Devices to group
11:CTS_Devices: RBACL policy counters enabled
Permit_IP-30 Counters last cleared: 04/20/2010 at 11:20:58 PM
IPv4 Role-based permissions from group 2:MS_Users to group
3:SB_Users: sgt:5 dgt:4 [1555]
deny_ip rbacl:Permit IP
SGT=7103 (configured):
IPv4 Role-based permissions from group 10 to group permit ip [1555]
permit_web
IT Portal (SGT 4)
Users, Access-3K# sgt:5 dgt:8 [1483] 10.1.100.10
Endpoints rbacl:Permit IP
permit ip [1483] VLAN100
Campus Network
sgt:5 dgt:9 [1541]
rbacl:Permit IP
permit ip [1541] Active
802.1X
Access-3K#show Catalyst® 3750-X
cts environment-data Catalyst 6K Nexus® 7000 ACS v5.1 Directory
CTS Environment Data Core Distribution
sgt:5 dgt:10 [1804]
====================
<snip> Web
rbacl:IT_Maintenance_ACL
permit tcp dst eq 20 log [0]
Security Group Name Table:
permit tcp dst eq 21 log [3]
0001-30 :
permit tcp dst eq 22 log [3]
0-7f:Unknown Public Portal (SGT 8) Internal Portal (SGT 9)
permit tcp dst eq 445 log [0]
2-7f:MS_Users 10.1.200.10 10.1.200.200
permit tcp dst eq 135 log [0]
3-7f:SB_Users
Untagged Frame Tagged Frame permit tcp dst eq 136 log [0]
4-7f:IT_Portal
permit tcp dst eq 137 log [0]
5-7f:MS_Servers
6-7f:IT_Admin
permit tcp dst eq 138 log
permit Record
Patient tcp dst eqDB139 log10)
(SGT
[0]
[0]
VLAN200
7-7f:Guest
permit tcp dst eq 3389 log
10.1.200.100 [251]
9-7f:Internal_Portal
permit icmp log [1547]
11-7f:CTS_Devices 73
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved.
denyCisco
ip [0]Public
Key Takeaways
Key Takeaways
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
References
Cisco TrustSec
http://www.cisco.com/go/trustsec
Cisco Catalyst 6500 Series Switches
http://www.cisco.com/go/6500
Cisco Catalyst 4500 Series Switches
http://www.cisco.com/go/4500
Cisco Catalyst 3750X Series Switches
http://www.cisco.com/go/3750x
Cisco TechWise TV – Fundamentals of TrustSec
http://youtu.be/78-GV7Pz18I
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Q&A
Complete Your Online Session
Evaluation
Give us your feedback and receive
a Cisco Live 2013 Polo Shirt!
Complete your Overall Event Survey and 5
Session Evaluations.
Directly from your mobile device on the
Cisco Live Mobile App
By visiting the Cisco Live Mobile Site
www.ciscoliveaustralia.com/mobile
Visit any Cisco Live Internet Station located
Don’t forget to activate your
throughout the venue
Cisco Live 365 account for
Polo Shirts can be collected in the World of access to all session material,
Solutions on Friday 8 March 12:00pm-2:00pm communities, and on-demand and live activities throughout
the year. Log into your Cisco Live portal and click the
"Enter Cisco Live 365" button.
www.ciscoliveaustralia.com/portal/login.ww
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
BRKCRS-2662 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public