Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Text Part Number: OL-22192-02
Page 2
CCVP, the Cisco logo, and Welcome to the Human Network are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn is a service mark of
Cisco
Systems, Inc.; and Access Registrar, Aironet, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the Cisco Certified Internetwork Expert logo,
IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step,
Cisco
Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study,
LightStream, Linksys, MeetingPlace, MGX, Networkers, Networking Academy, Network Registrar, PIX, ProConnect, ScriptShare, SMARTnet, StackWise, The Fastest Way
to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0711R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display
output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in
illustrative content is unintentional and coincidental.
Systems, Inc. and/or its affiliates in the United States and certain other countries.
Page 3
Prefaceix
Cisco TrustSec Overview1-1
Information about Cisco TrustSec Architecture1-1
Authentication1-3
Cisco TrustSec and Authentication1-3
Device Identities1-6
Device Credentials1-6
User Credentials1-6
Security Group-Based Access Control1-7
Security Groups and SGTs1-7
SGACL Policies1-7
Ingress Tagging and Egress Enforcement1-8
Determining the Source Security Group1-9
Determining the Destination Security Group1-10
SGACL Enforcement on Routed and Switched Traffic1-10
Authorization and Policy Acquisition1-10
Environment Data Download1-11
RADIUS Relay Functionality1-12
Link Security1-12
CONTENTS
OL-22192-01
Using Cisco TrustSec-Incapable Devices and Networks in a Cisco TrustSec Network1-13
SXP for SGT Propagation Across Legacy Access Networks1-13
Layer 3 SGT Transport for Spanning Non-TrustSec Regions1-14
Cisco TrustSec Reflector for Cisco TrustSec-Incapable Switching Modules1-15
Ingress Reflector1-16
Egress Reflector1-16
VRF-Aware SXP1-17
Layer 2 VRF-Aware SXP and VRF Assignment1-17
Cisco TrustSec Configuration Guide
iii
Page 4
Contents
Configuring the Cisco TrustSec Solution2-1
Configuration Overview2-1
Cisco TrustSec Configuration How-to Documents2-1
Supported Hardware and Software2-2
Prerequisites for Cisco TrustSec2-2
Cisco TrustSec Guidelines and Limitations2-3
Default Settings2-3
Default Settings3-12
Configuring Subnet to SGT Mapping3-12
Verifying Subnet to SGT Mapping Configuration3-15
Configuration Examples for Subnet to SGT Mapping3-15
VLAN to SGT Mapping3-16
Default Settings3-17
Configuring VLAN to SGT Mapping3-17
Verifying VLAN to SGT Mapping3-19
Configuration Example for VLAN to SGT Mapping for a Single Host Over an Access Link3-19
Cisco TrustSec Configuration Guide
iv
OL-22192-01
Page 5
Layer 3 Logical Interface to SGT Mapping (L3IF–SGT Mapping)3-20
Feature History for L3IF-SGT Mapping3-21
Default Settings3-21
Configuring L3IF to SGT Mapping3-21
Verifying L3IF to SGT Mapping3-21
Configuration Example for L3IF to SGT Mapping on an Ingress Port3-22
Binding Source Priorities3-22
Enabling Cisco TrustSec SXP4-2
Configuring an SXP Peer Connection4-2
Contents
Configuring the Default SXP Password4-4
Configuring the Default SXP Source IP Address4-4
Changing the SXP Reconciliation Period4-5
Changing the SXP Retry Period4-5
Creating Syslogs to Capture Changes of IP Address to SGT Mapping Learned Through SXP4-5
Verifying the SXP Connections4-6
Configuring Layer 3 SGT Transport Between Cisco TrustSec Domains4-6
Configuring Cisco TrustSec Reflector for Cisco TrustSec-Incapable Switching Modules4-8
Configuring Cisco TrustSec Caching4-9
Enabling Cisco TrustSec Caching4-9
Clearing the Cisco TrustSec Cache4-10
Configuring SGACL Policies5-1
Cisco TrustSec SGACL Feature Histories5-1
SGACL Policy Configuration Process5-2
Enabling SGACL Policy Enforcement Globally5-2
Configuration Examples for Enabling SGACL Policy Enforcement Globally5-2
Enabling SGACL Policy Enforcement Per Interface5-3
Configuration Examples for Enabling SGACL Policy Enforcement Per Interface5-3
Enabling SGACL Policy Enforcement on VLANs5-3
Configuration Examples for Enabling SGACL Policy Enforcement on VLANs5-3
OL-22192-01
Cisco TrustSec Configuration Guide
v
Page 6
Contents
Manually Configuring SGACL Policies5-4
Manually Configuring and Applying IPv4 SGACL Policies5-4
Configuration Examples for Manually Configuring SGACL Policies5-5
Displaying SGACL Policies5-6
Refreshing the Downloaded SGACL Policies5-7
Configuring Endpoint Admission Control6-1
Information About Endpoint Admission Control6-1
Basic EAC Configuration Sequence6-2
802.1X Authentication Configuration6-2
Verifying the 802.1X Configuration6-2
MAC Authentication Bypass Configuration6-3
Verifying the MAB Configuration6-3
Web Authentication Proxy Configuration6-4
Verifying Web Authentication Proxy Configuration6-4
Flexible Authentication Sequence and Failover Configuration6-5
802.1X Host Modes6-5
Pre-Authentication Open Access6-5
DHCP Snooping and SGT Assignment6-6
Verifying the SGT to Endpoint Host Binding6-6
Cisco TrustSec Endpoint Access Control Feature Histories6-7
Cisco TrustSec Command Summary7-1
Notes for Catalyst 3000 and 2000 Series Switches and WLC 5700 Series Wireless LAN
ControllersA-1
Supported Hardware and SoftwareA-1
Configuration Guidelines and RestrictionsA-1
Global Cat3K RestrictionsA-1
Catalyst 3850 and Catalyst 3650 Switches, and WLC 5700 Wireless LAN ControllersA-2
Catalyst 3750-X and Catalyst 3560-X switchesA-2
Notes for Catalyst 4500 Series SwitchesB-1
Supported Hardware and SoftwareB-1
TrustSec SGT and SGACL Configuration Guidelines and LimitationsB-1
Cisco TrustSec Configuration Guide
vi
OL-22192-01
Page 7
Notes for Catalyst 6500 Series SwitchesC-1
TrustSec Supported HardwareC-1
Flexible NetFlow SupportC-1
Sample ConfigurationsC-2
Configuration Excerpt of an IPV4 Flow Record (5-tuple, direction, SGT, DGT)C-2
Configuration Excerpt of an IPV6 Flow Record (5-tuple, direction, SGT, DGT)C-2
Configuration Excerpt of an IPv4 Flow MonitorC-2
Configuration Excerpt of an IPv6 Flow MonitorC-3
Configuration Excerpt of the Global Flow Monitor (IPv4 and IPv6)C-3
Configuration Excerpt of the Interface MonitorC-3
Flexible NetFlow Show CommandsC-3
TrustSec System Error MessagesC-4
FIPS SupportC-4
TrustSec Considerations when Configuring FIPSC-4
Licensing Requirements for FIPSC-4
Prerequisites for FIPS ConfigurationC-5
Guidelines and Limitations for FIPSC-5
Default Settings for FIPSC-5
Contents
I
NDEX
OL-22192-01
Cisco TrustSec Configuration Guide
vii
Page 8
Contents
Cisco TrustSec Configuration Guide
viii
OL-22192-01
Page 9
Preface
Revised: October 16, 2013, OL-22192-02
Organization
This guide includes the following chapters and appendixes:
Chapter or Appendix Title Description
Chapter 1, “Cisco TrustSec
Overview”
Chapter 2, “Configuring the Cisco
TrustSec Solution”
Chapter 3, “Configuring Identities,
Connections, and SGTs”
Chapter 4, “Configuring SGT
Exchange Protocol over TCP (SXP)
and Layer 3 Transport”
Appendix A, “Notes for Catalyst
3000 and 2000 Series Switches and
WLC 5700 Series Wireless LAN
Controllers”
Appendix B, “Notes for Catalyst
4500 Series Switches”
Appendix C, “Notes for Catalyst
6500 Series Switches”
Describes the elements and processes that create
the Cisco TrustSec network.
Provides an overview of configuration tasks
required to implement a Cisco TrustSec Network.
Provides NDAC and TrustSec seed device
configuration procedures.
Provides SGT over TCP Protocol (SXP)
configuration procedures.
Provides Security Group ACL configuration
procedures from the switch CLI.
Provides 802.1X, MAB, and WebAuth
configuration procedures for a TrustSec context.
Provides a list of Cisco TrustSec CLI commands
with brief descriptions.
Describes constraints, limitations, or
considerations pertaining to TrustSec
implementation of Catalyst 3000 and 2000 Series
Switches and WLC 5700 Series Wireless LAN
Controllers.
Describes constraints, limitations, or
considerations pertaining to TrustSec
implementation of Catalyst 4500 Series Switches.
Describes constraints, limitations, or
considerations pertaining to TrustSec
implementation of Catalyst 6500 Series Switches.
OL-22192-02
Cisco TrustSec Switch Configuration Guide
ix
Page 10
Conventions
This document uses the following conventions:
Preface
ConventionIndication
bold fontCommands and keywords and user-entered text appear in bold font.
italic fontDocument titles, new or emphasized terms, and arguments for which you supply
values are in italic font.
[ ]Elements in square brackets are optional.
{x | y | z }Required alternative keywords are grouped in braces and separated by
vertical bars.
[ x | y | z ]Optional alternative keywords are grouped in brackets and separated by
vertical bars.
stringA nonquoted set of characters. Do not use quotation marks around the string or
the string will include the quotation marks.
courier fontTerminal sessions and information the system displays appear in courier font.
< >Nonprinting characters such as passwords are in angle brackets.
[ ]Default responses to system prompts are in square brackets.
!, #An exclamation point (!) or a pound sign (#) at the beginning of a line of code
indicates a comment line.
NoteMeans reader take note.
TipMeans the following information will help you solve a problem.
CautionMeans reader be careful. In this situation, you might perform an action that could result in equipment
damage or loss of data.
TimesaverMeans the described action saves time. You can save time by performing the action described in
the paragraph.
Warning
Means reader be warned. In this situation, you might perform an action that could result in
bodily injury.
Cisco TrustSec Switch Configuration Guide
x
OL-22192-02
Page 11
Preface
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, using the Cisco Bug Search Tool (BST), submitting a
service request, and gathering additional information, see What’s New in Cisco Product Documentation
at: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html.
Subscribe to What’s New in Cisco Product Documentation, which lists all new and revised Cisco technical
documentation, as an RSS feed and deliver content directly to your desktop using a reader application. The
RSS feeds are a free service.
OL-22192-02
Cisco TrustSec Switch Configuration Guide
xi
Page 12
Preface
Cisco TrustSec Switch Configuration Guide
xii
OL-22192-02
Page 13
CHAP T ER
Cisco TrustSec Overview
Revised: June 16, 2011, OL-22192-01
This chapter contains the following topics:
• Information about Cisco TrustSec Architecture, page 1-1
• Using Cisco TrustSec-Incapable Devices and Networks in a Cisco TrustSec Network, page 1-13
Information about Cisco TrustSec Architecture
The Cisco TrustSec security architecture builds secure networks by establishing domains of trusted
network devices. Each device in the domain is authenticated by its peers. Communication on the links
between devices in the domain is secured with a combination of encryption, message integrity check,
and data-path replay protection mechanisms. Cisco TrustSec uses the device and user credentials
acquired during authentication for classifying the packets by security groups (SGs) as they enter the
network. This packet classification is maintained by tagging packets on ingress to the Cisco TrustSec
network so that they can be properly identified for the purpose of applying security and other policy
criteria along the data path. The tag, called the security group tag (SGT), allows the network to enforce
the access control policy by enabling the endpoint device to act upon the SGT to filter traffic.
The Cisco TrustSec architecture incorporates three key components:
• Authenticated networking infrastructure—After the first device (called the seed device)
authenticates with the authentication server to begin the Cisco TrustSec domain, each new device
added to the domain is authenticated by its peer devices already within the domain. The peers act as
intermediaries for the domain’s authentication server. Each newly-authenticated device is
categorized by the authentication server and assigned a security group number based on its identity,
role, and security posture.
• Security group-based access control—Access policies within the Cisco TrustSec domain are
topology-independent, based on the roles (as indicated by security group number) of source and
destination devices rather than on network addresses. Individual packets are tagged with the security
group number of the source.
• Secure communication—With encryption-capable hardware, communication on each link between
devices in the domain can be secured with a combination of encryption, message integrity checks,
and data-path replay protection mechanisms.
1
OL-22192-01
Cisco TrustSec Configuration Guide
1-1
Page 14
Information about Cisco TrustSec Architecture
Figure 1-1 shows an example of a Cisco TrustSec domain. In this example, several networking devices
and an endpoint device are inside the Cisco TrustSec domain. One endpoint device and one networking
device are outside the domain because they are not Cisco TrustSec-capable devices or because they have
been refused access. The authentication server is considered to be outside of the Cisco TrustSec domain;
it is either a Cisco Identities Service Engine (Cisco ISE), or a Cisco Secure Access Control System
(Cisco ACS).
Figure 1-1Cisco TrustSec Network Domain Example
Chapter 1 Cisco TrustSec Overview
Authentication
Server (AS)
Switch 1
Switch 2
Cisco TrustSec
Switch
Protected
Unprotected link
Host 1
253096
Each participant in the Cisco TrustSec authentication process acts in one of the following roles:
• Supplicant—An unauthenticated device connected to a peer within the Cisco TrustSec domain, and
attempting to join the Cisco TrustSec domain.
• Authentication server—The server that validates the identity of the supplicant and issues the policies
that determine the supplicant’s access to services within the Cisco TrustSec domain.
• Authenticator—An authenticated device that is already part of the Cisco TrustSec domain and can
authenticate new peer supplicants on behalf of the authentication server.
When the link between a supplicant and an authenticator first comes up, the following sequence of events
typically occurs:
1. Authentication (802.1X)—The supplicant is authenticated by the authentication server, with the
authenticator acting as an intermediary. Mutual authentication is performed between the two peers
(supplicant and authenticator).
2. Authorization—Based on the identity information of the supplicant, the authentication server
provides authorization policies, such as security group assignments and ACLs, to each of the linked
peers. The authentication server provides the identity of each peer to the other, and each peer then
applies the appropriate policy for the link.
3. Security Association Protocol (SAP) negotiation—When both sides of a link support encryption, the
supplicant and the authenticator negotiate the necessary parameters to establish a security
association (SA).
When all three steps are complete, the authenticator changes the state of the link from the unauthorized
(blocking) state to the authorized state, and the supplicant becomes a member of the Cisco TrustSec
domain.
Cisco TrustSec Configuration Guide
1-2
OL-22192-01
Page 15
Chapter 1 Cisco TrustSec Overview
Cisco TrustSec uses ingress tagging and egress filtering to enforce access control policy in a scalable
manner. Packets entering the domain are tagged with a security group tag (SGT) containing the assigned
security group number of the source device. This packet classification is maintained along the data path
within the Cisco TrustSec domain for the purpose of applying security and other policy criteria. The final
Cisco TrustSec device on the data path, either the endpoint or network egress point, enforces an access
control policy based on the security group of the Cisco TrustSec source device and the security group of
the final Cisco TrustSec device. Unlike traditional access control lists based on network addresses, Cisco
TrustSec access control policies are a form of role-based access control lists (RBACLs) called security
group access control lists (SGACLs).
NoteIngress refers to packets entering the first Cisco TrustSec-capable device encountered by a packet on its
path to the destination and egress refers to packets leaving the last Cisco TrustSec-capable device on the
path.
Authentication
This section includes the following topics:
• Cisco TrustSec and Authentication, page 1-3
Information about Cisco TrustSec Architecture
• Device Identities, page 1-6
• Device Credentials, page 1-6
• User Credentials, page 1-6
Cisco TrustSec and Authentication
Using Network Device Admission Control (NDAC), Cisco TrustSec authenticates a device before
allowing it to join the network. NDAC uses 802.1X authentication with Extensible Authentication
Protocol Flexible Authentication via Secure Tunnel (EAP-FAST) as the Extensible Authentication
Protocol (EAP) method to perform the authentication. EAP-FAST conversations provide for other EAP
method exchanges inside the EAP-FAST tunnel using chains. Administrators can use traditional
user-authentication methods, such as Microsoft Challenge Handshake Authentication Protocol Version
2 (MSCHAPv2), while still having security provided by the EAP-FAST tunnel. During the EAP-FAST
exchange, the authentication server creates and delivers to the supplicant a unique protected access
credential (PAC) that contains a shared key and an encrypted token to be used for future secure
communications with the authentication server. Figure 1-2 shows the EAP-FAST tunnel and inner
methods as used in Cisco TrustSec.
OL-22192-01
Cisco TrustSec Configuration Guide
1-3
Page 16
Information about Cisco TrustSec Architecture
Figure 1-2Cisco TrustSec Authentication
Chapter 1 Cisco TrustSec Overview
Switch 1 (supplicant)
EAP-FAST in 802.1X
Policy acquisition
Key establishment (SAP)
Ongoing key refresh (SAP)
Switch 2 (authenticator)
EAP-FAST Tunnel establishment
EAP-FAST in RADIUS
One time provisioning
Device authentication
User authentication
EAP-FAST tunnel tear down
Policy acquisition (RADIUS)
Cisco TrustSec
AS
AS
Switch 1
Switch 2
187008
Cisco TrustSec Configuration Guide
1-4
OL-22192-01
Page 17
Chapter 1 Cisco TrustSec Overview
This section includes the following topics:
• Cisco TrustSec Enhancements to EAP-FAST, page 1-5
• 802.1X Role Selection, page 1-5
• Cisco TrustSec Authentication Summary, page 1-5
Cisco TrustSec Enhancements to EAP-FAST
The implementation of EAP-FAST for Cisco TrustSec has the following enhancements:
• Authenticate the authenticator—Securely determines the identity of the authenticator by requiring
the authenticator to use its PAC to derive the shared key between itself and the authentication server.
This feature also prevents you from configuring RADIUS shared keys on the authentication server
for every possible IP address that can be used by the authenticator.
• Notify each device of the identity of its peer—By the end of the authentication exchange, the
authentication server has identified both the supplicant and the authenticator. The authentication
server conveys the identity of the authenticator, and whether the authenticator is Cisco
TrustSec-capable, to the supplicant by using additional type-length-value parameters (TLVs) in the
protected EAP-FAST termination. The authentication server also conveys the identity of the
supplicant, and whether the supplicant is Cisco TrustSec-capable, to the authenticator by using
RADIUS attributes in the Access- Accept message. Because each device knows the identity of its
peer, it can send additional RADIUS Access-Requests to the authentication server to acquire the
policy to be applied on the link.
Information about Cisco TrustSec Architecture
802.1X Role Selection
In 802.1X, the authenticator must have IP connectivity with the authentication server because it has to
relay the authentication exchange between the supplicant and the authenticator using RADIUS over
UDP/IP. When an endpoint device, such as a PC, connects to a network, it is obvious that it should
function as a supplicant. However, in the case of a Cisco TrustSec connection between two network
devices, the 802.1X role of each network device might not be immediately apparent to the other network
device.
Instead of requiring manual configuration of the authenticator and supplicant roles for two adjacent
switches, Cisco TrustSec runs a role-selection algorithm to automatically determine which switch
functions as the authenticator and which functions as the supplicant. The role-selection algorithm
assigns the authenticator role to the switch that has IP reachability to a RADIUS server. Both switches
start both the authenticator and supplicant state machines. When a switch detects that its peer has access
to a RADIUS server, it terminates its own authenticator state machine and assumes the role of the
supplicant. If both switches have access to a RADIUS server, the first switch to receive a response from
the RADIUS server becomes the authenticator and the other switch becomes the supplicant.
Cisco TrustSec Authentication Summary
By the end of the Cisco TrustSec authentication process, the authentication server has performed the
following actions:
• Verified the identities of the supplicant and the authenticator.
• Authenticated the user if the supplicant is an endpoint device.
OL-22192-01
Cisco TrustSec Configuration Guide
1-5
Page 18
Information about Cisco TrustSec Architecture
At the end of the Cisco TrustSec authentication process, both the authenticator and the supplicant know
the following:
• Device ID of the peer
• Cisco TrustSec capability information of the peer
• Key used for the SAP
Device Identities
Cisco TrustSec does not use IP addresses or MAC addresses as device identities. Instead, you assign a
name (device ID) to each Cisco TrustSec-capable switch to identify it uniquely in the Cisco TrustSec
domain. This device ID is used for the following:
• Looking up the authorization policy
• Looking up passwords in the databases during authentication
Device Credentials
Cisco TrustSec supports password-based credentials. Cisco TrustSec authenticates the supplicants
through passwords and uses MSCHAPv2 to provide mutual authentication.
Chapter 1 Cisco TrustSec Overview
User Credentials
The authentication server uses these credentials to mutually authenticate the supplicant during the
EAP-FAST phase 0 (provisioning) exchange where a PAC is provisioned in the supplicant. Cisco
TrustSec does not perform the EAP-FAST phase 0 exchange again until the PAC expires, and only
performs EAP-FAST phase 1 and phase 2 exchanges for future link bringups. The EAP-FAST phase 1
exchange uses the PAC to mutually authenticate the authentication server and the supplicant. Cisco
TrustSec uses the device credentials only during the PAC provisioning (or reprovisioning) steps.
When the supplicant first joins the Cisco TrustSec domain, the authentication server authenticates the
supplicant and pushes a shared key and encrypted token to the supplicant with the PAC. The
authentication server and the supplicant use this key and token for mutual authentication in all future
EAP-FAST phase 0 exchanges.
Cisco TrustSec does not require a specific type of user credential for endpoint devices. You can choose
any type of user authentication method that is supported by the authentication server, and use the
corresponding credentials. For example, the Cisco Secure Access Control System (ACS) version 5.1
supports MSCHAPv2, generic token card (GTC), or RSA one-time password (OTP).
Cisco TrustSec Configuration Guide
1-6
OL-22192-01
Page 19
Chapter 1 Cisco TrustSec Overview
Security Group-Based Access Control
This section includes the following topics:
• Security Groups and SGTs, page 1-7
• SGACL Policies, page 1-7
• Ingress Tagging and Egress Enforcement, page 1-8
• Determining the Source Security Group, page 1-9
• Determining the Destination Security Group, page 1-10
• SGACL Enforcement on Routed and Switched Traffic, page 1-10
Security Groups and SGTs
A security group is a grouping of users, endpoint devices, and resources that share access control
policies. Security groups are defined by the administrator in the Cisco ISE or Cisco Secure ACS. As new
users and devices are added to the Cisco TrustSec domain, the authentication server assigns these new
entities to appropriate security groups. Cisco TrustSec assigns to each security group a unique 16-bit
security group number whose scope is global within a Cisco TrustSec domain. The number of security
groups in the switch is limited to the number of authenticated network entities. You do not have to
manually configure security group numbers.
Once a device is authenticated, Cisco TrustSec tags any packet that originates from that device with a
security group tag (SGT) that contains the security group number of the device. The packet carries this
SGT throughout the network within the Cisco TrustSec header. The SGT is a single label that determines
the privileges of the source within the entire enterprise.
Because the SGT contains the security group of the source, the tag can be referred to as the source SGT.
The destination device is also assigned to a security group (the destination SG) that can be referred to
for simplicity as the destination group tag (DGT), although the actual Cisco TrustSec packet tag does
not contain the security group number of the destination device.
Information about Cisco TrustSec Architecture
SGACL Policies
OL-22192-01
Using security group access control lists (SGACLs), you can control the operations that users can
perform based on the security group assignments of users and destination resources. Policy enforcement
within the Cisco TrustSec domain is represented by a permissions matrix, with source security group
numbers on one axis and destination security group numbers on the other axis. Each cell in the body of
the matrix can contain an ordered list of SGACLs which specifies the permissions that should be applied
to packets originating from the source security group and destined for the destination security group.
Figure 1-3 shows an example of a Cisco TrustSec permissions matrix for a simple domain with three
defined user roles and one defined destination resource. Three SGACL policies control access to the
destination server based on the role of the user.
Cisco TrustSec Configuration Guide
1-7
Page 20
Information about Cisco TrustSec Architecture
Figure 1-3SGACL Policy Matrix Example
Egress Policy
Role
(Security Group)
User A (10)
User B (20)
Source
User C (30)
User D (30)
By assigning users and devices within the network to security groups and applying access control
between the security groups, Cisco TrustSec achieves role-based topology-independent access control
within the network. Because SGACLs define access control policies based on device identities instead
of IP addresses as in traditional ACLs, network devices are free to move throughout the network and
change IP addresses. As long as the roles and the permissions remain the same, changes to the network
topology do not change the security policy. When a user is added to the switch, you simply assign the
user to an appropriate security group and the user immediately receives the permissions of that group.
Using role-based permissions greatly reduces the size of ACLs and simplifies their maintenance. With
Cisco TrustSec, the number of access control entries (ACEs) configured is determined by the number of
permissions specified, resulting in a much smaller number of ACEs than in a traditional IP network. The
use of SGACLs in Cisco TrustSec typically results in a more efficient use of TCAM resources compared
with traditional ACLs.
Ingress Tagging and Egress Enforcement
Cisco TrustSec access control is implemented using ingress tagging and egress enforcement. At the
ingress point to the Cisco TrustSec domain, traffic from the source is tagged with an SGT containing the
security group number of the source entity. The SGT is propagated with the traffic across the domain.
At the egress point of the Cisco TrustSec domain, an egress device uses the source SGT and the security
group number of the destination entity (the destination SG, or DGT) to determine which access policy
to apply from the SGACL policy matrix.
Cisco TrustSec Configuration Guide
1-8
OL-22192-01
Page 21
Chapter 1 Cisco TrustSec Overview
Figure 1-4 shows how the SGT assignment and the SGACL enforcement operate in a Cisco TrustSec
domain.
Figure 1-4SGT and SGACL in a Cisco TrustSec Domain
Information about Cisco TrustSec Architecture
SGACL enforcement
SGT = 3
Host
user PC
SGT imposition
Step 1The host PC transmits a packet to the web server. Although the PC and the web server are not members
of the Cisco TrustSec domain, the data path of the packet includes the Cisco TrustSec domain.
Step 2The Cisco TrustSec ingress switch modifies the packet to add an SGT with security group number 3, the
security group number assigned by the authentication server for the host PC.
Step 3The Cisco TrustSec egress switch enforces the SGACL policy that applies to source group 3 and
destination group 4, the security group number assigned by the authentication server for the web server.
Step 4If the SGACL allows the packet to be forwarded, the Cisco TrustSec egress switch modifies the packet
to remove the SGT and forwards the packet to the web server.
Determining the Source Security Group
A network device at the ingress of Cisco TrustSec domain must determine the SGT of the packet entering
the Cisco TrustSec domain so that it can tag the packet with that SGT when it forwards it into the Cisco
TrustSec domain. The egress network device must determine the SGT of the packet in order to apply an
SGACL.
The network device can determine the SGT for a packet in one of the following methods:
33
Cisco TrustSec
33
DGT = 4
Web server
187009
• Obtain the source SGT during policy acquisition—After the Cisco TrustSec authentication phase, a
network device acquires policy information from the authentication server, which indicates whether
the peer device is trusted or not. If a peer device is not trusted, then the authentication server can
also provide an SGT to apply to all packets coming from the peer device.
• Obtain the source SGT from the packet—If a packet comes from a trusted peer device, the packet
carries the SGT. This applies to a network device that is not the first network device in Cisco
TrustSec domain for the packet.
• Look up the source SGT based on the source identity—With Identity Port Mapping (IPM), you can
manually configure the link with the identity of the connected peer. The network device requests
policy information, including SGT and trust state, from the authentication server.
• Look up the source SGT based on the source IP address—In some cases, you can manually configure
the policy to decide the SGT of a packet based on its source IP address. The SGT Exchange Protocol
(SXP) can also populate the IP-address-to-SGT mapping table.
OL-22192-01
Cisco TrustSec Configuration Guide
1-9
Page 22
Information about Cisco TrustSec Architecture
Determining the Destination Security Group
The egress network device in a Cisco TrustSec domain determines the destination group (DGT) for
applying the SGACL. The network device determines the destination security group for the packet using
the same methods used for determining the source security group, with the exception of obtaining the
group number from a packet tag. The destination security group number is not included in a packet tag.
In some cases, ingress devices or other non-egress devices might have destination group information
available. In those cases, SGACLs might be applied in these devices rather than egress devices.
SGACL Enforcement on Routed and Switched Traffic
SGACL enforcement is applied only on IP traffic, but enforcement can be applied to either routed or
switched traffic.
For routed traffic, SGACL enforcement is performed by an egress switch, typically a distribution switch
or an access switch with a routed port connecting to the destination host. When you enable SGACL
enforcement globally, enforcement is automatically enabled on every Layer 3 interface except for SVI
interfaces.
For switched traffic, SGACL enforcement is performed on traffic flowing within a single switching
domain without any routing function. An example would be SGACL enforcement performed by a data
center access switch on server-to-server traffic between two directly connected servers. In this example,
the server-to-server traffic would typically be switched. SGACL enforcement can be applied to packets
switched within a VLAN or forwarded to an SVI associated with a VLAN, but enforcement must be
enabled explicitly for each VLAN.
Chapter 1 Cisco TrustSec Overview
Authorization and Policy Acquisition
After device authentication ends, both the supplicant and authenticator obtain the security policy from
the authentication server. The two peers then perform link authorization and enforce the link security
policy against each other based on their Cisco TrustSec device IDs. The link authentication method can
be configured as either 802.1X or manual authentication. If the link security is 802.1X, each peer uses
a device ID received from the authentication server. If the link security is manual, you must assign the
peer device IDs.
The authentication server returns the following policy attributes:
• Cisco TrustSec trust—Indicates whether the peer device is to be trusted for the purpose of putting
the SGT in the packets.
• Peer SGT—Indicates the security group to which the peer belongs. If the peer is not trusted, all
packets received from the peer are tagged with this SGT. If the device does not know whether any
SGACLs are associated with the peer’s SGT, the device may send a follow-up request to the
authentication server to download the SGACLs.
• Authorization expiry time—Indicates the number of seconds before the policy expires. A Cisco
TrustSec device should refresh its policy and authorization before it times out. The device can cache
the authentication and policy data and reuse it after a reboot if the data has not expired. In Cisco IOS
Release 12.2(33)SXI, only policy data and environment data is cached.
TipEach Cisco TrustSec device should support some minimal default access policy in case it is not able to
contact the authentication server to get an appropriate policy for the peer.
Cisco TrustSec Configuration Guide
1-10
OL-22192-01
Page 23
Chapter 1 Cisco TrustSec Overview
SAP negotiation
authentication
authorization
authorization
authentication
supplican
Supplicant
AuthenticationAuthentication
Authorization
Authorization
SAP negotiation
authentication
authorization
ATAS
AuthenticationAuthentication
Authorization
Authorization
187007
The NDAC and SAP negotiation process is shown in Figure 1-5.
Figure 1-5NDAC and SAP Negotiation
Information about Cisco TrustSec Architecture
Environment Data Download
The Cisco TrustSec environment data is a collection of information or policies that assists a device to
function as a Cisco TrustSec node. The device acquires the environment data from the authentication
server when the device first joins a Cisco TrustSec domain, although you might also manually configure
some of the data on a device. For example, you must configure the seed Cisco TrustSec device with the
authentication server information, which can later be augmented by the server list that the device
acquires from the authentication server.
The device must refresh the Cisco TrustSec environment data before it expires. The device can also cache
the environment data and reuse it after a reboot if the data has not expired.
The device uses RADIUS to acquire the following environment data from the authentication server:
• Server lists—List of servers that the client can use for future RADIUS requests (for both
authentication and authorization).
• Device SG—Security group to which the device itself belongs.
• Expiry timeout—Interval that controls how often the Cisco TrustSec device should refresh its
environment data.
OL-22192-01
Cisco TrustSec Configuration Guide
1-11
Page 24
Information about Cisco TrustSec Architecture
RADIUS Relay Functionality
The switch that plays the role of the Cisco TrustSec authenticator in the 802.1X authentication process
has IP connectivity to the authentication server, allowing the switch to acquire the policy and
authorization from the authentication server by exchanging RADIUS messages over UDP/IP. The
supplicant device may not have IP connectivity with the authentication server. In such cases,
Cisco TrustSec allows the authenticator to act as a RADIUS relay for the supplicant.
The supplicant sends a special EAPOL message to the authenticator that contains the RADIUS server IP
address and UDP port and the complete RADIUS request. The authenticator extracts the RADIUS
request from the received EAPOL message and sends it over UDP/IP to the authentication server. When
the RADIUS response returns from the authentication server, the authenticator forwards the message
back to the supplicant, encapsulated in an EAPOL frame.
Link Security
When both sides of a link support 802.1AE Media Access Control Security (MACsec), a security
association protocol (SAP) negotiation is performed. An EAPOL-Key exchange occurs between the
supplicant and the authenticator to negotiate a cipher suite, exchange security parameters, and manage
keys. Successful completion of all three tasks results in the establishment of a security association (SA).
Depending on your software version, crypto licensing, and link hardware support, SAP negotiation can
use one of the following modes of operation:
• Galois/Counter Mode (GCM)—Specifies authentication and encryption
Chapter 1 Cisco TrustSec Overview
• GCM authentication (GMAC)—Specifies authentication and no encryption
• No Encapsulation—Specifies no encapsulation (clear text)
• Null—Specifies encapsulation, no authentication and no encryption
All modes except No Encapsulation require Cisco TrustSec-capable hardware.
For Cisco Catalyst 6500 series switches, Cisco IOS Release 12.2(50)SY and later releases, Cisco
TrustSec uses AES-128 GCM and GMAC, compliant with the IEEE 802.1AE standard.
Cisco TrustSec Configuration Guide
1-12
OL-22192-01
Page 25
Chapter 1 Cisco TrustSec Overview
Using Cisco TrustSec-Incapable Devices and Networks in a Cisco TrustSec Network
Using Cisco TrustSec-Incapable Devices and Networks in a
Cisco TrustSec Network
This section includes the following topics:
• SXP for SGT Propagation Across Legacy Access Networks, page 1-13
SXP for SGT Propagation Across Legacy Access Networks
Tagging packets with SGTs requires hardware support. You might have devices in your network that,
while capable of participating in Cisco TrustSec authentication, lack the hardware capability to tag
packets with SGTs. By using the SGT Exchange Protocol (SXP), these devices can pass
IP-address-to-SGT mappings to a Cisco TrustSec peer device that has Cisco TrustSec-capable hardware.
SXP typically operates between ingress access layer devices at the Cisco TrustSec domain edge and
distribution layer devices within the Cisco TrustSec domain. The access layer device performs Cisco
TrustSec authentication of external source devices to determine the appropriate SGTs for ingress
packets. The access layer device learns the IP addresses of the source devices using IP device tracking
and (optionally) DHCP snooping, then uses SXP to pass the IP addresses of the source devices along
with their SGTs to the distribution switches. Distribution switches with Cisco TrustSec-capable
hardware can use this IP-to-SGT mapping information to tag packets appropriately and to enforce
SGACL policies (see Figure 1-6).
Figure 1-6SXP Protocol to Propagate SGT Information
Using Cisco TrustSec-Incapable Devices and Networks in a Cisco TrustSec Network
You must manually configure an SXP connection between a peer without Cisco TrustSec hardware
support and a peer with Cisco TrustSec hardware support. The following tasks are required when
configuring the SXP connection:
• If you require SXP data integrity and authentication, you must configure the same SXP password
on both peer devices. You can configure the SXP password either explicitly for each peer connection
or globally for the device. Although an SXP password is not required, we recommend its use.
• You must configure each peer on the SXP connection as either an SXP speaker or an SXP listener.
The speaker device distributes the IP-to-SGT mapping information to the listener device.
• You can specify a source IP address to use for each peer relationship or you can configure a default
source IP address for peer connections where you have not configured a specific source IP address.
If you do not specify any source IP address, the device will use the interface IP address of the
connection to the peer.
SXP allows multiple hops. That is, if the peer of a device lacking Cisco TrustSec hardware support also
lacks Cisco TrustSec hardware support, the second peer can have an SXP connection to a third peer,
continuing the propagation of the IP-to-SGT mapping information until a hardware-capable peer is
reached. A device can be configured as an SXP listener for one SXP connection as an SXP speaker for
another SXP connection.
A Cisco TrustSec device maintains connectivity with its SXP peers by using the TCP keepalive
mechanism. To establish or restore a peer connection, the device will repeatedly attempt the connection
setup using a configurable retry period until the connection is successful or until the connection is
removed from the configuration.
Chapter 1 Cisco TrustSec Overview
Layer 3 SGT Transport for Spanning Non-TrustSec Regions
When a packet leaves the Cisco TrustSec domain for a non-TrustSec destination, the egress Cisco
TrustSec device removes the Cisco TrustSec header and SGT before forwarding the packet to the outside
network. If, however, the packet is merely traversing a non-TrustSec domain on the path to another Cisco
TrustSec domain, as shown in Figure 1-7, the SGT can be preserved by using the Cisco TrustSec Layer 3
SGT Transport feature. In this feature, the egress Cisco TrustSec device encapsulates the packet with an
ESP header that includes a copy of the SGT. When the encapsulated packet arrives at the next Cisco
TrustSec domain, the ingress Cisco TrustSec device removes the ESP encapsulation and propagates the
packet with its SGT.
Cisco TrustSec Configuration Guide
1-14
OL-22192-01
Page 27
Chapter 1 Cisco TrustSec Overview
Protected link
Unprotected link
Switch 2
TrustSec
domain
253097
Non-TrustSec
domain
Switch 1
TrustSec
domain
Figure 1-7Spanning a Non-TrustSec domain
Using Cisco TrustSec-Incapable Devices and Networks in a Cisco TrustSec Network
To support Cisco TrustSec Layer 3 SGT Transport, any device that will act as a Cisco TrustSec ingress
or egress Layer 3 gateway must maintain a traffic policy database that lists eligible subnets in remote
Cisco TrustSec domains as well as any excluded subnets within those regions. You can configure this
database manually on each device if they cannot be downloaded automatically from the
Cisco Secure ACS.
A device can send Layer 3 SGT Transport data from one port and receive Layer 3 SGT Transport data
on another port, but both the ingress and egress ports must have Cisco TrustSec-capable hardware.
NoteCisco TrustSec does not encrypt the Layer 3 SGT Transport encapsulated packets. To protect the packets
traversing the non-TrustSec domain, you can configure other protection methods, such as IPsec.
Cisco TrustSec Reflector for Cisco TrustSec-Incapable Switching Modules
A Catalyst 6500 series switch in a Cisco TrustSec domain may contain any of these types of switching
modules:
• Cisco TrustSec-capable—Hardware supports insertion and propagation of SGT.
• Cisco TrustSec-aware—Hardware does not support insertion and propagation of SGT, but hardware
can perform a lookup to determine the source and destination SGTs for a packet.
• Cisco TrustSec-incapable—Hardware does not support insertion and propagation of SGT and
cannot determine the SGT by a hardware lookup.
If your switch contains a Cisco TrustSec-capable supervisor engine, you can use the Cisco TrustSec
reflector feature to accommodate legacy Cisco TrustSec-incapable switching modules within the same
switch. Available in Cisco IOS Release 12.2(50)SY and later releases, Cisco TrustSec reflector uses
SPAN to reflect traffic from a Cisco TrustSec-incapable switching module to the supervisor engine for
SGT assignment and insertion.
OL-22192-01
Cisco TrustSec Configuration Guide
1-15
Page 28
Using Cisco TrustSec-Incapable Devices and Networks in a Cisco TrustSec Network
Two mutually exclusive modes, ingress and egress, are supported for the Cisco TrustSec reflector. The
default is pure mode, in which neither reflector is enabled. A Cisco TrustSec ingress reflector is
configured on an access switch facing a distribution switch, while a Cisco TrustSec egress reflector is
configured on a distribution switch.
Supported TrustSec Reflector Hardware
For further discussion of the Cisco TrustSec Reflector feature and a list of supported hardware, see the
document, “Cisco Catalyst 6500 Series with Supervisor Engine 2T: Enabling Cisco TrustSec with Investment Protection,” at the following URL:
A Cisco TrustSec ingress reflector is implemented on an access switch, where the Cisco
TrustSec-incapable switching module is on the Cisco TrustSec domain edge and the Cisco
TrustSec-capable supervisor engine uplink port connects to a Cisco TrustSec-capable distribution
switch.
The following conditions must be met before the Cisco TrustSec ingress reflector configuration is
accepted:
Chapter 1 Cisco TrustSec Overview
Egress Reflector
• The supervisor engine must be Cisco TrustSec-capable.
• Any Cisco TrustSec-incapable DFCs must be powered down.
• A Cisco TrustSec egress reflector must not be configured on the switch.
• Before disabling the Cisco TrustSec ingress reflector, you must remove power from the
Cisco TrustSec-incapable switching modules.
A Cisco TrustSec egress reflector is implemented on a distribution switch with Layer 3 uplinks, where
the Cisco TrustSec-incapable switching module faces an access switch. The Cisco TrustSec egress
reflector is supported only on Layer 3 uplinks, and is not supported on Layer 2 interfaces, SVIs,
subinterfaces, or tunnels, and is not supported for NAT traffic.
The following conditions must be met before the Cisco TrustSec egress reflector configuration is
accepted:
• The supervisor engine or DFC switching module must be Cisco TrustSec-capable.
• Cisco TrustSec must not be enabled on non-routed interfaces on the supervisor engine uplink ports
or on the Cisco TrustSec-capable DFC switching modules.
• Before disabling the Cisco TrustSec egress reflector, you must remove power from the Cisco
TrustSec-incapable switching modules.
• A Cisco TrustSec ingress reflector must not be configured on the switch.
Cisco TrustSec Configuration Guide
1-16
OL-22192-01
Page 29
Chapter 1 Cisco TrustSec Overview
VRF-Aware SXP
The SXP implementation of Virtual Routing and Forwarding (VRF) binds an SXP connection with a
specific VRF. It is assumed that the network topology is correctly configured for Layer 2 or Layer 3
VPNs, with all VRFs configured before enabling Cisco TrustSec.
SXP VRF support can be summarized as follows:
• Only one SXP connection can be bound to one VRF.
• Different VRFs may have overlapping SXP peer or source IP addresses.
• IP–SGT mappings learned (added or deleted) in one VRF can be updated only in the same VRF
domain. The SXP connection cannot update a mapping bound to a different VRF. If no SXP
connection exits for a VRF, IP–SGT mappings for that VRF won’t be updated by SXP.
• Multiple address families per VRF is supported. Therefore, one SXP connection in a VRF domain
can forward both IPV4 and IPV6 IP-SGT mappings.
• SXP has no limitation on the number of connections and number of IP–SGT mappings per VRF.
Layer 2 VRF-Aware SXP and VRF Assignment
Using Cisco TrustSec-Incapable Devices and Networks in a Cisco TrustSec Network
VRF to Layer 2 VLANs assignments are specified with the cts role-based l2-vrf vrf-name vlan-list
global configuration command. A VLAN is considered a Layer 2 VLAN as long as there is no switch
virtual interface (SVI) with an IP address configured on the VLAN. The VLAN becomes a Layer 3
VLAN once an IP address is configured on its SVI.
The VRF assignments configured by the cts role-based l2-vrf command are active as long as a VLAN
remains a Layer 2 VLAN. The IP–SGT bindings learned while a VRF assignment is active are also added
to the Forwarding Information Base (FIB) table associated with the VRF and the IP protocol version. If
an SVI becomes active for a VLAN, the VRF to VLAN assignment becomes inactive and all the bindings
learned on the VLAN are moved to the FIB table associated with the SVI’s VRF.
The VRF to VLAN assignment is retained even when the assignment becomes inactive. It is reactivated
when the SVI is removed or when the SVI IP address is deconfigured. When reactivated, the IP–SGT
bindings are moved back from the FIB table associated with the SVI's VRF to the FIB table associated
with the VRF assigned by the cts role-based l2-vrf command.
OL-22192-01
Cisco TrustSec Configuration Guide
1-17
Page 30
Using Cisco TrustSec-Incapable Devices and Networks in a Cisco TrustSec Network
Chapter 1 Cisco TrustSec Overview
Cisco TrustSec Configuration Guide
1-18
OL-22192-01
Page 31
Configuring the Cisco TrustSec Solution
Revised: July 13, 2012, OL-22192-01
This chapter includes the following topics:
• Configuration Overview, page 2-1
• Default Settings, page 2-3
• Additional Documentation, page 2-3
Configuration Overview
This guide documents elementary Cisco TrustSec configuration procedures for Cisco Catalyst switches
and includes a TrustSec command reference.
For network-wide deployment configurations, see the section, “Cisco TrustSec Configuration How-to
Documents.”
A network-wide deployment includes the configuration, interoperability, and management of multiple
devices, which may include the Cisco Identity Services Engine (Cisco ISE), The Cisco Secure Access
Control System (Cisco ACS), Cisco IP Telephones, Cisco routers, Cisco network appliances, etc.
CHAP T ER
2
White papers and presentations explaining the Cisco TrustSec Solution are at the following URL:
A series of “How-to” configuration documents provides deployment guidelines and best practices for
proven network architectures in complex scenarios. Find all Cisco TrustSec “How-To” documents at the
following URL:
TrustSec 2.1 Configuration How-to Guide topics include the following:
• Introduction
• Planning and Pre-Deployment Checklist
• ISE Base Configuration: ISE Bootstrapping
• Adding ID Stores and Creating Authentication
• Global Switch Configuration
OL-22192-01
Cisco TrustSec Configuration Guide
2-1
Page 32
Configuration Overview
Chapter 2 Configuring the Cisco TrustSec Solution
• Base configuration for the Wireless LAN Controller
• Phased Deployment Overview
• Monitor Mode
• Migrating from Monitor Mode
• Low Impact Mode
• Closed Mode
• ISE Profiling Services
• ISE Base Configurations: Promiscuous VMware
• Central Web Authentication
• User Authentication and Authorization to Multiple Active Directory Domains
• ISE Deployment Type and Guideline
• Using Certificates to Differentiate Access
• On-boarding and Provisioning
• Server to Server Segmentation using Security Group Access
• Deploying EAP Chaining with AnyConnect NAM and Cisco ISE
• Failed Authentications & Authorizations
Supported Hardware and Software
For a list of TrustSec supported hardware and software per TrustSec release, see,
Release Notes for Cisco TrustSec General Availability Releases at the following URL:
See also, the Release Notes, Configuration Guides, and Command References for your device.
Prerequisites for Cisco TrustSec
The following are the prerequisites for establishing a TrustSec network with Catalyst switches:
• TrustSec software on all network devices
• Connectivity between all network devices
• Network availability of the Cisco Secure ACS 5.1, or Cisco ISE operating with a TrustSec license
• Directory, DHCP, DNS, certificate authority, and NTP servers functioning in the network
Cisco TrustSec Configuration Guide
2-2
OL-22192-01
Page 33
Chapter 2 Configuring the Cisco TrustSec Solution
Cisco TrustSec Guidelines and Limitations
Cisco TrustSec has the following guidelines and limitations for Catalyst switches:
• AAA for Cisco TrustSec uses RADIUS and is supported only by the Cisco Secure Access Control
System (ACS), version 5.1 or later.
• You must enable the 802.1X feature globally for Cisco TrustSec to perform NDAC authentication.
If you disable 802.1X globally, you will disable NDAC.
• Cisco TrustSec is supported only on physical interfaces, not on logical interfaces.
• Cisco TrustSec does not support IPv6 in the releases referenced in this guide.
• If the default password is configured on a switch, the connection on that switch should configure the
password to use the default password. If the default password is not configured on a switch, the
connection on that switch should also not configure a password. The configuration of the password
option should be consistent across the deployment network.
• Configure the retry open timer command to a different value on different switches.
Default Settings
Additional Documentation
Table 2-1 lists the default settings for Cisco TrustSec parameters.
Table 2-1Default Cisco TrustSec Parameters
ParametersDefault
Cisco TrustSecDisabled.
SXPDisabled.
SXP default passwordNone.
SXP reconciliation period120 seconds (2 minutes).
SXP retry period60 seconds (1 minute).
Cisco TrustSec CachingDisabled.
Additional Documentation
Release-Specific Documents
Release-Specific Document Title TrustSec Topics
Release Notes for Cisco TrustSec General
Availability Releases
For a list of supported TrustSec features per platform and the minimum required IOS release, see
the Cisco TrustSec Platform Support Matrix at the following URL:
Otherwise, see product release notes for detailed feature introduction information.
OL-22192-02
Cisco TrustSec Configuration Guide
3-1
Page 38
Chapter 3 Configuring Identities, Connections, and SGTs
Configuring Credentials and AAA for a Cisco TrustSec Seed Device
Configuring Credentials and AAA for a Cisco TrustSec Seed
Device
A Cisco TrustSec-capable device that is directly connected to the authentication server, or indirectly
connected but is the first device to begin the TrustSec domain, is called the seed device. Other Cisco
TrustSec network devices are non-seed devices.
To enable NDAC and AAA on the seed switch so that it can begin the Cisco TrustSec domain, perform
these steps:
Detailed Steps for Catalyst 6500, Catalyst 3K
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
Step 8
Step 9
Step 10
Step 11
Router# cts credentials id device-id
password password
Router# configure terminal
Router(config)# aaa new-model
Router(config)# aaa authentication dot1x
default group radius
Router(config)# aaa authorization
network mlist group radius
Router(config)# cts authorization list
mlist
Router(config)# aaa accounting dot1x
default start-stop group radius
Router(config)# radius-server vsa send
authentication
Router(config)# dot1x
system-auth-control
Router(config)# exit
Specifies the Cisco TrustSec device ID and password
for this switch to use when authenticating with other
Cisco TrustSec devices with EAP-FAST. The
device-id argument has a maximum length of 32
characters and is case sensitive.
Enters global configuration mode.
Enables AAA.
Specifies the 802.1X port-based authentication
method as RADIUS.
Configures the switch to use RADIUS authorization
for all network-related service requests.
• mlist—The Cisco TrustSec AAA server group.
Specifies a Cisco TrustSec AAA server group.
Non-seed devices will obtain the server list from the
authenticator.
Enables 802.1X accounting using RADIUS.
Specifies the RADIUS authentication server host
address, service ports, and encryption key.
• ip-addr—The IP address of the authentication
server.
• secret—The encryption key shared with the
authentication server.
Configures the switch to recognize and use
vendor-specific attributes (VSAs) in RADIUS
Access-Requests generated by the switch during the
authentication phase.
Configuring Credentials and AAA for a Cisco TrustSec Non-Seed Device
Configuring Credentials and AAA for a Cisco TrustSec Non-Seed
Device
To enable NDAC and AAA on a non-seed switch so that it can join the Cisco TrustSec domain, perform
these steps:
Detailed Steps for Catalyst 6500
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Router# cts credentials id device-id
password password
Router# configure terminal
Router(config)# aaa new-model
Router(config)# aaa authentication dot1x
default group radius
Router(config)# aaa authorization
network mlist group radius
Router(config)# aaa accounting dot1x
default start-stop group radius
Specifies the Cisco TrustSec device ID and password
for this switch to use when authenticating with other
Cisco TrustSec devices with EAP-FAST. The
device-id argument has a maximum length of 32
characters and is case sensitive.
Enters global configuration mode.
Enables AAA.
Specifies the 802.1X port-based authentication
method as RADIUS.
Configures the switch to use RADIUS authorization
for all network-related service requests.
• mlist—Specifies a Cisco TrustSec AAA server
group.
Enables 802.1X accounting using RADIUS.
OL-22192-02
Cisco TrustSec Configuration Guide
3-3
Page 40
Configuring Credentials and AAA for a Cisco TrustSec Non-Seed Device
CommandPurpose
Step 7
Router(config)# radius-server vsa send
authentication
Configures the switch to recognize and use
vendor-specific attributes (VSAs) in RADIUS
Access-Requests generated by the switch during the
authentication phase.
Step 8
Step 9
NoteYou must also configure the Cisco TrustSec credentials for the switch on the Cisco Identity Services
Chapter 3 Configuring Identities, Connections, and SGTs
Enabling Cisco TrustSec Authentication and MACsec in 802.1X Mode on an Uplink Port
Enabling Cisco TrustSec Authentication and MACsec in 802.1X
Mode on an Uplink Port
You must enable Cisco TrustSec authentication on each interface that will connect to another Cisco
TrustSec device. To configure Cisco TrustSec authentication with 802.1X on an uplink interface to
another Cisco TrustSec device, perform this task:
Detailed Steps for Catalyst 6500
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Router# configure terminal
Router(config)# interface type slot/port
Router(config-if)# cts dot1x
Router(config-if-cts-dot1x)# [no] sap mode-list mode1 [mode2 [mode3 [mode4]]]
Enters global configuration mode.
Enters interface configuration mode for the uplink
interface.
Configures the uplink interface to perform NDAC
authentication.
(Optional) Configures 802.1AE MACsec with the SAP
operation mode on the interface. The interface will
negotiate with the peer for a mutually-acceptable
mode. List the acceptable modes in your order of
preference. Choices for mode are:
NoteIf the interface is not capable of SGT insertion
or data link encryption, no-encap is the default
and the only available SAP operating mode.
(Optional) Configures a reauthentication period to be
used if the authentication server does not specify a
period. If no reauthentication period is specified, the
default period is 86400 seconds.
(Optional) The no form of this command is used when
the peer is incapable of processing an SGT. The no propagate sgt command prevents the interface from
transmitting the SGT to the peer.
Configuring Cisco TrustSec and MACsec in Manual Mode on an Uplink Port
CommandPurpose
Step 9
Router(config-if)# no shutdown
Enables the interface and enables Cisco TrustSec
authentication on the interface.
Step 10
Router(config-if)# exit
Exits interface configuration mode.
Configuration Examples for 802.1X on Uplink Port
Catalyst 6500 Cisco TrustSec authentication in 802.1X mode on an interface using GCM as the preferred
SAP mode; the authentication server did not provide a reauthentication timer:
Chapter 3 Configuring Identities, Connections, and SGTs
Configuring Cisco TrustSec and MACsec in Manual Mode on an
Uplink Port
You can manually configure Cisco TrustSec on an interface. You must manually configure the interfaces
on both ends of the connection. No authentication occurs; policies can be statically configured or
dynamically downloaded from an authentication server by specifying the server’s device identity.
Detailed Steps for Catalyst 6500
CommandPurpose
Step 1
Step 2
Step 3
Router# configure terminal
Router(config)# interfacetype slot/port
Router(config-if)# cts manual
Enters global configuration mode.
Enters interface configuration mode for the uplink
interface.
Enters Cisco TrustSec manual configuration mode.
Cisco TrustSec Configuration Guide
3-6
OL-22192-02
Page 43
Chapter 3 Configuring Identities, Connections, and SGTs
CommandPurpose
Step 4
Router(config-if-cts-manual)# [no] sap pmk key [mode-list mode1 [mode2 [mode3
[mode4]]]]
Configuring Cisco TrustSec and MACsec in Manual Mode on an Uplink Port
(Optional) Configures the SAP pairwise master key
(PMK) and operation mode. SAP is disabled by
default in Cisco TrustSec manual mode.
• key—A hexadecimal value with an even number
of characters and a maximum length of 32
characters.
Router(config-if-cts-manual)# [no] policy
static sgt tag [trusted]
Router(config-if-cts-manual)# [no]
propagate sgt
Router(config-if-cts-manual)# exit
Router(config-if)# shutdown
NoteIf the interface is not capable of SGT
insertion or data link encryption, no-encap
is the default and the only available SAP
operating mode.
(Optional) Configures Identity Port Mapping (IPM)
to allow dynamic authorization policy download
from authorization server based on the identity of
the peer. See the additional usage notes following
this task.
• peer-name—The Cisco TrustSec device ID for
the peer device. The peer name is case sensitive.
NoteEnsure that you have configured the Cisco
TrustSec credentials (see “Configuring
Credentials and AAA for a Cisco TrustSec
Seed Device” section on page 3-2).
(Optional) Configures a static authorization policy.
See the additional usage notes following this task.
• tag—The SGT in decimal format. The range is
1 to 65533.
• trusted—Indicates that ingress traffic on the
interface with this SGT should not have its tag
overwritten.
(Optional) The no form of this command is used
when the peer is incapable of processing an SGT.
The no propagate sgt command prevents the
interface from transmitting the SGT to the peer.
Configuring Cisco TrustSec and MACsec in Manual Mode on an Uplink Port
CommandPurpose
Step 9
Step 10
Router(config-if)# no shutdown
Router(config-if)# exit
Identity Port Mapping (IPM) configures a physical port such that a single SGT is imposed on all traffic
entering the port; this SGT is applied on all IP traffic exiting the port until a new binding is learned. IPM
is configured as follows:
• CTS Manual interface configuration mode with the policy static sgt tag command
• CTS Manual interface configuration mode with the policy dynamic identity peer-name command
where peer-name is designated as non-trusted in the Cisco ACS or Cisco ISE configuration.
IPM is supported for the following ports:
• Routed ports
• Switchports in access mode
• Switchports in trunk mode
When manually configuring Cisco TrustSec on an interface, consider these usage guidelines and
restrictions:
• If no SAP parameters are defined, no Cisco TrustSec encapsulation or encryption will be performed.
Chapter 3 Configuring Identities, Connections, and SGTs
Enables the interface and enables Cisco TrustSec
authentication on the interface.
Exits interface configuration mode.
• If the selected SAP mode allows SGT insertion and an incoming packet carries no SGT, the tagging
policy is as follows:
–
If the policy static command is configured, the packet is tagged with the SGT configured in the
policy static command.
–
If the policy dynamic command is configured, the packet is not tagged.
• If the selected SAP mode allows SGT insertion and an incoming packet carries an SGT, the tagging
policy is as follows:
–
If the policy static command is configured without the trusted keyword, the SGT is replaced
with the SGT configured in the policy static command.
–
If the policy static command is configured with the trusted keyword, no change is made to the
SGT.
–
If the policy dynamic command is configured and the authorization policy downloaded from
the authentication server indicates that the packet source is untrusted, the SGT is replaced with
the SGT specified by the downloaded policy.
–
If the policy dynamic command is configured and the downloaded policy indicates that the
packet source is trusted, no change is made to the SGT.
Configuration Examples for Manual Mode and MACsec on an Uplink Port
Catalyst 6500 TrustSec interface configuration in manual mode:
The ability to manually refresh encryption keys is often part of network administration security
requirements. SAP key refresh ordinarily occurs automatically, triggered by combinations of network
events and non-configurable internal timers.
Regenerating SAP Key on an Interface
Detailed Steps for Catalyst 6500, Catalyst 3850/3650
CommandPurpose
Step 1
cts rekey interface interface_type
slot/port
Example:
c6500switch# cts rekey int gig 1/1
Forces renegotiation of SAP keys on MACsec link.
Verifying the Cisco TrustSec Interface Configuration
To view the TrustSec-relate interface configuration, perform this task:
Detailed Steps for Catalyst 6500
CommandPurpose
Step 1
show cts interface [interface_type
slot/port | brief | summary]
802.1X role: Supplicant
Reauth period applied to link: Not applicable to Supplicant role
Authorization Status: SUCCEEDED
Peer SGT: 11
Peer SGT assignment: Trusted
SAP Status: NOT APPLICABLE
Configured pairwise ciphers:
gcm-encrypt
null
Edison24U> show cts interface gig 1/0/6
Global Dot1x feature is Disabled
Interface GigabitEthernet1/0/6:
CTS is enabled, mode: MANUAL
IFC state: INIT
Authentication Status: NOT APPLICABLE
Cisco TrustSec Configuration Guide
3-10
OL-22192-02
Page 47
Chapter 3 Configuring Identities, Connections, and SGTs
Peer identity: "unknown"
Peer's advertised capabilities: ""
Authorization Status: NOT APPLICABLE
SAP Status: NOT APPLICABLE
Propagate SGT: Enabled
Cache Info:
Expiration : N/A
Cache applied to link : NONE
Statistics:
authc success: 0
authc reject: 0
authc failure: 0
authc no response: 0
authc logoff: 0
sap success: 0
sap fail: 0
authz success: 0
authz fail: 0
port auth fail: 0
L3 IPM: disabled.
Manually Configuring a Device SGT
Manually Configuring a Device SGT
In normal Cisco TrustSec operation, the authentication server assigns an SGT to the device for packets
originating from the device. You can manually configure an SGT to be used if the authentication server
is not accessible, but an authentication server-assigned SGT will take precedence over a
manually-assigned SGT.
To manually configure an SGT on the device, perform this task:
Detailed Steps for Catalyst 6500, 3850, 3750-X
CommandPurpose
Step 1
Step 2
Step 3
Configuration Examples for Manually Configuring a Device SGT
Switch# configure terminal
Switch(config)# cts sgt tag
Enters global configuration mode.
Configures the SGT for packets sent from the device.
The tag argument is in decimal format. The range is 1
to 65533.
Switch(config)# exit
Exits configuration mode.
Catalyst 6500, Catalyst 3850, and Catalyst 3750-X:
For Identity Port Mapping in cts interface manual mode, see the following section:
• Configuring Cisco TrustSec and MACsec in Manual Mode on an Uplink Port, page 3-6
Subnet to SGT Mapping
Subnet to SGT mapping binds an SGT to all host addresses of a specified subnet. TrustSec imposes the
SGT on an incoming packet when the packet’s source IP address belongs to the specified subnet. The
subnet and SGT are specified in the CLI with the cts role-based sgt-map net_address/prefix sgt sgt_number global configuration command. A single host may also be mapped with this command.
In IPv4 networks, SXPv3, and more recent versions, can receive and parse subnet net_address/prefix
strings from SXPv3 peers. Earlier SXP versions convert the subnet prefix into its set of host bindings
before exporting them to an SXP listener peer.
For example, the IPv4 subnet 198.1.1.0/29 is expanded as follows (only 3 bits for host addresses):
• Host addresses 198.1.1.1 to 198.1.1.7–tagged and propagated to SXP peer.
• Network and broadcast addresses 198.1.1.0 and 198.1.1.8— not tagged and not propagated.
To limit the number of subnet bindings SXPv3 can export, use the cts sxp mapping network-map global
configuration command.
Subnet bindings are static, there is no learning of active hosts. They can be used locally for SGT
imposition and SGACL enforcement. Packets tagged by subnet to SGT mapping can be propagated on
Layer 2 or Layer 3 TrustSec links.
For IPv6 networks, SXPv3 cannot export subnet bindings to SXPv2 or SXPv1 peers.
Default Settings
There are no default settings for this feature.
Configuring Subnet to SGT Mapping
This section includes the following topics:
• Verifying Subnet to SGT Mapping Configuration, page 3-15
• Configuring Subnet to SGT Mapping, page 3-12
Cisco TrustSec Configuration Guide
3-12
OL-22192-02
Page 49
Chapter 3 Configuring Identities, Connections, and SGTs
Restrictions
• An IPv4 subnetwork with a /31 prefix cannot be expanded.
• Subnet host addresses cannot be bound to SGTs when the network-map bindings parameter is less
than the total number of subnet hosts in the specified subnets, or when bindings is 0.
• IPv6 expansions and propagation only occurs when SXP speaker and listener are running SXPv3,
or more recent versions.
Detailed Steps for Catalyst 6500
CommandPurpose
Step 1
Step 2
Step 3
config t
Example:
switch# config t
switch(config)#
[no] cts sxp mapping network-mapbindings
Example:
switch(config)# cts sxp mapping network-map 10000
[no] cts role-based sgt-map
ipv4_address/prefix sgt number
Example:
switch(config)# cts role-based sgt-map
10.10.10.10/29 sgt 1234
Manually Configuring IP-Address-to-SGT Mapping
Enters global configuration mode.
Configures the Subnet to SGT Mapping host count
constraint. The bindings argument specifies the
maximum number of subnet IP hosts that can be
bound to SGTs and exported to the SXP listener.
• bindings—(0 to 65,535)
default is 0 (no expansions performed)
(IPv4) Specifies a subnet in CIDR notation. Use the
[no] form of the command to unconfigure the Subnet
to SGT mapping. The number of bindings specified
in Step 2 should match or exceed the number of host
addresses in the subnet (excluding network and
broadcast addresses). The sgt number keyword
specifies the Security Group Tag to be bound to
every host address in the specified subnet.
• ipv4_address—Specifies the IPv4 network
address in dotted decimal notation.
• prefix—(0 to 30). Specifies the number of bits in
Chapter 3 Configuring Identities, Connections, and SGTs
(IPv6) Specifies a subnet in colon hexadecimal
notation. Use the [no] form of the command to
unconfigure the Subnet to SGT mapping.
The number of bindings specified in Step 2 should
match or exceed the number of host addresses in the
subnet (excluding network and broadcast
addresses). The sgt number keyword specifies the
Security Group Tag to be bound to every host
address in the specified subnet.
• ipv6_address—Specifies IPv6 network address
in colon hexadecimal notation.
• prefix—(0 to128). Specifies the number of bits
in the network address.
• sgt number—(0 to 65,535). Specifies the
Security Group Tag (SGT) number.
Exits global configuration mode.
Step 6
Step 7
Example:
switch(config)# exit
switch#
s
how running-config | includesearch_string
Example:
switch# show running-config | include sgt 1234
switch# show running-config | include network-map
copy running-config startup-config
Example:
switch# copy running-config startup-config
Verifies that the cts role-based sgt-map and the
cts sxp mapping network-map commands are in
the running configuration.
Copies the running configuration to the startup
configuration.
Cisco TrustSec Configuration Guide
3-14
OL-22192-02
Page 51
Chapter 3 Configuring Identities, Connections, and SGTs
Verifying Subnet to SGT Mapping Configuration
To display Subnet to SGT Mapping configuration information, perform one of the following tasks:
CommandPurpose
show cts sxp connectionsDisplays the SXP speaker and listener
show cts sxp sgt-mapDisplays the IP to SGT bindings exported to the
show running-config Verifies that the Subnet to SGT configurations
For detailed information about the fields in the output from these commands, refer to Chapter 7, “Cisco
TrustSec Command Summary.”
Configuration Examples for Subnet to SGT Mapping
Manually Configuring IP-Address-to-SGT Mapping
connections with their operational status.
SXP listeners.
commands are in the running configuration file.
The following example shows how to configure IPv4 Subnet to SGT Mapping between two
Catalyst 6500 series switches running SXPv3 (Switch1 and Switch2):
Step 1Configure SXP speaker/listener peering between Switch1 (1.1.1.1) and Switch 2 (2.2.2.2).
The VLAN to SGT mapping feature binds an SGT to packets from a specified VLAN. This simplifies
the migration from legacy to TrustSec-capable networks as follows:
• Supports devices that are not TrustSec-capable but are VLAN-capable, such as, legacy switches,
wireless controllers, access points, VPNs, etc.
• Provides backward compatibility for topologies where VLANs and VLAN ACLs segment the
network, such as, server segmentation in data centers.
The VLAN to SGT binding is configured with the cts role-based sgt-map vlan-list global configuration
command.
When a VLAN is assigned a gateway that is a switched virtual interface (SVI) on a TrustSec-capable
switch, and IP Device Tracking is enabled on that switch, then TrustSec can create an IP to SGT binding
for any active host on that VLAN mapped to the SVI subnet.
IP-SGT bindings for the active VLAN hosts are exported to SXP listeners. The bindings for each mapped
VLAN are inserted into the IP-to-SGT table associated with the VRF the VLAN is mapped to by either
its SVI or by a cts role-based l2-vrf cts global configuration command.
VLAN to SGT bindings have the lowest priority of all binding methods and are ignored when bindings
from other sources are received, such as from SXP or CLI host configurations. Binding priorities are
listing in the “Binding Source Priorities” section on page 3-22.
Cisco TrustSec Configuration Guide
3-16
OL-22192-02
Page 53
Chapter 3 Configuring Identities, Connections, and SGTs
Default Settings
There are no default settings.
Configuring VLAN to SGT Mapping
This section includes the following topics:
• Task Flow for Configuring VLAN-SGT Mapping, page 3-17
Task Flow for Configuring VLAN-SGT Mapping
• Create a VLAN on the TrustSec switch with the same VLAN_ID of the incoming VLAN.
• Create an SVI for the VLAN on the TrustSec switch to be the default gateway for the endpoint
clients.
• Configure the TrustSec switch to apply an SGT to the VLAN traffic.
• Enable IP Device tracking on the TrustSec switch.
• Verify that VLAN to SGT mapping occurs on the TrustSec switch.
Manually Configuring IP-Address-to-SGT Mapping
Detailed Steps for Catalyst 6500
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
config t
Example:
TS_switchswitch# config t
TS_switchswitch(config)#
The host added to the IP Device Tracking table is
monitored with periodic ARP probes. Hosts that fail
to respond are removed from the table.
Exits Global configuration mode.
(Optional) Displays the VLAN to SGT mappings.
Cisco TrustSec Configuration Guide
3-18
OL-22192-02
Page 55
Chapter 3 Configuring Identities, Connections, and SGTs
CommandPurpose
Step 13
Step 14
show ip device tracking {all|interface|ip|mac}
Example:
TS_switch# show ip device tracking all
copy running-config startup-config
Example:
TS_switch# copy running-config
startup-config
Verifying VLAN to SGT Mapping
To display VLAN to SGT configuration information, use the following show commands:
CommandPurpose
show ip device tracking Displays the status of IP Device Tracking which
show cts role-based sgt-mapDisplays IP address to SGT bindings.
Manually Configuring IP-Address-to-SGT Mapping
(Optional) Verifies the operational status of IP
Device tracking.
(Optional) Copies the running configuration to the
startup configuration.
identifies the IP addresses of active hosts on a
VLAN.
For detailed information about the fields in the output from these commands, refer to Chapter 7, “Cisco
TrustSec Command Summary,” or the “Cisco IOS 15.0SY Security and VPN Command Reference.”
Configuration Example for VLAN to SGT Mapping for a Single Host Over an Access Link
In the following example, a single host connects to VLAN 100 on an access switch. The access switch
has an access mode link to a Catalyst 6500 series TrustSec software-capable switch. A switched virtual
interface on the TrustSec switch is the default gateway for the VLAN 100 endpoint (IP Address
10.1.1.1). The TrustSec switch imposes Security Group Tag (SGT) 10 on packets from VLAN 100.
Step 1Create VLAN 100 on an access switch.
access_switch# config t
access_switch(config)# vlan 100
access_switch(config-vlan)# no shutdown
access_switch(config-vlan)# exit
access_switch(config)#
Step 2Configure the interface to the TrustSec switch as an access link. Configurations for the endpoint access
TS_switch(config)# vlan 100
TS_switch(config-vlan)# no shutdown
TS_switch(config-vlan)# end
TS_switch#
OL-22192-02
Cisco TrustSec Configuration Guide
3-19
Page 56
Manually Configuring IP-Address-to-SGT Mapping
Step 4Create an SVI as the gateway for incoming VLAN 100.
TS_switch(config)# interface vlan 100
TS_switch(config-if)# ip address 10.1.1.2 255.0.0.0
TS_switch(config-if)# no shutdown
TS_switch(config-if)# end
TS_switch(config)#
Step 5Assign Security Group Tag (SGT) 10 to hosts on VLAN 100.
Step 6Enable IP Device Tracking on the TrustSec switch. Verify that it is operating.
TS_switch(config)# ip device tracking
TS_switch# show ip device tracking all
IP Device Tracking = Enabled
IP Device Tracking Probe Count = 3
IP Device Tracking Probe Interval = 100
-------------------------------------------------------------------- IP Address MAC Address Vlan Interface STATE
--------------------------------------------------------------------Total number interfaces enabled: 1
Vlan100
Chapter 3 Configuring Identities, Connections, and SGTs
Step 7(Optional). PING the default gateway from an endpoint (in this example, host IP Address 10.1.1.1).
Verify that SGT 10 is being mapped to VLAN 100 hosts.
TS_switch# show cts role-based sgt-map all
Active IP-SGT Bindings Information
IP Address SGT Source
============================================
10.1.1.1 10 VLAN
IP-SGT Active Bindings Summary
============================================
Total number of VLAN bindings = 1
Total number of CLI bindings = 0
Total number of active bindings = 1
Layer 3 Logical Interface to SGT Mapping (L3IF–SGT Mapping)
L3IF-SGT mapping can directly map SGTs to traffic of any of the following Layer 3 interfaces
regardless of the underlying physical interface:
• Routed port
• SVI (VLAN interface)
• Layer3 subinterface of a Layer2 port
• Tunnel interface
Cisco TrustSec Configuration Guide
3-20
OL-22192-02
Page 57
Chapter 3 Configuring Identities, Connections, and SGTs
Use the cts role-based sgt-map interface global configuration command to specify either a specific
SGT number, or a Security Group Name (whose SGT association is dynamically acquired from a Cisco
ISE or a Cisco ACS access server).
In cases where Identity Port Mapping (cts interface manual sub mode configuration) and L3IF-SGT
require different IP to SGT bindings, IPM takes precedence. All other conflicts among IP to SGT binding
are resolved according to the priorities listing in the “Binding Source Priorities” section on page 3-22.
Feature History for L3IF-SGT Mapping
Default Settings
There are no default settings.
Configuring L3IF to SGT Mapping
Detailed steps Catalyst 6500
Manually Configuring IP-Address-to-SGT Mapping
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Router# configure terminal
Router(config)# cts role-based sgt-map
interface type slot/port [security-group
name | sgt number]
To display L3IF to SGT configuration information, use the following show commands:
CommandPurpose
show cts role-based sgt-map allDisplays all IP address to SGT bindings.
Enters global configuration mode.
An SGT is imposed on ingress traffic to the specified
interface.
• interface type slot/port—Displays list of
available interfaces.
• security-group name— Security Group name to
SGT pairings are configured on the Cisco ISE or
Cisco ACS.
• sgt number—(0 to 65,535). Specifies the Security
Group Tag (SGT) number.
Exits configuration mode.
Verify that ingressing traffic is tagged with the
specified SGT.
OL-22192-02
Cisco TrustSec Configuration Guide
3-21
Page 58
Chapter 3 Configuring Identities, Connections, and SGTs
Manually Configuring IP-Address-to-SGT Mapping
Configuration Example for L3IF to SGT Mapping on an Ingress Port
In the following example a Layer 3 interface of a Catalyst 6500 series switch linecard is configured to
tag all ingressing traffic with SGT 3. Prefixes of attached subnets are already known.
Step 1Configure the interface.
Switch# config t
Switch
(config)# interface gigabitEthernet 6/3 sgt 3
Switch(config)# exit
Step 2Verify that the ingressing traffic to the interface is tagged appropriately.
Router# show cts role-based sgt-map all
IP Address SGT Source
============================================
15.1.1.15 4 INTERNAL
17.1.1.0/24 3 L3IF
21.1.1.2 4 INTERNAL
31.1.1.0/24 3 L3IF
31.1.1.2 4 INTERNAL
43.1.1.0/24 3 L3IF
49.1.1.0/24 3 L3IF
50.1.1.0/24 3 L3IF
50.1.1.2 4 INTERNAL
51.1.1.1 4 INTERNAL
52.1.1.0/24 3 L3IF
81.1.1.1 5 CLI
102.1.1.1 4 INTERNAL
105.1.1.1 3 L3IF
111.1.1.1 4 INTERNAL
IP-SGT Active Bindings Summary
============================================
Total number of CLI bindings = 1
Total number of L3IF bindings = 7
Total number of INTERNAL bindings = 7
Total number of active bindings = 15
Binding Source Priorities
TrustSec resolves conflicts among IP-SGT binding sources with a strict priority scheme. For example,
an SGT may be applied to an interface with the policy {dynamic identity peer-name | static sgt tag}
CTS Manual interface mode command (Identity Port Mapping).
from lowest (1) to highest (7), is as follows:
1. VLAN—Bindings learned from snooped ARP packets on a VLAN that has VLAN-SGT mapping
configured.
2. CLI— Address bindings configured using the IP-SGT form of the cts role-based sgt-map global
configuration command.
3. Layer 3 Interface—(L3IF) Bindings added due to FIB forwarding entries that have paths through
one or more interfaces with consistent L3IF-SGT mapping or Identity Port Mapping on routed ports.
4. SXP—Bindings learned from SXP peers.
5. IP_ARP—Bindings learned when tagged ARP packets are received on a CTS capable link.
The current priority enforcement order,
Cisco TrustSec Configuration Guide
3-22
OL-22192-02
Page 59
Chapter 3 Configuring Identities, Connections, and SGTs
Router(config)# [no] cts server test
{server-IP-address | all} {deadtime seconds | enable | idle-time seconds}
Router(config)# exit
Router# show cts server-list
Enters global configuration mode.
(Optional) Specifies how long a server in the group
should not be selected for service once it has been
marked as dead. The default is 20 seconds; the range
is 1 to 864000.
(Optional) Enables RADIUS load balancing for the
Cisco TrustSec private server group and chooses the
server with the least outstanding transactions. By
default, no load balancing is applied. The default
transactions is 25.
The ignore-preferred-server keyword instructs the
switch not to try to use the same server throughout a
session.
(Optional) Configures the server-liveliness test for a
specified server or for all servers on the dynamic
server list. By default, the test is enabled for all
servers. The default idle-time is 60 seconds; the range
is from 1 to 14400.
Exits configuration mode.
Displays status and configuration details of a list of
Cisco TrustSec servers.
This example shows how to configure server settings and how to display the Cisco TrustSec server list:
Router(config)# cts server test all deadtime 20
Router(config)# cts server test all enable
Router(config)# cts server test 10.15.20.102 idle-time 120
Router(config)# exit
Router# show cts server-list
CTS Server Radius Load Balance = ENABLED
Method = least-outstanding
OL-22192-02
Cisco TrustSec Configuration Guide
3-23
Page 60
Automatically Configuring a New or Replacement Password with the Authentication Server
Batch size = 50
Ignore preferred server
Server Group Deadtime = 20 secs (default)
Global Server Liveness Automated Test Deadtime = 20 secs
Global Server Liveness Automated Test Idle Time = 60 mins
Global Server Liveness Automated Test = ENABLED (default)
Chapter 3 Configuring Identities, Connections, and SGTs
Automatically Configuring a New or Replacement Password
with the Authentication Server
As an alternative to manually configuring the password between the switch and the authentication server,
you can initiate a password negotiation from the switch. To configure the password negotiation, perform
this task:
Detailed Steps for Catalyst 6500
CommandPurpose
Step 1
Router# cts change-password server
ip-address port {key secret | a-id a-id}
Initiates a password negotiation between the switch
and the authentication server.
• ip-address—The IP address of the authentication
server.
• port—The UDP port of the authentication server.
• key secret—The RADIUS shared secret of the
authentication server.
• a-id a-id—The A-ID associated with the
authentication server.
Cisco TrustSec Configuration Guide
3-24
OL-22192-02
Page 61
CHAP T ER
4
Configuring SGT Exchange Protocol over TCP
(SXP) and Layer 3 Transport
Revised: May 28, 2010, OL-22192-01
You can use the SGT Exchange Protocol (SXP) to propagate the SGTs across network devices that do
not have hardware support for Cisco TrustSec. This section describes how to configure Cisco TrustSec
SXP on switches in your network.
For a list of supported TrustSec features per platform and the minimum required IOS release, see
the Cisco TrustSec Platform Support Matrix at the following URL: (final URL posted with TS 4.0)
Otherwise, see product release notes for detailed feature introduction information.
Cisco TrustSec Configuration Guide
OL-22192-01
4-1
Page 62
Chapter 4 Configuring SGT Exchange Protocol over TCP (SXP) and Layer 3 Transport
Configuring Cisco TrustSec SXP
Configuring Cisco TrustSec SXP
To configure Cisco TrustSec SXP, follow these steps:
Step 1Enable the Cisco TrustSec feature (see the “Configuring Identities, Connections, and SGTs” chapter).
Step 2Enable Cisco TrustSec SXP (see the “Enabling Cisco TrustSec SXP” section on page 4-2).
Step 3Configure SXP peer connections (see the “Configuring an SXP Peer Connection” section on page 4-2).
Enabling Cisco TrustSec SXP
You must enable Cisco TrustSec SXP before you can configure peer connections. To enable Cisco
TrustSec SXP, perform this task:
Detailed Steps for Catalyst 6500
CommandPurpose
Step 1
Step 2
Step 3
Router# configure terminal
Router(config)# [no] cts sxp enable
Router(config)# exit
Configuring an SXP Peer Connection
You must configure the SXP peer connection on both of the devices. One device is the speaker and the
other is the listener. When using password protection, make sure to use the same password on both ends.
NoteIf a default SXP source IP address is not configured and you do not configure an SXP source address in
the connection, the Cisco TrustSec software derives the SXP source IP address from existing local IP
addresses. The SXP source address might be different for each TCP connection initiated from the switch.
Enters global configuration mode.
Enables SXP for Cisco TrustSec.
Exits configuration mode.
Cisco TrustSec Configuration Guide
4-2
OL-22192-01
Page 63
Chapter 4 Configuring SGT Exchange Protocol over TCP (SXP) and Layer 3 Transport
To configure the SXP peer connection, perform this task:
The optional source keyword specifies the IPv4
address of the source device. If no address is specified,
the connection will use the default source address, if
configured, or the address of the port.
The password keyword specifies the password that
SXP will use for the connection using the following
options:
• default—Use the default SXP password you
configured using the cts sxp default password
command.
Step 3
Step 4
• none—Do not use a password.
The mode keyword specifies the role of the remote
peer device:
• local—The specified mode refers to the local
device.
• peer—The specified mode refers to the peer
device.
• speaker—Default. Specifies that the device is the
speaker in the connection.
• listener—Specifies that the device is the listener
in the connection.
The optional vrf keyword specifies the VRF to the
peer. The default is the default VRF.
Router(config)# exit
Router# show cts sxp connections
Exits configuration mode.
(Optional) Displays the SXP connection information.
This example shows how to enable SXP and configure the SXP peer connection on Switch A, a speaker,
for connection to Switch B, a listener:
By default, SXP uses no password when setting up connections. You can configure a default SXP
password for the switch. In Cisco IOS Release 12.2(50)SY and later releases, you can specify an
encrypted password for the SXP default password.
To configure a default SXP password, perform this task:
Configures the SXP default password. You can enter
either a clear text password (using the 0 or no option)
or an encrypted password (using the 6 or 7 option).
The maximum password length is 32 characters.
Exits configuration mode.
This example shows how to configure a default SXP password:
SXP uses the default source IP address for all new TCP connections where a source IP address is not
specified. There is no effect on existing TCP connections when you configure the default SXP source IP
address.
To configure a default SXP source IP address, perform this task:
Detailed Steps for Catalyst 6500
CommandPurpose
Step 1
Step 2
Step 3
Router# configure terminal
Router(config)# cts sxp default
source-ip src-ip-addr
Router(config)# exit
Enters configuration mode.
Configures the SXP default source IP address.
Exits configuration mode.
This example shows how to configure an SXP default source IP address:
Chapter 4 Configuring SGT Exchange Protocol over TCP (SXP) and Layer 3 Transport
Changing the SXP Reconciliation Period
After a peer terminates an SXP connection, an internal hold-down timer starts. If the peer reconnects
before the internal hold-down timer expires, the SXP reconciliation period timer starts. While the SXP
reconciliation period timer is active, the Cisco TrustSec software retains the SGT mapping entries
learned from the previous connection and removes invalid entries. The default value is 120 seconds (2
minutes). Setting the SXP reconciliation period to 0 seconds disables the timer and causes all entries
from the previous connection to be removed.
To change the SXP reconciliation period, perform this task:
Detailed Steps for Catalyst 6500
CommandPurpose
Step 1
Step 2
Step 3
Router# configure terminal
Router(config)# cts sxp reconciliation
period seconds
Router(config)# exit
Enters configuration mode.
Changes the SXP reconciliation timer. The default
value is 120 seconds (2 minutes). The range is from 0
to 64000.
Exits configuration mode.
Changing the SXP Reconciliation Period
Changing the SXP Retry Period
The SXP retry period determines how often the Cisco TrustSec software retries an SXP connection.
When an SXP connection is not successfully set up, the Cisco TrustSec software makes a new attempt
to set up the connection after the SXP retry period timer expires. The default value is 120 seconds.
Setting the SXP retry period to 0 seconds disables the timer and retries are not attempted.
To change the SXP retry period, perform this task:
Detailed Steps for Catalyst 6500
CommandPurpose
Step 1
Step 2
Step 3
Router# configure terminal
Router(config)# cts sxp retry period
seconds
Router(config)# exit
Enters configuration mode.
Changes the SXP retry timer. The default value is 120
seconds (2 minutes). The range is from 0 to 64000.
Exits configuration mode.
Creating Syslogs to Capture Changes of IP Address to SGT
Mapping Learned Through SXP
When the cts sxp log binding-changes global configuration command is executed, SXP syslogs (sev 5
syslog) are generated whenever a change to IP address to SGT binding occurs (add, delete, change).
These changes are learned and propagated on the SXP connection.
The default is no cts sxp log binding-changes.
OL-22192-01
Cisco TrustSec Configuration Guide
4-5
Page 66
Chapter 4 Configuring SGT Exchange Protocol over TCP (SXP) and Layer 3 Transport
Verifying the SXP Connections
To enable logging of binding changes, perform the following task:
Detailed Steps for Catalyst 6500
CommandPurpose
Step 1
Step 2
Router# configure terminal
Router(config)# cts sxp log binding-changes
Verifying the SXP Connections
To view the SXP connections, perform this task:
CommandPurpose
Step 1
Router# show cts sxp connections [brief]
Enters configuration mode.
Turns on logging for IP to SGT binding changes.
Displays SXP status and connections.
This example shows how to view the SXP connections:
Router# show cts sxp connections
SXP : Enabled
Default Password : Set
Default Source IP: 10.10.1.1
Connection retry open period: 10 secs
Reconcile period: 120 secs
Retry open timer is not running
---------------------------------------------Peer IP : 10.20.2.2
Source IP : 10.10.1.1
Conn status : On
Conn Version : 2
Connection mode : SXP Listener
Connection inst# : 1
TCP conn fd : 1
TCP conn password: default SXP password
Duration since last state change: 0:00:21:25 (dd:hr:mm:sec)
Total num of SXP Connections = 1
Configuring Layer 3 SGT Transport Between Cisco TrustSec
Domains
Feature NameReleasesFeature Information
L3 SGT Transport12.2(50) SYThis feature was introduced on the Catalyst 6500 series
You can configure Layer 3 SGT Transport on Cisco TrustSec gateway devices on the edges of a network
domain that has no Cisco TrustSec-capable devices.
Cisco TrustSec Configuration Guide
4-6
switches.
OL-22192-01
Page 67
Chapter 4 Configuring SGT Exchange Protocol over TCP (SXP) and Layer 3 Transport
To configure Layer 3 SGT Transport, perform this task:
Configuring Layer 3 SGT Transport Between Cisco TrustSec Domains
Enters global configuration mode.
(Optional) Specifies the fallback traffic policy to be
applied when the authentication server is not available
for downloading the traffic policy.
• acl-name—The name of a traditional interface
ACL already configured on the device.
See the additional usage notes following this task.
(Optional) Specifies the fallback exception policy to
be applied when the authentication server is not
available for downloading the exception policy.
See the additional usage notes following this task.
Specifies an interface and enters interface
configuration mode.
(Configured on a Cisco TrustSec-capable physical
port) Specifies that egress traffic on this interface will
use Cisco TrustSec Layer 3 SGT transport
encapsulation as determined by the traffic and
exception policies.
(Configured on a routed port or SVI) Specifies that
egress traffic on this interface will use Cisco TrustSec
Layer 3 SGT transport encapsulation as determined by
the traffic and exception policies.
Exits interface configuration and global configuration
modes.
(Optional) Displays the Layer 3 SGT transport
configuration on the interfaces.
When configuring Cisco TrustSec Layer 3 SGT transport, consider these usage guidelines and
restrictions:
• The Cisco TrustSec Layer 3 SGT transport feature can be configured only on ports that support
hardware encryption.
• Traffic and exception policies for Cisco TrustSec Layer 3 SGT transport have the following
restrictions:
–
The policies must be configured as IP extended or IP named extended ACLs.
–
The policies must not contain deny entries.
–
If the same ACE is present in both the traffic and exception policies, the exception policy takes
precedence. No Cisco TrustSec Layer 3 encapsulation will be performed on packets matching
that ACE.
OL-22192-01
Cisco TrustSec Configuration Guide
4-7
Page 68
Chapter 4 Configuring SGT Exchange Protocol over TCP (SXP) and Layer 3 Transport
Configuring Cisco TrustSec Reflector for Cisco TrustSec-Incapable Switching Modules
• Traffic and exception policies can be downloaded from the authentication server (if supported by
your Cisco IOS Release) or manually configured on the device. The policies will be applied based
on these rules:
–
If a traffic policy or an exception policy is downloaded from the authentication server, it will
take precedence over any manually configured traffic or exception policy.
–
If the authentication server is not available but both a traffic policy and an exception policy have
been manually configured, the manually configured policies will be used.
–
If the authentication server is not available but a traffic policy has been configured with no
exception policy, no exception policy is applied. Cisco TrustSec Layer 3 encapsulation will be
applied on the interface based on the traffic policy.
–
If the authentication server is not available and no traffic policy has been manually configured,
no Cisco TrustSec Layer 3 encapsulation will be performed on the interface.
This example shows how to configure Layer 3 SGT Transport to a remote Cisco TrustSec domain:
Router# configure terminal
Router(config)# ip access-list extended traffic-list
Router(config-ext-nacl)# permit ip any 10.1.1.0 0.0.0.255
Router(config-ext-nacl)# exit
Router(config)# ip access-list extended exception-list
Router(config-ext-nacl)# permit ip any 10.2.2.0 0.0.0.255
Router(config-ext-nacl)# exit
Router(config)# cts policy layer3 ipv4 traffic traffic-sgt
Router(config)# cts policy layer3 ipv4 exception exception-list
Router(config)# interface gi2/1
Router(config-if)# cts layer3 trustsec ipv4 forwarding
Router(config-if)# shutdown
Router(config-if)# no shutdown
Router(config-if)# exit
Router(config)# exit
Configuring Cisco TrustSec Reflector for Cisco
TrustSec-Incapable Switching Modules
NoteThe Cisco TrustSec supervisor ingress reflector and the Cisco TrustSec egress reflector are mutually
exclusive. Do not enable both functions.
Egress reflector should be disabled when ERSPAN is configured.
To configure the Cisco TrustSec supervisor ingress reflector function, perform this task.
Detailed Steps for Catalyst 6500
CommandPurpose
Step 1
Step 2
Router# configure terminal
Router(config)# [no] platform cts ingress
Enters configuration mode.
Activates the Cisco TrustSec supervisor ingress
reflector.
Cisco TrustSec Configuration Guide
4-8
OL-22192-01
Page 69
Chapter 4 Configuring SGT Exchange Protocol over TCP (SXP) and Layer 3 Transport
CommandPurpose
Step 3
Step 4
Router(config)# exit
Router# show platform cts
This example shows how to configure a Cisco TrustSec ingress reflector:
NoteBefore disabling the Cisco TrustSec egress reflector, you must remove power from the Cisco
TrustSec-incapable switching modules.
Configuring Cisco TrustSec Caching
Enters configuration mode.
Activates the Cisco TrustSec egress reflector.
Exits configuration mode.
Displays Cisco TrustSec reflector mode (Ingress,
Egress, Pure, or No CTS).
Enabling Cisco TrustSec Caching
For quick recovery from brief outages, you can enable caching of authentication, authorization, and
policy information for Cisco TrustSec connections. Caching allows Cisco TrustSec devices to use
unexpired security information to restore links after an outage without requiring a full reauthentication
OL-22192-01
Cisco TrustSec Configuration Guide
4-9
Page 70
Configuring Cisco TrustSec Caching
of the Cisco TrustSec domain. The Cisco TrustSec devices will cache security information in DRAM. If
non-volatile (NV) storage is also enabled, the DRAM cache information will also be stored to the NV
memory. The contents of NV memory populate DRAM during a reboot.
NoteDuring extended outages, the Cisco TrustSec cache information is likely to become outdated.
To enable Cisco TrustSec caching, perform this task:
Chapter 4 Configuring SGT Exchange Protocol over TCP (SXP) and Layer 3 Transport
Enters configuration mode.
Enables caching of authentication, authorization and
environment-data information to DRAM. The default
is disabled.
The no form of this command deletes all cached
information from DRAM and non-volatile storage.
When DRAM caching is enabled, enables DRAM
cache updates to be written to non-volatile storage.
Also enables DRAM cache to be initially populated
from non-volatile storage when the device boots.
Exits configuration mode.
This example shows how to configure Cisco TrustSec caching, including non-volatile storage:
• Enabling SGACL Policy Enforcement Per Interface, page 5-3
• Enabling SGACL Policy Enforcement on VLANs, page 5-3
• Manually Configuring SGACL Policies, page 5-4
• Displaying SGACL Policies, page 5-6
• Refreshing the Downloaded SGACL Policies, page 5-7
5
Cisco TrustSec SGACL Feature Histories
For a list of supported TrustSec features per platform and the minimum required IOS release, see
the Cisco TrustSec Platform Support Matrix at the following URL:
Otherwise, see product release notes for detailed feature introduction information.
OL-22192-02
Cisco TrustSec Switch Configuration Guide
5-1
Page 72
SGACL Policy Configuration Process
SGACL Policy Configuration Process
Follow these steps to configure and enable Cisco TrustSec SGACL policies:
Step 1Configuration of SGACL policies should be done primarily through the Policy Management function of
the Cisco Secure ACS or the Cisco Identity Services Engine (see the Configuration Guide for the Cisco
Secure ACS or the Cisco Identity Services Engine User Guide).
If you are not using AAA on a Cisco Secure ACS or a Cisco ISE to download the SGACL policy
configuration, you can manually configure the SGACL mapping and policies (see the “Manually
Configuring SGACL Policies” section on page 5-4 and the “Manually Configuring SGACL Policies”
section on page 5-4).
NoteAn SGACL policy downloaded dynamically from the Cisco Secure ACS or a Cisco ISE will
override any conflicting locally-defined policy.
Step 2To enable SGACL policy enforcement on egress traffic on routed ports, enable SGACL policy
enforcement globally as described in the “Enabling SGACL Policy Enforcement Globally” section on
page 5-2.
Step 3To enable SGACL policy enforcement on switched traffic within a VLAN, or on traffic that is forwarded
to an SVI associated with a VLAN, enable SGACL policy enforcement for specific VLANs as described
in the “Enabling SGACL Policy Enforcement on VLANs” section on page 5-3.
Chapter 5 Configuring SGACL Policies
Enabling SGACL Policy Enforcement Globally
You must enable SGACL policy enforcement globally for Cisco TrustSec-enabled routed interfaces.
To enable SGACL policy enforcement on routed interfaces, perform this task:
CommandPurpose
Step 1
Step 2
Configuration Examples for Enabling SGACL Policy Enforcement Globally
Router# configure terminal
Router(config)# cts role-based
enforcement
Catalyst 6500, Catalyst 3850:
Switch(config)# cts role-based enforcement
Enters global configuration mode.
Enables Cisco TrustSec SGACL policy enforcement
on routed interfaces.
Cisco TrustSec Switch Configuration Guide
5-2
OL-22192-02
Page 73
Chapter 5 Configuring SGACL Policies
Enabling SGACL Policy Enforcement Per Interface
Enabling SGACL Policy Enforcement Per Interface
You must first enable SGACL policy enforcement globally for Cisco TrustSec-enabled routed interfaces.
This feature is not supported on Port Channel interfaces.
To enable SGACL policy enforcement on Layer 3 interfaces, perform this task:
Detailed Steps Catalyst 6500
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Router# configure terminal
Router(config)# interface gigabit 6/2
Router(config-if)# cts role-based enforcement
Router(config-if)# do show cts interface
Enters global configuration mode.
Specifies interface on which to enable or
disable SGACL enforcement.
Enables Cisco TrustSec SGACL policy
enforcement on routed interfaces.
Verifies that SGACL enforcement is enabled.
Configuration Examples for Enabling SGACL Policy Enforcement Per Interface
You must enable SGACL policy enforcement on specific VLANs to apply access control to switched
traffic within a VLAN, or to traffic that is forwarded to an SVI associated with a VLAN.
To enable SGACL policy enforcement on a VLAN or a VLAN list, perform this task:
Detailed Steps Catalyst 6500
CommandPurpose
Step 1
Step 2
Router# configure terminal
Router(config)# cts role-based
enforcement vlan-list vlan-list
Enters global configuration mode.
Enables Cisco TrustSec SGACL policy enforcement
on the VLAN or VLAN list.
Configuration Examples for Enabling SGACL Policy Enforcement on VLANs
A role-based access control list bound to a range of SGTs and DGTs forms an SGACL, a TrustSec policy
enforced on egress traffic. Configuration of SGACL policies are best done through the policy
management functions of the Cisco ISE or the Cisco Secure ACS. To manually (that is, locally)
configure SGACL policies, do the following:
1. Configure a role-based ACL.
2. Bind the role-based ACL to a range of SGTs.
NoteAn SGACL policy downloaded dynamically from the Cisco ISE or Cisco ACS overrides any conflicting
manually configured policy.
Manually Configuring and Applying IPv4 SGACL Policies
Detailed Steps for Catalyst 3850
Chapter 5 Configuring SGACL Policies
Step 1
Step 2
Step 3
Step 4
CommandPurpose
Router# configure terminal
ip access-list role-based rbacl-name
Enters global configuration mode.
Creates a Role-based ACL and enters Role-based ACL
configuration mode.
Example:
Switch(config)# ip access-list
role-based allow_webtraff
Switch(config)# cts role-based
permissions from 55 to 66 allow_webtraff
Step 6
Step 7
Step 8
Switch(config)# end
Switch# show cts role-based permissions
Switch# show ip access-lists
allow_webtraff
Manually Configuring SGACL Policies
Binds SGTs and DGTs to the RBACL. The
configuration is analogous to populating the
permission matrix configured on the Cisco ISE or the
Cisco Secure ACS.
• Default—Default permissions list
• sgt_num—0 to 65,519. Source Group Tag
• dgt_num—0 to 65,519. Destination Group Tag
• unknown—SGACL applies to packets where the
security group (source or destination) cannot be
determined.
• ipv4—Indicates the following RBACL is IPv4.
• rbacls—Name of RBACLs
Exits to Privileged Exec mode.
Displays permission to RBACL configurations.
Displays ACEs of all RBACLs or a specified RBACL.
Configuration Examples for Manually Configuring SGACL Policies
Catalyst 3850 IPv4 Manual SGACL policy:
Switch(config)# ip access role allow_webtraff
Switch(config-rb-acl)# 10 permit tcp dst eq 80
Switch(config-rb-acl)# 20 permit tcp dst eq 443
Switch(config-rb-acl)# 30 permit icmp
Switch(config-rb-acl)# 40 deny ip
Switch(config-rb-acl)# exit
Switch(config)# cts role-based permissions from 55 to 66 allow_webtraff
Switch# show ip access allow_webtraff
Role-based IP access list allow_webtraff
10 permit tcp dst eq www
20 permit tcp dst eq 443
30 permit icmp
40 deny ip
Switch# show show cts role-based permissions from 50 to 70
XXX need output XX
OL-22192-02
Cisco TrustSec Switch Configuration Guide
5-5
Page 76
Displaying SGACL Policies
Displaying SGACL Policies
After configuring the Cisco TrustSec device credentials and AAA, you can verify the Cisco TrustSec
SGACL policies downloaded from the authentication server or configured manually. Cisco TrustSec
downloads the SGACL policies when it learns of a new SGT through authentication and authorization
on an interface, from SXP, or from manual IP address to SGT mapping.
To display the contents of the SGACL policies permissions matrix, perform this task:
Displays the contents of the permissions matrix,
including SGACLs downloaded from the
authentication server and manually configured on
the switch.
Using the keywords, you can display all or part of the permissions matrix:
• If the from keyword is omitted, a column from the permissions matrix is displayed.
• If the to keyword is omitted, a row from the permissions matrix is displayed.
• If the from and to keywords are omitted, the entire permissions matrix is displayed.
• If the from and to keywords are specified, a single cell from the permissions matrix is displayed and
the details keyword is available. When details is entered, the ACEs of the SGACL of the single cell
are displayed.
This example shows how to display the content of the SGACL policies permissions matrix for traffic
sourced from security group 3:
Router# show cts role-based permissions from 3
Role-based permissions from group 3 to group 5:
SRB3
SRB5
Role-based permissions from group 3 to group 7:
SRB4
Cisco TrustSec Switch Configuration Guide
5-6
OL-22192-02
Page 77
Chapter 5 Configuring SGACL Policies
Refreshing the Downloaded SGACL Policies
Detailed Steps for Catalyst 6500, Catalyst 3850, Catalyst 3650
Performs an immediate refresh of the SGACL policies from
the authentication server.
• If a peer-id is specified, only the policies related to the
specified peer connection are refreshed. To refresh all
peer policies, press Enter without specifying an ID.
• If an SGT number is specified, only the policies related
to that SGT are refreshed. To refresh all security group
tag policies, press Enter without specifying an SGT
number. Select default to refresh the default policy.
Select unknown to refresh unknown policy.
Refreshing the Downloaded SGACL Policies
OL-22192-02
Cisco TrustSec Switch Configuration Guide
5-7
Page 78
Refreshing the Downloaded SGACL Policies
Chapter 5 Configuring SGACL Policies
Cisco TrustSec Switch Configuration Guide
5-8
OL-22192-02
Page 79
CHAP T ER
6
Configuring Endpoint Admission Control
Revised: May 28, 2010, OL-22192-01
This chapter contains the following sections:
• Information About Endpoint Admission Control
• Basic EAC Configuration Sequence
• 802.1X Authentication Configuration
• MAC Authentication Bypass Configuration
• Web Authentication Proxy Configuration
• Flexible Authentication Sequence and Failover Configuration
• 802.1X Host Modes
• Pre-Authentication Open Access
• DHCP Snooping and SGT Assignment
• Cisco TrustSec Endpoint Access Control Feature Histories
Information About Endpoint Admission Control
In TrustSec networks, packets are filtered at the egress, not the ingress to the network. In TrustSec
endpoint authentication, a host accessing the TrustSec domain (endpoint IP address) is associated with
a Security Group Tag (SGT) at the access device through DHCP snooping and IP device tracking. The
access device transmits that association (binding) through SXP to TrustSec hardware-capable egress
devices, which maintain a continually updated table of Source IP to SGT bindings. Packets are filtered
on egress by the TrustSec hardware-capable devices by applying security group ACLS (SGACLs).
Endpoint Admission Control (EAC) access methods for authentication and authorization can include the
following:
• 802.1X port-based Authentication
• MAC Authentication Bypass (MAB)
• Web Authentication (WebAuth)
All port-based authentication can be enabled with the authentication command. Each access method
must be configured individually per port. The flexible authentication sequence and failover features
permit the administrator to specify the failover and fallback sequence when multiple authentication
modes are configured and the active method fails. The 802.1X host mode determines how many endpoint
hosts can be attached per 802.1X port.
Cisco TrustSec Configuration Guide
OL-22192-01
6-1
Page 80
Basic EAC Configuration Sequence
Basic EAC Configuration Sequence
1. Configure the Cisco Secure ACS to provision SGTs to authenticated endpoint hosts.
2. Enable SXP on access switches. See the chapter, “Configuring SGT Exchange Protocol over TCP
(SXP) and Layer 3 Transport.”
3. Enable any combination of 802.1X, MAB, or WebAuth authentication methods on the access switch.
4. Enable DHCP and IP device tracking on access switches.
802.1X Authentication Configuration
The following example shows the basic 802.1x configuration on a Gigabit Ethernet port:
------------------------------Supplicant = 000c.293a.048e
Session ID = AC1AD01F0000000904BBECD8
Auth SM State = AUTHENTICATED
Auth BEND SM State = IDLE
Port Status = AUTHORIZED
MAC Authentication Bypass Configuration
MAC Authentication Bypass (MAB) enables hosts or clients that are not 802.1X capable to join
802.1X-enabled networks. It is not required to enable 802.1X authentication prior to enabling MAB.
The following example is a basic MAB configuration on a Catalyst switch:
switch(config)# interface GigabitEthernet2/1
switch(config-if)# authentication port-control auto
switch(config-if)# mab
For additional information on configuring MAB authentication, see the configuration guide for your
access switch.
MAC Authentication Bypass Configuration
Verifying the MAB Configuration
To verify the MAC Authentication Bypass configuration, use the show authentication interface
command.
switch# show authentication interface gigabitEthernet 2/1
Client list:
Interface MAC Address Domain Status Session ID
Gi2/1 000c.293a.048e DATA Authz Success AC1AD01F0000000A04CD41AC
Available methods list:
Handle Priority Name
2 1 mab
Runnable methods list:
Handle Priority Name
2 0 mab
To verify that the port has successfully authenticated, use the show mab interface command.
switch# show mab interface gigabitEthernet 2/1 details
MAB details for GigabitEthernet2/1
--------------Client MAC = 000c.293a.048e
Session ID = AC1AD01F0000000A04CD41AC
MAB SM state = ACQUIRING
Auth Status = UNAUTHORIZED
OL-22192-01
Cisco TrustSec Configuration Guide
6-3
Page 82
Web Authentication Proxy Configuration
Web Authentication Proxy Configuration
Web Authentication Proxy (WebAuth) allows the user to use a web browser to transmit their login
credentials to the Cisco Secure ACS though a Cisco IOS web server on the access device. WebAuth can
be enabled independently. It does not require 802.1X or MAB to be configured.
The following example is a basic WebAuth configuration on a Gigabit Ethernet port:
switch(config)# ip http server
switch(config)# ip access-list extended POLICY
switch(config-ext-nacl)# permit udp any any eq bootps
switch(config-ext-nacl)# permit udp any any eq domain
switch(config)# ip admission name HTTP proxy http
switch(config)# fallback profile FALLBACK_PROFILE
switch(config-fallback-profile)# ip access-group POLICY in
switch(config-fallback-profile)# ip admission HTTP
switch(config)# interface GigabitEthernet2/1
switch(config-if)# authentication port-control auto
switch(config-if)# authentication fallback FALLBACK_PROFILE6500(config-if)#ip access-group
POLICY in
For additional information on configuring web-based authentication, see the configuration guide for
your access switch.
For additional information on the ip http server command, see the Cisco IOS Network Management Command Reference entry at the at the following URL:
To verify the Web Authentication Proxy configuration, access the interface IP address with a web
browser. If configured correctly, the access device generates a challenge and accepts valid login
information.
To verify the Web Authentication proxy configuration with the CLI, use the show authentication interface command.
switch# show authentication interface gigabitEthernet 2/1
Client list:
Interface MAC Address Domain Status Session ID
Gi2/1 000c.293a.048e DATA Authz Success AC1AD01F0000000904BBECD8
Available methods list:
Handle Priority Name
1 2 webauth
Runnable methods list:
Handle Priority Name
1 0 webauth
Cisco TrustSec Configuration Guide
6-4
OL-22192-01
Page 83
Chapter 6 Configuring Endpoint Admission Control
Flexible Authentication Sequence and Failover Configuration
Flexible Authentication Sequence and Failover Configuration
Flexible Authentication Sequence (FAS) allows the access port to be configured for 802.1X, MAB, and
WebAuth authentication methods, specifying the fallback sequence if one or more of the authentication
methods are not available. The default failover sequence is as follows:
• 802.1X port-based Authentication
• MAC Authentication Bypass
• Web Authentication
Layer 2 authentications always occur before Layer 3 authentications. That is, 802.1X and MAB must
occur before WebAuth.
The following example specifies the authentication sequence as MAB, dot1X, and then WebAuth.
switch(config)# interface gigabitEthernet 2/1
switch(config-if)# authentication order mab dot1x webauth
switch(config-if)^Z
For more detailed information on authentication method sequence configuration, see the configuration
guide for your access switch.
For additional information on FAS, see the Cisco document, Flexible Authentication Order, Priority, and Failed Authentication at the following URL:
Four host classification modes can be configured per port:
• Single Host —Interface-based session with one MAC address
• Multi Host—Interface-based session with multiple MAC addresses per port
• Multi Domain—MAC + Domain (VLAN) session
• Multi Auth—MAC-based session with multiple MAC address per port
For more detailed information on 802.1x Host Mode configurations, see the configuration guide for your
access switch.
Pre-Authentication Open Access
The Pre-Authentication Open Access feature allows clients and devices to gain network access before
port authentication is performed. This process is primarily required for the PXE boot scenario, where a
device needs to access the network before PXE times out and download a bootable image that may
contain a supplicant.
For more detailed information on Pre-authentication Open Access configuration, see the configuration
guide for your access switch.
OL-22192-01
Cisco TrustSec Configuration Guide
6-5
Page 84
DHCP Snooping and SGT Assignment
DHCP Snooping and SGT Assignment
After the authentication process, authorization of the device occurs (for example, dynamic VLAN
assignment, ACL programming, etc.). For TrustSec networks, a Security Group Tag (SGT) is assigned
per the user configuration in the Cisco ACS. The SGT is bound to traffic sent from that endpoint through
DHCP snooping and the IP device tracking infrastructure.
The following example enables DHCP snooping and IP device tracking on an access switch:
switch# conf t
Enter configuration commands, one per line. End with CNTL/Z.
switch(config)# ip dhcp snooping
switch(config)# ip dhcp snooping vlan 10
switch(config)# no ip dhcp snooping information option
switch(config)# ip device tracking
For more detailed information on DHCP snooping and IP device tracking configuration, see the
configuration guide for your access switch.
Verifying the SGT to Endpoint Host Binding
Chapter 6 Configuring Endpoint Admission Control
To verify that hosts are visible to DHCP Snooping and IP Device Tracking, use the
show ip dhcp snooping binding and show ip device tracking commands.
switch# show ip dhcp snooping binding
MacAddress IpAddress Lease(sec) Type VLAN Interface
------------------ --------------- ---------- ------------- ---- -------------------00:0C:29:3A:04:8E 10.252.10.10 84814 dhcp-snooping 10 GigabitEthernet2/1
Total number of bindings: 1
switch# show ip device tracking all
IP Device Tracking = Enabled
IP Device Tracking Probe Count = 3
IP Device Tracking Probe Interval = 30
------------------------------------------------------------- IP Address MAC Address Interface STATE
10.252.10.10 000c.293a.048e GigabitEthernet2/1 ACTIVE
To verify that the correct SGT is bound to an endpoint IP address, use the show cts role-based sgt-map
command.
switch# show cts role-based sgt-map all
Active IP-SGT Bindings Information
IP Address SGT Source
============================================
1.1.1.1 7 INTERNAL
10.252.10.1 7 INTERNAL
10.252.10.10 3 LOCAL
10.252.100.1 7 INTERNAL
172.26.208.31 7 INTERNAL
IP-SGT Active Bindings Summary
============================================
Total number of LOCAL bindings = 1
Total number of INTERNAL bindings = 4
Total number of active bindings = 5
Cisco TrustSec Configuration Guide
6-6
OL-22192-01
Page 85
Chapter 6 Configuring Endpoint Admission Control
Cisco TrustSec Endpoint Access Control Feature Histories
Cisco TrustSec Endpoint Access Control Feature Histories
For a list of supported platforms, supported features, and the minimum required IOS releases, see
the Cisco TrustSec Platform Support Matrix at the following URL:
Configures CTS SGT Propagation configuration
for manual mode
sap (cts manual interface submode)Configures CTS SAP for manual mode.
Cisco TrustSec Clear Commands
clear cts cacheClears TrustSec cache file by type, by filename or
all cache files.
clear cts counterClears the counters for a single TrustSec interface
or for all interfaces
clear cts credentialsClears all CTS credentials, including all PACs.
clear cts environment-dataClears TrustSec environment data from cache.
clear cts macsecClears MACsec counters for a specified interface.
clear cts pacClears a PAC or all PACs from the keystore.
clear cts role-based countersDisplays role-based access control enforcement
statistics for SGTs and DGTs.
clear cts serverRemoves the specified authentication server.
Cisco TrustSec Configuration Guide
7-2
OL-22192-01
Page 89
Chapter 7 Cisco TrustSec Command Summary
Cisco TrustSec Show Commands
show cts authorization entriesDisplays the authorization entries.
show cts credentialsDisplays credentials used for CTS authentication.
show cts environment-dataDisplays the CTS environment data.
show cts interfaceDisplays CTS states and statistics per interface.
show cts macsecDisplays crypto ASIC packet counters per
show cts pacsDisplays the A-ID and PAC-info for PACs in the
show cts policy peerDisplays the peer authorization policies of
show cts policy layer3Displays the traffic and exception policies used in
show cts provisioningDisplays outstanding CTS provisioning jobs
show cts role-based sgt-mapDisplays IP address to Security Group Tag
show cts role-based countersDisplays role-based access control enforcement
show cts role-based sgt-mapDisplays IP to SGT bindings, permission lists, and
show cts server-listDisplays lists of AAA servers and load balancing
show cts sxpDisplays CTS SXP protocol information.
show platform cts reflectorDisplays the status of CTS reflector per interface.
Commands to Configure Endpoint Admission Control (EAC)
aaa accounting
aaa authorization
aaa authentication
order
priority
event
periodic
timer
host-mode
authorization
accounting
radius-server host
authentication port-control
interface.
keystore.
TrustSec peers.
CTS Layer3 Transport.
mappings.
statistics for SGTs and DGTs.
NetFlow statistics.
configurations.
OL-22192-01
Cisco TrustSec Configuration Guide
7-3
Page 90
Chapter 7 Cisco TrustSec Command Summary
Debug Commands
debug authentication event
debug authentication feature
debug condition cts peer-id
debug condition ctsFilters CTS debugging messages by interface
name, peer-id, peer-SGT or Security Group name.
debug condition cts peer-id
debug condition cts security-group
debug cts aaa
debug cts authentication events
debug cts authorization
debug cts authorization events
debug cts authorization rbacl
debug cts authorization snmp
debug cts cache
debug cts coa events
debug cts dp errors
debug cts dp info
debug cts dp packets
debug cts environment-data
debug cts environment-data events
debug cts error
debug cts fips
debug cts ha
debug cts ha core
debug cts ha infra
debug cts ifc
debug cts ifc cache
debug cts ifc events
debug cts ifc snmp
debug cts layer3-trustsec
debug cts provisioning
debug cts provisioning event
debug cts provisioning pak
debug cts relay event
debug cts relay pak
debug cts sap events
debug cts sap packets
debug cts sap pakdump
Cisco TrustSec Configuration Guide
7-4
OL-22192-01
Page 91
Chapter 7 Cisco TrustSec Command Summary
debug cts server-list
debug cts states
debug cts sxp
debug cts sxp conn
debug cts sxp error
debug cts sxp internal
debug cts sxp mdb
debug cts sxp message
debug dot.1x
debug epm
debug event
debug mab
debug radius
debug rbm api
debug rbm cli
debug rbm bindings
debug rbm dp errors
debug rbm dp events
debug rbm dp packets
debug rbm platform
debug rbm policy
OL-22192-01
Cisco TrustSec Configuration Guide
7-5
Page 92
cts authorization list
cts authorization list
To specify a list of AAA servers to use by the TrustSec seed device, use the cts authorization command
on the TrustSec seed device in global configuration mode. Use the no form of the command to stop using
the list during authentication.
cts authorization list server_list
no cts authorization list server_list
Chapter 7 Cisco TrustSec Command Summary
Syntax Description
server_listSpecifies a Cisco TrustSec AAA server group.
DefaultsNone
Command ModesGlobal configuration (config)
Supported User RolesAdministrator
Command History
ReleaseModification
12.2 (33) SXI3This command was introduced on the Catalyst 6500 series switches.
Usage GuidelinesThis command is only for the seed device. Non-seed devices obtain the TrustSec AAA server list from
their TrustSec authenticator peer as a component of their TrustSec environment data.
ExamplesThe following example displays an AAA configuration of a TrustSec seed device:
Router# cts credentials id Switch1 password Cisco123
Router# configure terminal
Router(config)# aaa new-model
Router(config)# aaa authentication dot1x default group radius
Router(config)# aaa authorization network MLIST group radius
Router(config)# cts authorization list MLIST
Router(config)# aaa accounting dot1x default start-stop group radius
Router(config)# radius-server host 10.20.3.1 auth-port 1812 acct-port 1813 pac key
AbCe1234
Router(config)# radius-server vsa send authentication
Router(config)# dot1x system-auth-control
Router(config)# exit
Related Commands
CommandDescription
show cts server-listDisplays RADIUS server configurations.
Cisco TrustSec Configuration Guide
7-6
OL-22192-01
Page 93
Chapter 7 Cisco TrustSec Command Summary
cts cache
To enable caching of TrustSec authorization and environment data information to DRAM and NVRAM,
use the cts cache global configuration command. Use the no form of the command to disable caching.
nv-storageCauses DRAM cache updates to be written to non-volatile storage and
enables DRAM cache to be initially populated from nv-storage when the
network device boots.
bootflash: dirSpecifies bootflash dir as the nv-storage location.
disk0: dirSpecifies disk 0 directory as the nv-storage location.
disk1: dirSpecifies disk 1 directory as the nv-storage location.
sup-bootflash: imageSpecifies a supervisor bootflash directory as the nv-storage location.
ReleaseModification
12.2(33) SXI This command was introduced on the Catalyst 6500 series switches.
12.2(50) SY PMK caching support is added for the Catalyst 6500 series switches.
Usage GuidelinesThe cts cache command enables caching of authentication, authorization and environment-data
information to DRAM. Caching is for the maintenance and reuse of information obtained through
authentication and authorization. Keystore provides for secure storage of a device's own credentials
(passwords, certificates, PACs) either in software or on a specialized hardware component. In the
absence of a dedicated hardware keystore, a software emulation keystore is created using DRAM and
NVRAM.
Cisco TrustSec creates a secure cloud of devices in a network by requiring that each device authenticate
and authorize its neighbors with a trusted AAA server (Cisco Secure ACS 5.1 or more recent) before
being granted access to the TrustSec network. Once the authentication and authorization is complete, the
information could be valid for some time. If caching is enabled, that information can be reused, allowing
the network device to bring up links without having to connect with the ACS, thus expediting the
OL-22192-01
Cisco TrustSec Configuration Guide
7-7
Page 94
cts cache
formation of the CTS cloud upon reboot, improving network availability, and reducing the load on the
ACS. Caching can be stored in volatile memory (information does not survive a reboot) or nonvolatile
memory (information survives a reboot).
ExamplesThe following example enables cache support:
ipv4_addressThe IP address of the authentication server.
udp_portThe UPD port of the authentication server.
a-id hex_stringSpecifies the identification string of the ACS server
key Specifies the RADIUS key to be used for provisioning
source Specifies the interface for source address in request packets
interface_listSpecify the interface type and its identifying parameters per the displayed
list.
Command History
Usage GuidelinesThe cts change-password command allows an administrator to change the password used between the
NoteThe cts change-password is supported on Cisco Secure ACS, 5.1 and more recent versions.
OL-22192-01
ReleaseModification
12.2(50) SYThis command was introduced on the Catalyst 6500 Series Switches.
local device the Cisco Secure ACS authentication server, without having to also reconfigure the
authentication server.
For Catalyst 6500 switches with dual-supervisor chassis, the hardware-based keystores must be
manually synchronized when inserting a second supervisor linecard. A password change process may be
invoked to make both active and standby supervisors have the same device password.
Cisco TrustSec Configuration Guide
7-9
Page 96
cts credentials
cts credentials
Use the cts credentials command in privileged EXEC mode to specify the TrustSec ID and password of
the network device. Use the clear cts credentials command to delete the credentials.
cts credentials id cts_id password cts_pwd
Chapter 7 Cisco TrustSec Command Summary
Syntax Description
DefaultsNone
Command ModesPrivileged EXEC (#)
Supported User RolesAdministrator
Command History
Usage GuidelinesFor use in TrustSec Network Device Admission Control (NDAC) authentication, the cts credentials
credentials id cts_idSpecifies the Cisco TrustSec device ID for this device to use when
authenticating with other Cisco TrustSec devices with EAP-FAST. The cts-id
variable has a maximum length of 32 characters and is case sensitive.
password cts_pwdSpecifies the password for this device to use when authenticating with other
Cisco TrustSec devices with EAP-FAST.
ReleaseModification
12.2(33) SXIThis command was introduced on the Catalyst 6500 series switches.
command specifies the Cisco TrustSec device ID and password for this switch to use when
authenticating with other Cisco TrustSec devices with EAP-FAST. The CTS credentials state retrieval is
not performed by the nonvolatile generation process (NVGEN) because the CTS credential information
is saved in the keystore, not in the startup-config. The device can be assigned a CTS identity by the Cisco
Secure Access Control Server (ACS), or auto-generate a new password when prompted to do so by the
ACS. Those credentials are stored in the keystore, eliminating the need to save the running-config. To
display the CTS device ID, use the show cts credentials command. The stored password is never
displayed.
To change the device ID or the password, reenter the command. To clear the keystore, use the clear cts credentials command.
NoteWhen the CTS device ID is changed, all Protected Access Credentials (PACs) are flushed from the
keystore because the PACs are associated with the old device ID and are not valid for a new identity.
Cisco TrustSec Configuration Guide
7-10
OL-22192-01
Page 97
Chapter 7 Cisco TrustSec Command Summary
cts credentials
ExamplesThe following example configures himalaya and cisco as the CTS device ID and password:
Router# cts credentials id himalaya password cisco
CTS device ID and password have been inserted in the local keystore. Please make sure that
the same ID and password are configured in the server database.
The following example changes the CTS device ID and password to atlas and cisco123:
Router# cts credentials id atlas pacssword cisco123
A different device ID is being configured.
This may disrupt connectivity on your CTS links.
Are you sure you want to change the Device ID? [confirm] y
TS device ID and password have been inserted in the local keystore. Please make sure that
the same ID and password are configured in the server database.
The following example displays the CTS device ID and password state:
Router# show cts credentials
CTS password is defined in keystore, device-id = atlas
Related CommandsCommandDescription
clear cts credentialsClears the Cisco TrustSec device ID and password.
show cts credentialsDisplays the state of the current Cisco TrustSec device ID and password.
show cts keystoreDisplays contents of the hardware and software keystores.
OL-22192-01
Cisco TrustSec Configuration Guide
7-11
Page 98
cts dot1x
cts dot1x
Use the cts dot1x command to enter CTS dot1x interface configuration mode (config-if-cts-dot1x) to
configure the TrustSec reauthentication timer on an interface. Use the no form of the command to disable
the timers on an interface.
[no] cts dot1x
Syntax DescriptionThis command has no arguments or keywords.
DefaultsCTS dot1x configuration on the interface is disabled by default.
Command ModesInterface configuration (config-if)
Chapter 7 Cisco TrustSec Command Summary
Supported User RolesAdministrator
Command History
ReleaseModification
12.2 (33) SXI3This command was introduced on the Catalyst 6500 series switches.
Usage GuidelinesBefore configuring the TrustSec dot1x reauthentication timer, configure dot1x globally from the
interface from the Interface Configuration mode. The CTS dot1x configuration governs TrustSec NDAC,
not TrustSec EAC processes.
ExamplesIn the following example, a Catalyst 6500 Series switch enters CTS configuration mode without first
enabling dot1x in interface configuration mode:
Router(config-if)# cts dot1x
Warning: Global dot1x is not configured, CTS will not run until dot1x is enabled
. (Gi3/1)
Router(config-if-cts-dot1x)# ?
CTS dot1x configuration commands:
default Set a command to its defaults
exit Exit from CTS dot1x sub mode
no Negate a command or set its defaults
timer CTS timer configuration
Cisco TrustSec Configuration Guide
7-12
OL-22192-01
Page 99
Chapter 7 Cisco TrustSec Command Summary
Related CommandsCommandDescription
default timer
Resets the CTS dot1x reauthentication timer to the default value.
reauthentication (cts
interface)
timer reauthentication
Sets the CTS dot1x reauthentication timer.
(cts interface)
show cts interface Displays CTS interface status and configurations.
show dotx interface Displays IEEE 802.1x configurations and statistics.
cts dot1x
OL-22192-01
Cisco TrustSec Configuration Guide
7-13
Page 100
Chapter 7 Cisco TrustSec Command Summary
default timer reauthentication (cts interface)
default timer reauthentication (cts interface)
Use the default timer reauthentication command in CTS interface configuration mode to reset the CTS
dot1x reauthentication timer to the default value.
default timer reauthentication
Syntax Description
timer reauthentication Sets the CTS reauthentication timer to the default values.