- Understanding Cisco TrustSec
- Configuring the Cisco TrustSec Solution
- Configuring Identities and Connections
- Configuring SGACL Policies
- TrustSec SGACL High Availability
- SGT Exchange Protocol over TCP (SXP)
- VRF-Aware SGT
- IP-Prefix and SGT-Based SXP Filtering
- SGT Inline Tagging
- Configuring Cisco TrustSec Reflector and Caching
- Configuring Endpoint Admission Control
- Cisco TrustSec Command Summary
- Considerations for Catalyst 3000 and 2000 Series Switches and Wireless LAN Controller 5700 Series
- Considerations for Catalyst 4500 Series Switches
- Considerations for Catalyst 6500 Series Switches
- Glossary
- Cisco TrustSec SGT Exchange Protocol Feature Histories
- Prerequisites for SGT Exchange Protocol
- Restrictions for SGT Exchange Protocol
- Information About SGT Exchange Protocol
- How to Configure SGT Exchange Protocol
- Enabling Cisco TrustSec SXP
- Configuring an SXP Peer Connection
- Configuring the Default SXP Password
- Configuring the Default SXP Source IP Address
- Changing the SXP Reconciliation Period
- Changing the SXP Retry Period
- Creating Syslogs to Capture Changes of IP Address-to-SGT Mapping Learned Through SXP
- Configuring Layer 3 SGT Transport Between Cisco TrustSec Domains
- Configuration Examples for SGT Exchange Protocol
- Verifying SGT Exchange Protocol Connections
- Feature Information for SGT Exchange Protocol
Configuring SGT Exchange Protocol
You can use the SGT Exchange Protocol (SXP) to propagate the Security Group Tags (SGTs) across network devices that do not have hardware support for Cisco TrustSec. This module describes how to configure Cisco TrustSec SXP on switches in your network.
Cisco TrustSec SGT Exchange Protocol Feature Histories
For a list of supported Cisco TrustSec features per platform and the minimum required IOS release, see
the Cisco TrustSec Platform Support Matrix at the following URL:
http://www.cisco.com/en/US/solutions/ns170/ns896/ns1051/trustsec_matrix.html
Otherwise, see product release notes for detailed feature introduction information.
Prerequisites for SGT Exchange Protocol
The Cisco TrustSec-SGT Over Exchange Protocol (SXP) network needs to be established before implementing SXP. This network has the following prerequisites:
- To use the Cisco TrustSec functionality on your existing device, ensure that you have purchased one of the followng security licenses:
Note Starting with Cisco IOS XE Release 16.5.1a, LAN Base License will support SXP configuration on Cisco Catalyst 3850 and Cisco Catalyst 3650 platforms.
Restrictions for SGT Exchange Protocol
Note Cisco TrustSec Exchange Protocol is supported only on physical interfaces and not on logical interfaces.
The following restrictions are applicable when running Cisco TrustSec in enforcement mode or inline tagging mode. These restrictions do not apply when these switches are used as an SXP speaker:
- An IP subnet address cannot be statically mapped to a Security Group Tag (SGT). You can only map IP addresses to an SGT. While configuring IP address-to-SGT mappings, the IP address prefix must be 32. (Applicable to Catalyst 3560-X and 3750-X Series Switches)
- If a port is configured in multi-authentication mode, all hosts connecting to that port must be assigned the same SGT. When a host tries to authenticate, it must be assigned the same SGT as the SGT assigned to a previously authenticated host. If a host tries to authenticate, and it has a different SGT to that of a previously authenticated host, the VLAN port to which these hosts belong is error-disabled. (Applicable to Catalyst 3560-X and 3750-X Series Switches)
- Cisco TrustSec enforcement mode on a VLAN trunk line supports only up to eight VLANs. If more than eight VLANs are configured on a VLAN trunk link and Cisco TrustSec is enabled on those VLANs, the switch ports on those VLAN trunk links will be error-disabled. (Applicable to Catalyst 3560-X, 3750-X, and 3850 Series Switches)
- Switches can assign SGT and apply the corresponding Security Group access control list (SGACL) to end hosts based on SGT Exchange Protocol (SXP) listening only if the end hosts are Layer 2 adjacent to the switch. (Applicable to Catalyst 3560-X and 3750-X Series Switches)
Information About SGT Exchange Protocol
- SGT Exchange Protocol Overview
- Security Group Tagging
- SGT Assignment
- Layer 3 SGT Transport Between Cisco TrustSec Domains
SGT Exchange Protocol Overview
Cisco TrustSec builds secure networks by establishing domains of trusted network devices. Each device in the domain is authenticated by its peers. Communication on the links between devices in the domain is secured with a combination of encryption, message integrity check, and data-path replay protection mechanisms.
The Security Group Tag (SGT) Exchange Protocol (SXP) is one of several protocols that supports Cisco TrustSec. SXP is a control protocol for propagating IP-to-SGT binding information across network devices that do not have the capability to tag packets. Cisco TrustSec filters packets at the egress interface. During endpoint authentication, a host accessing the Cisco TrustSec domain (the endpoint IP address) is associated with an SGT at the access device through Dynamic Host Control Protocol (DHCP) snooping and IP device tracking. The access device transmits that association or binding through SXP to Cisco TrustSec hardware-capable egress devices. These devices maintain a table of source IP-to-SGT bindings. Packets are filtered on the egress interface by Cisco TrustSec hardware-capable devices by applying security group access control lists (SGACLs). SXP passes IP-to-SGT bindings from authentication points to upstream devices in the network. This process allows security services on switches, routers, or firewalls to learn identity information from access devices.
SGTs can be assigned through any of the following Endpoint Admission Control (EAC) access methods:
SXP uses TCP as the transport protocol, and the TCP port 64999 for connection initiation. SXP uses Message Digest 5 (MD5) for authentication and integrity check. It has two defined roles—speaker (initiator) and listener (receiver).
Security Group Tagging
Security Group Tag is a unique 16 bit tag that is assigned to a unique role. It represents the privilege of the source user, device, or entity and is tagged at the ingress of the Cisco TrustSec domain.
SXP uses the device and user credentials acquired during authentication for classifying packets by security groups (SGs) as they enter a network. This packet classification is maintained by tagging packets on the ingress to the Cisco TrustSec network so that they can be identified for the purpose of applying security and other policy criteria along the data path. The Security Group Tag (SGT) allows the network to enforce the access control policy by enabling the endpoint device to act upon the SGT to filter traffic. Static port Identification is used to lookup the SGT value for a particular endpoint connected to a port.
SGT Assignment
The Security Group Tag (SGT) of a packet can be assigned at the port level when the packet comes tagged on a Cisco TrustSec link, or when a single endpoint authenticates on a port.
SGT of an incoming packet is determined in the following ways:
- When a packet that is tagged with an SGT comes on a trust port, the tag of the packet is considered as the SGT of the packet.
- When a packet is tagged with an SGT, but comes on an untrusted port, the SGT of the packet is ignored and the peer SGT is configured for the port.
- When a packet does not have an SGT, the peer SGT is configured for a port.
- Cisco TrustSec only allows a single host device to authenticate on a port (except for voice and data using separate VLANs). When a host is directly connected to a port, only a single peer SGT exists for that port. All packet from that port is assigned the same SGT.
The following methods of assigning SGTs are supported:
- IPM (dot1x, MAB, and Web Authentication)
- VLAN-to-SGT mapping Established when an authentication method provides an SGT for an authenticated entry already has an assigned IP address. A switch process monitors endpoint sessions and detects changes or removal of IP-to-SGT binding.
- SXP (SGT Exchange Protocol) Listener
Layer 3 SGT Transport Between Cisco TrustSec Domains
Note This feature is supported only on Cisco Catalyst 6500 Series Switches.
You can configure Layer 3 SGT Transport on Cisco TrustSec gateway devices on the edges of a network domain that has no Cisco TrustSec-capable devices.
When configuring Cisco TrustSec Layer 3 SGT transport, consider these usage guidelines and restrictions:
- The Cisco TrustSec Layer 3 SGT transport feature can be configured only on ports that support hardware encryption.
- Traffic and exception policies for Cisco TrustSec Layer 3 SGT transport have the following restrictions:
– The policies must be configured as IP extended or IP named extended ACLs.
– The policies must not contain deny entries.
– If the same ACE is present in both the traffic and exception policies, the exception policy takes precedence. No Cisco TrustSec Layer 3 encapsulation will be performed on packets matching that ACE.
- Traffic and exception policies can be downloaded from the authentication server (if supported by your Cisco IOS Release) or manually configured on the device. The policies will be applied based on the following rules:
– If a traffic policy or an exception policy is downloaded from the authentication server, it will take precedence over any manually configured traffic or exception policy.
– If the authentication server is not available but both a traffic policy and an exception policy have been manually configured, the manually configured policies will be used.
– If the authentication server is not available but a traffic policy has been configured with no exception policy, no exception policy is applied. Cisco TrustSec Layer 3 encapsulation will be applied on the interface based on the traffic policy.
– If the authentication server is not available and no traffic policy has been manually configured, no Cisco TrustSec Layer 3 encapsulation will be performed on the interface.
How to Configure SGT Exchange Protocol
- Enabling Cisco TrustSec SXP
- Configuring an SXP Peer Connection
- Configuring the Default SXP Password
- Configuring the Default SXP Source IP Address
- Changing the SXP Reconciliation Period
- Changing the SXP Retry Period
- Creating Syslogs to Capture Changes of IP Address-to-SGT Mapping Learned Through SXP
- Configuring Layer 3 SGT Transport Between Cisco TrustSec Domains
To configure Cisco TrustSec SXP, follow these steps:
Step 1 Enable the Cisco TrustSec feature (see the “ Configuring Identities, Connections, and SGTs ” chapter).
Step 2 Enable Cisco TrustSec SXP (see the “Enabling Cisco TrustSec SXP” section).
Step 3 Configure SXP peer connections (see the “Configuring an SXP Peer Connection” section).
Enabling Cisco TrustSec SXP
You must enable Cisco TrustSec SXP before you can configure peer connections. To enable Cisco TrustSec SXP, perform this task:
Detailed Stepss
|
|
|
---|---|---|
Exits global configuration mode and returns to privileged EXEC mode |
Configuring an SXP Peer Connection
You must configure the SXP peer connection on both of the devices. One device is the speaker and the other is the listener. When using password protection, make sure to use the same password on both ends.
Note If a default SXP source IP address is not configured and you do not configure an SXP source address in the connection, the Cisco TrustSec software derives the SXP source IP address from existing local IP addresses. The SXP source address might be different for each TCP connection initiated from the switch.
Detailed Steps
Configuring the Default SXP Password
By default, SXP uses no password when setting up connections. You can configure a default SXP password for the switch. In Cisco IOS Release 12.2(50)SY and later releases, you can specify an encrypted password for the SXP default password.
Detailed Steps
Configuring the Default SXP Source IP Address
SXP uses the default source IP address for all new TCP connections where a source IP address is not specified. There is no effect on existing TCP connections when you configure the default SXP source IP address.
To configure a default SXP source IP address, perform this task:
Detailed Steps
|
|
|
---|---|---|
Exits global configuration mode and returns to privileged EXEC mode. |
Changing the SXP Reconciliation Period
After a peer terminates an SXP connection, an internal hold-down timer starts. If the peer reconnects before the internal hold-down timer expires, the SXP reconciliation period timer starts. While the SXP reconciliation period timer is active, the Cisco TrustSec software retains the SGT mapping entries learned from the previous connection and removes invalid entries. The default value is 120 seconds (2 minutes). Setting the SXP reconciliation period to 0 seconds disables the timer and causes all entries from the previous connection to be removed.
Detailed Steps
|
|
|
---|---|---|
Changes the SXP reconciliation timer. The default value is 120 seconds (2 minutes). The range is from 0 to 64000. |
||
Exits global configuration mode and returns to privileged EXEC mode. |
Changing the SXP Retry Period
The SXP retry period determines how often the Cisco TrustSec software retries an SXP connection. When an SXP connection is not successfully set up, the Cisco TrustSec software makes a new attempt to set up the connection after the SXP retry period timer expires. The default value is 120 seconds. Setting the SXP retry period to 0 seconds disables the timer and retries are not attempted.
Detailed Steps
|
|
|
---|---|---|
Changes the SXP retry timer. The default value is 120 seconds (2 minutes). The range is from 0 to 64000. |
||
Exits global configuration mode and returns to privileged EXEC mode. |
Creating Syslogs to Capture Changes of IP Address-to-SGT Mapping Learned Through SXP
When the cts sxp log binding-changes command is configured in global configuration mode, SXP syslogs (sev 5 syslog) are generated whenever a change to IP address to SGT binding occurs (add, delete, change). These changes are learned and propagated on the SXP connection. The default is no cts sxp log binding-changes.
To enable logging of binding changes, perform the following task:
Detailed Steps
|
|
|
---|---|---|
Exits global configuration mode and returns to privileged EXEC mode. |
Configuring Layer 3 SGT Transport Between Cisco TrustSec Domains
You can configure Layer 3 SGT Transport on Cisco TrustSec gateway devices on the edges of a network domain that has no Cisco TrustSec-capable devices.
Note This feature is supported only on Cisco Catalyst 6500 Series Switches.
Detailed Steps for Catalyst 6500
Configuration Examples for SGT Exchange Protocol
- Example: Enabling Cisco TrustSec SXP and an SXP Peer Connection
- Example: Configuring the Default SXP Password and Source IP Address
- Example: Configuring Layer 3 SGT Transport Between Cisco TrustSec Domains
Example: Enabling Cisco TrustSec SXP and an SXP Peer Connection
The following example shows how to enable SXP and configure an SXP peer connection between Switch A, the speaker, and Switch B, the listener:
The following example shows how to configure the SXP peer connection between Switch B, the listener, and Switch A, the speaker:
Example: Configuring the Default SXP Password and Source IP Address
The following example shows how to configure a default SXP password and source IP address:
Example: Configuring Layer 3 SGT Transport Between Cisco TrustSec Domains
Note This feature is supported only on Cisco Catalyst 6500 Series Switches.
The following example shows how to configure Layer 3 SGT Transport to a remote Cisco TrustSec domain:
Verifying SGT Exchange Protocol Connections
To view SXP connections, perform this task:
|
|
|
---|---|---|
Displays detailed information about the SXP status and connections. |
||
Displays brief information about the SXP status and connections. |
The following is sample output from the show cts sxp connections command:
The following is sample output from the show cts sxp connections brief command:
Feature Information for SGT Exchange Protocol
Use Cisco Feature Navigator to find information about platform support and software image support. Cisco Feature Navigator enables you to determine which software images support a specific software release, feature set, or platform. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Note Table 1 lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.