- Understanding Cisco TrustSec
- Configuring the Cisco TrustSec Solution
- Configuring Identities and Connections
- Configuring SGACL Policies
- TrustSec SGACL High Availability
- SGT Exchange Protocol over TCP (SXP)
- VRF-Aware SGT
- IP-Prefix and SGT-Based SXP Filtering
- SGT Inline Tagging
- Configuring Cisco TrustSec Reflector and Caching
- Configuring Endpoint Admission Control
- Cisco TrustSec Command Summary
- Considerations for Catalyst 3000 and 2000 Series Switches and Wireless LAN Controller 5700 Series
- Considerations for Catalyst 4500 Series Switches
- Considerations for Catalyst 6500 Series Switches
- Glossary
- Cisco TrustSec Identity Configuration Feature Histories
- Configuring Credentials and AAA for a Cisco TrustSec Seed Device
- Configuring Credentials and AAA for a Cisco TrustSec Non-Seed Device
- Enabling Cisco TrustSec Authentication and MACsec in 802.1X Mode on an Uplink Port
- Configuring Cisco TrustSec and MACsec in Manual Mode on an Uplink Port
- Regenerating SAP Key on an Interface
- Verifying the Cisco TrustSec Interface Configuration
- Manually Configuring a Device SGT
- Manually Configuring IP Address-to-SGT Mapping
- Subnet-to-SGT Mapping
- VLAN-to-SGT Mapping
- Layer 3 Logical Interface-to-SGT Mapping (L3IF–SGT Mapping)
- Binding Source Priorities
Configuring Identities, Connections, and SGTs
This section includes the following topics:
- Cisco TrustSec Identity Configuration Feature Histories
- Configuring Credentials and AAA for a Cisco TrustSec Seed Device
- Configuring Credentials and AAA for a Cisco TrustSec Non-Seed Device
- Enabling Cisco TrustSec Authentication and MACsec in 802.1X Mode on an Uplink Port
- Configuring Cisco TrustSec and MACsec in Manual Mode on an Uplink Port
- Regenerating SAP Key on an Interface
- Verifying the Cisco TrustSec Interface Configuration
- Manually Configuring a Device SGT
- Manually Configuring IP Address-to-SGT Mapping
- Manually Configuring a Device SGT
- Configuring Additional Authentication Server-Related Parameters
- Automatically Configuring a New or Replacement Password with the Authentication Server
Cisco TrustSec Identity Configuration Feature Histories
For a list of supported TrustSec features per platform and the minimum required IOS release, see
the Cisco TrustSec Platform Support Matrix at the following URL:
http://www.cisco.com/en/US/solutions/ns170/ns896/ns1051/trustsec_matrix.html
Otherwise, see product release notes for detailed feature introduction information.
Configuring Credentials and AAA for a Cisco TrustSec Seed Device
A Cisco TrustSec-capable device that is directly connected to the authentication server, or indirectly connected but is the first device to begin the TrustSec domain, is called the seed device. Other Cisco TrustSec network devices are non-seed devices.
To enable NDAC and AAA on the seed switch so that it can begin the Cisco TrustSec domain, perform these steps:
Detailed Steps
Note You must also configure the Cisco TrustSec credentials for the switch on the Cisco Identity Services Engine (Cisco ISE) or the Cisco Secure Access Control Server (Cisco ACS).
Configuration Examples for Seed Device
Catalyst 6500 configured as a Cisco TrustSec seed device:
Configuring Credentials and AAA for a Cisco TrustSec Non-Seed Device
To enable NDAC and AAA on a non-seed switch so that it can join the Cisco TrustSec domain, perform these steps:
Detailed Steps
Note You must also configure the Cisco TrustSec credentials for the switch on the Cisco Identity Services Engine, or the Cisco Secure ACS.
Configuration Examples for Non-Seed Device
Catalyst 3850/3650 example for access VLAN, where propagate SGT is not the default:
Enabling Cisco TrustSec Authentication and MACsec in 802.1X Mode on an Uplink Port
Note This feature is not supported on platforms that support Cisco IOS XE Denali and Everest Releases.
You must enable Cisco TrustSec authentication on each interface that will connect to another Cisco TrustSec device. To configure Cisco TrustSec authentication with 802.1X on an uplink interface to another Cisco TrustSec device, perform this task:
Detailed Steps
Configuration Examples for 802.1X on Uplink Port
Catalyst 6500 Cisco TrustSec authentication in 802.1X mode on an interface using GCM as the preferred SAP mode; the authentication server did not provide a reauthentication timer:
Configuring Cisco TrustSec and MACsec in Manual Mode on an Uplink Port
Note Cisco Catalyst 9400 Series Switches do not support MACsec.
Feature History for Trustsec NDAC
You can manually configure Cisco TrustSec on an interface. You must manually configure the interfaces on both ends of the connection. No authentication occurs; policies can be statically configured or dynamically downloaded from an authentication server by specifying the server’s device identity.
Detailed Steps
|
|
|
---|---|---|
Enters interface configuration mode for the uplink interface. |
||
Device(config-if-cts-manual)# [ no ] sap pmk key [ mode-list mode1 [ mode2 [ mode3 [ mode4 ]]]] |
(Optional) Configures the SAP pairwise master key (PMK) and operation mode. SAP is disabled by default in Cisco TrustSec manual mode. The SAP operation mode options are:
Note MACsec with SAP is not supported on the Catalyst 3K switches. Note If the interface is not capable of SGT insertion or data link encryption, no-encap is the default and the only available SAP operating mode. |
|
Device(config-if-cts-manual)# [ no ] policy dynamic identity peer-name |
(Optional) Configures Identity Port Mapping (IPM) to allow dynamic authorization policy download from authorization server based on the identity of the peer. See the additional usage notes following this task. Note Ensure that you have configured the Cisco TrustSec credentials (see “Configuring Credentials and AAA for a Cisco TrustSec Seed Device” section). |
|
Device(config-if-cts-manual)# [ no ] policy static sgt tag [ trusted ] |
(Optional) Configures a static authorization policy. See the additional usage notes following this task. |
|
(Optional) The no form of this command is used when the peer is incapable of processing an SGT. The no propagate sgt command prevents the interface from transmitting the SGT to the peer. |
||
Enables the interface and enables Cisco TrustSec authentication on the interface. |
||
Identity Port Mapping (IPM) configures a physical port such that a single SGT is imposed on all traffic entering the port; this SGT is applied on all IP traffic exiting the port until a new binding is learned. IPM is configured as follows:
- CTS Manual interface configuration mode with the policy static sgt tag command
- CTS Manual interface configuration mode with the policy dynamic identity peer-name command where peer-name is designated as non-trusted in the Cisco ACS or Cisco ISE configuration.
IPM is supported for the following ports:
When manually configuring Cisco TrustSec on an interface, consider these usage guidelines and restrictions:
- If no SAP parameters are defined, MACsec encapsulation or encryption will not be performed.
- If the selected SAP mode allows SGT insertion and an incoming packet carries no SGT, the tagging policy is as follows:
– If the policy static command is configured, the packet is tagged with the SGT configured in the policy static command.
– If the policy dynamic command is configured, the packet is not tagged.
- If the selected SAP mode allows SGT insertion and an incoming packet carries an SGT, the tagging policy is as follows:
– If the policy static command is configured without the trusted keyword, the SGT is replaced with the SGT configured in the policy static command.
– If the policy static command is configured with the trusted keyword, no change is made to the SGT.
– If the policy dynamic command is configured and the authorization policy downloaded from the authentication server indicates that the packet source is untrusted, the SGT is replaced with the SGT specified by the downloaded policy.
– If the policy dynamic command is configured and the downloaded policy indicates that the packet source is trusted, no change is made to the SGT.
Configuration Examples for Manual Mode and MACsec on an Uplink Port
Note Cisco Catalyst 9400 Series Switches do not support MACsec.
Catalyst 6500 TrustSec interface configuration in manual mode:
Before configuring Cisco TrustSec, refer to the guidelines mentioned in Catalyst 3850, Catalyst 3650 Switches, and Wireless LAN Controller 5700 Series under Configuration Guidelines and Restrictions section.
Catalyst 3850 TrustSec interface configuration in manual mode:
Regenerating SAP Key on an Interface
Feature History for SAP Key Regeneration
The ability to manually refresh encryption keys is often part of network administration security requirements. SAP key refresh ordinarily occurs automatically, triggered by combinations of network events and non-configurable internal timers.
Detailed Steps
|
|
|
---|---|---|
Verifying the Cisco TrustSec Interface Configuration
To view the TrustSec-relate interface configuration, perform this task:
Detailed Steps
|
|
|
---|---|---|
show cts interface [ interface_type slot / port | brief | summary ] |
Example: Show Cisco 6500 TrustSec interface configuration:
Example: Cisco 3850 TrustSec interface query:
Manually Configuring a Device SGT
Feature History for Manual Device SGT
|
|
|
---|---|---|
This feature was introduced on the Catalyst 6500 series switches. |
In normal Cisco TrustSec operation, the authentication server assigns an SGT to the device for packets originating from the device. You can manually configure an SGT to be used if the authentication server is not accessible, but an authentication server-assigned SGT will take precedence over a manually-assigned SGT.
To manually configure an SGT on the device, perform this task:
Detailed Steps
|
|
|
---|---|---|
Configures the SGT for packets sent from the device. The tag argument is in decimal format. The range is 1 to 65533. |
||
Configuration Examples for Manually Configuring a Device SGT
Catalyst 6500, Catalyst 3850, and Catalyst 3750-X:
Manually Configuring IP Address-to-SGT Mapping
Feature History for IP-Address-to-SGT Mapping
This section discusses SGTs-to-source IP address mapping as follows:
- Subnet-to-SGT Mapping
- VLAN-to-SGT Mapping
- Layer 3 Logical Interface-to-SGT Mapping (L3IF–SGT Mapping)
For Identity Port Mapping in cts interface manual mode, see the following section:
Subnet-to-SGT Mapping
Subnet-to-SGT mapping binds an SGT to all host addresses of a specified subnet. TrustSec imposes the SGT on an incoming packet when the packet’s source IP address belongs to the specified subnet. The subnet and SGT are specified in the CLI with the cts role-based sgt-map net_address / prefix sgt sgt_number global configuration command. A single host may also be mapped with this command.
In IPv4 networks, SXPv3, and more recent versions, can receive and parse subnet net_address / prefix strings from SXPv3 peers. Earlier SXP versions convert the subnet prefix into its set of host bindings before exporting them to an SXP listener peer.
For example, the IPv4 subnet 198.1.1.0/29 is expanded as follows (only 3 bits for host addresses):
- Host addresses 198.1.1.1 to 198.1.1.7–tagged and propagated to SXP peer.
- Network and broadcast addresses 198.1.1.0 and 198.1.1.8— not tagged and not propagated.
To limit the number of subnet bindings SXPv3 can export, use the cts sxp mapping network-map global configuration command.
Subnet bindings are static, there is no learning of active hosts. They can be used locally for SGT imposition and SGACL enforcement. Packets tagged by subnet-to-SGT mapping can be propagated on Layer 2 or Layer 3 TrustSec links.
For IPv6 networks, SXPv3 cannot export subnet bindings to SXPv2 or SXPv1 peers.
Feature History for Subnet-to-SGT Mapping
|
|
|
---|---|---|
Support for this command was introduced with SXPv3 on the Catalyst 6500 series switches. Related CLIs appeared in earlier releases. |
Default Settings
Configuring Subnet-to-SGT Mapping
Restrictions
- An IPv4 subnetwork with a /31 prefix cannot be expanded.
- Subnet host addresses cannot be bound to SGTs when the network-map bindings parameter is less than the total number of subnet hosts in the specified subnets, or when bindings is 0.
- IPv6 expansions and propagation only occurs when SXP speaker and listener are running SXPv3, or more recent versions.
Restrictions for Cisco IOS XE Release 3.9.2E on Catalyst 4500
Detailed Steps
Verifying Subnet-to-SGT Mapping Configuration
To display Subnet-to-SGT Mapping configuration information, perform one of the following tasks:
Configuration Examples for Subnet-to-SGT Mapping
The following example shows how to configure IPv4 Subnet-to-SGT Mapping between two Catalyst 6500 series switches running SXPv3 (Switch1 and Switch2):
Step 1 Configure SXP speaker/listener peering between Switch1 (1.1.1.1) and Switch 2 (2.2.2.2).
Step 2 Configure Switch 2 as SXP listener of Switch1.
Step 3 On Switch2, verify that the SXP connection is operating:
Step 4 Configure the subnetworks to be expanded on Switch1.
Step 5 On Switch2, verify the subnet-to-SGT expansion from Switch1. There should be two expansions for the 10.10.10.0/30 subnetwork, six expansions for the 11.11.11.0/29 subnetwork, and 14 expansions for the 192.168.1.0/28 subnetwork.
Step 6 Verify the expansion count on Switch1:
Step 7 Save the configurations on Switch 1 and Switch 2 and exit global configuration mode.
VLAN-to-SGT Mapping
The VLAN-to-SGT mapping feature binds an SGT to packets from a specified VLAN. This simplifies the migration from legacy to TrustSec-capable networks as follows:
- Supports devices that are not TrustSec-capable but are VLAN-capable, such as, legacy switches, wireless controllers, access points, VPNs, etc.
- Provides backward compatibility for topologies where VLANs and VLAN ACLs segment the network, such as, server segmentation in data centers.
The VLAN-to-SGT binding is configured with the cts role-based sgt-map vlan-list global configuration command.
When a VLAN is assigned a gateway that is a switched virtual interface (SVI) on a TrustSec-capable switch, and IP Device Tracking is enabled on that switch, then TrustSec can create an IP-to-SGT binding for any active host on that VLAN mapped to the SVI subnet.
IP-SGT bindings for the active VLAN hosts are exported to SXP listeners. The bindings for each mapped VLAN are inserted into the IP-to-SGT table associated with the VRF the VLAN is mapped to by either its SVI or by the cts role-based l2-vrf command.
VLAN-to-SGT bindings have the lowest priority of all binding methods and are ignored when bindings from other sources are received, such as from SXP or CLI host configurations. Binding priorities are listing in the “Binding Source Priorities” section.
Feature History for VLAN-to-SGT Mapping
Default Settings
Configuring VLAN-to-SGT Mapping
Task Flow for Configuring VLAN-SGT Mapping
- Create a VLAN on the TrustSec switch with the same VLAN_ID of the incoming VLAN.
- Create an SVI for the VLAN on the TrustSec switch to be the default gateway for the endpoint clients.
- Configure the TrustSec switch to apply an SGT to the VLAN traffic.
- Enable IP Device tracking on the TrustSec switch.
- Verify that VLAN-to-SGT mapping occurs on the TrustSec switch.
Detailed Steps for Catalyst 6500, Catalyst 4K
|
|
|
---|---|---|
Creates VLAN 100 on the TrustSec-capable gateway switch and enters VLAN configuration submode. |
||
Exits VLAN configuration mode and returns to global configuration mode. |
||
Exits VLAN interface configuration mode and returns to global configuration mode. |
||
cts role-based sgt-map vlan-list vlan_id sgt sgt_number TS_switch(config)# cts role-based sgt-map vlan-list 100 sgt 10 |
||
Configure SISF policy before you proceed to the next step. Refer Configuring SISF Policy and Attaching to a Port. |
||
show cts role-based sgt-map { ipv4_netaddr | ipv4_netaddr / prefix | ipv6_netaddr | ipv6_netaddr / prefix | all [ ipv4 | ipv6 ] | |
||
|
(Optional) Verifies the operational status of IP Device tracking. |
|
(Optional) Copies the running configuration to the startup configuration. |
Configuring SISF Policy and Attaching to a Port
The Switch Integrated Security Features (SISF) policy is configured on both the VLAN and on the physical port. The SISF policy is attached to a VLAN to learn the VLAN-specific address binding. The purpose of attaching the SISF policy to a physical port is to learn IPv4 and IPv6 addresses on the physical port.
Verifying VLAN-to-SGT Mapping
To display VLAN-to-SGT configuration information, use the following show commands:
|
|
---|---|
Displays the state of the IPv4 and IPv6 neighbor binding entries in a binding table. |
Configuration Example for VLAN-to-SGT Mapping for a Single Host Over an Access Link
In the following example, a single host connects to VLAN 100 on an access switch. The access switch has an access mode link to a Catalyst 6500 series TrustSec software-capable switch. A switched virtual interface on the TrustSec switch is the default gateway for the VLAN 100 endpoint (IP Address 10.1.1.1). The TrustSec switch imposes Security Group Tag (SGT) 10 on packets from VLAN 100.
Step 1 Create VLAN 100 on an access switch.
access_switch# configure terminal
access_switch(config)# vlan 100
access_switch(config-vlan)# no shutdown
access_switch(config-vlan)# exit
Step 2 Configure the interface to the TrustSec switch as an access link. Configurations for the endpoint access port are omitted in this example.
access_switch(config)# interface gigabitEthernet 6/3
access_switch(config-if)# switchport
access_switch(config-if)# switchport mode access
access_switch(config-if)# switchport access vlan 100
Step 3 Create VLAN 100 on the TrustSec switch.
Step 4 Create an SVI as the gateway for incoming VLAN 100.
Step 5 Assign Security Group Tag (SGT) 10 to hosts on VLAN 100.
Step 6 (Optional) PING the default gateway from an endpoint (in this example, host IP Address 10.1.1.1). Verify that SGT 10 is being mapped to VLAN 100 hosts.
Step 7 (Optional) Displays the state of the IPv4 and IPv6 neighbor binding entries in a binding table.
Layer 3 Logical Interface-to-SGT Mapping (L3IF–SGT Mapping)
L3IF-SGT mapping can directly map SGTs to traffic of any of the following Layer 3 interfaces regardless of the underlying physical interface:
Use the cts role-based sgt-map interface global configuration command to specify either a specific SGT number, or a Security Group Name (whose SGT association is dynamically acquired from a Cisco ISE or a Cisco ACS access server).
In cases where Identity Port Mapping (cts interface manual sub mode configuration) and L3IF-SGT require different IP to SGT bindings, IPM takes precedence. All other conflicts among IP to SGT binding are resolved according to the priorities listing in the “Binding Source Priorities” section.
Feature History for L3IF-SGT Mapping
|
|
|
---|---|---|
Support for this command was introduced on the Catalyst 6500 series switches. |
Default Settings
Configuring L3IF-to-SGT Mapping
Detailed steps Catalyst 6500
Verifying L3IF-to-SGT Mapping
To display L3IF-to-SGT configuration information, use the following show commands:
|
|
---|---|
Configuration Example for L3IF-to-SGT Mapping on an Ingress Port
In the following example a Layer 3 interface of a Catalyst 6500 series switch linecard is configured to tag all ingressing traffic with SGT 3. Prefixes of attached subnets are already known.
Step 1 Configure the interface.
Switch(config)# interface gigabitEthernet 6/3 sgt 3
Step 2 Verify that the ingressing traffic to the interface is tagged appropriately.
Binding Source Priorities
TrustSec resolves conflicts among IP-SGT binding sources with a strict priority scheme. For example, an SGT may be applied to an interface with the policy { dynamic identity peer-name | static sgt tag } CTS Manual interface mode command (Identity Port Mapping). The current priority enforcement order, from lowest (1) to highest (7), is as follows:
1. VLAN—Bindings learned from snooped ARP packets on a VLAN that has VLAN-SGT mapping configured.
2. CLI— Address bindings configured using the IP-SGT form of the cts role-based sgt-map global configuration command.
3. Layer 3 Interface—(L3IF) Bindings added due to FIB forwarding entries that have paths through one or more interfaces with consistent L3IF-SGT mapping or Identity Port Mapping on routed ports.
4. SXP—Bindings learned from SXP peers.
5. IP_ARP—Bindings learned when tagged ARP packets are received on a CTS capable link.
6. LOCAL—Bindings of authenticated hosts which are learned via EPM and device tracking. This type of binding also include individual hosts that are learned via ARP snooping on L2 [I]PM configured ports.
7. INTERNAL—Bindings between locally configured IP addresses and the device own SGT.
Configuring Additional Authentication Server-Related Parameters
To configure the interaction between a switch and the Cisco TrustSec server, perform one or more of these tasks:
Detailed Steps for Catalyst 6500
This example shows how to configure server settings and how to display the Cisco TrustSec server list:
Automatically Configuring a New or Replacement Password with the Authentication Server
Note This feature is not supported on Cisco Catalyst 9400 Series Switches.
As an alternative to manually configuring the password between the switch and the authentication server, you can initiate a password negotiation from the switch. To configure the password negotiation, perform this task:
Detailed Steps for Catalyst 6500
Emulating the Hardware Keystore
|
|
---|---|
This feature was introduced on the Catalyst 6500 series switches. |
Note This feature is not supported on Cisco Catalyst 9400 Series Switches.
In cases where a hardware keystore is not present or is unusable, you can configure the switch to use a software emulation of the keystore. To configure the use of a software keystore, perform this task:
Detailed Steps for Catalyst 6500
This example shows how to configure and verify the use of a software keystore: