EMAIL SUPPORT

dclessons@dclessons.com

LOCATION

US

Cisco TrustSec Introduction

TrustSec

VLAN assignment and dACL are two important parameters used to control access to network, buts its size grows expontiently when network expends and there are large requirement of network access.

As network grows, it very difficult to manages them, as their size increase very large as per below formula for ACEs.

(# of sources) × (# of destinations) × permissions = # of ACEs

Let say I have 1 Source and 6 destination and if we require 4 permission then total number of ACE require would be:

1 source × 6 destinations × 4 permissions = 24 ACEs

So Implementation and later management of these ACE is very complex task. To overcome these challenges, TrustSec was developed.

TrustSec is next generation access control enforcement, developed to address the issue of above challenges of ACE increase.

TrustSec assign a tag called Security Group tag or SGT, to user/device’s traffic at ingress, and then enforce the access everywhere in infrastructure.

Example: Guest user is assigned SGT so that it can isolated to non-Guest Traffic throughout infrastructure.

Below are some common SGT groups provided by ISE.

  • Network Infrastructure:SGT assigned to all the switches, routers, WLCs, and firewalls within the organization.
  • Network Services:SGT is assigned common services servers like (DNS, DHCP, NTP, and so on).
  • Executive:To classify executives’ traffic and simply to ensure that executives will never be denied access to anything.
  • Sales:SGT assigned to sales traffic of organization.
  • Finance:SGT assigned to  Finance traffic of organization
  • HR:SGT assigned to HR traffic of organization.
  • Line-of-Business-1:SGTs are used for different lines of business, and those lines of business cannot have access to each other’s data.

 Security Group tags

 It is 16 bit value that ISE assigns to users or endpoint session upon login. Network infrastructure see these SGT as an attributes and put this information as Layer 2 tag in to all traffic for that particular session. 

Defining SGT’s:

ISE acts as SGT controller, and has dedicated work center related to TrustSec. ISE comes with large number of predefined SGT’s with assigned icons as shown below.

To view these SGT, follow below path: Work Centers | TrustSec, with this path you can also cre ate your own SGT’s. Here notice that one default SGT, Unknown with value 0. This SGT will be used when a traffic arrives and has no SGT tags.

Classification

It is a process classifying any traffic and assigning a SGT. All Supported Cisco Switches and wireless Controllers supports assignment of SGT.

Transport: The Process of communicating the assigned SGT to upstream Network Infrastructure via Native tagging or via Peering Protocols is called Transport.

Below Example shows one access switch that has native tagging, and packets gets tags on uplink port. There is also a non-native tagging switch, which is using a peering protocol to update the Tags to its upstream switch. In both cases, upstream switch continues to tag traffic throughout the infrastructure.

There are following ways to assign the tags.

  • SGT can be assigned dynamically, and be downloaded as the result of an ISE authorization
  • It can be assigned manually at the port level
  • It can be mapped to IP addresses and downloaded to SGT-capable devices.

Now we will see each method one by one:

Dynamically Assigning SGT via 802.1X

ISE has some preconfigured example of TAG assignment. You can use below link to see these:

Work Centers | Network Access | Policy Sets | Default | Authorization

Below are the steps to add Security Group tag as an authorization result:

Step 1. Click Edit to edit your existing authorization rule.

Step 2. Click the + sign under Permissions.

Step 3. Click the + sign next to the authorization profile.

Step 4. Choose Security Group.

Step 5. Select the appropriate Security Group to apply.

 

GENERAL FAQ

Cisco TrustSec is an access control policy framework. Rather than dealing with lengthy and convoluted ACLs, it works by tagging and controlling traffic using the Security Group Tag (SGT). This allows you to apply uniform security rules across the network. Cisco TrustSec is a next-generation access control method that can greatly enhance the performance, scalability, and manageability of your network.

Conventional Access Control Lists (ACLs) are rapidly expanding with the network and also becoming difficult to administrate. TrustSec eliminates these large ACLs with tag-based policies. Every user or device is associated with an SGT, and access rights are granted using these tags, rather than the use of static IPs or VLANs.

The SGT specifies the privileges of a traffic source within the Cisco TrustSec domain. The SGT denotes the endpoint’s access entitlements, and all traffic from the endpoint will carry the SGT information. The SGT is used by Cisco TrustSec-capable enforcement devices to make forwarding decisions. Because the SGT assignments denote the business roles and functions, Cisco TrustSec access controls can be defined in terms of business needs and not underlying networking details. 

An SGT (Security Group Tag) is a 16-bit tag assigned by Cisco ISE to a user or device session when the user logs in. The tag travels with the traffic across the network and helps switches, routers, and firewalls understand what kind of access that traffic should have, for example, whether it belongs to HR, Finance, or Guest users. This allows consistent access control policies to be enforced across the entire network.

There are a couple of ways that SGTs can be assigned:

Dynamically by Cisco ISE during user authentication (such as 802.1X).

On a switch, you can do this manually on the port level.

Supported devices can download these packages by resolving their IP addresses.

These techniques enable more flexible and accurate tagging of data in the various networks.

Cisco ISE is the TrustSec Centralized policy creation point. It is the store of Security Group Tags and policies, handling their definition, control, and distribution across the network. ISE also offers a TrustSec work center, which allows administrators to easily view, create, and manage SGTs.

Yes. Most modern Cisco switches, routers, and wireless controllers support TrustSec tagging and policy enforcement. Even if your network includes older or non-SGT-capable devices, TrustSec can still exchange SGT information through peering, allowing consistent policy enforcement across mixed environments.


Comment

    You are will be the first.

LEAVE A COMMENT

Please login here to comment.