Brksec 3690
Brksec 3690
Tags (SGT)
The Detailed Walk Through
BRKSEC-3690
Cisco Webex Teams
Questions?
Use Cisco Webex Teams to chat
with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
About Me
Darrin Miller
• Security focused Technical Marketing Engineer
• Focused on Architecture, Policy, and Threat
• Author of Books, CVDs, Whitepapers, Patents, etc.
• Cisco Live Distinguished Speaker Hall of Fame Elite
• 20+ years at Cisco: Research, Development, TME
Clarification:
That is “my” beer.
Beer Lover It was placed in
front of me. In
addition I paid for
the dinner where
the accuser made
Beer Lover this picture.
Accuser
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Agenda
• Security/Scalable Group Tag (SGT) Review
• Use Case Reviews with Design Considerations
• Campus
• WLAN
• Software Defined Access (SD-Access) – SGT/VXLAN
• Firewall Integration with SD-Access
• Meraki/3rd party interop
• WAN
• SXP WAN design
• SGT over WAN
• Data Center
• SGT/ACI
• Cloud
• Summary
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
SGT Review
Traditional Segmentation
Access Layer
groupings to provide
consistent policy and 50 Employee 1 Employee 2 Employee 3
SGT_FinanceServer SGT_Printers
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
SGT Review
Example: User to Application Access Control
• Regardless of topology or
Public Cloud - IaaS
location, policy (Security
Group Tag) stays with users,
Data Center Data Center
Devices, and workloads Firewall
• SGT simplifies ACL
management for intra/inter- Campus Core
VLAN traffic
• Other Use Cases
- Workload/Workload Micro
segmentation
- User/User – Device/Device
Micro Segmentation Access Layer
- Hybrid Cloud Employee Tag
Supplier Tag
Guest Tag
Non-Compliant
Tag
Voice Voice Employee Suppliers Guest Non-Compliant
SGT #3
Internal resources Static mechanisms
Internal IT SGT #4
infrastructure and
topology-based IP
Subnets VLANs
Static
policy Address
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
SGT Review
SGT Transport Mechanism
Inline SGT Tagging
Security/Scalable group eXchange Protocol (SXP)
IP-SGT Binding Table
IP Address SGT SRC SGT=50
10.1.100.98 50 Local
ASIC ASIC
SXP Optionally Encrypted
Non-SGT
capable
Campus Access Core DC Core TOR DC Access
Enterprise
Backbone
10.1.100.98
Hypervisor SW
WLC SGT=50
Ethernet Frame FW
SRC: 10.1.100.98
Inline Tagging (data plane):
ASIC
If Device supports SGT in its ASIC
IP Address SGT SXP (control plane):
10.1.100.98 50 Shared between Devices that do
SXP not have SGT-capable hardware
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
SGT Review
SGT Transport over L3 networks
Enterprise
Network
VXLAN
Guest Server
Finance Catalyst Switch ISE Posture
WLC
Profiler
Nexus 5000/2000
Enterprise LAN
Internet
BYOD
SXP
DMVPN
Catalyst Switch Catalyst 6500
Nexus 7000 Data Center
Catalyst Switch
Admin GETVPN
Ent. MPLS
SGACL
HR
SGT carried inband with ethernet frame
• Multiple options for SGT transport over non CTS Layer 3 networks
• DMVPN for Internet based VPNs – IWAN compatible SGT carried inband with VXLAN
• GETVPN for security private MPLS clouds SGT carried inband with DMVPN
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
SGT Review
End-to-end SGT Tagging
FIB Lookup
Destination MAC/Port SGT 30 Destination Classification
CRM: SGT 20
PCI_DB: SGT 30
End user authenticated
Classified as Employee (5)
ISE
Cat9300 Cat9500 Cat9600 Nexus 7000 Nexus 5500 Nexus 2248
CRM
5 Enterprise DST: 10.1.100.52
Backbone SGT: 20
SRC:10.1.10.220
SRC: 10.1.10.220 DST: 10.1.200.100 PCI_DB
SGT: 5 Nexus 2248 DST: 10.1.200.100
SGT: 30
WLC5508 Firepower
SGT Tagging SRC\DST CRM (20) PCI_DB (30)
Employee (5) SGACL-A Deny
BYOD (7) Deny Deny
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
SGT Review
Dynamic Security Group ACL (SGACL)
Downloads
Prod_Servers Dev_Servers
• New User/Device/Server provisioned Switches pull
down only the
• Switch requests policies for assets they protect policies they need
SGT=3
SGT=4
SGT=5
• All controls centrally managed
• Security policies de-coupled from network topology
• No switch-specific security configs needed
• One place to audit network-wide policies
Switches request
Prod_Server policies for assets
Dev_Server
(SGT=7) they protect
(SGT=10)
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
SGT Review
Open Implementations
• 3rd parties support SGTs vis pxGrid - IETF proposal for Security Automation and
Continuous Monitoring (SACM) – Checkpoint amongst others
• SXP published as an Informational Draft to the IETF, based on customer requests –
shipping partner implementations
• Open Source SXP Implementations – Java in OpenDaylight, C on github.com
• Includes the Cisco Meta Data (CMD) format for inclusion of the SGT with Ethernet
frames (detailed on the next slides)
• https://datatracker.ietf.org/doc/draft-smith-kandula-sxp/
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
SGT Review
Why is this Interesting? – Making “Intent” Real
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
SGT Review
Forrester: The Total Economic Impact of SGTs
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Use Case Reviews with
Design Considerations
Use Case - Campus
SGT/SGACL Supported Platforms
http://www.cisco.com/c/en/us/solutions/enterprise-networks/trustsec/trustsec_matrix.html
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Use Case Review -
Campus
Use Case - Campus
Campus Access Control
• Business Problem/Background
• BYOD assets require restricted access to Corp. network and Internet proxies
• Production vs. Development Users on Corp. WLAN
• Compliant vs. Noncompliant Users on Corp. WLAN
• Centralized compulsory tunneling caused application performance degradation
• Scaling Decentralized access control – platform, opex, capex
• Solution Overview
• Use of SXP to communicate IP/SGT of all classes of users above to upstream SGACL switch
• Use subnet/SGT and IP/SGT definitions published to distributed SGACL switches via SXP, ISE push, or CLI
• Upstream SGACL switch derives SGT/DGT matches from SXP, ISE 1.3, or CLI.
• Example - Reduced IOS ACE from approx. 1500 lines to one ACE
• permit tcp dst eq 443
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Use Case - Campus
Manufacturer Internet Proxies
192.168.31.1/32 = SGT100
IP Address SGT
Data Center
192.168.31.1./32 Internet Proxies - 100
SGT DGT SGACL 192.168.32.0/24 = SGT 20 192.168.31.1./32 Internet Proxies - 100
192.268.32.0/24 Data Center - 20
ISE 192.168.32.0/24 Data Center - 20
BYOD Data Center deny ip Branch Office 10.x.x.0/24 Campus D - 30
10.x.x.0/24 Campus A - 30
Campus A 10.z.z.0/24 Branch Office - 50
10.z.z.0/24 = SGT 50 10.z.z.0/24 Branch Office - 50
10.x.x.0/24 = SGT 50
IP Address SGT
SGT 6: Full Access SGT 3: BYOD SGT 4: Dev SGT 5: Production SGT 8: Limited Access SGT 6: Full Access
IP Address SGT
IP Address SGT SRC:10.2.1.100
10.23.1.100 Limited_Access - 8
10.2.1.100 BYOD - 3 DST: 192.168.32.100
10.23.10.200 Full Access - 6
10.2.10.200 Full Access - 6
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Use Case - Campus
Hardware Forwarding SGT/SGACL
• IP/SGT Based
• Cat9K/Cat 6K-Sup2T
• N7K – M series and F series
• Cat 4K/Sup7E/Sup8E
• Cat 3850/5760
• ASR1K
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Use Case - Campus
SGT and Destination Group Tag (DGT) Derivation in Cat 3K-X
DGT
Each (Port,vlan) DGT SGT/DGT
(Port,vlan) SGACL
can have
one DGT
associated
with it.
Egress Path (DGT derivation and SGACL)
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Use Case - Campus
SGT and DGT Derivation in Cat9K
From the Ingress port based
Priority L3/FIB table
control btw Packet Static Config
sources
Ingress Path (SGT Derivation) SGT
DGT
IP prefix DGT SGT/DGT
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Use Case - Campus
WLC SXP Configuration
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Use Case - Campus
IOS SXP Configuration
C3850#show cts role-based sgt-map all details
Active IP-SGT Bindings Information
• Configure ISE 2.x to the point where you can perform 802.1X authentication (bootstrap, certificate, AD
integration, basic authentication & authorization rules)
• Configure Device SGT (Work Centers > Trustsec > Components > Security Group)
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Use Case - Campus
SGT Configuration for ISE
• Under Work Centers > TrustSec > Trustsec Policy > Network Device authorization, assign Device
SGT created in step (2) to default condition
• Optionally under Administration > System > Settings > Protocols > EAP-FAST > EAP-FAST Settings, change A-ID
description to something meaningful, so that you can recognise which ISE you are receiving PAC file
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Use Case - Campus
Configuration an SGT Device
• Configure RADIUS secret.
Also Advanced TrustSec
Settings, check Use
Device ID for TrustSec,
then type Device
password. This ID and
Password needs to be
exactly same as you
define on network Device
CLI
• Use default AAA group for 802.1X and “defined authz list” for authorization
C9K-CORE-1(config)#aaa authentication dot1x default group radius
C9K-CORE-1(config)#aaa authorization network <AUTHZ_List_Name> group radius
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Use Case - Campus
Configuring an IOS Switch for SGT(cont.)
• Configure RADIUS server to use VSA in authentication request
C9K-CORE-1(config)#dot1x system-auth-control
• Define Device credential (EAP-FAST I-ID), which must match ones in ISE AAA client configuration
Note: remember that Device credential under IOS is configured in Enable mode, not
in config mode. This is different CLI command level between IOS and NX-OS,
where you need to configure Device credential in config mode
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Use Case - Campus
Verification – Environment Data
C6K-CORE-1#show cts environment-data
CTS Environment Data
====================
Current state = COMPLETE
Last status = Successful
Local Device SGT:
SGT tag = 2-00
Server List Info:
Installed list: CTSServerList1-0004, 3 server(s):
*Server: 10.1.100.3, port 1812, A-ID 04FB30FE056125FE90A340C732ED9530
Status = ALIVE
auto-test = FALSE, idle-time = 60 mins, deadtime = 20 secs
*Server: 10.1.100.4, port 1812, A-ID 04FB30FE056125FE90A340C732ED9530
Status = ALIVE
auto-test = FALSE, idle-time = 60 mins, deadtime = 20 secs
*Server: 10.1.100.6, port 1812, A-ID 04FB30FE056125FE90A340C732ED9530
Status = ALIVE
auto-test = FALSE, idle-time = 60 mins, deadtime = 20 secs
Multicast Group SGT Table:
Security Group Name Table:
0001-30 :
2-98 : 80 -> Trustsec_Devices
unicast-unknown-98 : 80 -> Unknown
Any : 80 -> ANY
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Use Case - Campus
Create the SGTs in ISE – UI/REST
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Use Case - Campus
Preparing ISE for SGACL Enforcement
• ISE needs to be configured for SGT/SGACL and associated policies
Under Work Center > TrustSec > Egress Policy
2
Select Permission
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Use Case - Campus
Activating SGACL Enforcement on IOS Switch
• After setting up SGT/SGACL on ISE, you can now enable SGACL Enforcement on IOS switch
Defining IP to SGT mapping for servers – Shown via CLI, but can be pushed from ISE to CLI or via SXP
C6K-CORE-1(config)#cts role-based sgt-map 192.168.31.1 sgt 100
C6K-CORE-1(config)#cts role-based sgt-map 192.168.32.0/24 sgt 20
C6K-CORE-1(config)#cts role-based sgt-map 10.x.x.0 sgt 30
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Use Case - Campus
Downloading Policy on IOS Switch
• After enabling SGACL enforcement, policies need to be downloaded to IOS, the egress
enforcement point
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Use Case - Campus
Downloading Policy on IOS Switch
Verify Environment Data
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Use Case - Campus
The Reality of SGACL Download – Server List
• There is one Server List defined in ISE
• The NAD can be configured to speak to ISE via real IP of PSN or SLB
Virtual IP address for CTS (this is supported)
• Regardless the NAD will download from the IPs in the server list
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Use Case - Campus
Server List with Real IP of ISE PSN
or Load Balanced Virtual IP (VIP)
1. NAD configured to talk to IP of real ISE VIP IP1 ISE Cluster PSN 1/2/3
PSN IP1 or Virtual IP (VIP) IP2
2. NAD downloads environmental data
and gets server list with ISE real IP4
3. User 802.1X authenticates and gets
SGT x
4. When ISE goes to pull down SGACLs
for policy it will adhere to the Server ISE PSN4 IP4
List and speak to ISE PSN4 real IP4
Payment Server
Trusted
Asset
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Use Case - Campus
ISE SGACL Policy Push
UI interaction
Identity Services Engine SGACL COA
1. BYOD communicating with Development
Server SGACL Download
2. Administrator creates new Policy denying Administrator
access to BYOD to Development Server
3. Administrator triggers a push of policy
4. Network Device downloads new policy for
Development Server
Development
BYOD
Server
deny ip
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Use Case - Campus
Alternative Policy View on IOS Switch
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Use Case - Campus
SGACL Monitoring – Best Effort Syslog
C9K-CORE-1#sho cts role-based permissions
IPv4 Role-based permissions from group 8:EMPLOYEE_FULL to group 8:EMPLOYEE_FULL:
Lateral_Prevention-11
C9K-CORE-1#show ip access-list
Role-based IP access list Deny IP-00 (downloaded)
10 deny ip
Role-based IP access list Lateral_Prevention-11 (downloaded)
10 deny icmp log
20 deny udp dst eq 445 log
30 deny tcp dst range 1 100 log (51 matches)
40 deny udp dst eq domain log
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Use Case - Campus
Verifying SGACL Drops
Mostly SGACL is done in HW. Only if the packet needs to be punted to SW (e.g.
TCAM is full, marked to be logged) , SW counter increments
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Use Case - Campus
SGT/SGACL for WLC/APs
Destination BYOD Employees
Source (4) (5)
• Code 8.3 – allows SXP from WLC for FlexConnect Intra_Jabber_Sig Intra_Jabber_Sig
Employees (5)
Anti_Malware Anti_Malware
• Code version 8.4
Intra_Jabber_Sig Intra_Jabber_Sig
BYOD (4)
Anti_Malware Anti_Malware
• Models: 2800, 3700, 3800, 1850,1830, 1700, 2700
(AKA wave 1 and wave 2 APs)
Benefits
• Restrict Lateral Movement in WLAN natively Stealthwatch
• Restrict Lateral Movement to LAN as well
• Use classifications from WLC/AP in ASA, FTD,
FTD
WSA, StealthWatch policies
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Use Case - Campus
Central Authentication/Switch
WLAN User to WLAN User
1. Clients are authenticated and assigned an
SGT
2. WLAN Client-1 sends IP packet to WLAN ISE
Client-2
3. Ingress AP tags frame
4. Frame arrives at egress AP Switch
5. Egress AP derives S-SGT from frame
6. AP derives D-SGT from WLAN client table
7. AP finds SGACL for SGT/D-SGT match in
memory and applies policy
IP Address SGT
10.2.1.200 Full Access - 5
WLC Switch
SRC:10.2.1.100
DST: 10.2.1.200
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Nexus 7000 SGT
Considerations
Use Case - Campus
Nexus 7000 SGT/SGACL Capabilities
• SGT/SGACL supported on M series, F2, F2E cards as of 6.2(6a)
• SGT/SGACL support on F3 as of 6.2(10)*
• VPC and Fabric Path supported in 6.2(10) with IP/SGT only
• NXOS 7.3
• Subnet/SGT including local only 0.0.0.0/0 for ”Internet use cases”
• SXPv3 to receive/send subnet/SGT (no IPv6)
• SGACL Monitor Mode
• Enhanced SGACL Logging (action in log)
• NXOS 8.0 LOB1 LOB2 PCI_DB
• Two configuration options to provide an L3 interface exist that will impose the dot1q header.
• Interface configuration through the use of sub-interfaces with 802.1q encapsulation enabled.
• Use of a logical Switched Virtual Interface (SVI) used with interface configured as a L2 Trunk port carrying the VLAN to
which the SVI is assigned.
• Can impact L2 control traffic consists of protocols such as CDP, LLDP, LACP, PAgP, STP, BFD, etc working with
• SGT Tagging Compatibility of F3 with ISR/ASR/Catalyst switches – Fixed in IOS-XE 16.10 for IOS-XE routers
• https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus7000/sw/security/config/cisco_nexus7000_security_config_guide_8x/configuring_ci
sco_trustsec.html#concept_06EC3AC2909F4592BCB3862
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Use Case - Campus
Nexus 7000 Interface Configuration
feature cts
feature dot1x
cts Device-id N7K-DST1 password 7 wnyxlszh123
cts role-based counters enable
cts role-based sgt-map 10.39.1.30 17
……
cts role-based sgt-map 10.87.109.72 3
cts role-based enforcement
vlan 87
cts role-based enforcement
vlan 118
cts role-based enforcement
interface Ethernet1/25
description N5K connection
cts manual
policy static sgt 0x0002 trusted <- Later versions of NXOS allow a decimal for the SGT
switchport
switchport mode trunk
switchport trunk allowed vlan 90,118-120,124
spanning-tree port type normal
channel-group 10 mode active
no shutdown
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Common Issues
Use Case - Campus
Device Tracking – The Engine that
802.1X/MAB Work for SGT
interface GigabitEthernet1/0/1
• Device Tracking was enabled by switchport access vlan 100 IOS-XE 3.x
default for 802.1X/MAB in IOS switchport mode access
authentication event fail action next-method
releases prior to 16.x authentication host-mode multi-auth
authentication open
• In 16.x IP Device Tracking is authentication order dot1x mab
authentication priority dot1x mab
enabled separately from authentication port-control auto
802.1X/MAB authentication periodic
authentication timer reauthenticate server
authentication violation restrict
mab
snmp trap mac-notification change added
dot1x pae authenticator
dot1x timeout tx-period 10 Mandatory in
spanning-tree portfast
spanning-tree bpduguard enable IOS-XE 16.x
device-tracking attach-policy IPDT_MAX_10
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Use Case - Campus
Device Tracking Entry Fundamental
to an IP/SGT Entry
DC-C4K-Sup8E#sho ip device tracking all
Global IP Device Tracking for clients = Enabled
Global IP Device Tracking Probe Count = 3
Global IP Device Tracking Probe Interval = 30
IOS-XE 3.x
Global IP Device Tracking Probe Delay Interval = 0
-----------------------------------------------------------------------------------------------
IP Address MAC Address Vlan Interface Probe-Timeout State Source
-----------------------------------------------------------------------------------------------
10.0.0.1 c471.feb7.f141 5 GigabitEthernet3/2 30 ACTIVE ARP
Network Layer Address Link Layer Address Interface vlan prlvl age state Time left
ARP 10.0.0.1 0050.56b4.4760 Gi1/0/1 100 0005 4mn REACHABLE 42 s
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Use Case - Campus
IP/SGT Programming Happens after
Device Tracking Learning
SW1-BRC1#sho cts role-based sgt-map all det
Active IPv4-SGT Bindings Information
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Use Case - Campus
CSCvh70725 - SGT Binding Removed After IPv6
Entry Goes to STALE in IPDT Database
device-tracking policy IPDT_MAX_10
no protocol ndp
9410#sh cts role-based sgt-map 10.0.0.1 no protocol dhcp6
IP Address SGT Source tracking enable
====================
10.0.0.1 18 LOCAL interface GigabitEthernet1/0/1
device-tracking attach-policy IPDT_MAX_10
9410#sh device-tracking dat int GigabitEthernet2/0/11
Network Layer Address Link Layer Address Interface vlan prlvl age state Time left
ND FE80::CE99:99FF:FE4E:FCE4 cc00.9100.fce4 Gi2/0/11 417 0005 4mn REACHABLE 18 s try 0
ARP 10.0.0.1 cc00.9100.fce4 Gi2/0/11 417 0005 69s REACHABLE 239 s try 0
ND FE80::DD99:7D5B:DE67:FE60 cc01.a200.cc38 Gi2/0/11 402 0005 7s REACHABLE 302 s try 0
ARP 10.0.0.2 cc01.a200.cc38 Gi2/0/11 402 0005 32s REACHABLE 271 s try 0
Once the IPv6 entry goes to STALE, the IPv4 SGT Binding gets removed from the table, causing the phone be considered
Unknown.
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Use Case - Campus
SGACL Download Errors
• Validate AAA is reachable with “show aaa servers”
• Validate the device has a PAC with “show cts pac all”
• Validate the device can communicate with ISE by checking environmental data
“show cts environmental-data”
• Check ISE to make sure the SGACL is formatted properly
• No IP/SGT on switch because of an error in device tracking
• TrustSec communities Troubleshooting Guide
• https://communities.cisco.com/docs/DOC-69479
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Software Defined
Access (SD-
Access) –
SGT/VXLAN
Use Case – SGT/VXLAN
What is SD-Access?
• Policy/Automation/Assurance for a set of technology innovations solving
• Subnet availability across access layers w/o stretched VLANs (i.e. spanning tree)
• Very common in manufacturing, medical, university environments
• Especially relevant as IoT enters the enterprise campus/WAN (building automation systems that only connect via L2
protocols, connected lighting, etc.)
• Simplified VRF deployment w/o MPLS
• Distribution/Core can be plain IP while the edges can be the VRF point of presences
• Simpler connection of VRFs via on demand tunnels as opposed to GRE, etc.
• More scalable VRF counts than DMVPN, etc.
• Security using SGT/SGACL – alternative to SXP that allows end to end tagging w/o “all Devices in the middle
being Cisco”
• Easy to handle 3rd party distribution/core layers
• Easy to handle topologies where the WAN router isn’t managed by the enterprise
• https://www.cisco.com/c/en/us/solutions/enterprise-networks/software-defined-access/compatibility-
matrix.html
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Use Case – SGT/VXLAN
SD-Access
Two Level Hierarchy – Macro Level
Building Management
Campus Users
VN
VN
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Use Case – SGT/VXLAN
SD-Access
Two Level Hierarchy – Micro Level
Network
Scalable Group Tag (SGT)
Second level Segmentation ensures
role based access control between
two groups within a Virtual Network.
Provides the ability to segment the
network into either line of businesses
or functional blocks.
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Use Case – SGT/VXLAN
What is Unique About SD-Access?
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Use Case – SGT/VXLAN
SD-Access – ISE/Cisco DNA FABRIC POLICIES
Contract
Employees Production
PERMIT
Cisco
DNA Center
API
Employees Contractors Production Development
Cisco ISE
POLICY DOWNLOAD
FABRIC NODES
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Use Case – SGT/VXLAN
Policy Views in DNAC (Matrix View)
• Scaled and
Zoomed View
• Easy navigation
of large
policies
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Use Case – SGT/VXLAN
Policy Views in DNAC (Matrix View)
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Use Case – SGT/VXLAN
Policy Views in DNAC (List View)
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Use Case – SGT/VXLAN
SD-Access Example Topology
11.11.11.0/24
Data Center
1. LISP Routing Lookup for Cisco DNAC - ISE
destination IP. Tunnel LISP
location found - see Mapping System
BRKCRS for all the 10.10.10.0/24
SDA Fabric Site 1
details
Fabric Border
2. SGT Tagged traffic Routers Web App DB
encapsulated in VXLAN
and sent to tunnel IP Network
location over “non
SGT D-SGT SGACL
exit
• IPv4 any version of code, IPv6 16.9 !
eid-table vrf Guest instance-id 11
dynamic-eid Guest_10_241_1_0
database-mapping 10.241.1.0/24 locator-set
rloc_5ac867cf-dcaf-4537-a043-da8b4c91c21f
exit
!
exit
!
disable-ttl-propagate
ipv4 sgt
ipv4 use-petr 10.99.200.39
ipv4 itr map-resolver 10.99.200.39
ipv4 itr
ipv4 etr map-server 10.99.200.39 key uci
ipv4 etr
exit
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Use Case – SGT/VXLAN
Fabric Sites & Domains
Connecting Multiple Fabrics
?
single Fabric Site another Fabric Site
VRF-LITE
C MPLS C
SD-Access
SD-WAN*
B B B B
Metro Area
Fabric Fabric
Site 1 Site 2
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Use Case – SGT/VXLAN
SD-Access for Distributed Campus
SD-Access Transit
CONTROL-PLANE
1
LISP LISP LISP
C C
B B B B
SDA Transit Network
Border Border
Cisco DNA-Center
DATA+POLICY-PLANE
12
VXLAN+SGT VXLAN+SGT VXLAN+SGT
IP Address SGT
10.2.10.200 Contractor - 4
C C
B B B B
SDA Transit Network
SDA Fabric Site 1 SDA Fabric Site 2
Border Border
3
SRC:10.2.10.100
Cisco DNA-Center
DST: 10.2.10.200
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Firewall Integration
with SD-Access
Use Case – SGT/VXLAN
Border Deployment Options -
Firewalls
Non-SGT aware Firewall: SGT aware Firewall :
• Firewall is connected externally to the • Firewall is connected externally to the Campus
Campus Fabric. Fabric.
• The prefixes from the local Campus • The prefixes from the local Campus Fabric domain
Fabric domain will be advertised to the will be advertised to the firewall with a routing
firewall with a routing protocol of protocol of choice.
choice.
• SXP connection between ISE and Firewall used for
• Firewall policy is based Interface or derivation of SGTs on the Firewall.
Subnet IP/mask and IP ACL’s.
• Firewall policy is based on SGT’s and SGACL’s
(Group Based Policy).
B
B
B
Firewall
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Use Case – SGT/VXLAN
Border Deployment Options -
Firewalls
DATA PLANE TRAFFIC
VXLAN VRF-LITE
B
B
B
Firewall
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Use Case – SGT/VXLAN
Border Deployment Options -
Firewalls ISE
POLICY-PLANE
SGT in VXLAN
Scalable Group Tags
SXP/PXGRID
B
B
B
Firewall
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Use Case – SGT/VXLAN
Single VN - Endpoint to Application
POLICY-PLANE ISE
SGT in VXLAN
Scalable Group Tags
SXP/PXGRID
B Firewall
B 5
PCI_Users
SRC:10.1.10.10
DST: 11.11.11.100
B SRC:10.1.10.10
DST: 11.11.11.100
10.1.10.10 SGT: 5 PCI_App
11.11.11.100
IP Address SGT
10.1.10.10 PCI Users
12.1.10.10 LOB2 Users
11.11.11.4 PCI_DB
11.11.11.100 PCI_App
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
Use Case – SGT/VXLAN
Multiple VN - Endpoint to Endpoint
ISE
POLICY-PLANE
SGT in VXLAN
LOB1-VN Scalable Group Tags
SXP/PXGRID
B Firewall
B 5
LOB1_UsersSRC:10.1.10.10
DST: 12.1.10.10
B SRC:10.1.10.10
DST: 11.11.11.100
10.1.10.10 SGT: 5
IP Address SGT
10.1.10.1 LOB1_Users
12.1.10.10 LOB2_Users
11.11.11.4 PCI_DB
11.11.11.100 PCI_App
LOB2_Users
12.1.10.10 SGT DGT SGFW
IP Address SGT
Auditor 10.1.10.1 Auditor
ISE
Application
Servers App Servers
1
Trusted
Database DB Servers
Auditor Asset
Network
802.1x
Servers
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Meraki and 3rd party Interop
Common Questions about Deployment
with Non Cisco RADIUS or NAC Solutions
• ”What if I don’t have ISE for 802.1X/MAB AAA?”
• Any RADIUS server can return the SGT
• ISE just for SGACL management
• ISE proxy and does user authorization/SGACL management
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
Meraki and 3rd party Interop
RADIUS Proxy
[Cisco RADIUS AVP] cts:security-group-tag-0064-0
Or
Any authorization attributes
ACCESS ACCEPT 2
1 802.1X / MAC authentication 1
(and) SGT
request to Cisco ISE SGACL Policy
Auth Download
Request
ISE proxies the 802.1X / 5
2
MAB request to RADIUS
server 0
3 RADIUS Server returns
access accept with IETF Network
attribute [1] – username
User / Endpoint Access Switch Protected Services
DC Switch
4 ISE inspects username and
matches authorization Rule in
ISE for SGT assignment • ISE is authoritative for SGT assignment
and SGACL definitions. • More complex coexistence for
5 SGACL for SGT-100 (Hex • Migration to ISE for authorization easy authentications and authorizations
64) “Trusted Asset” is
downloaded from ISE
“if” desired
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
Meraki and 3rd party Interop
Delineated Policy Model Cisco DNA-C
• Any/Existing RADIUS Server can assign • SGT number value needs to be entered
an SGT into the RADIUS authorization result by
• Simple coexistence hand
RADIUS Policy download
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
Meraki and 3rd party Interop
Delineated Policy Model
Switch configurations
3850
!
aaa new-model
!
!
aaa group server radius GENERIC_RADIUS
server name RADIUS_Server_01
!
aaa group server radius ISE Authentication
server name ISE_01 authorization and
! Accounting
aaa authentication dot1x default group GENERIC_RADIUS
aaa authorization network default group GENERIC_RADIUS AAA
aaa authorization network cts-mlist group ISE
aaa accounting dot1x default start-stop group GENERIC_RADIUS
CTS
cts authorization list cts-mlist
!
radius server RASDIUS_Server_01
address ipv4 10.1.100.3 auth-port 1645 acct-port 1646
Generic RADIUS Server
key cisco123
!
Cisco ISE radius server ISE_01
address ipv4 10.1.100.3 auth-port 1812 acct-port 1813
pac key cisco123
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
Meraki and 3rd party Interop
Overlay NAC - REST API: IP to SGT
Only officially supported method for SD-Access
1
3 Passive Monitoring System
writes new classification to Network
ISE via PxGrid Access Switch Protected Services
User / Endpoint
DC Switch
• Solution Overview
• Multi-use workstations use 802.1X to distinguish the user (user experience change)
• 802.1X is a full machine or user login
• Windows Fast switching not supported if user identity is needed between desktop swaps.
• ISE deployed for profiling medical devices
• Distribution/Core does not support SGT
• Access Layer capable of bidirectional SXP and filtering on IP/SGT
• 3650/3850 have limited resource for IP/SGT (12K) and can’t hold all endpoints in network
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
Use Case - WAN
Health Care Access Control -
Medical Devices (2/2)
• Solution Overview
• Resolved this by only applying SGT to users of medical Device, and servers explicitly allowed access
• All user or end Devices on network that don’t get an SGT assigned do not populate the IP/SGT
• Advertises a summary IP/SGT (10.0.0.0/8) in SXP.
• This means only explicitly known users and end Devices get an IP/SGT (/32) while everyone else in the enterprise falls
through to the summary IP/SGT (/8)
• This keeps the SXP total IP/SGT well under 12K for this particular network
• This allows the policy to be Known_SGT <-> Known_SGT = Permit and Summary_SGT<-> Known_SGT =
Deny
• Internet Traffic is not tagged. This allows the administrator to use a ”reserved” tag called “Unknown” to
handle traffic to medical resources.
• Alternative methods for handling ”Internet Traffic”
• Use “default route” classification on N7K, Cat9K to map to a specific ‘Internet SGT’
• Use a range of subnet/SGT on the edge for “public addresses” not owned by the enterprise (i.e. 1.0.0.0/8, 2.0.0.0/7,
4.0.0.0/6, etc…) to map to a specific ’Internet SGT’
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
Use Case - WAN
Default Route Classification
cat9300-SDA-1(config)#cts role-based sgt-map 0.0.0.0/0 sgt 2500
%Please ensure default route is created using ip route 0.0.0.0 command
!
!
• New in IOS XE 16.11 csr1kv-nat#sho cts role-based sgt-map all details
Active IPv4-SGT Bindings Information
• Available on N7K in NXOS IP Address Security Group Source
7.3(0)D1(1) ======================================================================
0.0.0.0/0 2500:Internet_SGT CLI
• Default route (dynamic or !
static) must exist for proper !
cat9300-SDA-1#show ip route
classification and -- snip –
enforcement Gateway of last resort is 172.23.41.1 to network 0.0.0.0
S* 0.0.0.0/0 [1/0] via 172.23.41.1
• 0.0.0.0/0 is not exported via !
!
SXP per design Cat9300-SDA-1#sh cts role-based permissions
specification on IOS XE --snip--
IPv4 Role-based permissions from group 60:IoT_Sensors to group 2500:Internet_SGT:
• “Except” N7K can allow it deny_log-01
!
via ”cts sxp allow default- !
route-sgt” Jun 9 20:44:29.700: %FMANFP-6-IPACCESSLOGSGDP: R0/0: fman_fp_image:
ingress_interface='GigabitEthernet1' sgacl_name='deny_log-01' action='Deny'
protocol='icmp' src-ip='172.23.41.144' dest-ip='172.23.41.1' type='2048' code='0'
sgt='60' dgt='2500' logging_interval_hits='1'
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
Use Case - WAN
Access Control – Health Care Medical
Devices SXP Aggregation
IP Address
10.1.254.1(/32)
10.1.254.1(/32) --
10.1.254.1(/32) -D
10.1.254.10(/32) - D
D
D
SGT
Medical_Device– –
Medical_Device
Medical_Device
10
10
MedDevUser – 20
–
10
S – Static IP/SGT Definition
D – Dynamic IP/SGT Definition
Speaker/Listener 10.1.254.10(/32) -
10.1.254.10(/32) -DD
10.1.10.1(/32) - D
MedDevUser –
MedDevUser – 20
20
Medical_Device - 10
Medical_Device -
Medical_Device -
10.1.10.1(/32) -
10.1.10.1(/32) -DD
10.1.10.10(/32) - D 10
10 - 20
MedDevUser
10.1.10.10(/32) -
10.1.10.10(/32) -D
10.100.100.100(/32) D- S MedDevUser
MedDevUser - 20
EMR - 300- 20
Electronic Medical
Records
Speaker/Listener
10.1.10.10(/32) MedDevUser - 20
10.1.10.4
Medical Application
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
Use Case - WAN
Access Control – Health Care Medical
Devices SXP Aggregation
Speaker/Listener
IP Address SGT
Medical_Device –
10.1.254.1(/32) - D
10
10.1.254.10(/32) - D MedDevUser – 20
Medical_Device -
10.1.10.1(/32) - D
10
10.1.10.10(/32) - D MedDevUser - 20
Medical Dispenser
Server
Listener
Medical Application
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
Use Case - WAN
Access Control – Health Care Medical
Devices SXP Aggregation
SGT DGT SGACL Speaker/Listener
Enterprise(30) Medical_App(400) deny ip
SRC:10.1.254.100
DST: 10.200.200.200 Listener
Electronic Medical
Records
Speaker/Listener
IP Address SGT
Medical Dispenser
10.1.254.1(/32) - D Medical_Device – 10
Server
10.1.254.10(/32) - D MedDevUser – 20 Listener
10.1.10.1(/32) - D Medical_Device - 10
10.1.10.10(/32) - D MedDevUser - 20
SXP DB RBM DB
IP1/SGT1-S1 SXP IP1-SGT1 SXP DB RBM DB
IP1/SGT1-S1R2S2
IP1/SGT1-S1 SXP IP1/SGT1
IP1/SGT1-S1R2S3
IP1/SGT1-S1R1S2
IP1/SGT1-S1R2S4
IP1/SGT1-S1R1S3
IP1/SGT1-S1R2S5
IP1/SGT1-S1R1S4
IP1/SGT1-S1R1S5
R1 R2
S1 S2 S3 S4 S5
SXP DB RBM DB
IP1/SGT1-S1R1 SXP IP1-SGT1 DC-ASR1K-1(config)#cts sxp limit import peer-sequence-nodes 2
------- DC-ASR1K-1(config)#cts sxp limit export peer-sequence-nodes 2
IP1/SGT1-S1R2
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
Use Case - WAN
ASR1K Configuration – SXP to Inline SGT
Configure SXP as normal. Arriving IP
ASR1K-1#sho run | incl sxp packets will have the SGT associated with
cts sxp enable them and be tagged on exit via the Gig
cts sxp default source-ip 10.99.1.10 0/0/0 int.
cts sxp default password cisco123
cts sxp connection peer 10.99.10.12 source 10.99.1.10 password default mode local listener
cts sxp connection peer 10.99.10.13 source 10.99.1.10 password default mode local listener
cts sxp connection peer 10.99.188.1 source 10.99.1.10 password default mode local listener
cts sxp connection peer 10.99.200.10 source 10.99.1.10 password default mode local listener
cts sxp connection peer 10.1.36.2 source 10.99.1.10 password default mode local listener
cts sxp connection peer 10.3.99.2 source 10.99.1.10 password default mode local listener
cts sxp connection peer 10.99.200.21 source 10.99.1.10 password default mode local listener
cts sxp connection peer 10.0.1.2 source 10.99.1.10 password default mode local listener
cts sxp connection peer 10.10.1.30 source 10.99.1.10 password default mode local listener
!
ASR1K-1#sho run int g 0/0/0
!
interface GigabitEthernet0/0/0
ip address 10.1.46.2 255.255.255.0
shutdown
negotiation auto
cts manual Standard Tagging Configuration for the Gig
policy static sgt 2 trusted 0/0/0 interface connected to the N7K
no cts role-based enforcement
cdp enable
!
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 105
Use Case - WAN
Considerations for SGT scaling on Cat 9K
9300#show platform hardware fed switch active fwd-asic resource tcam utilization • Total SGT it can
CAM Utilization for ASIC [0] enforce policy upon
Table Max Values Used Values
-------------------------------------------------------------------------------- • 255 prior to
Unicast MAC addresses 32768/1024 19/21
L3 Multicast entries 8192/512 0/7
17.1(1)
L2 Multicast entries
Directly or indirectly connected routes
8192/512
24576/8192
0/9
96/149
• 4K as of
QoS Access Control Entries 5120 85 17.1(1)
Security Access Control Entries 5120 162
Ingress Netflow ACEs 256 9 • IP/SGT Counter –
Policy Based Routing ACEs 1024 20 10K limit officially*
Egress Netflow ACEs 768 9
Flow SPAN ACEs 1024 13 • ACE Counter –
Control Plane Entries 512 255
Tunnels 512 17 ACEs are shared
Lisp Instance Mapping Entries 512 3 with like SGT/DGT
Input Security Associations 256 4
Output Security Associations and Policies 256 5
SGT_DGT
CLIENT_LE
8192/512
4096/256
4060/512
0/0
• SGT/DGT Hash
INPUT_GROUP_LE 1024 0 table – Cells from
OUTPUT_GROUP_LE
Macsec SPD
1024
256
0
2
the ISE Matrix
* - IP/SGT scales are per platform. Check limits in TrustSec Systems Bulletin
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
Use Case - WAN
Health Care Evolution due to scale
Router SGACL and ISE as SXP Speaker IP Address
10.1.254.1
SGT
SGT
Medical_Device
Medical_Device –– 10
10
10.1.254.10 MedDevUser
MedDevUser –– 20
20
10.1.10.10 MedDevUser
MedDevUser -- 20
20
SXP Enabled
WLC
Listener
Electronic Medical
Records
Listener
Medical Dispenser
Server
Listener
Remote Site
Medical Application SGT carried inband with ethernet frame
SXP
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
Use Case - WAN
Configure Links for SGT Tagging
CTS Manual no encryption
ISR4K-1#sho cts interface brief
ISR4K-1
Global Dot1x feature is Enabled
Interface GigabitEthernet1/5
Interface GigabitEthernet1/1:
cts manual
CTS is enabled, mode: MANUAL
policy static sgt 2 trusted
IFC state: OPEN
no cts role-based enforcement
Authentication Status: NOT APPLICABLE
Peer identity: "unknown"
Catalyst 3850
Peer's advertised capabilities: ""
interface GigabitEthernet1/0/14
Authorization Status: SUCCEEDED
no switchport
Peer SGT: 2:Device_sgt
ip address 10.10.20.2 255.255.255.0
Peer SGT assignment: Trusted
cts manual
SAP Status: NOT APPLICABLE
policy static sgt 2 trusted
Propagate SGT: Enabled
no cts role-based enforcement
Cache Info:
Expiration : N/A
• port-channel support - cts is
Cache applied to link : NONE
configured on the physical interface
then added to the port channel
L3 IPM: disabled.
Best Practice - “shut” and “no shut” and interface for any cts manual change
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 109
Use Case - WAN
How Do I Know if I am Tagging? SGT
and Flexible NetFlow (FNF)
flow record cts-v4 Interface vlan 10
match ipv4 protocol ip flow monitor cts-mon input
match ipv4 source address ip flow monitor cts-mon output
match ipv4 destination address
match transport source-port
Interface vlan 20
match transport destination-port
match flow direction
ip flow monitor cts-mon input
match flow cts source group-tag ip flow monitor cts-mon output
match flow cts destination group-tag
collect counter bytes Interface vlan 30
collect counter packets ip flow monitor cts-mon input
ip flow monitor cts-mon output
flow exporter EXP1
destination 10.2.44.15 Interface vlan 40
source GigabitEthernet3/1 ip flow monitor cts-mon input
ip flow monitor cts-mon output
flow monitor cts-mon
record cts-v4
exporter EXP1
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 110
Use Case - WAN
Monitoring SGT/FNF Flow Cache
ASR1K-1#show flow mon cts-mon cache
Cache type: Normal
Cache size: 4096
Current entries: 1438
High Watermark: 1632
Flows added: 33831
Flows aged: 32393
- Active timeout ( 1800 secs) 0
- Inactive timeout ( 15 secs) 32393
- Event aged 0
- Watermark aged 0
- Emergency aged 0
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 111
Use Case - WAN
Stealthwatch Flow Query
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
Use Case - WAN
SXP and CMD Parsers in Wireshark via LUA
https://github.com/opendaylight/sxp/tree/master/sxp-dissector
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 113
Use Case - WAN
SGFW or SGACL on Router
Platforms as of 16.3(3)
isr-43xx-5#sho cts role-based permissions
IPv4 Role-based permissions from group 1000 to group 4:Employees (configured):
Deny_Log
RBACL Monitor All for Dynamic Policies : FALSE
RBACL Monitor All for Configured Policies : FALSE
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 114
Use Case - WAN
Monitoring SGACLs
• SGT/DGT Counters can be exported periodically via streaming telemetry as of IOSXE
16.10 and aggregated across the network
• SGACL Logs are exported via syslog and can be aggregated and parsed for reporting
Analytics/Reporting
Streaming Telemetry
Data storage
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 115
Use Case - WAN
SGACL Parsing – Logstash example
• Grok Parsing of SGACL syslogs to create DB values for
SGT/DGT/SGACL, etc.
• *Jan 27 13:33:43.355: %RBM-6-SGACLHIT: ingress_interface='GigabitEthernet1/0/24'
sgacl_name='DenyIP_Log-01' action='Deny' protocol='tcp' src-vrf='default' src-ip='10.10.18.101' src-
port='64382' dest-vrf='default' dest-ip='10.10.35.201' dest-port='80' sgt='4' dgt='4'
logging_interval_hits='1'
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
Use Case - WAN
SGT/DGT Hit Counters via Streaming Telemetry
• NCC –
• https://github.com/CiscoDevNet/ncc
• ./ncc-establish-subscription.py --host=172.23.41.129 -u cisco -p nbv_1234 -x
/trustsec-state --period 50--callback sample > trustsec-state.txt
Subscription Result : notif-bis:ok {
Subscription Id : 2147483648 "dst-sgt": "4",
-->> "hardware-deny-count": "145",
Event time : 2019-01-27 22:26:46.910000+00:00 "hardware-monitor-count": "0",
Subscription Id : 2147483648 "hardware-permit-count": "0",
Type : 1 "last-updated-time": "1548631492542928",
Data : "monitor-mode": "false",
{ "num-of-sgacl": "1",
"datastore-contents-xml": { "policy-life-time": "86400",
"trustsec-state": { "sgacl-name": "dev_emp_deny_log-02;",
"cts-rolebased-policies": { "software-deny-count": "0",
"cts-rolebased-policy": [ "software-monitor-count": "0",
"software-permit-count": "0",
"src-sgt": "8",
"total-deny-count": "145",
"total-permit-count": "0"
},
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 117
Use Case - WAN
Elasticsearch Example – SGACL Monitoring
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 118
Use Case - WAN
Health Care Evolution due to scale
Move to full tagging DMVPN IP Address
10.1.254.1
SGT
SGT
Medical_Device
Medical_Device –– 10
10
10.1.254.10 MedDevUser
MedDevUser –– 20
20
10.1.10.1 Medical_Device
Medical_Device -- 10
10
10.1.10.10 MedDevUser
MedDevUser -- 20
20
Electronic Medical
Records
DMVPN
Medical Dispenser
Server
Remote Site
Medical Application SGT carried inband with frame/packet
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 121
Use Case - WAN
SGT DMVPN Tagging Config
interface Tunnel10
bandwidth 1000000
ip address 10.210.0.129 255.255.255.128
no ip redirects
ip mtu 1360
no ip next-hop-self eigrp 1
no ip split-horizon eigrp 1
ip flow monitor FLOW-MONITOR-1 input
ip flow monitor FLOW-MONITOR-1 output
ip nhrp authentication cisco123
ip nhrp map multicast dynamic
ip nhrp network-id 301
ip nhrp holdtime 600
ip nhrp shortcut
ip nhrp redirect
ip tcp adjust-mss 1300
Enables SGT propagation on DMVPN. This command is valid for GRE and
cts sgt inline
tunnel interface mode only
cdp enable
tunnel source GigabitEthernet0/0/1
tunnel mode gre multipoint
tunnel path-mtu-discovery
tunnel protection ipsec profile DMVPN-PROFILE
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 122
Use Case - WAN
SGT DMVPN – Show Commands
ASR1K-1# show dmvpn
# Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb
----- --------------- --------------- ----- -------- -----
1 1.1.1.99 10.1.1.99 UP 00:00:01 SC
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 123
Data Center
SGT/ACI
SGT/ACI
Policy Federation ISE to APIC Flow:
SGT Policy used to Program ACI EPG Policy
SGT Policy Domain ISE
ACI Policy Domain
Cisco
DNAC ISE Retrieves: ISE Exchanges:
Controller Layer
Controller Layer
App EPG
Endpoint = 10.1.100.52
Network Layer
Network Layer
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 126
SGT/ACI
Groups Provisioned from SD-Access to
ACI (via ISE)
ISE
dynamically
provisions
EPG and IP
mappings
into ACI
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 129
SGT/ACI
Enforcement Scale in ACI
ACI 3.2 Scale
EX, FX and FX2 Hardware
SDA Domain ACI
No. of unique EEPGs 250
ISE dynamically Total Number of Mappings 64,000
provisions EEPGs and
IP mappings into ACI
C
Mappings per EEPG 8000
EXT-
SD-Access EPG1
B
Fabric Site EXT-
EPG3
Controller Layer
Controller Layer
ISE Retrieves:
EPG Name: App EPG
EPG Binding = 10.1.100.52
App EPG
Endpoint = 10.1.100.52
Network Layer
Network Layer
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
SGT/ACI
Groups Provisioned from ACI to SD-
Access (via ISE)
ISE
dynamically
provisions
SGT into
Cisco DNA
Center
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 132
SGT/ACI
Scalable Groups in Cisco DNA Center
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 133
SGT/ACI
ACI EPG Shared with SGT Infrastructure
C9K-CORE-1#$how flow monitor CYBER_MONITOR cache filter ipv4 C9K-CORE-1#sho cts environment-data
destination address 10.200.101.105 --snip--
--snip--
Security Group Name Table:
IPV4 SOURCE ADDRESS: 10.10.18.102 0-00:Unknown
IPV4 DESTINATION ADDRESS: 10.200.101.105 2-00:TrustSec_Devices
TRNS SOURCE PORT: 0 3-00:Network_Services
TRNS DESTINATION PORT: 2048
FLOW CTS SOURCE GROUP TAG: 100 4-00:Employees
FLOW CTS DESTINATION GROUP TAG: 0 5-00:Contractors
IP PROTOCOL: 1 6-00:Guests
tcp flags: 0x00 7-00:Production_Users
interface output: Te2/1
8-00:Developers
counter bytes: 1320
counter packets: 22 9-00:Auditors
timestamp first: 04:04:04.013 10-00:Point_of_Sale_Systems
timestamp last: 04:04:24.913 11-00:Production_Servers
12-00:Development_Servers
IPV4 SOURCE ADDRESS: 10.10.18.102
IPV4 DESTINATION ADDRESS: 10.200.101.105 13-00:Test_Servers
TRNS SOURCE PORT: 0 14-00:PCI_Servers
TRNS DESTINATION PORT: 2048 15-00:BYOD
FLOW CTS SOURCE GROUP TAG: 100
16-00:pci_users
FLOW CTS DESTINATION GROUP TAG: 10005
IP PROTOCOL: 1 255-00:Quarantined_Systems
tcp flags: 0x00 10001-00:EV_appProfile_LOB1_Web1EPG
interface output: Te2/1 10002-00:EV_appProfile_LOB1_App1EPG
counter bytes: 1440 10003-00:EV_appProfile_LOB1_DB1EPG
counter packets: 24
timestamp first: 04:04:04.013 10004-00:EV_appProfile_NetworkServicesEPG
timestamp last: 04:04:26.963 10005-00:EV_appProfile_LOB2_App1EPG
--snip--
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 134
SGT/ACI
Extended Visibility in Stealthwatch
SGT & ACI Policy Groups in Flow Records
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 135
Cloud
Use Case - Cloud
Security Controls for Cloud Applications
• Business Problem/Background
• Developers were buying VMs in cloud environments since IT was too slow to provision
• This led to untracked data being exposed in cloud environments
• This led to issues with production and development cross connections by employees corrupting data sets
• “De-provisioning” Applications/Servers never happen. Results in stale security rules
• “What does this rule do? We don’t know we better not remove it”
• Provisioning of workloads in minutes as opposed to days – “Fast IT”
• Solution Overview
• Provide automation for on prem and cloud environments with strict access controls
• Change provisioning to automatically reflect the existence of a new cloud instance
• Provide best path by tunnelling or peering to the cloud providers
• Provide access control on best path for development, user acceptance and production workloads
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
Use Case - Cloud
Security Controls for Applications
Ticket – New Firewall Manager
Ticket – new App VLAN if New push during On Prem
for business App maintenance
window
Finance App
Ticket – Hand off IP
Ticket – New Server IP
to security to add
to security policy
HR App
Public Cloud
Employee
Dev App
Developer
New
© 2020 Production
Cisco and/or its affiliates. All rights reserved. Cisco Public App
138
Use Case - Cloud
Developer and Production Controls for
Applications SXP Distributes On Prem
Developer spins up Ticket – new App
for business IP/SGT to border protection
new App in Cloud
Finance App
Developer Automation Provisions App
IP provisioned to ISE/CSR
via REST API
HR App
Public Cloud
Employee
Dev App
✓ ✓
Guest Tag
Guest X X
Non-Compliant Tag
Non-Compliant X X ✓ ✓
Data Center BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 142
Use Case - Cloud
Production and Dev Example IP
IP
IPAddress
Addressd
Address SGT
SGT
10.200.1.100
10.1.10.1 Employee_Web
Employee
Employee–––10
10
100
10.1.254.1 Employee
Employee–– 10
10
10.1.254.10 Dev - 20
Employee Web
SXP Enabled SW
IP Address SGT Cloud
10.1.10.1 Employee– 10
10.1.10.10 Dev - 20
Dev_App
10.2.10.4 Admin - 30
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 143
Summary
Summary
• SGT is the foundation for the newly announce Cisco DNA/SD-Access
• SGT builds upon dynamic classification (802.1X/ACI/etc.), static classification
(IP/SGT) and orchestration - REST, Cloud Center to classify users and endpoints on
enterprise networks
• SGT provides a scalable enterprise network access control model that is deployed in
customer networks today
• SGT provides operational savings by decoupling security policy from the network
topology
• SGT has broad Cisco and 3rd party software and hardware support
• SGT has easily adopted migration strategies for deployment
• SGT is deployable today in your network
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 145
ISE Diagonal Learning Map BRKSEC-3229 / Friday 9h00
ISE under magnifying glass.
How to troubleshoot ISE
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 146
Links
• Secure Access, TrustSec, and ISE on Cisco.com
• http://www.cisco.com/go/TrustSec
• http://www.cisco.com/go/ise
• http://www.cisco.com/go/isepartner
• TrustSec Communities
• https://communities.cisco.com/community/technology/security/pa/trustsec
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 147
Complete your
online session
survey • Please complete your session survey
after each session. Your feedback
is very important.
• Complete a minimum of 4 session
surveys and the Overall Conference
survey (starting on Thursday) to
receive your Cisco Live t-shirt.
• All surveys can be taken in the Cisco Events
Mobile App or by logging in to the Content
Catalog on ciscolive.com/emea.
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 148
Continue your education
Demos in the
Walk-in labs
Cisco campus
BRKSEC-3690 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 149
Thank you