Table Of Contents
Configuring the Cisco TrustSec Solution
Configuration Overview
Cisco TrustSec Configuration How-to Documents
Supported Hardware and Software
Prerequisites for Cisco TrustSec
Cisco TrustSec Guidelines and Limitations
Default Settings
Additional Documentation
Release-Specific Documents
Platform-Specific Documents
Cisco IOS TrustSec Documentation Set
Configuring the Cisco TrustSec Solution
Revised: July 13, 2012, OL-22192-01
This chapter includes the following topics:
•
Configuration Overview
•
Default Settings
•
Additional Documentation
Configuration Overview
This guide documents elementary Cisco TrustSec configuration procedures for Cisco Catalyst switches and includes a TrustSec command reference.
For network-wide deployment configurations, see the section, "Cisco TrustSec Configuration How-to Documents."
A network-wide deployment includes the configuration, interoperability, and management of multiple devices, which may include the Cisco Identity Services Engine (Cisco ISE), The Cisco Secure Access Control System (Cisco ACS), Cisco IP Telephones, Cisco routers, Cisco network appliances, etc.
White papers and presentations explaining the Cisco TrustSec Solution are at the following URL:
http://www.cisco.com/en/US/netsol/ns1051/index.html
Cisco TrustSec Configuration How-to Documents
A series of "How-to" configuration documents provides deployment guidelines and best practices for proven network architectures in complex scenarios. Find all Cisco TrustSec "How-To" documents at the following URL:
http://www.cisco.com/en/US/solutions/ns340/ns414/ns742/ns744/landing_DesignZone_TrustSec.html
TrustSec 2.1 Configuration How-to Guide topics include the following:
•
Introduction
•
Planning and Pre-Deployment Checklist
•
ISE Base Configuration: ISE Bootstrapping
•
Adding ID Stores and Creating Authentication
•
Global Switch Configuration
•
Base configuration for the Wireless LAN Controller
•
Phased Deployment Overview
•
Monitor Mode
•
Migrating from Monitor Mode
•
Low Impact Mode
•
Closed Mode
•
ISE Profiling Services
•
ISE Base Configurations: Promiscuous VMware
•
Central Web Authentication
•
User Authentication and Authorization to Multiple Active Directory Domains
•
ISE Deployment Type and Guideline
•
Using Certificates to Differentiate Access
•
On-boarding and Provisioning
•
Server to Server Segmentation using Security Group Access
•
Deploying EAP Chaining with AnyConnect NAM and Cisco ISE
•
Failed Authentications & Authorizations
Supported Hardware and Software
For a list of TrustSec supported hardware and software per TrustSec release, see,
Release Notes for Cisco TrustSec General Availability Releases at the following URL:
http://www.cisco.com/en/US/docs/switches/lan/trustsec/release/notes/rn_cts_crossplat.html
See also, the Release Notes, Configuration Guides, and Command References for your device.
Prerequisites for Cisco TrustSec
The following are the prerequisites for establishing a TrustSec network with Catalyst switches:
•
TrustSec software on all network devices
•
Connectivity between all network devices
•
Network availability of the Cisco Secure ACS 5.1, or Cisco ISE operating with a TrustSec license
•
Directory, DHCP, DNS, certificate authority, and NTP servers functioning in the network
Cisco TrustSec Guidelines and Limitations
Cisco TrustSec has the following guidelines and limitations for Catalyst switches:
•
AAA for Cisco TrustSec uses RADIUS and is supported only by the Cisco Secure Access Control System (ACS), version 5.1 or later.
•
You must enable the 802.1X feature globally for Cisco TrustSec to perform NDAC authentication. If you disable 802.1X globally, you will disable NDAC.
•
Cisco TrustSec is supported only on physical interfaces, not on logical interfaces.
•
Cisco TrustSec does not support IPv6 in the releases referenced in this guide.
•
If the default password is configured on a switch, the connection on that switch should configure the password to use the default password. If the default password is not configured on a switch, the connection on that switch should also not configure a password. The configuration of the password option should be consistent across the deployment network.
•
Configure the retry open timer command to a different value on different switches.
Default Settings
Table 2-1 lists the default settings for Cisco TrustSec parameters.
Table 2-1 Default Cisco TrustSec Parameters
Parameters
|
Default
|
Cisco TrustSec
|
Disabled.
|
SXP
|
Disabled.
|
SXP default password
|
None.
|
SXP reconciliation period
|
120 seconds (2 minutes).
|
SXP retry period
|
60 seconds (1 minute).
|
Cisco TrustSec Caching
|
Disabled.
|
Additional Documentation
Release-Specific Documents
Platform-Specific Documents
Cisco IOS TrustSec Documentation Set