NOTE: If you are unable Continue reading
Basic Trustsec – Implementing Manual SGTs and SGACLs
Trustsec is a mature and interesting policy mechanism available in most Cisco gear. The features and capabilities vary depending on device type and class. One of the frustrations I have is that almost every Trustsec reference I find focuses on the use of ISE. While I consider ISE a key component, I think a manual configuration is a better way to understand the components of the solution.
This post is the first in a series that will go through the configuration of Trustsec in various places in the network. I hope to examine classification and tag assignment, propagation techniques and enforcement. Ultimately, I will introduce ISE but it will be the tool that makes this technology dynamic and robust. The goal is to build a better foundation by taking a step by step approach into the world of Trustsec.
In this article, I will simply build a network with a Catalyst 9300 and two devices. One device will be assigned an SGT of 2 and the other will receive an SGT of 3. I understand that many are concerned about the fact that they don’t have this class of switch at the access layer. Future articles will address how Trustsec Continue reading
P4 takes SDN to the next level, bringing programmability to the forwarding plane.
Getting the company’s engineers adept at working with millimeter wave spectrum and knowing how to work with municipalities on cell sites is Verizon’s “secret sauce.”
The use of containers provides an abstraction layer to support AI behind the firewall. This latest announcement builds on IBM's continued support for Kubernetes.