![]() |
Table Of Contents
cts role-based counters enable
C Commands
This chapter describes the Cisco NX-OS TrustSec commands that begin with C.
clear cts policy
To clear the Cisco TrustSec security group access control list (SGACL) policies, use the clear cts policy command.
clear cts policy {all | peer device-id | sgt sgt-value}
Syntax Description
Command Default
None
Command Modes
Any command mode
Command History
Usage Guidelines
To use this command, you must first enable the 802.1X feature by using the feature dot1x command and then enable the Cisco TrustSec feature using the feature cts command.
When you clear the SGACL policies, the operation does not take effect until the interface is flapped. If the interface is a static SGT interface, the SGT value is set to zero (0) after the flapping. To undo this operation, use the following commands:
switch(config-if-cts-manual)# no policy staticswitch(config-if-cts-manual)# policy static sgt sgt-value
switch(config-if-cts-manual)#If the interface is a dynamic SGT interface, the SGT is downloaded again from the RADIUS server after the flapping.
This command does not require a license.
Examples
This example shows how to clear all the Cisco TrustSec SGACL policies on the device:
switch# clear cts policy allswitch#Related Commands
clear cts role-based counters
To clear the role-based access control list (RBACL) statistics so that all counters are reset to 0, use the clear cts role-based counters command.
clear cts role-based counters
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Any configuration mode
Command History
Usage Guidelines
This command does not require a license.
Examples
This example shows how to clear the RBACL statistics:
switch# clear cts role-based countersswitch#Related Commands
cts device-id
To configure a Cisco TrustSec device identifier, use the cts device-id command.
cts device-id device-id password [7] password
Syntax Description
Command Default
No Cisco TrustSec device identifier
Clear text passwordCommand Modes
Global configuration mode
Command History
Usage Guidelines
To use this command, you must first enable the 802.1X feature by using the feature dot1x command and then enable the Cisco TrustSec feature using the feature cts command.
The Cisco TrustSec device identifier name must be unique.
This command does not require a license.
Examples
This example shows how to configure a Cisco TrustSec device identifier:
switch# configure terminalswtich(config)# cts device-id DeviceA password Cisco321swtich(config)#Related Commands
Command Descriptionfeature cts
Enables the Cisco TrustSec feature.
feature dot1x
Enables the 802.1X feature.
show cts credentials
Displays the Cisco TrustSec credentials information.
cts manual
To enter the Cisco TrustSec manual configuration for an interface, use the cts manual command. To remove the manual configuration, use the no form of this command.
cts manual
no cts manual
Syntax Description
This command has no arguments or keywords.
Command Default
Disabled
Command Modes
Interface configuration mode
Command History
Usage Guidelines
To use this command, you must first enable the 802.1X feature by using the feature dot1x command and then enable the Cisco TrustSec feature using the feature cts command.
After using this command, you must enable and disable the interface using the shutdown and no shutdown command sequence for the configuration to take effect.
This command does not require a license.
Examples
This example shows how to enter Cisco TrustSec manual configuration mode for an interface:
switch# configure terminalswitch(config)# interface ethernet 2/4switch(config-if)# cts manualswitch(config-if-cts-manual)#This example shows how to remove the Cisco TrustSec manual configuration from an interface:
switch# configure terminalswitch(config)# interface ethernet 2/4switch(config-if)# no cts manualswitch(config-if)# shutdownswitch(config-if)# no shutdownRelated Commands
Command Descriptionfeature cts
Enables the Cisco TrustSec feature.
feature dot1x
Enables the 802.1X feature.
show cts interface
Displays Cisco TrustSec configuration information for interfaces.
cts role-based access-list
To create or specify a Cisco TrustSec security group access control list (SGACL) and enter role-based access control list configuration mode, use the cts role-based access-list command. To remove an SGACL, use the no form of this command.
cts role-based access-list list-name
no cts role-based access-list list-name
Syntax Description
list-name
Name for the SGACL. The name is alphanumeric and case-sensitive. The maximum length is 32 characters.
Command Default
None
Command Modes
Global configuration mode
Command History
Usage Guidelines
To use this command, you must first enable the 802.1X feature by using the feature dot1x command and then enable the Cisco TrustSec feature using the feature cts command.
When you remove an SGACL, the access list can no longer be referenced by any SGT-DGT pair in the system.
This command does not require a license.
Examples
This example shows how to create a Cisco TrustSec SGACL and enter the role-based access list configuration mode:
switch# configure terminalswitch(config)# cts role-based access-list MySGACLswitch(config-rbacl)#This example shows how to remove a Cisco TrustSec SGACL:
switch# configure terminalswitch(config)# no cts role-based access-list MySGACLswitch(config)#Related Commands
cts role-based counters enable
To enable role-based access control list (RBACL) statistics, use the cts role-based counters enable command. To disable RBACL statistics, use the no form of this command.
cts role-based counters enable
no cts role-based counters enable
Syntax Description
This command has no arguments or keywords.
Command Default
Disabled
Command Modes
Global configuration mode
Command History
Usage Guidelines
To use this command, you must first enable the 802.1X feature by using the feature dot1x command and then enable the Cisco TrustSec feature using the feature cts command.
To use this command, you must enable RBACL policy enforcement on the VLAN.
When you enable RBACL statistics, each policy requires one entry in the hardware. If you do not have enough space remaining in the hardware, an error message appears, and you cannot enable the statistics.
RBACL statistics are lost during an ISSU or when an access control entry is added to or removed from a RBACL.
This command does not require a license.
Examples
This example shows how to enable RBACL statistics:
switch# configure terminalswitch(config)# cts role-based counters enableNote: Clearing previously collected counters...switch(config)#This example shows how to disable RBACL statistics:
switch# configure terminalswitch(config)# no cts role-based counters enableswitch(config)#Related Commands
cts role-based enforcement
To enable role-based access control list (RBACL) enforcement on a VLAN, use the cts role-based enforcement command. To disable RBACL enforcement on a VLAN, use the no form of this command.
cts role-based enforcement
no cts role-based enforcement
Syntax Description
This command has no arguments or keywords.
Command Default
Disabled
Command Modes
VLAN configuration mode
Command History
Usage Guidelines
To use this command, you must first enable the 802.1X feature by using the feature dot1x command and then enable the Cisco TrustSec feature using the feature cts command.
RBACL enforcement is enabled on per-VLAN basis. RBACL enforcement cannot be enabled on routed VLANs or interfaces. For RBACL enforcement changes to take effect, you must exit from the VLAN configuration mode.
This command does not require a license.
Examples
This example shows how to enable RBACL enforcement on a VLAN and verifies the status:
switch# configure terminalswitch(config)# vlan 5switch(config-vlan)# cts role-based enforcementswitch(config-vlan)# exitswitch(config)# show cts role-based enablevlan:102switch(config)#This example shows how to disable RBACL enforcement on a VLAN:
switch# configure terminalswitch(config)# vlan 5switch(config-vlan)# no cts role-based enforcementswitch(config-vlan)#Related Commands
Command Descriptionfeature dot1x
Enables the 802.1X feature on the switch.
show cts role-based enable
Displays the VLANs that has RBACL enabled.
cts role-based sgt
To manually configure mapping of Cisco TrustSec security group tags (SGTs) to a security group access control list (SGACL), use the cts role-based sgt command. To remove the SGT mapping to an SGACL, use the no form of this command.
cts role-based sgt {sgt-value | any | unknown} dgt {dgt-value | any | unknown} access-list list-name
no cts role-based sgt {sgt-value | any | unknown} dgt {dgt-value | any | unknown}
Syntax Description
Command Default
None
Command Modes
Global configuration mode
Command History
Usage Guidelines
To use this command, you must first enable the 802.1X feature by using the feature dot1x command and then enable the Cisco TrustSec feature using the feature cts command.
You must configure the SGACL before you can configure SGT mapping.
This command does not require a license.
Examples
This example shows how to configure SGT mapping for an SGACL:
switch# configure terminalswitch(config)# cts role-based sgt 3 dgt 10 access-list MySGACLswitch(config)#This example shows how to configure any SGT mapping to any destination SGT:
switch# configure terminalswitch(config)# cts role-based sgt any dgt any access-list MySGACLswitch(config)#This example shows how to remove SGT mapping for an SGACL:
switch# configure terminalswitch(config)# no cts role-based sgt 3 dgt 10switch(config)#Related Commands
cts role-based sgt-map
To manually configure the Cisco TrustSec security group tag (SGT) mapping to IP addresses, use the cts role-based sgt-map command. To remove an SGT, use the no form of this command.
cts role-based sgt-map ipv4-address sgt-value
no cts role-based sgt-map ipv4-address
Syntax Description
Command Default
None
Command Modes
Global configuration mode
VLAN configuration mode
VRF configuration modeCommand History
Usage Guidelines
To use this command, you must first enable the 802.1X feature by using the feature dot1x command and then enable the Cisco TrustSec feature using the feature cts command.
You can use only IPv4 addressing with Cisco TrustSec.
This command does not require a license.
Examples
This example shows how to configure mapping for a Cisco TrustSec SGT:
switch# configure terminalswitch(config)# cts role-based sgt-map 10.10.1.1 3switch(config)#This example shows how to remove a Cisco TrustSec SGT mapping:
switch# configure terminalswitch(config)# no cts role-based sgt-map 10.10.1.1switch(config)#Related Commands
Command Descriptionfeature cts
Enables the Cisco TrustSec feature.
feature dot1x
Enables the 802.1X feature on the switch.
show cts role-based sgt-map
Displays the Cisco TrustSec SGT mapping.
cts sgt
To configure the security group tag (SGT) for Cisco TrustSec, use the cts sgt command. To revert to the default settings, use the no form of this command.
cts sgt tag
no cts sgt
Syntax Description
tag
Local SGT for the device that is a hexadecimal value with the format 0xhhhh. The range is from 0x2 to 0xffef.
Command Default
None
Command Modes
Global configuration mode
Command History
Usage Guidelines
To use this command, you must first enable the 802.1X feature by using the feature dot1x command and then enable the Cisco TrustSec feature using the feature cts command.
This command does not require a license.
Examples
This example shows how to configure the Cisco TrustSec SGT for the device:
switch# configure terminalswitch(config)# cts sgt 0x3switch(config)#Related Commands
Command Descriptionfeature cts
Enables the Cisco TrustSec feature.
feature dot1x
Enables the 802.1X feature on the switch.
show cts environment-data
Displays the Cisco TrustSec environment data.
cts sxp connection peer
To configure a Security Group Tag (SGT) Exchange Protocol (SXP) peer connection for Cisco TrustSec, use the cts sxp connection peer command. To remove the SXP connection, use the no form of this command.
cts sxp connection peer peer-ipv4-addr [source src-ipv4-addr] password {default | none | required {password| 7 encrypted-password}} mode listener [vrf vrf-name]
no cts sxp connection peer peer-ipv4-addr [source src-ipv4-addr] password {default | none | required {password | 7 encrypted-password}} mode listener [vrf vrf-name]
Syntax Description
Command Default
Configured default SXP password for the device
Configured default SXP source IPv4 address for the device
Default VRFCommand Modes
Global configuration mode
Command History
Usage Guidelines
To use this command, you must first enable the 802.1X feature by using the feature dot1x command and then enable the Cisco TrustSec feature using the feature cts command.
You can use only IPv4 addressing with Cisco TrustSec.
If you do not specify a source IPv4 address, you must configure a default SXP source IPv4 address using the cts sxp default source-ip command.
If you specify default as the password mode, you must configure a default SXP password using the cts sxp default password command.
This command does not require a license.
Examples
This example shows how to configure an SXP peer connection:
switch# configure terminalswitch(config)# cts sxp connection peer 10.10.1.1 source 10.10.2.2 password default mode listenerswitch(config)#This example shows how to remove an SXP peer connection:
switch# configure terminalswitch(config)# no cts sxp connection peer 10.10.1.1switch(config)#Related Commands
cts sxp default password
To configure the default Security Group Tag (SGT) Exchange Protocol (SXP) password for the device, use the cts sxp default password command. To remove the default, use the no form of this command.
cts sxp default password {password | 7 encrypted-password}
no cts sxp default password
Syntax Description
Command Default
None
Command Modes
Global configuration mode
Command History
Usage Guidelines
To use this command, you must first enable the 802.1X feature by using the feature dot1x command and then enable the Cisco TrustSec feature using the feature cts command.
This command does not require a license.
Examples
This example shows how to configure the default SXP password for the device:
switch# configure terminalswitch(config)# cts sxp default password Cisco654switch(config)#This example shows how to remove the default SXP password:
switch# configure terminalswitch(config)# no cts sxp default passwordswitch(config)#Related Commands
Command Descriptionfeature cts
Enables the Cisco TrustSec feature.
feature dot1x
Enables the 802.1X feature on the switch.
show cts sxp
Displays the Cisco TrustSec SXP configuration information.
cts sxp default source-ip
To configure the default Security Group Tag (SGT) Exchange Protocol (SXP) source IPv4 address for the device, use the cts sxp default source-ip command. To revert to the default, use the no form of this command.
cts sxp default source-ip ipv4-address
no cts sxp default source-ip
Syntax Description
Command Default
None
Command Modes
Global configuration mode
Command History
Usage Guidelines
To use this command, you must first enable the 802.1X feature by using the feature dot1x command and then enable the Cisco TrustSec feature using the feature cts command.
You can use only IPv4 addressing with Cisco TrustSec.
This command does not require a license.
Examples
This example shows how to configure the default SXP source IP address for the device:
switch# configure terminalswitch(config)# cts sxp default source-ip 10.10.3.3switch(config)#This example shows how to remove the default SXP source IP address:
switch# configure terminalswitch(config)# no cts sxp default source-ipswitch(config)#Related Commands
Command Descriptionfeature cts
Enables the Cisco TrustSec feature.
feature dot1x
Enables the 802.1X feature on the switch.
show cts sxp
Displays the Cisco TrustSec SXP configuration information.
cts sxp enable
To enable the Security Group Tag (SGT) Exchange Protocol (SXP) peer on a device, use the cts sxp enable command. To revert to the default, use the no form of this command.
cts sxp enable
no cts sxp enable
Syntax Description
This command has no arguments or keywords.
Command Default
Disabled
Command Modes
Global configuration mode
Command History
Usage Guidelines
To use this command, you must first enable the 802.1X feature by using the feature dot1x command and then enable the Cisco TrustSec feature using the feature cts command.
This command does not require a license.
Examples
This example shows how to enable SXP:
switch# configure terminalswitch(config)# cts sxp enableswitch(config)#This example shows how to disable SXP:
switch# configure terminalswitch(config)# no cts sxp enableswitch(config)#Related Commands
Command Descriptionfeature cts
Enables the Cisco TrustSec feature.
feature dot1x
Enables the 802.1X feature on the switch.
show cts sxp
Displays the Cisco TrustSec SXP configuration information.
cts sxp reconcile-period
To configure a Security Group Tag (SGT) Exchange Protocol (SXP) reconcile period timer, use the cts sxp reconcile-period command. To revert to the default, use the no form of this command.
cts sxp reconcile-period seconds
no cts sxp reconcile-period
Syntax Description
Command Default
120 seconds (2 minutes)
Command Modes
Global configuration mode
Command History
Usage Guidelines
To use this command, you must first enable the 802.1X feature by using the feature dot1x command and then enable the Cisco TrustSec feature using the feature cts command.
After a peer terminates an SXP connection, an internal hold-down timer starts. If the peer reconnects before the internal hold-down timer expires, the SXP reconcile period timer starts.
Note
Setting the SXP reconcile period to 0 seconds disables the timer.
This command does not require a license.
Examples
This example shows how to configure the SXP reconcile period:
switch# configure terminalswitch(config)# cts sxp reconcile-period 120switch(config)#This example shows how to revert to the default SXP reconcile period value:
switch# configure terminalswitch(config)# no cts sxp reconcile-periodswitch(config)#Related Commands
cts sxp retry-period
To configure a Security Group Tag (SGT) Exchange Protocol (SXP) retry period timer, use the cts sxp retry-period command. To revert to the default, use the no form of this command.
cts sxp retry-period seconds
no cts sxp retry-period
Syntax Description
Command Default
60 seconds (1 minute)
Command Modes
Global configuration mode
Command History
Usage Guidelines
To use this command, you must first enable the 802.1X feature by using the feature dot1x command and then enable the Cisco TrustSec feature using the feature cts command.
The SXP retry period determines how often the Cisco NX-OS software retries an SXP connection. When an SXP connection is not successfully set up, the Cisco NX-OS software makes a new attempt to set up the connection after the SXP retry period timer expires.
Note
Setting the SXP retry period to 0 seconds disables the timer and retries are not attempted.
This command does not require a license.
Examples
This example shows how to configure the SXP retry period:
switch# configure terminalswitch(config)# cts sxp retry-period 120switch(config)#This example shows how to revert to the default SXP retry period value:
switch# configure terminalswitch(config)# no cts sxp retry-periodswitch(config)#Related Commands