Cisco TrustSec
Cisco TrustSec provides security improvements to Cisco network devices based on the capability to strongly identify users, hosts, and network devices within a network. TrustSec provides topology-independent and scalable access controls by uniquely classifying data traffic for a particular role. TrustSec ensures data confidentiality and integrity by establishing trust among authenticated peers and encrypting links with those peers.
-
The key component of Cisco TrustSec is the Cisco Identity Services Engine (ISE).
-
Cisco ISE can provision switches with TrustSec Identities and Security Group ACLs (SGACLs).
-
SGACLs may be configured manually on the switch.
![]() Note |
You should manually clear the CTS environment data using the clear cts environment-data command before changing CTS server to a new one. This ensures that you get the updated data while running show cts environment-data command. |
Feature History
|
Feature Name |
Release |
Description |
|---|---|---|
|
TrustSec Enablement on Flex mode APs for HA SSO |
Cisco IOS XE 17.18.2 |
The feature ensures that CTS SGACL enforcement remains available and consistent during HA events such as Stateful Switchover (SSO) between wireless controllers. This provides uninterrupted security policy enforcement on Flex mode APs even during controller failover or redundancy events. |
|
TrustSec support for Cisco Catalyst IW6300 Heavy Duty Series and 6300 Series Embedded Services Access Points |
Cisco IOS XE 17.8.1 |
Enable and configure Cisco TrustSec Security Group ACL (SGACL) in FlexConnect and Flex+Bridge mode. SGACL enforcement on the controller for local and Bridge mode, inline tagging and SXP only in FlexConnect. |
|
Support for SGT Inline Tagging Over Port-Channel Uplink |
Cisco IOS XE 17.3.5a |
SGT inline tagging over port-channel uplink is supported for Cisco Catalyst 9800-L, 9800-40, and 9800-80 Wireless Controllers. If you downgrade to releases that do not support SGT inline tagging over port-channel, the port-channel may be suspended. |

Feedback