152
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Configuring Security Features
SGT over Ethernet Tagging
DETAILED STEPS
Command or Action
Purpose
Step 1
enable
Example:
Router(config)# enable
Enables the privileged EXEC mode. Enter your
password if prompted.
Step 2
configure terminal
Example:
Router(config)# configure terminal
Enters the global configuration mode.
Step 3
interface gigabitethernet
slot/port
Example:
Router(config)# interface gigabitethernet
0/0
Enters the interface configuration mode.
Step 4
cts manual
Example:
Router(config-if)# cts manual
Enables the interface for CTS SGT authorization
and forwarding, and enters the CTS manual
interface configuration mode.
Step 5
propagate sgt
Example:
Router(config-if-cts-manual)# propagate sgt
Enables L2-SGT imposition for egress traffic on
the interface.
Note
If
you configure
cts manual
command,
CTS SGT propagation is enabled by
default. To disable CTS SGT propagation,
use
no propagate sgt
command.
Step 6
policy static sgt
tag
[trusted]
Example:
Router(config-if-cts-manual)# policy static
sgt 77 trusted
Configures a static SGT ingress policy on the
interface and defines the trustworthiness of an
SGT received on the interface.
Note
The
trusted
keyword indicates that the
interface is trustworthy for CTS. The SGT
value received via the ethernet packet on
this interface is trusted and will be used by
the device for any SGT-aware policy
enforcement or for egress tagging. If the
trusted
keyword is not configured, all the
ingress traffic is assigned with the static
SGT value specified in the configuration.
Step 7
end
Example:
Router(config-if-cts-manual)# end
Exits the configuration session.