P Commands
This chapter describes the Cisco NX-OS TrustSec commands that begin with P.
permit
To configure a permit action in a security group access control list (SGACL), use the permit command. To remove the action, use the no form of this command.
permit { all | icmp | igmp | ip | {{ tcp | udp } [{ dest | dst | src } {{ eq | gt | lt | neq } port-number } | range port-number1 port-number2 }]} [ log ]
no permit { all | icmp | igmp | ip | {{ tcp | udp } [{ dest | dst | src } {{ eq | gt | lt | neq } port-number } | range port-number1 port-number2 }]} [ log ]
Syntax Description
Specifies Internet Group Management Protocol (IGMP) traffic. |
|
(Optional) Specifies that packets matching this configuration be logged. |
Defaults
Command Modes
role-based access control list (RBACL)
Command History
|
|
Usage Guidelines
To use this command, you must first enable the 802.1X feature by using the feature dot1x command and then enable the Cisco TrustSec feature using the feature cts command.
To enable RBACL logging, you must enable RBACL policy enforcement on the VLAN. You must also enable Cisco TrustSec counters using the cts role-based counters enable command.
Examples
This example shows how to add a permit action to an SGACL and enable RBACL logging:
This example shows how to remove a permit action from an SGACL:
Related Commands
|
|
---|---|
policy
To manually configure a Cisco TrustSec authentication policy on an interface with either a Cisco TrustSec device identifier or security group tag (SGT), use the policy command. To revert to the default, use the no form of this command.
policy { dynamic identity device-id | static sgt sgt-value [ trusted ]}
no policy { dynamic | static }
Syntax Description
Command Default
Command Modes
Cisco TrustSec manual configuration mode
Command History
|
|
Usage Guidelines
To use this command, you must first enable the 802.1X feature by using the feature dot1x command and then enable the Cisco TrustSec feature using the feature cts command.
After using this command, you must enable and disable the interface using the shutdown and no shutdown command sequence for the configuration to take effect.
Examples
This example shows how to manually configure a dynamic Cisco TrustSec policy on an interface:
This example shows how to remove a manually configured dynamic Cisco TrustSec policy from an interface:
This example shows how to manually configure a static Cisco TrustSec policy on an interface:
This example shows how to remove a manually configured static Cisco TrustSec policy on an interface:
Related Commands
|
|
---|---|
Enters Cisco TrustSec manual configuration mode for an interface. |
|
propagate-sgt
To enable security group tag (SGT) propagation on Layer 2 Cisco TrustSec interfaces, use the propagate-sgt command. To disable SGT propagation, use the no form of this command.
Syntax Description
Command Default
Enabled if manual configuration is enabled on the interface.
Disabled if manual configuration is disabled on the interface.
Command Modes
Command History
|
|
Usage Guidelines
To use this command, you must first enable the 802.1X feature by using the feature dot1x command and then enable the Cisco TrustSec feature using the feature cts command.
You can disable the SGT propagation feature on an interface if the peer device connected to the interface can not handle Cisco TrustSec packets tagged with an SGT.
After using this command, you must enable and disable the interface using the shutdown and no shutdown command sequence for the configuration to take effect.
Examples
This example shows how to disable SGT propagation:
This example shows how to enable SGT propagation:
Related Commands
|
|
---|---|
Enables Cisco TrustSec manual configuration on an interface. |
|