Which component of Cisco SD-Access integrates with Cisco DNA Center to perform policy segmentation and enforcement through the use of security group access control lists and security group tags?
A.
Cisco Application Policy Infrastructure Controller Enterprise Module
The correct answer is C. Cisco Identity Services Engine (ISE).
Cisco ISE integrates with Cisco DNA Center to perform policy segmentation and enforcement in an SD-Access network. It uses security group access control lists (SGACLs) and security group tags (SGTs) to enforce policies based on user and device profiles. ISE enables the creation and management of these security policies, ensuring that proper access is granted based on user and device identity.
SGT ==> DNAC + ISE
While SGTs are administered by Cisco ISE through the tightly integrated REST APIs, Cisco DNA Center is used as the pane of glass to manage and create SGTs and define their policies.
SGT ==> DNAC + ISE
While SGTs are administered by Cisco ISE through the tightly integrated REST APIs, Cisco DNA Center is used as the pane of glass to manage and create SGTs and define their policies.
TrustSec--> Just a term
Cisco TrustSec is an umbrella term for security improvements to Cisco network devices based on the
capability to strongly identify users, hosts and network devices within a network. TrustSec provides
topology independent and scalable access controls by uniquely classifying data traffic for a particular
role. TrustSec ensures data confidentiality and integrity by establishing trust among authenticated peers
and encrypting links with those peers.
The key component of Cisco TrustSec is the Cisco Identity Services Engine. It is typical for the
Cisco ISE to provision switches with TrustSec Identities and Security Group ACLs (SGACLs), though
these may be configured manually.
Answer is C
"The key component of Cisco TrustSec is the Cisco Identity Services Engine."
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SY/configuration/guide/sy_swcg/trustsec.pdf
C is correct.
Policy management with identity services is enabled in an SD-Access network using ISE integrated with Cisco DNA Center for dynamic mapping of users and devices to scalable groups.
https://www.cisco.com/c/en/us/td/docs/solutions/CVD/Campus/cisco-sda-design-guide.html#CiscoDNACenterSoftware
I'm torn between C and D.
Trustsec is the name of the feature.
But it's ISE that actually pushes SGTs and SGACLs to the NADs.
DNAC is a single pane of glass to manage it.
So I think the answer is more likely to be C because ISE has to be integrated with DNAC for Trustsec to work in SDA.
https://www.cisco.com/c/en/us/td/docs/solutions/CVD/Campus/cisco-sda-design-guide.html#IdentityServicesEngine
Effectively, it's Cisco TrustSec - ISE is for identity context, authentication, posture validation, etc
Cisco TrustSec - Security provided by Cisco TrustSec ® infrastructure (Security Group Tags [SGT], SGACLs) and Cisco segmentation capabilities (Cisco Locator/ID Separation Protocol [LISP], VXLAN, and Virtual Routing and Forwarding [VRF]).
Identity context for users and devices, including authentication, posture validation, and device profiling, provided by the Cisco ISE.
https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/software-defined-access/nb-09-sda-faq-cte-en.html
This section is not available anymore. Please use the main Exam Page.300-420 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
SpicyMochi
5 months, 4 weeks agocerifyme85
6 months, 1 week agocerifyme85
6 months, 1 week agoDOSKIM
7 months agoiLikeHamburgers
10 months, 2 weeks agoiLikeHamburgers
1 year agoSergeBesse
1 year, 1 month agoKamran202034
1 year, 2 months agopython_tamer
1 year, 4 months agoXavi07
2 years, 3 months agoluisjuradoledesma
2 years, 8 months agoCCNPWILL
2 years, 3 months ago