Cts Role-Based Enforcement - Cisco Nexus 7000 Series Command Reference Manual

Hide thumbs Also See for Nexus 7000 Series:
Table of Contents

Advertisement

C Commands

cts role-based enforcement

To enable Cisco TrustSec security group access control list (SGACL) enforcement in a VLAN or Virtual
Routing and Forwarding instance (VRF), use the cts role-based enforcement command. To revert to the
default, use the no form of this command.
To disable Cisco TrustSec SGACL enforcement in an L3 interface or L3 port-channel, use the no cts role-based
enforcement command. To revert to the default, use the cts role-based enforcement command.
cts role-based enforcement
no cts role-based enforcement
Syntax Description
This command has no arguments or keywords.
Command Default
Disabled for VLAN, and Virtual Routing and Forwarding instance (VRF).
Enabled for L3 interfaces and L3 port-channels.
Command Modes
Global configuration VLAN configuration VRF configuration Interface configuration
Command History
Release
8.0(1)
4.0(1)
Usage Guidelines
To use this command, you must enable the Cisco TrustSec feature using the feature cts command.
This command requires the Advanced Services license.
Examples
This example shows how to enable Cisco TrustSec SGACL enforcement in the default VRF:
switch# configure terminal
switch(config)# cts role-based enforcement
This example shows how to enable Cisco TrustSec SGACL enforcement in a VLAN:
switch# configure terminal
switch(config)# vlan 1
switch(config-vlan)# cts role-based enforcement
This example shows how to enable Cisco TrustSec SGACL enforcement in a nondefault VRF:
switch# configure terminal
switch(config)# vrf context MyVRF
Modification
Added the support for disabling SGACL policy enforcement on L3 interfaces
and L3 port-channels.
This command was introduced.
Cisco Nexus 7000 Series Security Command Reference
cts role-based enforcement
165

Advertisement

Table of Contents
loading

Table of Contents