Which two methods are used to assign security group tags to the user in a Cisco TrustSec. architecture? (Choose two.)
Which two methods are used to assign security group tags to the user in a Cisco TrustSec. architecture? (Choose two.)
In the Cisco TrustSec architecture, security group tags (SGTs) are used to enforce security policies across the network. The two primary methods for assigning these tags to users are through web authentication and IEEE 802.1x authentication. Web authentication is used when users access the network via a web browser, allowing the system to authenticate the user and assign the appropriate security group tag. IEEE 802.1x is a network access control protocol that authenticates and authorizes users by leveraging a server, authenticator, and supplicant, subsequently assigning the correct security group tag based on the authentication results.
A. Web authentication Used when a user logs in using a web browser. When a user accesses the network using this method, web authentication authenticates the user and assigns a security group tag. This is an effective authentication method when the client terminal does not have an 802.1X supplicant function. B. IEEE 802.1x A network access control protocol that provides authentication and authorization. It consists of three elements: an authentication server, an authenticator, and a supplicant. When a user connects to a network, they are authenticated using 802.1x and are granted permission to access the network. Through this authentication process, users are assigned the appropriate security group tag.
AB is the correct, the rest make no sense for authentication
Admin please fix from OCG p.735 Cisco ISE assigns the SGT tags to users or devices that are successfully authenticated and authorized through 802.1x, MAB, or WebAuth.
TrustSec uses SGT tags to perform ingress tagging and egress filtering to enforce access control policy. Cisco ISE assigns the SGT tags to users or devices that are successfully authenticated and authorized through 802.1x, MAB, or WebAuth. The SGT tag assignment is delivered to the authenticator as an authorization option (in the same way as a dACL). After the SGT tag is assigned, an access enforcement policy (allow or drop) based on the SGT tag can be applied at any egress point of the TrustSec network.
A and B are correct
A and B are correct