In this 5-day Cisco TrustSec and SGT-Based Segmentation is easiest to teach when the class moves from core concepts into repeated design-configure-validate cycles across wired, wireless, and SD-WAN, then finishes with centralized policy governance and third-party firewall enforcement. Below is a detailed multi-day outline with aligned labs, focused on how Security Group Tags (SGTs) are assigned, propagated, and enforced, and how Cisco ISE and Security Group Firewalls (SGFWs) work together for consistent unified policy across the Mutli-domain network.
Why Attend with Current Technologies CLC
Our Instructors are in the top 10% rated by Cisco
Our Lab has a dedicated 1 Gig Fiber Connection for our Labs
By the end of the course, students will be able to design and implement end-to-end SGT assignment and propagation, validate enforcement at multiple points in the network, troubleshoot TrustSec-related issues, and centrally manage policy in Cisco ISE while extending enforcement to Security Group Firewalls.
Network Security Engineers: Those responsible for implementing and managing network access controls (NAC), security policies, and segmentation.
Network Architects & Designers: Professionals designing secure campus and data center networks using software-defined segmentation.
Cisco ISE Administrators: Individuals focusing on Cisco Identity Services Engine (ISE) for policy management and Security Group Tag (SGT) assignment.
System Administrators & IT Managers: Professionals aiming to enhance network security and implement compliance-based access control.
IT Professionals tasked with Compliance: Those needing to meet industry standards like PCI (Payment Card Industry) through rigorous network segmentation.
CCNP Security / CCIE Security Candidates: Those preparing for Cisco certifications that require knowledge of TrustSec concepts (SGT, SGACL, SXP).
Network Support Engineers: Those who need to troubleshoot security policies and access issues
Module 1: TrustSec Fundamentals and SGT Architecture
TrustSec purpose in Zero Trust Networks (ZTN) and micro-segmentation for real networks, such as separating finance endpoints from general users without relying on IP subnets.
SGT Identity Model, Classification, Propagation, Tag lifecycle, and the difference between classification and enforcement
TrustSec Policy Enforcement
SGT Control Plane Components: ISE, TrustSec devices and PxGrid Consumers
TrustSec SGT Propagation Methods: Inline tagging (SGT over Ethernet), SXP, and IP-to-SGT mapping.
Policy Model overview: Security Group ACLs (SGACLs), egress vs ingress enforcement, and policy matrix logic
Cisco TrustSec/SGTs in Wireless Meraki Networks
Cisco TrustSec/SGTs in Multi-Domain Networks with SD-WAN
Cisco TrustSec Site with Policy via Firewalls
Cisco TrustSec Design and Planning Process
Lab 1: Environment Validation and Baseline Access
Verify lab topology, ISE health, device reachability, and time sync.
Capture baseline traffic flows before segmentation.
Lab 2: SGT Creation and Policy Matrix Foundation in ISE
Define a business-aligned SGT set (example: Employees, Contractors, Printers, Servers, Guests).
Build a starter matrix with permit and deny rules.
Publish and confirm policy distribution readiness.