Cisco Blogs


Cisco Blog > Enterprise Networks

Demystifying the Catalyst: Cisco Context Aware Secure Access (Security Group Tags – SGT) Technology

In this blog, let us take a look at how Catalyst access switches enable and enforce context aware access to IT resources.

Many types of devices, including laptops, smartphones, and tablets, are used by end users to connect to the network wired, wirelessly, and remotely through VPN. With bring your own device (BYOD) access, the devices can be personal or corporate owned. Every enterprise has policies that dictate who can access what applications and databases, when and how. Traditionally, IT manages the policy either by introducing appliances at points in the campus where users connect or by manually configuring all the access switches. Appliances incur additional capital and operational expenses, whereas manual configuration of the switches requires maintenance of every switch. Moreover, the network can carry traffic using Ethernet, IPv4, IPv6, or other technologies, so the configuration must keep up with changes in technology, which leads to higher operational complexity and costs.

Read More »

Tags: , , , , , , , ,

Smart Access to Borderless Networks

I guess it’s a bit natural to feel a sense of pride when you are a part of the team that has innovated the vast majority of LAN Access switch features in the market. I joined this group about 2 years ago and have been in awe ever since. If innovation and the sheer brilliance of simplicity excites you then this should be a fun read.

It is probably obvious that every single endpoint connects to the network ONLY through an access switch. Even the wireless ones.. through the access point that is plugged into the access switch. So no endpoint can get into the network without going through an access switch.

Read More »

Tags: , , , , , , , ,