<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE -WLC Guest Implementation in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-wlc-guest-implementation/m-p/3731015#M489225</link>
    <description>&lt;P&gt;Yes I am running Flexconnect in SSID, using WLC is only to redirect RADIUS traffic to PSN and apply ACL to Flex Connect group based on ISE policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sorry i didnt mention it, setup is working fine, back to my question, is there any security measures should be considered using same mgmt i/f in WLC for Enterprise and Guest RADIUS traffic&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 23 Oct 2018 19:56:53 GMT</pubDate>
    <dc:creator>rajcisco</dc:creator>
    <dc:date>2018-10-23T19:56:53Z</dc:date>
    <item>
      <title>ISE -WLC Guest Implementation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-wlc-guest-implementation/m-p/3730723#M489171</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am trying to implement guest network using ISE 2.2 &amp;amp; WLC (aireos), with flexconnect (central auth and local switch). I am using separate interface in ISE-PSN for guest, but using the same management interface in WLC where other enterprise traffic is terminated due to present architecture (all branch offices uses local switch, there is no central switching). I see ISE can provide initial ACL (redirect guest to psn for Authentication) and second ACL once authenticated (to access only Internet)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But Is there anything else to consider in security perspective, as i am using the WLC management interface of the controller for the Guest?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note: Routing guest to internet using vrf/vlan over firewall to local internet link&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your time.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Oct 2018 13:16:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-wlc-guest-implementation/m-p/3730723#M489171</guid>
      <dc:creator>rajcisco</dc:creator>
      <dc:date>2018-10-23T13:16:45Z</dc:date>
    </item>
    <item>
      <title>Re: ISE -WLC Guest Implementation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-wlc-guest-implementation/m-p/3730769#M489190</link>
      <description>&lt;P&gt;This is a common setup, i.e. FlexConnect guests to a local VRF at the remote site and send them out to the Internet.&amp;nbsp; The only issue you have to tackle is getting the guests back to the PSNs for the guest portal.&amp;nbsp; I usually bring them in over the Internet.&amp;nbsp; Use a second interface on the PSNs and put it in a DMZ and open up 8443 access from the Internet or put up dedicate guest PSNs in the DMZ.&amp;nbsp; I like dedicated guests PSNs then I don't have a dual legged box sitting in the DMZ.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Oct 2018 13:53:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-wlc-guest-implementation/m-p/3730769#M489190</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-10-23T13:53:18Z</dc:date>
    </item>
    <item>
      <title>Re: ISE -WLC Guest Implementation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-wlc-guest-implementation/m-p/3730862#M489205</link>
      <description>&lt;P&gt;Thank you Paul for the reply&lt;/P&gt;
&lt;P&gt;Actually my design flow is like something like below,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Guest--&amp;gt;SSID (AP)--&amp;gt;WLC--&amp;gt;PSN (first ACL)---&amp;gt;WLC---&amp;gt;Guest (Redirect Page) --&amp;gt; Passcode entered--&amp;gt;WLC ---&amp;gt;PSN---&amp;gt;Authenticated (Second ACL)--WLC--&amp;gt;Guest--&amp;gt;local firewall--&amp;gt; Internet&lt;/P&gt;
&lt;P&gt;First ACL - to provide only access to PSN&lt;/P&gt;
&lt;P&gt;Second ACL- to provide only access to Internet&lt;/P&gt;
&lt;P&gt;I am using PSN with two leg, but not in DMZ, second leg in separate guest vrf. WLC mgmt will communicate to PSN i/f(in guest vrf)over firewall just for control traffic&lt;/P&gt;</description>
      <pubDate>Tue, 23 Oct 2018 16:06:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-wlc-guest-implementation/m-p/3730862#M489205</guid>
      <dc:creator>rajcisco</dc:creator>
      <dc:date>2018-10-23T16:06:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE -WLC Guest Implementation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-wlc-guest-implementation/m-p/3730880#M489214</link>
      <description>So are you running the SSID in FlexConnect or not?  If so then the WLC is not involved in anything except passing the RADIUS authentication.  The traffic flow you need to make work is :&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Guest-&amp;gt;AP-&amp;gt;PSN.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 23 Oct 2018 16:26:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-wlc-guest-implementation/m-p/3730880#M489214</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-10-23T16:26:25Z</dc:date>
    </item>
    <item>
      <title>Re: ISE -WLC Guest Implementation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-wlc-guest-implementation/m-p/3731015#M489225</link>
      <description>&lt;P&gt;Yes I am running Flexconnect in SSID, using WLC is only to redirect RADIUS traffic to PSN and apply ACL to Flex Connect group based on ISE policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sorry i didnt mention it, setup is working fine, back to my question, is there any security measures should be considered using same mgmt i/f in WLC for Enterprise and Guest RADIUS traffic&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Oct 2018 19:56:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-wlc-guest-implementation/m-p/3731015#M489225</guid>
      <dc:creator>rajcisco</dc:creator>
      <dc:date>2018-10-23T19:56:53Z</dc:date>
    </item>
    <item>
      <title>Re: ISE -WLC Guest Implementation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-wlc-guest-implementation/m-p/3731018#M489236</link>
      <description>None that I can think of.  This is a common setup.  There is no avenue for guests to actually use that channel to do anything.  I have never separate authentication traffic from the WLC to ISE.  Actually user traffic, yes, but not authentication traffic.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 23 Oct 2018 20:00:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-wlc-guest-implementation/m-p/3731018#M489236</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-10-23T20:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: ISE -WLC Guest Implementation</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-wlc-guest-implementation/m-p/3731095#M489243</link>
      <description>&lt;P&gt;Thank you Paul for your time and information&lt;/P&gt;</description>
      <pubDate>Tue, 23 Oct 2018 21:39:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-wlc-guest-implementation/m-p/3731095#M489243</guid>
      <dc:creator>rajcisco</dc:creator>
      <dc:date>2018-10-23T21:39:52Z</dc:date>
    </item>
  </channel>
</rss>

