<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Guest users behind NAT? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/guest-users-behind-nat/m-p/3572345#M535921</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nice job on the drawing Paul.  Curious how many interfaces you are using on the Guest PSNs and whether the guest internet traffic is also flowing through a firewall.  Do 4, 11 and 14 route through the load balancers to communicate with the WLCs?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 24 Apr 2017 16:16:33 GMT</pubDate>
    <dc:creator>gbekmezi-DD</dc:creator>
    <dc:date>2017-04-24T16:16:33Z</dc:date>
    <item>
      <title>Guest users behind NAT?</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-users-behind-nat/m-p/3572342#M535918</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey guys, so my scenario is guests are on 10.2.3.x/24 in the DMZ. When they hit the Guest portal (ISE at IP address 4.5.6.7), they are NAT'd to IP address 54.54.54.54. So basically, ISE see's the guests using the same IP address 54.54.54.54 - does this still work or not?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Forget the bit about best practise - just curious if it would work. In my mind (and I'm happy to be corrected), this will still work as the URL that the guests are redirected to contains some unique information for each user, so ISE is able to inform the WLC (via CoA) after a guest is logged in (CoA is basically tell WLC MAC address is now auth'd so permit full access to internet).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DJ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Apr 2017 05:31:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-users-behind-nat/m-p/3572342#M535918</guid>
      <dc:creator>dazza_johnson</dc:creator>
      <dc:date>2017-04-24T05:31:28Z</dc:date>
    </item>
    <item>
      <title>Re: Guest users behind NAT?</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-users-behind-nat/m-p/3572343#M535919</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Darren, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Works fine.&amp;nbsp; The guest IP is irrelevant in the guest flow.&amp;nbsp; As long as the WLC can talk back and forth with the ISE PSNs it all works fine.&amp;nbsp; I have done setups where at remote sites the guests are completely isolated networks on FlexConnect APs and they access dedicated guest PSNs I have sitting in the DMZ in the datacenter.&amp;nbsp; The guests come across the Internet to go through the portal.&amp;nbsp; The PSNs can talk just fine to the WLC and the CoA on the session ID gets the user on the Internet after they go through the guest portal sequence.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Apr 2017 13:32:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-users-behind-nat/m-p/3572343#M535919</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-04-24T13:32:52Z</dc:date>
    </item>
    <item>
      <title>Re: Guest users behind NAT?</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-users-behind-nat/m-p/3572344#M535920</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Darren,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a drawing I put together for a client that shows all the steps in the guest process.&amp;nbsp; This was for the customer that had the guest PSNs in the DMZ off the firewall and access the guest portal across the Internet.&lt;IMG alt="Guest Flow.JPG" class="image-1 jive-image" src="/legacyfs/online/fusion/106659_Guest Flow.JPG" style="height: 420px; width: 620px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Apr 2017 13:42:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-users-behind-nat/m-p/3572344#M535920</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-04-24T13:42:12Z</dc:date>
    </item>
    <item>
      <title>Re: Guest users behind NAT?</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-users-behind-nat/m-p/3572345#M535921</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nice job on the drawing Paul.  Curious how many interfaces you are using on the Guest PSNs and whether the guest internet traffic is also flowing through a firewall.  Do 4, 11 and 14 route through the load balancers to communicate with the WLCs?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Apr 2017 16:16:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-users-behind-nat/m-p/3572345#M535921</guid>
      <dc:creator>gbekmezi-DD</dc:creator>
      <dc:date>2017-04-24T16:16:33Z</dc:date>
    </item>
    <item>
      <title>Re: Guest users behind NAT?</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-users-behind-nat/m-p/3572346#M535922</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In this customer case, we had setup dedicated Guest PSNs with single interfaces in the DMZ behind the load balancers.&amp;nbsp; All flows went through the load balancers and firewall to get to the guest PSNs.&amp;nbsp; The load balancer was also responsible for changing the CoA traffic source IP to the VIP address.&amp;nbsp; In other cases I have used multiple NICs on the PSNs to do a similar setup but that is messy because the PSNs use a unified routing table.&amp;nbsp; So your default gateway on the PSN points to the DMZ and you have to add static routes for internal subnets pointing out the internal NIC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the guest side, they were going through a PAT device (FW, router VRF with PAT, etc.).&amp;nbsp; I don’t remember what security was being applied to that traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul Haferman&lt;/P&gt;&lt;P&gt;Office- 920.996.3011&lt;/P&gt;&lt;P&gt;Cell- 920.284.9250&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Apr 2017 16:34:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-users-behind-nat/m-p/3572346#M535922</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-04-24T16:34:31Z</dc:date>
    </item>
    <item>
      <title>Re: Guest users behind NAT?</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-users-behind-nat/m-p/3572347#M535923</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In general, all the RADIUS traffic to/from WLC should pass through the LB.&amp;nbsp; This will provide symmetric pathing and also facilitates SNAT of CoA from PSNs back to NAD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Starting in ISE 1.3 we added support to automatically return traffic on same interface it was received provided a default route is configured for that interface.&amp;nbsp; In ISE 2.0 we added logic to use global default gateway for PSN-initiated traffic that transcends individual default routes (ip route 0.0.0.0 ...).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some additional multi-interface examples with and without NAT are provided in reference version of BRKSEC-3699 presentation posted to CiscoLive.com.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Apr 2017 19:37:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-users-behind-nat/m-p/3572347#M535923</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-04-24T19:37:09Z</dc:date>
    </item>
    <item>
      <title>Re: Guest users behind NAT?</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-users-behind-nat/m-p/3572348#M535924</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ahh thx Craig.  I don’t have many multi-NIC deployments so haven’t played around with the routing logic too much.  Good to know the logic exists to return out the same interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul Haferman&lt;/P&gt;&lt;P&gt;Office- 920.996.3011&lt;/P&gt;&lt;P&gt;Cell- 920.284.9250&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Apr 2017 21:37:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-users-behind-nat/m-p/3572348#M535924</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-04-24T21:37:42Z</dc:date>
    </item>
  </channel>
</rss>

