<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Block NMAP port Scanning from Guest wireless Network in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/block-nmap-port-scanning-from-guest-wireless-network/m-p/4306833#M566103</link>
    <description>&lt;P&gt;This sounds like an ACL issue on the WLC as stated by &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/321306"&gt;@Francesco Molino&lt;/a&gt; .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 13 Mar 2021 19:50:20 GMT</pubDate>
    <dc:creator>thomas</dc:creator>
    <dc:date>2021-03-13T19:50:20Z</dc:date>
    <item>
      <title>Block NMAP port Scanning from Guest wireless Network</title>
      <link>https://community.cisco.com/t5/network-access-control/block-nmap-port-scanning-from-guest-wireless-network/m-p/4303539#M565959</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello Team&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Please how to Block NMAP port Scanning from Guest wireless Network ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I have configure Guest wireless. Guest is not able to ping Any ressource But NMAP scanning is working. All Private IP execept ISE, DHCP and DNS is Deny, but NMAP is still able to see others Clients connected&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Zanga&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Mar 2021 22:49:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/block-nmap-port-scanning-from-guest-wireless-network/m-p/4303539#M565959</guid>
      <dc:creator>O.Zang</dc:creator>
      <dc:date>2021-03-08T22:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: Block NMAP port Scanning from Guest wireless Network</title>
      <link>https://community.cisco.com/t5/network-access-control/block-nmap-port-scanning-from-guest-wireless-network/m-p/4303609#M565963</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The guest is going through a FW? How you wanted to block the nmap for guests? Were you thinking using a simple ACL or using a next-gen FW (IPS and/or blocking based on application detection)?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By ACL, you won’t be able to block it without blocking legitimate traffic. The 2nd option will be the way to go.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Mar 2021 03:21:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/block-nmap-port-scanning-from-guest-wireless-network/m-p/4303609#M565963</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2021-03-09T03:21:52Z</dc:date>
    </item>
    <item>
      <title>Re: Block NMAP port Scanning from Guest wireless Network</title>
      <link>https://community.cisco.com/t5/network-access-control/block-nmap-port-scanning-from-guest-wireless-network/m-p/4303676#M565967</link>
      <description>&lt;P&gt;Thank for your response&amp;nbsp;&lt;SPAN&gt;Francesco.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The wireless Guest are not going through an firewall.&lt;/P&gt;&lt;P&gt;I have deny access to all private IP range excempt for ISE, DNS, and DHCP via the WLC Flexconnect ACL.&lt;/P&gt;&lt;P&gt;Ping, and SSH, or Telnet from Putty is not working. But NMAP is still able to scan the Network.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Zang&lt;/P&gt;</description>
      <pubDate>Tue, 09 Mar 2021 06:04:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/block-nmap-port-scanning-from-guest-wireless-network/m-p/4303676#M565967</guid>
      <dc:creator>O.Zang</dc:creator>
      <dc:date>2021-03-09T06:04:05Z</dc:date>
    </item>
    <item>
      <title>Re: Block NMAP port Scanning from Guest wireless Network</title>
      <link>https://community.cisco.com/t5/network-access-control/block-nmap-port-scanning-from-guest-wireless-network/m-p/4306094#M566079</link>
      <description>&lt;P&gt;Can you share the ACL you’ve implemented?&lt;/P&gt;</description>
      <pubDate>Fri, 12 Mar 2021 03:58:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/block-nmap-port-scanning-from-guest-wireless-network/m-p/4306094#M566079</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2021-03-12T03:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: Block NMAP port Scanning from Guest wireless Network</title>
      <link>https://community.cisco.com/t5/network-access-control/block-nmap-port-scanning-from-guest-wireless-network/m-p/4306833#M566103</link>
      <description>&lt;P&gt;This sounds like an ACL issue on the WLC as stated by &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/321306"&gt;@Francesco Molino&lt;/a&gt; .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 13 Mar 2021 19:50:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/block-nmap-port-scanning-from-guest-wireless-network/m-p/4306833#M566103</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2021-03-13T19:50:20Z</dc:date>
    </item>
    <item>
      <title>Re: Block NMAP port Scanning from Guest wireless Network</title>
      <link>https://community.cisco.com/t5/network-access-control/block-nmap-port-scanning-from-guest-wireless-network/m-p/4924932#M584105</link>
      <description>&lt;P&gt;We are using 9800 WLC with DNAC solution and facing the same challenges. Since Guest is open to connect and outsiders is able to see the connected Mac address by nmap scan hence able to bypass portal authenticaiton by spoofing valid connected user mac address.&lt;/P&gt;&lt;P&gt;Cisco is unable to provide any solutions.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 10:58:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/block-nmap-port-scanning-from-guest-wireless-network/m-p/4924932#M584105</guid>
      <dc:creator>seemon</dc:creator>
      <dc:date>2023-09-18T10:58:31Z</dc:date>
    </item>
  </channel>
</rss>

