<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Guest portal interfaces question in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/5303837#M597001</link>
    <description>&lt;P&gt;If this is only used for guest portal, can we use /32 IP address? We are migrating to ISE in AWS and this interface is in the same VPC as Gi0 interface. The current on-prem ISE has /22 IP range assigned to guest portal interface.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 30 Jun 2025 00:37:15 GMT</pubDate>
    <dc:creator>Sdiana</dc:creator>
    <dc:date>2025-06-30T00:37:15Z</dc:date>
    <item>
      <title>Guest portal interfaces question</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/4640826#M575788</link>
      <description>&lt;P&gt;It's the first time i'm setting up guest portal on ISE, so please bear with me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Physically, the GUEST network will be isolated from the LAN and residing in the DMZ, for which i'm planning to use a dedicated interface on the WLC that will host the new guest SSID and GUEST network, which in turn will go to the firewall via it's dedicated VLAN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The goal is to have guest portal on a separate interface on ISE (2 VM appliances) since i read this is the recommended best practice.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now the thing i'm not really getting is the Guest portal 'allowed interfaces' settings.&lt;/P&gt;&lt;P&gt;Multiple docs i read state that in order to fully isolate guest traffic, one should use another interface to host your GUEST portal and configure and ip on it (on your ISE boxes via CLI).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Portal_settings.png" style="width: 970px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/154827i90BDED49724EB547/image-size/large?v=v2&amp;amp;px=999" role="button" title="Portal_settings.png" alt="Portal_settings.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let's say the GUEST network is 192.168.100.0/24.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does this mean the interface needs to have an ip in the range of the GUEST network? So something like 192.168.100.254?&lt;/P&gt;&lt;P&gt;Or can it be an address of another network in your LAN?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let's assume a guest connects to the GUEST SSID, RADIUS traffic will then come into this newly configured interface instead of the LAN interface and once the GUEST is matching your policy and allowed access, HTTP/HTTPS traffic will flow in/out of the GUEST network, from AP's on the WLC, to the internet and your GUESTS, back and forth?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does it work the way like i'm describing here or the flow is completely different?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2022 13:45:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/4640826#M575788</guid>
      <dc:creator>Darkmatter</dc:creator>
      <dc:date>2022-06-29T13:45:24Z</dc:date>
    </item>
    <item>
      <title>Re: Guest portal interfaces question</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/4640907#M575791</link>
      <description>&lt;P&gt;It can be any IP you want that makes sense for your network design.&amp;nbsp; This could be an IP directly in your guest VLAN or through another DMZ controlled by firewall rules.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;RADIUS traffic will still terminate on the normal LAN from your wireless controller.&amp;nbsp; The guest redirect HTTPS traffic will be the traffic to hit the alternate interface.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2022 15:11:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/4640907#M575791</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2022-06-29T15:11:32Z</dc:date>
    </item>
    <item>
      <title>Re: Guest portal interfaces question</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/4640920#M575792</link>
      <description>&lt;P&gt;Thanks for your response, but not fully clear yet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you maybe trow in a few examples?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2022 15:36:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/4640920#M575792</guid>
      <dc:creator>Darkmatter</dc:creator>
      <dc:date>2022-06-29T15:36:11Z</dc:date>
    </item>
    <item>
      <title>Re: Guest portal interfaces question</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/4640927#M575795</link>
      <description>&lt;P&gt;Sure so lets assuming the following:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ISE PSN gig 0: 10.10.10.10&lt;/P&gt;
&lt;P&gt;ISE PSN gig5: 192.168.10.10&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Client connects to guest wireless----&amp;gt;WLC---&amp;gt;RADIUS MAB request to ISE PSN 10.10.10.10&lt;/P&gt;
&lt;P&gt;ISE responds with captive portal URL and ACL----&amp;gt;URL points client to 192.168.10.10----&amp;gt;Client connects directly to 192.168.10.10&lt;/P&gt;
&lt;P&gt;Client signs into splash page -----&amp;gt;ISE sends CoA via gig0 to WLC----&amp;gt; WLC reauthenticates with a new MAB request to 10.10.10.10----&amp;gt; Client joins guest network.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2022 15:47:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/4640927#M575795</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2022-06-29T15:47:22Z</dc:date>
    </item>
    <item>
      <title>Re: Guest portal interfaces question</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/4641165#M575804</link>
      <description>&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199513"&gt;@ahollifield&lt;/a&gt;&amp;nbsp; pointed out, the "control plane" (so to speak) is the RADIUS traffic between the WLC and ISE - and that goes to the PSN's gig0 IP address.&lt;/P&gt;
&lt;P&gt;As for the client (guests) on the open SSID, they get an IP address via DHCP when they land on the VLAN that you made available on the WLC for the Guest SSID (192.168.100.0/24) - but this doesn't mean the ISE Guest Portal Interface has to reside on this VLAN too. It could - but it doesn't have to. You can put the ISE Guest PSN interface in a DMZ (e.g. ISE Gig 5 = 172.16.1.100), and then have a FW rule that allows TCP/8993 from the 192.168.100.0/24 -&amp;gt; 172.16.1.100&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I just wanted to point that out - you can "shield" your ISE PSN from guest users by placing the interface in a DMZ and putting a FW rule in place. Having said that, the ACL on the WLC should do the same - allow pre-auth clients to only do DHCP, DNS and TCP/8993 to PSN. And then after auth, allow DHCP, DNS, TCP/8993 to ISE, and block RFC1918, and allow everything else (in that order).&lt;/P&gt;
&lt;P&gt;This separation gives a nice warm fuzzy feeling of security - and it's also handy in the case of a suspected DDOS - you can simple shut the Gig5 down and not risk degrading the rest of the PSN's operations (RADIUS/TACACS etc.).&lt;/P&gt;
&lt;P&gt;It also comes at a small cost of complexity - when you look at the ACLs on the WLC, you need to remember which IP addresses are for Gig0 and which are for Gig5. I find this confusing when looking at a WLC config - I see the IP address of Gig0 listed as RADIUS server, but then the ACLs for the guest WLAN contain those strange IPs (for Gig5) - it can be confusing if you don't have the documentation or context.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2022 20:32:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/4641165#M575804</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-06-29T20:32:43Z</dc:date>
    </item>
    <item>
      <title>Re: Guest portal interfaces question</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/4641634#M575829</link>
      <description>&lt;P&gt;Many thanks to both of you &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt; and &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199513"&gt;@ahollifield&lt;/a&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This info is golden to me and probably future community users as well. Nowhere i could find this topic well layed out and explained like you guys did.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jun 2022 14:07:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/4641634#M575829</guid>
      <dc:creator>Darkmatter</dc:creator>
      <dc:date>2022-06-30T14:07:30Z</dc:date>
    </item>
    <item>
      <title>Re: Guest portal interfaces question</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/5303831#M596997</link>
      <description>&lt;P&gt;Hi guys,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for the great solution and info provided here. I have a question about the range of the IP for Guest portal interface? Is a /32 IP range good enough for Gi5 which is used for Guest redirect?&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jun 2025 00:08:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/5303831#M596997</guid>
      <dc:creator>Sdiana</dc:creator>
      <dc:date>2025-06-30T00:08:14Z</dc:date>
    </item>
    <item>
      <title>Re: Guest portal interfaces question</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/5303832#M596998</link>
      <description>No Because how would routing work? Also why gi5?&lt;BR /&gt;</description>
      <pubDate>Mon, 30 Jun 2025 00:14:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/5303832#M596998</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-06-30T00:14:40Z</dc:date>
    </item>
    <item>
      <title>Re: Guest portal interfaces question</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/5303834#M596999</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199513"&gt;@ahollifield&lt;/a&gt;&amp;nbsp;sorry maybe I wasn't clear in my question. In your example&amp;nbsp;&lt;SPAN&gt;ISE PSN gig5: 192.168.10.10, what should be the range of the IP for this interface which is used for Guest portal?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jun 2025 00:19:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/5303834#M596999</guid>
      <dc:creator>Sdiana</dc:creator>
      <dc:date>2025-06-30T00:19:51Z</dc:date>
    </item>
    <item>
      <title>Re: Guest portal interfaces question</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/5303835#M597000</link>
      <description>Whatever fits in the rest of your network design. Typically ISE guest interfaces are placed into a DMZ&lt;BR /&gt;</description>
      <pubDate>Mon, 30 Jun 2025 00:29:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/5303835#M597000</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-06-30T00:29:45Z</dc:date>
    </item>
    <item>
      <title>Re: Guest portal interfaces question</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/5303837#M597001</link>
      <description>&lt;P&gt;If this is only used for guest portal, can we use /32 IP address? We are migrating to ISE in AWS and this interface is in the same VPC as Gi0 interface. The current on-prem ISE has /22 IP range assigned to guest portal interface.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jun 2025 00:37:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/5303837#M597001</guid>
      <dc:creator>Sdiana</dc:creator>
      <dc:date>2025-06-30T00:37:15Z</dc:date>
    </item>
    <item>
      <title>Re: Guest portal interfaces question</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/5303841#M597002</link>
      <description>I’m possible to answer without a full review of your network architecture and topology.&lt;BR /&gt;</description>
      <pubDate>Mon, 30 Jun 2025 01:08:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/5303841#M597002</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-06-30T01:08:40Z</dc:date>
    </item>
    <item>
      <title>Re: Guest portal interfaces question</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/5304819#M597049</link>
      <description>&lt;P&gt;For the traffic to get to the portal on that interface routing needs to happen. For instance, if the traffic comes from a WLC that is sitting in the islated segment or from a L3 device that is located in that segment, those devices would need to have a leg within the same subnet as ISE Gi5 interface, hence, a /32 won't work.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 10:30:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-interfaces-question/m-p/5304819#M597049</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-07-02T10:30:11Z</dc:date>
    </item>
  </channel>
</rss>

