<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Guest Anchor Management Interface in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/guest-anchor-management-interface/m-p/3742694#M100911</link>
    <description>&lt;P&gt;it is common practice to put the anchor WLC (including management interface) in a DMZ like 10.1&lt;/P&gt;
&lt;P&gt;for some client traffic (e.g. dhcp-proxy) the WLC uses it's management IP&lt;/P&gt;
&lt;P&gt;and&amp;nbsp;then yes, the tunnel goes through the firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I suggest you read image 10.15 that it is good practice to also place a FW between the guest-DMZ and the server-DMZ.&lt;/P&gt;
&lt;P&gt;(wich in turn does not show in 10.1)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 09 Nov 2018 08:03:43 GMT</pubDate>
    <dc:creator>pieterh</dc:creator>
    <dc:date>2018-11-09T08:03:43Z</dc:date>
    <item>
      <title>Guest Anchor Management Interface</title>
      <link>https://community.cisco.com/t5/wireless/guest-anchor-management-interface/m-p/3742443#M100910</link>
      <description>&lt;P&gt;I am following the Enterprise Mobility Design Guide (below) and I am not clear on the position of the management interface.&amp;nbsp; &amp;nbsp;Fig. 10.1 and 10.2 show one interface on the DMZ.&amp;nbsp; Fig. 10.15 shows 2 interfaces, one on the dmz and one on the management vlan.&amp;nbsp; &amp;nbsp; Is it ok for me to have the management interface connect to the trusted side of my network and just create the anchor behind the firewall?&amp;nbsp; Or should I have both interfaces on the DMZ and have the tunnel go through the firewall?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-1/Enterprise-Mobility-8-1-Design-Guide/Enterprise_Mobility_8-1_Deployment_Guide/WirelessNetwork_GuestAccessService.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-1/Enterprise-Mobility-8-1-Design-Guide/Enterprise_Mobility_8-1_Deployment_Guide/WirelessNetwork_GuestAccessService.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 16:25:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-anchor-management-interface/m-p/3742443#M100910</guid>
      <dc:creator>davddobie</dc:creator>
      <dc:date>2021-07-05T16:25:55Z</dc:date>
    </item>
    <item>
      <title>Re: Guest Anchor Management Interface</title>
      <link>https://community.cisco.com/t5/wireless/guest-anchor-management-interface/m-p/3742694#M100911</link>
      <description>&lt;P&gt;it is common practice to put the anchor WLC (including management interface) in a DMZ like 10.1&lt;/P&gt;
&lt;P&gt;for some client traffic (e.g. dhcp-proxy) the WLC uses it's management IP&lt;/P&gt;
&lt;P&gt;and&amp;nbsp;then yes, the tunnel goes through the firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I suggest you read image 10.15 that it is good practice to also place a FW between the guest-DMZ and the server-DMZ.&lt;/P&gt;
&lt;P&gt;(wich in turn does not show in 10.1)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Nov 2018 08:03:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-anchor-management-interface/m-p/3742694#M100911</guid>
      <dc:creator>pieterh</dc:creator>
      <dc:date>2018-11-09T08:03:43Z</dc:date>
    </item>
    <item>
      <title>Re: Guest Anchor Management Interface</title>
      <link>https://community.cisco.com/t5/wireless/guest-anchor-management-interface/m-p/3744950#M100913</link>
      <description>&lt;P&gt;Thanks for the reply.&amp;nbsp; Is there any security concerns with putting the management interface on the trust network?&amp;nbsp; I only have one interface available on my firewall&amp;nbsp;(for&amp;nbsp;my DMZ interface directly connected to the firewall).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Nov 2018 16:09:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-anchor-management-interface/m-p/3744950#M100913</guid>
      <dc:creator>davddobie</dc:creator>
      <dc:date>2018-11-12T16:09:41Z</dc:date>
    </item>
    <item>
      <title>Re: Guest Anchor Management Interface</title>
      <link>https://community.cisco.com/t5/wireless/guest-anchor-management-interface/m-p/3745027#M100915</link>
      <description>&lt;P&gt;is the firewall able to handle (dot1q) subinterfaces?&lt;/P&gt;
&lt;P&gt;than you can use vlans to separate trafic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Nov 2018 16:19:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-anchor-management-interface/m-p/3745027#M100915</guid>
      <dc:creator>pieterh</dc:creator>
      <dc:date>2018-11-12T16:19:11Z</dc:date>
    </item>
    <item>
      <title>Re: Guest Anchor Management Interface</title>
      <link>https://community.cisco.com/t5/wireless/guest-anchor-management-interface/m-p/3745110#M100917</link>
      <description>&lt;P&gt;Yes it is an ASA.&amp;nbsp; I will see if we can do that since it seems most secure.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just in case we do go with the 2 arm approach what should I be concerned with to lock it down?&amp;nbsp; The management interface would be on our internal management network that has ACLs separating it from the other vlans.&amp;nbsp; Manage via wireless is disabled.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Nov 2018 16:32:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-anchor-management-interface/m-p/3745110#M100917</guid>
      <dc:creator>davddobie</dc:creator>
      <dc:date>2018-11-12T16:32:20Z</dc:date>
    </item>
    <item>
      <title>Re: Guest Anchor Management Interface</title>
      <link>https://community.cisco.com/t5/wireless/guest-anchor-management-interface/m-p/3745554#M100918</link>
      <description>&lt;P&gt;in rare occasions client traffic may "leak" from the management interface that is a reason to put it "behind bars".&lt;/P&gt;
&lt;P&gt;the management interface is used for some client data e.g. if you configure dhcp-proxy or external web-auth.&lt;/P&gt;
&lt;P&gt;if running guest-DHCP local on the controller or some other device on the guest vlan this is no concern&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;basically you configure normal rules for management access ssh, https (, snmp), and of course the foreign-anchor communication&lt;/P&gt;</description>
      <pubDate>Tue, 13 Nov 2018 08:00:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-anchor-management-interface/m-p/3745554#M100918</guid>
      <dc:creator>pieterh</dc:creator>
      <dc:date>2018-11-13T08:00:52Z</dc:date>
    </item>
  </channel>
</rss>

