<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Yes you are right. in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/guest-anchor-dmz-firewall-rule-changes/m-p/2785288#M100932</link>
    <description>&lt;P&gt;Yes you are right.&lt;/P&gt;
&lt;P&gt;The Guest traffic, however, is sent to the anchor controller in the DMZ via an Ether IP tunnel, and the anchor controller bridges it to the DMZ network. The network firewall is configured to allow UDP 16666 and Protocol 97 traffic between the two controllers. Because the anchor controller handles client DHCP and authentication, the laptop of the visitor has an IP in the DMZ VLAN range.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Here is the flow:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Client &amp;gt; AP &amp;gt; WLC &amp;gt; Guest WLC &amp;gt; DMZ &amp;gt; Internet&lt;BR /&gt;&lt;BR /&gt;Regards&lt;/P&gt;
&lt;P&gt;Dont forget to rate helpful posts&lt;/P&gt;</description>
    <pubDate>Wed, 18 Nov 2015 07:51:47 GMT</pubDate>
    <dc:creator>Sandeep Choudhary</dc:creator>
    <dc:date>2015-11-18T07:51:47Z</dc:date>
    <item>
      <title>Guest Anchor - DMZ firewall rule changes</title>
      <link>https://community.cisco.com/t5/wireless/guest-anchor-dmz-firewall-rule-changes/m-p/2785285#M100929</link>
      <description>&lt;P&gt;Hi all ,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am setting up a Guest anchor at my office.&lt;/P&gt;
&lt;P&gt;Now&amp;nbsp;guest wireless internet traffic will be&amp;nbsp;&amp;nbsp;sent out to the internet locally , than using my offshore anchor which was being used till now .&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Just to give you guys an idea about the topology ::&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This Anchor is connected to the DMZ switch , on a switchport which is put in a DMZ VLAN ( for eg gi 1/0/1 ) .&lt;/P&gt;
&lt;P&gt;I have another switchport &amp;nbsp;( gi 1/0/2-3 ) in the DMZ VLAN which is in turn connected to the DMZ interfaces on my firewall cluster .&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Now i have to convey to my Security team , what rules should&amp;nbsp;i have them configured inroder to establish the EOIP tunnel betwwen my Anchor and my Mobility controller.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What changes should i be asking them to make on the Firewall ?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;From what i have read and understood :&lt;/P&gt;
&lt;P&gt;A.&amp;nbsp;&lt;SPAN&gt;Data - 12222/Control - 12223 - LWAPP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;B .Data - 5247/Control - 5246 &amp;nbsp; &amp;nbsp; - CAPWAP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;C. Mobility traffic &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - 16666/16667&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Is there anything else necessary for both the controllers to communicate &amp;nbsp;?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks in advance.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 11:15:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-anchor-dmz-firewall-rule-changes/m-p/2785285#M100929</guid>
      <dc:creator>rahul nair</dc:creator>
      <dc:date>2021-07-05T11:15:31Z</dc:date>
    </item>
    <item>
      <title>If a firewall is involved,</title>
      <link>https://community.cisco.com/t5/wireless/guest-anchor-dmz-firewall-rule-changes/m-p/2785286#M100930</link>
      <description>&lt;P&gt;If a firewall is involved, ports 16666 (16667 if using secure mobility) and protocol 97 must be allowed bidirectionally between the IP addresses of the controller management interfaces.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;– UDP 16666 for tunnel control traffic&lt;BR /&gt;&lt;BR /&gt;– IP Protocol 97 for user data traffic&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Dont forget to rate helpful posts&lt;/P&gt;</description>
      <pubDate>Wed, 18 Nov 2015 07:30:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-anchor-dmz-firewall-rule-changes/m-p/2785286#M100930</guid>
      <dc:creator>Sandeep Choudhary</dc:creator>
      <dc:date>2015-11-18T07:30:59Z</dc:date>
    </item>
    <item>
      <title>Hi Sandeep ,</title>
      <link>https://community.cisco.com/t5/wireless/guest-anchor-dmz-firewall-rule-changes/m-p/2785287#M100931</link>
      <description>&lt;P&gt;Hi Sandeep ,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for the reply .&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;And apart from this , i think i should be getting a rule created so that both Anchor and Mobility controllers can reach other . Am i right ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So if my understanding is correct , all guest internet traffic originating from the client , would first hit the AP.&lt;/P&gt;
&lt;P&gt;Being a &amp;nbsp;Centrally switched WLAN , then it would hit the foreign&amp;nbsp;controller which will be then tunnelled to the Anchor controller . Then to my internet router.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Am i getting this correct ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks ,&lt;/P&gt;
&lt;P&gt;Rahul.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Nov 2015 07:38:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-anchor-dmz-firewall-rule-changes/m-p/2785287#M100931</guid>
      <dc:creator>rahul nair</dc:creator>
      <dc:date>2015-11-18T07:38:36Z</dc:date>
    </item>
    <item>
      <title>Yes you are right.</title>
      <link>https://community.cisco.com/t5/wireless/guest-anchor-dmz-firewall-rule-changes/m-p/2785288#M100932</link>
      <description>&lt;P&gt;Yes you are right.&lt;/P&gt;
&lt;P&gt;The Guest traffic, however, is sent to the anchor controller in the DMZ via an Ether IP tunnel, and the anchor controller bridges it to the DMZ network. The network firewall is configured to allow UDP 16666 and Protocol 97 traffic between the two controllers. Because the anchor controller handles client DHCP and authentication, the laptop of the visitor has an IP in the DMZ VLAN range.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Here is the flow:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Client &amp;gt; AP &amp;gt; WLC &amp;gt; Guest WLC &amp;gt; DMZ &amp;gt; Internet&lt;BR /&gt;&lt;BR /&gt;Regards&lt;/P&gt;
&lt;P&gt;Dont forget to rate helpful posts&lt;/P&gt;</description>
      <pubDate>Wed, 18 Nov 2015 07:51:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-anchor-dmz-firewall-rule-changes/m-p/2785288#M100932</guid>
      <dc:creator>Sandeep Choudhary</dc:creator>
      <dc:date>2015-11-18T07:51:47Z</dc:date>
    </item>
    <item>
      <title>Thanks a lot .</title>
      <link>https://community.cisco.com/t5/wireless/guest-anchor-dmz-firewall-rule-changes/m-p/2785289#M100933</link>
      <description>&lt;P&gt;Thanks a lot .&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Just to confirm once more , the actual physical &amp;nbsp;flow should be like :&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Client &amp;gt; AP &amp;gt; WLC &amp;gt;FW&amp;gt; Guest WLC &amp;gt; DMZ &amp;gt; Internet ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;And all the guest traffic , including DHCP request/ack would be originating from the IP address of the Foreign WLC right ? &amp;nbsp;As the packets' source Ip address?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt; I am asking this , so that just one rule enabling both WLCs to talk to each other would do the trick.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Lastly is there a final test that i can do from both the WLCs do ensure that is effectively achieved from both the end ? Like a command or something ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Nov 2015 07:57:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-anchor-dmz-firewall-rule-changes/m-p/2785289#M100933</guid>
      <dc:creator>rahul nair</dc:creator>
      <dc:date>2015-11-18T07:57:49Z</dc:date>
    </item>
    <item>
      <title>yes you are correct....</title>
      <link>https://community.cisco.com/t5/wireless/guest-anchor-dmz-firewall-rule-changes/m-p/2785290#M100934</link>
      <description>&lt;P&gt;yes you are correct.... Traffic flow with firewall will be :&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Client &amp;gt; AP &amp;gt; WLC &amp;gt;FW&amp;gt; Guest WLC &amp;gt; DMZ &amp;gt; Internet&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;yes it(DHCP req) will start form forein wlc.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;During the anchoring scenario the client’s DHCP is handled by the anchor controller as the client data is tunneled within an EoIP tunnel between the foreign and anchor controllers. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;yes you can do the mobilty eping/moing test to ensure that data and control path are up and working:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;https://rscciew.wordpress.com/2014/07/10/mobility-configuring-on-wlc/&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;http://revolutionwifi.blogspot.de/2010/10/auto-anchor-mobility-fundamentals.html&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Dont forget to rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Nov 2015 08:20:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-anchor-dmz-firewall-rule-changes/m-p/2785290#M100934</guid>
      <dc:creator>Sandeep Choudhary</dc:creator>
      <dc:date>2015-11-18T08:20:24Z</dc:date>
    </item>
    <item>
      <title>Thanks Sandeep .</title>
      <link>https://community.cisco.com/t5/wireless/guest-anchor-dmz-firewall-rule-changes/m-p/2785291#M100935</link>
      <description>&lt;P&gt;Thanks Sandeep .&lt;/P&gt;
&lt;P&gt;I think it is clear now !&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Nov 2015 08:32:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-anchor-dmz-firewall-rule-changes/m-p/2785291#M100935</guid>
      <dc:creator>rahul nair</dc:creator>
      <dc:date>2015-11-18T08:32:18Z</dc:date>
    </item>
  </channel>
</rss>

