<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic restrict HTTPS access to 5508 WLC in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/restrict-https-access-to-5508-wlc/m-p/2272818#M119409</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You have to use CPU Acl because this traffic is directed to the wlc itself.&lt;/P&gt;&lt;P&gt;Interface acl is for traffic from to wireless clients&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/wireless/controller/7.4/configuration/guides/security_solution/config_security_chapter_01110.html#ID2789"&gt;http://www.cisco.com/en/US/docs/wireless/controller/7.4/configuration/guides/security_solution/config_security_chapter_01110.html#ID2789&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 25 Jun 2013 20:34:26 GMT</pubDate>
    <dc:creator>Serge Yasmine</dc:creator>
    <dc:date>2013-06-25T20:34:26Z</dc:date>
    <item>
      <title>restrict HTTPS access to 5508 WLC</title>
      <link>https://community.cisco.com/t5/wireless/restrict-https-access-to-5508-wlc/m-p/2272815#M119406</link>
      <description>&lt;P&gt;I would like to restrict HTTPS access to the management interface(the GUI management) on a 5508.&amp;nbsp; I created an ACL and applied it to the management interface.&amp;nbsp; Nothing happens.&amp;nbsp; Still able to access from any IP.&amp;nbsp; Maybe im goign about this the wrong way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL is attached as a picture to this discussion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help is appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ryan&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 07:16:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/restrict-https-access-to-5508-wlc/m-p/2272815#M119406</guid>
      <dc:creator>ryan.rouleau</dc:creator>
      <dc:date>2021-07-04T07:16:22Z</dc:date>
    </item>
    <item>
      <title>restrict HTTPS access to 5508 WLC</title>
      <link>https://community.cisco.com/t5/wireless/restrict-https-access-to-5508-wlc/m-p/2272816#M119407</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Ryan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As per your query i can suggest you the following solution-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please use the commands to verify the acl on management interface-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;•1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; config interface acl management access-control-list-name&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;•2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; config interface acl ap-manager access-control-list-name&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this will help you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Jun 2013 21:29:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/restrict-https-access-to-5508-wlc/m-p/2272816#M119407</guid>
      <dc:creator>Abhishek Abhishek</dc:creator>
      <dc:date>2013-06-21T21:29:45Z</dc:date>
    </item>
    <item>
      <title>restrict HTTPS access to 5508 WLC</title>
      <link>https://community.cisco.com/t5/wireless/restrict-https-access-to-5508-wlc/m-p/2272817#M119408</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Through the CLI there was no ACL applied.&amp;nbsp; Now doing the command above, the ACL is now applied, but its still allowing HTTPS access from any IP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Jun 2013 17:06:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/restrict-https-access-to-5508-wlc/m-p/2272817#M119408</guid>
      <dc:creator>ryan.rouleau</dc:creator>
      <dc:date>2013-06-25T17:06:57Z</dc:date>
    </item>
    <item>
      <title>restrict HTTPS access to 5508 WLC</title>
      <link>https://community.cisco.com/t5/wireless/restrict-https-access-to-5508-wlc/m-p/2272818#M119409</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You have to use CPU Acl because this traffic is directed to the wlc itself.&lt;/P&gt;&lt;P&gt;Interface acl is for traffic from to wireless clients&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/wireless/controller/7.4/configuration/guides/security_solution/config_security_chapter_01110.html#ID2789"&gt;http://www.cisco.com/en/US/docs/wireless/controller/7.4/configuration/guides/security_solution/config_security_chapter_01110.html#ID2789&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Jun 2013 20:34:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/restrict-https-access-to-5508-wlc/m-p/2272818#M119409</guid>
      <dc:creator>Serge Yasmine</dc:creator>
      <dc:date>2013-06-25T20:34:26Z</dc:date>
    </item>
    <item>
      <title>restrict HTTPS access to 5508 WLC</title>
      <link>https://community.cisco.com/t5/wireless/restrict-https-access-to-5508-wlc/m-p/2272819#M119410</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks everyone.&amp;nbsp; The CPU ACL works.&amp;nbsp; Just make sure you add a permit any any to the end of your ACL or you might lose access to other mangement services as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ryan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Jun 2013 20:59:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/restrict-https-access-to-5508-wlc/m-p/2272819#M119410</guid>
      <dc:creator>ryan.rouleau</dc:creator>
      <dc:date>2013-06-25T20:59:17Z</dc:date>
    </item>
    <item>
      <title>So this announcement came out</title>
      <link>https://community.cisco.com/t5/wireless/restrict-https-access-to-5508-wlc/m-p/2272820#M119411</link>
      <description>&lt;P&gt;So this announcement came out and now I'm looking at cpu acl stuff.&amp;nbsp; I found this thread but have a question about your statement &lt;STRONG&gt;"Just make sure you add a permit any any to the end of your ACL or you might lose access to other mangement services as well."&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Im confused if you add this wouldn't this allow access for all anyway?&amp;nbsp; I can see you blocked https.&amp;nbsp; Does anyone know what other management services are needed?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151016-wlc&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2015 18:35:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/restrict-https-access-to-5508-wlc/m-p/2272820#M119411</guid>
      <dc:creator>Trent Hurt</dc:creator>
      <dc:date>2015-10-21T18:35:30Z</dc:date>
    </item>
  </channel>
</rss>

