<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic howto block p2p traffic of clients connected to the same ssid on in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402279#M123183</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you say it works - are you talking about P2P Blocking Action or Dynamic Interface ACLs?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 28 Oct 2011 00:54:08 GMT</pubDate>
    <dc:creator>Sasha Tchepourko</dc:creator>
    <dc:date>2011-10-28T00:54:08Z</dc:date>
    <item>
      <title>howto block p2p traffic of clients connected to the same ssid on different wlc</title>
      <link>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402276#M123180</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I use two wlc 4400 (4.2.x version) with a mobility domain and one ssid, both wlc are connected to a cisco l2 switch infrastructure. On the wlc I use the p2p blocking action 'drop' (&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/wireless/controller/5.2/configuration/guide/c52wlan.html#wp1209597" target="_blank"&gt;http://www.cisco.com/en/US/docs/wireless/controller/5.2/configuration/guide/c52wlan.html#wp1209597&lt;/A&gt;&lt;SPAN&gt;) to isolate the clients from each other. Does anybody know if only unicast traffic is blocked or also multicast and broadcast traffic like arp requests?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Concerning blocking p2p traffic of clients connected to the same ssid but different controllers I found the following statement in the LAP FAQs (&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/wireless/ps430/products_qanda_item09186a00806a4da3.shtml):" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/wireless/ps430/products_qanda_item09186a00806a4da3.shtml):&lt;/A&gt;&lt;/P&gt;&lt;P&gt;===&lt;/P&gt;&lt;P&gt;Q. In autonomous APs, Public Secure Packet Forwarding (PSPF) is used to avoid client devices associated to this AP from inadvertently sharing files with other client devices on the wireless network. Is there any equivalent feature in Lightweight APs?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A. The feature or the mode that performs the similar function of PSPF in lightweight architecture is called peer-to-peer blocking mode. Peer-to-peer blocking mode is actually available with the controllers that manage the LAP. If this mode is disabled on the controller (which is the default setting), it allows the wireless clients to communicate with each other through the controller. If the mode is enabled, it blocks the communication between clients through the controller. It only works among the APs that have joined to the same controller. When enabled, &lt;STRONG&gt;&lt;EM&gt;this mode does not block wireless clients terminated on one controller from the ability to get to wireless clients terminated on a different controller, even in the same mobility group.&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;===&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anybody know what's the best practise to prevent this inter wlc client traffic? I already read about using acls on the wlc dynamic interfaces, or private vlans on the l2 switch vlans where the dynamic interfaces are connected to. Is it allowed to completely isolate the wlc from each other on these dynamic interfaces with acls or private vlans or do the wlc need to see each other on this interfaces (e.g. heart beat)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks in advance,&lt;/P&gt;&lt;P&gt;Thorsten&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 01:28:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402276#M123180</guid>
      <dc:creator>thorsten.steffen</dc:creator>
      <dc:date>2021-07-04T01:28:19Z</dc:date>
    </item>
    <item>
      <title>howto block p2p traffic of clients connected to the same ssid on</title>
      <link>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402277#M123181</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Thorsten,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you get an answer to your question? - "Does anybody know what's the best practise to prevent this inter wlc client traffic?"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been using interface ACLs but it's impacting users' performance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Oct 2011 00:43:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402277#M123181</guid>
      <dc:creator>Sasha Tchepourko</dc:creator>
      <dc:date>2011-10-28T00:43:30Z</dc:date>
    </item>
    <item>
      <title>howto block p2p traffic of clients connected to the same ssid on</title>
      <link>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402278#M123182</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No!! Its the WLC in picture... it works for same controller and APs registered to the same and P2P blocking the clients connecting to it on a WLAN&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Oct 2011 00:49:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402278#M123182</guid>
      <dc:creator>Surendra BG</dc:creator>
      <dc:date>2011-10-28T00:49:24Z</dc:date>
    </item>
    <item>
      <title>howto block p2p traffic of clients connected to the same ssid on</title>
      <link>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402279#M123183</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you say it works - are you talking about P2P Blocking Action or Dynamic Interface ACLs?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Oct 2011 00:54:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402279#M123183</guid>
      <dc:creator>Sasha Tchepourko</dc:creator>
      <dc:date>2011-10-28T00:54:08Z</dc:date>
    </item>
    <item>
      <title>howto block p2p traffic of clients connected to the same ssid on</title>
      <link>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402280#M123184</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;P2P blocking Action&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Oct 2011 00:55:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402280#M123184</guid>
      <dc:creator>Surendra BG</dc:creator>
      <dc:date>2011-10-28T00:55:34Z</dc:date>
    </item>
    <item>
      <title>howto block p2p traffic of clients connected to the same ssid on</title>
      <link>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402281#M123185</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What seems to not work is the P2P Blocking Action set to Forward-UpStream... Apperantly this suppose to happen:&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;This prevents potential attacks between clients on the same subnet by forcing communication through the router&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/solutions/Enterprise/Mobility/secwlandg20/ch4_2_SPMb.html#wp1307344"&gt;http://www.cisco.com/en/US/docs/solutions/Enterprise/Mobility/secwlandg20/ch4_2_SPMb.html#wp1307344&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Oct 2011 00:58:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402281#M123185</guid>
      <dc:creator>Sasha Tchepourko</dc:creator>
      <dc:date>2011-10-28T00:58:44Z</dc:date>
    </item>
    <item>
      <title>howto block p2p traffic of clients connected to the same ssid on</title>
      <link>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402282#M123186</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We're still using acls on the dynamic interfaces which is working fine although it isn't a preferred solution. Did you test Forward-UpStream? Did it work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thorsten&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Oct 2011 06:21:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402282#M123186</guid>
      <dc:creator>thorsten.steffen</dc:creator>
      <dc:date>2011-10-28T06:21:36Z</dc:date>
    </item>
    <item>
      <title>howto block p2p traffic of clients connected to the same ssid on</title>
      <link>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402283#M123187</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There was a bug on this issue in 7.0.116.0 that the WLC was not forwarding the upstream traffic with Forward Upstream enabled. Not sure if this was resolved&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;NikhiL&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Oct 2011 06:51:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402283#M123187</guid>
      <dc:creator>nikhilcherian</dc:creator>
      <dc:date>2011-10-28T06:51:02Z</dc:date>
    </item>
    <item>
      <title>howto block p2p traffic of clients connected to the same ssid on</title>
      <link>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402284#M123188</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've been using interface ACLs as well however I've disovered today that they impact users' performance. Having them on can only pull down ~9Mbps. With it off getting ~50Mbps. The way that I found the issue was with a VNC session, very slow to refresh, but the second I take the ACL off it's all good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Forward-UpStream doesn't seem to work (or parts of it). It seems that there are two things now working for me:&lt;/P&gt;&lt;P&gt;1. ARPs are being dropped if a client A queries client B's MAC (ok if client queries gateway's MAC)&lt;/P&gt;&lt;P&gt;2. Traffic is sent upstream, ie. router sees client's A packet and sends it down, as a simple permit any any log outbound ACL sees hits, but that packet never reaches the client B. (this was done with static arp entries on the machines).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this makes sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NikhiL, do you know what was that bug id?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Oct 2011 08:20:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402284#M123188</guid>
      <dc:creator>Sasha Tchepourko</dc:creator>
      <dc:date>2011-10-28T08:20:59Z</dc:date>
    </item>
    <item>
      <title>Re: howto block p2p traffic of clients connected to the same ssi</title>
      <link>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402285#M123189</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sasha,Thorsten&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The bug is Junked and I believe which is what you are running into with your tests:&lt;/P&gt;&lt;P&gt;CSCtr60787&amp;nbsp;&amp;nbsp;&amp;nbsp; WLC P2P Blocking Set to Forward-UpStream Doesn't Work. &lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Bugtoolkit : &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/Support/BugToolKit/action.do?hdnAction=searchBugs"&gt;http://tools.cisco.com/Support/BugToolKit/action.do?hdnAction=searchBugs&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To answer your original query :&lt;/P&gt;&lt;P&gt;ACL is only solution to block client communication on same ssid between 2 wlcs. 5508 works better with ACLs then 44xx platform.&lt;/P&gt;&lt;P&gt;ARP requests will be forwarded to upstream router just like any other traffic. WLC won't proxy arp for clients on same vlan.&lt;/P&gt;&lt;P&gt;Gateway arp's I believe should be handled by WLC . ( Don't quote me on this but I am pretty sure it is ) ..If it was not, then how would client know about gw ? &lt;/P&gt;&lt;P&gt;Multicast traffic is not applicable for p2p.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your ACL can be as simple as this for the scenario :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WLC 1 - clientvlan = 10&lt;BR /&gt;WLC 2 - clientvlan = 10&lt;BR /&gt;and you want to restrict users from wlc1-wlc1, wlc1-wlc2, wlc2-wlc2 for same vlan10.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically in that case the ACL should look like on both WLCs :&lt;BR /&gt;1. Permit statement to talk to gateway.&lt;BR /&gt;2. Deny to subnet.&lt;BR /&gt;3. Permit all.&lt;BR /&gt;4. If DHCP/DNS other services are on same subnet then you would need to add a permit&lt;BR /&gt;statement before the deny.&lt;BR /&gt;5. Attach the ACL to SSID or dymanic interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks..Salil&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class="mcePaste" id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;"&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;A href="http://cdetsweb-prd.cisco.com/apps/goto?identifier=CSCtr60787"&gt;CSCtr60787&lt;/A&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;A href="http://wwwin.cisco.com/ios/cets/pdi/cbms/cdets/legend.shtml" target="_blank" title="Help"&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;IMG border="0" height="15" src="http://cdetsweb-prd.cisco.com/apps/files/xslt/help.png" width="15" /&gt;&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN&gt;&lt;STRONG&gt;WLC P2P Blocking Set to Forward-UpStream Doesn't Work.&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 29 Oct 2011 04:47:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402285#M123189</guid>
      <dc:creator>Salil Prabhu</dc:creator>
      <dc:date>2011-10-29T04:47:06Z</dc:date>
    </item>
    <item>
      <title>howto block p2p traffic of clients connected to the same ssid on</title>
      <link>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402286#M123190</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Salil,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm currently using the ACL on the Dynamic interface but have found that it imacts our clients' performance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas why? I'm have 5 WiSM blades in total all doing the same thing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Nov 2011 06:32:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402286#M123190</guid>
      <dc:creator>Sasha Tchepourko</dc:creator>
      <dc:date>2011-11-02T06:32:43Z</dc:date>
    </item>
    <item>
      <title>howto block p2p traffic of clients connected to the same ssid on</title>
      <link>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402287#M123191</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sasha,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes Performance will be impacted as ACL's on WLC are software based..whereas on Router/Firewalls they are Asic/hardware based ( so fast ).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Longer the ACL, the slower it will be.. Try to put packets which HIT most at the beginning .. Use ACL counters to determine which Statement is HIT most often.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks..Salil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Nov 2011 13:38:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402287#M123191</guid>
      <dc:creator>Salil Prabhu</dc:creator>
      <dc:date>2011-11-02T13:38:09Z</dc:date>
    </item>
    <item>
      <title>howto block p2p traffic of clients connected to the same ssid on</title>
      <link>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402288#M123192</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Salil, again thank you for the information. That's I thought as well. Unfortunatelly in my environment the ACL is already as small as it can be.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you know when the Forward-UpStream feature will be fixed? As we need the functionality of filtering the p2p traffic but don't want the solution to impact our clients' performance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sasha.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Nov 2011 23:36:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402288#M123192</guid>
      <dc:creator>Sasha Tchepourko</dc:creator>
      <dc:date>2011-11-02T23:36:36Z</dc:date>
    </item>
    <item>
      <title>howto block p2p traffic of clients connected to the same ssid on</title>
      <link>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402289#M123193</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sasha,&lt;/P&gt;&lt;P&gt;if your wlc are connected via cisco switches perhaps private vlan feature is a possibility to prevent client-to-client traffic being transferred between wlc. We thought about this solution last year but private vlans weren't supported on vlan trunks at this point of time; in current ios versions it's supported on vlan trunks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Thorsten&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Nov 2011 09:25:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402289#M123193</guid>
      <dc:creator>thorsten.steffen</dc:creator>
      <dc:date>2011-11-03T09:25:01Z</dc:date>
    </item>
    <item>
      <title>howto block p2p traffic of clients connected to the same ssid on</title>
      <link>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402290#M123194</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sasha,Thosten&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far I know p2p over multiple ssid is not planned to be fixed. You can approach your account team to address this as PERS ( Product enhancement request ) but they would need to have good buissness justification $$ and number of customers requesting the feature..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have not tried Private vlans ..Sorry..May be if I get some time I will test out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks..Salil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Nov 2011 20:04:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402290#M123194</guid>
      <dc:creator>Salil Prabhu</dc:creator>
      <dc:date>2011-11-03T20:04:27Z</dc:date>
    </item>
    <item>
      <title>howto block p2p traffic of clients connected to the same ssid on</title>
      <link>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402291#M123195</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello there, did we ever got an answer on this? Still wondering if private vlan is the way to go or perhaps protected ports, which may not bring scalability in a large wireless network. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Sep 2012 21:21:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402291#M123195</guid>
      <dc:creator>pzpgd1mlf</dc:creator>
      <dc:date>2012-09-02T21:21:23Z</dc:date>
    </item>
    <item>
      <title>howto block p2p traffic of clients connected to the same ssid on</title>
      <link>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402292#M123196</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I too would like to know if a best practice has ever been discovered for this.&lt;/P&gt;&lt;P&gt;I have a site that has 550 APs with 4 x 5508 so I have use multiple controllers at this site. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jan 2013 23:18:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402292#M123196</guid>
      <dc:creator>Michael Burk</dc:creator>
      <dc:date>2013-01-10T23:18:42Z</dc:date>
    </item>
    <item>
      <title>howto block p2p traffic of clients connected to the same ssid on</title>
      <link>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402293#M123197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We're still using acls on the dynamic interfaces, not nice but it's working fine in our environment (6 wlc).&lt;/P&gt;&lt;DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;Thorsten&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2013 07:59:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402293#M123197</guid>
      <dc:creator>thorsten.steffen</dc:creator>
      <dc:date>2013-01-11T07:59:27Z</dc:date>
    </item>
    <item>
      <title>howto block p2p traffic of clients connected to the same ssid on</title>
      <link>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402294#M123198</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Very good, can you provide some sample ACL lines so we can see how that would look? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my case the controllers are connected via Layer2 and I'm not sure the L2 traffic of a client on Controller1 would hit the SVI before being switched to a given client on Controller2.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2013 17:03:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402294#M123198</guid>
      <dc:creator>Michael Burk</dc:creator>
      <dc:date>2013-01-11T17:03:18Z</dc:date>
    </item>
    <item>
      <title>howto block p2p traffic of clients connected to the same ssid on</title>
      <link>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402295#M123199</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;config example on wlc44xx:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;wlan client net: 10.1.1.0 /24, default gateway 10.1.1.10 (dedicated router in our case)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;acl rules:&lt;/P&gt;&lt;P&gt;1. 10.1.1.0 /24 -&amp;gt; 10.1.1.10: Permit&lt;BR /&gt;2. 10.1.1.10 -&amp;gt; 10.1.1.0 /24: Permit&lt;BR /&gt;3. 10.1.1.0 /24 -&amp;gt; 10.1.1.0 /24: Deny&lt;BR /&gt;4. 10.1.1.0 /24 -&amp;gt; 0.0.0.0 /0: Permit&lt;BR /&gt;5. 0.0.0.0 /0 -&amp;gt; 10.1.1.0 /24: Permit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in short words: Allow Traffic to/from default gateway + deny traffic inside the net + allow traffic to/from rest&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jan 2013 14:53:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/howto-block-p2p-traffic-of-clients-connected-to-the-same-ssid-on/m-p/1402295#M123199</guid>
      <dc:creator>thorsten.steffen</dc:creator>
      <dc:date>2013-01-14T14:53:56Z</dc:date>
    </item>
  </channel>
</rss>

