<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Secure Guest Access with 5508 controller in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/secure-guest-access-with-5508-controller/m-p/1883158#M12439</link>
    <description>&lt;P&gt;Hi there, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could someone point me in the right direction with regards to the following? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a requirement to set up a guest SSID for contractor so that they can use the internet while in the office.&lt;/P&gt;&lt;P&gt;Security say that all traffic on this SSID should be isolated and directed straight to the firewall, with no chance of contamination into the company network infrastructure. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the 5508, my understanding is using the setting up a guest account functionality built in will achieve this, but all traffic would end up at the wireless controller. How do I then put a direct forward for all traffic to the firewall which will only affect the guest traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be welcomed with delight and joy!!! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Sun, 04 Jul 2021 04:56:08 GMT</pubDate>
    <dc:creator>Andy Johnson</dc:creator>
    <dc:date>2021-07-04T04:56:08Z</dc:date>
    <item>
      <title>Secure Guest Access with 5508 controller</title>
      <link>https://community.cisco.com/t5/wireless/secure-guest-access-with-5508-controller/m-p/1883158#M12439</link>
      <description>&lt;P&gt;Hi there, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could someone point me in the right direction with regards to the following? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a requirement to set up a guest SSID for contractor so that they can use the internet while in the office.&lt;/P&gt;&lt;P&gt;Security say that all traffic on this SSID should be isolated and directed straight to the firewall, with no chance of contamination into the company network infrastructure. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the 5508, my understanding is using the setting up a guest account functionality built in will achieve this, but all traffic would end up at the wireless controller. How do I then put a direct forward for all traffic to the firewall which will only affect the guest traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be welcomed with delight and joy!!! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 04:56:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/secure-guest-access-with-5508-controller/m-p/1883158#M12439</guid>
      <dc:creator>Andy Johnson</dc:creator>
      <dc:date>2021-07-04T04:56:08Z</dc:date>
    </item>
    <item>
      <title>Secure Guest Access with 5508 controller</title>
      <link>https://community.cisco.com/t5/wireless/secure-guest-access-with-5508-controller/m-p/1883159#M12440</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Configure an ACL on the router of the ACL for that Guest VLAN so that, the Guest VLAN can only go out directly to the internet and not to communicate with any other VLAN..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Surendra&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Apr 2012 08:20:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/secure-guest-access-with-5508-controller/m-p/1883159#M12440</guid>
      <dc:creator>Surendra BG</dc:creator>
      <dc:date>2012-04-03T08:20:07Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Guest Access with 5508 controller</title>
      <link>https://community.cisco.com/t5/wireless/secure-guest-access-with-5508-controller/m-p/1883160#M12441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The best way to accomplish this would be to have your internal controller anchor to another controller located in you DMZ.  This would allow you to choose whatever SSID you want and have its traffic virtually terminate outside of your trusted network.  If clients attached to this SSID needed access to internal resources they could use a VPN to come back in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2012 02:17:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/secure-guest-access-with-5508-controller/m-p/1883160#M12441</guid>
      <dc:creator>braggb001</dc:creator>
      <dc:date>2012-04-04T02:17:08Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Guest Access with 5508 controller</title>
      <link>https://community.cisco.com/t5/wireless/secure-guest-access-with-5508-controller/m-p/1883161#M12442</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. Drop the traffic at the WLC apply ACl&lt;/P&gt;&lt;P&gt;2. Anchor the traffic to the DMZ&lt;/P&gt;&lt;P&gt;3. Take one of the ports from the WLC and plug it into the FW&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DONE...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2012 02:28:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/secure-guest-access-with-5508-controller/m-p/1883161#M12442</guid>
      <dc:creator>George Stefanick</dc:creator>
      <dc:date>2012-04-04T02:28:42Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Guest Access with 5508 controller</title>
      <link>https://community.cisco.com/t5/wireless/secure-guest-access-with-5508-controller/m-p/1883162#M12443</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;H5 style="border-collapse: collapse; font-size: 1.3333em; list-style-type: none; padding-top: 3px; padding-bottom: 3px; overflow-x: hidden; overflow-y: hidden; color: #555555; font-family: Arial, verdana, sans-serif;"&gt;to George Stefanick&lt;/H5&gt;&lt;P&gt; Could you provide url of documentation how to implement third solution - &lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt; Take one of the ports from the WLC and plug it into the FW, &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;especialy configuration of WLC.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2012 03:54:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/secure-guest-access-with-5508-controller/m-p/1883162#M12443</guid>
      <dc:creator>deshtikypshaq</dc:creator>
      <dc:date>2012-04-04T03:54:40Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Guest Access with 5508 controller</title>
      <link>https://community.cisco.com/t5/wireless/secure-guest-access-with-5508-controller/m-p/1883163#M12444</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is no documentation for that, most don't do it and I've seen it not recommended before.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyways, all you do is setup a dynamic interface and select port 8 for example and plug that into your DMZ network or FW interface directly. This will only work if you are not doing LAG on the 5508.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2012 04:02:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/secure-guest-access-with-5508-controller/m-p/1883163#M12444</guid>
      <dc:creator>blakekrone</dc:creator>
      <dc:date>2012-04-04T04:02:12Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Guest Access with 5508 controller</title>
      <link>https://community.cisco.com/t5/wireless/secure-guest-access-with-5508-controller/m-p/1883164#M12445</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As Blake pointed out its not supported, but it works. I have a customer set up like this and they are running fine. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2012 04:06:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/secure-guest-access-with-5508-controller/m-p/1883164#M12445</guid>
      <dc:creator>George Stefanick</dc:creator>
      <dc:date>2012-04-04T04:06:32Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Guest Access with 5508 controller</title>
      <link>https://community.cisco.com/t5/wireless/secure-guest-access-with-5508-controller/m-p/1883165#M12446</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I too have customers setup this way with no issues.  I don't know why it wouldn't be supported... It was supported on the 4400's and even on the 2504's. Oh well... It works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scott Fella&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from my iPhone&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2012 11:41:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/secure-guest-access-with-5508-controller/m-p/1883165#M12446</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2012-04-04T11:41:20Z</dc:date>
    </item>
  </channel>
</rss>

