<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Guest WiFi + Network separation in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/guest-wifi-network-separation/m-p/4087625#M215384</link>
    <description>&lt;P&gt;What about using ACL's in the Guest SSID to deny access to RFC1918 local LAN (superseded by RFC5735)? Have you also considered splitting Guest traffic into a different VRF?&lt;/P&gt;&lt;P&gt;HTH&lt;BR /&gt;-Jesus&lt;BR /&gt;*** Please Rate Helpful Responses ***&lt;/P&gt;</description>
    <pubDate>Mon, 18 May 2020 06:45:51 GMT</pubDate>
    <dc:creator>JPavonM</dc:creator>
    <dc:date>2020-05-18T06:45:51Z</dc:date>
    <item>
      <title>Guest WiFi + Network separation</title>
      <link>https://community.cisco.com/t5/wireless/guest-wifi-network-separation/m-p/4087547#M215383</link>
      <description>&lt;P&gt;I am planning to implement guest WiFi access in my network.&lt;/P&gt;&lt;P&gt;Already we have the Cisco AP &amp;amp; WLC in place. The existing Cisco AP has 1 SSID for intra WiFi access.&lt;/P&gt;&lt;P&gt;The WLC is in the Data center &amp;amp; the APs are in branch locations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to setup additional SSID for Guest Internet access.&lt;/P&gt;&lt;P&gt;For the internet Guest access it will have local breakout to Internet from the branch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So would like to understand, how to achieve network segregation in this scenario.&lt;/P&gt;&lt;P&gt;The Guest VLAN should have access only to Internet.&lt;/P&gt;&lt;P&gt;No access to corporate network &amp;amp; the guest VLAN should be isolated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How to achieve this ? Attached is the diagram for your reference.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 19:03:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-wifi-network-separation/m-p/4087547#M215383</guid>
      <dc:creator>RS19</dc:creator>
      <dc:date>2021-07-05T19:03:24Z</dc:date>
    </item>
    <item>
      <title>Re: Guest WiFi + Network separation</title>
      <link>https://community.cisco.com/t5/wireless/guest-wifi-network-separation/m-p/4087625#M215384</link>
      <description>&lt;P&gt;What about using ACL's in the Guest SSID to deny access to RFC1918 local LAN (superseded by RFC5735)? Have you also considered splitting Guest traffic into a different VRF?&lt;/P&gt;&lt;P&gt;HTH&lt;BR /&gt;-Jesus&lt;BR /&gt;*** Please Rate Helpful Responses ***&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2020 06:45:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-wifi-network-separation/m-p/4087625#M215384</guid>
      <dc:creator>JPavonM</dc:creator>
      <dc:date>2020-05-18T06:45:51Z</dc:date>
    </item>
    <item>
      <title>Re: Guest WiFi + Network separation</title>
      <link>https://community.cisco.com/t5/wireless/guest-wifi-network-separation/m-p/4087639#M215385</link>
      <description>&lt;P&gt;In the given context, you have to apply some ACL on vlan 100 (guest vlan) to prevent it from communicating with your internal network. You can permit to DNS/DHCP &amp;amp; then block to rest of your internal network. Then permit any.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you want to completely isolate guest traffic, then you tunnel guest traffic to a DMZ WLC, where you do not terminate in your internal corporate switch network. Refer below for more details&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-5/Enterprise-Mobility-8-5-Design-Guide/Enterprise_Mobility_8-5_Deployment_Guide/WirelessNetwork_GuestAccessService.html" target="_self"&gt;https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-5/Enterprise-Mobility-8-5-Design-Guide/Enterprise_Mobility_8-5_Deployment_Guide/WirelessNetwork_GuestAccessService.html&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Rasika&lt;/P&gt;
&lt;P&gt;*** Pls rate all useful responses ***&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2020 07:40:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-wifi-network-separation/m-p/4087639#M215385</guid>
      <dc:creator>Rasika Nayanajith</dc:creator>
      <dc:date>2020-05-18T07:40:48Z</dc:date>
    </item>
    <item>
      <title>Re: Guest WiFi + Network separation</title>
      <link>https://community.cisco.com/t5/wireless/guest-wifi-network-separation/m-p/4088343#M215386</link>
      <description>&lt;P&gt;ACL is one option which I am thinking now.&lt;/P&gt;&lt;P&gt;Regarding vrf currently it is not possible due to some restrictions in the hardware &amp;amp; the design&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2020 23:51:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-wifi-network-separation/m-p/4088343#M215386</guid>
      <dc:creator>RS19</dc:creator>
      <dc:date>2020-05-18T23:51:06Z</dc:date>
    </item>
    <item>
      <title>Re: Guest WiFi + Network separation</title>
      <link>https://community.cisco.com/t5/wireless/guest-wifi-network-separation/m-p/4088346#M215387</link>
      <description>&lt;P&gt;Thanks. ACL is the option i am looking for. Regarding the WLC option It is not feasible since I dont have the anchor WLC &amp;amp; also I want to use the local internet in the branch locations to exit to Internet. I dont want my traffic to flow this DC and use Internet at DC .&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2020 23:53:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-wifi-network-separation/m-p/4088346#M215387</guid>
      <dc:creator>RS19</dc:creator>
      <dc:date>2020-05-18T23:53:54Z</dc:date>
    </item>
    <item>
      <title>Re: Guest WiFi + Network separation</title>
      <link>https://community.cisco.com/t5/wireless/guest-wifi-network-separation/m-p/4095088#M215388</link>
      <description>&lt;P&gt;Further to the above discussions, I have updated the diagram as attached.&lt;/P&gt;&lt;P&gt;Below is the further explanation.&lt;/P&gt;&lt;P&gt;- In Each floor there is guest VLAN which needs internet access.&lt;/P&gt;&lt;P&gt;- For Each Guest VLAN, I will apply ACL so that It does not communicate with other internal segments.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Questions:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;- On Core Switch(L3#1,L3#2) is it required to add default route pointing to R#1 &amp;amp; R#2 ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;- Is it possible to achieve without Default route in R#1 &amp;amp; R#2 ?&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;The reason for asking this is because if default route is added in&amp;nbsp;L3#1 &amp;amp; L3#2, even other segments will have route to internet which I want to avoid&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- I want to have route only to the Guest VLAN(Segment)&amp;nbsp;&lt;/P&gt;&lt;P&gt;How to achieve this ? Is some kind of policy map or policy route in&amp;nbsp;L3#1 &amp;amp; L3#2, will help in achieving this ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 31 May 2020 13:20:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-wifi-network-separation/m-p/4095088#M215388</guid>
      <dc:creator>RS19</dc:creator>
      <dc:date>2020-05-31T13:20:22Z</dc:date>
    </item>
    <item>
      <title>Re: Guest WiFi + Network separation</title>
      <link>https://community.cisco.com/t5/wireless/guest-wifi-network-separation/m-p/4095224#M215389</link>
      <description>&lt;P&gt;Any help regarding my query&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jun 2020 02:44:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-wifi-network-separation/m-p/4095224#M215389</guid>
      <dc:creator>RS19</dc:creator>
      <dc:date>2020-06-01T02:44:58Z</dc:date>
    </item>
    <item>
      <title>Re: Guest WiFi + Network separation</title>
      <link>https://community.cisco.com/t5/wireless/guest-wifi-network-separation/m-p/4096695#M215390</link>
      <description>The route should automatically be set, if you have a vlan interface on your core switches. This is also the point (the router for the guest vlan) where you would apply the ACL to that vlan interface.</description>
      <pubDate>Wed, 03 Jun 2020 08:10:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-wifi-network-separation/m-p/4096695#M215390</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2020-06-03T08:10:55Z</dc:date>
    </item>
  </channel>
</rss>

