<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WLC MGMT Interface Access Control in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/wlc-mgmt-interface-access-control/m-p/4956422#M262732</link>
    <description>&lt;P&gt;Yes we use CPU ACL.&lt;BR /&gt;Just remember all the other things you might need to allow:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless/5500-series-wireless-controllers/113344-cuwn-ppm.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/wireless/5500-series-wireless-controllers/113344-cuwn-ppm.html&lt;/A&gt;&lt;BR /&gt;Ideally your WLC management should be behind a firewall too.&lt;BR /&gt;Like others have warned - make sure you have console access to disable the CPU ACL in case you lock yourself out.&lt;/P&gt;</description>
    <pubDate>Thu, 09 Nov 2023 13:39:58 GMT</pubDate>
    <dc:creator>Rich R</dc:creator>
    <dc:date>2023-11-09T13:39:58Z</dc:date>
    <item>
      <title>WLC MGMT Interface Access Control</title>
      <link>https://community.cisco.com/t5/wireless/wlc-mgmt-interface-access-control/m-p/4955622#M262697</link>
      <description>&lt;P&gt;Hello, Cisco Community,&lt;/P&gt;&lt;P&gt;With the recent announcement of multiple vulnerabilities in Cisco IOS XE Software Web UI Feature, &lt;STRONG&gt;CVE-2023-20198&lt;/STRONG&gt; and &lt;STRONG&gt;CVE-2023-20273&lt;/STRONG&gt; respectfully. I have taken to closing any holes that afflict our environment. My concern (however not addressed in the advisory: Multiple Vulnerabilities in Cisco IOS XE Software Web UI Feature) is for our AirOS Infrastructure, with varying WLC(s) globally, and the secure-server feature being present, I could not / cannot identify if the 3500 series product line is impacted. I would assume not, given the lack of communication relating to AirOS in the advisory statement.&lt;/P&gt;&lt;P&gt;Through my remediation, I have identified that network management over HTTPS to our Wireless LAN Controllers is not suitably limited through access control(s), open to administrative connection via HTTPS from any internal source that isn't currently policed through ISE. i.e. server VLANs etc. To combat to this, I wish to enforce Access Control through ACLs, VACLs, or perhaps a policy map within ISE itself.&lt;/P&gt;&lt;P&gt;The Controllers supply an option to apply a local ACL to the MGMT interface, processed in software, my concern given the age of the hardware and expected traffic over this interface is degradation in performance, resulting in packet loss. This lead me to look at applying a ACL, PACL, VACL on the directly connected switch of the Controller(s). Traffic control is then closer to the source, utilising specific hardware allocated, specifically for VACLs. My understanding is all packets bridged and entering the VLAN are checked against the VACL. With significant traffic and varying usage, making Access Control cumbersome to manage, and potentially introducing a bottleneck, given the extensive VACL Map that would be required to govern the Virutal LAN.&lt;/P&gt;&lt;P&gt;Also considered CBAC, unfortunately the associated switching infrastructure does not support this feature, thus not applicable in this situation.&lt;/P&gt;&lt;P&gt;My question: Given the scenario above, and that the Controllers are not public facing, what access control type would best suit the requirement? And where would the access control be placed?&lt;/P&gt;&lt;P&gt;My thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 09:09:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-mgmt-interface-access-control/m-p/4955622#M262697</guid>
      <dc:creator>aavnet89</dc:creator>
      <dc:date>2023-11-08T09:09:06Z</dc:date>
    </item>
    <item>
      <title>Re: WLC MGMT Interface Access Control</title>
      <link>https://community.cisco.com/t5/wireless/wlc-mgmt-interface-access-control/m-p/4955675#M262698</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;EM&gt; &amp;nbsp; &amp;nbsp; &amp;gt;...&lt;/EM&gt;&lt;SPAN&gt;&lt;EM&gt;, and that the Controllers &lt;U&gt;&lt;FONT color="#008000"&gt;are not public facing,&amp;nbsp;&lt;/FONT&gt;&lt;/U&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;/SPAN&gt;&amp;nbsp;- In my opinion that would be sufficient to mitigate this vulnerability ,&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 11:18:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-mgmt-interface-access-control/m-p/4955675#M262698</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2023-11-08T11:18:12Z</dc:date>
    </item>
    <item>
      <title>Re: WLC MGMT Interface Access Control</title>
      <link>https://community.cisco.com/t5/wireless/wlc-mgmt-interface-access-control/m-p/4955683#M262700</link>
      <description>&lt;P&gt;Thanks, Marce1000,&lt;/P&gt;&lt;P&gt;The vulnerability isn't the focus point, simply back-fill to provide detail where possible. My question relates more to restricting access to the MGMT interface of a WLC without impacting services and or the production environment, and where based on the scenario access control should be placed.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 11:37:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-mgmt-interface-access-control/m-p/4955683#M262700</guid>
      <dc:creator>aavnet89</dc:creator>
      <dc:date>2023-11-08T11:37:14Z</dc:date>
    </item>
    <item>
      <title>Re: WLC MGMT Interface Access Control</title>
      <link>https://community.cisco.com/t5/wireless/wlc-mgmt-interface-access-control/m-p/4955690#M262702</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;EM&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;gt;...&lt;/EM&gt;&lt;SPAN&gt;&lt;EM&gt;cannot identify if the 3500 series product line is impacted.&amp;nbsp;&lt;/EM&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;FONT color="#008000"&gt; - It isn't&lt;/FONT&gt; because the aireos based controllers do not run &lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;IOS-XE&lt;/STRONG&gt;&lt;/FONT&gt;&amp;nbsp; (where the vulnerability takes place)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;gt;.&lt;EM&gt;..&amp;nbsp;and where based on the scenario access control should be placed.&lt;/EM&gt;&lt;BR /&gt;&amp;nbsp;- For the AireOS models best on the controller itself with so called 'CPU ACL(s)' : good document here :&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;A href="https://mrncciew.com/2013/03/15/wlc-access-control-list-acl/" target="_blank"&gt;https://mrncciew.com/2013/03/15/wlc-access-control-list-acl/&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;M.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 12:23:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-mgmt-interface-access-control/m-p/4955690#M262702</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2023-11-08T12:23:14Z</dc:date>
    </item>
    <item>
      <title>Re: WLC MGMT Interface Access Control</title>
      <link>https://community.cisco.com/t5/wireless/wlc-mgmt-interface-access-control/m-p/4955872#M262709</link>
      <description>&lt;P&gt;Like Marce mentioned, the CPU ACL is what you need to use. &amp;nbsp;Be careful or else you will lock yourself out. &amp;nbsp;You should read u on it from various sources and hopefully you have a spare/lab controller you can build out your CPU ACL.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 16:01:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-mgmt-interface-access-control/m-p/4955872#M262709</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2023-11-08T16:01:43Z</dc:date>
    </item>
    <item>
      <title>Re: WLC MGMT Interface Access Control</title>
      <link>https://community.cisco.com/t5/wireless/wlc-mgmt-interface-access-control/m-p/4956392#M262728</link>
      <description>&lt;P&gt;Thanks, Scott,&lt;/P&gt;&lt;P&gt;The CPU ACL looks to certainly be what I need. In terms of transport services, I will perform an invisible port-scan to identify open TCP services.&lt;/P&gt;&lt;P&gt;Thanks again to you all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2023 12:18:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-mgmt-interface-access-control/m-p/4956392#M262728</guid>
      <dc:creator>aavnet89</dc:creator>
      <dc:date>2023-11-09T12:18:06Z</dc:date>
    </item>
    <item>
      <title>Re: WLC MGMT Interface Access Control</title>
      <link>https://community.cisco.com/t5/wireless/wlc-mgmt-interface-access-control/m-p/4956403#M262729</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; - Yeah , the&lt;FONT color="#008000"&gt;&lt;EM&gt; CPU ACL&lt;/EM&gt;&lt;/FONT&gt; is what you need indeed for AireOS based controllers , but&amp;nbsp; you need to be carefully with it , to not lock yourself out. Ideally it would be done on &lt;U&gt;initial&lt;/U&gt; controller configuration without APs connected or clients served.&amp;nbsp; You may try it (e.g.) without saving the configuration immediately &lt;U&gt;,&lt;EM&gt; in case of trouble , (or have a spare controller for testing)&lt;/EM&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2023 12:44:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-mgmt-interface-access-control/m-p/4956403#M262729</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2023-11-09T12:44:21Z</dc:date>
    </item>
    <item>
      <title>Re: WLC MGMT Interface Access Control</title>
      <link>https://community.cisco.com/t5/wireless/wlc-mgmt-interface-access-control/m-p/4956422#M262732</link>
      <description>&lt;P&gt;Yes we use CPU ACL.&lt;BR /&gt;Just remember all the other things you might need to allow:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless/5500-series-wireless-controllers/113344-cuwn-ppm.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/wireless/5500-series-wireless-controllers/113344-cuwn-ppm.html&lt;/A&gt;&lt;BR /&gt;Ideally your WLC management should be behind a firewall too.&lt;BR /&gt;Like others have warned - make sure you have console access to disable the CPU ACL in case you lock yourself out.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2023 13:39:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-mgmt-interface-access-control/m-p/4956422#M262732</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2023-11-09T13:39:58Z</dc:date>
    </item>
  </channel>
</rss>

