<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 9800 Guest Anchor Design in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/9800-guest-anchor-design/m-p/5070284#M270314</link>
    <description>&lt;P&gt;SVI's do exist on C9800 but they are not needed, but one use case is to configure VRFs to isolate Guest traffic on a different VLAN.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-12/config-guide/b_wl_17_12_cg/m_vrf-support-and-overlapping-ip-address.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-12/config-guide/b_wl_17_12_cg/m_vrf-support-and-overlapping-ip-address.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 16 Apr 2024 06:58:00 GMT</pubDate>
    <dc:creator>JPavonM</dc:creator>
    <dc:date>2024-04-16T06:58:00Z</dc:date>
    <item>
      <title>9800 Guest Anchor Design</title>
      <link>https://community.cisco.com/t5/wireless/9800-guest-anchor-design/m-p/5069810#M270292</link>
      <description>&lt;P&gt;I am trying to understand Guest Anchoring with the 9800 Controllers.&lt;/P&gt;
&lt;P&gt;In the 5500 series WLCs you had to access the WMI from the inside network through the firewall to the Anchor Controller Mgmt Vlan on a DMZ.&amp;nbsp; Then create another sub-interface on the Firewall for the guest traffic to go out to the Internet once de-encapsulated.&amp;nbsp; You could not have the AC connect to the inside network as you had to have an SVI on the Mgmt and Guest vlan possibly creating a backdoor if the Mgmt interface was on the inside network.&lt;/P&gt;
&lt;P&gt;Since the 9800's don't need an SVI for the guest traffic has Cisco changed it's best practices to allow the AC WMI to connect directly to the inside network and then we don't have to create another sub-interface on the firewall for management and create all the rules needed AC management and tunneling?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2024 17:47:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/9800-guest-anchor-design/m-p/5069810#M270292</guid>
      <dc:creator>nir wittenberg</dc:creator>
      <dc:date>2024-04-15T17:47:02Z</dc:date>
    </item>
    <item>
      <title>Re: 9800 Guest Anchor Design</title>
      <link>https://community.cisco.com/t5/wireless/9800-guest-anchor-design/m-p/5070168#M270303</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; - More of a generic reply ; have a look at&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/213912-configure-mobility-anchor-on-catalyst-98.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/213912-configure-mobility-anchor-on-catalyst-98.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;Note that it is always advisable to have a&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;checkup of the involved 9800 WLC's configuration with the CLI command&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;show tech wireless&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;&amp;nbsp;and feed the output to :&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://cway.cisco.com/wireless-config-analyzer/" target="_blank" rel="nofollow noopener noreferrer"&gt;Wireless Config Analyzer&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Meaning that in your case it will also point to errors related to anchoring setups&lt;STRONG&gt; (e.g.)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2024 05:14:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/9800-guest-anchor-design/m-p/5070168#M270303</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2024-04-16T05:14:32Z</dc:date>
    </item>
    <item>
      <title>Re: 9800 Guest Anchor Design</title>
      <link>https://community.cisco.com/t5/wireless/9800-guest-anchor-design/m-p/5070284#M270314</link>
      <description>&lt;P&gt;SVI's do exist on C9800 but they are not needed, but one use case is to configure VRFs to isolate Guest traffic on a different VLAN.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-12/config-guide/b_wl_17_12_cg/m_vrf-support-and-overlapping-ip-address.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-12/config-guide/b_wl_17_12_cg/m_vrf-support-and-overlapping-ip-address.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2024 06:58:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/9800-guest-anchor-design/m-p/5070284#M270314</guid>
      <dc:creator>JPavonM</dc:creator>
      <dc:date>2024-04-16T06:58:00Z</dc:date>
    </item>
    <item>
      <title>Re: 9800 Guest Anchor Design</title>
      <link>https://community.cisco.com/t5/wireless/9800-guest-anchor-design/m-p/5071064#M270333</link>
      <description>&lt;P&gt;There is not one mention of a firewall/DMZ in that support doc.&amp;nbsp; It does show a diagram of the Forgein and Anchor connecting via the internal network and then a link to the Internet from the Anchor.&amp;nbsp; That document lacks so much detail.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-16 at 10.54.06 AM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215929iB0C0B0D605682E43/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2024-04-16 at 10.54.06 AM.png" alt="Screenshot 2024-04-16 at 10.54.06 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2024 16:55:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/9800-guest-anchor-design/m-p/5071064#M270333</guid>
      <dc:creator>nir wittenberg</dc:creator>
      <dc:date>2024-04-16T16:55:04Z</dc:date>
    </item>
    <item>
      <title>Re: 9800 Guest Anchor Design</title>
      <link>https://community.cisco.com/t5/wireless/9800-guest-anchor-design/m-p/5072621#M270385</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1702832"&gt;@nir wittenberg&lt;/a&gt;&amp;nbsp;Hi, I was informed by Cisco some time ago that they see there WLCs as a secure boundary device and that traffic should not be able to pass between management and guest functions. However, accepting this and putting it in to practice in my eyes was always a leap of faith too far &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Based on what you are intimating I would suggest either;&lt;/P&gt;&lt;P&gt;Put the WMI in a dmz on it's own, and then drop the L2 guest traffic into another DMZ to keep traffic separate. This could be done with a trunk port from the WLC. It will mean passing the WMI tunnel traffic through from an inside network to the WMI DMZ.&lt;/P&gt;&lt;P&gt;The other option is to be brave, put the WMI on a separate physical interface on the WLC and connect to an inside network, and then put the guest L2 VLANs into a different interface on the WLC and pass to a DMZ/FW for access control. You could put some form of interface ACL onto the WMI L3 interface to restrict to traffic to/from the export WLCs you connect to.&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2024 07:11:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/9800-guest-anchor-design/m-p/5072621#M270385</guid>
      <dc:creator>Tony Greensmith</dc:creator>
      <dc:date>2024-04-18T07:11:55Z</dc:date>
    </item>
  </channel>
</rss>

