<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 9800 Series Internal Guest DHCP in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/9800-series-internal-guest-dhcp/m-p/5154221#M273990</link>
    <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;I am trying to come up with a secure way to run DHCP on 9800 controllers for guest wireless users. To give some context I have about 30 9800's currently deployed with guest access setup through an ISE portal. We currently have guest DHCP running on the firewalls at each location but our security department wants to remove DHCP from them. It looks like the next best option is to run DHCP on the 9800's however I can't find any best practice for doing it securely.&lt;/P&gt;&lt;P&gt;I currently do not have any SVI on the guest vlan but it looks like it will be necessary to add one in order to serve DHCP on the vlan. How do I secure the SVI so that nothing other than DHCP is allowed to the guest vlan?&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;</description>
    <pubDate>Wed, 31 Jul 2024 20:48:30 GMT</pubDate>
    <dc:creator>dstrobel</dc:creator>
    <dc:date>2024-07-31T20:48:30Z</dc:date>
    <item>
      <title>9800 Series Internal Guest DHCP</title>
      <link>https://community.cisco.com/t5/wireless/9800-series-internal-guest-dhcp/m-p/5154221#M273990</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;I am trying to come up with a secure way to run DHCP on 9800 controllers for guest wireless users. To give some context I have about 30 9800's currently deployed with guest access setup through an ISE portal. We currently have guest DHCP running on the firewalls at each location but our security department wants to remove DHCP from them. It looks like the next best option is to run DHCP on the 9800's however I can't find any best practice for doing it securely.&lt;/P&gt;&lt;P&gt;I currently do not have any SVI on the guest vlan but it looks like it will be necessary to add one in order to serve DHCP on the vlan. How do I secure the SVI so that nothing other than DHCP is allowed to the guest vlan?&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 20:48:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/9800-series-internal-guest-dhcp/m-p/5154221#M273990</guid>
      <dc:creator>dstrobel</dc:creator>
      <dc:date>2024-07-31T20:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: 9800 Series Internal Guest DHCP</title>
      <link>https://community.cisco.com/t5/wireless/9800-series-internal-guest-dhcp/m-p/5154239#M273992</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1233161"&gt;@dstrobel&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;You can use ACL to allow only DHCP traffic on the SVI:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list xxx permit udp any eq bootpc any eq bootps&lt;/P&gt;
&lt;P&gt;access-lis txxx deny ip any any&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 21:34:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/9800-series-internal-guest-dhcp/m-p/5154239#M273992</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2024-07-31T21:34:50Z</dc:date>
    </item>
    <item>
      <title>Re: 9800 Series Internal Guest DHCP</title>
      <link>https://community.cisco.com/t5/wireless/9800-series-internal-guest-dhcp/m-p/5154252#M273993</link>
      <description>&lt;P&gt;Thank you sir, I'm sorry I should have also mentioned I have a punt acl for the guests to get to DNS and ISE before registration:&lt;/P&gt;&lt;P&gt;ip access-list extended ACL_WEBAUTH_REDIRECT&lt;BR /&gt;10 deny ip any host x.x.x.x&lt;BR /&gt;15 deny ip any host x.x.x.x&lt;BR /&gt;20 deny ip host x.x.x.x any&lt;BR /&gt;25 deny ip host x.x.x.x any&lt;BR /&gt;30 deny udp any any eq domain&lt;BR /&gt;40 deny udp any eq domain any&lt;BR /&gt;50 permit tcp any any eq www&lt;/P&gt;&lt;P&gt;I'm guessing this needs a permit&amp;nbsp;&lt;SPAN&gt;udp any eq bootpc any eq bootps added as well?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 21:58:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/9800-series-internal-guest-dhcp/m-p/5154252#M273993</guid>
      <dc:creator>dstrobel</dc:creator>
      <dc:date>2024-07-31T21:58:30Z</dc:date>
    </item>
    <item>
      <title>Re: 9800 Series Internal Guest DHCP</title>
      <link>https://community.cisco.com/t5/wireless/9800-series-internal-guest-dhcp/m-p/5154254#M273994</link>
      <description>&lt;P&gt;in WLC CLI use&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list MHM-DHCP permit udp any eq bootpc any eq bootps&lt;/P&gt;
&lt;P&gt;then apply ACL under VLAN SVI not under port&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;TT&gt;myc9800-CL(config)#interface Vlan&amp;lt;number&amp;gt;
myc9800-CL(config-if)#ip access-group MHM-DHCP &lt;STRONG&gt;in&lt;/STRONG&gt;&lt;/TT&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;this ACL one line end with deny ip any any and this work if you use SVI only for DHCP server if you push this SVI as GW IP to guest wifi then you need to add permit ip any any line under acl, this way the SVI use as dhcp server and as GW for guest wifi.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 22:04:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/9800-series-internal-guest-dhcp/m-p/5154254#M273994</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-31T22:04:36Z</dc:date>
    </item>
    <item>
      <title>Re: 9800 Series Internal Guest DHCP</title>
      <link>https://community.cisco.com/t5/wireless/9800-series-internal-guest-dhcp/m-p/5154263#M273995</link>
      <description>&lt;P&gt;check below please&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2024 19:56:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/9800-series-internal-guest-dhcp/m-p/5154263#M273995</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-01T19:56:34Z</dc:date>
    </item>
    <item>
      <title>Re: 9800 Series Internal Guest DHCP</title>
      <link>https://community.cisco.com/t5/wireless/9800-series-internal-guest-dhcp/m-p/5154282#M273996</link>
      <description>&lt;P&gt;Thanks for your help, I will give it a try tomorrow and let you know how it goes.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 23:27:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/9800-series-internal-guest-dhcp/m-p/5154282#M273996</guid>
      <dc:creator>dstrobel</dc:creator>
      <dc:date>2024-07-31T23:27:42Z</dc:date>
    </item>
    <item>
      <title>Re: 9800 Series Internal Guest DHCP</title>
      <link>https://community.cisco.com/t5/wireless/9800-series-internal-guest-dhcp/m-p/5154305#M273998</link>
      <description>&lt;P&gt;&amp;nbsp;Not necessary. First the client will get IP address, than it will go to the portal so when the client hits this ACL_WEBAUTH_REDIRECT the IP address will be in place already&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2024 00:58:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/9800-series-internal-guest-dhcp/m-p/5154305#M273998</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2024-08-01T00:58:09Z</dc:date>
    </item>
    <item>
      <title>Re: 9800 Series Internal Guest DHCP</title>
      <link>https://community.cisco.com/t5/wireless/9800-series-internal-guest-dhcp/m-p/5154703#M274019</link>
      <description>&lt;P&gt;Thank you both for your help. It appears to be working as required. In case anyone else is looking for this exact setup, this is what I ended up using:&lt;/P&gt;&lt;P&gt;ip dhcp excluded-address 192.168.20.0 192.168.20.19&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool Guest&lt;BR /&gt;network 192.168.20.0 255.255.255.0&lt;BR /&gt;default-router 192.168.20.1&lt;BR /&gt;dns-server x.x.x.x x.x.x.x&lt;BR /&gt;lease 0 8&lt;/P&gt;&lt;P&gt;interface VlanXXX&lt;BR /&gt;description GuestWIFI&lt;BR /&gt;ip address 192.168.20.4 255.255.255.0&lt;BR /&gt;ip access-group GUEST-DHCP in&lt;/P&gt;&lt;P&gt;ip access-list extended GUEST-DHCP&lt;BR /&gt;10 permit udp any eq bootpc any eq bootps&lt;BR /&gt;20 deny ip any any&lt;/P&gt;&lt;P&gt;wireless profile policy xxxxx_WLANID_4&lt;BR /&gt;ipv4 dhcp required&lt;BR /&gt;ipv4 dhcp server 192.168.20.4&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2024 19:50:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/9800-series-internal-guest-dhcp/m-p/5154703#M274019</guid>
      <dc:creator>dstrobel</dc:creator>
      <dc:date>2024-08-01T19:50:56Z</dc:date>
    </item>
    <item>
      <title>Re: 9800 Series Internal Guest DHCP</title>
      <link>https://community.cisco.com/t5/wireless/9800-series-internal-guest-dhcp/m-p/5154704#M274020</link>
      <description>&lt;P&gt;You are so welcome&lt;/P&gt;
&lt;P&gt;have a nice summer&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2024 19:56:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/9800-series-internal-guest-dhcp/m-p/5154704#M274020</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-01T19:56:06Z</dc:date>
    </item>
    <item>
      <title>Re: 9800 Series Internal Guest DHCP</title>
      <link>https://community.cisco.com/t5/wireless/9800-series-internal-guest-dhcp/m-p/5155736#M274100</link>
      <description>&lt;P&gt;Note that you can also apply an ACL to the WLAN profile policy with "&lt;FONT face="courier new,courier"&gt;ipv4 acl &amp;lt;aclname&amp;gt;&lt;/FONT&gt;"&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2024 00:02:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/9800-series-internal-guest-dhcp/m-p/5155736#M274100</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2024-08-05T00:02:20Z</dc:date>
    </item>
  </channel>
</rss>

