<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Whitelist a single client to bypass local web authentication (9800 in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/whitelist-a-single-client-to-bypass-local-web-authentication/m-p/5216995#M277095</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1126219"&gt;@nickydd9&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For external guest portal you need Access List in order to redirect, This could be possible by adding one line on the ACL for the printer. This way the redirect wouldn´t happen. &lt;/P&gt;
&lt;P&gt;Now, internal web portal, I dont believe is possible. I believe the second alternative is the one to follow.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 29 Oct 2024 19:03:20 GMT</pubDate>
    <dc:creator>Flavio Miranda</dc:creator>
    <dc:date>2024-10-29T19:03:20Z</dc:date>
    <item>
      <title>Whitelist a single client to bypass local web authentication (9800)</title>
      <link>https://community.cisco.com/t5/wireless/whitelist-a-single-client-to-bypass-local-web-authentication/m-p/5216986#M277091</link>
      <description>&lt;P&gt;I am running a Catalyst 9800 WLC on 17.12.3 and have an SSID currently setup and working for local web authentication. When users attempt to connect, they are presented with the web auth portal and must enter the username and password of the guest account we have created for them to connect.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a potential requirement of adding a non-standard device to this SSID wirelessly which is a printer. The printer won't be able to access the web auth portal GUI to enter any credentials, so I was wondering if there is a method to whitelist one specific client to bypass the local web authentication and connect to the SSID. Perhaps a MAC address bypass?&amp;nbsp;&lt;/P&gt;&lt;P&gt;My other solution would be to have a separate SSID for this with MAC filtering enabled that maps to the same VLAN as the existing SSID, but I'd rather not broadcast a new SSID if I don't have to.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 18:37:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/whitelist-a-single-client-to-bypass-local-web-authentication/m-p/5216986#M277091</guid>
      <dc:creator>nickydd9</dc:creator>
      <dc:date>2024-10-29T18:37:06Z</dc:date>
    </item>
    <item>
      <title>Re: Whitelist a single client to bypass local web authentication (9800</title>
      <link>https://community.cisco.com/t5/wireless/whitelist-a-single-client-to-bypass-local-web-authentication/m-p/5216988#M277093</link>
      <description>&lt;P&gt;If you using ISE or Radius, you can use MAB for this kind of requirement, yes you can also consider other SSID if you like for the different IP address VLAN to segment the Printers.&lt;/P&gt;
&lt;P&gt;example :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/213922-configure-mac-authentication-ssid-on-cis.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/213922-configure-mac-authentication-ssid-on-cis.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 18:40:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/whitelist-a-single-client-to-bypass-local-web-authentication/m-p/5216988#M277093</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-10-29T18:40:04Z</dc:date>
    </item>
    <item>
      <title>Re: Whitelist a single client to bypass local web authentication (9800</title>
      <link>https://community.cisco.com/t5/wireless/whitelist-a-single-client-to-bypass-local-web-authentication/m-p/5216991#M277094</link>
      <description>&lt;P&gt;I am not using ISE, so is a second SSID with MAC filtering my only option?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 18:45:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/whitelist-a-single-client-to-bypass-local-web-authentication/m-p/5216991#M277094</guid>
      <dc:creator>nickydd9</dc:creator>
      <dc:date>2024-10-29T18:45:08Z</dc:date>
    </item>
    <item>
      <title>Re: Whitelist a single client to bypass local web authentication (9800</title>
      <link>https://community.cisco.com/t5/wireless/whitelist-a-single-client-to-bypass-local-web-authentication/m-p/5216995#M277095</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1126219"&gt;@nickydd9&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For external guest portal you need Access List in order to redirect, This could be possible by adding one line on the ACL for the printer. This way the redirect wouldn´t happen. &lt;/P&gt;
&lt;P&gt;Now, internal web portal, I dont believe is possible. I believe the second alternative is the one to follow.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 19:03:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/whitelist-a-single-client-to-bypass-local-web-authentication/m-p/5216995#M277095</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2024-10-29T19:03:20Z</dc:date>
    </item>
    <item>
      <title>Re: Whitelist a single client to bypass local web authentication (9800</title>
      <link>https://community.cisco.com/t5/wireless/whitelist-a-single-client-to-bypass-local-web-authentication/m-p/5217112#M277109</link>
      <description>&lt;P&gt;Given Local WebAuth your best option would be seperate SSID for the printer&lt;/P&gt;</description>
      <pubDate>Wed, 30 Oct 2024 02:38:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/whitelist-a-single-client-to-bypass-local-web-authentication/m-p/5217112#M277109</guid>
      <dc:creator>Haydn Andrews</dc:creator>
      <dc:date>2024-10-30T02:38:15Z</dc:date>
    </item>
    <item>
      <title>Re: Whitelist a single client to bypass local web authentication (9800</title>
      <link>https://community.cisco.com/t5/wireless/whitelist-a-single-client-to-bypass-local-web-authentication/m-p/5217202#M277116</link>
      <description>&lt;P&gt;Different SSID -&amp;nbsp; May&amp;nbsp; be explore option MAC filtering :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-3/config-guide/b_wl_17_3_cg/m_mab_auth_bypass.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-3/config-guide/b_wl_17_3_cg/m_mab_auth_bypass.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Oct 2024 08:09:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/whitelist-a-single-client-to-bypass-local-web-authentication/m-p/5217202#M277116</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-10-30T08:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: Whitelist a single client to bypass local web authentication (9800</title>
      <link>https://community.cisco.com/t5/wireless/whitelist-a-single-client-to-bypass-local-web-authentication/m-p/5217210#M277118</link>
      <description>&lt;P&gt;&lt;SPAN&gt;As&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/178747"&gt;@Flavio Miranda&lt;/a&gt;&amp;nbsp; mention you can create a access-list and&amp;nbsp; separate SSID&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp; with mac filtering for printer.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*** Please rate helpful posts ***&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Oct 2024 08:31:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/whitelist-a-single-client-to-bypass-local-web-authentication/m-p/5217210#M277118</guid>
      <dc:creator>srimal99</dc:creator>
      <dc:date>2024-10-30T08:31:17Z</dc:date>
    </item>
  </channel>
</rss>

