<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Native vlan in wireless and security recomendations in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317275#M285315</link>
    <description>&lt;P&gt;What does the "override vlan on AP" actually does? Why do I need this option?&lt;/P&gt;</description>
    <pubDate>Mon, 04 Aug 2025 16:51:10 GMT</pubDate>
    <dc:creator>rodrigoaantunes</dc:creator>
    <dc:date>2025-08-04T16:51:10Z</dc:date>
    <item>
      <title>Native vlan in wireless and security recomendations</title>
      <link>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317243#M285303</link>
      <description>&lt;P&gt;Hello, there is a CISCO recomendation that says the native vlan has to be an unused vlan (a dummy vlan) in order to prevent VLAN hopping attacks.&lt;/P&gt;&lt;P&gt;How to achieve this in a wireless scenario?&lt;/P&gt;&lt;P&gt;I have a virtual wireless controller and a lot of flex connect aps in local swithing mode.&lt;/P&gt;&lt;P&gt;The ap management interface is in vlan 2.&lt;/P&gt;&lt;P&gt;The ap ports on the switches are trunk with native vlan 2. If I change the native vlan to a dummy vlan the aps don't work.&lt;/P&gt;&lt;P&gt;So how can achieve the cisco recomendation? I think is unsecure to allow the management traffic in the native vlan.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2025 15:08:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317243#M285303</guid>
      <dc:creator>rodrigoaantunes</dc:creator>
      <dc:date>2025-08-04T15:08:40Z</dc:date>
    </item>
    <item>
      <title>Re: Native vlan in wireless and security recomendations</title>
      <link>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317245#M285305</link>
      <description>&lt;P&gt;you use wlc 9800 ?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2025 15:11:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317245#M285305</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-08-04T15:11:04Z</dc:date>
    </item>
    <item>
      <title>Re: Native vlan in wireless and security recomendations</title>
      <link>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317252#M285308</link>
      <description>&lt;P&gt;VLAN hopping attack refers to the default VLAN - VLAN1. Please have a look -&amp;nbsp;&lt;A href="https://learningnetwork.cisco.com/s/blogs/a0D3i000002SKPREA4/vlan1-and-vlan-hopping-attack" target="_blank"&gt;https://learningnetwork.cisco.com/s/blogs/a0D3i000002SKPREA4/vlan1-and-vlan-hopping-attack&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Now what you said is correct. You are having flex AP and that's how the switchport config should be. Native vlan from where your APs are getting IP address and in the trunk you should allow rest of the vlan where client traffic should be. There is nothing wrong in this config.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2025 15:37:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317252#M285308</guid>
      <dc:creator>Saikat Nandy</dc:creator>
      <dc:date>2025-08-04T15:37:00Z</dc:date>
    </item>
    <item>
      <title>Re: Native vlan in wireless and security recomendations</title>
      <link>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317256#M285309</link>
      <description>&lt;P&gt;No, it is the old virtual wireless controller, version 8.5&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2025 15:54:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317256#M285309</guid>
      <dc:creator>rodrigoaantunes</dc:creator>
      <dc:date>2025-08-04T15:54:17Z</dc:date>
    </item>
    <item>
      <title>Re: Native vlan in wireless and security recomendations</title>
      <link>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317262#M285310</link>
      <description>&lt;P&gt;so you use flex AP and AirOS&amp;nbsp;&lt;BR /&gt;there is option in WLAN VLAN mapping to set native VLAN AP will use&amp;nbsp;&lt;BR /&gt;make sure the native VLAN is matching the AP trunk native vlan&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cisco17.png" style="width: 740px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/249673i6B1E472C2957F790/image-size/large?v=v2&amp;amp;px=999" role="button" title="cisco17.png" alt="cisco17.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2025 16:11:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317262#M285310</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-08-04T16:11:29Z</dc:date>
    </item>
    <item>
      <title>Re: Native vlan in wireless and security recomendations</title>
      <link>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317266#M285311</link>
      <description>&lt;P&gt;But in this way all the management traffic is in the native vlan which is not recommended by cisco.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2025 16:26:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317266#M285311</guid>
      <dc:creator>rodrigoaantunes</dc:creator>
      <dc:date>2025-08-04T16:26:32Z</dc:date>
    </item>
    <item>
      <title>Re: Native vlan in wireless and security recomendations</title>
      <link>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317268#M285313</link>
      <description>&lt;P&gt;The recommendation is not to use VLAN 1 - the default native vlan. Please have a look into the &lt;A href="https://learningnetwork.cisco.com/s/blogs/a0D3i000002SKPREA4/vlan1-and-vlan-hopping-attack" target="_self"&gt;link&lt;/A&gt;&amp;nbsp;which talks about how VLAN 1 is related to VLAN hopping attack. In your case, your AP management native vlan is 2.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2025 16:32:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317268#M285313</guid>
      <dc:creator>Saikat Nandy</dc:creator>
      <dc:date>2025-08-04T16:32:39Z</dc:date>
    </item>
    <item>
      <title>Re: Native vlan in wireless and security recomendations</title>
      <link>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317270#M285314</link>
      <description>&lt;P&gt;The link says this: "Use&amp;nbsp;a native VLAN on the trunk connection that is not used anywhere else on the switch. "&lt;BR /&gt;But this vlan is used for AP management. Shouldn't the ap management be in a tagged vlan?&lt;BR /&gt;&lt;BR /&gt;And AI said this:&lt;BR /&gt;&lt;BR /&gt;Using an active VLAN (like the AP management VLAN) as the native VLAN increases the risk of attacks. An attacker who manages to connect to the trunk port (even if unauthorized) can send untagged traffic and potentially access the native VLAN, which in your case is the AP's management VLAN.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;H2&gt;Why Is This a Risk Now?&lt;/H2&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By configuring &lt;STRONG&gt;VLAN 2 as native&lt;/STRONG&gt; on the switch and also including it in the &lt;STRONG&gt;trunk allowed VLAN list&lt;/STRONG&gt; (for the AP to function), and knowing that &lt;STRONG&gt;VLAN 2 is used for AP management&lt;/STRONG&gt;, you're exposing this management VLAN.&lt;/P&gt;&lt;H3&gt;Risk Scenario:&lt;/H3&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;An attacker gains physical access to the network and connects to a port configured as a &lt;STRONG&gt;trunk&lt;/STRONG&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Even if the attacker doesn't know the allowed VLANs or doesn't have access to devices that generate tagged traffic, they can send &lt;STRONG&gt;untagged packets&lt;/STRONG&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;These untagged packets will be automatically associated with the &lt;STRONG&gt;native VLAN (VLAN 2)&lt;/STRONG&gt; by the switch.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Since VLAN 2 carries the AP management traffic, the attacker can try to exploit vulnerabilities in that network segment to gain access to the &lt;STRONG&gt;AP, WLC, or other management devices&lt;/STRONG&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2025 16:48:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317270#M285314</guid>
      <dc:creator>rodrigoaantunes</dc:creator>
      <dc:date>2025-08-04T16:48:40Z</dc:date>
    </item>
    <item>
      <title>Re: Native vlan in wireless and security recomendations</title>
      <link>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317275#M285315</link>
      <description>&lt;P&gt;What does the "override vlan on AP" actually does? Why do I need this option?&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2025 16:51:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317275#M285315</guid>
      <dc:creator>rodrigoaantunes</dc:creator>
      <dc:date>2025-08-04T16:51:10Z</dc:date>
    </item>
    <item>
      <title>Re: Native vlan in wireless and security recomendations</title>
      <link>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317276#M285316</link>
      <description>&lt;P&gt;NO, only NATIVE VLAN option what you need&amp;nbsp;&lt;BR /&gt;other option keep as it defualt&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2025 16:55:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317276#M285316</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-08-04T16:55:14Z</dc:date>
    </item>
    <item>
      <title>Re: Native vlan in wireless and security recomendations</title>
      <link>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317277#M285317</link>
      <description>&lt;P&gt;But do you know what that option does?&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2025 16:56:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317277#M285317</guid>
      <dc:creator>rodrigoaantunes</dc:creator>
      <dc:date>2025-08-04T16:56:31Z</dc:date>
    </item>
    <item>
      <title>Re: Native vlan in wireless and security recomendations</title>
      <link>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317282#M285319</link>
      <description>&lt;P&gt;First do you see wlan ID and it vlan ID when open this tab?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2025 17:00:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317282#M285319</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-08-04T17:00:07Z</dc:date>
    </item>
    <item>
      <title>Re: Native vlan in wireless and security recomendations</title>
      <link>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317441#M285334</link>
      <description>&lt;P&gt;That Cisco recommendation is for trunk ports connecting switches, not for trunk ports on access ports like those for APs or VoIp phones, where the native VLAN use to be used to host the device.&lt;/P&gt;
&lt;P&gt;OR, you can use a dummy native VLAN, and setup management VLAN with a tag and configure that under the "WLAN VLAN mapping section", but for that you need to pre-stage the AP so adding more admin tasks.&lt;/P&gt;
&lt;P&gt;I would recommend not to use dummy VLANs facing APs or phones.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Aug 2025 07:22:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317441#M285334</guid>
      <dc:creator>JPavonM</dc:creator>
      <dc:date>2025-08-05T07:22:29Z</dc:date>
    </item>
    <item>
      <title>Re: Native vlan in wireless and security recomendations</title>
      <link>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317677#M285354</link>
      <description>&lt;P&gt;Ok, the ap is in the trunk with native vlan 2, should the vlan2 be in the trunk allowed list?&lt;/P&gt;</description>
      <pubDate>Tue, 05 Aug 2025 14:28:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317677#M285354</guid>
      <dc:creator>rodrigoaantunes</dc:creator>
      <dc:date>2025-08-05T14:28:45Z</dc:date>
    </item>
    <item>
      <title>Re: Native vlan in wireless and security recomendations</title>
      <link>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317705#M285355</link>
      <description>&lt;P&gt;I mention before yoh run flex or local' I check your reply you use local so vlan mapping is not work for local.&lt;/P&gt;
&lt;P&gt;Forget secuirty concern for a sec' when you change native vlan to any vlan other than vlan 2 the AP is no longer connect to wlc ? Confirm that.&lt;/P&gt;
&lt;P&gt;And Yes all vlan include native vlan must allow in trunk&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 05 Aug 2025 15:16:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/native-vlan-in-wireless-and-security-recomendations/m-p/5317705#M285355</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-08-05T15:16:20Z</dc:date>
    </item>
  </channel>
</rss>

