<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: One of the client traffic seen towards 192.0.2.1 in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/one-of-the-client-traffic-seen-towards-192-0-2-1/m-p/5527076#M310562</link>
    <description>&lt;PRE&gt;&lt;SPAN class=""&gt;&lt;A class="" href="https://www.rfc-editor.org/rfc/rfc5737.html#section-1" target="_blank" rel="noopener nofollow noreferrer"&gt;1&lt;/A&gt;.  Introduction&lt;/SPAN&gt;

   This document describes three IPv4 address blocks that are provided
   for use in documentation.  The use of designated address ranges for
   documentation and examples reduces the likelihood of conflicts and
   confusion arising from the use of addresses assigned for some other
   purpose.

   [RFC1166] reserves the first of the three address blocks,
   192.0.2.0/24.  The other two address blocks have recently been
   allocated for this purpose, primarily to ease the writing of examples
   involving addresses from multiple networks.

   Other documentation ranges have been defined in the IETF, including
   the IPv6 documentation prefix [&lt;A title="&amp;quot;IPv6 Address Prefix Reserved for Documentation&amp;quot;" href="https://www.rfc-editor.org/rfc/rfc3849" target="_blank" rel="noopener nofollow noreferrer"&gt;RFC3849&lt;/A&gt;] and example domain names
   [&lt;A title="&amp;quot;Reserved Top Level DNS Names&amp;quot;" href="https://www.rfc-editor.org/rfc/rfc2606" target="_blank" rel="noopener nofollow noreferrer"&gt;RFC2606&lt;/A&gt;].  Documentation also makes use of the ranges reserved in
   [&lt;A title="&amp;quot;Address Allocation for Private Internets&amp;quot;" href="https://www.rfc-editor.org/rfc/rfc1918" target="_blank" rel="noopener nofollow noreferrer"&gt;RFC1918&lt;/A&gt;].

&lt;SPAN class=""&gt;&lt;A class="" href="https://www.rfc-editor.org/rfc/rfc5737.html#section-2" target="_blank" rel="noopener nofollow noreferrer"&gt;2&lt;/A&gt;.  Terminology&lt;/SPAN&gt;

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in &lt;A href="https://www.rfc-editor.org/bcp/bcp14" target="_blank" rel="noopener nofollow noreferrer"&gt;BCP 14&lt;/A&gt;, [&lt;A title="&amp;quot;Key words for use in RFCs to Indicate Requirement Levels&amp;quot;" href="https://www.rfc-editor.org/rfc/rfc2119" target="_blank" rel="noopener nofollow noreferrer"&gt;RFC2119&lt;/A&gt;].

&lt;SPAN class=""&gt;&lt;A class="" href="https://www.rfc-editor.org/rfc/rfc5737.html#section-3" target="_blank" rel="noopener nofollow noreferrer"&gt;3&lt;/A&gt;.  Documentation Address Blocks&lt;/SPAN&gt;

   The blocks 192.0.2.0/24 (TEST-NET-1), 198.51.100.0/24 (TEST-NET-2),
   and 203.0.113.0/24 (TEST-NET-3) are provided for use in
   documentation.

&lt;SPAN class=""&gt;&lt;A class="" href="https://www.rfc-editor.org/rfc/rfc5737.html#section-4" target="_blank" rel="noopener nofollow noreferrer"&gt;4&lt;/A&gt;.  Operational Implications&lt;/SPAN&gt;

   Addresses within the TEST-NET-1, TEST-NET-2, and TEST-NET-3 blocks
   SHOULD NOT appear on the public Internet and are used without any
   coordination with IANA or an Internet registry [&lt;A title="&amp;quot;INTERNET REGISTRY IP ALLOCATION GUIDELINES&amp;quot;" href="https://www.rfc-editor.org/rfc/rfc2050" target="_blank" rel="noopener nofollow noreferrer"&gt;RFC2050&lt;/A&gt;].  Network
   operators SHOULD add these address blocks to the list of non-
   routeable address spaces, and if packet filters are deployed, then
   this address block SHOULD be added to packet filters.

   These blocks are not for local use, and the filters may be used in
   both local and public contexts.&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;&lt;A href="https://www.rfc-editor.org/rfc/rfc5737.html" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.rfc-editor.org/rfc/rfc5737.html&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 05 Sep 2025 09:59:11 GMT</pubDate>
    <dc:creator>aleabrahao</dc:creator>
    <dc:date>2025-09-05T09:59:11Z</dc:date>
    <item>
      <title>One of the client traffic seen towards 192.0.2.1</title>
      <link>https://community.cisco.com/t5/wireless/one-of-the-client-traffic-seen-towards-192-0-2-1/m-p/5527071#M310557</link>
      <description>&lt;P&gt;Hi all, It's been reported from our internet SIEM team that, one of the client connect to Meraki access point traffic is seen towards 192.0.2.1, I did go to clients and verified however not seen any client with 192 series IP address. Can someone suggest on this?&lt;/P&gt;</description>
      <pubDate>Wed, 03 Sep 2025 07:30:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/one-of-the-client-traffic-seen-towards-192-0-2-1/m-p/5527071#M310557</guid>
      <dc:creator>SatishJ11</dc:creator>
      <dc:date>2025-09-03T07:30:51Z</dc:date>
    </item>
    <item>
      <title>Re: One of the client traffic seen towards 192.0.2.1</title>
      <link>https://community.cisco.com/t5/wireless/one-of-the-client-traffic-seen-towards-192-0-2-1/m-p/5527072#M310558</link>
      <description>&lt;P&gt;Sounds like a client send traffic  going to a public address &lt;SPAN&gt;192.0.2.1.  So you would not find a network client with that ip&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Sep 2025 08:38:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/one-of-the-client-traffic-seen-towards-192-0-2-1/m-p/5527072#M310558</guid>
      <dc:creator>ww^</dc:creator>
      <dc:date>2025-09-03T08:38:37Z</dc:date>
    </item>
    <item>
      <title>Re: One of the client traffic seen towards 192.0.2.1</title>
      <link>https://community.cisco.com/t5/wireless/one-of-the-client-traffic-seen-towards-192-0-2-1/m-p/5527073#M310559</link>
      <description>&lt;P&gt;As far as I remember, IP 192.0.2.1 is the Cisco Controller's virtual interface IP for redirection to the captive portal, but I don't remember the same applying to Meraki.&lt;/P&gt;&lt;P&gt;Do you have a Cisco controller, either AirOS or Catalyst 9800?&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless/5500-series-wireless-controllers/108501-webauth-tshoot.html#toc-hId--1153923825" target="_blank" rel="nofollow noopener noreferrer"&gt;https://www.cisco.com/c/en/us/support/docs/wireless/5500-series-wireless-controllers/108501-webauth-tshoot.html#toc-hId--1153923825&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Sep 2025 10:01:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/one-of-the-client-traffic-seen-towards-192-0-2-1/m-p/5527073#M310559</guid>
      <dc:creator>aleabrahao</dc:creator>
      <dc:date>2025-09-03T10:01:02Z</dc:date>
    </item>
    <item>
      <title>Re: One of the client traffic seen towards 192.0.2.1</title>
      <link>https://community.cisco.com/t5/wireless/one-of-the-client-traffic-seen-towards-192-0-2-1/m-p/5527074#M310560</link>
      <description>&lt;P&gt;What exactly 192.0.2.1 is? I see it as ISP: &lt;SPAN&gt;TEST-NET&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Sep 2025 09:26:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/one-of-the-client-traffic-seen-towards-192-0-2-1/m-p/5527074#M310560</guid>
      <dc:creator>SatishJ11</dc:creator>
      <dc:date>2025-09-05T09:26:01Z</dc:date>
    </item>
    <item>
      <title>Re: One of the client traffic seen towards 192.0.2.1</title>
      <link>https://community.cisco.com/t5/wireless/one-of-the-client-traffic-seen-towards-192-0-2-1/m-p/5527075#M310561</link>
      <description>&lt;P&gt;There is no Cisco Controller, we have all our infra with Cisco Meraki SD-WAN and access points are also Meraki&lt;/P&gt;</description>
      <pubDate>Fri, 05 Sep 2025 09:27:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/one-of-the-client-traffic-seen-towards-192-0-2-1/m-p/5527075#M310561</guid>
      <dc:creator>SatishJ11</dc:creator>
      <dc:date>2025-09-05T09:27:10Z</dc:date>
    </item>
    <item>
      <title>Re: One of the client traffic seen towards 192.0.2.1</title>
      <link>https://community.cisco.com/t5/wireless/one-of-the-client-traffic-seen-towards-192-0-2-1/m-p/5527076#M310562</link>
      <description>&lt;PRE&gt;&lt;SPAN class=""&gt;&lt;A class="" href="https://www.rfc-editor.org/rfc/rfc5737.html#section-1" target="_blank" rel="noopener nofollow noreferrer"&gt;1&lt;/A&gt;.  Introduction&lt;/SPAN&gt;

   This document describes three IPv4 address blocks that are provided
   for use in documentation.  The use of designated address ranges for
   documentation and examples reduces the likelihood of conflicts and
   confusion arising from the use of addresses assigned for some other
   purpose.

   [RFC1166] reserves the first of the three address blocks,
   192.0.2.0/24.  The other two address blocks have recently been
   allocated for this purpose, primarily to ease the writing of examples
   involving addresses from multiple networks.

   Other documentation ranges have been defined in the IETF, including
   the IPv6 documentation prefix [&lt;A title="&amp;quot;IPv6 Address Prefix Reserved for Documentation&amp;quot;" href="https://www.rfc-editor.org/rfc/rfc3849" target="_blank" rel="noopener nofollow noreferrer"&gt;RFC3849&lt;/A&gt;] and example domain names
   [&lt;A title="&amp;quot;Reserved Top Level DNS Names&amp;quot;" href="https://www.rfc-editor.org/rfc/rfc2606" target="_blank" rel="noopener nofollow noreferrer"&gt;RFC2606&lt;/A&gt;].  Documentation also makes use of the ranges reserved in
   [&lt;A title="&amp;quot;Address Allocation for Private Internets&amp;quot;" href="https://www.rfc-editor.org/rfc/rfc1918" target="_blank" rel="noopener nofollow noreferrer"&gt;RFC1918&lt;/A&gt;].

&lt;SPAN class=""&gt;&lt;A class="" href="https://www.rfc-editor.org/rfc/rfc5737.html#section-2" target="_blank" rel="noopener nofollow noreferrer"&gt;2&lt;/A&gt;.  Terminology&lt;/SPAN&gt;

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in &lt;A href="https://www.rfc-editor.org/bcp/bcp14" target="_blank" rel="noopener nofollow noreferrer"&gt;BCP 14&lt;/A&gt;, [&lt;A title="&amp;quot;Key words for use in RFCs to Indicate Requirement Levels&amp;quot;" href="https://www.rfc-editor.org/rfc/rfc2119" target="_blank" rel="noopener nofollow noreferrer"&gt;RFC2119&lt;/A&gt;].

&lt;SPAN class=""&gt;&lt;A class="" href="https://www.rfc-editor.org/rfc/rfc5737.html#section-3" target="_blank" rel="noopener nofollow noreferrer"&gt;3&lt;/A&gt;.  Documentation Address Blocks&lt;/SPAN&gt;

   The blocks 192.0.2.0/24 (TEST-NET-1), 198.51.100.0/24 (TEST-NET-2),
   and 203.0.113.0/24 (TEST-NET-3) are provided for use in
   documentation.

&lt;SPAN class=""&gt;&lt;A class="" href="https://www.rfc-editor.org/rfc/rfc5737.html#section-4" target="_blank" rel="noopener nofollow noreferrer"&gt;4&lt;/A&gt;.  Operational Implications&lt;/SPAN&gt;

   Addresses within the TEST-NET-1, TEST-NET-2, and TEST-NET-3 blocks
   SHOULD NOT appear on the public Internet and are used without any
   coordination with IANA or an Internet registry [&lt;A title="&amp;quot;INTERNET REGISTRY IP ALLOCATION GUIDELINES&amp;quot;" href="https://www.rfc-editor.org/rfc/rfc2050" target="_blank" rel="noopener nofollow noreferrer"&gt;RFC2050&lt;/A&gt;].  Network
   operators SHOULD add these address blocks to the list of non-
   routeable address spaces, and if packet filters are deployed, then
   this address block SHOULD be added to packet filters.

   These blocks are not for local use, and the filters may be used in
   both local and public contexts.&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;&lt;A href="https://www.rfc-editor.org/rfc/rfc5737.html" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.rfc-editor.org/rfc/rfc5737.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Sep 2025 09:59:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/one-of-the-client-traffic-seen-towards-192-0-2-1/m-p/5527076#M310562</guid>
      <dc:creator>aleabrahao</dc:creator>
      <dc:date>2025-09-05T09:59:11Z</dc:date>
    </item>
    <item>
      <title>Re: One of the client traffic seen towards 192.0.2.1</title>
      <link>https://community.cisco.com/t5/wireless/one-of-the-client-traffic-seen-towards-192-0-2-1/m-p/5527077#M310563</link>
      <description>&lt;P&gt;As reported, Cisco uses this address range to redirect the captive portal to the controllers.&lt;/P&gt;&lt;P&gt;As far as I remember, this isn't the case with Meraki. I don't know the AP model you're using, but I would perform a packet capture to confirm it's not a false positive.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Sep 2025 10:02:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/one-of-the-client-traffic-seen-towards-192-0-2-1/m-p/5527077#M310563</guid>
      <dc:creator>aleabrahao</dc:creator>
      <dc:date>2025-09-05T10:02:31Z</dc:date>
    </item>
    <item>
      <title>Re: One of the client traffic seen towards 192.0.2.1</title>
      <link>https://community.cisco.com/t5/wireless/one-of-the-client-traffic-seen-towards-192-0-2-1/m-p/5527078#M310564</link>
      <description>&lt;P&gt;This issue isn't happening all time, once in 15days like that as far as I remember, which started recently. We are using MR44 &lt;/P&gt;</description>
      <pubDate>Fri, 05 Sep 2025 11:37:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/one-of-the-client-traffic-seen-towards-192-0-2-1/m-p/5527078#M310564</guid>
      <dc:creator>SatishJ11</dc:creator>
      <dc:date>2025-09-05T11:37:26Z</dc:date>
    </item>
    <item>
      <title>Re: One of the client traffic seen towards 192.0.2.1</title>
      <link>https://community.cisco.com/t5/wireless/one-of-the-client-traffic-seen-towards-192-0-2-1/m-p/5527079#M310565</link>
      <description>&lt;P&gt;Well, the point is that this address is reserved for documentation or, in the case of Cisco (traditional controllers), it's used for the virtual interface IP.&lt;/P&gt;&lt;P&gt;I still believe that performing a packet capture on your network is the best option.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Sep 2025 12:18:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/one-of-the-client-traffic-seen-towards-192-0-2-1/m-p/5527079#M310565</guid>
      <dc:creator>aleabrahao</dc:creator>
      <dc:date>2025-09-05T12:18:59Z</dc:date>
    </item>
    <item>
      <title>Re: One of the client traffic seen towards 192.0.2.1</title>
      <link>https://community.cisco.com/t5/wireless/one-of-the-client-traffic-seen-towards-192-0-2-1/m-p/5527080#M310566</link>
      <description>&lt;P&gt;Deep Search APIs allow developers to integrate autonomous, multi-step research capabilities into their own applications. Unlike standard search APIs (which just return links), these APIs use "agentic" logic to browse, read, and synthesize information into a full report.&lt;/P&gt;&lt;P&gt;​As of late 2025, the market has split into &lt;STRONG&gt;Research Agents&lt;/STRONG&gt; (which do the thinking) and &lt;STRONG&gt;Retrieval Engines&lt;/STRONG&gt; (which provide the raw web data for LLMs).&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2025 01:48:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/one-of-the-client-traffic-seen-towards-192-0-2-1/m-p/5527080#M310566</guid>
      <dc:creator>Ap121</dc:creator>
      <dc:date>2025-12-18T01:48:47Z</dc:date>
    </item>
  </channel>
</rss>

