<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I don't remember testing it. in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/dns-based-acl-in-wlc/m-p/2604607#M41404</link>
    <description>&lt;P&gt;I don't remember testing it. Anyway the only way to resolve it without side effects is either going straight to 8.2.100.0, which is already available on CCO or open a TAC case to receive an image from the 8.0 train containing the bugfix.&lt;/P&gt;
&lt;P&gt;You will notice it will work when you get the following messages in the client debug output:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff DNS SNOOPING: decode clientMac aa:bb:cc:dd:ee:ff,DomainName[lh3.googleusercontent.com] IpAddr: [173.194.44.44]&lt;BR /&gt;&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff Fetched IP address [173.194.44.44] DomainName[lh3.googleusercontent.com]&lt;BR /&gt;&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff Round-Robin[index 0, flag 0]&amp;nbsp;&amp;nbsp; Update[2] the mscb with the IP address in DNS response. removed ip[0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [10.32.9.68]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [173.194.112.39]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [173.194.44.44]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;
&lt;P&gt;8.2.100.0 also provides double the count of ACL entries as well as IPs the MSCB can hold (20/40 as opposed to 10/20). The above ouput reflects this.&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Patrick&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Jan 2016 14:16:37 GMT</pubDate>
    <dc:creator>patrick.kofler</dc:creator>
    <dc:date>2016-01-12T14:16:37Z</dc:date>
    <item>
      <title>DNS-BASED ACL IN WLC</title>
      <link>https://community.cisco.com/t5/wireless/dns-based-acl-in-wlc/m-p/2604602#M41399</link>
      <description>&lt;P style="font-size: 14px;"&gt;I,m trying to use DNS-based ACL with pre-authentication ACL, in order to allow access to some URL's before the client will be authenticate by external captive portal without RADIUS&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;In the bug search web, ( &lt;A href="https://tools.cisco.com/bugsearch/bug/CSCup98797)&amp;nbsp;this" target="_blank"&gt;https://tools.cisco.com/bugsearch/bug/CSCup98797)&amp;nbsp;this&lt;/A&gt; bug appears as fixed, but i,m running 7.6.130 code in WLC 5500 and the behavior is the same, URL's has not effect because i,m not using RADIUS.&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;I see in the Cisco&amp;nbsp;&lt;SPAN style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 9px; font-weight: bold;"&gt;Wireless LAN Controller Configuration Guide, Release 8.0&amp;nbsp;&lt;SPAN style="font-family: arial, helvetica, sans-serif;"&gt;&lt;SPAN style="font-size: 11px;"&gt;the following advice:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;UL style="margin-top: 15px; margin-bottom: 0px; font-size: 14px;"&gt;&lt;LI style="margin: 5px 0px;"&gt;&lt;P style="font-size: 1em; line-height: 1.2em;"&gt;DNS-based ACLs work only when RADIUS NAC (central web authentication or posture) are done on the SSID. DNS-based ACLs do not work with local web authentication or any other form of ACL other than a redirect-ACL used in the case of RADIUS NAC.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="font-size: 1em; line-height: 1.2em;"&gt;so in 8.0 code the behavior is the same as 7.6.130&lt;/P&gt;&lt;P style="font-size: 1em; line-height: 1.2em;"&gt;I can't understand why Cisco WLC is not able to permit access using URL's instead of ip address without RADIUS,&amp;nbsp;most manufactures can do it, even Meraki that now is part of Cisco can do this. Is imposible open thousand of ip address in the ACL if you want to open facebook or akamai for example.&lt;/P&gt;&lt;P style="font-size: 1em; line-height: 1.2em;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 1em; line-height: 1.2em;"&gt;Anybody knows a workarround to achieve this?&amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 1em; line-height: 1.2em;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 1em; line-height: 1.2em;"&gt;Regards!&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 08:56:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dns-based-acl-in-wlc/m-p/2604602#M41399</guid>
      <dc:creator>jucape2009</dc:creator>
      <dc:date>2021-07-05T08:56:24Z</dc:date>
    </item>
    <item>
      <title>I have this problem as well.</title>
      <link>https://community.cisco.com/t5/wireless/dns-based-acl-in-wlc/m-p/2604603#M41400</link>
      <description>&lt;P&gt;I have this problem as well. In fact, it doesn't work when using radius-NAC either. We are trying to perform posture remediation using ISE for MS Updates in our posture redirect ACL using URL-Based ACE's, have engaged countless TAC engineers to no avail. It is also documented in bug CSCuv74219 for version 8.0 and 8.1 code as well and the workaround hasn't work either. Very discouraging. You would think something so simple and common would be fixed quickly. Whats happening at Cisco these days?&lt;/P&gt;</description>
      <pubDate>Fri, 04 Sep 2015 12:03:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dns-based-acl-in-wlc/m-p/2604603#M41400</guid>
      <dc:creator>mikehallevms</dc:creator>
      <dc:date>2015-09-04T12:03:23Z</dc:date>
    </item>
    <item>
      <title>I'm not sure what are you</title>
      <link>https://community.cisco.com/t5/wireless/dns-based-acl-in-wlc/m-p/2604604#M41401</link>
      <description>&lt;P&gt;I'm not sure what are you trying to achieve. But to make Local Web Auth (LWA), you can make the pre-auth-ACL on the WLC &amp;amp; refer to the external URL of the protal. I've tried this previously &amp;amp; worked fine. The issue i faced was that i should configure AAA for the WLAN to get the users authenticated because undoing so will make the authentication fail &amp;amp; nit refering to Local WLC users. Is that what you mean?&lt;/P&gt;</description>
      <pubDate>Fri, 09 Oct 2015 15:53:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dns-based-acl-in-wlc/m-p/2604604#M41401</guid>
      <dc:creator>O_A_H</dc:creator>
      <dc:date>2015-10-09T15:53:33Z</dc:date>
    </item>
    <item>
      <title>The configuration guide</title>
      <link>https://community.cisco.com/t5/wireless/dns-based-acl-in-wlc/m-p/2604605#M41402</link>
      <description>&lt;P&gt;The configuration guide states that local web auth is not supported.&lt;/P&gt;
&lt;P&gt;I quote from the 7.6 configuration guide &lt;A href="http://www.cisco.com/c/en/us/td/docs/wireless/controller/7-6/configuration-guide/b_cg76/b_cg76_chapter_0110101.html#reference_5CAC7B1B4E274CDE98D253DCEC1DCCA5"&gt;Restrictions on DNS-based Access Control Lists&lt;/A&gt;&lt;/P&gt;

&lt;PRE&gt;
DNS-based ACLs work only when RADIUS NAC (central web authentication or posture) are done on the SSID. DNS-based ACLs do not work with local web authentication or any other form of ACL other than a redirect-ACL used in the case of RADIUS NAC.
&lt;/PRE&gt;

&lt;P&gt;I think this has been decided to move the unified access forward by encouraging the use of central web authentication, but that is solely an assumption on my part.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;@Mike: Try to enable &lt;STRONG&gt;DHCP address assignment required&lt;/STRONG&gt; on the WLAN. This feature invokes DHCP snooping and I wouldn't be surprised if the DNS snooping code of the DNS-ACL feature is somehow (inadvertently) dependent on this function. I have successfully tested it with 7.6.110.0, 8.0.115.0 and &lt;DEL&gt;8.0.120.0&lt;/DEL&gt; running on a 5508 WLC.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Edit: Shot too early. Thought I was running 8.0.120.0 but 7.6.110.0 was still active. 8.0.120.0 is &lt;STRONG&gt;not &lt;/STRONG&gt;working. I went through the bugfixes and discovered one related to DHCP - &lt;A href="https://tools.cisco.com/bugsearch/bug/CSCus85767"&gt;CSCus85767&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;BTW release 8.0.110.0 is also working. Interestingly when I disable the DHCP address assignment required again it still works.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2015 11:07:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dns-based-acl-in-wlc/m-p/2604605#M41402</guid>
      <dc:creator>patrick.kofler</dc:creator>
      <dc:date>2015-10-12T11:07:45Z</dc:date>
    </item>
    <item>
      <title>Did you test WLC version 8.0</title>
      <link>https://community.cisco.com/t5/wireless/dns-based-acl-in-wlc/m-p/2604606#M41403</link>
      <description>&lt;P&gt;Did you test WLC version 8.0.100.0?&lt;/P&gt;
&lt;P&gt;I configured an access-list with dns based URL, and the SSID is using Radius NAC and dhcp required. Unfortunately the configuration does not work. Eventually 8.0.100.0 is affected by the bug CSCuv74219 also.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Dec 2015 15:03:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dns-based-acl-in-wlc/m-p/2604606#M41403</guid>
      <dc:creator>gadholwi1</dc:creator>
      <dc:date>2015-12-01T15:03:10Z</dc:date>
    </item>
    <item>
      <title>I don't remember testing it.</title>
      <link>https://community.cisco.com/t5/wireless/dns-based-acl-in-wlc/m-p/2604607#M41404</link>
      <description>&lt;P&gt;I don't remember testing it. Anyway the only way to resolve it without side effects is either going straight to 8.2.100.0, which is already available on CCO or open a TAC case to receive an image from the 8.0 train containing the bugfix.&lt;/P&gt;
&lt;P&gt;You will notice it will work when you get the following messages in the client debug output:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff DNS SNOOPING: decode clientMac aa:bb:cc:dd:ee:ff,DomainName[lh3.googleusercontent.com] IpAddr: [173.194.44.44]&lt;BR /&gt;&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff Fetched IP address [173.194.44.44] DomainName[lh3.googleusercontent.com]&lt;BR /&gt;&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff Round-Robin[index 0, flag 0]&amp;nbsp;&amp;nbsp; Update[2] the mscb with the IP address in DNS response. removed ip[0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [10.32.9.68]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [173.194.112.39]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [173.194.44.44]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.927: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;*spamApTask2: Jan 12 14:00:46.928: aa:bb:cc:dd:ee:ff IP Addr Updated in MSCB - [0.0.0.0]&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;
&lt;P&gt;8.2.100.0 also provides double the count of ACL entries as well as IPs the MSCB can hold (20/40 as opposed to 10/20). The above ouput reflects this.&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Patrick&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jan 2016 14:16:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dns-based-acl-in-wlc/m-p/2604607#M41404</guid>
      <dc:creator>patrick.kofler</dc:creator>
      <dc:date>2016-01-12T14:16:37Z</dc:date>
    </item>
    <item>
      <title>Thank you for the information</title>
      <link>https://community.cisco.com/t5/wireless/dns-based-acl-in-wlc/m-p/2604608#M41405</link>
      <description>&lt;P&gt;Thank you for the information. Infact 8.0.100.0 is suffered by the bug CSCuv74219 (and/or CSCus61445), and DNS-based ACL does not work.&lt;/P&gt;
&lt;P&gt;The bug is fixed 8.0.121.0 and 8.2.100.0. I got this information from Cisco TAC.&lt;/P&gt;
&lt;P&gt;Unfortunately DNS-based ACL is NOT supported in a foreign-anchor setup (auto-anchor). There is an enhancement request to fix this issue:&lt;SPAN style="background-color: yellow;"&gt;&lt;/SPAN&gt; CSCui81308&amp;nbsp; Auto Anchor Support for DNS based ACL.&lt;/P&gt;
&lt;P&gt;Because we are using an auto-anchor setup, DNS-based ACL is not working for us!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jan 2016 14:25:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dns-based-acl-in-wlc/m-p/2604608#M41405</guid>
      <dc:creator>gadholwi1</dc:creator>
      <dc:date>2016-01-12T14:25:05Z</dc:date>
    </item>
    <item>
      <title>Hi gadholwi...</title>
      <link>https://community.cisco.com/t5/wireless/dns-based-acl-in-wlc/m-p/2604609#M41406</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://supportforums.cisco.com/users/gadholwi1" title="View user profile." class="username" lang="" about="/users/gadholwi1" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;gadholwi&lt;/A&gt;...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I came across the same issue. We are running 8.0.122.44 and we are only able to use preauthentication-ACL when we know the specific IP addresses of the websites.I have added three URL's but they are not working.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Do you know the status of the enchancement request&amp;nbsp;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;A href="https://quickview.cloudapps.cisco.com/quickview/bug/CSCui81308" target="_blank" rel="nofollow"&gt;CSCui81308&lt;/A&gt;?&lt;/P&gt;</description>
      <pubDate>Fri, 23 Sep 2016 08:25:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dns-based-acl-in-wlc/m-p/2604609#M41406</guid>
      <dc:creator>diondohmen</dc:creator>
      <dc:date>2016-09-23T08:25:12Z</dc:date>
    </item>
    <item>
      <title>Hi gadholwi1, did you receive</title>
      <link>https://community.cisco.com/t5/wireless/dns-based-acl-in-wlc/m-p/2604610#M41407</link>
      <description>&lt;P&gt;Hi gadholwi1, did you receive an update about enhancement request&amp;nbsp;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;A href="https://quickview.cloudapps.cisco.com/quickview/bug/CSCui81308" target="_blank"&gt;CSCui81308&lt;/A&gt;? Or did you find a different solution to your setup?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2016 08:29:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dns-based-acl-in-wlc/m-p/2604610#M41407</guid>
      <dc:creator>diondohmen</dc:creator>
      <dc:date>2016-11-08T08:29:39Z</dc:date>
    </item>
  </channel>
</rss>

