<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Guest access and VPN client sessions in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/guest-access-and-vpn-client-sessions/m-p/1841231#M52625</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Scott,&lt;/P&gt;&lt;P&gt;My understanding is that all traffic is tunnelled through the EoIP tunnel, and therefore there is no need to specify ipsec ports on our firewall.&amp;nbsp; Is this not correct?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 29 Nov 2011 14:45:07 GMT</pubDate>
    <dc:creator>liamwalk1971</dc:creator>
    <dc:date>2011-11-29T14:45:07Z</dc:date>
    <item>
      <title>Guest access and VPN client sessions</title>
      <link>https://community.cisco.com/t5/wireless/guest-access-and-vpn-client-sessions/m-p/1841227#M52621</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have implemented a Guest WLAN using a 4402 controller residing&amp;nbsp; in our internet facing DMZ environment.&amp;nbsp; EoIP tunnel forwards traffic&amp;nbsp; from internal controllers to DMZ anchor.&amp;nbsp; The service works well and is&amp;nbsp; very popular with third party contractors working onsite.&amp;nbsp;&amp;nbsp; Authentication for guest is via a Cisco Guest NAC server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have had a few issues with contractors attempting to establish client VPN access to their parent company.&amp;nbsp; Are there any known issues with this type of guest connection?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 04:08:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-access-and-vpn-client-sessions/m-p/1841227#M52621</guid>
      <dc:creator>liamwalk1971</dc:creator>
      <dc:date>2021-07-04T04:08:38Z</dc:date>
    </item>
    <item>
      <title>Guest access and VPN client sessions</title>
      <link>https://community.cisco.com/t5/wireless/guest-access-and-vpn-client-sessions/m-p/1841228#M52622</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Liam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As long as you are opening up the ports for VPN on the FW, you should be fine.&amp;nbsp; I have never had any issues with various type of VPN clients using wireless guest (webauth).&amp;nbsp; Are you sure that the users have successfully authenticated? Also did you increase the session timeout or disabled it.&amp;nbsp; This will force webauth users to log back in which might be an issue also.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 13:29:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-access-and-vpn-client-sessions/m-p/1841228#M52622</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2011-11-29T13:29:22Z</dc:date>
    </item>
    <item>
      <title>Guest access and VPN client sessions</title>
      <link>https://community.cisco.com/t5/wireless/guest-access-and-vpn-client-sessions/m-p/1841229#M52623</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What code version?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There have been numerous bugs with pptp not working so if you aren't up to date on code, it wouldn't surprise me if that is your problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 14:28:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-access-and-vpn-client-sessions/m-p/1841229#M52623</guid>
      <dc:creator>weterry</dc:creator>
      <dc:date>2011-11-29T14:28:14Z</dc:date>
    </item>
    <item>
      <title>Re: Guest access and VPN client sessions</title>
      <link>https://community.cisco.com/t5/wireless/guest-access-and-vpn-client-sessions/m-p/1841230#M52624</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you provide us with what code versions are affected?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from my iPhone&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 14:37:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-access-and-vpn-client-sessions/m-p/1841230#M52624</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2011-11-29T14:37:41Z</dc:date>
    </item>
    <item>
      <title>Guest access and VPN client sessions</title>
      <link>https://community.cisco.com/t5/wireless/guest-access-and-vpn-client-sessions/m-p/1841231#M52625</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Scott,&lt;/P&gt;&lt;P&gt;My understanding is that all traffic is tunnelled through the EoIP tunnel, and therefore there is no need to specify ipsec ports on our firewall.&amp;nbsp; Is this not correct?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 14:45:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-access-and-vpn-client-sessions/m-p/1841231#M52625</guid>
      <dc:creator>liamwalk1971</dc:creator>
      <dc:date>2011-11-29T14:45:07Z</dc:date>
    </item>
    <item>
      <title>Re: Guest access and VPN client sessions</title>
      <link>https://community.cisco.com/t5/wireless/guest-access-and-vpn-client-sessions/m-p/1841232#M52626</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I thought there was one in mid-6.0 code.... but can't seem to find bug ID so I may be mistaken&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CSCsx20559&amp;nbsp;&amp;nbsp;&amp;nbsp; PPTP not working through WLC&amp;nbsp;&amp;nbsp; - Exists in 5.2.157.0 5.2.178.0&amp;nbsp;&amp;nbsp; resolved in 5.2.193 / 6.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CSCtc78925&amp;nbsp;&amp;nbsp;&amp;nbsp; PPTP not connecting through IOS based AP - Autonomous - One of the biggest issues with 12.4(21a)JA01&amp;nbsp; (resolved in whatever IOS code came after JA01.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It also looks like there is an even older bug but I can't make out wlc version of code.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It may not even be an issue for this case.&amp;nbsp; Just something to note.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 14:50:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-access-and-vpn-client-sessions/m-p/1841232#M52626</guid>
      <dc:creator>weterry</dc:creator>
      <dc:date>2011-11-29T14:50:05Z</dc:date>
    </item>
    <item>
      <title>Re: Guest access and VPN client sessions</title>
      <link>https://community.cisco.com/t5/wireless/guest-access-and-vpn-client-sessions/m-p/1841233#M52627</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct... I have clients that put rules in the FW for guest traffic not allowing VPN, that's why I ask.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from my iPhone&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 14:50:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-access-and-vpn-client-sessions/m-p/1841233#M52627</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2011-11-29T14:50:11Z</dc:date>
    </item>
    <item>
      <title>Re: Guest access and VPN client sessions</title>
      <link>https://community.cisco.com/t5/wireless/guest-access-and-vpn-client-sessions/m-p/1841234#M52628</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the version!  I was worried it was on the 6.x:)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from my iPhone&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 14:54:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-access-and-vpn-client-sessions/m-p/1841234#M52628</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2011-11-29T14:54:41Z</dc:date>
    </item>
    <item>
      <title>Re: Guest access and VPN client sessions</title>
      <link>https://community.cisco.com/t5/wireless/guest-access-and-vpn-client-sessions/m-p/1841235#M52629</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The version of code on the corporate network controllers (2 x WiSM) and DMZ Anchor Point controllers (2 x 4402) is 7.0.98.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there are any recommendations on required code level, please let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 17:10:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-access-and-vpn-client-sessions/m-p/1841235#M52629</guid>
      <dc:creator>liamwalk1971</dc:creator>
      <dc:date>2011-11-29T17:10:28Z</dc:date>
    </item>
    <item>
      <title>Re: Guest access and VPN client sessions</title>
      <link>https://community.cisco.com/t5/wireless/guest-access-and-vpn-client-sessions/m-p/1841236#M52630</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nothing specific to this issue comes to mind as far as 7.0 goes.&lt;/P&gt;&lt;P&gt;I saw a few TAC cases complain about guest + vpn,&amp;nbsp; all of which were firewall limitations (except I think 1 was a bandwidth contract issue).&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you doing rate limiting with bandwidth contracts?&amp;nbsp; That wouldn't prevent a vpn though, it would just potentially cause vpn disconnects due to over subscription.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So unless bandwidth contracts are in place, I'm leaning back to Scott's post.&amp;nbsp;&amp;nbsp; I assume you have a firewall between your Anchor WLC and the internet.....&amp;nbsp; perhaps the firewall is eating that packets?&amp;nbsp;&amp;nbsp; Specifically, you mention your anchor is in the DMZ....&amp;nbsp; I hear DMZ used loosely, sometimes it means completely on the other side of the firewal, some times it means a virtual zone within the firewal (port 1 trust, port 2 untrust, port 3 dmz)&amp;nbsp; so traffic would still go thorugh the firewall from DMZ to untrust to get to internet....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 17:24:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-access-and-vpn-client-sessions/m-p/1841236#M52630</guid>
      <dc:creator>weterry</dc:creator>
      <dc:date>2011-11-29T17:24:30Z</dc:date>
    </item>
    <item>
      <title>Re: Guest access and VPN client sessions</title>
      <link>https://community.cisco.com/t5/wireless/guest-access-and-vpn-client-sessions/m-p/1841237#M52631</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;Yes, I just checked the fw rules and although we allow all tcp/udp access outbound, I am thinking we also need to enable IPSec-ESP protocol 50 also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 17:32:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/guest-access-and-vpn-client-sessions/m-p/1841237#M52631</guid>
      <dc:creator>liamwalk1971</dc:creator>
      <dc:date>2011-11-29T17:32:25Z</dc:date>
    </item>
  </channel>
</rss>

