<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Why not just create an acl on in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/restrict-ssh-to-wlc-from-untrusted-subnets/m-p/3690312#M5696</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326193"&gt;@Scott Fella&lt;/a&gt; does it mean there's no way to apply management ACL on the WLC? That's a bit of disappointment. We also have a requirement to restrict management access to WLCs in the trusted network (such as only DC/jump boxes) can manage it. Applying this ACL to management SVI on a switch is not really an option because apart from WLCs we have tens of other devices in management VLAN and some have different requirements. This will also make ACL IP-address specific, while if applied to WLC it can be based around standard sets of source IP address (jump box) with ANY as destination - hence unified across all WLCs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I can't believe Cisco hasn't created management ACLs...&amp;nbsp; we've just finished applying this to our routers and switches securing both SSH and HTTPS, but of course... you can't do this on WLCs &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 17 Aug 2018 10:03:09 GMT</pubDate>
    <dc:creator>Tymofii Dmytrenko</dc:creator>
    <dc:date>2018-08-17T10:03:09Z</dc:date>
    <item>
      <title>Restrict SSH to WLC from untrusted subnets</title>
      <link>https://community.cisco.com/t5/wireless/restrict-ssh-to-wlc-from-untrusted-subnets/m-p/3010351#M5693</link>
      <description>&lt;P&gt;We are trying to be more prudent on what subnets have access to our WLC for PCI compliance.&amp;nbsp; We have created a deny ACL&amp;nbsp; on the management ACL of the wireless controller but I can still ssh from a subnet we have denied access to. What gives?&amp;nbsp;&amp;nbsp; We obviously do not want to block CAPWAP traffic to and from the access points and controllers but we do no want to have unrestricted management access from all the remote subnets.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 13:22:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/restrict-ssh-to-wlc-from-untrusted-subnets/m-p/3010351#M5693</guid>
      <dc:creator>DAVID</dc:creator>
      <dc:date>2021-07-05T13:22:58Z</dc:date>
    </item>
    <item>
      <title>Why not just create an acl on</title>
      <link>https://community.cisco.com/t5/wireless/restrict-ssh-to-wlc-from-untrusted-subnets/m-p/3010352#M5694</link>
      <description>&lt;P&gt;Why not just create an acl on the layer 3 svi and not on the WLC.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Scott&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*** Please rate helpful posts ***&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2017 16:12:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/restrict-ssh-to-wlc-from-untrusted-subnets/m-p/3010352#M5694</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2017-01-17T16:12:13Z</dc:date>
    </item>
    <item>
      <title>that would be an option if I</title>
      <link>https://community.cisco.com/t5/wireless/restrict-ssh-to-wlc-from-untrusted-subnets/m-p/3010353#M5695</link>
      <description>&lt;P&gt;that would be an option if I had it.&amp;nbsp; I'm trying to appease management who insists that the ACL is not correct.&amp;nbsp; Here is a brief background.&amp;nbsp; I have two 5520's in HA.&amp;nbsp; The active node is what is accessible to the AP's and general management. While the deny tcp any any has been created on the management ACL I can still SSH to the backup node but not the active node.&amp;nbsp; Trying to understand as to why?&amp;nbsp; I do realize that only one node will be active at a time and any ACL obliviously only deals with the active node.&amp;nbsp; Just making sure that I am not missing something.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2017 16:46:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/restrict-ssh-to-wlc-from-untrusted-subnets/m-p/3010353#M5695</guid>
      <dc:creator>DAVID</dc:creator>
      <dc:date>2017-01-17T16:46:39Z</dc:date>
    </item>
    <item>
      <title>Re: Why not just create an acl on</title>
      <link>https://community.cisco.com/t5/wireless/restrict-ssh-to-wlc-from-untrusted-subnets/m-p/3690312#M5696</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326193"&gt;@Scott Fella&lt;/a&gt; does it mean there's no way to apply management ACL on the WLC? That's a bit of disappointment. We also have a requirement to restrict management access to WLCs in the trusted network (such as only DC/jump boxes) can manage it. Applying this ACL to management SVI on a switch is not really an option because apart from WLCs we have tens of other devices in management VLAN and some have different requirements. This will also make ACL IP-address specific, while if applied to WLC it can be based around standard sets of source IP address (jump box) with ANY as destination - hence unified across all WLCs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I can't believe Cisco hasn't created management ACLs...&amp;nbsp; we've just finished applying this to our routers and switches securing both SSH and HTTPS, but of course... you can't do this on WLCs &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Aug 2018 10:03:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/restrict-ssh-to-wlc-from-untrusted-subnets/m-p/3690312#M5696</guid>
      <dc:creator>Tymofii Dmytrenko</dc:creator>
      <dc:date>2018-08-17T10:03:09Z</dc:date>
    </item>
    <item>
      <title>Re: Why not just create an acl on</title>
      <link>https://community.cisco.com/t5/wireless/restrict-ssh-to-wlc-from-untrusted-subnets/m-p/3690324#M5697</link>
      <description>&lt;P&gt;You can create a CPU ACL to restrict access to management. We just rather restrict it from the L3 as it’s easier to apply from a few devices than all.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Aug 2018 10:55:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/restrict-ssh-to-wlc-from-untrusted-subnets/m-p/3690324#M5697</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2018-08-17T10:55:32Z</dc:date>
    </item>
    <item>
      <title>Re: Why not just create an acl on</title>
      <link>https://community.cisco.com/t5/wireless/restrict-ssh-to-wlc-from-untrusted-subnets/m-p/3690367#M5698</link>
      <description>&lt;P&gt;Yeah... I am looking at CPU ACLs now.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Applied basic ACL with one DENY (specific) and ONE PERMIT ALL statement. It does look like it does the job, but I am not sure if anything else can be broken potentially.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also tried a reverse rule - PERMIT from 2 subnets from where management traffic is expected and DENIED everything else - still ok. Apparently in 8.x code this ACL does not affect service protocols, such as CAPWAP and Mobility (all my APs are still up, clients can still connect and consume wireless services).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I will leave it for couple days before signing off....&amp;nbsp; Thanks !&lt;/P&gt;</description>
      <pubDate>Fri, 17 Aug 2018 12:33:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/restrict-ssh-to-wlc-from-untrusted-subnets/m-p/3690367#M5698</guid>
      <dc:creator>Tymofii Dmytrenko</dc:creator>
      <dc:date>2018-08-17T12:33:59Z</dc:date>
    </item>
    <item>
      <title>Re: Why not just create an acl on</title>
      <link>https://community.cisco.com/t5/wireless/restrict-ssh-to-wlc-from-untrusted-subnets/m-p/3690368#M5699</link>
      <description>&lt;P&gt;Oh... it affects RADIUS communication &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; and TACACS+&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So, ACL must include service subnets too... or protocols. Crap.&lt;/P&gt;
&lt;P&gt;That's not what we wanted as it can become way too complicated.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Aug 2018 12:43:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/restrict-ssh-to-wlc-from-untrusted-subnets/m-p/3690368#M5699</guid>
      <dc:creator>Tymofii Dmytrenko</dc:creator>
      <dc:date>2018-08-17T12:43:00Z</dc:date>
    </item>
    <item>
      <title>Re: Why not just create an acl on</title>
      <link>https://community.cisco.com/t5/wireless/restrict-ssh-to-wlc-from-untrusted-subnets/m-p/3690398#M5700</link>
      <description>It’s trocky because you have to understand if you use any, inbounds or outboud.  I have just used source subnet permit like https and ssh inbound then deny any any inbound for https and ssh inbound then permit any any. &lt;BR /&gt;&lt;BR /&gt;So you might want to try to permit what you want first using inbound then deny the same protocols then have a permit any any in the end.</description>
      <pubDate>Fri, 17 Aug 2018 13:28:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/restrict-ssh-to-wlc-from-untrusted-subnets/m-p/3690398#M5700</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2018-08-17T13:28:08Z</dc:date>
    </item>
    <item>
      <title>Re: Why not just create an acl on</title>
      <link>https://community.cisco.com/t5/wireless/restrict-ssh-to-wlc-from-untrusted-subnets/m-p/3690462#M5701</link>
      <description>&lt;P&gt;Thanks Scott&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yeah, it's tricky, indeed&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just tried what you've suggested and it works&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So I permit HTTPS/SSH by source (two rules per source), then DENY HTTPS/SSH from ANY and permit other protocols ANY ANY.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I believe CPU ACL ignores the direction, rules needs to be as if you apply TOWARDS CPU (seen it somewhere).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It works&lt;/P&gt;</description>
      <pubDate>Fri, 17 Aug 2018 14:55:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/restrict-ssh-to-wlc-from-untrusted-subnets/m-p/3690462#M5701</guid>
      <dc:creator>Tymofii Dmytrenko</dc:creator>
      <dc:date>2018-08-17T14:55:00Z</dc:date>
    </item>
  </channel>
</rss>

