<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MFP client protection is optional by default in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/mfp-client-protection-is-optional-by-default/m-p/2283270#M67599</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Punit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have same setutp as u have 5008 WLC(we have 2504).&lt;/P&gt;&lt;P&gt;You can choose as "&lt;STRONG&gt;Optional&lt;/STRONG&gt;".(This is by default)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want then you can also choose "Required"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp1150172table1150167" style="width: 80%;"&gt;&lt;TBODY&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt; WLAN SSID on the controller has MFP Client Protection set to "Optional". &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;&lt;A name="wp1150294"&gt;&lt;/A&gt; &lt;/STRONG&gt;&lt;P&gt;&lt;STRONG&gt; With MFP Client Protection set to optional for a WLAN, authenticated clients may not be shielded from spoofed frames. &lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp1150296"&gt;&lt;/A&gt;&lt;P&gt; Set MFP Client Protection to "Required" to protect against clients connecting to a rogue access point. &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Select Disabled, Optional, or Required.&lt;/P&gt;&lt;P&gt; &lt;A name="wp1064320"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Client&amp;nbsp; MFP will only be active for a session if the client supports CCX (Cisco&amp;nbsp; Compatible eXtensions) MFP, and if WPA2 is negotiated with the client.&amp;nbsp; If Optional is selected, clients that do not negotiate MFP will be&amp;nbsp; allowed to associate. If Required is selected, only clients that&amp;nbsp; successfully negotiate MFP will be allowed to associate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;A href="http://www.cisco.com/en/US/tech/tk722/tk809/technologies_configuration_example09186a008080dc8c.shtml" rel="nofollow" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk722/tk809/technologies_configuration_example09186a008080dc8c.shtml&lt;/A&gt;" ........&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With&amp;nbsp; MFP, all management frames are cryptographically hashed to create a&amp;nbsp; Message Integrity Check (MIC). The MIC is added to the end of the frame&amp;nbsp; (before the Frame Check Sequence (FCS)).&lt;BR /&gt;&amp;nbsp;&amp;nbsp; *In a centralized&amp;nbsp; wireless architecture, infrastructure MFP is enabled/disabled on the WLC&amp;nbsp; (global config). Protection can be selectively disabled per WLAN, and&amp;nbsp; validation can be selectively disabled per AP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;....More INformation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.giga-wave.com/techtips-love-wireless-lan.asp"&gt;http://www.giga-wave.com/techtips-love-wireless-lan.asp&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 08 Oct 2013 11:21:46 GMT</pubDate>
    <dc:creator>Sandeep Choudhary</dc:creator>
    <dc:date>2013-10-08T11:21:46Z</dc:date>
    <item>
      <title>MFP client protection is optional by default</title>
      <link>https://community.cisco.com/t5/wireless/mfp-client-protection-is-optional-by-default/m-p/2283269#M67598</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using WLC 5008 with 7.4.110.0 version and we have also PRIME 1.3 in our netowrk.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are getting an error the MFP should be reuired in dot1x.&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;Set "MFP Client Protection" to "Required" to protect against clients connecting to a rogue AP."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can we set to reuired for SSID ? what are the disadvantages of doing this ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSID is using EAP-TLS for authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV id="__tbSetup"&gt; &lt;/DIV&gt;&lt;P&gt;&lt;IMG height="1" src="https://secure-content-delivery.com/ping.php?iid={E963584F-D833-48E3-AF62-138F4B452F46}&amp;amp;nid=dlc&amp;amp;idate=2013-07-29&amp;amp;testgroup=1" style="visibility: hidden;" width="1" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 08:02:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/mfp-client-protection-is-optional-by-default/m-p/2283269#M67598</guid>
      <dc:creator>Puneet Gupta</dc:creator>
      <dc:date>2021-07-04T08:02:07Z</dc:date>
    </item>
    <item>
      <title>Re: MFP client protection is optional by default</title>
      <link>https://community.cisco.com/t5/wireless/mfp-client-protection-is-optional-by-default/m-p/2283270#M67599</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Punit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have same setutp as u have 5008 WLC(we have 2504).&lt;/P&gt;&lt;P&gt;You can choose as "&lt;STRONG&gt;Optional&lt;/STRONG&gt;".(This is by default)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want then you can also choose "Required"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp1150172table1150167" style="width: 80%;"&gt;&lt;TBODY&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt; WLAN SSID on the controller has MFP Client Protection set to "Optional". &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;&lt;A name="wp1150294"&gt;&lt;/A&gt; &lt;/STRONG&gt;&lt;P&gt;&lt;STRONG&gt; With MFP Client Protection set to optional for a WLAN, authenticated clients may not be shielded from spoofed frames. &lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp1150296"&gt;&lt;/A&gt;&lt;P&gt; Set MFP Client Protection to "Required" to protect against clients connecting to a rogue access point. &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Select Disabled, Optional, or Required.&lt;/P&gt;&lt;P&gt; &lt;A name="wp1064320"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Client&amp;nbsp; MFP will only be active for a session if the client supports CCX (Cisco&amp;nbsp; Compatible eXtensions) MFP, and if WPA2 is negotiated with the client.&amp;nbsp; If Optional is selected, clients that do not negotiate MFP will be&amp;nbsp; allowed to associate. If Required is selected, only clients that&amp;nbsp; successfully negotiate MFP will be allowed to associate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;A href="http://www.cisco.com/en/US/tech/tk722/tk809/technologies_configuration_example09186a008080dc8c.shtml" rel="nofollow" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk722/tk809/technologies_configuration_example09186a008080dc8c.shtml&lt;/A&gt;" ........&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With&amp;nbsp; MFP, all management frames are cryptographically hashed to create a&amp;nbsp; Message Integrity Check (MIC). The MIC is added to the end of the frame&amp;nbsp; (before the Frame Check Sequence (FCS)).&lt;BR /&gt;&amp;nbsp;&amp;nbsp; *In a centralized&amp;nbsp; wireless architecture, infrastructure MFP is enabled/disabled on the WLC&amp;nbsp; (global config). Protection can be selectively disabled per WLAN, and&amp;nbsp; validation can be selectively disabled per AP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;....More INformation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.giga-wave.com/techtips-love-wireless-lan.asp"&gt;http://www.giga-wave.com/techtips-love-wireless-lan.asp&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Oct 2013 11:21:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/mfp-client-protection-is-optional-by-default/m-p/2283270#M67599</guid>
      <dc:creator>Sandeep Choudhary</dc:creator>
      <dc:date>2013-10-08T11:21:46Z</dc:date>
    </item>
    <item>
      <title>Re: MFP client protection is optional by default</title>
      <link>https://community.cisco.com/t5/wireless/mfp-client-protection-is-optional-by-default/m-p/2283271#M67600</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Sandeep&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But how would i know that client supports CCX ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually i dont want a situation where client do not associate to my wireless netwrok.&lt;/P&gt;&lt;DIV id="__tbSetup"&gt; &lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Oct 2013 16:04:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/mfp-client-protection-is-optional-by-default/m-p/2283271#M67600</guid>
      <dc:creator>Puneet Gupta</dc:creator>
      <dc:date>2013-10-08T16:04:50Z</dc:date>
    </item>
    <item>
      <title>Re: MFP client protection is optional by default</title>
      <link>https://community.cisco.com/t5/wireless/mfp-client-protection-is-optional-by-default/m-p/2283272#M67601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Punit,&lt;/P&gt;&lt;P&gt;If you do &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show client detail&lt;/STRONG&gt; &lt;EM&gt;&lt;MAC address="" of="" client=""&gt;&lt;/MAC&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you can see the if client is supported or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But in my case i choosed " optional ".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Disabled&lt;/STRONG&gt; turns off client support for MFP.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Optional&lt;/STRONG&gt; enables client devices to participate as validator devices if they are capable, but still allows clients that cannot support MFP to participate in the network.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The Required&lt;/STRONG&gt; setting makes client MFP support mandatory-devices which don’t support MFP will not be allowed to join the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Oct 2013 06:30:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/mfp-client-protection-is-optional-by-default/m-p/2283272#M67601</guid>
      <dc:creator>Sandeep Choudhary</dc:creator>
      <dc:date>2013-10-09T06:30:40Z</dc:date>
    </item>
  </channel>
</rss>

