<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACLs on WLC in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/acls-on-wlc/m-p/1837841#M8056</link>
    <description>&lt;P&gt;hi Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;just a question regarding ACL configuration on the WLC. I am a bit confused on when to use CPU ACL and when should we apply the ACL on an interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it seems CPU ACL is used to filter traffic processed by CPU, so normally used to prevent access to WLC through GUI/ssh/telnet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and if we apply ACL on an interface,&amp;nbsp; then this is mainly used to filter data traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can you please help to clarify the difference between the two and what would be the best practice to use them?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;appreciate for any comments.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Sun, 04 Jul 2021 04:28:58 GMT</pubDate>
    <dc:creator>welleslee</dc:creator>
    <dc:date>2021-07-04T04:28:58Z</dc:date>
    <item>
      <title>ACLs on WLC</title>
      <link>https://community.cisco.com/t5/wireless/acls-on-wlc/m-p/1837841#M8056</link>
      <description>&lt;P&gt;hi Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;just a question regarding ACL configuration on the WLC. I am a bit confused on when to use CPU ACL and when should we apply the ACL on an interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it seems CPU ACL is used to filter traffic processed by CPU, so normally used to prevent access to WLC through GUI/ssh/telnet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and if we apply ACL on an interface,&amp;nbsp; then this is mainly used to filter data traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can you please help to clarify the difference between the two and what would be the best practice to use them?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;appreciate for any comments.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 04:28:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/acls-on-wlc/m-p/1837841#M8056</guid>
      <dc:creator>welleslee</dc:creator>
      <dc:date>2021-07-04T04:28:58Z</dc:date>
    </item>
    <item>
      <title>Re: ACLs on WLC</title>
      <link>https://community.cisco.com/t5/wireless/acls-on-wlc/m-p/1837842#M8057</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you do configure acl’s on the WLC, I would not create a cpu acl, because you might end up locking yourself of the wlc.  You can create acl’s for the interface to deny or allow traffic from that interface or even do a pre-auth acl if you wanted to.  I only use acl’s on the wlc if I have to (webauth) or else I would use acl on the layer 3 switch instead.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jan 2012 13:25:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/acls-on-wlc/m-p/1837842#M8057</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2012-01-31T13:25:23Z</dc:date>
    </item>
  </channel>
</rss>

