cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3109
Views
5
Helpful
5
Replies

Block NMAP port Scanning from Guest wireless Network

O.Zang
Level 1
Level 1

Hello Team

Please how to Block NMAP port Scanning from Guest wireless Network ?

I have configure Guest wireless. Guest is not able to ping Any ressource But NMAP scanning is working. All Private IP execept ISE, DHCP and DNS is Deny, but NMAP is still able to see others Clients connected

 

Regards

Zanga

2 Accepted Solutions

Accepted Solutions

Can you share the ACL you’ve implemented?


Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

View solution in original post

thomas
Cisco Employee
Cisco Employee

This sounds like an ACL issue on the WLC as stated by @Francesco Molino .

 

View solution in original post

5 Replies 5

Francesco Molino
VIP Alumni
VIP Alumni

Hi

 

The guest is going through a FW? How you wanted to block the nmap for guests? Were you thinking using a simple ACL or using a next-gen FW (IPS and/or blocking based on application detection)?

 

By ACL, you won’t be able to block it without blocking legitimate traffic. The 2nd option will be the way to go.

 


Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

Thank for your response Francesco.

The wireless Guest are not going through an firewall.

I have deny access to all private IP range excempt for ISE, DNS, and DHCP via the WLC Flexconnect ACL.

Ping, and SSH, or Telnet from Putty is not working. But NMAP is still able to scan the Network.

Thanks

Zang

Can you share the ACL you’ve implemented?


Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

thomas
Cisco Employee
Cisco Employee

This sounds like an ACL issue on the WLC as stated by @Francesco Molino .

 

seemon
Level 1
Level 1

We are using 9800 WLC with DNAC solution and facing the same challenges. Since Guest is open to connect and outsiders is able to see the connected Mac address by nmap scan hence able to bypass portal authenticaiton by spoofing valid connected user mac address.

Cisco is unable to provide any solutions.