ISE1.4 CWA URL Public IP - WLC (Anchor/Foreigner) communication to PSN
Dear, Scenario is as attached.
Guest gets public DNS which resolves CWA redirect URL into a public IP. Guest cannot talk to PSN at PSN's private IP address. WLC management interface can communicate with PSN's private IP address only.
I want to know, 1- If Guest can reach PSN CWA redirect URL using public IP address through internet; CWA should work, isn't it? 2- When foreign WLC communicates with ISE for radius authentication of anchored WLAN, which IP address does it use? (Management interface, Yes? & still Guest network should be able to reach PSN CWA redirect URL public IP address? Is it correct)
3- A- If guest PC resolves PSN CWA redirect URL into a public IP; CWA redirect ACL on WLC should have ACE that permits traffic to PSN public IP & not the private IP address? B- Is it valid for both type of WLCs? Anchor (in internet DMZ like Guest) and foreigner?
Yes, MSSPs can use Threat Response. In fact, there are more than 100 MSSPs actively using Threat Response in their investigations. Threat Response partially supports multi-tenancy, in that you can configure as many copies of a module as you need, one per...
With our browser plugins for Chrome and Firefox, you may immediately integrate with any web-based third-party products or intelligence web-based sources. Learn how to configure the plugins in this short video.
Besides, you may leverage Threat Response’s ...
Threat Response integrates with Threat Grid as a reference module. It allows investigators to pivot and get information for IP addresses, domains, URLs and file hashes from the Threat Grid repository. Conversely, Threat Grid leverages the Investigation a...
Threat Response integrates with SMA (Security Management Appliance) as an enrichment and enforcement module. The SMA module allows investigators to take actions such as searching email records for sender email and IP, email subject and message header, am...
With this integration, investigators can see intrusion events from Firepower devices correlated with enrichment from other Cisco Security products, adding greater context and helping the SOC investigate incidents with broader internal visibility.