11-28-2017 06:17 AM - edited 03-08-2019 12:54 PM
Hi,
We have two ISP 1. MPLS and 2. For Guest - Fiber Broadband. How to secure our Corporate Network from Guest Network as both are connected to our Cisco ASA5515.
Regards,
Mohammed
Solved! Go to Solution.
11-28-2017 06:32 AM
Hi,
You can deploy access list to block communication between the corporate and guest vlan and only allow access to the Internet for guest vlan.
HTH
11-28-2017 06:32 AM
Hi there,
Create a new Guest VRF on your core switch. It should contain all your guest wireless interfaces and a point-to-point link to your ASA.
This will keep traffic seperated on your core, there only way devices in different VRFs will be able to communicate will be via the ASA.
cheers,
Seb.
11-28-2017 06:32 AM
Hi,
You can deploy access list to block communication between the corporate and guest vlan and only allow access to the Internet for guest vlan.
HTH
11-28-2017 06:32 AM
Hi there,
Create a new Guest VRF on your core switch. It should contain all your guest wireless interfaces and a point-to-point link to your ASA.
This will keep traffic seperated on your core, there only way devices in different VRFs will be able to communicate will be via the ASA.
cheers,
Seb.
11-28-2017 06:45 AM
Most of the staff will connect to guest wifi. How can I allow and access Exchange ActiveSync using the Guest Wireless?
Regards,
Mohammed
11-28-2017 07:05 AM
Hi,
As long as the guest is in a separate vlan/subnet, you can use the access-list to allow exchange ActiveSync IPs to communicate with guest and also have them access the Internet. As for DNS on guest network, you can point them to an external DNS (8.8.8.8).
HTH
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide