Hiwe have an WLC behind a firewall and are setting up a tunnel from the WLC with a 3rd party WLC behind their Firewall, when the secure tunnel is established between the WLC's if a user wants to connect at the 3rd party side where they are broadcasti...