01-19-2025 07:07 PM
Hello,
I have a Catalyst 9800-80 running version 17.9.6 and Cisco ISE 3.1. I want to configure wireless clients connected to an SSID using iPSK/MAB to dynamically change their VLAN and reference an ACL that resides on the 9800.
I understand that dACL support is only available starting with version 17.10, so I cannot use that feature at this time. While I have successfully configured the dynamic VLAN functionality using an authorization profile, I would like guidance on how to handle the ACL configuration under these constraints.
Thank you for your assistance!
01-19-2025 07:44 PM
you can configure dACL, the aproach is different before and after 17.10
In Cisco IOS-XE 17.8 and earlier releases, you had to configure the name in Cisco ISE and define the ACL individually in each of the controllers, so when you configure ISE, just push ACL name and define your ACLs locally on controller.
In newer version you can push entire ACL on WLC instead of just name, no need to define ACL entries locally on controller
01-19-2025 08:58 PM
It rare to push both dynamic vlan and dacl.
If you config ise to push dynamic vlan then use ACL in wlan to control traffic no need to push it from ISE.
The dacl is mainly used for redirect traffic of cwa.
MHM
01-20-2025 02:38 AM
@Luna99923 As mentioned above You can defined on the ISE and push to controllers.You can refer to following links
https://www.cisco.com/c/en/us/support/docs/wireless/4400-series-wireless-lan-controllers/99121-vlan-acs-ad-config.html
01-21-2025 06:57 AM
Thank you.
Does anyone know if the following still applies to 9800 WLCs? I pulled the following from: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wlan-security/71978-acl-wlc.html
ALCs in WLCs work differently than in routers. These are a few things to remember when you configure ACLs in WLCs:
The most common mistake is to select IP when you intend to deny or allow IP packets. Because you select what is inside the IP packet, you deny or allow IP-in-IP packets.
Controller ACLs cannot block WLC virtual IP address, and hence DHCP packets for wireless clients.
Controller ACLs cannot block multicast traffic received from wired networks that is destined to wireless clients. Controller ACLs are processed for multicast traffic initiated from wireless clients, destined to wired networks or other wireless clients on the same controller.
Unlike a router, the ACL controls traffic in both directions when applied to an interface, but it does not perform stateful firewalling. If you forget to open a hole in the ACL for return traffic, this causes a problem.
Controller ACLs only block IP packets. You cannot block Layer 2 ACLs or Layer 3 packets that are not IP.
Controller ACLs do not use inverse masks like the routers. Here, 255 means match that octet of the IP address exactly.
ACLs on the controller are done in software and impact forwarding performance.
01-21-2025 07:55 AM
That's a very old document for AireOS so I'd not assume any of it necessarily still applies to 9800.
See the config guide https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-12/config-guide/b_wl_17_12_cg/m_conf_ipv4_acl_ewlc.html which discusses how they apply on 9800.
For dACLs also see https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/221941-configure-troubleshoot-downloadable-ac.html
01-21-2025 08:23 AM
Again why you looking for dACL and dynamic VLAN in same ssid? What is your requirements??
MHM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide