03-29-2021 05:30 AM - edited 07-05-2021 01:03 PM
Hi all,
Does anyone know how Catalyst 9800 configuration model approaches ACL settings in terms of IPv4 ACL assigned to WLAN which is used by AP in flexconnect mode to filter traffic with local switching in place?
An example is that WLAN is configured to be locally switched, and therefore clients connecting to such WLAN are controlled what such clients can basically connect to based on defined ACL which is used by an AP.
In AireOS (WLCs) it was being done with flexconnect ACL, which was basically mapped with VLAN (VLAN-ACL mapping).
In world of 9800 is this being done by:
- Flex profile > VLAN tab > where ACL Name is applied to???
or
- Policy profile > Access Policies tab > WLAN ACL - IPv4 ACL ???
ACL needs to operate on AP level for a certain broadcasted WLAN, so clients are able to join/associate but just specific resources are allowed for them as per defined ACL.
The AP needs to run in FLEX mode, as it broadcast multiple WLANs (centrally & locally switched) but just one of such locally switched network should be restricted by an ACL.
Thanks for any hint/recommendation.
Martin
Solved! Go to Solution.
04-19-2021 12:46 AM
Finally, I have a solution and a bit more explanation on where/how IPv4 ACL behaves.
Well and it just works
Please don't take this as full documentation, it is a summary. Cisco should be updating their 9800 documentation with a bit more insight into ACLs and it's purpose/usage.
Cheers
03-29-2021 06:29 AM - edited 03-29-2021 06:31 AM
In theory the answer should be in https://www.cisco.com/c/en/us/td/docs/wireless/access_point/feature-matrix/ap-feature-matrix.html#_Toc64463738 but I'm not sure which feature applies - possibly VLAN ACL?
You may have to do some testing yourself because that's the only way to be sure as many things that *should* work on 9800 still don't and are not always very well documented.
What we found for a centrally switched WLAN (on an AP in flex mode because we also have locally switched WLANs) is that ACL applied to SVI on the WLC does not work (wacky behaviour with some traffic blocked and some not), but ACL applied in the WLAN policy does work (your 2nd option). TAC are still investigating whether that's "by design" or not (they're waiting for lab setup to repro what we've seen before taking it to BU). We haven't tested ACL on locally switched WLAN though.
Interested to hear what you find in your testing...
03-29-2021 10:08 PM
Thanks. I'm planning to test it for sure, and hopefully will be able to do so today. Just thought someone already have such experience.
With centrally switched WLANs it's somehow easier because you can place C9800 interface behind some firewall (well if available in your setup of course).
Will try to provide results from my testing.
From what I've heard on one webinars by Cisco (and hopefully well understood) is that 1st option should be used in case we use dynamic VLAN assignments with Radius. So second option might make sense...but need to test.
03-29-2021 11:43 PM
Just tried to use "Policy profile > Access Policies tab > WLAN ACL - IPv4 ACL" however this doesn't work as my intention is. Once ACL applied it basically filters even clients who would like to join this WLAN. So my client wasn't able to even connect to WLAN. Once ACL removed, client was able to connect easily.
Therefore this option doesn't provide what I need.
Need to search a bit more, test or shoot TAC case for help. I'm running the 17.3.3 where I believe such feature should be available...
04-07-2021 03:21 AM
TAC just came back to us and said:
This is happening because 9800 is based on ASR architecture and routers are only applying ACLs attached on SVI when packet is routed between interfaces. Since WLC is not doing any form of routing those ACLs are transparent for WLAN traffic and have no effect. Hence,
They agree this is not well documented for 9800 so have raised an internal documentation bug to get the ACL support & limitations properly documented for 9800. Hopefully that will include for flex cases.
04-07-2021 10:57 PM
Thanks for sharing.
I've been also attending webinars which are ongoing and also Cisco accepted in Q&A that ACL topic is a bit missing from documentation perspective.
Even above would mean that ACL applied in Policy profile should work but wasn't my case as it depend at what step exactly ACL is enforced by AP. I kind of believe need to do a bit more testing if e.g. DHCP packets were not dropped and therefore it seemed that client wasn't able to connect.
Will post update once I'm done with testing.
Thanks
04-19-2021 12:46 AM
Finally, I have a solution and a bit more explanation on where/how IPv4 ACL behaves.
Well and it just works
Please don't take this as full documentation, it is a summary. Cisco should be updating their 9800 documentation with a bit more insight into ACLs and it's purpose/usage.
Cheers
04-19-2021 02:40 AM
Thanks Martin
09-12-2024 12:38 PM
few years after this post, seems still same scenario. I pasted my new post here so you guys might have some input:
summary based on TAC: on C9800 Flex mode local switching to overcome the limitation of "P2P Blocking Action - > Drop" via SSID, use ACL and apply to Flex profile "Policy ACL" and "VLAN" Tab... basically enable both Dp2P Drop and ACL but this is not scable and can not have communication exemption!
https://community.cisco.com/t5/wireless/p2p-blocking-with-acl/m-p/5192879#M275417
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide