12-05-2024 01:27 PM
Greetings, I am looking for some guidance regarding peer to peer isolation using multiple aps with local switching.
I am using a EWC with four APs and am looking to implement some form of peer isolation. I understand that it will work as is for devices on the same AP but not different APs.
Documentation suggests using Flexconnect ACLs, my question is what would such an acl and it's ace look like?
I have tried a couple variations of something like the following below without success;
Extended IP access list P2P_Blocking
1 permit ip host 10.1.2.1 any log
2 permit ip any host 10.1.2.1 log
3 deny ip 10.1.2.0 0.0.0.255 10.1.2.0 0.0.0.255 log
12-05-2024 01:37 PM
Peer to peer blocking will work for all user under the same WLAN, not AP. If all your user is under the same WLAN, P2P block will work for you.
If you have more than one WLAN you can add the WLC to the Layer3 device that routes your traffic.
12-05-2024 01:41 PM
The document does not suggest that?
Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Cupertino 17.9.x - Peer-to-Peer Client Support [Cisco Catalyst 9800 Series Wireless Controllers] - Cisco
"FlexConnect central switching clients supports peer-to-peer blocking for clients associated with different APs. However, for FlexConnect local switching, this solution targets only clients connected to the same AP"
12-05-2024 01:43 PM
You are right. What I said applies only for Central switching, not local switching, sorry for that.
12-05-2024 01:50 PM
Extended IP access list P2P_Blocking
1 permit ip host 10.1.2.1 any log
2 permit ip any host 10.1.2.1 log
3 deny ip 10.1.2.0 0.0.0.255 10.1.2.0 0.0.0.255 log
Who is 10.1.2.1? Is it one client?
12-05-2024 03:54 PM
I went through this with Cisco
Following were recommendations on how to achieve this
SDA (No thanks)
MAC ACLs on the switch (No thanks)
Flex ACLs
I believe you ACL is correct if .1 is the default gateway
I believe you may need a permit any any following the deny statement to allow the users to access other resources (subnets)
Also if DHCP/ DNS are in the same VLAN allow them
Suggest testing it in a lab though
12-05-2024 11:42 PM
Did you try to enable P2P Blocking Action available for every wifi-SSID config ?
12-05-2024 11:55 PM
is 10.1.2.1 your gateway ?
did you apply the ACL ?
12-06-2024 08:18 AM - edited 12-06-2024 08:19 AM
You can also achieve the same effect by combining P2P blocking with "switchport protected" on the AP switch ports such that no AP port can talk to any other AP port, only to the uplink or router port. If and how this is configured depends on your switch topology and connectivity requirements, so can get complicated but worth considering too.
Plenty of guides and videos on how to use this feature if you search.
https://networklessons.com/switching/protected-port-cisco-catalyst-switch
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide