cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1949
Views
25
Helpful
8
Replies

Google chromecast exclusion on "Drop" policy P2P Blocking in WLC

Kriasn
Level 1
Level 1

Hi.

 

I have a wireless network that i administrate on a Cisco 9800-CL WLC. This network has the P2P Blocking action set to "Drop" due to security reasons. I want a Google Chromecast on this network. With the current configuration on the WLC i cant even set it up. Because it relies on a connection between a mobile device and the chromecast, which currently are getting dropped, due to the policy.

 

So my question: Is it possible to continue having the policy set top "drop", and exclude the chromecast device with MAC-adress so that all devices can communicate with the chromecast device and only that, (not other devices on the network). Again this due to security reasons.

 

I also have a picture attached here that shows other options. "Forward-UpStream" and "Allow Private Group", could one of these be used?

 

The easy fix is to setup another WLAN / SSID that has "disabled" P2P action. But i was hoping there was a workaround here with an exclusion of some sort.

 

Any help would be appericiated!

2 Accepted Solutions

Accepted Solutions

Option 2 sounds like the solution used in many hotels which requires a Chromecast proxy server which sits between the networks - it has an interface on each.

Option 1 should be easily done by simply configuring both SSID/WLAN on the same interface.  Not sure how the P2P blocking will handle that but it might actually work.  Try it out and let us know

 

View solution in original post

JPavonM
VIP
VIP

Option 1 would work only if you map both SSIDs to the same VLAN, this way you will be able to use mDNS for autodiscovery which is one of the advantages of these devices.

Option 2 would definetively work as this is the intent of this setup mode.

View solution in original post

8 Replies 8

patoberli
VIP Alumni
VIP Alumni

It depends on the security of that SSID. 

You could solve it by using iPSK, if the SSID was using PSK up until now:

https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/216130-configure-catalyst-9800-wlc-ipsk-with-ci.html

 

Otherwise you need to allow Peer to Peer (like it is typically on wired) communication. 

P2P is permit all or deny all.

If by any chance the application use some sort of server then you could use  "Forward-UpStream"

and "Allow Private Group", relies on iPSK devices.

 

Rich R
VIP
VIP

As usual the documentation is not great - but as others have hinted the allow-private group options only creates close user groups for users using the same PSK:

https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/config-guide/newconfigmodel/b_catalyst-9800-configuration-model/m_wlans.html

"You can also block the peer-to-peer traffic if any two clients do not share the same pre-shared key (PSK). This is supported on local and flex-connect modes.

Peer-to-peer blocking can be configured at three levels: allow, drop, and pre-shared key.

  • Allow-private-group: Enables the blocking of peer-to-peer traffic with the same tag value. If allow-private-group is disabled, then all peer-to-peer traffic with different tag values are dropped."

But that won't actually do what you want anyway.  I think your only way to achieve this will be P2P allowed and with ACLs to control the access but that will probably be far from perfect.  Also watch out for how Chromecast loads up the SSID.

 

 

Kriasn
Level 1
Level 1

Hi. You are right. This will not work the way i want it too. I'm not able to use iPSK. As i am unable to tag devices. But i've been looking into another workaround. Which is going have to be to solution here, because, lets face it, it's not possible to do what i want in my current network. Which basically is to: Use the network that i have, that has "Drop" in P2P in WLC. But i want them to not drop to only one device, this chromecast device. I tought this was possible trough some way of MAC-address reservation of some kind. But i guess if it says "Drop" it drops all P2P traffic on the network...

 

So i have come up with two workarounds. And need to know if option 1 is possible, with someones confirmation.

 

Option 1: My current network that i have i WLC that is set to "Drop". Lets call this SSID: "Network 1". Can i set up a new SSID "Network 2" on the WLC and put the chromecast / IOT devices etc in this network. And from there configure a bridge betweek network 1 and 2. Because the devices on "Network 1" are the ones that need to "cast" to the chromecast which is on "network 2". If you catch my drift.

 

Option 2: Create a new SSID for Chomecast / IOT devices and use the chromecast in "Guest Mode" which will prob work as its not reliant to be on the same WiFi as the device that "casts" to the chromecast, but is instead reliant on a PIN (4-digit code) to cast.

 

@Rich R @Flavio Miranda @patoberli 

Let me know if you can think of another workaround.

Not sure about option 2. But about option 1, probably wont work. Usually this kind of solution requires that all devices to be on the same network segment and when you create two SSIDs you are creating two networks.

  This is about security versus usability. In order to be security, I can´t use our solutions.

 

Option 2 sounds like the solution used in many hotels which requires a Chromecast proxy server which sits between the networks - it has an interface on each.

Option 1 should be easily done by simply configuring both SSID/WLAN on the same interface.  Not sure how the P2P blocking will handle that but it might actually work.  Try it out and let us know

 

JPavonM
VIP
VIP

Option 1 would work only if you map both SSIDs to the same VLAN, this way you will be able to use mDNS for autodiscovery which is one of the advantages of these devices.

Option 2 would definetively work as this is the intent of this setup mode.

Kriasn
Level 1
Level 1

Brilliant. Thanks for the responses: @JPavonM  @Rich R @Flavio Miranda . I'm going to go for option 2 as this is what its intended for. Due to security reasons, i'm not able try option 1, i cannot have the SSID's in the same VLAN. As much as i would like to try it. This is in a production enviroment, if it would have been a lab, i woudl've tried it. Maybe sometime in the future.

 

- Kristian 

Review Cisco Networking for a $25 gift card