cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
206
Views
3
Helpful
4
Replies

9800 Guest Anchor Design

nir wittenberg
Level 1
Level 1

I am trying to understand Guest Anchoring with the 9800 Controllers.

In the 5500 series WLCs you had to access the WMI from the inside network through the firewall to the Anchor Controller Mgmt Vlan on a DMZ.  Then create another sub-interface on the Firewall for the guest traffic to go out to the Internet once de-encapsulated.  You could not have the AC connect to the inside network as you had to have an SVI on the Mgmt and Guest vlan possibly creating a backdoor if the Mgmt interface was on the inside network.

Since the 9800's don't need an SVI for the guest traffic has Cisco changed it's best practices to allow the AC WMI to connect directly to the inside network and then we don't have to create another sub-interface on the firewall for management and create all the rules needed AC management and tunneling? 

1 Accepted Solution

Accepted Solutions

Tony Greensmith
Level 1
Level 1

@nir wittenberg Hi, I was informed by Cisco some time ago that they see there WLCs as a secure boundary device and that traffic should not be able to pass between management and guest functions. However, accepting this and putting it in to practice in my eyes was always a leap of faith too far

Based on what you are intimating I would suggest either;

Put the WMI in a dmz on it's own, and then drop the L2 guest traffic into another DMZ to keep traffic separate. This could be done with a trunk port from the WLC. It will mean passing the WMI tunnel traffic through from an inside network to the WMI DMZ.

The other option is to be brave, put the WMI on a separate physical interface on the WLC and connect to an inside network, and then put the guest L2 VLANs into a different interface on the WLC and pass to a DMZ/FW for access control. You could put some form of interface ACL onto the WMI L3 interface to restrict to traffic to/from the export WLCs you connect to.

Hope that helps.

View solution in original post

4 Replies 4

marce1000
VIP
VIP

 

  - More of a generic reply ; have a look at https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/213912-configure-mobility-anchor-on-catalyst-98.html

   Note that it is always advisable to have a  checkup of the involved 9800 WLC's configuration with the CLI command show tech wireless and feed the output to : Wireless Config Analyzer
                        Meaning that in your case it will also point to errors related to anchoring setups (e.g.)

 M.



-- ' 'Good body every evening' ' this sentence was once spotted on a logo at the entrance of a Weight Watchers Club !

There is not one mention of a firewall/DMZ in that support doc.  It does show a diagram of the Forgein and Anchor connecting via the internal network and then a link to the Internet from the Anchor.  That document lacks so much detail.Screenshot 2024-04-16 at 10.54.06 AM.png

JPavonM
VIP
VIP

SVI's do exist on C9800 but they are not needed, but one use case is to configure VRFs to isolate Guest traffic on a different VLAN.

https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-12/config-guide/b_wl_17_12_cg/m_vrf-support-and-overlapping-ip-address.pdf

 

Tony Greensmith
Level 1
Level 1

@nir wittenberg Hi, I was informed by Cisco some time ago that they see there WLCs as a secure boundary device and that traffic should not be able to pass between management and guest functions. However, accepting this and putting it in to practice in my eyes was always a leap of faith too far

Based on what you are intimating I would suggest either;

Put the WMI in a dmz on it's own, and then drop the L2 guest traffic into another DMZ to keep traffic separate. This could be done with a trunk port from the WLC. It will mean passing the WMI tunnel traffic through from an inside network to the WMI DMZ.

The other option is to be brave, put the WMI on a separate physical interface on the WLC and connect to an inside network, and then put the guest L2 VLANs into a different interface on the WLC and pass to a DMZ/FW for access control. You could put some form of interface ACL onto the WMI L3 interface to restrict to traffic to/from the export WLCs you connect to.

Hope that helps.

Review Cisco Networking products for a $25 gift card