Switches / Hubs
--
Questions
--
Followers
Top Experts
The WLC uses VLANs to segregate the various networks. VLAN 5 is for WiFi management and is used by the WLC to talk to the APs (172.16.150.0/24). VLAN 6 is used for the guest WiFi network (172.16.160.0/24). VLAN 7 is used for the internal WiFi network (172.16.170.0/24). The WLC has 2 ports that connect to the closest Cisco Switch. Both ports on the switch that the WLC connects to are setup for 802.1Q trunking. There are 2 more switches that traffic has to hop through to get to our ISA Server firewall. The firewall has 1 physical port for the internal traffic that is VLANed in to 2 virtual ports for VLAN1 and VLAN 6.
I have attached a network diagram to show the details.
How do I get data from a guest WiFi client to the firewall without allowing them access to our internal network (ie: route VLAN6 through to the firewall)?
network-diagram.jpg
Zero AI Policy
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
You can use an ACL to deny the traffic from your guest network to access your internal network. Once that is done the flow of the traffic will go out the default route/internet. That way if a sophisticated user tried to get to your internal network the ACL would deny them access and they would only be able to get out to the internet. Once the ACL is created you will need to apply it to the inbound direction of the vlan for which the inter-vlan routing is occuring on
Do I really need to configure inter-vlan routing and ACLs to do this? Surely there is a way to just have the traffic isolated to VLAN6 and carried across the network that way?






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Since you are only concerned with the wifi guest access accessing your internal lan you would only need to create a single ACL (with multiple permit/deny statements) and then apply that to the default gateway (interface vlan on your Wireless controller) so that the traffic would be dropped there.
interface FastEthernet0/32
description WLC Port 2 (VL06)
switchport trunk encapsulation dot1q
switchport trunk native vlan 6
switchport mode trunk
spanning-tree portfast
!
interface FastEthernet0/40
description WLC Port 1 (VL05)
switchport trunk encapsulation dot1q
switchport trunk native vlan 5
switchport mode trunk
spanning-tree portfast
!
Any ideas?

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Here is a link describing this issue in more detail if the line protocol of the interface is down:
http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a0080160b14.shtml
If the interface vlan 6 does happen to be down because of the above you can exclude it from requiring a port in that vlan by using the "Autostate" command. Here is a link on doing this. You will basically go under that interface and type the command "switchport auto-state exclude"
Switch#config t
Switch(config)#interface vlan 6
Switch(config-if)#switchpo
http://www.ciscopress.com/articles/article.asp?p=1574301&seqNum=3
http://dhucaby.wordpress.com/2010/06/07/ccnp-switch-svi-autostate/
Let me know the results
Interface IP-Address OK? Method Status Protocol
Vlan1 172.16.116.2 YES NVRAM up up
Vlan2 172.16.129.4 YES NVRAM up up
Vlan3 172.16.130.4 YES NVRAM up up
Vlan5 172.16.150.254 YES NVRAM up up
Vlan6 172.16.160.254 YES manual up up
Vlan7 172.16.170.254 YES NVRAM up up
FastEthernet0/32 unassigned YES unset up up
FastEthernet0/40 unassigned YES unset up up
I thought the manual vs NVRAM method might mean something but that just indicates the interface was created from the CLI since the last boot.
So, let me get this figured out and I will get back to this issue... hopefully shortly.






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Switches / Hubs
--
Questions
--
Followers
Top Experts
A switch is a device that filters and forwards packets of data between LAN segments. Switches operate at the data link layer or the network layer of the Open Systems Interconnection (OSI) Reference Model and therefore support any packet protocol. LANs that use switches to join segments are called switched LANs or, in the case of Ethernet networks, switched Ethernet LANs. A hub is a connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports; when a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.