Solved

Access point isolation on cisco 2504

Posted on 2014-03-21
5
80 Views
Last Modified: 2016-05-16
I have been asked to configure AP isolation on a cisco 2504 and cannot seem to find any information on how to accomplish this. I would like to remove isolation on only the guest WLAN. Any input would be appreciated.
0
Comment
Question by:wildcat5
5 Comments
 
LVL 15

Expert Comment

by:WalkaboutTigger
Comment Utility
What version of the OS are you running on the 2504?

Are you asking about mobility group isolation, for which the configuration manual can be found at
http://www.cisco.com/c/en/us/td/docs/wireless/controller/7-0MR1/configuration/guide/wlc_cg70MR1/cg_mobility.html
?

Are you actually just trying to separate Guest WLAN access from trusted WLAN access?
0
 
LVL 45

Accepted Solution

by:
Craig Beck earned 200 total points
Comment Utility
If you're meaning the feature which stops clients from seeing and talking to eachother across the WLAN you mean the P2P Blocking feature.

It's in the Advanced tab for the WLAN (set it to 'Drop')...

WLAN P2P Blocking
You might also want to block Wifi-Direct, using the same page.
0
 
LVL 61

Expert Comment

by:gheist
Comment Utility
Obviously that is configured on access point with radio first...
0
 
LVL 45

Expert Comment

by:Craig Beck
Comment Utility
Obviously that is configured on access point with radio first...
I'm a bit confused by that?

Although, you made me read the OP again and I now noticed that I posted instructions to block instead of unblock.

So, set P2P Blocking Action to 'Disabled'.
0
 

Author Comment

by:wildcat5
Comment Utility
Thanks everyone for the postings, I am busy trying out the solutions posted so far. I will post again when I get it working with the solution that worked.
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Join & Write a Comment

Password hashing is better than message digests or encryption, and you should be using it instead of message digests or encryption.  Find out why and how in this article, which supplements the original article on PHP Client Registration, Login, Logo…
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now