Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17


cisco WLC 4402 and ACLs

Posted on 2014-03-24
Medium Priority
Last Modified: 2014-03-26
I have a WLC 4402 with a dozen LW1130s and would like see how to open some things up on the Guest network.  I can find no ACLs on the WLC, under Security > Acess Control LIstsm there are none listed.  But I want to test an application that needs a few UDP & TCP ports open to talk between wireless iPads.  I am assuming that the WLC is blocking all of the traffic between peers on the Guest WLAN, but am not sure.  Can anyone tell me if that is the default for the Guest network, to block all internal traffic between peers?  And how can I define a port to allow traffic between clients on the guest network?   Thanks
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2

Expert Comment

by:Jordan Medlen
ID: 39951148
I believe that Guest WLANs are just normal WLANs that you can configure just for guests and throw that traffic on a separate VLAN. You can also control what type of authentication is used to gain access to that WLAN. Initially, until authentication has happened, no access between any devices, peer or otherwise, would be had until that is achieved.

I use just regular SSIDs and VLANs for my guest wifi. If you're referring to the "Guest LAN" check box in the controller, I believe this is for extending the guest network functionality from the wireless to the wired LAN as well.

ACLs are managed under Security -> Access Control Lists (Left hand menu) -> Access Control Lists. This is where I manage all of my wireless ACLs.
LVL 47

Expert Comment

by:Craig Beck
ID: 39951625
Yup, Guest WLANs are regular WLANs, SSID-wise.

To stop clients from seeing each-other there's an option called 'P2P Blocking Action' which stops all clients on the same AP from seeing each-other.  You'll find this option on the WLAN's 'Advanced' tab...

WLAN P2P Blocking Action
Set that to 'Disabled' and it will allow clients to see eachother.

Note though that this doesn't stop a client from seeing a client on another AP unless the 'Forward-Upstream' option is set and there is an ACL at the upstream router.

Author Comment

ID: 39952966
Thanks.  So to allow clients to see each other, the P2P Blocking Action should be set to Disabled.  But then to allow traffic between APs, what would be the desired setting?
LVL 47

Accepted Solution

Craig Beck earned 2000 total points
ID: 39953055

I need to explain my previous comment to clarify what I mean.  I was a bit hazy so apologies for that.

There were issues with code in v7 which meant this didn't work as expected (especially  This also doesn't work as you'd expect for FlexConnect APs.

The way it is supposed to work is this...

Disabled - allows all comms between clients.  ACLs upstream at the router don't affect clients on the same WLAN as it's Layer2 (before routing).  The WLC just passes traffic within its own internal switch.

Drop - stops ALL clients on the WLAN from seeing eachother as long as ALL APs are on the same WLC.  If you have more than one WLC this doesn't stop your clients from seeing clients attached to the same WLAN but via APs on a different WLC.  What happened in some versions of code is that the traffic was only limited to the same AP (as it used to be in Autonomous code).  This was fixed in IIRC.

Forward-Upstream - forces all traffic up to the router.  This stops all comms across the APs and enables the use of ACLs to determine what's allowed between clients.

Featured Post

Building an interactive eFuture classroom

Watch and learn how ATEN provided a total control system solution including seamless switching matrix switch, HDBaseT extenders, PDU, lighting control to build an interactive eFuture classroom.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This program is used to assist in finding and resolving common problems with wireless connections.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question