WLC - ACL

WLC regular ACL

1. The regular ACL is applied on dynamic interface, with ISE authorization,  a new ACL can overwrite interface ACL and applies on client session.

2. Controller ACLs cannot block virtual IP address, and hence DHCP packets for wireless clients.

3. ACL do not affect broadcast or Multicast traffic, so DHCP is not blocked.

4. ACL has direction from the standpoint of WLC. So for permit access, needs one inbound rule and one outbound rule.

5. ACL is created on WLC, ISE  authorization profile only applies Airespace ACL Name to wireless client session.

6. ACL applies to wireless client session only when AP works in local mode or Flexconnect mode with central switching, in these setup, all user data are sent to WLC via CAPWAP tunnel, then from WLC are sent to wire world.



WLC FlexConnect ACL

1. FlexConnect ACL is used when AP is in FlexConnect mode and WLAN is on Local Switching mode, in this case, client data traffic are not sent to WLC, instead, switching locally.

2. On FlexConnect AP, each local switching WLAN are mapped to a VLAN, Native VLAN is used by the management interface.

3. FlexConnect ACL can be a applied at AP level or AP FlexConnect Group level, so it is VLAN based, compare to regular ACL which can be role based.

4. Wireless > FlexConnect Group > "Group Name" > ACL Mapping > AAA VLAN-ACL mapping
ACL is applied on AP wired interface, so Ingress is from wired to wireless, Egress is from wireless to wired.


https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/212481-configure-flexconnect-acl-s-on-wlc.html


Comments

Popular posts from this blog

ASA IKEv1 VPN troubleshooting Steps and Tips

Firepower 2100/1100 FTD/ASA initial setup, reimage, upgrade.

Firepower FMC and FTD troubleshooting