We have a Cisco wireless network that has both a secured WLAN that our employees use as well as a guest WLAN for visitors and vendors. The catch is that our guest WLAN is not content filtered but our secured WLAN that our employees use is. The problem we now have is that our employees have learned this and are connecting to the guest WLAN to get unsecured access.
We have a Cisco ACS server that we put all our employees' PCs MAC addresses in to grant them wireless access. Is there any way we can do the reverse?
Basically, we want to somehow restrict those whose MAC is listed in the ACS server from being able to use the Guest wireless.
I was thinking we might could create an ACL that denied access on that Guest Wireless VLAN to those whose MAC is listed in the ACS but I have no idea where to begin.
Is this even possible and if so can you just point me in the right direction.
This is a growing issue at a lot of businesses. We are in the process of doing this same thing but using Juniper SSG 550 to make this happen. In our SSG we create a policy map to direct all traffic to our webwasher for inspection before leaving out envorionment.
What kind of filtering are you doing to employee's? What is doing the filtering?
We are pleased to announce availability of Beta software for 16.6.3. 16.6.3 will be the second rebuild on the 16.6 release train targeted towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are looking for early feedback from custome...