The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
FlexConnect ACLs
An access control list (ACL) is a set of rules used to limit access to a particular interface (for example, if you want to restrict a wireless client from pinging the management interface of the controller). ACLs enable access control of network traffic. After ACLs are configured on the controller, you can apply them to the management interface, the AP-Manager interface, any of the dynamic interfaces, or a WLAN. ACLs enable you to control data traffic to and from wireless clients or to the controller CPU.You can configure ACLs on FlexConnect access points to enable effective usage and access control of locally switched data traffic on an access point.
The FlexConnect ACLs can be applied to VLAN interfaces on access points in both the Ingress and Egress mode.
Existing interfaces on an access point can be mapped to ACLs. The interfaces can be created by configuring a WLAN-VLAN mapping on a FlexConnect access point.
The FlexConnect ACLs can be applied to an access point’s VLAN only if VLAN support is enabled on the FlexConnect access point.
To set up location authentication, see the FlexConnect chapter of the Enterprise Mobility Design Guide.
FlexConnect ACLs can be applied only to FlexConnect access points. The configurations applied are per AP and per VLAN.
FlexConnect ACLs are supported on the native VLAN.
![]() Note | FlexConnect ACLs are not supported on native VLAN when setting comes from FlexConnect Group. |
You can configure up to 512 ACLs on a Cisco Wireless Controller. Each rule has parameters that affect its action. When a packet matches all the parameters pertaining to a rule, the action set pertaining to that rule is applied to the packet.
You can define 64 IPv4 address based rules in each ACL.
Non-FlexConnect ACLs that are configured on the controller cannot be applied to a FlexConnect AP.
FlexConnect ACLs do not support direction per rule. Unlike normal ACLs, Flexconnect ACLs cannot be configured with a direction. An ACL as a whole needs to be applied to an interface as ingress or egress.
ACLs in your network might have to be modified because Control and Provisioning of Wireless Access Points (CAPWAP) use ports that are different from the ones used by the Lightweight Access Point Protocol (LWAPP).
All ACLs have an implicit deny all rule as the last rule. If a packet does not match any of the rules, it is dropped by the corresponding access point.
ACLs mapping on the VLANs that are created on an AP using WLAN-VLAN mapping, should be performed on a per-AP basis only. VLANs can be created on a FlexConnect group for AAA override. These VLANs will not have any mapping for a WLAN.
ACLs for VLANs that are created on a FlexConnect group should be mapped only on the FlexConnect group. If the same VLAN is present on the corresponding AP as well as the FlexConnect group, AP VLAN will take priority. This means that if no ACL is mapped on the AP, the VLAN will not have any ACL, even if the ACL is mapped to the VLAN on the FlexConnect group.
Ensure the FlexConnect ACL and the regular ACL names are not the same while configuring a WLAN for FlexConnect local switching.
AAA client ACL support:
Before the AAA sends the client ACL, ensure that the ACL is created on a FlexConnect group or an AP. The ACL is not downloaded to the AP dynamically when the client gets associated with the AP.
A maximum of 96 ACLs can be configured on an AP. Each ACL can have a maximum of 64 rules.
FlexConnect ACLs do not have directions. The entire ACL is applied as ingress or egress.
The ACL returned by the AAA is applied on both ingress and egress on the 802.11 side of the client.
![]() Note | A Local Switching WLAN is configured and ACL is mapped to a FlexConnect group with an ACL. The ACL has set of 'deny and permit' rules. When you associate a client to the WLAN, the client needs to have DHCP permit rule added for getting the IP address. |
Use the following commands on the controller to configure FlexConnect ACLs:
Create or delete an ACL on a FlexConnect access point by entering this command:
config flexconnect acl {create | delete } name
The IPv4 ACL name of up to 32 characters is supported.
Associate a FlexConnect ACL to a WLAN.
Configure an IP address based rule for an ACL
[Optional] Add a VLAN on a FlexConnect access point by entering this command:
config ap flexconnect vlan add acl vlan-id ingress-aclname egress-acl-name ap-name
Use the following commands on the controller to view information related to FlexConnect ACLs:
show flexconnect acl summary—Displays a summary of the ACLs.
show client detail mac-address—Displays AAA override ACL.
show flexconnect acl detailed acl-name—Displays the detailed information about the ACL.
debug flexconnect acl {enable | disable}—Enables or disables the debugging of FlexConnect ACL.
AAA Overrides for FlexConnect
The Allow Authentication, Authorization, Accouting (AAA) Override option of a WLAN enables you to configure the WLAN for authentication. It enables you to apply VLAN tagging, QoS, and ACLs to individual clients based on the returned RADIUS attributes from the AAA server.
AAA overrides for FlexConnect access points introduce a dynamic VLAN assignment for locally switched clients. AAA overrides for FlexConnect also support fast roaming (Opportunistic Key Caching [OKC]/ Cisco Centralized Key management [CCKM]) of overridden clients.
VLAN overrides for FlexConnect are applicable for both centrally and locally authenticated clients. VLANs can be configured on FlexConnect groups.
If a VLAN on the AP is configured using the WLAN-VLAN, the AP configuration of the corresponding ACL is applied. If the VLAN is configured using the FlexConnect group, the corresponding ACL configured on the FlexConnect group is applied. If the same VLAN is configured on the FlexConnect group and also on the AP, the AP configuration, with its ACL takes precedence. If there is no slot for a new VLAN from the WLAN-VLAN mapping, the latest configured FlexConnect group VLAN is replaced.
If the VLAN that was returned from the AAA is not present on the AP, the client falls back to the default VLAN configured for the WLAN.
Before configuring a AAA override, the VLAN must be created on the access points. These VLANs can be created by using the existing WLAN-VLAN mappings on the access points, or by using the FlexConnect group VLAN-ACL mappings.
AAA Override for IPv6 ACLs
In order to support centralized access control through a centralized AAA server such as the Cisco Identity Services Engine (ISE) or ACS, the IPv6 ACL can be provisioned on a per-client basis using AAA Override attributes. In order to use this feature, the IPv6 ACL must be configured on the controller and the WLAN must be configured with the AAA Override feature enabled. The AAA attribute for an IPv6 ACL is Airespace-IPv6-ACL-Name similar to the Airespace-ACL-Name attribute used for provisioning an IPv4-based ACL. The AAA attribute-returned contents should be a string that is equal to the name of the IPv6 ACL as configured on the controller.
AAA Overrides of Bidirectional Rate Limiting on an AP and Controller
Upstream/Downstream | Local Mode | FlexConnect Central Switching | FlexConnect Local Switching | FlexConnect Standalone |
---|---|---|---|---|
Per-Client Downstream | Controller | Controller | AP | AP |
Per-Client Upstream | AP | AP | AP | AP |
AAA | QoS Profile of AAA | WLAN | QoS Profile of WLAN | Applied to Client |
---|---|---|---|---|
100 Kbps | 200 Kbps | 300 Kbps | 400 Kbps | 100 Kbps |
X | — | — | — | 200 Kbps |
X | X | — | — | 300 Kbps |
X | X | X | — | 400 Kbps |
X | X | X | X | Unlimited |
Before configuring a AAA override, VLANs must be created on the access points. These VLANs can be created by using the existing WLAN-VLAN mappings on the access points, or by using the FlexConnect group VLAN-ACL mappings.
At any given point, an AP has a maximum of 16 VLANs. First, the VLANs are selected as per the AP configuration (WLAN-VLAN), and then the remaining VLANs are pushed from the FlexConnect group in the order that they are configured or displayed in the FlexConnect group. If the VLAN slots are full, an error message is displayed.
VLAN, ACL, QoS, Rate limiting are supported with local and central switching WLAN.
Dynamic VLAN assignment is not supported for web authentication from a controller with Access Control Server (ACS).
AAA override of bidirectional rate limiting on an AP and the controller is supported on all the following 802.11n nonmesh access points:
If bidirectional rate limiting is not present, AAA override cannot occur.
The ISE server is supported.
The upstream rate limit parameter is equal to the downstream parameter, from AAA override.
Local authentication is not supported.
To configure VLAN overrides on a FlexConnect access point, use the following command:
config ap flexconnect vlan add vlan-id acl ingress-acl egress-acl ap_name