Layer 3 access
A Layer 3 access is a wireless controller deployment mode that
-
terminates wireless client subnets directly on the controller
-
supports Layer 3 routing functions such as OSPFv2 and PIM-SM, and
-
enables client subnet segmentation, overlapping IP support, and a scalable network design.
Starting from Cisco IOS XE 17.13.1, the Cisco Catalyst 9800 series wireless controller platforms can be deployed as a Layer 3 (L3) network to perform routing functions.
In Cisco IOS XE 17.12.x and earlier releases, these platforms are deployed as Layer 2 network elements. In these deployments, wireless client subnets are terminated at an upstream network element. Upstream refers to the direction in which data is transferred from clients to a server. The controller forwards traffic based on the MAC address of the clients.
The L3 access feature terminates wireless client subnets in the controller and supports Layer 3 forwarding for wireless client traffic. When L3 is enabled on a specific SSID, the client VLAN of that SSID is terminated at the controller. In this scenario, the wireless controller forwards traffic based on the network layer (IP) address.
This enables:
-
Segmentation and client overlapping IP address support using VRF.
-
Flexible network design and faster convergence.
-
Consistency in network design.
-
Scalability for upstream switches and routers.
The core focus is seamless integration of OSPF and multicast routing. This transition empowers wireless networks to respond dynamically to changing business requirements, ensuring optimal performance and agility in dynamic networking environments.
Restrictions for Layer 3 access
-
By default, the L3 access is disabled on a WLAN.
-
Only N+1 redundancy is supported with L3 access.
-
You cannot configure multiple IP addresses in an SVI.
-
High Availability SSO is not supported in L3 WLANs.
-
In mixed mode (L2 and L3 WLANs), HA SSO with Loopback as WMI is not supported.
-
The ip radius source-interface vrf global command is not supported.
-
These NAT CLIs are not supported in Cisco IOS XE 17.13.1:
show ip nat aggregationshow ip nat bpashow ip nat hashow ip nat limitsshow ip nat mapshow ip nat platformshow ip nat poolshow ip nat portblockshow ip nat redundancyshow ip nat route-diashow ip nat translationsclear ip nat translations -
Multicast stream is not supported with VRF.
-
Client IPv6 is not supported. The controller or AP cannot have IPv6 addresses.
Use cases for Layer 3 access
Layer 3 access support
-
Segmentation and client overlapping IP address support.
-
Flexible and optimized network design using L3 access.
Network Address Translation (NAT) support
-
Translating client traffic in the guest network to reach the corporate services (For instance, Cisco ISE).
-
Hiding the private IP addresses of clients from outside networks.
![]() Note |
Only NAT with IPv4 to IPv4 translation is supported in Cisco IOS XE 17.13.1. |
Enable Layer 3 access on policy profile (GUI)
Procedure
|
Step 1 |
Choose . |
|
Step 2 |
Select a policy profile and in the Edit Policy Profile window, go to the advanced policy profile properties. |
|
Step 3 |
Under the Advanced tab, enable L3 Access on the policy profile so that client traffic on a WLAN that has this policy can benefit from Layer 3 forwarding. |
|
Step 4 |
Click Apply to Device. |
Enable Layer 3 access on policy profile (CLI)
Procedure
|
Step 1 |
Enter the global configuration mode. Example:
|
|
Step 2 |
Configure a wireless policy profile. Example:
|
|
Step 3 |
Disable the wireless policy profile. Example:
|
|
Step 4 |
Enable L3 access in the wireless policy profile. Example:
|
|
Step 5 |
Enable the wireless policy profile. Example:
|
Configure a client gateway (GUI)
Procedure
|
Step 1 |
Choose and select the SVI tab. |
|
Step 2 |
Click an SVI interface. On the General tab of the Edit SVI window, select a VRF from the drop-down list to associate it with the SVI interface. |
|
Step 3 |
Enable the Autostate Disable to keep the SVI up, even when all ports on the VLAN are down. |
|
Step 4 |
Click Save & Apply to Device. |
Configure a client gateway (CLI)
Procedure
|
Step 1 |
Enter the global configuration mode. Example:
|
|
Step 2 |
Specify an interface and enter the interface configuration mode. Example:
|
|
Step 3 |
Activate multiprotocol VRF in an interface. Example:
|
|
Step 4 |
Define the IP address for the VRF. Example:
|
|
Step 5 |
Configure SVI to ensure that SVI is up even if the VLAN is not switched out. Example:
|
|
Step 6 |
Exit the interface configuration mode and enter the global configuration mode. Example:
|
Enable internal DHCP with VRF (CLI)
Procedure
|
Step 1 |
Enter the global configuration mode. Example:
|
|
Step 2 |
Configure WLAN policy profile and enter the wireless policy configuration mode. Example:
|
|
Step 3 |
Add a description for the policy profile and configure AAA policy override. Example:
|
|
Step 4 |
Enable DHCP Option 82 for the wireless clients and enable VRF on DHCP Option 82. Example:
|
|
Step 5 |
Configure the WLAN's IPv4 DHCP server IP address and VRF name. Example:
|
|
Step 6 |
Disable the wireless policy profile and enable L3 access in the wireless policy profile. Example:
|
|
Step 7 |
Configure Network Access Control in the policy profile. Example:
|
|
Step 8 |
Map the VLAN to a policy profile. Example:
If vlan-id is not specified, the default native vlan 1 is applied. The valid range for vlan-id is 1 to 4096. |
|
Step 9 |
Enable the wireless policy profile. Example:
|
Verify internal DHCP with VRF details
To verify the internal DHCP details, use this command:
Device# show run int Vlan55
Building configuration...
Current configuration : 290 bytes
!
interface Vlan55
vrf forwarding sample_guest
ip address 55.55.55.2 255.255.255.0
no ip proxy-arp
ip nat inside
ip cef accounting non-recursive external
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 cisco123
no autostate
no mop enabled
no mop sysid
end
To verify the NAT datapath statistics, use this command:
Device# show run int Loopback1
Building configuration...
Current configuration : 90 bytes
!
interface Loopback1
vrf forwarding sample_guest
ip address 7.7.7.1 255.255.255.0
end
ip dhcp pool l3_sample_guest
vrf sample_guest
network 55.55.55.0 255.255.255.0
default-router 55.55.55.2
To verify the IP entries from database, use this command:
Device# show wireless device-tracking database ip
IP ZONE/VRF-TABLE-ID STATE DISCOVERY MAC VRF-NAME
55.55.55.2 0x00000003 Reachable Local 001e.bd11.a0ff
55.55.55.6 0x00000003 Reachable IPv4 DHCP 58a0.239b.d25f sample_guest
Verify Layer 3 access details
To verify whether Layer 3 access is enabled for a specific policy profile, use this command:
Device# show wireless profile policy detailed default-policy-profile
Policy Profile Name : default-policy-profile
Description : default policy profile
Status : ENABLED
VLAN : 20
.
.
.
L3 Forwarding :ENABLED
To view whether the Layer 3 access is enabled under policy profile, use this command:
Device# show wireless profile policy all
Policy Profile Name : default-policy-profile
Description : default policy profile
Status : ENABLED
VLAN : 20
.
.
.
L3 Forwarding :ENABLED
To verify the client information, use this command:
Device# show wireless client mac-address <mac-address> detail
Client MAC Address : a886.ddb2.05e9
.
.
.
L3 Forwarding: Enabled
To verify the client gateway details, use this command:
Device# show wireless client mac-address 0024.d742.46e4 detail | inc Gateway
.
.
.
Client Gateway IPv4 Address : 117.117.117.1
![]() Note |
The client gateway is displayed only if the client performs DHCP. If the client learns IP using static or ARP, the client gateway will not be displayed. |

Feedback