DNS-based access control lists
A DNS-based access control list is a wireless network security feature that
-
allows administrators to permit or deny wireless client access to resources based on DNS domain names
-
dynamically learns allowed or denied IP addresses through DNS snooping on access points, and
-
enables pre-authentication and post-authentication URL filtering for enhanced client security.
DNS-based ACLs are used for wireless client devices. You can set pre-authentication ACLs on the embedded wireless controller to determine which data requests are allowed or blocked.
To enable DNS-based ACLs on the embedded wireless controller, configure the allowed or denied URLs for the ACLs. The URLs need to be pre-configured on the ACL.
During the registration phase, DNS-based ACLs allow the client to connect to the configured URLs. The embedded wireless controller is configured with the ACL name provided by the AAA server. If the AAA server returns the ACL name, the controller applies the ACL to the client for web redirection.
During client authentication, the AAA server returns the pre-authentication ACL (url-redirect-acl), which is the attribute name assigned to the ACL by the AAA server. The AP performs DNS snooping for each client until registration is complete and the client reaches the SUPPLICANT PROVISIONING state. When the embedded wireless controller receives the ACL configured with URLs, it sends a CAPWAP payload to the access point to enable DNS snooping for those URLs.
When URL snooping is enabled, the access point learns the IP address of the resolved domain name from the DNS response. If the domain name matches a configured URL, the access point parses the DNS response for the IP address. The AP adds the IP address to the allowed list, which allows the client to access the configured URLs.
During pre-authentication or post-authentication, the DNS ACL is applied to the client in the AP. If the client roams from one AP to another AP, tthe DNS-learned IP addresses from the previous access point remain valid on the new AP.
This feature supports:
-
A maximum of 32 URL lists.
-
A maximum of 32 URLs per URL list.
-
Up to 30 IP addresses per URL.
-
A maximum of 16 URL lists with wild cards.
-
A maximum of 10 URLs per wild-card URL.
![]() Note |
When configuring wild card based URLs, generic wild-card URLs are not allowed. Wild cards cannot be present within the domain name, and multiple wild cards are not allowed in a single URL. Wild card specification in a URL is only allowed at the third-degree level or higher. |
![]() Note |
Conflicting or invalid configurations are not allowed. The same URL cannot have different actions. For example, Deny and Allow cannot be configured on www.yahoo.com . |
![]() Note |
Attach the URL filter to a policy profile for local mode. In FlexConnect mode, attach the URL filter to the flex profile; attaching it to a policy profile is not required. |
![]() Note |
DNS-based URLs require an active DNS query from the client. For URL filtering to work, configure DNS settings correctly. |
![]() Note |
The URL filter takes precedence over punt or redirect ACLs, as well as custom or static pre-authentication ACLs. |
FlexConnect in Embedded Wireless Controller
FlexConnect is a wireless solution for branch office and remote office deployments. It enables customers to configure and control access points in a branch or remote office from the corporate office through a wide area network (WAN) link without deploying a embedded wireless controller in each branch office.
The FlexConnect access points can switch client data traffic locally while carrying the authentication centrally. Also, FlexConnect APs perform client authentication locally when their connection to the controller is lost. When they are connected back to the controller, they can also send authentication/policy details back to the embedded wireless controller.
The embedded wireless controller network comprises of at least one 802.11ax Wave 2 Cisco Aironet Series access point (AP) with a software-based embedded wireless controller managing other APs in the network. The AP acting as the embedded wireless controller is referred to as the primary AP while the other APs in the network, which are managed by this primary AP, are referred to as subordinate APs. In addition to acting as an embedded wireless controller, the primary AP also operates as an AP to serve clients along with the subordinate APs.
Pre-Auth DNS ACL feature is also known as Walled Garden feature. The walled garden is a list of web sites or domains that you can visit without being authenticated. DNS snooping is performed on the AP for each client and configured rule is applied to client traffic after matching the Source or Destination IP.
Roaming
During Roaming, the support clients roam from one AP to the other using the existing roaming support. DNS ACLs are retained at the target AP even after roaming. For Roaming with DNS Pre-Auth ACL and Post-Auth ACL, the target AP learns the client-resolved IP from the serving AP.

Feedback