<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Question about setting up the internal firewall in Aerohive Migrated Content</title>
    <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/question-about-setting-up-the-internal-firewall/m-p/62355#M1352</link>
    <description>&lt;P&gt;We have 2 AP230's, running in a separate subnet (192.168.23.*).&lt;/P&gt;&lt;P&gt;This subnet has full access to our wired network (192.168.11.*). Our Cisco firewall is configured to make this work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This way, clients connected through WiFi can connect to our server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In Hivemanager we have a separate Guests user profile set in Network Policies (Apply a different user profile to various clients and user groups.) This profile is using the Guest-Internet-Access-Only Firewall rules (no idea if this is a default)&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="1382947d3a3b400c9ab21d1db26086dd_0690c000006GbD2AAK.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/3081i1D522B08E6F4788F/image-size/large?v=v2&amp;amp;px=999" role="button" title="1382947d3a3b400c9ab21d1db26086dd_0690c000006GbD2AAK.png" alt="1382947d3a3b400c9ab21d1db26086dd_0690c000006GbD2AAK.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As far as I understand, it basically only allows DHCP and DNS traffic between the networks and denies everything else.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My challenge is the following. We have a new presentation screen that allows wireless connections through the WiFi. But it also must connect to our servers.&lt;/P&gt;&lt;P&gt;I have both AP's connected to a switch (that is connected to the 192.168.23.* range). I was thinking about plugging the new screen into that switch, giving it access to our 192.168.11.* range.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And in Hivemanager I want to open up the ports needed, so that guest WiFi users can connect to the screen (it looks like this is not possible at the moment).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the best way to open up the following ports? Should I create an application with the rules? &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG src="sfdc://0690c000006GbD7AAK" alt="MirrorOp_ports_Leddura_2Share" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help is well appreciated&lt;/P&gt;</description>
    <pubDate>Tue, 27 Nov 2018 18:28:55 GMT</pubDate>
    <dc:creator>beheer1</dc:creator>
    <dc:date>2018-11-27T18:28:55Z</dc:date>
    <item>
      <title>Question about setting up the internal firewall</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/question-about-setting-up-the-internal-firewall/m-p/62355#M1352</link>
      <description>&lt;P&gt;We have 2 AP230's, running in a separate subnet (192.168.23.*).&lt;/P&gt;&lt;P&gt;This subnet has full access to our wired network (192.168.11.*). Our Cisco firewall is configured to make this work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This way, clients connected through WiFi can connect to our server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In Hivemanager we have a separate Guests user profile set in Network Policies (Apply a different user profile to various clients and user groups.) This profile is using the Guest-Internet-Access-Only Firewall rules (no idea if this is a default)&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="1382947d3a3b400c9ab21d1db26086dd_0690c000006GbD2AAK.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/3081i1D522B08E6F4788F/image-size/large?v=v2&amp;amp;px=999" role="button" title="1382947d3a3b400c9ab21d1db26086dd_0690c000006GbD2AAK.png" alt="1382947d3a3b400c9ab21d1db26086dd_0690c000006GbD2AAK.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As far as I understand, it basically only allows DHCP and DNS traffic between the networks and denies everything else.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My challenge is the following. We have a new presentation screen that allows wireless connections through the WiFi. But it also must connect to our servers.&lt;/P&gt;&lt;P&gt;I have both AP's connected to a switch (that is connected to the 192.168.23.* range). I was thinking about plugging the new screen into that switch, giving it access to our 192.168.11.* range.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And in Hivemanager I want to open up the ports needed, so that guest WiFi users can connect to the screen (it looks like this is not possible at the moment).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the best way to open up the following ports? Should I create an application with the rules? &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG src="sfdc://0690c000006GbD7AAK" alt="MirrorOp_ports_Leddura_2Share" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help is well appreciated&lt;/P&gt;</description>
      <pubDate>Tue, 27 Nov 2018 18:28:55 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/question-about-setting-up-the-internal-firewall/m-p/62355#M1352</guid>
      <dc:creator>beheer1</dc:creator>
      <dc:date>2018-11-27T18:28:55Z</dc:date>
    </item>
    <item>
      <title>Re: Question about setting up the internal firewall</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/question-about-setting-up-the-internal-firewall/m-p/62356#M1353</link>
      <description>&lt;P&gt;Hello, unless you are using one of our routers, we wouldn't affect ports one way or the other via the AP's configurations. Instead this would be determined by a router or firewall/content filter further upstream from the AP, before the default gateway. &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Guest-Internet-Access-Only firewall is indeed a default object. This will block guest users from connecting to anything in the 10.*.*.*, 172.16.*.*, and 192.168.*.* IP scopes. So, in your use case here, if the presentation screen is using an address from the 192.168.11.* range, the wireless clients on the guest network would not be able to access that screen per the IP firewall rules you have set up on the AP. Users on your internal wireless SSID that are not using this IP firewall policy should be able to reach the presentation screen as far as the APs are concerned. &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you'd like to keep using most of the settings in the Guest-Internet-Access-Only firewall, you could clone it by going to Common Objects, then add a rule below DNS but above the first IP scope denial rule, and add a rule that allows traffic to the IP of the presentation screen. The IP Firewall rules are applied in top down order, so the rule to allow traffic to that IP address will be applied before the rule to deny traffic to the 192.168.*.* will be applied. All other internal traffic will still be denied. &lt;/P&gt;</description>
      <pubDate>Tue, 27 Nov 2018 23:45:02 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/question-about-setting-up-the-internal-firewall/m-p/62356#M1353</guid>
      <dc:creator>samantha_lynn</dc:creator>
      <dc:date>2018-11-27T23:45:02Z</dc:date>
    </item>
    <item>
      <title>Re: Question about setting up the internal firewall</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/question-about-setting-up-the-internal-firewall/m-p/62357#M1354</link>
      <description>&lt;P&gt;Thank you for your reply Sam, I think it is all clear.&lt;/P&gt;&lt;P&gt;So if I add the following rule, all traffic from the guest internet, should only be allowed to our presentatioscreen (and nowhere else).&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="6dfe35cdf7cf4840b4cdbd3e5d74955b_0690c000006GbfpAAC.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/3058i790D77C868313400/image-size/large?v=v2&amp;amp;px=999" role="button" title="6dfe35cdf7cf4840b4cdbd3e5d74955b_0690c000006GbfpAAC.png" alt="6dfe35cdf7cf4840b4cdbd3e5d74955b_0690c000006GbfpAAC.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Nov 2018 23:58:29 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/question-about-setting-up-the-internal-firewall/m-p/62357#M1354</guid>
      <dc:creator>beheer1</dc:creator>
      <dc:date>2018-11-27T23:58:29Z</dc:date>
    </item>
    <item>
      <title>Re: Question about setting up the internal firewall</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/question-about-setting-up-the-internal-firewall/m-p/62358#M1355</link>
      <description>&lt;P&gt;You got it! That should limit guest users to only that single internal address and a normal internet connection. &lt;/P&gt;</description>
      <pubDate>Wed, 28 Nov 2018 00:04:20 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/question-about-setting-up-the-internal-firewall/m-p/62358#M1355</guid>
      <dc:creator>samantha_lynn</dc:creator>
      <dc:date>2018-11-28T00:04:20Z</dc:date>
    </item>
    <item>
      <title>Re: Question about setting up the internal firewall</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/question-about-setting-up-the-internal-firewall/m-p/62359#M1356</link>
      <description>&lt;P&gt;Awesome, that saves me adding exception rules per port. Thanks for the help.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Nov 2018 00:07:49 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/question-about-setting-up-the-internal-firewall/m-p/62359#M1356</guid>
      <dc:creator>beheer1</dc:creator>
      <dc:date>2018-11-28T00:07:49Z</dc:date>
    </item>
  </channel>
</rss>

