<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: how to block local access guest-portal in ExtremeWireless (Identifi)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-identifi/how-to-block-local-access-guest-portal/m-p/35751#M1668</link>
    <description>Hi Mohhamed , &lt;BR /&gt;
another method would be to bring your DMZ to the second port of your Wireless Controller (even if its Virtual 2110 controller , you just assign in in your ESXi server) . Then assign this Topology as Default Topology on your Guest WLAN Service . By doing that you physically separating your Corporate network from the Guest access .</description>
    <pubDate>Fri, 10 Jul 2015 19:07:00 GMT</pubDate>
    <dc:creator>Ostrovsky__Yury</dc:creator>
    <dc:date>2015-07-10T19:07:00Z</dc:date>
    <item>
      <title>how to block local access guest-portal</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-identifi/how-to-block-local-access-guest-portal/m-p/35747#M1664</link>
      <description>Hi,&lt;BR /&gt;
             We are using v2100 identify controller. We create captive portal its using our Guest.&lt;BR /&gt;
once the Guest is connected the portal he can access my internal network also. any option to block  my internal  network. i need Guest only use internet.</description>
      <pubDate>Fri, 10 Jul 2015 10:57:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-identifi/how-to-block-local-access-guest-portal/m-p/35747#M1664</guid>
      <dc:creator>Mohammed_Jashee</dc:creator>
      <dc:date>2015-07-10T10:57:00Z</dc:date>
    </item>
    <item>
      <title>RE: how to block local access guest-portal</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-identifi/how-to-block-local-access-guest-portal/m-p/35748#M1665</link>
      <description>Hi Mohammed,&lt;BR /&gt;
&lt;BR /&gt;
we have two separate SSIDs for internal and guest and both have separate VLANs. The VLAN/SSID with the guest user is not routed to our internal net.&lt;BR /&gt;
&lt;BR /&gt;
Additional: you can use the policy rules (VNS Configuration on the Controller) to deny or allow traffic to/from the Networks.&lt;BR /&gt;
&lt;BR /&gt;
Regards, Ralf&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Fri, 10 Jul 2015 11:05:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-identifi/how-to-block-local-access-guest-portal/m-p/35748#M1665</guid>
      <dc:creator>Ralf</dc:creator>
      <dc:date>2015-07-10T11:05:00Z</dc:date>
    </item>
    <item>
      <title>RE: how to block local access guest-portal</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-identifi/how-to-block-local-access-guest-portal/m-p/35749#M1666</link>
      <description>Jasheer,&lt;BR /&gt;
&lt;BR /&gt;
Follow the below links for configuration&lt;BR /&gt;
&lt;A href="https://www.youtube.com/watch?v=xQFVE3o5W6I" target="_blank" rel="nofollow noreferrer noopener"&gt;https://www.youtube.com/watch?v=xQFVE3o5W6I&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
To block your internal networks you have to make sure your guest's authenticated roles are:&lt;BR /&gt;
1. Setup rules to block internal subnet or&lt;BR /&gt;
2. Contain to VLAN&lt;BR /&gt;
&lt;BR /&gt;
Regards&lt;BR /&gt;
Karthikeyan M.</description>
      <pubDate>Fri, 10 Jul 2015 11:21:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-identifi/how-to-block-local-access-guest-portal/m-p/35749#M1666</guid>
      <dc:creator>Mohanakrishnan_</dc:creator>
      <dc:date>2015-07-10T11:21:00Z</dc:date>
    </item>
    <item>
      <title>RE: how to block local access guest-portal</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-identifi/how-to-block-local-access-guest-portal/m-p/35750#M1667</link>
      <description>Nice call out Karhikeyan.&lt;BR /&gt;
&lt;BR /&gt;
We're in the process of migrating these Videos to GTAC Knowledge and in the near future, starting to release some new ones.  Our Community Manager, Drew C. and a colleague are busy prepping them now.&lt;BR /&gt;
&lt;BR /&gt;
We believe this will make them easier to find going forward for those who believe in a little purple in their network!</description>
      <pubDate>Fri, 10 Jul 2015 11:21:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-identifi/how-to-block-local-access-guest-portal/m-p/35750#M1667</guid>
      <dc:creator>Ryan_Mathews</dc:creator>
      <dc:date>2015-07-10T11:21:00Z</dc:date>
    </item>
    <item>
      <title>RE: how to block local access guest-portal</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-identifi/how-to-block-local-access-guest-portal/m-p/35751#M1668</link>
      <description>Hi Mohhamed , &lt;BR /&gt;
another method would be to bring your DMZ to the second port of your Wireless Controller (even if its Virtual 2110 controller , you just assign in in your ESXi server) . Then assign this Topology as Default Topology on your Guest WLAN Service . By doing that you physically separating your Corporate network from the Guest access .</description>
      <pubDate>Fri, 10 Jul 2015 19:07:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-identifi/how-to-block-local-access-guest-portal/m-p/35751#M1668</guid>
      <dc:creator>Ostrovsky__Yury</dc:creator>
      <dc:date>2015-07-10T19:07:00Z</dc:date>
    </item>
  </channel>
</rss>

