<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Change config of RFS6000 in ExtremeWireless (WiNG)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53410#M3219</link>
    <description>The ABCEmployees ACL has the entry:&lt;BR /&gt;
 permit ip 192.168.0.0/24 host 10.0.70.9 rule-precedence 140 &lt;BR /&gt;
&lt;BR /&gt;
This specifies that traffic is permitted if:  It's ANY type protocol, originating from a device on the 192.168.0.0/24 subnet, and is destined for the single host address 10.0.70.9.&lt;BR /&gt;
&lt;BR /&gt;
Than again...the ABCEmployees ACL also has several other 'permit' statements that are not contained in the 2018 version ACL.  The 2018 ACL is structured such that the only traffic allowed is:&lt;BR /&gt;
- UDP traffic from any IP address, destined to ANY IP address as long as the destination is port range 67-68.  So this is so clients can get their DHCP lease.&lt;BR /&gt;
  &lt;BR /&gt;
- UDP traffic from any IP address, destined to ANY IP address as long as the destination is port equals "dns"  (in this case, dns is a built in alias that equals port 53&lt;BR /&gt;
&lt;BR /&gt;
- DENY traffic from ANY IP address that is destined to the 10.0.70.0/23 subnet&lt;BR /&gt;
&lt;BR /&gt;
So I'm assuming that the WLANs that have the 2018 ACL applied to it (These below) are correct - that wireless users on those ESSIDs should NOT be able to communicate with the 10.0.70.0/23 subnet.&lt;BR /&gt;
&lt;BR /&gt;
  wlan 3&lt;BR /&gt;
  description Employee Wireless&lt;BR /&gt;
  ssid ABC_Employee&lt;BR /&gt;
  vlan 100&lt;BR /&gt;
&lt;BR /&gt;
   &lt;BR /&gt;
&lt;BR /&gt;
  wlan 5&lt;BR /&gt;
  description Guest Network&lt;BR /&gt;
  ssid ABC_Visitor&lt;BR /&gt;
  vlan 100&lt;BR /&gt;
&lt;BR /&gt;
   &lt;BR /&gt;
&lt;BR /&gt;
   &lt;BR /&gt;
&lt;BR /&gt;
  wlan test2&lt;BR /&gt;
  shutdown&lt;BR /&gt;
  ssid test2&lt;BR /&gt;
  vlan 100&lt;BR /&gt;
&lt;BR /&gt;
  &lt;BR /&gt;
If you also want this sort of restriction applied to the Corporate Wireless, you can simply make the configuration change.&lt;BR /&gt;
 - Go into wlan1 and issue the statement to 'use ip-access-list in ABCEmployee2018'&lt;BR /&gt;
(Can also be done in the GUI, in the WLAN, look in the center column for the "Firewall" section.  Use the drop-down selector for the "Inbound Firewall Rules" option and choose the ABCEmployee2018 ACL)&lt;BR /&gt;
&lt;BR /&gt;
To allow DNS traffic in an ACL, you just need to have that same single statement in any ACL you 'use', which is:  &lt;BR /&gt;
&lt;B&gt;permit udp any any eq dns rule-precedence &lt;/B&gt;(appropriate precedence number) &lt;BR /&gt;
&lt;BR /&gt;
(TIP) name your WLANs the same as the SSID they use.  This makes it much easier when you are mapping them in the radio interfaces.  In that section, it only shows you the WLAN 'name' and not the actual SSID contained within that WLAN name...so you might find yourself asking...what SSID is wlan3 using? ...and you have to jump back over to the WLANs section to check and see.  If the WLAN name is the same as the SSID, this won't happen.&lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Fri, 14 Sep 2018 23:13:00 GMT</pubDate>
    <dc:creator>ckelly</dc:creator>
    <dc:date>2018-09-14T23:13:00Z</dc:date>
    <item>
      <title>Change config of RFS6000</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53391#M3200</link>
      <description>I need to change the DNS IP address in my config.  I can access the RFS6000 via IP address, web interface and see the running config.  How can I edit this?  Please advise.  Thank you!</description>
      <pubDate>Thu, 13 Sep 2018 21:08:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53391#M3200</guid>
      <dc:creator>DW76</dc:creator>
      <dc:date>2018-09-13T21:08:00Z</dc:date>
    </item>
    <item>
      <title>RE: Change config of RFS6000</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53392#M3201</link>
      <description>You can enter the name server addresses either in the controller profile itself or as a controller override.  In either case though, the actual CLI syntax you would use is:  ip name-server X.X.X.X&lt;BR /&gt;
&lt;BR /&gt;
Example, to enter an address as an override:&lt;BR /&gt;
1) Login&lt;BR /&gt;
2) enable&lt;BR /&gt;
3) self&lt;BR /&gt;
4) ip name-server 8.8.8.8&lt;BR /&gt;
5) commit write&lt;BR /&gt;
&lt;BR /&gt;
You can enter multiple DNS entries this way.&lt;BR /&gt;
&lt;BR /&gt;
From the UI:&lt;BR /&gt;
&lt;BR /&gt;
1) Configuration Tab&lt;BR /&gt;
2) Devices&lt;BR /&gt;
3) Select the RFS6000 &lt;BR /&gt;
4) In center column, expand "Profile Overrides"&lt;BR /&gt;
5) Expand "Network"&lt;BR /&gt;
6) Select DNS&lt;BR /&gt;
7) Over to the right, you should see where you can enter DNS server entries&lt;BR /&gt;
 Remember to "Commit and Save" in the top right corner when done</description>
      <pubDate>Thu, 13 Sep 2018 21:17:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53392#M3201</guid>
      <dc:creator>ckelly</dc:creator>
      <dc:date>2018-09-13T21:17:00Z</dc:date>
    </item>
    <item>
      <title>RE: Change config of RFS6000</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53393#M3202</link>
      <description>Thank you Chris--however when I browse to the network settings via UI, there are no existing DNS entries shown.  Does that make sense?  Tried accessing the device via CLI using Putty/SSH but the password I use to access via UI does not work there.  Not real familiar with this device as it was set up by a vendor.  Trying to avoid having to buy a 4 hour block of time for a 2 min change.  Any thoughts?  If I change in the UI, will it override the existing running config?</description>
      <pubDate>Thu, 13 Sep 2018 21:44:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53393#M3202</guid>
      <dc:creator>DW76</dc:creator>
      <dc:date>2018-09-13T21:44:00Z</dc:date>
    </item>
    <item>
      <title>RE: Change config of RFS6000</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53394#M3203</link>
      <description>Is it possible that there currently are no DNS entries that have been setup?&lt;BR /&gt;
&lt;BR /&gt;
Another possibility is that if there *are* DNS entries, they've been entered at the controller's Profile level.  In case you're not aware, the Profile settings are where you want to keep as many settings as possible.  The override section will *override* a setting that exist in the main Profile.  Normal use of the override section is for things like static IP addresses, hostnames, etc.  Things that are unique to a device...and therefore not appropriate to enter into a common Profile.&lt;BR /&gt;
&lt;BR /&gt;
In the UI, to get to the controller's Profile:&lt;BR /&gt;
1) Configuration&lt;BR /&gt;
2) Profiles&lt;BR /&gt;
3) Double-Click on the Profile that is assigned to your RFS6000&lt;BR /&gt;
4) Center column, expand Network and choose DNS.&lt;BR /&gt;
&lt;BR /&gt;
If you don't see any DNS entries there either, then it would seem that the controller does not have any DNS entries.  Does the controller need one?  Or....are you really looking to assign DNS entries for the adopted APs?&lt;BR /&gt;
&lt;BR /&gt;
Not sure why the password isn't working to access the CLI but works for the GUI.  Maybe the management profile is configured to disallow CLI access?</description>
      <pubDate>Thu, 13 Sep 2018 21:55:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53394#M3203</guid>
      <dc:creator>ckelly</dc:creator>
      <dc:date>2018-09-13T21:55:00Z</dc:date>
    </item>
    <item>
      <title>RE: Change config of RFS6000</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53395#M3204</link>
      <description>Hi,&lt;BR /&gt;
&lt;BR /&gt;
I've managed to make an SSH connection.  The following CLI shows the DNS entry:&lt;BR /&gt;
&lt;BR /&gt;
dhcp-server-policy default&lt;BR /&gt;
 dhcp-pool EmployeeGuest&lt;BR /&gt;
  network 192.168.0.0/24&lt;BR /&gt;
  address range 192.168.0.2 192.168.0.254 &lt;BR /&gt;
  default-router 192.168.0.1&lt;BR /&gt;
  dns-server  10.0.70.2&lt;BR /&gt;
&lt;BR /&gt;
Can you explain how I change this?  Will it require a restart or anything?  Thank you.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Fri, 14 Sep 2018 00:05:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53395#M3204</guid>
      <dc:creator>DW76</dc:creator>
      <dc:date>2018-09-14T00:05:00Z</dc:date>
    </item>
    <item>
      <title>RE: Change config of RFS6000</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53396#M3205</link>
      <description>Okay...so this is showing that you have a DHCP service created on the RFS6000.  But, it doesn't necessarily show that it's *used* (It is simply a policy that is created and *can* be used).&lt;BR /&gt;
&lt;BR /&gt;
If we assume though that this DHCP service Policy is used by the controller, then you can change the DNS entry this way.&lt;BR /&gt;
&lt;BR /&gt;
1) Log in&lt;BR /&gt;
2) enable&lt;BR /&gt;
3) config&lt;BR /&gt;
4) dhcp-server-policy default&lt;BR /&gt;
5) dhcp-pool EmployeeGuest&lt;BR /&gt;
6) no dns-server  (This gets rid of the existing entry)&lt;BR /&gt;
7) dns-server &lt;ENTER your="" new="" dns="" server="" ip=""&gt;&lt;BR /&gt;
 commit wr&lt;BR /&gt;
&lt;BR /&gt;
You can then verify things at the level you're at now (you are currently in the dhcp-pool settings).  Issue the command:  show context&lt;BR /&gt;
&lt;BR /&gt;
This will show you all of the settings that currently exist at the dhcp-pool level of the config.&lt;BR /&gt;
You can use that same command at any level so that you can see the current config settings for a section that you are in.  Very handy command.&lt;/ENTER&gt;</description>
      <pubDate>Fri, 14 Sep 2018 00:15:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53396#M3205</guid>
      <dc:creator>ckelly</dc:creator>
      <dc:date>2018-09-14T00:15:00Z</dc:date>
    </item>
    <item>
      <title>RE: Change config of RFS6000</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53397#M3206</link>
      <description>Thank you!  I will make these changes after hours this afternoon.  One other question, while examining the config, I notice this entry:  &lt;BR /&gt;
&lt;BR /&gt;
 use radius-server-policy default&lt;BR /&gt;
 interface me1&lt;BR /&gt;
  ip address 10.1.1.100/24&lt;BR /&gt;
&lt;BR /&gt;
Not sure what this is as we have no IP scheme in our network that is 10.1.1.x.  Any thoughts?</description>
      <pubDate>Fri, 14 Sep 2018 00:24:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53397#M3206</guid>
      <dc:creator>DW76</dc:creator>
      <dc:date>2018-09-14T00:24:00Z</dc:date>
    </item>
    <item>
      <title>RE: Change config of RFS6000</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53398#M3207</link>
      <description>The me1 interface is normally used for an out of band management port.  If you don't have any network cables plugged into it, then it's not accessible on the network, so no concerns there.</description>
      <pubDate>Fri, 14 Sep 2018 01:09:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53398#M3207</guid>
      <dc:creator>ckelly</dc:creator>
      <dc:date>2018-09-14T01:09:00Z</dc:date>
    </item>
    <item>
      <title>RE: Change config of RFS6000</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53399#M3208</link>
      <description>Hi again,&lt;BR /&gt;
An opportunity presented itself so I made the changes.  I'm able to verify that the DNS server IP has been changed for both startup and running configs--however wifi clients are not able to browse by URL, but the settings on my phone show the new DNS IP address.  Any thoughts--did I miss something?  I see this still exists in the config and it should be changed to the new IP.  Can you send syntax to change this:  &lt;BR /&gt;
&lt;BR /&gt;
permit ip 192.168.0.0/24 host 10.0.70.2 rule-precedence 140 &lt;BR /&gt;
&lt;BR /&gt;
As always, thanks again!</description>
      <pubDate>Fri, 14 Sep 2018 01:12:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53399#M3208</guid>
      <dc:creator>DW76</dc:creator>
      <dc:date>2018-09-14T01:12:00Z</dc:date>
    </item>
    <item>
      <title>RE: Change config of RFS6000</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53400#M3209</link>
      <description>Can you also include the parent level of this entry?  I can't tell exactly where this rule originates</description>
      <pubDate>Fri, 14 Sep 2018 01:21:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53400#M3209</guid>
      <dc:creator>ckelly</dc:creator>
      <dc:date>2018-09-14T01:21:00Z</dc:date>
    </item>
    <item>
      <title>RE: Change config of RFS6000</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53401#M3210</link>
      <description>ip access-list ABCEmployee2018&lt;BR /&gt;
 permit udp any range 67 68 any range 67 68 rule-precedence 1 &lt;BR /&gt;
 permit udp any any eq dns rule-precedence 2 &lt;BR /&gt;
 deny ip any 10.0.70.0/23 rule-precedence 3 &lt;BR /&gt;
 permit ip 192.168.0.1/24 any rule-precedence 4 &lt;BR /&gt;
&lt;BR /&gt;
ip access-list ABCEmployees&lt;BR /&gt;
 permit udp any eq 68 any eq dhcps rule-precedence 10 &lt;BR /&gt;
 permit udp any any eq dns rule-precedence 20 &lt;BR /&gt;
 permit tcp any any eq www rule-precedence 30 &lt;BR /&gt;
 permit tcp any any eq https rule-precedence 40 &lt;BR /&gt;
 permit tcp any any eq smtp rule-precedence 50 &lt;BR /&gt;
 permit tcp any any eq imaps rule-precedence 60 &lt;BR /&gt;
 permit tcp any any eq 587 rule-precedence 70 &lt;BR /&gt;
 permit tcp any any eq pop3 rule-precedence 80 &lt;BR /&gt;
 permit tcp any eq 443 any eq https rule-precedence 90 &lt;BR /&gt;
 permit tcp any any eq 1723 rule-precedence 100 &lt;BR /&gt;
 permit udp any any eq 500 rule-precedence 110 &lt;BR /&gt;
 permit udp any any eq 4500 rule-precedence 115 &lt;BR /&gt;
 permit ip 192.168.0.0/24 host 10.0.70.2 rule-precedence 140    ***(IP address needs to change)&lt;BR /&gt;
 deny ip 192.168.0.0/24 host 192.168.0.1 rule-precedence 145 &lt;BR /&gt;
 deny ip any host 10.0.70.20 rule-precedence 150 &lt;BR /&gt;</description>
      <pubDate>Fri, 14 Sep 2018 01:23:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53401#M3210</guid>
      <dc:creator>DW76</dc:creator>
      <dc:date>2018-09-14T01:23:00Z</dc:date>
    </item>
    <item>
      <title>RE: Change config of RFS6000</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53402#M3211</link>
      <description>Okay...an IP access list rule.&lt;BR /&gt;
To get to the section to change it:&lt;BR /&gt;
&lt;BR /&gt;
1) Login&lt;BR /&gt;
2) enable&lt;BR /&gt;
3) config&lt;BR /&gt;
4) ip access-list ABCEmployees&lt;BR /&gt;
5) permit ip 192.168.0.0/24 host 10.0.70.2 rule-precedence 140   (&lt;B&gt;change the IP address to what you want in this command.  Since the rule-precedence level remains the same, the new entry will simply overwrite what is already there.  If you want to actually add NEW entries, just make sure that they don't duplicate the rule-precedence values of any of the existing entries)&lt;BR /&gt;
&lt;/B&gt;6) commit write&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Fri, 14 Sep 2018 01:32:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53402#M3211</guid>
      <dc:creator>ckelly</dc:creator>
      <dc:date>2018-09-14T01:32:00Z</dc:date>
    </item>
    <item>
      <title>RE: Change config of RFS6000</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53403#M3212</link>
      <description>Ok, was able to change that too, however wifi clients are still not getting online.  Any ideas... not seeing any other references in the config for the old IP address.</description>
      <pubDate>Fri, 14 Sep 2018 02:04:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53403#M3212</guid>
      <dc:creator>DW76</dc:creator>
      <dc:date>2018-09-14T02:04:00Z</dc:date>
    </item>
    <item>
      <title>RE: Change config of RFS6000</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53404#M3213</link>
      <description>So is this client able to PING an Internet IP address?  Is this just a resolution issue?&lt;BR /&gt;
You say that the client does show that it has a DNS server as part of its DHCP lease info?</description>
      <pubDate>Fri, 14 Sep 2018 04:05:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53404#M3213</guid>
      <dc:creator>ckelly</dc:creator>
      <dc:date>2018-09-14T04:05:00Z</dc:date>
    </item>
    <item>
      <title>RE: Change config of RFS6000</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53405#M3214</link>
      <description>Chris-My apologies, I am out of the office now.  I will test this again and report back tomorrow.  The config on phones does show the new DNS IP.  I am attaching the full config if that helps at all.&lt;BR /&gt;
&lt;BR /&gt;
!&lt;BR /&gt;
! Configuration of RFS6000 version 5.8.6.7-002R&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
version 2.5&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
ip access-list ABCEmployeeGuest&lt;BR /&gt;
 permit ip 192.168.0.0/24 any rule-precedence 10 &lt;BR /&gt;
!&lt;BR /&gt;
ip access-list Hotspot&lt;BR /&gt;
 permit udp any eq 68 any eq dhcps rule-precedence 10 &lt;BR /&gt;
 permit udp any any eq dns rule-precedence 20 &lt;BR /&gt;
 permit tcp any any eq www rule-precedence 30 &lt;BR /&gt;
 permit tcp any any eq https rule-precedence 40 &lt;BR /&gt;
 permit tcp any any eq snpp rule-precedence 50 &lt;BR /&gt;
 deny ip any host 10.0.70.20 rule-precedence 60 &lt;BR /&gt;
!&lt;BR /&gt;
ip access-list ABCEmployee2018&lt;BR /&gt;
 permit udp any range 67 68 any range 67 68 rule-precedence 1 &lt;BR /&gt;
 permit udp any any eq dns rule-precedence 2 &lt;BR /&gt;
 deny ip any 10.0.70.0/23 rule-precedence 3 &lt;BR /&gt;
&lt;BR /&gt;
 permit ip 192.168.0.1/24 any rule-precedence 4 &lt;BR /&gt;
&lt;BR /&gt;
ip access-list ABCEmployees&lt;BR /&gt;
 permit udp any eq 68 any eq dhcps rule-precedence 10 &lt;BR /&gt;
 permit udp any any eq dns rule-precedence 20 &lt;BR /&gt;
 permit tcp any any eq www rule-precedence 30 &lt;BR /&gt;
 permit tcp any any eq https rule-precedence 40 &lt;BR /&gt;
 permit tcp any any eq smtp rule-precedence 50 &lt;BR /&gt;
 permit tcp any any eq imaps rule-precedence 60 &lt;BR /&gt;
 permit tcp any any eq 587 rule-precedence 70 &lt;BR /&gt;
 permit tcp any any eq pop3 rule-precedence 80 &lt;BR /&gt;
 permit tcp any eq 443 any eq https rule-precedence 90 &lt;BR /&gt;
 permit tcp any any eq 1723 rule-precedence 100 &lt;BR /&gt;
 permit udp any any eq 500 rule-precedence 110 &lt;BR /&gt;
 permit udp any any eq 4500 rule-precedence 115 &lt;BR /&gt;
 permit ip 192.168.0.0/24 host 10.0.70.9 rule-precedence 140 &lt;BR /&gt;
 deny ip 192.168.0.0/24 host 192.168.0.1 rule-precedence 145 &lt;BR /&gt;
 deny ip any host 10.0.70.20 rule-precedence 150 &lt;BR /&gt;
!&lt;BR /&gt;
firewall-policy default&lt;BR /&gt;
 no ip dos smurf&lt;BR /&gt;
 no ip dos twinge&lt;BR /&gt;
 no ip dos invalid-protocol&lt;BR /&gt;
 no ip dos router-advt&lt;BR /&gt;
no ip dos router-solicit&lt;BR /&gt;
 no ip dos option-route&lt;BR /&gt;
 no ip dos ascend&lt;BR /&gt;
 no ip dos chargen&lt;BR /&gt;
 no ip dos fraggle&lt;BR /&gt;
 no ip dos snork&lt;BR /&gt;
 no ip dos ftp-bounce&lt;BR /&gt;
 no ip dos tcp-intercept&lt;BR /&gt;
 no ip dos broadcast-multicast-icmp&lt;BR /&gt;
 no ip dos land&lt;BR /&gt;
 no ip dos tcp-xmas-scan&lt;BR /&gt;
 no ip dos tcp-null-scan&lt;BR /&gt;
 no ip dos winnuke&lt;BR /&gt;
 no ip dos tcp-fin-scan&lt;BR /&gt;
 no ip dos udp-short-hdr&lt;BR /&gt;
 no ip dos tcp-post-syn&lt;BR /&gt;
 no ip dos tcphdrfrag&lt;BR /&gt;
 no ip dos ip-ttl-zero&lt;BR /&gt;
 no ip dos ipspoof&lt;BR /&gt;
 no ip dos tcp-bad-sequence&lt;BR /&gt;
 no ip dos tcp-sequence-past-window&lt;BR /&gt;
 no ip-mac conflict&lt;BR /&gt;
 no ip-mac routing conflict&lt;BR /&gt;
 dhcp-offer-convert&lt;BR /&gt;
 no ipv6 strict-ext-hdr-check &lt;BR /&gt;
 no ipv6 unknown-options &lt;BR /&gt;
 no ipv6 duplicate-options &lt;BR /&gt;
 no ipv6 option strict-hao-opt-check&lt;BR /&gt;
 no ipv6 option strict-padding&lt;BR /&gt;
 no stateful-packet-inspection-l2&lt;BR /&gt;
 alg sip&lt;BR /&gt;
 no ipv6-mac conflict&lt;BR /&gt;
 no ipv6-mac routing conflict&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
mint-policy global-default&lt;BR /&gt;
!&lt;BR /&gt;
wlan-qos-policy CBTest&lt;BR /&gt;
 qos trust dscp&lt;BR /&gt;
 qos trust wmm&lt;BR /&gt;
!&lt;BR /&gt;
wlan-qos-policy default&lt;BR /&gt;
 qos trust dscp&lt;BR /&gt;
 qos trust wmm&lt;BR /&gt;
!&lt;BR /&gt;
radio-qos-policy default&lt;BR /&gt;
 !&lt;BR /&gt;
aaa-policy AAA_POLICY_wlan_2&lt;BR /&gt;
 authentication server 1 onboard controller&lt;BR /&gt;
!&lt;BR /&gt;
captive-portal CaptivePortal2&lt;BR /&gt;
 server host CaptivePortal2.com&lt;BR /&gt;
 server mode centralized-controller&lt;BR /&gt;
 simultaneous-users 200&lt;BR /&gt;
 webpage internal login footer Please contact reception or I.T. if you do not have a User Name and Password&lt;BR /&gt;
 webpage internal login header ABC Guest Network Login&lt;BR /&gt;
 webpage internal welcome description You now have network access. &lt;BR /&gt;
Please have this window open to display your remaining session time.&lt;BR /&gt;
&lt;BR /&gt;
Click the disconnect link below to end this session.&lt;BR /&gt;
 webpage internal fail description Either the username and password are invalid, or service is unavailable at this time.&lt;BR /&gt;
 webpage internal agreement description Guest users agree to ABC web use policies.&lt;BR /&gt;
 webpage internal agreement header Terms of Use&lt;BR /&gt;
 use aaa-policy AAA_POLICY_wlan_2&lt;BR /&gt;
 webpage internal registration field city type text enable label "City" placeholder "Enter City"&lt;BR /&gt;
 webpage internal registration field street type text enable label "Address" placeholder "123 Any Street"&lt;BR /&gt;
 webpage internal registration field name type text enable label "Full Name" placeholder "Enter First Name, Last Name"&lt;BR /&gt;
 webpage internal registration field zip type number enable label "Zip" placeholder "Zip"&lt;BR /&gt;
 webpage internal registration field via-sms type checkbox enable title "SMS Preferred"&lt;BR /&gt;
 webpage internal registration field mobile type number enable label "Mobile" placeholder "Mobile Number with Country code"&lt;BR /&gt;
 webpage internal registration field age-range type dropdown-menu enable label "Age Range" title "Age Range"&lt;BR /&gt;
 webpage internal registration field email type e-address enable mandatory label "Email" placeholder "you@domain.com"&lt;BR /&gt;
 webpage internal registration field via-email type checkbox enable title "Email Preferred"&lt;BR /&gt;
!&lt;BR /&gt;
wlan 1&lt;BR /&gt;
 description Corporate Wireless&lt;BR /&gt;
 ssid ABC_Wireless&lt;BR /&gt;
 vlan 1&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type ccmp&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 wpa-wpa2 psk 0 xxxxx&lt;BR /&gt;
!&lt;BR /&gt;
wlan 2&lt;BR /&gt;
 description Hot Spot&lt;BR /&gt;
 shutdown&lt;BR /&gt;
 ssid ABC_Guest&lt;BR /&gt;
 vlan 1&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type none&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 use aaa-policy AAA_POLICY_wlan_2&lt;BR /&gt;
 use captive-portal CaptivePortal2&lt;BR /&gt;
 captive-portal-enforcement&lt;BR /&gt;
 ip arp trust&lt;BR /&gt;
 ip dhcp trust&lt;BR /&gt;
 acl exceed-rate wireless-client-denied-traffic 1000000 disassociate&lt;BR /&gt;
 use ip-access-list in Hotspot&lt;BR /&gt;
!&lt;BR /&gt;
wlan 3&lt;BR /&gt;
 description Employee Wireless&lt;BR /&gt;
 ssid ABC_Employee&lt;BR /&gt;
 vlan 100&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type tkip-ccmp&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 wpa-wpa2 psk 0 xxxxx&lt;BR /&gt;
 use ip-access-list in ABCEmployee2018&lt;BR /&gt;
!&lt;BR /&gt;
wlan 4&lt;BR /&gt;
 description IT Dept Test Network&lt;BR /&gt;
 shutdown&lt;BR /&gt;
 ssid ABC_ITDept&lt;BR /&gt;
 vlan 1&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type none&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 wpa-wpa2 psk 0 xxxxx&lt;BR /&gt;
 wep64 key 1 hex 0 1273c26cbe&lt;BR /&gt;
 wep64 key 2 hex 0 5944e563a3&lt;BR /&gt;
 wep64 key 3 hex 0 e848578b45&lt;BR /&gt;
 wep64 key 4 hex 0 a23a40a20c&lt;BR /&gt;
!&lt;BR /&gt;
wlan 5&lt;BR /&gt;
 description Guest Network&lt;BR /&gt;
 ssid ABC_Visitor&lt;BR /&gt;
 vlan 100&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type tkip-ccmp&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 wpa-wpa2 psk 0 Visitor@xxx&lt;BR /&gt;
 use ip-access-list in ABCEmployee2018&lt;BR /&gt;
!&lt;BR /&gt;
wlan test2&lt;BR /&gt;
 shutdown&lt;BR /&gt;
 ssid test2&lt;BR /&gt;
 vlan 100&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type ccmp&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 wpa-wpa2 psk 0 testtest&lt;BR /&gt;
 use ip-access-list in ABCEmployee2018&lt;BR /&gt;
!&lt;BR /&gt;
smart-rf-policy default&lt;BR /&gt;
!&lt;BR /&gt;
radius-group ABCGuestGroup&lt;BR /&gt;
 guest&lt;BR /&gt;
 policy vlan 1&lt;BR /&gt;
 policy ssid ABC_Guest&lt;BR /&gt;
!&lt;BR /&gt;
 radius-user-pool-policy Guest&lt;BR /&gt;
 user Guest password 0 guest@ABC group ABCGuestGroup guest expiry-time 16:15 expiry-date 12/21/2019 start-time 16:15 start-date 12/20/2010&lt;BR /&gt;
!&lt;BR /&gt;
radius-server-policy default&lt;BR /&gt;
 use radius-user-pool-policy Guest&lt;BR /&gt;
!&lt;BR /&gt;
dhcp-server-policy default&lt;BR /&gt;
 dhcp-pool EmployeeGuest&lt;BR /&gt;
  network 192.168.0.0/24&lt;BR /&gt;
  address range 192.168.0.2 192.168.0.254 &lt;BR /&gt;
  default-router 192.168.0.1&lt;BR /&gt;
  dns-server  10.0.70.9&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
management-policy default&lt;BR /&gt;
 no telnet&lt;BR /&gt;
 http server&lt;BR /&gt;
 no https server&lt;BR /&gt;
 no ftp&lt;BR /&gt;
 ssh&lt;BR /&gt;
 user admin password 1 871c077c9bc6d6eb7396e2056a1b0ff36a0ca882cc1e73f1089b1864746b47d2 role superuser access all&lt;BR /&gt;
user cB password 1 cd93f6b1ec3aae6ae9a29d3138a90bf92b90e2d4 role superuser access all&lt;BR /&gt;
 user webadmin password 1 8893186442be830c7a8bea38184e4189239c55af role web-user-admin &lt;BR /&gt;
 snmp-server user snmpoperator v3 encrypted des auth md5 0 0xdd7f8e6f3a8f541942acb4158d31bbf5&lt;BR /&gt;
 snmp-server user snmptrap v3 encrypted des auth md5 0 0xcadb481610695a440a262f01636b317f&lt;BR /&gt;
 snmp-server user snmpmanager v3 encrypted des auth md5 0 0xcadb481610695a440a262f01636b317f&lt;BR /&gt;
!&lt;BR /&gt;
ex3500-management-policy default&lt;BR /&gt;
 snmp-server community public ro&lt;BR /&gt;
 snmp-server community private rw&lt;BR /&gt;
 snmp-server notify-filter 1 remote 127.0.0.1&lt;BR /&gt;
 snmp-server view defaultview 1 included&lt;BR /&gt;
!&lt;BR /&gt;
profile rfs6000 default-rfs6000&lt;BR /&gt;
 no autoinstall configuration&lt;BR /&gt;
 no autoinstall firmware&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
-- isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto remote-vpn-client&lt;BR /&gt;
 interface me1&lt;BR /&gt;
 interface up1&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
 interface ge2&lt;BR /&gt;
 interface ge3&lt;BR /&gt;
 interface ge4&lt;BR /&gt;
 interface ge5&lt;BR /&gt;
 interface ge6&lt;BR /&gt;
 interface ge7&lt;BR /&gt;
 interface ge8&lt;BR /&gt;
 interface wwan1&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
 router ospf&lt;BR /&gt;
 router bgp&lt;BR /&gt;
!&lt;BR /&gt;
profile ap650 default-ap650&lt;BR /&gt;
 no autoinstall configuration&lt;BR /&gt;
 no autoinstall firmware&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto load-management&lt;BR /&gt;
 crypto remote-vpn-client&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
!&lt;BR /&gt;
rf-domain default&lt;BR /&gt;
 country-code us&lt;BR /&gt;
 use smart-rf-policy default&lt;BR /&gt;
!&lt;BR /&gt;
rfs6000 5C-0E-8B-18-36-71&lt;BR /&gt;
 use profile default-rfs6000&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname rfs6000-183671&lt;BR /&gt;
 license AP 1c4dc8ec8275e6c0d4914bb989c9f0da93bef016f88782847ede9b04e8f141e270a146ddbb479b59&lt;BR /&gt;
 location ABC&lt;BR /&gt;
 contact CB&lt;BR /&gt;
 timezone America/Chicago&lt;BR /&gt;
 country-code us&lt;BR /&gt;
 mac-name BC-85-56-34-D9-25 LCONF-WIN7&lt;BR /&gt;
 mac-name 00-23-68-AF-7B-9E ABCScan5&lt;BR /&gt;
 mac-name 60-D8-19-42-14-69 TSCREEN-win7&lt;BR /&gt;
 mac-name 24-77-03-D7-DD-E0 FS-win7lap&lt;BR /&gt;
 mac-name 00-23-68-AF-7C-EA ABCScan3&lt;BR /&gt;
 mac-name 00-23-68-AF-7C-76 ABCScan6&lt;BR /&gt;
 mac-name 00-23-68-AF-7A-B0 ABCScan4&lt;BR /&gt;
 mac-name BC-85-56-34-D8-CD UCONF-WIN7&lt;BR /&gt;
 mac-name 00-23-68-AF-7B-9F ABCScan2&lt;BR /&gt;
 mac-name 00-23-68-AF-7B-97 ABCScan1&lt;BR /&gt;
 spanning-tree mst cisco-interoperability enable&lt;BR /&gt;
 area "Server Room"&lt;BR /&gt;
 ip default-gateway 10.0.70.1&lt;BR /&gt;
 use radius-server-policy default&lt;BR /&gt;
 interface me1&lt;BR /&gt;
  ip address 10.1.1.100/24&lt;BR /&gt;
 interface up1&lt;BR /&gt;
  switchport mode trunk&lt;BR /&gt;
  switchport trunk native vlan 1&lt;BR /&gt;
  no switchport trunk native tagged&lt;BR /&gt;
  switchport trunk allowed vlan 1&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  switchport mode access&lt;BR /&gt;
  switchport access vlan 1&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
 interface ge2&lt;BR /&gt;
  switchport mode access&lt;BR /&gt;
  switchport access vlan 1&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
 interface ge3&lt;BR /&gt;
  switchport mode access&lt;BR /&gt;
  switchport access vlan 1&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
 interface ge4&lt;BR /&gt;
switchport mode access&lt;BR /&gt;
  switchport access vlan 1&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
 interface ge5&lt;BR /&gt;
  switchport mode access&lt;BR /&gt;
  switchport access vlan 1&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
 interface ge6&lt;BR /&gt;
  switchport mode access&lt;BR /&gt;
  switchport access vlan 1&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
 interface ge7&lt;BR /&gt;
  switchport mode access&lt;BR /&gt;
  switchport access vlan 1&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
 interface ge8&lt;BR /&gt;
  switchport mode acce</description>
      <pubDate>Fri, 14 Sep 2018 04:38:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53405#M3214</guid>
      <dc:creator>DW76</dc:creator>
      <dc:date>2018-09-14T04:38:00Z</dc:date>
    </item>
    <item>
      <title>RE: Change config of RFS6000</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53406#M3215</link>
      <description>Side note: I don't see anywhere in the config that any of the ip-access-list you have created have been applied.  The access-list exist, but they're not 'used' anywhere.&lt;BR /&gt;
&lt;BR /&gt;
Regarding the DNS issue though, test a wireless client and see if it can PING something on the Internet like 8.8.8.8.  If this is some sort of a resolution problem then this will work.  But if you then try to PING a FQDN on the Internet like &lt;A href="http://www.google.com" target="_blank" rel="nofollow noreferrer noopener"&gt;www.google.com&lt;/A&gt;, it won't work.  But in the off chance that a client is not able to even PING an IP address on the Internet, then we're dealing with a completely different issue...not simply a DNS problem.&lt;BR /&gt;</description>
      <pubDate>Fri, 14 Sep 2018 20:23:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53406#M3215</guid>
      <dc:creator>ckelly</dc:creator>
      <dc:date>2018-09-14T20:23:00Z</dc:date>
    </item>
    <item>
      <title>RE: Change config of RFS6000</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53407#M3216</link>
      <description>Chris,  I didn't realize that I have to "apply" an access list.  How do I do that?</description>
      <pubDate>Fri, 14 Sep 2018 20:36:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53407#M3216</guid>
      <dc:creator>DW76</dc:creator>
      <dc:date>2018-09-14T20:36:00Z</dc:date>
    </item>
    <item>
      <title>RE: Change config of RFS6000</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53408#M3217</link>
      <description>*** It appears that when I searched your config listing, I fat-fingered the search term and that's why I wasn't seeing that you have in fact used the ACLs...but since you ask, I'll describe this anyway***&lt;BR /&gt;
&lt;BR /&gt;
It begins with WHERE you want to apply the ACL.  (note: this is a common theme when using WiNG-5.  You create things like ACL policies, DHCP server policies, WLANs, etc - but then you have to select where you want them to be used - Example, you create WLANs...but then you have to indicated that you want to use one in the AP's Profile.  Same thing with the ACL's you create)&lt;BR /&gt;
&lt;BR /&gt;
With ACLs, where you indicate that it should be used depends on how you constructed the ACL.  In your case, it appears that you have ACLs created to control traffic originating at the wireless clients when attempting to reach somewhere after the AP, right?&lt;BR /&gt;
In this case, the best way to do this is to create an ACL based on the understanding that you want to control that traffic when it comes in to the AP radio - from the wireless user.  So you create your rules.  Once you have that ACL, you then want to apply it to the applicable WLAN (so this is applied in the actual WLAN configuration).  Here's what one of yours looks like:&lt;BR /&gt;
&lt;BR /&gt;
wlan 5&lt;BR /&gt;
 description Guest Network&lt;BR /&gt;
 ssid ABC_Visitor&lt;BR /&gt;
 vlan 100&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type tkip-ccmp&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 wpa-wpa2 psk 0 Visitor@xxx&lt;BR /&gt;
 &lt;B&gt;use ip-access-list in ABCEmployee2018&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
Notice the last line there.  The 'use' syntax is how you will normally specify that a device (controller, AP) should actually use something that you created.  In this case, you've specified that the WLAN setup should 'use' the ip-access-list name "ABCEmployee2018" and apply those rules to traffic coming from wireless users and entering the AP.  That's where the rules will then be processed.&lt;BR /&gt;
You can also create ACLs and then apply them to Ethernet interfaces on APs or controllers.  Just FYI.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Fri, 14 Sep 2018 20:47:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53408#M3217</guid>
      <dc:creator>ckelly</dc:creator>
      <dc:date>2018-09-14T20:47:00Z</dc:date>
    </item>
    <item>
      <title>RE: Change config of RFS6000</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53409#M3218</link>
      <description>Thank you for explaining that.  As I'm reviewing this config, something that doesn't make sense to me:  ACL "ABCEmployees" specifies permit for the host IP of 10.0.70.9, while ACL "ABCEmployee2018" does not reference a host IP at all.  I see where the ACL ABCEmployee2018 is "used" for WLAN EmployeeWireless but not defined for Corporate Wireless.  Oddly, this does not seem to be an issue when using the old host IP, but could it be a problem with the new?  DNS for wired clients is fine so I'm hesitant to think this is a DNS issue, but is there something needed in DNS to allow Wifi traffic?  This is a new DNS server but was AD Integrated so should be a carbon copy of the old server config...</description>
      <pubDate>Fri, 14 Sep 2018 21:15:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53409#M3218</guid>
      <dc:creator>DW76</dc:creator>
      <dc:date>2018-09-14T21:15:00Z</dc:date>
    </item>
    <item>
      <title>RE: Change config of RFS6000</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53410#M3219</link>
      <description>The ABCEmployees ACL has the entry:&lt;BR /&gt;
 permit ip 192.168.0.0/24 host 10.0.70.9 rule-precedence 140 &lt;BR /&gt;
&lt;BR /&gt;
This specifies that traffic is permitted if:  It's ANY type protocol, originating from a device on the 192.168.0.0/24 subnet, and is destined for the single host address 10.0.70.9.&lt;BR /&gt;
&lt;BR /&gt;
Than again...the ABCEmployees ACL also has several other 'permit' statements that are not contained in the 2018 version ACL.  The 2018 ACL is structured such that the only traffic allowed is:&lt;BR /&gt;
- UDP traffic from any IP address, destined to ANY IP address as long as the destination is port range 67-68.  So this is so clients can get their DHCP lease.&lt;BR /&gt;
  &lt;BR /&gt;
- UDP traffic from any IP address, destined to ANY IP address as long as the destination is port equals "dns"  (in this case, dns is a built in alias that equals port 53&lt;BR /&gt;
&lt;BR /&gt;
- DENY traffic from ANY IP address that is destined to the 10.0.70.0/23 subnet&lt;BR /&gt;
&lt;BR /&gt;
So I'm assuming that the WLANs that have the 2018 ACL applied to it (These below) are correct - that wireless users on those ESSIDs should NOT be able to communicate with the 10.0.70.0/23 subnet.&lt;BR /&gt;
&lt;BR /&gt;
  wlan 3&lt;BR /&gt;
  description Employee Wireless&lt;BR /&gt;
  ssid ABC_Employee&lt;BR /&gt;
  vlan 100&lt;BR /&gt;
&lt;BR /&gt;
   &lt;BR /&gt;
&lt;BR /&gt;
  wlan 5&lt;BR /&gt;
  description Guest Network&lt;BR /&gt;
  ssid ABC_Visitor&lt;BR /&gt;
  vlan 100&lt;BR /&gt;
&lt;BR /&gt;
   &lt;BR /&gt;
&lt;BR /&gt;
   &lt;BR /&gt;
&lt;BR /&gt;
  wlan test2&lt;BR /&gt;
  shutdown&lt;BR /&gt;
  ssid test2&lt;BR /&gt;
  vlan 100&lt;BR /&gt;
&lt;BR /&gt;
  &lt;BR /&gt;
If you also want this sort of restriction applied to the Corporate Wireless, you can simply make the configuration change.&lt;BR /&gt;
 - Go into wlan1 and issue the statement to 'use ip-access-list in ABCEmployee2018'&lt;BR /&gt;
(Can also be done in the GUI, in the WLAN, look in the center column for the "Firewall" section.  Use the drop-down selector for the "Inbound Firewall Rules" option and choose the ABCEmployee2018 ACL)&lt;BR /&gt;
&lt;BR /&gt;
To allow DNS traffic in an ACL, you just need to have that same single statement in any ACL you 'use', which is:  &lt;BR /&gt;
&lt;B&gt;permit udp any any eq dns rule-precedence &lt;/B&gt;(appropriate precedence number) &lt;BR /&gt;
&lt;BR /&gt;
(TIP) name your WLANs the same as the SSID they use.  This makes it much easier when you are mapping them in the radio interfaces.  In that section, it only shows you the WLAN 'name' and not the actual SSID contained within that WLAN name...so you might find yourself asking...what SSID is wlan3 using? ...and you have to jump back over to the WLANs section to check and see.  If the WLAN name is the same as the SSID, this won't happen.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Fri, 14 Sep 2018 23:13:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/change-config-of-rfs6000/m-p/53410#M3219</guid>
      <dc:creator>ckelly</dc:creator>
      <dc:date>2018-09-14T23:13:00Z</dc:date>
    </item>
  </channel>
</rss>

