Skip to content

dot11.Network

Wireless & Network Stuff

Menu
  • Home
  • Contact
  • About
Menu

Peer-to-Peer blocking in SDA-Wireless

Posted on March 2, 2022March 2, 2022 by Kevin

  • What is Peer-2-Peer blocking?

Peer-2-peer (P2P) blocking is a security feature allowing an administrator to drop (or force to switch upstream) data traffic between clients associated to the same WLAN. P2P is mostly deployed in Guest WLANs where you don’t want your clients to be able to communicate between each others.

This settings can be modified on the Advanced Settings of the WLAN (for AireOS & IOS-XE) WLC

AireOS Configuration
IOS-XE Configuration
  • What is the impact of enabling SDA for Wireless?

When extending SDA to Wireless world, traffic between two clients connected to the same WLAN and same AP will always be switched at the Fabric Edge level. Basically, the Access Point will encapsulate data traffic into VxLAN tunnel between Access Points and Fabric Edge, in order to make sure that policy enforcement (TrustSec) is applied to the traffic.

Therefore, P2P policy enforcement at the AP level is no longer working : Access Point is sending all traffic upstream. In order to block communication between peers on the same WLAN & same AP, you have to leverage Cisco Trustsec Policy and SGACL. Configuration steps is detailed below.

  • Peer-to-Peer blocking with TrusSec Config (DNAC 2.2.3.4)

    • Configure your TrustSec policy as you would do for micro-segmentation in your wired network : Policy > Group-Based Access Control > Policies– In the below example, PC to PC communication is mapped to the contract named “Deny ip” which is the default one to deny all traffic.
      If you need more granularity, you can configure specific contracts and assign it to matrix.

    • Click Deploy to push this config to ISE. Once done, if you have at lease one wireless client with SGT “PC” you should see the SGACL in your WLC. On IOS-XE you can browse Configuration > Security > TrustSec > CTS Policies, or through CLI with the command show cts policy sgt
  • Caveats

    • If you perform this configuration while affected users are connected, you may have to shutdown the WLAN in order to reset the session and apply the SGACL
    • If your WLAN is mapped to a Fabric-Enabled Policy Profile as well as a Non-Fabric-Enabled Policy Profile, you still need to define the P2P blocking action for non-SDA Access Points.

Reference:
https://www.cisco.com/c/en/us/td/docs/solutions/CVD/Campus/cisco-sda-design-guide.html

 

FacebookTweetLinkedIn

1 thought on “Peer-to-Peer blocking in SDA-Wireless”

  1. Travis Kash says:
    May 17, 2022 at 11:21 am

    Thanks for this informational blog. If possible please make more blog post on Wireless or ISE integration with SDA.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Categories

  • CCIE Notes (3)
  • Cisco (5)
  • Config (6)
  • Python (1)
  • SDA (3)
  • Security (1)
  • Uncategorized (2)

Archives

  • June 2022 (2)
  • March 2022 (2)
  • October 2019 (1)
  • January 2019 (2)
  • October 2018 (1)
© 2025 dot11.Network | Powered by Minimalist Blog WordPress Theme