<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to block management from Wireless clients on ZF 7372 in To Be Moved</title>
    <link>https://community.ruckuswireless.com/t5/To-Be-Moved/How-to-block-management-from-Wireless-clients-on-ZF-7372/m-p/26681#M1523</link>
    <description>I've just done a test in my simple office lab.&lt;BR /&gt;&lt;BR /&gt;Are you trying to setup a Wireless SSID for clients, but want to keep them from seeing your AP WebUI, right?&lt;BR /&gt;&lt;BR /&gt;So then, you could leave your Eth port(s) configured as Bridge to WAN in VLAN 4 if you wish or is what you use, &lt;BR /&gt;and define an Internal Subnet (any other VLAN) and DHCP scope, assign that to your SSID with Local subnet NAT &lt;BR /&gt;and Route to WAN, and these wireless clients get an IP from your 'other' VLAN, and should still get thru your internal &lt;BR /&gt;network to the Internet.&lt;BR /&gt;&lt;BR /&gt;However, with this configuration, no, I could not prevent the wireless VLAN clients from being able to ping the AP's &lt;BR /&gt;IP address on the other VLAN/network.&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;Depending on your infrastructure switch/router, you might be able to create an ACL on your VLAN 4 that deny's&lt;BR /&gt;the Wireless VLAN subnet, from having HTTPS (tcp:443) to your AP's IP address...?&amp;nbsp; My simple network can't&lt;BR /&gt;test that ACL.</description>
    <pubDate>Wed, 13 Jul 2016 20:46:48 GMT</pubDate>
    <dc:creator>michael_brado</dc:creator>
    <dc:date>2016-07-13T20:46:48Z</dc:date>
    <item>
      <title>How to block management from Wireless clients on ZF 7372</title>
      <link>https://community.ruckuswireless.com/t5/To-Be-Moved/How-to-block-management-from-Wireless-clients-on-ZF-7372/m-p/26678#M1520</link>
      <description>I'd like to only permit Management from Ethernet Port 1. I don't want any clients to be able to &amp;nbsp;see the management UI. I've tried setting the VLAN for management to VLAN 4 and setting up a Subnet for Port 1 on VLAN 4. I setup a subnet for the Radio on VLAN 1 but the wireless clients can still see the Management interface.</description>
      <pubDate>Fri, 08 Jul 2016 21:44:36 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/To-Be-Moved/How-to-block-management-from-Wireless-clients-on-ZF-7372/m-p/26678#M1520</guid>
      <dc:creator>brett_cherwinsk</dc:creator>
      <dc:date>2016-07-08T21:44:36Z</dc:date>
    </item>
    <item>
      <title>Re: How to block management from Wireless clients on ZF 7372</title>
      <link>https://community.ruckuswireless.com/t5/To-Be-Moved/How-to-block-management-from-Wireless-clients-on-ZF-7372/m-p/26679#M1521</link>
      <description>I'm not sure a standalone AP which acts as a router for both VLAN subnets, can "hide" one of it's Eth IP addresses.&lt;BR /&gt;&lt;BR /&gt;If you can experiment, can you now Disable port 1, and still manage the AP from an SSID using VLAN 4?</description>
      <pubDate>Mon, 11 Jul 2016 18:23:03 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/To-Be-Moved/How-to-block-management-from-Wireless-clients-on-ZF-7372/m-p/26679#M1521</guid>
      <dc:creator>michael_brado</dc:creator>
      <dc:date>2016-07-11T18:23:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to block management from Wireless clients on ZF 7372</title>
      <link>https://community.ruckuswireless.com/t5/To-Be-Moved/How-to-block-management-from-Wireless-clients-on-ZF-7372/m-p/26680#M1522</link>
      <description>Wouldn't that lock me out of the manager if I can't get in to it vis SSID?</description>
      <pubDate>Wed, 13 Jul 2016 18:51:23 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/To-Be-Moved/How-to-block-management-from-Wireless-clients-on-ZF-7372/m-p/26680#M1522</guid>
      <dc:creator>brett_cherwinsk</dc:creator>
      <dc:date>2016-07-13T18:51:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to block management from Wireless clients on ZF 7372</title>
      <link>https://community.ruckuswireless.com/t5/To-Be-Moved/How-to-block-management-from-Wireless-clients-on-ZF-7372/m-p/26681#M1523</link>
      <description>I've just done a test in my simple office lab.&lt;BR /&gt;&lt;BR /&gt;Are you trying to setup a Wireless SSID for clients, but want to keep them from seeing your AP WebUI, right?&lt;BR /&gt;&lt;BR /&gt;So then, you could leave your Eth port(s) configured as Bridge to WAN in VLAN 4 if you wish or is what you use, &lt;BR /&gt;and define an Internal Subnet (any other VLAN) and DHCP scope, assign that to your SSID with Local subnet NAT &lt;BR /&gt;and Route to WAN, and these wireless clients get an IP from your 'other' VLAN, and should still get thru your internal &lt;BR /&gt;network to the Internet.&lt;BR /&gt;&lt;BR /&gt;However, with this configuration, no, I could not prevent the wireless VLAN clients from being able to ping the AP's &lt;BR /&gt;IP address on the other VLAN/network.&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;Depending on your infrastructure switch/router, you might be able to create an ACL on your VLAN 4 that deny's&lt;BR /&gt;the Wireless VLAN subnet, from having HTTPS (tcp:443) to your AP's IP address...?&amp;nbsp; My simple network can't&lt;BR /&gt;test that ACL.</description>
      <pubDate>Wed, 13 Jul 2016 20:46:48 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/To-Be-Moved/How-to-block-management-from-Wireless-clients-on-ZF-7372/m-p/26681#M1523</guid>
      <dc:creator>michael_brado</dc:creator>
      <dc:date>2016-07-13T20:46:48Z</dc:date>
    </item>
  </channel>
</rss>

