Setting up a partner wireless with limited internal access
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-17-2015 10:00 AM
We currently have 2 broadcast SSIDs a corporate Radius authenticated network and a guest which is open and has no local access. This is all working fine. We have a small use case where we may have a 'partner' on site for a period of time who will need access to a specific internal resource that is not accessible externally without VPN. This is a first, possibly only time and not sure how long it will be used. So I'm trying to avoid making huge changes to our existing setup if I can. If the partner is off premises they can access the resource via VPN, This is tested and proven. If the partner is on premises I'm trying to come up with a way to provide access to the internal resource without giving access to our entire internal network.
I've thought of a couple of different ways. Using the VPN across the guest wireless runs into loopback issues with the firewall that I haven't been able to resolve, and think may not be 'fixable'
I'm thinking that I could address this with a Radius authenticated SSID that has a layer 4 access control only allowing access to our DNS server, and the internal resource. I 'could' put this in the same vlan as our 'corporate' SSID and just restrict access at the AP. I'm sure this isn't the most secure way, but would only require a few minor changes on the Wireless. I've experimented with the Roles in ZD and see I can use Radius to 'put' the user to an ssid even if they click on the 'full corporate' SSID.
Anyone have other thoughts on how to approach this. I'd like to avoid setting up an entirely new vlan, dhcp scope.... for what might be never used again.
Thanks
I've thought of a couple of different ways. Using the VPN across the guest wireless runs into loopback issues with the firewall that I haven't been able to resolve, and think may not be 'fixable'
I'm thinking that I could address this with a Radius authenticated SSID that has a layer 4 access control only allowing access to our DNS server, and the internal resource. I 'could' put this in the same vlan as our 'corporate' SSID and just restrict access at the AP. I'm sure this isn't the most secure way, but would only require a few minor changes on the Wireless. I've experimented with the Roles in ZD and see I can use Radius to 'put' the user to an ssid even if they click on the 'full corporate' SSID.
Anyone have other thoughts on how to approach this. I'd like to avoid setting up an entirely new vlan, dhcp scope.... for what might be never used again.
Thanks
5 REPLIES 5
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-17-2015 10:26 AM
idea 1
create a new guest WLAN with restricted subnet allowing access ONLY to that internal resource + internet if required.
on top of it create a guest pass for no of days or weeks he is on site so that once he is gone as per schedule guest pass too expires. You can remove this new guest WLAN too.
if you want that this guest WLAN should be seen only at few location then that too is feasible...
You can tag this WLAN with a VLAN from which you want this person get an IP...
create a new guest WLAN with restricted subnet allowing access ONLY to that internal resource + internet if required.
on top of it create a guest pass for no of days or weeks he is on site so that once he is gone as per schedule guest pass too expires. You can remove this new guest WLAN too.
if you want that this guest WLAN should be seen only at few location then that too is feasible...
You can tag this WLAN with a VLAN from which you want this person get an IP...
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-21-2015 08:51 AM
Thanks Monnat, I pretty much did that, but didn't create it as a guest wlan.
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-17-2015 10:44 AM
Thanks for the suggestion. I tried 'cloning' my corporate SSID and then placing an ACL on it. It seems to have worked. Would have going the guest route just auto-setup the ACL's or does it provide more restriction. Obviously the time expiration, but I already have an 'AD' account created for him to access the internal resource so I can leverage that.
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-17-2015 10:55 AM
A guest network is essentially based off ACLs and then some. It presets some ACLs that prevent access to the subnets that your ZD and AP's reside on, with specific exceptions for talking to the ZD's captive portal.
The only thing "bonus" that it does is that it makes the ZD respond with a captive portal specific landing page if you attempt to talk to it, instead of a ZD login page. It's a mild deterrent to an attacker attempting to brute force your ZD login credentials.
The only thing "bonus" that it does is that it makes the ZD respond with a captive portal specific landing page if you attempt to talk to it, instead of a ZD login page. It's a mild deterrent to an attacker attempting to brute force your ZD login credentials.

