This access list will permit access to the corporate network and source nat all other traffic to be local switched.
ip access-list session corp-net-split-acl
user alias corp-network-alias any permit
alias corp-network-alias user any permit
any any svc-dhcp permit
user any any route src-nat
any user any permit
This role will be associated with the session access-list created before.
user-role role-split-corp
access-list session corp-net-split-acl
wlan virtual-ap "remote-teste10"
aaa-profile "remote-teste10"
vlan 1043 —> Vlan that user will get IP from
forward-mode split-tunnel —> Split-tunnel enabled
ssid-profile "remote-teste10”
!
wlan ssid-profile "remote-teste10"
essid "remote-teste10"
opmode wpa2-psk-aes
wpa-passphrase 1d5318efb6110ec9f7dd7e92d03d235fe443cb9eea6167b5
!
ap-group “RAP-Test-Group"
virtual-ap "remote-teste10”
whitelist-db rap add mac-address xx:xx:xx:xx:xx:xx
ap-group RAP-Test-Group —> AP group created on item 5
ap-name RAP-AP-01
RAP access points will receive IP address from this pool.
ip local pool “RAP-Pool-Corp" 10.5.1.200 10.5.1.254
After adding the RAP to the whitelist-db, it has to provisioned through the GUI.
During the provisioning we need will use the controllers’s external IP or hostname. Remember that the ports TCP/4500 and UDP 69 should be open between RAP and controller.