1. Cisco Wireless LAN Controller Configuration Guide
Release 8.5
"Configuring CPU ACLs" section: "The controller has a CPU ACL. This ACL is configurable and is used to protect the controller CPU from DoS attacks and other malicious traffic... When you create a CPU ACL
you must permit the traffic from your wireless clients that require access to the controller CPU. For example
if you are using web authentication
you must permit HTTP and HTTPS." This confirms that a misconfigured ACL will block web authentication.
2. Cisco
"Cisco Wireless LAN Controller (WLC) CPU ACLs" White Paper: "The CPU ACLs are applied to traffic that is destined to the CPU of the WLC. This includes management traffic (Telnet
SSH
HTTP
HTTPS
and SNMP) and traffic from wireless clients that is terminated on the WLC
such as web authentication." This document explicitly states that web authentication traffic is processed by the CPU ACL.
3. Enterprise Mobility 8.5 Design Guide
"WLC Platform Features > CPU ACL" section: "The purpose of the CPU ACL is to protect the WLC CPU from being overloaded by traffic that is not essential to the operation of the WLC... If you configure a CPU ACL
you must be sure to permit all of the traffic that you want the WLC to process. For example
if you are using external web authentication
you must be sure to permit traffic from the web server to the WLC." This highlights the necessity of correctly permitting required traffic.