02-25-2013 08:41 PM - edited 02-25-2013 08:49 PM
Between an AP and the controller:
1 FTP (TCP port 21).
2. TFTP (UDP port 69)
3. NTP (UDP port 123).
4. SYSLOG (UDP port 514).
5. PAPI (UDP port 8211).
6. GRE (protocol 47).
what ports to be opened from controller subnet to the AP subnet?
If CPSEC is enabled, NAT-T port UDP 4500 has to be open on either direction, between AP and controller, right?
would all the above 6 traffic flows, gets inside the ipsec, when CPSEC is enabled? i can just allow the NAT-T port udp 4500 alone on the firewall bidirectional between AP and controller?
Solved! Go to Solution.
02-26-2013 01:35 AM - edited 02-26-2013 03:34 AM
** Read Giles Post - He fixed my answer - With the right answer and the current info **
The port list staying the same for RemoteAP or CampusAP:
Between Campus AP (GRE) and LMS Controller
FTP (tcp/20 and tcp/21)
TFTP (udp 69) – (for AP-52; for all other AP’s, if there is no local image on the AP, e.g. a brand new AP, the
AP will use TFTP to retrieve initial image)
GRE (protocol 47)
Between Remote AP (IPSec) and Controller
TFTP (UDP/69) - note: Not needed for normal operation. If the RAP looses the local image for whatever
reason, TFTP is used to download the latest image.
Thanks Giles. :smileywink: ( A day that you dont learn something new - it's a wasted day)
Aruba Airheads - Powered By community for empower the community
************ Don't Forget to Kudos + me,If i helped you******************
02-26-2013 03:17 AM - edited 02-26-2013 11:53 AM
I know how this stuff works and you really confused me!
"When CPSEC enabled - each whitelisted or allowed AP get certiface from the controller itself."
This is not true, all 'new' AP's have a TPM module which stores a factory certificate, so it does not need to get a certificate from the controller, old AP's which don't support TPM modules can be downloaded from the controller.
The idea behind CPsec - Control Plane security is to protect the control plane so that we can support bridge mode PSK etc.
i.e. when we send a key to the AP we don't send it in clear text but inside IPSec to the AP.
So the only thing which is inside CPSec (which is IPSec or NAT-T - UDP 4500) is our propitiatory protocol PAPI (UDP port 8211).
I would leave the ports listed open if possible as any new AP coming up will have to use these before it can become a CPSec AP.
02-26-2013 11:34 AM
We have a stateful firewall and find that the list you have is correct for AP to Controller, and the stateful firewall allows responses.
From the controller to the AP you'll need 8211 open.
The GRE tunnel we pass in both direction stateless to reduce overhead.
if I've helped, please give kudos
if I've provided a solution, please mark the solution so others can find it
03-06-2013 03:31 AM
Thank you all. I got the idea.
Stateful firewall, does open the reverse traffic from controller to AP automatically, for the communication initiated from AP to the controller.