Wireless Access

Reply
Frequent Contributor I

RAP leaks internal IP Address', MAC Address' and EAPOL information

When monitoring the switch port that the WAN Interface connects to, packet captures show that MAC address', IP Address', etc are gathered for devices connected directly to the RAP. Shouldn't this information be encrypted? The uplink switch shouldn't see those MAC Address' in it's CAM table, but yet it does. Any dieas?

 

Regards,

Tony Marques

Guru Elite

Re: RAP leaks internal IP Address', MAC Address' and EAPOL information

What forwarding modes are you using?

Tim Cappalli | Aruba Security
@timcappalli | timcappalli.me | ACMX #367 / ACCX #480

Re: RAP leaks internal IP Address', MAC Address' and EAPOL information

Is setup tunneled/Bridge ?

Thank you

Victor Fabian
Lead Mobility Architect @WEI
AMFX | ACMX | ACDX | ACCX | CWAP | CWDP | CWNA
Frequent Contributor I

Re: RAP leaks internal IP Address', MAC Address' and EAPOL information

I assume it's under AP Configuration > AP Group > Edit "xxx" > Profiles > AP > Ethernet interface 0 port configuration > Wired AP:

 

I have Forward mode = tunnel and Trusted not checked and Broadcast checked

 

Regards,

Tony Marques

Guru Elite

Re: RAP leaks internal IP Address', MAC Address' and EAPOL information

tmarques,

 

Please open a TAC case so that what you are seeing can be understood.

 

******************
Answers and views expressed by me on this forum are my own and not necessarily the position of Aruba Networks or Hewlett Packard Enterprise.
******************
Search Airheads
cancel
Showing results for 
Search instead for 
Did you mean: