Wireless Access

Reply
Frequent Contributor I
Posts: 82
Registered: ‎05-28-2010

RAP leaks internal IP Address', MAC Address' and EAPOL information

When monitoring the switch port that the WAN Interface connects to, packet captures show that MAC address', IP Address', etc are gathered for devices connected directly to the RAP. Shouldn't this information be encrypted? The uplink switch shouldn't see those MAC Address' in it's CAM table, but yet it does. Any dieas?

 

Regards,

Tony Marques

Guru Elite
Posts: 8,335
Registered: ‎09-08-2010

Re: RAP leaks internal IP Address', MAC Address' and EAPOL information

What forwarding modes are you using?

Tim Cappalli | Aruba Security TME
@timcappalli | timcappalli.me | ACMX #367 / ACCX #480
MVP
Posts: 4,238
Registered: ‎07-20-2011

Re: RAP leaks internal IP Address', MAC Address' and EAPOL information

Is setup tunneled/Bridge ?

Thank you

Victor Fabian
Lead Mobility Engineer @ Integration Partners
AMFX | ACMX | ACDX | ACCX | CWAP | CWDP | CWNA
Frequent Contributor I
Posts: 82
Registered: ‎05-28-2010

Re: RAP leaks internal IP Address', MAC Address' and EAPOL information

I assume it's under AP Configuration > AP Group > Edit "xxx" > Profiles > AP > Ethernet interface 0 port configuration > Wired AP:

 

I have Forward mode = tunnel and Trusted not checked and Broadcast checked

 

Regards,

Tony Marques

Guru Elite
Posts: 20,819
Registered: ‎03-29-2007

Re: RAP leaks internal IP Address', MAC Address' and EAPOL information

tmarques,

 

Please open a TAC case so that what you are seeing can be understood.

 



Colin Joseph
Aruba Customer Engineering

Looking for an Answer? Search the Community Knowledge Base Here: Community Knowledge Base

Search Airheads
Showing results for 
Search instead for 
Did you mean: