Wireless Access

last person joined: 11 hours ago 

Access network design for branch, remote, outdoor, and campus locations with HPE Aruba Networking access points and mobility controllers.
Expand all | Collapse all

RAP leaks internal IP Address', MAC Address' and EAPOL information

This thread has been viewed 0 times
  • 1.  RAP leaks internal IP Address', MAC Address' and EAPOL information

    Posted Oct 22, 2014 03:31 PM

    When monitoring the switch port that the WAN Interface connects to, packet captures show that MAC address', IP Address', etc are gathered for devices connected directly to the RAP. Shouldn't this information be encrypted? The uplink switch shouldn't see those MAC Address' in it's CAM table, but yet it does. Any dieas?

     

    Regards,

    Tony Marques



  • 2.  RE: RAP leaks internal IP Address', MAC Address' and EAPOL information

    EMPLOYEE
    Posted Oct 22, 2014 03:33 PM
    What forwarding modes are you using?


  • 3.  RE: RAP leaks internal IP Address', MAC Address' and EAPOL information

    Posted Oct 22, 2014 04:03 PM

    I assume it's under AP Configuration > AP Group > Edit "xxx" > Profiles > AP > Ethernet interface 0 port configuration > Wired AP:

     

    I have Forward mode = tunnel and Trusted not checked and Broadcast checked

     

    Regards,

    Tony Marques



  • 4.  RE: RAP leaks internal IP Address', MAC Address' and EAPOL information

    EMPLOYEE
    Posted Oct 24, 2014 06:24 AM

    tmarques,

     

    Please open a TAC case so that what you are seeing can be understood.

     



  • 5.  RE: RAP leaks internal IP Address', MAC Address' and EAPOL information

    Posted Oct 22, 2014 03:33 PM

    Is setup tunneled/Bridge ?