<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Mobility control &amp;amp; data encryption in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/mobility-control-amp-data-encryption/m-p/3955789#M103851</link>
    <description>&lt;P&gt;Hi everybody!&lt;/P&gt;&lt;P&gt;Found this paper:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-7/b_encrypted_tunnel_deployment_guide.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-7/b_encrypted_tunnel_deployment_guide.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It says that:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"In release 8.7 end-to-end Tunnel encrypted between Anchor and Foreign Controllers"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;by issuing commands:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="keyword kwd CN_CmdName-2A8B56A4"&gt;config mobility group member add&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;config mobility encryption enable&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;(i'm not mentioning adding mobility peers)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But in Configuration Guide it's more complicated:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="keyword kwd CN_CmdName-2A8B56A4"&gt;config mobility group member add&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;EM&gt;peer-mac-addr&amp;nbsp;peer-ip-addr&amp;nbsp;group-name&amp;nbsp;&lt;/EM&gt;&lt;STRONG&gt;&lt;SPAN class="keyword kwd"&gt;encrypt&amp;nbsp;&lt;/SPAN&gt;{&amp;nbsp;&lt;SPAN class="keyword kwd"&gt;enable&lt;/SPAN&gt;&amp;nbsp;|&amp;nbsp;&lt;SPAN class="keyword kwd"&gt;disable&lt;/SPAN&gt;}&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="keyword kwd CN_CmdName-2A8B56A4"&gt;config mobility group member data-dtls&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;EM&gt;peer-mac-addr&amp;nbsp;&lt;/EM&gt;&lt;STRONG&gt;{&amp;nbsp;&lt;SPAN class="keyword kwd"&gt;enable&lt;/SPAN&gt;&amp;nbsp;|&amp;nbsp;&lt;SPAN class="keyword kwd"&gt;disable&lt;/SPAN&gt;}&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-8/config-guide/b_cg88/encrypted_mobility_tunnel.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-8/config-guide/b_cg88/encrypted_mobility_tunnel.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Which commands are true?&lt;/P&gt;&lt;P&gt;2) Will both control (port 16666) and data (port 16667) flows will be encrypted after enabling this feature?&amp;nbsp;&lt;/P&gt;&lt;P&gt;3) When deploying Foreign-Anchor scenario with this encryption, is it enough to open ports 16666 &amp;amp; 16667 on the firewalls for mobility messaging and user traffic to be tunneled between foreign and anchor? Or is it required to open 5246/5247 for CAPWAP traffic for Anchor also?&amp;nbsp;(not mentioning everything else, like https, snmp etc.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;P&gt;Artem&lt;/P&gt;</description>
    <pubDate>Mon, 05 Jul 2021 18:16:55 GMT</pubDate>
    <dc:creator>Murinos</dc:creator>
    <dc:date>2021-07-05T18:16:55Z</dc:date>
    <item>
      <title>Mobility control &amp; data encryption</title>
      <link>https://community.cisco.com/t5/wireless/mobility-control-amp-data-encryption/m-p/3955789#M103851</link>
      <description>&lt;P&gt;Hi everybody!&lt;/P&gt;&lt;P&gt;Found this paper:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-7/b_encrypted_tunnel_deployment_guide.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-7/b_encrypted_tunnel_deployment_guide.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It says that:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"In release 8.7 end-to-end Tunnel encrypted between Anchor and Foreign Controllers"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;by issuing commands:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="keyword kwd CN_CmdName-2A8B56A4"&gt;config mobility group member add&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;config mobility encryption enable&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;(i'm not mentioning adding mobility peers)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But in Configuration Guide it's more complicated:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="keyword kwd CN_CmdName-2A8B56A4"&gt;config mobility group member add&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;EM&gt;peer-mac-addr&amp;nbsp;peer-ip-addr&amp;nbsp;group-name&amp;nbsp;&lt;/EM&gt;&lt;STRONG&gt;&lt;SPAN class="keyword kwd"&gt;encrypt&amp;nbsp;&lt;/SPAN&gt;{&amp;nbsp;&lt;SPAN class="keyword kwd"&gt;enable&lt;/SPAN&gt;&amp;nbsp;|&amp;nbsp;&lt;SPAN class="keyword kwd"&gt;disable&lt;/SPAN&gt;}&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="keyword kwd CN_CmdName-2A8B56A4"&gt;config mobility group member data-dtls&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;EM&gt;peer-mac-addr&amp;nbsp;&lt;/EM&gt;&lt;STRONG&gt;{&amp;nbsp;&lt;SPAN class="keyword kwd"&gt;enable&lt;/SPAN&gt;&amp;nbsp;|&amp;nbsp;&lt;SPAN class="keyword kwd"&gt;disable&lt;/SPAN&gt;}&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-8/config-guide/b_cg88/encrypted_mobility_tunnel.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-8/config-guide/b_cg88/encrypted_mobility_tunnel.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Which commands are true?&lt;/P&gt;&lt;P&gt;2) Will both control (port 16666) and data (port 16667) flows will be encrypted after enabling this feature?&amp;nbsp;&lt;/P&gt;&lt;P&gt;3) When deploying Foreign-Anchor scenario with this encryption, is it enough to open ports 16666 &amp;amp; 16667 on the firewalls for mobility messaging and user traffic to be tunneled between foreign and anchor? Or is it required to open 5246/5247 for CAPWAP traffic for Anchor also?&amp;nbsp;(not mentioning everything else, like https, snmp etc.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;P&gt;Artem&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 18:16:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/mobility-control-amp-data-encryption/m-p/3955789#M103851</guid>
      <dc:creator>Murinos</dc:creator>
      <dc:date>2021-07-05T18:16:55Z</dc:date>
    </item>
    <item>
      <title>Re: Mobility control</title>
      <link>https://community.cisco.com/t5/wireless/mobility-control-amp-data-encryption/m-p/3955813#M103852</link>
      <description>I don’t think this is necessary in your own environment, maybe in a shared environment. Mobility only uses 16666 and 16667 and you don’t need the ports for AP’s open unless for some reason you have AP’s joined to those controllers. &lt;BR /&gt;</description>
      <pubDate>Fri, 08 Nov 2019 19:09:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/mobility-control-amp-data-encryption/m-p/3955813#M103852</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2019-11-08T19:09:58Z</dc:date>
    </item>
    <item>
      <title>Re: Mobility control</title>
      <link>https://community.cisco.com/t5/wireless/mobility-control-amp-data-encryption/m-p/3955838#M103853</link>
      <description>&lt;P&gt;Thanks, Scott!&lt;/P&gt;&lt;P&gt;It's customer's requirement. We need to either confirm or refuse that both flows encrypted when speaking with their security department. It will not affect the design though, just want to be sure when speaking with them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Nov 2019 19:43:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/mobility-control-amp-data-encryption/m-p/3955838#M103853</guid>
      <dc:creator>Murinos</dc:creator>
      <dc:date>2019-11-08T19:43:09Z</dc:date>
    </item>
    <item>
      <title>Re: Mobility control</title>
      <link>https://community.cisco.com/t5/wireless/mobility-control-amp-data-encryption/m-p/3955905#M103854</link>
      <description>Okay… one thing that is important and is something to discuss with them are: is this for guest and if so, why not make is as simple as possible for the end user.  If they want PSK, then only do WPA2-PSK and not use a portal.  You will not be able to do both together and that is frustrating for an end user whom has to do both if it was even available.  Give them the choice of one or the other:)&lt;BR /&gt;</description>
      <pubDate>Fri, 08 Nov 2019 22:04:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/mobility-control-amp-data-encryption/m-p/3955905#M103854</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2019-11-08T22:04:58Z</dc:date>
    </item>
    <item>
      <title>Re: Mobility control &amp; data encryption</title>
      <link>https://community.cisco.com/t5/wireless/mobility-control-amp-data-encryption/m-p/3955950#M103855</link>
      <description>&lt;P&gt;&lt;EM&gt;In release 8.7 end-to-end Tunnel encrypted between Anchor and Foreign Controllers"&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;by issuing commands:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="keyword kwd CN_CmdName-2A8B56A4"&gt;config mobility group member add&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;config mobility encryption enable&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;(i'm not mentioning adding mobility peers)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But in Configuration Guide it's more complicated:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="keyword kwd CN_CmdName-2A8B56A4"&gt;config mobility group member add&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;EM&gt;peer-mac-addr&amp;nbsp;peer-ip-addr&amp;nbsp;group-name&amp;nbsp;&lt;/EM&gt;&lt;STRONG&gt;&lt;SPAN class="keyword kwd"&gt;encrypt&amp;nbsp;&lt;/SPAN&gt;{&amp;nbsp;&lt;SPAN class="keyword kwd"&gt;enable&lt;/SPAN&gt;&amp;nbsp;|&amp;nbsp;&lt;SPAN class="keyword kwd"&gt;disable&lt;/SPAN&gt;}&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="keyword kwd CN_CmdName-2A8B56A4"&gt;config mobility group member data-dtls&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;EM&gt;peer-mac-addr&amp;nbsp;&lt;/EM&gt;&lt;STRONG&gt;{&amp;nbsp;&lt;SPAN class="keyword kwd"&gt;enable&lt;/SPAN&gt;&amp;nbsp;|&amp;nbsp;&lt;SPAN class="keyword kwd"&gt;disable&lt;/SPAN&gt;}&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;1) Which commands are true?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;SPAN class="keyword kwd CN_CmdName-2A8B56A4"&gt;"config mobility group member add"&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="keyword kwd CN_CmdName-2A8B56A4"&gt;is not the full command syntax. What you see in config guide is full syntax of that command. In other deployment guide, it just give the stating section of that command.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="keyword kwd CN_CmdName-2A8B56A4"&gt;Mobility peer encryption introduced in 8.5MR1 release. So in that version you have to enable it globally (note that WLC will reboot once you enable it ) . See &lt;A href="https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2018/pdf/BRKEWN-2010.pdf" target="_self"&gt;this&lt;/A&gt; Ciscolive presentation (below image from it - slide 16)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="keyword kwd CN_CmdName-2A8B56A4"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="encrypted-mobility.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/49064i79526E365D574CCE/image-size/large?v=v2&amp;amp;px=999" role="button" title="encrypted-mobility.JPG" alt="encrypted-mobility.JPG" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="keyword kwd CN_CmdName-2A8B56A4"&gt;(&lt;FONT face="courier new,courier"&gt;WLC-1) &amp;gt;config mobility ?&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;dscp Configures the Mobility inter controller DSCP value.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;encryption Configures tunnel(control/data) encryption in mobility flat architecture.&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;group Configures the Mobility group parameters.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;multicast-mode Configures the Multicast Mode for mobility messages&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;new-architecture Configure the controller to switch between old and new mobility architecture.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;statistics Resets the mobility statistics&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;(WLC-1) &amp;gt;config mobility encryption enable&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Enabling encryption would change the data and control channel of mobility tunnel from unencrypted to encrypted !!!&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Configuration changes will be saved and System will be rebooted. !!! &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Are you sure you want to continue? (y/n) &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;y&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;Mobility tunnel encryption is enabled for flat architecture.&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;The system has unsaved changes.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Configuration saved!&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;System will now restart!&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Later versions, you do not have option to enable it like that. You can enable it per mobility member. Here is a controller running on 8.10 configuration options.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="keyword kwd CN_CmdName-2A8B56A4"&gt;(&lt;FONT face="courier new,courier"&gt;WLC-3) &amp;gt;config mobility ? &lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;dscp Configures the Mobility inter controller DSCP value.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;group Configures the Mobility group parameters.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;multicast-mode Configures the Multicast Mode for mobility messages&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;statistics Resets the mobility statistics.&lt;/FONT&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN&gt;&lt;SPAN class="keyword kwd CN_CmdName-2A8B56A4"&gt;(WLC-3) &amp;gt;config mobility group member ?&lt;BR /&gt;&lt;BR /&gt;add Add/Change a Mobility group member to the list.&lt;BR /&gt;data-dtls &lt;STRONG&gt;Optional data-dtls configuration for mobility peer. Default is enabled&lt;/STRONG&gt;&lt;BR /&gt;delete Delete a Mobility group member from the list.&lt;BR /&gt;hash Configure hash key for authorization. Applicable only if member is a Virtual Controller in the same domain.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;(WLC-3) &amp;gt;config mobility group member add 28:94:0f:ae:42:e0 10.5.x.x mildura encrypt ?&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;disable Disables secure communication to peer&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;enable Enables secure communication to peer&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN&gt;&lt;SPAN class="keyword kwd CN_CmdName-2A8B56A4"&gt;(WLC-3) &amp;gt;&lt;STRONG&gt;config mobility group member add&lt;/STRONG&gt; 28:94:0f:ae:42:e0 10.5.x.x mildura &lt;STRONG&gt;encrypt enable&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2.&amp;nbsp; Yes, both control &amp;amp; data will be encrypted. You can disable "data-dtls" if you want&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;(WLC-3) &amp;gt;config mobility group member data-dtls 28:94:0f:ae:42:e0 ?&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;enable Optional data-dtls enable or disable for member&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;disable Optional data-dtls enable or disable for member&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;(WLC-3) &amp;gt;&lt;STRONG&gt;config mobility group member data-dtls&lt;/STRONG&gt; 28:94:0f:ae:42:e0 &lt;STRONG&gt;enable&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;data-dtls already configured&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3. Still mobility messages use UDP 16666 &amp;amp; 16667 in outer headers, however inner traffic (control &amp;amp; data) is encrypted.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Rasika&lt;/P&gt;
&lt;P&gt;*** Pls rate all useful responses ***&lt;/P&gt;</description>
      <pubDate>Fri, 08 Nov 2019 23:20:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/mobility-control-amp-data-encryption/m-p/3955950#M103855</guid>
      <dc:creator>Rasika Nayanajith</dc:creator>
      <dc:date>2019-11-08T23:20:33Z</dc:date>
    </item>
    <item>
      <title>Re: Mobility control &amp; data encryption</title>
      <link>https://community.cisco.com/t5/wireless/mobility-control-amp-data-encryption/m-p/3956524#M103856</link>
      <description>Thank you very much, Rasika!&lt;BR /&gt;It's exactly what I needed to know.</description>
      <pubDate>Mon, 11 Nov 2019 08:03:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/mobility-control-amp-data-encryption/m-p/3956524#M103856</guid>
      <dc:creator>Murinos</dc:creator>
      <dc:date>2019-11-11T08:03:14Z</dc:date>
    </item>
  </channel>
</rss>

