<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: question about UDP 16667 in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/question-about-udp-16667/m-p/1399018#M184408</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is the only command required if you want to enable secure mobility.&amp;nbsp; So UPD port 16667 will need to be allowed, but 16666 doesn't need to be since you are using secure mobility.&amp;nbsp; Now depending on how your setup, you will need other ports allowed if required:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H3&gt;&lt;A name="qa10"&gt;Q. What ports do I need to permit for Lightweight Access Point Protocol (LWAPP) communication when there is a firewall in the network? &lt;/A&gt;&lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;&lt;P&gt;&lt;STRONG&gt;A. &lt;/STRONG&gt;You must enable these ports:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Enable these UDP ports for LWAPP traffic:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Data - 12222&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Control - 12223&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Enable these UDP ports for Mobility traffic:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;16666 - Secured Mode&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;16667 - Unsecured Mode&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Mobility and data messages are usually exchanged through EtherIP packets. &lt;STRONG&gt;IP protocol 97&lt;/STRONG&gt; must be allowed on the firewall to allow EtherIP packets. If you use &lt;STRONG&gt;ESP&lt;/STRONG&gt; to encapsulate mobility packets, you have to permit &lt;STRONG&gt;ISAKMP&lt;/STRONG&gt; through the firewall when you open &lt;STRONG&gt;UDP port 500&lt;/STRONG&gt;. You also have to open the &lt;STRONG&gt;IP protocol 50&lt;/STRONG&gt; to allow the encrypted data to pass through the firewall.&lt;/P&gt;&lt;P&gt;These ports are optional (depending on your requirements):&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;TCP 161 and 162 for SNMP (for the Wireless Control System [WCS])&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;UDP 69 for TFTP&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;TCP 80 and/or 443 for HTTP or HTTPS for GUI access&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;TCP 23 and/or 22 for Telnet or secure shell (SSH) for CLI access&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/BLOCKQUOTE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 26 Mar 2010 11:43:22 GMT</pubDate>
    <dc:creator>Scott Fella</dc:creator>
    <dc:date>2010-03-26T11:43:22Z</dc:date>
    <item>
      <title>question about UDP 16667</title>
      <link>https://community.cisco.com/t5/wireless/question-about-udp-16667/m-p/1399015#M184405</link>
      <description>&lt;P&gt;&lt;SPAN style="color: #000080;"&gt;I have a quick question about UDP 16667, it is said in configuration guide that:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: navy; font-size: 11pt; font-family: Calibri; "&gt;“IPSec encryption can also be configured for the inter-controller mobility messages, in which case port 16667 is used.”&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: navy; font-size: 11pt; font-family: Calibri; "&gt;My question is how to configure IPSec to support it? I can’t find any document describe this. Thanks for any input!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 01:39:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/question-about-udp-16667/m-p/1399015#M184405</guid>
      <dc:creator>bbxie</dc:creator>
      <dc:date>2021-07-04T01:39:57Z</dc:date>
    </item>
    <item>
      <title>Re: question about UDP 16667</title>
      <link>https://community.cisco.com/t5/wireless/question-about-udp-16667/m-p/1399016#M184406</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That might be a good question for TAC or one of the Cisco engineers on this forum.&amp;nbsp; I have seen that listed in the 3.2 code docs way back when and really have not seen any supporting documents on how to configure this feature if it even exist:)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Mar 2010 02:59:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/question-about-udp-16667/m-p/1399016#M184406</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2010-03-26T02:59:34Z</dc:date>
    </item>
    <item>
      <title>Re: question about UDP 16667</title>
      <link>https://community.cisco.com/t5/wireless/question-about-udp-16667/m-p/1399017#M184407</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;What I can find is to &lt;/SPAN&gt;&lt;SPAN style="color: #1f497d; font-family: Tahoma;"&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;use “config mobility secure-mode enable” to use 16667 instead of 16666, however nothing talked about IPSec itself. U&lt;SPAN style="color: #000080;"&gt;sually IPSec has a lot of parameters tunable, but I can't find out any document describing how to configure them. It seems for WLC all the parameters are fixed and not changable; all the IPSec packets are encapsulated with UDP 16667, we don't need to configure anything else in the WLC other than the above command, for all the network equipments(for example Firewall) between the two WLC, only need to allow UDP 16667.&amp;nbsp; I just want to confirm this.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Mar 2010 05:15:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/question-about-udp-16667/m-p/1399017#M184407</guid>
      <dc:creator>bbxie</dc:creator>
      <dc:date>2010-03-26T05:15:26Z</dc:date>
    </item>
    <item>
      <title>Re: question about UDP 16667</title>
      <link>https://community.cisco.com/t5/wireless/question-about-udp-16667/m-p/1399018#M184408</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is the only command required if you want to enable secure mobility.&amp;nbsp; So UPD port 16667 will need to be allowed, but 16666 doesn't need to be since you are using secure mobility.&amp;nbsp; Now depending on how your setup, you will need other ports allowed if required:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H3&gt;&lt;A name="qa10"&gt;Q. What ports do I need to permit for Lightweight Access Point Protocol (LWAPP) communication when there is a firewall in the network? &lt;/A&gt;&lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;&lt;P&gt;&lt;STRONG&gt;A. &lt;/STRONG&gt;You must enable these ports:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Enable these UDP ports for LWAPP traffic:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Data - 12222&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Control - 12223&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Enable these UDP ports for Mobility traffic:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;16666 - Secured Mode&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;16667 - Unsecured Mode&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Mobility and data messages are usually exchanged through EtherIP packets. &lt;STRONG&gt;IP protocol 97&lt;/STRONG&gt; must be allowed on the firewall to allow EtherIP packets. If you use &lt;STRONG&gt;ESP&lt;/STRONG&gt; to encapsulate mobility packets, you have to permit &lt;STRONG&gt;ISAKMP&lt;/STRONG&gt; through the firewall when you open &lt;STRONG&gt;UDP port 500&lt;/STRONG&gt;. You also have to open the &lt;STRONG&gt;IP protocol 50&lt;/STRONG&gt; to allow the encrypted data to pass through the firewall.&lt;/P&gt;&lt;P&gt;These ports are optional (depending on your requirements):&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;TCP 161 and 162 for SNMP (for the Wireless Control System [WCS])&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;UDP 69 for TFTP&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;TCP 80 and/or 443 for HTTP or HTTPS for GUI access&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;TCP 23 and/or 22 for Telnet or secure shell (SSH) for CLI access&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/BLOCKQUOTE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Mar 2010 11:43:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/question-about-udp-16667/m-p/1399018#M184408</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2010-03-26T11:43:22Z</dc:date>
    </item>
    <item>
      <title>Re: question about UDP 16667</title>
      <link>https://community.cisco.com/t5/wireless/question-about-udp-16667/m-p/1399019#M184409</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Scott! Does UDP16667 means ESP will be used and the firewall not only need to allow UDP 16667/IP protocol 97, but also UDP 500 and IP protocol 50?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Mar 2010 04:34:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/question-about-udp-16667/m-p/1399019#M184409</guid>
      <dc:creator>bbxie</dc:creator>
      <dc:date>2010-03-29T04:34:16Z</dc:date>
    </item>
    <item>
      <title>Re: question about UDP 16667</title>
      <link>https://community.cisco.com/t5/wireless/question-about-udp-16667/m-p/1399020#M184410</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem... just open UDP 16667 on the FW from WLC to WLC.&amp;nbsp; ESP is that whole thing about securing mobility messages using ipsec:)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Mar 2010 12:24:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/question-about-udp-16667/m-p/1399020#M184410</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2010-03-29T12:24:43Z</dc:date>
    </item>
  </channel>
</rss>

