Information about Encrypted Mobility Tunnel
A secure link in which data is encrypted using CAPWAP DTLS protocol can be established between two controllers. This secured link is called Encrypted Mobility Tunnel.
If encrypted mobility tunnel is in enabled state, the data traffic is encrypted and the controller uses UDP port 16667, instead of EoIP, to send the data traffic.
To ensure that controllers with expired MIC certificates are able to join the encrypted mobility tunnel enabled network, an existing CLI is used to disable the MIC certificate date validation.
Note |
This command disables the date validation check during Cisco AP join and encrypted mobility tunnel creation. When the config ap cert-expiry-ignore CLI is enabled, the lifetime check is disabled. |
Restrictions for Encrypted Mobility Tunnel
-
This feature is supported on Cisco 3504, 5520, and 8540 controllers only.
Note
The Cisco 5508 and 8510 Wireless Controllers do not support tunnel encryption protocols. They support IRCM with unencrypted mobility tunnels only.
-
Native IPv6 is not supported.
-
Mobility Multicast for an encrypted tunnel is not supported.
-
The Encrypted Mobility Tunnel feature should be enabled on all the mobility peers in the network to have the tunnel created. The default state is set to disabled.
-
If the packets passing through the controller after L3 roaming are greater than the MTU size of the controller in secure mobility, along with secure mobility, data encryption functionality must be enabled for the fragmented packets to be forwarded through a secure mobility tunnel.
-
Only MIC certificate is supported to create the tunnel.
-
When using Cisco 3504 controller as an anchor, we recommend reducing the client load by 30% of the controller's maximum load capability.
Configuring Global Encrypted Mobility Tunnel (GUI)
Procedure
Step 1 |
Choose Global Configuration page. to open the |
Step 2 |
Check the Mobility Encryption check box to enable mobility encryption on the network. |
Step 3 |
Save the configuration. |
Configuring Global Encrypted Mobility Tunnel (CLI)
Procedure
Step 1 |
[Optional] Disable the MIC certificate validation check by entering this command: config ap cert-expiry-ignore mic { enable | disable }
|
||
Step 2 |
Configure encrypted mobility tunnel by entering this command: config mobility encryption {enable | disable}
|
||
Step 3 |
View the status of the encrypted mobility tunnel by entering this command: lines show mobility summary
Information similar to the following is displayed:
|