Users Guide

Table Of Contents
Dell PowerConnect ArubaOS 5.0 | User Guide] External Firewall Configuration | 601
Appendix B
External Firewall Configuration
In many deployment scenarios, an external firewall is situated between Dell devices. This appendix describes the
network ports that need to be configured on the external firewall to allow proper operation of the Dell network.
You can also use this information to configure session ACLs to apply to physical ports on the controller for
enhanced security. Note, however, that this appendix does not describe requirements for allowing specific types
of user traffic on the network.
This appendix includes the following topics:
z “Communication Between Dell Devices” on page601
z “Network Management Access” on page602
z “Other Communications” on page602
Communication Between Dell Devices
This section describes the network ports that need to be configured on the firewall to allow proper operation of
the Dell network.
Between any two controllers:
z IPsec (UDP ports 500 and 4500) and ESP (protocol 50). PAPI between a master and a local controller is
encapsulated in IPsec .
z IP-IP (protocol 94) and UDP port 443 if Layer-3 mobility is enabled.
z GRE (protocol 47) if tunneling guest traffic over GRE to DMZ controller.
z IKE (UDP 500).
z ESP (protocol 50).
z NAT-T (UDP 4500).
Between an AP and the master controller:
z PAPI (UDP port 8211). If the AP uses DNS to discover the LMS controller, the AP first attempts to connect
to the master controller. (Also allow DNS (UDP port 53) traffic from the AP to the DNS server.)
z PAPI (UDP port 8211). All APs running as Air Monitors (AMs) require a permanent PAPI connection to the
master controller.
From an AP to the LMS controller:
z FTP (TCP port 21).
z TFTP (UDP port 69) for AP-52. For all other APs, if there is no local image on the AP (for example, a brand
new AP) the AP will use TFTP to retrieve the initial image.
z NTP (UDP port 123).
z SYSLOG (UDP port 514).
z PAPI (UDP port 8211).
z GRE (protocol 47).
Note: A controller uses both its loopback address and VLAN addresses for communications with other network elements. If the
firewall uses host-specific ACLS, those ACLs must specify all IP addresses used on the controller.