Cisco NAC3350-PROF-K9 Hardware Installation Guide - Page 104

Cisco NAC Appliance Connectivity Across a Firewall

Page 104 highlights

Cisco NAC Appliance Connectivity Across a Firewall Chapter 3 Installing the Clean Access Manager and Clean Access Server 4. Before deploying the CAS in a production environment, Cisco Strongly recommends acquiring a trusted certificate from a third-party Certificate Authority to replace the temporary certificate (in order to avoid the security warning that is displayed to end users during user login). For further details, see the "Manage CAS SSL Certificates" and "Synchronize System Time" sections of the Cisco NAC Appliance - Clean Access Server Configuration Guide, Release 4.8(3). For details on CAM certificates, see the Cisco NAC Appliance - Clean Access Manager Configuration Guide, Release 4.8(3). Cisco NAC Appliance Connectivity Across a Firewall The Clean Access Manager (CAM) uses Java Remote Method Invocation (RMI) for parts of its communication with the Clean Access Server (CAS), which means it uses dynamically allocated ports for this purpose. If your deployment has a firewall between the CAS and the CAM, you will need to set up rules in the firewall to allow communication between the CAS and CAM machines, that is, a rule that allows traffic originating from the CAM destined to the CAS and vice versa. Note If there is a NAT router between the CAS and CAM, also refer to section "Configuring the CAS Behind a NAT Firewall" in the Installation chapter of the Cisco NAC Appliance - Clean Access Server Configuration Guide, Release 4.8(3) for additional details. Table 3-1 lists the ports that are required for communication between the CAS and the CAM (per version of Cisco NAC Appliance). Table 3-1 Port Connectivity for CAM/CAS Cisco NAC Appliance Version Required Ports 4.8 4.7(x) 4.6(1) 4.5(x) 4.1(x) 4.0(x) TCP ports 443, 1099, and 8995~8996 3.6(x) TCP ports 80, 443, 1099, and 8995~8996 3.5(x) TCP ports 80, 443, 1099, and 32768~61000 (usually 32768~32999 are sufficient). For example, for Single Sign-On (SSO) capabilities, additional ports must be opened on the CAS and firewall (if any) to allow communication between the Agent and the Active Directory Server, as shown in Table 3-2. Table 3-2 provides further details about communicating devices, the ports affected, and the purpose of each port. 3-34 Cisco NAC Appliance Hardware Installation Guide OL-20326-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176

3-34
Cisco NAC Appliance Hardware Installation Guide
OL-20326-01
Chapter 3
Installing the Clean Access Manager and Clean Access Server
Cisco NAC Appliance Connectivity Across a Firewall
4.
Before deploying the CAS in a production environment, Cisco Strongly recommends acquiring a
trusted certificate from a third-party Certificate Authority to replace the temporary certificate (in
order to avoid the security warning that is displayed to end users during user login).
For further details, see the “Manage CAS SSL Certificates” and “Synchronize System Time” sections
of the
Cisco NAC Appliance - Clean Access Server Configuration Guide, Release 4.8(3)
. For details on
CAM certificates, see the
Cisco NAC Appliance - Clean Access Manager Configuration Guide, Release
4.8(3)
.
Cisco NAC Appliance Connectivity Across a Firewall
The Clean Access Manager (CAM) uses Java Remote Method Invocation (RMI) for parts of its
communication with the Clean Access Server (CAS), which means it uses dynamically allocated ports
for this purpose. If your deployment has a firewall between the CAS and the CAM, you will need to set
up rules in the firewall to allow communication between the CAS and CAM machines, that is, a rule that
allows traffic originating from the CAM destined to the CAS and vice versa.
Note
If there is a NAT router between the CAS and CAM, also refer to section “Configuring the CAS Behind
a NAT Firewall” in the Installation chapter of the
Cisco NAC Appliance - Clean Access Server
Configuration Guide, Release 4.8(3)
for additional details.
Table 3-1
lists the ports that are required for communication between the CAS and the CAM (per version
of Cisco NAC Appliance).
For example, for Single Sign-On (SSO) capabilities, additional ports must be opened on the CAS and
firewall (if any) to allow communication between the Agent and the Active Directory Server, as shown
in
Table 3-2
.
Table 3-2
provides further details about communicating devices, the ports affected, and the
purpose of each port.
Table 3-1
Port Connectivity for CAM/CAS
Cisco NAC
Appliance Version
Required Ports
4.8
4.7(x)
4.6(1)
4.5(x)
4.1(x)
4.0(x)
TCP ports 443, 1099, and 8995~8996
3.6(x)
TCP ports 80, 443, 1099, and 8995~8996
3.5(x)
TCP ports 80, 443, 1099, and 32768~61000 (usually 32768~32999 are sufficient).