What to do if the Omada Software Controller fails to start on Linux after modifying the port ( Controller 5.5.6 or above)

Omada Software Controller( V5 )
Recent updates may have expanded access to feature(s) discussed in this FAQ. Visit your product's support page, select the correct hardware version for your device, and check either the Datasheet or the firmware section for the latest improvements added to your product. Please note that product availability varies by region, and certain models may not be available in your region.
Omada Software Controller uses HTTPS ports 8043 and 8843 for controller management and portal, respectively, and HTTP port 8088 for both controller management and portal. For more information on which ports are used by Omada SDN Controller, please refer to FAQ3281.
You can modify these ports, for example, change the HTTPS port for controller management to 443, but please note that if you are using Omada SDN Controller on Linux, avoid using port 443, because non-root users are not allowed to run services on this port, which will cause the controller to fail to start.
But what if you have already changed the HTTPS management port to 443 and the controller can’t start? Here are some solutions.
Solution 1. Modify settings in “omada.properties” file.
The “omada.properties” file stores some parameters of Omada SDN Controller, and is usually located in the “/opt/tplink/EAPController/properties/” path. The settings for the ports used by the controller in the file are as follows.
#web config
# After Omada Controller is initialized, the configuration of the following three ports will be overwritten.
manage.http.port=8088
manage.https.port=8043
portal.http.port=8088
portal.https.port=8843
However, once the controller is initialized, your changes to the ports in this file will not take effect, and your changes to the ports on the controller webpage will not be synchronized to this file. That is, even if you have already changed the HTTPS management port to 443, it will still show “manage.https.port=8043” here.
To make the port settings here take effect, you need to manually add a new parameter “web.config.override=true”, and then start the controller, the HTTPS management port will be changed to 8043.
#web config
# After Omada Controller is initialized, the configuration of the following three ports will be overwritten.
web.config.override=true
manage.http.port=8088
manage.https.port=8043
portal.http.port=8088
portal.https.port=8843
Then please change the HTTPS management port to 8043 or other ports above 1024 on controller webpage. After that, edit the “omada.properties” file again and set “web.config.override” to false, or delete the parameter.
Solution 2. Allow non-root users to use privileged ports.
The parameter net.ipv4.ip_unprivileged_port_start defines the first unprivileged port in the network namespace. The value defaults to 1024, which means that ports below 1024 are privileged ports and therefore cannot be used by non-root users.
You can execute the command “sysctl net.ipv4.ip_unprivileged_port_start=443” with root privileges to enable non-root users to use port 443 and above, then start the controller, change the HTTPS management port to 8043 or other ports above 1024 on the controller webpage, and restart the controller.
Then execute the command “systctl net. ipv4.ip_unprivileged_port_start=1024” to restore the default settings, as opening privileged ports to non-root users may pose some risk.
Looking for More
Finden Sie diese FAQ hilfreich?
Mit Ihrer Rückmeldung tragen Sie dazu bei, dass wir unsere Webpräsenz verbessern.
Was ist Ihr Bedenken bei diesem Artikel?
- Mit Produkt unzufrieden
- Zu kompliziert
- Irreführende Titel
- Betrifft mich nicht
- Zu ungenau
- Was anderes
Vielen Dank.
Vielen Dank für Ihr Feedback.
Recommend Products
Von United States?
Erhalten Sie Produkte, Events und Leistungen speziell für Ihre Region
Diese Webseite verwendet Cookies, um die Websitenavigation zu verbessern, Online-Aktivitäten zu analysieren und die bestmögliche Nutzererfahrung auf unseren Webseiten zu haben. Sie können der Verwendung von Cookies jederzeit Widersprechen. Nähere Informationen finden Sie in unseren Datenschutzhinweisen.
Diese Webseite verwendet Cookies, um die Websitenavigation zu verbessern, Online-Aktivitäten zu analysieren und die bestmögliche Nutzererfahrung auf unseren Webseiten zu haben. Sie können der Verwendung von Cookies jederzeit Widersprechen. Nähere Informationen finden Sie in unseren Datenschutzhinweisen.
Notwendige Cookies
Diese Cookies sind zur Funktion der Website erforderlich und können in Ihren Systemen nicht deaktiviert werden.
TP-Link
SESSION, JSESSIONID, accepted_local_switcher, tp_privacy_base, tp_privacy_marketing, tp_smb-select-product_scence, tp_smb-select-product_scenceSimple, tp_smb-select-product_userChoice, tp_smb-select-product_userChoiceSimple, tp_smb-select-product_userInfo, tp_smb-select-product_userInfoSimple, tp_top-banner, tp_popup-bottom, tp_popup-center, tp_popup-right-middle, tp_popup-right-bottom, tp_productCategoryType
Youtube
id, VISITOR_INFO1_LIVE, LOGIN_INFO, SIDCC, SAPISID, APISID, SSID, SID, YSC, __Secure-1PSID, __Secure-1PAPISID, __Secure-1PSIDCC, __Secure-3PSID, __Secure-3PAPISID, __Secure-3PSIDCC, 1P_JAR, AEC, NID, OTZ
Zendesk
OptanonConsent, __cf_bm, __cfruid, _cfuvid, _help_center_session, _pendo___sg__.<container-id>, _pendo_meta.<container-id>, _pendo_visitorId.<container-id>, _zendesk_authenticated, _zendesk_cookie, _zendesk_session, _zendesk_shared_session, ajs_anonymous_id, cf_clearance
Analyse- und Marketing-Cookies
Analyse-Cookies ermöglichen es uns, Ihre Aktivitäten auf unserer Website zu analysieren, um die Funktionsweise unserer Website zu verbessern und anzupassen.
Die Marketing-Cookies können über unsere Website von unseren Werbepartnern gesetzt werden, um ein Profil Ihrer Interessen zu erstellen und Ihnen relevante Anzeigen auf anderen Websites zu zeigen.
Google Analytics & Google Tag Manager
_gid, _ga_<container-id>, _ga, _gat_gtag_<container-id>
Google Ads & DoubleClick
test_cookie, _gcl_au