summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc4564.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc4564.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc4564.txt')
-rw-r--r--doc/rfc/rfc4564.txt1795
1 files changed, 1795 insertions, 0 deletions
diff --git a/doc/rfc/rfc4564.txt b/doc/rfc/rfc4564.txt
new file mode 100644
index 0000000..4618890
--- /dev/null
+++ b/doc/rfc/rfc4564.txt
@@ -0,0 +1,1795 @@
+
+
+
+
+
+
+Network Working Group S. Govindan, Ed.
+Request for Comments: 4564 H. Cheng
+Category: Informational Panasonic
+ ZH. Yao
+ Huawei
+ WH. Zhou
+ China Mobile
+ L. Yang
+ Intel
+ July 2006
+
+
+ Objectives for
+ Control and Provisioning of Wireless Access Points (CAPWAP)
+
+Status of This Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard of any kind. Distribution of this
+ memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (2006).
+
+Abstract
+
+ This document presents objectives for an interoperable protocol for
+ the Control and Provisioning of Wireless Access Points (CAPWAP). The
+ document aims to establish a set of focused requirements for the
+ development and evaluation of a CAPWAP protocol. The objectives
+ address architecture, operation, security, and network operator
+ requirements that are necessary to enable interoperability among
+ Wireless Local Area Network (WLAN) devices of alternative designs.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Govindan, et al. Informational [Page 1]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+Table of Contents
+
+ 1. Introduction ....................................................3
+ 2. Terminology .....................................................3
+ 3. Requirements Notation ...........................................4
+ 4. Objectives Overview .............................................4
+ 5. Objectives ......................................................5
+ 5.1. Mandatory and Accepted Objectives ..........................5
+ 5.1.1. Logical Groups ......................................5
+ 5.1.2. Support for Traffic Separation ......................6
+ 5.1.3. Wireless Terminal Transparency ......................8
+ 5.1.4. Configuration Consistency ...........................8
+ 5.1.5. Firmware Trigger ....................................9
+ 5.1.6. Monitoring and Exchange of System-wide
+ Resource State .....................................10
+ 5.1.7. Resource Control Objective .........................11
+ 5.1.8. CAPWAP Protocol Security ...........................12
+ 5.1.9. System-wide Security ...............................14
+ 5.1.10. IEEE 802.11i Considerations .......................15
+ 5.1.11. Interoperability Objective .......................17
+ 5.1.12. Protocol Specifications ..........................18
+ 5.1.13. Vendor Independence ..............................19
+ 5.1.14. Vendor Flexibility ...............................19
+ 5.1.15. NAT Traversal ....................................20
+ 5.2. Desirable Objectives ......................................21
+ 5.2.1. Multiple Authentication Mechanisms .................21
+ 5.2.2. Support for Future Wireless Technologies ...........21
+ 5.2.3. Support for New IEEE Requirements ..................22
+ 5.2.4. Interconnection Objective ..........................23
+ 5.2.5. Access Control ....................................24
+ 5.3. Non-Objectives ............................................25
+ 5.3.1. Support for Non-CAPWAP WTPs ........................25
+ 5.3.2. Technical Specifications ...........................26
+ 5.4. Operator Requirements .....................................27
+ 5.4.1. AP Fast Handoff ....................................27
+ 6. Summary and Conclusion .........................................27
+ 7. Security Considerations ........................................28
+ 8. Acknowledgements ...............................................29
+ 9. Normative References ...........................................29
+ 10. Informative References ........................................29
+
+
+
+
+
+
+
+
+
+
+
+Govindan, et al. Informational [Page 2]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+1. Introduction
+
+ The growth in large-scale Wireless Local Area Network (WLAN)
+ deployments has brought into focus a number of technical challenges.
+ Among them is the complexity of managing large numbers of Wireless
+ Termination Points (WTPs), which is further exacerbated by variations
+ in their design. Another challenge is the maintenance of consistent
+ configurations among the numerous WTPs of a system. The dynamic
+ nature of the wireless medium is also a concern together with WLAN
+ security. The challenges affecting large-scale WLAN deployments have
+ been highlighted in [RFC3990].
+
+ Many vendors have addressed these challenges by developing new
+ architectures and solutions. A survey of the various developments
+ was conducted to better understand the context of these challenges.
+ This survey is a first step towards designing interoperability among
+ the solutions. The Architecture Taxonomy [RFC4118] is a result of
+ this survey in which major WLAN architecture families are classified.
+ Broadly, these are the autonomous, centralized WLAN, and distributed
+ mesh architectures.
+
+ The Architecture Taxonomy identified the centralized WLAN
+ architecture as one in which portions of the wireless medium access
+ control (MAC) operations are centralized in a WLAN controller. This
+ centralized WLAN architecture is further classified into remote-MAC,
+ split-MAC, and local-MAC designs. Each differs in the degree of
+ separation of wireless MAC layer capabilities between WTPs and WLAN
+ controller.
+
+ This document puts forward critical objectives for achieving
+ interoperability in the CAPWAP framework. It presents requirements
+ that address the challenges of controlling and provisioning large-
+ scale WLAN deployments. The realization of these objectives in a
+ CAPWAP protocol will ensure that WLAN equipment of major design types
+ may be integrally deployed and managed.
+
+2. Terminology
+
+ This document uses terminology defined in [RFC4118], [802.11],
+ [802.11i], and [802.11e]. Additionally, the following terms are
+ defined.
+
+ Centralized WLAN: A WLAN based on the centralized WLAN Architecture
+ [RFC4118].
+
+ Switching Segment: Those aspects of a centralized WLAN that primarily
+ deal with switching or routing of control and data information
+ between Wireless Termination Points (WTPs) and the WLAN controller.
+
+
+
+Govindan, et al. Informational [Page 3]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+ Wireless Medium Segment: Those aspects of a centralized WLAN that
+ primarily deal with the wireless interface between WTPs and wireless
+ terminals. The Wireless Medium Segment is specific to layer 2
+ wireless technology, such as IEEE 802.11.
+
+ CAPWAP Framework: A term that covers the local-MAC and split-MAC
+ designs of the Centralized WLAN Architecture. Standardization
+ efforts are focused on these designs.
+
+ CAPWAP Protocol: The protocol between WLAN controller and WTPs in the
+ CAPWAP framework. It facilitates control, management, and
+ provisioning of WTPs in an interoperable manner.
+
+ Logical Group: A logical separation of a physical WTP is termed
+ logical group. So a single physical WTP will operate a number of
+ logical groups. Virtual access points (APs) are examples of logical
+ groups. Here, each Basic Service Set Identifier (BSSID) and
+ constituent wireless terminals' radios are denoted as distinct
+ logical groups of a physical WTP. Logical groups are maintained
+ without conflicting with the CAPWAP objectives, particularly the
+ 'Wireless Terminal Transparency' objective.
+
+3. Requirements Notation
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
+ document are to be interpreted as described in [RFC2119].
+
+4. Objectives Overview
+
+ The objectives for CAPWAP have been broadly classified to address
+ architecture, operation, and security requirements of managing
+ large-scale WLAN deployments.
+
+ Architecture objectives deal with system-level aspects of the CAPWAP
+ protocol. They address issues of protocol extensibility, diversity
+ in network deployments and architecture designs, and differences in
+ transport technologies.
+
+ Operational objectives address the control and management features of
+ the CAPWAP protocol. They deal with operations relating to WLAN
+ monitoring, resource management, Quality of Service (QoS), and access
+ control.
+
+ Security objectives address potential threats to WLANs and their
+ containment. In the CAPWAP context, security requirements cover the
+ protocol between the WLAN controller and WTPs and also the WLAN
+ system as a whole.
+
+
+
+Govindan, et al. Informational [Page 4]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+ Additionally, a general classification is used for objectives
+ relating to the overall impact of the CAPWAP protocol specifications.
+
+5. Objectives
+
+ The objectives described in this document have been prioritized based
+ on their immediate significance in the development and evaluation of
+ a control and provisioning protocol for large-scale WLAN deployments.
+ The priorities are:
+
+ i. Mandatory and Accepted Objectives
+ ii. Desirable Objectives
+ iii. Non-Objectives
+
+ The priorities have been assigned to individual objectives in
+ accordance with working group discussions.
+
+ Furthermore, a distinct category of objectives is provided based on
+ requirements gathered from network service operators. These are
+ specific needs that arise from operators' experiences in deploying
+ and managing large-scale WLANs.
+
+ a. Operator Requirements
+
+5.1. Mandatory and Accepted Objectives
+
+ Objectives prioritized as mandatory and accepted have been deemed
+ crucial for the control and provisioning of WTPs. They directly
+ address the challenges of large-scale WLAN deployments and MUST be
+ realized by a CAPWAP protocol.
+
+5.1.1. Logical Groups
+
+ Classification: Architecture
+
+ Description:
+
+ Large WLAN deployments are complex and expensive. Furthermore,
+ enterprises deploying such networks are under pressure to improve the
+ efficiency of their expenditures.
+
+ Shared WLAN deployments, where a single physical WLAN infrastructure
+ supports a number of logical networks, are increasingly used to
+ address these two issues of large-scale WLANs. These are popular as
+ they allow deployment and management costs to be spread across
+ businesses.
+
+
+
+
+
+Govindan, et al. Informational [Page 5]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+ In traditional WLANs, each physical WTP represents one complete
+ subset of a larger WLAN system. Shared WLANs differ in that each
+ physical WTP represents a number of logical subsets of possibly a
+ number of larger WLAN systems. Each logical division of a physical
+ WTP is referred to as a logical group (see definition in Section 2).
+ So WLANs are managed in terms of logical groups instead of physical
+ WTPs. Logical groups are based on BSSIDs and other types of virtual
+ APs.
+
+ Protocol Requirement:
+
+ The CAPWAP protocol MUST be capable of controlling and managing
+ physical WTPs in terms of logical groups including BSSID-based
+ groups.
+
+ For all operating modes, including those in which the WTP performs
+ local bridging and those in which the Access Controller (AC) performs
+ centralized bridging, the protocol MUST provide provisions for
+ configuring logical groups at the WTP.
+
+ Motivation and Protocol Benefits:
+
+ Commercial realities necessitate that WLANs be manageable in terms of
+ their logical groups. This allows separation of logical services and
+ underlying infrastructure management. A protocol that realizes this
+ need ensures simpler and cost-effective WLANs, which directly address
+ the requirements of network service operators.
+
+ Relation to Problem Statement:
+
+ This objective addresses the problem of management complexity in
+ terms of costs. Cost complexity is reduced by sharing WLAN
+ deployments. Consequently, deployment and management cost-
+ efficiencies are realized.
+
+5.1.2. Support for Traffic Separation
+
+ Classification: Operations
+
+ Description:
+
+ The centralized WLAN architecture simplifies complexity associated
+ with large-scale deployments by consolidating portions of wireless
+ MAC functionality at a central WLAN controller and distributing the
+ remaining across WTPs. As a result, WTPs and WLAN controller
+ exchange control and data information between them. This objective
+
+
+
+
+
+Govindan, et al. Informational [Page 6]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+ states that control and data aspects of the exchanges be mutually
+ separated for further simplicity. This will allow solutions for each
+ type of exchange to be independently optimized.
+
+ Furthermore, in the context of shared WLAN deployments, the mutual
+ separation of control and data also addresses security concerns. In
+ particular, given the likelihood of different logical groups, such as
+ those established by different virtual APs, being managed by
+ different administrators, separation of control and data is a first
+ step towards individually containing and securing the logical groups.
+
+ It is also important to ensure that traffic from each logical group
+ is mutually separated to maintain the integrity and independence of
+ the logical groups.
+
+ Protocol Requirement:
+
+ The CAPWAP protocol MUST define transport control messages such that
+ the transport of control messages is separate from the transport of
+ data messages.
+
+ Motivation and Protocol Benefits:
+
+ The aim of separating data and control aspects of the protocol is to
+ simplify the protocol. It also allows for the flexibility of
+ addressing each type of traffic in the most appropriate manner.
+
+ Furthermore, this requirement will help remotely located WTPs to
+ handle data traffic in alternative ways without the need for
+ forwarding them across a wide network to the WLAN controller.
+
+ Separation of WTP control and data also aids in the secure
+ realization of shared WLAN deployments.
+
+ Relation to Problem Statement:
+
+ Broadly, this objective relates to the challenge of managing
+ complexity in large-scale WLANs. The requirement for traffic
+ separation simplifies control as this is separated from the task of
+ data transport.
+
+
+
+
+
+
+
+
+
+
+
+Govindan, et al. Informational [Page 7]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+5.1.3. Wireless Terminal Transparency
+
+ Classification: Operations
+
+ Description:
+
+ The CAPWAP protocol is applicable between a centralized WLAN
+ controller and a number of WTPs; i.e., it affects only the switching
+ segment of the centralized WLAN architecture. Its operations should
+ therefore be independent of the wireless terminal. Wireless
+ terminals should not be required to be aware of the existence of the
+ CAPWAP protocol.
+
+ Protocol Requirement:
+
+ Wireless terminals MUST NOT be required to recognize or be aware of
+ the CAPWAP protocol.
+
+ Motivation and Protocol Benefits:
+
+ IEEE 802.11-based wireless terminals are mature and widely available.
+ It would be beneficial for CAPWAP not to impose new requirements on
+ these wireless terminals. In effect, this requirement ensures that
+ the setup cost of the protocol is reduced as the numerous existing
+ wireless terminals need not be altered.
+
+ Relation to Problem Statement:
+
+ The Problem Statement highlights the challenges faced by large WLANs
+ consisting of many WTPs. It does not refer to the operations of
+ wireless terminals and this objective emphasizes the independence.
+
+5.1.4. Configuration Consistency
+
+ Classification: Operations
+
+ Description:
+
+ WLANs in the CAPWAP framework contain numerous WTPs, each of them
+ needing to be configured and managed in a consistent manner. The
+ main concern in ensuring consistency is availability of appropriate
+ information corresponding to WTP configuration states. So
+ configuration consistency can be achieved by providing the
+ centralized WLAN controller with regular updates on the state of WTP
+ operations. The centralized WLAN controller can in turn apply
+ information from the regular updates to ensure consistently among the
+ WTPs.
+
+
+
+
+Govindan, et al. Informational [Page 8]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+ Protocol Requirement:
+
+ The CAPWAP protocol MUST include support for regular exchanges of
+ state information between WTPs and the WLAN controller. Examples of
+ state information include WTP processing load and memory utilization.
+
+ Motivation and Protocol Benefits:
+
+ A protocol that provides access to regular state information can in
+ turn be used to enhance WLAN configuration and performance. The
+ CAPWAP protocol will be better equipped to address configuration-
+ related problems with the regularly available state information. So
+ with greater state information, control and management operations can
+ be improved.
+
+ Relation to Problem Statement:
+
+ One of the major challenges described in the Problem Statement is
+ that of maintaining consistent configuration across the numerous WTPs
+ of a WLAN. This objective addresses the fundamental issue behind
+ this -- availability of timely state information.
+
+5.1.5. Firmware Trigger
+
+ Classification: Operations
+
+ Description:
+
+ One specific aspect of configuration consistency is the firmware used
+ by various WTPs. The scale of large WLANs introduces possibilities
+ for variations in the firmware used among WTPs. This objective
+ highlights the need for the CAPWAP protocol to trigger the delivery
+ of appropriate versions of firmware to WTPs. The actual delivery of
+ firmware need not be inclusive to the protocol.
+
+ Protocol Requirement:
+
+ The CAPWAP protocol MUST support a trigger for delivery of firmware
+ updates.
+
+ Motivation and Protocol Benefits:
+
+ The CAPWAP protocol interfaces many WTPs to a centralized WLAN
+ controller. Firmware distribution allows these interfaces to be
+ compatible. This in turn results in consistent configuration and
+ simplified management. So the protocol benefits by including
+ triggers for the distribution of firmware updates.
+
+
+
+
+Govindan, et al. Informational [Page 9]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+ Relation to Problem Statement:
+
+ Inconsistencies in the configuration of WTPs have been identified as
+ a major challenge for large-scale WTPs. This objective helps
+ overcome the challenge by providing a way for the CAPWAP protocol to
+ initiate delivery of firmware updates that are compatible among all
+ WTPs.
+
+5.1.6. Monitoring and Exchange of System-wide Resource State
+
+ Classification: Operations
+
+ Description:
+
+ The centralized WLAN architecture is made up of a switching segment
+ and wireless medium segment. In the switching segment, network
+ congestion, WTP status, and firmware information have to be
+ monitored. In the wireless medium segment, the dynamic nature of the
+ medium itself has to be monitored. Overall, there are also various
+ statistics that need to be considered for efficient WLAN operation.
+
+ The CAPWAP protocol should be capable of monitoring the various
+ information sources and deliver the resulting information to the
+ relevant WLAN devices -- either WTPs or the WLAN controller.
+ Moreover, given the relationship among information sources, the
+ CAPWAP protocol should combine state information from them. For
+ example, statistics information and status signals from WTPs may be
+ merged before being exchanged.
+
+ Examples of statistics information that the CAPWAP protocol should
+ monitor and exchange include congestion state, interference levels,
+ loss rates, and various delay factors.
+
+ Protocol Requirement:
+
+ The CAPWAP protocol MUST allow for the exchange of statistics,
+ congestion, and other WLAN state information.
+
+ Motivation and Protocol Benefits:
+
+ The effectiveness of a protocol is based on the relevance of
+ information on which it operates. This requirement for resource
+ monitoring and exchange can provide the appropriate information to
+ the CAPWAP protocol.
+
+
+
+
+
+
+
+Govindan, et al. Informational [Page 10]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+ Relation to Problem Statement:
+
+ The Problem Statement highlights the challenge of dealing with large
+ numbers of WTPs and the dynamic nature of the wireless medium.
+ Information on the state of WTPs and the medium is important to deal
+ with them effectively. So this objective relates to the problem of
+ managing consistency in large WLANs.
+
+5.1.7. Resource Control Objective
+
+ Classification: Operations
+
+ Description:
+
+ Integral to the success of any wireless network system is the
+ performance and quality it can offer its subscribers. Since CAPWAP-
+ based WLANs combine a switching segment and a wireless medium
+ segment, performance and quality need to be coordinated across both
+ of these segments. So QoS performance must be enforced system-wide.
+
+ This objective highlights QoS over the entire WLAN system, which
+ includes the switching segment and the wireless medium segment.
+ Given the fundamental differences between the two, it is likely that
+ there are alternate QoS mechanisms between WTPs and wireless service
+ subscribers and between WTPs and WLAN controllers. For instance, the
+ former will be based on IEEE 802.11e, whereas the latter will be an
+ alternative. So resources need to be adjusted in a coordinated
+ fashion over both segments. The CAPWAP protocol should ensure that
+ these adjustments are appropriately exchanged between WLAN
+ controllers and WTPs.
+
+ In addition to IEEE 802.11e, there are a number of other IEEE 802.11
+ task groups that may affect network resources. These include IEEE
+ 802.11 TGk, TGu, and TGv, which are currently in progress. CAPWAP
+ should therefore not be restricted to IEEE 802.11e-based mapping.
+
+ Protocol Requirement:
+
+ The CAPWAP protocol MUST map the IEEE 802.11e QoS priorities to
+ equivalent QoS priorities across the switching and wireless medium
+ segments.
+
+
+
+
+
+
+
+
+
+
+Govindan, et al. Informational [Page 11]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+ Motivation and Protocol Benefits:
+
+ A protocol that addresses QoS aspects of WLAN systems will deliver
+ high performance thereby being beneficial for subscribers and for
+ resource utilization efficiency. Since CAPWAP deals with WTPs
+ directly and with the wireless medium indirectly, both of these must
+ be considered for performance.
+
+ For the wireless medium segment, QoS aspects in the protocol enable
+ high-quality communications within the domain of a WLAN controller.
+ Since each domain generally covers an enterprise or a group of
+ service providers, such protocol performance has wide-ranging
+ effects.
+
+ Within the switching segment of CAPWAP, a QoS-enabled protocol
+ minimizes the adverse effects of dynamic traffic characteristics so
+ as to ensure system-wide performance.
+
+ Relation to Problem Statement:
+
+ QoS control is critical to large WLANs and relates to a number of
+ aspects. In particular, this objective can help address the problem
+ of managing dynamic conditions of the wireless medium.
+
+ Furthermore, traffic characteristics in large-scale WLANs are
+ constantly varying. So network utilization becomes inefficient, and
+ user experience is unpredictable.
+
+ The interaction and coordination between the two aspects of system-
+ wide QoS are therefore critical for performance.
+
+5.1.8. CAPWAP Protocol Security
+
+ Classification: Security
+
+ Description:
+
+ This objective addresses the security of the CAPWAP protocol.
+
+ The CAPWAP protocol MUST first provide for the participating entities
+ -- the WLAN controller and WTPs -- to be explicitly mutually
+ authenticated. This is to ensure that rogue elements do not gain
+ access to the WLAN system. Rogue WTPs should not be allowed to
+ breach legitimate WLANs, and at the same time rogue WLAN controllers
+ should not be allowed to gain control of legitimate WTPs. For
+ example, WTPs may need to regularly renew their authentication state
+ with the WLAN controller and similarly for WLAN controllers.
+
+
+
+
+Govindan, et al. Informational [Page 12]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+ If authentication is performed via an authenticated key exchange,
+ future knowledge of derived keys is not sufficient for
+ authentication.
+
+ Any session keys used between the WLAN controller and WTPs MUST be
+ mutually derived using entropy contributed by both parties. This
+ ensures that no one party has control over the resulting session
+ keys.
+
+ Once WTPs and the WLAN controller have been mutually authenticated,
+ information exchanges between them must be secured against various
+ security threats. So the CAPWAP protocol MUST provide integrity
+ protection and replay protection. The protocol SHOULD provide
+ confidentiality through encryption. This should cover illegitimate
+ modifications to protocol exchanges, eavesdropping, and Denial of
+ Service (DoS) attacks, among other potential compromises. So the
+ protocol must provide confidentiality, integrity, and authenticity
+ for those exchanges.
+
+ As a result of realizing this objective, it should not be possible
+ for individual WTP breaches to affect the security of the WLAN as a
+ whole. So WTP misuse will be protected against.
+
+ Additionally, the key establishment protocol for authentication and
+ securing CAPWAP exchanges must be designed to minimize the
+ possibility of future compromises after the keys are established.
+
+ CAPWAP MUST NOT prevent the use of asymmetric authentication. The
+ security considerations of such asymmetric authentication are
+ described in the Security Considerations section.
+
+ If the CAPWAP protocol meets the criteria to require automated key
+ management per BCP 107 [RFC4107], then mutual authentication MUST be
+ accomplished via an authenticated key exchange.
+
+ Protocol Requirement:
+
+ The CAPWAP protocol MUST support mutual authentication of WTPs and
+ the centralized controller. It also MUST ensure that information
+ exchanges are integrity protected and SHOULD ensure confidentiality
+ through encryption.
+
+
+
+
+
+
+
+
+
+
+Govindan, et al. Informational [Page 13]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+ Motivation and Protocol Benefits:
+
+ WLANs are increasingly deployed in critical aspects of enterprise and
+ consumer networks. In these contexts, protocol security is crucial
+ to ensure the privacy and integrity expected from network
+ administrators and end-users. So securing the CAPWAP protocol has
+ direct benefits in addressing these concerns.
+
+ In many cases, the network path between a WTP and WLAN controller
+ contains untrusted links. Such links could be leveraged by rogue
+ WTPs to gain access to the WLAN system. They could also be used by
+ rogue WLAN controllers to gain control of legitimate WTPs and their
+ associated terminals to either redirect or compromise terminal
+ traffic. These security concerns can be mitigated with this
+ objective.
+
+ Relation to Problem Statement:
+
+ Security problems in large-scale WLANs are detailed in the Problem
+ Statement. These include complications arising from rogue WTPs and
+ compromised interfaces between WTPs and the WLAN controller. The
+ requirement for protocol security addresses these problems and
+ highlights the importance of protecting against them.
+
+5.1.9. System-wide Security
+
+ Classification: Security
+
+ Description:
+
+ The emphasis of this objective is on the security threats external to
+ the centralized CAPWAP segment of a WLAN system. The focus is
+ therefore on rogue wireless clients and other illegitimate wireless
+ interferences. There are a number of specific external threats that
+ need to be addressed within the CAPWAP framework.
+
+ i. PMK Sharing
+
+ One aspect of this objective relates to recent discussions on
+ Pairwise Master Key (PMK) sharing in the CAPWAP framework. This
+ objective highlights the need to prevent exploitation of this
+ ambiguity by rogue wireless clients. It is to ensure that any
+ ambiguities arising from the CAPWAP framework are not cause for
+ security breaches.
+
+
+
+
+
+
+
+Govindan, et al. Informational [Page 14]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+ Protocol Requirement:
+
+ The design of the CAPWAP protocol MUST NOT allow for any compromises
+ to the WLAN system by external entities.
+
+ Motivation and Protocol Benefits:
+
+ The external threats to the centralized WLAN architecture become
+ increasingly crucial given the low cost of wireless clients. Since
+ it is relatively inexpensive for rogue individuals to mount attacks,
+ it is important that WLAN systems are protected against them.
+ Adequate mechanisms to thwart such external threats will be of
+ tremendous benefit to the WLAN systems controlled and managed with
+ the CAPWAP protocol.
+
+ Relation to Problem Statement:
+
+ This objective is based on the security needs highlighted in the
+ Problem Statement. Specifically, the Problem Statement discusses the
+ effects of the shared wireless medium. This represents the external
+ aspects of the CAPWAP framework from which certain threats can arise.
+ The system-wide security objective addresses such threats in relation
+ to the Problem Statement.
+
+5.1.10. IEEE 802.11i Considerations
+
+ Classification: Operations
+
+ Description:
+
+ The CAPWAP protocol must support authentication in the centralized
+ WLAN architecture in which the authenticator and encryption points
+ can be located on distinct entities, i.e., WLAN controller or WTP.
+ The Architecture Taxonomy illustrates a number of variants, in both
+ local-MAC and split-MAC designs, in which the authenticator is
+ located at the WLAN controller and the encryption points are at the
+ WTPs. The CAPWAP protocol must be applicable to these variants and
+ allow authentication mechanisms and their constituent processes to be
+ operable in these cases.
+
+ An important issue to consider in this case is the exchange of key
+ information when authenticator and encryption points are located on
+ distinct entities. For example, consider the case where IEEE 802.11i
+ is used in a WLAN in which the WLAN controller realizes the
+ authenticator, some WTPs realize encryption (possibly local-MAC
+ WTPs), and other WTPs rely on the WLAN controller for encryption
+ (possibly split-MAC WTPs).
+
+
+
+
+Govindan, et al. Informational [Page 15]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+ Here, CAPWAP will first need to identify the location of the
+ authenticator and encryption points between each WLAN controller-WTP
+ pair. This will likely be part of the initial WTP configuration.
+ Subsequently, the WTPs that realize encryption will need CAPWAP to
+ exchange key information with the authenticator at the WLAN
+ controller. For the WTPs that do not realize encryption, CAPWAP
+ needs to adapt its control to bypass the key exchange phase.
+
+ Clearly, the centralized WLAN architecture presents a different
+ platform for authentication mechanisms compared to legacy WLANs in
+ which a WTP realized both authenticator and encryption roles. So
+ this objective highlights the need for CAPWAP to support
+ authentication and key management in the centralized WLAN
+ architecture.
+
+ Protocol Requirement:
+
+ The CAPWAP protocol MUST determine the exact structure of the
+ centralized WLAN architecture in which authentication needs to be
+ supported, i.e., the location of major authentication components.
+ This may be achieved during WTP initialization where major
+ capabilities are distinguished.
+
+ The protocol MUST allow for the exchange of key information when
+ authenticator and encryption roles are located in distinct entities.
+
+ Motivation and Protocol Benefits:
+
+ The immediate focus of CAPWAP is on supporting IEEE 802.11-based
+ WLANs. As such, it is necessary for the protocol to recognize the
+ major distinction in WLAN design with respect to IEEE 802.11i
+ authenticator and encryption points. This represents a significant
+ variation that has been highlighted in the Architecture Taxonomy.
+ The CAPWAP protocol benefits by accommodating such a major
+ consideration from IEEE 802.11i.
+
+ These requirements will be common for all authentication mechanisms
+ over the centralized WLAN architecture. So they are applicable to
+ IEEE 802.11i, Universal Access Method (UAM), and other mechanisms.
+
+ Relation to Problem Statement:
+
+ The Problem Statement highlights the availability of different WTP
+ designs and the need to ensure interoperability among them. In this
+ regard, operational changes occurring due to the separation of the
+ IEEE 802.11i authenticator and encryption points need to be
+ accommodated within the CAPWAP protocol.
+
+
+
+
+Govindan, et al. Informational [Page 16]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+5.1.11. Interoperability Objective
+
+ Classification: Architecture
+
+ Description:
+
+ Two major designs of the centralized WLAN architecture are local-MAC
+ and split-MAC. With the focusing of standardization efforts on these
+ two designs, it is crucial to ensure mutual interoperation among
+ them.
+
+ This objective for the CAPWAP protocol is to ensure that WTPs of both
+ local-MAC and split-MAC architecture designs are capable of
+ interoperation within a single WLAN. Consequently, a single WLAN
+ controller will be capable of controlling both types of WTPs using a
+ single CAPWAP protocol. Integral support for these designs comprises
+ a number of protocol aspects.
+
+ i. Capability negotiations between WLAN controller and WTPs
+
+ WTP designs differ in the degree of IEEE 802.11 MAC functionalities
+ that each type of WTP realizes. The major distinctions, split-MAC
+ and local-MAC, differ in the processing of IEEE 802.11 MAC frames.
+ In this regard, the CAPWAP protocol should include functionality that
+ allows for negotiations of significant capabilities between WTPs and
+ the WLAN controller.
+
+ As a first step, such negotiations could cover the type of WTP,
+ split-MAC or local-MAC, as this provides substantial information on
+ their respective capabilities.
+
+ ii. Establishment of alternative interfaces
+
+ The capability differences among different WTPs essentially equate to
+ alternative interfaces with a WLAN controller. So the CAPWAP
+ protocol should be capable of adapting its operations to the major
+ different interfaces. In a first case, this would include
+ accommodating capability differences between local-MAC and split-MAC
+ WTPs.
+
+ The definition of these interfaces in terms of finer granularity of
+ functionalities will be based on AP functionality documents produced
+ by the IEEE 802.11 AP Functionality (APF) Ad-Hoc Committee.
+
+ Protocol Requirement:
+
+ The CAPWAP protocol MUST include sufficient capabilities negotiations
+ to distinguish between major types of WTPs.
+
+
+
+Govindan, et al. Informational [Page 17]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+ Motivation and Protocol Benefits:
+
+ The benefits of realizing this architecture objective are both
+ technical and practical. First, there are substantial overlaps in
+ the control operations of local-MAC and split-MAC architecture
+ designs. The Architecture Taxonomy tabulates major common features
+ of the two designs. As a result, it is technically practical to
+ devise a single protocol that manages both types of devices.
+
+ Next, the ability to operate a CAPWAP protocol for both types of
+ architectural designs enhances its practical prospects as it will
+ have wider appeal.
+
+ Furthermore, the additional complexity resulting from such
+ alternative interfaces is marginal. Consequently, the benefits of
+ this objective will far outweigh any cost of realizing it.
+
+ Relation to Problem Statement:
+
+ The objective for supporting both local-MAC and split-MAC WTPs is
+ fundamental to addressing the Problem Statement. It forms the basis
+ for those problems to be uniformly addressed across the major WLAN
+ architectures. This is the ultimate aim of standardization efforts.
+ The realization of this objective will ensure the development of a
+ comprehensive set of mechanisms that address the challenges of
+ large-scale WLAN deployments.
+
+5.1.12. Protocol Specifications
+
+ Classification: General
+
+ Description:
+
+ WLAN equipment vendors require sufficient details from protocol
+ specifications so that implementing them will allow for compatibility
+ with other equipment that runs the same protocol. In this light, it
+ is important for the CAPWAP protocol specifications to be reasonably
+ complete for realization.
+
+ Protocol Requirement:
+
+ Any WTP or WLAN controller vendor or any person MUST be able to
+ implement the CAPWAP protocol from the specification itself and by
+ that it is required that all such implementations do interoperate.
+
+
+
+
+
+
+
+Govindan, et al. Informational [Page 18]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+ Motivation and Protocol Benefits:
+
+ It is beneficial for WLAN equipment vendors to refer to a single set
+ of specifications while implementing the CAPWAP protocol. This helps
+ to ease and quicken the development process.
+
+ Relation to Problem Statement:
+
+ This requirement is based on WG discussions that have been determined
+ to be important for CAPWAP.
+
+5.1.13. Vendor Independence
+
+ Classification: General
+
+ Description:
+
+ Rapid developments in WLAN technologies result in equipment vendors
+ constantly modifying their devices. In many cases, developments are
+ independently made for WLAN controllers and WTPs. The CAPWAP
+ protocol should not affect the independence of device modifications.
+
+ Protocol Requirement:
+
+ A WTP vendor SHOULD be able to make modifications to hardware without
+ any WLAN controller vendor involvement.
+
+ Motivation and Protocol Benefits:
+
+ Independence in the type of hardware for WLAN equipment ensures that
+ new developments do not hamper protocol operation.
+
+ Relation to Problem Statement:
+
+ This requirement is based on WG discussions that have been determined
+ to be important for CAPWAP.
+
+5.1.14. Vendor Flexibility
+
+ Classification: General
+
+ Description:
+
+ The CAPWAP protocol must not be specified for a particular type of
+ wireless MAC design. It should be compatible with both local-MAC and
+ split-MAC WTPs.
+
+
+
+
+
+Govindan, et al. Informational [Page 19]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+ Protocol Requirement:
+
+ The CAPWAP protocol MUST NOT limit WTP vendors in their choice of
+ local-MAC or split-MAC WTPs. It MUST be compatible with both types
+ of WTPs.
+
+ Motivation and Protocol Benefits:
+
+ This requirement is to ensure that WTP vendors have sufficient
+ flexibility in selecting the type of wireless MAC design that they
+ consider best for deployments.
+
+ Relation to Problem Statement:
+
+ This requirement is based on WG discussions that have been determined
+ to be important for CAPWAP.
+
+5.1.15. NAT Traversal
+
+ Classification: General
+
+ Description:
+
+ WLAN deployments may involve WTPs and the WLAN controller
+ communicating across Network Address Translators (NATs). The CAPWAP
+ protocol must be capable of operating across topologies that contain
+ known NAT configurations. It requires appropriate discovery and
+ identification mechanisms for NAT traversal.
+
+ Protocol Requirement:
+
+ The CAPWAP protocol MUST NOT prevent the operation of established
+ methods of NAT traversal.
+
+ Motivation and Protocol Benefits:
+
+ The widespread adoption of WLANs raises the possibility for WLAN
+ topologies containing NATs. It is important for the CAPWAP protocol
+ to be applicable within such topologies. This requirement aims to
+ make the CAPWAP protocol relevant for NAT traversal.
+
+ Relation to Problem Statement:
+
+ This requirement is based on WG discussions that have been determined
+ to be important for CAPWAP.
+
+
+
+
+
+
+Govindan, et al. Informational [Page 20]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+5.2. Desirable Objectives
+
+ These objectives have been determined to be desirable for a CAPWAP
+ protocol but not mandatory. Realizing these objectives may help
+ improve control of WLANs but need not necessarily be required for all
+ networks or scenarios.
+
+5.2.1. Multiple Authentication Mechanisms
+
+ Classification: Architecture
+
+ Description:
+
+ Shared WLAN infrastructure raises the issue of multiple
+ authentication mechanisms. This is because each logical group is
+ likely to be associated with different service providers or WLAN
+ domains. As a result, the authentication needs within them will be
+ different. Although CAPWAP is required to support IEEE 802.11i, it
+ is also necessary for it to support other authentication mechanisms.
+ For example, one logical group may use IEEE 802.11i, whereas another
+ may use web authentication. CAPWAP must be able to operate in such
+ shared WLANs.
+
+ Protocol Requirement:
+
+ The CAPWAP protocol MUST support different authentication mechanisms
+ in addition to IEEE 802.11i.
+
+ Motivation and Protocol Benefits:
+
+ The benefit of supporting various authentication mechanisms is that
+ the protocol then becomes flexible for use in various deployments.
+ The protocol will therefore not mandate the use of any particular
+ mechanisms that may not be appropriate for a particular deployment.
+
+ Relation to Problem Statement:
+
+ This objective relates to the problem of management complexity.
+ Shared WLAN deployments simplify management of large networks.
+
+5.2.2. Support for Future Wireless Technologies
+
+ Classification: Architecture
+
+ Description:
+
+ The rapid pace of technology developments means that new advances
+ need to be catered to in current analyses. Among these is the
+
+
+
+Govindan, et al. Informational [Page 21]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+ support for new wireless technologies within the CAPWAP protocol,
+ such as IEEE 802.16. The protocol should therefore not rely on
+ specifics of IEEE 802.11 technology.
+
+ In all cases where the CAPWAP protocol messages contain specific
+ layer 2 information elements, the definition of the protocol needs to
+ provide for extensibility so that these elements can be defined for
+ specific layer 2 wireless protocols. This may entail assigning a
+ layer 2 wireless protocol type and version field to the message PDU.
+ Examples of other wireless protocols that might be supported include
+ but are not limited to 802.16e, 802.15.x, etc.
+
+ Protocol Requirement:
+
+ CAPWAP protocol messages MUST be designed to be extensible for
+ specific layer 2 wireless technologies. It should not be limited to
+ the transport of elements relating to IEEE 802.11.
+
+ Motivation and Protocol Benefits:
+
+ There are many benefits to an extensible protocol. It allows for
+ application in different networks and provides greater scope.
+ Furthermore, service providers require WLAN solutions that will be
+ able to meet current and future market requirements.
+
+ Relation to Problem Statement:
+
+ The Problem Statement describes some of the advances taking place in
+ other standards bodies like the IEEE. It is important for the CAPWAP
+ protocol to reflect the advances and provide a framework in which
+ they can be supported.
+
+5.2.3. Support for New IEEE Requirements
+
+ Classification: Architecture
+
+ Description:
+
+ The IEEE 802.11 APF Ad-Hoc Committee has reviewed IEEE 802.11
+ functionality and has made more thorough definitions for the new
+ requirements. The CAPWAP protocol must be able to incorporate these
+ definitions with minimal change. Furthermore, a number of extensions
+ for IEEE 802.11 are currently being standardized. The CAPWAP
+ protocol must also be able to incorporate these new extensions with
+ minimal change.
+
+
+
+
+
+
+Govindan, et al. Informational [Page 22]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+ Protocol Requirement:
+
+ The CAPWAP protocol MUST be openly designed to support new IEEE
+ 802.11 definitions and extensions.
+
+ Motivation and Protocol Benefits:
+
+ There are a number of advances being made within the IEEE regarding
+ the functionality of IEEE 802.11 technology. Since this represents
+ one of the major wireless technologies in use today, it will be
+ beneficial for CAPWAP to incorporate the relevant new extensions.
+
+ Relation to Problem Statement:
+
+ The Problem Statement presents an overview of the task of the IEEE
+ 802.11 working group. This group is focused on defining the
+ functional architecture of WTPs and new extensions for it. It is
+ necessary for the CAPWAP protocol to reflect these definitions and
+ extensions.
+
+5.2.4. Interconnection Objective
+
+ Classification: Architecture
+
+ Description:
+
+ Large-scale WLAN deployments are likely to use a variety of
+ interconnection technologies between different devices of the
+ network. It should therefore be possible for the CAPWAP protocol to
+ operate over various interconnection technologies.
+
+ As a result of realizing this objective, the protocol will be capable
+ of operation over both IPv4 and IPv6. It will also be designed such
+ that it can operate within tightly administered networks, such as
+ enterprise networks, or on open, public access networks. For
+ example, VLAN tunnels can be used across different types of networks
+ over which CAPWAP will operate.
+
+ Protocol Requirement:
+
+ The CAPWAP protocol MUST NOT be constrained to specific underlying
+ transport mechanisms.
+
+
+
+
+
+
+
+
+
+Govindan, et al. Informational [Page 23]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+ Motivation and Protocol Benefits:
+
+ The main aim of the CAPWAP protocol is to achieve interoperability
+ among various WTPs and WLAN controllers. As such, the motivation for
+ this requirement is for the protocol to be operable independent of
+ underlying interconnection technologies.
+
+ Relation to Problem Statement:
+
+ The Problem Statement discusses the complexity of configuring large
+ WLANs. The selection of available interconnection technologies for
+ large-scale deployments further intensifies this complexity. This
+ requirement avoids part of the complexity by advocating independence
+ of the operational aspects of the protocol from underlying transport.
+
+5.2.5. Access Control
+
+ Classification: Operations
+
+ Description:
+
+ This objective focuses on the informational needs of WLAN access
+ control and specifically the role of the CAPWAP protocol in
+ transporting this information between WTPs and their WLAN controller.
+
+ The following are some specific information aspects that need to be
+ transported by the CAPWAP protocol:
+
+ i. IEEE 802.11 association and authentication
+
+ The association of wireless clients is distinct for initial and
+ roaming cases. As a result, access control mechanisms require
+ specific contextual information regarding each case. Additionally,
+ load balancing, QoS, security, and congestion information in both
+ wireless medium segments and switching segments need to be
+ considered.
+
+ ii. WTP Access Control
+
+ In addition to controlling access for wireless clients, it is also
+ necessary to control admission of new WTPs. Given the threat of
+ rogue WTPs, it is important for CAPWAP to relay appropriate
+ authentication information between new WTPs and the WLAN controller.
+
+ Protocol Requirement:
+
+ The CAPWAP protocol MUST be capable of exchanging information
+ required for access control of WTPs and wireless terminals.
+
+
+
+Govindan, et al. Informational [Page 24]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+ Motivation and Protocol Benefits:
+
+ Due to the scale of deployments in which CAPWAP will be employed,
+ comprehensive access control is crucial. The effectiveness of access
+ control in turn is affected by the information on which such control
+ is based. As a result, this objective has critical relevance to a
+ CAPWAP protocol.
+
+ Relation to Problem Statement:
+
+ This objective addresses the issue of access control in large WLANs.
+ Broadly, it relates the problem of managing the complexity scale of
+ such networks. With collective information of both switching and
+ wireless medium segments, realizing this objective will help control
+ and manage complexity.
+
+5.3. Non-Objectives
+
+ The following objectives have been prioritized as non-objectives
+ during the course of working group consultations. They have been
+ prioritized so in the context of CAPWAP and its considerations. They
+ may, however, be applicable in alternative contexts.
+
+5.3.1. Support for Non-CAPWAP WTPs
+
+ Classification: Architecture
+
+ Description:
+
+ The CAPWAP protocol should provide an engine-mechanism to spring WTP
+ auto-configuration and/or software version updates and should support
+ integration with existing network management system. WLAN controller
+ as a management agent is optional.
+
+ If entities other than WLAN controllers manage some aspects of WTPs,
+ such as software downloads, the CAPWAP protocol may be used for WTPs
+ to notify WLAN controllers of any changes made by the other entities.
+
+ Protocol Requirement:
+
+ The CAPWAP protocol SHOULD be capable of recognizing legacy WTPs and
+ existing network management systems.
+
+
+
+
+
+
+
+
+
+Govindan, et al. Informational [Page 25]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+ Motivation and Protocol Benefits:
+
+ It is expected that in many cases, the centralized WLAN architecture
+ will be deployed incrementally with legacy systems. In this regard,
+ it is necessary for the protocol to be used in scenarios with mixed
+ WLAN devices.
+
+ Relation to Problem Statement:
+
+ The Problem Statement highlights management complexity as a major
+ issue with large WLANs. One part of this complexity can be related
+ to the incremental deployment of centralized WLAN devices for which
+ this objective is applicable.
+
+5.3.2. Technical Specifications
+
+ Classification: General
+
+ Description:
+
+ The CAPWAP protocol must not require AC and WTP vendors to share
+ technical specifications to establish compatibility. The protocol
+ specifications alone must be sufficient for compatibility.
+
+ Protocol Requirement:
+
+ WTP vendors SHOULD NOT have to share technical specifications for
+ hardware and software to AC vendors in order for interoperability to
+ be achieved.
+
+ Motivation and Protocol Benefits:
+
+ It is beneficial for WLAN equipment vendors to refer to a single set
+ of specifications while implementing the CAPWAP protocol. This helps
+ to ease and quicken the development process.
+
+ Relation to Problem Statement:
+
+ This requirement is based on WG discussions that have been determined
+ to be important for CAPWAP.
+
+ This objective has been prioritized as a non-objective as it is a
+ duplicate of the Protocol Specifications objective (Section 5.1.12).
+
+
+
+
+
+
+
+
+Govindan, et al. Informational [Page 26]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+5.4. Operator Requirements
+
+ The following objectives have been provided by network service
+ operators. They represent the requirements from those ultimately
+ deploying the CAPWAP protocol in their WLANs.
+
+5.4.1. AP Fast Handoff
+
+ Classification: Operations
+
+ Description:
+
+ Network service operators consider handoffs crucial because of the
+ mobile nature of their customers. In this regard, the CAPWAP
+ protocol should not adversely affect AP fast-handoff procedures. The
+ protocol may support optimizations for fast handoff procedures so as
+ to allow better support for real-time services during handoffs.
+
+ Protocol Requirement:
+
+ CAPWAP protocol operations MUST NOT impede or obstruct the efficacy
+ of AP fast-handoff procedures.
+
+6. Summary and Conclusion
+
+ The objectives presented in this document address three main aspects
+ of the CAPWAP protocol, namely:
+
+ i. Architecture
+ ii. Operations
+ iii. Security
+
+ These requirements are aimed at focusing standardization efforts on a
+ simple, interoperable protocol for managing large-scale WLANs. The
+ architecture requirements specify the structural features of the
+ protocol such as those relating to WTP types (local-MAC and split-
+ MAC) and WTP structures (logical groups). The operations
+ requirements address the functional aspects dealing with WTP
+ configuration and management. Finally, the security requirements
+ cover authentication and integrity aspects of protocol exchanges.
+
+ The objectives have additionally been prioritized to reflect their
+ immediate significance to the development and evaluation of an
+ interoperable CAPWAP protocol. The priorities are Mandatory and
+ Accepted, Desirable, and Non-Objectives. They reflect working group
+ consensus on the effectiveness of the requirements in the context of
+ protocol design.
+
+
+
+
+Govindan, et al. Informational [Page 27]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+ Additionally, this document includes requirements from network
+ service operators that have been derived based on their experience in
+ operating large-scale WLANs.
+
+ The resulting requirements from this document will be used in
+ conjunction with the CAPWAP Problem Statement [RFC3990] and CAPWAP
+ Architecture Taxonomy [RFC4118] to develop and evaluate an
+ interoperable protocol for the control and provisioning of WTPs in
+ large-scale WLANs.
+
+7. Security Considerations
+
+ The CAPWAP framework highlights support for both local-MAC and
+ split-MAC WTPs. In deployments where both types of WTPs are used, it
+ is crucial to ensure that each be secured in consideration of its
+ capabilities. The Architecture Taxonomy illustrates how different
+ WTPs incorporate varying levels of functionalities. Development of
+ the CAPWAP protocol should ensure that the deployment of both local-
+ MAC and split-MAC WTPs within a single WLAN do not present loopholes
+ for security compromises.
+
+ In shared WLAN deployments made of a number of logical groups,
+ traffic from each group needs to be mutually separated. So in
+ addition to protocol-related exchanges, data traffic from wireless
+ terminals should also be segregated with respect to the logical
+ groups to which they belong. It should not be possible for data or
+ control traffic from one logical group to stray to or influence
+ another logical group.
+
+ The use of IEEE 802.11i over the centralized WLAN architecture allows
+ for implementations in which the PMK is shared across WTPs. This
+ raises the ambiguity between legitimate sharing and illegitimate
+ copies. Wireless terminals may unknowingly fall prey to or exploit
+ this ambiguity. The resolution of this issue is currently being
+ evaluated by the IEEE 802 and IETF liaisons.
+
+ The low cost of launching attacks on WLANs makes the CAPWAP protocol
+ a target. A first step in securing against any form of attacks is to
+ continuously monitor the WLAN for conditions of potential threats
+ from rogue WTPs or wireless terminals. For example, profiles for DoS
+ and replay attacks need to be considered for the CAPWAP protocol to
+ effectively monitor security conditions.
+
+ The open environment of many WLAN deployments makes physical security
+ breaches highly probable. Compromises resulting from theft and
+ physical damage must be considered during protocol development. For
+ instance, it should not be possible for a single compromised WTP to
+ affect the WLAN as a whole.
+
+
+
+Govindan, et al. Informational [Page 28]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+ Considering asymmetric, non-mutual authentication between WTPs and
+ the WLAN controller, there is a risk of a rogue participant
+ exploiting such an arrangement. It is preferable to avoid non-mutual
+ authentication. In some cases, the legitimacy of the protocol
+ exchange participants may be verified externally, for example, by
+ means of physical containment within a close environment. Asymmetric
+ authentication may be appropriate here without risk of security
+ compromises.
+
+8. Acknowledgements
+
+ The authors would like to thank the working group chairs, Dorothy
+ Gellert and Mahalingam Mani, for their support and patience with this
+ document. We would also like to thank participants of the working
+ group who have helped shape the objectives. In particular, the
+ authors thank James Kempf, Pat Calhoun, Inderpreet Singh, Dan
+ Harkins, T. Sridhar, Charles Clancy, and Emek Sadot for their
+ invaluable inputs. We also extend our gratitude to the IEEE 802.11
+ Ad-Hoc Committee for its evaluation of the document. The authors
+ also acknowledge the contributions from Meimei Dang, Satoshi Iino,
+ Mikihito Sugiura, and Dong Wang.
+
+9. Normative References
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+ [RFC3990] O'Hara, B., Calhoun, P., and J. Kempf, "Configuration and
+ Provisioning for Wireless Access Points (CAPWAP) Problem
+ Statement", RFC 3990, February 2005.
+
+ [RFC4118] Yang, L., Zerfos, P., and E. Sadot, "Architecture Taxonomy
+ for Control and Provisioning of Wireless Access Points
+ (CAPWAP)", RFC 4118, June 2005.
+
+10. Informative References
+
+ [802.11] IEEE Standard 802.11, "Wireless LAN Medium Access Control
+ (MAC) and Physical Layer (PHY) Specifications", June 2003.
+
+ [802.11i] IEEE Standard 802.11i, "Medium Access Control (MAC)
+ Security Enhancements", July 2004.
+
+ [802.11e] IEEE Standard 802.11e, "Medium Access Control (MAC)
+ Quality of Service Enhancements", November 2005.
+
+ [RFC4107] Bellovin, S. and R. Housley, "Guidelines for Cryptographic
+ Key Management", BCP 107, RFC 4107, June 2005.
+
+
+
+Govindan, et al. Informational [Page 29]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+Authors' Addresses
+
+ Saravanan Govindan
+ Panasonic Singapore Laboratories
+ Block 1022, Tai Seng Industrial Estate
+ #06-3530, Tai Seng Avenue
+ Singapore 534 415
+ Singapore
+
+ Phone: +65 6550 5441
+ EMail: saravanan.govindan@sg.panasonic.com
+
+
+ Zhonghui Yao
+ Huawei Longgang Production Base
+ Shenzhen 518 129
+ P. R. China
+
+ Phone: +86 755 2878 0808
+ EMail: yaoth@huawei.com
+
+
+ Wenhui Zhou
+ China Mobile
+ 53A, Xibianmen Ave, Xuanwu District
+ Beijing 100 053
+ P. R. China
+
+ Phone: +86 10 6600 6688 ext.3061
+ EMail: zhouwenhui@chinamobile.com
+
+
+ L. Lily Yang
+ Intel Corp.
+ JF3-206, 2111 NE 25th Ave.
+ Hilsboro, OR 97124
+ USA
+
+ Phone: +1 503 264 8813
+ EMail: lily.l.yang@intel.com
+
+
+
+
+
+
+
+
+
+
+
+Govindan, et al. Informational [Page 30]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+ Hong Cheng
+ Panasonic Singapore Laboratories
+ Block 1022, Tai Seng Industrial Estate
+ #06-3530, Tai Seng Avenue
+ Singapore 534 415
+ Singapore
+
+ Phone: +65 6550 5447
+ EMail: hong.cheng@sg.panasonic.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Govindan, et al. Informational [Page 31]
+
+RFC 4564 CAPWAP Objectives July 2006
+
+
+Full Copyright Statement
+
+ Copyright (C) The Internet Society (2006).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78, and except as set forth therein, the authors
+ retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
+ ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
+ INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
+ INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the procedures with respect to rights in RFC documents can be
+ found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at
+ ietf-ipr@ietf.org.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is provided by the IETF
+ Administrative Support Activity (IASA).
+
+
+
+
+
+
+
+Govindan, et al. Informational [Page 32]
+