diff options
| author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 | 
|---|---|---|
| committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 | 
| commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
| tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc4564.txt | |
| parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) | |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc4564.txt')
| -rw-r--r-- | doc/rfc/rfc4564.txt | 1795 | 
1 files changed, 1795 insertions, 0 deletions
diff --git a/doc/rfc/rfc4564.txt b/doc/rfc/rfc4564.txt new file mode 100644 index 0000000..4618890 --- /dev/null +++ b/doc/rfc/rfc4564.txt @@ -0,0 +1,1795 @@ + + + + + + +Network Working Group                                   S. Govindan, Ed. +Request for Comments: 4564                                      H. Cheng +Category: Informational                                        Panasonic +                                                                 ZH. Yao +                                                                  Huawei +                                                                WH. Zhou +                                                            China Mobile +                                                                 L. Yang +                                                                   Intel +                                                               July 2006 + + +                            Objectives for +      Control and Provisioning of Wireless Access Points (CAPWAP) + +Status of This Memo + +   This memo provides information for the Internet community.  It does +   not specify an Internet standard of any kind.  Distribution of this +   memo is unlimited. + +Copyright Notice + +   Copyright (C) The Internet Society (2006). + +Abstract + +   This document presents objectives for an interoperable protocol for +   the Control and Provisioning of Wireless Access Points (CAPWAP).  The +   document aims to establish a set of focused requirements for the +   development and evaluation of a CAPWAP protocol.  The objectives +   address architecture, operation, security, and network operator +   requirements that are necessary to enable interoperability among +   Wireless Local Area Network (WLAN) devices of alternative designs. + + + + + + + + + + + + + + + + + +Govindan, et al.             Informational                      [Page 1] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +Table of Contents + +   1. Introduction ....................................................3 +   2. Terminology .....................................................3 +   3. Requirements Notation ...........................................4 +   4. Objectives Overview .............................................4 +   5. Objectives ......................................................5 +      5.1. Mandatory and Accepted Objectives ..........................5 +           5.1.1. Logical Groups ......................................5 +           5.1.2. Support for Traffic Separation ......................6 +           5.1.3. Wireless Terminal Transparency ......................8 +           5.1.4. Configuration Consistency ...........................8 +           5.1.5. Firmware Trigger ....................................9 +           5.1.6. Monitoring and Exchange of System-wide +                  Resource State .....................................10 +           5.1.7. Resource Control Objective .........................11 +           5.1.8. CAPWAP Protocol Security ...........................12 +           5.1.9. System-wide Security ...............................14 +           5.1.10. IEEE 802.11i Considerations .......................15 +           5.1.11.  Interoperability Objective .......................17 +           5.1.12.  Protocol Specifications ..........................18 +           5.1.13.  Vendor Independence ..............................19 +           5.1.14.  Vendor Flexibility ...............................19 +           5.1.15.  NAT Traversal ....................................20 +      5.2. Desirable Objectives ......................................21 +           5.2.1. Multiple Authentication Mechanisms .................21 +           5.2.2. Support for Future Wireless Technologies ...........21 +           5.2.3. Support for New IEEE Requirements ..................22 +           5.2.4. Interconnection Objective ..........................23 +           5.2.5.  Access Control ....................................24 +      5.3. Non-Objectives ............................................25 +           5.3.1. Support for Non-CAPWAP WTPs ........................25 +           5.3.2. Technical Specifications ...........................26 +      5.4. Operator Requirements .....................................27 +           5.4.1. AP Fast Handoff ....................................27 +   6. Summary and Conclusion .........................................27 +   7. Security Considerations ........................................28 +   8. Acknowledgements ...............................................29 +   9. Normative References ...........................................29 +   10. Informative References ........................................29 + + + + + + + + + + + +Govindan, et al.             Informational                      [Page 2] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +1.  Introduction + +   The growth in large-scale Wireless Local Area Network (WLAN) +   deployments has brought into focus a number of technical challenges. +   Among them is the complexity of managing large numbers of Wireless +   Termination Points (WTPs), which is further exacerbated by variations +   in their design.  Another challenge is the maintenance of consistent +   configurations among the numerous WTPs of a system.  The dynamic +   nature of the wireless medium is also a concern together with WLAN +   security.  The challenges affecting large-scale WLAN deployments have +   been highlighted in [RFC3990]. + +   Many vendors have addressed these challenges by developing new +   architectures and solutions.  A survey of the various developments +   was conducted to better understand the context of these challenges. +   This survey is a first step towards designing interoperability among +   the solutions.  The Architecture Taxonomy [RFC4118] is a result of +   this survey in which major WLAN architecture families are classified. +   Broadly, these are the autonomous, centralized WLAN, and distributed +   mesh architectures. + +   The Architecture Taxonomy identified the centralized WLAN +   architecture as one in which portions of the wireless medium access +   control (MAC) operations are centralized in a WLAN controller.  This +   centralized WLAN architecture is further classified into remote-MAC, +   split-MAC, and local-MAC designs.  Each differs in the degree of +   separation of wireless MAC layer capabilities between WTPs and WLAN +   controller. + +   This document puts forward critical objectives for achieving +   interoperability in the CAPWAP framework.  It presents requirements +   that address the challenges of controlling and provisioning large- +   scale WLAN deployments.  The realization of these objectives in a +   CAPWAP protocol will ensure that WLAN equipment of major design types +   may be integrally deployed and managed. + +2.  Terminology + +   This document uses terminology defined in [RFC4118], [802.11], +   [802.11i], and [802.11e].  Additionally, the following terms are +   defined. + +   Centralized WLAN: A WLAN based on the centralized WLAN Architecture +   [RFC4118]. + +   Switching Segment: Those aspects of a centralized WLAN that primarily +   deal with switching or routing of control and data information +   between Wireless Termination Points (WTPs) and the WLAN controller. + + + +Govindan, et al.             Informational                      [Page 3] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +   Wireless Medium Segment: Those aspects of a centralized WLAN that +   primarily deal with the wireless interface between WTPs and wireless +   terminals.  The Wireless Medium Segment is specific to layer 2 +   wireless technology, such as IEEE 802.11. + +   CAPWAP Framework: A term that covers the local-MAC and split-MAC +   designs of the Centralized WLAN Architecture.  Standardization +   efforts are focused on these designs. + +   CAPWAP Protocol: The protocol between WLAN controller and WTPs in the +   CAPWAP framework.  It facilitates control, management, and +   provisioning of WTPs in an interoperable manner. + +   Logical Group: A logical separation of a physical WTP is termed +   logical group.  So a single physical WTP will operate a number of +   logical groups.  Virtual access points (APs) are examples of logical +   groups.  Here, each Basic Service Set Identifier (BSSID) and +   constituent wireless terminals' radios are denoted as distinct +   logical groups of a physical WTP.  Logical groups are maintained +   without conflicting with the CAPWAP objectives, particularly the +   'Wireless Terminal Transparency' objective. + +3.  Requirements Notation + +   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", +   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this +   document are to be interpreted as described in [RFC2119]. + +4.  Objectives Overview + +   The objectives for CAPWAP have been broadly classified to address +   architecture, operation, and security requirements of managing +   large-scale WLAN deployments. + +   Architecture objectives deal with system-level aspects of the CAPWAP +   protocol.  They address issues of protocol extensibility, diversity +   in network deployments and architecture designs, and differences in +   transport technologies. + +   Operational objectives address the control and management features of +   the CAPWAP protocol.  They deal with operations relating to WLAN +   monitoring, resource management, Quality of Service (QoS), and access +   control. + +   Security objectives address potential threats to WLANs and their +   containment.  In the CAPWAP context, security requirements cover the +   protocol between the WLAN controller and WTPs and also the WLAN +   system as a whole. + + + +Govindan, et al.             Informational                      [Page 4] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +   Additionally, a general classification is used for objectives +   relating to the overall impact of the CAPWAP protocol specifications. + +5.  Objectives + +   The objectives described in this document have been prioritized based +   on their immediate significance in the development and evaluation of +   a control and provisioning protocol for large-scale WLAN deployments. +   The priorities are: + +   i.  Mandatory and Accepted Objectives +   ii.  Desirable Objectives +   iii.  Non-Objectives + +   The priorities have been assigned to individual objectives in +   accordance with working group discussions. + +   Furthermore, a distinct category of objectives is provided based on +   requirements gathered from network service operators.  These are +   specific needs that arise from operators' experiences in deploying +   and managing large-scale WLANs. + +   a. Operator Requirements + +5.1.  Mandatory and Accepted Objectives + +   Objectives prioritized as mandatory and accepted have been deemed +   crucial for the control and provisioning of WTPs.  They directly +   address the challenges of large-scale WLAN deployments and MUST be +   realized by a CAPWAP protocol. + +5.1.1.  Logical Groups + +   Classification: Architecture + +   Description: + +   Large WLAN deployments are complex and expensive.  Furthermore, +   enterprises deploying such networks are under pressure to improve the +   efficiency of their expenditures. + +   Shared WLAN deployments, where a single physical WLAN infrastructure +   supports a number of logical networks, are increasingly used to +   address these two issues of large-scale WLANs.  These are popular as +   they allow deployment and management costs to be spread across +   businesses. + + + + + +Govindan, et al.             Informational                      [Page 5] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +   In traditional WLANs, each physical WTP represents one complete +   subset of a larger WLAN system.  Shared WLANs differ in that each +   physical WTP represents a number of logical subsets of possibly a +   number of larger WLAN systems.  Each logical division of a physical +   WTP is referred to as a logical group (see definition in Section 2). +   So WLANs are managed in terms of logical groups instead of physical +   WTPs.  Logical groups are based on BSSIDs and other types of virtual +   APs. + +   Protocol Requirement: + +   The CAPWAP protocol MUST be capable of controlling and managing +   physical WTPs in terms of logical groups including BSSID-based +   groups. + +   For all operating modes, including those in which the WTP performs +   local bridging and those in which the Access Controller (AC) performs +   centralized bridging, the protocol MUST provide provisions for +   configuring logical groups at the WTP. + +   Motivation and Protocol Benefits: + +   Commercial realities necessitate that WLANs be manageable in terms of +   their logical groups.  This allows separation of logical services and +   underlying infrastructure management.  A protocol that realizes this +   need ensures simpler and cost-effective WLANs, which directly address +   the requirements of network service operators. + +   Relation to Problem Statement: + +   This objective addresses the problem of management complexity in +   terms of costs.  Cost complexity is reduced by sharing WLAN +   deployments.  Consequently, deployment and management cost- +   efficiencies are realized. + +5.1.2.  Support for Traffic Separation + +   Classification: Operations + +   Description: + +   The centralized WLAN architecture simplifies complexity associated +   with large-scale deployments by consolidating portions of wireless +   MAC functionality at a central WLAN controller and distributing the +   remaining across WTPs.  As a result, WTPs and WLAN controller +   exchange control and data information between them.  This objective + + + + + +Govindan, et al.             Informational                      [Page 6] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +   states that control and data aspects of the exchanges be mutually +   separated for further simplicity.  This will allow solutions for each +   type of exchange to be independently optimized. + +   Furthermore, in the context of shared WLAN deployments, the mutual +   separation of control and data also addresses security concerns.  In +   particular, given the likelihood of different logical groups, such as +   those established by different virtual APs, being managed by +   different administrators, separation of control and data is a first +   step towards individually containing and securing the logical groups. + +   It is also important to ensure that traffic from each logical group +   is mutually separated to maintain the integrity and independence of +   the logical groups. + +   Protocol Requirement: + +   The CAPWAP protocol MUST define transport control messages such that +   the transport of control messages is separate from the transport of +   data messages. + +   Motivation and Protocol Benefits: + +   The aim of separating data and control aspects of the protocol is to +   simplify the protocol.  It also allows for the flexibility of +   addressing each type of traffic in the most appropriate manner. + +   Furthermore, this requirement will help remotely located WTPs to +   handle data traffic in alternative ways without the need for +   forwarding them across a wide network to the WLAN controller. + +   Separation of WTP control and data also aids in the secure +   realization of shared WLAN deployments. + +   Relation to Problem Statement: + +   Broadly, this objective relates to the challenge of managing +   complexity in large-scale WLANs.  The requirement for traffic +   separation simplifies control as this is separated from the task of +   data transport. + + + + + + + + + + + +Govindan, et al.             Informational                      [Page 7] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +5.1.3.  Wireless Terminal Transparency + +   Classification: Operations + +   Description: + +   The CAPWAP protocol is applicable between a centralized WLAN +   controller and a number of WTPs; i.e., it affects only the switching +   segment of the centralized WLAN architecture.  Its operations should +   therefore be independent of the wireless terminal.  Wireless +   terminals should not be required to be aware of the existence of the +   CAPWAP protocol. + +   Protocol Requirement: + +   Wireless terminals MUST NOT be required to recognize or be aware of +   the CAPWAP protocol. + +   Motivation and Protocol Benefits: + +   IEEE 802.11-based wireless terminals are mature and widely available. +   It would be beneficial for CAPWAP not to impose new requirements on +   these wireless terminals.  In effect, this requirement ensures that +   the setup cost of the protocol is reduced as the numerous existing +   wireless terminals need not be altered. + +   Relation to Problem Statement: + +   The Problem Statement highlights the challenges faced by large WLANs +   consisting of many WTPs.  It does not refer to the operations of +   wireless terminals and this objective emphasizes the independence. + +5.1.4.  Configuration Consistency + +   Classification: Operations + +   Description: + +   WLANs in the CAPWAP framework contain numerous WTPs, each of them +   needing to be configured and managed in a consistent manner.  The +   main concern in ensuring consistency is availability of appropriate +   information corresponding to WTP configuration states.  So +   configuration consistency can be achieved by providing the +   centralized WLAN controller with regular updates on the state of WTP +   operations.  The centralized WLAN controller can in turn apply +   information from the regular updates to ensure consistently among the +   WTPs. + + + + +Govindan, et al.             Informational                      [Page 8] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +   Protocol Requirement: + +   The CAPWAP protocol MUST include support for regular exchanges of +   state information between WTPs and the WLAN controller.  Examples of +   state information include WTP processing load and memory utilization. + +   Motivation and Protocol Benefits: + +   A protocol that provides access to regular state information can in +   turn be used to enhance WLAN configuration and performance.  The +   CAPWAP protocol will be better equipped to address configuration- +   related problems with the regularly available state information.  So +   with greater state information, control and management operations can +   be improved. + +   Relation to Problem Statement: + +   One of the major challenges described in the Problem Statement is +   that of maintaining consistent configuration across the numerous WTPs +   of a WLAN.  This objective addresses the fundamental issue behind +   this -- availability of timely state information. + +5.1.5.  Firmware Trigger + +   Classification: Operations + +   Description: + +   One specific aspect of configuration consistency is the firmware used +   by various WTPs.  The scale of large WLANs introduces possibilities +   for variations in the firmware used among WTPs.  This objective +   highlights the need for the CAPWAP protocol to trigger the delivery +   of appropriate versions of firmware to WTPs.  The actual delivery of +   firmware need not be inclusive to the protocol. + +   Protocol Requirement: + +   The CAPWAP protocol MUST support a trigger for delivery of firmware +   updates. + +   Motivation and Protocol Benefits: + +   The CAPWAP protocol interfaces many WTPs to a centralized WLAN +   controller.  Firmware distribution allows these interfaces to be +   compatible.  This in turn results in consistent configuration and +   simplified management.  So the protocol benefits by including +   triggers for the distribution of firmware updates. + + + + +Govindan, et al.             Informational                      [Page 9] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +   Relation to Problem Statement: + +   Inconsistencies in the configuration of WTPs have been identified as +   a major challenge for large-scale WTPs.  This objective helps +   overcome the challenge by providing a way for the CAPWAP protocol to +   initiate delivery of firmware updates that are compatible among all +   WTPs. + +5.1.6.  Monitoring and Exchange of System-wide Resource State + +   Classification: Operations + +   Description: + +   The centralized WLAN architecture is made up of a switching segment +   and wireless medium segment.  In the switching segment, network +   congestion, WTP status, and firmware information have to be +   monitored.  In the wireless medium segment, the dynamic nature of the +   medium itself has to be monitored.  Overall, there are also various +   statistics that need to be considered for efficient WLAN operation. + +   The CAPWAP protocol should be capable of monitoring the various +   information sources and deliver the resulting information to the +   relevant WLAN devices -- either WTPs or the WLAN controller. +   Moreover, given the relationship among information sources, the +   CAPWAP protocol should combine state information from them.  For +   example, statistics information and status signals from WTPs may be +   merged before being exchanged. + +   Examples of statistics information that the CAPWAP protocol should +   monitor and exchange include congestion state, interference levels, +   loss rates, and various delay factors. + +   Protocol Requirement: + +   The CAPWAP protocol MUST allow for the exchange of statistics, +   congestion, and other WLAN state information. + +   Motivation and Protocol Benefits: + +   The effectiveness of a protocol is based on the relevance of +   information on which it operates.  This requirement for resource +   monitoring and exchange can provide the appropriate information to +   the CAPWAP protocol. + + + + + + + +Govindan, et al.             Informational                     [Page 10] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +   Relation to Problem Statement: + +   The Problem Statement highlights the challenge of dealing with large +   numbers of WTPs and the dynamic nature of the wireless medium. +   Information on the state of WTPs and the medium is important to deal +   with them effectively.  So this objective relates to the problem of +   managing consistency in large WLANs. + +5.1.7.  Resource Control Objective + +   Classification: Operations + +   Description: + +   Integral to the success of any wireless network system is the +   performance and quality it can offer its subscribers.  Since CAPWAP- +   based WLANs combine a switching segment and a wireless medium +   segment, performance and quality need to be coordinated across both +   of these segments.  So QoS performance must be enforced system-wide. + +   This objective highlights QoS over the entire WLAN system, which +   includes the switching segment and the wireless medium segment. +   Given the fundamental differences between the two, it is likely that +   there are alternate QoS mechanisms between WTPs and wireless service +   subscribers and between WTPs and WLAN controllers.  For instance, the +   former will be based on IEEE 802.11e, whereas the latter will be an +   alternative.  So resources need to be adjusted in a coordinated +   fashion over both segments.  The CAPWAP protocol should ensure that +   these adjustments are appropriately exchanged between WLAN +   controllers and WTPs. + +   In addition to IEEE 802.11e, there are a number of other IEEE 802.11 +   task groups that may affect network resources.  These include IEEE +   802.11 TGk, TGu, and TGv, which are currently in progress.  CAPWAP +   should therefore not be restricted to IEEE 802.11e-based mapping. + +   Protocol Requirement: + +   The CAPWAP protocol MUST map the IEEE 802.11e QoS priorities to +   equivalent QoS priorities across the switching and wireless medium +   segments. + + + + + + + + + + +Govindan, et al.             Informational                     [Page 11] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +   Motivation and Protocol Benefits: + +   A protocol that addresses QoS aspects of WLAN systems will deliver +   high performance thereby being beneficial for subscribers and for +   resource utilization efficiency.  Since CAPWAP deals with WTPs +   directly and with the wireless medium indirectly, both of these must +   be considered for performance. + +   For the wireless medium segment, QoS aspects in the protocol enable +   high-quality communications within the domain of a WLAN controller. +   Since each domain generally covers an enterprise or a group of +   service providers, such protocol performance has wide-ranging +   effects. + +   Within the switching segment of CAPWAP, a QoS-enabled protocol +   minimizes the adverse effects of dynamic traffic characteristics so +   as to ensure system-wide performance. + +   Relation to Problem Statement: + +   QoS control is critical to large WLANs and relates to a number of +   aspects.  In particular, this objective can help address the problem +   of managing dynamic conditions of the wireless medium. + +   Furthermore, traffic characteristics in large-scale WLANs are +   constantly varying.  So network utilization becomes inefficient, and +   user experience is unpredictable. + +   The interaction and coordination between the two aspects of system- +   wide QoS are therefore critical for performance. + +5.1.8.  CAPWAP Protocol Security + +   Classification: Security + +   Description: + +   This objective addresses the security of the CAPWAP protocol. + +   The CAPWAP protocol MUST first provide for the participating entities +   -- the WLAN controller and WTPs -- to be explicitly mutually +   authenticated.  This is to ensure that rogue elements do not gain +   access to the WLAN system.  Rogue WTPs should not be allowed to +   breach legitimate WLANs, and at the same time rogue WLAN controllers +   should not be allowed to gain control of legitimate WTPs.  For +   example, WTPs may need to regularly renew their authentication state +   with the WLAN controller and similarly for WLAN controllers. + + + + +Govindan, et al.             Informational                     [Page 12] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +   If authentication is performed via an authenticated key exchange, +   future knowledge of derived keys is not sufficient for +   authentication. + +   Any session keys used between the WLAN controller and WTPs MUST be +   mutually derived using entropy contributed by both parties.  This +   ensures that no one party has control over the resulting session +   keys. + +   Once WTPs and the WLAN controller have been mutually authenticated, +   information exchanges between them must be secured against various +   security threats.  So the CAPWAP protocol MUST provide integrity +   protection and replay protection.  The protocol SHOULD provide +   confidentiality through encryption.  This should cover illegitimate +   modifications to protocol exchanges, eavesdropping, and Denial of +   Service (DoS) attacks, among other potential compromises.  So the +   protocol must provide confidentiality, integrity, and authenticity +   for those exchanges. + +   As a result of realizing this objective, it should not be possible +   for individual WTP breaches to affect the security of the WLAN as a +   whole.  So WTP misuse will be protected against. + +   Additionally, the key establishment protocol for authentication and +   securing CAPWAP exchanges must be designed to minimize the +   possibility of future compromises after the keys are established. + +   CAPWAP MUST NOT prevent the use of asymmetric authentication.  The +   security considerations of such asymmetric authentication are +   described in the Security Considerations section. + +   If the CAPWAP protocol meets the criteria to require automated key +   management per BCP 107 [RFC4107], then mutual authentication MUST be +   accomplished via an authenticated key exchange. + +   Protocol Requirement: + +   The CAPWAP protocol MUST support mutual authentication of WTPs and +   the centralized controller.  It also MUST ensure that information +   exchanges are integrity protected and SHOULD ensure confidentiality +   through encryption. + + + + + + + + + + +Govindan, et al.             Informational                     [Page 13] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +   Motivation and Protocol Benefits: + +   WLANs are increasingly deployed in critical aspects of enterprise and +   consumer networks.  In these contexts, protocol security is crucial +   to ensure the privacy and integrity expected from network +   administrators and end-users.  So securing the CAPWAP protocol has +   direct benefits in addressing these concerns. + +   In many cases, the network path between a WTP and WLAN controller +   contains untrusted links.  Such links could be leveraged by rogue +   WTPs to gain access to the WLAN system.  They could also be used by +   rogue WLAN controllers to gain control of legitimate WTPs and their +   associated terminals to either redirect or compromise terminal +   traffic.  These security concerns can be mitigated with this +   objective. + +   Relation to Problem Statement: + +   Security problems in large-scale WLANs are detailed in the Problem +   Statement.  These include complications arising from rogue WTPs and +   compromised interfaces between WTPs and the WLAN controller.  The +   requirement for protocol security addresses these problems and +   highlights the importance of protecting against them. + +5.1.9.  System-wide Security + +   Classification: Security + +   Description: + +   The emphasis of this objective is on the security threats external to +   the centralized CAPWAP segment of a WLAN system.  The focus is +   therefore on rogue wireless clients and other illegitimate wireless +   interferences.  There are a number of specific external threats that +   need to be addressed within the CAPWAP framework. + +   i.  PMK Sharing + +   One aspect of this objective relates to recent discussions on +   Pairwise Master Key (PMK) sharing in the CAPWAP framework.  This +   objective highlights the need to prevent exploitation of this +   ambiguity by rogue wireless clients.  It is to ensure that any +   ambiguities arising from the CAPWAP framework are not cause for +   security breaches. + + + + + + + +Govindan, et al.             Informational                     [Page 14] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +   Protocol Requirement: + +   The design of the CAPWAP protocol MUST NOT allow for any compromises +   to the WLAN system by external entities. + +   Motivation and Protocol Benefits: + +   The external threats to the centralized WLAN architecture become +   increasingly crucial given the low cost of wireless clients.  Since +   it is relatively inexpensive for rogue individuals to mount attacks, +   it is important that WLAN systems are protected against them. +   Adequate mechanisms to thwart such external threats will be of +   tremendous benefit to the WLAN systems controlled and managed with +   the CAPWAP protocol. + +   Relation to Problem Statement: + +   This objective is based on the security needs highlighted in the +   Problem Statement.  Specifically, the Problem Statement discusses the +   effects of the shared wireless medium.  This represents the external +   aspects of the CAPWAP framework from which certain threats can arise. +   The system-wide security objective addresses such threats in relation +   to the Problem Statement. + +5.1.10.  IEEE 802.11i Considerations + +   Classification: Operations + +   Description: + +   The CAPWAP protocol must support authentication in the centralized +   WLAN architecture in which the authenticator and encryption points +   can be located on distinct entities, i.e., WLAN controller or WTP. +   The Architecture Taxonomy illustrates a number of variants, in both +   local-MAC and split-MAC designs, in which the authenticator is +   located at the WLAN controller and the encryption points are at the +   WTPs.  The CAPWAP protocol must be applicable to these variants and +   allow authentication mechanisms and their constituent processes to be +   operable in these cases. + +   An important issue to consider in this case is the exchange of key +   information when authenticator and encryption points are located on +   distinct entities.  For example, consider the case where IEEE 802.11i +   is used in a WLAN in which the WLAN controller realizes the +   authenticator, some WTPs realize encryption (possibly local-MAC +   WTPs), and other WTPs rely on the WLAN controller for encryption +   (possibly split-MAC WTPs). + + + + +Govindan, et al.             Informational                     [Page 15] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +   Here, CAPWAP will first need to identify the location of the +   authenticator and encryption points between each WLAN controller-WTP +   pair.  This will likely be part of the initial WTP configuration. +   Subsequently, the WTPs that realize encryption will need CAPWAP to +   exchange key information with the authenticator at the WLAN +   controller.  For the WTPs that do not realize encryption, CAPWAP +   needs to adapt its control to bypass the key exchange phase. + +   Clearly, the centralized WLAN architecture presents a different +   platform for authentication mechanisms compared to legacy WLANs in +   which a WTP realized both authenticator and encryption roles.  So +   this objective highlights the need for CAPWAP to support +   authentication and key management in the centralized WLAN +   architecture. + +   Protocol Requirement: + +   The CAPWAP protocol MUST determine the exact structure of the +   centralized WLAN architecture in which authentication needs to be +   supported, i.e., the location of major authentication components. +   This may be achieved during WTP initialization where major +   capabilities are distinguished. + +   The protocol MUST allow for the exchange of key information when +   authenticator and encryption roles are located in distinct entities. + +   Motivation and Protocol Benefits: + +   The immediate focus of CAPWAP is on supporting IEEE 802.11-based +   WLANs.  As such, it is necessary for the protocol to recognize the +   major distinction in WLAN design with respect to IEEE 802.11i +   authenticator and encryption points.  This represents a significant +   variation that has been highlighted in the Architecture Taxonomy. +   The CAPWAP protocol benefits by accommodating such a major +   consideration from IEEE 802.11i. + +   These requirements will be common for all authentication mechanisms +   over the centralized WLAN architecture.  So they are applicable to +   IEEE 802.11i, Universal Access Method (UAM), and other mechanisms. + +   Relation to Problem Statement: + +   The Problem Statement highlights the availability of different WTP +   designs and the need to ensure interoperability among them.  In this +   regard, operational changes occurring due to the separation of the +   IEEE 802.11i authenticator and encryption points need to be +   accommodated within the CAPWAP protocol. + + + + +Govindan, et al.             Informational                     [Page 16] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +5.1.11.  Interoperability Objective + +   Classification: Architecture + +   Description: + +   Two major designs of the centralized WLAN architecture are local-MAC +   and split-MAC.  With the focusing of standardization efforts on these +   two designs, it is crucial to ensure mutual interoperation among +   them. + +   This objective for the CAPWAP protocol is to ensure that WTPs of both +   local-MAC and split-MAC architecture designs are capable of +   interoperation within a single WLAN.  Consequently, a single WLAN +   controller will be capable of controlling both types of WTPs using a +   single CAPWAP protocol.  Integral support for these designs comprises +   a number of protocol aspects. + +   i.  Capability negotiations between WLAN controller and WTPs + +   WTP designs differ in the degree of IEEE 802.11 MAC functionalities +   that each type of WTP realizes.  The major distinctions, split-MAC +   and local-MAC, differ in the processing of IEEE 802.11 MAC frames. +   In this regard, the CAPWAP protocol should include functionality that +   allows for negotiations of significant capabilities between WTPs and +   the WLAN controller. + +   As a first step, such negotiations could cover the type of WTP, +   split-MAC or local-MAC, as this provides substantial information on +   their respective capabilities. + +   ii.  Establishment of alternative interfaces + +   The capability differences among different WTPs essentially equate to +   alternative interfaces with a WLAN controller.  So the CAPWAP +   protocol should be capable of adapting its operations to the major +   different interfaces.  In a first case, this would include +   accommodating capability differences between local-MAC and split-MAC +   WTPs. + +   The definition of these interfaces in terms of finer granularity of +   functionalities will be based on AP functionality documents produced +   by the IEEE 802.11 AP Functionality (APF) Ad-Hoc Committee. + +   Protocol Requirement: + +   The CAPWAP protocol MUST include sufficient capabilities negotiations +   to distinguish between major types of WTPs. + + + +Govindan, et al.             Informational                     [Page 17] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +   Motivation and Protocol Benefits: + +   The benefits of realizing this architecture objective are both +   technical and practical.  First, there are substantial overlaps in +   the control operations of local-MAC and split-MAC architecture +   designs.  The Architecture Taxonomy tabulates major common features +   of the two designs.  As a result, it is technically practical to +   devise a single protocol that manages both types of devices. + +   Next, the ability to operate a CAPWAP protocol for both types of +   architectural designs enhances its practical prospects as it will +   have wider appeal. + +   Furthermore, the additional complexity resulting from such +   alternative interfaces is marginal.  Consequently, the benefits of +   this objective will far outweigh any cost of realizing it. + +   Relation to Problem Statement: + +   The objective for supporting both local-MAC and split-MAC WTPs is +   fundamental to addressing the Problem Statement.  It forms the basis +   for those problems to be uniformly addressed across the major WLAN +   architectures.  This is the ultimate aim of standardization efforts. +   The realization of this objective will ensure the development of a +   comprehensive set of mechanisms that address the challenges of +   large-scale WLAN deployments. + +5.1.12.  Protocol Specifications + +   Classification: General + +   Description: + +   WLAN equipment vendors require sufficient details from protocol +   specifications so that implementing them will allow for compatibility +   with other equipment that runs the same protocol.  In this light, it +   is important for the CAPWAP protocol specifications to be reasonably +   complete for realization. + +   Protocol Requirement: + +   Any WTP or WLAN controller vendor or any person MUST be able to +   implement the CAPWAP protocol from the specification itself and by +   that it is required that all such implementations do interoperate. + + + + + + + +Govindan, et al.             Informational                     [Page 18] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +   Motivation and Protocol Benefits: + +   It is beneficial for WLAN equipment vendors to refer to a single set +   of specifications while implementing the CAPWAP protocol.  This helps +   to ease and quicken the development process. + +   Relation to Problem Statement: + +   This requirement is based on WG discussions that have been determined +   to be important for CAPWAP. + +5.1.13.  Vendor Independence + +   Classification: General + +   Description: + +   Rapid developments in WLAN technologies result in equipment vendors +   constantly modifying their devices.  In many cases, developments are +   independently made for WLAN controllers and WTPs.  The CAPWAP +   protocol should not affect the independence of device modifications. + +   Protocol Requirement: + +   A WTP vendor SHOULD be able to make modifications to hardware without +   any WLAN controller vendor involvement. + +   Motivation and Protocol Benefits: + +   Independence in the type of hardware for WLAN equipment ensures that +   new developments do not hamper protocol operation. + +   Relation to Problem Statement: + +   This requirement is based on WG discussions that have been determined +   to be important for CAPWAP. + +5.1.14.  Vendor Flexibility + +   Classification: General + +   Description: + +   The CAPWAP protocol must not be specified for a particular type of +   wireless MAC design.  It should be compatible with both local-MAC and +   split-MAC WTPs. + + + + + +Govindan, et al.             Informational                     [Page 19] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +   Protocol Requirement: + +   The CAPWAP protocol MUST NOT limit WTP vendors in their choice of +   local-MAC or split-MAC WTPs.  It MUST be compatible with both types +   of WTPs. + +   Motivation and Protocol Benefits: + +   This requirement is to ensure that WTP vendors have sufficient +   flexibility in selecting the type of wireless MAC design that they +   consider best for deployments. + +   Relation to Problem Statement: + +   This requirement is based on WG discussions that have been determined +   to be important for CAPWAP. + +5.1.15.  NAT Traversal + +   Classification: General + +   Description: + +   WLAN deployments may involve WTPs and the WLAN controller +   communicating across Network Address Translators (NATs).  The CAPWAP +   protocol must be capable of operating across topologies that contain +   known NAT configurations.  It requires appropriate discovery and +   identification mechanisms for NAT traversal. + +   Protocol Requirement: + +   The CAPWAP protocol MUST NOT prevent the operation of established +   methods of NAT traversal. + +   Motivation and Protocol Benefits: + +   The widespread adoption of WLANs raises the possibility for WLAN +   topologies containing NATs.  It is important for the CAPWAP protocol +   to be applicable within such topologies.  This requirement aims to +   make the CAPWAP protocol relevant for NAT traversal. + +   Relation to Problem Statement: + +   This requirement is based on WG discussions that have been determined +   to be important for CAPWAP. + + + + + + +Govindan, et al.             Informational                     [Page 20] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +5.2.  Desirable Objectives + +   These objectives have been determined to be desirable for a CAPWAP +   protocol but not mandatory.  Realizing these objectives may help +   improve control of WLANs but need not necessarily be required for all +   networks or scenarios. + +5.2.1.  Multiple Authentication Mechanisms + +   Classification: Architecture + +   Description: + +   Shared WLAN infrastructure raises the issue of multiple +   authentication mechanisms.  This is because each logical group is +   likely to be associated with different service providers or WLAN +   domains.  As a result, the authentication needs within them will be +   different.  Although CAPWAP is required to support IEEE 802.11i, it +   is also necessary for it to support other authentication mechanisms. +   For example, one logical group may use IEEE 802.11i, whereas another +   may use web authentication.  CAPWAP must be able to operate in such +   shared WLANs. + +   Protocol Requirement: + +   The CAPWAP protocol MUST support different authentication mechanisms +   in addition to IEEE 802.11i. + +   Motivation and Protocol Benefits: + +   The benefit of supporting various authentication mechanisms is that +   the protocol then becomes flexible for use in various deployments. +   The protocol will therefore not mandate the use of any particular +   mechanisms that may not be appropriate for a particular deployment. + +   Relation to Problem Statement: + +   This objective relates to the problem of management complexity. +   Shared WLAN deployments simplify management of large networks. + +5.2.2.  Support for Future Wireless Technologies + +   Classification: Architecture + +   Description: + +   The rapid pace of technology developments means that new advances +   need to be catered to in current analyses.  Among these is the + + + +Govindan, et al.             Informational                     [Page 21] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +   support for new wireless technologies within the CAPWAP protocol, +   such as IEEE 802.16.  The protocol should therefore not rely on +   specifics of IEEE 802.11 technology. + +   In all cases where the CAPWAP protocol messages contain specific +   layer 2 information elements, the definition of the protocol needs to +   provide for extensibility so that these elements can be defined for +   specific layer 2 wireless protocols.  This may entail assigning a +   layer 2 wireless protocol type and version field to the message PDU. +   Examples of other wireless protocols that might be supported include +   but are not limited to 802.16e, 802.15.x, etc. + +   Protocol Requirement: + +   CAPWAP protocol messages MUST be designed to be extensible for +   specific layer 2 wireless technologies.  It should not be limited to +   the transport of elements relating to IEEE 802.11. + +   Motivation and Protocol Benefits: + +   There are many benefits to an extensible protocol.  It allows for +   application in different networks and provides greater scope. +   Furthermore, service providers require WLAN solutions that will be +   able to meet current and future market requirements. + +   Relation to Problem Statement: + +   The Problem Statement describes some of the advances taking place in +   other standards bodies like the IEEE.  It is important for the CAPWAP +   protocol to reflect the advances and provide a framework in which +   they can be supported. + +5.2.3.  Support for New IEEE Requirements + +   Classification: Architecture + +   Description: + +   The IEEE 802.11 APF Ad-Hoc Committee has reviewed IEEE 802.11 +   functionality and has made more thorough definitions for the new +   requirements.  The CAPWAP protocol must be able to incorporate these +   definitions with minimal change.  Furthermore, a number of extensions +   for IEEE 802.11 are currently being standardized.  The CAPWAP +   protocol must also be able to incorporate these new extensions with +   minimal change. + + + + + + +Govindan, et al.             Informational                     [Page 22] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +   Protocol Requirement: + +   The CAPWAP protocol MUST be openly designed to support new IEEE +   802.11 definitions and extensions. + +   Motivation and Protocol Benefits: + +   There are a number of advances being made within the IEEE regarding +   the functionality of IEEE 802.11 technology.  Since this represents +   one of the major wireless technologies in use today, it will be +   beneficial for CAPWAP to incorporate the relevant new extensions. + +   Relation to Problem Statement: + +   The Problem Statement presents an overview of the task of the IEEE +   802.11 working group.  This group is focused on defining the +   functional architecture of WTPs and new extensions for it.  It is +   necessary for the CAPWAP protocol to reflect these definitions and +   extensions. + +5.2.4.  Interconnection Objective + +   Classification: Architecture + +   Description: + +   Large-scale WLAN deployments are likely to use a variety of +   interconnection technologies between different devices of the +   network.  It should therefore be possible for the CAPWAP protocol to +   operate over various interconnection technologies. + +   As a result of realizing this objective, the protocol will be capable +   of operation over both IPv4 and IPv6.  It will also be designed such +   that it can operate within tightly administered networks, such as +   enterprise networks, or on open, public access networks.  For +   example, VLAN tunnels can be used across different types of networks +   over which CAPWAP will operate. + +   Protocol Requirement: + +   The CAPWAP protocol MUST NOT be constrained to specific underlying +   transport mechanisms. + + + + + + + + + +Govindan, et al.             Informational                     [Page 23] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +   Motivation and Protocol Benefits: + +   The main aim of the CAPWAP protocol is to achieve interoperability +   among various WTPs and WLAN controllers.  As such, the motivation for +   this requirement is for the protocol to be operable independent of +   underlying interconnection technologies. + +   Relation to Problem Statement: + +   The Problem Statement discusses the complexity of configuring large +   WLANs.  The selection of available interconnection technologies for +   large-scale deployments further intensifies this complexity.  This +   requirement avoids part of the complexity by advocating independence +   of the operational aspects of the protocol from underlying transport. + +5.2.5.  Access Control + +   Classification: Operations + +   Description: + +   This objective focuses on the informational needs of WLAN access +   control and specifically the role of the CAPWAP protocol in +   transporting this information between WTPs and their WLAN controller. + +   The following are some specific information aspects that need to be +   transported by the CAPWAP protocol: + +   i.  IEEE 802.11 association and authentication + +   The association of wireless clients is distinct for initial and +   roaming cases.  As a result, access control mechanisms require +   specific contextual information regarding each case.  Additionally, +   load balancing, QoS, security, and congestion information in both +   wireless medium segments and switching segments need to be +   considered. + +   ii.  WTP Access Control + +   In addition to controlling access for wireless clients, it is also +   necessary to control admission of new WTPs.  Given the threat of +   rogue WTPs, it is important for CAPWAP to relay appropriate +   authentication information between new WTPs and the WLAN controller. + +   Protocol Requirement: + +   The CAPWAP protocol MUST be capable of exchanging information +   required for access control of WTPs and wireless terminals. + + + +Govindan, et al.             Informational                     [Page 24] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +   Motivation and Protocol Benefits: + +   Due to the scale of deployments in which CAPWAP will be employed, +   comprehensive access control is crucial.  The effectiveness of access +   control in turn is affected by the information on which such control +   is based.  As a result, this objective has critical relevance to a +   CAPWAP protocol. + +   Relation to Problem Statement: + +   This objective addresses the issue of access control in large WLANs. +   Broadly, it relates the problem of managing the complexity scale of +   such networks.  With collective information of both switching and +   wireless medium segments, realizing this objective will help control +   and manage complexity. + +5.3.  Non-Objectives + +   The following objectives have been prioritized as non-objectives +   during the course of working group consultations.  They have been +   prioritized so in the context of CAPWAP and its considerations.  They +   may, however, be applicable in alternative contexts. + +5.3.1.  Support for Non-CAPWAP WTPs + +   Classification: Architecture + +   Description: + +   The CAPWAP protocol should provide an engine-mechanism to spring WTP +   auto-configuration and/or software version updates and should support +   integration with existing network management system.  WLAN controller +   as a management agent is optional. + +   If entities other than WLAN controllers manage some aspects of WTPs, +   such as software downloads, the CAPWAP protocol may be used for WTPs +   to notify WLAN controllers of any changes made by the other entities. + +   Protocol Requirement: + +   The CAPWAP protocol SHOULD be capable of recognizing legacy WTPs and +   existing network management systems. + + + + + + + + + +Govindan, et al.             Informational                     [Page 25] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +   Motivation and Protocol Benefits: + +   It is expected that in many cases, the centralized WLAN architecture +   will be deployed incrementally with legacy systems.  In this regard, +   it is necessary for the protocol to be used in scenarios with mixed +   WLAN devices. + +   Relation to Problem Statement: + +   The Problem Statement highlights management complexity as a major +   issue with large WLANs.  One part of this complexity can be related +   to the incremental deployment of centralized WLAN devices for which +   this objective is applicable. + +5.3.2.  Technical Specifications + +   Classification: General + +   Description: + +   The CAPWAP protocol must not require AC and WTP vendors to share +   technical specifications to establish compatibility.  The protocol +   specifications alone must be sufficient for compatibility. + +   Protocol Requirement: + +   WTP vendors SHOULD NOT have to share technical specifications for +   hardware and software to AC vendors in order for interoperability to +   be achieved. + +   Motivation and Protocol Benefits: + +   It is beneficial for WLAN equipment vendors to refer to a single set +   of specifications while implementing the CAPWAP protocol.  This helps +   to ease and quicken the development process. + +   Relation to Problem Statement: + +   This requirement is based on WG discussions that have been determined +   to be important for CAPWAP. + +   This objective has been prioritized as a non-objective as it is a +   duplicate of the Protocol Specifications objective (Section 5.1.12). + + + + + + + + +Govindan, et al.             Informational                     [Page 26] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +5.4.  Operator Requirements + +   The following objectives have been provided by network service +   operators.  They represent the requirements from those ultimately +   deploying the CAPWAP protocol in their WLANs. + +5.4.1.  AP Fast Handoff + +   Classification: Operations + +   Description: + +   Network service operators consider handoffs crucial because of the +   mobile nature of their customers.  In this regard, the CAPWAP +   protocol should not adversely affect AP fast-handoff procedures.  The +   protocol may support optimizations for fast handoff procedures so as +   to allow better support for real-time services during handoffs. + +   Protocol Requirement: + +   CAPWAP protocol operations MUST NOT impede or obstruct the efficacy +   of AP fast-handoff procedures. + +6.  Summary and Conclusion + +   The objectives presented in this document address three main aspects +   of the CAPWAP protocol, namely: + +   i.  Architecture +   ii.  Operations +   iii.  Security + +   These requirements are aimed at focusing standardization efforts on a +   simple, interoperable protocol for managing large-scale WLANs.  The +   architecture requirements specify the structural features of the +   protocol such as those relating to WTP types (local-MAC and split- +   MAC) and WTP structures (logical groups).  The operations +   requirements address the functional aspects dealing with WTP +   configuration and management.  Finally, the security requirements +   cover authentication and integrity aspects of protocol exchanges. + +   The objectives have additionally been prioritized to reflect their +   immediate significance to the development and evaluation of an +   interoperable CAPWAP protocol.  The priorities are Mandatory and +   Accepted, Desirable, and Non-Objectives.  They reflect working group +   consensus on the effectiveness of the requirements in the context of +   protocol design. + + + + +Govindan, et al.             Informational                     [Page 27] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +   Additionally, this document includes requirements from network +   service operators that have been derived based on their experience in +   operating large-scale WLANs. + +   The resulting requirements from this document will be used in +   conjunction with the CAPWAP Problem Statement [RFC3990] and CAPWAP +   Architecture Taxonomy [RFC4118] to develop and evaluate an +   interoperable protocol for the control and provisioning of WTPs in +   large-scale WLANs. + +7.  Security Considerations + +   The CAPWAP framework highlights support for both local-MAC and +   split-MAC WTPs.  In deployments where both types of WTPs are used, it +   is crucial to ensure that each be secured in consideration of its +   capabilities.  The Architecture Taxonomy illustrates how different +   WTPs incorporate varying levels of functionalities.  Development of +   the CAPWAP protocol should ensure that the deployment of both local- +   MAC and split-MAC WTPs within a single WLAN do not present loopholes +   for security compromises. + +   In shared WLAN deployments made of a number of logical groups, +   traffic from each group needs to be mutually separated.  So in +   addition to protocol-related exchanges, data traffic from wireless +   terminals should also be segregated with respect to the logical +   groups to which they belong.  It should not be possible for data or +   control traffic from one logical group to stray to or influence +   another logical group. + +   The use of IEEE 802.11i over the centralized WLAN architecture allows +   for implementations in which the PMK is shared across WTPs.  This +   raises the ambiguity between legitimate sharing and illegitimate +   copies.  Wireless terminals may unknowingly fall prey to or exploit +   this ambiguity.  The resolution of this issue is currently being +   evaluated by the IEEE 802 and IETF liaisons. + +   The low cost of launching attacks on WLANs makes the CAPWAP protocol +   a target.  A first step in securing against any form of attacks is to +   continuously monitor the WLAN for conditions of potential threats +   from rogue WTPs or wireless terminals.  For example, profiles for DoS +   and replay attacks need to be considered for the CAPWAP protocol to +   effectively monitor security conditions. + +   The open environment of many WLAN deployments makes physical security +   breaches highly probable.  Compromises resulting from theft and +   physical damage must be considered during protocol development.  For +   instance, it should not be possible for a single compromised WTP to +   affect the WLAN as a whole. + + + +Govindan, et al.             Informational                     [Page 28] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +   Considering asymmetric, non-mutual authentication between WTPs and +   the WLAN controller, there is a risk of a rogue participant +   exploiting such an arrangement.  It is preferable to avoid non-mutual +   authentication.  In some cases, the legitimacy of the protocol +   exchange participants may be verified externally, for example, by +   means of physical containment within a close environment.  Asymmetric +   authentication may be appropriate here without risk of security +   compromises. + +8.  Acknowledgements + +   The authors would like to thank the working group chairs, Dorothy +   Gellert and Mahalingam Mani, for their support and patience with this +   document.  We would also like to thank participants of the working +   group who have helped shape the objectives.  In particular, the +   authors thank James Kempf, Pat Calhoun, Inderpreet Singh, Dan +   Harkins, T. Sridhar, Charles Clancy, and Emek Sadot for their +   invaluable inputs.  We also extend our gratitude to the IEEE 802.11 +   Ad-Hoc Committee for its evaluation of the document.  The authors +   also acknowledge the contributions from Meimei Dang, Satoshi Iino, +   Mikihito Sugiura, and Dong Wang. + +9.  Normative References + +   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate +              Requirement Levels", BCP 14, RFC 2119, March 1997. + +   [RFC3990]  O'Hara, B., Calhoun, P., and J. Kempf, "Configuration and +              Provisioning for Wireless Access Points (CAPWAP) Problem +              Statement", RFC 3990, February 2005. + +   [RFC4118]  Yang, L., Zerfos, P., and E. Sadot, "Architecture Taxonomy +              for Control and Provisioning of Wireless Access Points +              (CAPWAP)", RFC 4118, June 2005. + +10.  Informative References + +   [802.11]   IEEE Standard 802.11, "Wireless LAN Medium Access Control +              (MAC) and Physical Layer (PHY) Specifications", June 2003. + +   [802.11i]  IEEE Standard 802.11i, "Medium Access Control (MAC) +              Security Enhancements", July 2004. + +   [802.11e]  IEEE Standard 802.11e, "Medium Access Control (MAC) +              Quality of Service Enhancements", November 2005. + +   [RFC4107]  Bellovin, S. and R. Housley, "Guidelines for Cryptographic +              Key Management", BCP 107, RFC 4107, June 2005. + + + +Govindan, et al.             Informational                     [Page 29] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +Authors' Addresses + +   Saravanan Govindan +   Panasonic Singapore Laboratories +   Block 1022, Tai Seng Industrial Estate +   #06-3530, Tai Seng Avenue +   Singapore  534 415 +   Singapore + +   Phone: +65 6550 5441 +   EMail: saravanan.govindan@sg.panasonic.com + + +   Zhonghui Yao +   Huawei Longgang Production Base +   Shenzhen  518 129 +   P. R. China + +   Phone: +86 755 2878 0808 +   EMail: yaoth@huawei.com + + +   Wenhui Zhou +   China Mobile +   53A, Xibianmen Ave, Xuanwu District +   Beijing  100 053 +   P. R. China + +   Phone: +86 10 6600 6688 ext.3061 +   EMail: zhouwenhui@chinamobile.com + + +   L. Lily Yang +   Intel Corp. +   JF3-206, 2111 NE 25th Ave. +   Hilsboro, OR  97124 +   USA + +   Phone: +1 503 264 8813 +   EMail: lily.l.yang@intel.com + + + + + + + + + + + +Govindan, et al.             Informational                     [Page 30] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +   Hong Cheng +   Panasonic Singapore Laboratories +   Block 1022, Tai Seng Industrial Estate +   #06-3530, Tai Seng Avenue +   Singapore  534 415 +   Singapore + +   Phone: +65 6550 5447 +   EMail: hong.cheng@sg.panasonic.com + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Govindan, et al.             Informational                     [Page 31] + +RFC 4564                   CAPWAP Objectives                   July 2006 + + +Full Copyright Statement + +   Copyright (C) The Internet Society (2006). + +   This document is subject to the rights, licenses and restrictions +   contained in BCP 78, and except as set forth therein, the authors +   retain all their rights. + +   This document and the information contained herein are provided on an +   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS +   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET +   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, +   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE +   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED +   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + +   The IETF takes no position regarding the validity or scope of any +   Intellectual Property Rights or other rights that might be claimed to +   pertain to the implementation or use of the technology described in +   this document or the extent to which any license under such rights +   might or might not be available; nor does it represent that it has +   made any independent effort to identify any such rights.  Information +   on the procedures with respect to rights in RFC documents can be +   found in BCP 78 and BCP 79. + +   Copies of IPR disclosures made to the IETF Secretariat and any +   assurances of licenses to be made available, or the result of an +   attempt made to obtain a general license or permission for the use of +   such proprietary rights by implementers or users of this +   specification can be obtained from the IETF on-line IPR repository at +   http://www.ietf.org/ipr. + +   The IETF invites any interested party to bring to its attention any +   copyrights, patents or patent applications, or other proprietary +   rights that may cover technology that may be required to implement +   this standard.  Please address the information to the IETF at +   ietf-ipr@ietf.org. + +Acknowledgement + +   Funding for the RFC Editor function is provided by the IETF +   Administrative Support Activity (IASA). + + + + + + + +Govindan, et al.             Informational                     [Page 32] +  |