1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
|
Network Working Group B. O'Hara
Request for Comments: 3990 P. Calhoun
Category: Informational Airespace
J. Kempf
Docomo Labs USA
February 2005
Configuration and Provisioning for Wireless Access Points (CAPWAP)
Problem Statement
Status of This Memo
This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (2005).
Abstract
This document describes the Configuration and Provisioning for
Wireless Access Points (CAPWAP) problem statement.
1. Introduction
With the approval of the 802.11 standard by the IEEE in 1997,
wireless LANs (WLANs) began a slow entry into enterprise networks.
The limited data rates of the original 802.11 standard, only 1 and 2
Mbps, limited the widespread adoption of the technology. 802.11
found wide deployment in vertical applications, such as inventory
management, point of sale, and transportation management. Pioneering
enterprises began to deploy 802.11, mostly for experimentation.
In 1999, the IEEE approved the 802.11a and 802.11b amendments to the
base standard, increasing the available data rate to 54 and 11 Mbps,
respectively, and expanding to a new radio band. This removed one of
the significant factors holding back adoption of 802.11 in large
enterprise networks. These large deployments were bound by the
definition and functionality of an 802.11 Access Point (AP), as
described in the 802.11 standard. The techniques required extensive
use of layer 2 bridging and widespread VLANs to ensure the proper
operation of higher layer protocols. Deployments of 802.11 WLANs as
large as several thousand APs have been described.
O'Hara, et al. Informational [Page 1]
^L
RFC 3990 CAPWAP Problem Statement February 2005
Large deployments of 802.11 WLANs have introduced several problems
that require solutions. The limitations on the scalability of
bridging should come as no surprise to the networking community, as
similar limitations arose in the early 1980s for wired network
bridging during the expansion and interconnection of wired local area
networks. This document will describe the problems introduced by the
large-scale deployment of 802.11 WLANs in enterprise networks.
2. Problem Statement
Large WLAN deployments introduce several problems. First, each AP is
an IP-addressable device requiring management, monitoring, and
control. Deployment of a large WLAN will typically double the number
of network infrastructure devices that require management. This
presents a significant additional burden to the network
administration resources and is often a hurdle to adoption of
wireless technologies, particularly because the configuration of each
access point is nearly identical to the next. This near-sameness
often leads to misconfiguration and improper operation of the WLAN.
Second, distributing and maintaining a consistent configuration
throughout the entire set of access points in the WLAN is
problematic. Access point configuration consists of both long-term
static information (such as addressing and hardware settings) and
more dynamic provisioning information (such as individual WLAN
settings and security parameters). Large WLAN installations that
have to update dynamic provisioning information in all the APs in the
WLAN require a prolonged phase-over time. As each AP is updated, the
WLAN will not have a single, consistent configuration.
Third, dealing effectively with the dynamic nature of the WLAN medium
itself is difficult. Due to the shared nature of the wireless medium
(shared with APs in the same WLAN, with APs in other WLANs, and with
devices that are not APs at all), parameters controlling the wireless
medium on each AP must be monitored frequently and modified in a
coordinated fashion to maximize WLAN performance. This must be
coordinated among all the access points, to minimize the interference
of one access point with its neighbors. Manually monitoring these
metrics and determining a new, optimum configuration for the
parameters related to the wireless medium is a task that takes
significant time and effort.
Fourth, securing access to the network and preventing installation of
unauthorized access points is challenging. Physical locations for
access points are often difficult to secure since their location must
often be outside of a locked network closet or server room. Theft of
an access point, with its embedded secrets, allows a thief to obtain
access to the resources secured by those secrets.
O'Hara, et al. Informational [Page 2]
^L
RFC 3990 CAPWAP Problem Statement February 2005
Recently, to address some, or all, of the above problems, multiple
vendors have begun offering proprietary solutions that combine
aspects of network switching, centralized control and management, and
distributed wireless access in a variety of new architectures. Since
interoperable solutions allow enterprises and service providers a
broader choice, a standardized, interoperable interface between
access points and a centralized controller addressing the problems
seems desirable.
In currently fielded devices, the physical portions of this network
system are one or more 802.11 access points (APs) and one or more
central control devices, alternatively described as controllers (or
as access controllers, ACs). Ideally, a network designer would be
able to choose one or more vendors for the APs and one or more
vendors for the central control devices in sufficient numbers to
design a network with 802.11 wireless access to meet the designer's
requirements.
Current implementations are proprietary and are not interoperable.
This is due to a number of factors, including the disparate
architectural choices made by the various manufacturers. A taxonomy
of the architectures employed in the existing products in the market
will provide the basis of an output document to be provided to the
IEEE 802.11 Working Group. This taxonomy will be utilized by the
802.11 Working Group as input to their task of defining the
functional architecture of an access point. The functional
architecture, including descriptions of detailed functional blocks,
interfaces, and information flow, will be reviewed by CAPWAP to
determine if further work is necessary to apply or develop standard
protocols providing for multi-vendor interoperable implementations of
WLANs built from devices that adhere to the newly appearing
hierarchical architecture using a functional split between an access
point and an access controller.
3. Security Considerations
The devices used in WLANs control network access and provide for the
delivery of packets between hosts using the WLAN and other hosts on
the WLAN or elsewhere on the Internet. Therefore, the functions for
control and provisioning of wireless access points, require
protection to prevent misuse of the devices.
Confidentiality, integrity, and authenticity requirements should
address central management, monitoring, and control of wireless
access points that should be addressed. Once an AP and AC have been
authenticated to each other, a single level of authorization allowing
monitoring, control, and provisioning may not be sufficient. The
requirement for more than a single level of authorization should be
O'Hara, et al. Informational [Page 3]
^L
RFC 3990 CAPWAP Problem Statement February 2005
determined. Physical security should also be addressed for those
devices that contain sensitive security parameters that might
compromise the security of the system, if those parameters were to
fall into the hands of an attacker.
To provide comprehensive radio coverage, APs are often installed in
locations that are difficult to secure. The CAPWAP architecture may
reduce the consequences of a stolen AP. If high-value secrets, such
as a RADIUS shared secret, are stored in the AC, then the physical
loss of an AP does not compromise these secrets. Further, the AC can
easily be located in a physically secure location. Of course,
concentrating all the high-value secrets in one place makes the AC an
attractive target, and strict physical, procedural, and technical
controls are needed to protect the secrets.
Authors' Addresses
Bob O'Hara
Airespace
110 Nortech Parkway
San Jose, CA 95134
Phone: +1 408-635-2025
EMail: bob@airespace.com
Pat R. Calhoun
Airespace
110 Nortech Parkway
San Jose, CA 95134
Phone: +1 408-635-2000
EMail: pcalhoun@airespace.com
James Kempf
Docomo Labs USA
181 Metro Drive, Suite 300
San Jose, CA 95110
Phone: +1 408 451 4711
EMail: kempf@docomolabs-usa.com
O'Hara, et al. Informational [Page 4]
^L
RFC 3990 CAPWAP Problem Statement February 2005
Full Copyright Statement
Copyright (C) The Internet Society (2005).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the IETF's procedures with respect to rights in IETF Documents can
be found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at ietf-
ipr@ietf.org.
Acknowledgement
Funding for the RFC Editor function is currently provided by the
Internet Society.
O'Hara, et al. Informational [Page 5]
^L
|