1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
|
Network Working Group D. Loher
Request for Comments: 4565 Envysion, Inc.
Category: Informational D. Nelson
Enterasys Networks, Inc.
O. Volinsky
Colubris Networks, Inc.
B. Sarikaya
Huawei USA
July 2006
Evaluation of Candidate Control and Provisioning
of Wireless Access Points (CAPWAP) Protocols
Status of This Memo
This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (2006).
Abstract
This document is a record of the process and findings of the Control
and Provisioning of Wireless Access Points Working Group (CAPWAP WG)
evaluation team. The evaluation team reviewed the 4 candidate
protocols as they were submitted to the working group on June 26,
2005.
Table of Contents
1. Introduction ....................................................3
1.1. Conventions Used in This Document ..........................3
1.2. Terminology ................................................3
2. Process Description .............................................3
2.1. Ratings ....................................................3
3. Member Statements ...............................................4
4. Protocol Proposals and Highlights ...............................5
4.1. LWAPP ......................................................5
4.2. SLAPP ......................................................6
4.3. CTP ........................................................6
4.4. WiCoP ......................................................7
Loher, et al. Informational [Page 1]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
5. Security Considerations .........................................7
6. Mandatory Objective Compliance Evaluation .......................8
6.1. Logical Groups .............................................8
6.2. Traffic Separation .........................................8
6.3. STA Transparency ...........................................9
6.4. Configuration Consistency .................................10
6.5. Firmware Trigger ..........................................11
6.6. Monitor and Exchange of System-wide Resource State ........12
6.7. Resource Control ..........................................13
6.8. Protocol Security .........................................15
6.9. System-Wide Security ......................................16
6.10. 802.11i Considerations ...................................17
6.11. Interoperability .........................................17
6.12. Protocol Specifications ..................................18
6.13. Vendor Independence ......................................19
6.14. Vendor Flexibility .......................................19
6.15. NAT Traversal ............................................20
7. Desirable Objective Compliance Evaluation ......................20
7.1. Multiple Authentication ...................................20
7.2. Future Wireless Technologies ..............................21
7.3. New IEEE Requirements .....................................21
7.4. Interconnection (IPv6) ....................................22
7.5. Access Control ............................................23
8. Evaluation Summary and Conclusions .............................24
9. Protocol Recommendation ........................................24
9.1. High-Priority Recommendations Relevant to
Mandatory Objectives ......................................25
9.1.1. Information Elements ...............................25
9.1.2. Control Channel Security ...........................25
9.1.3. Data Tunneling Modes ...............................26
9.2. Additional Recommendations Relevant to Desirable
Objectives ................................................27
9.2.1. Access Control .....................................27
9.2.2. Removal of Layer 2 Encapsulation for Data
Tunneling ..........................................28
9.2.3. Data Encapsulation Standard ........................28
10. Normative References ..........................................29
11. Informative References ........................................29
1. Introduction
This document is a record of the process and findings of the Control
and Provisioning of Wireless Access Points Working Group (CAPWAP WG)
evaluation team. The evaluation team reviewed the 4 candidate
protocols as they were submitted to the working group on June 26,
2005.
Loher, et al. Informational [Page 2]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
1.1. Conventions Used in This Document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
1.2. Terminology
This document uses terminology defined in RFC 4118 [ARCH], RFC 4564
[OBJ], and IEEE 802.11i [802.11i].
2. Process Description
The process to be described here has been adopted from a previous
evaluation in IETF [RFC3127]. The CAPWAP objectives in RFC 4564
[OBJ] were used to set the scope and direction for the evaluators and
was the primary source of requirements. However, the evaluation team
also used their expert knowledge and professional experience to
consider how well a candidate protocol met the working group
objectives.
For each of the 4 candidate protocols, the evaluation document editor
assigned 2 team members to write evaluation briefs. One member was
assigned to write a "Pro" brief and could take a generous
interpretation of the proposal; this evaluator could grant benefit of
doubt. A second evaluator was assigned to write a "Con" brief and
was required to use strict criteria when performing the evaluation.
2.1. Ratings
The "Pro" and "Con" members independently evaluated how well the
candidate protocol met each objective. Each objective was scored as
an 'F' for failure, 'P' for partial, or 'C' for completely meeting
the objective.
F - Failure to Comply
The evaluation team believes the proposal does not meet the
objective. This could be due to the proposal completely missing any
functionality towards the objective. A proposal could also receive
an 'F' for improperly implementing the objective.
P - Partial Compliance
The proposal has some functionality that addresses the objective, but
it is incomplete or ambiguous.
Loher, et al. Informational [Page 3]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
C - Compliant
The proposal fully specifies functionality meeting the objective.
The specification must be detailed enough that interoperable
implementations are likely from reading the proposal alone. If the
method is ambiguous or particularly complex, an explanation, use
cases, or even diagrams may need to be supplied in order to receive a
compliant rating.
The 4-person evaluation team held a teleconference for each candidate
to discuss the briefs. One of the working group chairs was also
present at the meeting in an advisory capacity. Each evaluator
presented a brief with supporting details. The team discussed the
issues and delivered a team rating for each objective. These
discussions are documented in the meeting minutes. The team ratings
are used for the compliance evaluation.
The candidate protocols were scored only on the information written
in their draft. This means that a particular protocol might actually
meet the specifics of a requirement, but if the proposal did not
state, describe, or reference how that requirement was met, it might
be scored lower.
3. Member Statements
Darren Loher, Roving Planet
I am employed as the senior architect at Roving Planet, which writes
network and security management software for wireless networks. I
have over 11 years of commercial experience designing and operating
networks. I have implemented and operated networks and network
management systems for a university, large enterprises, and a major
Internet service provider for over 4 years. I also have software
development experience and have written web-based network and systems
management tools including a system for managing a very large
distributed DNS system. I have witnessed the IETF standards process
for several years, my first event being IETF 28. I have rarely
directly participated in any working group activities before this
point. To my knowledge, my company has no direct relationship with
any companies that have authored the CAPWAP protocol submissions.
David Nelson, Enterasys
I am currently cochair of the RADEXT WG, AAA Doctor in O&M Area, and
employed in the core router engineering group of my company. I have
previously served on a protocol evaluation team in the AAA WG, and am
a coauthor of RFC 3127 [RFC3127]. I was an active contributor in the
IEEE 802.11i task group, and previously employed in the WLAN
Loher, et al. Informational [Page 4]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
engineering group of my company. I have had no participation in any
of the submitted protocols. My company does have an OEM relationship
with at least one company whose employees have coauthored one of the
submissions, but I have no direct involvement with our WLAN product
at this time.
Oleg Volinsky, Colubris Networks
I am a member of the Enterprise group of Colubris Networks, a WLAN
vendor. I have over 10 years of experience in design and development
of network products from core routers to home networking equipment.
Over years I have participated in various IETF groups. I have been a
member of CAPWAP WG for over a year. In my current position I have
been monitoring the developments of CAPWAP standards and potential
integration of the resulting protocol into the company's products. I
have not participated in any of the candidate protocol drafts. I
have not worked for any of the companies whose staff authored any of
the candidate protocols.
Behcet Sarikaya, University of Northern British Columbia
I am currently Professor of Computer Science at UNBC. I have so far
5 years of experience in IETF as a member of mobile networking-
related working groups. I have made numerous I-D contributions and
am a coauthor of one RFC. I have submitted an evaluation draft (with
Andy Lee) that evaluated LWAPP, CTP, and WiCoP. Also I submitted
another draft (on CAPWAPHP) that used LWAPP, CTP, WiCoP, and SLAPP as
transport. I also have research interests on next-generation access
point/controller architectures. I have no involvement in any of the
candidate protocol drafts, have not contributed any of the drafts. I
have not worked in any of the companies whose staff has produced any
of the candidate protocols.
4. Protocol Proposals and Highlights
The following proposals were submitted as proposals to the CAPWAP
working group.
4.1. LWAPP
The "Light Weight Access Point Protocol" [LWAPP] was the first CAPWAP
protocol originally submitted to Seamoby Working Group. LWAPP
proposes original solutions for authentication and user data
encapsulation as well as management and configuration information
elements. LWAPP originated as a "split MAC" protocol, but recent
changes have added local MAC support as well. LWAPP has received a
security review from Charles Clancy of the University of Maryland
Information Systems Security Lab.
Loher, et al. Informational [Page 5]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
LWAPP is the most detailed CAPWAP proposal. It provides a thorough
specification of the discovery, security, and system management
methods. LWAPP focuses on the 802.11 WLAN-specific monitoring and
configuration. A key feature of LWAPP is its use of raw 802.11
frames that are tunneled back to the Access Controller (AC) for
processing. In both local- and split-MAC modes, raw 802.11 frames
are forwarded to the AC for management and control. In addition, in
split-MAC mode, user data is tunneled in raw 802.11 form to the AC.
While in concept, LWAPP could be used for other wireless
technologies, LWAPP defines very few primitives that are independent
of the 802.11 layer.
4.2. SLAPP
"Secure Light Access Point Protocol" [SLAPP] distinguishes itself
with the use of well-known, established technologies such as Generic
Routing Encapsulation (GRE) for user data tunneling between the AC
and Wireless Termination Point (WTP) and the proposed standard
Datagram Transport Layer Security [DTLS] for the control channel
transport.
4 modes of operation are supported, 2 local-MAC modes and 2 split-MAC
modes. STA control may be performed by the AC using native 802.11
frames that are encapsulated in SLAPP control packets across all
modes. (STA refers to a wireless station, typically a laptop.)
In SLAPP local-MAC modes, user data frames may be bridged or tunneled
back using GRE to the AC as 802.3 frames. In the split-MAC modes,
user data is always tunneled back to the AC as native 802.11 frames.
Encryption of user data may be performed at either the AC or the WTP
in split-MAC mode.
4.3. CTP
"CAPWAP Tunneling Protocol" [CTP] distinguishes itself with its use
of Simple Network Management Protocol (SNMP) to define configuration
and management data that it then encapsulates in an encrypted control
channel. CTP was originally designed as a local-MAC protocol but the
new version has split-MAC support as well. In addition, CTP is
clearly designed from the beginning to be compatible with multiple
wireless technologies.
CTP defines information elements for management and control between
the AC and WTP. CTP control messages are specified for STA session
state, configuration, and statistics.
Loher, et al. Informational [Page 6]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
In local-MAC mode, CTP does not forward any native wireless frames to
the AC. CTP specifies control messages for STA session activity,
mobility, and radio frequency (RF) resource management between the AC
and WTP. CTP local-MAC mode specifies that the integration function
from the wireless network to 802.3 Ethernet is performed at the WTP
for all user data. User data may either be bridged at the WTP or
encapsulated as 802.3 frames in CTP packets at the WTP and tunneled
to the AC.
CTP's split-MAC mode is defined as an extension to local-MAC mode.
In CTP's version of split-MAC operation, wireless management frames
are forwarded in their raw format to the AC. User data frames may be
bridged locally at the WTP, or they may be encapsulated in CTP
packets and tunneled in their native wireless form to the AC.
CTP supplies STA control abstraction, methods for extending the
forwarding of multiple types of native wireless management frames,
and many options for user data tunneling. Configuration management
is an extension of SNMP. This makes CTP one of the most flexible of
the proposed CAPWAP protocols. However, it does define new security
and data tunneling mechanisms instead of leveraging existing
standards.
4.4. WiCoP
"Wireless LAN Control Protocol" [WICOP] introduces new discovery,
configuration, and management of Wireless LAN (WLAN) systems. The
protocol defines a distinct discovery mechanism that integrates WTP-
AC capabilities negotiation.
WiCoP defines 802.11 Quality of Service (QoS) parameters. In
addition, the protocol proposes to use standard security and
authentication methods such as IPsec and Extensible Authentication
Protocol (EAP). The protocol needs to go into detail with regards to
explicit use of the above-mentioned methods. To ensure interoperable
protocol implementations, it is critical to provide users with
detailed unambiguous specification.
5. Security Considerations
Each of the candidate protocols has a Security Considerations
section, as well as security properties. The CAPWAP objectives
document [OBJ] contains security-related requirements. The
evaluation team has considered if and how the candidate protocols
implement the security features required by the CAPWAP objectives.
However, this evaluation team is not a security team and has not
Loher, et al. Informational [Page 7]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
performed a thorough security evaluation or tests. Any protocol
coming out of the CAPWAP working group must undergo an IETF security
review in order to fully meet the objectives.
6. Mandatory Objective Compliance Evaluation
6.1. Logical Groups
LWAPP:C, SLAPP:C, CTP:C, WiCoP:C
LWAPP
LWAPP provides a control message called "Add WLAN". This message is
used by the AC to create a WLAN with a unique ID, i.e., its Service
Set Identifier (SSID). The WTPs in this WLAN have their own Basic
Service Set Identifiers (BSSIDs). LWAPP meets this objective.
SLAPP
SLAPP explicitly supports 0-255 BSSIDs.
CTP
CTP implements a NETWORK_ID attribute that allows a wireless-
technology-independent way of creating logical groups. CTP meets
this objective.
WiCoP
WiCoP provides control tunnels to manage logical groups. There is
one control tunnel for each logical group. WiCoP meets this
objective.
6.2. Traffic Separation
LWAPP:C, SLAPP:C, CTP:P, WiCoP:P
If a protocol distinguishes a data message from a control message,
then it meets this objective.
LWAPP
LWAPP separates control messages from data messages using "C-bit".
"C-bit" is defined in the LWAPP transport header. When C-bit is
equal to zero, the message is a data message. When C-bit is equal to
one, the message is a control message. So, LWAPP meets this
objective.
Loher, et al. Informational [Page 8]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
SLAPP
The SLAPP protocol encapsulates control using DTLS and optionally,
user data with GRE. Of particular note, SLAPP defines 4
"architecture modes" that define how user data is handled in relation
to the AC. SLAPP is compliant with this objective.
CTP
CTP defines separate packet frame types for control and data.
However, the evaluation team could not find a way to configure the
tunneling of user data, so it opted to rate CTP as only partially
compliant. It appears that CTP would rely on SNMP MIB Object
Identifiers (OIDs) for this function, but none were defined in the
specification. Defining the necessary OIDs would make CTP fully
compliant.
WiCoP
WiCoP provides for separation between control and data channels.
However, tunneling methods are not explicitly described. Because of
this, WiCoP partially meets this objective.
6.3. STA Transparency
LWAPP:C, SLAPP:C, CTP:C, WiCoP:C
If a protocol does not indicate that STA needs to know about the
protocol, then this objective is met.
The protocol must not define any message formats between STA and
WTP/AC.
LWAPP
LWAPP does not require a STA to be aware of LWAPP. No messages or
protocol primitives are defined that the STA must interact with
beyond the 802.11 standard. LWAPP is fully compliant.
SLAPP
SLAPP places no requirements on STA network elements. No messages or
protocol primitives are defined that the STA must interact with
beyond the 802.11 standard.
Loher, et al. Informational [Page 9]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
CTP
CTP does not require a terminal to know CTP. So, CTP meets this
objective.
WiCoP
WiCoP does not require a terminal to know WiCoP. So, WiCoP meets
this objective.
6.4. Configuration Consistency
LWAPP:C, SLAPP:C, CTP:C, WiCoP:C
Given the objective of maintaining configurations for a large number
of network elements involved in 802.11 wireless networks, the
evaluation team would like to recommend that a token, key, or serial
number for configuration be implemented for configuration
verification.
LWAPP
It is possible to obtain and verify all configurable values through
LWAPP. Notably, LWAPP takes an approach that only "non-default"
settings (defaults are specified by LWAPP) are necessary for
transmission when performing configuration consistency checks. This
behavior is explicitly specified in LWAPP. LWAPP is compliant with
this objective.
SLAPP
Numerous events and statistics are available to report configuration
changes and WTP state. SLAPP does not have any built-in abilities to
minimize or optimize configuration consistency verification, but it
is compliant with the objective.
CTP
CTP's use of SNMP makes configuration consistency checking
straightforward. Where specified in a MIB, one could take advantage
of default values.
WICOP
The WiCoP configuration starts with exchange of capability messages
between the WTP and AC. Next, configuration control data is sent to
the WTP.
Loher, et al. Informational [Page 10]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
WiCoP defines configuration values in groups of configuration data
messages. In addition, the protocol supports configuration using MIB
objects. To maintain data consistency, each configuration message
from the AC is acknowledged by the WTP.
6.5. Firmware Trigger
LWAPP:P, SLAPP:P, CTP:P, WiCoP:C
The evaluation team considered the objective and determined that for
full compliance, the protocol state machine must support the ability
to initiate the process for checking and performing a firmware update
independently of other functions.
Many protocols perform a firmware check and update procedure only on
system startup time. This method received a partial compliance. The
team believed that performing the firmware check only at startup time
was unnecessarily limiting and that allowing it to occur at any time
in the state machine did not increase complexity of the protocol.
Allowing the firmware update process to be initiated during the
running state allows more possibilities for minimizing downtime of
the WTP during the firmware update process.
For example, the firmware check and download of the image over the
network could potentially occur while the WTP was in a running state.
After the file transfer was complete, the WTP could be rebooted just
once and begin running the new firmware image. This could pose a
meaningful reduction in downtime when the firmware image is large,
the link for loading the file is very slow, or the WTP reboot time is
long.
A protocol would only fail compliance if no method was specified for
updating of firmware.
LWAPP
Firmware download is initiated by the WTP only at the Join phase
(when a WTP is first associating with an AC) and not at any other
time. The firmware check and update could be "triggered" indirectly
by the AC by sending a reset message to the WTP. The resulting
reboot would cause a firmware check and update to be performed.
LWAPP is partially compliant because its firmware trigger can only be
used in the startup phases of the state machine.
Loher, et al. Informational [Page 11]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
SLAPP
SLAP includes a firmware check and update procedure that is performed
when a WTP is first connecting to an AC. The firmware check and
update can only be "triggered" indirectly by the AC by sending a
reset message to the WTP. SLAPP is partially compliant because its
firmware trigger can only be used in the startup phases of the state
machine.
CTP
The CTP state machine specifies that the firmware upgrade procedure
must be performed immediately after the authentication exchange as
defined in section 6.2 of [CTP]. However, section 5.2.5 of [CTP]
states that the SW-Update-Req message MAY be sent by the AC. This
indirectly implies that CTP could support an AC-triggered software
update during the regular running state of the WTP. So it seems that
CTP might be fully compliant, but the proposal should be clarified
for full compliance.
WiCoP
In WiCoP, firmware update may be triggered any time in the active
state, so WiCoP is fully compliant.
6.6. Monitor and Exchange of System-wide Resource State
LWAPP:C, SLAPP:C, CTP:P, WiCoP:C
The evaluation team focused on the protocols supplying 3 methods
relevant to statistics from WTPs: The ability to transport
statistics, a minimum set of standard data, and the ability to extend
what data could be reported or collected.
LWAPP
Statistics are sent by the WTP using an "Event Request" message.
LWAPP defines an 802.11 statistics message that covers 802.11 MAC
layer properties. LWAPP is compliant.
SLAPP
WLAN statistics transport is supplied via the control channel and
encoded in SLAPP-defined TLVs called information elements. 802.11
configuration and statistics information elements are supplied in
[SLAPP] 6.1.3.1. These are extendable and include vendor-specific
extensions.
Loher, et al. Informational [Page 12]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
CTP
CTP defines a control message called "CTP Stats-Notify". This
control message contains statistics in the form of SNMP OIDs and is
sent from the WTP to AC. This approach is novel because it leverages
the use of standard SNMP.
Section 5.3.10 of [CTP] recommends the use of 802.11 MIBs where
applicable. However, the proposal acknowledges that additional
configuration and statistics information is required, but does not
specify these MIB extensions. CTP needs to add these extensions to
the proposal. Also, this minimum set of statistics and configuration
OIDs must become requirements in order to fully meet the objective.
WiCoP
The feedback control message sent by the WTP contains many
statistics. WiCoP specifies 15 statistics that the WTP needs to send
to the AC. New versions of WiCoP can address any new statistics that
the AC needs to monitor the WTP. WiCoP meets this objective.
6.7. Resource Control
LWAPP:C, SLAPP:P, CTP:P, WiCoP:P
The evaluation team interpreted the resource control objective to
mean that the CAPWAP protocol must map 802.11e QoS markings to the
wired network. This mapping must include any encapsulation or
tunneling of user data defined by the CAPWAP protocol. Of particular
note, the evaluation team agreed that the CAPWAP protocol should
supply an explicit capability to configure this mapping. Since most
of the protocols relied only on the 802.11e statically defined
mapping, most received a partial compliance.
LWAPP
LWAPP defines its own custom TLV structure, which consists of an
8-bit type or class of information value and an additional 8-bit
value that indexes to a specific variable.
LWAPP allows the mobile station-based QoS configuration in each Add
Mobile Request sent by AC to WTP for each new mobile station that is
attached. Packet prioritization is left to individual WTPs. 4
different QoS policies for each station to enforce can be configured.
Update Mobile QoS message element can be used to change QoS policy at
the WTP for a given mobile station. LWAPP should support 8 QoS
policies as this matches 802.11e 802.1p and IP TOS, but for this
objective, 4 classes is compliant.
Loher, et al. Informational [Page 13]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
Overall, LWAPP conforms to the resource control objective. It
enables QoS configuration and mapping. The control can be applied on
a logical group basis and also enables the wireless traffic to be
flexibly mapped to the wired segment.
SLAPP
Although 802.11e specifies 802.1p and Differentiated Service Code
Point (DSCP) mappings, there is no explicit support for 802.11e in
SLAPP. SLAPP must be updated to add 802.11e as one of the standard
capabilities that a WTP could support and specify a mechanism that
would allow configuration of mapping the QoS classes.
CTP
CTP requires that the WTP and AC copy the QoS marking of user data to
the data message encapsulation. This mapping is accomplished by the
CTP Header's 1-byte policy field. However, no configuration of QoS
mapping other than copying the user data's already existing markings
is defined in CTP. It seems clear that SNMP could be used to
configure the mapping to occur differently, but no OIDs are defined
that would enable this. Partial compliance is assigned to CTP for
this objective.
WiCoP
Note: WiCoP rating for resource control objectives has been upgraded
from Failed to Partial. After an additional review of the WiCoP
protocol proposal, it was determined that the protocol partially
meets resource control objectives.
WiCoP protocol starts its QoS configuration with 802.11e capability
exchange between the WTP and AC. The QoS capabilities primitives are
included in the capability messages.
WiCoP defines the QoS-Value message that contains 802.11e
configuration parameters. This is sent for each group supported by
the WTP. WiCoP does not provide an explicit method for configuration
of DSCP tags and 802.1P precedence values. It is possible to
configure these parameters through SNMP OID configuration method, but
WiCoP does not explicitly identify any specific MIBs. Overall, WiCoP
partially meets resource control CAPWAP objectives. In order to be
fully compliant with the given objective, the protocol needs to
identify a clear method to configure 802.1p and DSCP mappings.
Loher, et al. Informational [Page 14]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
6.8. Protocol Security
LWAPP:C, SLAPP:C, CTP:F, WiCoP:F
For the purposes of the protocol security objective, the evaluation
team primarily considered whether or not the candidate protocols
implement the security features required by the CAPWAP objectives.
Please refer to the Security Considerations section of this document.
LWAPP
It appears that the security mechanisms, including the key management
portions in LWAPP, are correct. One third-party security review has
been performed. However, further security review is warranted since
a CAPWAP-specific key exchange mechanism is defined. LWAPP is
compliant with the objective.
SLAPP
The SLAPP protocol implements authentication of the WTP by the AC
using the DTLS protocol. This behavior is defined in both the
discovery process and the 802.11 control process. SLAPP allows
mutual and asymmetric authentication. SLAPP also gives informative
examples of how to properly use the authentication. SLAPP should add
another informative example for authentication of the AC by the WTP.
SLAPP is compliant with the objective.
CTP
The original presentation at IETF63 of the preliminary findings of
the evaluation team reported that CTP failed this objective. This
was on the basis of asymmetric authentication not being supported by
CTP. This was due to a misunderstanding of what was meant by
asymmetric authentication by the evaluation team. The definitions of
the terminology used in [OBJ] were clarified on the CAPWAP mailing
list. CTP in fact does implement a form of asymmetric authentication
through the use of public keys.
However, CTP still fails to comply with the objective for two
reasons:
First, CTP does not mutually derive session keys. Second, CTP does
not perform explicit mutual authentication because the 2 parties
authenticating do not confirm the keys.
Loher, et al. Informational [Page 15]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
WiCoP
There is not enough specific information to implement WiCoP protocol
security features. Although in concept EAP and IPsec make sense,
there is no explicit description on how these methods would be used.
6.9. System-Wide Security
LWAPP:C, SLAPP:C, CTP:F, WiCoP:F
LWAPP
LWAPP wraps all control and management communication in its
authenticated and encrypted control channel. LWAPP does not seem
particularly vulnerable to Denial of Service (DoS). LWAPP should
make a recommendation that the Join method be throttled to reduce the
impact of DoS attacks against it. Use of an established security
mechanism such as IPsec would be preferred. However, LWAPP's
independent security review lent enough confidence to declare LWAPP
compliant with the objective.
SLAPP
SLAPP is compliant due to wrapping all control and management
communication in DTLS. SLAPP also recommends measures to protect
against discovery request DoS attacks. DTLS has undergone security
review and has at least one known implementation outside of SLAPP.
At the time of this writing, DTLS is pending proposed standard status
in the IETF.
CTP
CTP introduces a new, unestablished mechanism for AC-to-WTP
authentication. For complete compliance, use of an established
security mechanism with detailed specifications for its use in CTP is
preferred. Alternatively, a detailed security review could be
performed. CTP does not point out or recommend or specify any DoS
attack mitigation requirements against Reg-Req and Auth-Req floods,
such as a rate limiter. Because CTP received an 'F' on its protocol
security objective, it follows that system-wide security must also be
rated 'F'.
WiCoP
WiCop does not address DoS attack threats. Also, as with the
protocol security objective, the protocol needs to explicitly
describe its tunnel and authentication methods.
Loher, et al. Informational [Page 16]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
6.10. 802.11i Considerations
LWAPP:C, SLAPP:C, CTP:F, WiCoP:P
LWAPP
LWAPP explicitly defines mechanisms for handling 802.11i in its modes
with encryption terminated at the WTP. In order to accomplish this,
the AC sends the Pairwise Transient Key (PTK) using the encrypted
control channel to the WTP using the Add Mobile message. When
encryption is terminated at the AC, there are no special
requirements. LWAPP is compliant.
SLAPP
SLAPP defines a control message to send the PTK and Group Temporal
Key (GTK) to the WTP when the WTP is the encryption endpoint. This
control message is carried on the DTLS protected control channel.
SLAPP is compliant.
CTP
CTP lacks a specification for a control message to send 802.11i PTK
and GTK keys to a WTP when the WTP is an encryption endpoint. Based
on this, CTP fails compliance for this objective. This requirement
could be addressed either by defining new control channel information
elements or by simply defining SNMP OIDs. The transport of these
OIDs would be contained in the secure control channel and therefore
protected.
WiCoP
WiCoP lacks documentation on how to handle 4-way handshake. The case
for encryption at the AC needs clarification.
6.11. Interoperability
LWAPP:C, SLAPP:C, CTP:C, WiCoP:C
LWAPP
LWAPP supports both split- and local-MAC architectures and is
therefore compliant to the letter of the objectives. LWAPP is
particularly rich in its support of the split-MAC architecture.
However, LWAPP's support of local-MAC is somewhat limited and could
be expanded. LWAPP is lacking a mode that allows local-MAC data
Loher, et al. Informational [Page 17]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
frames to be tunneled back to the AC. A discussion of possible
extensions and issues is discussed in the recommendations section of
this evaluation.
SLAPP
SLAPP is compliant.
CTP
CTP is compliant.
WiCoP
WiCoP is compliant.
6.12. Protocol Specifications
LWAPP:C, SLAPP:P, CTP:P, WiCoP:P
LWAPP
LWAPP is nearly fully documented. Only a few sections are noted as
incomplete. Detailed descriptions are often given to explain the
purpose of the protocol primitives defined that should encourage
interoperable implementations.
SLAPP
SLAPP is largely implementable from its specification. It contains
enough information to perform an interoperable implementation for its
basic elements; however, additional informative references or
examples should be provided covering use of information elements,
configuring multiple logical groups, and so on.
CTP
As noted earlier, there are a few areas where CTP lacks a complete
specification, primarily due to the lack of specific MIB definitions.
WiCoP
Due to the lack of specific tunnel specifications and authentication
specifications, WiCoP is only partially compliant.
Loher, et al. Informational [Page 18]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
6.13. Vendor Independence
LWAPP:C, SLAPP:C, CTP:C, WiCoP:C
LWAPP
LWAPP is compliant.
SLAPP
SLAPP is compliant.
CTP
CTP is compliant.
WiCoP
WiCoP is compliant.
6.14. Vendor Flexibility
LWAPP:C, SLAPP:C, CTP:C, WiCoP:C
LWAPP
LWAPP is compliant.
SLAPP
SLAPP is compliant.
CTP
CTP is compliant.
WiCoP
WiCoP is compliant.
Loher, et al. Informational [Page 19]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
6.15. NAT Traversal
LWAPP:C, SLAPP:C, CTP:C, WiCoP:C
LWAPP
LWAPP may require special considerations due to it carrying the IP
address of the AC and data termination points in the payload of
encrypted control messages. To overcome Network Address Translation
(NAT), static NAT mappings may need to be created at the NAT'ing
device if the AC or data termination points addresses are translated
from the point of view of the WTP. A WTP should be able to function
in the hidden address space of a NAT'd network.
SLAPP
SLAPP places no out-of-the-ordinary constraints regarding NAT. A WTP
could function in the hidden address space of a NAT'd network without
any special configuration.
CTP
CTP places no out-of-the-ordinary constraints regarding NAT. A WTP
could function in the hidden address space of a NAT'd network without
any special configuration.
WiCoP
WiCoP places no out-of-the-ordinary constraints regarding NAT. A WTP
could function in the hidden address space of a NAT'd network without
any special configuration.
7. Desirable Objective Compliance Evaluation
7.1. Multiple Authentication
LWAPP:C, SLAPP:C, CTP:C, WiCoP:C
LWAPP
LWAPP allows for multiple STA authentication mechanisms.
SLAPP
SLAPP does not constrain other authentication techniques from being
deployed.
Loher, et al. Informational [Page 20]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
CTP
CTP supports multiple STA authentication mechanisms.
WiCoP
WiCoP allows for multiple STA authentication mechanisms.
7.2. Future Wireless Technologies
LWAPP:C, SLAPP:C, CTP:C, WiCoP:C
LWAPP
LWAPP could be used for other wireless technologies. However, LWAPP
defines very few primitives that are independent of the 802.11 layer.
SLAPP
SLAPP could be used for other wireless technologies. However, SLAPP
defines very few primitives that are independent of the 802.11 layer.
CTP
CTP supplies STA control abstraction, methods for extending the
forwarding of multiple types of native wireless management frames,
and many options for user data tunneling. Configuration management
is an extension of SNMP, to which new MIBs could, in concept, be
easily plugged in. This helps makes CTP a particularly flexible
proposal for supporting future wireless technologies. In addition,
CTP has already defined multiple wireless protocol types in addition
to 802.11.
WiCoP
WiCoP could be used for other wireless technologies.
7.3. New IEEE Requirements
LWAPP:C, SLAPP:C, CTP:C, WiCoP:C
LWAPP
LWAPP's extensive use of native 802.11 frame forwarding allows it to
be transparent to many 802.11 changes. It, however, shifts the
burden of adapting MAC layer changes to the packet processing
capabilities of the AC.
Loher, et al. Informational [Page 21]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
SLAPP
SLAPP's use of native 802.11 frames for control and management allows
SLAPP a measure of transparency to changes in 802.11. Because SLAPP
also supports a mode that tunnels user data as 802.3 frames, it has
additional architectural options for adapting to changes on the
wireless infrastructure.
CTP
CTP has perhaps the greatest ability to adapt to changes in IEEE
requirements. Architecturally speaking, CTP has several options
available for adapting to change. SNMP OIDs are easily extended for
additional control and management functions. Native wireless frames
can be forwarded directly to the AC if necessary. Wireless frames
can be bridged to 802.3 frames and tunneled back to the AC to protect
the AC from changes at the wireless MAC layer. These options allow
many possible ways to adapt to change of the wireless MAC layer.
WiCoP
Because WiCoP uses 802.11 frames for the data transport, it is
transparent to most IEEE changes. Any new IEEE requirements may need
new configuration and new capability messages between the WTP and AC.
The AC would need to be modified to handle new 802.11 control and
management frames.
7.4. Interconnection (IPv6)
LWAPP:C, SLAPP:C, CTP:C, WiCoP:C
LWAPP
LWAPP explicitly defines measures for accommodating IPv6. LWAPP is
more sensitive to this in part because it carries IP addresses in two
control messages.
SLAPP
SLAPP is transparent to the interconnection layer. DTLS and GRE will
both operate over IPv6.
CTP
CTP is transparent to the interconnection layer. CTP should be able
to operate over IPv6 without any changes.
Loher, et al. Informational [Page 22]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
WiCoP
WiCoP is transparent to the interconnection layer and should be able
to operate over IPv6 without changes.
7.5. Access Control
LWAPP:C, SLAPP:C, CTP:C, WiCoP:C
LWAPP
LWAPP uses native 802.11 management frames forwarded to the AC for
the purpose of performing STA access control. WTPs are authenticated
in LWAPP's control protocol Join phase.
SLAPP
SLAPP has support for multiple authentication methods for WTPs. In
addition, SLAPP can control STA access via 802.11 management frames
forwarded to the AC or via SLAPP's information element primitives.
CTP
CTP specifies STA access control primitives.
WiCoP
WiCoP specifies access control in [WICOP] section 5.2.2.
Loher, et al. Informational [Page 23]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
8. Evaluation Summary and Conclusions
See Figure 1 (section numbers correspond to RFC 4564 [OBJ]).
---------------------------------------------------------------
| CAPWAP Evaluation | LWAPP | SLAPP | CTP | WiCoP |
|---------------------------------------------------------------|
| 5.1.1 Logical Groups | C | C | C | C |
| 5.1.2 Traffic Separation | C | C | P | P |
| 5.1.3 STA Transparency | C | C | C | C |
| 5.1.4 Config Consistency | C | C | C | C |
| 5.1.5 Firmware Trigger | P | P | P | C |
| 5.1.6 Monitor System | C | C | P | C |
| 5.1.7 Resource Control | C | P | P | P |
| 5.1.8 Protocol Security | C | C | F | F |
| 5.1.9 System Security | C | C | F | F |
| 5.1.10 802.11i Consideration | C | C | F | P |
|---------------------------------------------------------------|
| 5.1.11 Interoperability | C | C | C | C |
| 5.1.12 Protocol Specifications | C | P | P | P |
| 5.1.13 Vendor Independence | C | C | C | C |
| 5.1.14 Vendor Flexibility | C | C | C | C |
| 5.1.15 NAT Traversal | C | C | C | C |
|---------------------------------------------------------------|
| Desirable |
|---------------------------------------------------------------|
| 5.2.1 Multiple Authentication | C | C | C | C |
| 5.2.2 Future Wireless | C | C | C | C |
| 5.2.3 New IEEE Requirements | C | C | C | C |
| 5.2.4 Interconnection (IPv6) | C | C | C | C |
| 5.2.5 Access Control | C | C | C | C |
---------------------------------------------------------------
Figure 1: Summary Results
9. Protocol Recommendation
The proposals presented offer a variety of novel features that
together would deliver a full-featured, flexible, and extensible
CAPWAP protocol. The most novel of these features leverage existing
standards where feasible. It is this evaluation team's opinion that
a mix of the capabilities of the proposals will produce the best
CAPWAP protocol.
Loher, et al. Informational [Page 24]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
The recommended features are described below. Many of these novel
capabilities come from CTP and SLAPP and WiCoP. However, LWAPP has
the most complete base protocol and is flexible enough to be extended
or modified by the working group. We therefore recommend that LWAPP
be used as the basis for the CAPWAP protocol.
The evaluation team recommends that the working group carefully
consider the following issues and recommended changes. The
evaluation team believes that a more complete CAPWAP protocol will be
delivered by addressing these issues and changes.
9.1. High-Priority Recommendations Relevant to Mandatory Objectives
9.1.1. Information Elements
LWAPP's attribute value pair system meets the objectives as defined
by the working group. However, it has only 8 bits assigned for
attribute types, with an additional 8 bits for a specific element
within an attribute type. The evaluation team strongly recommends
that a larger number of bits be assigned for attribute types and
information elements.
9.1.2. Control Channel Security
LWAPP's security mechanisms appear satisfactory and could serve
CAPWAP going forward. However, the evaluation team recommends
adoption of a standard security protocol for the control channel.
There are several motivations for a standards-based security
protocol, but the primary disadvantage of a new security protocol is
that it will take longer and be more difficult to standardize than
reusing an existing IETF standard. First, a new security protocol
will face a longer, slower approval processes from the Security Area
Directorate and the IESG. The new CAPWAP security protocol will need
to pass several tests including the following:
What is uniquely required by CAPWAP that is not available from an
existing standard protocol? How will CAPWAP's security protocol meet
security area requirements for extensibility, such as the ability to
support future cipher suites and new key exchange methods? How does
this ability compare to established security protocols that have
these capabilities?
Points such as these are continually receiving more attention in the
industry and in the IETF. Extensibility of key exchange methods and
cipher suites are becoming industry standard best practices. These
issues are important topics in the IETF Security Area Advisory Group
(SAAG) and the SecMech BOF, held during the 63rd IETF meeting.
Loher, et al. Informational [Page 25]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
These issues could be nullified by adopting an appropriate existing
standard security protocol. IPsec or DTLS could be a standards
alternative to LWAPP's specification. DTLS presents a UDP variant of
Transport Layer Security (TLS). Although DTLS is relatively new, TLS
is a heavily used, tried-and-tested security protocol.
The evaluation team recommends that whatever security protocol is
specified for CAPWAP, its use cases must be described in detail.
LWAPP does a good job of this with its proposed, proprietary method.
If an updated specification is developed, it should contain at least
one mandatory authentication and cipher method. For example, pre-
shared key and x.509 certificates could be specified as mandatory
authentication methods, and Advanced Encryption Standard (AES)
Counter Mode with CBC-MAC Protocol (CCMP) could be selected as a
mandatory cipher.
Given the possibilities for code reuse, industry reliance on TLS, and
the future for TLS, DTLS may be a wise alternative to a security
method specific to CAPWAP. In addition, use of DTLS would likely
expedite the approval of CAPWAP as a proposed standard over the use
of CAPWAP-specific security mechanisms.
9.1.3. Data Tunneling Modes
9.1.3.1. Support for Local MAC User Data Tunneling
The issue of data encapsulation is closely related to the split- and
local-MAC architectures. The split-MAC architecture requires some
form of data tunneling. All the proposals except LWAPP offer a
method of tunneling in local-MAC mode as well. By local-MAC data
tunneling, we mean the tunneling of user data as 802.3 Ethernet
frames back to the AC from a WTP that is otherwise in local-MAC mode.
Tunneling data in local-MAC mode offers the ability for implementers
to innovate in several ways even while using a local-MAC
architecture. For example, functions such as mobility, flexible user
data encryption options, and fast handoffs can be enabled through
tunneling of user data back to an AC, or as LWAPP defines, a data
termination endpoint, which could be different from the AC. In
addition, there are special QoS or application-aware treatments of
user data packets such as voice or video. Improved transparency and
compatibility with future wireless technologies are also possible
when encapsulating user data in a common format, such as 802.3,
between the access point and the AC or other termination point in the
network.
Loher, et al. Informational [Page 26]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
Another possibility is when a native wireless MAC changes in the
future, if a new WTP that supports this MAC change can also support a
wireless MAC -> 802.3 integration function, then the wireless MAC
layer change may remain transparent to an AC and still maintain many
of the benefits that data tunneling can bring.
LWAPP does support a header for tunneled user data that contains
layer 1 wireless information (Received Signal Strength Indication
(RSSI) and Signal-to-Noise Ratio (SNR)) that is independent of the
wireless layer 2 MAC. Innovations related to the use of RSSI and SNR
at the AC may be retained even when tunneling 802.3 user data across
different wireless MACs.
It is likely that many other features could be created by innovative
implementers using this method. However, LWAPP narrowly defines the
local-MAC architecture to exclude an option of tunneling data frames
back to the AC. Given the broad support for tunneling 802.3 data
frames between the WTP and AC across all the proposals and existing
proprietary industry implementations, the evaluation team strongly
recommends that the working group consider a data tunneling mode for
local-MAC be added to the LWAPP proposal and become part of the
standard CAPWAP protocol.
9.1.3.2. Mandatory and Optional Tunneling Modes
If more than one tunneling mode is part of the CAPWAP protocol, the
evaluation team recommends that the working group choose one method
as mandatory and other methods as optional. In addition, the CAPWAP
protocol must implement the ability to negotiate which tunneling
methods are supported through a capabilities exchange. This allows
ACs and WTPs freedom to implement a variety of modes but always have
the option of falling back to a common mode.
The choice of which mode(s) should be mandatory is an important
decision and may impact many decisions implementers have to make with
their hardware and software choices for both WTPs and ACs. The
evaluation team believes that the working group should address this
issue of local-MAC data tunneling and carefully choose which mode(s)
should be mandatory.
9.2. Additional Recommendations Relevant to Desirable Objectives
9.2.1. Access Control
Abstraction of STA access control, such as that implemented in CTP
and WiCoP, stands out as a valuable feature as it is fundamental to
the operational capabilities of many types of wireless networks, not
just 802.11. LWAPP implements station access control as an 802.11-
Loher, et al. Informational [Page 27]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
specific function via forwarding of 802.11 control frames to the
access controller. LWAPP has abstracted the STA Delete function out
of the 802.11 binding. However, the Add STA function is part of the
802.11 binding. It would be useful to implement the wireless MAC
independent functions for adding a STA outside of the 802.11 binding.
9.2.2. Removal of Layer 2 Encapsulation for Data Tunneling
LWAPP currently specifies layer 2 and layer 3 methods for data
tunneling. The evaluation team believes that the layer 2 method is
redundant to the layer 3 method. The team recommends that the layer
2 method encapsulation be removed from the LWAPP protocol.
9.2.3. Data Encapsulation Standard
LWAPP's layer 3 data encapsulation meets the working group
objectives. However, the evaluation team recommends the use of a
standards-based protocol for encapsulation of user data between the
WTP and AC. GRE or Layer 2 Tunneling Protocol (L2TP) could make good
candidates as standards-based encapsulation protocols for data
tunneling.
Using a standard gives the opportunity for code reuse, whether it is
off-the-shelf microcode for processors, code modules that can be
purchased for real-time operating systems, or open-source
implementations for Unix-based systems. In addition, L2TP and GRE
are designed to encapsulate multiple data types, increasing
flexibility for supporting future wireless technologies.
Loher, et al. Informational [Page 28]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
10. Normative References
[802.11i] IEEE Standard 802.11i, "Medium Access Control (MAC)
Security Enhancements", July 2004.
[ARCH] Yang, L., Zerfos, P., and E. Sadot, "Architecture Taxonomy
for Control and Provisioning of Wireless Access Points
(CAPWAP)", RFC 4118, June 2005.
[OBJ] Govindan, S., Ed., Cheng, H., Yao, ZH., Zhou, WH., and L.
Yang, "Objectives for Control and Provisioning of Wireless
Access Points (CAPWAP)", RFC 4564, July 2006.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", RFC 2119, March 1997.
11. Informative References
[CTP] Singh , I., Francisco, P., Pakulski , K., and F. Backes,
"CAPWAP Tunneling Protocol (CTP)", Work in Progress, April
2005.
[DTLS] Rescorla, E. and N. Modadugu, "Datagram Transport Layer
Security", RFC 4347, April 2006.
[LWAPP] Calhoun, P., O'Hara, B., Kelly, S., Suri, R., Williams,
M., Hares, S., and N. Cam Winget, "Light Weight Access
Point Protocol (LWAPP)", Work in Progress, March 2005.
[RFC3127] Mitton, D., St.Johns, M., Barkley, S., Nelson, D., Patil,
B., Stevens, M., and B. Wolff, "Authentication,
Authorization, and Accounting: Protocol Evaluation", RFC
3127, June 2001.
[SLAPP] Narasimhan, P., Harkins, D., and S. Ponnuswamy, "SLAPP :
Secure Light Access Point Protocol", Work in Progress, May
2005.
[WICOP] Iino, S., Govindan, S., Sugiura, M., and H. Cheng,
"Wireless LAN Control Protocol (WiCoP)", Work in Progress,
March 2005.
Loher, et al. Informational [Page 29]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
Authors' Addresses
Darren P. Loher
Envysion, Inc.
2010 S. 8th Street
Boulder, CO 80302
USA
Phone: +1.303.667.8761
EMail: dplore@gmail.com
David B. Nelson
Enterasys Networks, Inc.
50 Minuteman Road
Anover, MA 01810-1008
USA
Phone: +1.978.684.1330
EMail: dnelson@enterasys.com
Oleg Volinsky
Colubris Networks, Inc.
200 West Street
Waltham, MA 02451
USA
Phone: +1.781.547.0329
EMail: ovolinsky@colubris.com
Behcet Sarikaya
Huawei USA
1700 Alma Dr. Suite 100
Plano, TX 75075
USA
Phone: +1.972.509.5599
EMail: sarikaya@ieee.org
Loher, et al. Informational [Page 30]
^L
RFC 4565 Evaluation of Candidate CAPWAP Protocols July 2006
Full Copyright Statement
Copyright (C) The Internet Society (2006).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Acknowledgement
Funding for the RFC Editor function is provided by the IETF
Administrative Support Activity (IASA).
Loher, et al. Informational [Page 31]
^L
|