draft-ietf-capwap-protocol-binding-ieee80211-06.txt   draft-ietf-capwap-protocol-binding-ieee80211-07.txt 
Network Working Group P. Calhoun, Editor Network Working Group P. Calhoun, Editor
Internet-Draft Cisco Systems, Inc. Internet-Draft Cisco Systems, Inc.
Expires: August 24, 2008 M. Montemurro, Editor Intended status: Standards Track M. Montemurro, Editor
Research In Motion Expires: January 11, 2009 Research In Motion
D. Stanley, Editor D. Stanley, Editor
Aruba Networks Aruba Networks
February 21, 2008 July 10, 2008
CAPWAP Protocol Binding for IEEE 802.11 CAPWAP Protocol Binding for IEEE 802.11
draft-ietf-capwap-protocol-binding-ieee80211-06 draft-ietf-capwap-protocol-binding-ieee80211-07
Status of this Memo Status of this Memo
By submitting this Internet-Draft, each author represents that any By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79. aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
skipping to change at page 1, line 37 skipping to change at page 1, line 37
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on August 24, 2008. This Internet-Draft will expire on January 11, 2009.
Copyright Notice
Copyright (C) The IETF Trust (2008).
Abstract Abstract
Wireless LAN product architectures have evolved from single Wireless LAN product architectures have evolved from single
autonomous access points to systems consisting of a centralized autonomous access points to systems consisting of a centralized
Access Controller (AC) and Wireless Termination Points (WTPs). The Access Controller (AC) and Wireless Termination Points (WTPs). The
general goal of centralized control architectures is to move access general goal of centralized control architectures is to move access
control, including user authentication and authorization, mobility control, including user authentication and authorization, mobility
management and radio management from the single access point to a management and radio management from the single access point to a
centralized controller. centralized controller.
This specification defines the Control And Provisioning of Wireless This specification defines the Control And Provisioning of Wireless
Access Points (CAPWAP) Protocol Binding Specification for use with Access Points (CAPWAP) Protocol Binding Specification for use with
the IEEE 802.11 Wireless Local Area Network protocol. The CAPWAP the IEEE 802.11 Wireless Local Area Network protocol.
Protocol Specification is defined separately [3].
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.1. Goals . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.1. Goals . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2. Conventions used in this document . . . . . . . . . . . . 4 1.2. Conventions used in this document . . . . . . . . . . . . 5
1.3. Terminology . . . . . . . . . . . . . . . . . . . . . . . 4 1.3. Terminology . . . . . . . . . . . . . . . . . . . . . . . 5
2. IEEE 802.11 Binding . . . . . . . . . . . . . . . . . . . . . 6 2. IEEE 802.11 Binding . . . . . . . . . . . . . . . . . . . . . 7
2.1. Split MAC and Local MAC Functionality . . . . . . . . . . 6 2.1. Split MAC and Local MAC Functionality . . . . . . . . . . 7
2.1.1. Split MAC . . . . . . . . . . . . . . . . . . . . . . 6 2.1.1. Split MAC . . . . . . . . . . . . . . . . . . . . . . 7
2.1.2. Local MAC . . . . . . . . . . . . . . . . . . . . . . 10 2.1.2. Local MAC . . . . . . . . . . . . . . . . . . . . . . 11
2.2. Roaming Behavior . . . . . . . . . . . . . . . . . . . . . 12 2.2. Roaming Behavior . . . . . . . . . . . . . . . . . . . . 13
2.3. Group Key Refresh . . . . . . . . . . . . . . . . . . . . 13 2.3. Group Key Refresh . . . . . . . . . . . . . . . . . . . . 14
2.4. BSSID to WLAN ID Mapping . . . . . . . . . . . . . . . . . 14 2.4. BSSID to WLAN ID Mapping . . . . . . . . . . . . . . . . 15
2.5. Quality of Service for IEEE 802.11 MAC Management 2.5. Quality of Service for IEEE 802.11 MAC Management
Messages . . . . . . . . . . . . . . . . . . . . . . . . . 14 Messages . . . . . . . . . . . . . . . . . . . . . . . . 15
2.6. Run State Operation . . . . . . . . . . . . . . . . . . . 15 2.6. Run State Operation . . . . . . . . . . . . . . . . . . . 16
3. IEEE 802.11 Specific CAPWAP Control Messages . . . . . . . . . 16 3. IEEE 802.11 Specific CAPWAP Control Messages . . . . . . . . . 17
3.1. IEEE 802.11 WLAN Configuration Request . . . . . . . . . . 16 3.1. IEEE 802.11 WLAN Configuration Request . . . . . . . . . 17
3.2. IEEE 802.11 WLAN Configuration Response . . . . . . . . . 17 3.2. IEEE 802.11 WLAN Configuration Response . . . . . . . . . 18
4. CAPWAP Data Message Bindings . . . . . . . . . . . . . . . . . 18 4. CAPWAP Data Message Bindings . . . . . . . . . . . . . . . . . 19
5. CAPWAP Control Message bindings . . . . . . . . . . . . . . . 20 5. CAPWAP Control Message bindings . . . . . . . . . . . . . . . 21
5.1. Discovery Request Message . . . . . . . . . . . . . . . . 20 5.1. Discovery Request Message . . . . . . . . . . . . . . . . 21
5.2. Discovery Response Message . . . . . . . . . . . . . . . . 20 5.2. Discovery Response Message . . . . . . . . . . . . . . . 21
5.3. Primary Discovery Request Message . . . . . . . . . . . . 20 5.3. Primary Discovery Request Message . . . . . . . . . . . . 21
5.4. Primary Discovery Response Message . . . . . . . . . . . . 20 5.4. Primary Discovery Response Message . . . . . . . . . . . 21
5.5. Join Request Message . . . . . . . . . . . . . . . . . . . 20 5.5. Join Request Message . . . . . . . . . . . . . . . . . . 21
5.6. Join Response Message . . . . . . . . . . . . . . . . . . 21 5.6. Join Response Message . . . . . . . . . . . . . . . . . . 22
5.7. Configuration Status Message . . . . . . . . . . . . . . . 21 5.7. Configuration Status Message . . . . . . . . . . . . . . 22
5.8. Configuration Status Response Message . . . . . . . . . . 21 5.8. Configuration Status Response Message . . . . . . . . . . 22
5.9. Configuration Update Request Message . . . . . . . . . . . 22 5.9. Configuration Update Request Message . . . . . . . . . . 23
5.10. Station Configuration Request . . . . . . . . . . . . . . 23 5.10. Station Configuration Request . . . . . . . . . . . . . . 24
5.11. Change State Event Request . . . . . . . . . . . . . . . . 23 5.11. Change State Event Request . . . . . . . . . . . . . . . 24
5.12. WTP Event Request . . . . . . . . . . . . . . . . . . . . 23 5.12. WTP Event Request . . . . . . . . . . . . . . . . . . . . 24
6. IEEE 802.11 Message Element Definitions . . . . . . . . . . . 24 6. IEEE 802.11 Message Element Definitions . . . . . . . . . . . 25
6.1. IEEE 802.11 Add WLAN . . . . . . . . . . . . . . . . . . . 24 6.1. IEEE 802.11 Add WLAN . . . . . . . . . . . . . . . . . . 25
6.2. IEEE 802.11 Antenna . . . . . . . . . . . . . . . . . . . 28 6.2. IEEE 802.11 Antenna . . . . . . . . . . . . . . . . . . . 30
6.3. IEEE 802.11 Assigned WTP BSSID . . . . . . . . . . . . . . 29 6.3. IEEE 802.11 Assigned WTP BSSID . . . . . . . . . . . . . 32
6.4. IEEE 802.11 Delete WLAN . . . . . . . . . . . . . . . . . 30 6.4. IEEE 802.11 Delete WLAN . . . . . . . . . . . . . . . . . 32
6.5. IEEE 802.11 Direct Sequence Control . . . . . . . . . . . 30 6.5. IEEE 802.11 Direct Sequence Control . . . . . . . . . . . 33
6.6. IEEE 802.11 Information Element . . . . . . . . . . . . . 31 6.6. IEEE 802.11 Information Element . . . . . . . . . . . . . 34
6.7. IEEE 802.11 MAC Operation . . . . . . . . . . . . . . . . 32 6.7. IEEE 802.11 MAC Operation . . . . . . . . . . . . . . . . 35
6.8. IEEE 802.11 MIC Countermeasures . . . . . . . . . . . . . 34 6.8. IEEE 802.11 MIC Countermeasures . . . . . . . . . . . . . 36
6.9. IEEE 802.11 Multi-Domain Capability . . . . . . . . . . . 34 6.9. IEEE 802.11 Multi-Domain Capability . . . . . . . . . . . 37
6.10. IEEE 802.11 OFDM Control . . . . . . . . . . . . . . . . . 35 6.10. IEEE 802.11 OFDM Control . . . . . . . . . . . . . . . . 38
6.11. IEEE 802.11 Rate Set . . . . . . . . . . . . . . . . . . . 36 6.11. IEEE 802.11 Rate Set . . . . . . . . . . . . . . . . . . 39
6.12. IEEE 802.11 RSNA Error Report From Station . . . . . . . . 37 6.12. IEEE 802.11 RSNA Error Report From Station . . . . . . . 40
6.13. IEEE 802.11 Station . . . . . . . . . . . . . . . . . . . 39 6.13. IEEE 802.11 Station . . . . . . . . . . . . . . . . . . . 42
6.14. IEEE 802.11 Station QoS Profile . . . . . . . . . . . . . 40 6.14. IEEE 802.11 Station QoS Profile . . . . . . . . . . . . . 43
6.15. IEEE 802.11 Station Session Key . . . . . . . . . . . . . 40 6.15. IEEE 802.11 Station Session Key . . . . . . . . . . . . . 43
6.16. IEEE 802.11 Statistics . . . . . . . . . . . . . . . . . . 42 6.16. IEEE 802.11 Statistics . . . . . . . . . . . . . . . . . 45
6.17. IEEE 802.11 Supported Rates . . . . . . . . . . . . . . . 46 6.17. IEEE 802.11 Supported Rates . . . . . . . . . . . . . . . 49
6.18. IEEE 802.11 Tx Power . . . . . . . . . . . . . . . . . . . 46 6.18. IEEE 802.11 Tx Power . . . . . . . . . . . . . . . . . . 49
6.19. IEEE 802.11 Tx Power Level . . . . . . . . . . . . . . . . 47 6.19. IEEE 802.11 Tx Power Level . . . . . . . . . . . . . . . 50
6.20. IEEE 802.11 Update Station QoS . . . . . . . . . . . . . . 47 6.20. IEEE 802.11 Update Station QoS . . . . . . . . . . . . . 50
6.21. IEEE 802.11 Update WLAN . . . . . . . . . . . . . . . . . 48 6.21. IEEE 802.11 Update WLAN . . . . . . . . . . . . . . . . . 51
6.22. IEEE 802.11 WTP Quality of Service . . . . . . . . . . . . 50 6.22. IEEE 802.11 WTP Quality of Service . . . . . . . . . . . 53
6.23. IEEE 802.11 WTP Radio Configuration . . . . . . . . . . . 51 6.23. IEEE 802.11 WTP Radio Configuration . . . . . . . . . . . 54
6.24. IEEE 802.11 WTP Radio Fail Alarm Indication . . . . . . . 53 6.24. IEEE 802.11 WTP Radio Fail Alarm Indication . . . . . . . 56
6.25. IEEE 802.11 WTP Radio Information . . . . . . . . . . . . 53 6.25. IEEE 802.11 WTP Radio Information . . . . . . . . . . . . 57
7. IEEE 802.11 Binding WTP Saved Variables . . . . . . . . . . . 55 7. IEEE 802.11 Binding WTP Saved Variables . . . . . . . . . . . 59
7.1. IEEE80211AntennaInfo . . . . . . . . . . . . . . . . . . . 55 7.1. IEEE80211AntennaInfo . . . . . . . . . . . . . . . . . . 59
7.2. IEEE80211DSControl . . . . . . . . . . . . . . . . . . . . 55 7.2. IEEE80211DSControl . . . . . . . . . . . . . . . . . . . 59
7.3. IEEE80211MACOperation . . . . . . . . . . . . . . . . . . 55 7.3. IEEE80211MACOperation . . . . . . . . . . . . . . . . . . 59
7.4. IEEE80211OFDMControl . . . . . . . . . . . . . . . . . . . 55 7.4. IEEE80211OFDMControl . . . . . . . . . . . . . . . . . . 59
7.5. IEEE80211Rateset . . . . . . . . . . . . . . . . . . . . . 55 7.5. IEEE80211Rateset . . . . . . . . . . . . . . . . . . . . 59
7.6. IEEE80211TxPower . . . . . . . . . . . . . . . . . . . . . 55 7.6. IEEE80211TxPower . . . . . . . . . . . . . . . . . . . . 59
7.7. IEEE80211QoS . . . . . . . . . . . . . . . . . . . . . . . 55 7.7. IEEE80211QoS . . . . . . . . . . . . . . . . . . . . . . 59
7.8. IEEE80211RadioConfig . . . . . . . . . . . . . . . . . . . 55 7.8. IEEE80211RadioConfig . . . . . . . . . . . . . . . . . . 59
8. Technology Specific Message Element Values . . . . . . . . . . 56 8. Technology Specific Message Element Values . . . . . . . . . . 60
9. Security Considerations . . . . . . . . . . . . . . . . . . . 57 8.1. WTP Descriptor Message Element, Encryption
9.1. IEEE 802.11 Security . . . . . . . . . . . . . . . . . . . 57 Capabilities Field: . . . . . . . . . . . . . . . . . . . 60
10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 59 9. Security Considerations . . . . . . . . . . . . . . . . . . . 61
11. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 60 9.1. IEEE 802.11 Security . . . . . . . . . . . . . . . . . . 61
12. References . . . . . . . . . . . . . . . . . . . . . . . . . . 61 10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 63
12.1. Normative References . . . . . . . . . . . . . . . . . . . 61 10.1. CAPWAP Message Types . . . . . . . . . . . . . . . . . . 63
12.2. Informational References . . . . . . . . . . . . . . . . . 61 10.2. CAPWAP Control Message Type . . . . . . . . . . . . . . . 63
Editors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 62 10.3. IEEE 802.11 Key Status . . . . . . . . . . . . . . . . . 63
Intellectual Property and Copyright Statements . . . . . . . . . . 63 10.4. IEEE 802.11 QoS . . . . . . . . . . . . . . . . . . . . . 63
10.5. IEEE 802.11 Auth Type . . . . . . . . . . . . . . . . . . 63
10.6. IEEE 802.11 Antenna Combiner . . . . . . . . . . . . . . 63
10.7. IEEE 802.11 Antenna Selection . . . . . . . . . . . . . . 63
10.8. IEEE 802.11 Session Key Flags . . . . . . . . . . . . . . 64
10.9. IEEE 802.11 Tag Packets . . . . . . . . . . . . . . . . . 64
10.10. IEEE 802.11 WTP Radio Fail . . . . . . . . . . . . . . . 64
10.11. IEEE 802.11 WTP Radio Type . . . . . . . . . . . . . . . 64
11. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 65
12. References . . . . . . . . . . . . . . . . . . . . . . . . . . 66
12.1. Normative References . . . . . . . . . . . . . . . . . . 66
12.2. Informational References . . . . . . . . . . . . . . . . 67
Editors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 68
Intellectual Property and Copyright Statements . . . . . . . . . . 69
1. Introduction 1. Introduction
This specification defines the Control And Provisioning of Wireless This specification defines the Control And Provisioning of Wireless
Access Points (CAPWAP) Protocol Binding Specification for use with Access Points (CAPWAP) Protocol Binding Specification for use with
the IEEE 802.11 Wireless Local Area Network protocol. Use of CAPWAP the IEEE 802.11 Wireless Local Area Network protocol. The CAPWAP
control message fields, new control messages and message elements are Protocol Specification is defined separately
[I-D.ietf-capwap-protocol-specification]. Use of CAPWAP control
message fields, new control messages and message elements are
defined. The minimum required definitions for a binding-specific defined. The minimum required definitions for a binding-specific
Statistics message element, Station message element, and WTP Radio Statistics message element, Station message element, and WTP Radio
Information message element are included. Information message element are included.
1.1. Goals 1.1. Goals
The goals for this CAPWAP protocol binding are listed below: The goals for this CAPWAP protocol binding are listed below:
1. To centralize the authentication and policy enforcement functions 1. To centralize the authentication and policy enforcement functions
for an IEEE 802.11 wireless network. The AC may also provide for an IEEE 802.11 wireless network. The AC may also provide
skipping to change at page 4, line 40 skipping to change at page 5, line 42
pressure. pressure.
The CAPWAP protocol binding extensions defined herein apply solely to The CAPWAP protocol binding extensions defined herein apply solely to
the interface between the WTP and the AC. Inter-AC and station-to-AC the interface between the WTP and the AC. Inter-AC and station-to-AC
communication are strictly outside the scope of this document. communication are strictly outside the scope of this document.
1.2. Conventions used in this document 1.2. Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [1]. document are to be interpreted as described in RFC 2119 [RFC2119].
1.3. Terminology 1.3. Terminology
This section contains definitions for terms used frequently
throughout this document. However, many additional definitions can
be found in [IEEE.802-11.2007].
Access Controller (AC): The network entity that provides WTP access Access Controller (AC): The network entity that provides WTP access
to the network infrastructure in the data plane, control plane, to the network infrastructure in the data plane, control plane,
management plane, or a combination therein. management plane, or a combination therein.
Basic Service Set (BSS): A set of stations controlled by a single Basic Service Set (BSS): A set of stations controlled by a single
coordination function. coordination function.
Distribution: The service that, by using association information, Distribution: The service that, by using association information,
delivers medium access control (MAC) service data units (MSDUs) delivers medium access control (MAC) service data units (MSDUs)
within the distribution system (DS). within the distribution system (DS).
skipping to change at page 6, line 9 skipping to change at page 7, line 9
a physical WTP. a physical WTP.
Wireless Termination Point (WTP): The physical or network entity that Wireless Termination Point (WTP): The physical or network entity that
contains an IEEE 802.11 RF antenna and wireless PHY to transmit and contains an IEEE 802.11 RF antenna and wireless PHY to transmit and
receive station traffic for wireless access networks. receive station traffic for wireless access networks.
2. IEEE 802.11 Binding 2. IEEE 802.11 Binding
This section describes use of the CAPWAP protocol with the IEEE This section describes use of the CAPWAP protocol with the IEEE
802.11 Wireless Local Area Network protocol, including Local and 802.11 Wireless Local Area Network protocol, including Local and
Split MAC operation, Group Key Refresh, BSSID to WLAN Mapping, IEEE Split MAC operation, Group Key Refresh, Basic Service Set
802.11 MAC management frame Quality of Service tagging and Run State Identification (BSSID) to WLAN Mapping, IEEE 802.11 MAC management
operation. frame Quality of Service tagging and Run State operation.
2.1. Split MAC and Local MAC Functionality 2.1. Split MAC and Local MAC Functionality
The CAPWAP protocol, when used with IEEE 802.11 devices, requires The CAPWAP protocol, when used with IEEE 802.11 devices, requires
specific behavior from the WTP and the AC to support the required specific behavior from the WTP and the AC to support the required
IEEE 802.11 protocol functions. IEEE 802.11 protocol functions.
For both the Split and Local MAC approaches, the CAPWAP functions, as For both the Split and Local MAC approaches, the CAPWAP functions, as
defined in the taxonomy specification [6], reside in the AC. defined in the taxonomy specification [RFC4118], reside in the AC.
To provide system component interoperability, the WTP and AC MUST To provide system component interoperability, the WTP and AC MUST
support 802.11 encryption/decryption at the WTP. The WTP and AC MAY support 802.11 encryption/decryption at the WTP. The WTP and AC MAY
support 802.11 encryption/decryption at the AC. support 802.11 encryption/decryption at the AC.
2.1.1. Split MAC 2.1.1. Split MAC
This section shows the division of labor between the WTP and the AC This section shows the division of labor between the WTP and the AC
in a Split MAC architecture. Figure 1 shows the separation of in a Split MAC architecture. Figure 1 shows the separation of
functionality between CAPWAP components. functionality between CAPWAP components.
skipping to change at page 7, line 13 skipping to change at page 8, line 13
Figure 1: Mapping of 802.11 Functions for Split MAC Architecture Figure 1: Mapping of 802.11 Functions for Split MAC Architecture
In a Split MAC Architecture, the Distribution and Integration In a Split MAC Architecture, the Distribution and Integration
services reside on the AC, and therefore all user data is tunneled services reside on the AC, and therefore all user data is tunneled
between the WTP and the AC. As noted above, all real-time IEEE between the WTP and the AC. As noted above, all real-time IEEE
802.11 services, including the Beacon and Probe Response frames, are 802.11 services, including the Beacon and Probe Response frames, are
handled on the WTP. handled on the WTP.
All remaining IEEE 802.11 MAC management frames are supported on the All remaining IEEE 802.11 MAC management frames are supported on the
AC, including the Association Request frame which allows the AC to be AC, including the Association Request frame which allows the AC to be
involved in the access policy enforcement portion of the IEEE 802.11 involved in the access policy enforcement portion of the IEEE 802.11
protocol. The IEEE 802.1X and IEEE 802.11 key management function protocol. The IEEE 802.1X [IEEE.802-1X.2004], Extensible
are also located on the AC. This implies that the AAA client also Authentication Protocol (EAP) [RFC3748] and IEEE Robust Security
resides on the AC. Network Association (RSNA) Key Management [IEEE.802-11.2007]
functions are also located on the AC. This implies that the AAA
client also resides on the AC.
While the admission control component of IEEE 802.11 resides on the While the admission control component of IEEE 802.11 resides on the
AC, the real time scheduling and queuing functions are on the WTP. AC, the real time scheduling and queuing functions are on the WTP.
Note that this does not prevent the AC from providing additional Note that this does not prevent the AC from providing additional
policy and scheduling functionality. policy and scheduling functionality.
Note that in the following figure, the use of '( - )' indicates that Note that in the following figure, the use of '( - )' indicates that
processing of the frames is done on the WTP. processing of the frames is done on the WTP.
Client WTP AC Client WTP AC
skipping to change at page 7, line 49 skipping to change at page 9, line 4
802.1X Authentication & 802.11 Key Exchange 802.1X Authentication & 802.11 Key Exchange
<---------------------------------------------------------> <--------------------------------------------------------->
Station Configuration Request Station Configuration Request
[Add Station (AES-CCMP, [Add Station (AES-CCMP,
PTK=x)] PTK=x)]
<--------------------------> <-------------------------->
802.11 Action Frames 802.11 Action Frames
<---------------------------------------------------------> <--------------------------------------------------------->
802.11 DATA (1) 802.11 DATA (1)
<---------------------------( - )-------------------------> <---------------------------( - )------------------------->
Figure 2: Split MAC Message Flow Figure 2: Split MAC Message Flow
Figure 2 provides an illustration of the division of labor in a Split Figure 2 provides an illustration of the division of labor in a Split
MAC architecture. In this example, a WLAN has been created that is MAC architecture. In this example, a WLAN has been created that is
configured for IEEE 802.11, using 802.1X based end user configured for IEEE 802.11, using 802.1X based end user
authentication and AES-CCMP link layer encryption. The following authentication and AES-CCMP link layer encryption (Counter mode with
process occurs: Cipher-block chaining Message authentication code Protocol, see
[FIPS.197.2001]). The following process occurs:
o The WTP generates the IEEE 802.11 Beacon frames, using information o The WTP generates the IEEE 802.11 Beacon frames, using information
provided to it through the IEEE 802.11 Add WLAN (see Section 6.1) provided to it through the IEEE 802.11 Add WLAN (see Section 6.1)
message element, including the RSNIE, which indicates support of message element, including the RSNIE, which indicates support of
802.1X and AES-CCMP. 802.1X and AES-CCMP.
o The WTP processes the Probe Request frame and responds with a o The WTP processes the Probe Request frame and responds with a
corresponding Probe Response frame. The Probe Request frame is corresponding Probe Response frame. The Probe Request frame is
then forwarded to the AC for optional processing. then forwarded to the AC for optional processing.
o The WTP forwards the IEEEE 802.11 Authentication and Association o The WTP forwards the IEEEE 802.11 Authentication and Association
frames to the AC, which is responsible for responding to the frames to the AC, which is responsible for responding to the
client. client.
o Once the association is complete, the AC transmits a Station o Once the association is complete, the AC transmits a Station
Configuration Request message, which includes an Add Station Configuration Request message, which includes an Add Station
message element, to the WTP (see Section 4.6.8 in [3]). In the message element, to the WTP (see Section 4.6.8 in
above example, the WLAN was configured for IEEE 802.1X. [I-D.ietf-capwap-protocol-specification]). In the above example,
the WLAN was configured for IEEE 802.1X.
o If the WTP is providing encryption/decryption services, once the o If the WTP is providing encryption/decryption services, once the
client has completed the IEEE 802.11 key exchange, the AC client has completed the IEEE 802.11 key exchange, the AC
transmits another Station Configuration Request message which transmits another Station Configuration Request message which
includes an Add Station message element, an IEEE 802.11 Station includes an Add Station message element, an IEEE 802.11 Station
message element, an IEEE 802.11 Station Session Key message message element, an IEEE 802.11 Station Session Key message
element and an IEEE 802.11 Information Element message element element and an IEEE 802.11 Information Element message element
which includes the RSNIE to the WTP, delivering the security which includes the Robust Security Network Information Element
policy to enforce for the station (in this case AES-CCMP), and the (RSNIE) to the WTP, delivering the security policy to enforce for
encryption key to use. If encryption/decryption is handled in the the station (in this case AES-CCMP), and the encryption key to
AC, the IEEE 802.11 Information message element with an RSNIE use. If encryption/decryption is handled in the AC, the IEEE
would not be included. 802.11 Information message element with an RSNIE would not be
included.
o The WTP forwards any IEEE 802.11 Management Action frames received o The WTP forwards any IEEE 802.11 Management Action frames received
to the AC. to the AC.
o All IEEE 802.11 station data frames are tunneled between the WTP o All IEEE 802.11 station data frames are tunneled between the WTP
and the AC. and the AC.
The WTP SHALL include the IEEE 802.11 MAC header contents in all The WTP SHALL include the IEEE 802.11 MAC header contents in all
frames transmitted to the AC. frames transmitted to the AC.
When 802.11 encryption/decryption is performed at the WTP, the WTP When 802.11 encryption/decryption is performed at the WTP, the WTP
MUST decrypt the uplink frames, MUST set the Protected Frame field to MUST decrypt the uplink frames, MUST set the Protected Frame field to
0, and MUST make the frame format consistent with that of an 0, and MUST make the frame format consistent with that of an
unprotected 802.11 frame prior to transmitting the frames to the AC. unprotected 802.11 frame prior to transmitting the frames to the AC.
The fields added to an 802.11 protected frame (i.e., IV/EIV, MIC, and The fields added to an 802.11 protected frame (i.e., Initialization
ICV) MUST be stripped off prior to transmission from the WTP to AC. Vector/Extended Initialization Vector (IV/EIV), Message Integrity
For downlink frames, the Protected Frame field MUST be set to 0 by Code (MIC), and Integrity Check Value (ICV)) MUST be stripped off
the AC as the frame being sent is unencrypted. The WTP MUST apply prior to transmission from the WTP to AC. For downlink frames, the
the required protection policy for the WLAN, and set the Protected Protected Frame field MUST be set to 0 by the AC as the frame being
Frame field on transmission over the air. The Protected Frame field sent is unencrypted. The WTP MUST apply the required protection
always needs to accurately indicate the status of the 802.11 frame policy for the WLAN, and set the Protected Frame field on
that is carrying it. transmission over the air. The Protected Frame field always needs to
accurately indicate the status of the 802.11 frame that is carrying
it.
When 802.11 encryption/decryption is performed at the AC, the WTP When 802.11 encryption/decryption is performed at the AC, the WTP
SHALL NOT decrypt the uplink frames prior to transmitting the frames SHALL NOT decrypt the uplink frames prior to transmitting the frames
to the AC. The AC and WTP SHALL populate the IEEE 802.11 MAC header to the AC. The AC and WTP SHALL populate the IEEE 802.11 MAC header
fields as described in Figure 3. fields as described in Figure 3.
MAC header field Location MAC header field Location
Frame Control: Frame Control:
Version AC Version AC
ToDS AC ToDS AC
skipping to change at page 9, line 44 skipping to change at page 11, line 4
Address 2: AC Address 2: AC
Address 3: AC Address 3: AC
Sequence Ctrl: WTP Sequence Ctrl: WTP
Address 4: AC Address 4: AC
QoS Control: AC QoS Control: AC
Frame Body: AC Frame Body: AC
FCS: WTP FCS: WTP
Figure 3: Population of the IEEE 802.11 MAC header Fields for Figure 3: Population of the IEEE 802.11 MAC header Fields for
Downlink Frames Downlink Frames
When 802.11 encryption/decryption is performed at the AC, the When 802.11 encryption/decryption is performed at the AC, the
MoreFrag bit is populated at the AC. The Pwr Mgmt bit is not MoreFrag bit is populated at the AC. The Pwr Mgmt bit is not
applicable to downlink frames, and is set to 0. Note that the FCS applicable to downlink frames, and is set to 0. Note that the Frame
field is not included in 802.11 frames exchanged between the WTP and Check Sequence (FCS) field is not included in 802.11 frames exchanged
the AC. Upon sending data frames to the AC, the WTP is responsible between the WTP and the AC. Upon sending data frames to the AC, the
for validating, and stripping the FCS field. Upon receiving data WTP is responsible for validating, and stripping the FCS field. Upon
frames from the AC, the WTP is responsible for adding the FCS field, receiving data frames from the AC, the WTP is responsible for adding
and populating the field as described in [2]. the FCS field, and populating the field as described in
[IEEE.802-11.2007].
2.1.2. Local MAC 2.1.2. Local MAC
This section shows the division of labor between the WTP and the AC This section shows the division of labor between the WTP and the AC
in a Local MAC architecture. Figure 4 shows the separation of in a Local MAC architecture. Figure 4 shows the separation of
functionality among CAPWAP components. functionality among CAPWAP components.
Function Location Function Location
Distribution Service WTP/AC Distribution Service WTP/AC
Integration Service WTP Integration Service WTP
skipping to change at page 10, line 46 skipping to change at page 12, line 6
forwarded to the AC in their native format, but encapsulated as 802.3 forwarded to the AC in their native format, but encapsulated as 802.3
frames. frames.
While the MAC is terminated on the WTP, it is necessary for the AC to While the MAC is terminated on the WTP, it is necessary for the AC to
be aware of mobility events within the WTPs. Thus the WTP MUST be aware of mobility events within the WTPs. Thus the WTP MUST
forward the IEEE 802.11 Association Request frames to the AC. The AC forward the IEEE 802.11 Association Request frames to the AC. The AC
MAY reply with a failed Association Response frame if it deems it MAY reply with a failed Association Response frame if it deems it
necessary, and upon receipt of a failed Association Response frame necessary, and upon receipt of a failed Association Response frame
from the AC, the WTP MUST send a Disassociation frame to the station. from the AC, the WTP MUST send a Disassociation frame to the station.
The IEEE 802.1X and RSNA Key Management functions reside in the AC. The IEEE 802.1X [IEEE.802-1X.2004], EAP and IEEE RSNA Key Management
Therefore, the WTP MUST forward all IEEE 802.1X/RSNA Key Management [IEEE.802-11.2007] functions reside in the AC. Therefore, the WTP
frames to the AC and forward the corresponding responses to the MUST forward all IEEE 802.1X, EAP and RSNA Key Management frames to
station. This implies that the AAA client also resides on the AC. the AC and forward the corresponding responses to the station. This
implies that the AAA client also resides on the AC.
Note that in the following figure, the use of '( - )' indicates that Note that in the following figure, the use of '( - )' indicates that
processing of the frames is done on the WTP. processing of the frames is done on the WTP.
Client WTP AC Client WTP AC
Beacon Beacon
<----------------------------- <-----------------------------
Probe Probe
<----------------------------> <---------------------------->
skipping to change at page 11, line 50 skipping to change at page 13, line 13
element. element.
o The WTP processes a Probe Request frame and responds with a o The WTP processes a Probe Request frame and responds with a
corresponding Probe Response frame. corresponding Probe Response frame.
o The WTP forwards the IEEE 802.11 Authentication and Association o The WTP forwards the IEEE 802.11 Authentication and Association
frames to the AC. frames to the AC.
o Once the association is complete, the AC transmits a Station o Once the association is complete, the AC transmits a Station
Configuration Request message, which includes the Add Station Configuration Request message, which includes the Add Station
message element, to the WTP (see Section 4.6.8 in [3]). In the message element, to the WTP (see Section 4.6.8 in
above example, the WLAN is configured for IEEE 802.1X, and [I-D.ietf-capwap-protocol-specification]). In the above example,
therefore the '802.1X only' policy bit is enabled. the WLAN is configured for IEEE 802.1X, and therefore the '802.1X
only' policy bit is enabled.
o The WTP forwards all IEEE 802.1X and IEEE 802.11 key exchange o The WTP forwards all IEEE 802.1X and IEEE 802.11 key exchange
messages to the AC for processing. messages to the AC for processing.
o The AC transmits another Station Configuration Request message o The AC transmits another Station Configuration Request message
including an Add Station message element, an IEEE 802.11 Station including an Add Station message element, an IEEE 802.11 Station
message element, an IEEE 802.11 Station Session Key message message element, an IEEE 802.11 Station Session Key message
element and an IEEE 802.11 Information Element message element element and an IEEE 802.11 Information Element message element
which includes the RSNIE to the WTP, stating the security policy which includes the RSNIE to the WTP, stating the security policy
to enforce for the client (in this case AES-CCMP), as well as the to enforce for the client (in this case AES-CCMP), as well as the
encryption key to use. The Add Station message element MAY encryption key to use. The Add Station message element MAY
include a VLAN name, which when present is used by the WTP to include a Virtual LAN (VLAN) [IEEE.802-1Q.2005] name , which when
identify the VLAN on which the user's data frames are to be present is used by the WTP to identify the VLAN on which the
bridged. user's data frames are to be bridged.
o The WTP forwards any IEEE 802.11 Management Action frames received o The WTP forwards any IEEE 802.11 Management Action frames received
to the AC. to the AC.
o The WTP MAY locally bridge client data frames (and provide the o The WTP MAY locally bridge client data frames (and provide the
necessary encryption and decryption services). The WTP MAY also necessary encryption and decryption services). The WTP MAY also
tunnel client data frames to the AC, using 802.3 frame tunnel mode tunnel client data frames to the AC, using 802.3 frame tunnel mode
or 802.11 frame tunnel mode. or 802.11 frame tunnel mode.
2.2. Roaming Behavior 2.2. Roaming Behavior
This section expands upon the examples provided in the previous This section expands upon the examples provided in the previous
section, and describes how the CAPWAP control protocol is used to section, and describes how the CAPWAP control protocol is used to
provide secure roaming. provide secure roaming.
Once a client has successfully associated with the network in a Once a client has successfully associated with the network in a
secure fashion, it is likely to attempt to roam to another WTP. secure fashion, it is likely to attempt to roam to another WTP.
Figure 6 shows an example of a currently associated station moving Figure 6 shows an example of a currently associated station moving
from its "Old WTP" to a "New WTP". The figure is valid for multiple from its "Old WTP" to a "New WTP". The figure is valid for multiple
different security policies, including IEEE 802.1X and WPA or WPA2, different security policies, including IEEE 802.1X and Wireless
Protected Access (WPA) or Wireless Protected Access 2 (WPA2) [WPA],
both with key caching (where the IEEE 802.1x exchange would be both with key caching (where the IEEE 802.1x exchange would be
bypassed) and without. bypassed) and without.
Client Old WTP New WTP AC Client Old WTP New WTP AC
Association Request/Response Association Request/Response
<--------------------------------------( - )--------------> <--------------------------------------( - )-------------->
Station Configuration Request[ Station Configuration Request[
Add Station (Station Message Add Station (Station Message
Elements)] Elements)]
skipping to change at page 14, line 48 skipping to change at page 16, line 5
during configuration via the IEEE 802.11 WTP WLAN Radio Configuration during configuration via the IEEE 802.11 WTP WLAN Radio Configuration
message element (see Section 6.23). message element (see Section 6.23).
2.5. Quality of Service for IEEE 802.11 MAC Management Messages 2.5. Quality of Service for IEEE 802.11 MAC Management Messages
It is recommended that IEEE 802.11 MAC Management frames be sent by It is recommended that IEEE 802.11 MAC Management frames be sent by
both the AC and the WTP with appropriate Quality of Service values, both the AC and the WTP with appropriate Quality of Service values,
listed below, to ensure that congestion in the network minimizes listed below, to ensure that congestion in the network minimizes
occurrences of packet loss. occurrences of packet loss.
802.1P: The precedence value of 7 SHOULD be used for all IEEE 802.1p: The precedence value of 7 SHOULD be used for all IEEE
802.11 MAC management frames, except for Probe Requests which 802.11 MAC management frames, except for Probe Requests which
SHOULD use 4. SHOULD use 4.
DSCP: The DSCP tag value of 46 SHOULD be used for all IEEE 802.11 DSCP: The DSCP tag value of 46 SHOULD be used for all IEEE 802.11
MAC management frames, except for Probe Requests which SHOULD use MAC management frames, except for Probe Requests which SHOULD use
34. 34.
2.6. Run State Operation 2.6. Run State Operation
The Run state is the normal state of operation for the CAPWAP The Run state is the normal state of operation for the CAPWAP
skipping to change at page 16, line 10 skipping to change at page 17, line 10
When the AC sends a WLAN Configuration Request message (see When the AC sends a WLAN Configuration Request message (see
Section 3.1) or receives the corresponding WLAN Configuration Section 3.1) or receives the corresponding WLAN Configuration
Response message (see Section 3.2) from the WTP, it remains in the Response message (see Section 3.2) from the WTP, it remains in the
Run state. Run state.
3. IEEE 802.11 Specific CAPWAP Control Messages 3. IEEE 802.11 Specific CAPWAP Control Messages
This section defines CAPWAP Control Messages that are specific to the This section defines CAPWAP Control Messages that are specific to the
IEEE 802.11 binding. Two messages are defined, IEEE 802.11 WLAN IEEE 802.11 binding. Two messages are defined, IEEE 802.11 WLAN
Configuration Request and IEEE 802.11 WLAN Configuration Response. Configuration Request and IEEE 802.11 WLAN Configuration Response.
See Section 4.5 in [3] for CAPWAP Control message definitions and the See Section 4.5 in [I-D.ietf-capwap-protocol-specification] for
derivation of the Message Type value from the IANA Enterprise number. CAPWAP Control message definitions and the derivation of the Message
Type value from the IANA Enterprise number.
The valid message types for IEEE 802.11 specific control messages are The valid message types for IEEE 802.11 specific control messages are
listed below. The IANA Enterprise number used with these messages is listed below. The IANA Enterprise number used with these messages is
13277. 13277.
CAPWAP Control Message Message Type CAPWAP Control Message Message Type
Value Value
IEEE 802.11 WLAN Configuration Request 3398912 IEEE 802.11 WLAN Configuration Request 3398912
IEEE 802.11 WLAN Configuration Response 3398913 IEEE 802.11 WLAN Configuration Response 3398913
skipping to change at page 16, line 33 skipping to change at page 17, line 34
3.1. IEEE 802.11 WLAN Configuration Request 3.1. IEEE 802.11 WLAN Configuration Request
The IEEE 802.11 WLAN Configuration Request is sent by the AC to the The IEEE 802.11 WLAN Configuration Request is sent by the AC to the
WTP in order to change services provided by the WTP. This control WTP in order to change services provided by the WTP. This control
message is used to either create, update or delete a WLAN on the WTP. message is used to either create, update or delete a WLAN on the WTP.
The IEEE 802.11 WLAN Configuration Request is sent as a result of The IEEE 802.11 WLAN Configuration Request is sent as a result of
either some manual administrative process (e.g., deleting a WLAN), or either some manual administrative process (e.g., deleting a WLAN), or
automatically to create a WLAN on a WTP. When sent automatically to automatically to create a WLAN on a WTP. When sent automatically to
create a WLAN, this control message is sent after the CAPWAP create a WLAN, this control message is sent after the CAPWAP
Configuration Update Request message (see Section 8.4 in [3]) has Configuration Update Request message (see Section 8.4 in
been received by the WTP. [I-D.ietf-capwap-protocol-specification]) has been received by the
WTP.
Upon receiving this control message, the WTP will modify the Upon receiving this control message, the WTP will modify the
necessary services, and transmit an IEEE 802.11 WLAN Configuration necessary services, and transmit an IEEE 802.11 WLAN Configuration
Response. Response.
A WTP MAY provide service for more than one WLAN, therefore every A WTP MAY provide service for more than one WLAN, therefore every
WLAN is identified through a numerical index. For instance, a WTP WLAN is identified through a numerical index. For instance, a WTP
that is capable of supporting up to 16 SSIDs, could accept up to 16 that is capable of supporting up to 16 Service Set Identifiers
IEEE 802.11 WLAN Configuration Request messages that include the Add (SSIDs), could accept up to 16 IEEE 802.11 WLAN Configuration Request
WLAN message element. messages that include the Add WLAN message element.
Since the index is the primary identifier for a WLAN, an AC MAY Since the index is the primary identifier for a WLAN, an AC MAY
attempt to ensure that the same WLAN is identified through the same attempt to ensure that the same WLAN is identified through the same
index number on all of its WTPs. An AC that does not follow this index number on all of its WTPs. An AC that does not follow this
approach MUST find some other means of maintaining a WLAN-Identifier- approach MUST find some other means of maintaining a WLAN-Identifier-
to-SSID mapping table. to-SSID mapping table.
The following message elements MAY be included in the IEEE 802.11 The following message elements MAY be included in the IEEE 802.11
WLAN Configuration Request message. Only one message element MUST be WLAN Configuration Request message. Only one message element MUST be
present. present.
skipping to change at page 17, line 17 skipping to change at page 18, line 19
o IEEE 802.11 Add WLAN, see Section 6.1 o IEEE 802.11 Add WLAN, see Section 6.1
o IEEE 802.11 Delete WLAN, see Section 6.4 o IEEE 802.11 Delete WLAN, see Section 6.4
o IEEE 802.11 Update WLAN, see Section 6.21 o IEEE 802.11 Update WLAN, see Section 6.21
The following message element MAY be present. The following message element MAY be present.
o IEEE 802.11 Information Element, see Section 6.6 o IEEE 802.11 Information Element, see Section 6.6
o Vendor Specific Payload, see [3] o Vendor Specific Payload, see
[I-D.ietf-capwap-protocol-specification]
3.2. IEEE 802.11 WLAN Configuration Response 3.2. IEEE 802.11 WLAN Configuration Response
The IEEE 802.11 WLAN Configuration Response message is sent by the The IEEE 802.11 WLAN Configuration Response message is sent by the
WTP to the AC. It is used to acknowledge receipt of an IEEE 802.11 WTP to the AC. It is used to acknowledge receipt of an IEEE 802.11
WLAN Configuration Request message, and to indicate that the WLAN Configuration Request message, and to indicate that the
requested configuration was successfully applied, or that an error requested configuration was successfully applied, or that an error
related to the processing of the IEEE 802.11 WLAN Configuration related to the processing of the IEEE 802.11 WLAN Configuration
Request message occurred on the WTP. Request message occurred on the WTP.
The following message element MUST be included in the IEEE 802.11
WLAN Configuration Response message.
o Result Code, see Section 4.6.35 in
[I-D.ietf-capwap-protocol-specification]
The following message element MAY be included in the IEEE 802.11 WLAN The following message element MAY be included in the IEEE 802.11 WLAN
Configuration Response message. Configuration Response message.
o IEEE 802.11 Assigned WTP BSSID, see Section 6.3 o IEEE 802.11 Assigned WTP BSSID, see Section 6.3
o Vendor Specific Payload, see [3] o Vendor Specific Payload, see
[I-D.ietf-capwap-protocol-specification]
The following message element MUST be included in the IEEE 802.11
WLAN Configuration Response message.
o Result Code, see Section 4.6.35 in [3]
4. CAPWAP Data Message Bindings 4. CAPWAP Data Message Bindings
This section describes the CAPWAP Data Message bindings to support This section describes the CAPWAP Data Message bindings to support
transport of IEEE 802.11 frames. transport of IEEE 802.11 frames.
Payload encapsulation: The CAPWAP protocol defines the CAPWAP data Payload encapsulation: The CAPWAP protocol defines the CAPWAP data
message, which is used to encapsulate a wireless payload. For message, which is used to encapsulate a wireless payload. For
IEEE 802.11, the IEEE 802.11 header and payload are encapsulated IEEE 802.11, the IEEE 802.11 header and payload are encapsulated
(excluding the IEEE 802.11 FCS checksum). The IEEE 802.11 FCS (excluding the IEEE 802.11 FCS checksum). The IEEE 802.11 FCS
checksum is handled by the WTP. This allows the WTP to validate checksum is handled by the WTP. This allows the WTP to validate
an IEEE 802.11 frame prior to sending it to the AC. Similarly, an IEEE 802.11 frame prior to sending it to the AC. Similarly,
when an AC wishes to transmit a frame to a station, the WTP when an AC wishes to transmit a frame to a station, the WTP
computes and adds the FCS checksum. computes and adds the FCS checksum.
Optional Wireless Specific Information: This optional CAPWAP header Optional Wireless Specific Information: This optional CAPWAP header
field (see Section 4.3 in [3]) is only used with CAPWAP data field (see Section 4.3 in
messages, and it serves two purposes, depending upon the direction [I-D.ietf-capwap-protocol-specification]) is only used with CAPWAP
of the message. For messages from the WTP to the AC, the field data messages, and it serves two purposes, depending upon the
uses the format described in the "IEEE 802.11 Frame Info" field direction of the message. For messages from the WTP to the AC,
(see below). However, for messages sent by the AC to the WTP, the the field uses the format described in the "IEEE 802.11 Frame
format used is described in the "Destination WLANs" field (also Info" field (see below). However, for messages sent by the AC to
defined below). the WTP, the format used is described in the "Destination WLANs"
field (also defined below).
Note that in both cases, the two optional headers fit in the Note that in both cases, the two optional headers fit in the
"Data" field of the Wireless Specific Information header. "Data" field of the Wireless Specific Information header.
IEEE 802.11 Frame Info: When an IEEE 802.11 frame is received from a IEEE 802.11 Frame Info: When an IEEE 802.11 frame is received from a
station over the air, it is encapsulated and this field is used to station over the air, it is encapsulated and this field is used to
include radio and PHY specific information associated with the include radio and PHY specific information associated with the
frame. frame.
The IEEE 802.11 Frame Info field has the following format: The IEEE 802.11 Frame Info field has the following format:
skipping to change at page 19, line 6 skipping to change at page 20, line 6
| RSSI | SNR | Data Rate | | RSSI | SNR | Data Rate |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
RSSI: RSSI is a signed, 8-bit value. It is the received signal RSSI: RSSI is a signed, 8-bit value. It is the received signal
strength indication, in dBm. strength indication, in dBm.
SNR: SNR is a signed, 8-bit value. It is the signal to noise SNR: SNR is a signed, 8-bit value. It is the signal to noise
ratio of the received IEEE 802.11 frame, in dB. ratio of the received IEEE 802.11 frame, in dB.
Data Rate: The data rate field is a 16 bit unsigned value. The Data Rate: The data rate field is a 16 bit unsigned value. The
contents of the field is set to 10 times the data rate in Mbps data rate field is a 16 bit unsigned value expressing the data
of the packet received by the WTP. For instance, a packet rate of the packets received by the WTP in units of 0.1 Mbps.
received at 5.5Mbps would be set to 55, while 11Mbps would be For instance, a packet received at 5.5Mbps would be set to 55,
set to 110. while 11Mbps would be set to 110.
Destination WLANs The Destination WLANs field is used to specify the Destination WLANs The Destination WLANs field is used to specify the
target WLANs for a given frame, and is only used with broadcast target WLANs for a given frame, and is only used with broadcast
and multicast frames. This field allows the AC to transmit a and multicast frames. This field allows the AC to transmit a
single broadcast or multicast frame to the WTP, and allows the WTP single broadcast or multicast frame to the WTP, and allows the WTP
to perform the necessary frame replication. The field uses the to perform the necessary frame replication. The field uses the
following format: following format:
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| WLAN ID bitmap | Reserved | | WLAN ID bitmap | Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
WLAN ID bitmap: This bit field indicates the WLAN ID (see WLAN ID bitmap: This bit field indicates the WLAN ID (see
Section 6.1) on which the WTP will transmit the included frame. Section 6.1) on which the WTP will transmit the included frame.
For instance, if a multicast packet is to be transmitted on For instance, if a multicast packet is to be transmitted on
WLANs 1 and 3, bits 1 and 3 of this field would be enabled. WLANs 1 and 3, bits 1 and 3 of this field would be enabled.
This field is to be set to zero for unicast packets and is This field is to be set to all zeroes for unicast packets and
unused if the WTP is not providing IEEE 802.11 encryption. is unused if the WTP is not providing IEEE 802.11 encryption.
Reserved: All implementations complying with this protocol MUST Reserved: All implementations complying with this protocol MUST
set to zero any bits that are reserved in the version of the set to zero any bits that are reserved in the version of the
protocol supported by that implementation. Receivers MUST protocol supported by that implementation. Receivers MUST
ignore all bits not defined for the version of the protocol ignore all bits not defined for the version of the protocol
they support. they support.
5. CAPWAP Control Message bindings 5. CAPWAP Control Message bindings
This section describes the IEEE 802.11 specific message elements This section describes the IEEE 802.11 specific message elements
skipping to change at page 24, line 38 skipping to change at page 25, line 38
IEEE 802.11 Supported Rates 1040 IEEE 802.11 Supported Rates 1040
IEEE 802.11 Tx Power 1041 IEEE 802.11 Tx Power 1041
IEEE 802.11 Tx Power Level 1042 IEEE 802.11 Tx Power Level 1042
IEEE 802.11 Update Station QoS 1043 IEEE 802.11 Update Station QoS 1043
IEEE 802.11 Update WLAN 1044 IEEE 802.11 Update WLAN 1044
IEEE 802.11 WTP Quality of Service 1045 IEEE 802.11 WTP Quality of Service 1045
IEEE 802.11 WTP Radio Configuration 1046 IEEE 802.11 WTP Radio Configuration 1046
IEEE 802.11 WTP Radio Fail Alarm Indication 1047 IEEE 802.11 WTP Radio Fail Alarm Indication 1047
IEEE 802.11 WTP Radio Information 1048 IEEE 802.11 WTP Radio Information 1048
Figure 8: IEEE 802.11 Binding Message Elements
6.1. IEEE 802.11 Add WLAN 6.1. IEEE 802.11 Add WLAN
The IEEE 802.11 Add WLAN message element is used by the AC to define The IEEE 802.11 Add WLAN message element is used by the AC to define
a WLAN on the WTP. The inclusion of this message element MUST also a WLAN on the WTP. The inclusion of this message element MUST also
include IEEE 802.11 Information Element message elements, containing include IEEE 802.11 Information Element message elements, containing
the following IEEE 802.11 IEs: the following IEEE 802.11 IEs:
Power Capability information element Power Capability information element
WPA information element WPA information element
skipping to change at page 25, line 24 skipping to change at page 26, line 24
If present, the RSN information element is sent with the IEEE 802.11 If present, the RSN information element is sent with the IEEE 802.11
Add WLAN message element to instruct the WTP on the usage of the Key Add WLAN message element to instruct the WTP on the usage of the Key
field. field.
An AC MAY include additional information elements as desired. The An AC MAY include additional information elements as desired. The
message element uses the following format: message element uses the following format:
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | WLAN ID | Capabilities | | Radio ID | WLAN ID | Capability |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Key Index | Key Status | Key Length | | Key Index | Key Status | Key Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Key... | | Key... |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Group TSC | | Group TSC |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Group TSC | QoS | Auth Type | | Group TSC | QoS | Auth Type |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MAC Mode | Tunnel Mode | Suppress SSID | SSID ... | MAC Mode | Tunnel Mode | Suppress SSID | SSID ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1024 for IEEE 802.11 Add WLAN Type: 1024 for IEEE 802.11 Add WLAN
Length: >= 49 Length: >= 52
Radio ID: An 8-bit value representing the radio. Radio ID: An 8-bit value representing the radio.
WLAN ID: An 8-bit value specifying the WLAN Identifier. WLAN ID: An 8-bit value specifying the WLAN Identifier.
Capability: A 16-bit value containing the capabilities information Capability: A 16-bit value containing the capability information
field to be advertised by the WTP in the Probe Request and Beacon field to be advertised by the WTP in the Probe Request and Beacon
frames. frames. Each bit of the Capability field represents a different
WTP capability, which are described in detail in
[IEEE.802-11.2007]. The format of the field is:
0 1
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|E|I|C|F|P|S|B|A|M|Q|T|D|V|O|K|L|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
E (ESS): The AC MUST set the Extended Service Set (ESS) subfield
to 1.
I (IBSS): The AC MUST set the Independent Basic Service Set
(IBSS) subfield to 0.
C (CF-Pollable): The AC sets the Contention Free Pollable (CF-
Pollable) subfield based on the table found in
[IEEE.802-11.2007].
F (CF-Poll Request): The AC sets the CF-Poll Request subfield
based on the table found in [IEEE.802-11.2007].
P (Privacy): The AC sets the Privacy subfield based on the
confidentiality requirements of the WLAN, as defined in
[IEEE.802-11.2007].
S (Short Preamble): The AC sets the Short Preamble subfield
based on whether the use of short preambles are permitted on
the WLAN, as defined in [IEEE.802-11.2007].
B (PBCC): The AC sets the Packet Binary Convolutional Code
(PBCC) modulation option subfield based on whether the use of
PBCC is permitted on the WLAN, as defined in
[IEEE.802-11.2007].
A (Channel Agility): The AC sets the Channel Agility subfield
based on whether the WTP is capable of supporting the High Rate
Direct Sequence Spread Spectrum (HR/DSSS), as defined in
[IEEE.802-11.2007].
M (Spectrum Management): The AC sets the Spectrum Management
subfield according to the value of the
dot11SpectrumManagementRequired MIB variable, as defined in
[IEEE.802-11.2007].
Q (QOS): The AC sets the Quality of Service (QOS) subfield based
on the table found in [IEEE.802-11.2007].
T (Short Slot Time): The AC sets the Short Slot Timesubfield
according to the value of the WTP's currently used slot time
value, as defined in [IEEE.802-11.2007].
D (APSD): The AC sets the APSD subfield according to the value
of the dot11APSDOptionImplemented Management Information Base
(MIB) variable, as defined in [IEEE.802-11.2007].
V (Reserved): The AC sets the Reserved subfield to zero, as
defined in [IEEE.802-11.2007].
O (DSSS-OFDM): The AC sets the DSSS-OFDM subfield to indicate
the use of Direct Sequence Spread Spectrum with Orthogonal
Frequency Division Multiplexing (DSSS-OFDM), as defined in
[IEEE.802-11.2007].
K (Delayed Block ACK): The AC sets the Delayed Block ACK
subfield according to the value of the
dot11DelayedBlockAckOptionImplemented MIB variable, as defined
in [IEEE.802-11.2007].
L (Immediate Block ACK): The AC sets the Delayed Block ACK
subfield according to the value of the
dot11ImmediateBlockAckOptionImplemented MIB variable, as
defined in [IEEE.802-11.2007].
Key-Index: The Key Index associated with the key. Key-Index: The Key Index associated with the key.
Key Status: A 1 byte value that specifies the state and usage of Key Status: A 1 byte value that specifies the state and usage of
the key that has been included. The following values describe the the key that has been included. The following values describe the
key usage and its status: key usage and its status:
0 - A value of zero, with the inclusion of the RSN Information 0 - A value of zero, with the inclusion of the RSN Information
Element means that the WLAN uses per-station encryption keys, and Element means that the WLAN uses per-station encryption keys,
therefore the key in the 'Key' field is only used for multicast and therefore the key in the 'Key' field is only used for
traffic. multicast traffic.
1 - When set to one, the WLAN employs a shared WEP key, also known 1 - When set to one, the WLAN employs a shared Wired Equivalent
as a static WEP key, and uses the encryption key for both unicast Privacy (WEP) key, also known as a static WEP key, and uses the
and multicast traffic for all stations. encryption key for both unicast and multicast traffic for all
stations.
2 - The value of 2 indicates that the AC will begin rekeying the GTK 2 - The value of 2 indicates that the AC will begin rekeying the
with the STA's in the BSS. It is only valid when IEEE 802.11 is GTK with the STA's in the BSS. It is only valid when IEEE
enabled as the security policy for the BSS. 802.11 is enabled as the security policy for the BSS.
3 - The value of 3 indicates that the AC has completed rekeying the 3 - The value of 3 indicates that the AC has completed rekeying
GTK and broadcast packets no longer need to be duplicated and the GTK and broadcast packets no longer need to be duplicated
transmitted with both GTK's. and transmitted with both GTK's.
Key Length: A 16-bit value representing the length of the Key Key Length: A 16-bit value representing the length of the Key
field. field.
Key: A 32 byte Session Key to use to provide data privacy. For Key: A 32 byte Session Key to use to provide data privacy. For
encryption schemes that employ a separate encryption key for encryption schemes that employ a separate encryption key for
unicast and multicast traffic, the key included here only applies unicast and multicast traffic, the key included here only applies
to multicast frames, and the cipher suite is specified in an to multicast frames, and the cipher suite is specified in an
accompanied RSN Information Element. In these scenarios, the key accompanied RSN Information Element. In these scenarios, the key
and cipher information is communicated via the Add Station message and cipher information is communicated via the Add Station message
element, see Section 4.6.8 in [3] and the IEEE 802.11 Station element, see Section 4.6.8 in
Session Key message element, see Section 6.15. [I-D.ietf-capwap-protocol-specification] and the IEEE 802.11
Station Session Key message element, see Section 6.15.
Group TSC A 48-bit value containing the Transmit Sequence Counter Group TSC A 48-bit value containing the Transmit Sequence Counter
for the updated group key. The WTP will set the TSC for for the updated group key. The WTP will set the TSC for
broadcast/multicast frames to this value for the updated group broadcast/multicast frames to this value for the updated group
key. key.
QOS: An 8-bit value specifying the default QOS policy for the WTP QOS: An 8-bit value specifying the default QOS policy for the WTP
to apply to network traffic received for a non-WMM enabled STA. to apply to network traffic received for a non-WMM enabled STA.
The following values are supported: The following enumerated values are supported:
0 - Best Effort 0 - Best Effort
1 - Video 1 - Video
2 - Voice 2 - Voice
3 - Background 3 - Background
Auth Type: An 8-bit value specifying the supported authentication Auth Type: An 8-bit value specifying the supported authentication
type. type.
The following values are supported: The following enumerated values are supported:
0 - Open System 0 - Open System
1 - WEP Shared Key 1 - WEP Shared Key
MAC Mode: This field specifies whether the WTP should support the MAC Mode: This field specifies whether the WTP should support the
WLAN in Local or Split MAC modes. Note that the AC MUST NOT WLAN in Local or Split MAC modes. Note that the AC MUST NOT
request a mode of operation that was not advertised by the WTP request a mode of operation that was not advertised by the WTP
during the discovery process (see Section 4.6.46 in [3]). The during the discovery process (see Section 4.6.46 in
following values are supported: [I-D.ietf-capwap-protocol-specification]). The following
enumerated values are supported:
0 - Local-MAC: Service for the WLAN is to be provided in Local 0 - Local-MAC: Service for the WLAN is to be provided in Local
MAC mode. MAC mode.
1 - Split-MAC: Service for the WLAN is to be provided in Split 1 - Split-MAC: Service for the WLAN is to be provided in Split
MAC mode. MAC mode.
Tunnel Mode: This field specifies the frame tunneling type to be Tunnel Mode: This field specifies the frame tunneling type to be
used for 802.11 data frames from all stations associated with the used for 802.11 data frames from all stations associated with the
WLAN. The AC MUST NOT request a mode of operation that was not WLAN. The AC MUST NOT request a mode of operation that was not
advertised by the WTP during the discovery process (see Section advertised by the WTP during the discovery process (see Section
4.6.43 in [3]). IEEE 802.11 management frames SHALL be tunneled 4.6.43 in [I-D.ietf-capwap-protocol-specification]). IEEE 802.11
using 802.11 Tunnel mode. The following values are supported: management frames SHALL be tunneled using 802.11 Tunnel mode. The
following enumerated values are supported:
0 - Local Bridging: All user traffic is to be locally bridged. 0 - Local Bridging: All user traffic is to be locally bridged.
1 - 802.3 Tunnel: All user traffic is to be tunneled to the AC 1 - 802.3 Tunnel: All user traffic is to be tunneled to the AC
in 802.3 format (see Section 4.3 in [3]). in 802.3 format (see Section 4.3 in
[I-D.ietf-capwap-protocol-specification]).
2 - 802.11 Tunnel: All user traffic is to be tunneled to the AC 2 - 802.11 Tunnel: All user traffic is to be tunneled to the AC
in 802.11 format. in 802.11 format.
Supress SSID: A boolean indicating whether the SSID is to be Supress SSID: A boolean indicating whether the SSID is to be
advertised by the WTP. A value of zero suppresses the SSID in the advertised by the WTP. A value of zero suppresses the SSID in the
802.11 Beacon and Probe Response frames, while a value of one will 802.11 Beacon and Probe Response frames, while a value of one will
cause the WTP to populate the field. cause the WTP to populate the field.
SSID: The SSID attribute is the service set identifier that will be SSID: The SSID attribute is the service set identifier that will be
advertised by the WTP for this WLAN. advertised by the WTP for this WLAN. The SSID field contains any
ASCII character and MUST NOT exceed 32 octets in length, as
defined in [IEEE.802-11.2007].
6.2. IEEE 802.11 Antenna 6.2. IEEE 802.11 Antenna
The IEEE 802.11 Antenna message element is communicated by the WTP to The IEEE 802.11 Antenna message element is communicated by the WTP to
the AC to provide information on the antennas available. The AC MAY the AC to provide information on the antennas available. The AC MAY
use this element to reconfigure the WTP's antennas. The message use this element to reconfigure the WTP's antennas. The message
element contains the following fields: element contains the following fields:
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | Diversity | Combiner | Antenna Cnt | | Radio ID | Diversity | Combiner | Antenna Cnt |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Antenna Selection [0..N] | | Antenna Selection...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+
Type: 1025 for IEEE 802.11 Antenna Type: 1025 for IEEE 802.11 Antenna
Length: >= 5 Length: >= 5
Radio ID: An 8-bit value representing the radio to configure. Radio ID: An 8-bit value representing the radio to configure.
Diversity: An 8-bit value specifying whether the antenna is to Diversity: An 8-bit value specifying whether the antenna is to
provide receive diversity. The value of this field is the same as provide receive diversity. The value of this field is the same as
the IEEE 802.11 dot11DiversitySelectionRx MIB element, see [2]. the IEEE 802.11 dot11DiversitySelectionRx MIB element, see
The following values are supported: [IEEE.802-11.2007]. The following enumerated values are
supported:
0 - Disabled 0 - Disabled
1 - Enabled (may only be true if the antenna can be used as a 1 - Enabled (may only be true if the antenna can be used as a
receive antenna) receive antenna)
Combiner: An 8-bit value specifying the combiner selection. The Combiner: An 8-bit value specifying the combiner selection. The
following values are supported: following values are supported:
1 - Sectorized (Left) 1 - Sectorized (Left)
skipping to change at page 29, line 4 skipping to change at page 31, line 36
1 - Enabled (may only be true if the antenna can be used as a 1 - Enabled (may only be true if the antenna can be used as a
receive antenna) receive antenna)
Combiner: An 8-bit value specifying the combiner selection. The Combiner: An 8-bit value specifying the combiner selection. The
following values are supported: following values are supported:
1 - Sectorized (Left) 1 - Sectorized (Left)
2 - Sectorized (Right) 2 - Sectorized (Right)
3 - Omni 3 - Omni
4 - MIMO 4 - Multiple Input/Multiple Output (MIMO)
Antenna Count: An 8-bit value specifying the number of Antenna Antenna Count: An 8-bit value specifying the number of Antenna
Selection fields. This value SHOULD be the same as the one found Selection fields. This value SHOULD be the same as the one found
in the IEEE 802.11 dot11CurrentTxAntenna MIB element (see [2]). in the IEEE 802.11 dot11CurrentTxAntenna MIB element (see
[IEEE.802-11.2007]).
Antenna Selection: One 8-bit antenna configuration value per Antenna Selection: One 8-bit antenna configuration value per
antenna in the WTP. The following values are supported: antenna in the WTP, containing up to 255 antennas. The following
enumerated values are supported:
1 - Internal Antenna 1 - Internal Antenna
2 - External Antenna 2 - External Antenna
6.3. IEEE 802.11 Assigned WTP BSSID 6.3. IEEE 802.11 Assigned WTP BSSID
The IEEE 802.11 Assigned WTP BSSID is only included by the WTP when The IEEE 802.11 Assigned WTP BSSID is only included by the WTP when
the IEEE 802.11 WLAN Configuration Request included the IEEE 802.11 the IEEE 802.11 WLAN Configuration Request included the IEEE 802.11
Add WLAN message element. The BSSID value field of this message Add WLAN message element. The BSSID value field of this message
skipping to change at page 29, line 41 skipping to change at page 32, line 31
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | WLAN ID | BSSID | Radio ID | WLAN ID | BSSID
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| BSSID | | BSSID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1026 for IEEE 802.11 Assigned WTP BSSID Type: 1026 for IEEE 802.11 Assigned WTP BSSID
Length: 6 Length: 8
Radio ID: An 8-bit value representing the radio. Radio ID: An 8-bit value representing the radio.
WLAN ID: An 8-bit value specifying the WLAN Identifier. WLAN ID: An 8-bit value specifying the WLAN Identifier.
BSSID: The BSSID assigned by the WTP for the WLAN created as a BSSID: The BSSID assigned by the WTP for the WLAN created as a
result of receiving an IEEE 802.11 Add WLAN. result of receiving an IEEE 802.11 Add WLAN.
6.4. IEEE 802.11 Delete WLAN 6.4. IEEE 802.11 Delete WLAN
skipping to change at page 30, line 16 skipping to change at page 33, line 4
The IEEE 802.11 Delete WLAN message element is used to inform the WTP The IEEE 802.11 Delete WLAN message element is used to inform the WTP
that a previously created WLAN is to be deleted, and contains the that a previously created WLAN is to be deleted, and contains the
following fields: following fields:
0 1 0 1
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | WLAN ID | | Radio ID | WLAN ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1027 for IEEE 802.11 Delete WLAN Type: 1027 for IEEE 802.11 Delete WLAN
Length: 3 Length: 2
Radio ID: An 8-bit value representing the radio Radio ID: An 8-bit value representing the radio
WLAN ID: An 8-bit value specifying the WLAN Identifier WLAN ID: An 8-bit value specifying the WLAN Identifier
6.5. IEEE 802.11 Direct Sequence Control 6.5. IEEE 802.11 Direct Sequence Control
The IEEE 802.11 Direct Sequence Control message element is a bi- The IEEE 802.11 Direct Sequence Control message element is a bi-
directional element. When sent by the WTP, it contains the current directional element. When sent by the WTP, it contains the current
state. When sent by the AC, the WTP MUST adhere to the values state. When sent by the AC, the WTP MUST adhere to the values
skipping to change at page 31, line 6 skipping to change at page 33, line 40
Length: 8 Length: 8
Radio ID: An 8-bit value representing the radio to configure. Radio ID: An 8-bit value representing the radio to configure.
Reserved: All implementations complying with this protocol MUST set Reserved: All implementations complying with this protocol MUST set
to zero any bits that are reserved in the version of the protocol to zero any bits that are reserved in the version of the protocol
supported by that implementation. Receivers MUST ignore all bits supported by that implementation. Receivers MUST ignore all bits
not defined for the version of the protocol they support. not defined for the version of the protocol they support.
Current Channel: This attribute contains the current operating Current Channel: This attribute contains the current operating
frequency channel of the DSSS PHY. This value comes from the IEEE frequency channel of the Direct Sequence Spread Spectrum (DSSS)
802.11 dot11CurrentChannel MIB element (see [2]). PHY. This value comes from the IEEE 802.11 dot11CurrentChannel
MIB element (see [IEEE.802-11.2007]).
Current CCA: The current CCA method in operation, whose value can Current CCA: The current Clear Channel Assessment (CCA) method in
be found in the IEEE 802.11 dot11CCAModeSupported MIB element (see operation, whose value can be found in the IEEE 802.11
[2]). Valid values are: dot11CCAModeSupported MIB element (see [IEEE.802-11.2007]). Valid
values are:
1 - energy detect only (edonly) 1 - energy detect only (edonly)
2 - carrier sense only (csonly) 2 - carrier sense only (csonly)
4 - carrier sense and energy detect (edandcs) 4 - carrier sense and energy detect (edandcs)
8 - carrier sense with timer (cswithtimer) 8 - carrier sense with timer (cswithtimer)
16 - high rate carrier sense and energy detect (hrcsanded) 16 - high rate carrier sense and energy detect (hrcsanded)
Energy Detect Threshold: The current Energy Detect Threshold being Energy Detect Threshold: The current Energy Detect Threshold being
used by the DSSS PHY. The value can be found in the IEEE 802.11 used by the DSSS PHY. The value can be found in the IEEE 802.11
dot11EDThreshold MIB element (see [2]). dot11EDThreshold MIB element (see [IEEE.802-11.2007]).
6.6. IEEE 802.11 Information Element 6.6. IEEE 802.11 Information Element
The IEEE 802.11 Information Element is used to communicate any IE The IEEE 802.11 Information Element is used to communicate any IE
defined in the IEEE 802.11 protocol. The data field contains the raw defined in the IEEE 802.11 protocol. The data field contains the raw
IE as it would be included within an IEEE 802.11 MAC management IE as it would be included within an IEEE 802.11 MAC management
message. message.
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | WLAN ID |B|P| Flags |Info Element... | Radio ID | WLAN ID |B|P| Reserved |Info Element...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1029 for IEEE 802.11 Information Element Type: 1029 for IEEE 802.11 Information Element
Length: >= 2 Length: >= 4
Radio ID: An 8-bit value representing the radio. Radio ID: An 8-bit value representing the radio.
WLAN ID: An 8-bit value specifying the WLAN Identifier. WLAN ID: An 8-bit value specifying the WLAN Identifier.
B: When set, the WTP is to include the information element in IEEE B: When set, the WTP is to include the information element in IEEE
802.11 Beacons associated with the WLAN. 802.11 Beacons associated with the WLAN.
P: When set, the WTP is to include the information element in Probe P: When set, the WTP is to include the information element in Probe
Responses associated with the WLAN. Responses associated with the WLAN.
Flags: All implementations complying with this protocol MUST set to Reserved: All implementations complying with this protocol MUST set
zero any bits that are reserved in the version of the protocol to zero any bits that are reserved in the version of the protocol
supported by that implementation. Receivers MUST ignore all bits supported by that implementation. Receivers MUST ignore all bits
not defined for the version of the protocol they support. not defined for the version of the protocol they support.
Info Element: The IEEE 802.11 Information Element, which includes Info Element: The IEEE 802.11 Information Element, which includes
the type, length and value field. the type, length and value field.
6.7. IEEE 802.11 MAC Operation 6.7. IEEE 802.11 MAC Operation
The IEEE 802.11 MAC Operation message element is sent by the AC to The IEEE 802.11 MAC Operation message element is sent by the AC to
set the IEEE 802.11 MAC parameters on the WTP, and contains the set the IEEE 802.11 MAC parameters on the WTP, and contains the
skipping to change at page 32, line 46 skipping to change at page 35, line 38
Length: 16 Length: 16
Radio ID: An 8-bit value representing the radio to configure. Radio ID: An 8-bit value representing the radio to configure.
Reserved: All implementations complying with this protocol MUST set Reserved: All implementations complying with this protocol MUST set
to zero any bits that are reserved in the version of the protocol to zero any bits that are reserved in the version of the protocol
supported by that implementation. Receivers MUST ignore all bits supported by that implementation. Receivers MUST ignore all bits
not defined for the version of the protocol they support. not defined for the version of the protocol they support.
RTS Threshold: This attribute indicates the number of octets in an RTS Threshold: This attribute indicates the number of octets in an
MPDU, below which an RTS/CTS handshake MUST NOT be performed. An MAC Protocol Data Unit (MPDU), below which an Request To Send/
RTS/CTS handshake MUST be performed at the beginning of any frame Clear To Send (RTS/CTS) handshake MUST NOT be performed. An RTS/
CTS handshake MUST be performed at the beginning of any frame
exchange sequence where the MPDU is of type Data or Management, exchange sequence where the MPDU is of type Data or Management,
the MPDU has an individual address in the Address1 field, and the the MPDU has an individual address in the Address1 field, and the
length of the MPDU is greater than this threshold. Setting this length of the MPDU is greater than this threshold. Setting this
attribute to be larger than the maximum MSDU size MUST have the attribute to be larger than the maximum MSDU size MUST have the
effect of turning off the RTS/CTS handshake for frames of Data or effect of turning off the RTS/CTS handshake for frames of Data or
Management type transmitted by this STA. Setting this attribute Management type transmitted by this STA. Setting this attribute
to zero MUST have the effect of turning on the RTS/CTS handshake to zero MUST have the effect of turning on the RTS/CTS handshake
for all frames of Data or Management type transmitted by this STA. for all frames of Data or Management type transmitted by this STA.
The default value of this attribute MUST be 2347. The value of The default value of this attribute MUST be 2347. The value of
this field comes from the IEEE 802.11 dot11RTSThreshold MIB this field comes from the IEEE 802.11 dot11RTSThreshold MIB
element, (see [2]). element, (see [IEEE.802-11.2007]).
Short Retry: This attribute indicates the maximum number of Short Retry: This attribute indicates the maximum number of
transmission attempts of a frame, the length of which is less than transmission attempts of a frame, the length of which is less than
or equal to RTSThreshold, that MUST be made before a failure or equal to RTSThreshold, that MUST be made before a failure
condition is indicated. The default value of this attribute MUST condition is indicated. The default value of this attribute MUST
be 7. The value of this field comes from the IEEE 802.11 be 7. The value of this field comes from the IEEE 802.11
dot11ShortRetryLimit MIB element, (see [2]). dot11ShortRetryLimit MIB element, (see [IEEE.802-11.2007]).
Long Retry: This attribute indicates the maximum number of Long Retry: This attribute indicates the maximum number of
transmission attempts of a frame, the length of which is greater transmission attempts of a frame, the length of which is greater
than dot11RTSThreshold, that MUST be made before a failure than dot11RTSThreshold, that MUST be made before a failure
condition is indicated. The default value of this attribute MUST condition is indicated. The default value of this attribute MUST
be 4. The value of this field comes from the IEEE 802.11 be 4. The value of this field comes from the IEEE 802.11
dot11LongRetryLimit MIB element, (see [2]). dot11LongRetryLimit MIB element, (see [IEEE.802-11.2007]).
Fragmentation Threshold: This attribute specifies the current Fragmentation Threshold: This attribute specifies the current
maximum size, in octets, of the MPDU that MAY be delivered to the maximum size, in octets, of the MPDU that MAY be delivered to the
PHY. An MSDU MUST be broken into fragments if its size exceeds PHY. A MAC Service Data Unit (MSDU) MUST be broken into fragments
the value of this attribute after adding MAC headers and trailers. if its size exceeds the value of this attribute after adding MAC
An MSDU or MMPDU MUST be fragmented when the resulting frame has headers and trailers. An MSDU or MAC Management Protocol Data
an individual address in the Address1 field, and the length of the Unit (MMPDU) MUST be fragmented when the resulting frame has an
individual address in the Address1 field, and the length of the
frame is larger than this threshold. The default value for this frame is larger than this threshold. The default value for this
attribute MUST be the lesser of 2346 or the aMPDUMaxLength of the attribute MUST be the lesser of 2346 or the aMPDUMaxLength of the
attached PHY and MUST never exceed the lesser of 2346 or the attached PHY and MUST never exceed the lesser of 2346 or the
aMPDUMaxLength of the attached PHY. The value of this attribute aMPDUMaxLength of the attached PHY. The value of this attribute
MUST never be less than 256. The value of this field comes from MUST never be less than 256. The value of this field comes from
the IEEE 802.11 dot11FragmentationThreshold MIB element, (see the IEEE 802.11 dot11FragmentationThreshold MIB element, (see
[2]). [IEEE.802-11.2007]).
Tx MSDU Lifetime: This attribute specifies the elapsed time in TU, Tx MSDU Lifetime: This attribute specifies the elapsed time in TU,
after the initial transmission of an MSDU, after which further after the initial transmission of an MSDU, after which further
attempts to transmit the MSDU MUST be terminated. The default attempts to transmit the MSDU MUST be terminated. The default
value of this attribute MUST be 512. The value of this field value of this attribute MUST be 512. The value of this field
comes from the IEEE 802.11 dot11MaxTransmitMSDULifetime MIB comes from the IEEE 802.11 dot11MaxTransmitMSDULifetime MIB
element, (see [2]). element, (see [IEEE.802-11.2007]).
Rx MSDU Lifetime: This attribute specifies the elapsed time in TU, Rx MSDU Lifetime: This attribute specifies the elapsed time in TU,
after the initial reception of a fragmented MMPDU or MSDU, after after the initial reception of a fragmented MMPDU or MSDU, after
which further attempts to reassemble the MMPDU or MSDU MUST be which further attempts to reassemble the MMPDU or MSDU MUST be
terminated. The default value MUST be 512. The value of this terminated. The default value MUST be 512. The value of this
field comes from the IEEE 802.11 dot11MaxReceiveLifetime MIB field comes from the IEEE 802.11 dot11MaxReceiveLifetime MIB
element, (see [2]). element, (see [IEEE.802-11.2007]).
6.8. IEEE 802.11 MIC Countermeasures 6.8. IEEE 802.11 MIC Countermeasures
The IEEE 802.11 MIC Countermeasures message element is sent by the The IEEE 802.11 MIC Countermeasures message element is sent by the
WTP to the AC to indicate the occurrence of a MIC failure. For more WTP to the AC to indicate the occurrence of a MIC failure. For more
information on MIC failure events, see the information on MIC failure events, see the
dot11RSNATKIPCounterMeasuresInvoked MIB element definition in [2]. dot11RSNATKIPCounterMeasuresInvoked MIB element definition in
[IEEE.802-11.2007].
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | WLAN ID | MAC Address | | Radio ID | WLAN ID | MAC Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MAC Address | | MAC Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1031 for IEEE 802.11 MIC Countermeasures Type: 1031 for IEEE 802.11 MIC Countermeasures
skipping to change at page 35, line 18 skipping to change at page 38, line 13
Radio ID: An 8-bit value representing the radio to configure. Radio ID: An 8-bit value representing the radio to configure.
Reserved: All implementations complying with this protocol MUST set Reserved: All implementations complying with this protocol MUST set
to zero any bits that are reserved in the version of the protocol to zero any bits that are reserved in the version of the protocol
supported by that implementation. Receivers MUST ignore all bits supported by that implementation. Receivers MUST ignore all bits
not defined for the version of the protocol they support. not defined for the version of the protocol they support.
First Channnel #: This attribute indicates the value of the lowest First Channnel #: This attribute indicates the value of the lowest
channel number in the sub-band for the associated domain country channel number in the sub-band for the associated domain country
string. The value of this field comes from the IEEE 802.11 string. The value of this field comes from the IEEE 802.11
dot11FirstChannelNumber MIB element (see [2]). dot11FirstChannelNumber MIB element (see [IEEE.802-11.2007]).
Number of Channels: This attribute indicates the value of the total Number of Channels: This attribute indicates the value of the total
number of channels allowed in the sub-band for the associated number of channels allowed in the sub-band for the associated
domain country string. The value of this field comes from the domain country string. The value of this field comes from the
IEEE 802.11 dot11NumberofChannels MIB element (see [2]). IEEE 802.11 dot11NumberofChannels MIB element (see
[IEEE.802-11.2007]).
Max Tx Power Level: This attribute indicates the maximum transmit Max Tx Power Level: This attribute indicates the maximum transmit
power, in dBm, allowed in the sub-band for the associated domain power, in dBm, allowed in the sub-band for the associated domain
country string. The value of this field comes from the IEEE country string. The value of this field comes from the IEEE
802.11 dot11MaximumTransmitPowerLevel MIB element (see [2]). 802.11 dot11MaximumTransmitPowerLevel MIB element (see
[IEEE.802-11.2007]).
6.10. IEEE 802.11 OFDM Control 6.10. IEEE 802.11 OFDM Control
The IEEE 802.11 OFDM Control message element is a bi-directional The IEEE 802.11 Orthogonal Frequency Division Multiplexing (OFDM)
element. When sent by the WTP, it contains the current state. When Control message element is a bi-directional element. When sent by
sent by the AC, the WTP MUST adhere to the received values. This the WTP, it contains the current state. When sent by the AC, the WTP
message element is only used for 802.11a radios and contains the MUST adhere to the received values. This message element is only
following fields: used for 802.11a radios and contains the following fields:
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | Reserved | Current Chan | Band Support | | Radio ID | Reserved | Current Chan | Band Support |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| TI Threshold | | TI Threshold |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1033 for IEEE 802.11 OFDM Control Type: 1033 for IEEE 802.11 OFDM Control
skipping to change at page 36, line 4 skipping to change at page 38, line 46
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | Reserved | Current Chan | Band Support | | Radio ID | Reserved | Current Chan | Band Support |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| TI Threshold | | TI Threshold |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1033 for IEEE 802.11 OFDM Control Type: 1033 for IEEE 802.11 OFDM Control
Length: 8 Length: 8
Radio ID: An 8-bit value representing the radio to configure. Radio ID: An 8-bit value representing the radio to configure.
Reserved: All implementations complying with this protocol MUST set Reserved: All implementations complying with this protocol MUST set
to zero any bits that are reserved in the version of the protocol to zero any bits that are reserved in the version of the protocol
supported by that implementation. Receivers MUST ignore all bits supported by that implementation. Receivers MUST ignore all bits
not defined for the version of the protocol they support. not defined for the version of the protocol they support.
Current Channel: This attribute contains the current operating Current Channel: This attribute contains the current operating
frequency channel of the OFDM PHY. The value of this field comes frequency channel of the OFDM PHY. The value of this field comes
from the IEEE 802.11 dot11CurrentFrequency MIB element (see [2]). from the IEEE 802.11 dot11CurrentFrequency MIB element (see
[IEEE.802-11.2007]).
Band Supported: The capability of the OFDM PHY implementation to Band Supported: The capability of the OFDM PHY implementation to
operate in the three U-NII bands. The value of this field comes operate in the three U-NII bands. The value of this field comes
from the IEEE 802.11 dot11FrequencyBandsSupported MIB element (see from the IEEE 802.11 dot11FrequencyBandsSupported MIB element (see
[2]), coded as an integer value of a three bit field as follows: [IEEE.802-11.2007]), coded as a bit field, whose values are:
Bit 0 - capable of operating in the lower (5.15-5.25 GHz) U-NII Bit 0 - capable of operating in the 5.15-5.25 GHz band
band
Bit 1 - capable of operating in the middle (5.25-5.35 GHz) U-NII Bit 1 - capable of operating in the 5.25-5.35 GHz band
band
Bit 2 - capable of operating in the upper (5.725-5.825 GHz) U-NII Bit 2 - capable of operating in the 5.725-5.825 GHz band
band
Bit 3 - capable of operating in the 5.47-5.725 GHz band
Bit 4 - capable of operating in the lower Japanese 5.25 GHz band
Bit 5 - capable of operating in the 5.03-5.091 GHz band
Bit 6 - capable of operating in the 4.94-4.99 GHz band
For example, for an implementation capable of operating in the For example, for an implementation capable of operating in the
lower and mid bands this attribute would take the value 3. 5.15-5.35 GHz bands this attribute would take the value 3.
TI Threshold: The Threshold being used to detect a busy medium TI Threshold: The Threshold being used to detect a busy medium
(frequency). CCA MUST report a busy medium upon detecting the (frequency). CCA MUST report a busy medium upon detecting the
RSSI above this threshold. The value of this field comes from the RSSI above this threshold. The value of this field comes from the
IEEE 802.11 dot11TIThreshold MIB element (see [2]). IEEE 802.11 dot11TIThreshold MIB element (see [IEEE.802-11.2007]).
6.11. IEEE 802.11 Rate Set 6.11. IEEE 802.11 Rate Set
The rate set message element value is sent by the AC and contains the The rate set message element value is sent by the AC and contains the
supported operational rates. It contains the following fields. supported operational rates. It contains the following fields.
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | Rate Set... | Radio ID | Rate Set...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1034 for IEEE 802.11 Rate Set
Type: 1034 for IEEE 802.11 Rate Set
Length: >= 3 Length: >= 3
Radio ID: An 8-bit value representing the radio to configure. Radio ID: An 8-bit value representing the radio to configure.
Rate Set: The AC generates the Rate Set that the WTP is to include Rate Set: The AC generates the Rate Set that the WTP is to include
in its Beacon and Probe messages. The length of this field is in its Beacon and Probe messages. The length of this field is
between 2 and 8 bytes. The value of this field comes from the between 2 and 8 bytes. The value of this field comes from the
IEEE 802.11 dot11OperationalRateSet MIB element (see [2]). IEEE 802.11 dot11OperationalRateSet MIB element (see
[IEEE.802-11.2007]).
6.12. IEEE 802.11 RSNA Error Report From Station 6.12. IEEE 802.11 RSNA Error Report From Station
The IEEE 802.11 RSN Error Report From Station message element is used The IEEE 802.11 RSN Error Report From Station message element is used
by a WTP to send RSN error reports to the AC. The WTP does not need by a WTP to send RSN error reports to the AC. The WTP does not need
to transmit any reports that do not include any failures. The fields to transmit any reports that do not include any failures. The fields
from this message element come from the IEEE 802.11 from this message element come from the IEEE 802.11
Dot11RSNAStatsEntry table, see [2]. Dot11RSNAStatsEntry table, see [IEEE.802-11.2007].
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Client MAC Address | | Client MAC Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Client MAC Address | BSSID | | Client MAC Address | BSSID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| BSSID | | BSSID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
skipping to change at page 38, line 4 skipping to change at page 40, line 45
| TKIP Local MIC Failures | | TKIP Local MIC Failures |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| TKIP Remote MIC Failures | | TKIP Remote MIC Failures |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| CCMP Replays | | CCMP Replays |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| CCMP Decrypt Errors | | CCMP Decrypt Errors |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| TKIP Replays | | TKIP Replays |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1035 for IEEE 802.11 RSNA Error Report From Station
Length: 14 Type: 1035 for IEEE 802.11 RSNA Error Report From Station
Length: 40
Client MAC Address: The Client MAC Address of the station. Client MAC Address: The Client MAC Address of the station.
BSSID: The BSSID on which the failures are being reported on. BSSID: The BSSID on which the failures are being reported on.
Radio ID: The Radio Identifier, typically refers to some interface Radio ID: The Radio Identifier, typically refers to some interface
index on the WTP index on the WTP
WLAN ID: The WLAN ID on which the RSNA failures are being reported. WLAN ID: The WLAN ID on which the RSNA failures are being reported.
Reserved: All implementations complying with this protocol MUST set Reserved: All implementations complying with this protocol MUST set
to zero any bits that are reserved in the version of the protocol to zero any bits that are reserved in the version of the protocol
supported by that implementation. Receivers MUST ignore all bits supported by that implementation. Receivers MUST ignore all bits
not defined for the version of the protocol they support. not defined for the version of the protocol they support.
TKIP ICV Errors: A 32-bit value representing the number of TKIP ICV TKIP ICV Errors: A 32-bit value representing the number of Temporal
errors encountered when decrypting packets from the station. The Key Integrity Protocol (TKIP) (as defined in [IEEE.802-11.2007])
value of this field comes from the IEEE 802.11 ICV errors encountered when decrypting packets from the station.
dot11RSNAStatsTKIPICVErrors MIB element (see [2]). The value of this field comes from the IEEE 802.11
dot11RSNAStatsTKIPICVErrors MIB element (see [IEEE.802-11.2007]).
TKIP Local MIC Failures: A 32-bit value representing the number of TKIP Local MIC Failures: A 32-bit value representing the number of
MIC failures encountered when checking the integrity of packets MIC failures encountered when checking the integrity of packets
received from the station. The value of this field comes from the received from the station. The value of this field comes from the
IEEE 802.11 dot11RSNAStatsTKIPLocalMICFailures MIB element (see IEEE 802.11 dot11RSNAStatsTKIPLocalMICFailures MIB element (see
[2]). [IEEE.802-11.2007]).
TKIP Remote MIC Failures: A 32-bit value representing the number of TKIP Remote MIC Failures: A 32-bit value representing the number of
MIC failures reported by the station encountered (possibly via the MIC failures reported by the station encountered (possibly via the
EAPOL-Key frame). The value of this field comes from the IEEE EAPOL-Key frame). The value of this field comes from the IEEE
802.11 dot11RSNAStatsTKIPRemoteMICFailures MIB element (see [2]). 802.11 dot11RSNAStatsTKIPRemoteMICFailures MIB element (see
[IEEE.802-11.2007]).
CCMP Replays: A 32-bit value representing the number of CCMP MPDUs CCMP Replays: A 32-bit value representing the number of CCMP MPDUs
discarded by the replay detection mechanism. The value of this discarded by the replay detection mechanism. The value of this
field comes from the IEEE 802.11 dot11RSNACCMPReplays MIB element field comes from the IEEE 802.11 dot11RSNACCMPReplays MIB element
(see [2]). (see [IEEE.802-11.2007]).
CCMP Decrypt Errors: A 32-bit value representing the number of CCMP CCMP Decrypt Errors: A 32-bit value representing the number of CCMP
MDPUs discarded by the decryption algorithm. The value of this MDPUs discarded by the decryption algorithm. The value of this
field comes from the IEEE 802.11 dot11RSNACCMPDecryptErrors MIB field comes from the IEEE 802.11 dot11RSNACCMPDecryptErrors MIB
element (see [2]). element (see [IEEE.802-11.2007]).
TKIP Replays: A 32-bit value representing the number of TKIP TKIP Replays: A 32-bit value representing the number of TKIP
Replays detected in frames received from the station. The value Replays detected in frames received from the station. The value
of this field comes from the IEEE 802.11 dot11RSNAStatsTKIPReplays of this field comes from the IEEE 802.11 dot11RSNAStatsTKIPReplays
MIB element (see [2]). MIB element (see [IEEE.802-11.2007]).
6.13. IEEE 802.11 Station 6.13. IEEE 802.11 Station
The IEEE 802.11 Station message element accompanies the Add Station The IEEE 802.11 Station message element accompanies the Add Station
message element, and is used to deliver IEEE 802.11 station policy message element, and is used to deliver IEEE 802.11 station policy
from the AC to the WTP. from the AC to the WTP.
The latest IEEE 802.11 Station message element overrides any The latest IEEE 802.11 Station message element overrides any
previously received message elements. previously received message elements.
skipping to change at page 39, line 32 skipping to change at page 42, line 32
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MAC Address | | MAC Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MAC Address | Capabilities | | MAC Address | Capabilities |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| WLAN ID |Supported Rates| | WLAN ID |Supported Rates|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1036 for IEEE 802.11 Station Type: 1036 for IEEE 802.11 Station
Length: >= 8 Length: >= 14
Radio ID: An 8-bit value representing the radio Radio ID: An 8-bit value representing the radio
Association ID: A 16-bit value specifying the IEEE 802.11 Association ID: A 16-bit value specifying the IEEE 802.11
Association Identifier Association Identifier
Flags: All implementations complying with this protocol MUST set to Flags: All implementations complying with this protocol MUST set to
zero any bits that are reserved in the version of the protocol zero any bits that are reserved in the version of the protocol
supported by that implementation. Receivers MUST ignore all bits supported by that implementation. Receivers MUST ignore all bits
not defined for the version of the protocol they support. not defined for the version of the protocol they support.
MAC Address: The station's MAC Address MAC Address: The station's MAC Address
Capabilities: A 16-bit field containing the IEEE 802.11 Capabilities: A 16-bit field containing the IEEE 802.11
Capabilities Information Field to use with the station. Capabilities Information Field to use with the station.
WLAN ID: An 8-bit value specifying the WLAN Identifier WLAN ID: An 8-bit value specifying the WLAN Identifier
Supported Rates: The variable length field containing the supported Supported Rates: The variable length field containing the supported
rates to be used with the station, as found in the IEEE 802.11 rates to be used with the station, as found in the IEEE 802.11
dot11OperationalRateSet MIB element (see [2]). dot11OperationalRateSet MIB element (see [IEEE.802-11.2007]).
This field MUST NOT exceed 126 octets and specifies the set of
data rates at which the station may transmit data, where each
octet represents a data rate.
6.14. IEEE 802.11 Station QoS Profile 6.14. IEEE 802.11 Station QoS Profile
The IEEE 802.11 Station QoS Profile message element contains the The IEEE 802.11 Station QoS Profile message element contains the
maximum IEEE 802.11e priority tag that may be used by the station. maximum IEEE 802.11e priority tag that may be used by the station.
Any packet received that exceeds the value encoded in this message Any packet received that exceeds the value encoded in this message
element MUST either be dropped or tagged using the maximum value element MUST either be dropped or tagged using the maximum value
permitted by to the user. The priority tag MUST be between zero (0) permitted by to the user. The priority tag MUST be between zero (0)
and seven (7). This message element MUST NOT be present without the and seven (7). This message element MUST NOT be present without the
IEEE 802.11 Station (see Section 6.13) message element IEEE 802.11 Station (see Section 6.13) message element
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MAC Address | | MAC Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MAC Address | 802.1P Precedence Tag | | MAC Address | 802.1p Priority Tag |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1037 for IEEE 802.11 Station QOS Profile Type: 1037 for IEEE 802.11 Station QOS Profile
Length: 8 Length: 8
MAC Address: The station's MAC Address MAC Address: The station's MAC Address
802.1P Precedence Tag: The maximum 802.1P precedence value that the 802.1p Priority Tag: The maximum 802.1p priority value that the WTP
WTP will allow in the TID field in the extended 802.11e QOS Data will allow in the Traffic Identifier (TID) field in the extended
header. 802.11e QOS Data header. Only the three least significant bits of
this field are valid, while the remaining bits MUST be set to zero
(0).
6.15. IEEE 802.11 Station Session Key 6.15. IEEE 802.11 Station Session Key
The IEEE 802.11 Station Session Key message element is sent when the The IEEE 802.11 Station Session Key message element is sent when the
AC determines that encryption of a station must be performed in the AC determines that encryption of a station must be performed in the
WTP. This message element MUST NOT be present without the IEEE WTP. This message element MUST NOT be present without the IEEE
802.11 Station (see Section 6.13) message element, and MUST NOT be 802.11 Station (see Section 6.13) message element, and MUST NOT be
sent if the WTP had not specifically advertised support for the sent if the WTP had not specifically advertised support for the
requested encryption scheme. requested encryption scheme.
The RSN information element MUST sent along with the IEEE 802.11 The RSN information element MUST sent along with the IEEE 802.11
Station Session Key in order to instruct the WTP on the usage of the Station Session Key in order to instruct the WTP on the usage of the
Key field. The AKM field of the RSM information element is used by Key field. The AKM field of the RSM information element is used by
the WTP to identify the authentication protocol. the WTP to identify the authentication protocol.
If the IEEE 802.11 Station Session Key message element's AKM-Only bit If the IEEE 802.11 Station Session Key message element's AKM-Only bit
is set, the WTP MUST drop all IEEE 802.11 packets that are not part is set, the WTP MUST drop all IEEE 802.11 packets that are not part
of the AKM (e.g., EAP). Note that AKM-Only is MAY be set while an of the Authentication and Key Management (AKM), such as EAP. Note
encryption key is in force, requiring that the AKM packets be that AKM-Only is MAY be set while an encryption key is in force,
encrypted. Once the station has successfully completed requiring that the AKM packets be encrypted. Once the station has
authentication via the AKM, the AC MUST send a new Add Station successfully completed authentication via the AKM, the AC MUST send a
message element to remove the AKM-Only restriction, and optionally new Add Station message element to remove the AKM-Only restriction,
push the session key down to the WTP. and optionally push the session key down to the WTP.
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MAC Address | | MAC Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MAC Address |A|C| Flags | | MAC Address |A|C| Flags |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Pairwise TSC | | Pairwise TSC |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
skipping to change at page 43, line 4 skipping to change at page 45, line 27
unicast packets received from the station. unicast packets received from the station.
Key: The key the WTP is to use when encrypting traffic to/from the Key: The key the WTP is to use when encrypting traffic to/from the
station. For dynamically created keys, this is commonly known as station. For dynamically created keys, this is commonly known as
a Pairwise Transient Key (PTK). a Pairwise Transient Key (PTK).
6.16. IEEE 802.11 Statistics 6.16. IEEE 802.11 Statistics
The IEEE 802.11 Statistics message element is sent by the WTP to The IEEE 802.11 Statistics message element is sent by the WTP to
transmit its current statistics, and contains the following fields. transmit its current statistics, and contains the following fields.
All of the fields in this message element are set to zero upon WTP
initialization. The fields will roll over when they reach their
maximum value of 65535. Due to the nature of each counter
representing different data points, the roll over event will vary
greatly across each field. Applications or human operators using
these counters need to be aware about the minimal possible times
between rollover events in order to make sure that no consecutive
rollover events are missed.
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | Reserved | | Radio ID | Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Tx Fragment Count | | Tx Fragment Count |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Multicast Tx Count | | Multicast Tx Count |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
skipping to change at page 44, line 6 skipping to change at page 47, line 6
| Associated Station Count | | Associated Station Count |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| QoS CF Polls Received Count | | QoS CF Polls Received Count |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| QoS CF Polls Unused Count | | QoS CF Polls Unused Count |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| QoS CF Polls Unusable Count | | QoS CF Polls Unusable Count |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1039 for IEEE 802.11 Statistics Type: 1039 for IEEE 802.11 Statistics
Length: 60 Length: 80
Radio ID: An 8-bit value representing the radio. Radio ID: An 8-bit value representing the radio.
Reserved: All implementations complying with this protocol MUST set Reserved: All implementations complying with this protocol MUST set
to zero any bits that are reserved in the version of the protocol to zero any bits that are reserved in the version of the protocol
supported by that implementation. Receivers MUST ignore all bits supported by that implementation. Receivers MUST ignore all bits
not defined for the version of the protocol they support. not defined for the version of the protocol they support.
Tx Fragment Count: A 32-bit value representing the number of Tx Fragment Count: A 32-bit value representing the number of
fragmented frames transmitted. The value of this field comes from fragmented frames transmitted. The value of this field comes from
the IEEE 802.11 dot11TransmittedFragmentCount MIB element (see the IEEE 802.11 dot11TransmittedFragmentCount MIB element (see
[2]). [IEEE.802-11.2007]).
Multicast Tx Count: A 32-bit value representing the number of Multicast Tx Count: A 32-bit value representing the number of
multicast frames transmitted. The value of this field comes from multicast frames transmitted. The value of this field comes from
the IEEE 802.11 dot11MulticastTransmittedFrameCount MIB element the IEEE 802.11 dot11MulticastTransmittedFrameCount MIB element
(see [2]). (see [IEEE.802-11.2007]).
Failed Count: A 32-bit value representing the transmit excessive Failed Count: A 32-bit value representing the transmit excessive
retries. The value of this field comes from the IEEE 802.11 retries. The value of this field comes from the IEEE 802.11
dot11FailedCount MIB element (see [2]). dot11FailedCount MIB element (see [IEEE.802-11.2007]).
Retry Count: A 32-bit value representing the number of transmit Retry Count: A 32-bit value representing the number of transmit
retries. The value of this field comes from the IEEE 802.11 retries. The value of this field comes from the IEEE 802.11
dot11RetryCount MIB element (see [2]). dot11RetryCount MIB element (see [IEEE.802-11.2007]).
Multiple Retry Count: A 32-bit value representing the number of Multiple Retry Count: A 32-bit value representing the number of
transmits that required more than one retry. The value of this transmits that required more than one retry. The value of this
field comes from the IEEE 802.11 dot11MultipleRetryCount MIB field comes from the IEEE 802.11 dot11MultipleRetryCount MIB
element (see [2]). element (see [IEEE.802-11.2007]).
Frame Duplicate Count: A 32-bit value representing the duplicate Frame Duplicate Count: A 32-bit value representing the duplicate
frames received. The value of this field comes from the IEEE frames received. The value of this field comes from the IEEE
802.11 dot11FrameDuplicateCount MIB element (see [2]). 802.11 dot11FrameDuplicateCount MIB element (see
[IEEE.802-11.2007]).
RTS Success Count: A 32-bit value representing the number of RTS Success Count: A 32-bit value representing the number of
successfully transmitted Ready To Send (RTS). The value of this successfully transmitted Ready To Send (RTS). The value of this
field comes from the IEEE 802.11 dot11RTSSuccessCount MIB element field comes from the IEEE 802.11 dot11RTSSuccessCount MIB element
(see [2]). (see [IEEE.802-11.2007]).
RTS Failure Count: A 32-bit value representing the failed RTS Failure Count: A 32-bit value representing the failed
transmitted RTS. The value of this field comes from the IEEE transmitted RTS. The value of this field comes from the IEEE
802.11 dot11RTSFailureCount MIB element (see [2]). 802.11 dot11RTSFailureCount MIB element (see [IEEE.802-11.2007]).
ACK Failure Count: A 32-bit value representing the number of failed ACK Failure Count: A 32-bit value representing the number of failed
acknowledgements. The value of this field comes from the IEEE acknowledgements. The value of this field comes from the IEEE
802.11 dot11ACKFailureCount MIB element (see [2]). 802.11 dot11ACKFailureCount MIB element (see [IEEE.802-11.2007]).
Rx Fragment Count: A 32-bit value representing the number of Rx Fragment Count: A 32-bit value representing the number of
fragmented frames received. The value of this field comes from fragmented frames received. The value of this field comes from
the IEEE 802.11 dot11ReceivedFragmentCount MIB element (see [2]). the IEEE 802.11 dot11ReceivedFragmentCount MIB element (see
[IEEE.802-11.2007]).
Multicast RX Count: A 32-bit value representing the number of Multicast RX Count: A 32-bit value representing the number of
multicast frames received. The value of this field comes from the multicast frames received. The value of this field comes from the
IEEE 802.11 dot11MulticastReceivedFrameCount MIB element (see IEEE 802.11 dot11MulticastReceivedFrameCount MIB element (see
[2]). [IEEE.802-11.2007]).
FCS Error Count: A 32-bit value representing the number of FCS FCS Error Count: A 32-bit value representing the number of FCS
failures. The value of this field comes from the IEEE 802.11 failures. The value of this field comes from the IEEE 802.11
dot11FCSErrorCount MIB element (see [2]). dot11FCSErrorCount MIB element (see [IEEE.802-11.2007]).
Decryption Errors: A 32-bit value representing the number of Decryption Errors: A 32-bit value representing the number of
Decryption errors that occurred on the WTP. Note that this field Decryption errors that occurred on the WTP. Note that this field
is only valid in cases where the WTP provides encryption/ is only valid in cases where the WTP provides encryption/
decryption services. The value of this field comes from the IEEE decryption services. The value of this field comes from the IEEE
802.11 dot11WEPUndecryptableCount MIB element (see [2]). 802.11 dot11WEPUndecryptableCount MIB element (see
[IEEE.802-11.2007]).
Discarded QoS Fragment Count: A 32-bit value representing the Discarded QoS Fragment Count: A 32-bit value representing the
number of discarded QoS fragments received. The value of this number of discarded QoS fragments received. The value of this
field comes from the IEEE 802.11 dot11QoSDiscardedFragmentCount field comes from the IEEE 802.11 dot11QoSDiscardedFragmentCount
MIB element (see [2]). MIB element (see [IEEE.802-11.2007]).
Associated Station Count: A 32-bit value representing the number of Associated Station Count: A 32-bit value representing the number of
number of associated stations. The value of this field comes from number of associated stations. The value of this field comes from
the IEEE 802.11 dot11AssociatedStationCount MIB element (see [2]). the IEEE 802.11 dot11AssociatedStationCount MIB element (see
[IEEE.802-11.2007]).
QoS CF Polls Received Count: A 32-bit value representing the number QoS CF Polls Received Count: A 32-bit value representing the number
of (+)CF-Polls received. The value of this field comes from the of (+)CF-Polls received. The value of this field comes from the
IEEE 802.11 dot11QosCFPollsReceivedCount MIB element (see [2]). IEEE 802.11 dot11QosCFPollsReceivedCount MIB element (see
[IEEE.802-11.2007]).
QoS CF Polls Unused Count: A 32-bit value representing the number QoS CF Polls Unused Count: A 32-bit value representing the number
of (+)CF-Polls that have been received, but not used. The value of (+)CF-Polls that have been received, but not used. The value
of this field comes from the IEEE 802.11 of this field comes from the IEEE 802.11
dot11QosCFPollsUnusedCount MIB element (see [2]). dot11QosCFPollsUnusedCount MIB element (see [IEEE.802-11.2007]).
QoS CF Polls Unusable Count: A 32-bit value representing the number QoS CF Polls Unusable Count: A 32-bit value representing the number
of (+)CF-Polls that have been received, but could not be used due of (+)CF-Polls that have been received, but could not be used due
to the TXOP size being smaller than the time that is required for to the Transmission Opportunity (TXOP) size being smaller than the
one frame exchange sequence. The value of this field comes from time that is required for one frame exchange sequence. The value
the IEEE 802.11 dot11QosCFPollsUnusableCount MIB element (see of this field comes from the IEEE 802.11
[2]). dot11QosCFPollsUnusableCount MIB element (see [IEEE.802-11.2007]).
6.17. IEEE 802.11 Supported Rates 6.17. IEEE 802.11 Supported Rates
The IEEE 802.11 Supported Rates message element is sent by the WTP to The IEEE 802.11 Supported Rates message element is sent by the WTP to
indicate the rates that it supports, and contains the following indicate the rates that it supports, and contains the following
fields. fields.
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
skipping to change at page 46, line 43 skipping to change at page 50, line 4
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | Reserved | Current Tx Power | | Radio ID | Reserved | Current Tx Power |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1041 for IEEE 802.11 Tx Power Type: 1041 for IEEE 802.11 Tx Power
Length: 4 Length: 4
Radio ID: An 8-bit value representing the radio to configure. Radio ID: An 8-bit value representing the radio to configure.
Reserved: All implementations complying with this protocol MUST set Reserved: All implementations complying with this protocol MUST set
to zero any bits that are reserved in the version of the protocol to zero any bits that are reserved in the version of the protocol
supported by that implementation. Receivers MUST ignore all bits supported by that implementation. Receivers MUST ignore all bits
not defined for the version of the protocol they support. not defined for the version of the protocol they support.
Current Tx Power: This attribute contains the current transmit Current Tx Power: This attribute contains the current transmit
output power in mW, as described in the dot11CurrentTxPowerLevel output power in mW, as described in the dot11CurrentTxPowerLevel
MIB variable, see [2]. MIB variable, see [IEEE.802-11.2007].
6.19. IEEE 802.11 Tx Power Level 6.19. IEEE 802.11 Tx Power Level
The IEEE 802.11 Tx Power Level message element is sent by the WTP and The IEEE 802.11 Tx Power Level message element is sent by the WTP and
contains the different power levels supported. The values found in contains the different power levels supported. The values found in
this message element are found in the IEEE 802.11 this message element are found in the IEEE 802.11
Dot11PhyTxPowerEntry MIB table, see [2]. Dot11PhyTxPowerEntry MIB table, see [IEEE.802-11.2007].
The value field contains the following: The value field contains the following:
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | Num Levels | Power Level [n] | | Radio ID | Num Levels | Power Level [n] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1042 for IEEE 802.11 Tx Power Level Type: 1042 for IEEE 802.11 Tx Power Level
Length: >= 4 Length: >= 4
Radio ID: An 8-bit value representing the radio to configure. Radio ID: An 8-bit value representing the radio to configure.
Num Levels: The number of power level attributes. The value of Num Levels: The number of power level attributes. The value of
this field comes from the IEEE 802.11 this field comes from the IEEE 802.11
dot11NumberSupportedPowerLevels MIB element (see [2]). dot11NumberSupportedPowerLevels MIB element (see
[IEEE.802-11.2007]).
Power Level: Each power level fields contains a supported power Power Level: Each power level fields contains a supported power
level, in mW. The value of this field comes from the level, in mW. The value of this field comes from the
corresponding IEEE 802.11 dot11TxPowerLevel[n] MIB element, see corresponding IEEE 802.11 dot11TxPowerLevel[n] MIB element, see
[2]. [IEEE.802-11.2007].
6.20. IEEE 802.11 Update Station QoS 6.20. IEEE 802.11 Update Station QoS
The IEEE 802.11 Update Station QoS message element is used to change The IEEE 802.11 Update Station QoS message element is used to change
the Quality of Service policy on the WTP for a given station. the Quality of Service policy on the WTP for a given station.
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | MAC Address | | Radio ID | MAC Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MAC Address | DSCP Tag | 802.1P Tag | | MAC Address | DSCP Tag | 802.1p Tag |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1043 for IEEE 802.11 Update Station QoS Type: 1043 for IEEE 802.11 Update Station QoS
Length: 8 Length: 8
Radio ID: The Radio Identifier, typically refers to some interface Radio ID: The Radio Identifier, typically refers to some interface
index on the WTP index on the WTP
MAC Address: The station's MAC Address. MAC Address: The station's MAC Address.
DSCP Tag: The DSCP label to use if packets are to be DSCP tagged. DSCP Tag: The DSCP label to use if packets are to be DSCP tagged.
skipping to change at page 48, line 15 skipping to change at page 51, line 24
Length: 8 Length: 8
Radio ID: The Radio Identifier, typically refers to some interface Radio ID: The Radio Identifier, typically refers to some interface
index on the WTP index on the WTP
MAC Address: The station's MAC Address. MAC Address: The station's MAC Address.
DSCP Tag: The DSCP label to use if packets are to be DSCP tagged. DSCP Tag: The DSCP label to use if packets are to be DSCP tagged.
802.1P Tag: The 802.1P precedence value to use if packets are to be 802.1p Tag: The 802.1p priority value to use if packets are to be
IEEE 802.1P tagged. IEEE 802.1p tagged. Only the three least significant bits of this
field are valid, while the remaining bits MUST be set to zero (0).
6.21. IEEE 802.11 Update WLAN 6.21. IEEE 802.11 Update WLAN
The IEEE 802.11 Update WLAN message element is used by the AC to The IEEE 802.11 Update WLAN message element is used by the AC to
define a wireless LAN on the WTP. The inclusion of this message define a wireless LAN on the WTP. The inclusion of this message
element MUST also include the IEEE 802.11 Information Element message element MUST also include the IEEE 802.11 Information Element message
element, containing the following 802.11 IEs: element, containing the following 802.11 IEs:
Power Capability information element Power Capability information element
skipping to change at page 49, line 4 skipping to change at page 52, line 14
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | WLAN ID | Capability | | Radio ID | WLAN ID | Capability |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Key Index | Key Status | Key Length | | Key Index | Key Status | Key Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Key... | | Key... |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1044 for IEEE 802.11 Update WLAN Type: 1044 for IEEE 802.11 Update WLAN
Length: 43 Length: 40
Radio ID: An 8-bit value representing the radio. Radio ID: An 8-bit value representing the radio.
WLAN ID: An 8-bit value specifying the WLAN Identifier. WLAN ID: An 8-bit value specifying the WLAN Identifier.
Capability: A 16-bit value containing the capabilities information Capability: A 16-bit value containing the capabilities information
field to be advertised by the WTP within the Probe and Beacon field to be advertised by the WTP within the Probe and Beacon
messages. messages.
Key-Index: The Key Index associated with the key. Key-Index: The Key Index associated with the key.
Key Status: A 1 byte value that specifies the state and usage of Key Status: A 1 byte value that specifies the state and usage of
the key that has been included. The following values describe the the key that has been included. The following values describe the
key usage and its status: key usage and its status:
0 - A value of zero, with the inclusion of the RSN Information 0 - A value of zero, with the inclusion of the RSN Information
Element means that the WLAN uses per-station encryption keys, and Element means that the WLAN uses per-station encryption keys,
therefore the key in the 'Key' field is only used for multicast and therefore the key in the 'Key' field is only used for
traffic. multicast traffic.
1 - When set to one, the WLAN employs a shared WEP key, also known 1 - When set to one, the WLAN employs a shared WEP key, also
as a static WEP key, and uses the encryption key for both unicast known as a static WEP key, and uses the encryption key for both
and multicast traffic for all stations. unicast and multicast traffic for all stations.
2 - The value of 2 indicates that the AC will begin rekeying the GTK 2 - The value of 2 indicates that the AC will begin rekeying the
with the STA's in the BSS. It is only valid when IEEE 802.11 is GTK with the STA's in the BSS. It is only valid when IEEE
enabled as the security policy for the BSS. 802.11 is enabled as the security policy for the BSS.
3 - The value of 3 indicates that the AC has completed rekeying the 3 - The value of 3 indicates that the AC has completed rekeying
GTK and broadcast packets no longer need to be duplicated and the GTK and broadcast packets no longer need to be duplicated
transmitted with both GTK's. and transmitted with both GTK's.
Key Length: A 16-bit value representing the length of the Key Key Length: A 16-bit value representing the length of the Key
field. field.
Key: A 32 byte Session Key to use to provide data privacy. For Key: A 32 byte Session Key to use to provide data privacy. For
static WEP keys, which is true when the 'Key Status' bit is set to static WEP keys, which is true when the 'Key Status' bit is set to
one, this key is used for both unicast and multicast traffic. For one, this key is used for both unicast and multicast traffic. For
encryption schemes that employ a separate encryption key for encryption schemes that employ a separate encryption key for
unicast and multicast traffic, the key included here only applies unicast and multicast traffic, the key included here only applies
to multicast data, and the cipher suite is specified in an to multicast data, and the cipher suite is specified in an
accompanied RSN Information Element. In these scenarios, the key, accompanied RSN Information Element. In these scenarios, the key,
and cipher information, is communicated via the Add Station and cipher information, is communicated via the Add Station
message element, see Section 4.6.8 in [3]. message element, see Section 4.6.8 in
[I-D.ietf-capwap-protocol-specification].
6.22. IEEE 802.11 WTP Quality of Service 6.22. IEEE 802.11 WTP Quality of Service
The IEEE 802.11 WTP Quality of Service message element value is sent The IEEE 802.11 WTP Quality of Service message element value is sent
by the AC to the WTP to communicate quality of service configuration by the AC to the WTP to communicate quality of service configuration
information. information.
0 1 0 1
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | Tag Packets | | Radio ID | Tag Packets |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1045 for IEEE 802.11 WTP Quality of Service Type: 1045 for IEEE 802.11 WTP Quality of Service
Length: >= 2 Length: 34
Radio ID: The Radio Identifier, typically refers to some interface Radio ID: The Radio Identifier, typically refers to some interface
index on the WTP index on the WTP
Tag Packets: A value indicating whether CAPWAP packets should be Tag Packets: A bit field indicating whether CAPWAP packets should
tagged for QoS purposes. The following values are currently be tagged for QoS purposes. The following bit values are
supported: currently supported:
0 - Untagged 0 - Untagged
1 - 802.1P 1 - 802.1p
2 - DSCP 2 - DSCP
Immediately following the above header is the following data Immediately following the above header is the following data
structure. This data structure will be repeated five times; once structure. This data structure will be repeated four times; once
for every QoS profile. The order of the QoS profiles are Voice, for every QoS profile. The order of the QoS profiles are Voice,
Video, Best Effort and Background. Video, Best Effort and Background.
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Queue Depth | CWMin | CWMax | | Queue Depth | CWMin | CWMax |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| CWMax | AIFS | Dot1P Tag | DSCP Tag | | CWMax | AIFS | 802.1p Tag | DSCP Tag |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Queue Depth: The number of packets that can be on the specific QoS Queue Depth: The number of packets that can be on the specific QoS
transmit queue at any given time. transmit queue at any given time.
CWMin: The Contention Window minimum value for the QoS transmit CWMin: The Contention Window minimum (CWmin) value for the QoS
queue. The value of this field comes from the IEEE 802.11 transmit queue. The value of this field comes from the IEEE
dot11EDCATableCWMin MIB element (see [2]). 802.11 dot11EDCATableCWMin MIB element (see [IEEE.802-11.2007]).
CWMax: The Contention Window maximum value for the QoS transmit CWMax: The Contention Window maximum (CWmax) value for the QoS
queue. The value of this field comes from the IEEE 802.11 transmit queue. The value of this field comes from the IEEE
dot11EDCATableCWMax MIB element (see [2]). 802.11 dot11EDCATableCWMax MIB element (see [IEEE.802-11.2007]).
AIFS: The Arbitration Inter Frame Spacing to use for the QoS AIFS: The Arbitration Inter Frame Spacing (AIFS) to use for the QoS
transmit queue. The value of this field comes from the IEEE transmit queue. The value of this field comes from the IEEE
802.11 dot11EDCATableAIFSN MIB element (see [2]). 802.11 dot11EDCATableAIFSN MIB element (see [IEEE.802-11.2007]).
Dot1P Tag: The 802.1P precedence value to use if packets are to be 802.1p Tag: The 802.1p priority value to use if packets are to be
802.1P tagged. 802.1p tagged. Only the three least significant bits of this
field are valid, while the remaining bits MUST be set to zero (0).
DSCP Tag: The DSCP label to use if packets are to be DSCP tagged. DSCP Tag: The DSCP label to use if packets are to be DSCP tagged.
6.23. IEEE 802.11 WTP Radio Configuration 6.23. IEEE 802.11 WTP Radio Configuration
The IEEE 802.11 WTP WLAN Radio Configuration message element is used The IEEE 802.11 WTP WLAN Radio Configuration message element is used
by the AC to configure a Radio on the WTP, and by the WTP to deliver by the AC to configure a Radio on the WTP, and by the WTP to deliver
its radio configuration to the AC. The message element value its radio configuration to the AC. The message element value
contains the following fields: contains the following fields:
skipping to change at page 51, line 40 skipping to change at page 55, line 4
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID |Short Preamble| Num of BSSIDs | DTIM Period | | Radio ID |Short Preamble| Num of BSSIDs | DTIM Period |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| BSSID | | BSSID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| BSSID | Beacon Period | | BSSID | Beacon Period |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Country Code | | Country Code |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1046 for IEEE 802.11 WTP WLAN Radio Configuration Type: 1046 for IEEE 802.11 WTP WLAN Radio Configuration
Length: 16 Length: 16
Radio ID: An 8-bit value representing the radio to configure. Radio ID: An 8-bit value representing the radio to configure.
Short Preamble: An 8-bit value indicating whether short preamble is Short Preamble: An 8-bit value indicating whether short preamble is
supported. The following values are currently supported: supported. The following enumerated values are currently
supported:
0 - Short preamble not supported. 0 - Short preamble not supported.
1 - Short preamble is supported. 1 - Short preamble is supported.
BSSID: The WLAN Radio's base MAC Address. BSSID: The WLAN Radio's base MAC Address.
Number of BSSIDs: This attribute contains the maximum number of Number of BSSIDs: This attribute contains the maximum number of
BSSIDs supported by the WTP. This value restricts the number of BSSIDs supported by the WTP. This value restricts the number of
logical networks supported by the WTP, and is between 1 and 16. logical networks supported by the WTP, and is between 1 and 16.
DTIM Period: This attribute specifies the number of beacon DTIM Period: This attribute specifies the number of beacon
intervals that elapse between transmission of Beacons frames intervals that elapse between transmission of Beacons frames
containing a TIM element whose DTIM Count field is 0. This value containing a Traffic Indication Map (TIM) element whose Delivery
is transmitted in the DTIM Period field of Beacon frames. The Traffic Indication Message (DTIM) Count field is 0. This value is
value of this field comes from the IEEE 802.11 dot11DTIMPeriod MIB transmitted in the DTIM Period field of Beacon frames. The value
element (see [2]). of this field comes from the IEEE 802.11 dot11DTIMPeriod MIB
element (see [IEEE.802-11.2007]).
Beacon Period: This attribute specifies the number of TU that a Beacon Period: This attribute specifies the number of Time Unit
station uses for scheduling Beacon transmissions. This value is (TU) that a station uses for scheduling Beacon transmissions.
transmitted in Beacon and Probe Response frames. The value of This value is transmitted in Beacon and Probe Response frames.
this field comes from the IEEE 802.11 dot11BeaconPeriod MIB The value of this field comes from the IEEE 802.11
element (see [2]). dot11BeaconPeriod MIB element (see [IEEE.802-11.2007]).
Country Code: This attribute identifies the country in which the Country Code: This attribute identifies the country in which the
station is operating. The value of this field comes from the IEEE station is operating. The value of this field comes from the IEEE
802.11 dot11CountryString MIB element (see [2]). Special 802.11 dot11CountryString MIB element (see [IEEE.802-11.2007]).
attention is required with use of this field, as implementations Some regulatory domains do not allow WTPs to have user
which take action based on this field could violate regulatory configurable country codes, and require that it be a fixed value
requirements. Some regulatory bodies do permit configuration of during the manufacturing process. Therefore, WTP vendors that
the country code under certain restrictions, such as the FCC, when wish to allow for the configuration of this field will need to
WTPs are certified as Software Defined Radios. validate this behavior during its radio certification process.
Other WTP vendors may simply wish to treat this WTP configuration
parameter as read-only. The country codes can be found in
[ISO.3166.1984].
The WTP and AC MAY ignore the value of this field, depending upon The WTP and AC MAY ignore the value of this field, depending upon
regulatory requirements, for example to avoid classification as a regulatory requirements, for example to avoid classification as a
Software Defined Radio. When this field is used, the first two Software Defined Radio. When this field is used, the first two
octets of this string is the two character country code as octets of this string is the two character country code as
described in document ISO/IEC 3166- 1, and the third octet MUST described in document ISO/IEC 3166- 1, and the third octet MUST
have the value 1, 2 or 3 as defined below. When the value of the have the value 1, 2 or 3 as defined below. When the value of the
third octet is 255, the country code field is not used, and MUST third octet is 255, the country code field is not used, and MUST
be ignored. be ignored.
skipping to change at page 53, line 27 skipping to change at page 56, line 43
| Radio ID | Type | Status | Pad | | Radio ID | Type | Status | Pad |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1047 for IEEE 802.11 WTP Radio Fail Alarm Indication Type: 1047 for IEEE 802.11 WTP Radio Fail Alarm Indication
Length: 4 Length: 4
Radio ID: The Radio Identifier, typically refers to some interface Radio ID: The Radio Identifier, typically refers to some interface
index on the WTP index on the WTP
Type: The type of radio failure detected. The following values are Type: The type of radio failure detected. The following enumerated
supported: values are supported:
1 - Receiver 1 - Receiver
2 - Transmitter 2 - Transmitter
Status: An 8-bit boolean indicating whether the radio failure is Status: An 8-bit boolean indicating whether the radio failure is
being reported or cleared. A value of zero is used to clear the being reported or cleared. A value of zero is used to clear the
event, while a value of one is used to report the event. event, while a value of one is used to report the event.
Pad: All implementations complying with version zero of this Pad: All implementations complying with version zero of this
protocol MUST set these bits to zero. Receivers MUST ignore all protocol MUST set these bits to zero. Receivers MUST ignore all
bits not defined for the version of the protocol they support. bits not defined for the version of the protocol they support.
6.25. IEEE 802.11 WTP Radio Information 6.25. IEEE 802.11 WTP Radio Information
skipping to change at page 54, line 22 skipping to change at page 57, line 39
| Radio Type | | Radio Type |
+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+
Type: 1048 for IEEE 802.11 WTP Radio Information Type: 1048 for IEEE 802.11 WTP Radio Information
Length: 5 Length: 5
Radio ID: The Radio Identifier, which typically refers to an Radio ID: The Radio Identifier, which typically refers to an
interface index on the WTP interface index on the WTP
Radio Type: The type of radio present. Note this bit field can be Radio Type: The type of radio present. Note this is a bit field
used to specify support for more than a single type of PHY/MAC. which is used to specify support for more than a single type of
The following values are supported: PHY/MAC. The following bit values are supported:
1 - 802.11b: An IEEE 802.11b radio. 1 - 802.11b: An IEEE 802.11b radio.
2 - 802.11a: An IEEE 802.11a radio. 2 - 802.11a: An IEEE 802.11a radio.
4 - 802.11g: An IEEE 802.11g radio. 4 - 802.11g: An IEEE 802.11g radio.
8 - 802.11n: An IEEE 802.11n radio. 8 - 802.11n: An IEEE 802.11n radio.
0xOF - 802.11b, 802.11a, 802.11g and 802.11n: The 4 radio types
indicated are supported in the WTP.
7. IEEE 802.11 Binding WTP Saved Variables 7. IEEE 802.11 Binding WTP Saved Variables
This section contains the IEEE 802.11 binding specific variables that This section contains the IEEE 802.11 binding specific variables that
SHOULD be saved in non-volatile memory on the WTP. SHOULD be saved in non-volatile memory on the WTP.
7.1. IEEE80211AntennaInfo 7.1. IEEE80211AntennaInfo
The WTP per radio antenna configuration, defined in Section 6.2. The WTP per radio antenna configuration, defined in Section 6.2.
7.2. IEEE80211DSControl 7.2. IEEE80211DSControl
skipping to change at page 55, line 26 skipping to change at page 59, line 26
The WTP per radio Direct Sequence Control configuration, defined in The WTP per radio Direct Sequence Control configuration, defined in
Section 6.5. Section 6.5.
7.3. IEEE80211MACOperation 7.3. IEEE80211MACOperation
The WTP per radio MAC Operation configuration, defined in The WTP per radio MAC Operation configuration, defined in
Section 6.7. Section 6.7.
7.4. IEEE80211OFDMControl 7.4. IEEE80211OFDMControl
The WTP per radio MAC Operation configuration, defined in The WTP per radio OFDM MAC Operation configuration, defined in
Section 6.10. Section 6.10.
7.5. IEEE80211Rateset 7.5. IEEE80211Rateset
The WTP per radio Basic Rate Set configuration, defined in The WTP per radio Basic Rate Set configuration, defined in
Section 6.11. Section 6.11.
7.6. IEEE80211TxPower 7.6. IEEE80211TxPower
The WTP per radio Transmit Power configuration, defined in The WTP per radio Transmit Power configuration, defined in
skipping to change at page 56, line 11 skipping to change at page 60, line 11
7.8. IEEE80211RadioConfig 7.8. IEEE80211RadioConfig
The WTP per radio Radio Configuration, defined in Section 6.23. The WTP per radio Radio Configuration, defined in Section 6.23.
8. Technology Specific Message Element Values 8. Technology Specific Message Element Values
This section lists IEEE 802.11 specific values for the generic CAPWAP This section lists IEEE 802.11 specific values for the generic CAPWAP
message elements which include fields whose values are technology message elements which include fields whose values are technology
specific. specific.
8.1. WTP Descriptor Message Element, Encryption Capabilities Field:
IEEE 802.11 uses the following values: IEEE 802.11 uses the following values:
4 - Encrypt AES-CCMP 128: WTP supports AES-CCMP, as defined in [4]. 4 - Encrypt AES-CCMP 128: WTP supports AES-CCMP, as defined in
[IEEE.802-11.2007].
5 - Encrypt TKIP-MIC: WTP supports TKIP and Michael, as defined in 5 - Encrypt TKIP-MIC: WTP supports TKIP and Michael, as defined in
[7]. [IEEE.802-11.2007] and [WPA], respectively.
9. Security Considerations 9. Security Considerations
This section describes security considerations for using IEEE 802.11 This section describes security considerations for using IEEE 802.11
with the CAPWAP protocol. with the CAPWAP protocol.
9.1. IEEE 802.11 Security 9.1. IEEE 802.11 Security
When used with an IEEE 802.11 infrastructure with WEP encryption, the When used with an IEEE 802.11 infrastructure with WEP encryption, the
CAPWAP protocol does not add any new vulnerabilities. Derived CAPWAP protocol does not add any new vulnerabilities. Derived
session keys between the STA and WTP can be compromised, resulting in session keys between the STA and WTP can be compromised, resulting in
many well-documented attacks. Implementers SHOULD discourage the use many well-documented attacks. Implementers SHOULD discourage the use
of WEP and encourage use of technically sound cryptographic solutions of WEP and encourage use of technically sound cryptographic solutions
such as those in an IEEE 802.11 RSN. such as those in an IEEE 802.11 RSN.
STA authentication is performed using IEEE 802.lX, and consequently STA authentication is performed using IEEE 802.lX, and consequently
EAP. Implementers SHOULD use EAP methods meeting the requirements EAP. Implementers SHOULD use EAP methods meeting the requirements
specified [5]. specified [RFC4017].
When used with IEEE 802.11 RSN security, the CAPWAP protocol may When used with IEEE 802.11 RSN security, the CAPWAP protocol may
introduce new vulnerabilities, depending on whether the link security introduce new vulnerabilities, depending on whether the link security
(packet encryption and integrity verification) is provided by the WTP (packet encryption and integrity verification) is provided by the WTP
or the AC. When the link security function is provided by the AC, no or the AC. When the link security function is provided by the AC, no
new security concerns are introduced. new security concerns are introduced.
However, when the WTP provides link security, a new vulnerability However, when the WTP provides link security, a new vulnerability
will exist when the following conditions are true: will exist when the following conditions are true:
skipping to change at page 59, line 7 skipping to change at page 63, line 7
providing the exact KeyRSC value is not warranted. That is, this providing the exact KeyRSC value is not warranted. That is, this
specification provides for a calculated risk in this regard. specification provides for a calculated risk in this regard.
The AC SHOULD use an RSC of 0 when computing message-3 of the 4-way The AC SHOULD use an RSC of 0 when computing message-3 of the 4-way
802.11i handshake, unless the AC has knowledge of a more optimal RSC 802.11i handshake, unless the AC has knowledge of a more optimal RSC
value to use. Mechanisms for determining a more optimal RSC value value to use. Mechanisms for determining a more optimal RSC value
are outside the scope of this specification. are outside the scope of this specification.
10. IANA Considerations 10. IANA Considerations
There are no IANA Considerations. 10.1. CAPWAP Message Types
This specification defines two new Message Types used in the CAPWAP
header. These values are defined in Section 3.
10.2. CAPWAP Control Message Type
This specification defines 27 new Message Types used in the CAPWAP
header. These values are defined in Figure 8.
10.3. IEEE 802.11 Key Status
The Key Status field in the IEEE 802.11 Add WLAN message element (see
Section 6.1) and IEEE 802.11 Update WLAN message element (see
Section 6.21) is used to provide information about the status of the
keying exchange. This document defines four values, and the
remaining values are controlled and maintained by IANA and requires a
Standards Action.
10.4. IEEE 802.11 QoS
The QoS field in the IEEE 802.11 Add WLAN message element (see
Section 6.1) is used to configure a QoS policy for the WLAN. This
document defines four values, and the remaining values are controlled
and maintained by IANA and requires a Standards Action.
10.5. IEEE 802.11 Auth Type
The Auth Type field in the IEEE 802.11 Add WLAN message element (see
Section 6.1) is used to configure the IEEE 802.11 authentication
policy for the WLAN. This document defines two bits, and the
remaining bits are controlled and maintained by IANA and requires a
Standards Action.
10.6. IEEE 802.11 Antenna Combiner
The Combiner field in the IEEE 802.11 Antenna message element (see
Section 6.2) is used to provide information about the WTP's antennas.
This document defines four bits, and the remaining bits are
controlled and maintained by IANA and requires a Standards Action.
10.7. IEEE 802.11 Antenna Selection
The Antenna Selection field in the IEEE 802.11 Antenna message
element (see Section 6.2) is used to provide information about the
WTP's antennas. This document defines two values, and the remaining
values are controlled and maintained by IANA and requires a Standards
Action.
10.8. IEEE 802.11 Session Key Flags
The Flags field in the IEEE 802.11 Station Session Key message
element (see Section 6.15) is used to configure the session key
association with the mobile device. This document defines two bits,
and the remaining 14 bits are controlled and maintained by IANA and
requires a Standards Action.
10.9. IEEE 802.11 Tag Packets
The Tag Packets field in the IEEE 802.11 WTP Quality of Service
message element (see Section 6.22) is used to specify how the CAPWAP
Data Channel packets are to be tagged. This document defines two
bits, and the remaining 6 bits are controlled and maintained by IANA
and requires a Standards Action.
10.10. IEEE 802.11 WTP Radio Fail
The Type field in the IEEE 802.11 WTP Radio Fail Alarm Indication
message element (see Section 6.24) is used to provide information on
why a WTP's radio has failed. This document defines two values, and
the remaining values are controlled and maintained by IANA and
requires a Standards Action.
10.11. IEEE 802.11 WTP Radio Type
The Radio Type field in the IEEE 802.11 WTP Radio Information message
element (see Section 6.25) is used to provide information about the
WTP's radio type. This document defines four bits, and the remaining
28 bits are controlled and maintained by IANA and requires a
Standards Action.
11. Acknowledgements 11. Acknowledgements
The following individuals are acknowledged for their contributions to The following individuals are acknowledged for their contributions to
this binding specification: Puneet Agarwal, Charles Clancy, Saravanan this binding specification: Puneet Agarwal, Charles Clancy, Saravanan
Govindan, Scott Kelly, Peter Nilsson, Bob O'Hara, David Perkins and Govindan, Scott Kelly, Peter Nilsson, Bob O'Hara, David Perkins,
Margaret Wasserman. Margaret Wasserman and Yong Zhang.
12. References 12. References
12.1. Normative References 12.1. Normative References
[1] Bradner, S., "Key words for use in RFCs to Indicate Requirement [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Levels", BCP 14, RFC 2119, March 1997. Requirement Levels", BCP 14, RFC 2119, March 1997.
[2] "Information technology - Telecommunications and information [RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H.
exchange between systems - Local and metropolitan area networks Levkowetz, "Extensible Authentication Protocol (EAP)",
- Specific requirements - Part 11: Wireless LAN Medium Access RFC 3748, June 2004.
Control (MAC) and Physical Layer (PHY) specifications",
IEEE Standard 802.11, 1999,
<http://standards.ieee.org/getieee802/download/802.11-1999.pdf>.
[3] Calhoun, P., "CAPWAP Protocol Specification", [ISO.3166.1984]
draft-ietf-capwap-protocol-specification-09 (work in progress), International Organization for Standardization, "Codes for
February 2008. the Representation of Names of Countries", ISO Standard
3166, 1984.
[4] "Information technology - Telecommunications and information [FIPS.197.2001]
exchange between systems - Local and metropolitan area networks National Institute of Standards and Technology, "Advanced
- Specific requirements - Part 11: Wireless LAN Medium Access Encryption Standard (AES)", FIPS PUB 197, November 2001, <
Control (MAC) and Physical Layer (PHY) specifications Amendment http://csrc.nist.gov/publications/fips/fips197/
6: Medium Access Control (MAC) Security Enhancements", fips-197.pdf>.
IEEE Standard 802.11i, July 2004,
[IEEE.802-11.2007]
"Information technology - Telecommunications and
information exchange between systems - Local and
metropolitan area networks - Specific requirements - Part
11: Wireless LAN Medium Access Control (MAC) and Physical
Layer (PHY) specifications", IEEE Standard 802.11, 2007, <
http://standards.ieee.org/getieee802/download/
802.11-2007.pdf>.
[I-D.ietf-capwap-protocol-specification]
Calhoun, P., "CAPWAP Protocol Specification",
draft-ietf-capwap-protocol-specification-10 (work in
progress), March 2008.
[IEEE.802-1X.2004]
"Information technology - Telecommunications and
information exchange between systems - Local and
metropolitan area networks - Specific requirements - Port-
Based Network Access Control", IEEE Standard 802.1X, 2004,
<http://standards.ieee.org/getieee802/download/ <http://standards.ieee.org/getieee802/download/
802.11i-2004.pdf>. 802.1X-2004.pdf>.
[IEEE.802-1Q.2005]
"Information technology - Telecommunications and
information exchange between systems - Local and
metropolitan area networks - Specific requirements -
Virtual Bridged Local Area Networks", IEEE Standard
802.1Q, 2005, <http://standards.ieee.org/getieee802/
download/802.1Q-2005.pdf>.
12.2. Informational References 12.2. Informational References
[5] Stanley, D., Walker, J., and B. Aboba, "Extensible [RFC4017] Stanley, D., Walker, J., and B. Aboba, "Extensible
Authentication Protocol (EAP) Method Requirements for Wireless Authentication Protocol (EAP) Method Requirements for
LANs", RFC 4017, March 2005. Wireless LANs", RFC 4017, March 2005.
[6] Yang, L., Zerfos, P., and E. Sadot, "Architecture Taxonomy for [RFC4118] Yang, L., Zerfos, P., and E. Sadot, "Architecture Taxonomy
Control and Provisioning of Wireless Access Points (CAPWAP)", for Control and Provisioning of Wireless Access Points
RFC 4118, June 2005. (CAPWAP)", RFC 4118, June 2005.
[7] "WiFi Protected Access (WPA), WPAfor802.11ver3_073004.pdf", [WPA] "WiFi Protected Access (WPA),
August 2004. WPAfor802.11ver3_073004.pdf", August 2004, <www.wi-
fi.org>.
Editors' Addresses Editors' Addresses
Pat R. Calhoun Pat R. Calhoun
Cisco Systems, Inc. Cisco Systems, Inc.
170 West Tasman Drive 170 West Tasman Drive
San Jose, CA 95134 San Jose, CA 95134
Phone: +1 408-853-5269 Phone: +1 408-902-3240
Email: pcalhoun@cisco.com Email: pcalhoun@cisco.com
Michael P. Montemurro Michael P. Montemurro
Research In Motion Research In Motion
5090 Commerce Blvd 5090 Commerce Blvd
Mississauga, ON L4W 5M4 Mississauga, ON L4W 5M4
Canada Canada
Phone: +1 905-629-4746 x4999 Phone: +1 905-629-4746 x4999
Email: mmontemurro@rim.com Email: mmontemurro@rim.com
skipping to change at page 63, line 44 skipping to change at line 2863
attempt made to obtain a general license or permission for the use of attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr. http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at this standard. Please address the information to the IETF at
ietf-ipr@ietf.org. ietf-ipr@ietf.org.
Acknowledgment
Funding for the RFC Editor function is provided by the IETF
Administrative Support Activity (IASA).
 End of changes. 176 change blocks. 
385 lines changed or deleted 647 lines changed or added

This html diff was produced by rfcdiff 1.35. The latest version is available from http://tools.ietf.org/tools/rfcdiff/