draft-ietf-capwap-protocol-binding-ieee80211-10.txt   draft-ietf-capwap-protocol-binding-ieee80211-11.txt 
Network Working Group P. Calhoun, Editor Network Working Group P. Calhoun, Editor
Internet-Draft Cisco Systems, Inc. Internet-Draft Cisco Systems, Inc.
Intended status: Standards Track M. Montemurro, Editor Intended status: Standards Track M. Montemurro, Editor
Expires: March 23, 2009 Research In Motion Expires: April 17, 2009 Research In Motion
D. Stanley, Editor D. Stanley, Editor
Aruba Networks Aruba Networks
September 19, 2008 October 14, 2008
CAPWAP Protocol Binding for IEEE 802.11 CAPWAP Protocol Binding for IEEE 802.11
draft-ietf-capwap-protocol-binding-ieee80211-10 draft-ietf-capwap-protocol-binding-ieee80211-11
Status of this Memo Status of this Memo
By submitting this Internet-Draft, each author represents that any By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79. aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
skipping to change at page 1, line 37 skipping to change at page 1, line 37
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on March 23, 2009. This Internet-Draft will expire on April 17, 2009.
Abstract Abstract
Wireless LAN product architectures have evolved from single Wireless LAN product architectures have evolved from single
autonomous access points to systems consisting of a centralized autonomous access points to systems consisting of a centralized
Access Controller (AC) and Wireless Termination Points (WTPs). The Access Controller (AC) and Wireless Termination Points (WTPs). The
general goal of centralized control architectures is to move access general goal of centralized control architectures is to move access
control, including user authentication and authorization, mobility control, including user authentication and authorization, mobility
management and radio management from the single access point to a management and radio management from the single access point to a
centralized controller. centralized controller.
skipping to change at page 2, line 30 skipping to change at page 2, line 30
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 5 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.1. Goals . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.1. Goals . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2. Conventions used in this document . . . . . . . . . . . . 6 1.2. Conventions used in this document . . . . . . . . . . . . 6
1.3. Terminology . . . . . . . . . . . . . . . . . . . . . . . 6 1.3. Terminology . . . . . . . . . . . . . . . . . . . . . . . 6
2. IEEE 802.11 Binding . . . . . . . . . . . . . . . . . . . . . 8 2. IEEE 802.11 Binding . . . . . . . . . . . . . . . . . . . . . 8
2.1. CAPWAP Wireless Binding Identifier . . . . . . . . . . . 8 2.1. CAPWAP Wireless Binding Identifier . . . . . . . . . . . 8
2.2. Split MAC and Local MAC Functionality . . . . . . . . . . 8 2.2. Split MAC and Local MAC Functionality . . . . . . . . . . 8
2.2.1. Split MAC . . . . . . . . . . . . . . . . . . . . . . 8 2.2.1. Split MAC . . . . . . . . . . . . . . . . . . . . . . 8
2.2.2. Local MAC . . . . . . . . . . . . . . . . . . . . . . 13 2.2.2. Local MAC . . . . . . . . . . . . . . . . . . . . . . 13
2.3. Roaming Behavior . . . . . . . . . . . . . . . . . . . . 15 2.3. Roaming Behavior . . . . . . . . . . . . . . . . . . . . 16
2.4. Group Key Refresh . . . . . . . . . . . . . . . . . . . . 16 2.4. Group Key Refresh . . . . . . . . . . . . . . . . . . . . 17
2.5. BSSID to WLAN ID Mapping . . . . . . . . . . . . . . . . 17 2.5. BSSID to WLAN ID Mapping . . . . . . . . . . . . . . . . 18
2.6. CAPWAP Data Channel QoS Behavior . . . . . . . . . . . . 17 2.6. CAPWAP Data Channel QoS Behavior . . . . . . . . . . . . 19
2.6.1. IEEE 802.11 Data Frames . . . . . . . . . . . . . . . 17 2.6.1. IEEE 802.11 Data Frames . . . . . . . . . . . . . . . 19
2.6.2. IEEE 802.11 MAC Management Messages . . . . . . . . . 20 2.6.2. IEEE 802.11 MAC Management Messages . . . . . . . . . 22
2.7. Run State Operation . . . . . . . . . . . . . . . . . . . 21 2.7. Run State Operation . . . . . . . . . . . . . . . . . . . 22
3. IEEE 802.11 Specific CAPWAP Control Messages . . . . . . . . . 22 3. IEEE 802.11 Specific CAPWAP Control Messages . . . . . . . . . 23
3.1. IEEE 802.11 WLAN Configuration Request . . . . . . . . . 22 3.1. IEEE 802.11 WLAN Configuration Request . . . . . . . . . 23
3.2. IEEE 802.11 WLAN Configuration Response . . . . . . . . . 23 3.2. IEEE 802.11 WLAN Configuration Response . . . . . . . . . 24
4. CAPWAP Data Message Bindings . . . . . . . . . . . . . . . . . 24 4. CAPWAP Data Message Bindings . . . . . . . . . . . . . . . . . 25
5. CAPWAP Control Message bindings . . . . . . . . . . . . . . . 26 5. CAPWAP Control Message bindings . . . . . . . . . . . . . . . 27
5.1. Discovery Request Message . . . . . . . . . . . . . . . . 26 5.1. Discovery Request Message . . . . . . . . . . . . . . . . 27
5.2. Discovery Response Message . . . . . . . . . . . . . . . 26 5.2. Discovery Response Message . . . . . . . . . . . . . . . 27
5.3. Primary Discovery Request Message . . . . . . . . . . . . 26 5.3. Primary Discovery Request Message . . . . . . . . . . . . 27
5.4. Primary Discovery Response Message . . . . . . . . . . . 26 5.4. Primary Discovery Response Message . . . . . . . . . . . 27
5.5. Join Request Message . . . . . . . . . . . . . . . . . . 26 5.5. Join Request Message . . . . . . . . . . . . . . . . . . 27
5.6. Join Response Message . . . . . . . . . . . . . . . . . . 27 5.6. Join Response Message . . . . . . . . . . . . . . . . . . 28
5.7. Configuration Status Message . . . . . . . . . . . . . . 27 5.7. Configuration Status Request Message . . . . . . . . . . 28
5.8. Configuration Status Response Message . . . . . . . . . . 27 5.8. Configuration Status Response Message . . . . . . . . . . 28
5.9. Configuration Update Request Message . . . . . . . . . . 28 5.9. Configuration Update Request Message . . . . . . . . . . 29
5.10. Station Configuration Request . . . . . . . . . . . . . . 29 5.10. Station Configuration Request . . . . . . . . . . . . . . 30
5.11. Change State Event Request . . . . . . . . . . . . . . . 29 5.11. Change State Event Request . . . . . . . . . . . . . . . 30
5.12. WTP Event Request . . . . . . . . . . . . . . . . . . . . 29 5.12. WTP Event Request . . . . . . . . . . . . . . . . . . . . 30
6. IEEE 802.11 Message Element Definitions . . . . . . . . . . . 30 6. IEEE 802.11 Message Element Definitions . . . . . . . . . . . 31
6.1. IEEE 802.11 Add WLAN . . . . . . . . . . . . . . . . . . 30 6.1. IEEE 802.11 Add WLAN . . . . . . . . . . . . . . . . . . 31
6.2. IEEE 802.11 Antenna . . . . . . . . . . . . . . . . . . . 36 6.2. IEEE 802.11 Antenna . . . . . . . . . . . . . . . . . . . 37
6.3. IEEE 802.11 Assigned WTP BSSID . . . . . . . . . . . . . 37 6.3. IEEE 802.11 Assigned WTP BSSID . . . . . . . . . . . . . 38
6.4. IEEE 802.11 Delete WLAN . . . . . . . . . . . . . . . . . 38 6.4. IEEE 802.11 Delete WLAN . . . . . . . . . . . . . . . . . 39
6.5. IEEE 802.11 Direct Sequence Control . . . . . . . . . . . 38 6.5. IEEE 802.11 Direct Sequence Control . . . . . . . . . . . 39
6.6. IEEE 802.11 Information Element . . . . . . . . . . . . . 39 6.6. IEEE 802.11 Information Element . . . . . . . . . . . . . 41
6.7. IEEE 802.11 MAC Operation . . . . . . . . . . . . . . . . 40 6.7. IEEE 802.11 MAC Operation . . . . . . . . . . . . . . . . 41
6.8. IEEE 802.11 MIC Countermeasures . . . . . . . . . . . . . 42 6.8. IEEE 802.11 MIC Countermeasures . . . . . . . . . . . . . 43
6.9. IEEE 802.11 Multi-Domain Capability . . . . . . . . . . . 43 6.9. IEEE 802.11 Multi-Domain Capability . . . . . . . . . . . 44
6.10. IEEE 802.11 OFDM Control . . . . . . . . . . . . . . . . 44 6.10. IEEE 802.11 OFDM Control . . . . . . . . . . . . . . . . 45
6.11. IEEE 802.11 Rate Set . . . . . . . . . . . . . . . . . . 45 6.11. IEEE 802.11 Rate Set . . . . . . . . . . . . . . . . . . 46
6.12. IEEE 802.11 RSNA Error Report From Station . . . . . . . 45 6.12. IEEE 802.11 RSNA Error Report From Station . . . . . . . 47
6.13. IEEE 802.11 Station . . . . . . . . . . . . . . . . . . . 47 6.13. IEEE 802.11 Station . . . . . . . . . . . . . . . . . . . 49
6.14. IEEE 802.11 Station QoS Profile . . . . . . . . . . . . . 48 6.14. IEEE 802.11 Station QoS Profile . . . . . . . . . . . . . 50
6.15. IEEE 802.11 Station Session Key . . . . . . . . . . . . . 49 6.15. IEEE 802.11 Station Session Key . . . . . . . . . . . . . 51
6.16. IEEE 802.11 Statistics . . . . . . . . . . . . . . . . . 51 6.16. IEEE 802.11 Statistics . . . . . . . . . . . . . . . . . 53
6.17. IEEE 802.11 Supported Rates . . . . . . . . . . . . . . . 55 6.17. IEEE 802.11 Supported Rates . . . . . . . . . . . . . . . 57
6.18. IEEE 802.11 Tx Power . . . . . . . . . . . . . . . . . . 55 6.18. IEEE 802.11 Tx Power . . . . . . . . . . . . . . . . . . 57
6.19. IEEE 802.11 Tx Power Level . . . . . . . . . . . . . . . 56 6.19. IEEE 802.11 Tx Power Level . . . . . . . . . . . . . . . 58
6.20. IEEE 802.11 Update Station QoS . . . . . . . . . . . . . 56 6.20. IEEE 802.11 Update Station QoS . . . . . . . . . . . . . 59
6.21. IEEE 802.11 Update WLAN . . . . . . . . . . . . . . . . . 58 6.21. IEEE 802.11 Update WLAN . . . . . . . . . . . . . . . . . 60
6.22. IEEE 802.11 WTP Quality of Service . . . . . . . . . . . 61 6.22. IEEE 802.11 WTP Quality of Service . . . . . . . . . . . 64
6.23. IEEE 802.11 WTP Radio Configuration . . . . . . . . . . . 64 6.23. IEEE 802.11 WTP Radio Configuration . . . . . . . . . . . 66
6.24. IEEE 802.11 WTP Radio Fail Alarm Indication . . . . . . . 66 6.24. IEEE 802.11 WTP Radio Fail Alarm Indication . . . . . . . 68
6.25. IEEE 802.11 WTP Radio Information . . . . . . . . . . . . 66 6.25. IEEE 802.11 WTP Radio Information . . . . . . . . . . . . 69
7. IEEE 802.11 Binding WTP Saved Variables . . . . . . . . . . . 68 7. IEEE 802.11 Binding WTP Saved Variables . . . . . . . . . . . 71
7.1. IEEE80211AntennaInfo . . . . . . . . . . . . . . . . . . 68 7.1. IEEE80211AntennaInfo . . . . . . . . . . . . . . . . . . 71
7.2. IEEE80211DSControl . . . . . . . . . . . . . . . . . . . 68 7.2. IEEE80211DSControl . . . . . . . . . . . . . . . . . . . 71
7.3. IEEE80211MACOperation . . . . . . . . . . . . . . . . . . 68 7.3. IEEE80211MACOperation . . . . . . . . . . . . . . . . . . 71
7.4. IEEE80211OFDMControl . . . . . . . . . . . . . . . . . . 68 7.4. IEEE80211OFDMControl . . . . . . . . . . . . . . . . . . 71
7.5. IEEE80211Rateset . . . . . . . . . . . . . . . . . . . . 68 7.5. IEEE80211Rateset . . . . . . . . . . . . . . . . . . . . 71
7.6. IEEE80211TxPower . . . . . . . . . . . . . . . . . . . . 68 7.6. IEEE80211TxPower . . . . . . . . . . . . . . . . . . . . 71
7.7. IEEE80211QoS . . . . . . . . . . . . . . . . . . . . . . 68 7.7. IEEE80211QoS . . . . . . . . . . . . . . . . . . . . . . 71
7.8. IEEE80211RadioConfig . . . . . . . . . . . . . . . . . . 68 7.8. IEEE80211RadioConfig . . . . . . . . . . . . . . . . . . 71
8. Technology Specific Message Element Values . . . . . . . . . . 69 8. Technology Specific Message Element Values . . . . . . . . . . 72
8.1. WTP Descriptor Message Element, Encryption 8.1. WTP Descriptor Message Element, Encryption
Capabilities Field: . . . . . . . . . . . . . . . . . . . 69 Capabilities Field: . . . . . . . . . . . . . . . . . . . 72
9. Security Considerations . . . . . . . . . . . . . . . . . . . 70 9. Security Considerations . . . . . . . . . . . . . . . . . . . 73
9.1. IEEE 802.11 Security . . . . . . . . . . . . . . . . . . 70 9.1. IEEE 802.11 Security . . . . . . . . . . . . . . . . . . 73
10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 72 10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 75
10.1. CAPWAP Wireless Binding Identifier . . . . . . . . . . . 72 10.1. CAPWAP Wireless Binding Identifier . . . . . . . . . . . 75
10.2. CAPWAP IEEE 802.11 Message Types . . . . . . . . . . . . 72 10.2. CAPWAP IEEE 802.11 Message Types . . . . . . . . . . . . 75
10.3. CAPWAP Message Element Type . . . . . . . . . . . . . . . 72 10.3. CAPWAP Message Element Type . . . . . . . . . . . . . . . 75
10.4. IEEE 802.11 Key Status . . . . . . . . . . . . . . . . . 72 10.4. IEEE 802.11 Key Status . . . . . . . . . . . . . . . . . 75
10.5. IEEE 802.11 QoS . . . . . . . . . . . . . . . . . . . . . 73 10.5. IEEE 802.11 QoS . . . . . . . . . . . . . . . . . . . . . 76
10.6. IEEE 802.11 Auth Type . . . . . . . . . . . . . . . . . . 73 10.6. IEEE 802.11 Auth Type . . . . . . . . . . . . . . . . . . 76
10.7. IEEE 802.11 Antenna Combiner . . . . . . . . . . . . . . 73 10.7. IEEE 802.11 Antenna Combiner . . . . . . . . . . . . . . 76
10.8. IEEE 802.11 Antenna Selection . . . . . . . . . . . . . . 73 10.8. IEEE 802.11 Antenna Selection . . . . . . . . . . . . . . 76
10.9. IEEE 802.11 Session Key Flags . . . . . . . . . . . . . . 74 10.9. IEEE 802.11 Session Key Flags . . . . . . . . . . . . . . 77
10.10. IEEE 802.11 Tagging Policy . . . . . . . . . . . . . . . 74 10.10. IEEE 802.11 Tagging Policy . . . . . . . . . . . . . . . 77
10.11. IEEE 802.11 WTP Radio Fail . . . . . . . . . . . . . . . 74 10.11. IEEE 802.11 WTP Radio Fail . . . . . . . . . . . . . . . 77
10.12. IEEE 802.11 WTP Radio Type . . . . . . . . . . . . . . . 74 10.12. IEEE 802.11 WTP Radio Type . . . . . . . . . . . . . . . 77
11. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 76 11. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 79
12. References . . . . . . . . . . . . . . . . . . . . . . . . . . 77 12. References . . . . . . . . . . . . . . . . . . . . . . . . . . 80
12.1. Normative References . . . . . . . . . . . . . . . . . . 77 12.1. Normative References . . . . . . . . . . . . . . . . . . 80
12.2. Informational References . . . . . . . . . . . . . . . . 78 12.2. Informational References . . . . . . . . . . . . . . . . 81
Editors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 79 Editors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 82
Intellectual Property and Copyright Statements . . . . . . . . . . 80 Intellectual Property and Copyright Statements . . . . . . . . . . 83
1. Introduction 1. Introduction
The CAPWAP protocol [I-D.ietf-capwap-protocol-specification] defines The CAPWAP protocol [I-D.ietf-capwap-protocol-specification] defines
an extensible protocol to allow an Access Controller to manage an extensible protocol to allow an Access Controller to manage
wireless agnostic Wireless Termination Points. The CAPWAP protocol wireless agnostic Wireless Termination Points. The CAPWAP protocol
itself does not include any specific wireless technologies, but itself does not include any specific wireless technologies, but
instead relies on binding specification to extend the technology to a instead relies on binding specification to extend the technology to a
particular wireless technology. particular wireless technology.
skipping to change at page 9, line 47 skipping to change at page 9, line 47
Network Association (RSNA) Key Management [IEEE.802-11.2007] Network Association (RSNA) Key Management [IEEE.802-11.2007]
functions are also located on the AC. This implies that the AAA functions are also located on the AC. This implies that the AAA
client also resides on the AC. client also resides on the AC.
While the admission control component of IEEE 802.11 resides on the While the admission control component of IEEE 802.11 resides on the
AC, the real time scheduling and queuing functions are on the WTP. AC, the real time scheduling and queuing functions are on the WTP.
Note that this does not prevent the AC from providing additional Note that this does not prevent the AC from providing additional
policy and scheduling functionality. policy and scheduling functionality.
Note that in the following figure, the use of '( - )' indicates that Note that in the following figure, the use of '( - )' indicates that
processing of the frames is done on the WTP. processing of the frames is done on the WTP. This figure represents
a case where encryption services are provided by the AC.
Client WTP AC Client WTP AC
Beacon Beacon
<----------------------------- <-----------------------------
Probe Request Probe Request
----------------------------( - )-------------------------> ----------------------------( - )------------------------->
Probe Response Probe Response
<----------------------------- <-----------------------------
802.11 AUTH/Association 802.11 AUTH/Association
<---------------------------------------------------------> <--------------------------------------------------------->
Station Configuration Request Station Configuration Request
[Add Station (Station Message [Add Station (Station MAC
Elements)] Address), IEEE 802.11 Add
Station (WLAN ID), IEEE
802.11 Session Key(Flag=A)]
<--------------------------> <-------------------------->
802.1X Authentication & 802.11 Key Exchange 802.1X Authentication & 802.11 Key Exchange
<---------------------------------------------------------> <--------------------------------------------------------->
Station Configuration Request Station Configuration Request
[Add Station (AES-CCMP, [Add Station(Station MAC
PTK=x)] Address), IEEE 802.11 Add
Station (WLAN ID), IEEE 802.11
Station Session Key(Flag=C)]
<--------------------------> <-------------------------->
802.11 Action Frames 802.11 Action Frames
<---------------------------------------------------------> <--------------------------------------------------------->
802.11 DATA (1) 802.11 DATA (1)
<---------------------------( - )-------------------------> <---------------------------( - )------------------------->
Figure 2: Split MAC Message Flow Figure 2: Split MAC Message Flow
Figure 2 provides an illustration of the division of labor in a Split Figure 2 provides an illustration of the division of labor in a Split
MAC architecture. In this example, a WLAN has been created that is MAC architecture. In this example, a WLAN has been created that is
skipping to change at page 11, line 9 skipping to change at page 11, line 13
then forwarded to the AC for optional processing. then forwarded to the AC for optional processing.
o The WTP forwards the IEEEE 802.11 Authentication and Association o The WTP forwards the IEEEE 802.11 Authentication and Association
frames to the AC, which is responsible for responding to the frames to the AC, which is responsible for responding to the
client. client.
o Once the association is complete, the AC transmits a Station o Once the association is complete, the AC transmits a Station
Configuration Request message, which includes an Add Station Configuration Request message, which includes an Add Station
message element, to the WTP (see Section 4.6.8 in message element, to the WTP (see Section 4.6.8 in
[I-D.ietf-capwap-protocol-specification]). In the above example, [I-D.ietf-capwap-protocol-specification]). In the above example,
the WLAN was configured for IEEE 802.1X. the WLAN was configured for IEEE 802.1X, and therefore the IEEE
802.11 Station Session Key is included with the flag field's 'A'
bit set.
o If the WTP is providing encryption/decryption services, once the o If the WTP is providing encryption/decryption services, once the
client has completed the IEEE 802.11 key exchange, the AC client has completed the IEEE 802.11 key exchange, the AC
transmits another Station Configuration Request message which transmits another Station Configuration Request message, which
includes an Add Station message element, an IEEE 802.11 Station includes:
message element, an IEEE 802.11 Station Session Key message
element and an IEEE 802.11 Information Element message element - An Add Station message element.
which includes the Robust Security Network Information Element
(RSNIE) to the WTP, delivering the security policy to enforce for - An IEEE 802.11 Add Station message element, which includes the
the station (in this case AES-CCMP), and the encryption key to WLAN Identifier the station has associated with.
use. If encryption/decryption is handled in the AC, the IEEE
802.11 Information message element with an RSNIE would not be - An IEEE 802.11 Station Session Key message element, which
included. includes the pairwise encryption key.
- An IEEE 802.11 Information Element message element which
includes the obust Security Network Information Element (RSNIE)
to the WTP, stating the security policy to enforce for the
client (in this case AES-CCMP).
o If the WTP is providing encryption/decryption services, once the
client has completed the IEEE 802.11 key exchange, the AC
transmits another Station Configuration Request message, which
includes:
- An Add Station message element.
- An IEEE 802.11 Add Station message element, which includes the
WLAN Identifier the station has associated with.
- An IEEE 802.11 Station Session Key message element, which
includes the pairwise encryption key.
- An IEEE 802.11 Information Element message element which
includes the Robust Security Network Information Element
(RSNIE) to the WTP, stating the security policy to enforce for
the client (in this case AES-CCMP).
o If the AC is providing encryption/decryption services, once the
client has completed the IEEE 802.11 key exchange, the AC
transmits another Station Configuration Request message, which
includes:
- An Add Station message element.
- An IEEE 802.11 Add Station message element, which includes the
WLAN Identifier the station has associated with.
- An IEEE 802.11 Station Session Key message element with the
flag fields' 'C' bit enabled (indicating that the AC will
provide crypto services).
o The WTP forwards any IEEE 802.11 Management Action frames received o The WTP forwards any IEEE 802.11 Management Action frames received
to the AC. to the AC.
o All IEEE 802.11 station data frames are tunneled between the WTP o All IEEE 802.11 station data frames are tunneled between the WTP
and the AC. and the AC.
Note that during the EAPOL-Key exchange between the Station and the Note that during the EAPOL-Key exchange between the Station and the
AC, the Receive Sequence Counter (RSC) field for the GTK needs to be AC, the Receive Sequence Counter (RSC) field for the GTK needs to be
included in the frame. The value of zero (0) is used by the AC included in the frame. The value of zero (0) is used by the AC
skipping to change at page 14, line 15 skipping to change at page 15, line 15
Client WTP AC Client WTP AC
Beacon Beacon
<----------------------------- <-----------------------------
Probe Probe
<----------------------------> <---------------------------->
802.11 AUTH 802.11 AUTH
<----------------------------- <-----------------------------
802.11 Association 802.11 Association
<---------------------------( - )-------------------------> <---------------------------( - )------------------------->
Station Configuration Request[ Station Configuration Request
Add Station (Station Message [Add Station (Station MAC
Elements)] Address), IEEE 802.11 Add
Station (WLAN ID), IEEE
802.11 Session Key(Flag=A)]
<--------------------------> <-------------------------->
802.1X Authentication & 802.11 Key Exchange 802.1X Authentication & 802.11 Key Exchange
<---------------------------------------------------------> <--------------------------------------------------------->
Station Configuration Request
[Add Station(Station MAC
Address), IEEE 802.11 Add
Station (WLAN ID), IEEE 802.11
Station session Key (Key=x),
IEEE 802.11 Information
Element(RSNIE(Pairwise
Cipher=CCMP))]
<-------------------------->
802.11 Action Frames 802.11 Action Frames
<---------------------------------------------------------> <--------------------------------------------------------->
Station Configuration Request[
Add Station (AES-CCMP,
PTK=x)]
<-------------------------->
802.11 DATA 802.11 DATA
<-----------------------------> <----------------------------->
Figure 5: Local MAC Message Flow Figure 5: Local MAC Message Flow
Figure 5 provides an illustration of the division of labor in a Local Figure 5 provides an illustration of the division of labor in a Local
MAC architecture. In this example, a WLAN that is configured for MAC architecture. In this example, a WLAN that is configured for
IEEE 802.11 has been created using AES-CCMP for privacy. The IEEE 802.11 has been created using AES-CCMP for privacy. The
following process occurs: following process occurs:
skipping to change at page 14, line 51 skipping to change at page 16, line 12
o The WTP processes a Probe Request frame and responds with a o The WTP processes a Probe Request frame and responds with a
corresponding Probe Response frame. corresponding Probe Response frame.
o The WTP forwards the IEEE 802.11 Authentication and Association o The WTP forwards the IEEE 802.11 Authentication and Association
frames to the AC. frames to the AC.
o Once the association is complete, the AC transmits a Station o Once the association is complete, the AC transmits a Station
Configuration Request message, which includes the Add Station Configuration Request message, which includes the Add Station
message element, to the WTP (see Section 4.6.8 in message element, to the WTP (see Section 4.6.8 in
[I-D.ietf-capwap-protocol-specification]). In the above example, [I-D.ietf-capwap-protocol-specification]). In the above example,
the WLAN is configured for IEEE 802.1X, and therefore the '802.1X the WLAN was configured for IEEE 802.1X, and therefore the IEEE
only' policy bit is enabled. 802.11 Station Session Key is included with the flag field's 'A'
bit set.
o The WTP forwards all IEEE 802.1X and IEEE 802.11 key exchange o The WTP forwards all IEEE 802.1X and IEEE 802.11 key exchange
messages to the AC for processing. messages to the AC for processing.
o The AC transmits another Station Configuration Request message o The AC transmits another Station Configuration Request message,
including an Add Station message element, an IEEE 802.11 Station which includes:
message element, an IEEE 802.11 Station Session Key message
element and an IEEE 802.11 Information Element message element - An Add Station message element, which MAY include a Virtual LAN
which includes the RSNIE to the WTP, stating the security policy (VLAN) [IEEE.802-1Q.2005] name, which when present is used by
to enforce for the client (in this case AES-CCMP), as well as the the WTP to identify the VLAN on which the user's data frames
encryption key to use. The Add Station message element MAY are to be bridged.
include a Virtual LAN (VLAN) [IEEE.802-1Q.2005] name , which when
present is used by the WTP to identify the VLAN on which the - An IEEE 802.11 Add Station message element, which includes the
user's data frames are to be bridged. WLAN Identifier the station has associated with
- An IEEE 802.11 Station Session Key message element, which
includes the pairwise encryption key.
- An IEEE 802.11 Information Element message element which
includes the RSNIE to the WTP, stating the security policy to
enforce for the client (in this case AES-CCMP).
o The WTP forwards any IEEE 802.11 Management Action frames received o The WTP forwards any IEEE 802.11 Management Action frames received
to the AC. to the AC.
o The WTP MAY locally bridge client data frames (and provide the o The WTP MAY locally bridge client data frames (and provide the
necessary encryption and decryption services). The WTP MAY also necessary encryption and decryption services). The WTP MAY also
tunnel client data frames to the AC, using 802.3 frame tunnel mode tunnel client data frames to the AC, using 802.3 frame tunnel mode
or 802.11 frame tunnel mode. or 802.11 frame tunnel mode.
2.3. Roaming Behavior 2.3. Roaming Behavior
skipping to change at page 15, line 35 skipping to change at page 17, line 4
or 802.11 frame tunnel mode. or 802.11 frame tunnel mode.
2.3. Roaming Behavior 2.3. Roaming Behavior
This section expands upon the examples provided in the previous This section expands upon the examples provided in the previous
section, and describes how the CAPWAP control protocol is used to section, and describes how the CAPWAP control protocol is used to
provide secure roaming. provide secure roaming.
Once a client has successfully associated with the network in a Once a client has successfully associated with the network in a
secure fashion, it is likely to attempt to roam to another WTP. secure fashion, it is likely to attempt to roam to another WTP.
Figure 6 shows an example of a currently associated station moving Figure 6 shows an example of a currently associated station moving
from its "Old WTP" to a "New WTP". The figure is valid for multiple from its "Old WTP" to a "New WTP". The figure is valid for multiple
different security policies, including IEEE 802.1X and Wireless different security policies, including IEEE 802.1X and Wireless
Protected Access (WPA) or Wireless Protected Access 2 (WPA2) [WPA], Protected Access (WPA) or Wireless Protected Access 2 (WPA2) [WPA].
both with key caching (where the IEEE 802.1x exchange would be In the event that key caching was employed, the 802.1X Authentication
bypassed) and without. step would be eliminated. Note that the example represents one where
crypto services are provided by the WTP, so in a case where the AC
provided this function the last Station Configuration Request would
be different.
Client Old WTP New WTP AC Client Old WTP New WTP AC
Association Request/Response Association Request/Response
<--------------------------------------( - )--------------> <--------------------------------------( - )-------------->
Station Configuration Request[ Station Configuration Request
Add Station (Station Message [Add Station (Station MAC
Elements)] Address), IEEE 802.11 Add
Station (WLAN ID), IEEE
802.11 Session Key(Flag=A)]
<----------------> <---------------->
802.1X Authentication (if no key cache entry exists) 802.1X Authentication (if no key cache entry exists)
<--------------------------------------( - )--------------> <--------------------------------------( - )-------------->
802.11 4-way Key Exchange 802.11 4-way Key Exchange
<--------------------------------------( - )--------------> <--------------------------------------( - )-------------->
Station Configuration Request Station Configuration Request
[Delete Station] [Delete Station]
<----------------------------------> <---------------------------------->
Station Configuration Request Station Configuration Request
[Add Station (AES-CCMP, [Add Station(Station MAC
PTK=x)] Address), IEEE 802.11 Add
Station (WLAN ID), IEEE 802.11
Station session Key (Key=x),
IEEE 802.11 Information
Element(RSNIE(Pairwise
Cipher=CCMP))]
<----------------> <---------------->
Figure 6: Client Roaming Example Figure 6: Client Roaming Example
2.4. Group Key Refresh 2.4. Group Key Refresh
Periodically, the Group Key (GTK)for the BSS needs to be updated. Periodically, the Group Key (GTK)for the BSS needs to be updated.
The AC uses an EAPOL-Key frame to update the group key for each STA The AC uses an EAPOL-Key frame to update the group key for each STA
in the BSS. While the AC is updating the GTK, each L2 broadcast in the BSS. While the AC is updating the GTK, each L2 broadcast
frame transmitted to the BSS needs to be duplicated and transmitted frame transmitted to the BSS needs to be duplicated and transmitted
skipping to change at page 20, line 35 skipping to change at page 21, line 47
the default policy, or the station specific policy if one exists. the default policy, or the station specific policy if one exists.
If encryption services are provided by the AC (see Section 6.15), If encryption services are provided by the AC (see Section 6.15),
the packet is encrypted, therefore the WTP cannot access the inner the packet is encrypted, therefore the WTP cannot access the inner
DSCP field, in which case it uses the behavior described when the DSCP field, in which case it uses the behavior described when the
'I' bit is not set. This occurs also if the inner packet is not 'I' bit is not set. This occurs also if the inner packet is not
IPv4 or IPv6, and thus does not have a DSCP field. IPv4 or IPv6, and thus does not have a DSCP field.
I=0: The WTP MUST NOT modify the DSCP field in the station's I=0: The WTP MUST NOT modify the DSCP field in the station's
packet. packet.
The IP header also includes the Explicit Congestion Notification The CAPWAP protocol supports the Explicit Congestion Notification
(ECN) bits [RFC3168]. When packets received from stations are (ECN) bits [RFC3168]. Additional details on ECN support can be found
encapsulated by the WTP, the ECN bits are set to zero (0) in the [I-D.ietf-capwap-protocol-specification].
outer header. The WTP does not modify the ECN bits in the original
station's packet header. This mode of operation is detailed as the
"limited functionality option" in [RFC3168].
2.6.2. IEEE 802.11 MAC Management Messages 2.6.2. IEEE 802.11 MAC Management Messages
It is recommended that IEEE 802.11 MAC Management frames be sent by It is recommended that IEEE 802.11 MAC Management frames be sent by
both the AC and the WTP with appropriate Quality of Service values, both the AC and the WTP with appropriate Quality of Service values,
listed below, to ensure that congestion in the network minimizes listed below, to ensure that congestion in the network minimizes
occurrences of packet loss. Note that the QoS Mechanism specified in occurrences of packet loss. Note that the QoS Mechanism specified in
Tagging Policy is used as specified by the AC in the IEEE 802.11 WTP Tagging Policy is used as specified by the AC in the IEEE 802.11 WTP
Quality of Service message element (see Section 6.22). However, the Quality of Service message element (see Section 6.22). However, the
station specific policy is not used for IEEE 802.11 MAC Management station specific policy is not used for IEEE 802.11 MAC Management
frames. frames.
802.1p: The precedence value of 7 (decimal) SHOULD be used for all 802.1p: The precedence value of 7 (decimal) SHOULD be used for all
IEEE 802.11 MAC management frames, except for Probe Requests which IEEE 802.11 MAC management frames, except for Probe Requests which
SHOULD use 4. SHOULD use 4.
DSCP: All IEEE 802.11 MAC management frames SHOULD use the DSCP: All IEEE 802.11 MAC management frames SHOULD use the CS6 per-
Expedited Forwarding per-hop behavior (see [RFC2598]), while IEEE hop behavior (see [RFC2474]), while IEEE 802.11 Probe Requests
802.11 Probe Requests should use the Low Drop Assured Forwarding should use the Low Drop Assured Forwarding per-hop behavior (see
per-hop behavior (see [RFC2598]). [RFC2598]).
2.7. Run State Operation 2.7. Run State Operation
The Run state is the normal state of operation for the CAPWAP The Run state is the normal state of operation for the CAPWAP
protocol in both the WTP and the AC. protocol in both the WTP and the AC.
When the WTP receives a WLAN Configuration Request message (see When the WTP receives a WLAN Configuration Request message (see
Section 3.1), it MUST respond with a WLAN Configuration Response Section 3.1), it MUST respond with a WLAN Configuration Response
message (see Section 3.2) and it remains in the Run state. message (see Section 3.2) and it remains in the Run state.
skipping to change at page 27, line 15 skipping to change at page 28, line 15
5.6. Join Response Message 5.6. Join Response Message
The following IEEE 802.11 specific message element MUST be included The following IEEE 802.11 specific message element MUST be included
in the CAPWAP Join Response Message. in the CAPWAP Join Response Message.
o IEEE 802.11 WTP Radio Information, see Section 6.25. An IEEE o IEEE 802.11 WTP Radio Information, see Section 6.25. An IEEE
802.11 WTP Radio Information message element MUST be present for 802.11 WTP Radio Information message element MUST be present for
every radio in the WTP. every radio in the WTP.
5.7. Configuration Status Message 5.7. Configuration Status Request Message
The following IEEE 802.11 specific message elements MAY be included The following IEEE 802.11 specific message elements MAY be included
in the CAPWAP Configuration Status Message. More than one of each in the CAPWAP Configuration Status Request Message. More than one of
message element listed MAY be included. each message element listed MAY be included.
o IEEE 802.11 Antenna, see Section 6.2 o IEEE 802.11 Antenna, see Section 6.2
o IEEE 802.11 Direct Sequence Control, see Section 6.5 o IEEE 802.11 Direct Sequence Control, see Section 6.5
o IEEE 802.11 MAC Operation, see Section 6.7 o IEEE 802.11 MAC Operation, see Section 6.7
o IEEE 802.11 Multi Domain Capability, see Section 6.9 o IEEE 802.11 Multi Domain Capability, see Section 6.9
o IEEE 802.11 OFDM Control, see Section 6.10 o IEEE 802.11 OFDM Control, see Section 6.10
skipping to change at page 32, line 6 skipping to change at page 33, line 6
| Group TSC | | Group TSC |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Group TSC | QoS | Auth Type | | Group TSC | QoS | Auth Type |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MAC Mode | Tunnel Mode | Suppress SSID | SSID ... | MAC Mode | Tunnel Mode | Suppress SSID | SSID ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1024 for IEEE 802.11 Add WLAN Type: 1024 for IEEE 802.11 Add WLAN
Length: >= 20 Length: >= 20
Radio ID: An 8-bit value representing the radio. Radio ID: An 8-bit value representing the radio, whose value is
between one (1) and 31.
WLAN ID: An 8-bit value specifying the WLAN Identifier. The value WLAN ID: An 8-bit value specifying the WLAN Identifier. The value
MUST be between one (1) and 16. MUST be between one (1) and 16.
Capability: A 16-bit value containing the capability information Capability: A 16-bit value containing the capability information
field to be advertised by the WTP in the Probe Request and Beacon field to be advertised by the WTP in the Probe Request and Beacon
frames. Each bit of the Capability field represents a different frames. Each bit of the Capability field represents a different
WTP capability, which are described in detail in WTP capability, which are described in detail in
[IEEE.802-11.2007]. The format of the field is: [IEEE.802-11.2007]. The format of the field is:
skipping to change at page 34, line 34 skipping to change at page 35, line 34
field. field.
Key: A Session Key, whose length is known via the key length field, Key: A Session Key, whose length is known via the key length field,
used to provide data privacy. For encryption schemes that employ used to provide data privacy. For encryption schemes that employ
a separate encryption key for unicast and multicast traffic, the a separate encryption key for unicast and multicast traffic, the
key included here only applies to multicast frames, and the cipher key included here only applies to multicast frames, and the cipher
suite is specified in an accompanied RSN Information Element. In suite is specified in an accompanied RSN Information Element. In
these scenarios, the key and cipher information is communicated these scenarios, the key and cipher information is communicated
via the Add Station message element, see Section 4.6.8 in via the Add Station message element, see Section 4.6.8 in
[I-D.ietf-capwap-protocol-specification] and the IEEE 802.11 [I-D.ietf-capwap-protocol-specification] and the IEEE 802.11
Station Session Key message element, see Section 6.15. Station Session Key message element, see Section 6.15. When used
with WEP, the key field includes the broadcast key. When used
with CCMP, the Key field includes the 128-bit Group Temporal Key.
When used with TKIP, the Key field includes the 256-bit Group
Temporal Key (which consists of a 128-bit key used as input for
TKIP key mixing, and two 64-bit keys used for Michael).
Group TSC A 48-bit value containing the Transmit Sequence Counter Group TSC A 48-bit value containing the Transmit Sequence Counter
for the updated group key. The WTP will set the TSC for for the updated group key. The WTP will set the TSC for
broadcast/multicast frames to this value for the updated group broadcast/multicast frames to this value for the updated group
key. key.
QOS: An 8-bit value specifying the default QOS policy for the WTP QOS: An 8-bit value specifying the default QOS policy for the WTP
to apply to network traffic received for a non-WMM enabled STA. to apply to network traffic received for a non-WMM enabled STA.
The following enumerated values are supported: The following enumerated values are supported:
skipping to change at page 36, line 34 skipping to change at page 37, line 37
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | Diversity | Combiner | Antenna Cnt | | Radio ID | Diversity | Combiner | Antenna Cnt |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Antenna Selection... | Antenna Selection...
+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+
Type: 1025 for IEEE 802.11 Antenna Type: 1025 for IEEE 802.11 Antenna
Length: >= 5 Length: >= 5
Radio ID: An 8-bit value representing the radio to configure. Radio ID: An 8-bit value representing the radio to configure, whose
value is between one (1) and 31.
Diversity: An 8-bit value specifying whether the antenna is to Diversity: An 8-bit value specifying whether the antenna is to
provide receive diversity. The value of this field is the same as provide receive diversity. The value of this field is the same as
the IEEE 802.11 dot11DiversitySelectionRx MIB element, see the IEEE 802.11 dot11DiversitySelectionRx MIB element, see
[IEEE.802-11.2007]. The following enumerated values are [IEEE.802-11.2007]. The following enumerated values are
supported: supported:
0 - Disabled 0 - Disabled
1 - Enabled (may only be true if the antenna can be used as a 1 - Enabled (may only be true if the antenna can be used as a
skipping to change at page 37, line 45 skipping to change at page 39, line 4
highly recommended that the WTP assign the BSSID using the following highly recommended that the WTP assign the BSSID using the following
algorithm: BSSID = {base BSSID} + WLAN ID. algorithm: BSSID = {base BSSID} + WLAN ID.
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | WLAN ID | BSSID | Radio ID | WLAN ID | BSSID
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| BSSID | | BSSID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1026 for IEEE 802.11 Assigned WTP BSSID Type: 1026 for IEEE 802.11 Assigned WTP BSSID
Length: 8 Length: 8
Radio ID: An 8-bit value representing the radio.
Radio ID: An 8-bit value representing the radio, whose value is
between one (1) and 31.
WLAN ID: An 8-bit value specifying the WLAN Identifier. The value WLAN ID: An 8-bit value specifying the WLAN Identifier. The value
MUST be between one (1) and 16. MUST be between one (1) and 16.
BSSID: The BSSID assigned by the WTP for the WLAN created as a BSSID: The BSSID assigned by the WTP for the WLAN created as a
result of receiving an IEEE 802.11 Add WLAN. result of receiving an IEEE 802.11 Add WLAN.
6.4. IEEE 802.11 Delete WLAN 6.4. IEEE 802.11 Delete WLAN
The IEEE 802.11 Delete WLAN message element is used to inform the WTP The IEEE 802.11 Delete WLAN message element is used to inform the WTP
skipping to change at page 38, line 28 skipping to change at page 39, line 33
0 1 0 1
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | WLAN ID | | Radio ID | WLAN ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1027 for IEEE 802.11 Delete WLAN Type: 1027 for IEEE 802.11 Delete WLAN
Length: 2 Length: 2
Radio ID: An 8-bit value representing the radio Radio ID: An 8-bit value representing the radio, whose value is
between one (1) and 31.
WLAN ID: An 8-bit value specifying the WLAN Identifier. The value WLAN ID: An 8-bit value specifying the WLAN Identifier. The value
MUST be between one (1) and 16. MUST be between one (1) and 16.
6.5. IEEE 802.11 Direct Sequence Control 6.5. IEEE 802.11 Direct Sequence Control
The IEEE 802.11 Direct Sequence Control message element is a bi- The IEEE 802.11 Direct Sequence Control message element is a bi-
directional element. When sent by the WTP, it contains the current directional element. When sent by the WTP, it contains the current
state. When sent by the AC, the WTP MUST adhere to the values state. When sent by the AC, the WTP MUST adhere to the values
provided. This element is only used for IEEE 802.11b radios. The provided. This element is only used for IEEE 802.11b radios. The
skipping to change at page 39, line 4 skipping to change at page 40, line 12
provided. This element is only used for IEEE 802.11b radios. The provided. This element is only used for IEEE 802.11b radios. The
message element has the following fields. message element has the following fields.
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | Reserved | Current Chan | Current CCA | | Radio ID | Reserved | Current Chan | Current CCA |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Energy Detect Threshold | | Energy Detect Threshold |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1028 for IEEE 802.11 Direct Sequence Control Type: 1028 for IEEE 802.11 Direct Sequence Control
Length: 8 Length: 8
Radio ID: An 8-bit value representing the radio to configure. Radio ID: An 8-bit value representing the radio to configure, whose
value is between one (1) and 31.
Reserved: All implementations complying with this protocol MUST set Reserved: All implementations complying with this protocol MUST set
to zero any bits that are reserved in the version of the protocol to zero any bits that are reserved in the version of the protocol
supported by that implementation. Receivers MUST ignore all bits supported by that implementation. Receivers MUST ignore all bits
not defined for the version of the protocol they support. not defined for the version of the protocol they support.
Current Channel: This attribute contains the current operating Current Channel: This attribute contains the current operating
frequency channel of the Direct Sequence Spread Spectrum (DSSS) frequency channel of the Direct Sequence Spread Spectrum (DSSS)
PHY. This value comes from the IEEE 802.11 dot11CurrentChannel PHY. This value comes from the IEEE 802.11 dot11CurrentChannel
MIB element (see [IEEE.802-11.2007]). MIB element (see [IEEE.802-11.2007]).
skipping to change at page 40, line 4 skipping to change at page 41, line 17
The IEEE 802.11 Information Element is used to communicate any IE The IEEE 802.11 Information Element is used to communicate any IE
defined in the IEEE 802.11 protocol. The data field contains the raw defined in the IEEE 802.11 protocol. The data field contains the raw
IE as it would be included within an IEEE 802.11 MAC management IE as it would be included within an IEEE 802.11 MAC management
message. message.
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | WLAN ID |B|P| Reserved |Info Element... | Radio ID | WLAN ID |B|P| Reserved |Info Element...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1029 for IEEE 802.11 Information Element Type: 1029 for IEEE 802.11 Information Element
Length: >= 4 Length: >= 4
Radio ID: An 8-bit value representing the radio. Radio ID: An 8-bit value representing the radio, whose value is
between one (1) and 31.
WLAN ID: An 8-bit value specifying the WLAN Identifier. The value WLAN ID: An 8-bit value specifying the WLAN Identifier. The value
MUST be between one (1) and 16. MUST be between one (1) and 16.
B: When set, the WTP is to include the information element in IEEE B: When set, the WTP is to include the information element in IEEE
802.11 Beacons associated with the WLAN. 802.11 Beacons associated with the WLAN.
P: When set, the WTP is to include the information element in Probe P: When set, the WTP is to include the information element in Probe
Responses associated with the WLAN. Responses associated with the WLAN.
skipping to change at page 41, line 4 skipping to change at page 42, line 20
| Short Retry | Long Retry | Fragmentation Threshold | | Short Retry | Long Retry | Fragmentation Threshold |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Tx MSDU Lifetime | | Tx MSDU Lifetime |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Rx MSDU Lifetime | | Rx MSDU Lifetime |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1030 for IEEE 802.11 MAC Operation Type: 1030 for IEEE 802.11 MAC Operation
Length: 16 Length: 16
Radio ID: An 8-bit value representing the radio to configure.
Radio ID: An 8-bit value representing the radio to configure, whose
value is between one (1) and 31.
Reserved: All implementations complying with this protocol MUST set Reserved: All implementations complying with this protocol MUST set
to zero any bits that are reserved in the version of the protocol to zero any bits that are reserved in the version of the protocol
supported by that implementation. Receivers MUST ignore all bits supported by that implementation. Receivers MUST ignore all bits
not defined for the version of the protocol they support. not defined for the version of the protocol they support.
RTS Threshold: This attribute indicates the number of octets in an RTS Threshold: This attribute indicates the number of octets in an
MAC Protocol Data Unit (MPDU), below which an Request To Send/ MAC Protocol Data Unit (MPDU), below which an Request To Send/
Clear To Send (RTS/CTS) handshake MUST NOT be performed. An RTS/ Clear To Send (RTS/CTS) handshake MUST NOT be performed. An RTS/
CTS handshake MUST be performed at the beginning of any frame CTS handshake MUST be performed at the beginning of any frame
skipping to change at page 42, line 42 skipping to change at page 44, line 17
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | WLAN ID | MAC Address | | Radio ID | WLAN ID | MAC Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MAC Address | | MAC Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1031 for IEEE 802.11 MIC Countermeasures Type: 1031 for IEEE 802.11 MIC Countermeasures
Length: 8 Length: 8
Radio ID: The Radio Identifier, typically refers to some interface Radio ID: The Radio Identifier, whose value is between one (1) and
index on the WTP. 31, typically refers to some interface index on the WTP.
WLAN ID: This 8-bit unsigned integer includes the WLAN Identifier, WLAN ID: This 8-bit unsigned integer includes the WLAN Identifier,
on which the MIC failure occurred. The value MUST be between one on which the MIC failure occurred. The value MUST be between one
(1) and 16. (1) and 16.
MAC Address: The MAC Address of the station that caused the MIC MAC Address: The MAC Address of the station that caused the MIC
failure. failure.
6.9. IEEE 802.11 Multi-Domain Capability 6.9. IEEE 802.11 Multi-Domain Capability
skipping to change at page 43, line 28 skipping to change at page 44, line 47
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | Reserved | First Channel # | | Radio ID | Reserved | First Channel # |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Number of Channels | Max Tx Power Level | | Number of Channels | Max Tx Power Level |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1032 for IEEE 802.11 Multi-Domain Capability Type: 1032 for IEEE 802.11 Multi-Domain Capability
Length: 8 Length: 8
Radio ID: An 8-bit value representing the radio to configure. Radio ID: An 8-bit value representing the radio to configure, whose
value is between one (1) and 31.
Reserved: All implementations complying with this protocol MUST set Reserved: All implementations complying with this protocol MUST set
to zero any bits that are reserved in the version of the protocol to zero any bits that are reserved in the version of the protocol
supported by that implementation. Receivers MUST ignore all bits supported by that implementation. Receivers MUST ignore all bits
not defined for the version of the protocol they support. not defined for the version of the protocol they support.
First Channnel #: This attribute indicates the value of the lowest First Channnel #: This attribute indicates the value of the lowest
channel number in the sub-band for the associated domain country channel number in the sub-band for the associated domain country
string. The value of this field comes from the IEEE 802.11 string. The value of this field comes from the IEEE 802.11
dot11FirstChannelNumber MIB element (see [IEEE.802-11.2007]). dot11FirstChannelNumber MIB element (see [IEEE.802-11.2007]).
skipping to change at page 44, line 25 skipping to change at page 45, line 47
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | Reserved | Current Chan | Band Support | | Radio ID | Reserved | Current Chan | Band Support |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| TI Threshold | | TI Threshold |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1033 for IEEE 802.11 OFDM Control Type: 1033 for IEEE 802.11 OFDM Control
Length: 8 Length: 8
Radio ID: An 8-bit value representing the radio to configure. Radio ID: An 8-bit value representing the radio to configure, whose
value is between one (1) and 31.
Reserved: All implementations complying with this protocol MUST set Reserved: All implementations complying with this protocol MUST set
to zero any bits that are reserved in the version of the protocol to zero any bits that are reserved in the version of the protocol
supported by that implementation. Receivers MUST ignore all bits supported by that implementation. Receivers MUST ignore all bits
not defined for the version of the protocol they support. not defined for the version of the protocol they support.
Current Channel: This attribute contains the current operating Current Channel: This attribute contains the current operating
frequency channel of the OFDM PHY. The value of this field comes frequency channel of the OFDM PHY. The value of this field comes
from the IEEE 802.11 dot11CurrentFrequency MIB element (see from the IEEE 802.11 dot11CurrentFrequency MIB element (see
[IEEE.802-11.2007]). [IEEE.802-11.2007]).
skipping to change at page 45, line 28 skipping to change at page 47, line 4
6.11. IEEE 802.11 Rate Set 6.11. IEEE 802.11 Rate Set
The rate set message element value is sent by the AC and contains the The rate set message element value is sent by the AC and contains the
supported operational rates. It contains the following fields. supported operational rates. It contains the following fields.
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | Rate Set... | Radio ID | Rate Set...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1034 for IEEE 802.11 Rate Set Type: 1034 for IEEE 802.11 Rate Set
Length: >= 3 Length: >= 3
Radio ID: An 8-bit value representing the radio to configure. Radio ID: An 8-bit value representing the radio to configure, whose
value is between one (1) and 31.
Rate Set: The AC generates the Rate Set that the WTP is to include Rate Set: The AC generates the Rate Set that the WTP is to include
in its Beacon and Probe messages. The length of this field is in its Beacon and Probe messages. The length of this field is
between 2 and 8 bytes. The value of this field comes from the between 2 and 8 bytes. The value of this field comes from the
IEEE 802.11 dot11OperationalRateSet MIB element (see IEEE 802.11 dot11OperationalRateSet MIB element (see
[IEEE.802-11.2007]). [IEEE.802-11.2007]).
6.12. IEEE 802.11 RSNA Error Report From Station 6.12. IEEE 802.11 RSNA Error Report From Station
The IEEE 802.11 RSN Error Report From Station message element is used The IEEE 802.11 RSN Error Report From Station message element is used
skipping to change at page 46, line 28 skipping to change at page 48, line 4
| TKIP Local MIC Failures | | TKIP Local MIC Failures |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| TKIP Remote MIC Failures | | TKIP Remote MIC Failures |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| CCMP Replays | | CCMP Replays |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| CCMP Decrypt Errors | | CCMP Decrypt Errors |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| TKIP Replays | | TKIP Replays |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1035 for IEEE 802.11 RSNA Error Report From Station Type: 1035 for IEEE 802.11 RSNA Error Report From Station
Length: 40 Length: 40
Client MAC Address: The Client MAC Address of the station. Client MAC Address: The Client MAC Address of the station.
BSSID: The BSSID on which the failures are being reported on. BSSID: The BSSID on which the failures are being reported on.
Radio ID: The Radio Identifier, typically refers to some interface Radio ID: The Radio Identifier, whose value is between one (1) and
index on the WTP 31, typically refers to some interface index on the WTP
WLAN ID: The WLAN ID on which the RSNA failures are being reported. WLAN ID: The WLAN ID on which the RSNA failures are being reported.
The value MUST be between one (1) and 16. The value MUST be between one (1) and 16.
Reserved: All implementations complying with this protocol MUST set Reserved: All implementations complying with this protocol MUST set
to zero any bits that are reserved in the version of the protocol to zero any bits that are reserved in the version of the protocol
supported by that implementation. Receivers MUST ignore all bits supported by that implementation. Receivers MUST ignore all bits
not defined for the version of the protocol they support. not defined for the version of the protocol they support.
TKIP ICV Errors: A 32-bit value representing the number of Temporal TKIP ICV Errors: A 32-bit value representing the number of Temporal
skipping to change at page 48, line 21 skipping to change at page 49, line 39
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MAC Address | Capabilities | | MAC Address | Capabilities |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| WLAN ID |Supported Rates| | WLAN ID |Supported Rates|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1036 for IEEE 802.11 Station Type: 1036 for IEEE 802.11 Station
Length: >= 14 Length: >= 14
Radio ID: An 8-bit value representing the radio Radio ID: An 8-bit value representing the radio, whose value is
between one (1) and 31.
Association ID: A 16-bit value specifying the IEEE 802.11 Association ID: A 16-bit value specifying the IEEE 802.11
Association Identifier Association Identifier
Flags: All implementations complying with this protocol MUST set to Flags: All implementations complying with this protocol MUST set to
zero any bits that are reserved in the version of the protocol zero any bits that are reserved in the version of the protocol
supported by that implementation. Receivers MUST ignore all bits supported by that implementation. Receivers MUST ignore all bits
not defined for the version of the protocol they support. not defined for the version of the protocol they support.
MAC Address: The station's MAC Address MAC Address: The station's MAC Address
skipping to change at page 49, line 12 skipping to change at page 50, line 35
element MUST be tagged using the maximum value permitted by to the element MUST be tagged using the maximum value permitted by to the
user. The priority tag MUST be between zero (0) and seven (7). This user. The priority tag MUST be between zero (0) and seven (7). This
message element MUST NOT be present without the IEEE 802.11 Station message element MUST NOT be present without the IEEE 802.11 Station
(see Section 6.13) message element. (see Section 6.13) message element.
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MAC Address | | MAC Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MAC Address | 802.1p Priority Tag | | MAC Address | Reserved |8021p|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1037 for IEEE 802.11 Station QOS Profile Type: 1037 for IEEE 802.11 Station QOS Profile
Length: 8 Length: 8
MAC Address: The station's MAC Address MAC Address: The station's MAC Address
802.1p Priority Tag: The maximum 802.1p priority value that the WTP Reserved: All implementations complying with this protocol MUST set
will allow in the Traffic Identifier (TID) field in the extended to zero any bits that are reserved in the version of the protocol
802.11e QOS Data header. Only the three least significant bits of supported by that implementation. Receivers MUST ignore all bits
this field are valid, while the remaining bits MUST be set to zero not defined for the version of the protocol they support.
(0).
8021p: The maximum 802.1p priority value that the WTP will allow in
the Traffic Identifier (TID) field in the extended 802.11e QOS
Data header.
6.15. IEEE 802.11 Station Session Key 6.15. IEEE 802.11 Station Session Key
The IEEE 802.11 Station Session Key message element is sent when the The IEEE 802.11 Station Session Key message element is sent when the
AC determines that encryption of a station must be performed in the AC determines that encryption of a station must be performed in the
WTP. This message element MUST NOT be present without the IEEE WTP. This message element MUST NOT be present without the IEEE
802.11 Station (see Section 6.13) message element, and MUST NOT be 802.11 Station (see Section 6.13) message element, and MUST NOT be
sent if the WTP had not specifically advertised support for the sent if the WTP had not specifically advertised support for the
requested encryption scheme, through the WTP Descriptor Message requested encryption scheme, through the WTP Descriptor Message
Element's Encryption Capabilities Field (see Section 8.1). Element's Encryption Capabilities Field (see Section 8.1).
The RSN information element MUST sent along with the IEEE 802.11 When the Key field is non-zero in length, the RSN information element
Station Session Key in order to instruct the WTP on the usage of the MUST be sent along with the IEEE 802.11 Station Session Key in order
Key field. The WTP MUST observe the AKM field of the RSN information to instruct the WTP on the usage of the Key field. The WTP MUST
element in order to identify the authentication protocol to be observe the AKM field of the RSN information element in order to
enforced with the station. identify the authentication protocol to be enforced with the station.
If cryptographic services are provided at the WTP, the WTP MUST If cryptographic services are provided at the WTP, the WTP MUST
observe the algorithm dictated in the Pairwise Cipher Suite field of observe the algorithm dictated in the Pairwise Cipher Suite field of
the RSN information element sent by the AC. The RSN Information the RSN information element sent by the AC. The RSN Information
Element included here is the one sent by the AC in the third message Element included here is the one sent by the AC in the third message
of the 4-Way Key Handshake, which specifies which cipher is to be of the 4-Way Key Handshake, which specifies which cipher is to be
applied to provide encryption and decryption services with the applied to provide encryption and decryption services with the
station. The RSN Information Element is used to communicate any station. The RSN Information Element is used to communicate any
supported algorithm, including WEP, TKIP and AES-CCMP. In the case supported algorithm, including WEP, TKIP and AES-CCMP. In the case
of static WEP keys, the RSN Information Element is still used to of static WEP keys, the RSN Information Element is still used to
skipping to change at page 51, line 23 skipping to change at page 53, line 11
modify the contents of the packets, including modifying the modify the contents of the packets, including modifying the
DSCP markings of the encapsulated packet. In this case, this DSCP markings of the encapsulated packet. In this case, this
function would be the responsibility of the AC. function would be the responsibility of the AC.
Pairwise TSC: The 6 byte Transmit Sequence Counter (TSC) field to Pairwise TSC: The 6 byte Transmit Sequence Counter (TSC) field to
use for unicast packets transmitted to the station. use for unicast packets transmitted to the station.
Pairwise RSC: The 6 byte Receive Sequence Counter (RSC) to use for Pairwise RSC: The 6 byte Receive Sequence Counter (RSC) to use for
unicast packets received from the station. unicast packets received from the station.
Key: The key the WTP is to use when encrypting traffic to/from the Key: The pairwise key the WTP is to use when encrypting traffic to/
station. For dynamically created keys, such as those used with from the station. The format of the keys differ based on the
WPA and RSN, this is commonly known as a Pairwise Transient Key crypto algorithm used. For unicast WEP keys, the Key field
(PTK). For static keys, such as those used in WEP, the Key field consists of the actual unicast encryption key (note, this is used
contains the actual encryption key. when WEP is used in conjunction with 802.1X, and therefore a
unicast encryption key exists). When used with CCMP, the Key
field includes the 128-bit Temporal Key. When used with TKIP, the
Key field includes the 256-bit Temporal Key (which consists of a
128-bit key used as input for TKIP key mixing, and two 64-bit keys
used for Michael).
6.16. IEEE 802.11 Statistics 6.16. IEEE 802.11 Statistics
The IEEE 802.11 Statistics message element is sent by the WTP to The IEEE 802.11 Statistics message element is sent by the WTP to
transmit its current statistics, and contains the following fields. transmit its current statistics, and contains the following fields.
All of the fields in this message element are set to zero upon WTP All of the fields in this message element are set to zero upon WTP
initialization. The fields will roll over when they reach their initialization. The fields will roll over when they reach their
maximum value of 4294967295. Due to the nature of each counter maximum value of 4294967295. Due to the nature of each counter
representing different data points, the roll over event will vary representing different data points, the roll over event will vary
greatly across each field. Applications or human operators using greatly across each field. Applications or human operators using
skipping to change at page 53, line 8 skipping to change at page 55, line 8
| QoS CF Polls Received Count | | QoS CF Polls Received Count |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| QoS CF Polls Unused Count | | QoS CF Polls Unused Count |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| QoS CF Polls Unusable Count | | QoS CF Polls Unusable Count |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1039 for IEEE 802.11 Statistics Type: 1039 for IEEE 802.11 Statistics
Length: 80 Length: 80
Radio ID: An 8-bit value representing the radio. Radio ID: An 8-bit value representing the radio, whose value is
between one (1) and 31.
Reserved: All implementations complying with this protocol MUST set Reserved: All implementations complying with this protocol MUST set
to zero any bits that are reserved in the version of the protocol to zero any bits that are reserved in the version of the protocol
supported by that implementation. Receivers MUST ignore all bits supported by that implementation. Receivers MUST ignore all bits
not defined for the version of the protocol they support. not defined for the version of the protocol they support.
Tx Fragment Count: A 32-bit value representing the number of Tx Fragment Count: A 32-bit value representing the number of
fragmented frames transmitted. The value of this field comes from fragmented frames transmitted. The value of this field comes from
the IEEE 802.11 dot11TransmittedFragmentCount MIB element (see the IEEE 802.11 dot11TransmittedFragmentCount MIB element (see
[IEEE.802-11.2007]). [IEEE.802-11.2007]).
skipping to change at page 55, line 28 skipping to change at page 57, line 28
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | Supported Rates... | Radio ID | Supported Rates...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1040 for IEEE 802.11 Supported Rates Type: 1040 for IEEE 802.11 Supported Rates
Length: >= 3 Length: >= 3
Radio ID: An 8-bit value representing the radio. Radio ID: An 8-bit value representing the radio, whose value is
between one (1) and 31.
Supported Rates: The WTP includes the Supported Rates that its Supported Rates: The WTP includes the Supported Rates that its
hardware supports. The format is identical to the Rate Set hardware supports. The format is identical to the Rate Set
message element and is between 2 and 8 bytes in length. message element and is between 2 and 8 bytes in length.
6.18. IEEE 802.11 Tx Power 6.18. IEEE 802.11 Tx Power
The IEEE 802.11 Tx Power message element value is bi-directional. The IEEE 802.11 Tx Power message element value is bi-directional.
When sent by the WTP, it contains the current power level of the When sent by the WTP, it contains the current power level of the
radio in question. When sent by the AC, it contains the power level radio in question. When sent by the AC, it contains the power level
skipping to change at page 55, line 48 skipping to change at page 58, line 4
radio in question. When sent by the AC, it contains the power level radio in question. When sent by the AC, it contains the power level
the WTP MUST adhere to. the WTP MUST adhere to.
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | Reserved | Current Tx Power | | Radio ID | Reserved | Current Tx Power |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1041 for IEEE 802.11 Tx Power Type: 1041 for IEEE 802.11 Tx Power
Length: 4 Length: 4
Radio ID: An 8-bit value representing the radio to configure.
Radio ID: An 8-bit value representing the radio to configure, whose
value is between one (1) and 31.
Reserved: All implementations complying with this protocol MUST set Reserved: All implementations complying with this protocol MUST set
to zero any bits that are reserved in the version of the protocol to zero any bits that are reserved in the version of the protocol
supported by that implementation. Receivers MUST ignore all bits supported by that implementation. Receivers MUST ignore all bits
not defined for the version of the protocol they support. not defined for the version of the protocol they support.
Current Tx Power: This attribute contains the current transmit Current Tx Power: This attribute contains the current transmit
output power in mW, as described in the dot11CurrentTxPowerLevel output power in mW, as described in the dot11CurrentTxPowerLevel
MIB variable, see [IEEE.802-11.2007]. MIB variable, see [IEEE.802-11.2007].
skipping to change at page 56, line 34 skipping to change at page 58, line 37
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | Num Levels | Power Level [n] | | Radio ID | Num Levels | Power Level [n] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1042 for IEEE 802.11 Tx Power Level Type: 1042 for IEEE 802.11 Tx Power Level
Length: >= 4 Length: >= 4
Radio ID: An 8-bit value representing the radio to configure. Radio ID: An 8-bit value representing the radio to configure, whose
value is between one (1) and 31.
Num Levels: The number of power level attributes. The value of Num Levels: The number of power level attributes. The value of
this field comes from the IEEE 802.11 this field comes from the IEEE 802.11
dot11NumberSupportedPowerLevels MIB element (see dot11NumberSupportedPowerLevels MIB element (see
[IEEE.802-11.2007]). [IEEE.802-11.2007]).
Power Level: Each power level fields contains a supported power Power Level: Each power level fields contains a supported power
level, in mW. The value of this field comes from the level, in mW. The value of this field comes from the
corresponding IEEE 802.11 dot11TxPowerLevel[n] MIB element, see corresponding IEEE 802.11 dot11TxPowerLevel[n] MIB element, see
[IEEE.802-11.2007]. [IEEE.802-11.2007].
skipping to change at page 57, line 23 skipping to change at page 59, line 30
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | MAC Address | | Radio ID | MAC Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MAC Address | QoS Sub-Element... | | MAC Address | QoS Sub-Element... |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1043 for IEEE 802.11 Update Station QoS Type: 1043 for IEEE 802.11 Update Station QoS
Length: 8 Length: 8
Radio ID: The Radio Identifier, typically refers to some interface Radio ID: The Radio Identifier, whose value is between one (1) and
index on the WTP 31, typically refers to some interface index on the WTP
MAC Address: The station's MAC Address. MAC Address: The station's MAC Address.
QoS Sub-Element: The IEEE 802.11 WTP Quality of Service message QoS Sub-Element: The IEEE 802.11 WTP Quality of Service message
element contains four QoS sub-elements, one for every QoS profile. element contains four QoS sub-elements, one for every QoS profile.
The order of the QoS profiles are Voice, Video, Best Effort and The order of the QoS profiles are Voice, Video, Best Effort and
Background. Background.
0 1 0 1
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
skipping to change at page 59, line 19 skipping to change at page 61, line 21
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Key Index | Key Status | Key Length | | Key Index | Key Status | Key Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Key... | | Key... |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1044 for IEEE 802.11 Update WLAN Type: 1044 for IEEE 802.11 Update WLAN
Length: >= 8 Length: >= 8
Radio ID: An 8-bit value representing the radio. Radio ID: An 8-bit value representing the radio, whose value is
between one (1) and 31.
WLAN ID: An 8-bit value specifying the WLAN Identifier. The value WLAN ID: An 8-bit value specifying the WLAN Identifier. The value
MUST be between one (1) and 16. MUST be between one (1) and 16.
Capability: A 16-bit value containing the capability information Capability: A 16-bit value containing the capability information
field to be advertised by the WTP in the Probe Request and Beacon field to be advertised by the WTP in the Probe Request and Beacon
frames. Each bit of the Capability field represents a different frames. Each bit of the Capability field represents a different
WTP capability, which are described in detail in WTP capability, which are described in detail in
[IEEE.802-11.2007]. The format of the field is: [IEEE.802-11.2007]. The format of the field is:
skipping to change at page 61, line 40 skipping to change at page 63, line 45
Key: A Session Key, whose length is known via the key length field, Key: A Session Key, whose length is known via the key length field,
used to provide data privacy. For static WEP keys, which is true used to provide data privacy. For static WEP keys, which is true
when the 'Key Status' bit is set to one, this key is used for both when the 'Key Status' bit is set to one, this key is used for both
unicast and multicast traffic. For encryption schemes that employ unicast and multicast traffic. For encryption schemes that employ
a separate encryption key for unicast and multicast traffic, the a separate encryption key for unicast and multicast traffic, the
key included here only applies to multicast data, and the cipher key included here only applies to multicast data, and the cipher
suite is specified in an accompanied RSN Information Element. In suite is specified in an accompanied RSN Information Element. In
these scenarios, the key, and cipher information, is communicated these scenarios, the key, and cipher information, is communicated
via the Add Station message element, see Section 4.6.8 in via the Add Station message element, see Section 4.6.8 in
[I-D.ietf-capwap-protocol-specification]. [I-D.ietf-capwap-protocol-specification]. When used with WEP, the
key field includes the broadcast key. When used with CCMP, the
Key field includes the 128-bit Group Temporal Key. When used with
TKIP, the Key field includes the 256-bit Group Temporal Key (which
consists of a 128-bit key used as input for TKIP key mixing, and
two 64-bit keys used for Michael).
6.22. IEEE 802.11 WTP Quality of Service 6.22. IEEE 802.11 WTP Quality of Service
The IEEE 802.11 WTP Quality of Service message element value is sent The IEEE 802.11 WTP Quality of Service message element value is sent
by the AC to the WTP to communicate quality of service configuration by the AC to the WTP to communicate quality of service configuration
information. The QoS tag included in this message element are the information. The QoS tag included in this message element are the
default QoS values to be applied to packets received by the WTP from default QoS values to be applied to packets received by the WTP from
stations on a particular radio. Any tagging performed by the WTP stations on a particular radio. Any tagging performed by the WTP
MUST be directly applied to the packets receive from the station, as MUST be directly applied to the packets receive from the station, as
well as the CAPWAP tunnel, if the packets are tunneled to the AC. well as the CAPWAP tunnel, if the packets are tunneled to the AC.
skipping to change at page 62, line 15 skipping to change at page 64, line 26
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID |Tagging Policy | QoS Sub-Element ... | Radio ID |Tagging Policy | QoS Sub-Element ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1045 for IEEE 802.11 WTP Quality of Service Type: 1045 for IEEE 802.11 WTP Quality of Service
Length: 34 Length: 34
Radio ID: The Radio Identifier, typically refers to some interface Radio ID: The Radio Identifier, whose value is between one (1) and
index on the WTP 31, typically refers to some interface index on the WTP
Tagging Policy: A bit field indicating how the WTP is to mark Tagging Policy: A bit field indicating how the WTP is to mark
packets for QoS purposes. The required WTP behavior is defined in packets for QoS purposes. The required WTP behavior is defined in
Section 2.6.1. The field has the following format: Section 2.6.1. The field has the following format:
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+
|Rsvd |P|Q|D|O|I| |Rsvd |P|Q|D|O|I|
+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+
skipping to change at page 64, line 32 skipping to change at page 67, line 4
| BSSID | | BSSID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| BSSID | Beacon Period | | BSSID | Beacon Period |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Country String | | Country String |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1046 for IEEE 802.11 WTP WLAN Radio Configuration Type: 1046 for IEEE 802.11 WTP WLAN Radio Configuration
Length: 16 Length: 16
Radio ID: An 8-bit value representing the radio to configure, whose
Radio ID: An 8-bit value representing the radio to configure. value is between one (1) and 31.
Short Preamble: An 8-bit value indicating whether short preamble is Short Preamble: An 8-bit value indicating whether short preamble is
supported. The following enumerated values are currently supported. The following enumerated values are currently
supported: supported:
0 - Short preamble not supported. 0 - Short preamble not supported.
1 - Short preamble is supported. 1 - Short preamble is supported.
BSSID: The WLAN Radio's base MAC Address. BSSID: The WLAN Radio's base MAC Address.
skipping to change at page 65, line 35 skipping to change at page 67, line 51
wish to allow for the configuration of this field will need to wish to allow for the configuration of this field will need to
validate this behavior during its radio certification process. validate this behavior during its radio certification process.
Other WTP vendors may simply wish to treat this WTP configuration Other WTP vendors may simply wish to treat this WTP configuration
parameter as read-only. The country strings can be found in parameter as read-only. The country strings can be found in
[ISO.3166-1]. [ISO.3166-1].
The WTP and AC MAY ignore the value of this field, depending upon The WTP and AC MAY ignore the value of this field, depending upon
regulatory requirements, for example to avoid classification as a regulatory requirements, for example to avoid classification as a
Software Defined Radio. When this field is used, the first two Software Defined Radio. When this field is used, the first two
octets of this string is the two character country string as octets of this string is the two character country string as
described in document [ISO.3166-1], and the third octet MUST have described in document [ISO.3166-1], and the third octet MUST
the value 1, 2 or 3 as defined below. When the value of the third either be a space, 'O', 'I' or X' as defined below. When the
octet is 255, the country string field is not used, and MUST be value of the third octet is 255 (HEX 0xff), the country string
ignored. field is not used, and MUST be ignored. The following are the
possible values for the third octet:
1. an ASCII space character, if the regulations under which the 1. an ASCII space character, if the regulations under which the
station is operating encompass all environments in the country, station is operating encompass all environments in the country,
2. an ASCII 'O' character, if the regulations under which the 2. an ASCII 'O' character, if the regulations under which the
station is operating are for an outdoor environment only, or station is operating are for an outdoor environment only, or
3. an ASCII 'I' character, if the regulations under which the 3. an ASCII 'I' character, if the regulations under which the
station is operating are for an indoor environment only. station is operating are for an indoor environment only.
4. an ASCII 'X' character, if the station is operating under a 4. an ASCII 'X' character, if the station is operating under a
non-country entity. The first two octets of the non-country non-country entity. The first two octets of the non-country
entity shall be two ASCII 'XX' characters. entity shall be two ASCII 'XX' characters.
3. a HEX 0xff character means that the country string field is
not used and MUST be ignored.
Note that the last byte of the Country String MUST be set to NULL. Note that the last byte of the Country String MUST be set to NULL.
6.24. IEEE 802.11 WTP Radio Fail Alarm Indication 6.24. IEEE 802.11 WTP Radio Fail Alarm Indication
The IEEE 802.11 WTP Radio Fail Alarm Indication message element is The IEEE 802.11 WTP Radio Fail Alarm Indication message element is
sent by the WTP to the AC when it detects a radio failure. sent by the WTP to the AC when it detects a radio failure.
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | Type | Status | Pad | | Radio ID | Type | Status | Pad |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type: 1047 for IEEE 802.11 WTP Radio Fail Alarm Indication Type: 1047 for IEEE 802.11 WTP Radio Fail Alarm Indication
Length: 4 Length: 4
Radio ID: The Radio Identifier, typically refers to some interface Radio ID: The Radio Identifier, whose value is between one (1) and
index on the WTP 31, typically refers to some interface index on the WTP
Type: The type of radio failure detected. The following enumerated Type: The type of radio failure detected. The following enumerated
values are supported: values are supported:
1 - Receiver 1 - Receiver
2 - Transmitter 2 - Transmitter
Status: An 8-bit boolean indicating whether the radio failure is Status: An 8-bit boolean indicating whether the radio failure is
being reported or cleared. A value of zero is used to clear the being reported or cleared. A value of zero is used to clear the
event, while a value of one is used to report the event. event, while a value of one is used to report the event.
Pad: All implementations complying with version zero of this Pad: All implementations complying with version zero of this
protocol MUST set these bits to zero. Receivers MUST ignore all protocol MUST set these bits to zero. Receivers MUST ignore all
bits not defined for the version of the protocol they support. bits not defined for the version of the protocol they support.
skipping to change at page 67, line 17 skipping to change at page 69, line 38
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio ID | Radio Type | | Radio ID | Radio Type |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Radio Type | | Radio Type |
+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+
Type: 1048 for IEEE 802.11 WTP Radio Information Type: 1048 for IEEE 802.11 WTP Radio Information
Length: 5 Length: 5
Radio ID: The Radio Identifier, which typically refers to an Radio ID: The Radio Identifier, whose value is between one (1) and
interface index on the WTP 31, which typically refers to an interface index on the WTP
Radio Type: The type of radio present. Note this is a bit field Radio Type: The type of radio present. Note this is a bit field
which is used to specify support for more than a single type of which is used to specify support for more than a single type of
PHY/MAC. The field has the following format: PHY/MAC. The field has the following format:
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+
|Reservd|N|G|A|B| |Reservd|N|G|A|B|
+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+
Reservd: A set of reserved bits for future use. All Reservd: A set of reserved bits for future use. All
implementations complying with this protocol MUST set to zero implementations complying with this protocol MUST set to zero
any bits that are reserved in the version of the protocol any bits that are reserved in the version of the protocol
supported by that implementation. Receivers MUST ignore all supported by that implementation. Receivers MUST ignore all
bits not defined for the version of the protocol they support. bits not defined for the version of the protocol they support.
N: An IEEE 802.11n radioP. N: An IEEE 802.11n radio.
G: An IEEE 802.11g radio. G: An IEEE 802.11g radio.
A: An IEEE 802.11a radio. A: An IEEE 802.11a radio.
B: An IEEE 802.11b radio. B: An IEEE 802.11b radio.
7. IEEE 802.11 Binding WTP Saved Variables 7. IEEE 802.11 Binding WTP Saved Variables
This section contains the IEEE 802.11 binding specific variables that This section contains the IEEE 802.11 binding specific variables that
skipping to change at page 69, line 19 skipping to change at page 72, line 19
specific. specific.
8.1. WTP Descriptor Message Element, Encryption Capabilities Field: 8.1. WTP Descriptor Message Element, Encryption Capabilities Field:
This specification defines two new bits for the WTP Descriptor's This specification defines two new bits for the WTP Descriptor's
Encryption Capabilities field, as defined in Encryption Capabilities field, as defined in
[I-D.ietf-capwap-protocol-specification]. Note that only the bits [I-D.ietf-capwap-protocol-specification]. Note that only the bits
defined in this specification are described below. The format of the defined in this specification are described below. The format of the
Encryption Capabilities Field is: Encryption Capabilities Field is:
0 1 2 3 4 5 6 7 1
+-+-+-+-+-+-+-+-+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |A|T| | | |A|T| |
+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
A: WTP supports AES-CCMP, as defined in [IEEE.802-11.2007]. A: WTP supports AES-CCMP, as defined in [IEEE.802-11.2007].
T: WTP supports TKIP and Michael, as defined in [IEEE.802-11.2007] T: WTP supports TKIP and Michael, as defined in [IEEE.802-11.2007]
and [WPA], respectively. and [WPA], respectively.
9. Security Considerations 9. Security Considerations
This section describes security considerations for using IEEE 802.11 This section describes security considerations for using IEEE 802.11
with the CAPWAP protocol. A complete threat analysis of the CAPWAP with the CAPWAP protocol. A complete threat analysis of the CAPWAP
skipping to change at page 77, line 9 skipping to change at page 80, line 9
The following individuals are acknowledged for their contributions to The following individuals are acknowledged for their contributions to
this binding specification: Puneet Agarwal, Charles Clancy, Pasi this binding specification: Puneet Agarwal, Charles Clancy, Pasi
Eronen, Saravanan Govindan, Scott Kelly, Peter Nilsson, Bob O'Hara, Eronen, Saravanan Govindan, Scott Kelly, Peter Nilsson, Bob O'Hara,
David Perkins, Margaret Wasserman and Yong Zhang. David Perkins, Margaret Wasserman and Yong Zhang.
12. References 12. References
12.1. Normative References 12.1. Normative References
[RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", BCP 26, RFC 5226,
May 2008.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997. Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H. [RFC2474] Nichols, K., Blake, S., Baker, F., and D. Black,
Levkowetz, "Extensible Authentication Protocol (EAP)", "Definition of the Differentiated Services Field (DS
RFC 3748, June 2004. Field) in the IPv4 and IPv6 Headers", RFC 2474,
December 1998.
[RFC2597] Heinanen, J., Baker, F., Weiss, W., and J. Wroclawski, [RFC2597] Heinanen, J., Baker, F., Weiss, W., and J. Wroclawski,
"Assured Forwarding PHB Group", RFC 2597, June 1999. "Assured Forwarding PHB Group", RFC 2597, June 1999.
[RFC2598] Jacobson, V., Nichols, K., and K. Poduri, "An Expedited [RFC2598] Jacobson, V., Nichols, K., and K. Poduri, "An Expedited
Forwarding PHB", RFC 2598, June 1999. Forwarding PHB", RFC 2598, June 1999.
[RFC2474] Nichols, K., Blake, S., Baker, F., and D. Black,
"Definition of the Differentiated Services Field (DS
Field) in the IPv4 and IPv6 Headers", RFC 2474,
December 1998.
[RFC3168] Ramakrishnan, K., Floyd, S., and D. Black, "The Addition [RFC3168] Ramakrishnan, K., Floyd, S., and D. Black, "The Addition
of Explicit Congestion Notification (ECN) to IP", of Explicit Congestion Notification (ECN) to IP",
RFC 3168, September 2001. RFC 3168, September 2001.
[RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H.
Levkowetz, "Extensible Authentication Protocol (EAP)",
RFC 3748, June 2004.
[RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", BCP 26, RFC 5226,
May 2008.
[FIPS.197.2001] [FIPS.197.2001]
National Institute of Standards and Technology, "Advanced National Institute of Standards and Technology, "Advanced
Encryption Standard (AES)", FIPS PUB 197, November 2001, < Encryption Standard (AES)", FIPS PUB 197, November 2001, <
http://csrc.nist.gov/publications/fips/fips197/ http://csrc.nist.gov/publications/fips/fips197/
fips-197.pdf>. fips-197.pdf>.
[ISO.3166-1] [ISO.3166-1]
ISO Standard, "International Organization for ISO Standard, "International Organization for
Standardization, Codes for the representation of names of Standardization, Codes for the representation of names of
countries and their subdivisions - Part 1: Country codes", countries and their subdivisions - Part 1: Country codes",
skipping to change at page 78, line 10 skipping to change at page 81, line 10
information exchange between systems - Local and information exchange between systems - Local and
metropolitan area networks - Specific requirements - Part metropolitan area networks - Specific requirements - Part
11: Wireless LAN Medium Access Control (MAC) and Physical 11: Wireless LAN Medium Access Control (MAC) and Physical
Layer (PHY) specifications", IEEE Standard 802.11, 2007, < Layer (PHY) specifications", IEEE Standard 802.11, 2007, <
http://standards.ieee.org/getieee802/download/ http://standards.ieee.org/getieee802/download/
802.11-2007.pdf>. 802.11-2007.pdf>.
[I-D.ietf-capwap-protocol-specification] [I-D.ietf-capwap-protocol-specification]
Montemurro, M., Stanley, D., and P. Calhoun, "CAPWAP Montemurro, M., Stanley, D., and P. Calhoun, "CAPWAP
Protocol Specification", Protocol Specification",
draft-ietf-capwap-protocol-specification-12 (work in draft-ietf-capwap-protocol-specification-13 (work in
progress), September 2008. progress), September 2008.
[IEEE.802-1X.2004] [IEEE.802-1X.2004]
"Information technology - Telecommunications and "Information technology - Telecommunications and
information exchange between systems - Local and information exchange between systems - Local and
metropolitan area networks - Specific requirements - Port- metropolitan area networks - Specific requirements - Port-
Based Network Access Control", IEEE Standard 802.1X, 2004, Based Network Access Control", IEEE Standard 802.1X, 2004,
<http://standards.ieee.org/getieee802/download/ <http://standards.ieee.org/getieee802/download/
802.1X-2004.pdf>. 802.1X-2004.pdf>.
 End of changes. 71 change blocks. 
217 lines changed or deleted 322 lines changed or added

This html diff was produced by rfcdiff 1.35. The latest version is available from http://tools.ietf.org/tools/rfcdiff/