RFC CAPWAP Protocol Base MIB May CAPWAP Control Channel: A bi-directional flow defined by the AC IP Address, WTP IP Address, AC control. The Control And Provisioning of Wireless Access Points (CAPWAP) protocol is a standard, The protocol specification is described in RFC RFC (part 1 of 6): Control And Provisioning of Wireless Access Points ( CAPWAP) Protocol Specification.

Author: Tygojinn Mazukasa
Country: Vietnam
Language: English (Spanish)
Genre: Literature
Published (Last): 22 May 2011
Pages: 298
PDF File Size: 12.33 Mb
ePub File Size: 4.5 Mb
ISBN: 155-1-33881-250-8
Downloads: 98829
Price: Free* [*Free Regsitration Required]
Uploader: Kigajinn

Acquiring – This state represents both devices connecting to each other, to begin encrypting their communications. To centralize the capwp and policy enforcement functions for a wireless network.

SLAPP attempted to solve a more general problem, not limiting itself to However, [RFC] does give two example protocols: Fit APs are a combination of the Thin and Thick metaphors. As mentioned in cxpwap 4. Once received, the controller moves to the Acquiring phase without responding yet. The challenges facing wireless networks with regard to standardized management and provisioning are difficult. Wireless controllers have some general tasks that they perform.

However, the header does not ffc any particular attention, and as such, will not be covered by this paper. In some vendor’s access points, even wireless encryption is not even performed at the AP.

An overview of the architecture and protocols use in access point AP to controller communication in enterprise grade wireless networks. More consideration has been placed on ensuring that CAPWAP is secure, by taking advantage of the security offered by requiring full encryption with authentication between the controller and AP. The controller then authenticates the AP, and begins uploading firmware to the AP.

Current Status and Overview of the CAPWAP Protocol

There are 6 main portions of a controller’s duties. Vendors do not have a clearly defined set of protocols that must be implemented, in order to be compatible with other vendors. It was seen as overly complex, as well as lacking in security, as portions of the control stream are unencrypted, and the dfc data stream between controller and AP are unencrypted.


The controller has a fixed set of The cost per unit is much lower than Fat APs, as the only logic necessary for functioning is the radio hardware and a simple wired interface, with memory to store firmware. The first is targeted at server hardware, and handles the operation of the controller. Once the AP has received the configuration, it may enter the Run state. Change State Event Request More specifically, it fails to define key duties mentioned in [Section 2.

Primary Discovery Request Message Extensibility is provided via a generic encapsulation and transport mechanism, enabling the CAPWAP protocol to be applied to many access point types in the future, via a specific wireless binding.

The controller processes the Discovery Request, and if valid, responds in the positive, and moves to Securing. The AP sends the controller its current configuration, and the controller responds with an updated configuration. Because they are standalone devices, they also cause difficulties when managing a growing network of many devices, as firmware and configuration must be handled on an individual basis for each device. AC Name with Priority The Receiver-From-STA thread can pass along messages through the Principal thread, which are sent back to the controller for processing.

In order to understand the CAPWAP, one must first understand the basic controller-AP structure, common to most, if not all enterprise grade wireless network deployments. A Fat AP understands and speaks layer 2 and possible layer 3 protocols, and is addressable on the network. Allowing these functions to be performed from a centralized AC in an interoperable fashion increases manageability and allows network operators to more tightly control their wireless network infrastructure.

The migration towards a unified standard will be long, and not necessarily even happen, because each vendor already supports its own proprietary protocols, and sees little motivation to commoditize their AP hardware by introducing CAPWAP across the industry.

This limits interoperability to only vendors who have implemented [RFC]which is just Cisco as of the time of this writing. Firstly, it should enable a centralized management solution of the various hardware in a typical WLAN deployment.


The second program is run on each AP, in order to facilitate communication between the AP and controller.

They are responsible for discovering, authenticating, and registration of APs, as well as maintaining a service channel to communicate over. Thus, OpenCAPWAP is only a proof of concept, as they are limited in the hardware that they may support, by a lack of common target hardware, as well as differencing This paper is organized as follows: The WLAN market is structured similarly to an oligopoly, because the market is controlled by a very small set of vendors, namely Aruba, Cisco, Meru, and Capwwp.

A controller must respond with a Discovery Response. Second, it should make configuration of multiple hardware types transparent, and ensure configurations are consistent across the network.

A rcf that contains an interface to a wireless medium WM. In either case, the L2 wireless management frames are processed locally. Please see [fig 8] for a diagram. Finally configuration takes place, and the AP is set capqap active mode.

The controller can then authenticate the AP, and negotiate its advertised capabilities, such as being A single Receiver thread receives and processes any requests from APs. The only duties that the controller is responsible for under this scheme is wireless key management and authentication proxying.

CAPWAP, Control And Provisioning of Wireless Access Points

Current capwsp solutions and interoperability is also covered, and the current state and trends in the enterprise WLAN market are discussed. From the Run state, an AP and controller may exchange new key material, by entering the Key Update state.

Discovery – Discovery is the initial broadcast from an AP, informing controllers that they are interested in communicating in a specific protocol.