RFC 5418

Control And Provisioning of Wireless Access Points (CAPWAP) Threat Analysis for IEEE 802.11 Deployments, March 2009

Canonical URL:
https://www.rfc-editor.org/rfc/rfc5418.txt
File formats:
Plain TextPDF
Status:
INFORMATIONAL
Authors:
S. Kelly
T. Clancy
Stream:
IETF
Source:
capwap (ops)

Cite this RFC: TXT  |  XML

DOI:  10.17487/RFC5418

Discuss this RFC: Send questions or comments to capwap@frascone.com

Other actions: Submit Errata  |  Find IPR Disclosures from the IETF


Abstract

Early Wireless Local Area Network (WLAN) deployments feature a "fat" Access Point (AP), which serves as a \%stand-alone interface between the wired and wireless network segments. However, this model raises scaling, mobility, and manageability issues, and the Control and Provisioning of Wireless Access Points (CAPWAP) protocol is meant to address these issues. CAPWAP effectively splits the fat AP functionality into two network elements, and the communication channel between these components may traverse potentially hostile hops. This document analyzes the security exposure resulting from the introduction of CAPWAP and summarizes the associated security considerations for IEEE 802.11-based CAPWAP implementations and deployments. This memo provides information for the Internet community.


For the definition of Status, see RFC 2026.

For the definition of Stream, see RFC 4844.


Download PDF Reader



Search RFCs
Advanced Search
×