Control And Provisioning of Wireless Access Points (CAPWAP) Protocol Specification

This specification defines the Control And Provisioning of Wireless Access Points (CAPWAP) Protocol, meeting the objectives defined by the CAPWAP Working Group in RFC 4564. The CAPWAP protocol is designed to be flexible, allowing it to be used for a variety of wireless technologies. This document describes the base CAPWAP protocol, while separate binding extensions will enable its use with additional wireless technologies. [STANDARDS-TRACK]

[1]  Paul Vixie,et al.  A DNS RR for specifying the location of services (DNS SRV) , 1996, RFC.

[2]  Stephen E. Deering,et al.  Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.

[3]  Russ Housley,et al.  Guidance for Authentication, Authorization, and Accounting (AAA) Key Management , 2007, RFC.

[4]  Eric Rescorla,et al.  The Design and Implementation of Datagram TLS , 2004, NDSS.

[5]  Pat R. Calhoun,et al.  Control and Provisioning of Wireless Access Points (CAPWAP) Protocol Binding for IEEE 802.11 , 2009, RFC.

[6]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[7]  David Cooper,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.

[8]  Stephen E. Deering,et al.  Path MTU Discovery for IP version 6 , 1996, RFC.

[9]  T. Charles Clancy,et al.  Control And Provisioning of Wireless Access Points (CAPWAP) Threat Analysis for IEEE 802.11 Deployments , 2009, RFC.

[10]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.

[11]  David L. Mills,et al.  Network Time Protocol (Version 3) Specification, Implementation , 1992 .

[12]  Eric Rescorla,et al.  Datagram Transport Layer Security , 2006, RFC.

[13]  Godred Fairhurst,et al.  The Lightweight User Datagram Protocol (UDP-Lite) , 2004, RFC.

[14]  Pat R. Calhoun Control And Provisioning of Wireless Access Points (CAPWAP) Access Controller DHCP Option , 2009, RFC.

[15]  Thomas Narten,et al.  Guidelines for Writing an IANA Considerations Section in RFCs , 1998, RFC.

[16]  Matt Mathis,et al.  IPv4 Reassembly Errors at High Data Rates , 2007, RFC.

[17]  David L. Black,et al.  Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers , 1998, RFC.

[18]  Hong Cheng,et al.  Objectives for Control and Provisioning of Wireless Access Points (CAPWAP) , 2006, RFC.

[19]  Jonathan Wood,et al.  Authentication, Authorization and Accounting (AAA) Transport Profile , 2003, RFC.

[20]  David L. Black,et al.  The Addition of Explicit Congestion Notification (ECN) to IP , 2001, RFC.

[21]  Hannes Tschofenig,et al.  Pre-Shared Key Ciphersuites for Transport Layer Security (TLS) , 2005, RFC.

[22]  Stephen E. Deering,et al.  Path MTU discovery , 1990, RFC.

[23]  Donald E. Eastlake,et al.  Randomness Requirements for Security , 2005, RFC.

[24]  Subbu Ponnuswamy,et al.  SLAPP: Secure Light Access Point Protocol , 2010, RFC.

[25]  Joyce K. Reynolds Assigned Numbers: RFC 1700 is Replaced by an On-line Database , 2002, RFC.

[26]  Tim Dierks,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .

[27]  Francois Yergeau,et al.  UTF-8, a transformation format of ISO 10646 , 1998, RFC.

[28]  Matt Mathis,et al.  Packetization Layer Path MTU Discovery , 2007, RFC.

[29]  Jukka Manner,et al.  Mobility Related Terminology , 2004, RFC.

[30]  Susan Hares,et al.  Lightweight Access Point Protocol , 2010, RFC.

[31]  Scott O. Bradner,et al.  Key words for use in RFCs to Indicate Requirement Levels , 1997, RFC.