802.11r, 802.11k, 802.11v, 802.11w Fast Transition Roaming
802.11r, 802.11k, 802.11v, 802.11w Fast Transition Roaming
When a client is roaming between AP1 and AP2 that are connected to the same controller, the following
steps takes place by default:
Step 1 Client associates with AP1 and requests to roam with AP2.
Step 2 Client sends a FT Authentication Request to AP2 and receives a FT Authentication Response from AP2.
Step 3 Client sends a FT Re-association Request to AP2 and receives a FT Re-association Response from AP2.
Step 4 Client completes its roam from AP1 to AP2.
When a client is roaming between AP1 and AP2 which are connected to different controllers such as
WLC1 and WLC2, respectively, within mobility group, the following steps takes place by default:
Step 1 Client associates with AP1 and requests to roam with AP2.
Step 2 Client sends a FT Authentication Request to AP2 and receives a FT Authentication Response from AP2.
Step 3 WLC-1 sends PMK and mobility message to WLC-2 about the roaming client that uses mobility
infrastructure.
Step 4 Client completes its roam from AP1 to AP2.
When a client is roaming between AP1 and AP2 that are connected to the same controller, the following
steps takes place by default:
Step 1 Client associates with AP1 and requests to roam with AP2.
Step 2 Client sends a FT Authentication Request to AP1 and receives a FT Authentication Response from AP1.
Step 3 The controller sends the pre-authentication information to AP2 as the APs are connected to the same
controller.
Step 4 Client sends a FT Re-association Request to AP2 and receives a FT Re-association Response from AP2.
Step 5 Client completes its roam from AP1 to AP2.
When a client is roaming between AP1 and AP2 that are connected to the different controllers such as
WLC1 and WLC2 respectively within a mobility group, the following steps takes place by default:
Step 1 Client associates with AP1 and requests to roam with AP2.
Step 2 Client sends a FT Authentication Request to AP1 and receives a FT Authentication Response from AP1.
Step 3 WLC-1 sends Pairwise Master Key (PMK) and mobility message to WLC-2 about the roaming client.
Step 4 Client completes its roam from AP1 to AP2.
Note The Over the DS check box gets enabled only when you enable FT.
Step 7 In the Reassociation Timeout field, enter the number of seconds after which the reassociation attempt
of a client to an AP must time out. The valid range is 1 to 100 seconds.
Note The Reassociation Timeout field gets enabled only when you enable FT.
Step 8 Under Authentication Key Management, check the Enable check box of either FT 802.1X or FT PSK
to enable the key. To disable the key, uncheck the Enable check box.
Note If you check the FT PSK check box, from the PSK Format drop-down list, choose ASCII or
Hex and enter the key value.
Step 9 Choose Enable or Disable from the WPA gtk-randomize State drop-down list, to configure the WPA
Group Temporal Key (GTK) to randomize state.
config wlan security ft {enable | disable} Enable or disable 802.11r fast transition
wlan-id parameters.
config wlan security ft over-the-ds {enable | Enable or disable 802.11r fast transition
disable} wlan-id parameters over a distributed system. This is
disabled, by default.
config wlan security ft reassociation-timeout Enables 802.11r fast transition reassociation
timeout-in-seconds wlan-id timeout. The range is between 1 to 100 seconds.
The WLAN configuration contains a new Authenticated Key Management (AKM) type called FT (Fast
Transition).
config wlan security wpa akm ft-psk {enable | disable} wlan-id
config wlan security wpa akm ft-802.1X {enable | disable} wlan-id
Enable or disable the AKM for FT over a DS, enter the following command:
config wlan security wpa akm ft over-the-ds {enable | disable} wlan-id
To view the WLAN and FT parameters on the WLAN, enter the following command:
show wlan wlan-id
Troubleshooting Support
• Enable or disable debugging of FT events, using the following command:
debug ft events {enable | disable}
• Enable or disable debugging of key generation for FT, using the following command:
debug ft keys {enable | disable}
The following elements are implemented in the beacon and probe response on the AP to ensure smooth
integration with Apple handheld devices:
• Country Element—The Country Information Element contains the information required to allow a
station to identify the regulatory domain in which the station is located and to configure its PHY for
operation in that regulatory domain.
• Power Constraint Element—The power constraint element contains the information necessary to
allow a client to determine the local maximum transmit power in the current channel.
• RM Enable Capabilities Element—The RM Capabilities element is five octets long. When this
element is included in a beacon or probe response, it uses bit 1 to signal so that the AP can provide
neighbor list. When used in an association request, bit 1 signifies the client's request for a neighbor
list.
The presence of all three of these IEs signifies that this SSID is configured to provide a neighbor list on
request. For this release we send neighbor list based on the request from the client and not on the
neighbor list capability of the client in the IE.
The following Wireshark capture displays these information elements:
config wlan Configures assisted roaming prediction list for a WLAN. By default,
assisted-roaming prediction the assisted roaming prediction list is disabled.
{enable | disable} wlan-id
config assisted-roaming Configures the maximum number of times a client can deny
denial-maximum count association if the association request is sent to an AP which does not
match any AP on the prediction. The valid range is from 1 to 10, and
the default value is 5.
config assisted-roaming Configures the minimum number of predicted APs required for the
prediction-minimum count prediction list to activate. The default value is 3.
Troubleshooting Support
• Debug a client for assisted roaming, using the following command:
debug mac addr client-mac-addr
• Configure the debugging of all of the 802.11k events, using the following command:
debug 11k all {enable | disable}
• Verify the neighbor requests that are received, using the following command:
debug 11k events {enable | disable}
• Configure the debugging of the client roaming history, using the following command:
debug 11k history {enable | disable}
• Get details of client roaming parameters that are to be imported for offline simulation, using the
following command:
debug 11k simulation {enable | disable}
Troubleshooting Support
• Enable or disable 802.11v debug, using the following command on the WLC:
debug 11v detail
• Track the DMS requests processed by an access point, using the following command on the AP:
debug dot11 dot11v
Disassociation function
Optimized Roaming behavior: Check client stats every 90 seconds(or less), if RSSI fails & data rate fails,
disassociate the client.
Optimized Roaming + 802.11v behavior: If client is BSS Transition capable, instead of disassociating
the client, send the client BSS Transition Request
Restrictions
Client needs to support 802.11v BSS transition.
When Management Frame Protection is negotiated, the AP encrypts the GTK and IGTK values in the
EAPOL-Key frame, which is delivered in message 3 of 4-way handshake.
If the AP later changes the GTK, it sends the new GTK and IGTK to the client using the Group Key
Handshake.
802.11w defines a new Broadcast/Multicast Integrity Protocol (BIP) that provides data integrity and
replay protection for broadcast/multicast robust management frames after successful establishment of an
IGTKSA. It adds a MIC that is calculated using the shared IGTK key.
If the AP is not already engaged in an SA query with the client, the AP shall issue an SA query until a
matching SA query response is received or the Association Comeback time expires. An AP may interpret
reception of a valid protected frame as an indication of a successfully completed SA query. If an SA
query response with a matching transaction identifier is not received within the time period, the AP shall
allow the association process to start without additional SA Query procedures.
Note The 802.11w IGTK key is derived using the 4-way handshake. The key can only be used on
WLANs that are configured for WPA2 security at layer 2.
Step 5 In the Protected Management Frame area, choose the PMF state from the drop-down list. The
following options are available:
• Disabled— Disables 802.11w MFP protection on a WLAN.
• Optional— To be used if the client supports 802.11w.
• Required— Ensures that the clients that do not support 802.11w cannot associate with the
WLAN.
Step 6 If you choose the PMF state as either Optional or Required, perform the following:
• In the Comeback timer field, enter the association comeback interval in milliseconds. The
comeback interval is the time within which the access point re-associates with the client after a
valid security association.
• In the SA Query Timeout field, enter the maximum time before a Security Association (SA)
query times out.
Config wlan security pmf Configure the PMF parameters with the following options:
{disable | optional | • Association-comeback—Configures the 802.11w association. The
required} wlan-id range is from 1to20 seconds.
Config wlan security pmf
• Required— Requires clients to negotiate 802.11w MFP protection
association-comeback
on a WLAN.
timeout-in-seconds wlan-id
• Optional— Enables 802.11w MFP protection on a WLAN.
Config wlan security pmf
saquery-retrytimeout • Saquery-retry-time— Time interval identified in milliseconds in
timeout-in-milliseconds the association response to an already associated client before the
wlan-id association can be tried again. This time interval checks if the client
is a real client and not a rogue client during the association
comeback time. If the client does not respond within this time, the
client association is deleted from the controller. The saquery retry
time in milliseconds. The range is from 100 to 500 ms. The value
must be specified in multiples of 100 milliseconds.
WLAN configuration contains a new Authenticated Key Management (AKM) type called Protected
Management Frames (PMF).
• Configure the 802.1X authentication for PMF, using the following command:
config wlan security wpa akm pmf 802.1x {enable | disable} wlan-id
• Configure the pre-shared key support for PMF, using the command:
config wlan security wpa akm pmf psk {enable | disable} wlan-id
Note 802.11w cannot be enabled on WLANs of None, WEP-40, WEP-104, and WPA (AES or TKIP)
encryption.
Monitoring 802.11w
To display the WLAN and PMF parameters on the WLAN, enter the following command:
show wlan wlan-id
Troubleshooting Support
To configure the debugging of PMF, enter the following command:
debug pmf events {enable | disable}