SLAPP Dan Harkins Partha Narasimhan Subbu Ponnuswarmy.

Slides:



Advertisements
Similar presentations
Designing for Pervasive Network Security. Designing for Security Our aim in this section will be to concentrate on how campus Networks can be designed.
Advertisements

28-May Interim - Geneva 802.1AB-Rev Proposal for Device Specific Location Delivery over Wireless LAN.
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
1 Capwap issues.PPT / DD-MM-YYYY / Initials CAPWAP Issues.
CAPWAP BOF Control And Provisioning of Wireless Access Points James Kempf DoCoMo Labs USA Dorothy Stanley Agere Systems WAP!
Jonas Lippuner. Overview IPCop  Introduction  Network Structure  Services  Addons Installing IPCop on a SD card  Hardware  Installation.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
Format Scandisk Defragmentation Antivirus Compression Software
67th IETF San Diego IETF BMWG WLAN Switch Benchmarking Jerry Perser, Tom Alexander, Muninder Singh Sambi,
Andrew Fuqua 3/4/2015 LTEC A network HUB is a device that is used to link multiple devices over a network. The HUB is not a great choice when shopping.
NovaBACKUP 10 xSP Technical Training By: Nathan Fouarge
- 1 - A Powerful Dual-mode IP core for a/b Wireless LANs.
Basic Networking Components
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
OmniRAN SoA and Gap Analysis Date: [ ] Authors: NameAffiliationPhone Antonio de la Juan Carlos
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Light Weight Access Point Protocol (LWAPP) IETF 57 Pat Calhoun, Airespace.
Review of Memory Management, Virtual Memory CS448.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
Yang Shi (Richard), Yong Zhang IETF 74 th 26 March 2009, San Francisco CAPWAP WG MIB Drafts Report.
Lecture 11 Page 1 CS 111 Online Memory Management: Paging and Virtual Memory CS 111 On-Line MS Program Operating Systems Peter Reiher.
Roaming Over Savi Device Tao Lin IETF 79. Outline DHCP/NDP Snooping mechanism Switch implementation Roaming over switches WLAN network Roaming over WLAN.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Doc.: IEEE /595r2 Submission May 2002 Lily Yang, Tyan-Shu JouSlide 1 Mesh Relevance in CAPWAP and AP Functional Descriptions L. Lily Yang (Intel.
Status Update of CAPWAP Architecture Taxonomy Lily Yang (Editor) Intel Corp. August 4, th IETF meeting.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
CAPWAP Taxonomy Recommendations Pat R. Calhoun, Cisco Systems Bob O’Hara, Cisco Systems Inderpreet Singh, Chantry Networks.
CAPWAP Arch-Draft Issues IETF 59, Seoul 4 March 2004.
Thoughts on KeySec John Viega
62 nd IETF – CAPWAP Working Group1 CAPWAP Objectives Saravanan Govindan March 2005.
Issue #138 CAPWAP WG Meeting IETF 68, Prague. Issue 138 #138: Support and Negotiation of WTP data encryption in the CAPWAP protocol Proposed solution.
Packet Format Issues #227: Need Shim Header to indicate Crypto Property of packet Do we need to add pre-amble header to indicate if data is encrypted or.
CAPWAP Security 65 th IETF 20 March 2006 Scott Kelly
Virtual Local Area Networks (VLANs) Part II
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
57 th IETF CAPWAP Security Issues David Molnar Security Architect July 18, 2003.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
KMIP Compliance Redefining Server and Client requirements to claim compliance Presented by: Bob Lockhart.
61 st IETF – CAPWAP Working Group1 CAPWAP Objectives Saravanan Govindan Panasonic 8 November, 2004.
CAPWAP Working Group MIB documents IETF 65 David T. Perkins.
NETWORK DEVICES RONALD SHERGA OCTOBER 13, 2015 LTEC 4550.
July 2007 CAPWAP Protocol Specification Editors' Report July 2007
1 IEEE interim, Orlando, Florida, March, 2008new-nfinn-fast-chains-rings-par5c-0308-v1 Fast Recovery for Chains and Rings Proposal for PAR and 5.
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
KMIP Compliance Redefining Server and Client requirements to claim compliance Presented by: Bob Lockhart.
Software Defined Networking and OpenFlow Geddings Barrineau Ryan Izard.
Peer-to-Peer Solutions Between Service Providers David A. Bryan CTO, Jasomi Networks October 10, 2002 – Fall VON, Atlanta, GA.
Hybrid-MAC Model for CAPWAP draft-ietf-opsawg-capwap-hybridmac-00 Presenting: Hui Deng:
Boot Engineering Extension Record (B.E.E.R.) By Curtis E. Stevens.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
David T. Perkings Shi Yang IETF 70 th 2 Dec 2007, Vancouver CAPWAP WG MIB.
Overlapping eduroam networks operated by different organizations
Shi Yang David T. Perkins IETF 70th 3 Dec 2007, Vancouver
Topic #1 & #5 “All that has to do with header formats”
2002 IPv6 技術巡迴研討會 IPv6 Mobility
RNI Requirements Imposed by PBB-TE
Software Defined Networking (SDN)
WLAN Mesh in CAPWAP Architecture
PEKM (Post-EAP Key Management Protocol)
Mesh Relevance in CAPWAP and AP Functional Descriptions
IETF Liaison Report November 2004 Dorothy Stanley – Agere Systems
WLAN Mesh in CAPWAP Architecture
Mesh Relevance in CAPWAP and AP Functional Descriptions
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
CS703 – Advanced Operating Systems
OPERATING SYSTEMS MEMORY MANAGEMENT BY DR.V.R.ELANGOVAN.
doc.: IEEE <doc#>
VLANS The Who, What Why, And Where's to using them
Presentation transcript:

SLAPP Dan Harkins Partha Narasimhan Subbu Ponnuswarmy

Why CAPWAP? To allow for interoperability between an AC from one vendor and a WTP from another Because there’s a belief that WTPs will become inexpensive, commodity-priced devices and economics will require something like CAPWAP.

Dynamic WLAN Market New technologies being developed as we sit here –802.11r –802.11k Lots of vendor innovation in things like rogue detection, IDS, location services, PMK caching for fast handoffs between WTPs All the innovation is being done in the WLAN switch market, exactly what CAPWAP is addressing

Standards are fun but… Standards are appropriate when the vast majority of the problem space is solvable and the technology is not very fluid. Final part of problem is solved with “vendor extensions” Standardizing on one approach to a snapshot in time of a dynamic environment would stifle innovation and lock everyone into a less-than- ideal common denominator of reduced functionality. The amount of “vendor extensions” would grow as the technology expands and the utility of the standard decreases

Standards are fun but… A control and data tunneling protocol is a good idea but one is pretty much the same as the other– a single approach to a snapshot in time of a dynamic environment. pah-tay-to, poh-tah-to Something else is needed to ensure that innovation and product differentiation is still possible going forward.

SLAPP Negotiable control protocol –One is defined for in the draft but you could easily define a new magic number to be LWAPP’s control and tunneling protocol, or CTP’s control and tunneling protocol, or an control protocol, or…. –Image download feature to provide a bootable image in which a control and tunneling protocol is embedded (could be LWAPP’s, could be CTP’s, could be something proprietary) Image download enables continued innovation in a dynamic technology like

To download an image or not to download an image, that is the question Imagine k is finalized and becomes part of the base standard. What happens if we don’t have image download? –Reconvene the WG to define new standard features for CAPWAP. The WG that never dies!!! –Define vendor specific extensions A vendor that does both AC and WTP makes a proprietary version of “the standard”. Wow! Otherwise vendors must agree on some vendor-specific attributes and wait for them to rev their code and notify your customers of the new matrix of what version of your’’s works with what version of their’s to get k functionality.

To download an image or not to download an image, that is the question Imagine k is finalized and becomes part of the base standard. What happens if we have image download? –If the AC vendor owns code that’s been ported to various WTPs, just do it! –If the AC vendor doesn’t own the code it contacts the WTP vendor to agree on how to extend the proprietary protocol they share. Better than the best case of the “no image download” option because image versions are stored on the AC, no interoperability matrix.

Image download is real Multiple examples exist today where a fat AP from one vendor can be given a brain transplant and turned into a thin AP and controlled by an AC from a different vendor. It requires close co-operation between the AC maker and the WTP maker, right? –To do quickly yes, but so what? Assuming WTPs become commodity priced devices their vendors will happily share the hardware characteristics necessary to port a code base to their WTP. It’s in their best interest after all. –To do less quickly no. But it’s still possible.

SLAPP Technology separation– discovery and authentication step, then media-specific control protocol step– allows SLAPP to be used for other wireless media (e.g ) Supports multiple topologies for connecting WTPs and ACs –Local MAC (bridged and tunneled) –Split MAC (L2 encryption at WTP and L2 encryption at AC)

SLAPP Uses proven technology instead of re- inventing the wheel –DTLS for data protection of entire control protocol (including image download) –GRE for user data encapsulation if SLAPP’s control protocol is used. Satisfies requirements in CAPWAP Objectives Draft

Thank You