Tags

, , ,

In this post we will see how a basic 802.11 roam works using Cisco WLC & two APs. My WLC is 4402 & running on 7.0.116.0 code.

802.11-Roaming-Basics-00I have configured a SSID called TEST1 with 802.1X security. Here is WLAN security settings

(4402-3) >show wlan 1
WLAN Identifier.................................. 1
Profile Name..................................... TEST1
Network Name (SSID).............................. TEST1
Status........................................... Enabled
.
.
Radius Servers
   Authentication................................ 192.168.100.2 1812
   Accounting.................................... 192.168.100.2 1813
Security
   802.11 Authentication:........................ Open System
   Static WEP Keys............................... Disabled
   802.1X........................................ Disabled
   Wi-Fi Protected Access (WPA/WPA2)............. Enabled
      WPA (SSN IE)............................... Disabled
      WPA2 (RSN IE).............................. Enabled
         TKIP Cipher............................. Disabled
         AES Cipher.............................. Enabled
      Auth Key Management
         802.1x.................................. Enabled
         PSK..................................... Disabled
         CCKM.................................... Disabled
         FT(802.11r)............................. Disabled
         FT-PSK(802.11r)......................... Disabled
FT Reassociation Timeout......................... 20
FT Over-The-Air mode............................. Enabled
FT Over-The-Ds mode.............................. Enabled
CCKM tsf Tolerance............................... 1000
.

I have statically configure the LAP1 & LAP2 channels &  TX-Power Level(to min) in order to have better control over roaming in my lab setup & allowing me to capture packets over the air on those channels (36,40).

config 802.11a disable LAP2
config 802.11a channel ap LAP2 40
config 802.11a txPower ap LAP2 7
config 802.11a enable LAP2

config 802.11a disable LAP1
config 802.11a channel ap LAP1 36
config 802.11a txPower ap LAP1 7
config 802.11a enable LAP1

You can verify your configuration using “show ap config 802.11a summary” CLI command.

(4402-3) >show ap config 802.11a summary 
AP Name                SubBand RadioMAC            Status     Channel   PwLvl   SlotId 
--------------------   ------- ------------------  --------   -------   ------  ------ 
LAP2                      -    2c:3f:38:2a:b1:20   ENABLED    40        7       1         
LAP1                      -    64:a0:e7:af:47:40   ENABLED    36        7       1

Here is the packet flow when client associates to the wireless network. 7921 has associated to LAP2. After open system authentication, it is going through EAP-LEAP authentication process & then followed by 4-Way Handshake prior to user traffic start passing through. As you can see in this frame capture it took 116ms (time taken from frame 365 to 400) for the complete process.

802.11-Roaming-Basics-02Now, if I move my 7921 towards LAP1 you can see it is decided join to LAP1 (Based on the RSSI, SNR,etc received by client- Note that roaming decision is purely made by client & AP/WLC have no control). In here as well you can see it took around 119ms (frame 455-489) to complete the roam process. During this process most of time taken for the EAP process (~90ms  from frame 463-481)

802.11-Roaming-Basics-03As you can see in the above, Roaming process start by 7921 sending a “Reassociation Request” frame to LAP1. Here is the detail of that frame. Note that there are two fieds (PMKID Count,PMKList) in this Reassociation Request frame that will be used if any Fast Secure Roaming method in used (not in our case here) to indicate the target AP that client was already in the network with secure association.802.11-Roaming-Basics-04Then AP responds with “Reassociation Response” frame indicating client can join the new AP (LAP1).Then Client & AP needs to derive the keys for data encryption (PTK) & hence client must re-authenticate to generate the seeding material for 4-Way Handshake which resulting encryption keys (PTK)

802.11-Roaming-Basics-05As you saw above, every time client roam to new AP, client has to go through the full 802.1X EAP authentication process & then 4 way handshake. Since this EAP Authencation process takes considerable amount of time (vary ~100ms -700ms) for certain applications (like voice) it is not ideal a client roam takes that much time.

Therefore 802.11-2007 standard defines two fast secure roaming mechanisms applicable to legacy Autonomous APs.

1. Preauthentication.
2. PMK Caching.

Most WLAN vendors offer a fast secure roaming solution called OKCOpportunistic Key Caching which is an enhancement of PMK caching.(Note that OKC is not part of 802.11-2007 standard)

Cisco has offered proprietary version of fast-secure roaming called Cisco Centralized Key Management (CCKM). To support CCKM, supplicant should fall under Cisco licensed CCX program. You can check the nature of roam when you enable CCKM on this SSID.Security

   802.11 Authentication:........................ Open System
   Static WEP Keys............................... Disabled
   802.1X........................................ Disabled
   Wi-Fi Protected Access (WPA/WPA2)............. Enabled
      WPA (SSN IE)............................... Disabled
      WPA2 (RSN IE).............................. Enabled
         TKIP Cipher............................. Disabled
         AES Cipher.............................. Enabled
      Auth Key Management
         802.1x.................................. Enabled
         PSK..................................... Disabled
         CCKM.................................... Enabled
         FT(802.11r)............................. Disabled
         FT-PSK(802.11r)......................... Disabled

As you can see below this time supplicant continue to pass traffic as soon as AP send “Reassociation Response” frame. There is no authentication or 4-way handshake require to takes place. You can see the entire client roam occurs within 7ms in this case.

802.11-Roaming-Basics-06In 2008, IEEE came up with 802.11r which standardize the fast roaming. This method is called Fast BSS Transition (FT).  There are two FT methods

1. Over the Air Fast BSS Transition.
2. Over the DS Fast BSS Transition.

We will discuss each of these Fast Secure Roaming mechanisms in future posts.

Referennce
1. 802.11 WLAN Roaming and Fast-Secure Roaming on CUWN <-Best Cisco Document I found describing this topic in detail
2. CWSP-Official Study Guide- Chapter 7
3.7921-Association-LAP2 (Original Association packet capture)
4.7921-Roaming to-LAP1 (Reassociation or Roaming packet capture)
5.7921-CCKM-Roaming to-LAP1 (Roaming with CCKM packet capture)