![]() ![]() Once the Open System authentication process is completed successfully with a response from the AP ("cable connected"), the association process essentially finishes the 802.11 Layer 2 (L2) negotiation that establishes the link between the client and the AP. The AP cannot request that you establish a connection. ![]() This is why the client begins this process by sending the Authentication frame to the selected AP, as shown later in this document. This is very important to understand, because it is always the wireless client that selects which AP is preferred, and bases the decision on multiple factors that vary between vendors. Think of the Open System authentication process as "connecting the cable" on the AP that the client selects. Then, the association process must be completed. When an 802.11 wireless client connects to an Access Point (AP), before it begins to pass traffic (wireless data frames), it first must pass the basic 802.11 Open System authentication process. Background Informationīefore a description of the different fast-secure roaming methods available for WLANs is given, it is important to understand how the WLAN association process works, and how a regular roaming event occurs when there is no security configured on the Service Set Identifier (SSID). If your network is live, make sure that you understand the potential impact of any command. ![]() All of the devices used in this document started with a cleared (default) configuration. The information in this document was created from the devices in a specific lab environment. Specifics of all the methods explained here remain the same on later Cisco WLAN Controller codes (up to version 8.3 by the time this article was updated). The information in this document is based on Cisco WLAN Controller Software Version 7.4, but most of the debug outputs and behaviors described might apply to any software version that supports the methods discussed. Prerequisites RequirementsĬisco recommends that you have knowledge of these topics: Examples of WLAN Controller (WLC) debugs are provided, and wireless packet captures are used in order to analyze and explain the events that occur for each roaming method described. The main purpose of this document is to describe the differences between the various techniques available, their advantages and limitations, and the frames-exchange on each method. The document does not provide all of the specifics about how each method works or how they are configured. This document describes the different types of wireless roaming and fast-secure roaming methods available for IEEE 802.11 Wireless LANs (WLANs) supported on the Cisco Unified Wireless Network (CUWN). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |