Wi-Fi EasyMesh™ Specification v3.0 ... This document is the specification for Wi-Fi CERTIFIED EasyMesh™, the Wi-Fi Alliance certification ...
Wi-Fi EasyMeshTM Specification Version 3.0 WI-FI ALLIANCE PROPRIETARY SUBJECT TO CHANGE WITHOUT NOTICE This document may be used with the permission of Wi-Fi Alliance under the terms set forth herein. By your use of the document, you are agreeing to these terms. Unless this document is clearly designated as an approved specification, this document is a work in process and is not an approved Wi-Fi Alliance specification. This document is subject to revision or removal at any time without notice. Information contained in this document may be used at your sole risk. Wi-Fi Alliance assumes no responsibility for errors or omissions in this document. This copyright permission does not constitute an endorsement of the products or services. Wi-Fi Alliance trademarks and certification marks may not be used unless specifically allowed by Wi-Fi Alliance. Wi-Fi Alliance has not conducted an independent intellectual property rights ("IPR") review of this document and the information contained herein, and makes no representations or warranties regarding IPR, including without limitation patents, copyrights or trade secret rights. This document may contain inventions for which you must obtain licenses from third parties before making, using or selling the inventions. Wi-Fi Alliance owns the copyright in this document and reserves all rights therein. A user of this document may duplicate and distribute copies of the document in connection with the authorized uses described herein, provided any duplication in whole or in part includes the copyright notice and the disclaimer text set forth herein. Unless prior written permission has been received from Wi-Fi Alliance, any other use of this document and all other duplication and distribution of this document are prohibited. Unauthorized use, duplication, or distribution is an infringement of Wi-Fi Alliance's copyright. NO REPRESENTATIONS OR WARRANTIES (WHETHER EXPRESS OR IMPLIED) ARE MADE BY WIFI ALLIANCE AND WI-FI ALLIANCE IS NOT LIABLE FOR AND HEREBY DISCLAIMS ANY DIRECT, INDIRECT, PUNITIVE, SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR EXEMPLARY DAMAGES ARISING OUT OF OR IN CONNECTION WITH THE USE OF THIS DOCUMENT AND ANY INFORMATION CONTAINED IN THIS DOCUMENT. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Wi-Fi EasyMeshTM Specification v3.0 Version 1.0 2.0 3.0 Date YYYY-MM-DD 2018-06-18 2019-12-18 2020-12-07 Document revision history Remarks Initial release. Updated with Profile-2 features Updated with Profile-3 features © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 2 of 163 Wi-Fi EasyMeshTM Specification v3.0 Table of contents 1 OVERVIEW................................................................................................................................................................. 11 1.1 Scope .......................................................................................................................................................... 11 1.2 Purpose ....................................................................................................................................................... 11 2 REFERENCES ........................................................................................................................................................... 12 3 DEFINITIONS AND ACRONYMS .............................................................................................................................. 14 3.1.1 Shall/should/may/might word usage .............................................................................................. 14 3.1.2 Conventions ................................................................................................................................... 14 3.1.3 Definitions ...................................................................................................................................... 14 3.1.4 Abbreviations and acronyms.......................................................................................................... 17 4 ARCHITECTURE........................................................................................................................................................ 19 4.1 Multi-AP architecture................................................................................................................................... 19 4.1.1 Multi-AP example deployment ....................................................................................................... 19 5 MULTI-AP ONBOARDING ......................................................................................................................................... 23 5.1 1905 Push Button Configuration method .................................................................................................... 23 5.2 PBC Backhaul STA onboarding procedure................................................................................................. 23 5.3 DPP Backhaul STA and Multi-AP Agent secure onboarding...................................................................... 26 5.3.1 Overview of DPP onboarding procedure (Informative) .................................................................. 26 5.3.2 Data structures used in DPP onboarding ...................................................................................... 29 5.3.3 Requirements for devices using DPP onboarding procedures ...................................................... 33 5.3.4 Onboarding method via Wi-Fi with out-of-band DPP bootstrapping .............................................. 34 5.3.5 Onboarding Method via a Multi-AP Logical Ethernet Interface with out-of-band DPP bootstrapping ....................................................................................................................................................... 39 5.3.6 Onboarding method via Wi-Fi with inband DPP bootstrapping using Push Button ....................... 42 5.3.7 Establishing secure 1905-layer connectivity .................................................................................. 43 5.3.8 Fronthaul BSS and Backhaul BSS configuration ........................................................................... 45 5.3.9 DPP onboarding after Profile-1 or Profile-2 onboarding ................................................................ 46 5.3.10 DPP reconfiguration ...................................................................................................................... 47 5.3.11 Onboarding DPP capable client devices (STAs) .......................................................................... 49 6 MULTI-AP DISCOVERY............................................................................................................................................. 51 6.1 Multi-AP controller discovery ...................................................................................................................... 51 6.2 Multi-AP service discovery .......................................................................................................................... 52 6.3 Client association and disassociation notification ....................................................................................... 52 7 MULTI-AP CONFIGURATION.................................................................................................................................... 54 7.1 AP configuration .......................................................................................................................................... 54 7.2 AP operational BSS reporting ..................................................................................................................... 56 7.3 Policy configuration ..................................................................................................................................... 56 8 CHANNEL SELECTION ............................................................................................................................................. 58 8.1 Channel Preference Query and Report ...................................................................................................... 58 8.2 Channel Selection Request and Report...................................................................................................... 59 8.2.1 Coordinated DFS CAC................................................................................................................... 60 8.2.2 DFS CAC Scan Requirements on a Multi-AP Controller ............................................................... 60 8.2.3 DFS CAC Scan Requirements on a Multi-AP Agent ..................................................................... 60 9 CAPABILITY INFORMATION REPORTING .............................................................................................................. 62 9.1 AP capability ............................................................................................................................................... 62 9.2 Client capability ........................................................................................................................................... 62 9.3 Backhaul STA capability ............................................................................................................................. 63 10 LINK METRIC COLLECTION ..................................................................................................................................... 64 10.1 Backhaul link metrics .................................................................................................................................. 64 10.2 Per-AP metrics and bulk STA metrics......................................................................................................... 64 © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 3 of 163 Wi-Fi EasyMeshTM Specification v3.0 10.2.1 Link metric measurements from the AP........................................................................................ 64 10.2.2 Channel Scan................................................................................................................................ 65 10.3 Per-STA measurements.............................................................................................................................. 67 10.3.1 Associated STA link measurements from the AP ......................................................................... 67 10.3.2 Unassociated STA RCPI measurements from the AP.................................................................. 68 10.3.3 802.11 beacon measurements from the client.............................................................................. 69 10.4 Combined infrastructure metrics ................................................................................................................. 70 11 CLIENT STEERING.................................................................................................................................................... 71 11.1 Multi-AP Controller initiated steering mandate ........................................................................................... 71 11.2 Multi-AP Controller initiated steering opportunity........................................................................................ 71 11.3 Multi-AP Agent initiated RCPI-based steering ............................................................................................ 72 11.3.1 RCPI-based steering rules ............................................................................................................ 72 11.4 Multi-AP Agent determination of target BSS............................................................................................... 72 11.5 Steering mechanisms.................................................................................................................................. 72 11.6 Client association control mechanism......................................................................................................... 73 11.7 Wi-Fi Agile Multiband and Tunneled Message support .............................................................................. 74 12 BACKHAUL OPTIMIZATION...................................................................................................................................... 76 12.1 Backhaul optimization by backhaul station association control .................................................................. 76 13 MULTI-AP MESSAGING SECURITY ......................................................................................................................... 78 13.1 1905-Layer Security Capability ................................................................................................................... 78 13.2 Message integrity code ............................................................................................................................... 78 13.2.1 Theory of Operation (Informative)................................................................................................. 78 13.2.2 MIC transmission requirements .................................................................................................... 79 13.2.3 MIC reception requirements.......................................................................................................... 80 13.3 1905-layer encryption.................................................................................................................................. 80 13.3.1 Theory of Operation (informative) ................................................................................................. 80 13.3.2 Encryption requirements ............................................................................................................... 81 13.3.3 Decryption requirements ............................................................................................................... 82 14 FOUR-ADDRESS MAC HEADER FORMAT.............................................................................................................. 83 14.1 Wi-Fi backhaul frame and address handling............................................................................................... 83 14.1.1 Receiver requirements .................................................................................................................. 83 14.1.2 Transmitter requirements .............................................................................................................. 83 14.1.3 Wired backhaul frame and address handling ............................................................................... 84 15 SUPPLEMENTAL PROTOCOL RULES/PROCEDURES .......................................................................................... 85 15.1 CMDU reliable multicast transmission ........................................................................................................ 85 15.1.1 CMDU reliable multicast transmission procedures ....................................................................... 85 15.1.2 CMDU reliable multicast reception procedures ............................................................................ 85 15.2 1905 CMDU adjustments ............................................................................................................................ 85 15.3 Order of Processing .................................................................................................................................... 86 15.3.1 Transmission Order....................................................................................................................... 86 15.3.2 Reception Order............................................................................................................................ 86 16 HIGHER LAYER DATA PAYLOAD OVER 1905 ........................................................................................................ 87 17 MULTI-AP CONTROL MESSAGING ......................................................................................................................... 88 17.1 Multi-AP message format............................................................................................................................ 88 17.1.1 1905 AP-Autoconfiguration Search message format (extended) ................................................. 93 17.1.2 1905 AP-Autoconfiguration Response message format (extended) ............................................ 93 17.1.3 1905 AP-Autoconfiguration WSC message format (extended) .................................................... 94 17.1.4 1905 Topology Response message format (extended)................................................................ 94 17.1.5 1905 Topology Notification message format (extended) .............................................................. 94 17.1.6 AP Capability Query message format........................................................................................... 94 17.1.7 AP Capability Report message format.......................................................................................... 94 17.1.8 Multi-AP Policy Config Request message format ......................................................................... 94 17.1.9 Channel Preference Query message format ................................................................................ 95 17.1.10 Channel Preference Report message format ............................................................................. 95 17.1.11 Channel Selection Request message format ............................................................................. 95 © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 4 of 163 Wi-Fi EasyMeshTM Specification v3.0 17.1.12 Channel Selection Response message format........................................................................... 95 17.1.13 Operating Channel Report message format ............................................................................... 95 17.1.14 Client Capability Query message format .................................................................................... 95 17.1.15 Client Capability Report message format ................................................................................... 95 17.1.16 AP Metrics Query Message format ............................................................................................. 96 17.1.17 AP Metrics Response Message format....................................................................................... 96 17.1.18 Associated STA Link Metrics Query message format ................................................................ 96 17.1.19 Associated STA Link Metrics Response message format .......................................................... 96 17.1.20 Unassociated STA Link Metrics Query message format ............................................................ 96 17.1.21 Unassociated STA Link Metrics Response message format...................................................... 96 17.1.22 Beacon Metrics Query message format ..................................................................................... 96 17.1.23 Beacon Metrics Response message format ............................................................................... 96 17.1.24 Combined Infrastructure Metrics message format ...................................................................... 97 17.1.25 Client Steering Request message format ................................................................................... 97 17.1.26 Client Steering BTM Report message format ............................................................................. 97 17.1.27 Client Association Control Request message format ................................................................. 97 17.1.28 Steering Completed message format ......................................................................................... 97 17.1.29 Backhaul Steering Request message format ............................................................................. 97 17.1.30 Backhaul Steering Response message format........................................................................... 97 17.1.31 Higher Layer Data message format ............................................................................................ 98 17.1.32 1905 Ack message format .......................................................................................................... 98 17.1.33 Channel Scan Request message format .................................................................................... 98 17.1.34 Channel Scan Report message format....................................................................................... 98 17.1.35 CAC Request message format ................................................................................................... 98 17.1.36 CAC Termination message format.............................................................................................. 98 17.1.37 Error Response message format ................................................................................................ 98 17.1.38 Topology Query message format................................................................................................ 98 17.1.39 Association Status Notification message format......................................................................... 98 17.1.40 Tunneled message format .......................................................................................................... 98 17.1.41 Client Disassociation Stats message format .............................................................................. 99 17.1.42 Backhaul STA Capability Query message format....................................................................... 99 17.1.43 Backhaul STA Capability Report message format...................................................................... 99 17.1.44 Failed Connection message ....................................................................................................... 99 17.1.45 1905 Rekey Request message format ....................................................................................... 99 17.1.46 1905 Decryption Failure message format ................................................................................... 99 17.1.47 Service Prioritization Request message format .......................................................................... 99 17.1.48 Proxied Encap DPP message format ......................................................................................... 99 17.1.49 1905 Encap EAPOL message format ....................................................................................... 100 17.1.50 DPP Bootstrapping URI Notification message format .............................................................. 100 17.1.51 DPP CCE Indication message format....................................................................................... 100 17.1.52 Chirp Notification message format............................................................................................ 100 17.1.53 BSS Configuration Request message ...................................................................................... 100 17.1.54 BSS Configuration Response message ................................................................................... 100 17.1.55 BSS Configuration Result message.......................................................................................... 100 17.1.56 Direct Encap DPP message ..................................................................................................... 100 17.1.57 Reconfiguration Trigger message............................................................................................. 101 17.1.58 Agent List message .................................................................................................................. 101 17.2 Multi-AP TLVs format ................................................................................................................................ 102 17.2.1 SupportedService TLV format..................................................................................................... 104 17.2.2 SearchedService TLV format ...................................................................................................... 104 17.2.3 AP Radio Identifier TLV format ................................................................................................... 105 17.2.4 AP Operational BSS TLV format................................................................................................. 105 17.2.5 Associated Clients TLV format.................................................................................................... 105 17.2.6 AP Capability TLV format............................................................................................................ 106 17.2.7 AP Radio Basic Capabilities TLV format .................................................................................... 106 17.2.8 AP HT Capabilities TLV format ................................................................................................... 107 17.2.9 AP VHT Capabilities TLV format................................................................................................. 107 17.2.10 AP HE Capabilities TLV format ................................................................................................. 108 © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 5 of 163 Wi-Fi EasyMeshTM Specification v3.0 17.2.11 17.2.12 17.2.13 17.2.14 17.2.15 17.2.16 17.2.17 17.2.18 17.2.19 17.2.20 17.2.21 17.2.22 17.2.23 17.2.24 17.2.25 17.2.26 17.2.27 17.2.28 17.2.29 17.2.30 17.2.31 17.2.32 17.2.33 17.2.34 17.2.35 17.2.36 17.2.37 17.2.38 17.2.39 17.2.40 17.2.41 17.2.42 17.2.43 17.2.44 17.2.45 17.2.46 17.2.47 17.2.48 17.2.49 17.2.50 17.2.51 17.2.52 17.2.53 17.2.54 17.2.55 17.2.56 17.2.57 17.2.58 17.2.59 17.2.60 17.2.61 17.2.62 17.2.63 17.2.64 17.2.65 17.2.66 17.2.67 17.2.68 Steering Policy TLV format ....................................................................................................... 109 Metric Reporting Policy TLV format .......................................................................................... 110 Channel Preference TLV format ............................................................................................... 111 Radio Operation Restriction TLV format ................................................................................... 113 Transmit Power Limit TLV format ............................................................................................. 114 Channel Selection Response TLV format................................................................................. 114 Operating Channel Report TLV format ..................................................................................... 114 Client Info TLV format ............................................................................................................... 115 Client Capability Report TLV format ......................................................................................... 115 Client Association Event TLV format ........................................................................................ 116 AP Metric Query TLV format ..................................................................................................... 116 AP Metrics TLV format .............................................................................................................. 116 STA MAC Address Type TLV format ........................................................................................ 117 Associated STA Link Metrics TLV format ................................................................................. 117 Unassociated STA Link Metrics Query TLV format .................................................................. 118 Unassociated STA Link Metrics Response TLV format............................................................ 118 Beacon Metrics Query TLV format............................................................................................ 119 Beacon Metrics Response TLV format ..................................................................................... 120 Steering Request TLV format ................................................................................................... 120 Steering BTM Report TLV format ............................................................................................. 121 Client Association Control Request TLV format ....................................................................... 122 Backhaul Steering Request TLV format ................................................................................... 122 Backhaul Steering Response TLV format................................................................................. 122 Higher Layer Data TLV format .................................................................................................. 123 Associated STA Traffic Stats TLV format ................................................................................. 123 Error Code TLV format.............................................................................................................. 124 Channel Scan Reporting Policy TLV format ............................................................................. 125 Channel Scan Capabilities TLV format ..................................................................................... 125 Channel Scan Request TLV format .......................................................................................... 126 Channel Scan Result TLV format ............................................................................................. 127 Timestamp TLV format ............................................................................................................. 129 CAC Request TLV format ......................................................................................................... 129 CAC Termination TLV format.................................................................................................... 130 CAC Completion Report TLV format......................................................................................... 130 CAC Status Report TLV format................................................................................................. 131 CAC Capabilities TLV format .................................................................................................... 132 Multi-AP Profile TLV format ...................................................................................................... 133 Profile-2 AP Capability TLV format ........................................................................................... 133 Default 802.1Q Settings TLV format ......................................................................................... 133 Traffic Separation Policy TLV format ........................................................................................ 134 Profile-2 Error Code TLV format ............................................................................................... 134 AP Radio Advanced Capabilities TLV format ........................................................................... 135 Association Status Notification TLV format............................................................................... 135 Source Info TLV format ............................................................................................................. 136 Tunneled message type TLV format......................................................................................... 136 Tunneled TLV format ................................................................................................................ 136 Profile-2 Steering Request TLV format ..................................................................................... 137 Unsuccessful Association Policy TLV format............................................................................ 138 Metric Collection Interval TLV format........................................................................................ 138 Radio Metrics TLV format ......................................................................................................... 139 AP Extended Metrics TLV format.............................................................................................. 139 Associated STA Extended Link Metrics TLV format ................................................................. 140 Status Code TLV format ........................................................................................................... 140 Reason Code TLV format ......................................................................................................... 141 Backhaul STA Radio Capabilities TLV format .......................................................................... 141 Backhaul BSS Configuration TLV ............................................................................................. 141 1905 Layer Security Capability TLV format .............................................................................. 142 MIC TLV format......................................................................................................................... 142 © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 6 of 163 Wi-Fi EasyMeshTM Specification v3.0 17.2.69 17.2.70 17.2.71 17.2.72 17.2.73 17.2.74 17.2.75 17.2.76 17.2.77 17.2.78 17.2.79 17.2.80 17.2.81 17.2.82 17.2.83 17.2.84 17.2.85 17.2.86 Encrypted Payload TLV format ................................................................................................. 142 Service Prioritization Rule TLV format ...................................................................................... 143 DSCP Mapping Table TLV format ............................................................................................ 143 AP Wi-Fi 6 Capabilities TLV format .......................................................................................... 144 Associated Wi-Fi 6 STA Status Report TLV format .................................................................. 145 BSSID TLV format..................................................................................................................... 146 BSS Configuration Report TLV format...................................................................................... 146 Device Inventory TLV format .................................................................................................... 147 Agent List TLV format ............................................................................................................... 147 AKM Suite Capabilities TLV format........................................................................................... 148 1905 Encap DPP TLV format.................................................................................................... 149 1905 Encap EAPOL TLV format ............................................................................................... 149 DPP Bootstrapping URI Notification TLV.................................................................................. 149 DPP CCE Indication TLV .......................................................................................................... 150 DPP Chirp Value TLV ............................................................................................................... 150 BSS Configuration Request TLV .............................................................................................. 151 BSS Configuration Response TLV............................................................................................ 151 DPP Message TLV ................................................................................................................... 151 18 MULTI-AP PROFILES .............................................................................................................................................. 152 19 TRAFFIC SEPARATION .......................................................................................................................................... 154 19.1 Traffic Separation in Multi-AP Network ..................................................................................................... 154 19.1.1 Traffic Separation Overview (Informative) .................................................................................. 154 19.1.2 Multi-AP Controller Requirements .............................................................................................. 156 19.1.3 Multi-AP Agent Requirements..................................................................................................... 156 19.2 VLAN Tagging in Multi-AP ........................................................................................................................ 158 20 SERVICE PRIORITIZATION .................................................................................................................................... 160 20.1 Service Prioritization in Multi-AP Network (Informative) ........................................................................... 160 20.2 Service Prioritization Operation ................................................................................................................ 160 20.2.1 Multi-AP Controller Requirements .............................................................................................. 160 20.2.2 Multi-AP Agent Requirements..................................................................................................... 160 APPENDIX A A.1 A.2 A.3 (INFORMATIVE) MISCELLANEOUS ....................................................................................................... 162 Higher layer protocol field definition (see section 16) ............................................................................... 162 Indication of associated 802.11 clients ..................................................................................................... 162 Implementation Notes (Informative) .......................................................................................................... 162 A.3.1 Traffic Separation......................................................................................................................... 162 A.3.2 Controller implementation for Policy Set Up ................................................................................ 162 A.3.3 Fragmentation of IEEE 1905........................................................................................................ 162 A.3.4 Multi-AP Logical Ethernet Interfaces............................................................................................ 162 A.3.5 Primary Channel for Operating Classes Greater than 40 MHz ................................................... 163 © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 7 of 163 Wi-Fi EasyMeshTM Specification v3.0 Table 1. Table 2. Table 3. Table 4. Table 5. Table 6. Table 7. Table 8. Table 9. Table 10. Table 11. Table 12. Table 13. Table 14. Table 15. Table 16. Table 17. Table 18. Table 19. Table 20. Table 21. Table 22. Table 23. Table 24. Table 25. Table 26. Table 27. Table 28. Table 29. Table 30. Table 31. Table 32. Table 33. Table 34. Table 35. Table 36. Table 37. Table 38. Table 39. Table 40. Table 41. Table 42. Table 43. Table 44. Table 45. Table 46. Table 47. Table 48. Table 49. Table 50. Table 51. Table 52. Table 53. Table 54. Table 55. Table 56. List of tables Definitions ................................................................................................................................................... 14 Abbreviations and acronyms....................................................................................................................... 17 Multi-AP IE format ....................................................................................................................................... 25 Multi-AP Default 802.1Q Setting subelement format .................................................................................. 25 DPP Configuration Request object ............................................................................................................. 29 DPP Configuration Object parameters........................................................................................................ 30 DPP Connector Body object format ............................................................................................................ 32 netRole Compatibility .................................................................................................................................. 34 1905 GTK KDE selectors ............................................................................................................................ 44 1905 GTK KDE format ................................................................................................................................ 44 netRole compatibility for reconfiguration..................................................................................................... 47 Extension of 1905 Media type Table 6-12 in [2] ......................................................................................... 51 Extension of Authentication Types Table 32 in [5]...................................................................................... 54 Multi-AP Extension subelement .................................................................................................................. 55 Multi-AP Profile subelement........................................................................................................................ 56 Message types ............................................................................................................................................ 88 Table of TLVs ............................................................................................................................................ 102 SupportedService TLV format................................................................................................................... 104 SearchedService TLV format .................................................................................................................... 104 AP Radio Identifier TLV format ................................................................................................................. 105 AP Operational BSS TLV format............................................................................................................... 105 Associated Clients TLV format.................................................................................................................. 105 AP Capability TLV format.......................................................................................................................... 106 AP Radio Basic Capabilities TLV format................................................................................................... 106 AP HT Capabilities TLV format ................................................................................................................. 107 AP VHT Capabilities TLV format............................................................................................................... 107 AP HE Capabilities TLV format ................................................................................................................. 108 Steering Policy TLV format ....................................................................................................................... 110 Metric Reporting Policy TLV format .......................................................................................................... 110 Channel Preference TLV format ............................................................................................................... 112 Radio Operation Restriction TLV format ................................................................................................... 113 Transmit Power Limit TLV format ............................................................................................................. 114 Channel Selection Response TLV format................................................................................................. 114 Operating Channel Report TLV format ..................................................................................................... 115 Client Info TLV format ............................................................................................................................... 115 Client Capability Report TLV format ......................................................................................................... 115 Client Association Event TLV format ........................................................................................................ 116 AP Metric Query TLV format ..................................................................................................................... 116 AP Metrics TLV format .............................................................................................................................. 116 STA MAC Address Type TLV format ........................................................................................................ 117 Associated STA Link Metrics TLV format ................................................................................................. 117 Unassociated STA Link Metrics Query TLV format .................................................................................. 118 Unassociated STA Link Metrics Response TLV format ............................................................................ 118 Beacon Metrics Query TLV format............................................................................................................ 119 Beacon Metrics Response TLV format ..................................................................................................... 120 Steering Request TLV format ................................................................................................................... 120 Steering BTM Report TLV format ............................................................................................................. 121 Client Association Control Request TLV format ....................................................................................... 122 Backhaul Steering Request TLV format.................................................................................................... 122 Backhaul Steering Response TLV format................................................................................................. 122 Higher Layer Data TLV format .................................................................................................................. 123 Associated STA Traffic Stats TLV............................................................................................................. 123 Error Code TLV format.............................................................................................................................. 124 Channel Scan Reporting Policy TLV......................................................................................................... 125 Channel Scan Capabilities TLV ................................................................................................................ 125 Channel Scan Request TLV ..................................................................................................................... 126 © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 8 of 163 Wi-Fi EasyMeshTM Specification v3.0 Table 57. Table 58. Table 59. Table 60. Table 61. Table 62. Table 63. Table 64. Table 65. Table 66. Table 67. Table 68. Table 69. Table 70. Table 71. Table 72. Table 73. Table 74. Table 75. Table 76. Table 77. Table 78. Table 79. Table 80. Table 81. Table 82. Table 83. Table 84. Table 85. Table 86. Table 87. Table 88. Table 89. Table 90. Table 91. Table 92. Table 93. Table 94. Table 95. Table 96. Table 97. Table 98. Table 99. Table 100. Table 101. Table 102. Table 103. Table 104. Table 105. Table 106. Channel Scan Result TLV......................................................................................................................... 127 Timestamp TLV ......................................................................................................................................... 129 CAC Request TLV format ......................................................................................................................... 129 CAC Termination TLV format.................................................................................................................... 130 CAC Completion Report TLV format......................................................................................................... 130 CAC Status Report TLV format................................................................................................................. 131 CAC Capabilities TLV format .................................................................................................................... 132 Multi-AP Profile TLV format ...................................................................................................................... 133 Profile-2 AP Capability TLV format ........................................................................................................... 133 Default 802.1Q Settings TLV format ......................................................................................................... 134 Traffic Separation Policy TLV format ........................................................................................................ 134 Profile-2 Error Code TLV format ............................................................................................................... 134 AP Radio Advanced Capabilities TLV format ........................................................................................... 135 Association Status Notification TLV format............................................................................................... 136 Source Info TLV format ............................................................................................................................. 136 Tunneled message type TLV format......................................................................................................... 136 Tunneled TLV format ................................................................................................................................ 137 Profile-2 Steering Request TLV format ..................................................................................................... 137 Unsuccessful Association Policy TLV format............................................................................................ 138 Metric Collection Interval TLV format ........................................................................................................ 138 Radio Metrics TLV format ......................................................................................................................... 139 AP Extended Metrics TLV format.............................................................................................................. 139 Associated STA Extended Link Metrics TLV format ................................................................................. 140 Status Code TLV format............................................................................................................................ 140 Reason Code TLV format ......................................................................................................................... 141 Backhaul STA Radio Capabilities TLV format .......................................................................................... 141 Backhaul BSS Configuration TLV format.................................................................................................. 141 1905 Layer Security Capability TLV format .............................................................................................. 142 MIC TLV format ......................................................................................................................................... 142 Encrypted TLV format ............................................................................................................................... 142 Service Prioritization Rule TLV ................................................................................................................. 143 DSCP Mapping Table TLV........................................................................................................................ 143 AP Wi-Fi 6 Capabilities TLV format .......................................................................................................... 144 Associated Wi-Fi 6 STA Status Report TLV format .................................................................................. 145 BSSID TLV format..................................................................................................................................... 146 BSS Configuration Report TLV format BSSID TLV format ....................................................................... 146 Device Inventory TLV................................................................................................................................ 147 Agent List TLV........................................................................................................................................... 147 AKM Suite Capabilities TLV format........................................................................................................... 148 1905 Encap DPP TLV format.................................................................................................................... 149 1905 Encap EAPOL TLV format ............................................................................................................... 149 DPP Bootstrapping URI Notification TLV format ...................................................................................... 150 DPP CCE Indication TLV format ............................................................................................................... 150 DPP Chirp Value TLV format .................................................................................................................... 150 BSS Configuration Request TLV format ................................................................................................... 151 BSS Configuration Response TLV format ................................................................................................ 151 DPP Message TLV format ........................................................................................................................ 151 Profile Section Applicability ....................................................................................................................... 152 802.1Q C-TAG PCP to WMM UP & AC Mapping ..................................................................................... 161 Higher layer protocol field definition .......................................................................................................... 162 Figure 1. Figure 2. Figure 3. Figure 4. List of figures Multi-AP example deployment 1 ................................................................................................................. 20 Multi-AP example deployment 2 ................................................................................................................. 21 Multi-AP example deployment 3 ................................................................................................................. 22 Onboarding/Configuring BSS...................................................................................................................... 24 © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 9 of 163 Wi-Fi EasyMeshTM Specification v3.0 Figure 5. Figure 6. Figure 7. Figure 8. Figure 9. Figure 10. Figure 11. Figure 12. Figure 13. Figure 14. Figure 15. Figure 16. Figure 18. Figure 19. Figure 20. DPP Onboarding ......................................................................................................................................... 27 Configuration Request Object example ...................................................................................................... 30 DPP Configuration Object example ............................................................................................................ 33 Decoded Connector from Configuration Object (signedConnector) Header example................................ 33 Decoded Connector from Configuration Object (signedConnector) Body example ................................... 33 DPP Configuration via Wi-Fi ....................................................................................................................... 38 DPP in 802.11 Action Frame ...................................................................................................................... 39 DPP Onboarding via Multi-AP Logical Ethernet Interface .......................................................................... 41 Onboarding/Configuring BSS...................................................................................................................... 42 DPP Reconfiguration Message Flow .......................................................................................................... 49 1905 Message Format for Message Integrity ............................................................................................. 79 1905 Message Format for Encryption......................................................................................................... 81 Example Network Configuration with Traffic Separation Enabled ............................................................ 155 IEEE 802.11 frame with 802.1Q C-TAG ................................................................................................... 159 Ethernet frame with 802.1Q C-TAG.......................................................................................................... 159 © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 10 of 163 Wi-Fi EasyMeshTM Specification v3.0 1 Overview 1.1 Scope This document is the specification for Wi-Fi CERTIFIED EasyMeshTM, the Wi-Fi Alliance® certification program based on Wi-Fi EasyMeshTM. This specification defines the control protocols between Wi-Fi® access points (APs) as well as the data objects necessary to enable onboarding, provisioning, control and management of multiple APs. This specification also defines the mechanism to route traffic between Wi-Fi access points within the Multi-AP network. The term "Multi-AP" found throughout this document is interchangeable with "Wi-Fi EasyMesh". 1.2 Purpose The purpose of this specification is to enable interoperability across Wi-Fi access points (APs) from different vendors in a Wi-Fi network deployment comprising multiple APs. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 11 of 163 Wi-Fi EasyMeshTM Specification v3.0 2 References [1] IEEE Computer Society, "IEEE Standard for Information Technology Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Networks Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications," (IEEE Std. 802.11-2016) (https://standards.ieee.org/findstds/standard/802.11-2016.html) [2] IEEE Std 1905.1TM-2013, IEEE Standard for a Convergent Digital Home Network for Heterogeneous Technologies (https://standards.ieee.org/findstds/standard/1905.1-2013.html) [3] IEEE Std 802.3TM-2015, IEEE Standard for Ethernet (http://ieeexplore.ieee.org/document/7428776/) [4] TR-181 Device Data Model for TR-069 2016, Issue: 2 Amendment 11 Issue Date: July 2016 (https://www.broadbandforum.org/technical/download/TR-181_Issue-2_Amendment-11.pdf) [5] Wi-Fi Protected Setup Specification (https://www.wi-fi.org/discover-wi-fi/specifications) [6] ISO 3166-1, "Codes for the representation of names of countries and their subdivisions--Part 1: Country codes" (https://www.iso.org/standard/63545.html) [7] IEEE 802.1Q-2018 - IEEE Standard for Local and Metropolitan Area Networks--Bridges and Bridged Networks, (https://standards.ieee.org/standard/802_1Q-2018.html) [8] Wi-Fi Agile Multiband Specification v1.2 (https://www.wi-fi.org/file/wi-fi-agile-multiband-specification) [9] Optimized Connectivity Experience Technical Specification v1.0 (https://www.wi-fi.org/file/optimized-connectivityexperience-technical-specification-v10) [10] Wi-Fi Data Elements Specification v1.0 (https://www.wi-fi.org/file/data-elements-specification-package) [11] IEEE 1905.1a-2014, IEEE Standard for a Convergent Digital Home Network for Heterogeneous Technologies Amendment 1: Support of New MAC/PHYs and Enhancements (https://standards.ieee.org/standard/1905_1a2014.html) [12] WMM Specification Version 1.2.0 (https://www.wi-fi.org/file/wmm-specification-v12) [13] IETF RFC 6021 Common YANG Data Types, (https://tools.ietf.org/html/rfc6021) [14] IETF RFC 3339, Date and Time on the Internet: Timestamps, https://tools.ietf.org/html/rfc3339 [15] Synthetic Initialization Vector (SIV) Authenticated Encryption Using the Advanced Encryption Standard (AES), RFC 5297 (https://tools.ietf.org/html/rfc5297) [16] US Secure Hash Algorithms (SHA and HMAC-SHA), RFC 4634 (https://tools.ietf.org/html/rfc4634) [17] IEEE Std 802.11TMax - IEEE Standard for Local and Metropolitan Area Networks -Specific requirements, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (http://grouper.ieee.org/groups/802/11/) [18] Wi-Fi Easy Connect Specification (https://www.wi-fi.org/discover-wi-fi/specifications) [19] RFC 4648, The Base16, Base32, and Base64 Data Encodings, October 2006 (https://tools.ietf.org/html/rfc4648) [20] RFC 7517, The JSON Web Key (JWK), May 2015 (https://tools.ietf.org/html/rfc7517) © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 12 of 163 Wi-Fi EasyMeshTM Specification v3.0 [21] RFC 3986, Uniform Resource Identifier (URI): Generic Syntax, January 2005, (https://tools.ietf.org/html/rfc3986) [22] RFC 7159, The JavaScript Object Notation (JSON) Data Interchange Format, March 2014, (https://tools.ietf.org/html/rfc7159) [23] Wi-Fi Alliance Security Requirements, (https://www.wi-fi.org/members/wi-fi-alliance-security-requirements) [24] IETF RFC 2474 "Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers, (https://tools.ietf.org/html/rfc2474) © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 13 of 163 Wi-Fi EasyMeshTM Specification v3.0 3 Definitions and acronyms 3.1.1 Shall/should/may/might word usage The words "shall", "should", and "may" are used intentionally throughout this document to identify the normative text for the Multi-AP program. The words "can" and "might" shall not be used to define normative requirements. The word shall indicates a mandatory requirement. All mandatory requirements must be implemented to assure interoperability with other Multi-AP products. The word should denotes a recommended approach or action. The word may indicates a permitted approach or action with no implied preference. The words might and can indicate a possibility or suggestion. 3.1.2 Conventions The ordering of bits and bytes in the fields within TLVs, information elements and attributes shall follow the conventions in [2] unless otherwise stated. The word ignored shall be used to describe bits, bytes, fields or parameters whose values are not verified by the recipient. The word reserved shall be used to describe objects (bits, bytes, or fields or their assigned values) whose usage and interpretation will be defined in the future by this specification or by other technical specifications/bulletins. A reserved object shall be set to zero unless otherwise stated. The recipient of a reserved object shall ignore its value unless that object becomes defined at a later date. The sender of an object defined by this technical specification shall not use a reserved code value. 3.1.3 Definitions The definitions in Table 1 are applicable to this specification. Table 1. Definitions Term 1905 4-way handshake 1905 GTK 1905 PMK 1905 PTK 1905 TK 802.1Q C-TAG 802.1Q C-VID 802.1Q VLAN Tag Air Time Available Channel Definition The 4-way handshake procedure per section 12.7.6.4 of [1] with a 1905 PMK to establish a 1905 PTK and 1905 GTK A 256-bit Group Transient Key derived by the Multi-AP Controller A 256-bit Pairwise Master Key generated during the 1905-layer DPP Network Introduction protocol A 512-bit Pairwise Transient Key generated during the 1905 4-way handshake using a 1905 PMK A 256-bit Transient Key derived from the 1905 PTK as per section 12.7.1.3 of [1] A Customer Virtual Local Area Network [C-VLAN] tag as specified in section 3.58 of [7]. A Customer Virtual Local Area Network [C-VLAN] identifier as specified in section 3.57 of [7]. Any VLAN tag specified in [7], including C-VLAN and S-VLAN tags. The time-frequency spectral resources, normalized to the operating bandwidth of the BSS. Therefore, if the predicted bandwidth of backhaul transmissions is less than the BSS operating bandwidth (e.g. due to dynamic bandwidth adjustment and/or HE OFDMA allocation), this is factored in to the percentage of air time indicated. A channel that the Multi-AP Agent can actively use immediately without needing to perform a CAC. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 14 of 163 Wi-Fi EasyMeshTM Specification v3.0 Term backhaul link backhaul SSID backhaul STA CAC Completion Action Channel Availability Check (CAC) Continuous CAC Continuous CAC with dedicated radio Controller DFS Channel Clear Indication DSCP Value Egress Packet Enrollee Multi-AP Agent fronthaul AP Independent Channel Scan Inoperable channel In-Service Monitoring Ingress Packet Logical Ethernet Interface Logical Ethernet Link MIMO Dimension reduced CAC Definition A Wi-Fi link or wired Logical Ethernet Link between two Multi-AP devices in a Multi-AP network. A Wi-Fi SSID used for a Wi-Fi backhaul link that is either the same or different from the fronthaul SSID. A STA on a Multi-AP device with a Multi-AP Agent that provides Wi-Fi connectivity with other Wi-Fi access points over the backhaul link. The action a Multi-AP Agent takes upon completing a CAC. CAC completion actions include remaining on the channel where the CAC was performed and continuing to monitor for radar, or returning to the previous state before the CAC was started. Period of time during which a radio in a Multi-AP Agent monitors for radar, without sending or receiving traffic on the channel being monitored for radar. A method of performing a Channel Availability Check (CAC) in which one of the radios that would normally be used for communication ceases normal operation and listens continuously on the channel being CAC'ed. Using this method, the radio is not available for any other purpose while the CAC is being performed. A method of performing a Channel Availability Check (CAC) in which the device performing the CAC employs an additional radio, that has not been in use for communication, to perform the CAC. The additional radio allows the CAC to be performed while the device continues to operate with the equivalent capabilities as when it is not performing a CAC. An indication provided by the Multi-AP Controller to a Multi-AP Agent as part of a Channel Preference TLV within a Channel Selection Request message that indicates that the Multi-AP Agent may begin operating on that channel without having to perform a CAC. The 6-bit Differentiated Services Codepoint field value in the IP packet header as defined by [24]. Any packet leaving a Multi-AP Profile-2 Network Segment via an interface of a Multi-AP Agent that implements Profile-2, including all packets sent on the Wi-Fi fronthaul, Profile-1 Wi-Fi backhaul or any packet sent on a Multi-AP Logical Ethernet Interface that are being carried over the Primary VLAN. A Multi-AP Agent that is seeking to be or is in the process of being DPP onboarded to the Multi-AP network. An access point (AP) of a Multi-AP device that provides Wi-Fi connectivity to client stations (STAs) and/or backhaul STAs. A channel scan initiated by the Multi-AP Agent performing the scan (rather than by the Multi-AP Controller). A channel that a device is temporarily not able to operate on due to reasons such as regulatory restrictions or radio environment. Period of time during which a radio in a Multi-AP Agent monitors for radar while transmitting and receiving traffic on the channel being monitored. Any packet generated locally by a Multi-AP Agent that implements Profile-2 or any packet entering a Multi-AP Profile-2 Network Segment via an interface of a Multi-AP Agent that implements Profile-2, including any packet received on, Wi-Fi fronthaul or Profile-1 Wi-Fi backhaul or any packet received on a Multi-AP Logical Ethernet Interface that is not tagged as belonging to a Secondary VLAN. An interface onto a Logical Ethernet Link. A wired connection that may be Ethernet, Multimedia over Coax Alliance (MoCA), power line communication (PLC) or equivalent. A method of performing a Channel Availability Check (CAC) in which the device performing the CAC employs one receiving chain from one of the radios to perform the © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 15 of 163 Wi-Fi EasyMeshTM Specification v3.0 Term Multi-AP Agent Multi-AP Controller Multi-AP device Multi-AP Logical Ethernet Interface Multi-AP network Multi-AP Profile-2 Network Segment multiple virtual radio operation Non-Occupancy Channels Non-Occupancy Duration Non-operable channel Primary Network Primary VLAN Proxy Agent Requested Channel Scan Secondary VLAN Self-Triggered CAC Simultaneous CAC Radios Steering Mandate mechanism Steering Opportunity mechanism Successful CAC Time Sliced CAC Definition CAC. Using this method, the Rx MIMO capability of the radio performing the CAC is reduced by one while the CAC is being performed. A Multi-AP compliant logical entity that executes AP control functions and provides Multi-AP specific control information. A Multi-AP compliant logical entity that implements logic for controlling the operation of the Multi-AP network. A Multi-AP physical entity that may contain a Multi-AP Controller only, a Multi-AP Agent only or both Multi-AP Controller and Multi-AP Agent. A Logical Ethernet Interface that connects Multi-AP devices. A Wi-Fi network deployment comprising of one or more Multi-AP devices. A set of Multi-AP Agents that implements Profile-2 that are connected to each other by a set of Wi-Fi or Logical Ethernet Links where those links do not pass through a Multi-AP Agent that implements Profile-1 or a device that discards 802.1Q VLAN tags. (See section 8.1 of [2]) Time slicing operation of the physical radio between multiple virtual radios, each operating on a different band or channel. Channels that have had radar detected on them, and cannot be occupied until the nonOccupancy Duration has expired. After detection of radar, regulatory domains require that the channel not be used for a period of time. The amount of time remaining (in seconds) until the channel can be used is the Non-Occupancy Duration. Non-occupancy periods are the result of detecting radar during a CAC, while monitoring following the termination or end of a CAC, or while performing in-service monitoring. A channel that a device is permanently not capable of operating on. The network that a user configures for their own use, covering both Logical Ethernet and Wi-Fi interfaces, and all of the traffic carried onto this network. A unique VLAN that is assigned to the Primary Network traffic. A Multi-AP Agent that translates between 1905 CMDUs and 802.11 frames to/from an Enrollee Multi-AP Agent. A channel scan performed in response to a request from a Multi-AP Controller. Any VLAN configured by the Multi-AP Controller that implements Profile-2 that is not the Primary VLAN. A CAC started by a Multi-AP Agent of its own volition. These may be performed for a number of reasons, for example if the Multi-AP Agent believes a CAC is required before operating on a channel that it has been requested to operate on. The radios in a Multi-AP Agent that are able to perform a CAC simultaneously. For example, if a Multi-AP Agent can only perform one CAC check at a time, then it would have one CAC Radio. If it is able to perform CAC on two channels simultaneously, then it has two Simultaneous CAC Radios. A mechanism to mandate a Multi-AP Agent to attempt steering of one or more associated STAs. A mechanism to provide a time window for a Multi-AP Agent to steer one or more associated STAs. A Channel Availability Check (CAC) that proceeds to completion of the required CAC time without detecting radar. Operation in the channel on which the CAC was performed could commence following a Successful CAC. A method of performing a Channel Availability Check (CAC) in which one of the radios that normally is used for communications spends a fraction of the time performing the CAC, and the remainder of the time operating normally for communication. Using this © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 16 of 163 Wi-Fi EasyMeshTM Specification v3.0 Term Traffic Separation Policy Triggered CAC Unsuccessful CAC Wi-Fi Backhaul Wi-Fi Fronthaul Definition method, the data throughput that can be sustained by the radio is reduced roughly by the percentage of time it spends performing the CAC. A group of traffic separation rules that are set in the Multi-AP Controller. A CAC begun by the Multi-AP Controller via a CAC Request message. A CAC that is not a Successful CAC. Unsuccessful CACs can be due to detecting radar, or errors that prevent monitoring the channel for the required CAC time. A Wi-Fi link between two Multi-AP devices in a Multi-AP network. A Wi-Fi link between a Multi-AP Agent and its associated non-backhaul STA client stations (STAs). 3.1.4 Abbreviations and acronyms Table 2 defines the acronyms used throughout this document. Some acronyms are commonly used in publications and standards defining the operation of wireless local area networks, while others have been generated by Wi-Fi Alliance. Table 2. Abbreviations and acronyms Acronyms 1905 AC AFC AL bBSS bSTA BSS BTM CAC CMDU DFS DL DPP DSCP EIRP EUI fBSS GI GTK HE OFDMA HLE HT IE Definition IEEE Std 1905.1TM-2013, IEEE Standard for a Convergent Digital Home Network for Heterogeneous Technologies Access category Automatic Frequency Coordination Abstraction layer Backhaul BSS Backhaul STA Basic service set BSS transition management Channel availability check Control message data unit Dynamic frequency selection Downlink Device provisioning protocol Differentiated Services CodePoint Effective isotropic radiated power Extended unique identifier Fronthaul BSS Guard interval Group temporal key High efficiency orthogonal frequency-division multiplexing Higher layer entity High throughput Information element © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 17 of 163 Wi-Fi EasyMeshTM Specification v3.0 Acronyms JSON KDE MIC MID MU OFDMA PBC PCP PPDU RCPI RSSI SU TBTT TU UL MU-MIMO VID VLAN WPS Definition JavaScript object notation Key data encapsulation (see [1]) Message integrity check Message identifier Multi-user Orthogonal frequency-division multiplexing Push-button configuration Priority Codepoint Physical layer protocol data unit Received channel power indicator Received signal strength indicator Single user Target beacon transmission time Time units Uplink multi-user multiple input multiple output VLAN Identifier Virtual Local Area Network Wi-Fi Protected SetupTM © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 18 of 163 Wi-Fi EasyMeshTM Specification v3.0 4 Architecture 4.1 Multi-AP architecture A Multi-AP network consists of two types of logical entities: · One Multi-AP Controller and · One or more Multi-AP Agents A Multi-AP Controller is a logical entity in a Multi-AP network that implements logic for controlling the fronthaul APs and backhaul links in the Multi-AP network. A single Multi-AP Controller is supported for a given Multi-AP network. A Multi-AP Controller receives measurements and capability data for fronthaul APs, clients and backhaul links from the Multi-AP Agents and triggers AP control related commands and operations on the Multi-AP Agents. A Multi-AP Controller also provides onboarding functionality to onboard and provision Multi-AP devices onto the Multi-AP network. A Multi-AP Agent is a logical entity that executes the commands received from the Multi-AP Controller, and reports measurements and capabilities data for fronthaul APs, clients and backhaul links to a Multi-AP Controller and/or to other Multi-AP Agents. A Multi-AP Agent interfaces with Wi-Fi sub-systems for fronthaul APs and backhaul STA on the Multi-AP device to get measurements and capabilities data, apply configuration changes and execute AP control functions. A logical Multi-AP control interface is defined between Multi-AP devices over which configuration and control functions for fronthaul APs and backhaul links are executed. A Multi-AP control interface exists between the Multi-AP Controller and Multi-AP Agents. A Multi-AP interface may exist between two Multi-AP Agents. A Multi-AP device may contain a Multi-AP Controller only, a Multi-AP Agent only, or both Multi-AP Controller and Multi-AP Agent. Two Multi-AP devices with Multi-AP Agents connect to each other over a backhaul link, which could be either a WiFi link or a wired Logical Ethernet Link. A single active backhaul link is allowed between any two Multi-AP devices at any given time. A Multi-AP device with a Multi-AP Agent includes fronthaul AP(s) for client STAs and/or a backhaul STA to associate with for Wi-Fi backhaul connectivity. In cases where a Wi-Fi backhaul link is supported, a Multi-AP device with a Multi-AP Agent also includes a backhaul STA to enable Wi-Fi backhaul link with another upstream fronthaul AP (see Figure 2). Multi-AP devices with Multi-AP Agent functionality are connected to each other in a tree topology over one or more hops within a Multi-AP network. The tree topology ensures that a single backhaul path (over one or more hops) is established between any two Multi-AP devices in a Multi-AP network. The Multi-AP features defined in this specification are grouped into "Profiles". A Multi-AP device is said to implement a given Profile when it implements all the features mandated by such profile, as detailed in Table 104 in section 18. Profiles are numbered and referred to as "Profile-X", where X is an integer greater than or equal to 1. 4.1.1 Multi-AP example deployment Figure 1 shows an example of a Multi-AP deployment with two Multi-AP devices. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 19 of 163 Wi-Fi EasyMeshTM Specification v3.0 Multi-AP Device 1 Multi-AP Controller Multi-AP Agent Fronthaul AP Logical Ethernet Port Non-AP STA 1 Multi-AP Device 2 Backhaul STA Multi-AP Agent Fronthaul AP Logical Ethernet Port Backhaul link (Wi-Fi or wired) Wi-Fi Fronthaul link Multi-AP control interface Non-AP STA 2 Figure 1. Multi-AP example deployment 1 Figure 2 shows another example of a Multi-AP deployment with four Multi-AP devices organized in a tree topology with a maximum of two hops between the Multi-AP devices. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 20 of 163 Wi-Fi EasyMeshTM Specification v3.0 Multi-AP Device 1 Multi-AP Controller Multi-AP Agent Fronthaul AP Logical Ethernet Port WAN Non-AP STA 1 Backhaul STA Multi-AP Agent Fronthaul AP Multi-AP Device 2 Logical Ethernet Port Multi-AP Agent Fronthaul AP Multi-AP Device 3 Backhaul STA Multi-AP Agent Fronthaul AP Multi-AP Device 4 Non-AP STA 4 Non-AP STA 2 Non-AP STA 3 Wi-Fi Backhaul Link Wired Backhaul Link Wi-Fi Fronthaul Link Figure 2. Multi-AP example deployment 2 Figure 3 shows another example of a Multi-AP deployment with four Multi-AP devices and with the Multi-AP Controller entity deployed on a separate Multi-AP device. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 21 of 163 Wi-Fi EasyMeshTM Specification v3.0 Multi-AP Device 1 Multi-AP Controller Logical Ethernet Port WAN Logical Ethernet Port Multi-AP Agent Fronthaul AP Multi-AP Device 2 Non-AP STA 1 Backhaul STA Multi-AP Agent Fronthaul AP Multi-AP Device 4 Non-AP STA 3 Backhaul STA Multi-AP Agent Fronthaul AP Multi-AP Device 3 Non-AP STA 2 Figure 3. Multi-AP example deployment 3 Wi-Fi Backhaul Link Wired Backhaul Link Wi-Fi Fronthaul Link © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 22 of 163 Wi-Fi EasyMeshTM Specification v3.0 5 Multi-AP onboarding Onboarding is the process by which a Multi-AP Agent gains layer-2 connectivity onto a Multi-AP network through Wi-Fi or wired connectivity. This specification defines two methods (see section 5.2 (PBC onboarding) and 5.3 (DPP onboarding)) by which a Multi-AP device that includes a Multi-AP Agent and backhaul STA can onboard to a Multi-AP network. Note that a backhaul STA might be provisioned with backhaul credentials using out of band method(s). Once layer-2 connectivity is established by any method, the Multi-AP Agent commences discovery of the Multi-AP Controller per section 6.1. For Multi-AP devices that implement Profile-3, DPP onboarding can be used for two independent purposes: · DPP backhaul STA onboarding: to enable layer-2 Wi-Fi connectivity for a backhaul STA. (see section 5.3.4 or 5.3.6) · DPP Multi-AP Agent secure onboarding: to secure the 1905-layer between the enrollee Multi-AP Agent and the Multi-AP Controller and other existing Multi-AP Agent(s) in the network. (see section 5.3.7) If a Multi-AP Agent backhaul STA that implements Profile-3 onboards to the Multi-AP network through a Multi-AP Agent that implements Profile-1 or Profile-2 (e.g., using the PBC onboarding method of section 5.2) and the network uses a Multi-AP Controller that implements Profile-3, the Multi-AP Agent and Controller are not able to perform 1905-layer security message integrity or encryption (see section 13) unless the Multi-AP Agent performs DPP Multi-AP Agent secure onboarding (see section 5.3.7). However, the Multi-AP Controller can still enable other Profile-3 features. 5.1 1905 Push Button Configuration method A Multi-AP Agent with a backhaul STA shall support the 1905 Push Button Configuration (1905 PBC) method of [2] with the extensions per section 5.2. 5.2 PBC Backhaul STA onboarding procedure An enrollee backhaul STA uses an extension to the PBC onboarding method, as defined in section 5.1, to indicate to an existing Multi-AP Agent that it is a backhaul STA (see Figure 4). In Figure 4, it is assumed that a Multi-AP Controller previously configured the existing Multi-AP Agent with the supported BSS backhaul STA connections using an extension to the 1905 AP-Autoconfiguration procedures per 7.1 (see Figure 4). © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 23 of 163 Wi-Fi EasyMeshTM Specification v3.0 Figure 4. Onboarding/Configuring BSS BSS Configuration If a Multi-AP Agent operates a BSS that has been configured to support the Backhaul BSS role but has not been configured to support the Fronthaul BSS role, the Multi-AP Agent shall not advertise Wi-Fi Protected Setup (WPS) support on that BSS. If a Multi-AP Agent operates one or more BSSs that has been configured to support Fronthaul BSS, the Multi-AP Agent shall advertise WPS support on at least one of those BSSs. If a backhaul STA sends a (Re-)Association Request frame from its backhaul STA interface, it shall include in the frame a Multi-AP IE (see Table 3) containing a Multi-AP Extension subelement where bit 7 of the subelement value is set to one to indicate it is a backhaul STA. If a Multi-AP Agent operates a BSS that has been configured to support Fronthaul BSS, the Multi-AP Agent shall include a Multi-AP IE containing a Multi-AP Extension subelement with bit 5 of the subelement value set to one to indicate Fronthaul BSS in all (Re-)Association Response frames sent from that BSS to STAs identifying themselves as backhaul STAs. If a Multi-AP Agent operates a BSS that has been configured to support Backhaul BSS, the Multi-AP Agent shall include a Multi-AP IE containing a Multi-AP Extension subelement with bit 6 of the subelement value set to one to indicate Backhaul BSS in all (Re-)Association Response frames sent from that BSS to STAs identifying themselves as backhaul STAs. If a Multi-AP Agent operates a backhaul BSS configured with Profile-1 bSTA Disallowed the Multi-AP Agent shall set bit 3 of the Multi-AP Extension subelement to one. If a Multi-AP Agent operates a BSS configured with Profile-2 bSTA Disallowed, the Multi-AP Agent shall set bit 2 of the Multi-AP Extension subelement to one. If a Multi-AP Agent that implements Profile-2 sends a Multi-AP IE in a (Re)Association Request or Response frame, it shall include a Multi-AP Profile subelement with the Multi-AP Profile field set to 0x02. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 24 of 163 Wi-Fi EasyMeshTM Specification v3.0 If a Multi-AP Agent that implements Profile-2 sends a Multi-AP IE in a (Re)Association Response frame of a Backhaul BSS, and the most recently received Traffic Separation Policy has the number of SSIDs field set to a value different than zero, it shall include a Multi-AP Default 802.1Q Setting subelement (as defined in Table 4) with the latest configured Primary VLAN ID. If a Multi-AP Agent that implements Profile-2 sends a Multi-AP IE in a (Re)Association Response frame of a Backhaul BSS, and it considers the Primary VLAN ID not configured, it shall not include a Multi-AP Default 802.1Q Setting subelement. Backhaul STA Configuration If a backhaul STA sends an M1 message (see [5]) from its backhaul STA interface during a WPS exchange, it shall include a Multi-AP Extension subelement in the M1 message as part of the Wi-Fi Alliance Vendor Extension attribute with bit 7 of the subelement value set to one to indicate it is a backhaul STA. If a Multi-AP Agent receives an M1 message with bit 7 of the Multi-AP Extension subelement, as part of the Wi-Fi Alliance Vendor Extension attribute set to one from a STA during the WPS procedure, the Multi-AP Agent shall configure the backhaul STA with credentials (i.e. SSID and passphrase) pertaining to the backhaul SSID. If a Multi-AP Agent's backhaul STA uses WPS to be configured with network credentials by another Multi-AP Agent and the backhaul STA has been deauthenticated by the AP at the end of the WPS procedure, the Multi-AP Agent's backhaul STA shall associate to the backhaul SSID using the configured credentials. If a Multi-AP Agent backhaul STA supports SAE and the configured credentials comprise a WPA2-Personal passphrase and the Multi-AP Agent discovers an AP that is advertising the backhaul SSID and an SAE AKM, the Multi-AP Agent shall attempt SAE authentication with the AP (instead of WPA2-Personal) using the configured passphrase. If the Backhaul STA of a Multi-AP Agent that implements Profile-2 has successfully associated with a Backhaul BSS whose latest (Re)Association Response frame contains a Multi-AP Default 802.1Q Setting subelement (Table 4) in the Multi-AP IE with a Primary VLAN ID that differs from the one in use on the newly-associated Multi-AP Agent, or no Primary VLAN ID is configured on the newly-associated Multi-AP Agent, then the newly-associated Multi-AP Agent shall configure the Primary VLAN ID to the one indicated in the Multi-AP Default 802.1Q Setting subelement and send any 1905.1 management frames as defined in section 19.1.3. If the Backhaul STA of a Multi-AP Agent implements Profile-2 has successfully associated with a Backhaul BSS whose latest (Re)Association Response frame does not contain a MultiAP Default 802.1Q Setting subelement (Table 4) in the Multi-AP IE and the newly-associated Multi-AP Agent has a Primary VLAN ID configured, the newly-associated Multi-AP Agent shall consider the Primary VLAN ID not configured and send any 1905.1 management frames as defined in section 19.1.3. Table 3. Multi-AP IE format Field Element ID Length OUI OUI Type Subelement related fields Size (Octets) 1 1 3 1 3 3 Value (Hex) 0xDD Variable 0x50-6F-9A 0x1B Variable Variable Description IEEE 802.11 vendor specific information element. Length of the following fields in the IE in octets. Wi-Fi Alliance specific OUI (refer to 9.4.1.32 of [1]) Wi-Fi Alliance specific OUI Type identifying the type of the MultiAP IE. Multi-AP Extension subelement per Table 14. Multi-AP Profile subelement per Table 15. 4 Variable Multi-AP Default 802.1Q Setting subelement per Table 4. Field Subelement ID Subelement Length Table 4. Multi-AP Default 802.1Q Setting subelement format Length 1 octet 1 octet Value 0x08 0x02 Description Multi-AP Default 802.1Q Setting subelement identifier. Number of Bytes in the subelement value. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 25 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field Subelement Value Length 2 octets Value Variable Description Primary VLAN ID. This subfield shall be transmitted in little endian byte order. 5.3 DPP Backhaul STA and Multi-AP Agent secure onboarding 5.3.1 Overview of DPP onboarding procedure (Informative) The Multi-AP DPP onboarding method enables a Multi-AP Agent that implements Profile-3 to use the DPP Protocol (see [18]) to onboard to a Multi-AP network using a Multi-AP Controller that implements Profile-3. The onboarding can occur over Ethernet or over Wi-Fi via a Multi-AP Agent that implements Profile-3 acting as a Proxy Agent. Since the DPP Protocol supports configuration of DPP capable devices using a variety of Wi-Fi technologies, onboarding of Multi-AP devices requires the DPP "wi-fi_tech" field set to "map". Multi-AP-specific extensions to the DPP Configuration Request object and DPP Configuration Object parameters are defined and used in this specification. Figure 5 provides an overview of the DPP based onboarding sequence where an Enrollee Multi-AP Agent backhaul STA is onboarded over a Wi-Fi radio and subsequently the Multi-AP Agent's backhaul STA is configured with credentials for backhaul connectivity and the Multi-AP Agent is configured for 1905-layer security. The Enrollee Multi-AP Agent takes the DPP Responder role and the Multi-AP Controller takes the DPP Initiator role. The DPP onboarding process begins when the Multi-AP Controller receives the bootstrapping information of the Enrollee Multi-AP Agent in the form of a DPP URI. Upon receipt of the DPP URI, the Multi-AP Controller instructs one or more existing Multi-AP Agents to advertise the CCE IE in their Beacon and Probe Response frames, if they are not doing so already, and listen to the Enrollee's DPP Presence Announcement frame. Once the Multi-AP Controller receives a DPP Presence Announcement frame from an Enrollee Multi-AP Agent, it initiates the DPP Authentication procedure by generating a DPP Authentication Request frame. A Multi-AP Agent, acting as a proxy, relays the DPP Authentication messages received from the Multi-AP Controller to the Enrollee when the DPP Presence Announcement frame with the correct hash is received from the Enrollee. The proxy performs a bi-directional converstion between a DPP frame carried in an 802.11 frame to a DPP frame encapsulated in a Multi-AP CMDU message. Upon successful authentication, the Enrollee Multi-AP Agent requests configuration by exchanging DPP Configuration Protocol messages (see 6.6 of [18]) with the Multi-AP Controller. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 26 of 163 Wi-Fi EasyMeshTM Specification v3.0 Figure 5. DPP Onboarding The procedure below outlines how an Enrollee Multi-AP Agent and the Multi-AP Network interact for DPP onboarding over Wi-Fi. The announcement procedure referenced here is either the DPP Presence Announcement or the DPP Reconfiguration Announcement advertised by the Enrollee. 1. (Figure 5 step 1, 2, 3) A new Enrollee Multi-AP Agent is placed in DPP onboarding mode (e.g., user powering the device, user taking some action to enable onboarding). 2. The Multi-AP Controller takes the role of a DPP Configurator and obtains the Enrollee's DPP URI by one of the following mechanisms: a. One of the bootstrapping methods described in section 5 of [18], or b. The DPP bootstrapping using push button method described in section 5.3.6, or c. (step 4, 5) Transfer of the DPP URI with the bootstrapping information of the Enrollee (see [21]) from the Enrollee to the Controller using a secure out-of-band mechanism that is outside the scope of this specification (e.g., remote pre-provisioning of the Controller with the DPP URI of an enrollee provided by a Service Provider). 3. As shown in Figure 5 step 3, a Multi-AP Controller implementation might leverage user interface capabilities of a separate device for the purpose of bootstrapping (e.g., a QR code scanning app on a smartphone). Any necessary interfaces between physical components of the logical Multi-AP Controller entity are assumed to be secure and are out-of-scope of this specification. 4. As part of the bootstrapping process, (steps 10, 19) the Enrollee Multi-AP Agent starts advertising its presence by transmitting a periodic DPP Presence Announcement frame on various channels. It determines these channels by following the channel list selection procedure for presence announcement described in Section 6.2 of [18]. Each © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 27 of 163 Wi-Fi EasyMeshTM Specification v3.0 DPP Presence Announcement frame contains a bootstrapping key hash of the Enrollee. If the Enrollee has already been enrolled to the Multi-AP network, but its backhaul STA disconnected, the Enrollee follows the above procedure to reconnect, except that the Enrollee sends a DPP Reconfiguration Announcement frame that contains the hash of the C-sign-key of the Controller which onboarded its backhaul STA. 5. (step 0) A Multi-AP device may, by default, advertise the Configurator Connectivity Element (CCE) IE in Beacons and Probe Response frames to facilitate Enrollee Multi-AP Agent or other DPP capable client device onboarding into the Multi-AP network. If CCE is not advertised by default, upon receipt of an Enrollee's DPP URI, (steps 6,7) the Multi-AP Controller instructs one or more Multi-AP Agents in the network to start advertising the CCE in Beacon and Probe Response frames by sending them a DPP CCE Indication message. A Controller may instruct the existing Multi-AP Agents to advertise or not advertise the CCE at any time, independently of any upcoming onboarding procedure. It is recommended that the Multi-AP Controller triggers one or more Multi-AP Agents to start advertising the CCE in Beacon and Probe Response frames to facilitate seamless (re)configuration of backhaul STA and regular DPP capable STA devices. 6. (steps 8, 9) The Multi-AP Agent(s) start(s)/continue(s) advertising the CCE and listen(s) for a DPP Presence Announcement frame on their channel(s). The existence of the CCE in the Beacon frames on a given channel allows the Enrollee Multi-AP Agent to include that channel in its channel list contained in DPP Presence Announcement frame sent in that channel. 7. (steps 12, 13) The Multi-AP Agent(s) start(s)/continue(s) listening for announcements frames (DPP Presence Announcement frame or DPP Reconfiguration Announcement frame) and upon receipt of a DPP Presence Announcement frame or a DPP Reconfiguration Announcement frame for which it does not have a matching DPP (Reconfiguration) Authentication Request, the Multi-AP Agent will encapsulate it in a Chirp Notification message and send it to the Multi-AP Controller (step 14). 8. (steps 17, 18) If the Multi-AP Controller has received the DPP URI of the Enrollee and receives the DPP Presence Announcement frame of the Enrollee through one of the Multi-AP Agents, the Multi-AP Controller constructs a DPP Authentication Request frame, encapsulates it in a Proxied Encap DPP message and sends the Proxied Encap DPP message to the Multi-AP Agent(s) for relaying it to the Enrollee Multi-AP Agent. The Multi-AP Controller also sends a hashed value (computed from the Enrollee's public key in the DPP URI) that it expects in the DPP Presence Announcement frame of the Enrollee Multi-AP Agent. 9. If the Multi-AP Controller receives a DPP Reconfiguration Announcement frame from a Multi-AP Agent through one of the Multi-AP Agents, the Multi-AP Controller constructs a DPP Reconfiguration Authentication Request frame. 10. (steps 17, 18) If a Proxy Agent receives a Proxied Encap DPP message carrying a DPP Authentication Request and a DPP Chirp Value TLV, it will start comparing the value of the Hash Value field of the DPP Chirp Value TLV with the bootstrapping key hash from any DPP Presence Announcement frames it receives. If a match is found (step 20), the Multi-AP Agent forwards the DPP Authentication Request to the sender of the DPP Presence Announcement frame (step 22). 11. (steps 11, 15, 16, 19, 21) The Enrollee Multi-AP Agent continues the announcement procedure and listens for the DPP (Reconfiguration) Authentication Request frame. (step 22) Upon receipt of the DPP (Reconfiguration) Authentication Request frame, (step 23) the Enrollee stops the announcement procedure and engages in a DPP (Reconfig) Authentication exchange with the Multi-AP Controller on the channel of the selected Proxy Agent from which it received the DPP (Reconfiguration) Authentication Request frame. 12. (step 24) The Enrollee Multi-AP Agent constructs and sends a DPP (Reconfiguration) Authentication Response frame intended for the Multi-AP Controller and sends it to the Proxy Agent from which it received the DPP (Reconfiguration) Authentication Request frame. 13. (step 25) If the Proxy Agent receives the DPP (Reconfiguration) Authentication Response frame, it encapsulates the frame in a Proxied Encap DPP message and sends it to the Multi-AP Controller. 14. (step 26) If the Multi-AP Controller receives a DPP (Reconfiguration) Authentication Response frame, it will construct a DPP (Reconfiguration) Authentication Confirm frame, encapsulate it in a Proxied Encap DPP message, and send it to the Enrollee Multi-AP Agent through the Proxy Agent. (step 27) 15. (step 28) The Enrollee Multi-AP Agent will, upon receipt of the DPP (Reconfiguration) Authentication Confirm frame, request its initial configuration from the Multi-AP Controller by exchanging DPP Configuration frames using the selected Proxy Agent. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 28 of 163 Wi-Fi EasyMeshTM Specification v3.0 16. (step 28) The Multi-AP Controller configures the backhaul STA and the 1905-layer security of the Enrollee MultiAP Agent using the DPP Configuration protocol. After receiving the configuration for its backhaul STA and 1905-layer, the Enrollee Multi-AP Agent: · configures its backhaul STA interface, · uses its backhaul STA to connect to a backhaul BSS of the Multi-AP network, · discovers the Multi-AP Controller using AP-Autoconfiguration Search, · initiates the DPP Network Introduction protocol (see section 6.6 of [18]) to exchange 1905-layer connectors, · establishes a 1905 PMK with the Multi-AP Controller for its 1905-layer, and · intiates a 4-way handshake to derive a 1905 PTK. Fronthaul and backhaul configurations, including any policy, are obtained by the newly enrolled Multi-AP Agent using 1905-layer messages as explained in section 5.3.5. If the Multi-AP Controller triggers the newly enrolled Multi-AP Agent to start advertising the CCE in Beacon and Probe Response frames, the Multi-AP Agent listens to DPP Reconfiguration Announcement frames containing the C-sign-key hash of the Controller (to facilitate reconfiguration of enrolled Multi-AP Agents), and any additional bootstrapping key hashes received from the Multi-AP Controller (to facilitate Enrollee onboarding). The above steps describe a scenario where the Enrollee Multi-AP Agent uses a Wi-Fi link for backhaul. However, the 1905-layer DPP onboarding can alternatively be performed over the Logical Ethernet Link of the Enrollee. After DPP onboarding and configuration, the newly enrolled Multi-AP Agent can establish 1905-layer security between itself and the other existing Multi-AP Agents that implement Profile-3 to enable 1905 message encryption and message integrity the same way it did with the Multi-AP Controller. 5.3.2 Data structures used in DPP onboarding During DPP onboarding, the Multi-AP Controller and the Enrollee Multi-AP Agent exchange configuration information using the JSON structures described below. The DPP Configuration Request object is a JSON (JavaScript Object Notation) encoded data structure as defined in [22], that is transmitted as a DPP attribute (see 8.1 in [18]) in the DPP Configuration Request frame and BSS Configuration Request TLV. The DPP Configuration Object is a JSON (JavaScript Object Notation) encoded data structure as defined in [22], that is transmitted as a DPP attribute (see 8.1 in [18]) in the DPP Configuration Response frame and BSS Configuration Response TLV. The Multi-AP Agent shall use the JSON encoding defined in Table 5 to encode the DPP Configuration Request object. An example is provided in Figure 6. Parameter Name DPP Configuration Request object Device Name configRequest name Wi-Fi Technology wi-fi_tech Network Role netRole bSTAList bSTA list L2 Network Role netRole Table 5. DPP Configuration Request object Type OBJECT Value Description STRING STRING STRING Array STRING variable map mapAgent Objects mapBackhaulSta The name of the device. The type of network that the Enrollee wishes to be enrolled. The role that the Enrollee wishes to obtain for its 1905layer, fronthaul BSS and backhaul BSS. List of backhaul STA capabiliities in the structure: "bSTAList": [ {"netRole": "mapBackhaulSta", "akm": "STRING", "channelList": "STRING"} ] The role that the Enrollee wishes to obtain. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 29 of 163 Wi-Fi EasyMeshTM Specification v3.0 Parameter Name Authentication and akm key management type channelList Type STRING STRING Value psk, dpp, sae, psk+sae, dpp+sae, dpp+psk+sae or a list of one or more AKM suite selectors, delimited with a "+" character Description The authentication type(s) for the network. "psk" indicates one or more of the PSK and FT-PSK AKMs defined in [1] (typically at least "00-0F-AC:2" for interoperability) "sae" indicates one or more of the SAE and FT-SAE AKMs defined in [1] (typically at least "00-0F-AC:8" for interoperability) "dpp" indicates one or more of the DPP and FT-DPP AKMs defined in section 8.4 of [18] (typically at least "506F-9A:2" for interoperability) If a list of AKM suite selectors is provided, each AKM suite selector (OUI and type) is encoded as a 4-octet hex-encoded value without internal delimiters, e.g. 506F9A02 As defined in the DPP spec { "name": "My Multi-AP Agent", "wi-fi_tech": "map", "netRole": "mapAgent", "bSTAList": [ { "netRole": "mapBackhaulSta", "akm": "dpp+psk+sae", "channelList": "81/1,115/36"} ] } Figure 6. Configuration Request Object example The DPP Configuration Object parameters are given in Table 6 and the DPP Connector body object is described in Table 7. The JSON hierarchy for these two objects is illustrated in Figure 7, Figure 8 and Figure 9. A Multi-AP device shall encode the DPP Configuration Object as specified in section 4.3 of [18]. Table 6. DPP Configuration Object parameters Parameter DPP Configuration Object Wi-Fi Technology object: Decryption Failure Counter threshold Name Type configurationObject OBJECT wi-fi_tech STRING dfCounterThreshold NUMBER Discovery object: Discovery OBJECT Value Description map, inframap integer The wi-fi_tech value. Decryption Failure Counter threshold configured by Multi-AP Controller to each Multi-AP Agent. Included only in the DPP Configuration Object for the 1905-layer. The value shall be less than 65535 © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 30 of 163 Wi-Fi EasyMeshTM Specification v3.0 Parameter Radio Unique Identifier of a radio Name RUID SSID Ssid Type STRING STRING BSSID BSSID Credential cred object Authentication akm and key management type STRING OBJECT STRING Pre-shared key psk_hex STRING WPA2 Passphrase and/or SAE password DPP Connector pass signedConnector STRING STRING C-sign-key csign JWK Value the radio unique identifier of the radio UTF-8 MAC Address of the BSS Description The specific radio of the Enrollee Multi-AP Agent for which this configuration object applies to. This parameter is not included when configuring the backhaul STA or the 1905layer.. The name of the network for fronthaul BSS and backhaul BSS. The name of the network to connect to if it pertains to the backhaul STA. if DPP Configuration Object for the 1905layer, this field is ignored. The MAC address assigned to the BSS. The Controller sets this field to zero if it does not know the BSSID (initial configuration) or to the value assigned by the Multi-AP Agent to the BSS. psk, dpp, sae, psk+sae, dpp+sae, dpp+psk+sae or a list of one or more AKM suite selectors, delimited with a "+" character The authentication type(s) for the Wi-Fi network. "psk" indicates one or more of the PSK and FT-PSK AKMs defined in [1] (typically at least "00-0F-AC:2" for interoperability) Not included for 1905-layer configuration. "sae" indicates one or more of the SAE and FT-SAE AKMs defined in [1] (typically at least "00-0F-AC:8" for interoperability) "dpp" indicates one or more of the DPP and FT-DPP AKMs defined in section 8.4 of [18] (typically at least "50-6F-9A:2" for interoperability) When a list of AKM suite selectors is provided, each AKM suite selector (OUI and type) is encoded as a 4-octet hex-encoded value without internal delimiters, e.g. 506F9A02 Conditionally present when akm parameter value contains "psk" or a PSK AKM suite selector. WPA2 or SAE Passphrase/password. Conditionally present when akm parameter value continas "psk" or "sae", or a PSK and/or SAE AKM suite selector. The DPP Connector is composed of a header (see [18]) and the body object, as specified in Table 7. Configurator's public key; See section 4.2 of [18]. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 31 of 163 Wi-Fi EasyMeshTM Specification v3.0 Parameter Name Privacy- ppKey protection-key Type JWK Value Description Configurator's pubic key for privacy protection (see section 4.2 of [18]. Conditionally present when the Multi-AP Controller supports DPP Reconfiguration Parameter DPP Connector Body object Table 7. DPP Connector Body object format Name dppCon groups groupId Type Value OBJECT ARRAY STRING Freeform string or wildcard set to "*" netRole netAccessKey STRING JWK mapBackhaulSta, mapBackhaulBss, mapAgent, ap, mapController, configurator expiry STRING Scope Description M M The groups array comprises an array of one or more group objects. M A string identifying the identity of the group in the group object. The owner of this Connector is allowed by the Configurator to connect to devices in this group. M The role assigned to the owner of this Connector in this group. M JSON web key with encoding defined in [20]; "key_ops" and "use" objects in a "netAccessKey" object shall not be present. Note that JSON Web Keys use an uncompressed format. O Timestamp for net access key expiry, see section 4.3.5.9 of [18]. Optionally present. { "wi-fi_tech": "map", "dfCounterThreshold": 15, "discovery": { "RUID": "DE00ADBE00EF", "ssid": "myWi-Fi", "BSSID": "000000000000" }, "cred": { "akm": "dpp+psk+sae", "pass": "supersecret", "signedConnector": "eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJrTWNlZ0RCUG1OWlZha0FzQlpPek9vQ3N2UWprcl9uRUFwOXVGLUVEbVZFIi wiYWxnIjoiRVMyNTYifQ.ewogICJncm91cHMiOiBbCiAgICB7CiAgICAgICJncm91cElkIjogIm1hcE5XIiwKICAgIC AgIm5ldFJvbGUiOiAibWFwQWdlbnQiCiAgICB9CiAgXSwKICAibmV0QWNjZXNzS2V5IjogewogICAgImt0eSI6ICJFQ yIsCiAgICAiY3J2IjogIlAtMjU2IiwKICAgICJ4IjogIlhqLXpWMmlFaUg4WHd5QTlpanBzTDZ4eUx2RGlJQnRockhP OFpWeHdtcEEiLAogICAgInkiOiAiTFVzREJtbjdudi1MQ25uNmZCb1hLc0twTEdKaVZwWV9rblRja0dnc2dlVSIKICB 9LAogICJleHBpcnkiOiAiMjAyMS0wMS0zMVQyMjowMDowMCswMjowMCIKfQ.8fJSNCpDjv5BEFfmlqEbBNTaHx2L6c_ 22Uvr9KYjtAw88VfvEUWiruECUSJCUVFqv1yDEE4RJVdTIw3aUDhlMw", "csign": { "kty":"EC", "crv":"P-256", "x":"MKBCTNIcKUSDii11ySs3526iDZ8AiTo7Tu6KPAqv7D4", "y":"4Etl6SRW2YiLUrN5vfvVHuhp7x8PxltmWWlbbM4IFyM", "kid":"kMcegDBPmNZVakAsBZOzOoCsvQjkr_nEAp9uF-EDmVE" © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 32 of 163 Wi-Fi EasyMeshTM Specification v3.0 } } } Figure 7. DPP Configuration Object example { "typ": "dppCon", "kid": "kMcegDBPmNZVakAsBZOzOoCsvQjkr_nEAp9uF-EDmVE", "alg": "ES256" } Figure 8. Decoded Connector from Configuration Object (signedConnector) Header example { "groups": [ { "groupId": "mapNW", "netRole": "mapAgent" } ], "netAccessKey": { "kty": "EC", "crv": "P-256", "x": "Xj-zV2iEiH8XwyA9ijpsL6xyLvDiIBthrHO8ZVxwmpA", "y": "LUsDBmn7nv-LCnn6fBoXKsKpLGJiVpY_knTckGgsgeU" }, "expiry": "2021-01-31T22:00:00+02:00" } Figure 9. Decoded Connector from Configuration Object (signedConnector) Body example 5.3.3 Requirements for devices using DPP onboarding procedures A Multi-AP Controller that implements Profile-3 configures only one backhaul STA for each Multi-AP Agent. Multi-AP devices that implement Profile-3 assume that the DPP Configurator and the Multi-AP Controller are co-located as there is no defined interface between them. The DPP Configurator possesses a signing key pair (C-sign-key, c-signkey) as specified in [18]. The netRole=configurator role is only used for reconfiguration (see section 5.3.9). The DPP Configurator function shall initialize itself with a connector with netRole=configurator. The DPP Configurator shall initialize the Multi-AP Controller function by providing it with a connector with netRole=mapController for the Multi-AP Controller function. The following requirements in this section apply to the DPP onboarding scenarios of sections 5.3.4, 5.3.5 and 5.3.6. A Multi-AP Controller shall support the procedures of a DPP Configurator as defined in [18]. A Multi-AP Controller shall set the DPP Protocol Version to 2 for all DPP frames constructed as defined in [18]. An Enrollee Multi-AP Agent shall set the DPP Protocol Version to 2 for all DPP frames as defined in [18]. If an Enrollee Multi-AP Agent sends a DPP Configuration Request frame (see section 6.4.2 of [18] and Table 5), it shall: · include one DPP Configuration Request Object (see Table 5) · set the netRole to "mapAgent" · set wi-fi_tech to "map" · include the akm parameter, and · set the akm parameter value to the supported akm of its backhaul STA. If a Multi-AP Controller sends a DPP Configuration Response frame, it shall include: © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 33 of 163 Wi-Fi EasyMeshTM Specification v3.0 · Zero or one DPP Configuration Object for the backhaul STA · Zero or one DPP Configuration Object for the 1905-layer If a Multi-AP Controller sends a DPP Configuration Object for the backhaul STA, it shall set the fields described in Table 6 as follows: · DPP Configuration Object wi-fi_tech = "map" Discovery Object o SSID Credential Object o akm = AKM suite selectors configured for the backhaul BSS and supported by the backhaul STA as indicated in the DPP Configuration Request object. o DPP Connector with netRole = "mapBackhaulSta" o C-sign-key o Pre-shared key o WPA2 Passphrase and/or SAE password If a Multi-AP Controller sends a DPP Configuration Object for the 1905-layer, it shall set the fields described in Table 6 as follows: · DPP Configuration Object wi-fi_tech = "map" Decryption Failure Counter threshold Credential Object o akm = dpp o DPP Connector with netRole = "mapAgent" o C-sign-key If a Multi-AP device uses the DPP Network Introduction protocol as described in section 6.6 of [18] to attempt to connect to another Multi-AP device, it shall perform the connector group comparison per section 6.6.2 of [18] using the compatibility rules specified in Table 8. A Multi-AP device should perform the netRole compatibility matching in a case insensitive matching operation. If compatibility fails, see [18] for status and error messages. Table 8. netRole Compatibility netRole of matching groupId in received Connector mapBackhaulSta ANY except mapBackhaulSta mapBackhaulBss ANY except mapBackhaulBss mapController or mapAgent Any except mapController or mapAgent mapAgent ANY except mapAgent netRole of device's matching Connector groupId mapBackhaulBss mapBackhaulBss mapBackhaulSta mapBackhaulSta mapAgent mapAgent mapController mapController Compatibility Compatible Not compatible Compatible Not compatible Compatible Not Compatible Compatible Not Compatible 5.3.4 Onboarding method via Wi-Fi with out-of-band DPP bootstrapping If the Multi-AP Controller receives a DPP URI using any out-of-band DPP URI exchange (see section 5 of [18]), it shall send a DPP CCE Indication message containing one DPP CCE Indication TLV with the Advertise CCE field set to one and send it to one or more Multi-AP Agents - one of which will act as Proxy Agent during the onboarding process of an Enrollee Multi-AP Agent. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 34 of 163 Wi-Fi EasyMeshTM Specification v3.0 If a Multi-AP Agent sends a Beacon or Probe Response frame and the most recently received DPP CCE Indication TLV from the Multi-AP Controller had the Advertise CCE flag set to one, the Multi-AP Agent shall include the CCE in the Beacon and Probe Response frames on all of its fronthaul BSSs. If an Enrollee Multi-AP Agent supports onboarding over a Wi-Fi link, it shall support sending a Presence Announcement frame as specified in Section 6.2 of [18]. If a Proxy Agent receives a DPP Presence Announcement frame, the Proxy Agent shall check if the bootsrapping key hash in the DPP Presence Announcement frame matches any values of boostrapping key hash of a stored DPP Authentication Request frame received from the Multi-AP Controller. If no matching hash value is found, the Proxy Agent shall send a Chirp Notification message to the Controller with a DPP Chirp Value TLV and shall set the fields in the TLV: · Enrollee MAC Address present bit to one · Hash Validity Bit field to one · Destination STA MAC Address field to the source MAC Address of the DPP Presence Announcement frame · Hash Length field value to the length of the hash · Hash Value field to the boostrapping key hash received in the DPP Presence Announcement frame If the Multi-AP Controller that has been provided a DPP URI receives a Chirp Notification message with the Hash Value field matching the bootstrapping key hash from the DPP URI (see section 5 of [18]), the Multi-AP Controller shall send to all the Multi-AP Agents, using the CMDU reliable multicast transmission procedures, a Proxied Encap DPP message containing a 1905 Encap DPP TLV and a DPP Chirp Value TLV pertaining to that received DPP URI and set the fields: · In the 1905 Encap DPP TLV, the Multi-AP Controller shall set the DPP Frame Indicator to zero, the Frame Type to zero (DPP Authentication Request frame), set the Enrollee MAC Address present bit to one and the Destination STA MAC Address field to the MAC address of the Enrollee received in the DPP Chirp Value TLV. · In the DPP Chirp Value TLV, the Multi-AP Controller shall set the Enrollee MAC Address present bit to one, Hash Validity Bit field to one, the Destination STA MAC Address field to the MAC Address received in the Chirp Notification message, the Hash Length field set to the length of the hash, and the Hash Value field to the value computed from the DPP URI (as per Section 6.2.1 of [18]) If a Proxy Agent receives a Proxied Encap DPP message from the Multi-AP Controller that includes both a 1905 Encap DPP TLV containing an encapsulated DPP Authentication Request frame and a DPP Chirp Value TLV, the Proxy Agent shall decapsulate and store the DPP Authentication Request frame and listen for DPP Presence Announcement frames on the fronthaul BSS. If a Proxy Agent receives a Presence Announcement frame (chirp) with boostrapping key hash from the Enrollee Multi-AP Agent that matches the Hash Value field of the DPP Chirp Value TLV received from the Multi-AP Controller, the Proxy Agent shall send the DPP Authentication Request frame to the Enrollee within 1 second of receiving the Presence Announcement frame from that Enrollee, using a DPP Public Action frame to the MAC address from where the presence announcement was received. If the Proxy Agent receives the Enrollee's 802.11 ACK frame from the DPP Authentication Request frame to the Enrollee, the Proxy Agent may discard the DPP Authentication Request frame. If a Proxy Agent receives a Chirp Notification message from the Multi-AP Controller with one or more DPP Chirp Value TLVs with the Hash Validity set to zero, the Proxy Agent shall stop comparing the included hash(es) and may discard the corresponding DPP Authentication Request frame. NOTE: A Multi-AP Controller sends a Chirp Notification message to indicate to clear the DPP onboarding state machine of Enrollee Multi-AP Agents from the memory of the existing Multi-AP Agents. It can also be used to drop/cancel any ongoing DPP sessions. If the Enrollee Multi-AP Agent receives a DPP Authentication Request frame that includes its own boostrapping key hash (i.e., meant for itself), it shall respond with a DPP Authentication Response frame and ignore any subsequent DPP Authentication frames it may receive from other Multi-AP Agents. If the Controller has not received a DPP Authentication Response frame and the DPP Authentication Protocol times out (see [18] for timers), the Controller shall restart the DPP Authentication Protocol as per section 6.3 of [18] by resending the DPP Authentication Request frame. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 35 of 163 Wi-Fi EasyMeshTM Specification v3.0 If a Proxy Agent receives a DPP Public Action frame with Frame Type field set to one or 16 (DPP (Reconfiguration) Authentication Response) in response to a DPP (Reconfiguration) Authentication Request from the Enrollee Multi-AP Agent, it shall generate a Proxied Encap DPP message containing a 1905 Encap DPP TLV with the Encapsulated frame field set to the received DPP Public Action frame body, the Enrollee MAC Address Present bit set to one, the Destination STA MAC Address field set to the Enrolee's MAC address, the DPP Frame Indicator bit set to 0 and the Frame Type field set to one (or 16), and shall send the message to the Multi-AP Controller. If a Multi-AP Controller receives a Proxied Encap DPP message, then it shall respond within one second with a 1905 Ack message per section 17.1.32. The Multi-AP Controller shall then extract the encapsulated DPP frame from the Encapsulated Frame field of the 1905 Encap DPP TLV and process the frame per sections 6.1 to 6.6 of [18]. If the frame requires a response per sections 6.1 to 6.6 of [18], the Multi-AP Controller shall encapsulate the DPP frame in a 1905 Encap DPP TLV, set the Enrollee MAC Address present bit to one and include the Enrollee MAC address into the Destination STA MAC Address field of the 1905 Encap DPP TLV, and send the Proxied Encap DPP message to the MultiAP Agent from which it received the Proxied Encap DPP message. If a Proxy Agent receives a Proxied Encap DPP message from the Controller, it shall extract the DPP frame from the Encapsulated Frame field of the 1905 Encap DPP TLV. If the DPP Frame Indicator field value is zero, and if the Frame Type field is not equal to zero or 15, then: · If the Frame Indicator bit field in the 1905 Encap DPP TLV is set to zero and the Enrollee MAC Address Present bit is set to one, then the Proxy Agent shall send the frame as a unicast Public Action frame to the Enrollee MAC address. · If the Frame Indicator bit field in the 1905 Encap DPP TLV is set to zero and the Enrollee MAC Address Present bit is set to zero, then the Proxy Agent shall send the frame as a broadcast Public Action frame. · If the Frame Indicator bit field in the 1905 Encap DPP TLV is set to one and the Enrollee MAC Address Present bit is set to one, then the Proxy Agent shall send the frame as a unicast GAS frame to the Enrollee MAC address. · If the Frame Indicator bit field in the 1905 Encap DPP TLV is set to one and the Enrollee MAC Address Present bit is set to zero, then the Proxy Agent shall discard the message. If a Proxy Agent receives a 1905 Encap DPP TLV from a Proxied Encap DPP message, it shall encapsulate it in a 802.11 frame, the contents of the TLV shall be copied into an 802.11 action frame and the DPP Public Action frame header fields shall be set based on the DPP Frame Indicator and Frame Type field of the TLV. If a Multi-AP Controller receives a Proxied Encap DPP message containing an encapsulated DPP (Reconfiguration) Authentication Response frame, it shall generate a DPP (Reconfiguration) Authentication Confirm frame as per [18] and encapsulate it into a 1905 Encap DPP TLV, the DPP Frame Indicator bit to 0, Enrollee MAC Address Present bit to one, the Frame Type field to 2 (or 17 for Reconfig) and include the Enrollee MAC Address into the Destination STA MAC Address field. The Multi-AP Controller shall include the TLV into a Proxied Encap DPP message and send it to the MultiAP Agent from which the previous Proxied Encap DPP message carrying the DPP (Reconfiguration) Authentication Response frame was received. If a Proxy Agent receives a Proxied Encap DPP message with the 1905 Encap DPP TLV Frame Type set to 2 (or 17 for Reconfig), it shall decapsulate the DPP (Reconfiguration) Authentication Confirm frame from the TLV and send it to the Enrollee using a DPP Public Action frame as described in [18]. During the DPP Authentication Protocol (see 6.3 of [18]) and DPP Configuration Protocol (see 6.4 of [18]), a Multi-AP Controller shall only communicate with the Enrollee via the Proxy Agent from which it received the DPP Authentication Response frame. If an Enrollee Multi-AP Agent receives a DPP (Reconfiguration) Authentication Confirm Public Action frame, it shall generate a DPP Configuration Request frame, include it into a GAS Request frame (as specified in [18]) and send it to the Proxy Agent from which it received the DPP Authentication Confirm Public Action frame. See Figure 10 for the Enrollee's configuration message flow. The Enrollee Multi-AP Agent shall populate the akm parameter with the AKM(s) its backhaul STA supports. If a Proxy Agent receives a DPP Configuration Request frame in a GAS frame from an Enrollee Multi-AP Agent, it shall generate a Proxied Encap DPP message that includes a 1905 Encap DPP TLV that encapsulates the received DPP Configuration Request frame and shall set the Enrollee MAC Address Present field to one, include the Enrollee's MAC address in the Destination STA MAC Address field, set the DPP Frame Indicator field to one and the Frame Type field to 255, and send the message to the Multi-AP Controller. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 36 of 163 Wi-Fi EasyMeshTM Specification v3.0 If a Multi-AP Controller receives a Proxied Encap DPP message from an Enrollee Multi-AP Agent carrying a DPP Configuration Request frame, it shall generate a DPP Configuration Response frame and include one DPP Configuration Object for the 1905-layer and one DPP Configuration Object for the backhaul STA of the Enrollee, encapsulate them into a 1905 Encap DPP TLV, set the DPP Frame Indicator bit to one, set the Enrollee MAC Address Present bit to one, set the Frame Type field to 255 and include the Enrollee MAC Address into the Destination STA MAC Address field. If a Multi-AP Controller onboards a Muti-AP Agent over Wi-Fi, the Multi-AP Controller may include a `sendConnStatus' attribute in the DPP Configuration Response frame. The 1905 Encap DPP TLV shall be included into a Proxied Encap DPP message and sent to the Multi-AP Agent from which the previous Proxied Encap DPP message carrying the DPP Configuration Request frame was received. If a Proxy Agent receives a Proxied Encap DPP message from the Multi-AP Controller, it shall extract the DPP frame from the Encapsulated Frame field of the 1905 Encap DPP TLV and: · If the 1905 Encap DPP TLV Frame Indicator bit field is set to one and the Frame Type field is set to 255, the Proxy Agent shall decapsulate the DPP Configuration Response frame from the TLV and send it to the Enrollee Multi-AP Agent using a GAS frame as described in [18]. · If the 1905 Encap DPP TLV Frame Indicator bit field is set to one and the Frame Type field set to a value other than 255, the Proxy Agent shall discard the message. · If the 1905 Encap DPP TLV Frame Indicator bit field is set to zero and the Frame Type field set to 255, the Proxy Agent shall discard the message. · If the 1905 Encap DPP TLV Frame Indicator bit field is set to zero and the Frame Type field is set to a valid value, the Proxy Agent shall process the message as specified in sections 5.3.4 or 5.3.10. If an Enrollee Multi-AP Agent receives a DPP Configuration Response frame, it shall send a DPP Configuration Result Public Action frame as per [18], configure its 1905 and backhaul STA interfaces with the parameters received in the DPP Configuration Object and: · If the AKM for the backhaul STA in the DPP Configuration Object includes dpp and the backhaul BSS is configured to support the DPP AKM, then the Enrollee Multi-AP Agent shall initiate the DPP Network Introduction protocol in Public Action frames as per [18] to associate to the backhaul BSS. · If the AKM for the backhaul STA in the DPP Configuration Object includes PSK or SAE password, then the Enrollee Multi-AP Agent shall scan for and associate with a backhaul BSS with the SSID indicated in DPP Configuration Object as per [1]. If a Multi-AP Agent with DPP AKM enabled receives a DPP Peer Discovery Request Public Action frame, it shall respond with a DPP Peer Discovery Response Public Action frame and derive a PMK with the backhaul STA of the Enrollee MultiAP Agent as per [18]. If a DPP Configuration Response frame includes a `sendConnStatus' attribute, the Enrollee Multi-AP Agent shall generate a DPP Connection Status Result frame indicating the status of the connection attempt of its backhaul STA to the bBSS, as described in section 6.4.5.1 of [18], before initiating the 1905 DPP Peer Discovery procedure with the Multi-AP Controller. If a Proxy Agent receives a DPP Configuration Result Public Action frame from an Enrollee Multi-AP Agent, it shall encapsulate the frame into a 1905 Encap DPP TLV, set the Enrollee MAC Address Present field to one, set the Destination STA MAC Address field to the MAC address of the Enrollee, set the DPP Frame Indicator field to 0 and the Frame Type field to 11, and send the Proxied Encap DPP message to the Multi-AP Controller. If the GAS frame carrying the DPP Configuration frames needs to be fragmented, the Proxy Agent shall fragment the GAS frame as per [1] and [18]. If a Proxy Agent receives a DPP Connection Status Result Public Action frame from an Enrollee Multi-AP Agent, it shall encapsulate the frame into a 1905 Encap DPP TLV, set the Enrollee MAC Address Present field to one, set the Destination STA MAC Address field to the MAC address of the Enrollee, set the DPP Frame Indicator field to 0 and the Frame Type field to 12, and send the Proxied Encap DPP message to the Multi-AP Controller. If the Multi-AP Controller receives the DPP Configuration Result frame with DPP Status field set to STATUS_OK, the Multi-AP Controller shall retain the information that it successfully onboarded and configured the newly onboarded MultiAP Agent using the AL MAC address of the Enrollee Multi-AP Agent. If the Enrollee Multi-AP Agent's backhaul STA is associated with the backhaul BSS, the Enrollee Multi-AP Agent shall search for the Multi-AP Controller using 1905 AP-Autoconfiguration Search messages. If the Enrollee Multi-AP Agent receives a 1905 AP-Autoconfig Response message with the SupportedService field set to "Multi-AP Controller" and the © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 37 of 163 Wi-Fi EasyMeshTM Specification v3.0 Multi-AP Profile field in the Multi-AP Profile TLV (see section 17.2.47) is set to "Multi-AP Profile-3", the Enrollee Multi-AP Agent shall continue with the procedures in section 5.3.7 to secure its own 1905-layer and shall not initiate the APAutoconfiguration WSC exchange described in section 7.1. Figure 10. DPP Configuration via Wi-Fi © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 38 of 163 Wi-Fi EasyMeshTM Specification v3.0 5.3.4.1 Encapsulation of DPP Public Action frames and DPP GAS frames into TLVs: A Multi-AP Controller or Proxy Agent shall encapsulate a DPP 802.11 Action frame (as shown in Figure 11 (from Figure 6 in [18])) into a Proxied Encap DPP message by including the body of the 802.11 Action frame into the 1905 Encap DPP TLV as follows: · Encapsulated frame length field of the 1905 Encap DPP TLV is a 16-bit integer and contains the length of the Field in Figure 11 and DPP Message in Figure 11 inclusive, · Encapsulated frame field of the 1905 Encap DPP TLV is the Field in Figure 11 and DPP Message in Figure 11 of an 802.11 Action Frame shown in Figure 11 , · DPP Frame Indicator field of the 1905 Encap DPP TLV is the value corresponding to the frame type from the Category field (either DPP Public Action frame or GAS frame). · Frame Type field of the 1905 Encap DPP TLV is the DPP Public Action frame type value, or 255, based on the DPP Frame Type field (see section 8.2.1 of [18]) of the DPP frame. Figure 11. DPP in 802.11 Action Frame 5.3.5 Onboarding Method via a Multi-AP Logical Ethernet Interface with out-of-band DPP bootstrapping A Multi-AP Controller can only initiate the DPP Authentication Protocol with an Enrollee after it receives the bootstrapping information of the Enrollee. Providing the bootstrapping information of the Enrollee to the Controller happens using an outof-band mechanism. An example of an out-of-band mechanism is when the bootstrapping information is labeled on the Enrollee in a form of a QR code; the user scans the QR code with the smartphone and the smartphone transfers the QR code content to the Controller using a proprietary interface. If the Multi-AP Controller receives the enrollee's DPP URI by one of the mechanisms described in section 5 of [18], then DPP procedures can be initiated. See Figure 12 for the DPP Onboarding via Multi-AP Logical Ethernet Interface. If an Enrollee Multi-AP Agent detects that the link status of a Multi-AP Logical Ethernet Interface transitions to LINK_UP [3], the Enrollee Multi-AP Agent shall search for the Multi-AP Controller by sending 1905 AP-Autoconfiguration Search messages per section 6.1. The Enrollee Multi-AP Agent shall include a DPP Chirp Value TLV in the 1905 APAutoconfiguration Search message, setting the fields as follows: © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 39 of 163 Wi-Fi EasyMeshTM Specification v3.0 · Enrollee MAC Address present bit set to zero, · Hash Validity bit set to one, · Hash Length field set to the length of the hash, and · Hash Value set to the boostrapping key hash, as per section 6.2.1 of [18]. If the Multi-AP Controller has been provided with a DPP URI and receives a 1905 AP-Autoconfiguration Search message with a DPP Chirp Value TLV pertaining to a matching DPP URI, it shall respond within 1 second with a 1905 APAutoconfiguration Response message including a DPP Chirp Value TLV with the Hash Validity bit set to one and the Hash Value field set to the hash of the Enrollee. If the Controller has already initiated but not finalized a DPP Authentication Protocol (see section 6.3 in [18]) over Wi-Fi with the Enrollee Multi-AP Agent at the time it receives a 1905 AP-Autoconfiguration Search message with a DPP Chirp Value TLV in it and with the Hash Value field set to the same as the Enrollee with which the Controller has already initiated a DPP Authentication procedure, the Controller shall continue with the DPP Authentication Protocol and shall not send a DPP Authentication Request in a Direct Encap DPP message on a Multi-AP Logical Ethernet Interface to the Enrollee Multi-AP Agent. If the DPP Authentication Protocol over Wi-Fi fails (see [18]), the Multi-AP Controller shall initiate the DPP Authentication Protocol over the Multi-AP Logical Ethernet Interface. If the Enrollee Multi-AP Agent receives a 1905 AP-Autoconfiguration Response message that includes a DPP Chirp Value TLV with the Hash Value field matching its own, the Enrollee Multi-AP Agent shall wait for DPP_TIMER (set to 10 seconds) for the Multi-AP Controller to initiate the DPP Authentication Protocol by sending a Direct Encap DPP message with a DPP Message TLV carrying a DPP Authentication Request frame, using 1905 CMDU unicast transmission procedures. If DPP_TIMER expires and a DPP Authentication Request frame was not received, the Enrollee Multi-AP Agent shall send an AP-Autoconfigure WSC message to the Multi-AP Controller and continue with the AP-Autoconfig Search as shown in Figure 4 (e.g. the Multi-AP Controller did not obtain the DPP URI of the Enrollee). If the Enrollee Multi-AP Agent receives a Direct Encap DPP message with a DPP Message TLV carrying a DPP Authentication Request frame, it shall respond with a Direct Encap DPP message with a DPP Message TLV carrying a DPP Authentication Response frame. If the Multi-AP Controller receives a Direct Encap DPP message with a DPP Message TLV carrying a DPP Authentication Response frame, it shall respond with a Direct Encap DPP message with a DPP Message TLV carrying a DPP Authentication Confirm frame. If the Enrollee Multi-AP Agent receives a Direct Encap DPP message with a DPP Message TLV carrying a DPP Authentication Confirm frame, it shall send a Direct Encap DPP message with a DPP Message TLV carrying a DPP Configuration Request frame. The DPP Configuration Request frame shall contain a DPP Configuration Request object with the content as described in section 5.3.2. The Enrollee Multi-AP Agent may include a bSTAList to request configuration for its backhaul STA, even though it onboards using Ethernet. If the Multi-AP Controller receives a Direct Encap DPP message with a DPP Message TLV carrying a DPP Configuration Request frame, it shall respond with a Direct Encap DPP message with a DPP Message TLV carrying a DPP Configuration Response frame. The DPP Configuration Response frame shall contain a DPP Configuration object with the content as described in section 5.3.2. If the Multi-AP Controller onboards the Enrollee Multi-AP Agent over a Multi-AP Logical Ethernet Interface, the Multi-AP Controller shall not include a `sendConnStatus' attribute in a DPP Configuration Response frame. The Controller shall provide configuration for the Enrollee's 1905-layer and may include configuration for the Enrollee's backhaul STA, if it was requested. If the Enrollee Multi-AP Agent receives a Direct Encap DPP message with a DPP Message TLV carrying a DPP Configuration Response frame, it shall send a Direct Encap DPP message with a DPP Message TLV carrying a DPP Configuration Result frame. The Enrollee Multi-AP Agent shall configure its 1905-layer with the configuration information received from the Controller, and, if it has requested and received configuration for its backhaul STA, it shall apply the configuration to its backhaul STA interface. After the Enrollee Multi-AP Agent sent the DPP Configuration Result frame to the Controller, it shall follow the procedures in section 5.3.7 to set up a secure 1905-layer connectivity with the Controller. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 40 of 163 Wi-Fi EasyMeshTM Specification v3.0 Figure 12. DPP Onboarding via Multi-AP Logical Ethernet Interface © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 41 of 163 Wi-Fi EasyMeshTM Specification v3.0 5.3.6 Onboarding method via Wi-Fi with inband DPP bootstrapping using Push Button If a Multi-AP Agent that implements Profile-3 performs the Multi-AP PBC Backhaul STA Onboarding procedure per section 5.2 with another Multi-AP Agent, the Enrollee Multi-AP Agent shall include its DPP URI in the Encrypted Settings of M7 as shown in Figure 13. The Proxy Agent shall send the DPP URI to the Controller in a DPP Bootstrapping URI Notification message. Figure 13. Onboarding/Configuring BSS If a (existing Multi-AP) Proxy Agent receives a DPP URI from an Enrollee Multi-AP Agent during Multi-AP PBC Onboarding procedure (see section 5.2) and the Proxy Agent possesses a 1905 TK with the Multi-AP Controller, it shall perform the following: · Send a DPP Bootstrapping URI Notification message to the Multi-AP Controller containing the DPP URI. · Send an M8 message to the Enrollee Multi-AP Agent without any backhaul BSS credentials (see Figure 13). If an Proxy Agent receives a DPP URI from an Enrollee Multi-AP Agent during Multi-AP PBC Onboarding procedure (see section 5.2) and the Proxy Agent does not have a 1905 TK with the Multi-AP Controller, it shall: · not send the DPP Bootstrapping URI Notification message to the Controller with the DPP URI · Send an M8 message to the Enrollee Multi-AP Agent with the backhaul BSS credentials (see Figure 13). NOTE: under this condition, the Enrollee Multi-AP Agent falls back to PBC onboarding procedure (see section 5.1), without securing the 1905-layer. If an Enrollee Multi-AP Agent which implements Profile-3 receives an M8 with backhaul credentials, it shall follow the procedures in section 5.2 to onboard. If a Multi-AP Controller receives a DPP Bootstrapping URI Notification message, then it shall perform the following: © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 42 of 163 Wi-Fi EasyMeshTM Specification v3.0 · Select the Proxy Agent to be the Multi-AP Agent that sent the DPP Bootstrapping URI Notification message. · Start the DPP procedure per section 5.3.4. 5.3.7 Establishing secure 1905-layer connectivity Once a Multi-AP Agent has been onboarded and received a 1905 DPP Connector from the Multi-AP Controller (and has connected its backhaul STA to the backhaul BSS if using Wi-Fi), it uses the 1905 DPP Connector to establish a secure channel with the Multi-AP Controller and other Multi-AP Agents in the network. If the newly enrolled Multi-AP Agent receives an AP-Autoconfiguration Response message from a Multi-AP Controller indicating Profile-3 support in the Multi-AP Profile TLV, or if the Multi-AP Agent needs to re-establish a new 1905 PMK, it shall initiate and perform the 1905 PMK establishment procedure in section 5.3.7.1. 5.3.7.1 1905 PMK establishment If triggered to establish a 1905 PMK with a Multi-AP device, a Multi-AP Agent shall delete any 1905 PMK and associated 1905 PTK it may have with the peer Multi-AP device and shall initiate the DPP Network Introduction protocol (see section 6.6 of [18]) by sending a DPP Peer Discovery Request frame and include its 1905 Connector with netRole set to "mapAgent" into the DPP Peer Discovery Request frame. The Multi-AP Agent shall include the DPP Peer Discovery Request frame into the DPP Message TLV and send the TLV in a Direct Encap DPP message to the Multi-AP Controller. If a Multi-AP Controller receives a Direct Encap DPP message with a DPP Message TLV containing a DPP Peer Discovery Request frame, it shall check that the netRole in the received Connector from the Multi-AP Agent has netRole set to mapAgent (see Table 8). If the netRole is compatible (see Table 8), the Multi-AP Controller shall generate a DPP Peer Discovery Response frame and include its 1905 Connector with netRole set to mapController. The Multi-AP Controller shall include the DPP Peer Discovery Response frame into the DPP Message TLV and send the TLV in a Direct Encap DPP message to the Multi-AP Agent. If a Multi-AP Agent receives a Direct Encap DPP message with a DPP Message TLV containing a DPP Peer Discovery Response frame, it shall extract the DPP Peer Discovery Response frame from the DPP Message TLV and process it according to section 6.6 of [18]. If a Multi-AP Device receives a DPP Peer Discovery Request frame from an Enrollee Multi-AP Agent, or an already enrolled Multi-AP Agent, it shall process it according to section 6.6 of [18]. After successfully deriving the 1905 PMK, the Multi-AP Device which sent the 1905 DPP Peer Discovery Response shall initiate a 1905 4-way handshake to derive a new 1905 PTK with the Multi-AP Agent. If a Multi-AP Agent wants to communicate with another Multi-AP Agent, it shall establish a secure 1905-layer connectivity by using the DPP Peer Discovery protocol for establishing a 1905 PMK with the other Multi-AP Agent and exchange Connectors with netRole set to mapAgent. 5.3.7.2 1905 PTK establishment and 1905 4-way handshake A Multi-AP Device derives a 1905 PTK to communicate with another Multi-AP Device by performing a 4-way handshake as described in section 12.7.6.4 of [1] using the 1905 PMK established by the 1905-layer DPP Network Introduction protocol. Each pair of Multi-AP devices will have a uniquely derived 1905 PMK and 1905 PTK. If the Enrollee Multi-AP Agent generates a 1905 PMK during 1905-layer DPP Network Introduction protocol, it shall store the 1905 PMK in volatile memory. If the Multi-AP Controller generates a 1905 PMK during 1905-layer DPP Network Introduction protocol, it shall: · store the 1905 PMK · initiate and perform the 1905 4-way handshake procedure with the Multi-AP Agent to establish the 1905 PTK and 1905 GTK (see section 5.3.7.3) between the Multi-AP Controller and the Multi-AP Agent A Multi-AP device should not include any RSNE in the messages belonging to the 1905 4-way handshake. A Multi-AP device shall ignore any RSNE received in the 1905 4-way handshake messages. The Multi-AP device shall encapsulate each EAPOL-Key frame in a 1905 Encap EAPOL message. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 43 of 163 Wi-Fi EasyMeshTM Specification v3.0 The Multi-AP device shall generate a 512-bit 1905 PTK using KDF-SHA-256-512(K, A, B) with A and B as defined in 12.7.1.3 of [1]. If a Multi-AP Device successfully validates message M4 of the 1905 4-way handshake, the Multi-AP Device shall delete any previously derived 1905 PMK and associated 1905 PTK with the initiating Multi-AP Agent, install the new 1905 PTK, set the corresponding Multi-AP Device specific Encryption Transmission Counter to one and set the Encryption Reception Counter to zero. If a Multi-AP device has derived a new 1905 PTK, it shall derive the 256-bit 1905 TK from the 512-bit 1905 PTK using the procedures defined in 12.7.1.3 of [1]. 5.3.7.3 1905 GTK establishment The Multi-AP Controller shall generate the 1905 GTK and include it in message 3 of the 1905 4-way handshake. The 1905 GTK shall be a random or pseudorandom number as per section 12.7.1.2 of [1]. If a Multi-AP Agent is performing a 1905 4-way handshake with another Multi-AP Agent, a new 1905 GTK shall not be generated and included in Message 3. A Multi-AP Agent shall use the 1905 GTK provided by the Multi-AP Controller. The Multi-AP Controller shall use the values specified in Table 9 for KDE selectors (see "Key Data" in section 12.7.2 and Table 12-6 of [1]) Table 9. 1905 GTK KDE selectors OUI 0x50-6F-9A Type 0 Meaning 1905 GTK KDE The format of the 1905 GTK KDE is specified in Table 10. The Key ID specifies which index is used for the 1905 GTK. The Multi-AP Controller shall not use a Key ID of value zero for 1905 GTKs. Table 10. 1905 GTK KDE format Key ID Bits 0-1 Reserved Bits 2 - 7 1905 GTK 32 octets 5.3.7.4 1905 PTK rekey requirements A Multi-AP Controller may send a 1905 Rekey Request message to any Multi-AP Agent at any time based on its policy. If triggered, a Multi-AP Controller shall send a 1905 Rekey Request message to a Multi-AP Agent. The Multi-AP Controller may stagger the request messages to avoid creating a burst of control message traffic in the network. If a Multi-AP Agent receives a 1905 Rekey Request message, then it shall respond within one second with a 1905 Ack message and shall perform the 1905 4-way handshake procedure (see section 5.3.7.2) to establish a new 1905 PTK with every Multi-AP device it is communicating with. If a 1905 4-way handshake procedure is successful with the other MultiAP device, the Multi-AP Agent shall set the corresponding Multi-AP device specific Encryption Transmission Counter to one and the Encryption Reception Counter to zero. If a Multi-AP device has derived a new 1905 PTK, it shall derive the 256-bit 1905 TK from the 512-bit 1905 PTK using the procedures defined in 12.7.1.3 of [1]. 5.3.7.5 1905 GTK rekey requirements If triggered, a Multi-AP Controller shall generate a new 1905 GTK for all the Multi-AP Agents that implement Profile-3 and have 1905 Security enabled. At any time based on its policy, the Multi-AP Controller shall distribute the new 1905 GTK using the procedure described in section 12.7.7 of [1] with messages encapsulated using the 1905 Encap EAPOL message to each of the Multi-AP Agents that implement Profile-3 and have 1905 Security enabled. If a Multi-AP Agent that implements Profile-3 receives a new 1905 GTK and the corresponding new 1905 GTK Key Id, then the Multi-AP Agent shall perform the following: © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 44 of 163 Wi-Fi EasyMeshTM Specification v3.0 · Set the Integrity Transmission Counter to one and all the Integrity Reception Counters to zero · Start using the new 1905 GTK for MIC computation for both transmission and reception 5.3.8 Fronthaul BSS and Backhaul BSS configuration If an Enrollee Multi-AP Agent has established a PMK and PTK with the Controller at 1905-layer using the procedures described in section 5.3.7, it shall request configuration for its fronthaul BSSs and backhaul BSSs by sending a BSS Configuration Request message to the Controller. The AP Radio Basic Capabilities TLV included in the BSS Configuration Request message shall list all the supported radios of the Multi-AP Agent. The BSS Configuration Request message shall include one BSS Configuration Request TLV with DPP attribute(s) for all supported radios of the Multi-AP Agent. If a Multi-AP Agent receives a Connector with netRole set to 'ap', it shall compare the netRole compatibility using the rules specified in Table 15 of [18]. If a Multi-AP Agent receives a Connector with netRole set to 'mapBackhaulBss' it shall compare the netRole compatibility using the rules in the Table 8 for backhaul BSS and 1905-layer. If an Enrollee Multi-AP Agent sends a BSS Configuration Request message, it shall include a DPP Configuration Request Object with the following content: · netRole set to "mapAgent" · wi-fi_tech set to "map" A Multi-AP Agent may send a BSS Configuration Request message to the Controller at any time after it has been initially configured. If a Multi-AP Controller receives a BSS Configuration Request message, it shall respond within one second with a BSS Configuration Response message including one BSS Configuration Response TLV containing one DPP Configuration Object with DPP Configuration Object attributes for all fronthaul BSS(s) and backhaul BSS(s) to be configured on the Enrollee Multi-AP Agent. If a Multi-AP Controller sends a BSS Configuration Response TLV for a backhaul BSS, it shall set the parameters in the DPP Configuration Object fields described in Table 6 as follows: · DPP Configuration Object wi-fi_tech = "map" · Discovery Object SSID: set to the desired value Radio Unique Identifier of the radio BSSID: used only when reconfiguring the BSS · Credential Object akm = AKM suite selectors to be used on the backhaul BSS. DPP Connector with netRole = "mapBackhaulBss" C-sign-key Pre-shared key WPA2 Passphrase and/or SAE password If a Multi-AP Controller sends a BSS Configuration Response TLV for a fronthaul BSS, it shall set the parameters in the DPP Configuration Object fields described in Table 6 as follows: · DPP Configuration Object wi-fi_tech = "inframap" · Discovery Object SSID: set to the desired value Radio Unique Identifier of the radio BSSID: used only when reconfiguring the BSS © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 45 of 163 Wi-Fi EasyMeshTM Specification v3.0 · Credential Object akm = AKM suite selectors to be used on the fronthaul BSS. DPP Connector with netRole = "ap" C-sign-key Pre-shared key WPA2 Passphrase and/or SAE password If a Multi-AP Controller does not want to configure any BSS on a radio of a Multi-AP Agent, it shall include a BSS Configuration Response TLV in the BSS Configuration Response message and shall set the parameters in the DPP Configuration Object fields of the BSS Configuration Response TLV described in Table 6 as follows: · DPP Configuration Object wi-fi_tech = "inframap" · Discovery Object SSID: NULL Radio Unique Identifier of the radio If a Multi-AP Controller wants to tear down an existing BSS on a radio of a Multi-AP Agent, it shall include a BSS Configuration Response TLV in the BSS Configuration Response message and shall set the parameters in the DPP Configuration Object fields of the BSS Configuration Response TLV described in Table 6 as follows: · DPP Configuration Object wi-fi_tech = "inframap" or "map" · Discovery Object SSID: NULL Radio Unique Identifier of the radio BSSID If an Enrollee Multi-AP Agent receives a BSS Configuration Response message from the Multi-AP Controller, it shall configure its fronthaul BSS(s) and backhaul BSS(s) accordingly and send a BSS Configuration Result message to the Multi-AP Controller. An Enrollee Multi-AP Agent shall apply the received configuration from the Multi-AP Controller based on the value in the netRole, as follows: · If the netRole value is set to 'mapBackhaulBss', the configuration is for a backhaul BSS · If the netRole value is set to 'ap', the configuration is for a fronthaul BSS If the Multi-AP Controller receives a BSS Configuration Result message, it shall: · send an Agent List message to the newly onboarded Enrollee Multi-AP Agent and all the other existing Multi-AP Agents · include the Agent List TLV with the list of all the Multi-AP Agents that are part of the Multi-AP network (including the newly enrolled Multi-AP Agent itself) · set the Multi-AP Profile field in the Agent List TLV to the value of the Multi-AP Profile field of the Multi-AP Profile TLV received from each Multi-AP Agent · set the Security field in the Agent List TLV to 1905 Security enabled for all Multi-AP Profile-3 devices onboarded with DPP, and set the Security field to 1905 Security not enabled otherwise. 5.3.9 DPP onboarding after Profile-1 or Profile-2 onboarding If a Multi-AP Agent that implements Profile-3 has been onboarded using Profile-1 or Profile-2 onboarding procedures with a Multi-AP Controller that implements Profile-3, it shall continue sending 1905 AP-Autoconfiguration Search messages every 30 seconds with a DPP Chirp Value TLV as specified in section 5.3.4. If a Multi-AP Agent has previously been onboarded using Profile-1 or Profile-2 onboarding procedures (it has not been configured with a 1905-layer Connector) and the Multi-AP Controller is subsequently provided out-of-band with the MultiAP Agent's DPP URI, the Multi-AP Controller shall initiate the 1905-layer DPP Authentication and Configuration procedures per section 5.3.4. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 46 of 163 Wi-Fi EasyMeshTM Specification v3.0 5.3.10 DPP reconfiguration DPP reconfiguration requires a DPP Configurator function with a connector with netRole=configurator in the Multi-AP network. If a Multi-AP Controller wants to reconfigure the backhaul BSS and/or fronthaul BSS of one or more Multi-AP Agent(s), it shall send to the Multi-AP Agent(s) a Reconfiguration Trigger message. The Multi-AP Agent shall respond within one second with a 1905 Ack message per section 17.1.32. The Multi-AP Agent shall send a BSS Configuration Request message to the Multi-AP Controller to receive fresh fronthaul BSS and/or backhaul BSS configuration information. If a Multi-AP Controller receives a DPP Reconfiguration Announcement frame, a Multi-AP Controller shall send a DPP Connector with the netRole set to "configurator" (See Table 7) to reconfigure the Multi-AP Agent. Table 11 shows the compatibility matrix for Connector matching during reconfiguration. Table 11. netRole compatibility for reconfiguration netRole of matching groupId in received Connector mapBackhaulSta mapAgent configurator All other Multi-AP specific netRole netRole of device's matching Connector groupId configurator configurator mapAgent or mapBackhaulSta configurator Compatibility Compatible Compatible Compatible Not compatible NOTE: as part of a backhaul BSS reconfiguration, backhaul STA connectivity of some of the Multi-AP Agents in the MultiAP network may be lost. If there are any Multi-AP Agents configured with Wi-Fi backhaul connections within the Multi-AP network, the Multi-AP Controller shall enable CCE advertisements on all Multi-AP Agents. If a Multi-AP Agent wants to receive an updated configuration for 1905-layer connectivity (e.g., 1905 DPP Connector has expired) it shall generate a DPP Reconfiguration Announcement frame that includes the Controller's C-sign-key hash and shall encapsulate the DPP Reconfiguration Announcement frame in a Direct Encap DPP message and send it to the Multi-AP Controller. If a Multi-AP Agent with CCE enabled receives a DPP Reconfiguration Announcement frame, it shall check that the hash in the frame matches the hash of the Multi-AP Controller's C-sign-key. If the hash matches, it shall: · forward the DPP Reconfiguration Announcement frame to the Multi-AP Controller by generating a Proxied Encap DPP message containing a 1905 Encap DPP TLV, · encapsulate the received DPP Public Action frame body in the Encapsulated frame field, · set the Enrollee MAC Address present bit to one, · set the Destination STA MAC Address field to the Enrolee's MAC address, · set the DPP Frame Indicator bit to zero · set the Frame Type field to 14, and · send the message to the Multi-AP Controller. If a Multi-AP Controller that supports DPP reconfiguration receives a Proxied Encap DPP message that includes an encapsulated DPP Reconfiguration Announcement frame with a hash value that matches C-sign-key hash, the Multi-AP Controller shall generate DPP Reconfiguration Authentication Request frame as per section 6.5.3 of [18] and encapsulate it in a 1905 Encap DPP TLV and include it into Proxied Encap DPP message. In the 1905 Encap DPP TLV, the Multi-AP Controller shall set the DPP Frame Indicator to zero, set the Frame Type to 15, set the Enrollee MAC Address Present bit field to one and shall set the Destination STA MAC Address field to the MAC address of the Multi-AP Agent to be reconfigured, and sends the message to all the Multi-AP Agents - one of which will become the Proxy Agent for a given Enrollee Multi-AP Agent. If the Multi-AP Controller sends a Proxied Encap DPP message carrying an encapsulated DPP Reconfiguration Authentication Request frame, it shall not include a DPP Chirp Value TLV into the message. If a Proxy Agent receives a Proxied Encap DPP message that includes an encapsulated DPP Reconfiguration Authentication Request frame destined for a Multi-AP Agent seeking reconfiguration, the Proxy Agent shall listen for a DPP Reconfiguration Announcement frame. If a Proxy Agent receives a DPP Reconfiguration Announcement frame, it © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 47 of 163 Wi-Fi EasyMeshTM Specification v3.0 shall check that the hash in the frame matches the hash of the Controller's C-sign-key. If the hash matches and the DPP Reconfiguration Authentication Request frame is for the Multi-AP Agent seeking reconfiguration based on the matching of the source MAC address of the Reconfig Announcement frame with the Destination STA MAC Address field from the 1905 Encap DPP TLV, the Proxy Agent shall send the DPP Reconfiguration Authentication Request Public Action frame to the Multi-AP Agent seeking reconfiguration. If the hash does not match, the Proxy Agent shall forward the Reconfiguration Announcement frame to the Multi-AP Controller as specified above. NOTE: this frame may be a Reconfiguration Announcement frame from a different Multi-AP Agent seeking reconfiguration, If a Proxy Agent receives a Proxied Encap DPP message that includes an encapsulated DPP Reconfiguration Authentication Request frame, it shall store it until it receives a DPP Reconfiguration Announcement frame from a to be reconfigured Multi-AP Agent matching the MAC address associated with the encapsulated DPP Reconfiguration Authentication Request frame. If the Proxy Agent receives an 802.11 ACK frame from the Multi-AP Agent seeking reconfiguration indicating receipt of the DPP Reconfiguration Authentication Request frame, it may discard the DPP Reconfiguration Authentication Request frame. If the Proxy Agent receives a Chirp Notification message with Hash Validity bit set to zero, Hash Length field set to zero and the Enrollee MAC Address present bit set 1 in the Chirp Value TLV from the Multi-AP Controller, it shall discard the DPP Reconfiguration Authentication Request frame that is associated with the Destination STA MAC Address field from the Chirp Value TLV. If the Enrollee receives a DPP Reconfiguration Authentication Request frame, it shall follow the behaviour described in [18] and send the DPP Reconfiguration Authentication Response frame to the Proxy Agent. If the Multi-AP Controller receives a DPP Reconfiguration Authentication Response frame encapsulated in a 1905 Encap DPP TLV carried in a Proxied Encap DPP message from a Proxy Agent, it shall send a DPP Reconfiguration Authentication Confirm frame encapsulated in a 1905 Encap DPP TLV using a Proxied Encap DPP message to the Enrollee through the Proxy Agent and send a Chirp Notification message to all the Multi-AP Agents with a Chirp Value TLV with the Hash Validity field set to zero, the Enrollee MAC Address present bit set to one, the Destination MAC Address field set to the MAC address of the just reconfigured Multi-AP Agent and the Hash Length field set to zero. If the Proxy Agent receives a DPP Reconfiguration Authentication Confirm frame encapsulated in a 1905 Encap DPP TLV of a Proxied Encap DPP message, it shall decapsulate the DPP Reconfiguration Authentication Confirm frame and send it to the Multi-AP Agent seeking reconfiguration. If the Enrollee receives a DPP Reconfiguration Authentication Confirm frame, it shall follow the behaviour described in section 6.5.4 of [18] and send a DPP Configuration Request frame to the Multi-AP Controller. If a backhaul STA of a Multi-AP Agent receives a protected Disassociation frame, it shall try to re-associate its backhaul STA using the backhaul BSS credentials from the last onboarding procedure. If the re-association fails and the Multi-AP Agent possesses a Privacy-protection-key from the Multi-AP Controller, then the Multi-AP Agent shall invoke the reconfiguration algorithm from [18] section 6.5.2 by starting the Reconfiguration Announcement procedures. See Figure 14 for the Reconfiguration message flow. If the backhaul STA of a Multi-AP Agent misses an implementation specific number of Beacon frames on the backhaul BSS and the Multi-AP Agent possesses a Privacy-protection-key from the Multi-AP Controller, it shall invoke the reconfiguration algorithm from [18] section 6.5.2 by starting Reconfiguration Announcement procedures. The Multi-AP Agent shall retain its backhaul STA configuration until it successfully receives an updated configuration. If the Multi-AP Agent needs to reconfigure its backhaul STA, it shall include a DPP Configuration Request object with netRole=mapBackhaulSta into a DPP Configuration Request frame during reconfiguration. If the Multi-AP Agent needs to reconfigure its 1905-layer, it shall include a DPP Configuration Request object with netRole=mapAgent into a DPP Configuration Request frame during reconfiguration. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 48 of 163 Wi-Fi EasyMeshTM Specification v3.0 Figure 14. DPP Reconfiguration Message Flow 5.3.11 Onboarding DPP capable client devices (STAs) Since a Multi-AP Controller that implements Profile-3 includes a co-located DPP Configurator (see section 5.3.3), the Multi-AP network can also perform DPP onboarding of DPP capable client devices (STAs) that do not implement Multi-AP Agent functionality. The procedures defined in this version of the specification only support onboarding DPP capable client devices (STAs) that indicate DPP Protocol Version 2 or higher in the DPP URI. These client devices are required to generate a Channel List for Presence Announcement as defined in [18] and use those channels to send DPP Presence Announcement frames [18]. During the DPP onboarding procedure, these client devices will be configured with credentials that will allow them to connect to one or more fronthaul BSS(s) in a Multi-AP network. If a Multi-AP Controller receives a DPP URI that does not include a DPP Protocol Version, it should notify the user indicating that the DPP URI is invalid or unsupported. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 49 of 163 Wi-Fi EasyMeshTM Specification v3.0 If triggered by receipt of a DPP URI, a Multi-AP Controller shall initiate the DPP Authentication Protocol as specified in section 5.3.4. Upon successful completion of the DPP Authentication protocol, the Multi-AP Controller is expected to receive a DPP Configuration Request frame from the Enrollee. If the Multi-AP Controller receives a DPP Configuration Request object with the Wi-Fi Technology field set to "infra" and the Network Role field is set to "sta", it shall generate one or more DPP Configuration Response object(s) as specified in section 4.3 of [18] and shall populate the SSID field with a BSS that provides fronthaul connectivity for the client device. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 50 of 163 Wi-Fi EasyMeshTM Specification v3.0 6 Multi-AP discovery A discovery scheme is used to discover Multi-AP Controller and Multi-AP Agents in a Multi-AP network that is based on an extension of the discovery functionality defined in [2]. Note: A Multi-AP Agent supporting [11] might use the Generic PHY query/response procedure to discover Generic Phy non-Wi-Fi interfaces. Additional Wi-Fi Media type (intfType) value(s) to 1905 Media type Table 6-12 (see [2]): Table 12. Extension of 1905 Media type Table 6-12 in [2] Media Type (intfType) Bits 15 to 8 1 Bits 7 to 0 8 Description Wi-Fi 6 Media-specific information (n octects) n=0 6.1 Multi-AP controller discovery A Multi-AP network shall be configured with a single Controller for the Multi-AP network. If a Multi-AP device can be configured as a Controller through an out-of-band mechanism (e.g. through UI or Service Provider configuration), the configuration shall be stored in non-volatile memory and the configuration shall be used after restart of the device. Note: If a Multi-AP device that implements Profile-2 implements an Agent and a Controller, then it might provide an out-ofband mechanism by which a user can disable the Controller function if they wish to onboard this as a Multi-AP Agent to an existing Multi-AP network. For example, this could be implemented directly by presenting the user with a Controller on/off selection or indirectly by presenting the user with a choice such as "Is this a new network or an existing network?". Note: If a Multi-AP device that implements Profile-2 implements an Agent and a Controller and the Agent initiates onboarding onto an existing Multi-AP network (see section 5) using a Wi-Fi interface, it might disable its Controller functionality and store this configuration in its non-volatile memory. Note: If a Multi-AP device that implements Profile-2 implements an Agent and a Controller and a non-Wi-Fi interface transitions to the PWR_ON state, it might send a 1905 AP-Autoconfiguration Search message (see section 6.3.7 of [2]) on that interface. If the Multi-AP device receives a 1905 AP-Autoconfiguration Response message (see section 6.3.8 of [2]) on a non-Wi-Fi interface from a Controller that is not its Controller, it might disable its Controller functionality and store this configuration in its non-volatile memory. Note: A Multi-AP Controller might send a 1905 AP-Autoconfiguration Search message to discover the possible presence of another Multi-AP Controller. If the Multi-AP Controller receives a 1905 AP-Autoconfiguration Response message, it might send a notification to the upper layers. This specification extends the 1905 AP-Autoconfiguration search/response procedure (see section 10 of [2]) to allow discovery of a Multi-AP Controller. The Multi-AP Controller shall be co-located with the 1905 Registrar functionality in the same physical device. To discover a Multi-AP Controller, a Multi-AP Agent sends a 1905 AP-Autoconfiguration Search message (see section 6.3.7 of [2]). The Multi-AP Controller responds with a 1905 AP-Autoconfiguration Response message (see section 6.3.8 of [2]). A Multi-AP Agent that implements Profile-2 shall include one Multi-AP Profile TLV (see section 17.2.47) in the 1905 AP-Autoconfiguration Search message with the Multi-AP Profile field set to Multi-AP Profile-2. A Multi-AP Agent shall indicate Registrar in the SearchedRole TLV in the 1905 AP-Autoconfiguration Search message. A Multi-AP Agent shall include SupportedService TLV and SearchedService TLV in the 1905 AP-Autoconfiguration Search message per section 17.1.1. A Multi-AP Agent shall indicate Multi-AP Agent in the SupportedService TLV in the 1905 APAutoconfiguration Search message. A Multi-AP Agent shall indicate Multi-AP Controller in the SearchedService TLV in the 1905 AP-Autoconfiguration Search message. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 51 of 163 Wi-Fi EasyMeshTM Specification v3.0 If a Multi-AP Controller receives a 1905 AP-Autoconfiguration Search message with SearchedRole set to Registrar and SearchedService set to Multi-AP Controller, it shall include SupportedService TLV in the 1905 AP-Autoconfiguration Response message per section 17.1.2. A Multi-AP Controller shall indicate Registrar in the SupportedRole TLV in the 1905 AP-Autoconfiguration Response message. A Multi-AP Controller shall indicate Multi-AP Controller in the SupportedService TLV in the 1905 AP-Autoconfiguration Response message. A Multi-AP Controller that implements Profile-2 shall include one Multi-AP Profile TLV in the 1905 AP-Autoconfiguration Response message with the Multi-AP Profile field set to Multi-AP Profile-2. 6.2 Multi-AP service discovery This specification extends the 1905 Topology query/response procedure (see section 8 of [2]) to allow discovery of MultiAP specific capabilities provided by Multi-AP devices. To discover the Multi-AP specific capabilities of a Multi-AP device, a Multi-AP Controller or a Multi-AP Agent sends a 1905 Topology Query message to the Multi-AP device (per section 8 of [2]). The Multi-AP device responds with a 1905 Topology Response message (per section 17.1.4). A Multi-AP Controller or a Multi-AP Agent shall include a SupportedService TLV in the 1905 Topology Response message. If the Multi-AP device includes a Multi-AP Agent, the Multi-AP Agent shall indicate Multi-AP Agent in the SupportedService TLV in the 1905 Topology Response message. If the Multi-AP device includes a Multi-AP Controller, the Multi-AP Controller shall indicate Multi-AP Controller in the SupportedService TLV in the 1905 Topology Response message. If a Multi-AP device that implements Profile-2 sends a Topology Query message, it shall include one Multi-AP Profile TLV in the 1905 Topology Query message with the Multi-AP Profile field set to Multi-AP Profile-2. If a Multi-AP Agent sends a Topology Response message and there is at least one 802.11 client directly associated with any of the BSS(s) that is operated by the Multi-AP Agent, the Multi-AP Agent shall include an Associated Clients TLV in the message per section 17.1.4 to indicate all the 802.11 clients that are directly associated with each of the BSS(s) that is operated by the Multi-AP Agent. See A.2 for further explanation. If a Multi-AP device that implements Profile-2 sends a Topology Response message, it shall include one Multi-AP Profile TLV in the 1905 Topology Response message with the Multi-AP Profile field set to Multi-AP Profile-2. If a Multi-AP device that implements Profile-3 sends an AP Capability Report message, then for the following fields in the Device Inventory TLV: · the SerialNumber string shall remain fixed over the lifetime of the device, including across firmware updates · if a Multi-AP Agent supports multiple firmware images, the SoftwareVersion string shall be the software version of the active firmware image · to allow version comparisons, the SoftwareVersion string should be in the form of dot-delimited integers, where each successive integer represents a more minor category of variation. For example, 3.0.21 where the components mean: Major.Minor.Build · if a Multi-AP Agent supports multiple execution environments, the ExecutionEnv string shall be the active execution environment 6.3 Client association and disassociation notification This specification extends the 1905 Topology Notification message to allow other Multi-AP Agents to learn of client (re)association and disassociation events quickly. If a Wi-Fi client joins or leaves a BSS on a Multi-AP device, the Multi-AP Agent shall include a Client Association Event TLV in the 1905 Topology Notification message per section 17.1.5. If a Multi-AP Agent that implements Profile-2 sends a 1905 Topology Notification message including a Client Association Event TLV with the Association Event bit set to zero (client disassociation), the Multi-AP Agent shall also send to the Multi-AP Controller a Client Disassociation Stats message including one STA MAC Address TLV identifying the station that has disassociated, one Reason Code TLV with the Reason Code set to indicate the reason for the disassociation or deauthentication as defined in Table 9-45 of [1] and one Associated STA Traffic Stats TLV indicating the final traffic stats of that client session. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 52 of 163 Wi-Fi EasyMeshTM Specification v3.0 If a Multi-AP Agent that implements Profile-2 most recently received Multi-AP Policy Config Request contains an Unsuccessful Association Policy TLV with the Report Unsuccessful Associations bit set to one, and if the Multi-AP Agent has sent fewer than the maximum number of Failed Connection messages (as specified in the Maximum Reporting Rate element of the Unsuccessful Association Policy TLV) in the preceding minute, and the Multi-AP Agent detects that Wi-Fi client has made a failed attempt to connect to any BSS operated by the Multi-AP Agent, the Multi-AP Agent shall send to the Multi-AP Controller a Failed Connection message including a STA MAC Address TLV identifying the client that has attempted to connect and a Status Code TLV with the Status Code set to a non-zero value that indicates the reason for association or authentication failure as defined in Table 9-46 of [1], or a Status Code TLV with the Status Code set to zero and a Reason Code TLV with the Reason Code indicating the reason the STA was disassociated or deauthenticated as defined in Table 9-45 of [1]. If a Multi-AP Agent that implements Profile-3 sends a Failed Connection message, the Multi-AP Agent shall include a BSSID TLV (see section 17.2.74) indicating the BSSID of the BSS to which the failed connection attempt was made. Note: A STA does not send a Disassociation or Deauthentication frame to the source BSS when roaming using the 802.11 Reassociation procedure. If a STA roams away from a BSS for which it has negotiated Protected Management Frames with the AP, and subsequently attempts to (re)associate to that same BSS while the AP maintains associated state for the STA from the original association (i.e. if the AP has not realized that the STA left the BSS), the AP will initiate a security procedure per IEEE 802.11 standard intended to protect the original association from unauthorized tear down. This procedure involves rejection of the subsequent (re)association request for a timeout period, which can result in significant outage for the STA. To avoid such outage, it is necessary for a Multi-AP Agent to internally synchronize association state between BSSs it is operating, and also to determine when an associated STA has roamed to a BSS of another Multi-AP Agent. For the latter, 1905 Topology Notification messages received from other Multi-AP Agents might be used. A possible race condition might occur when the STA roams away and then rapidly attempts to (re)associate back to the source BSS before the message indicating the initial roam has been received. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 53 of 163 Wi-Fi EasyMeshTM Specification v3.0 7 Multi-AP configuration 7.1 AP configuration This specification extends the 1905 AP-Autoconfiguration procedure to enable a Multi-AP Controller to configure 802.11 interfaces (i.e. BSS) on each of the radio(s) of a Multi-AP Agent. A Multi-AP Agent treats each of its unconfigured radio(s) as an "unconfigured IEEE 802.11 interface" in section 10.1 of [2]. A Multi-AP Controller configures Traffic Separation policies using AP-Autoconfiguration WSC messages and / or Multi-AP AP Policy Config Request messages (see Section 19.1.2). This specification extends the Authentication Types in Table 32 of [5] by defining a new value 0x0040 for SAE. Table 13. Extension of Authentication Types Table 32 in [5] Value 0x0040 Authentication Types SAE Notes To initiate (re)configuration of a radio, a Multi-AP Agent shall send an AP-Autoconfiguration WSC message per section 17.1.3. A Multi-AP Agent shall send a separate AP-Autoconfiguration WSC message per section 17.1.3 for each of its radio(s). The Multi-AP Agent shall indicate the radio of the 802.11 configuration with a Radio Unique Identifier in the AP Radio Basic Capabilities TLV (see section 17.2.7). The Multi-AP Agent shall set the MAC Address attribute in M1 in the AP-Autoconfiguration WSC message to the 1905 AL MAC address of the Multi-AP device. The Multi-AP Agent shall set the Authentication Type Flags attribute in M1 in the AP-Autoconfiguration WSC message to one of the values allowed in [5] or to 0x0040 (indicating SAE) or to any valid combination, depending on the radio's supported AKMs from Table 9-133 of [1] . If a Multi-AP Agent that implements Profile-2 sends an AP-Autoconfiguration WSC message, it shall include one Profile-2 AP Capability TLV and one AP Radio Advanced Capabilities TLV. If a Multi-AP Controller receives a WSC TLV containing an M1, then it shall respond within one second with either 1) one or more M2s for each BSS to be configured on the radio identified in the AP Radio Identifier TLV or 2) one M2 with bit 4 (Tear down bit) set to one in the Multi-AP Extension subelement to indicate that zero BSS are to be configured on the radio identified in the AP Radio Identifier TLV per section 17.1.3. A Multi-AP Controller shall include one WSC TLV containing an M2 (see [5]) for each BSS to be configured on the radio identified in the AP Radio Identifier TLV in an AP-Autoconfiguration WSC message per section 17.1.3. The N2 nonce specified in each M2 shall be unique. A Multi-AP Controller shall set the Authentication Type attribute in M2 to one of the values allowed in [5] or to 0x0040 (indicating SAE) or to any valid combination, as per the Multi-AP Agent declaration in M1's Authentication Types Flags. A Multi-AP Controller indicates whether or not a BSS is to support Multi-AP backhaul connections and/or fronthaul connections in the Multi-AP Extension subelement listed in Table 14 as part of AP-Autoconfiguration WSC message illustrated in Figure 4. If a Multi-AP Controller sends an M2 indicating Fronthaul BSS, it shall not set the Authentication Type attribute in that M2 to 0x0040 (SAE only). The Multi-AP Controller shall not configure SAE-only mode on fronthaul BSSs. However, if the Multi-AP Agent indicates support for SAE in the M1, the Controller might configure a fronthaul BSS to 0x0060 (PSK+SAE), aka WPA3 Transition Mode. The Multi-AP Extension subelement is carried in a Wi-Fi Alliance Vendor Extension attribute with the Vendor Extension attribute ID set to 0x1049, Vendor ID set to 0x00372A, and the subelement ID set to 0x06. See Table 29 of [5]. If a BSS supports backhaul connections, a Multi-AP Controller shall include a Multi-AP Extension subelement in the APAutoconfiguration WSC containing an M2 with bit 6 of the subelement value set to one. If a Controller wants a backhaul BSS of a Multi-AP Agent that implements Profle-2 to disallow association to any Backhaul STA that would result in a Profile-1 backhaul link (as per section 12.1), a Multi-AP Controller shall include a Multi-AP Extension subelement in the AP-Autoconfiguration WSC containing an M2 with bit 6 of the subelement value set to one and bit 3 of the subelement value set to one. If a Controller wants a backhaul BSS of a Multi-AP Agent that implements Profile-2 to disallow association to any Backhaul STA that would result in a Profile-2 backhaul link (as per section 12.1), a Multi-AP Controller shall include a Multi-AP Extension subelement in the AP-Autoconfiguration WSC containing an M2 with bit 6 of the © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 54 of 163 Wi-Fi EasyMeshTM Specification v3.0 subelement value set to one and bit 2 of the subelement value set to one. If a BSS supports fronthaul connections, a Multi-AP Controller shall include a Multi-AP Extension subelement in the AP-Autoconfiguration WSC containing an M2 with bit 5 of the subelement value set to one. The Wi-Fi Alliance Vendor Extension attribute shall be carried in ConfigData encrypted by the KeyWrapKey in the AP-Autoconfiguration WSC message containing an M2. Table 14. Multi-AP Extension subelement Field Subelement ID Subelement Length Subelement Value Length 1 octet 1 octet bit 7 bit 6 bit 5 bit 4 bit 3 bit 2 bits 1 - 0 Value 0x06 0x01 Variable Variable Variable Variable Variable Variable Description Multi-AP Extension subelement identifier. Number of Bytes in the subelement value. Backhaul STA Backhaul BSS Fronthaul BSS Tear Down Profile-1 Backhaul STA association disallowed. Profile-2 Backhaul STA association disallowed. Reserved To facilitate one or more backhaul STAs acting as an enrollee to connect to a Multi-AP network, a Multi-AP Controller should indicate that at least one BSS on any of the Multi-AP Agent(s) is set to support Multi-AP backhaul connections. If triggered1, the Multi-AP Controller shall include a Multi-AP Extension subelement with bit 6 Backhaul BSS and/or bit 5 Fronthaul BSS set to one in the corresponding M2 in an AP-Autoconfiguration WSC message per section 17.1.3. A Multi-AP Controller shall limit the number of WSC TLVs containing M2 in the AP-Autoconfiguration WSC message to no more than the value in the Maximum number of BSS(s) supported by this radio in the AP Radio Basic Capabilities TLV. A Multi-AP Controller shall set the Radio Unique Identifier field in the AP Radio Identifier TLV in the AP-Autoconfiguration WSC message to the value of the same field specified in the AP Radio Basic Capabilities TLV in the corresponding APAutoconfiguration WSC message received from the Multi-AP Agent. If a Multi-AP Agent receives an AP-Autoconfiguration WSC message containing one or more M2, it shall validate each M2 (based on its 1905 AL MAC address) and configure a BSS on the corresponding radio for each of the M2. If the Multi-AP Agent is currently operating a BSS with operating parameters that do not completely match any of the M2 in the received AP-Autoconfiguration WSC message, it shall tear down that BSS. If a Multi-AP Agent receives an AP-Autoconfiguration WSC message containing an M2 with a Multi-AP Extension subelement with bit 4 (Tear Down bit) of the subelement value set to one (see Table 14), it shall tear down all currently operating BSS(s) on the radio indicated by the Radio Unique Identifier, and shall ignore the other attributes in the M2. If a Multi-AP Agent that implements Profile-2 receives an APAutoconfiguration WSC message for a backhaul BSS with bit 3 of the Multi-AP Extension subelement set to one, it shall configure such BSS to refuse association from backhaul STAs that would result in a Profile-1 backhaul, as per section 12. If a Multi-AP Agent that implements Profile-2 receives an AP-Autoconfiguration WSC message for a backhaul BSS with bit 2 of the Multi-AP Extension subelement set to one, it shall configure such BSS to refuse association from backhaul STAs that would result in a Profile-2 backhaul, as per section 12. If a Multi-AP Agent that implements Profile-2 receives an AP-Autoconfiguration WSC with a Traffic Separation Policy TLV with the Number of SSIDs field set to a non-zero value and the Multi-AP Agent is unable to configure one or more BSS as indicated by the M2 TLVs and by the Traffic Separation Policy TLV, the Multi-AP Agent shall tear down each of those BSS and shall send an Error Response message per section 17.1.37 containing one Profile-2 Error Code TLVs with reason code field set to 0x07 or 0x08. 1 This specification only partially defines the algorithms that govern the operation of a Multi-AP Controller. These MultiAP Controller algorithms' actions are alluded to by the wording "If triggered, a Multi-AP Controller..." in this specification. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 55 of 163 Wi-Fi EasyMeshTM Specification v3.0 If a Multi-AP Agent receives an AP-Autoconfiguration Renew message, then it shall respond within one second by sending one AP-Autoconfiguration WSC message per section 17.1.3 for each of its radios, irrespective of the value specified in the SupportedFreqBand TLV in the AP-Autoconfiguration Renew message. If a Multi-AP Agent that implements Profile-2 receives an AP-Autoconfiguration Renew message, then it shall retain all configuration and policy it has previously received in TLVs except those explicitly updated by the Autoconfig Renew procedure. Note: A Multi-AP Agent that implements Profile-2 might check that the AP-Autoconfiguration Renew message is from the Multi-AP Controller with which it previously on-boarded (for example, by comparing the ALID of the Controller for the new request against the ALID of the original Controller) and ignore the message if not. Table 15. Multi-AP Profile subelement Field Length Subelement ID 1 octet Subelement Length Subelement Value 1 octet 1 octet Value 0x07 0x01 0x00; Reserved 0x01: Multi-AP Profile-1 0x02: Multi-AP Profile-2 0x03: Multi-AP Profile-3 0x04~0xFF: Reserved Description Multi-AP Profile subelement identifier. Number of octets in the subelement value (subelement payload). Multi-AP Profile 7.2 AP operational BSS reporting A Multi-AP Agent indicates the BSS(s) it is currently operating on each of its radios in the 1905 Topology Response message. A Multi-AP device treats each BSS as an IEEE 802.11 "local interface" specified in [2]. A Multi-AP Agent shall indicate each BSS that is operating in PWR_ON or PWR_SAVE mode as a separate (802.11) Local Interface in the Device Information Type TLV in the 1905 Topology Response message. The Multi-AP Agent shall set the MAC address of the Local Interface field in the Device Information Type TLV in the 1905 Topology Response message to the BSSID. A Multi-AP Agent shall include an AP Operational BSS TLV in the 1905 Topology Response message per section 17.1.4. The Multi-AP Agent shall indicate all BSS(s) it is currently operating in PWR_ON or PWR_SAVE mode on each of its radios in the AP Operational BSS TLV in the 1905 Topology Response message. If a Multi-AP Agent that implements Profile-3 sends a 1905 Topology Response message, it shall also perform the following: · Include one BSS Configuration Report TLV in the 1905 Topology Response message · If the Multi-AP Agent configures a BSS to be a member of a Multiple BSSID set, the Multi-AP Agent shall set the Multiple BSSID Set bit of that BSSID to one in the BSS Configuration Report TLV. Otherwise, the Multi-AP Agent shall set the bit to zero. · If the Multi-AP Agent configures a BSS to be the Transmitted BSSID of a Multiple BSSID Set, the Multi-AP Agent shall set the Transmitted BSSID bit of that BSSID to one in the BSS Configuration Report TLV. Otherwise, the Multi-AP Agent shall set the bit to zero. 7.3 Policy configuration The Multi-AP Policy Config Request message enables a Multi-AP Controller to configure Multi-AP control related policies on a Multi-AP Agent. If triggered, a Multi-AP Controller shall send a Multi-AP Policy Config Request message per section 17.1.8 to a Multi-AP Agent. If a Multi-AP Agent receives a Multi-AP Policy Config Request message, then it shall respond within one second with a 1905 Ack message per section 17.1.32. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 56 of 163 Wi-Fi EasyMeshTM Specification v3.0 The Steering Policy TLV defined in section 17.2.11 contains steering related policies. The Local Steering Disallowed STA list indicates STAs that are only to be steered in response to a steering message indicating Steering Mandate from the Multi-AP Controller (see section 11.1). The BTM Steering Disallowed STA list indicates STAs that are to be steered using the Client Association Control mechanism (see section 11.6). The Steering Policy field indicates the policy for Multi-AP Agent-initiated steering on a given radio. The Channel Utilization Threshold and RCPI Steering Threshold fields indicate thresholds used in Agent-initiated steering for each radio. The Metrics Reporting Policy TLV defined in section 17.2.12 contains link metrics reporting related policies. The AP Metrics Reporting Interval field indicates if periodic AP metrics reporting is to be enabled, and if so the cadence. The STA Metrics Reporting RCPI Threshold and AP Metrics Channel Utilization Reporting Threshold fields indicate if thresholdbased metric reporting is to be enabled for STA and/or AP metrics, and if so the corresponding thresholds for each radio. The Channel Scan Reporting Policy TLV defined in section 17.2.37 identifies whether a Multi-AP Agent that implements Profile-2 is required to report the results of any Independent Channel Scan that it performs to the Multi-AP Controller. The Unsuccessful Association Policy TLV defined in section 17.2.58 contains policies related to reporting unsuccessful associations. The Report Unsuccessful Associations bit indicates whether a Multi-AP Agent that implements Profile-2 shall report unsuccessful association attempts of client STAs. The Maximum Reporting Rate value indicates the maximum rate at which the unsuccessful associations shall be reported. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 57 of 163 Wi-Fi EasyMeshTM Specification v3.0 8 Channel selection Multi-AP control messages enable the configuration of a Multi-AP Agent with parameters for channel selection. 8.1 Channel Preference Query and Report Channel Preference Query and Channel Preference Report messages enable a Multi-AP Controller to query operating channel preferences for AP radios of a Multi-AP Agent. If triggered, a Multi-AP Controller shall send a Channel Preference Query message per section 17.1.9 to a Multi-AP Agent. If a Multi-AP Agent receives a Channel Preference Query message, then it shall respond within one second with a Channel Preference Report message per section 17.1.10. The Channel Preference Report message shall contain the same MID that was received in the Channel Preference Query message. The Channel Preference Report message shall contain information regarding all the channels that a given radio of the Multi-AP Agent transmitting the report is temporarily unable to operate in, or prefers not to operate in, for each supported operating class as specified by the MultiAP Agent (per Operating Classes field in the AP Radio Basic Capabilities TLV in section 17.2.7). Additionally, the Channel Preference Report message shall contain information regarding the channel separation (if any) that a given radio of the Multi-AP Agent requires between each of its own potential operating channels and the operating channel of another radio of the Multi-AP Agent, where the two radios may have one transmitting and the other receiving or transmitting simultaneously. If a Multi-AP Agent supports 6GHz channels, the Channel Preference Report message shall provide channel preference information on 6GHz channels obtained from any applicable 6GHz channel operation regulatory restriction information (e.g., out-of-band AFC query), shall set the Preference field for the channels that are disallowed to 0000 in the Channel Preference TLV and set the Reason Code field for the channels that are disallowed to 1100 in the Channel Preference TLV. Note: Channels for which the Multi-AP Agent's radio is statically (permanently) unable to operate are reported in the AP Radio Basic Capabilities TLV. A Channel Preference Report message does not include information on operating classes that are not supported by the corresponding radio of the Multi-AP Agent per the AP Radio Basic Capabilities TLV. If a Multi-AP Controller receives a Channel Preference Report message from a Multi-AP Agent, the Multi-AP Controller shall delete all (if any) previously stored channel preference information from the Multi-AP Agent pertaining to all radios of that Multi-AP Agent and replace it with the information contained within the Channel Preference Report message. If a Channel Preference Report does not specify a preference for a particular channel within a supported operating class as specified by the Multi-AP Agent for a given radio, the Multi-AP Controller shall infer that the Multi-AP Agent is indicating the highest preference (preference score 15) for the channel in that operating class on the corresponding radio. If a Channel Preference Report contains zero Channel Preference TLVs and zero Radio Operation Restriction TLVs, the Multi-AP Controller shall infer that the Multi-AP Agent is indicating the highest preference (preference score 15) for all channels and operating classes supported by all of the Multi-AP Agent's radios. The mechanism by which a Multi-AP Agent determines and reevaluates its channel preferences is implementationspecific. However, a Multi-AP Agent shall indicate a channel is operable when indicating preferences in a Channel Preference Report with the following exceptions: · If a radio cannot operate on a channel in an operating class due to detection of radar, that channel shall be indicated as a Non-operable channel · If conditions exist whereby normal operation of a BSS by the radio on a channel would be unsuccessful (e.g. due to strong interference), the channel shall be indicated as a Non-operable channel. If a Multi-AP Agent's channel preferences change, it shall send an unsolicited Channel Preference Report to the Multi-AP Controller indicating the Multi-AP Agent's current preferences. If a Multi-AP Agent detects a change in the DFS status of any channel, it shall send an unsolicited Channel Preference Report to the Controller setting the appropriate DFS related Reason Code for the channel per Table 30 of section 17.2.13. If a Multi-AP Controller receives an unsolicited Channel Preference Report message, then it shall respond within one second with a 1905 Ack message. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 58 of 163 Wi-Fi EasyMeshTM Specification v3.0 8.2 Channel Selection Request and Report The Channel Selection Request message contains information regarding the Multi-AP Controller's preferences and restrictions for the operating classes, channels and transmit power for each radio of a Multi-AP Agent. If triggered, a Multi-AP Controller shall send a Channel Selection Request message per section 17.1.11. If a Multi-AP Controller sends a Channel Selection Request message, it shall specify an "operable" preference for at least one of the non-DFS channels that the Multi-AP Agent indicated as operable (i.e. that the Multi-AP Agent did not explicitly indicate the channel as a Non-operable channel) on each radio of the Multi-AP Agent per the most recently received Channel Preference Report message and AP Radio Basic Capabilities TLV from the Multi-AP Agent. If a Multi-AP Controller sends a Channel Selection Request message, it shall not specify preferences in which the only allowed channels for a given radio violate the radio operation restrictions indicated in the most recently received Channel Preference Report message from the Multi-AP Agent. If a Multi-AP Controller sends a Channel Selection Request message, it should specify preferences that take into account the corresponding preference values indicated by the Multi-AP Agent in the most recent Channel Preference Report message. Except where necessary for load balancing or other network management requirements, the Multi-AP Controller should refrain from indicating a preference of Non-operable channel for a channel and operating class that the Multi-AP Agent has indicated is operable on a given radio. If a Multi-AP Agent receives a Channel Selection Request message from the Multi-AP Controller, the Multi-AP Agent shall delete all (if any) previously stored channel preference information from the Multi-AP Controller pertaining to all radios of the Multi-AP Agent and replace it with the information contained within the message. A Multi-AP Agent shall store the channel preference information in non-volatile storage. If a Multi-AP Agent reboots, it may either continue to use the most recent channel preference information received from the Multi-AP Controller prior to the reboot, or it may flush any previously received channel preference information and assume all supported channels are preferred until such time that new channel preference information is received from the Multi-AP Controller. If a Channel Selection Request message does not specify a preference for a particular channel within a supported operating class as specified by the Multi-AP Agent for a given radio, the Multi-AP Agent shall infer that the Multi-AP Controller is indicating the highest preference (preference score 15) for the channel in that operating class on the corresponding radio. If a Channel Selection Request message contains zero Channel Preference TLVs, the Multi-AP Agent shall infer that the Multi-AP Controller is indicating the highest preference (preference score 15) for all channels and operating classes supported by all of the Multi-AP Agent's radios. A Multi-AP Agent shall not operate a radio on a channel and operating class for which the currently stored Multi-AP Controller preference information indicates as a Non-operable channel. If a Multi-AP Agent receives a Channel Selection Request message from the Multi-AP Controller, it shall attempt to operate each of its radios on one of the channels indicated as the highest preference for that radio per the Channel Selection Request message. If a Multi-AP Agent attempts to operate, or is already operating, a radio on a channel and that channel becomes an Inoperable channel, the Multi-AP Agent should take into account the corresponding preference values indicated in the most recently received Channel Selection Request message (if any). The exact mechanism by which the Multi-AP Agent selects the operating channel(s) and operating class(es) is implementation-specific. If a Multi-AP Agent performs Channel availability check (CAC), it should take into account the channel prioritization in the Channel Selection Request message when deciding which channels to check first. A Multi-AP Agent should operate a radio at the maximum nominal transmit power the radio is capable of operating and is allowed to operate according to applicable regulatory rules. If a Multi-AP Agent receives a Channel Selection Request message containing a Transmit Power Limit TLV, it shall limit the nominal transmit power of the corresponding radio to the value specified in the TLV. If a Multi-AP Agent receives a Channel Selection Request message, it shall within one second send a Channel Selection Response message (section 17.1.12) to the Multi-AP Controller indicating, for each radio, whether the Multi-AP Agent accepts or declines the request and, if appropriate, the reason for declining. The Channel Selection Response message shall contain the same MID that was received in the Channel Selection Request message. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 59 of 163 Wi-Fi EasyMeshTM Specification v3.0 If a Multi-AP Agent sent a Channel Selection Response message indicating acceptance of the Multi-AP Controller's request for a given radio, the Multi-AP Agent shall make any necessary adjustments to the operating channel, operating classes and transmit power of its radios and then, irrespective of whether any adjustments have been made, send an Operating Channel Report message per section 17.1.13 containing information regarding the current operating parameters for each of the Multi-AP Agent's radios. If a Multi-AP Controller receives an Operating Channel Report message, then it shall respond within one second with a 1905 Ack message. If a Multi-AP Agent changes the operating channel, operating class and/or nominal transmit power of a radio of its own accord (i.e. not in response to reception of a Channel Selection Request message), then it shall send an unsolicited Operating Channel Report message per section 17.1.13 to the Multi-AP Controller indicating the new operating parameters for the corresponding radio. Note: The operating classes specified in an Operating Channel Report TLV are equal to the values indicated in the Operating Classes field of the Supported Operating Classes element (per section 9.4.2.54 of [1]), if the Supported Operating Classes element is transmitted by the AP operating in the BSS on the corresponding radio. This includes an operating class corresponding to each channel bandwidth in which the radio is currently operating (e.g. typically 20, 40 and 80 MHz Operating Classes for a VHT80 AP). When a primary channel is used, the 20 MHz Operating Class indicates that primary channel. 8.2.1 Coordinated DFS CAC A Multi-AP network provides the ability for a Multi-AP Controller to request that Multi-AP Agents perform Channel Availability Checks (CACs), or provide their CAC status. The Multi-AP Agents report the result of the requested CACs and report their CAC status if requested. These features provide assistance in efficiently meeting the regulatory requirements in various geographies. 8.2.2 DFS CAC Scan Requirements on a Multi-AP Controller If triggered, a Multi-AP Controller shall send a CAC Request message to a Multi-AP Agent, requesting one or more CACs. The Multi-AP Controller should not send another CAC request to a given Radio Unique Identifier until the previous CAC request has completed or has been terminated. A Multi-AP Controller shall not send a CAC Request TLV of a method, operating class, or on an operating channel outside the Multi-AP Agent's most recently received CAC Capabilities TLV (see section 17.2.46). If triggered, a Multi-AP Controller shall send a CAC Termination message to a Multi-AP Agent. If a Multi-AP Controller receives a Channel Preference Report message (see section 8.1) with a CAC Status Report TLV, it may consider spectrum available in one channel/class pair to be available in all channel/class pairs that include that spectrum. If triggered, a Multi-AP Controller may send a Channel Selection Request with a Controller DFS Channel Clear Indication. 8.2.3 DFS CAC Scan Requirements on a Multi-AP Agent If a Multi-AP Agent receives a CAC Request message from a Multi-AP Controller, it shall respond within one second with a 1905.1 Ack. If a Multi-AP Agent receives a CAC Request message from a Multi-AP Controller, it may decline to perform the CAC by sending a Channel Preference Report message (see section 8.1) with a CAC Completion Report TLV with the CAC Completion Status field indicating a CAC failure. If a Multi-AP Agent receives a CAC Request message from a Multi-AP Controller, and does not decline the request, then it shall commence a CAC on the requested channel, using the requested CAC type and bandwidth, within 15 seconds. If a Multi-AP Agent receives a CAC Request message that contains more than one CAC request, and it is unable to perform them simultaneously, it may perform them sequentially, in any order it chooses. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 60 of 163 Wi-Fi EasyMeshTM Specification v3.0 If a Multi-AP Agent is performing a CAC and a Multi-AP Agent receives a CAC request for a different CAC method, bandwidth, or channel, on a given radio unique identifier, then it shall terminate any current CAC and begin a new CAC according to the new request within 15 seconds. If a Multi-AP Agent terminates an ongoing CAC due to receiving a new CAC Request, the Multi-AP Agent shall not send a Channel Preference Report message for the terminated CAC. If a Multi-AP Agent is performing a CAC and receives a CAC Termination message, it shall respond within one second with a 1905.1 ACK, terminate any ongoing CAC, and return the radio that was performing the CAC to its most recent operational configuration. The Multi-AP Agent shall not send a Channel Preference Report message for the terminated CAC. If a Multi-AP Agent performing a CAC encounters any of the following three conditions: · The full time required for the CAC has elapsed · An error occurs which prevents continuing the CAC · Radar is detected then within 15 seconds a Multi-AP Agent shall send an unsolicited Channel Preference Report, and include a CAC Completion Report TLV and a Channel Preference TLV for the radio that experienced one of the three conditions. If a Multi-AP Agent sends a Channel Preference Report with a CAC Completion Report TLV that indicates detection of radar has occurred, the Multi-AP Agent may indicate which sub-channel(s) the radar appeared in. If a Multi-AP Agent sends a CAC Channel Preference report with a CAC Completion Report TLV that indicates which subchannel(s) the radar appeared in, the report may include indications only at the lowest bandwidth classes to which the radar could be isolated. Upon completion of a requested CAC, if a CAC was a Successful CAC, the Multi-AP Agent shall follow the CAC Completion Action specified in the CAC Request. If a CAC was an Unsuccessful CAC, the Multi-AP Agent shall return the radio that was performing the CAC to its most recent operational configuration. If a Multi-AP Agent sends an unsolicited Channel Preference Report with a Reason Code "0111", this Channel Preference Report shall be sent within 15 seconds of detecting the radar or within 15 seconds of being re-connected to the network after detecting the radar. If a Multi-AP Agent sends a Channel Preference Report message for any reason, the Multi-AP Agent shall include Channel Preference TLVs for all radios in the Multi-AP Agent, and a CAC Status Report TLV. The Channel Preference TLVs and CAC Status Report TLV shall include a list of the Available Channels. The Channel Preference TLVs and CAC Status Report TLV shall also include a list of the non-occupancy channels and the Non-Occupancy Duration remaining on those channels. The Multi-AP Agent should report Non-Occupancy Channels in the lowest bandwidth class to which the radar could be isolated. The CAC status report shall include the status of any ongoing CAC for all radios within the Multi-AP Agent. If a Multi-AP Agent receives a Channel Selection Request with a Controller DFS Channel Clear Indication, it may change to that channel without performing a CAC on that channel. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 61 of 163 Wi-Fi EasyMeshTM Specification v3.0 9 Capability information reporting 9.1 AP capability AP Capability Query and AP Capability Report messages enable a Multi-AP Controller or a Multi-AP Agent to obtain the capability information of all AP radios on a Multi-AP device. If triggered, a Multi-AP Controller or a Multi-AP Agent shall send an AP Capability Query message per section 17.1.6. If a Multi-AP Agent receives an AP Capability Query message, then it shall respond within one second with an AP Capability Report message per section 17.1.7. A Multi-AP Agent shall include one AP Capability TLV in the AP Capability Report message. A Multi-AP Agent shall include one AP Radio Basic Capabilities TLV for each AP radio in the AP Capability Report message. A Multi-AP Agent that implements Profile-2 shall include one Metric Collection Interval TLV in the AP Capability Report message. If an AP radio supports 802.11 High Throughput capability, a Multi-AP Agent shall include an AP HT Capabilities TLV for that radio in the AP Capability Report message. If an AP radio supports 802.11 Very High Throughput capability, a MultiAP Agent shall include an AP VHT Capabilities TLV for that radio in the AP Capability Report message. If an AP radio supports 802.11 High Efficiency capability, a Multi-AP Agent shall include an AP HE Capabilities TLV for that radio in the AP Capability Report message. If an AP radio managed by a Multi-AP Agent is capable of multiple virtual radio operation (see Table 1), then the Multi-AP Agent shall identify each of the virtual radios separately with a unique Radio unique identifier in the capabilities TLVs and indicate capability information only pertaining to indicated virtual radio in the capabilities TLVs in the AP Capability Report message. If a Multi-AP Agent that implements Profile-2 sends an AP Capability Report message, it shall also perform the following: · Include one Channel Scan Capabilities TLV in the AP Capability Report message. Operating classes specified in this TLV shall be 20 MHz operating classes from Table E-4 of [1]. If the "On boot only" bit is set to one, the Scan Impact field shall be set to 0x00. · Include one CAC Capabilities TLV in an AP Capabilities Report message. A Multi-AP Agent may restrict its reported CAC capabilities to match the regulations of the country in which it is operating. The CAC Capabilities TLV shall include an indication of the country in which the Multi-AP Agent is operating according to the two letter codes provided in [6]. The Multi-AP Agent shall specify CAC capabilities for each Simultaneous CAC Radio in the Multi-AP Agent. · Include one Profile-2 AP Capability TLV in the AP Capability Report message. If a Multi-AP Agent that implements Profile-2 sends a Profile-2 AP Capability TLV, it shall also perform the following: · Set the Byte Counter Units field to 0x01 (KiB (kibibytes)). · Set the Max Total Number of VIDs field to 2 or greater. · If the Multi-AP Agent onboards to a Multi-AP Controller that implements Profile-1, the Multi-AP Agent shall set the Byte Counter Units field to 0x00 (bytes) and report the values of the BytesSent and BytesRecevied fields in the Associated STA Traffic Stats TLV in bytes. If a Multi-AP Agent that implements Profile-3 sends an AP Capability Report message, it shall also perform the following: · Set Service Prioritization bit of the Profile-2 AP Capability TLV to one. · Set Max Total Number Service Prioritization Rules to one. · Include one AP Wi-Fi 6 Capabilities TLV in the AP Capability Report message for each radio that supports 802.11 High Efficiency capability. · Include one Device Inventory TLV in the AP Capability Report message. The AP Capability Report message shall contain the same MID that was received in the AP Capability Query message. 9.2 Client capability Multi-AP Client Capability Query and Client Capability Report messages enable a Multi-AP Controller to obtain capability information of a client STA associated with a Multi-AP Agent. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 62 of 163 Wi-Fi EasyMeshTM Specification v3.0 If triggered, a Multi-AP Controller shall send a Client Capability Query message per section 17.1.14. If triggered and supported, a Multi-AP Agent shall send a Client Capability Query message per section 17.1.14. If a Multi-AP Agent receives a Client Capability Query message, then within one second it shall respond with a Client Capability Report message per section 17.1.15. The Client Capability Report message shall contain the same MID that was received in the Client Capability Query message. If the STA specified in the Client Capability Query message is not associated with any of the BSS operated by the Multi-AP Agent (an error scenario), the Multi-AP Agent shall set the result code in the Client Capability Report TLV to 0x01 per section 17.2.19 and include an Error Code TLV with the reason code set to 0x02 and the STA MAC address field included per section 17.2.36 in the Client Capability Report message. If the STA specified in the Client Capability Query message is associated with any of the BSS operated by the Multi-AP Agent and the Multi-AP Agent is unable to report the client's capability, the Multi-AP Agent shall set the result code in the Client Capability Report TLV to 0x01 and include an Error Code TLV with the reason code set to 0x03 in the Client Capability Report message. 9.3 Backhaul STA capability Backhaul STA Capability Query and Backhaul STA Capability Report messages enable a Multi-AP Controller to obtain the capability information of all backhaul STA radios on a Multi-AP device. If triggered, a Multi-AP Controller shall send a Backhaul STA Capability Query message per section 17.1.42. If a Multi-AP Agent receives a Backhaul STA Capability Query message, then it shall respond within one second with a Backhaul STA Capability Report message per section 17.1.43. A Multi-AP Agent shall include one Backhaul STA Radio Capabilities TLV for each Backhaul STA radio in the Backhaul STA Capability Report message. The Backhaul STA Capability Report message shall contain a MID that was indicated in a previously received Backhaul STA Capability Query message. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 63 of 163 Wi-Fi EasyMeshTM Specification v3.0 10 Link metric collection 10.1 Backhaul link metrics This section defines the protocol for a Multi-AP device to convey backhaul link metric information associated with each of the BSSs in which the Multi-AP device is operating. The 1905 link metric information dissemination protocol is used to query and report link metrics for backhaul links (e.g. link between a Multi-AP Agent AP interface and a Multi-AP Agent backhaul STA interface, or between two Multi-AP Agent Ethernet interfaces. See [2]). If triggered, a Multi-AP Controller and Multi-AP Agent shall send a 1905 Link metric query message to a Multi-AP Agent. Note: Additional clarifications with respect to fields in a 1905 Transmitter link metric TLV are as follows: · macThroughputCapacity field is the estimated MAC data rate in Mb/s for the backhaul link in the downlink direction when reported by a Multi-AP Agent that operates the AP for the link, or the estimated MAC data rate in Mb/s for the backhaul link in the uplink direction when reported by the Multi-AP Agent that operates the backhaul STA for the link, if 100% of channel air time and BSS operating bandwidth were to be available. · linkAvailability field is the predicted percentage of Air Time that the backhaul link would consume given the current channel condition, assuming sufficient BE traffic is generated over the backhaul link to the client STAs and/or other backhaul STAs associated with the downstream Multi-AP Agent to fill this Air Time. Note: Additional clarifications with respect to fields in a 1905 Receiver link metric TLV are as follows: · The RSSI field is calculated from the RCPI of a number of PPDU received when reported by a Multi-AP Agent that operates the AP for the link, or the Beacon RSSI when reported by a Multi-AP Agent that operates the backhaul STA for the link. Note: A Multi-AP Agent supporting [11] might use the transmitter and receiver Link metric TLVs as defined in [11] to report the metrics of Generic Phy non-Wi-Fi interfaces. 10.2 Per-AP metrics and bulk STA metrics This section defines the protocol for a Multi-AP Agent to convey per-AP metric information about each of the BSS (fronthaul and/or backhaul) it is operating. These metrics pertain to the BSS overall, and can also include information relating to every STA associated to the AP. For metrics relating to a single specific STA that might be associated to the BSS, see section 10.3. 10.2.1 Link metric measurements from the AP If triggered, a Multi-AP Controller shall send an AP Metrics Query message per section 17.1.16 to a Multi-AP Agent. If a Multi-AP Agent receives an AP Metrics Query message, then it shall respond within one second with an AP Metrics Response message (section 17.1.17) containing the following TLVs: · One AP Metrics TLV per section 17.2.22 for each of the BSSs specified in the query. · If the Multi-AP Agent implements Profile-2, it shall include one AP Extended Metrics TLV for each of the BSSs specified in the query. · If the Multi-AP Agent implements Profile-2, it shall include one Radio Metrics TLV for each of the radios specified in the query. The AP Metrics Response message shall contain the same MID that was received in the AP Metrics Query message. If a Multi-AP Agent receives a Metric Reporting Policy TLV with AP Metrics Reporting Interval field set to a non-zero value, it shall send an AP Metrics Response message to the Multi-AP Controller once every reporting interval specified in the field and containing the following TLVs: · One AP Metrics TLV for each BSS which it is operating. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 64 of 163 Wi-Fi EasyMeshTM Specification v3.0 · If the Multi-AP Agent implements Profile-2, it shall include one AP Extended Metrics TLV for each BSS which it is operating · If the Multi-AP Agent implements Profile-2, it shall include one Radio Metrics TLV for each radio which it is operating. If a Multi-AP Agent receives a Metric Reporting Policy TLV with AP Metrics Channel Utilization Reporting Threshold field set to a non-zero value for a given radio, it shall measure the channel utilization on that radio in each consecutive implementation-specific measurement period and, if the most recently measured channel utilization has crossed the reporting threshold in either direction (with respect to the previous measurement), it shall send an AP Metrics Response message to the Multi-AP Controller containing the following TLVs: · One AP Metrics TLV for each of the BSSs on that radio. · If the Multi-AP Agent implements Profile-2, it shall include one AP Extended Metrics TLV for each of the BSSs on that radio. · If the Multi-AP Agent implements Profile-2, it shall include one Radio Metrics TLV for that radio. If a Multi-AP Agent sends an AP Extended Metrics TLV, it shall encode the byte counters in that TLV according to the value of the Byte Counter Units field in its last sent Profile-2 AP Capability TLV (if the Multi-AP Agent implements Profile2), or in bytes if it has not sent a Profile-2 AP Capability TLV. If a Multi-AP Agent sends an AP Metrics Response message and if the most recently received (if any) Metric Reporting Policy TLV has Associated STA Traffic Stats Inclusion Policy set to one for a specified radio, the Multi-AP Agent shall also include one Associated STA Traffic Stats TLV for each STA associated to a BSS being reported on that radio unless it has sent a previous AP Metrics Response message including the corresponding STA Traffic Stats TLVs within the previous 10 seconds, in which case it may include or omit the STA Traffic Stats TLVs. If a Multi-AP Agent sends an Associated STA Traffic Stats TLV, it shall encode the byte counters in that TLV according to the value of the Byte Counter Units field in its last sent Profile-2 AP Capability TLV (if the Multi-AP Agent implements Profile-2), or in bytes if it has not sent a Profile-2 AP Capability TLV. If a Multi-AP Agent sends an AP Metrics Response message and if the most recently received (if any) Metric Reporting Policy TLV has Associated STA Link Metrics Inclusion Policy set to one for a specified radio, the Multi-AP Agent shall also include one Associated STA Link Metrics TLV and if the Multi-AP Agent implements Profile-2 one Associated STA Extended Link Metrics TLV for each STA associated to a BSS being reported on that radio. When reporting STA Traffic Stats, a Multi-AP Agent should report the most recent counter information commensurate with maintaining AP throughput performance, and shall report counter information no older than 10 seconds. If a Multi-AP Agent sends an AP Metrics Response message and if the most recently received (if any) Metric Reporting Policy TLV has Associated Wi-Fi 6 STA Status Inclusion Policy set to one for a specified radio, the Multi-AP Agent shall also include one Associated Wi-Fi 6 STA Status Report TLV for each STA associated to a BSS being reported on that radio unless it has sent a previous AP Metrics Response message including the corresponding Associated Wi-Fi 6 STA Status Report TLVs within the previous 10 seconds, in which case it may include or omit the Associated Wi-Fi 6 STA Status Report TLVs. Associated Wi-Fi 6 STA Status Report TLV includes uplink queue sizes of TIDs at a Wi-Fi 6 client that are known to its associated Multi-AP Agent. Note: The Estimated Air Time Fraction subfield in the Estimated Service Parameters Information field in an AP Metrics TLV is defined in 9.4.2.174 of [1] and represents the predicted percentage of air time that a new STA joining the BSS would be allocated for data PPDUs (transmitted downlink from the AP) carrying data of the corresponding AC for the STA. For the purpose of defining the Estimated Air Time Fraction value, it is assumed that the downlink traffic load to the hypothetical newly joining STA is sufficient to fill the estimated air time fraction. 10.2.2 Channel Scan A Multi-AP network managed by a Multi-AP Controller that implements Profile-2 provides the ability for Multi-AP Agents to perform a set of channel scans and report the results of the scans to the Multi-AP Controller. A Multi-AP Agent has the capability to perform a set of channel scans either at boot only, or upon request from the Multi-AP Controller. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 65 of 163 Wi-Fi EasyMeshTM Specification v3.0 10.2.2.1 Channel Scan Requirements on a Multi-AP Controller If triggered, a Multi-AP Controller shall send a Channel Scan Request message (see section 17.1.33) to a Multi-AP Agent. If a Multi-AP Controller sends a Channel Scan Request to a Multi-AP Agent with the Perform Fresh Scan bit set to zero, it shall set the Number of Operating Classes field for each radio listed to zero. A Multi-AP Controller shall not send a Channel Scan Request to a Multi-AP Agent that implements Profile-1. If a Multi-AP Controller receives a Channel Scan Report message, it shall respond within one second with a 1905 Ack message. 10.2.2.2 Channel Scan Requirements on a Multi-AP Agent If a Multi-AP Agent receives a Channel Scan Request message, it shall respond within one second with a 1905 Ack message. On-Boot Scan If a Multi-AP Agent sets the "On boot only" bit to 1 in its Channel Scan Capabilities TLV, it shall perform a Channel Scan at boot on each of the radio and operating class and channel combinations specified in its Channel Scan Capabilities and shall store the scan results. Requested Channel Scan - Fresh If a Multi-AP Agent has set the "On boot only" bit to 0 in its Channel Scan Capabilities TLV and receives from the Multi-AP Controller a Channel Scan Request message containing a Channel Scan Request TLV with the "Perform Fresh Scan" bit set to one and the Multi-AP Agent is currently performing a Requested Channel Scan, the MultiAP Agent should abort the current Requested Channel Scan as soon as practical and shall send to the Multi-AP Controller a Channel Scan Report Message relating to that Channel Scan before acting on the new request as described in the following paragraph. If a Multi-AP Agent that has set the "On boot only" bit to 0 in its Channel Scan Capabilities TLV receives from the Multi-AP Controller a Channel Scan Request message containing a Channel Scan Request TLV with the "Perform Fresh Scan" bit set to one and is not currently performing a Requested Channel Scan, the Multi-AP Agent shall, as soon as practical, start a sequence of Channel Scans on the requested radio and operating class and channel combinations. When finished scanning, or within 5 minutes, whichever comes sooner, the Multi-AP Agent shall send to the Multi-AP Controller a Channel Scan Report Message (see section 17.1.34) containing one Timestamp TLV (see section 17.2.41) indicating the current time and one Channel Scan Result TLV (see section 17.2.40) for each of the operating class and channel combinations listed in the Channel Scan Request TLV. Each Channel Scan Result TLV shall contain either a success Status Code and the scan result data or a non-Success Scan Status code, as defined in Table 57, indicating the reason the scan could not be completed. The Multi-AP Agent shall set the Status Code as follows: If the requested Channel Scan operating class and channel combination is in the set of operating class and channel combinations in the Multi-AP Agent's declared Channel Scan Capabilities and the Multi-AP Agent successfully completed the fresh Channel Scan, the Multi-AP Agent shall set the Status Code to 0x00 (Success). If the requested Channel Scan operating class and channel combination is not in the set of operating class and channel combinations in the Multi-AP Agent's declared Channel Scan Capabilities, the Multi-AP Agent shall set the Status Code to 0x01. If the Multi-AP Agent received the Channel Scan Request less than the Minimum Scan Interval declared in the Multi-AP Agent's Channel Scan Capabilities after the previously received Channel Scan Request, the Multi-AP Agent may set the Status Code to 0x02 and not perform the Channel Scan. If the Multi-AP Agent has not performed the Channel Scan because the radio is too busy, the Multi-AP Agent shall set the Status Code to 0x03. If the Multi-AP Agent has not been able to complete the Channel Scan in the time available, the Multi-AP Agent shall set the Status Code to 0x04. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 66 of 163 Wi-Fi EasyMeshTM Specification v3.0 If the Multi-AP Agent has aborted the Channel Scan due to receiving another Channel Scan Request, the Multi-AP Agent shall set the Status Code to 0x05. The Multi-AP Agent shall store the result of the last successful scan on each radio and operating class and channel combination. If a Multi-AP Agent has set the "On boot only" bit to 1 in its Channel Scan Capabilities TLV and receives from the Multi-AP Controller a Channel Scan Request message containing a Channel Scan Request TLV with the "Perform Fresh Scan" bit set to one, the Multi-AP Agent shall respond with a Channel Scan Report Message containing one Timestamp TLV indicating the current time and one Channel Scan Result TLV for each of the operating class and channel combinations listed in the Channel Scan Request TLV and set the Status Code to 0x06. Requested Channel Scan - Stored If a Multi-AP Agent receives a Channel Scan Request message containing a Channel Scan Request TLV with the "Perform Fresh Scan" bit set to zero, the Multi-AP Agent shall respond with a Channel Scan Report Message (see section 17.1.34) containing one Timestamp TLV (see section 17.2.41) indicating the current time and one Channel Scan Result TLV (see section 17.2.40) for each of the operating class and channel combinations for which it has stored results for each of the radios listed in the Channel Scan Request TLV, even if the Channel Scan Result is from an Independent Channel Scan and the "Report Independent Channel Scans" bit was set to zero in the most recently received Channel Scan Reporting Policy TLV. If the Multi-AP Agent has set the "On boot only" bit to 1 in its Channel Scan Capabilities TLV and has not yet completed the On-boot Scan on an operating class and channel combination listed in its Channel Scan Capabilities TLV, the Multi-AP Agent shall also include a Channel Scan Result TLV for that operating class and channel combination with the Status Code set to 0x04. Independent Channel Scan A Multi-AP Agent may perform an Independent Channel Scan. If a Multi-AP Agent performs a set of Independent Channel Scans, and the "Report Independent Channel Scans" bit was set to one in the most recently received Channel Scan Reporting Policy TLV, then the Multi-AP Agent shall report the channel scan results to the Multi-AP Controller in a Channel Scan Report message as described above in Section 10.2.2.2 for a fresh Requested Channel Scan. If a Multi-AP Agent performs a set of Independent Channel Scans, and has not received a Channel Scan Reporting Policy TLV, then the Multi-AP Agent shall not report the channel scan results to the Multi-AP Controller. If the number of neighbors detected during a channel scan would mean that the channel scan report message would not fit within one 1905.1 CMDU, the Multi-AP Agent shall split the channel scan report across multiple Channel Scan Result TLVs by splitting the information related to sets of neighbor BSSs into separate Channel Scan Result TLVs and setting the NumberofNeighbors field to the number of neighbors contained in the corresponding TLV. 10.3 Per-STA measurements This section defines the protocol for a Multi-AP Agent to convey link metric information on a per-STA basis. 10.3.1 Associated STA link measurements from the AP This subsection defines the protocol for a Multi-AP Agent to report link quality metrics for the downlink and uplink links between a Multi-AP Agent AP and an associated STA. If triggered, a Multi-AP Controller shall send an Associated STA Link Metrics Query message per section 17.1.18 to a Multi-AP Agent. If a Multi-AP Agent receives an Associated STA Link Metrics Query message, then it shall respond within one second with an Associated STA Link Metrics Response message per section 17.1.19 containing one Associated STA Link Metrics TLV and if the Multi-AP Agent implements Profile-2 one Associated STA Extended Link Metrics TLV for the specified STA. The Associated STA Link Metrics Response message shall contain the same MID that was received in the Associated STA Link Metrics Query message. If the specified STA is not associated with any of the BSS operated by the Multi-AP Agent (an error scenario), the Multi-AP shall set the Number of BSSIDs reported field in the Associated STA Link Metrics TLV to © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 67 of 163 Wi-Fi EasyMeshTM Specification v3.0 zero per section 17.2.24 and include an Error Code TLV with the reason code field set to 0x02 and the STA MAC address field included per section 17.2.36. If a Multi-AP Agent receives a Metric Reporting Policy TLV with STA Metrics Reporting RCPI Threshold field set to a nonzero value for a given radio, the Multi-AP Agent shall monitor the uplink RCPI for each STA associated to a BSS operating on that radio and, if the most recently measured uplink RCPI for a STA has crossed the STA Metrics Reporting RCPI Threshold including hysteresis margin in either direction (with respect to the previous measurement), the Multi-AP Agent shall send an Associated STA Link Metrics Response message to the Multi-AP Controller containing an Associated STA Link Metrics TLV and if the Multi-AP Agent implements Profile-2 one Associated STA Extended Link Metrics TLV corresponding to that STA. Unless STA Metrics Reporting RCPI Hysteresis Margin Override field is set to a non-zero value in the most recently received Metric Reporting Policy TLV (if any) relating to a given radio, a Multi-AP Agent should use a non-zero implementation-specific hysteresis margin that is sufficient to avoid excessive generation of Associated STA Link Metrics Response messages caused by rapid fluctuations of uplink RCPI measurements around the RCPI threshold and the Multi-AP Agent shall not use a hysteresis margin that is greater than 5 dB. If STA Metrics Reporting RCPI Hysteresis Margin Override field is set to a non-zero value in the most recently received Metric Reporting Policy TLV, a Multi-AP Agent shall use the value specified for STA Metrics Reporting RCPI Hysteresis Margin Override field as RCPI hysteresis margin when determining when to send an Associated STA Link Metrics Response message for RCPI threshold based reporting. When a Multi-AP Agent measures RCPI or SNR values for the purpose of calculating the Estimated MAC Data Rate and uplink RCPI used for STA metric reporting, these values may be averaged over time using an implementation-specific smoothing function. When a non-zero STA Metrics Reporting RCPI Threshold is configured, a Multi-AP Agent should perform sufficient smoothing of uplink RCPI measurements to avoid excessive generation of Associated STA Link Metrics Response messages caused by measurement noise. If a Multi-AP Agent sends an Associated STA Link Metrics TLV, it shall set the values of the Estimated MAC Data Rate metrics for downlink and uplink of the associated link based on the most recently measured uplink and downlink RCPI or SNR values. The Estimated MAC Data Rate metric is an estimate of the MAC layer throughput achievable on the link if 100% of channel air time and BSS operating bandwidth were to be available. The algorithm used by the Multi-AP Agent to calculate the Estimated MAC Data Rate metrics is implementation-specific. A reference method2 is defined in Annex R.7 of [1], which takes RCPI or SNR as inputs, and where with respect to Equation R-1, = × __ × 8 10.3.2 Unassociated STA RCPI measurements from the AP This subsection defines the protocol for a Multi-AP Agent to report uplink RCPI for unassociated STAs. If triggered, a Multi-AP Controller and Multi-AP Agent shall send an Unassociated STA Link Metrics Query message per section 17.1.20 to a Multi-AP Agent. A Multi-AP Controller and Multi-AP Agent shall not send an Unassociated STA Link Metrics Query message to a Multi-AP Agent that does not indicate support for Unassociated STA Link Metrics in the AP Capability TLV. If a Multi-AP Agent that indicates support for Unassociated STA Link Metrics receives an Unassociated STA Link Metrics Query message, it shall respond within one second with a 1905 Ack message and attempt to measure the uplink RCPI for the specified STAs. If any of the STAs specified in the Unassociated STA Link Metrics Query message is associated with any BSS operated by the Multi-AP Agent (an error scenario), for each of those associated STAs, the Multi-AP Agent shall include an Error Code TLV with the reason code field set to 0x01 and the STA MAC address field included per section 17.2.36 in the 1905 Ack message. A Multi-AP Agent shall attempt RCPI measurement on the current operating channel(s) of its radio(s) and, if it indicated support with the Off-Channel Unassociated STA Link Metrics bit in the AP Capability TLV, shall attempt RCPI measurement on the other channels and Operating Classes specified in the query. When a Multi-AP 2 In Equation R-2, P_adjust should take into account the expected interference caused by OBSS and other external interferers, as well as the expected inter-stream MU-MIMO interference (if applicable). "Inbound" indicates uplink direction, while "Outbound" indicates downlink direction © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 68 of 163 Wi-Fi EasyMeshTM Specification v3.0 Agent measures RCPI values for unassociated STA link metric reporting, these values may be averaged over time using an implementation-specific smoothing function. If the Multi-AP Agent has collected one or more uplink RCPI measurements, it shall send an Unassociated STA Link Metrics Response message per section 17.1.21. A Multi-AP Agent may send the uplink RCPI measurements in one or more Unassociated STA Link Metrics Response messages immediately after some of the measurements become available or may bundle into a single Unassociated STA Link Metrics Response message. If the Multi-AP Agent cannot obtain any RCPI measurements on all of the STAs specified in the Unassociated STA Link Metrics Query message after some implementation-specific timeout, the Multi-AP Agent shall set the number of STAs included field in the Unassociated STA Link Metrics Response message to zero per section 17.2.26. If a Multi-AP Controller receives an Unassociated STA Link Metrics Response message, then it shall respond within one second with a 1905 Ack message. 10.3.3 802.11 beacon measurements from the client This subsection defines the protocol to request a Multi-AP Agent to obtain 802.11 Beacon Report measurements from an associated STA and respond with the Beacon Report from that STA. The primary purpose is to obtain measurements of downlink RCPI from Beacon or Probe Response frames transmitted by the AP operating in a BSS, as the basis for steering decisions, however the mechanism can also be used to obtain Information Elements from the Beacon or Probe Response frames transmitted by the APs operating in those BSSs. If triggered, a Multi-AP Controller and Multi-AP Agent shall send a Beacon Metrics Query message per section 17.1.22 to a Multi-AP Agent. If a Multi-AP Agent receives a Beacon Metrics Query message, then it shall respond within one second with a 1905 Ack message. If the specified STA in the Beacon Metrics Query message is not associated with any of the BSS operated by the Multi-AP Agent (an error scenario), the Multi-AP Agent shall include an Error Code TLV with the reason code field set to 0x02 and the STA MAC address field included per section 17.2.36 in the 1905 Ack message. If the specified STA indicates support for 802.11 Beacon Report, the Multi-AP Agent shall perform the following: · Send an 802.11 Beacon request to the STA. · If the STA indicates support for Active and/or Passive 802.11 Beacon measurements, the Multi-AP Agent may set the Measurement Mode field in the Beacon request to Active or Passive unless an active QoS-sensitive traffic stream exists which the Multi-AP Agent expects would be unduly impacted by Active or Passive measurements, in which case Beacon Table mode may be requested. · If the value of the SSID Length field in the query is non-zero, an SSID subelement shall be included in the 802.11 Beacon request, and shall be set to the value of the SSID field in the query. Else, an SSID subelement shall not be included. · The Operating Class, Channel Number, BSSID and Reporting Detail fields in the Beacon Request shall be set to the corresponding values specified in the query · If the value of the Number of AP Channel Reports field (h) in the query is greater than zero and the value of the Channel Number field in the query is 255, then h AP Channel Report subelements shall be included in the 802.11 Beacon request, each containing the specified Operating Class and Channel List. If a Multi-AP Controller or Multi-AP Agent sends a Beacon Metrics Query message, it should aim to minimize the disruption potentially caused to the ongoing traffic of the specified STA by: · Minimizing the number of channels on which the STA is required to scan in order to make the measurements to only those channels on which BSS of interest are operating · Setting the Specify SSID field to one unless reports for BSS outside the currently associated ESS are required · Refraining from setting the Reporting Detail field to value two, and minimizing the number of Element IDs requested when Reporting Detail field is set to value one If a Multi-AP Agent receives a Beacon Report from the STA, it shall send a Beacon Metrics Response message to the Multi-AP Controller per section 17.1.23 for each Beacon Report received from the STA and include all the measurement reports contained in the Beacon Report from the STA. If a Multi-AP Controller receives a Beacon Metrics Response message, then it shall respond within one second with a 1905 Ack message. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 69 of 163 Wi-Fi EasyMeshTM Specification v3.0 Note: A Measurement Report message in a Beacon Metrics Report message contains an Actual Measurement Start Time field indicating the time at which the STA performed the measurements indicated in the report. If the STA only supports Beacon Table mode (where the STA responds with cached Beacon Report measurements), it is possible that the time of this measurement will be prior to the time the Beacon Metrics Query was received by the Multi-AP Agent. 10.4 Combined infrastructure metrics This section defines the protocol for a Multi-AP Controller to convey combined metrics regarding all the BSS and all of the backhaul links in the Multi-AP network. A Multi-AP Controller typically provides this information to Multi-AP Agents just before directing a Multi-AP Agent to perform local steering of client(s). If triggered, a Multi-AP Controller shall send a Combined Infrastructure Metrics message per section 17.1.24 to a Multi-AP Agent. If a Multi-AP Controller sends a Combined Infrastructure Metrics message, it includes the most recently received TLVs from the corresponding Multi-AP Agents in the Multi-AP network. If a Multi-AP Agent receives a Combined Infrastructure Metrics message, then it shall respond within one second with a 1905 Ack message. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 70 of 163 Wi-Fi EasyMeshTM Specification v3.0 11 Client steering Multi-AP control messages enable efficient steering of STAs between BSSs in a Multi-AP network. These control messages enable steering of client STAs which support 802.11v BSS Transition Management (BTM) as well as client STAs which do not support BTM. 11.1 Multi-AP Controller initiated steering mandate A Multi-AP Controller uses the Steering Mandate mechanism to mandate a Multi-AP Agent to attempt steering of one or more associated STAs. If triggered, a Multi-AP Controller shall send a Client Steering Request message with Request Mode bit set to one indicating a Steering Mandate to a Multi-AP Agent per section 17.1.25. If the Multi-AP Agent implements Profile-1, the Multi-AP Controller shall include a Steering Request TLV into the Client Steering Request message. If the Multi-AP Agent implements Profile-2 and all the STA(s) specified in the message are Agile Multiband capable, a Multi-AP Controller that implements Profile-2 shall include a Profile-2 Steering Request TLV into the Client Steering Request message. If the Multi-AP Agent implements Profile-2 and all the STAs to be steered in the message are Agile Multiband capable, a MultiAP Controller that implements Profile-2 shall include a Profile-2 Steering Request TLV into the Client Steering Request message. If the Multi-AP Agent implements Profile-2 and not all the STAs to be steered are Agile Multiband capable, then the Multi-AP Controller shall include a Steering Request TLV into the Client Steering Request message to steer the STAs which are not Agile Multiband capable, and a Profile-2 Steering Request TLV to steer the STAs which are Agile Multiband capable. If a Multi-AP Agent receives a Client Steering Request message with Request Mode bit set to one, then it shall respond within one second with a 1905 Ack message. If a STA specified in the Client Steering Request message is not associated with the source BSSID specified in the same message (an error scenario), for each of those unassociated STAs, the Multi-AP Agent shall include an Error Code TLV with the reason code field set to 0x02 and the STA MAC address field included per section 17.2.36 in the 1905 Ack message. If a Multi-AP Agent receives a Client Steering Request message with Request Mode bit set to one indicating a Steering Mandate, the Multi-AP Agent shall attempt to steer each STA identified in the request to the corresponding target BSS specified in the request message. If the Target BSSID specified for a STA in the Client Steering Request message is wildcard, the Multi-AP Agent shall attempt to steer the STA to the most suitable target BSS it has identified for that STA. 11.2 Multi-AP Controller initiated steering opportunity A Multi-AP Controller uses the Steering Opportunity mechanism to provide a time window for a Multi-AP Agent to steer one or more associated STAs. If triggered, a Multi-AP Controller shall send a Client Steering Request message with Request Mode bit set to zero indicating a Steering Opportunity to a Multi-AP Agent per section 17.1.25. If a Multi-AP Controller sends a Client Steering Request message with Request Mode bit set to zero indicating a Steering Opportunity to a Multi-AP Agent, it shall not send another Client Steering Request message with Request Mode bit set to zero to the same Multi-AP Agent until the length of time indicated in the Steering Opportunity Window field of the field message has expired, or the Multi-AP Controller has received a Steering Completed message (see section 17.1.28) from the Multi-AP Agent. If a Multi-AP Agent receives a Client Steering Request message with Request Mode bit set to zero, then it shall respond within one second with a 1905 Ack message. If a Multi-AP Agent receives a Client Steering Request message with Request Mode bit set to zero indicating a Steering Opportunity and all the following conditions are true, the Multi-AP Agent may attempt to steer the STA(s) identified in the request to any other BSS in the Multi-AP network that the Multi-AP Agent has identified as suitable target BSS(s): · The time delta since the message was received is less than the value of the Steering Opportunity Window field in the message · The Multi-AP Agent has not terminated the Steering Opportunity by sending a Steering Completed message · The STA's MAC address is not included in the Local Steering Disallowed STA List in the Steering Policy TLV © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 71 of 163 Wi-Fi EasyMeshTM Specification v3.0 A Multi-AP Agent's decision whether or not to steer a STA and whether to steer a STA to a target BSS identified in a Client Steering Request message that indicates a Steering Opportunity should use implementation-specific mechanisms per section 11.4. If triggered, a Multi-AP Agent shall send a Steering Completed message per section 17.1.28 to the Multi-AP Controller to terminate a Steering Opportunity. The Steering Completed message shall contain a new MID value. If a Multi-AP Controller receives a Steering Completed message, then it shall respond within one second with a 1905 Ack message. 11.3 Multi-AP Agent initiated RCPI-based steering A Multi-AP Controller sets the steering policy on a Multi-AP Agent using the Steering Policy TLV (see section 17.2.11). By default, a Multi-AP Agent shall only attempt to steer a STA per the rules in sections 11.1 and 11.2. If the Multi-AP Agent receives the Steering Policy TLV, it shall additionally follow the RCPI-based steering policy rules as follows: · If the Steering Policy field is set to 0x00 (Agent-initiated Steering Disallowed), there are no additional rules by which the Multi-AP Agent is allowed to steer a STA. · If the Steering Policy field is set to 0x01 (Agent-initiated RCPI-based Steering Mandated) and the Multi-AP Agent indicated support for Agent-Initiated RCPI-based Steering in the AP Capability TLV, the Multi-AP Agent shall additionally follow the RCPI-based steering rules per section 11.3.1. · If the Steering Policy field is set to 0x02 (Agent-initiated RCPI-based Steering Allowed), the Multi-AP Agent may additionally follow the RCPI-based steering rules per section 11.3.1. 11.3.1 RCPI-based steering rules RCPI-based steering is used to allow a Multi-AP Agent to steer an associated STA to another BSS when the RCPI of the current connection becomes low. If a Multi-AP Agent is following the RCPI-based steering rules and all of the following three conditions are true, the MultiAP Agent attempts to steer a STA to the most suitable target BSS it has identified: · The measured uplink RCPI for the STA falls below the RCPI Steering Threshold specified in the Steering Policy TLV for the corresponding radio. · The STA's MAC address is not included in the Local Steering Disallowed STA List in the Steering Policy TLV. · The Agent has identified a suitable target BSS for the STA. 11.4 Multi-AP Agent determination of target BSS A Multi-AP Agent uses implementation-specific mechanisms to determine a suitable target BSS for a STA for steering scenarios described in sections 11.1, 11.2 and 11.3. These implementation-specific mechanisms to determine a suitable target BSS might take into account the following information: · The most recently measured link metrics. · Received link metrics from a STA, other Multi-AP Agents and/or the Multi-AP Controller. · RCPI Steering Threshold and Channel Utilization Threshold specified in the most recently received Steering Policy TLV from the Multi-AP Controller. If a Multi-AP device that implements Profile-2 receives an Association Status Notification TLV with the Association Allowance status field set to 0x00 in the most recently received Association Status Notification TLV message, then the Multi-AP device shall consider the target BSSs as not suitable for client steering. 11.5 Steering mechanisms If a Multi-AP Agent attempts to steer a STA that indicates support for BSS Transition Management and the STA's MAC address is not included in the BTM Steering Disallowed STA list indicated in the most recently received Steering Policy TLV, the Multi-AP Agent shall: © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 72 of 163 Wi-Fi EasyMeshTM Specification v3.0 · Transmit a BTM Request frame to the STA including a Neighbor Report element specifying the BSSID, Operating Class and Channel Number of the identified target BSS. The Operating Class shall contain an enumerated value from Table E-4 in Annex E of [1]. If the STA is a Wi-Fi Agile Multiband capable STA, a Multi-AP Agent that implements Profile-2 shall include in the BTM Request frame: o A BSS Transition Candidate Preference subelement into the Neighbor Report element and shall set the value of the Preference field in the subelement to 255 per section 3.5.2 of [8]. o An MBO-OCE IE that contains a Transition Reason Code as specified in Table 18 of [8]. · If the steering attempt is in response to the reception of a Client Steering Request message with Request Mode bit set to one (indicating a Steering Mandate): No additional Neighbor Report elements shall be included in the BTM Request frame The Abridged bit in the BTM Request frame shall be set to the value of the BTM Abridged field in the Client Steering Request message received for the Steering Mandate The Disassociation Imminent bit in the BTM Request frame shall be set to the value of the BTM Disassociation Imminent bit in the Client Steering Request message received for the Steering Mandate. If the Disassociation Imminent bit is set to one, the Disassociation Timer field in the BTM Request frame (in TBTTs) shall be set according to the BTM Disassociation Timer field (in TUs) in the Client Steering Request message received for the Steering Mandate, else the BTM Disassociation Timer field in Client Steering Request is ignored. If the Multi-AP Agent receives a BTM Response frame in response to the BTM Request frame, it shall send a Client Steering BTM Report message per section 17.1.26 containing the BTM Response to the Multi-AP Controller. The Client Steering BTM Report message shall contain a new MID value. · If the steering attempt is in response to reception of a Multi-AP Controller initiated Steering Opportunity, the BTM Disassociation Imminent, the BTM Abridged and the BTM Disassociation Timer fields in the Client Steering Request message are ignored. If a Multi-AP Agent attempts to steer a STA that does not indicate support for BSS Transition Management or the STA's MAC address is included in the BTM Steering Disallowed STA list indicated in the most recently received Steering Policy TLV, and: · If the steering attempt is not in response to the reception of a Client Steering Request message with Request Mode bit set to one (indicating a Steering Mandate), the Multi-AP Agent may use the Client Association Control mechanism per section 11.6 to block the STA from associating to any BSS in the network other than the target BSS(s) and, · If the Multi-AP Agent has not received indication that the STA has already left the BSS, the Multi-AP Agent shall send a Disassociation frame or Deauthentication frame to the STA. If a Multi-AP Agent transmits a BTM Request frame to a STA as result of a steering attempt for a Multi-AP Controller Initiated Steering Opportunity per section 11.2 or an Agent Initiated Steering per RCPI Threshold per section 11.3, and the Multi-AP Agent subsequently identifies that the STA does not intend to leave the BSS (e.g. the STA sends a BTM Response with "Reject" status code), the Multi-AP Agent may attempt to steer the STA using the Client Association Control mechanism per section 11.6 and by sending a Disassociation frame or Deauthentication frame to the STA. If a Multi-AP Controller receives a Client Steering BTM Report message, then it shall respond within one second with a 1905 Ack message. 11.6 Client association control mechanism A Client Association Control Request message enables a Multi-AP Controller or a Multi-AP Agent to implicitly steer a STA (e.g. one that does not support/obey BTM requests) to a certain BSS by causing other BSS(s) in the Multi-AP network to block that STA. If triggered, a Multi-AP Controller or a Multi-AP Agent shall send a Client Association Control Request message to a MultiAP Agent per section 17.1.27. If a Multi-AP Agent receives a Client Association Control Request message, then it shall respond within one second with a 1905 Ack message. If any of the STAs specified in the Client Association Control message with Association Control field set to 0x00 (indicating Client Blocking) is associated with the BSSID specified in the same message (an error scenario), © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 73 of 163 Wi-Fi EasyMeshTM Specification v3.0 then for each of those associated STAs, the Multi-AP Agent shall include an Error Code TLV with the reason code field set to 0x01 and the STA MAC address field included per section 17.2.36 in the 1905 Ack message. If a Multi-AP Agent receives a Client Association Control Request message with Association Control field set to 0x00 (indicating Client Blocking) and all the following conditions are true, it shall reject a first attempt by a STA specified in the request to associate to the specified BSS operated by the Multi-AP Agent and should not respond to any Probe Request frames sent by the specified STA(s) to the specified BSS: · The time delta since the message was received is less than the value of Validity Period field in the Client Association Control Request message. · The Multi-AP Agent has not subsequently received a Client Association Control Request message with Association Control field set to 0x01 (indicating Client Unblocking) specifying the STA. Otherwise, the Multi-AP Agent shall not perform blocking of the STA. A Multi-AP Agent that implements Profile-2 shall not reject associations using other association control mechanisms, such as ACL lists or (if supported) the configuration of an RSSI threshold with the RSSI based Association Rejection feature of the Wi-Fi Optimized Connectivity program (see [9]). The Validity Period field in a Client Association Control Request message with Association Control field set to 0x01 (Client Unblocking) is ignored. Note: When a Multi-AP Agent rejects an association attempt, it does so either by sending an Authentication frame with a "Reject" status code or, if it does not reject the authentication, by sending a (Re-)Association Response frame with a "Reject" status code. If a Multi-AP Agent rejects an authentication request or (re-)association request as a result of having received a Client Association Control Request (i.e. if the Multi-AP Agent would have otherwise accepted the authentication or (re)association), it shall set the Status Code in the Authentication frame or (Re-)Association Response frame to a value that does not indicate capabilities mismatch or negotiation failure, and should set the Status Code to value 33 (denied due to insufficient bandwidth) or 34 (denied due to poor channel conditions). 11.7 Wi-Fi Agile Multiband and Tunneled Message support The fronthaul BSSs of a Multi-AP Agent shall support Wi-Fi Agile Multiband and include a Wi-Fi Agile Multiband AP Capability Indication attribute in Beacon, Probe Response, and (Re)Association Response frames as defined in [8]. If a Multi-AP Agent receives a (Re-)Association Request frame from a STA, it shall send a Tunneled message including the (Re-)Association Request frame body to the Multi-AP Controller per section 17.1.40. The Multi-AP Agent shall set the MAC address field in the Source Info TLV to be the MAC address of the STA that generated the request. If a Multi-AP Agent receives a WNM Notification Request frame from an associated STA, it shall send a Tunneled message including the WNM Notification Request frame body to the Multi-AP Controller per section 17.1.40. The Multi-AP Agent shall set the MAC address field in the Source Info TLV to be the MAC address of the associated STA that generated the request. If a Multi-AP Agent receives a BTM Query frame from an associated STA, it shall send a Tunneled message including the BTM Query frame body to the Multi-AP Controller per section 17.1.40. The Multi-AP Agent shall set the MAC address field in the Source Info TLV to be the MAC address of the associated STA that generated the query. The Multi-AP Agent shall also generate a BTM Request per section 3.5.1.2 of [8] to that STA. If a Multi-AP Agent receives an ANQP request for a Neighbor Report ANQP-element from a STA, it shall send a Tunneled message including the ANQP Request frame body to the Multi-AP Controller per section 17.1.40. The Multi-AP Agent shall set the MAC address field in the Source Info TLV to be the MAC address of the STA that generated the query. If a Multi-AP Controller receives a Tunneled message from a Multi-AP Agent, it shall respond within one second with a 1905 Ack message. If a Multi-AP Agent cannot accept new associations in a given BSS, it shall include the MBO-OCE IE with the Association Disallowed attribute (section 4.2.4 of [9]) in Beacon and Probe Response frames and send an Association Status Notification message to the Multi-AP Controller and all the other Multi-AP Agents with the Association Allowance status © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 74 of 163 Wi-Fi EasyMeshTM Specification v3.0 field set to 0x00. If the association status in the BSS changes, the Multi-AP Agent shall send a new Association Status Notification message. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 75 of 163 Wi-Fi EasyMeshTM Specification v3.0 12 Backhaul optimization In a Multi-AP network, the backhaul STA of a Multi-AP Agent connects to a BSS to access backhaul connectivity. A MultiAP Agent might have chosen from multiple candidate BSSs during onboarding and subsequently a Multi-AP Controller might want to move that Multi-AP Agent to a different BSS. If triggered, a Multi-AP Controller shall send a Backhaul Steering Request message to request the Multi-AP Agent to connect its backhaul STA to a different BSS per section 17.1.29. If a Multi-AP Agent receives a Backhaul Steering Request message, then it shall respond within one second with a 1905 Ack message to the Multi-AP Controller and attempt to (re-)associate with the target BSS specified in the message. After the Multi-AP Agent has associated with the target BSS successfully or 10 seconds has expired since the reception of the Backhaul Steering Request message, the Multi-AP Agent shall send a Backhaul Steering Response message to the MultiAP Controller per section 17.1.30. If the Multi-AP Agent successfully associated with the target BSS specified in the Backhaul Steering Request message, the Multi-AP Agent shall set the result code in the Backhaul Steering Response TLV to 0x00. If the Multi-AP Agent cannot (re-)associate with the target BSS specified in the Backhaul Steering Request message, the Multi-AP Agent shall set the result code in the Backhaul Steering Response TLV to 0x01 and include an Error Code TLV in the Backhaul Steering Response message with the reason code set to one of the 0x04, 0x05 and 0x06 per section 17.2.36. In general, when a Multi-AP Agent performs the steering requested by the Multi-AP Controller, there might be a brief user data interruption on the STAs that are associated with the Multi-AP Agent due to data path change and the duration of the steering (similar to steering by using the BSS Transition Management message on a STA). If a Multi-AP Agent's fronthaul BSS is operating on the same channel as its backhaul STA and the Multi-AP Agent receives a Backhaul Steering Request message that requires the backhaul STA to switch to a different channel, there might be connection interruption on the clients that are associated with the Multi-AP Agent's fronthaul BSS while the channel switch occurs. The Multi-AP Controller should attempt to minimize or avoid such interruption if possible in such cases (e.g. by steering the clients to another fronthaul BSS, if available, prior to triggering backhaul steering). If a Multi-AP Controller receives a Backhaul Steering Response message, then it shall respond within one second with a 1905 Ack message to the sender of the message. 12.1 Backhaul optimization by backhaul station association control A Backhaul BSS on a Multi-AP Agent that implements Profile-2 can be configured by a Multi-AP Controller to disallow association of backhaul STAs that would result in either a Profile-1 backhaul link or a Profile-2 backhaul link. A Multi-AP Controller can configure this feature when onboarding the Multi-AP Agent, by setting bits 3 and 2 to one in the Multi-AP Extension subelement in the AP-Autoconfiguration WSC message (see section 5.2) or at any point in time by setting bit 7 and 6 to one in the Backhaul BSS Configuration TLV of a Multi-AP Policy Config Request message (see section 7.3). If a Multi-AP Agent sets the Profile-2 bSTA Disallowed bit to one on the backhaul BSS, and receives an Association Request frame on that backhaul BSS from a backhaul STA that includes a Multi-AP Profile subelement indicating Multi-AP Profile-2, then the Multi-AP Agent shall reject the association request (see section 18) on that backhaul BSS. If a Multi-AP Agent sets the Profile-1 bSTA Disallowed bit to one on the backhaul BSS, and receives an Association Request frame on that backhaul BSS from a backhaul STA that does not include a Multi-AP Profile subelement, then the Multi-AP Agent shall reject the association request (see section 18) on that backhaul BSS. Note: When a Multi-AP Agent rejects an association attempt, it does so either by sending an Authentication frame with a "Reject" status code or, if it does not reject the authentication, by sending a (Re-)Association Response frame with a "Reject" status code. If a Multi-AP Agent rejects an Authentication Request or (Re-)Association Request as a result of a "Backhaul STA association disallowed" configuration and it is able to provide one or more alternative backhaul BSS, it shall set the Status Code in the Authentication frame or (Re-)Association Response frame to 82 (rejected_with_suggested_bss_transition) and append at least one Neighbor Report element indicating an alternative backhaul BSS. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 76 of 163 Wi-Fi EasyMeshTM Specification v3.0 If a Multi-AP Agent rejects an authentication request or (re-)association request as a result of a "Backhaul STA association disallowed" configuration and it is not able to provide a suggested BSS transition target, it shall set the Status Code in the corresponding Authentication frame or (Re-)Association Response frame to 12 (denied other reasons). A Multi-AP Controller that implements Profile-2 should not request a Multi-AP Agent that implements Profile-1 to associate its backhaul STA to a BSS configured as "Profile-1 Backhaul STA association disallowed". A Multi-AP Controller that implements Profile-2 should not request a Multi-AP Agent that implements Profile-2 to associate its backhaul STA to a BSS configured as "Profile-2 Backhaul STA association disallowed". © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 77 of 163 Wi-Fi EasyMeshTM Specification v3.0 13 Multi-AP messaging security This specification utilizes multiple security layers. A Multi-AP device wishing to join a network of Multi-AP devices satisfies the onboarding authentication of its network connectivity. For example, Wi-Fi connectivity uses Wi-Fi Alliance Security as per [23]. The implementation of the Multi-AP Agent AP functionality for fronthaul BSSs and backhaul BSSs shall support the "Personal" AP requirements of [23]. The implementation of the Multi-AP Agent STA functionality for backhaul STA shall support the "Personal" STA requirements of [23]. Multi-AP 1905-layer messaging is protected against out-of-network eavesdropping through utilization of encryption feature(s) of its underlying network connectivity. A Multi-AP interface is considered authenticated when the underlying networking technology encryption mode has been successfully configured. For configuration of messaging for Multi-AP Agent credentials related to a BSS, the Wi-Fi Simple Configuration V2 mechanism (see section 7.1 of [5]) is used as a further layer of protection against unauthorized access and disclosure. A Multi-AP device that implements Profile-3 can use the following security mechanisms to protect the 1905 message contents at the 1905-layer: · Messages (see section 6.3 of [2] and section 17.1) transmitted with CMDU reliable multicast transmission procedures (see section 15.1) have both the multicast and unicast transmissions of TLVs protected by a message integrity code (MIC). Unicast transmissions as part of the reliable multicast transmission procedure are not protected by TLV encryption. · Messages transmitted with CMDU neighbor multicast transmission procedures (see section 7.2 of [2]) or CMDU relayed multicast transmission procedures (see section 7.3 of [2]) have the transmission of TLVs protected by a message integrity code (MIC). · Messages transmitted with CMDU unicast transmission procedures (see section 7.4 of [2]) are protected by TLV encryption. 13.1 1905-Layer Security Capability A Multi-AP device that implements Profile-3 shall indicate its 1905-layer security capability in the 1905 Layer Security Capability TLV by setting the onboarding protocols supported field to '0x00', the supported message integrity algorithm to '0x00' and the supported encryption algorithm to '0x00'. 13.2 Message integrity code 13.2.1 Theory of Operation (Informative) When a Multi-AP device that implements Profile-3 sends a message transmitted with CMDU neighbor multicast transmission procedures (see section 7.2 of [2]), CMDU relayed multicast transmission procedures (see section 7.3 of [2] or CMDU reliable multicast transmission procedures (see section 15.1), it computes a Message Integrity Code (MIC) value over all of the enclosed TLVs and inserts the value in a MIC TLV into the message (see Figure 15). The receiver independently computes the MIC value and ignores and discards any message with a received MIC value that is different than the transmitted MIC value. A Multi-AP Controller that implements Profile-3 generates a Group Temporal Key (1905 GTK) and the associated 1905 GTK Key Id and distributes it to all the Multi-AP Agents in the network securely during onboarding and rekeying (see section 5.3.7). A Multi-AP device that implements Profile-3 uses the 1905 GTK for the MIC computation. It is assumed that any device with the 1905 GTK is a trusted Multi-AP device. To prevent replay attack, the sender uses an Integrity Transmission Counter (strictly increasing unsigned integer) in the MIC computation for all the receivers. The sender increments the counter by one whenever it sends a message. The counter value is included in the MIC TLV. The receiver maintains an Integrity Reception Counter (strictly increasing unsigned integer) for each sender. The receiver only accepts messages that carry a transmission counter value that is greater than the last received transmission counter value of a valid message from the same sender. An integrity counter © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 78 of 163 Wi-Fi EasyMeshTM Specification v3.0 of size 48-bits is used to avoid counter value wrap-around during the lifetime of the 1905 GTK (before the Multi-AP Controller rekeys the 1905 GTK). First 6-octets of the 1905 CMDU TTLLVV11 TTLLVV22 ... TTLLVVnn MIC TLVn+1 End of Msg TLV The MIC protects these parts Figure 15. 1905 Message Format for Message Integrity 13.2.2 MIC transmission requirements A Multi-AP device that implements Profile-3 shall maintain a 48-bit (strictly increasing unsigned integer) Integrity Transmission Counter for transmission of messages. If a Multi-AP device possesses a 1905 GTK and needs to construct a message to be transmitted with CMDU neighbor multicast transmission procedures (see section 7.2 of [2]), CMDU relayed multicast transmission procedures (see section 7.3 of [2] or CMDU reliable multicast transmission procedures including the unicast retransmissions (see section 15.1), the Multi-AP device shall perform the following before sending the message: · Compute a 256-bit MIC field using HMAC-SHA256 (see [16]) with the 1905 GTK as the key, and the message_array consisting of the following inputs concatenated in the order shown below: The first 6 octets of the 1905 CMDU (see Table 6-3 in [2]). The first 13 octets of the MIC TLV Value (1905 GTK Key ID field, MIC Version field, reserved bits, Integrity Transmission Counter field, and Source 1905 AL Mac Address field) (see Table 85). All of the TLVs included in the message (including the End of Message TLV), but not the MIC TLV. · Include the 1905 GTK Key Id, MIC Version field set to 0x00, Integrity Transmission Counter and the MIC in a MIC TLV (see section 17.2.68). · Include the MIC TLV in the message, immediately preceding the End of Message TLV as shown in Figure 15. · Increment the Integrity Transmission Counter by one. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 79 of 163 Wi-Fi EasyMeshTM Specification v3.0 13.2.3 MIC reception requirements If a Multi-AP Agent that implements Profile-3 receives a message that does not contain a MIC TLV from a Multi-AP Agent transmitted with: · CMDU neighbor multicast transmission procedures (see section 7.2 of [2]), · CMDU relayed multicast transmission procedures (see section 7.3 of [2], or · CMDU reliable multicast transmission procedures including the unicast retransmissions (see section 15.1) and the most recently received Agent List TLV Security field indicated the AL MAC address of the sender Multi-AP Agent has 1905 Security enabled, the Multi-AP Agent shall ignore and discard the message. A Multi-AP device that implements Profile-3 shall maintain a separate 48-bit (strictly increasing unsigned integer) Integrity Reception Counter for each Multi-AP device that implements Profile-3 identifed in the Source 1905 AL MAC Address field of received MIC TLVs. If a Multi-AP device possesses a 1905 GTK and receives a message with a MIC TLV included, the Multi-AP device shall perform the following before processing all the other TLVs in the message: · If the Integrity Transmission Counter value received in the message is not greater than the Integrity Reception Counter corresponding to the Source 1905 AL MAC Address field of the MIC TLV of the message, the Multi-AP device shall ignore and discard the message and shall not relay the message. · Compute a MIC using the same inputs described in 13.2.2 · If the computed MIC is not identical to the one included in the MIC TLV, the Multi-AP device shall ignore and discard the message. · If the computed MIC is identical to the one included in the MIC TLV, the Multi-AP device shall set the Integrity Reception Counter corresponding to the Multi-AP device corresponding to the Source 1905 AL MAC Address field in the MIC TLV to the received Integrity Transmission Counter and process the received TLV(s). 13.3 1905-layer encryption 13.3.1 Theory of Operation (informative) When a Multi-AP device that implements Profile-3 sends a message transmitted only with CMDU unicast transmission procedures (see section 7.4 of [2]), it encrypts all of the TLVs of the message (except the End of Message TLV) and encapsulates all those encrypted TLVs into an Encrypted Payload TLV (see Figure 16). If Multi-AP device succesfully decrypts the message, it will process the (now unencrypted) TLVs. Otherwise, it will ignore and discard the message. Two messages, Direct Encap DPP and 1905 Encap EAPOL, are an exception since those messages are used to establish the secure communication key material. A 1905 PTK is generated between each pair of sender and receiver of the message by performing a 1905 4-way handshake on the 1905 PMK established by the 1905 DPP procedures (see section 5.3.7.2). To prevent replay attack, the sender uses an Encryption Transmission Counter (strictly increasing unsigned integer) in the encryption computation. The sender increments the counter by one whenever it sends a message (see section 7.1 of [2]). The counter value is included in the message. The receiver maintains an Encryption Reception Counter (strictly increasing unsigned integer) for each sender. The receiver only accepts messages that carry a transmission counter value that is greater than the last received transmission counter value of a valid message. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 80 of 163 Wi-Fi EasyMeshTM Specification v3.0 Output of AES-SIV Multi-AP message Encrypted Payload TLV (Encryption info with all the TLVs that were encrypted ) SIV A TLV that was encrypted TLV1 TLV2 ... TLVn End of Msg TLV Figure 16. 1905 Message Format for Encryption 13.3.2 Encryption requirements A Multi-AP device that implements Profile-3 shall maintain a separate 48-bit (strictly increasing unsigned integer) Encryption Transmission Counter for each Multi-AP device. If a Multi-AP device needs to construct a message of type 1905 AP-Autoconfiguration Search, 1905 AP-Autoconfiguration Response, Direct Encap DPP or 1905 Encap EAPOL, it shall not perform the following encryption procedure before sending the message: If a Multi-AP device possesses the 1905 TK corresponding to the receiver of the message and needs to construct a message only transmitted with CMDU unicast transmission procedures (see section 7.4 of [2]), the Multi-AP device that implements Profile-3 shall perform the following before sending the message: · Perform the SIV-encrypt function (see section 2.6 in [15]) with the following input parameters: K = 1905 TK (256 bit) corresponding to the receiver P = all of the TLVs in the message concatenated (except the End of Message TLV) AD1 = The first six octets of the 1905 CMDU. AD2 = The Encryption Transmission Counter value at the sender from the field in Encrypted Payload TLV. AD3 = Source 1905 AL MAC Address from the field in Encrypted Payload TLV. AD4 = Destination 1905 AL MAC Address from the field in Encrypted Payload TLV. · Include the output (Z) of the SIV-encrypt function in the AES-SIV Encryption Output field of the Encrypted Payload TLV as shown in Figure 16. Note: the output (Z) produced by the SIV-encryption function is the SIV (V) concatenated with all of encrypted TLVs (C). · Replace all the unencrypted TLVs except the End of Message TLV with the Encrypted Payload TLV as shown in Figure 16. · Increment the Encryption Transmission Counter that corresponds to the destination Multi-AP device by one. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 81 of 163 Wi-Fi EasyMeshTM Specification v3.0 13.3.3 Decryption requirements If a Multi-AP Agent that implements Profile-3 receives a message of type Direct Encap DPP or 1905 Encap EAPOL and the message does not contain an Encrypted Payload TLV, the Multi-AP Agent shall process the message. If a Multi-AP Agent that implements Profile-3 receives a message from a Multi-AP device transmitted with CMDU unicast transmission procedures (see section 7.4 of [2]), and the most recently received Agent List TLV Security field indicated the AL MAC address of the sender Multi-AP Agent has 1905 Secuirty enabled, and the message does not contain an Encrypted Payload TLV, the Multi-AP Agent shall ignore and discard the message. A Multi-AP device that implements Profile-3 shall maintain a separate 48-bit (strictly increasing unsigned integer) Encryption Reception Counter and a 16-bit Decryption Failure Counter for each Multi-AP device that implements Profile-3. If a Multi-AP device possesses the 1905 TK corresponding to the sender of the message and receives a message with an Encrypted Payload TLV included, the Multi-AP device shall perform the following: · If the Encryption Transmission Counter value received in the Encrypted Payload TLV is not greater than the Encryption Reception Counter corresponding to the Source 1905 AL MAC Address field of the Encrypted Payload TLV, the Multi-AP device shall ignore and discard the entire message. · If the Destination 1905 AL MAC Address value received in the Encrypted Payload TLV is not the 1905 AL MAC Address of the receiver, the Multi-AP device shall ignore and discard the entire message. · If a Multi-AP device receives an Encrypted Payload TLV and the Multi-AP device does not have the corresponding 1905 TK for the sender, the Multi-AP device shall ignore and discard the message. · Perform the SIV-decrypt function (see section 2.7 in [15]) with the following input parameters: K = 1905 TK corresponding to the sender Z = value of the AES-SIV Encryption Output field. AD1 = The first six octets of the received 1905 CMDU. AD2 = The Encryption Transmission Counter value in the Encrypted Payload TLV. AD3 = Source 1905 AL MAC Address value in the Encrypted Payload TLV. AD4 = Destination 1905 AL MAC Address value in the Encrypted Payload TLV. · If the SIV-decrypt function output is the special symbol FAIL (indicating that the message was not successfully decrypted), the Multi-AP device shall ignore and discard the message and shall increment the Decryption Failure Counter corresponding to the Multi-AP device. · If the SIV-decrypt function output is plaintext TLVs, the Multi-AP device shall set the Encryption Reception Counter corresponding to that Source 1905 AL MAC Address to the received Encryption Transmission Counter value and process the now decrypted TLVs. · If a Decryption Failure Counter that corresponds to a Multi-AP Agent exceeds the Decryption Failure Counter threshold value in the DPP Configuration Object, the Multi-AP Agent shall send a 1905 Decryption Failure message (see section 17.1.46) to the Multi-AP Controller with the AL MAC address field in the 1905 AL MAC Address type set to the AL MAC Address of the Multi-AP device that sent the Encrypted Payload TLV. · If the Decryption Failure Counter that corresponds to the Multi-AP Controller exceeds the Decryption Failure Counter threshold value in the DPP Configuration Object, the Multi-AP Agent shall re-establish the 1905 PMK using 1905 DPP Discovery and perform the 1905 4-way handshake procedure to establish a new 1905 TK with the Multi-AP Controller and set the corresponding Multi-AP Controller specific Encryption Transmission Counter to one and the Encryption Reception Counter to zero. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 82 of 163 Wi-Fi EasyMeshTM Specification v3.0 14 Four-address MAC header format The address handling description applies immediately after a Multi-AP Agent has connected to a Multi-AP network using an onboarding method per section 5. 14.1 Wi-Fi backhaul frame and address handling If a Multi-AP device receives a Multi-AP IE from another Multi-AP device, then thereafter a Multi-AP device frame formats shall be compliant with section 9 of [1] with the following exceptions: 14.1.1 Receiver requirements If source address (SA field) has the same value as the IEEE MAC individual address of the backhaul STA (TA field), a Fronthaul AP shall support receiving both Four-Address and Three-Address MAC header format Data frames from a backhaul STA. If source address (SA field) has a different value than the IEEE MAC individual address of the backhaulSTA (TA field), a Fronthaul AP shall support receiving Four-Address header format Data frames from a backhaul STA. If destination address (DA field) has the same value as the IEEE MAC individual address of the backhaul STA (RA field), a backhaul STA shall support receiving both Four-Address and Three-Address MAC header format Data frames from a Fronthaul AP. If destination address (DA field) has a different value than the IEEE MAC individual address of the backhaul STA (RA field), a backhaul STA shall support receiving Four-Address MAC header format Data frames from a Fronthaul AP. 14.1.2 Transmitter requirements If a backhaul STA sends a Data frame to an associated Fronthaul AP with a source address (SA field) different from the IEEE MAC individual address of the backhaul STA, then the backhaul STA shall set the To DS B8 field to one and From DS B9 field to one in the MAC Frame Control field, per section 9.2.4.1 of [1]. If a backhaul STA sends a Data frame to an associated Fronthaul AP with a source address (SA field) same as the IEEE MAC individual address of the backhaul STA, then the backhaul STA shall either: · Follow the Three-Address MAC header procedures of [1], or · Set the To DS B8 field to one and From DS B9 field to one in the MAC Frame Control field, per section 9.2.4.1 of [1]. The backhaul STA shall set the RA field ("Address 1" (per Table 9-26 of [1])) in the Data frame sent over the backhaul link to the IEEE MAC individual address of the AP or group address. The backhaul STA shall set the TA field ("Address 2" (per Table 9-26 of [1])) in the Data frame sent over the backhaul link to the IEEE MAC individual address of the Backhaul STA. If a Fronthaul AP sends a Data frame to an associated backhaul STA with a destination address (DA field) different from the IEEE MAC individual address of the backhaul STA, then the Fronthaul AP shall set the To DS B8 field to one and From DS B9 field to one in the MAC Frame Control field, per section 9.2.4.1 of [1]. If a Fronthaul AP sends a Data frame to an associated backhaul STA with a destination address (DA field) same as the IEEE MAC individual address of the backhaul STA, then the Fronthaul AP shall either: · Follow the Three-Address MAC header procedures of [1], or · Set the To DS B8 field to one and From DS B9 field to one in the MAC Frame Control field, per section 9.2.4.1 of [1]. The Fronthaul AP shall set the RA field ("Address 1" (per Table 9-26 of [1])) in the Data frame sent over the backhaul link to the IEEE MAC individual address of the backhaul STA or group address. The Fronthaul AP shall set the TA field ("Address 2" (per Table 9-26 of [1])) in the Data frame sent over the backhaul link to the IEEE MAC individual address of the Fronthaul AP. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 83 of 163 Wi-Fi EasyMeshTM Specification v3.0 14.1.3 Wired backhaul frame and address handling Data frames shall be carried with Ethernet frames and handled per section 3 of [3]. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 84 of 163 Wi-Fi EasyMeshTM Specification v3.0 15 Supplemental protocol rules/procedures This section describes supplemental protocol rules/procedures (see section 7 in [2]). 15.1 CMDU reliable multicast transmission All Multi-AP control messages sent using the CMDU unicast transmission procedure rely on a paired transaction to provide reliability. Many Multi-AP control messages are request and response message pairs e.g. Client Capability Query message and Client Capability Report message. For Multi-AP control messages that are sent as unicast notifications without an expected information response, a generic 1905 Ack message is sent per section 17.1.32. The generic 1905 Ack message shall contain the same MID that was received in the Multi-AP control message that this Ack message is acknowledging. To improve reliability, if the request message and/or the response message is lost, the sender may send another request message (using a new MID value). Similarly, if the notification message and/or the 1905 Ack message is lost, the sender may send another notification message (using a new MID value). A new transmission type and the corresponding procedures are defined to increase the reliability of a message defined in [2] sent using the CMDU relayed multicast transmission procedure. Its applicability to each message is described in Table 16. Since the messages sent by the CMDU relayed multicast transmission procedure do not return an acknowledgement, in some extreme poor link condition (e.g. very high packet error probability condition) the CMDU might be lost. To increase the probability of receiving the CMDUs, a Multi-AP device sends the CMDU as relayed multicast and also sends the same CMDU (with the same MID) using the unicast procedure to other discovered Multi-AP devices. A receiver discards any duplicated received CMDU based on the MID. 15.1.1 CMDU reliable multicast transmission procedures In the CMDU reliable multicast transmission procedures, · the Multi-AP device shall transmit the CMDU as a relayed multicast transmission per section 7.3 of [2] (i.e. with the relayIndicator field in the CMDU set to one). · the Multi-AP device shall transmit the same CMDU as a unicast transmission (using the same MID but with the relayIndicator field in the CMDU set to zero) per section 7.4 of [2] to other discovered Multi-AP devices on the Multi-AP network. 15.1.2 CMDU reliable multicast reception procedures In the CMDU reliable multicast reception procedures, · the Multi-AP device shall process a received CMDU with the relayIndicator set to one per section 7.6 of [2]. · the Multi-AP device shall process a received CMDU with the relayIndicator set to zero per section 7.7 of [2]. 15.2 1905 CMDU adjustments The introduction of DPP and encryption functionality in Profile 3 might cause a single TLV to exceed 1492 octets. 1905.1 [2] has an arbitrary limit on TLV length to fit within a CMDU fragment that is relaxed in Profile-3. If a Multi-AP device that implements Profile-3 needs to construct a message only transmitted with CMDU unicast transmission procedures (see section 7.4 of [2]) to another Multi-AP device that implements Profile-3, the Multi-AP device shall interpret the second sentence of section 6.2 of [2], "If the message is too large to fit within an Ethernet frame, then multiple fragments can be created at the TLV boundaries to form multiple messages", as follows: "If the message is too large to fit within an Ethernet frame, then multiple CMDU fragments can be created." © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 85 of 163 Wi-Fi EasyMeshTM Specification v3.0 If a Multi-AP device that implements Profile-3 needs to construct a message only transmitted with CMDU unicast transmission procedures (see section 7.4 of [2]) to another Multi-AP device that implements Profile-3, the Multi-AP device shall interpret the second sentence of section 7.1.1 of [2], "Each CMDU fragment may carry a partial payload of the original CMDU, fragmented at the 1905 protocol TLV boundaries.", as follows: "Each CMDU fragment may carry a partial payload of the original CMDU, fragmented at an octet boundary." If a Multi-AP device sends a 1905 message to a Multi-AP device and needs to construct a message to be transmitted with CMDU neighbor multicast transmission procedures (see section 7.2 of [2]), CMDU relayed multicast transmission procedures (see section 7.3 of [2] or CMDU reliable multicast transmission procedures including the unicast retransmissions (see section 15.1), then the Multi-AP device shall interpret the above quoted two sentences from [2] in their original form. 15.3 Order of Processing Multi-AP Profile-3 adds new functionality such as DPP and encryption (see section 13.3) which may result in TLVs larger than 1492 octets (see section 15.2) that warrant clarification on the order of processing for transmission and reception of frames. 15.3.1 Transmission Order In preparation of sending a Multi-AP message (see section 17.1), a Multi-AP device that implements Profile-3 performs the following in order: · collects the underlying information that will be transmitted in one or more TLVs (see section 17.2) (some Profile-3 TLVs might have a length exceed 1492 octets) · if the message transmission procedures (see Table 16) use encryption, perform the encryption transmission procedures (see section 13.3.2) · if the message transmission procedures (see Table 16) use message integrity check, perform the MIC Transmission procedures and insert the MIC TLV (see section 13.2.2) · if the aggregate of TLVs exceed 1492 octets, perform CMDU fragmentation (see section 15.2 above and section 7.1.1 of [2]) 15.3.2 Reception Order Upon reception of a first CMDU of Multi-AP message (see section 17.1), a Multi-AP device that implements Profile-3 performs the following in order noting that a given step might terminate the processing and discard all of the received information: · if lastFragmentIndicator is zero, perform and complete CMDU reassembly (see section 7.1.2 of [2]) · if the source is a Multi-AP device that implements Profile-3, find the MIC TLV and perform the MIC Reception procedures (see section 13.2.3) · if any TLV is an Encryption Payload TLV, perform the decryption reception procedures (see section 13.3.3) · process the underlying information contained in the TLVs (see section 17.2) © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 86 of 163 Wi-Fi EasyMeshTM Specification v3.0 16 Higher layer data payload over 1905 Multi-AP control messages are defined to provide a generic mechanism to carry higher layer data as opaque payload over the 1905 abstraction layer. This generic mechanism can be used to transport higher layer protocol messages over 1905 on a Multi-AP device, e.g. transport higher layer messages to access and manipulate TR-181 data objects (see [4]). If triggered by an HLE, a Multi-AP Controller or a Multi-AP Agent shall send a Higher Layer Data message per section 17.1.31. A Multi-AP Controller or a Multi-AP Agent shall include a Higher Layer Data TLV received from the HLE in the Higher Layer Data message. If a Multi-AP Controller or a Multi-AP Agent receives a Higher Layer Data message, then it shall respond within one second with a 1905 Ack message per section 17.1.32. The 1905 Ack message shall contain the same MID that was received in the Higher Layer Data message. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 87 of 163 Wi-Fi EasyMeshTM Specification v3.0 17 Multi-AP control messaging Multi-AP control messages are carried using the 1905 CMDU format as defined in [2]. The 1905 CMDU header includes a Message Type field identifying the type of the message carried in the CMDU. 1905 Message Type values from the reserved space are used for Multi-AP control messages. Multi-AP specific TLVs are defined using the 1905 tlvType value range. A Multi-AP device that implements Profile-2 shall only include the End of Message TLV in the last fragment of a CMDU (when lastFragmentIndicator is set to one). 17.1 Multi-AP message format This section defines the message formats for Multi-AP control messages and those 1905 control messages defined in 1905 which are extended for Multi-AP support. The first column of Table 16 shows the Multi-AP Profile (see section 18) for which the message was originally introduced or extended from 1905. The second column of Table 16 shows the latest Multi-AP Profile for which the message was modified. Table 16. Message types Introduced in Multi-AP Profile 1 Last modified in Multi-AP Profile 1 Message type 1905 Topology Notification message Protocol STA capability Value 0x0001 1 2 1905 Topology Topology 0x0002 Query message discovery 1 3 1905 Topology STA 0x0003 Response capability message 1 2 1905 AP- AP 0x0007 Autoconfiguration configuration Search message 1 3 1905 AP- AP 0x0008 Autoconfiguration configuration Response message 1 2 1905 AP- AP 0x0009 Autoconfiguration configuration WSC message 1 1 1905 Ack 1905 CMDU 0x8000 message 1 1 AP Capability AP 0x8001 Query message capability Transmission type Reliable multicast Unicast Unicast Relayed multicast Unicast Unicast Unicast Unicast Relay indicator field See section 15.1 0 0 1 0 0 0 0 Use CMDU Reliable Multicast? Yes No No No No No No No Description A message to notify that a device's 1905 topology entries have changed. A message to query a Multi-AP Agent for its topology information. A message to carry topology information in response to a topology query. A message to search for the Controller. A message to answer to a 1905 APAutoconfiguration Search message. A message to carry a WSC registration frame. A message to acknowledge certain 1905 messages. A message to query a fronthaul © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 88 of 163 Wi-Fi EasyMeshTM Specification v3.0 Introduced in Multi-AP Profile Last modified in Multi-AP Profile Message type Protocol Value 1 3 AP Capability AP 0x8002 Report message capability 1 2 Multi-AP Policy Multi-AP 0x8003 Config Request configuration message 1 1 Channel Channel 0x8004 Preference Selection Query message 1 2 Channel Channel 0x8005 Preference Selection Report message 1 1 Channel Channel 0x8006 Selection Selection Request message 1 1 Channel Channel 0x8007 Selection Selection Response message 1 1 Operating Channel 0x8008 Channel Report Selection message 1 1 Client Capability STA 0x8009 Query message capability 1 1 Client Capability STA 0x800A Report message capability 1 2 AP Metrics Link metric 0x800B Query Message collection Transmission Relay type indicator field Unicast 0 Unicast 0 Unicast 0 Unicast 0 Unicast 0 Unicast 0 Unicast 0 Unicast 0 Unicast 0 Unicast 0 Use CMDU Reliable Multicast? Description AP's capability information. No A message to report a fronthaul AP's capability information. No A message to configure Multi- AP control related policies. No A message to query operating channel preferences for AP radios of Multi-AP Agents. No A message to report operating channel preferences for AP radios of Multi-AP Agents. No A message to send channel selection configurations for AP radios of Multi-AP Agents. No A message to report the Multi- AP Agent's response to the Channel Selection request. No A message to report the current operating channel configurations for AP radios of Multi-AP Agents. No A message to query a client's capability information. No A message to report a client's capability information. No A message to query an AP's metrics. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 89 of 163 Wi-Fi EasyMeshTM Specification v3.0 Introduced in Multi-AP Profile 1 1 Last modified in Multi-AP Profile 3 1 Message type AP Metrics Response message Associated STA Link Metrics Query message Protocol Link metric collection Link metric collection Value 0x800C 0x800D 1 2 Associated STA Link metric 0x800E Link Metrics collection Response message 1 1 Unassociated Link metric 0x800F STA Link Metrics collection Query message 1 1 Unassociated Link metric 0x8010 STA Link Metrics collection Response message 1 1 Beacon Metrics Link metric 0x8011 Query message collection 1 1 Beacon Metrics Link metric 0x8012 Response collection message 1 1 Combined Link metric 0x8013 Infrastructure collection Metrics message 1 2 Client Steering Client 0x8014 Request Steering message 1 1 Client Steering Client 0x8015 BTM Report Steering message 1 1 Client Client 0x8016 Association Steering Control Request message 1 1 Steering Client 0x8017 Completed Steering message Transmission Relay type indicator field Unicast 0 Unicast 0 Unicast 0 Unicast 0 Unicast 0 Unicast 0 Unicast 0 Unicast 0 Unicast 0 Unicast 0 Unicast 0 Unicast 0 Use CMDU Reliable Multicast? Description No A message to report an AP's metric. No A message to query an associated STA's link metrics. No A message to report an associated STA's link metrics. No A message to query an unassociated STA's link metrics. No A message to report an unassociated STA's link metrics. No A message to query the Beacon frame metrics. No A message to report the Beacon frame metrics. No A message to send combined infrastructure metrics. No A message to trigger steering for one or more STAs. No A message to provide BTM report received from a STA. No A message to enable blocking of STA(s) association on Multi-AP Agent. No A message to provide indication of termination of a Steering Opportunity © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 90 of 163 Wi-Fi EasyMeshTM Specification v3.0 Introduced in Multi-AP Profile 1 Last modified in Multi-AP Profile 1 Message type Higher Layer Data message Protocol Value Higher layer 0x8018 data payload 1 1 Backhaul Backhaul 0x8019 Steering Request optimization message 1 1 Backhaul Backhaul 0x801A Steering optimization Response message 2 2 Channel Scan Channel 0x801B Request scan message 2 2 Channel Scan Channel 0x801C Report message scan 3 3 DPP CCE DPP 0x801D Indication onboarding message 3 3 1905 Rekey Message 0x801E Request security message 3 3 1905 Decryption Message 0x801F Failure message security 2 2 CAC Request DFS CAC 0x8020 message 2 2 CAC Termination DFS CAC 0x8021 message 2 2 Client Data 0x8022 Disassociation Element Stats message 3 3 Service Service 0x8023 Prioritization Prioritization Request message 2 2 Error Response Traffic 0x8024 message Separation 2 2 Association Client 0x8025 Status steering Transmission Relay type indicator field Unicast 0 Unicast 0 Unicast 0 Unicast 0 Unicast 0 Unicast 0 Use CMDU Reliable Multicast? Description No A message to query a client's capability information. No A message to steer a backhaul STA. No A message to respond to the Backhaul Steering Request message No A message to request a channel scan. No A message to report the channel scan result. No A message to advertise CCE IE Unicast 0 Unicast 0 Unicast 0 Unicast 0 Unicast 0 Unicast 0 No A message to request the Multi- AP Agent to rekey. No A message that indicates encryption failures. No A message to request a DFS CAC. No A message to terminate a DFS CAC. No A message to report disassociated client's stats No A message to request Service Prioritization Unicast 0 Reliable 0 multicast No A message to report an error pertaining to traffic separation request. Yes A message notifying Controller that a © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 91 of 163 Wi-Fi EasyMeshTM Specification v3.0 Introduced in Multi-AP Profile Last modified in Multi-AP Profile Message type Notification message Protocol Value 2 2 Tunneled Tunnel 0x8026 message 2 2 Backhaul STA Backhaul 0x8027 Capability Query STA message capability 2 2 Backhaul STA Backhaul 0x8028 Capability Report STA message capability 3 3 Proxied Encap DPP 0x8029 DPP message onboarding 3 3 Direct Encap DPP 0x802A DPP message onboarding 3 3 Reconfiguration DPP 0x802B Trigger message onboarding 3 3 BSS DPP 0x802C Configuration onboarding Request message 3 3 BSS DPP 0x802D Configuration onboarding Response message 3 3 BSS DPP 0x802E Configuration onboarding Result message Transmission Relay type indicator field Unicast 0 Unicast 0 Unicast 0 Unicast 0 Unicast 0 Unicast 0 Unicast 0 Unicast 0 Unicast 0 Use CMDU Reliable Multicast? Description Multi-AP Agent cannot accept associations from client devices No A message relaying from Multi-AP Agent to Controller the frame body without the MAC header of an 802.11 frame received by the Multi-AP Agent from a STA. No A message to query the Backhaul STA capability of the Multi-AP Agent. No A message to respond to the Backhaul STA Capability Query message. No A message to encapsulate DPP frames. No A direct message between Multi- AP Controller and Multi-AP Agent carrying an encapsulated DPP frame No A message from Multi-AP Controller triggering Agents to request for reconfiguration No A message to request bSTA, fBSS and bBSS configuration No A message carrying bSTA, fBSS and bBSS configuration information No A message reporting © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 92 of 163 Wi-Fi EasyMeshTM Specification v3.0 Introduced in Multi-AP Profile Last modified in Multi-AP Profile Message type Protocol Value 3 3 Chirp Notification DPP 0x802F message onboarding 3 3 1905 Encap DPP 0x8030 EAPOL message onboarding 3 3 DPP DPP 0x8031 Bootstrapping onboarding URI Notification message (Reserved) 0x8032 3 3 Failed Data 0x8033 Connection Element message 3 3 Agent List DPP 0x8035 message onboarding Transmission Relay type indicator field Unicast 0 Unicast 0 Unicast 0 Use CMDU Reliable Multicast? Description configuration information No CCE enablement/ disablement in Multi-AP Agents No A message to encapsulate EAPOL frames. No A message to send the DPP bootstrapping URI information to the Multi-AP Controller. Unicast 0 Unicast 0 No A message to report failed connection. 0 A message listing all Multi- AP Agents in the network. The notation "[Profile-1]" in the messages' definition in the reminder of this section denotes TLVs that are mandatory, conditionally present or optional when the transmitter implements Profile-1, as detailed in this specification. The notation "[Profile-2]" in the messages' definition in the reminder of this section denotes TLVs that are mandatory, conditionally present or optional when the transmitter implements Profile-2, as detailed in this specification. The notation "[Profile-3]" in the messages' definition in the reminder of this section denotes TLVs that are mandatory, conditionally present or optional when the transmitter implements Profile-3, as detailed in this specification.The lack of such notation indicates TLVs that are mandatory, conditionally present or optional for any Multi-AP device. 17.1.1 1905 AP-Autoconfiguration Search message format (extended) The following TLVs shall also be included in this message, in addition to TLVs listed in [2]: · Zero or one SupportedService TLV (see section 17.2.1) [Profile-1]. · Zero or one SearchedService TLV (see section 17.2.2) [Profile-1]. · One Multi-AP Profile TLV (see section 17.2.47) [Profile-2]. · One DPP Chirp Value TLV (see section 17.2.83) [Profile-3]. 17.1.2 1905 AP-Autoconfiguration Response message format (extended) The following TLV shall also be included in this message, in addition to TLVs listed in [2] · Zero or one SupportedService TLV (see section 17.2.1) [Profile-1]. · One Device 1905 Layer Security Capability TLV (see section 17.2.67) [Profile-3]. · One Multi-AP Profile TLV (see section 17.2.47) [Profile-2]. · One DPP Chirp Value TLV (see section 17.2.83) [Profile-3]. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 93 of 163 Wi-Fi EasyMeshTM Specification v3.0 17.1.3 1905 AP-Autoconfiguration WSC message format (extended) The following TLVs shall also be included in this message: · If the message is sent by the Multi-AP Agent: One AP Radio Basic Capabilities TLV (see section 17.2.7) [Profile-1]. One WSC TLV (containing M1) [Profile-1]. One Profile-2 AP Capability TLV (see section 17.2.48) [Profile-2]. One AP Radio Advanced Capabilities TLV (see section 17.2.52) [Profile-2]. · If the message is sent by the Multi-AP Controller: One AP Radio Identifier TLV (see section 17.2.3) [Profile-1]. One or more WSC TLV (containing M2) [Profile-1]. Zero or one Default 802.1Q Settings TLV (see section 17.2.49) [Profile-2]. Zero or one Traffic Separation Policy TLV (see section 17.2.50) [Profile-2]. 17.1.4 1905 Topology Response message format (extended) The following TLV shall also be included in this message, in addition to TLVs listed [2]: · Zero or one SupportedService TLV (see section 17.2.1) [Profile-1]. · One AP Operational BSS TLV (see section 17.2.4) [Profile-1]. · Zero or one Associated Clients TLV (see section 17.2.5) [Profile-1]. · One Multi-AP Profile TLV (see section 17.2.47) [Profile-2]. · One BSS Configuration Report TLV (see section 17.2.75) [Profile-3]. 17.1.5 1905 Topology Notification message format (extended) The following TLV shall also be included in the 1905 Topology Notification message: · Zero or one Client Association Event TLV (see section 17.2.20) [Profile-1]. 17.1.6 AP Capability Query message format No TLVs are required in this message. 17.1.7 AP Capability Report message format The following TLVs shall be included in this message: · One AP Capability TLV (see section 17.2.6) [Profile-1]. · One or more AP Radio Basic Capabilities TLV (see section 17.2.7) [Profile-1]. · Zero or more AP HT Capabilities TLV (see section 17.2.8) [Profile-1]. · Zero or more AP VHT Capabilities TLV (see section 17.2.9) [Profile-1]. · Zero or more AP HE Capabilities TLV (see section 17.2.10) [Profile-1]. · Zero or more AP Wi-Fi 6 Capabilities TLV (see section 17.2.72) [Profile-3]. · One Channel Scan Capabilities TLV (see section 17.2.38) [Profile-2]. · One Device 1905 Layer Security Capability TLV (see section 17.2.67) [Profile-3]. · One CAC Capabilities TLV (see section 17.2.46) [Profile-2]. · One Profile-2 AP Capability TLV (see section 17.2.48) [Profile-2]. · One Metric Collection Interval TLV (see section 17.2.59) [Profile-2]. · One Device Inventory TLV (see section 17.2.76) [Profile-3]. 17.1.8 Multi-AP Policy Config Request message format The following TLV shall be included in this message: © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 94 of 163 Wi-Fi EasyMeshTM Specification v3.0 · Zero or one Steering Policy TLV (see section 17.2.11) [Profile-1]. · Zero or one Metric Reporting Policy TLV (see section 17.2.12) [Profile-1]. · Zero or one Default 802.1Q Settings TLV (see section 17.2.49) [Profile-2]. · Zero or one Traffic Separation Policy TLV (see section 17.2.50) [Profile-2]. · Zero or one Channel Scan Reporting Policy TLV (see section 17.2.37) [Profile-2]. · Zero or one Unsuccessful Association Policy TLV (see section 17.2.58) [Profile-2]. · Zero or more Backhaul BSS Configuration TLV (see section 17.2.66) [Profile-2]. 17.1.9 Channel Preference Query message format No TLVs are required in this message. 17.1.10 Channel Preference Report message format The following TLVs shall be included in this message: · Zero or more Channel Preference TLVs (see section 17.2.13) [Profile-1]. · Zero or more Radio Operation Restriction TLVs (see section 17.2.14) [Profile-1]. · Zero or one CAC Completion Report TLV (see section 17.2.44) [Profile-2]. · One CAC Status Report TLV (see section 17.2.45) [Profile-2]. 17.1.11 Channel Selection Request message format The following TLVs shall be included in this message: · Zero or more Channel Preference TLVs (see section 17.2.13) [Profile-1]. · Zero or more Transmit Power Limit TLVs (see section 17.2.15) [Profile-1]. 17.1.12 Channel Selection Response message format The following TLVs shall be included in this message: · One or more Channel Selection Response TLVs (see section 17.2.16) [Profile-1]. 17.1.13 Operating Channel Report message format The following TLVs shall be included in this message: · One or more Operating Channel Report TLVs (see section 17.2.17) [Profile-1]. 17.1.14 Client Capability Query message format The following TLV shall be included in this message: · One Client Info TLV (see section 17.2.18) [Profile-1]. 17.1.15 Client Capability Report message format The following TLVs shall be included in this message: · One Client Info TLV (see section 17.2.18) [Profile-1]. · One Client Capability Report TLV (see section 17.2.19) [Profile-1]. · Zero or one Error Code TLV (see section 17.2.36) [Profile-1]. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 95 of 163 Wi-Fi EasyMeshTM Specification v3.0 17.1.16 AP Metrics Query Message format The following TLVs shall be included in this message: · One AP metric query TLV (see section 17.2.21) [Profile-1]. · Zero or more AP Radio Identifier TLVs (see section 17.2.3) [Profile-2]. 17.1.17 AP Metrics Response Message format The following TLVs shall be included in this message: · One or more AP Metrics TLVs (see section 17.2.22) [Profile-1]. · One or more AP Extended Metrics TLVs (see section 17.2.61) [Profile-2]. · Zero or more Radio Metrics TLVs (see section 17.2.60) [Profile-2]. · Zero or more Associated STA Traffic Stats TLVs (see section 17.2.35) [Profile-1]. · Zero or more Associated STA Link Metrics TLVs (see section 17.2.24) [Profile-1]. · Zero or more Associated STA Extended Link Metrics TLVs (see section 17.2.62) [Profile-2]. · Zero or more Associated Wi-Fi 6 STA Status Report TLVs (see section 17.2.73) [Profile-3]. 17.1.18 Associated STA Link Metrics Query message format The following TLVs shall be included in this message: · One STA MAC Address type TLV (see section 17.2.23) [Profile-1]. 17.1.19 Associated STA Link Metrics Response message format The following TLVs shall be included in this message: · One or more Associated STA Link Metrics TLVs (see section 17.2.24) [Profile-1]. · Zero or one Error Code TLV (see section 17.2.36) [Profile-1]. · One or more Associated STA Extended Link Metrics TLVs (see section 17.2.62) [Profile-2]. 17.1.20 Unassociated STA Link Metrics Query message format The following TLVs shall be included in this message: · One Unassociated STA Link Metrics query TLV (see section 17.2.25) [Profile-1]. 17.1.21 Unassociated STA Link Metrics Response message format The following TLVs shall be included in this message: · One Unassociated STA Link Metrics response TLV (see section 17.2.26) [Profile-1]. 17.1.22 Beacon Metrics Query message format The following TLVs shall be included in this message: · One Beacon metrics query TLV (see section 17.2.27) [Profile-1]. 17.1.23 Beacon Metrics Response message format The following TLVs shall be included in this message: · One Beacon metrics response TLV (see section 17.2.28) [Profile-1]. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 96 of 163 Wi-Fi EasyMeshTM Specification v3.0 17.1.24 Combined Infrastructure Metrics message format The following TLVs shall be included in this message: · One AP Metrics TLV (see section 17.2.22) for each BSS the Controller determines to provide the AP Metrics information. · For each backhaul link (between two Multi-AP Agents) in the network: One 1905 transmitter link metric TLV (see section 6.4.11 of [2]) corresponding to the backhaul AP [Profile-1]. One 1905 transmitter link metric TLV (see section 6.4.11 of [2]) corresponding to the backhaul STA [Profile-1]. One 1905 receiver link metric TLV (see section 6.4.12 of [2]) corresponding to the backhaul AP [Profile-1]. One 1905 receiver link metric TLV (see section 6.4.12 of [2]) corresponding to the backhaul STA [Profile-1]. 17.1.25 Client Steering Request message format The following TLV shall be included in this message: · If the message is sent to a Multi-AP Agent that implements only Profile-1 or is sent from a Multi-AP device that implements Profile-1: One Steering Request TLV (see section 17.2.29) [Profile-1]. · If the message is sent to a Multi-AP Agent that implements Profile-2 from a Multi-AP device that implements only Profile-2: Zero or one Steering Request TLV (see section 17.2.29) to non-Agile Multiband capable STAs [Profile-2]. Zero or one Profile-2 Steering Request TLV (see section 17.2.57). to Agile Multiband capable STAs [Profile2]. 17.1.26 Client Steering BTM Report message format The following TLV shall be included in this message: · One Steering BTM Report TLV (see section 17.2.30) [Profile-1]. 17.1.27 Client Association Control Request message format The following TLV shall be included in this message: · One or more Client Association Control Request TLVs (see section 17.2.31) [Profile-1]. 17.1.28 Steering Completed message format No TLVs are required in this message. 17.1.29 Backhaul Steering Request message format The following TLV shall be included in this message: · One Backhaul Steering Request TLV (see section 17.2.32) [Profile-1]. 17.1.30 Backhaul Steering Response message format The following TLV shall be included in this message: · One Backhaul Steering Response TLV (see section 17.2.33) [Profile-1]. · Zero or one Error Code TLV (see section 17.2.36) [Profile-1]. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 97 of 163 Wi-Fi EasyMeshTM Specification v3.0 17.1.31 Higher Layer Data message format The following TLV shall be included in this message: · One Higher Layer Data TLV (see section 17.2.34) [Profile-1]. 17.1.32 1905 Ack message format The following TLV shall be included in this message: · Zero or more Error Code TLVs (see section 17.2.36) [Profile-1]. 17.1.33 Channel Scan Request message format The following TLV shall be included in this message: · One Channel Scan Request TLV (see section 17.2.39) [Profile-1]. 17.1.34 Channel Scan Report message format The following TLV shall be included in this message: · One Timestamp TLV (see section 17.2.41) [Profile-1]. · One or more Channel Scan Result TLVs (see section 17.2.40) [Profile-1]. 17.1.35 CAC Request message format The following TLV shall be included in this message: · One CAC Request TLV (see section 17.2.42) [Profile-1]. 17.1.36 CAC Termination message format The following TLV shall be included in this message: · One CAC Termination TLV (see section 17.2.43) [Profile-1]. 17.1.37 Error Response message format The following TLV shall be included in this message: · One or more Profile-2 Error Code TLV (see section 17.2.51) [Profile-1]. 17.1.38 Topology Query message format The following TLV shall be included in this message: · One Multi-AP Profile TLV (see section 17.2.47) [Profile-2]. 17.1.39 Association Status Notification message format The following TLVs shall be included in this message: · One Association Status Notification TLVs (see section 17.2.53) [Profile-1]. 17.1.40 Tunneled message format The following TLVs shall be included in this message: © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 98 of 163 Wi-Fi EasyMeshTM Specification v3.0 · One Source Info TLV (see section 17.2.54) [Profile-1]. · One Tunneled message type TLV (see section 17.2.55) [Profile-1]. · One or more Tunneled TLVs (see section 17.2.56) [Profile-1]. 17.1.41 Client Disassociation Stats message format The following TLVs shall be included in this message: · One STA MAC Address TLV (See section 17.2.23) [Profile-1]. · One Reason Code TLV (see section 17.2.64) [Profile-1]. · One Associated STA Traffic Stats TLV (see section 17.2.35) [Profile-1]. 17.1.42 Backhaul STA Capability Query message format No TLVs are required in this message. 17.1.43 Backhaul STA Capability Report message format The following TLVs shall be included in this message: · Zero or more Backhaul STA Radio Capabilities TLV (see section 17.2.65) [Profile-1]. 17.1.44 Failed Connection message The following TLVs shall be included in this message: · One BSSID TLV (see section 17.2.74) [Profile-3]. · One STA MAC Address Type TLV (see section 17.2.23) [Profile-1]. · One Status Code TLV (see section 17.2.63) [Profile-1]. · Zero or one Reason Code TLV (see section 17.2.64) [Profile-1]. 17.1.45 1905 Rekey Request message format No TLVs are required in this message. 17.1.46 1905 Decryption Failure message format The following TLV shall be included in this message: · One 1905.1 AL MAC address type TLV (see section 6.4.3 of [2]) [Profile-3]. 17.1.47 Service Prioritization Request message format The following TLV shall be included in this message: · Zero or more Service Prioritization Rule TLVs (see section 17.2.70) [Profile-3]. · Zero or one DSCP Mapping Table TLV (see section 17.2.71) [Profile-3]. 17.1.48 Proxied Encap DPP message format The following TLV shall be included in this message: · One 1905 Encap DPP TLV (see section 17.2.79) [Profile-3]. · Zero or One Chirp Value TLV (see section 17.2.83) [Profile-3]. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 99 of 163 Wi-Fi EasyMeshTM Specification v3.0 17.1.49 1905 Encap EAPOL message format The following TLV shall be included in this message: · One 1905 Encap EAPOL TLV (see section 17.2.80) [Profile-3]. 17.1.50 DPP Bootstrapping URI Notification message format The following TLVs shall be included in this message: · One DPP Bootstrapping URI Notification TLV (see section 17.2.81) [Profile-3]. 17.1.51 DPP CCE Indication message format The following TLV shall also be included in this message: · One DPP CCE Indication TLV (see section 17.2.82) [Profile-3]. 17.1.52 Chirp Notification message format The following TLV shall also be included in this message: · One or more DPP Chirp Value TLV (see section 17.2.83) [Profile-3]. 17.1.53 BSS Configuration Request message The following TLV shall also be included in this message: · One Multi-AP Profile TLV (see section 17.2.47) [Profile-3]. · One SupportedService TLV (see section 17.2.1). · One AKM Suite Capabilities TLV (see section 17.2.78) [Profile-3]. · One or more AP Radio Basic Capabilities TLV (see section 17.2.7). · Zero or more Backhaul STA Radio Capabilities TLV (see section 17.2.65). · One Profile-2 AP Capability TLV (see section 17.2.48). · One or more AP Radio Advanced Capabilities TLV (see section 17.2.52). · One BSS Configuration Request TLV (see section 17.2.84) [Profile-3]. 17.1.54 BSS Configuration Response message The following TLV shall also be included in this message: · One BSS Configuration Response TLV (see section 17.2.85) [Profile-3]. · Zero or one Default 802.1Q Settings TLV (see section 17.2.49). · Zero or one Traffic Separation Policy TLV (see section 17.2.50). 17.1.55 BSS Configuration Result message The following TLV shall also be included in this message: · One BSS Configuration Report TLV (see section 17.2.75) [Profile-3]. 17.1.56 Direct Encap DPP message The following TLV shall also be included in this message: · One DPP Message TLV (see section 17.2.86) [Profile-3]. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 100 of 163 Wi-Fi EasyMeshTM Specification v3.0 17.1.57 Reconfiguration Trigger message · No TLVs are required in this message. 17.1.58 Agent List message The following TLV shall also be included in this message: · Agent List TLV (see section 17.2.77) [Profile-3]. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 101 of 163 Wi-Fi EasyMeshTM Specification v3.0 17.2 Multi-AP TLVs format This section defines the format for the Multi-AP specific TLVs. Starting with Profile-3 TLVs, the Field name has been moved to the first column of each table. Summary of TLVs is contained in Table 17. Table 17. Table of TLVs Introduced in Multi-AP Profile 1 TLV Name SupportedService TLV 1 SearchedService TLV 1 AP Radio Identifier TLV 1 AP Operational BSS TLV 1 Associated Clients TLV 1 AP Radio Basic Capabilities TLV 1 AP HT Capabilities TLV 1 AP VHT Capabilities TLV 1 AP HE Capabilities TLV 1 Steering Policy TLV 1 Metric Reporting Policy TLV 1 Channel Preference TLV 1 Radio Operation Restriction TLV 1 Transmit Power TLV 1 Channel Selection Response TLV 1 Operating Channel TLV 1 Client info TLV 1 Client capability report TLV 1 Client Association Event TLV 1 AP metrics query TLV 1 AP metrics TLV 1 STA MAC Address Type TLV 1 Associated STA Link metrics TLV 1 Unassociated STA link metrics query TLV 1 Unassociated STA link metrics response TLV 1 Beacon Metrics Query TLV 1 Beacon Metrics Response TLV 1 Steering Request TLV 1 Steering BTM Report TLV 1 Client Association Control Request TLV 1 Backhaul Steering Request TLV 1 Backhaul Steering Response TLV Value 0x80 0x81 0x82 0x83 0x84 0x85 0x86 0x87 0x88 0x89 0x8A 0x8B 0x8C 0x8D 0x8E 0x8F 0x90 0x91 0x92 0x93 0x94 0x95 0x96 0x97 0x98 0x99 0x9A 0x9B 0x9C 0x9D 0x9E 0x9F © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 102 of 163 Wi-Fi EasyMeshTM Specification v3.0 Introduced in Multi-AP Profile 1 TLV Name Higher layer data TLV 1 AP Capability TLV 1 Associated STA Traffic Stats TLV 1 Error Code TLV 2 Channel Scan Reporting Policy TLV 2 Channel Scan Capabilities TLV 2 Channel Scan Request TLV 2 Channel Scan Result TLV 2 Timestamp TLV 3 1905 Layer Security Capability TLV 3 AP Wi-Fi 6 Capabilities TLV 3 MIC TLV 3 Encrypted Payload TLV 2 CAC Request TLV 2 CAC Termination TLV 2 CAC Completion Report TLV 3 Associated Wi-Fi 6 STA Status Report TLV 2 CAC Status Report TLV 2 CAC Capabilities TLV 2 Multi-AP Profile TLV 2 Profile-2 AP Capability TLV 2 Default 802.1Q Settings TLV 2 Traffic Separation Policy TLV 3 BSS Configuration Report TLV 3 BSSID TLV 3 Service Prioritization Rule TLV 3 DSCP Mapping Table TLV 3 BSS Configuration Request TLV 2 Profile-2 Error code TLV 3 BSS Configuration Response TLV 2 AP Radio Advanced Capabilities TLV 2 Association Status Notification TLV 2 Source Info TLV 2 Tunneled message type TLV 2 Tunneled TLV 2 Profile-2 Steering Request TLV Value 0xA0 0xA1 0xA2 0xA3 0xA4 0xA5 0xA6 0xA7 0xA8 0xA9 0xAA 0xAB 0xAC 0xAD 0xAE 0xAF 0xB0 0xB1 0xB2 0xB3 0xB4 0xB5 0xB6 0xB7 0xB8 0xB9 0xBA 0xBB 0xBC 0xBD 0xBE 0xBF 0xC0 0xC1 0xC2 0xC3 © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 103 of 163 Wi-Fi EasyMeshTM Specification v3.0 Introduced in Multi-AP Profile 2 TLV Name Unsuccessful Association Policy TLV 2 Metric Collection Interval TLV 2 Radio Metrics TLV 2 AP Extended Metrics TLV 2 Associated STA Extended Link Metrics TLV 2 Status Code TLV 2 Reason Code TLV 2 Backhaul STA Radio Capabilities TLV 3 AKM Suite Capabilities TLV 3 1905 Encap DPP TLV 3 1905 Encap EAPOL TLV 3 DPP Bootstrapping URI Notification TLV 2 Backhaul BSS Configuration TLV 3 DPP Message TLV 3 DPP CCE Indication TLV 3 DPP Chirp Value TLV 3 Device Inventory TLV 3 Agent List TLV Value 0xC4 0xC5 0xC6 0xC7 0xC8 0xC9 0xCA 0xCB 0xCC 0xCD 0xCE 0xCF 0xD0 0xD1 0xD2 0xD3 0xD4 0xD5 17.2.1 SupportedService TLV format Table 18 provides the definition for the SupportedService TLV. Table 18. SupportedService TLV format Field tlvType tlvLength tlvValue Length Value 1 octet 0x80 2 octets Variable 1 octet k 1 octet 0x00: Multi-AP Controller 0x01: Multi-AP Agent 0x02 0xFF: Reserved The above field is repeated k 1 times. Description Supported service information TLV. Number of octets in ensuing field. List of supported service(s). Supported service. 17.2.2 SearchedService TLV format Table 19 provides the definition for the SearchedService TLV. Table 19. SearchedService TLV format Field tlvType Length 1 octet Value 0x81 Description Searched service information TLV. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 104 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field tlvLength tlvValue Length Value 2 octets variable 1 octet k 1 octet 0x00: Multi-AP Controller 0x01 0xFF: Reserved The above field is repeated k 1 times. Description Number of octets in ensuing field. List of searched service(s). Searched service. 17.2.3 AP Radio Identifier TLV format Table 20 provides the definition for the AP Radio Identifier TLV. Table 20. AP Radio Identifier TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets Value 0x82 6 Variable Description AP Radio Identifier TLV. Number of octets in ensuing field. Radio Unique Identifier of a radio of the Multi-AP Agent. 17.2.4 AP Operational BSS TLV format Table 21 provides the definition for the AP Operational BSS TLV. Table 21. AP Operational BSS TLV format Field tlvType tlvLength tlvValue Length Value Description 1 octet 0x83 AP Operational BSS TLV. 2 octets Variable Number of octets in ensuing field. 1 octet k Number of radios reported. 6 octets Variable Radio Unique Identifier of a radio. 1 octet m Number of BSS (802.11 Local interfaces) currently operating on the radio. 6 octets Variable MAC Address of Local Interface (equal to BSSID) operating on the radio. 1 octet n SSID length. n octets Variable SSID The above 3 fields are repeated m 1 times (if m = 0, these fields are omitted). The above 5 fields are repeated k 1 times. 17.2.5 Associated Clients TLV format Table 22 provides the definition for the Associated Clients TLV. Table 22. Associated Clients TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 1 octet Value 0x84 Variable k Description Associated Clients TLV. Number of octets in ensuing field. Number of BSSs included in this TLV. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 105 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field Length Value Description 6 octets 2 octets Any EUI-48 value m The BSSID of the BSS operated by the Multi-AP Agent in which the client is associated. Number of clients associated to the BSS. 6 octets Any EUI-48 value The MAC address of the associated 802.11 client. 2 octets 0x0000 0xFFFE: 0 - 65,534 Time since the 802.11 client's last association to this Multi-AP device in 0xFFFF: 65,535 or higher seconds. The above 2 fields are repeated m 1 times (if m = 0, these fields are omitted). The above 4 fields are repeated k 1 times. 17.2.6 AP Capability TLV format Table 23 provides the definition for the AP Capability TLV. Table 23. AP Capability TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets bit 7 bit 6 bit 5 bits 4-0 Value 0xA1 1 0: Not supported 1: Supported 0: Not supported 1: Supported 0: Not supported 1: Supported Description AP Capability TLV. Number of octets in ensuing field. Support Unassociated STA Link Metrics reporting on the channels its BSSs are currently operating on. Support Unassociated STA Link Metrics reporting on channels its BSSs are not currently operating on. Support Agent-initiated RCPI-based Steering. Reserved 17.2.7 AP Radio Basic Capabilities TLV format Table 24 provides the definition for the AP Radio Basic Capabilities TLV. Table 24. AP Radio Basic Capabilities TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets 1 octet 1 octet 1 octet 1 octet Value 0x85 Variable Variable Variable (non-zero) k Variable Variable Description AP Radio Basic Capabilities TLV. Number of octets in ensuing field. Radio unique identifier of the radio for which capabilities are reported. Maximum number of BSSs supported by this radio. Number of operating classes supported for the radio, defined per Table E4 in [1]. All the supported operating classes are reported per regulatory restrictions. Operating class per Table E-4 in [1], that this radio is capable of operating on. Maximum transmit power EIRP that this radio is capable of transmitting in the current regulatory domain for the operating class. The field is coded as a 2's complement signed integer in units of decibels relative to 1 mW (dBm). © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 106 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field Length Value Description 1 octet m Number of statically Non-operable channels in the operating class. Other channels from this operating class which are not listed here are supported for the radio. 1 octet Variable Channel number of a channel which is statically a Non-operable channel in the operating class (i.e. the radio is never able to operate on this channel). This field is not present if m = 0. The above field is repeated m 1 times (if m = 0, these fields are omitted). The above 4 fields are repeated k 1 times. 17.2.8 AP HT Capabilities TLV format Table 25 provides the definition for the AP HT Capabilities TLV. Table 25. AP HT Capabilities TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets bits 7-6 bits 5-4 bit 3 bit 2 bit 1 bit 0 Value 0x86 7 Any EUI-48 value 00: 1 Tx spatial stream 01: 2 Tx spatial stream 10: 3 Tx spatial stream 11: 4 Tx spatial stream 00: 1 Rx spatial stream 01: 2 Rx spatial stream 10: 3 Rx spatial stream 11: 4 Rx spatial stream 0: Not supported 1: Supported 0: Not supported 1: Supported 0: Not supported 1: Supported Description AP HT Capabilities TLV. Number of octets in ensuing field. Radio unique identifier of the radio for which HT capabilities are reported. Maximum number of supported Tx spatial streams. Maximum number of supported Rx spatial streams. Short GI Support for 20 MHz. Short GI Support for 40 MHz. HT support for 40 MHz. Reserved. 17.2.9 AP VHT Capabilities TLV format Table 26 provides the definition for the AP VHT Capabilities TLV. Table 26. AP VHT Capabilities TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets Value 0x87 12 Any EUI-48 value Description AP VHT Capabilities TLV. Number of octets in ensuing field. Radio unique identifier of the radio for which VHT capabilities are reported. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 107 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field Length 2 octets 2 octets bits 7-5 bits 4-2 bit 1 bit 0 bit 7 bit 6 bit 5 bit 4 bits 3-0 Value Variable Variable 000: 1 Tx spatial stream 001: 2 Tx spatial stream 010: 3 Tx spatial stream 011: 4 Tx spatial stream 100: 5 Tx spatial stream 101: 6 Tx spatial stream 110: 7 Tx spatial stream 111: 8 Tx spatial stream 000: 1 Rx spatial stream 001: 2 Rx spatial stream 010: 3 Rx spatial stream 011: 4 Rx spatial stream 100: 5 Rx spatial stream 101: 6 Rx spatial stream 110: 7 Rx spatial stream 111: 8 Rx spatial stream 0: Not supported 1: Supported 0: Not supported 1: Supported 0: Not supported 1: Supported 0: Not supported 1: Supported 0: Not supported 1: Supported 0: Not supported 1: Supported Description Supported VHT Tx MCS. Supported set of VHT MCSs that can be transmitted. Set to Tx VHT MCS Map field per Figure 9-562 in [1] reordered from the underlying referenced standard into big-endian order. Supported VHT Rx MCS. Supported set of VHT MCSs that can be received. Set to Rx VHT MCS Map field per Figure 9-562 in [1] reordered from the underlying referenced standard into big-endian order. Maximum number of supported Tx spatial streams. Maximum number of supported Rx spatial streams. Short GI support for 80 MHz. Short GI support for 160 MHz and 80+80 MHz. VHT support for 80+80 MHz. VHT support for 160 MHz. SU beamformer capable. MU beamformer capable. Reserved. 17.2.10 AP HE Capabilities TLV format Table 27 provides the definition for the AP HE Capabilities TLV. Table 27. AP HE Capabilities TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets Value 0x88 Variable Any EUI-48 value Description AP HE Capabilities TLV. Number of octets in ensuing field. Radio unique identifier of the radio for which HE capabilities are reported. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 108 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field Length 1 octet k octets bits 7-5 bits 4-2 bit 1 bit 0 bit 7 bit 6 bit 5 bit 4 bit 3 bit 2 bit 1 bit 0 Value k Variable 000: 1 Tx spatial stream 001: 2 Tx spatial stream 010: 3 Tx spatial stream 011: 4 Tx spatial stream 100: 5 Tx spatial stream 101: 6 Tx spatial stream 110: 7 Tx spatial stream 111: 8 Tx spatial stream 000: 1 Rx spatial stream 001: 2 Rx spatial stream 010: 3 Rx spatial stream 011: 4 Rx spatial stream 100: 5 Rx spatial stream 101: 6 Rx spatial stream 110: 7 Rx spatial stream 111: 8 Rx spatial stream 0: Not supported 1: Supported 0: Not supported 1: Supported 0: Not supported 1: Supported 0: Not supported 1: Supported 0: Not supported 1: Supported 0: Not supported 1: Supported 0: Not supported 1: Supported 0: Not supported 1: Supported 0: Not supported 1: Supported Description Length of supported HE MCS field. Supported HE MCS indicating set of supported HE Tx and Rx MCS. Set to Tx Rx HE MCS Support field from 802.11ax spec reordered from the underlying referenced standard into big-endian order. Variable length from 4-12 bytes. Maximum number of supported Tx spatial streams. Maximum number of supported Rx spatial streams. HE support for 80+80 MHz. HE support for 160 MHz. SU beamformer capable. MU beamformer capable. UL MU-MIMO capable. UL MU-MIMO + OFDMA capable. DL MU-MIMO + OFDMA capable. UL OFDMA capable. DL OFDMA capable. Reserved. 17.2.11 Steering Policy TLV format Table 28 provides the definition for the Steering Policy TLV. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 109 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field tlvType tlvLength tlvValue Table 28. Steering Policy TLV format Length Value Description 1 octet 0x89 Steering Policy TLV. 2 octets variable Number of octets in ensuing field. 1 octet h 6 octets Any EUI-48 value The above field is repeated h 1 times. Local Steering Disallowed STA count Number of STA MAC addresses for which local steering is disallowed. STA MAC address for which local steering is disallowed. Not included if previous field is set to zero. 1 octet k 6 octets Any EUI-48 value The above field is repeated k 1 times. BTM Steering Disallowed STA count. Number of STA MAC addresses for which BTM steering is disallowed. STA MAC address for which BTM steering is disallowed. Not included if previous field is set to zero. 1 octet m Number of radios for which control policy is being indicated. 6 octets Any EUI-48 value 1 octet 1 octet 0x00: Agent Initiated Steering Disallowed 0x01: Agent Initiated RCPIbased Steering Mandated 0x02: Agent Initiated RCPIbased Steering Allowed 0x03 0xFF: Reserved variable 1 octet Variable 0 220: RCPI threshold (encoded per Table 9-154 of [1]). 221 255: Reserved The above 4 fields are repeated for m 1 times. Radio unique identifier of an AP radio for which Multi-AP control policies are being provided. Steering Policy. Channel Utilization Threshold (defined per BSS Load element section 9.4.2.28 of [1]). RCPI Steering Threshold. 17.2.12 Metric Reporting Policy TLV format Table 29 provides the definition for the Metric Reporting Policy TLV. Table 29. Metric Reporting Policy TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 1 octet 1 octet Value Description 0x8A Metric Reporting Policy TLV. Variable Number of octets in ensuing field. Variable 0: Do not report AP Metrics periodically 1 255: AP Metrics reporting interval in seconds k AP Metrics Reporting Interval in seconds. Number of radios. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 110 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field Length Value Description 6 octets Variable Radio Unique Identifier. 1 octet 1 octet 1 octet bit 7 bit 6 bit 5 bits 4-0 Variable 0: Do not report STA Metrics based on RCPI threshold. 1 220: RCPI threshold (encoded per Table 9-154 of [1]). 221 255: Reserved. 0: Use Agent's implementation-specific default RCPI Hysteresis margin. >0: RCPI hysteresis margin value Unsigned integer 0: Do not report AP Metrics based on Channel utilization threshold. >0: AP Metrics Channel Utilization Reporting Threshold (similar to channel utilization measurement in 9.4.2.28 of [1]). 0: Do not include Associated STA Traffic Stats TLV in AP Metrics Response 1: Include Associated STA Traffic Stats TLV in AP Metrics Response 0: Do not include Associated STA Link Metrics TLV in AP Metrics Response 1: Include Associated STA Link Metrics TLV in AP Metrics Response 0: Do not include Associated Wi-Fi 6 STA Status Report TLV in AP Metrics Response 1: Include Associated Wi-Fi 6 STA Status Report TLV in AP Metrics Response STA Metrics Reporting RCPI Threshold. STA Metrics Reporting RCPI Hysteresis Margin Override. This field is coded as an unsigned integer in units of decibels (dB). Note: Setting this field to a non-zero value may cause suboptimal performance. AP Metrics Channel Utilization Reporting Threshold. Associated STA Traffic Stats Inclusion Policy. Note: Inclusion of STA Traffic Stats TLV(s) in STA Metrics Response messages may significantly impact the throughput performance of the corresponding radio. Associated STA Link Metrics Inclusion Policy. Inclusion policy of Associated Wi-Fi 6 STA Status Report TLV (see 17.2.73) Reserved. The above 7 fields are repeated k 1 times. 17.2.13 Channel Preference TLV format Table 30 provides the definition for the Channel Preference TLV. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 111 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets 1 octet 1 octet 1 octet k octets bits 7-4 Table 30. Channel Preference TLV format Value 0x8B Variable Variable m Variable k Variable 0000: Non-operable channel 0001-1110: Operable with preference score 1 - 14 (where 1 is least preferred) 1111: Reserved Note: the "most preferred" score 15 is inferred for all channels / operating classes that are not specified in the corresponding message. Description Channel Preference TLV. Number of octets in ensuing field. Radio Unique identifier of a radio for which channel preferences are reported. Number of operating classes for which preferences are reported in this TLV. Operating Class contains an enumerated value from Table E-4 in Annex E of [1], specifying the global operating class in which the subsequent Channel List is valid. Number of channels specified in the Channel List. Channel List. Contains a variable number of octets. Each octet describes a single channel number in the Operating Class. An empty Channel List field (k=0) indicates that the indicated Preference applies to all channels in the Operating Class. Preference. Indicates a preference value for the channels in the Channel List. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 112 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field Length Value Description bits 3-0 0000: Unspecified 0001: Proximate non-802.11 interferer in local environment 0010: Intra-network 802.11 OBSS interference management 0011: External network 802.11 OBSS interference management 0100: Reduced coverage (e.g. due to limited transmit power) 0101: Reduced throughput (e.g. due to limited channel bandwidth of the operating class, or high channel utilization measured on the channel) 0110: In-device Interferer within AP (can only be specified by the Multi-AP Agent) 0111: Operation disallowed due to radar detection on a DFS channel (can only be specified by the Multi-AP Agent) 1000: Operation would prevent backhaul operation using shared radio (can only be specified by the Multi-AP Agent) 1001: Immediate operation possible on a DFS channel CAC has been run and is still valid and channel has been cleared for use (can only be specified by the Multi-AP Agent) 1010: DFS channel state unknown (CAC has not run or its validity period has expired) (can only be specified by the Multi-AP Agent) 1011: Controller DFS Channel Clear Indication (Can only be specified by the Multi-AP Controller) 1100: Operation disallowed by regulatory restriction 1101 1111: Reserved The above 5 fields are repeated m 1 times. Reason Code. Indicates the reason for the Preference. 17.2.14 Radio Operation Restriction TLV format Table 31 provides the definition for the Radio Operation Restriction TLV. Table 31. Radio Operation Restriction TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets 1 octet 1 octet 1 octet 1 octet Value 0x8C Variable Variable m Variable k Variable Description Radio Operation Restriction TLV. Number of octets in ensuing field. Radio Unique identifier of a radio. Number of Operating Classes for which restrictions are reported in this TLV. Operating Class contains an enumerated value from Table E-4 in Annex E of [1], specifying the global operating class in which the subsequent Channel List is valid. Number of channels specified. Channel number for which a restriction applies. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 113 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field Length Value Description 1 octet 0x00 0xFF The minimum frequency separation (in multiples of 10 MHz) that this radio would require when operating on the above channel number between the center frequency of that channel and the center operating frequency of another radio (operating simultaneous TX/RX) of the Multi-AP Agent. The above 2 fields are repeated k 1 times The above 4 fields are repeated m 1 times 17.2.15 Transmit Power Limit TLV format Table 32 provides the definition for the Transmit Power Limit TLV. Table 32. Transmit Power Limit TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets 1 octet Value 0x8D 7 Variable Variable Description Transmit Power TLV. Number of octets in ensuing field. Radio Unique identifier. Transmit Power Limit EIRP per 20 MHz bandwidth representing the nominal transmit power limit for this radio. The field is coded as a 2's complement signed integer in units of decibels relative to 1 mW (dBm). 17.2.16 Channel Selection Response TLV format Table 33 provides the definition for the Channel Selection Response TLV. Table 33. Channel Selection Response TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets 1 octet Value Description 0x8E Channel Selection Response TLV. 7 Number of octets in ensuing field. Radio unique identifier. 0x00: Accept 0x01: Decline because request violates current preferences which have changed since last reported 0x02: Decline because request violates most recently reported preferences 0x03: Decline because request would prevent operation of a currently operating backhaul link (where backhaul STA and BSS share a radio) 0x04 0xFF: Reserved Indicates the channel selection response code, with respect to the Channel Selection Request. 17.2.17 Operating Channel Report TLV format Table 34 provides the definition for the Operating Channel Report TLV. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 114 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field tlvType tlvLength tlvValue Table 34. Operating Channel Report TLV format Length Value Description 1 octet 0x8F Operating Channel TLV. 2 octets Variable Number of octets in ensuing field. 6 octets Variable Radio Unique identifier of a radio. 1 octet k Number of current operating classes. 1 octet 1 octet Variable Variable Operating Class. It contains an enumerated value from Table E-4 in Annex E of [1], specifying the global operating class in which the subsequent Channel is valid. Current operating channel number in the Operating Class. The above 2 fields are repeated k 1 times. 1 octet Variable Current Transmit Power EIRP representing the current nominal transmit power. The field is coded as a 2's complement signed integer in units of decibels relative to 1 mW (dBm). This value is less than or equal to the Maximum Transmit Power specified in the AP Radio Basic Capabilities TLV for the current operating class. 17.2.18 Client Info TLV format Table 35 provides the definition for the Client Info TLV. Table 35. Client Info TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets 6 octets Value 0x90 12 Any EUI-48 value Any EUI-48 value Description Client info TLV. Number of octets in ensuing field. The BSSID of a BSS. The MAC address of the client. 17.2.19 Client Capability Report TLV format Table 36 provides the definition for the Client Capability Report TLV. Table 36. Client Capability Report TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 1 octet Variable Value 0x91 Variable 0x00: Success 0x01: Failure 0x02 0xFF: Reserved Description Client capability report TLV. Number of octets in ensuing field. Result Code for the client capability report message. The frame body of the most recently received (Re)Association Request frame from this client, as defined in Table 9-36 and Table 9-38 of [17] in the order of the underlying referenced standard. If Result Code is not equal to 0x00, this field is omitted. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 115 of 163 Wi-Fi EasyMeshTM Specification v3.0 17.2.20 Client Association Event TLV format Table 37 provides the definition for the Client Association Event TLV. Table 37. Client Association Event TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets 6 octets bit 7 bits 6-0 Value 0x92 13 Any EUI-48 value Any EUI-48 value 1: Client has joined the BSS 0: Client has left the BSS 0 Description Client Association Event TLV. Number of octets in ensuing field. The MAC address of the client. The BSSID of the BSS operated by the Multi-AP Agent for which the event has occurred. Association event. Reserved. 17.2.21 AP Metric Query TLV format Table 38 provides the definition for the AP metrics query TLV. Table 38. AP Metric Query TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 1 octet 6 octets Value 0x93 Variable k Any EUI-48 value The above field is repeated k 1 times. Description AP metrics query TLV. Number of octets in ensuing field. Number of BSSIDs included in this TLV BSSID of a BSS operated by the Multi-AP device for which the metrics are to be reported. 17.2.22 AP Metrics TLV format Table 39 provides the definition for the AP Metrics TLV. Table 39. AP Metrics TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets 1 octet 2 octets bit 7 Value 0x94 Variable Any EUI-48 value Variable Variable 1 Description AP metrics TLV. Number of octets in ensuing field. BSSID of a BSS operated by the Multi-AP Agent for which the metrics are reported. Channel Utilization as measured by the radio operating the BSS as defined in BSS Load element section 9.4.2.28 of [1]. Unsigned integer indicating the total number of STAs currently associated with this BSS. Include bit for the Estimated Service Parameters Information field for AC=BE. This field shall be set to 1. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 116 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field Length bit 6 bit 5 bit 4 bits 3 - 0 3 octets Value 0 or 1 0 or 1 0 or 1 0 Variable 0 or 3 octets Variable 0 or 3 octets Variable 0 or 3 octets Variable Description Include bit for the Estimated Service Parameters Information field for AC=BK. Include bit for the Estimated Service Parameters Information field for AC=VO. Include bit for the Estimated Service Parameters Information field for AC=VI. Reserved. Estimated Service Parameters Information field for AC=BE (see Figure 9588 in [1]), containing Data Format, BA Window Size, Estimated Air Time Fraction and Data PPDU Target Duration subfields reordered from the underlying referenced standard into big-endian order. If bit 6 of the 10th octet of tlvValue is set to 1, this field shall be included. Otherwise, this field shall be omitted. Estimated Service Parameters Information field for AC=BK (see Figure 9588 in[1]), containing Data Format, BA Window Size, Estimated Air Time Fraction and Data PPDU Target Duration subfields reordered from the underlying referenced standard into big-endian order. If bit 5 of the 10th octet of tlvValue is set to 1, this field shall be included. Otherwise, this field shall be omitted. Estimated Service Parameters Information field for AC=VO (see Figure 9588 in [1]), containing Data Format, BA Window Size, Estimated Air Time Fraction and Data PPDU Target Duration subfields reordered from the underlying referenced standard into big-endian order. If bit 4 of the 10th octet of tlvValue is set to 1, this field shall be included. Otherwise, this field shall be omitted. Estimated Service Parameters Information field for AC=VI (see Figure 9588 in [1]), containing Data Format, BA Window Size, Estimated Air Time Fraction and Data PPDU Target Duration subfields reordered from the underlying referenced standard into big-endian order. 17.2.23 STA MAC Address Type TLV format Table 40 provides the definition for the STA MAC Address Type TLV. Table 40. STA MAC Address Type TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets Value 0x95 6 Any EUI-48 value Description STA MAC address TLV. Number of octets in ensuing field. MAC address of the associated STA. 17.2.24 Associated STA Link Metrics TLV format Table 41 provides the definition for the Associated STA Link Metrics TLV. Table 41. Associated STA Link Metrics TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets Value 0x96 Variable Any EUI-48 value Description Associated STA link metrics TLV. Number of octets in ensuing field. MAC address of the associated STA. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 117 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field Length Value Description 1 octet k (>=0) Number of BSSIDs reported for this STA. 6 octets Any EUI-48 value BSSID of the BSS for which the STA is associated. 4 octets 4 octets Variable Variable The time delta in ms between the time at which the earliest measurement that contributed to the data rate estimates were made, and the time at which this report was sent. Estimated MAC Data Rate in downlink (in Mb/s). 4 octets Variable Estimated MAC Data Rate in uplink (in Mb/s). 1 octet Variable 0 220: RCPI (encoded per Table 9-154 of [1]). 221 - 255: Reserved. Uplink RCPI for STA. The above 5 fields are repeated k 1 times (if k = 0, these fields are omitted). 17.2.25 Unassociated STA Link Metrics Query TLV format Table 42 provides the definition for the Unassociated STA Link Metrics Query TLV. Table 42. Unassociated STA Link Metrics Query TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 1 octet 1 octet 1 octet Value 0x97 Variable Variable k Variable 1 octet m 6 octets Any EUI-48 value The above field is repeated m 1 times. The above three fields are repeated k 1 times. Description Unassociated STA link metrics query TLV. Number of octets in ensuing field. Operating Class contains an enumerated value from table E-4 in Annex E of [1], specifying the global operating class in which the Channel List is valid. Number of channels specified in the Channel List. Channel Number. A channel number in the Operating Class on which the RCPI measurements are to be made. Channel numbering dependent on Operating Class according to Annex E of [1]. Number of STA MAC addresses for this channel. STA MAC address for which the metrics are requested. 17.2.26 Unassociated STA Link Metrics Response TLV format Table 43 provides the definition for the Unassociated STA Link Metrics Response TLV. Table 43. Unassociated STA Link Metrics Response TLV format Field tlvType tlvLength Length 1 octet 2 octets Value 0x98 Variable Description Unassociated STA link metrics response TLV. Number of octets in ensuing field. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 118 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field tlvValue Length Value Description 1 octet 1 octet Variable k (>=0) Operating Class contains an enumerated value from table E-4 in Annex E of [1], specifying the global operating class for which the Channels in the report apply. The number of STA entries included in this TLV. 6 octets Any EUI-48 value MAC address of STA for which UL RCPI is being reported. 1 octet Variable A single channel number in Operating Class on which the RCPI measurement for STA was made. Channel numbering is dependent on Operating Class according to Annex E of [1]. 4 octets Variable The time delta in ms between the time at which the RCPI for STA was measured, and the time at which this report was sent. 1 octet Variable 0 220: RCPI (encoded per Table 9-154 of [1]). 221 - 255: Reserved. Uplink RCPI for STA. The above 4 fields are repeated k 1 times (if k = 0, these fields are omitted). 17.2.27 Beacon Metrics Query TLV format Table 44 provides the definition for the Beacon Metrics Query TLV. Table 44. Beacon Metrics Query TLV format Field tlvType tlvLength tlvValue Length Value Description 1 octet 0x99 Beacon Metrics Query TLV. 2 octets Variable Number of octets in ensuing field. 6 octets 1 octet Any EUI-48 value Variable MAC address of the associated STA for which the Beacon report information is requested. Operating Class field to be specified in the Beacon request. 1 octet Variable Channel Number field to be specified in the Beacon request. 6 octets Variable BSSID field to be specified in the Beacon request. 1 octet Variable Reporting Detail value to be specified in the Beacon request. 1 octet g SSID length. g octets Variable SSID 1 octet h 1 octet k Number of AP Channel Reports. If the value of Channel Number field is not set to 255, h is set to 0. Length of an AP Channel Report. 1 octet Variable Operating Class in an AP Channel Report. k 1 octets Variable Channel List in an AP Channel Report. The above 3 fields are repeated h 1 times (if h = 0, these fields are omitted). 1 octet m octets m Variable Number of element IDs. If the value of Reporting Detail field is not set to 1, m is set to 0. Element List. Comprises a list of m Element IDs to be included in a Request Element in the Beacon request. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 119 of 163 Wi-Fi EasyMeshTM Specification v3.0 17.2.28 Beacon Metrics Response TLV format Table 45 provides the definition for the Beacon Metrics Response TLV. Table 45. Beacon Metrics Response TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets 1 octet 1 octet Variable Value 0x9A Variable Any EUI-48 value k Variable Description Beacon metrics response TLV. Number of octets in ensuing field. MAC address of the associated STA for which the Beacon Report information is requested. Reserved. Number of measurement report elements included in this TLV. Contains a Measurement Report element that was received from the STA since the corresponding Beacon Metrics Query message was received by the Multi-AP Agent, per Figure 9-199 in [1] in the order of the underlying referenced standard. The length of this field is carried in the 2nd octet of the element per Figure 9-122 in [1]. The above field is repeated k - 1 times. 17.2.29 Steering Request TLV format Table 46 provides the definition for the Steering Request TLV. Table 46. Steering Request TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets bit 7 bit 6 bit 5 bits 4-00 2 octets 2 octets Value Description 0x9B Steering Request TLV. Variable Number of octets in ensuing field. Variable 0: Request is a Steering Opportunity. 1: Request is a Steering Mandate to trigger steering for specific client STA(s) Variable BSSID. Unique identifier of the source BSS for which the steering request applies (i.e. BSS that the STAs specified in the request are currently associated with). Request Mode. BTM Disassociation Imminent bit. Variable BTM Abridged bit. 0 Reserved. Variable Variable Steering Opportunity window. Time period in seconds (from reception of the Steering Request message) for which the request is valid. If Request Mode bit is 1, then the value of this field is ignored. BTM Disassociation Timer. Time period in TUs of the disassociation timer in the BTM Request. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 120 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field Length Value Description 1 octet k = 0: Steering request applies to all associated STAs in the BSS per policy setting. k > 0: Steering request applies to specific STAs specified by STA MAC address(es) STA List Count k. 6 octets Variable STA MAC address for which the steering request applies. If k is 0, then this field is not included. The above field is repeated k 1 times (if k = 0, this field is omitted). 1 octet m = 1 or k Target BSSID List Count. If Request Mode bit is set to 1 and if: m = 1: The same target BSSID is indicated for all specified STAs m = k (k>1): An individual target BSSID is indicated for each specified STA (in the same order) If Request Mode bit is 0, then this field is set to zero. 6 octets Variable Target BSSID. Indicates a target BSSID for steering. Wildcard BSSID is represented by FF:FF:FF:FF:FF:FF. 1 octet Variable Target BSS Operating Class. If the Target BSSID is set to "Wildcard BSSID", the value of this field is ignored by the receiver. 1 octet Variable Target BSS Channel Number for channel on which the Target BSS is transmitting Beacon frames. If the Target BSSID is set to "Wildcard BSSID", the value of this field is ignored by the receiver. The above 3 fields are repeated m 1 times (if m = 0, these fields are omitted). 17.2.30 Steering BTM Report TLV format Table 47 provides the definition for the Steering BTM Report TLV. Table 47. Steering BTM Report TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets Value 0x9C Variable Variable 6 octets 1 octet Variable Variable 0 or 6 octets Variable Description Steering BTM Report TLV. Number of octets in ensuing field. BSSID. Unique identifier of the source BSS for which the steering BTM report applies. STA MAC address for which the steering BTM report applies. BTM Status Code. Indicates the value of the BTM Status Code as reported by the STA in the BTM Response (per Table 9-357 in [1]). Target BSSID. Indicates the value of the Target BSSID field (if present) in the BTM Response received from the STA (see section 9.6.14.10 of [1]. Note: This indicates the BSSID that the STA intends to roam to, which may not align with the Target BSSID specified in the BTM Request. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 121 of 163 Wi-Fi EasyMeshTM Specification v3.0 17.2.31 Client Association Control Request TLV format Table 48 provides the definition for the Client Association Control Request TLV. Table 48. Client Association Control Request TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets 1 octet 2 octets Value 0x9D Variable Variable 0x00: Block 0x01: Unblock 0x02-0xFF: Reserved Variable 1 octet k 6 octets Variable The above field is repeated k 1 times. Description Client Association Control Request TLV. Number of octets in ensuing field. BSSID - unique identifier of the BSS for which the client blocking request applies. Association Control. Indicates if the request is to block or unblock the indicated STAs from associating. Validity Period. Time period in seconds (from reception of the Client Association Control Request message) for which a blocking request is valid. STA List Count Indicating one or more STA(s) for which Client Association Control request applies. STA MAC address for which the Client Association Control request applies. 17.2.32 Backhaul Steering Request TLV format Table 49 provides the definition for the Backhaul Steering Request TLV. Table 49. Backhaul Steering Request TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets 6 octets 1 octet 1 octet Value 0x9E 14 Any EUI-48 value Any EUI-48 value Variable Variable Description Backhaul Steering Request TLV. Number of octets in ensuing field. The MAC address of the associated backhaul STA operated by the MultiAP Agent. The BSSID of the target BSS. Operating class per Table E-4 in [1]. Channel number on which Beacon frames are being transmitted by the target BSS. 17.2.33 Backhaul Steering Response TLV format Table 50 provides the definition for the Backhaul Steering Response TLV. Table 50. Backhaul Steering Response TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets 6 octets Value 0x9F 13 Any EUI-48 value Any EUI-48 value Description Backhaul steering response TLV. Number of octets in ensuing field. The MAC address of the associated backhaul STA operated by the MultiAP Agent. The BSSID of the target BSS. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 122 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field Length 1 octet Value 0x00: Success 0x01: Failure 0x02 0xFF: Reserved. Description Result code. 17.2.34 Higher Layer Data TLV format Table 51 provides the definition for the Higher Layer Data TLV. Table 51. Higher Layer Data TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 1 octet Variable Value 0xA0 Variable Variable Variable Description Higher layer data TLV. Number of octets in ensuing field. Higher layer protocol (see Appendix A.1). Higher layer protocol payload (To be defined for specific higher layer protocol). 17.2.35 Associated STA Traffic Stats TLV format Table 52 provides the definition for the Associated STA Traffic Stats TLV. Table 52. Associated STA Traffic Stats TLV Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets 4 octets 4 octets 4 octets 4 octets Value 0xA2 Variable Any EUI-48 value Unsigned Integer Unsigned Integer Unsigned Integer Unsigned Integer Description Associated STA Traffic Stats TLV. Number of octets in ensuing field. MAC address of the associated STA. BytesSent Raw counter of the number of bytes sent to the associated STA. Note: it is the responsibility of the recipient to handle counter roll-over. For Multi-AP Agents that implement Profile-1, the units of this counter are Bytes. Otherwise, the units of this counter are as specified by the Byte Counter Units field of the Profile-2 AP Capability TLV. BytesReceived Raw counter of number of bytes received from the associated STA. Note: it is the responsibility of the recipient to handle counter roll-over. For Multi-AP Agents that implement Profile-1, the units of this counter are Bytes. Otherwise, the units of this counter are as specified by the Byte Counter Units field of the Profile-2 AP Capability TLV. PacketsSent Raw counter of the number of packets successfully sent to the associated STA. Note: it is the responsibility of the recipient to handle counter roll-over. PacketsReceived Raw counter of the number of packets received from the associated STA during the measurement window. Note: it is the responsibility of the recipient to handle counter roll-over. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 123 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field Length 4 octets 4 octets 4 octets Value Unsigned Integer Unsigned Integer Unsigned Integer Description TxPacketsErrors Raw counter of the number of packets which could not be transmitted to the associated STA due to errors. Note: it is the responsibility of the recipient to handle counter roll-over. RxPacketsErrors Raw counter of the number of packets which were received in error from the associated STA. Note: it is the responsibility of the recipient to handle counter roll-over. RetransmissionCount Raw counter of the number of packets sent with the retry flag set to the associated STA. Note: it is the responsibility of the recipient to handle counter roll-over. 17.2.36 Error Code TLV format Table 53 provides the definition for the Error Code TLV. Table 53. Error Code TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 1 octet 6 octets Value Description 0xA3 Error code TLV. 7 Number of octets in ensuing field. 0x00: Reserved 0x01: STA associated with a BSS operated by the Multi-AP Agent. 0x02: STA not associated with any BSS operated by the Multi-AP Agent. 0x03: Client capability report unspecified failure 0x04: Backhaul steering request rejected because the backhaul STA cannot operate on the channel specified. 0x05: Backhaul steering request rejected because the target BSS signal is too weak or not found. 0x06: Backhaul steering request authentication or association Rejected by the target BSS. 0x07 0xFF: Reserved. Any EUI-48 value Reason code. The MAC address of the STA referred to in the previous field. The value of this field is valid only if the reason code field is set to 0x01 or 0x02. Otherwise this field is ignored by the recipient of this TLV. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 124 of 163 Wi-Fi EasyMeshTM Specification v3.0 17.2.37 Channel Scan Reporting Policy TLV format Table 54 provides the definition for the Channel Scan Reporting Policy TLV. Table 54. Channel Scan Reporting Policy TLV Field tlvType tlvLength tlvValue Length 1 octet 2 octets bit 7 bits 6-0 Value 0xA4 Variable 1: Report Independent Channel Scans 0: Do not report Independent Channel Scans unless explicitly requested in a Channel Scan Request Description Channel Scan Reporting Policy TLV. Number of octets in ensuing field. Report Independent Channel Scans Reserved 17.2.38 Channel Scan Capabilities TLV format Table 55 provides the definition for the Channel Scan Capabilities TLV. Table 55. Channel Scan Capabilities TLV Field tlvType tlvLength tlvValue Length 1 octet 2 octets 1 octet 6 octets bit 7 bits 6-5 bits 4-0 4 octets Value Description 0xA5 Channel Scan Capabilities TLV. Variable Number of Octets in ensuing field. R Variable Number of Radios The number of radios for which channel scan capabilities are declared. Radio Unique Identifier of a radio of the Multi-AP Agent. 1: True (Agent can only perform scan on boot) 0: False (Agent can perform Requested scans) 0x00: No impact (independent radio is available for scanning that is not used for Fronthaul or backhaul) 0x01: Reduced number of spatial streams 0x02: Time slicing impairment (Radio may go off channel for a series of short intervals) 0x03: Radio unavailable for >= 2 seconds) On Boot Only Indicates whether the specified radio is capable only of "On boot" scans or can perform scans upon request. Scan Impact Guidance information on the expected impact on any Fronthaul or Backhaul operations on this radio of using this radio to perform a channel scan. Reserved Variable Minimum Scan Interval The minimum interval in seconds between the start of two consecutive channel scans on this radio © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 125 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field Length 1 octet 1 octet 1 octet k octets Value m Variable k Variable The above 3 fields are repeated m 1 times. The above 9 fields are repeated r -1 times. Description Number of Operating Classes Number of operating classes for which channel scan capabilities are declared on this radio. Operating Class Operating Class contains an enumerated value from Table E-4 in Annex E of [1]. Number of Channels. Number of channels specified in the Channel List. k=0 indicates that the Multi-AP Agent is capable of scanning on all channels in the Operating Class. Channel List. Contains a variable number of octets. Each octet describes a single channel number in the Operating Class on which the Multi-AP Agent is capable of performing a scan. If k=0, this field is omitted. 17.2.39 Channel Scan Request TLV format Table 56 provides the definition for the Channel Scan Request TLV. Table 56. Channel Scan Request TLV Field tlvType tlvLength tlvValue Length 1 octet 2 octets bit 7 bits 6-0 1 octet 6 octets 1 octet 1 octet 1 octet Value 0xA6 Variable 1: Perform a fresh scan and return results 0: Return stored results of last successful scan r Variable m Variable k Description Channel Scan Request TLV. Number of octets in ensuing field. Perform Fresh Scan Indicator to identify whether a fresh scan is being requested, or whether stored results from previous (including on-boot) scan are requested. Reserved Number of Radios The number of radios upon which channel scans are requested. Radio Unique Identifier of a radio of the Multi-AP Agent. Number of Operating Classes Number of operating classes for which channel scans are being requested on this radio. If the Perform Fresh Scan bit is set to 0, this field shall be set to zero and the following fields shall be omitted. Operating Class Operating Class contains an enumerated value from Table E-4 in Annex E of [1], specifying the global operating class in which the subsequent Channel List is valid. Number of Channels. Number of channels specified in the Channel List. k=0 indicates that the Multi-AP Agent is requested to scan on all channels in the Operating Class. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 126 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field Length k octets Value Variable The above 3 fields are present m times. The above 5 fields are repeated r -1 times. Description Channel List. Contains a variable number of octets. Each octet describes a single channel number in the Operating Class on which the Multi-AP Agent is requested to perform a scan. If k=0, this field is omitted. 17.2.40 Channel Scan Result TLV format Table 57 provides the definition for the Channel Scan Result TLV. Table 57. Channel Scan Result TLV Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets 1 octet 1 octet Value 0xA7 Variable Variable Variable Variable 1 octet The following fields are only present if Scan Status is set to 0x00 1 octet 0x00: Success 0x01: Scan not supported on this operating class and channel on this radio 0x02: Request too soon after last scan 0x03: Radio too busy to perform scan 0x04: Scan not completed 0x05: Scan aborted 0x06: Fresh scan not supported. Radio only supports on boot scans. 0x07 0xFF: Reserved. Variable Timestamp Length Octets Variable 1 octet Variable Description Channel Scan Result TLV. Number of octets in ensuing field. Radio Unique Identifier of a radio of the Multi-AP Agent. Operating Class Channel The channel number of the channel scanned by the radio given the operating class. Scan Status A status code to indicate whether a scan has been performed successfully and if not, the reason for failure. Timestamp Length TimeStamp The start time of the scan of the channel. The timestamp shall be formatted as a string using the typedef date-andtime string format as defined in section 3 of [1] and shall include timesecfrac and time-offset as defined in section 5.6 of [1]. '\d{4}-\d{2}-\d{2}T\d{2}:\d{2}:\d{2}\.\d+Z|[\+\-]\d{2}:\d{2})' Utilization The current channel utilization measured by the radio on the scanned 20 MHz channel - as defined in section 9.4.2.28 of [1]. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 127 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field Length Value Description 1 octet 2 octets 6 octets Variable 221 - 224: Reserved. Variable Variable 1 octet SSID Length octets 0x00 0x20: length of SSID byte array 0x21 - 0xFF: Reserved. Variable 1 octet Variable 1 octet n Noise An indicator of the average radio noise plus interference power measured on the 20 MHz channel during a channel scan. Encoding as defined as for ANPI in section 11.11.9.4 of [1]. NumberOfNeighbors The number of neighbor BSS discovered on this channel. BSSID The BSSID indicated by the neighboring BSS. EUI-48 SSID Length SSID The SSID indicated by the neighboring BSS. SignalStrength An indicator of radio signal strength (RSSI) of the Beacon or Probe Response frames of the neighboring BSS as received by the radio measured in dBm. (RSSI is encoded per Table 9-154 of [[1]). Reserved: 221 - 255. Length of Channel Bandwidth field n octets bit 7 bits 6 -0 Variable 1: field present 0: field not present ChannelBandwidth String indicating the maximum bandwidth at which the neighbor BSS is operating, e.g., "20" or "40" or "80" or "80+80" or "160" MHz. BSS Load Element Present Set to one if the neighboring BSS's Beacons/Probe Responses include a BSS Load Element as defined in section 9.4.2.28 of [1]. Set to 0 otherwise. Reserved 1 octet 2 octets The above 10 fields are present NumberOfNeighbors times 4 octets bit 7 bits 6-0 Variable Variable Variable 1: Scan was an Active scan 0: Scan was Passive scan ChannelUtilization If "BSS Load Element Present" bit is set to one, this field is present. Otherwise it is omitted. The value of the "Channel Utilization" field as reported by the neighboring BSS in the BSS Load element. StationCount If "BSS Load Element Present" bit is set to one, this field is present. Otherwise it is omitted. The value of the "Station Count" field reported by the neighboring BSS in the BSS Load element. AggregateScanDuration Total time spent performing the scan of this channel in milliseconds. Scan Type Indicates whether the scan was performed passively or with Active probing. Reserved © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 128 of 163 Wi-Fi EasyMeshTM Specification v3.0 17.2.41 Timestamp TLV format Table 58 provides the definition for the Timestamp TLV. Table 58. Timestamp TLV Field tlvType tlvLength tlvValue Length 1 octet 2 octets 1 octet Timestamp Length Octets Value 0xA8 Variable Variable Variable Description Timestamp TLV. Number of octets in ensuing field. Timestamp Length Timestamp The timestamp shall be formatted as a string using the typedef date-andtime string format as defined in section 3 of [1] and shall include timesecfrac and time-offset as defined in section 5.6 of [1]. '\d{4}-\d{2}-\d{2}T\d{2}:\d{2}:\d{2}\.\d+Z|[\+\-]\d{2}:\d{2})' 17.2.42 CAC Request TLV format Table 59 provides the definition for the CAC Request TLV. Table 59. CAC Request TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 1 octet 6 octets 1 octet Value 0xAD Variable r Variable Variable 1 octet Variable bits 7-5 bits 4-3 bits 2-0 "000": Continuous CAC "001": Continuous with dedicated radio "010": MIMO dimension reduced "011": Time sliced CAC "011"-"111": Reserved "00": Remain on channel and continue to monitor for radar "01": Return the radio that was performing the CAC to its most recent operational configuration. "10"-"11": Reserved The above 6 fields are repeated r-1 times Description CAC Request TLV. Number of octets in ensuing field. Number of Radios Number of radios for which a CAC Request is being made. Radio Unique Identifier of a radio of the Multi-AP Agent for which a CAC Request is being made. Operating Class Operating class to use for performing the CAC, from Table E-4 in Annex E of [1]. Channel Single channel number in the operating class on which the Multi-AP Agent is being requested to perform a CAC. CAC Method CAC method to be used. CAC Completion Action CAC Completion Action for Successful CAC. Reserved © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 129 of 163 Wi-Fi EasyMeshTM Specification v3.0 17.2.43 CAC Termination TLV format Table 60 provides the definition for the CAC Termination TLV. Table 60. CAC Termination TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 1 octet Value 0xAE Variable r 6 octets 1 octet Variable Variable 1 octet Variable The above three fields are repeated r-1 times Description CAC Termination TLV. Number of octets in ensuing field. Number of Radios Number of radios for which a CAC termination is being made. Radio Unique Identifier of a radio of the Multi-AP Agent for which the CAC Termination is being made. Operating Class Operating class of the CAC to be terminated. Channel Single channel number of the CAC to be terminated. 17.2.44 CAC Completion Report TLV format Table 61 provides the definition for the CAC Completion Report TLV. Table 61. CAC Completion Report TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 1 octet 6 octets 1 octet 1 octet 1 octet Value Description 0xAF CAC Completion Report TLV. Variable Number of octets in ensuing field. r Variable Variable Variable 0x00: Successful 0x01: Radar detected 0x02: CAC not supported as requested (capability mismatch) 0x03: Radio too busy to perform CAC 0x04: Request was considered to be nonconformant to regulations in the country in which the MultiAP Agent is operating 0x05: Other error 0x06 - 0xFF: Reserved Number of Radios Number of radios for which a CAC Completion Report is being sent. Radio Unique Identifier of a radio of the Multi-AP Agent used for performing the CAC. Operating Class Operating class used for performing the CAC, from Table E-4 in Annex E of [1]. Channel Channel number used for performing the CAC. CAC Completion Status. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 130 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field Length 1 octet Value k 1 octet Variable 1 octet Variable The above 2 fields are repeated k -1 times. The above 7 fields are repeated r-1 times. Description Number of Pairs Number of class and channel pairs that radar was detected on. This field shall be set to 0 if radar was not detected. Operating Class Detected Operating class to which the radar was detected, from Table E-4 in Annex E of [1]. This field shall be set to 0 if radar was not detected. Channel Detected Single channel number in the operating class on which the radar was detected. This field shall be set to 0 if radar was not detected. 17.2.45 CAC Status Report TLV format Table 62 provides the definition for the CAC Status Report TLV. Table 62. CAC Status Report TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 1 octet 1 octet 1 octet 2 octets Value 0xB1 Variable a Variable Variable Variable Above 3 fields are repeated a-1 times 1 octet n 1 octet Variable 1 octet Variable 2 octets Variable Above 3 fields are repeated n-1 times 1 octet c Description CAC Status Report TLV. Number of octets in ensuing field. Number of Available Channels Number of channels the Multi-AP Agent indicates as Available Channels. Operating Class Operating class of an Available Channel, from Table E-4 in Annex E of [1]. Channel Channel number of an Available Channel in the given Operating class. Minutes Minutes since CAC was completed identifying Available Channel. Set to zero for non-DFS channels. Number of Pairs Number of class and channel pairs the Multi-AP Agent indicates are on the non-occupancy list due to detection of radar. Operating Class Operating class of channel that is in the non-occupancy list, from Table E4 in Annex E of [1]. Channel Single channel number in the operating class on which the radar was detected. Duration Seconds remaining in the non-occupancy duration for the channel specified by the class and channel pair. Number of Pairs Number of class and channel pairs that have an active CAC ongoing. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 131 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field Length 1 octet Value Variable 1 octet Variable 3 octets Variable Above 3 fields are repeated c-1 times Description Operating Class Operating class of channel that has ongoing CAC, from Table E-4 in Annex E of [1]. Channel Single channel number in the operating class that has an ongoing CAC. Countdown Seconds remaining to complete the CAC. 17.2.46 CAC Capabilities TLV format Table 63 provides the definition for the CAC Capabilities TLV. Table 63. CAC Capabilities TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 2 octets 1 octet 6 octets 1 octet 1 octet 3 octets 1 octet 1 octet 1 octet 1 octet Value 0xB2 Variable Variable r Variable t 0x00: Continuous CAC 0x01: Continuous with dedicated radio 0x02: MIMO dimension reduced 0x03: Time sliced CAC 0x04 - 0xFF: Reserved Variable c Variable f Variable Description CAC Capabilities TLV. Number of octets in ensuing field. Country Code Two-character country code in which the Multi-AP Agent is operating according to ISO 3166 [5]. The characters shall be encoded as UTF-8. Number of Radios. Separate radios shall be specified only to the extent that all radios specified can perform CACs simultaneously. If the value is zero, the agent has no radios that are able to perform a CAC. Radio Unique Identifier of the radio. Number of CAC Types Supported Number of types of CAC that the radio can perform. Each type is defined by a method and time to complete. For each type, the classes and channels allowed are enumerated. CAC method supported. Duration Number of seconds required to complete CAC. Number of Operating Classes Number of classes supported for the given method. Operating Class Operating class for which the capability is being described, from Table E-4 in Annex E of [1]. Number of Channels Number of channels supported in the given operating class. Channel Single channel number in the operating for which the capability is being described. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 132 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field Length Value Description The above field is repeated f-1 times. The above 3 fields are repeated c-1 times. The above 6 fields are repeated t-1 times. The above 8 fields are repeated r-1 times (if r=0, these fields are omitted). 17.2.47 Multi-AP Profile TLV format Table 64 provides the definition for the Multi-AP Profile TLV. Table 64. Multi-AP Profile TLV format Field / Name tlvType tlvLength tlvValue Multi-AP Profile Length 1 octet 2 octets 1 octet Value 0xB3 1 0x00: Reserved 0x01: Multi-AP Profile-1 0x02: Multi-AP Profile-2 0x03: Multi-AP Profile-3 0x04 ~0xFF Reserved Description Multi-AP Profile TLV. Number of Octets in ensuing field. A 1905 device that receives a Multi-AP Profile TLV with a reserved value shall assume the sender implements the same profile implemented by the receiver. 17.2.48 Profile-2 AP Capability TLV format Table 65 provides the definition for the Profile-2 AP Capability TLV. Table 65. Profile-2 AP Capability TLV format Field / Name tlvType tlvLength tlvValue Max Priortization Rules Byte Counter Units Length 1 octet 2 octets 1 octet 1 octet bits 7-6 Prioritization Max VIDs bit 5 bits 4-0 1 octet Value 0xB4 Variable 0 - 255 0: bytes 1: kibibytes (KiB) 2: mebibytes (MiB) 3: reserved 0 or 1 Variable Description Profile-2 AP Capability TLV. Number of octets in ensuing field. The maximum total number of service priroritization rules supported by the Multi-AP Agent Reserved The units used for byte counters when the Multi-AP Agent reports traffic statistics. Service Prioritization Reserved Max Total Number of unique VIDs the Multi-AP Agent supports. 17.2.49 Default 802.1Q Settings TLV format Table 66 provides the definition for the Default 802.1Q Settings TLV. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 133 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field tlvType tlvLength tlvValue Length 1 octet 2 octets 2 octets bits 7-5 bits 4-0 Table 66. Default 802.1Q Settings TLV format Value 0xB5 Variable Variable Variable Description Default 802.1Q Settings TLV. Number of octets in ensuing field. Primary VLAN ID. Default PCP. Reserved. 17.2.50 Traffic Separation Policy TLV format Table 67 provides the definition for the Traffic Separation Policy TLV. Table 67. Traffic Separation Policy TLV format Field tlvType tlvLength tlvValue Length Value 1 octet 0xB6 2 octets Variable 1 octet k 1 octet n n octets Variable 2 octets 0x0000 0x0002: Reserved 0x0003 0x0FFE 0xFFF 0xFFFF: Reserved The above 3 fields are repeated k-1 times. Description Traffic Separation Policy TLV. Number of octets in ensuing field. Number of SSIDs. Length of SSID name. SSID name. VLAN ID. 17.2.51 Profile-2 Error Code TLV format Table 68 provides the definition for the Profile-2 Error Code TLV. Table 68. Profile-2 Error Code TLV format Field tlvType tlvLength Length 1 octet 2 octets Value 0xBC Variable Description Profile-2 Error code TLV. Number of octets in ensuing field. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 134 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field tlvValue Length 1 octet 0 or 6 octets Value Description 0x00: Reserved 0x01: Service Prioritization Rule not found 0x02: Number of Service Prioritization Rules exceeded the maximum supported 0x03: Default PCP or Primary VLAN ID not provided 0x04: Reserved 0x05: Number of unique VLAN ID exceeds maximum supported 0x06: Reserved. 0x07: Traffic Separation on combined fronthaul and Profile-1 backhaul unsupported 0x08: Traffic Separation on combined Profile-1 backhaul and Profile-2 backhaul unsupported 0x09: Service Prioritization Rule not supported 0x0A- Traffic Separation not supported 0x0B 0xFF: Reserved. Variable Reason code. BSSID this error refers to. This field shall be included if the Reason code field is set to '0x07' or '0x08'. 17.2.52 AP Radio Advanced Capabilities TLV format Table 69 provides the definition for the AP Radio Advanced Capabilities TLV. Table 69. AP Radio Advanced Capabilities TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets bit 7 bit 6 bit 5-0 Value 0xBE Variable Variable 0 or 1 0 or 1 Description AP Radio Advanced Capabilities TLV. Number of octets in ensuing field. Radio Unique Identifier of the radio for which capabilities are reported. Combined Front Back Traffic Separation on combined fronthaul and Profile-1 backhaul support. Combined Profile-1 and Profile-2 Traffic Separation on combined Profile-1 backhaul and Profile-2 backhaul support. Reserved 17.2.53 Association Status Notification TLV format Table 70 provides the definition for the Association Status Notification TLV. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 135 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field tlvType tlvLength tlvValue Table 70. Association Status Notification TLV format Length Value Description 1 octet 0xBF Association Status Notification TLV. 2 octets variable Number of octets in ensuing field. 1 octet k Number of BSSIDs and their statuses included in this TLV 6 octets Any EUI- 48 value BSSID of a BSS operated by the Multi-AP device 1 octet 0x00: No more associations allowed 0x01: Associations allowed 0x02 0xFF: Reserved The above 2 fields are repeated k times. Association Allowance status The status of allowance of new client device associations on the BSSs specified by the BSSIDs in this TLV. 17.2.54 Source Info TLV format Table 71 provides the definition for the Source Info TLV. Table 71. Source Info TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 6 Value 0xC0 6 Any EUI-48 value Description Source Info TLV. Number of octets in ensuing field. MAC Address The MAC address of the device that generated the message included in the tlvValue field of the Tunneled TLV. 17.2.55 Tunneled message type TLV format Table 72 provides the definition for the Tunneled message type TLV. Table 72. Tunneled message type TLV format Field tlvType tlvLength tlvValue Length 1 octet 2 octets 1 octet Value Description 0xC1 Tunneled message type TLV. 1 Number of octets in ensuing field. 0x00: Association Request 0x01: Re-Association Request 0x02: BTM Query 0x03: WNM Request 0x04 ANQP request for Neighbor Report 0x05-0xFF: Reserved Tunneled Protocol Type 802.11 request frame type carried in the Tunneled TLV. 17.2.56 Tunneled TLV format Table 73 provides the definition for the Tunneled TLV. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 136 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field tlvType tlvLength tlvValue Length 1 octet 2 octets Variable Table 73. Tunneled TLV format Value 0xC2 Variable Variable Description Tunneled TLV. Number of octets in ensuing field. 802.11 request frame body. 17.2.57 Profile-2 Steering Request TLV format Table 74 provides the definition for the Profile-2 Steering Request TLV. Table 74. Profile-2 Steering Request TLV format Field tlvType tlvLength tlvValue Length Value Description 1 octet 0xC3 Profile-2 Steering Request TLV. 2 octets Variable Number of octets in ensuing field. 6 octets bit 7 bit 6 Variable 0: Request is a Steering Opportunity. 1: Request is a Steering Mandate to trigger steering for specific client STA(s) Variable BSSID. Unique identifier of the source BSS for which the steering request applies (i.e. BSS that the STAs specified in the request are currently associated with). Request Mode. BTM Disassociation Imminent bit. bit 5 Variable BTM Abridged bit. bits 4-0 0 Reserved. 2 octets Variable Steering Opportunity window. Time period in seconds (from reception of the Steering Request message) for which the request is valid. If Request Mode bit is set to 1, then the value of this field is ignored. 2 octets Variable BTM Disassociation Timer. Time period in TUs of the disassociation timer in the BTM Request. 1 octet k = 0: Steering request applies to all Agile Multiband capable associated STAs in the BSS per policy setting. k > 0: Steering request applies to specific Agile Multiband capable STAs specified by STA MAC address(es) STA List Count k. 6 octets Variable MAC Address Agile Multiband capable STA MAC address for which the steering request applies. If k is 0, then this field is not included. The above field is repeated k 1 times (if k = 0, the above field is omitted). © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 137 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field Length Value Description 1 octet m = 1 or k Target BSSID List Count. If Request Mode bit is set to one and if: m = 1: The same target BSSID is indicated for all specified STAs m = k (k>1): An individual target BSSID is indicated for each specified STA (in the same order) If Request Mode bit is 0, then this field is set to zero. 6 octets Variable Target BSSID. Indicates a target BSSID for steering. Wildcard BSSID is represented by FF:FF:FF:FF:FF:FF. 1 octet Variable Target BSS Operating Class. If the Target BSSID is set to "Wildcard BSSID", the value of this field is ignored by the receiver. 1 octet Variable Target BSS Channel Target BSS Channel Number for channel on which the Target BSS is transmitting Beacon frames. If the Target BSSID is set to "Wildcard BSSID", the value of this field is ignored by the receiver. 1 octet Variable Reason Code Reason code for steering as specified in Table 18 of [8]. The above 4 fields are repeated m 1 times (if m = 0, these fields are omitted). 17.2.58 Unsuccessful Association Policy TLV format Table 75 provides the definition for the Unsuccessful Association Policy TLV. Table 75. Unsuccessful Association Policy TLV format Field / Name tlvType tlvLength tlvValue Report Unsuccessful Associations Length 1 octet 2 octets bit 7 bits 6-0 Maximum 4 octets Reporting Rate Value 0xC4 Variable Description Unsuccessful Association Policy TLV. Number of octets in ensuing field. 0: Do not report unsuccessful association attempts 1: Report unsuccessful association attempts Indicates whether Multi-AP Agent should report unsuccessful association attempts of client STAs to the Multi-AP Controller Reserved Variable Maximum rate for reporting unsuccessful association attempts (in attempts per minute) 17.2.59 Metric Collection Interval TLV format Table 76 provides the definition for the Metric Collection Interval TLV. Table 76. Metric Collection Interval TLV format Field / Name tlvType tlvLength Length 1 octet 2 octets Value 0xC5 Variable Description Metric Collection Interval TLV. Number of octets in ensuing field. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 138 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field / Name tlvValue Collection Interval Length 4 octets Value Variable Description Device.CollectionInterval as defined in Table 3 & Table 6 of [10]. Note: If a Multi-AP Agent is polled for metrics once every Collection Interval, at least one metric from one radio on the Multi-AP Agent will have been freshly re-measured. Polling more frequently may not provide additional new information. 17.2.60 Radio Metrics TLV format Table 77 provides the definition for the Radio Metrics TLV. Table 77. Radio Metrics TLV format Field / Name tlvType tlvLength tlvValue RUID Length 1 octet 2 octets 6 octets Noise Transmit ReceiveSelf ReceiveOther 1 octet 1 octet 1 octet 1 octet Value 0xC6 Variable Variable Variable Variable Variable Variable Description Radio Metrics TLV. Number of octets in ensuing field. Radio Unique Identifier of a radio of the Multi-AP Agent for which metrics are being reported. Radio.Noise as Table 3 & Table 6 of [10]. Radio.Transmit as defined in Table 3 & Table 6 of [10]. Radio.ReceiveSelf as defined in Table 3 & Table 6 of [10]. Radio.ReceiveOther as defined in Table 3 & Table 6 of [10]. 17.2.61 AP Extended Metrics TLV format Table 78 provides the definition for the AP Extended Metrics TLV. Table 78. AP Extended Metrics TLV format Field / Name tlvType tlvLength tlvValue BSSID UnicastBytesSent Length 1 octet 2 octets Value 0xC7 Variable 6 octets 4 octets Variable Variable UnicastBytesReceived 4 octets Variable MulticastBytesSent 4 octets Variable Description AP Extended Metrics TLV. Number of octets in ensuing field. BSSID of a BSS for which metrics are being reported. BSS.UnicastBytesSent as defined in Table 3 & Table 6 of [10], except that the byte counters are encoded in units specified by the Byte Counter Units field of the Profile-2 AP Capability TLV. BSS.UnicastBytesReceived as defined in Table 3 & Table 6 of [10], except that the byte counters are encoded in units specified by the Byte Counter Units field of the Profile-2 AP Capability TLV. BSS.MulticastBytesSent as defined in Table 3 & Table 6 of [10], except that the byte counters are encoded in units specified by the Byte Counter Units field of the Profile-2 AP Capability TLV. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 139 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field / Name MulticastBytesReceived Length 4 octets Value Variable BroadcastBytesSent 4 octets Variable BroadcastBytesReceived 4 octets Variable Description BSS.MulticastBytesReceived as defined in Table 3 & Table 6 in [10], except that the byte counters are encoded in units specified by the Byte Counter Units field of the Profile-2 AP Capability TLV. BSS.BroadcastBytesSent as defined in Table 3 & Table 6 in [10], except that the byte counters are encoded in units specified by the Byte Counter Units field of the Profile-2 AP Capability TLV. BSS.BroadcastBytesReceived as defined in Table 3 & Table 6 in [10], except that the byte counters are encoded in units specified by the Byte Counter Units field of the Profile-2 AP Capability TLV. 17.2.62 Associated STA Extended Link Metrics TLV format Table 79 provides the definition for the Associated STA Extended Link Metrics TLV. Table 79. Associated STA Extended Link Metrics TLV format Field / Name Length Value Description tlvType 1 octet 0xC8 Associated STA Extended Link Metrics TLV. tlvLength 2 octets Variable Number of Octets in ensuing field. tlvValue MAC Address 6 octets Any EUI-48 value MAC Address of the associated STA. BSSID Number 1 octet k (>=0) Number of BSSIDs reported for this STA. BSSID 6 octets Any EUI-48 value BSSID of the BSS to which the STA is associated. LastDataDownlinkRate 4 octets LastDataUplinkRate 4 octets UtilizationReceive 4 octets Variable Variable Variable STA.LastDataDownlinkRate as defined in Table 3 & Table 6 of [10]. STA.LastDataUplinkRate as defined in Table 3 & Table 6 of [10]. STA.UtilizationReceive as defined in Table 3 & Table 6 of [10]. UtilizationTransmit 4 octets Variable STA.UtilizationTransmit as defined in Table 3 & Table 6 of [10]. The above 5 fields are repeated k 1 times (if k = 0, these fields are omitted). 17.2.63 Status Code TLV format Table 80 provides the definition for the Status Code TLV. Table 80. Status Code TLV format Field / Name tlvType tlvValue tlvValue Status Code Length 1 octet 2 octets 2 octets Value 0xC9 Variable Variable Description Status Code TLV. Number of octets in ensuing field. This field shall be set in accordance with Table 9-46 of [1]. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 140 of 163 Wi-Fi EasyMeshTM Specification v3.0 17.2.64 Reason Code TLV format Table 81 provides the definition for the Reason Code TLV. Table 81. Reason Code TLV format Field / Name tlvType tlvLength tlvValue Reason Code Length 1 octet 2 octets 2 octets Value 0xCA Variable Variable Description Reason Code TLV. Number of octets in ensuing field. This field shall be set in accordance with Table 9-45 of [1]. 17.2.65 Backhaul STA Radio Capabilities TLV format Table 82 provides the definition for the Backhaul STA Radio Capabilities TLV. Table 82. Backhaul STA Radio Capabilities TLV format Field / Name tlvType tlvLength tlvValue Length 1 octet 2 octets 6 octets Included bit 7 MAC Address bits 6-0 6 octets Value 0xCB Variable Description Backhaul STA Radio Capabilities TLV. Number of octets in ensuing field. Variable 0: the MAC address is not included below 1: the MAC address is included below 0 Any EUI-48 value Radio Unique Identifier of the radio for which capabilities are reported. The MAC address include. Reserved. MAC address of the backhaul STA on this radio. (This field is present if the MAC address include field is set to 1). 17.2.66 Backhaul BSS Configuration TLV Table 83 provides the definition for the Backhaul BSS Configuration TLV. Table 83. Backhaul BSS Configuration TLV format Field / Name Length tlvType 1 octet tlvLength 2 octets tlvValues BSSID 6 octets Profile-1 bSTA bit 7 Disallowed Profile-2 bSTA bit 6 Disallowed bits 5-0 Value 0xD0 Variable Variable 0: allowed 1: disallowed 0: allowed 1: disallowed Description Backhaul BSS Configuration TLV. Number of octets in ensuing field. BSSID of BSS to which this configuration applies. Profile-1 Backhaul STA association disallowed. Profile-2 Backhaul STA association disallowed. Reserved. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 141 of 163 Wi-Fi EasyMeshTM Specification v3.0 17.2.67 1905 Layer Security Capability TLV format Table 84 provides the definition for the 1905 Layer Security Capability TLV. Table 84. 1905 Layer Security Capability TLV format Field / Name tlvType tlvLength tlvValue Onboarding Protocol Length 1 octet 2 octets 1 octet MIC Algorithm 1 octet Encryption Algorithm 1 octet Value 0xA9 3 Description 1905 Layer Security Capability TLV. Number of octets in ensuing field. 0x00: 1905 Device Provisioning Protocol. 0x01 - 0xFF: Reserved. 0x00: HMAC-SHA256. 0x01 - 0xFF: Reserved. 0x00: AES-SIV. 0x01 - 0xFF: Reserved. Onboarding protocols supported. Message integrity algorithms supported. Message encryption algorithms supported. 17.2.68 MIC TLV format Table 85 provides the definition for the MICTLV. Table 85. MIC TLV format Field / Name tlvType tlvLength tlvValue 1905 GTK Key Id MIC Version Length 1 octet 2 octets bits 7-6 bits 5-4 Integrity Transmission Counter Source 1905 AL MAC Address MIC Length MIC bits 3-0 6 octets 6 octets 2 octets n octets Value 0xAB 15 + n Variable 0x0: Version 1 0x1 - 0x3: Reserved Variable Variable n Variable Description MIC TLV. Number of octets in ensuing field. Reserved Length of the Message Integrity Code in octets. Message Integrity Code. 17.2.69 Encrypted Payload TLV format Table 86 provides the definition for the Encrypted TLV. Table 86. Encrypted TLV format Field / Name tlvType Length 1 octet Value 0xAC Description Encrypted Payload TLV. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 142 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field / Name Length tlvLength 2 octets tlvValue Encryption Transmission Counter Source 1905 AL MAC Address Destination 1905 AL MAC Address AES-SIV length 6 octets 6 octets 6 octets 2 octets AES-SIV n Value Variable Variable Variable Variable n Variable Description Number of octets in ensuing field. Source 1905 AL MAC Address of this TLV. Destination 1905 AL MAC Address of this TLV. Length of the AES-SIV Encryption Output field. AES-SIV Encryption Output (i.e., SIV concatenated with all the encrypted TLVs) 17.2.70 Service Prioritization Rule TLV format Table 87 provides the definition for the Service Prioritization Rule TLV. Table 87. Service Prioritization Rule TLV Field tlvType tlvLength tlvValue Rule Id Add Remove Length 1 octet 2 octets 4 octets bit 7 Precedence bits 6-0 1 octet Output 1 octet Always Match bit 7 bit 6-0 Value 0xB9 8 Description Service Prioritization Rule TLV. Number of octets in ensuing field. Variable 0: remove this rule 1: add this rule Variable 0x00 0xFE 0xFF: Reserved. 0x00 0x09 0x0A 0xFF: Reserved 0 or 1 Service Prioritization Rule Identifier. Add-Remove Rule. Reserved. Rule Precedence higher number means higher priority. Rule Output The value of, or method used to select, the 802.1Q C-TAG PCP output value. Rule Always Matches Reserved 17.2.71 DSCP Mapping Table TLV format Table 88 provides the definition for the DSCP Mapping Table TLV. Table 88. DSCP Mapping Table TLV Field / Name tlvType tlvLength Length 1 octet 2 octets Value 0xBA Variable Description DSCP Mapping Table TLV. Number of octets in ensuing field. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 143 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field / Name tlvValue DSCP PCP mapping Length 64 octets Value Description Each octet: 0x00 0x07 0x08 0xFF Reserved List of 64 PCP values (one octet per value) corresponding to the DSCP markings 0x00 to 0x3F, ordered by increasing DSCP Value. This table is used to select a PCP value if a Service Prioritization Rule specifies Rule Output: 0x08 17.2.72 AP Wi-Fi 6 Capabilities TLV format Table 89 provides the definition for the AP Wi-Fi 6 Capabilities TLV. Table 89. AP Wi-Fi 6 Capabilities TLV format Field / Name tlvType tlvLength tlvValue RUID Length 1 octet 2 octets 6 octets n Agent Role 1 octet bit 7-6 HE 160 HE 8080 MCS NSS Length MCS NSS bit 5 bit 4 bit 3-0 4 or 8 or 12 octets SU bit 7 Beamformer SU bit 6 Beamformee MU bit 5 Beamformer Status Beamformee bit 4 STS Less 80 Value 0xAA Variable Description AP Wi-Fi 6 Capabilities TLV. Number of octets in ensuing field. Any EUI-48 value Variable 0: Wi-Fi 6 support info for the AP role 1: Wi-Fi 6 support info for the non-AP STA role 2-3: Reserved 0: Not supported 1: Supported 0: Not supported 1: Supported Radio unique identifier of the radio for which HE capabilities are reported. Number of roles Multi-AP Agent's Role of Wi-Fi 6 operations Designation of the Wi-Fi 6 capabilities for a specific role, including AP role and/or backhaul STA role. Support for HE 160 MHz Support for HE 80+80 MHz Length of MCS NSS Variable 0: Not supported 1: Supported 0: Not supported 1: Supported 0: Not supported 1: Supported 0: Not supported 1: Supported Supported MCS and NSS Supported HE-MCS And NSS Set field as defined in Figure 9772d--Supported HE-MCS And NSS Set field format in [17]. HE-MCS And NSS Set field for 160MHz shall be present if 160MHz is supported. HE-MCS And NSS Set field for 80+80MHz shall be present if 80+80Mhz is supported. Support for SU Beamformer. Support for SU Beamformee Support for MU beamformer Status Support for Beamformee STS 80 MHz © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 144 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field / Name Length Beamformee bit 3 STS Greater 80 UL MU-MIMO bit 2 UL OFDMA bit 1 DL OFDMA bit 0 Max DL MUMIMO TX Max UL MUMIMO RX Max DL OFDMA TX Max UL OFDMA RX RTS bit 7-4 bit 3-0 1 octet 1 octet bit 7 MU RTS bit 6 Multi-BSSID bit 5 MU EDCA bit 4 TWT Requester TWT Responder bit 3 bit 2 bit 1-0 Value 0: Not supported 1: Supported 0: Not supported 1: Supported 0: Not supported 1: Supported 0: Not supported 1: Supported variable variable variable variable 0: Not supported 1: Supported 0: Not supported 1: Supported 0: Not supported 1: Supported 0: Not supported 1: Supported 0: Not supported 1: Supported 0: Not supported 1: Supported Description Support for Beamformee STS > 80 MHz Support for UL MU-MIMO Support for UL OFDMA. Support for DL OFDMA Max number of users supported per DL MU-MIMO TX in an AP role Max number of users supported per UL MU-MIMO RX in an AP role Max number of users supported per DL OFDMA TX in an AP role Max number of users supported per UL OFDMA RX in an AP role Support for RTS Support for MU RTS Support for Multi-BSSID Support for MU EDCA Support for TWT Requester Support for TWT Responder Reserved. The above 25 fields are repeated n-1 times, where n is the number of roles. 17.2.73 Associated Wi-Fi 6 STA Status Report TLV format Table 90 provides the definition for the Associated Wi-Fi 6 STA Status Report TLV. Table 90. Associated Wi-Fi 6 STA Status Report TLV format Field / Name tlvType tlvLength tlvValue MAC Address n TID Length 1 octet 2 octets 6 octets 1 octet 1 octet Value 0xB0 Variable Any EUI-48 value Variable Variable Description Associated Wi-Fi 6 STA Status Report TLV. Number of octets in ensuing tlvValue field. MAC address of the associated STA. n The TID of the corresponding Queue Size field © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 145 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field / Name Queue Size Length 1 octet Value Variable Description Queue Size for this TID. Its format is defined in Table 9-6--QoS Control field [1] The above two fields are repeated n-1 times 17.2.74 BSSID TLV format Table 91 provides the definition for the BSSID TLV. Table 91. BSSID TLV format Field / Name tlvType tlvLength tlvValue BSSID Length 1 octet 2 octets 6 octets Value 0xB8 6 Any EUI-48 value Description BSSID TLV. Number of octets in ensuing field. BSSID 17.2.75 BSS Configuration Report TLV format Table 92 provides the definition for the BSS Configuration Report TLV. Table 92. BSS Configuration Report TLV format BSSID TLV format Field / Name tlvType tlvLength tlvValue RUID Number BSS Length 1 octet 2 octets 1 octet 6 octets 1 octet BSSID 6 octets BackHaul BSS Bit 7 Fronthaul BSS Bit 6 R1 disallowed status R2 disallowed status Multiple BSSID Bit 5 Bit 4 Bit 3 Transmitted BSSID Bit 2 Bit 1-0 Bit 7-0 Value 0xB7 Variable Description BSS Configuration Report TLV. Number of octets in ensuing field. k Variable m Variable 0: in use 1: not in use 0: in use 1: not in use 0: allowed 1: disallowed 0: allowed 1: disallowed 0: Not-configured 1: Configured 0: Non-transmitted 1: Transmitted Number of radios reported. Radio Unique Identifier of a radio. Number of BSS (802.11 Local interfaces) currently operating on the radio. MAC Address of Local Interface (equal to BSSID) operating on the radio. Backhaul BSS Fronthaul BSS R1 disallowed status R2 disallowed status Multiple BSSID Set Transmitted BSSID Reserved Reserved © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 146 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field / Name SSID Length Value Description 1 octet n SSID length. n octets Variable SSID The above 10 fields are repeated m 1 times (if m = 0, these fields are omitted). The above 12 fields are repeated k 1 times. 17.2.76 Device Inventory TLV format Table 93 provides the definition for the Device Inventory TLV. Table 93. Device Inventory TLV Field / Name tlvType tlvLength tlvValue Length 1 octet 2 octets 1 octet Value 0xD4 Variable lsn Serial Number lsn octets (<= 64 octets) 1 octet Variable lsv Software Version lsv octets (<= 64 octets) 1 octet Variable lee Execution Env RUID lee octets (<= 64 octets) 1 octet 6 octets Variable k (>=1) Variable 1 octet lcv Chipset Vendor lcv octets (<= 64 octets) Variable The above 3 fields are repeated k-1 times Description Device Inventory TLV. Number of octets in ensuing field. Length of the SerialNumber string (octets). Less than or equal to 64. A string Identifying the particular device that is unique for the indicated model and manufacturer. Length of the SoftwareVersion string (octets). Less than or equal to 64. A string identifying the software version currently installed in the device (i.e. version of the overall device firmware). Length of the ExecutionEnv string (octets). Less than or equal to 64. A string identifying the execution environment (operating system) in the device. Number of radios Radio Unique Identifier of a radio for which ChipsetVendor information is being provided. Length of the ChipsetVendor string (octets). Less than or equal to 64. A string identifying the Wi-Fi chip vendor of this radio. 17.2.77 Agent List TLV format Table 94 provides the definition for the Agent List TLV. Table 94. Agent List TLV Field / Name tlvType tlvLength tlvValue Length 1 octet 2 octets Value 0xD5 variable Description Agent List TLV Number of octets in ensuing field. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 147 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field / Name Length Value Number of Agents MAC Address 1 octet 6 octets k Variable Multi-AP Profile Security 1 octet 0x00: Reserved 0x01: Multi-AP Profile1 0x02: Multi-AP Profile2 0x03: Multi-AP Profile3 0x04-0xFF: Reserved 1 octet 0x00: 1905 Security not enabled 0x01: 1905 Security enabled 0x02-0xFF Reserved The above 3 fields are repeated k-1 times Description Number of Multi-AP Agents present in this TLV AL MAC address of the Multi-AP Agent Highest profile supported by the Multi-AP Agent with the AL MAC equal to the field above as indicated in its Multi-AP Profile TLV. 17.2.78 AKM Suite Capabilities TLV format Table 95 provides the definition for the AKM Suite Capabilities TLV. Table 95. AKM Suite Capabilities TLV format Field / Name Length Value Description tlvType 1 octet 0xCC AKM Suite Capabilities TLV. tlvLength 2 octets Variable Number of octets in ensuing field. tlvValue Num Backhaul BSS AKM Suite Selectors BH OUI BH AKM Suite Type. 1 octet k Number of AKM suite selectors from Table 9-133 of [1] or Table 55 of [18] supported by the backhaul BSS of this Multi-AP Agent. 3 octets Any OUI value specified in Table 9-133 of [1] or Table 55 of [18]. 1 octet Any suite type value specified in Table 9-133 of [1] or Table 55 of [18]. The above two fields are repeated k-1 times (if k = 0, these fields are omitted). Num Fronthaul BSS AKM Suite Selectors FH OUI FH AKM Suite Type 1 octet r Number of AKM suite selectors from Table 9-133 of [1] or Table 55 of [18] supported by the fronthaul BSS of this Multi-AP Agent. 3 octets Any OUI value specified in Table 9-133 of [1] or Table 55 of [18]. 1 octet Any suite type value specified in Table 9-133 of [1] or Table 55 of [18]. The above two fields are repeated r-1 times (if r = 0, these fields are omitted). © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 148 of 163 Wi-Fi EasyMeshTM Specification v3.0 17.2.79 1905 Encap DPP TLV format Table 96 provides the definition for the 1905 Encap DPP TLV. Table 96. 1905 Encap DPP TLV format Field / Name tlvType tlvLength tlvValue Enrollee MAC Address Present DPP Frame Indicator Length 1 octet 2 octets bit 7 bit 6 bit 5 Destination STA MAC Address Frame Type bits 4-0 6 octets 1 octet Encapsulated frame length field Encapsulated frame 2 octet n octets Value 0xCD Variable Description Encap DPP TLV. Number of octets in ensuing field. 0 or 1 This is set to specify the address of the Enrollee Multi-AP Agent to the Proxy Agent and Multi-AP Controller 0: DPP Public Action frame 1: GAS frame 0 Variable Reserved Content type of the encapsulated DPP frame. Reserved. This field is present if the Enrollee MAC Address present bit is set to one Variable n If the DPP Frame Indicator (bit 5) is 0, this field is set to the DPP Public Action frame type (see Table 25 of [18]). Otherwise this field is set to 255. Length of encapsulated frame. Variable If bit 5=0, this field contains a DPP Public Action frame (see Table 29 of [18]) else this field contains a GAS frame that carries the DPP Configuration Protocol payload. 17.2.80 1905 Encap EAPOL TLV format Table 97 provides the definition for the 1905 Encap EAPOL TLV. Table 97. 1905 Encap EAPOL TLV format Field / Name tlvType tlvLength tlvValue EAPOL frame payload Length 1 octet 2 octets Variable Value 0xCE Variable Variable Description Encap EAPOL TLV. Number of octets in ensuing field. 17.2.81 DPP Bootstrapping URI Notification TLV Table 98 provides the definition for the DPP Bootstrapping URI Notification TLV. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 149 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field tlvType tlvLength tlvValue RUID BSSID Length 1 octet 2 octets 6 octets 6 octets bSTA Address 6 octets DPP URI n octets Table 98. DPP Bootstrapping URI Notification TLV format Value 0xCF Variable Description DPP Bootstrapping URI Notification TLV Number of octets in ensuing field. Variable Variable Variable Variable Radio Unique Identifier of a radio MAC Address of Local Interface (equal to BSSID) operating on the radio, on which the URI was received during PBC onboarding. MAC Address of backhaul STA from which the URI was received during PBC onboarding DPP URI received during PBC onboarding (note: format of URI is specified in section 5.2.1 of [18] 17.2.82 DPP CCE Indication TLV Table 99 provides the definition for the DPP CCE Indication TLV. Table 99. DPP CCE Indication TLV format Field / Name tlvType tlvLength tlvValue Advertise CCE Length 1 octet 2 octets 1 octet Value 0xD2 1 1: Enable 0: Disable Description DPP CCE Indication TLV Number of octets in ensuing field. Enable/Disable CCE advertisement in beacons and probe responses. 17.2.83 DPP Chirp Value TLV Table 100 provides the definition for the DPP Chirp Value TLV. Table 100. DPP Chirp Value TLV format Field tlvType tlvLength tlvValue Enrollee MAC Address Present Hash Validity Length 1 octet 2 octets bit 7 bit 6 Destination STA MAC Address Hash Length bit 5-0 6 octets 1 octet Value 0xD3 1 0 or 1 1: establish 0: purge 0 Variable k Description DPP Chirp Value TLV Number of octets in ensuing field. This is set to specify the address of the Enrollee Multi-AP Agent to the Proxy Agent and Multi-AP Controller Establish/purge any DPP authentication state pertaining to the hash value in this TLV Reserved This field is present if the Enrollee MAC Address present bit is set to one Indicates the length of the included hash value. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 150 of 163 Wi-Fi EasyMeshTM Specification v3.0 Field Hash Value Length k octets Value Variable Description Hash value is computed from public key of Enrollee (See Section 6.2.1 of [18]). 17.2.84 BSS Configuration Request TLV Table 101 provides the definition for the BSS Configuration Request TLV. Table 101. BSS Configuration Request TLV format Field Length tlvType 1 octet tlvLength 2 octets tlvValue DPP Configuration Request Object variable Value 0xBB variable variable Description BSS Configuration Request TLV Number of octets in ensuing field. One or more JSON encoded DPP Configuration Request Object attributes (See section 8.1 of [18]. 17.2.85 BSS Configuration Response TLV Table 102 provides the definition for the BSS Configuration Response TLV. Table 102. BSS Configuration Response TLV format Field tlvType tlvLength tlvValue DPP Configuration Object Length 1 octet 2 octets variable Value 0xBD variable variable Description BSS Configuration Response TLV Number of octets in ensuing field. One or more JSON encoded DPP Configuration Object attributes (See section 8.1 of [18]. 17.2.86 DPP Message TLV Table 103 provides the definition for the DPP Message TLV. Table 103. DPP Message TLV format Field tlvType tlvLength tlvValue DPP Frame Length 1 octet 2 octets variable Value 0xD1 variable variable Description DPP Message TLV Number of octets in ensuing field. DPP frame as defined in [18] © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 151 of 163 Wi-Fi EasyMeshTM Specification v3.0 18 Multi-AP Profiles A Multi-AP device shall implement all the mandatory functionalities in sections, sub-sections and in Table 104, as per the Multi-AP Profile it indicates in any Multi-AP Profile TLV (see section 17.2.47) and Multi-AP Profile subelement (see Table 15) it sends. A Multi-AP device includes a Multi-AP Profile TLV in every 1905 Topology Query message, 1905 Topology Response message, BSS Configuration Request, and 1905 AP-Autoconfiguration Search message it sends. If a Multi-AP device does not include a Multi-AP Profile TLV in any of those messages, the device implements only Profile-1. Additionally, a Multi-AP Controller includes a Multi-AP Profile TLV in every 1905 AP-Autoconfiguration Response message it sends. If a Multi-AP Controller does not include a Multi-AP Profile TLV in any AP-Autoconfiguration Response message it sends, the Controller implements only Profile-1. A Multi-AP Agent includes a Multi-AP Profile subelement in every (Re)-Association Request and Responses it sends. If a Multi-AP Agent does not include a Multi-AP Profile subelement in any of those frames, the Multi-AP Agent implements only Profile-1. If a Multi-AP device receives any of the aforementioned messages or frames that includes a Multi-AP Profile TLV or a Multi-AP Profile subelement, with the Multi-AP Profile field set to a reserved value, it shall assume that the sender of such a message or frame implements the same profile implemented by the recipient. A backhaul link between two Multi-AP devices is said to be a "Profile-X Backhaul", where "X" is the lowest of the profiles implemented by the two devices. An "X" in Table 104 indicates the profile(s) for which the function applies to. If a feature is not supported, the corresponding Capabilities TLV(s) is not sent. Table 104. Profile Section Applicability Function Multi-AP Onboarding DPP Backhaul STA and Multi-AP Agent secure onboarding 1905 CMDU adjustments (TLV>1492 octets) Order of Processing Multi-AP Discovery Multi-AP Profile Multi-AP Configuration Channel selection Co-ordinated CAC AP Capability Client Capability Link metric collection Data element support Channel scan Client steering Section 5 (5.1, 5.2) 5.3 Applicable to Multi-AP: Profile-1 Profile-2 Profile-3 X X See Profile-1 X 15.2 15.3 Table 4 X X See Profile-1 6.1, 6.2, 17.2.47, 18 X X 7 X X See Profile-1 8.1, 8.2 X X See Profile-1 8.1, 8.2.1, 9.1 9.1 X Check CAC Capabilities TLV, omit TLV if not supported. X X See Profile-1 9.2 X X See Profile-1 10.1, 10.2.1, 10.3, 10.4 X X See Profile-1 6.3, 7.3, 9.1, 10.2, 10.2.1, 10.3.1 7.3, 9.1, 10.2.2 X X X 11 X X See Profile-1 © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 152 of 163 Wi-Fi EasyMeshTM Specification v3.0 Function Section Wi-Fi Agile Multiband and tunneled message support 11.4, 11.5, 11.7 Backhaul optimization 12 Backhaul optimization by backhaul stations association control 1905-Layer Security Capability Message integrity code 1905-layer encryption 1905 CMDU adjustments (TLV>1492 octets) Order of Processing Four-address MAC header format 12.1 13.1, 13.2, 13.3, 15.2, 15.3 14 Multi-AP control messaging reliability 15.1 Higher layer data payload over 1905 16 Traffic separation general 7.1, 19 Traffic separation in presence of Multi-AP Agents with different capabilities Multi-AP message format 7.1, 7.2, 12.1 17 Service Prioritization 20 Applicable to Multi-AP: Profile-1 Profile-2 Profile-3 X X X See Profile-1 X X X X X X X See Profile-1 X X X X X See Table 16 See Table 16 See Table 16 X © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 153 of 163 Wi-Fi EasyMeshTM Specification v3.0 19 Traffic Separation 19.1 Traffic Separation in Multi-AP Network 19.1.1 Traffic Separation Overview (Informative) This informative description of traffic separation relies on terms defined in section 3.1. A Multi-AP Controller is able to configure multiple fronthaul SSIDs in a Multi-AP network. A Multi-AP Profile-2 Network Segment supports traffic separation for each fronthaul SSIDs using a unique VLAN. The traffic belonging to each VLAN is distinguished using an 802.1Q C-TAG with a unique VLAN ID, or the lack of thereof. The rules defined in section 19.1.3 ensure that traffic generated within a Multi-AP network is clearly identifiable as belonging to one SSID. Traffic generated outside of a Multi-AP network is tagged with a VLAN ID (or untagged as appropriate) prior to ingressing the Multi-AP network by means not defined in this specification and is expected to be identified as belonging to an SSID. A Multi-AP device is a layer-2 (Link Layer) logical device that can be embedded into a more complex physical device (e.g., a router, or a gateway) that implements both a Multi-AP Agent as well as other, above layer-2, functionalities. Often in this case, traffic generated outside of the network (e.g., ingressing thru the WAN interface) is classified by the gateway/routing subsystem and tagged (if needed) before being forwarded to the Multi-AP device subsystem. The abstract/logical interface between the Multi-AP subsystem and the rest of the device is considered a Multi-AP Logical Ethernet Interface as per the definition in section 3.1.3 and the rules in section 19.1.3. If Traffic Separation is not configured on a Multi-AP Agent that implements Profile-2, the Multi-AP Agent might behave in a transparent manner to VLAN tags applied by other entities. A Multi-AP Controller configures SSID to VLAN ID mapping in a Traffic Separation Policy. Each mapping from one or many SSIDs to one VLAN ID is indicated in a Traffic Separation Policy TLV. The Multi-AP Controller distributes the Traffic Separation Policy to all Multi-AP Agents. It is recommended that a Multi-AP Controller provides each Multi-AP Agent with a complete list of VLAN ID to SSID mappings, including those VIDs that are mapped to SSIDs that are not configured on a given Multi-AP Agent, to enable that traffic on all VIDs is forwarded over backhaul links. Multi-AP Agents report to the Multi-AP Controller the maximum number of VIDs they are able to configure in the Profile-2 AP Capability TLV. A Controller that intends to use more VIDs than those supported on some of the Multi-AP Agents it manages, may rearrange the topology in such a way that traffic for all VIDs downstream of a Multi-AP Agent can be forwarded by such Agent. For each Ingress Packet, a Multi-AP Agent adds an 802.1Q C-TAG with a VLAN ID as specified in a Traffic Separation Policy. For each Egress Packet, a Multi-AP Agent removes any 802.1Q C-TAG. For a packet to be transmitted on a Multi-AP Logical Ethernet Interface, if the VLAN ID in the 802.1Q C-TAG is set to one of the Secondary VLAN IDs, a Multi-AP Agent maintains the 802.1Q C-TAG on those packets. Multi-AP IEEE 1905.1 management frames are carried in the Primary Network. A Default 802.1Q Settings TLV identifies a Primary VLAN ID for tagging packets on the Primary Network. Traffic separation is not supported across a Multi-AP Agent that implements Profile-1. Therefore, a Multi-AP Controller should not configure any SSID that is mapped to a Secondary VLAN ID on any Multi-AP Agent that implements Profile-1 or on any Multi-AP Agent that is downstream of a Multi-AP Agent that implements Profile-1. If the location of the WAN connection in a network managed by a Multi-AP Controller changes (e.g., in order to use a backup WAN connection in the event the main WAN connection fails), the portions of the network where traffic separation is possible may change and the Multi-AP Controller may need to reconfigure the entire network accordingly, including Secondary SSIDs and VLAN(s). A Multi-AP Controller that reconfigures VLAN(s) in the entire Multi-AP Profile-2 Network Segment may reconfigure the traffic separation policy on the Multi-AP Agents, starting from those at the very end of the data-plane tree topology and finishing at the data-plane root. Failing to do so may result in the inability to deliver reconfiguration CMDUs to downstream Multi-AP Agents due to Primary VLAN ID mismatch. During VLAN reconfiguration data traffic loss may occur. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 154 of 163 Wi-Fi EasyMeshTM Specification v3.0 Figure 18 shows an example network configuration with traffic separation enabled. Figure 18. Example Network Configuration with Traffic Separation Enabled 19.1.1.1 Mixed backhaul and fronthaul (Informative) As a result of the rules detailed in section 19.1.3, when a Multi-AP Agent transmits a packet on a Profile-1 backhaul Wi-Fi Interface, it removes the 802.1Q C-VLAN tag. When a Multi-AP Agent transmits a packet on a Profile-2 backhaul Wi-Fi Interface it maintains the 802.1Q C-VLAN tag. When a BSS on a Multi-AP Agent has been configured as both fronthaul and backhaul BSS, the Multi-AP Agent removes the 802.1Q C-VLAN tag from the packets it transmits to a fronthaul STA. Some Multi-AP Agent implementations may be able to comply with the requirements described in section 19.1.3, while others may only be able to comply when all of the STAs associated with the same BSS require the same VLAN processing. A Multi-AP Agent indicates its traffic separation capabilities to the Controller within the AP Radio Advanced Capabilities TLV in the 1905 AP-Autoconfiguration WSC message or BSS Configuration Request. In a Multi-AP network where Traffic Separation is enabled and a single SSID is used as both fronthaul and backhaul, a Controller that configures a Multi-AP Agent that has reported Combined Front Back bit set to zero might achieve an equivalent topology by configuring this Multi-AP Agent with two BSSs, one used exclusively as fronthaul and one used exclusively as backhaul, both bearing the same SSID and credentials, on the same or on different radios, as permitted by the "Maximum number of BSSs" supported on each of the Multi-AP Agent's radios. In a Multi-AP network where Traffic Separation is enabled and both Profile-1 and Profile-2 Multi-AP Agents are expected to associate with the backhaul BSS, a Controller that configures a Multi-AP Agent that has reported Combined Profile-1 and Profile-2 bit set to zero might achieve an equivalent topology by configuring this Multi-AP Agent with two backhaul BSSs, both configured as backhaul with same SSID and credentials, one configured with Profile-1 bSTA Disallowed bit © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 155 of 163 Wi-Fi EasyMeshTM Specification v3.0 set to one and the other with Profile-2 bSTA Disallowed bit set to one, on the same or on different radios as permitted by the "Maximum number of BSSs" supported on each of the Multi-AP Agent's radios. Only Multi-AP Agents that report both the aforementioned Profile-1 bSTA Disallowed and Profile-2 bSTA Disallowed bits set to one can be expected to support Traffic separation on a BSS that combine fronthaul and Profile-2 backhaul, or fronthaul and Profile-1 backhaul and Profile-2 backhaul. In a Multi-AP network where Traffic Separation is enabled and a single SSID is used as both fronthaul and backhaul, and Multi-AP Agents implementing Profile-1 as well as Multi-AP Agents implementing Profile-2 are expected to associate with the backhaul SSID, a Multi-AP Controller that configures an Multi-AP Agent that has reported Combined Front Back bit set to zero, and/or Combined Profile-1 and Profile-2 bit set to zero might achieve an equivalent topology by configuring such Multi-AP Agent with three BSSs, one used exclusively as fronthaul, a second one used exclusively as backhaul with Profile-1 bSTA Disallowed bit set to one, and a third one used exclusively as backhaul with Profile-2 bSTA Disallowed bit set to one. All of the BSSs bear the same SSID and credentials, on the same or on different radios, as permitted by the "Maximum number of BSSs" supported on each of the Multi-AP Agent's radios. 19.1.2 Multi-AP Controller Requirements A Multi-AP Controller that implements Profile-2 configures Traffic Separation using an AP-Autoconfiguration WSC message, BSS Configuration Response message or a Multi-AP AP Policy Config Request message. If triggered, a Multi-AP Controller shall send a Traffic Separation Policy TLV to a Multi-AP Agent in a Multi-AP Policy Config Request message. If a Multi-AP Controller sends a message containing a Traffic Separation Policy TLV that has the Number of SSIDs field set to a non-zero value, it shall include a Default 802.1Q Settings TLV in the message. If a Multi-AP Controller sends a Traffic Separation Policy TLV to a Multi-AP Agent, it shall send a Traffic Separation Policy TLV that includes a set of unique VIDs that does not exceed the Max Total Number of VIDs reported in the most recent Profile-2 AP Capability TLV received from that Multi-AP Agent. If a Multi-AP Controller sends a Traffic Separation Policy TLV with the Number of SSIDs field set to a non-zero value to a Multi-AP Agent that has set the Combined Front Back bit and/or the Combined Profile-1 and Profile-2 bit to zero, the MultiAP Controller should avoid sending a set of BSS configuration and Traffic Separation Policies that the Multi-AP Agent has advertised as unsupported. Note: Multi-AP Agents that do not report both Combined Front Back bit set to one and Combined Profile-1 and Profile-2 bit set to one may be also unable to support traffic separation on combined fronthaul and Profile-2 backhaul. Agents that do not report both Combined Front Back bit set to one and Combined Profile-1 and Profile-2 bit set to one may be also unable to support traffic separation on combined fronthaul, Profile-1 backhaul and Profile-2 backhaul. If a Multi-AP Controller sends a Traffic Separation Policy TLV with the Number of SSIDs field set to a non-zero value and one or more M2 TLVs with bit 6 (Backhaul BSS) set to one and SSID assigned a Secondary VLAN ID as per the Traffic Separation Policy TLV, a Multi-AP Agent behavior is unspecified. If a Multi-AP Controller sends a 1905.1 packet, it shall send it on the Primary Network. In order to avoid transient misconfiguration, if the Traffic Separation configuration is known to a Multi-AP Controller at the time a new Multi-AP Agent is onboarded, the Multi-AP Controller may include the Traffic Separation Policy TLV and the Default 802.1Q Settings TLV in the onboarding messages (as per section 7.1). 19.1.3 Multi-AP Agent Requirements If a Multi-AP Agent receives a Multi-AP Policy Config Request message that includes a Traffic Separation Policy TLV, the Multi-AP Agent shall respond with a 1905 Ack message (per section 17.1.32) within one second and before implementing any policy in the received Multi-AP Policy Config Request message. A Multi-AP Agent may receive a Traffic Separation Policy TLV and a Default 802.1Q Settings TLV in any of the following messages: AP-Autoconfiguration WSC message (see section 7.1), BSS Configuration Response message (see section 17.1.54), Multi-AP Policy Config Request message (see section 7.3). Additionally, it may receive a Multi-AP Default © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 156 of 163 Wi-Fi EasyMeshTM Specification v3.0 802.1Q Setting subelement in (Re-)Association Response frames sent by Multi-AP Agents that implement Profile-2 (see section 5.2). The subsequent paragraphs in 19.1.3 apply to all the scenarios described above. If a Multi-AP Agent receives a Traffic Separation Policy TLV that includes a set of VIDs that exceeds the Max Total Number of unique VIDs the Multi-AP Agent supports, the Multi-AP Agent shall send an Error Response message per section 17.1.37 containing one Profile-2 Error Code TLV for each misconfigured BSS with reason code field set to 0x05 per section 17.2.51. If a Multi-AP Agent receives the Traffic Separation Policy TLV in a Multi-AP Policy Config Request message, the Multi-AP Agent shall discard the unsupported policy. If a Multi-AP Agent receives the Traffic Separation Policy TLV in an AP-Autoconfiguration WSC message, the Multi-AP Agent shall tear down the misconfigured BSS, as defined in sections 7.1. If a Multi-AP Agent is unable to configure one or more BSS as indicated by the received Traffic Separation Policy TLV and the combined fronthaul / Profile-1 backhaul / Profile-2 backhaul configuration, the Multi-AP Agent shall send an Error Response message per section 17.1.37 containing one Profile-2 Error Code TLV for each misconfigured BSS with reason code field set to 0x07 or 0x08 per section 17.2.51. If a Multi-AP Agent receives the Traffic Separation Policy TLV in a Multi-AP Policy Config Request message, the Multi-AP Agent shall discard the unsupported policy. If a Multi-AP Agent receives the Traffic Separation Policy TLV in an AP-Autoconfiguration WSC message, the Multi-AP Agent shall tear down the misconfigured BSS, as defined in section 7.1. If a Multi-AP Agent has not received a Multi-AP Default 802.1Q Setting subelement in the (Re-)Association Response frame, or a Traffic Separation Policy TLV, or the most recently received Traffic Separation Policy TLV has the Number of SSIDs field set to zero, the Multi-AP Agent shall consider the Primary VLAN ID not configured and may forward VLAN tagged packets received at the Fronthaul interface or Logical Ethernet interface, and shall not add, modify or remove any VLAN tag on any packets it sends or receives and shall not perform traffic separation on the basis of any VLAN tag present in a packet. If a Multi-AP Agent has received a Traffic Separation Policy and the most recently received Traffic Separation Policy defines at least one SSID to VLAN ID mapping, then it shall perform VLAN tag processing as described below. If a Multi-AP Agent sends a 1905.1 packet, it shall send it on the Primary Network. If no Primary VLAN ID is configured on this Multi-AP Agent, the Multi-AP Agent shall send these 1905 packets on a Wi-Fi backhaul link without an 802.1Q C-Tag. If a Primary VLAN ID is configured on this Multi-AP Agent, the Multi-AP Agent shall send these packets on a Wi-Fi backhaul link with an 802.1Q C-Tag with VLAN ID equal to the Primary VLAN ID. If a Multi-AP Agent generates a frame with EtherType 0x888E (EAPOL) on a Profile-2 Wi-Fi backhaul link and no Primary VLAN ID is configured, the Multi-AP Agent shall send these frames without an 802.1Q C-Tag. If a Multi-AP Agent configures a Primary VLAN ID, the Multi-AP Agent shall send EtherType 0x888E frames on a Profile-2 Wi-Fi backhaul link with an 802.1Q C-Tag with VLAN ID equal to the Primary VLAN ID. Backhaul STA behavior upon (re)association · If the Backhaul STA of a Multi-AP Agent has successfully associated with a Backhaul BSS whose latest (Re)Association Response frame contains a Multi-AP Default 802.1Q Setting subelement in the Multi-AP IE, with a Primary VLAN ID that differs from the one in use on the newly-associated Agent, or no Primary VLAN ID is configured on the newly-associated Agent, then the newly-associated Agent shall set its Primary VLAN ID to the value contained in the (Re)Association Response frame. · If the Backhaul STA of a Multi-AP Agent has successfully associated with a Backhaul BSS whose latest (Re)Association Response frame does not contain a Multi-AP Default 802.1Q Setting subelement in the Multi-AP IE and a Primary VLAN ID is configured on the newly-associated Agent, then the newly-associated Agent shall unconfigure its Primary VLAN ID and any Traffic Separation Policy until a Traffic Separation Policy is received from Controller. If a Multi-AP Agent has learned that the destination address of a packet is on one VLAN and the packet has an 802.1Q CTAG containing a different VLAN ID, the Multi-AP Agent shall discard the packet. Wi-Fi Backhaul · If a Multi-AP Agent receives a packet that is not classified as an Ingress Packet on a Wi-Fi Backhaul Interface (i.e. a Profile-2 backhaul), the Multi-AP Agent shall retain the existing VLAN ID in the 802.1Q C-TAG. A Multi-AP Agent may discard such packets if the 802.1Q C-TAG VLAN ID is not included in the most recently received Traffic Separation Policy TLV © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 157 of 163 Wi-Fi EasyMeshTM Specification v3.0 · If a Multi-AP Agent receives a packet that is classified as an Ingress Packet on a Wi-Fi Backhaul Interface (i.e. a Profile-1 backhaul), the Multi-AP Agent shall add an 802.1Q C-TAG onto the packet and set the VLAN ID to the Primary VLAN ID as specified in the Default 802.1Q Settings TLV. · If a Multi-AP Agent sends a packet that is not classified as an Egress Packet on a Wi-Fi Backhaul Interface (i.e. a Profile-2 backhaul), the Multi-AP Agent shall retain the existing 802.1Q C-TAG, leaving the VLAN ID unmodified. · If a Multi-AP Agent sends a packet that is classified as an Egress Packet on a Wi-Fi Backhaul Interface (i.e. a Profile-1 backhaul), the Multi-AP Agent shall remove the 802.1Q C-TAG on the packet. Wi-Fi Fronthaul · If a Multi-AP Agent receives a packet on a Wi-Fi Fronthaul Interface (i.e. from an associated non-backhaul STA) that has an 802.1Q VLAN Tag, it shall discard that packet. · If a Multi-AP Agent receives a packet on a Wi-Fi Fronthaul Interface (i.e. from an associated non-backhaul STA) without an existing 802.1Q VLAN Tag, the Multi-AP Agent shall add an 802.1Q C-TAG onto the packet. If the SSID of the Wi-Fi Fronthaul Interface is present in the Traffic Separation Policy TLV, the Multi-AP Agent shall tag the VLAN ID field with the VLAN ID specified in that VLAN ID field in the Traffic Separation Policy TLV that corresponds to the SSID of the Wi-Fi Fronthaul Interface. If the SSID of the Wi-Fi Fronthaul Interface is not present in the Traffic Separation Policy TLV, the Multi-AP Agent shall tag the VLAN ID field with the Primary VLAN ID as specified in the Default 802.1Q Settings TLV. · If a Multi-AP Agent sends a packet on a Wi-Fi Fronthaul Interface (i.e. to an associated non-backhaul STA), the Multi-AP Agent shall map the PCP field in the 802.1Q C-TAG to WMM (as specified in [12]) and then remove the 802.1Q C-TAG. Multi-AP Logical Ethernet · If a Multi-AP Agent receives a packet on a Multi-AP Logical Ethernet Interface and the packet does not have an 802.1Q VLAN Tag, the Multi-AP Agent shall add an 802.1Q C-TAG, setting the VLAN ID to the Primary VLAN ID and the PCP value to the Default PCP value specified in the Default 802.1Q Settings TLV. · If a Multi-AP Agent receives a packet on a Multi-AP Logical Ethernet Interface and the packet has an 802.1Q VLAN Tag and the first 802.1Q VLAN Tag in the packet is an 802.1Q C-TAG that contains a C-VID value of the Primary VLAN ID as specified in the Default 802.1Q Settings TLV, then the Multi-AP Agent shall not forward it on that same interface, with or without a VLAN tag. · If a Multi-AP Agent receives a packet on a Multi-AP Logical Ethernet Interface and the packet does not have an 802.1Q VLAN Tag, the Multi-AP Agent shall not forward it on that same interface, with or without a VLAN tag. · If a Multi-AP Agent receives a packet on a Multi-AP Logical Ethernet Interface and the packet has an 802.1Q VLAN Tag and the first 802.1Q VLAN Tag in the packet is an 802.1Q C-TAG that contains a C-VID value of a Secondary VLAN ID as specified in the Traffic Separation Policy, then the Multi-AP Agent shall retain the 802.1Q C-TAG. · If a Multi-AP Agent receives a packet on a Multi-AP Logical Ethernet Interface and the packet has an 802.1Q VLAN Tag and the first 802.1Q VLAN Tag is an 802.1Q C-TAG that contains a C-VID that is not listed in the Traffic Separation Policy, the Multi-AP Agent shall discard the packet. · If a Multi-AP Agent receives a packet on a Multi-AP Logical Ethernet Interface and the packet has an 802.1Q VLAN Tag and the first 802.1Q VLAN Tag is not an 802.1Q C-TAG, the Multi-AP Agent shall either discard the packet or strip the 802.1Q tag that is not a C-TAG and apply the rules described in this section to the resulting packet. · If a Multi-AP Agent sends a packet on a Multi-AP Logical Ethernet Interface and the packet has an 802.1Q C-TAG that contains a C-VID value of the Primary VLAN ID, the Multi-AP Agent shall remove that 802.1Q C-TAG.If a Multi-AP Agent sends a packet on a Multi-AP Logical Ethernet Interface and the packet has an 802.1Q C-TAG that contains a C-VID value of a Secondary VLAN ID, the Multi-AP Agent shall retain that 802.1Q C-TAG. 19.2 VLAN Tagging in Multi-AP A Multi-AP Agent applies 802.1Q C-TAGs as described below. If a Multi-AP Agent includes an 802.1Q C-TAG in an IEEE 802.11 frame, the Multi-AP Agent shall insert the tag as the first and only VLAN tag following the SNAP Extension header as shown in Figure 19. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 158 of 163 Wi-Fi EasyMeshTM Specification v3.0 Figure 19. IEEE 802.11 frame with 802.1Q C-TAG If a Multi-AP Agent includes an 802.1Q C-TAG in an Ethernet frame, the Multi-AP Agent shall insert the tag as the first and only VLAN tag following the source MAC address as shown in Figure 20. Figure 20. Ethernet frame with 802.1Q C-TAG If a Multi-AP Agent includes an 802.1Q C-TAG in a frame, it shall set the Drop Eligible Indicator (DEI) bit to 0. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 159 of 163 Wi-Fi EasyMeshTM Specification v3.0 20 Service Prioritization 20.1 Service Prioritization in Multi-AP Network (Informative) A Multi-AP network provides service prioritization support for traffic in which a Multi-AP Controller can instruct a Multi-AP Agent to prioritize specified traffic using a set of Service Prioritization Rules. A Multi-AP Agent examines all Ingress Packets. If the packet matches a Service Prioritization Rule, the Multi-AP Agent marks the packet with a PCP value in the packet's 802.1Q C-TAG. Within a Multi-AP Profile-2 Network Segment, a Multi-AP Agent maps 802.1Q C-TAG PCP values to 802.11 User Priority / Access Categories based on Table 105. A Multi-AP Agent provides the corresponding QoS treatment to process packets in compliance with WMM [12] on Wi-Fi links. On non-Wi-Fi links, implementers may map the 802.1Q C-TAG PCP field to the link-level QoS mechanism used on that technology. 20.2 Service Prioritization Operation 20.2.1 Multi-AP Controller Requirements If triggered, a Multi-AP Controller shall send Service Prioritization Rule TLV to a Multi-AP Agent using a Service Prioritization Request message (see section 17.1.47). If a Multi-AP Controller sends to a Multi-AP Agent a Service Prioritization Request message that contains a Service Prioritization Rule TLV, the Multi-AP Controller should ensure that the Service Prioritization Rule TLV is compatible with the Multi-AP Agent's capabilities as identified in the most recent AP Capability Report message received from that MultiAP Agent. A Multi-AP Controller shall assign a unique Service Prioritization Rule ID for each Service Prioritization Rule in a Service Prioritization Request message. If a Multi-AP Controller sends a Service Prioritization Request Message, it may include one DSCP Mapping Table TLV (see section 17.2.71). 20.2.2 Multi-AP Agent Requirements 20.2.2.1 Configuration of Service Prioritization Rules If a Multi-AP Agent receives a Service Prioritization Request message from the Multi-AP Controller, it shall respond within one second with a 1905 Ack message per section 17.1.32. If the received set of Service Prioritization Rule TLVs in the Service Prioritization Request message exceeds the Multi-AP Agent's declared capabilities, it shall also respond with an Error Response message per section 17.1.37 containing one or more Profile-2 Error Code TLVs as described below. The Error Report message shall contain the same MID that was received in the Service Prioritization Request message. If a Multi-AP Agent receives a Service Prioritization Rule TLV in a Service Prioritization Request message from the MultiAP Controller, it shall process that TLV as follows: · If the Add-Remove Rule bit in the Service Prioritization Rule TLV is set to one: If the number of stored Service Prioritization Rules has reached the Max Total Number Service Prioritization Rules supported by the Multi-AP Agent and the Service Prioritization Rule does not have the same Service Prioritization Rule ID as an existing rule, the Multi-AP Agent shall send an Error Response message including a Profile-2 Error Code TLV with the reason code field set to 0x02 and the Service Prioritization Rule ID field set to the Service Prioritization Rule ID per section 17.2.51 and shall discard the rule. If the Service Prioritization Rule has the same Service Prioritization Rule ID as an existing rule, the Multi-AP Agent shall overwrite the existing rule with this Service Prioritization Rule. Otherwise, the Multi-AP Agent shall add this Service Priorotization Rule as a new rule. If the Always Matches bit is set to zero, a Multi-AP Agent may choose to not install such a rule. · If the Add-Remove Rule bit in the Service Prioritization Rule TLV is set to zero: © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 160 of 163 Wi-Fi EasyMeshTM Specification v3.0 If the Service Prioritization Rule ID is found, the Multi-AP Agent shall remove this Service Prioritization Rule. If the Service Prioritization Rule ID is not found, the Multi-AP Agent shall include a Profile-2 Error Code TLV with the reason code field set to 0x01 and the Service Prioritization Rule ID field set to the Service Prioritization Rule ID per section 17.2.36 in the Error Response message. 20.2.2.2 Application of Service Prioritization Rules If a Multi-AP Agent receives a packet that is not an Ingress Packet, it shall not modify the PCP value in any VLAN tag on the packet. If a Multi-AP Agent receives an Ingress Packet, it shall apply the following procedure. A Multi-AP Agent shall compare each Ingress Packet to each stored Service Prioritization Rule in the order of decreasing Rule Precedence value. A Multi-AP Agent shall evaluate a Service Prioritization Rule as matching or not matching as follows: · If the Always Matches bit is set to one, the Multi-AP Agent shall evaluate the rule as matching. · If the Always Matches bit is set to zero, the Multi-AP Agent shall evaluate the rule as not matching. If a Multi-AP Agent evaluates a rule as matching, it shall set the PCP field in the 802.1Q C-TAG according to the Rule Output value and stop any further rule processing. The Rule Output value indicates one of the following operations: · 0x00 ~ 0x07: Use this literal value as the output PCP value · 0x08: If a DSCP Value [24] is present in the source packet and the Multi-AP Agent has received a DSCP Mapping Table TLV from the Multi-AP Controller, the Multi-AP Agent shall lookup that DSCP Value in the DSCP to PCP mapping table provided in the most recently received DSCP Mapping Table TLV and use the corresponding PCP as the output PCP value. Otherwise, it shall use the default PCP value as the output PCP value. · 0x09: If UP is defined in the 802.11 QoS Control field of the source packet, the Multi-AP Agent shall use that UP as the output PCP value, otherwise it shall use the default PCP value as the output PCP value. If a packet does not match any Service Prioritization Rule, a Multi-AP Agent shall mark the packet with the Default PCP. If a Multi-AP Agent sends a packet over a Wi-Fi link, the Multi-AP Agent shall map from PCP to WMM UP / AC according to Table 105 and then process packets in compliance with WMM [12]. If a Multi-AP Agent sends a packet over a non-Wi-Fi interface, the Multi-AP Agent should map from PCP to the specific QoS supported on the link level technology in use. Table 105. 802.1Q C-TAG PCP to WMM UP & AC Mapping Priority 802.1Q C-TAG PCP Value WMM UP 802.11 EDCA Access Category Designation Lowest 1 2 0 3 4 5 6 Highest 7 1 BK Background 2 BK Background 0 BE Best Effort 3 BE Best Effort 4 VI Video (alternate) 5 VI Video (primary) 6 VO Voice (primary) 7 VO Voice (alternate) © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 161 of 163 Wi-Fi EasyMeshTM Specification v3.0 Appendix A (Informative) Miscellaneous A.1 Higher layer protocol field definition (see section 16) Table 106 lists the values that are reserved for the 1-octet higher layer protocol field. Table 106. Higher layer protocol field definition Value 0x00 0x01 0x02 0xFF Definition Reserved. TR-181 transport protocol. Reserved. A.2 Indication of associated 802.11 clients When a Multi-AP Agent sends a Topology Response message per [1], the non-1905 neighbor device list TLV may be reporting all MAC addresses it has observed that do not also indicate a 1905 AL MAC address. This might include 802.11 clients directly associated with one of the BSS(s) operated by the Multi-AP Agent as well as "behind" 802.11 clients which are connected through another Multi-AP Agent that is connected to this Multi-AP device. As a result, the recipient of the non-1905 neighbor device list TLV in a Topology Response message might not be able to determine the exact Multi-AP device a given 802.11 client is associated with based on this message. The Associated Clients TLV in the 1905 Topology Response message allows a Multi-AP Agent to unequivocally indicate which 802.11 clients are directly associated to each BSS operating on that Multi-AP device. A.3 Implementation Notes (Informative) A.3.1 Traffic Separation Implementers of Multi-AP Controllers managing networks where Traffic Separation is enabled and where Agents are daisy chained (over Wi-Fi or Ethernet backhaul) are reminded that, in order to maintain traffic separation across those backhaul links, a traffic separation policy containing all VIDs in use in the entire network should be sent to each Agent, even where those Agents are not configured to support the corresponding fronthaul SSIDs. Note that, depending on the max number of VIDs advertised by such an Agent, some topologies may not be properly supported, and a topology change through Backhaul optimization and/or BSS reconfiguration may be necessary. Implementers of Multi-AP Agents are reminded that the Agents may receive Traffic Separation policies containing SSID to VLAN ID mappings for SSIDs that are not configured on the Agent. Implementers of Multi-AP Agents are reminded that a BSS will receive both tagged and untagged EAPOL (0x888E) frames (e.g., when Traffic Separation is configured and the same BSS is configured to allow association of both Profile-1 and Profile-2 bSTAs). Implementers need to ensure that received EAPOL frames are properly processed by Supplicant/Authenticator irrespective of whether or not they are tagged. A.3.2 Controller implementation for Policy Set Up Implementers of Multi-AP Controllers are reminded that correct sequencing of policy messaging to Agents is essential. When changing the Traffic Separation policies on an existing Multi-AP network, Multi-AP Agents topologically furthest from the Controller should be configured before Multi-AP Agents closer to the controller. A.3.3 Fragmentation of IEEE 1905 Implementers of Multi-AP device should be aware that some Profile-1 devices may send a fragmented CMDU with the lastFragmentIndicator set to zero and an End of Message TLV. A.3.4 Multi-AP Logical Ethernet Interfaces © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 162 of 163 Wi-Fi EasyMeshTM Specification v3.0 A Multi-AP Logical Ethernet Interface is an interface designed to be used for connecting a Multi-AP Agent to other MultiAP devices. Implementers are reminded that users may also connect other LAN devices to these interfaces. Implementers of Multi-AP Agents should note that not all Logical Ethernet Interfaces are considered to be Multi-AP Logical Ethernet Interfaces. In particular, a WAN interface on a residential gateway would not normally be considered to be a Multi-AP Logical Ethernet Interface, in which case the requirements in this specification (particularly those relating to VLAN processing for Traffic Separation) would not apply. Implementers need to indicate in the certification process which Logical Ethernet Interfaces are to be tested as Multi-AP Logical Ethernet Interfaces. A.3.5 Primary Channel for Operating Classes Greater than 40 MHz The Multi-AP Controller can indicate its preference for a specific primary channel for a greater than 40 MHz (e.g., 80 MHz, 160 MHz) operation by including two operating classes in the Channel Preference TLV, one for the larger bandwidth and one for the 20 MHz primary channel. For example, include opclass 128 with channel numbers 58, 106, 122, 138, and 155 with preference values 1 (implying 42 is the most preferred) and opclass 115 with channel numbers 36, 44, and 48 with preferences 1 (implying 40 is the most preferred) to indicate to the Multi-AP Agent that 80 MHz operation with channel number 40 as the Primary Channel is the most preferred. © 2020 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 163 of 163Microsoft Word for Microsoft 365