Wi-Fi EasyMesh Specification v3
Wi-Fi EasyMesh Specification v3
Wi-Fi EasyMesh Specification v3
Specification
Version 3.0
Wi-Fi Alliance has not conducted an independent intellectual property rights ("IPR") review of this document
and the information contained herein, and makes no representations or warranties regarding IPR, including
without limitation patents, copyrights or trade secret rights. This document may contain inventions for which
you must obtain licenses from third parties before making, using or selling the inventions.
Wi-Fi Alliance owns the copyright in this document and reserves all rights therein. A user of this document
may duplicate and distribute copies of the document in connection with the authorized uses described
herein, provided any duplication in whole or in part includes the copyright notice and the disclaimer text set
forth herein. Unless prior written permission has been received from Wi-Fi Alliance, any other use of this
document and all other duplication and distribution of this document are prohibited. Unauthorized use,
duplication, or distribution is an infringement of Wi-Fi Alliance’s copyright.
Table of contents
1 OVERVIEW................................................................................................................................................................. 11
1.1 Scope .......................................................................................................................................................... 11
1.2 Purpose ....................................................................................................................................................... 11
2 REFERENCES ........................................................................................................................................................... 12
3 DEFINITIONS AND ACRONYMS .............................................................................................................................. 14
3.1.1 Shall/should/may/might word usage .............................................................................................. 14
3.1.2 Conventions ................................................................................................................................... 14
3.1.3 Definitions ...................................................................................................................................... 14
3.1.4 Abbreviations and acronyms.......................................................................................................... 17
4 ARCHITECTURE ........................................................................................................................................................ 19
4.1 Multi-AP architecture ................................................................................................................................... 19
4.1.1 Multi-AP example deployment ....................................................................................................... 19
5 MULTI-AP ONBOARDING ......................................................................................................................................... 23
5.1 1905 Push Button Configuration method .................................................................................................... 23
5.2 PBC Backhaul STA onboarding procedure................................................................................................. 23
5.3 DPP Backhaul STA and Multi-AP Agent secure onboarding ...................................................................... 26
5.3.1 Overview of DPP onboarding procedure (Informative) .................................................................. 26
5.3.2 Data structures used in DPP onboarding ...................................................................................... 29
5.3.3 Requirements for devices using DPP onboarding procedures ...................................................... 33
5.3.4 Onboarding method via Wi-Fi with out-of-band DPP bootstrapping .............................................. 34
5.3.5 Onboarding Method via a Multi-AP Logical Ethernet Interface with out-of-band DPP bootstrapping
....................................................................................................................................................... 39
5.3.6 Onboarding method via Wi-Fi with inband DPP bootstrapping using Push Button ....................... 42
5.3.7 Establishing secure 1905-layer connectivity .................................................................................. 43
5.3.8 Fronthaul BSS and Backhaul BSS configuration ........................................................................... 45
5.3.9 DPP onboarding after Profile-1 or Profile-2 onboarding ................................................................ 46
5.3.10 DPP reconfiguration ...................................................................................................................... 47
5.3.11 Onboarding DPP capable client devices (STAs) .......................................................................... 49
6 MULTI-AP DISCOVERY ............................................................................................................................................. 51
6.1 Multi-AP controller discovery ...................................................................................................................... 51
6.2 Multi-AP service discovery .......................................................................................................................... 52
6.3 Client association and disassociation notification ....................................................................................... 52
7 MULTI-AP CONFIGURATION .................................................................................................................................... 54
7.1 AP configuration .......................................................................................................................................... 54
7.2 AP operational BSS reporting ..................................................................................................................... 56
7.3 Policy configuration ..................................................................................................................................... 56
8 CHANNEL SELECTION ............................................................................................................................................. 58
8.1 Channel Preference Query and Report ...................................................................................................... 58
8.2 Channel Selection Request and Report...................................................................................................... 59
8.2.1 Coordinated DFS CAC ................................................................................................................... 60
8.2.2 DFS CAC Scan Requirements on a Multi-AP Controller ............................................................... 60
8.2.3 DFS CAC Scan Requirements on a Multi-AP Agent ..................................................................... 60
9 CAPABILITY INFORMATION REPORTING .............................................................................................................. 62
9.1 AP capability ............................................................................................................................................... 62
9.2 Client capability ........................................................................................................................................... 62
9.3 Backhaul STA capability ............................................................................................................................. 63
10 LINK METRIC COLLECTION ..................................................................................................................................... 64
10.1 Backhaul link metrics .................................................................................................................................. 64
10.2 Per-AP metrics and bulk STA metrics......................................................................................................... 64
List of tables
Table 1. Definitions ................................................................................................................................................... 14
Table 2. Abbreviations and acronyms ....................................................................................................................... 17
Table 3. Multi-AP IE format ....................................................................................................................................... 25
Table 4. Multi-AP Default 802.1Q Setting subelement format .................................................................................. 25
Table 5. DPP Configuration Request object ............................................................................................................. 29
Table 6. DPP Configuration Object parameters........................................................................................................ 30
Table 7. DPP Connector Body object format ............................................................................................................ 32
Table 8. netRole Compatibility .................................................................................................................................. 34
Table 9. 1905 GTK KDE selectors ............................................................................................................................ 44
Table 10. 1905 GTK KDE format ................................................................................................................................ 44
Table 11. netRole compatibility for reconfiguration ..................................................................................................... 47
Table 12. Extension of 1905 Media type Table 6-12 in [2] ......................................................................................... 51
Table 13. Extension of Authentication Types Table 32 in [5]...................................................................................... 54
Table 14. Multi-AP Extension subelement .................................................................................................................. 55
Table 15. Multi-AP Profile subelement ........................................................................................................................ 56
Table 16. Message types ............................................................................................................................................ 88
Table 17. Table of TLVs ............................................................................................................................................ 102
Table 18. SupportedService TLV format ................................................................................................................... 104
Table 19. SearchedService TLV format .................................................................................................................... 104
Table 20. AP Radio Identifier TLV format ................................................................................................................. 105
Table 21. AP Operational BSS TLV format............................................................................................................... 105
Table 22. Associated Clients TLV format .................................................................................................................. 105
Table 23. AP Capability TLV format .......................................................................................................................... 106
Table 24. AP Radio Basic Capabilities TLV format................................................................................................... 106
Table 25. AP HT Capabilities TLV format ................................................................................................................. 107
Table 26. AP VHT Capabilities TLV format ............................................................................................................... 107
Table 27. AP HE Capabilities TLV format ................................................................................................................. 108
Table 28. Steering Policy TLV format ....................................................................................................................... 110
Table 29. Metric Reporting Policy TLV format .......................................................................................................... 110
Table 30. Channel Preference TLV format ............................................................................................................... 112
Table 31. Radio Operation Restriction TLV format ................................................................................................... 113
Table 32. Transmit Power Limit TLV format ............................................................................................................. 114
Table 33. Channel Selection Response TLV format ................................................................................................. 114
Table 34. Operating Channel Report TLV format ..................................................................................................... 115
Table 35. Client Info TLV format ............................................................................................................................... 115
Table 36. Client Capability Report TLV format ......................................................................................................... 115
Table 37. Client Association Event TLV format ........................................................................................................ 116
Table 38. AP Metric Query TLV format ..................................................................................................................... 116
Table 39. AP Metrics TLV format .............................................................................................................................. 116
Table 40. STA MAC Address Type TLV format ........................................................................................................ 117
Table 41. Associated STA Link Metrics TLV format ................................................................................................. 117
Table 42. Unassociated STA Link Metrics Query TLV format .................................................................................. 118
Table 43. Unassociated STA Link Metrics Response TLV format ............................................................................ 118
Table 44. Beacon Metrics Query TLV format............................................................................................................ 119
Table 45. Beacon Metrics Response TLV format ..................................................................................................... 120
Table 46. Steering Request TLV format ................................................................................................................... 120
Table 47. Steering BTM Report TLV format ............................................................................................................. 121
Table 48. Client Association Control Request TLV format ....................................................................................... 122
Table 49. Backhaul Steering Request TLV format.................................................................................................... 122
Table 50. Backhaul Steering Response TLV format ................................................................................................. 122
Table 51. Higher Layer Data TLV format .................................................................................................................. 123
Table 52. Associated STA Traffic Stats TLV............................................................................................................. 123
Table 53. Error Code TLV format .............................................................................................................................. 124
Table 54. Channel Scan Reporting Policy TLV......................................................................................................... 125
Table 55. Channel Scan Capabilities TLV ................................................................................................................ 125
Table 56. Channel Scan Request TLV ..................................................................................................................... 126
List of figures
Figure 1. Multi-AP example deployment 1 ................................................................................................................. 20
Figure 2. Multi-AP example deployment 2 ................................................................................................................. 21
Figure 3. Multi-AP example deployment 3 ................................................................................................................. 22
Figure 4. Onboarding/Configuring BSS ...................................................................................................................... 24
1 Overview
1.1 Scope
This document is the specification for Wi-Fi CERTIFIED EasyMesh™, the Wi-Fi Alliance® certification program based on
Wi-Fi EasyMesh™. This specification defines the control protocols between Wi-Fi® access points (APs) as well as the
data objects necessary to enable onboarding, provisioning, control and management of multiple APs. This specification
also defines the mechanism to route traffic between Wi-Fi access points within the Multi-AP network. The term "Multi-AP"
found throughout this document is interchangeable with "Wi-Fi EasyMesh".
1.2 Purpose
The purpose of this specification is to enable interoperability across Wi-Fi access points (APs) from different vendors in a
Wi-Fi network deployment comprising multiple APs.
2 References
[1] IEEE Computer Society, “IEEE Standard for Information Technology – Telecommunications and Information
Exchange Between Systems – Local and Metropolitan Area Networks – Specific requirements Part 11: Wireless LAN
Medium Access Control (MAC) and Physical Layer (PHY) Specifications,” (IEEE Std. 802.11-2016)
(https://standards.ieee.org/findstds/standard/802.11-2016.html)
[2] IEEE Std 1905.1™-2013, IEEE Standard for a Convergent Digital Home Network for Heterogeneous Technologies
(https://standards.ieee.org/findstds/standard/1905.1-2013.html)
[4] TR-181 Device Data Model for TR-069 2016, Issue: 2 Amendment 11 Issue Date: July 2016 (https://www.broadband-
forum.org/technical/download/TR-181_Issue-2_Amendment-11.pdf)
[6] ISO 3166-1, “Codes for the representation of names of countries and their subdivisions—Part 1: Country codes”
(https://www.iso.org/standard/63545.html)
[7] IEEE 802.1Q-2018 - IEEE Standard for Local and Metropolitan Area Networks—Bridges and Bridged Networks,
(https://standards.ieee.org/standard/802_1Q-2018.html)
[11] IEEE 1905.1a-2014, IEEE Standard for a Convergent Digital Home Network for Heterogeneous Technologies
Amendment 1: Support of New MAC/PHYs and Enhancements (https://standards.ieee.org/standard/1905_1a-
2014.html)
[14] IETF RFC 3339, Date and Time on the Internet: Timestamps, https://tools.ietf.org/html/rfc3339
[15] Synthetic Initialization Vector (SIV) Authenticated Encryption Using the Advanced Encryption Standard (AES), RFC
5297 (https://tools.ietf.org/html/rfc5297)
[16] US Secure Hash Algorithms (SHA and HMAC-SHA), RFC 4634 (https://tools.ietf.org/html/rfc4634)
[17] IEEE Std 802.11™ax - IEEE Standard for Local and Metropolitan Area Networks -Specific requirements, Part 11:
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
(http://grouper.ieee.org/groups/802/11/)
[19] RFC 4648, The Base16, Base32, and Base64 Data Encodings, October 2006 (https://tools.ietf.org/html/rfc4648)
[20] RFC 7517, The JSON Web Key (JWK), May 2015 (https://tools.ietf.org/html/rfc7517)
© 2020 Wi-Fi Alliance. All Rights Reserved.
Used with the permission of Wi-Fi Alliance under the terms as stated in this document.
Page 12 of 163
Wi-Fi EasyMesh™ Specification v3.0
[21] RFC 3986, Uniform Resource Identifier (URI): Generic Syntax, January 2005, (https://tools.ietf.org/html/rfc3986)
[22] RFC 7159, The JavaScript Object Notation (JSON) Data Interchange Format, March 2014,
(https://tools.ietf.org/html/rfc7159)
[24] IETF RFC 2474 “Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers,
(https://tools.ietf.org/html/rfc2474)
3.1.2 Conventions
The ordering of bits and bytes in the fields within TLVs, information elements and attributes shall follow the conventions in
[2] unless otherwise stated.
The word ignored shall be used to describe bits, bytes, fields or parameters whose values are not verified by the recipient.
The word reserved shall be used to describe objects (bits, bytes, or fields or their assigned values) whose usage and
interpretation will be defined in the future by this specification or by other technical specifications/bulletins. A reserved
object shall be set to zero unless otherwise stated. The recipient of a reserved object shall ignore its value unless that
object becomes defined at a later date. The sender of an object defined by this technical specification shall not use a
reserved code value.
3.1.3 Definitions
The definitions in Table 1 are applicable to this specification.
Table 1. Definitions
Term Definition
1905 4-way handshake The 4-way handshake procedure per section 12.7.6.4 of [1] with a 1905 PMK to
establish a 1905 PTK and 1905 GTK
1905 GTK A 256-bit Group Transient Key derived by the Multi-AP Controller
1905 PMK A 256-bit Pairwise Master Key generated during the 1905-layer DPP Network
Introduction protocol
1905 PTK A 512-bit Pairwise Transient Key generated during the 1905 4-way handshake using a
1905 PMK
1905 TK A 256-bit Transient Key derived from the 1905 PTK as per section 12.7.1.3 of [1]
802.1Q C-TAG A Customer Virtual Local Area Network [C-VLAN] tag as specified in section 3.58 of [7].
802.1Q C-VID A Customer Virtual Local Area Network [C-VLAN] identifier as specified in section 3.57
of [7].
802.1Q VLAN Tag Any VLAN tag specified in [7], including C-VLAN and S-VLAN tags.
Air Time The time-frequency spectral resources, normalized to the operating bandwidth of the
BSS. Therefore, if the predicted bandwidth of backhaul transmissions is less than the
BSS operating bandwidth (e.g. due to dynamic bandwidth adjustment and/or HE
OFDMA allocation), this is factored in to the percentage of air time indicated.
Available Channel A channel that the Multi-AP Agent can actively use immediately without needing to
perform a CAC.
Term Definition
backhaul link A Wi-Fi link or wired Logical Ethernet Link between two Multi-AP devices in a Multi-AP
network.
backhaul SSID A Wi-Fi SSID used for a Wi-Fi backhaul link that is either the same or different from the
fronthaul SSID.
backhaul STA A STA on a Multi-AP device with a Multi-AP Agent that provides Wi-Fi connectivity with
other Wi-Fi access points over the backhaul link.
CAC Completion Action The action a Multi-AP Agent takes upon completing a CAC. CAC completion actions
include remaining on the channel where the CAC was performed and continuing to
monitor for radar, or returning to the previous state before the CAC was started.
Channel Availability Check (CAC) Period of time during which a radio in a Multi-AP Agent monitors for radar, without
sending or receiving traffic on the channel being monitored for radar.
Continuous CAC A method of performing a Channel Availability Check (CAC) in which one of the radios
that would normally be used for communication ceases normal operation and listens
continuously on the channel being CAC’ed. Using this method, the radio is not available
for any other purpose while the CAC is being performed.
Continuous CAC with dedicated radio A method of performing a Channel Availability Check (CAC) in which the device
performing the CAC employs an additional radio, that has not been in use for
communication, to perform the CAC. The additional radio allows the CAC to be
performed while the device continues to operate with the equivalent capabilities as when
it is not performing a CAC.
Controller DFS Channel Clear Indication An indication provided by the Multi-AP Controller to a Multi-AP Agent as part of a
Channel Preference TLV within a Channel Selection Request message that indicates
that the Multi-AP Agent may begin operating on that channel without having to perform a
CAC.
DSCP Value The 6-bit Differentiated Services Codepoint field value in the IP packet header as
defined by [24].
Egress Packet Any packet leaving a Multi-AP Profile-2 Network Segment via an interface of a Multi-AP
Agent that implements Profile-2, including all packets sent on the Wi-Fi fronthaul,
Profile-1 Wi-Fi backhaul or any packet sent on a Multi-AP Logical Ethernet Interface that
are being carried over the Primary VLAN.
Enrollee Multi-AP Agent A Multi-AP Agent that is seeking to be or is in the process of being DPP onboarded to
the Multi-AP network.
fronthaul AP An access point (AP) of a Multi-AP device that provides Wi-Fi connectivity to client
stations (STAs) and/or backhaul STAs.
Independent Channel Scan A channel scan initiated by the Multi-AP Agent performing the scan (rather than by the
Multi-AP Controller).
Inoperable channel A channel that a device is temporarily not able to operate on due to reasons such as
regulatory restrictions or radio environment.
In-Service Monitoring Period of time during which a radio in a Multi-AP Agent monitors for radar while
transmitting and receiving traffic on the channel being monitored.
Ingress Packet Any packet generated locally by a Multi-AP Agent that implements Profile-2 or any
packet entering a Multi-AP Profile-2 Network Segment via an interface of a Multi-AP
Agent that implements Profile-2, including any packet received on, Wi-Fi fronthaul or
Profile-1 Wi-Fi backhaul or any packet received on a Multi-AP Logical Ethernet Interface
that is not tagged as belonging to a Secondary VLAN.
Logical Ethernet Interface An interface onto a Logical Ethernet Link.
Logical Ethernet Link A wired connection that may be Ethernet, Multimedia over Coax Alliance (MoCA), power
line communication (PLC) or equivalent.
MIMO Dimension reduced CAC A method of performing a Channel Availability Check (CAC) in which the device
performing the CAC employs one receiving chain from one of the radios to perform the
Term Definition
CAC. Using this method, the Rx MIMO capability of the radio performing the CAC is
reduced by one while the CAC is being performed.
Multi-AP Agent A Multi-AP compliant logical entity that executes AP control functions and provides
Multi-AP specific control information.
Multi-AP Controller A Multi-AP compliant logical entity that implements logic for controlling the operation of
the Multi-AP network.
Multi-AP device A Multi-AP physical entity that may contain a Multi-AP Controller only, a Multi-AP Agent
only or both Multi-AP Controller and Multi-AP Agent.
Multi-AP Logical Ethernet Interface A Logical Ethernet Interface that connects Multi-AP devices.
Multi-AP network A Wi-Fi network deployment comprising of one or more Multi-AP devices.
Multi-AP Profile-2 Network Segment A set of Multi-AP Agents that implements Profile-2 that are connected to each other by a
set of Wi-Fi or Logical Ethernet Links where those links do not pass through a Multi-AP
Agent that implements Profile-1 or a device that discards 802.1Q VLAN tags. (See
section 8.1 of [2])
multiple virtual radio operation Time slicing operation of the physical radio between multiple virtual radios, each
operating on a different band or channel.
Non-Occupancy Channels Channels that have had radar detected on them, and cannot be occupied until the non-
Occupancy Duration has expired.
Non-Occupancy Duration After detection of radar, regulatory domains require that the channel not be used for a
period of time. The amount of time remaining (in seconds) until the channel can be used
is the Non-Occupancy Duration. Non-occupancy periods are the result of detecting
radar during a CAC, while monitoring following the termination or end of a CAC, or while
performing in-service monitoring.
Non-operable channel A channel that a device is permanently not capable of operating on.
Primary Network The network that a user configures for their own use, covering both Logical Ethernet and
Wi-Fi interfaces, and all of the traffic carried onto this network.
Primary VLAN A unique VLAN that is assigned to the Primary Network traffic.
Proxy Agent A Multi-AP Agent that translates between 1905 CMDUs and 802.11 frames to/from an
Enrollee Multi-AP Agent.
Requested Channel Scan A channel scan performed in response to a request from a Multi-AP Controller.
Secondary VLAN Any VLAN configured by the Multi-AP Controller that implements Profile-2 that is not the
Primary VLAN.
Self-Triggered CAC A CAC started by a Multi-AP Agent of its own volition. These may be performed for a
number of reasons, for example if the Multi-AP Agent believes a CAC is required before
operating on a channel that it has been requested to operate on.
Simultaneous CAC Radios The radios in a Multi-AP Agent that are able to perform a CAC simultaneously. For
example, if a Multi-AP Agent can only perform one CAC check at a time, then it would
have one CAC Radio. If it is able to perform CAC on two channels simultaneously, then
it has two Simultaneous CAC Radios.
Steering Mandate mechanism A mechanism to mandate a Multi-AP Agent to attempt steering of one or more
associated STAs.
Steering Opportunity mechanism A mechanism to provide a time window for a Multi-AP Agent to steer one or more
associated STAs.
Successful CAC A Channel Availability Check (CAC) that proceeds to completion of the required CAC
time without detecting radar. Operation in the channel on which the CAC was performed
could commence following a Successful CAC.
Time Sliced CAC A method of performing a Channel Availability Check (CAC) in which one of the radios
that normally is used for communications spends a fraction of the time performing the
CAC, and the remainder of the time operating normally for communication. Using this
Term Definition
method, the data throughput that can be sustained by the radio is reduced roughly by
the percentage of time it spends performing the CAC.
Traffic Separation Policy A group of traffic separation rules that are set in the Multi-AP Controller.
Triggered CAC A CAC begun by the Multi-AP Controller via a CAC Request message.
Unsuccessful CAC A CAC that is not a Successful CAC. Unsuccessful CACs can be due to detecting radar,
or errors that prevent monitoring the channel for the required CAC time.
Wi-Fi Backhaul A Wi-Fi link between two Multi-AP devices in a Multi-AP network.
Wi-Fi Fronthaul A Wi-Fi link between a Multi-AP Agent and its associated non-backhaul STA client
stations (STAs).
Acronyms Definition
1905 IEEE Std 1905.1™-2013, IEEE Standard for a Convergent Digital Home Network for
Heterogeneous Technologies
AC Access category
AL Abstraction layer
DL Downlink
GI Guard interval
HT High throughput
IE Information element
Acronyms Definition
MU Multi-user
SU Single user
TU Time units
4 Architecture
4.1 Multi-AP architecture
A Multi-AP network consists of two types of logical entities:
Multi-AP
Device 1
Multi-AP
Controller
Multi-AP
Agent
Logical
Fronthaul Ethernet
AP Port
Multi-AP
Device 2
Non-AP
STA 1 Backhaul Logical
STA Ethernet
Port
Multi-AP
Agent
Backhaul link (Wi-Fi or wired)
Fronthaul Wi-Fi Fronthaul link
AP Multi-AP control interface
Non-AP
STA 2
WAN
Multi-AP Device 1
Multi-AP
Controller
Multi-AP
Agent Logical
Ethernet
Fronthaul AP Port
Logical
Non-AP Backhaul STA Ethernet Port
STA 1
Multi-AP Multi-AP
Agent Agent
Fronthaul AP Fronthaul AP
Backhaul STA
Multi-AP Non-AP
Non-AP STA 3
Agent
STA 2
Fronthaul AP
Wi-Fi Backhaul Link
Multi-AP Device 4
Wired Backhaul Link
Non-AP Wi-Fi Fronthaul Link
STA 4
WAN
Multi-AP Device 1
Multi-AP
Controller
Logical Ethernet
Port
Logical
Ethernet Port
Multi-AP
Agent Non-AP
STA 1
Fronthaul AP
Multi-AP Device 2
Multi-AP Multi-AP
Agent Agent
Fronthaul AP Fronthaul AP
5 Multi-AP onboarding
Onboarding is the process by which a Multi-AP Agent gains layer-2 connectivity onto a Multi-AP network through Wi-Fi or
wired connectivity. This specification defines two methods (see section 5.2 (PBC onboarding) and 5.3 (DPP onboarding))
by which a Multi-AP device that includes a Multi-AP Agent and backhaul STA can onboard to a Multi-AP network. Note
that a backhaul STA might be provisioned with backhaul credentials using out of band method(s). Once layer-2
connectivity is established by any method, the Multi-AP Agent commences discovery of the Multi-AP Controller per
section 6.1.
For Multi-AP devices that implement Profile-3, DPP onboarding can be used for two independent purposes:
• DPP backhaul STA onboarding: to enable layer-2 Wi-Fi connectivity for a backhaul STA. (see section 5.3.4 or
5.3.6)
• DPP Multi-AP Agent secure onboarding: to secure the 1905-layer between the enrollee Multi-AP Agent and the
Multi-AP Controller and other existing Multi-AP Agent(s) in the network. (see section 5.3.7)
If a Multi-AP Agent backhaul STA that implements Profile-3 onboards to the Multi-AP network through a Multi-AP Agent
that implements Profile-1 or Profile-2 (e.g., using the PBC onboarding method of section 5.2) and the network uses a
Multi-AP Controller that implements Profile-3, the Multi-AP Agent and Controller are not able to perform 1905-layer
security message integrity or encryption (see section 13) unless the Multi-AP Agent performs DPP Multi-AP Agent secure
onboarding (see section 5.3.7). However, the Multi-AP Controller can still enable other Profile-3 features.
BSS Configuration
If a Multi-AP Agent operates a BSS that has been configured to support the Backhaul BSS role but has not been
configured to support the Fronthaul BSS role, the Multi-AP Agent shall not advertise Wi-Fi Protected Setup (WPS) support
on that BSS.
If a Multi-AP Agent operates one or more BSSs that has been configured to support Fronthaul BSS, the Multi-AP Agent
shall advertise WPS support on at least one of those BSSs.
If a backhaul STA sends a (Re-)Association Request frame from its backhaul STA interface, it shall include in the frame a
Multi-AP IE (see Table 3) containing a Multi-AP Extension subelement where bit 7 of the subelement value is set to one to
indicate it is a backhaul STA.
If a Multi-AP Agent operates a BSS that has been configured to support Fronthaul BSS, the Multi-AP Agent shall include a
Multi-AP IE containing a Multi-AP Extension subelement with bit 5 of the subelement value set to one to indicate Fronthaul
BSS in all (Re-)Association Response frames sent from that BSS to STAs identifying themselves as backhaul STAs.
If a Multi-AP Agent operates a BSS that has been configured to support Backhaul BSS, the Multi-AP Agent shall include a
Multi-AP IE containing a Multi-AP Extension subelement with bit 6 of the subelement value set to one to indicate Backhaul
BSS in all (Re-)Association Response frames sent from that BSS to STAs identifying themselves as backhaul STAs. If a
Multi-AP Agent operates a backhaul BSS configured with Profile-1 bSTA Disallowed the Multi-AP Agent shall set bit 3 of
the Multi-AP Extension subelement to one. If a Multi-AP Agent operates a BSS configured with Profile-2 bSTA Disallowed,
the Multi-AP Agent shall set bit 2 of the Multi-AP Extension subelement to one.
If a Multi-AP Agent that implements Profile-2 sends a Multi-AP IE in a (Re)Association Request or Response frame, it
shall include a Multi-AP Profile subelement with the Multi-AP Profile field set to 0x02.
If a Multi-AP Agent that implements Profile-2 sends a Multi-AP IE in a (Re)Association Response frame of a Backhaul
BSS, and the most recently received Traffic Separation Policy has the number of SSIDs field set to a value different than
zero, it shall include a Multi-AP Default 802.1Q Setting subelement (as defined in Table 4) with the latest configured
Primary VLAN ID. If a Multi-AP Agent that implements Profile-2 sends a Multi-AP IE in a (Re)Association Response frame
of a Backhaul BSS, and it considers the Primary VLAN ID not configured, it shall not include a Multi-AP Default 802.1Q
Setting subelement.
Backhaul STA Configuration
If a backhaul STA sends an M1 message (see [5]) from its backhaul STA interface during a WPS exchange, it shall
include a Multi-AP Extension subelement in the M1 message as part of the Wi-Fi Alliance Vendor Extension attribute with
bit 7 of the subelement value set to one to indicate it is a backhaul STA.
If a Multi-AP Agent receives an M1 message with bit 7 of the Multi-AP Extension subelement, as part of the Wi-Fi Alliance
Vendor Extension attribute set to one from a STA during the WPS procedure, the Multi-AP Agent shall configure the
backhaul STA with credentials (i.e. SSID and passphrase) pertaining to the backhaul SSID.
If a Multi-AP Agent’s backhaul STA uses WPS to be configured with network credentials by another Multi-AP Agent and
the backhaul STA has been deauthenticated by the AP at the end of the WPS procedure, the Multi-AP Agent's backhaul
STA shall associate to the backhaul SSID using the configured credentials.
If a Multi-AP Agent backhaul STA supports SAE and the configured credentials comprise a WPA2-Personal passphrase
and the Multi-AP Agent discovers an AP that is advertising the backhaul SSID and an SAE AKM, the Multi-AP Agent shall
attempt SAE authentication with the AP (instead of WPA2-Personal) using the configured passphrase.
If the Backhaul STA of a Multi-AP Agent that implements Profile-2 has successfully associated with a Backhaul BSS
whose latest (Re)Association Response frame contains a Multi-AP Default 802.1Q Setting subelement (Table 4) in the
Multi-AP IE with a Primary VLAN ID that differs from the one in use on the newly-associated Multi-AP Agent, or no
Primary VLAN ID is configured on the newly-associated Multi-AP Agent, then the newly-associated Multi-AP Agent shall
configure the Primary VLAN ID to the one indicated in the Multi-AP Default 802.1Q Setting subelement and send any
1905.1 management frames as defined in section 19.1.3. If the Backhaul STA of a Multi-AP Agent implements Profile-2
has successfully associated with a Backhaul BSS whose latest (Re)Association Response frame does not contain a Multi-
AP Default 802.1Q Setting subelement (Table 4) in the Multi-AP IE and the newly-associated Multi-AP Agent has a
Primary VLAN ID configured, the newly-associated Multi-AP Agent shall consider the Primary VLAN ID not configured and
send any 1905.1 management frames as defined in section 19.1.3.
Table 3. Multi-AP IE format
OUI Type 1 0x1B Wi-Fi Alliance specific OUI Type identifying the type of the Multi-
AP IE.
Subelement related 3 Variable Multi-AP Extension subelement per Table 14.
fields
3 Variable Multi-AP Profile subelement per Table 15.
The procedure below outlines how an Enrollee Multi-AP Agent and the Multi-AP Network interact for DPP onboarding over
Wi-Fi. The announcement procedure referenced here is either the DPP Presence Announcement or the DPP
Reconfiguration Announcement advertised by the Enrollee.
1. (Figure 5 step 1, 2, 3) A new Enrollee Multi-AP Agent is placed in DPP onboarding mode (e.g., user powering the
device, user taking some action to enable onboarding).
2. The Multi-AP Controller takes the role of a DPP Configurator and obtains the Enrollee's DPP URI by one of the
following mechanisms:
a. One of the bootstrapping methods described in section 5 of [18], or
b. The DPP bootstrapping using push button method described in section 5.3.6, or
c. (step 4, 5) Transfer of the DPP URI with the bootstrapping information of the Enrollee (see [21]) from the
Enrollee to the Controller using a secure out-of-band mechanism that is outside the scope of this specification
(e.g., remote pre-provisioning of the Controller with the DPP URI of an enrollee provided by a Service
Provider).
3. As shown in Figure 5 step 3, a Multi-AP Controller implementation might leverage user interface capabilities of a
separate device for the purpose of bootstrapping (e.g., a QR code scanning app on a smartphone). Any
necessary interfaces between physical components of the logical Multi-AP Controller entity are assumed to be
secure and are out-of-scope of this specification.
4. As part of the bootstrapping process, (steps 10, 19) the Enrollee Multi-AP Agent starts advertising its presence by
transmitting a periodic DPP Presence Announcement frame on various channels. It determines these channels by
following the channel list selection procedure for presence announcement described in Section 6.2 of [18]. Each
DPP Presence Announcement frame contains a bootstrapping key hash of the Enrollee. If the Enrollee has
already been enrolled to the Multi-AP network, but its backhaul STA disconnected, the Enrollee follows the above
procedure to reconnect, except that the Enrollee sends a DPP Reconfiguration Announcement frame that
contains the hash of the C-sign-key of the Controller which onboarded its backhaul STA.
5. (step 0) A Multi-AP device may, by default, advertise the Configurator Connectivity Element (CCE) IE in Beacons
and Probe Response frames to facilitate Enrollee Multi-AP Agent or other DPP capable client device onboarding
into the Multi-AP network. If CCE is not advertised by default, upon receipt of an Enrollee's DPP URI, (steps 6,7)
the Multi-AP Controller instructs one or more Multi-AP Agents in the network to start advertising the CCE in
Beacon and Probe Response frames by sending them a DPP CCE Indication message. A Controller may instruct
the existing Multi-AP Agents to advertise or not advertise the CCE at any time, independently of any upcoming
onboarding procedure.
It is recommended that the Multi-AP Controller triggers one or more Multi-AP Agents to start advertising the CCE
in Beacon and Probe Response frames to facilitate seamless (re)configuration of backhaul STA and regular DPP
capable STA devices.
6. (steps 8, 9) The Multi-AP Agent(s) start(s)/continue(s) advertising the CCE and listen(s) for a DPP Presence
Announcement frame on their channel(s). The existence of the CCE in the Beacon frames on a given channel
allows the Enrollee Multi-AP Agent to include that channel in its channel list contained in DPP Presence
Announcement frame sent in that channel.
7. (steps 12, 13) The Multi-AP Agent(s) start(s)/continue(s) listening for announcements frames (DPP Presence
Announcement frame or DPP Reconfiguration Announcement frame) and upon receipt of a DPP Presence
Announcement frame or a DPP Reconfiguration Announcement frame for which it does not have a matching DPP
(Reconfiguration) Authentication Request, the Multi-AP Agent will encapsulate it in a Chirp Notification message
and send it to the Multi-AP Controller (step 14).
8. (steps 17, 18) If the Multi-AP Controller has received the DPP URI of the Enrollee and receives the DPP
Presence Announcement frame of the Enrollee through one of the Multi-AP Agents, the Multi-AP Controller
constructs a DPP Authentication Request frame, encapsulates it in a Proxied Encap DPP message and sends the
Proxied Encap DPP message to the Multi-AP Agent(s) for relaying it to the Enrollee Multi-AP Agent. The Multi-AP
Controller also sends a hashed value (computed from the Enrollee's public key in the DPP URI) that it expects in
the DPP Presence Announcement frame of the Enrollee Multi-AP Agent.
9. If the Multi-AP Controller receives a DPP Reconfiguration Announcement frame from a Multi-AP Agent through
one of the Multi-AP Agents, the Multi-AP Controller constructs a DPP Reconfiguration Authentication Request
frame.
10. (steps 17, 18) If a Proxy Agent receives a Proxied Encap DPP message carrying a DPP Authentication Request
and a DPP Chirp Value TLV, it will start comparing the value of the Hash Value field of the DPP Chirp Value TLV
with the bootstrapping key hash from any DPP Presence Announcement frames it receives. If a match is found
(step 20), the Multi-AP Agent forwards the DPP Authentication Request to the sender of the DPP Presence
Announcement frame (step 22).
11. (steps 11, 15, 16, 19, 21) The Enrollee Multi-AP Agent continues the announcement procedure and listens for the
DPP (Reconfiguration) Authentication Request frame. (step 22) Upon receipt of the DPP (Reconfiguration)
Authentication Request frame, (step 23) the Enrollee stops the announcement procedure and engages in a DPP
(Reconfig) Authentication exchange with the Multi-AP Controller on the channel of the selected Proxy Agent from
which it received the DPP (Reconfiguration) Authentication Request frame.
12. (step 24) The Enrollee Multi-AP Agent constructs and sends a DPP (Reconfiguration) Authentication Response
frame intended for the Multi-AP Controller and sends it to the Proxy Agent from which it received the DPP
(Reconfiguration) Authentication Request frame.
13. (step 25) If the Proxy Agent receives the DPP (Reconfiguration) Authentication Response frame, it encapsulates
the frame in a Proxied Encap DPP message and sends it to the Multi-AP Controller.
14. (step 26) If the Multi-AP Controller receives a DPP (Reconfiguration) Authentication Response frame, it will
construct a DPP (Reconfiguration) Authentication Confirm frame, encapsulate it in a Proxied Encap DPP
message, and send it to the Enrollee Multi-AP Agent through the Proxy Agent. (step 27)
15. (step 28) The Enrollee Multi-AP Agent will, upon receipt of the DPP (Reconfiguration) Authentication Confirm
frame, request its initial configuration from the Multi-AP Controller by exchanging DPP Configuration frames using
the selected Proxy Agent.
© 2020 Wi-Fi Alliance. All Rights Reserved.
Used with the permission of Wi-Fi Alliance under the terms as stated in this document.
Page 28 of 163
Wi-Fi EasyMesh™ Specification v3.0
16. (step 28) The Multi-AP Controller configures the backhaul STA and the 1905-layer security of the Enrollee Multi-
AP Agent using the DPP Configuration protocol.
After receiving the configuration for its backhaul STA and 1905-layer, the Enrollee Multi-AP Agent:
Wi-Fi Technology wi-fi_tech STRING map The type of network that the Enrollee wishes to be
enrolled.
Network Role netRole STRING mapAgent The role that the Enrollee wishes to obtain for its 1905-
layer, fronthaul BSS and backhaul BSS.
bSTAList bSTA list Array Objects List of backhaul STA capabiliities in the structure:
"bSTAList": [ {“netRole”: “mapBackhaulSta”, "akm":
"STRING", "channelList": "STRING"} ]
L2 Network Role netRole STRING mapBackhaulSta The role that the Enrollee wishes to obtain.
Authentication and akm STRING psk, The authentication type(s) for the network.
key management dpp,
type "psk" indicates one or more of the PSK and FT-PSK
sae,
psk+sae, AKMs defined in [1] (typically at least "00-0F-AC:2" for
interoperability)
dpp+sae,
dpp+psk+sae
or a list of one or "sae" indicates one or more of the SAE and FT-SAE
AKMs defined in [1] (typically at least "00-0F-AC:8" for
more AKM suite
selectors, interoperability)
delimited with a
"+" character "dpp" indicates one or more of the DPP and FT-DPP
AKMs defined in section 8.4 of [18] (typically at least "50-
6F-9A:2" for interoperability)
The DPP Configuration Object parameters are given in Table 6 and the DPP Connector body object is described in Table
7. The JSON hierarchy for these two objects is illustrated in Figure 7, Figure 8 and Figure 9.
A Multi-AP device shall encode the DPP Configuration Object as specified in section 4.3 of [18].
Table 6. DPP Configuration Object parameters
Radio Unique RUID STRING the radio The specific radio of the Enrollee Multi-AP
Identifier of a unique Agent for which this configuration object
radio identifier of applies to.
the radio This parameter is not included when
configuring the backhaul STA or the 1905-
layer..
SSID Ssid STRING UTF-8 The name of the network for fronthaul BSS
and backhaul BSS.
The name of the network to connect to if it
pertains to the backhaul STA.
if DPP Configuration Object for the 1905-
layer, this field is ignored.
BSSID BSSID STRING MAC The MAC address assigned to the BSS. The
Address of Controller sets this field to zero if it does not
the BSS know the BSSID (initial configuration) or to
the value assigned by the Multi-AP Agent to
the BSS.
Credential cred OBJECT
object
Authentication akm STRING psk, dpp, The authentication type(s) for the Wi-Fi
and key sae, network.
management psk+sae,
type dpp+sae, "psk" indicates one or more of the PSK and
dpp+psk+sae FT-PSK AKMs defined in [1] (typically at
least "00-0F-AC:2" for interoperability)
or a list of Not included for 1905-layer configuration.
one or more
AKM suite "sae" indicates one or more of the SAE and
selectors, FT-SAE AKMs defined in [1] (typically at
delimited least "00-0F-AC:8" for interoperability)
with a "+"
character
"dpp" indicates one or more of the DPP and
FT-DPP AKMs defined in section 8.4 of [18]
(typically at least "50-6F-9A:2" for
interoperability)
{
"wi-fi_tech": "map",
"dfCounterThreshold": 15,
"discovery":
{
"RUID": "DE00ADBE00EF",
"ssid": "myWi-Fi",
"BSSID": "000000000000"
},
"cred":
{
"akm": "dpp+psk+sae",
"pass": "supersecret",
"signedConnector":
"eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJrTWNlZ0RCUG1OWlZha0FzQlpPek9vQ3N2UWprcl9uRUFwOXVGLUVEbVZFIi
wiYWxnIjoiRVMyNTYifQ.ewogICJncm91cHMiOiBbCiAgICB7CiAgICAgICJncm91cElkIjogIm1hcE5XIiwKICAgIC
AgIm5ldFJvbGUiOiAibWFwQWdlbnQiCiAgICB9CiAgXSwKICAibmV0QWNjZXNzS2V5IjogewogICAgImt0eSI6ICJFQ
yIsCiAgICAiY3J2IjogIlAtMjU2IiwKICAgICJ4IjogIlhqLXpWMmlFaUg4WHd5QTlpanBzTDZ4eUx2RGlJQnRockhP
OFpWeHdtcEEiLAogICAgInkiOiAiTFVzREJtbjdudi1MQ25uNmZCb1hLc0twTEdKaVZwWV9rblRja0dnc2dlVSIKICB
9LAogICJleHBpcnkiOiAiMjAyMS0wMS0zMVQyMjowMDowMCswMjowMCIKfQ.8fJSNCpDjv5BEFfmlqEbBNTaHx2L6c_
22Uvr9KYjtAw88VfvEUWiruECUSJCUVFqv1yDEE4RJVdTIw3aUDhlMw",
"csign":
{
"kty":"EC",
"crv":"P-256",
"x":"MKBCTNIcKUSDii11ySs3526iDZ8AiTo7Tu6KPAqv7D4",
"y":"4Etl6SRW2YiLUrN5vfvVHuhp7x8PxltmWWlbbM4IFyM",
"kid":"kMcegDBPmNZVakAsBZOzOoCsvQjkr_nEAp9uF-EDmVE"
}
}
}
{
"typ": "dppCon",
"kid": "kMcegDBPmNZVakAsBZOzOoCsvQjkr_nEAp9uF-EDmVE",
"alg": "ES256"
}
{
"groups": [
{
"groupId": "mapNW",
"netRole": "mapAgent"
}
],
"netAccessKey": {
"kty": "EC",
"crv": "P-256",
"x": "Xj-zV2iEiH8XwyA9ijpsL6xyLvDiIBthrHO8ZVxwmpA",
"y": "LUsDBmn7nv-LCnn6fBoXKsKpLGJiVpY_knTckGgsgeU"
},
"expiry": "2021-01-31T22:00:00+02:00"
}
netRole of matching groupId in received Connector netRole of device's matching Connector groupId Compatibility
If a Multi-AP Agent sends a Beacon or Probe Response frame and the most recently received DPP CCE Indication TLV
from the Multi-AP Controller had the Advertise CCE flag set to one, the Multi-AP Agent shall include the CCE in the
Beacon and Probe Response frames on all of its fronthaul BSSs.
If an Enrollee Multi-AP Agent supports onboarding over a Wi-Fi link, it shall support sending a Presence Announcement
frame as specified in Section 6.2 of [18].
If a Proxy Agent receives a DPP Presence Announcement frame, the Proxy Agent shall check if the bootsrapping key
hash in the DPP Presence Announcement frame matches any values of boostrapping key hash of a stored DPP
Authentication Request frame received from the Multi-AP Controller. If no matching hash value is found, the Proxy Agent
shall send a Chirp Notification message to the Controller with a DPP Chirp Value TLV and shall set the fields in the TLV:
• In the 1905 Encap DPP TLV, the Multi-AP Controller shall set the DPP Frame Indicator to zero, the Frame Type
to zero (DPP Authentication Request frame), set the Enrollee MAC Address present bit to one and the Destination
STA MAC Address field to the MAC address of the Enrollee received in the DPP Chirp Value TLV.
• In the DPP Chirp Value TLV, the Multi-AP Controller shall set the Enrollee MAC Address present bit to one, Hash
Validity Bit field to one, the Destination STA MAC Address field to the MAC Address received in the Chirp
Notification message, the Hash Length field set to the length of the hash, and the Hash Value field to the value
computed from the DPP URI (as per Section 6.2.1 of [18])
If a Proxy Agent receives a Proxied Encap DPP message from the Multi-AP Controller that includes both a 1905 Encap
DPP TLV containing an encapsulated DPP Authentication Request frame and a DPP Chirp Value TLV, the Proxy Agent
shall decapsulate and store the DPP Authentication Request frame and listen for DPP Presence Announcement frames
on the fronthaul BSS.
If a Proxy Agent receives a Presence Announcement frame (chirp) with boostrapping key hash from the Enrollee Multi-AP
Agent that matches the Hash Value field of the DPP Chirp Value TLV received from the Multi-AP Controller, the Proxy
Agent shall send the DPP Authentication Request frame to the Enrollee within 1 second of receiving the Presence
Announcement frame from that Enrollee, using a DPP Public Action frame to the MAC address from where the presence
announcement was received.
If the Proxy Agent receives the Enrollee's 802.11 ACK frame from the DPP Authentication Request frame to the Enrollee,
the Proxy Agent may discard the DPP Authentication Request frame.
If a Proxy Agent receives a Chirp Notification message from the Multi-AP Controller with one or more DPP Chirp Value
TLVs with the Hash Validity set to zero, the Proxy Agent shall stop comparing the included hash(es) and may discard the
corresponding DPP Authentication Request frame.
NOTE: A Multi-AP Controller sends a Chirp Notification message to indicate to clear the DPP onboarding state machine of
Enrollee Multi-AP Agents from the memory of the existing Multi-AP Agents. It can also be used to drop/cancel any
ongoing DPP sessions.
If the Enrollee Multi-AP Agent receives a DPP Authentication Request frame that includes its own boostrapping key hash
(i.e., meant for itself), it shall respond with a DPP Authentication Response frame and ignore any subsequent DPP
Authentication frames it may receive from other Multi-AP Agents.
If the Controller has not received a DPP Authentication Response frame and the DPP Authentication Protocol times out
(see [18] for timers), the Controller shall restart the DPP Authentication Protocol as per section 6.3 of [18] by resending
the DPP Authentication Request frame.
If a Proxy Agent receives a DPP Public Action frame with Frame Type field set to one or 16 (DPP (Reconfiguration)
Authentication Response) in response to a DPP (Reconfiguration) Authentication Request from the Enrollee Multi-AP
Agent, it shall generate a Proxied Encap DPP message containing a 1905 Encap DPP TLV with the Encapsulated frame
field set to the received DPP Public Action frame body, the Enrollee MAC Address Present bit set to one, the Destination
STA MAC Address field set to the Enrolee's MAC address, the DPP Frame Indicator bit set to 0 and the Frame Type field
set to one (or 16), and shall send the message to the Multi-AP Controller.
If a Multi-AP Controller receives a Proxied Encap DPP message, then it shall respond within one second with a 1905 Ack
message per section 17.1.32. The Multi-AP Controller shall then extract the encapsulated DPP frame from the
Encapsulated Frame field of the 1905 Encap DPP TLV and process the frame per sections 6.1 to 6.6 of [18]. If the frame
requires a response per sections 6.1 to 6.6 of [18], the Multi-AP Controller shall encapsulate the DPP frame in a 1905
Encap DPP TLV, set the Enrollee MAC Address present bit to one and include the Enrollee MAC address into the
Destination STA MAC Address field of the 1905 Encap DPP TLV, and send the Proxied Encap DPP message to the Multi-
AP Agent from which it received the Proxied Encap DPP message.
If a Proxy Agent receives a Proxied Encap DPP message from the Controller, it shall extract the DPP frame from the
Encapsulated Frame field of the 1905 Encap DPP TLV. If the DPP Frame Indicator field value is zero, and if the Frame
Type field is not equal to zero or 15, then:
• If the Frame Indicator bit field in the 1905 Encap DPP TLV is set to zero and the Enrollee MAC Address Present
bit is set to one, then the Proxy Agent shall send the frame as a unicast Public Action frame to the Enrollee MAC
address.
• If the Frame Indicator bit field in the 1905 Encap DPP TLV is set to zero and the Enrollee MAC Address Present
bit is set to zero, then the Proxy Agent shall send the frame as a broadcast Public Action frame.
• If the Frame Indicator bit field in the 1905 Encap DPP TLV is set to one and the Enrollee MAC Address Present
bit is set to one, then the Proxy Agent shall send the frame as a unicast GAS frame to the Enrollee MAC address.
• If the Frame Indicator bit field in the 1905 Encap DPP TLV is set to one and the Enrollee MAC Address Present
bit is set to zero, then the Proxy Agent shall discard the message.
If a Proxy Agent receives a 1905 Encap DPP TLV from a Proxied Encap DPP message, it shall encapsulate it in a 802.11
frame, the contents of the TLV shall be copied into an 802.11 action frame and the DPP Public Action frame header fields
shall be set based on the DPP Frame Indicator and Frame Type field of the TLV.
If a Multi-AP Controller receives a Proxied Encap DPP message containing an encapsulated DPP (Reconfiguration)
Authentication Response frame, it shall generate a DPP (Reconfiguration) Authentication Confirm frame as per [18] and
encapsulate it into a 1905 Encap DPP TLV, the DPP Frame Indicator bit to 0, Enrollee MAC Address Present bit to one,
the Frame Type field to 2 (or 17 for Reconfig) and include the Enrollee MAC Address into the Destination STA MAC
Address field. The Multi-AP Controller shall include the TLV into a Proxied Encap DPP message and send it to the Multi-
AP Agent from which the previous Proxied Encap DPP message carrying the DPP (Reconfiguration) Authentication
Response frame was received.
If a Proxy Agent receives a Proxied Encap DPP message with the 1905 Encap DPP TLV Frame Type set to 2 (or 17 for
Reconfig), it shall decapsulate the DPP (Reconfiguration) Authentication Confirm frame from the TLV and send it to the
Enrollee using a DPP Public Action frame as described in [18].
During the DPP Authentication Protocol (see 6.3 of [18]) and DPP Configuration Protocol (see 6.4 of [18]), a Multi-AP
Controller shall only communicate with the Enrollee via the Proxy Agent from which it received the DPP Authentication
Response frame.
If an Enrollee Multi-AP Agent receives a DPP (Reconfiguration) Authentication Confirm Public Action frame, it shall
generate a DPP Configuration Request frame, include it into a GAS Request frame (as specified in [18]) and send it to the
Proxy Agent from which it received the DPP Authentication Confirm Public Action frame. See Figure 10 for the Enrollee's
configuration message flow. The Enrollee Multi-AP Agent shall populate the akm parameter with the AKM(s) its backhaul
STA supports.
If a Proxy Agent receives a DPP Configuration Request frame in a GAS frame from an Enrollee Multi-AP Agent, it shall
generate a Proxied Encap DPP message that includes a 1905 Encap DPP TLV that encapsulates the received DPP
Configuration Request frame and shall set the Enrollee MAC Address Present field to one, include the Enrollee's MAC
address in the Destination STA MAC Address field, set the DPP Frame Indicator field to one and the Frame Type field to
255, and send the message to the Multi-AP Controller.
If a Multi-AP Controller receives a Proxied Encap DPP message from an Enrollee Multi-AP Agent carrying a DPP
Configuration Request frame, it shall generate a DPP Configuration Response frame and include one DPP Configuration
Object for the 1905-layer and one DPP Configuration Object for the backhaul STA of the Enrollee, encapsulate them into
a 1905 Encap DPP TLV, set the DPP Frame Indicator bit to one, set the Enrollee MAC Address Present bit to one, set the
Frame Type field to 255 and include the Enrollee MAC Address into the Destination STA MAC Address field. If a Multi-AP
Controller onboards a Muti-AP Agent over Wi-Fi, the Multi-AP Controller may include a ‘sendConnStatus’ attribute in the
DPP Configuration Response frame. The 1905 Encap DPP TLV shall be included into a Proxied Encap DPP message
and sent to the Multi-AP Agent from which the previous Proxied Encap DPP message carrying the DPP Configuration
Request frame was received.
If a Proxy Agent receives a Proxied Encap DPP message from the Multi-AP Controller, it shall extract the DPP frame from
the Encapsulated Frame field of the 1905 Encap DPP TLV and:
• If the 1905 Encap DPP TLV Frame Indicator bit field is set to one and the Frame Type field is set to 255, the
Proxy Agent shall decapsulate the DPP Configuration Response frame from the TLV and send it to the Enrollee
Multi-AP Agent using a GAS frame as described in [18].
• If the 1905 Encap DPP TLV Frame Indicator bit field is set to one and the Frame Type field set to a value other
than 255, the Proxy Agent shall discard the message.
• If the 1905 Encap DPP TLV Frame Indicator bit field is set to zero and the Frame Type field set to 255, the Proxy
Agent shall discard the message.
• If the 1905 Encap DPP TLV Frame Indicator bit field is set to zero and the Frame Type field is set to a valid value,
the Proxy Agent shall process the message as specified in sections 5.3.4 or 5.3.10.
If an Enrollee Multi-AP Agent receives a DPP Configuration Response frame, it shall send a DPP Configuration Result
Public Action frame as per [18], configure its 1905 and backhaul STA interfaces with the parameters received in the DPP
Configuration Object and:
• If the AKM for the backhaul STA in the DPP Configuration Object includes dpp and the backhaul BSS is
configured to support the DPP AKM, then the Enrollee Multi-AP Agent shall initiate the DPP Network Introduction
protocol in Public Action frames as per [18] to associate to the backhaul BSS.
• If the AKM for the backhaul STA in the DPP Configuration Object includes PSK or SAE password, then the
Enrollee Multi-AP Agent shall scan for and associate with a backhaul BSS with the SSID indicated in DPP
Configuration Object as per [1].
If a Multi-AP Agent with DPP AKM enabled receives a DPP Peer Discovery Request Public Action frame, it shall respond
with a DPP Peer Discovery Response Public Action frame and derive a PMK with the backhaul STA of the Enrollee Multi-
AP Agent as per [18].
If a DPP Configuration Response frame includes a ‘sendConnStatus’ attribute, the Enrollee Multi-AP Agent shall generate
a DPP Connection Status Result frame indicating the status of the connection attempt of its backhaul STA to the bBSS,
as described in section 6.4.5.1 of [18], before initiating the 1905 DPP Peer Discovery procedure with the Multi-AP
Controller.
If a Proxy Agent receives a DPP Configuration Result Public Action frame from an Enrollee Multi-AP Agent, it shall
encapsulate the frame into a 1905 Encap DPP TLV, set the Enrollee MAC Address Present field to one, set the
Destination STA MAC Address field to the MAC address of the Enrollee, set the DPP Frame Indicator field to 0 and the
Frame Type field to 11, and send the Proxied Encap DPP message to the Multi-AP Controller. If the GAS frame carrying
the DPP Configuration frames needs to be fragmented, the Proxy Agent shall fragment the GAS frame as per [1] and [18].
If a Proxy Agent receives a DPP Connection Status Result Public Action frame from an Enrollee Multi-AP Agent, it shall
encapsulate the frame into a 1905 Encap DPP TLV, set the Enrollee MAC Address Present field to one, set the
Destination STA MAC Address field to the MAC address of the Enrollee, set the DPP Frame Indicator field to 0 and the
Frame Type field to 12, and send the Proxied Encap DPP message to the Multi-AP Controller.
If the Multi-AP Controller receives the DPP Configuration Result frame with DPP Status field set to STATUS_OK, the
Multi-AP Controller shall retain the information that it successfully onboarded and configured the newly onboarded Multi-
AP Agent using the AL MAC address of the Enrollee Multi-AP Agent.
If the Enrollee Multi-AP Agent's backhaul STA is associated with the backhaul BSS, the Enrollee Multi-AP Agent shall
search for the Multi-AP Controller using 1905 AP-Autoconfiguration Search messages. If the Enrollee Multi-AP Agent
receives a 1905 AP-Autoconfig Response message with the SupportedService field set to "Multi-AP Controller" and the
Multi-AP Profile field in the Multi-AP Profile TLV (see section 17.2.47) is set to “Multi-AP Profile-3", the Enrollee Multi-AP
Agent shall continue with the procedures in section 5.3.7 to secure its own 1905-layer and shall not initiate the AP-
Autoconfiguration WSC exchange described in section 7.1.
5.3.4.1 Encapsulation of DPP Public Action frames and DPP GAS frames into TLVs:
A Multi-AP Controller or Proxy Agent shall encapsulate a DPP 802.11 Action frame (as shown in Figure 11 (from Figure 6
in [18])) into a Proxied Encap DPP message by including the body of the 802.11 Action frame into the 1905 Encap DPP
TLV as follows:
• Encapsulated frame length field of the 1905 Encap DPP TLV is a 16-bit integer and contains the length of the
Field in Figure 11 and DPP Message in Figure 11 inclusive,
• Encapsulated frame field of the 1905 Encap DPP TLV is the Field in Figure 11 and DPP Message in Figure 11 of
an 802.11 Action Frame shown in Figure 11 ,
• DPP Frame Indicator field of the 1905 Encap DPP TLV is the value corresponding to the frame type from the
Category field (either DPP Public Action frame or GAS frame).
• Frame Type field of the 1905 Encap DPP TLV is the DPP Public Action frame type value, or 255, based on the
DPP Frame Type field (see section 8.2.1 of [18]) of the DPP frame.
5.3.5 Onboarding Method via a Multi-AP Logical Ethernet Interface with out-of-band DPP
bootstrapping
A Multi-AP Controller can only initiate the DPP Authentication Protocol with an Enrollee after it receives the bootstrapping
information of the Enrollee. Providing the bootstrapping information of the Enrollee to the Controller happens using an out-
of-band mechanism. An example of an out-of-band mechanism is when the bootstrapping information is labeled on the
Enrollee in a form of a QR code; the user scans the QR code with the smartphone and the smartphone transfers the QR
code content to the Controller using a proprietary interface. If the Multi-AP Controller receives the enrollee's DPP URI by
one of the mechanisms described in section 5 of [18], then DPP procedures can be initiated. See Figure 12 for the DPP
Onboarding via Multi-AP Logical Ethernet Interface.
If an Enrollee Multi-AP Agent detects that the link status of a Multi-AP Logical Ethernet Interface transitions to LINK_UP
[3], the Enrollee Multi-AP Agent shall search for the Multi-AP Controller by sending 1905 AP-Autoconfiguration Search
messages per section 6.1. The Enrollee Multi-AP Agent shall include a DPP Chirp Value TLV in the 1905 AP-
Autoconfiguration Search message, setting the fields as follows:
5.3.6 Onboarding method via Wi-Fi with inband DPP bootstrapping using Push Button
If a Multi-AP Agent that implements Profile-3 performs the Multi-AP PBC Backhaul STA Onboarding procedure per
section 5.2 with another Multi-AP Agent, the Enrollee Multi-AP Agent shall include its DPP URI in the Encrypted Settings
of M7 as shown in Figure 13.
The Proxy Agent shall send the DPP URI to the Controller in a DPP Bootstrapping URI Notification message.
• Send a DPP Bootstrapping URI Notification message to the Multi-AP Controller containing the DPP URI.
• Send an M8 message to the Enrollee Multi-AP Agent without any backhaul BSS credentials (see Figure 13).
If an Proxy Agent receives a DPP URI from an Enrollee Multi-AP Agent during Multi-AP PBC Onboarding procedure (see
section 5.2) and the Proxy Agent does not have a 1905 TK with the Multi-AP Controller, it shall:
• not send the DPP Bootstrapping URI Notification message to the Controller with the DPP URI
• Send an M8 message to the Enrollee Multi-AP Agent with the backhaul BSS credentials (see Figure 13).
NOTE: under this condition, the Enrollee Multi-AP Agent falls back to PBC onboarding procedure (see section 5.1),
without securing the 1905-layer.
If an Enrollee Multi-AP Agent which implements Profile-3 receives an M8 with backhaul credentials, it shall follow the
procedures in section 5.2 to onboard.
If a Multi-AP Controller receives a DPP Bootstrapping URI Notification message, then it shall perform the following:
• Select the Proxy Agent to be the Multi-AP Agent that sent the DPP Bootstrapping URI Notification message.
• Start the DPP procedure per section 5.3.4.
If triggered to establish a 1905 PMK with a Multi-AP device, a Multi-AP Agent shall delete any 1905 PMK and associated
1905 PTK it may have with the peer Multi-AP device and shall initiate the DPP Network Introduction protocol (see section
6.6 of [18]) by sending a DPP Peer Discovery Request frame and include its 1905 Connector with netRole set to
"mapAgent" into the DPP Peer Discovery Request frame. The Multi-AP Agent shall include the DPP Peer Discovery
Request frame into the DPP Message TLV and send the TLV in a Direct Encap DPP message to the Multi-AP Controller.
If a Multi-AP Controller receives a Direct Encap DPP message with a DPP Message TLV containing a DPP Peer
Discovery Request frame, it shall check that the netRole in the received Connector from the Multi-AP Agent has netRole
set to mapAgent (see Table 8). If the netRole is compatible (see Table 8), the Multi-AP Controller shall generate a DPP
Peer Discovery Response frame and include its 1905 Connector with netRole set to mapController. The Multi-AP
Controller shall include the DPP Peer Discovery Response frame into the DPP Message TLV and send the TLV in a
Direct Encap DPP message to the Multi-AP Agent.
If a Multi-AP Agent receives a Direct Encap DPP message with a DPP Message TLV containing a DPP Peer Discovery
Response frame, it shall extract the DPP Peer Discovery Response frame from the DPP Message TLV and process it
according to section 6.6 of [18].
If a Multi-AP Device receives a DPP Peer Discovery Request frame from an Enrollee Multi-AP Agent, or an already
enrolled Multi-AP Agent, it shall process it according to section 6.6 of [18]. After successfully deriving the 1905 PMK, the
Multi-AP Device which sent the 1905 DPP Peer Discovery Response shall initiate a 1905 4-way handshake to derive a
new 1905 PTK with the Multi-AP Agent.
If a Multi-AP Agent wants to communicate with another Multi-AP Agent, it shall establish a secure 1905-layer connectivity
by using the DPP Peer Discovery protocol for establishing a 1905 PMK with the other Multi-AP Agent and exchange
Connectors with netRole set to mapAgent.
A Multi-AP Device derives a 1905 PTK to communicate with another Multi-AP Device by performing a 4-way handshake
as described in section 12.7.6.4 of [1] using the 1905 PMK established by the 1905-layer DPP Network Introduction
protocol. Each pair of Multi-AP devices will have a uniquely derived 1905 PMK and 1905 PTK.
If the Enrollee Multi-AP Agent generates a 1905 PMK during 1905-layer DPP Network Introduction protocol, it shall store
the 1905 PMK in volatile memory.
If the Multi-AP Controller generates a 1905 PMK during 1905-layer DPP Network Introduction protocol, it shall:
The Multi-AP device shall generate a 512-bit 1905 PTK using KDF-SHA-256-512(K, A, B) with A and B as defined in
12.7.1.3 of [1].
If a Multi-AP Device successfully validates message M4 of the 1905 4-way handshake, the Multi-AP Device shall delete
any previously derived 1905 PMK and associated 1905 PTK with the initiating Multi-AP Agent, install the new 1905 PTK,
set the corresponding Multi-AP Device specific Encryption Transmission Counter to one and set the Encryption Reception
Counter to zero.
If a Multi-AP device has derived a new 1905 PTK, it shall derive the 256-bit 1905 TK from the 512-bit 1905 PTK using the
procedures defined in 12.7.1.3 of [1].
The Multi-AP Controller shall generate the 1905 GTK and include it in message 3 of the 1905 4-way handshake. The
1905 GTK shall be a random or pseudorandom number as per section 12.7.1.2 of [1].
If a Multi-AP Agent is performing a 1905 4-way handshake with another Multi-AP Agent, a new 1905 GTK shall not be
generated and included in Message 3. A Multi-AP Agent shall use the 1905 GTK provided by the Multi-AP Controller.
The Multi-AP Controller shall use the values specified in Table 9 for KDE selectors (see "Key Data" in section 12.7.2 and
Table 12-6 of [1])
Table 9. 1905 GTK KDE selectors
The format of the 1905 GTK KDE is specified in Table 10. The Key ID specifies which index is used for the 1905 GTK.
The Multi-AP Controller shall not use a Key ID of value zero for 1905 GTKs.
Table 10. 1905 GTK KDE format
A Multi-AP Controller may send a 1905 Rekey Request message to any Multi-AP Agent at any time based on its policy. If
triggered, a Multi-AP Controller shall send a 1905 Rekey Request message to a Multi-AP Agent. The Multi-AP Controller
may stagger the request messages to avoid creating a burst of control message traffic in the network.
If a Multi-AP Agent receives a 1905 Rekey Request message, then it shall respond within one second with a 1905 Ack
message and shall perform the 1905 4-way handshake procedure (see section 5.3.7.2) to establish a new 1905 PTK with
every Multi-AP device it is communicating with. If a 1905 4-way handshake procedure is successful with the other Multi-
AP device, the Multi-AP Agent shall set the corresponding Multi-AP device specific Encryption Transmission Counter to
one and the Encryption Reception Counter to zero.
If a Multi-AP device has derived a new 1905 PTK, it shall derive the 256-bit 1905 TK from the 512-bit 1905 PTK using the
procedures defined in 12.7.1.3 of [1].
If triggered, a Multi-AP Controller shall generate a new 1905 GTK for all the Multi-AP Agents that implement Profile-3 and
have 1905 Security enabled. At any time based on its policy, the Multi-AP Controller shall distribute the new 1905 GTK
using the procedure described in section 12.7.7 of [1] with messages encapsulated using the 1905 Encap EAPOL
message to each of the Multi-AP Agents that implement Profile-3 and have 1905 Security enabled.
If a Multi-AP Agent that implements Profile-3 receives a new 1905 GTK and the corresponding new 1905 GTK Key Id,
then the Multi-AP Agent shall perform the following:
• Set the Integrity Transmission Counter to one and all the Integrity Reception Counters to zero
• Start using the new 1905 GTK for MIC computation for both transmission and reception
• Credential Object
▪ akm = AKM suite selectors to be used on the fronthaul BSS.
▪ DPP Connector with netRole = "ap"
▪ C-sign-key
▪ Pre-shared key
▪ WPA2 Passphrase and/or SAE password
If a Multi-AP Controller does not want to configure any BSS on a radio of a Multi-AP Agent, it shall include a BSS
Configuration Response TLV in the BSS Configuration Response message and shall set the parameters in the DPP
Configuration Object fields of the BSS Configuration Response TLV described in Table 6 as follows:
• If the netRole value is set to 'mapBackhaulBss', the configuration is for a backhaul BSS
• If the netRole value is set to 'ap', the configuration is for a fronthaul BSS
If the Multi-AP Controller receives a BSS Configuration Result message, it shall:
• send an Agent List message to the newly onboarded Enrollee Multi-AP Agent and all the other existing Multi-AP
Agents
• include the Agent List TLV with the list of all the Multi-AP Agents that are part of the Multi-AP network (including
the newly enrolled Multi-AP Agent itself)
• set the Multi-AP Profile field in the Agent List TLV to the value of the Multi-AP Profile field of the Multi-AP Profile
TLV received from each Multi-AP Agent
• set the Security field in the Agent List TLV to 1905 Security enabled for all Multi-AP Profile-3 devices onboarded
with DPP, and set the Security field to 1905 Security not enabled otherwise.
netRole of matching groupId in received Connector netRole of device's matching Connector groupId Compatibility
NOTE: as part of a backhaul BSS reconfiguration, backhaul STA connectivity of some of the Multi-AP Agents in the Multi-
AP network may be lost.
If there are any Multi-AP Agents configured with Wi-Fi backhaul connections within the Multi-AP network, the Multi-AP
Controller shall enable CCE advertisements on all Multi-AP Agents.
If a Multi-AP Agent wants to receive an updated configuration for 1905-layer connectivity (e.g., 1905 DPP Connector has
expired) it shall generate a DPP Reconfiguration Announcement frame that includes the Controller's C-sign-key hash and
shall encapsulate the DPP Reconfiguration Announcement frame in a Direct Encap DPP message and send it to the
Multi-AP Controller.
If a Multi-AP Agent with CCE enabled receives a DPP Reconfiguration Announcement frame, it shall check that the hash
in the frame matches the hash of the Multi-AP Controller's C-sign-key. If the hash matches, it shall:
• forward the DPP Reconfiguration Announcement frame to the Multi-AP Controller by generating a Proxied Encap
DPP message containing a 1905 Encap DPP TLV,
• encapsulate the received DPP Public Action frame body in the Encapsulated frame field,
• set the Enrollee MAC Address present bit to one,
• set the Destination STA MAC Address field to the Enrolee's MAC address,
• set the DPP Frame Indicator bit to zero
• set the Frame Type field to 14, and
• send the message to the Multi-AP Controller.
If a Multi-AP Controller that supports DPP reconfiguration receives a Proxied Encap DPP message that includes an
encapsulated DPP Reconfiguration Announcement frame with a hash value that matches C-sign-key hash, the Multi-AP
Controller shall generate DPP Reconfiguration Authentication Request frame as per section 6.5.3 of [18] and encapsulate
it in a 1905 Encap DPP TLV and include it into Proxied Encap DPP message. In the 1905 Encap DPP TLV, the Multi-AP
Controller shall set the DPP Frame Indicator to zero, set the Frame Type to 15, set the Enrollee MAC Address Present bit
field to one and shall set the Destination STA MAC Address field to the MAC address of the Multi-AP Agent to be
reconfigured, and sends the message to all the Multi-AP Agents - one of which will become the Proxy Agent for a given
Enrollee Multi-AP Agent. If the Multi-AP Controller sends a Proxied Encap DPP message carrying an encapsulated DPP
Reconfiguration Authentication Request frame, it shall not include a DPP Chirp Value TLV into the message.
If a Proxy Agent receives a Proxied Encap DPP message that includes an encapsulated DPP Reconfiguration
Authentication Request frame destined for a Multi-AP Agent seeking reconfiguration, the Proxy Agent shall listen for a
DPP Reconfiguration Announcement frame. If a Proxy Agent receives a DPP Reconfiguration Announcement frame, it
© 2020 Wi-Fi Alliance. All Rights Reserved.
Used with the permission of Wi-Fi Alliance under the terms as stated in this document.
Page 47 of 163
Wi-Fi EasyMesh™ Specification v3.0
shall check that the hash in the frame matches the hash of the Controller's C-sign-key. If the hash matches and the DPP
Reconfiguration Authentication Request frame is for the Multi-AP Agent seeking reconfiguration based on the matching of
the source MAC address of the Reconfig Announcement frame with the Destination STA MAC Address field from the
1905 Encap DPP TLV, the Proxy Agent shall send the DPP Reconfiguration Authentication Request Public Action frame
to the Multi-AP Agent seeking reconfiguration. If the hash does not match, the Proxy Agent shall forward the
Reconfiguration Announcement frame to the Multi-AP Controller as specified above.
NOTE: this frame may be a Reconfiguration Announcement frame from a different Multi-AP Agent seeking
reconfiguration,
If a Proxy Agent receives a Proxied Encap DPP message that includes an encapsulated DPP Reconfiguration
Authentication Request frame, it shall store it until it receives a DPP Reconfiguration Announcement frame from a to be
reconfigured Multi-AP Agent matching the MAC address associated with the encapsulated DPP Reconfiguration
Authentication Request frame. If the Proxy Agent receives an 802.11 ACK frame from the Multi-AP Agent seeking
reconfiguration indicating receipt of the DPP Reconfiguration Authentication Request frame, it may discard the DPP
Reconfiguration Authentication Request frame. If the Proxy Agent receives a Chirp Notification message with Hash
Validity bit set to zero, Hash Length field set to zero and the Enrollee MAC Address present bit set 1 in the Chirp Value
TLV from the Multi-AP Controller, it shall discard the DPP Reconfiguration Authentication Request frame that is
associated with the Destination STA MAC Address field from the Chirp Value TLV.
If the Enrollee receives a DPP Reconfiguration Authentication Request frame, it shall follow the behaviour described in
[18] and send the DPP Reconfiguration Authentication Response frame to the Proxy Agent.
If the Multi-AP Controller receives a DPP Reconfiguration Authentication Response frame encapsulated in a 1905 Encap
DPP TLV carried in a Proxied Encap DPP message from a Proxy Agent, it shall send a DPP Reconfiguration
Authentication Confirm frame encapsulated in a 1905 Encap DPP TLV using a Proxied Encap DPP message to the
Enrollee through the Proxy Agent and send a Chirp Notification message to all the Multi-AP Agents with a Chirp Value
TLV with the Hash Validity field set to zero, the Enrollee MAC Address present bit set to one, the Destination MAC
Address field set to the MAC address of the just reconfigured Multi-AP Agent and the Hash Length field set to zero.
If the Proxy Agent receives a DPP Reconfiguration Authentication Confirm frame encapsulated in a 1905 Encap DPP TLV
of a Proxied Encap DPP message, it shall decapsulate the DPP Reconfiguration Authentication Confirm frame and send it
to the Multi-AP Agent seeking reconfiguration.
If the Enrollee receives a DPP Reconfiguration Authentication Confirm frame, it shall follow the behaviour described in
section 6.5.4 of [18] and send a DPP Configuration Request frame to the Multi-AP Controller.
If a backhaul STA of a Multi-AP Agent receives a protected Disassociation frame, it shall try to re-associate its backhaul
STA using the backhaul BSS credentials from the last onboarding procedure. If the re-association fails and the Multi-AP
Agent possesses a Privacy-protection-key from the Multi-AP Controller, then the Multi-AP Agent shall invoke the
reconfiguration algorithm from [18] section 6.5.2 by starting the Reconfiguration Announcement procedures. See Figure
14 for the Reconfiguration message flow.
If the backhaul STA of a Multi-AP Agent misses an implementation specific number of Beacon frames on the backhaul
BSS and the Multi-AP Agent possesses a Privacy-protection-key from the Multi-AP Controller, it shall invoke the
reconfiguration algorithm from [18] section 6.5.2 by starting Reconfiguration Announcement procedures.
The Multi-AP Agent shall retain its backhaul STA configuration until it successfully receives an updated configuration.
If the Multi-AP Agent needs to reconfigure its backhaul STA, it shall include a DPP Configuration Request object with
netRole=mapBackhaulSta into a DPP Configuration Request frame during reconfiguration.
If the Multi-AP Agent needs to reconfigure its 1905-layer, it shall include a DPP Configuration Request object with
netRole=mapAgent into a DPP Configuration Request frame during reconfiguration.
If triggered by receipt of a DPP URI, a Multi-AP Controller shall initiate the DPP Authentication Protocol as specified in
section 5.3.4.
Upon successful completion of the DPP Authentication protocol, the Multi-AP Controller is expected to receive a DPP
Configuration Request frame from the Enrollee. If the Multi-AP Controller receives a DPP Configuration Request object
with the Wi-Fi Technology field set to "infra" and the Network Role field is set to "sta", it shall generate one or more DPP
Configuration Response object(s) as specified in section 4.3 of [18] and shall populate the SSID field with a BSS that
provides fronthaul connectivity for the client device.
6 Multi-AP discovery
A discovery scheme is used to discover Multi-AP Controller and Multi-AP Agents in a Multi-AP network that is based on
an extension of the discovery functionality defined in [2].
Note: A Multi-AP Agent supporting [11] might use the Generic PHY query/response procedure to discover Generic Phy
non-Wi-Fi interfaces.
Additional Wi-Fi Media type (intfType) value(s) to 1905 Media type Table 6-12 (see [2]):
Table 12. Extension of 1905 Media type Table 6-12 in [2]
1 8 Wi-Fi 6 n=0
If a Multi-AP Controller receives a 1905 AP-Autoconfiguration Search message with SearchedRole set to Registrar and
SearchedService set to Multi-AP Controller, it shall include SupportedService TLV in the 1905 AP-Autoconfiguration
Response message per section 17.1.2. A Multi-AP Controller shall indicate Registrar in the SupportedRole TLV in the
1905 AP-Autoconfiguration Response message. A Multi-AP Controller shall indicate Multi-AP Controller in the
SupportedService TLV in the 1905 AP-Autoconfiguration Response message. A Multi-AP Controller that implements
Profile-2 shall include one Multi-AP Profile TLV in the 1905 AP-Autoconfiguration Response message with the Multi-AP
Profile field set to Multi-AP Profile-2.
• the SerialNumber string shall remain fixed over the lifetime of the device, including across firmware updates
• if a Multi-AP Agent supports multiple firmware images, the SoftwareVersion string shall be the software version of
the active firmware image
• to allow version comparisons, the SoftwareVersion string should be in the form of dot-delimited integers, where
each successive integer represents a more minor category of variation. For example, 3.0.21 where the
components mean: Major.Minor.Build
• if a Multi-AP Agent supports multiple execution environments, the ExecutionEnv string shall be the active
execution environment
If a Multi-AP Agent that implements Profile-2 most recently received Multi-AP Policy Config Request contains an
Unsuccessful Association Policy TLV with the Report Unsuccessful Associations bit set to one, and if the Multi-AP Agent
has sent fewer than the maximum number of Failed Connection messages (as specified in the Maximum Reporting Rate
element of the Unsuccessful Association Policy TLV) in the preceding minute, and the Multi-AP Agent detects that Wi-Fi
client has made a failed attempt to connect to any BSS operated by the Multi-AP Agent, the Multi-AP Agent shall send to
the Multi-AP Controller a Failed Connection message including a STA MAC Address TLV identifying the client that has
attempted to connect and a Status Code TLV with the Status Code set to a non-zero value that indicates the reason for
association or authentication failure as defined in Table 9-46 of [1], or a Status Code TLV with the Status Code set to zero
and a Reason Code TLV with the Reason Code indicating the reason the STA was disassociated or deauthenticated as
defined in Table 9-45 of [1].
If a Multi-AP Agent that implements Profile-3 sends a Failed Connection message, the Multi-AP Agent shall include a
BSSID TLV (see section 17.2.74) indicating the BSSID of the BSS to which the failed connection attempt was made.
Note: A STA does not send a Disassociation or Deauthentication frame to the source BSS when roaming using the
802.11 Reassociation procedure. If a STA roams away from a BSS for which it has negotiated Protected Management
Frames with the AP, and subsequently attempts to (re)associate to that same BSS while the AP maintains associated
state for the STA from the original association (i.e. if the AP has not realized that the STA left the BSS), the AP will initiate
a security procedure per IEEE 802.11 standard intended to protect the original association from unauthorized tear down.
This procedure involves rejection of the subsequent (re)association request for a timeout period, which can result in
significant outage for the STA. To avoid such outage, it is necessary for a Multi-AP Agent to internally synchronize
association state between BSSs it is operating, and also to determine when an associated STA has roamed to a BSS of
another Multi-AP Agent. For the latter, 1905 Topology Notification messages received from other Multi-AP Agents might
be used. A possible race condition might occur when the STA roams away and then rapidly attempts to (re)associate back
to the source BSS before the message indicating the initial roam has been received.
7 Multi-AP configuration
7.1 AP configuration
This specification extends the 1905 AP-Autoconfiguration procedure to enable a Multi-AP Controller to configure 802.11
interfaces (i.e. BSS) on each of the radio(s) of a Multi-AP Agent. A Multi-AP Agent treats each of its unconfigured radio(s)
as an “unconfigured IEEE 802.11 interface” in section 10.1 of [2]. A Multi-AP Controller configures Traffic Separation
policies using AP-Autoconfiguration WSC messages and / or Multi-AP AP Policy Config Request messages (see Section
19.1.2).
This specification extends the Authentication Types in Table 32 of [5] by defining a new value 0x0040 for SAE.
Table 13. Extension of Authentication Types Table 32 in [5]
To initiate (re)configuration of a radio, a Multi-AP Agent shall send an AP-Autoconfiguration WSC message per section
17.1.3. A Multi-AP Agent shall send a separate AP-Autoconfiguration WSC message per section 17.1.3 for each of its
radio(s). The Multi-AP Agent shall indicate the radio of the 802.11 configuration with a Radio Unique Identifier in the AP
Radio Basic Capabilities TLV (see section 17.2.7). The Multi-AP Agent shall set the MAC Address attribute in M1 in the
AP-Autoconfiguration WSC message to the 1905 AL MAC address of the Multi-AP device. The Multi-AP Agent shall set
the Authentication Type Flags attribute in M1 in the AP-Autoconfiguration WSC message to one of the values allowed in
[5] or to 0x0040 (indicating SAE) or to any valid combination, depending on the radio's supported AKMs from Table 9-133
of [1] . If a Multi-AP Agent that implements Profile-2 sends an AP-Autoconfiguration WSC message, it shall include one
Profile-2 AP Capability TLV and one AP Radio Advanced Capabilities TLV.
If a Multi-AP Controller receives a WSC TLV containing an M1, then it shall respond within one second with either 1) one
or more M2s for each BSS to be configured on the radio identified in the AP Radio Identifier TLV or 2) one M2 with bit 4
(Tear down bit) set to one in the Multi-AP Extension subelement to indicate that zero BSS are to be configured on the
radio identified in the AP Radio Identifier TLV per section 17.1.3.
A Multi-AP Controller shall include one WSC TLV containing an M2 (see [5]) for each BSS to be configured on the radio
identified in the AP Radio Identifier TLV in an AP-Autoconfiguration WSC message per section 17.1.3. The N2 nonce
specified in each M2 shall be unique. A Multi-AP Controller shall set the Authentication Type attribute in M2 to one of the
values allowed in [5] or to 0x0040 (indicating SAE) or to any valid combination, as per the Multi-AP Agent declaration in
M1's Authentication Types Flags.
A Multi-AP Controller indicates whether or not a BSS is to support Multi-AP backhaul connections and/or fronthaul
connections in the Multi-AP Extension subelement listed in Table 14 as part of AP-Autoconfiguration WSC message
illustrated in Figure 4. If a Multi-AP Controller sends an M2 indicating Fronthaul BSS, it shall not set the Authentication
Type attribute in that M2 to 0x0040 (SAE only).
The Multi-AP Controller shall not configure SAE-only mode on fronthaul BSSs. However, if the Multi-AP Agent indicates
support for SAE in the M1, the Controller might configure a fronthaul BSS to 0x0060 (PSK+SAE), aka WPA3 Transition
Mode.
The Multi-AP Extension subelement is carried in a Wi-Fi Alliance Vendor Extension attribute with the Vendor Extension
attribute ID set to 0x1049, Vendor ID set to 0x00372A, and the subelement ID set to 0x06. See Table 29 of [5].
If a BSS supports backhaul connections, a Multi-AP Controller shall include a Multi-AP Extension subelement in the AP-
Autoconfiguration WSC containing an M2 with bit 6 of the subelement value set to one. If a Controller wants a backhaul
BSS of a Multi-AP Agent that implements Profle-2 to disallow association to any Backhaul STA that would result in a
Profile-1 backhaul link (as per section 12.1), a Multi-AP Controller shall include a Multi-AP Extension subelement in the
AP-Autoconfiguration WSC containing an M2 with bit 6 of the subelement value set to one and bit 3 of the subelement
value set to one. If a Controller wants a backhaul BSS of a Multi-AP Agent that implements Profile-2 to disallow
association to any Backhaul STA that would result in a Profile-2 backhaul link (as per section 12.1), a Multi-AP Controller
shall include a Multi-AP Extension subelement in the AP-Autoconfiguration WSC containing an M2 with bit 6 of the
subelement value set to one and bit 2 of the subelement value set to one. If a BSS supports fronthaul connections, a
Multi-AP Controller shall include a Multi-AP Extension subelement in the AP-Autoconfiguration WSC containing an M2
with bit 5 of the subelement value set to one. The Wi-Fi Alliance Vendor Extension attribute shall be carried in ConfigData
encrypted by the KeyWrapKey in the AP-Autoconfiguration WSC message containing an M2.
Table 14. Multi-AP Extension subelement
bits 1 - 0 Reserved
To facilitate one or more backhaul STAs acting as an enrollee to connect to a Multi-AP network, a Multi-AP Controller
should indicate that at least one BSS on any of the Multi-AP Agent(s) is set to support Multi-AP backhaul connections.
If triggered1, the Multi-AP Controller shall include a Multi-AP Extension subelement with bit 6 Backhaul BSS and/or bit 5
Fronthaul BSS set to one in the corresponding M2 in an AP-Autoconfiguration WSC message per section 17.1.3.
A Multi-AP Controller shall limit the number of WSC TLVs containing M2 in the AP-Autoconfiguration WSC message to no
more than the value in the Maximum number of BSS(s) supported by this radio in the AP Radio Basic Capabilities TLV. A
Multi-AP Controller shall set the Radio Unique Identifier field in the AP Radio Identifier TLV in the AP-Autoconfiguration
WSC message to the value of the same field specified in the AP Radio Basic Capabilities TLV in the corresponding AP-
Autoconfiguration WSC message received from the Multi-AP Agent.
If a Multi-AP Agent receives an AP-Autoconfiguration WSC message containing one or more M2, it shall validate each M2
(based on its 1905 AL MAC address) and configure a BSS on the corresponding radio for each of the M2. If the Multi-AP
Agent is currently operating a BSS with operating parameters that do not completely match any of the M2 in the received
AP-Autoconfiguration WSC message, it shall tear down that BSS. If a Multi-AP Agent receives an AP-Autoconfiguration
WSC message containing an M2 with a Multi-AP Extension subelement with bit 4 (Tear Down bit) of the subelement value
set to one (see Table 14), it shall tear down all currently operating BSS(s) on the radio indicated by the Radio Unique
Identifier, and shall ignore the other attributes in the M2. If a Multi-AP Agent that implements Profile-2 receives an AP-
Autoconfiguration WSC message for a backhaul BSS with bit 3 of the Multi-AP Extension subelement set to one, it shall
configure such BSS to refuse association from backhaul STAs that would result in a Profile-1 backhaul, as per section 12.
If a Multi-AP Agent that implements Profile-2 receives an AP-Autoconfiguration WSC message for a backhaul BSS with bit
2 of the Multi-AP Extension subelement set to one, it shall configure such BSS to refuse association from backhaul STAs
that would result in a Profile-2 backhaul, as per section 12.
If a Multi-AP Agent that implements Profile-2 receives an AP-Autoconfiguration WSC with a Traffic Separation Policy TLV
with the Number of SSIDs field set to a non-zero value and the Multi-AP Agent is unable to configure one or more BSS as
indicated by the M2 TLVs and by the Traffic Separation Policy TLV, the Multi-AP Agent shall tear down each of those BSS
and shall send an Error Response message per section 17.1.37 containing one Profile-2 Error Code TLVs with reason
code field set to 0x07 or 0x08.
1 This specification only partially defines the algorithms that govern the operation of a Multi-AP Controller. These Multi-
AP Controller algorithms' actions are alluded to by the wording "If triggered, a Multi-AP Controller..." in this specification.
If a Multi-AP Agent receives an AP-Autoconfiguration Renew message, then it shall respond within one second by
sending one AP-Autoconfiguration WSC message per section 17.1.3 for each of its radios, irrespective of the value
specified in the SupportedFreqBand TLV in the AP-Autoconfiguration Renew message.
If a Multi-AP Agent that implements Profile-2 receives an AP-Autoconfiguration Renew message, then it shall retain all
configuration and policy it has previously received in TLVs except those explicitly updated by the Autoconfig Renew
procedure.
Note: A Multi-AP Agent that implements Profile-2 might check that the AP-Autoconfiguration Renew message is from the
Multi-AP Controller with which it previously on-boarded (for example, by comparing the ALID of the Controller for the new
request against the ALID of the original Controller) and ignore the message if not.
Table 15. Multi-AP Profile subelement
Subelement 1 octet 0x01 Number of octets in the subelement value (subelement payload).
Length
Subelement Value 1 octet 0x00; Reserved Multi-AP Profile
0x01: Multi-AP Profile-1
0x02: Multi-AP Profile-2
0x03: Multi-AP Profile-3
0x04~0xFF: Reserved
• Include one BSS Configuration Report TLV in the 1905 Topology Response message
• If the Multi-AP Agent configures a BSS to be a member of a Multiple BSSID set, the Multi-AP Agent shall set the
Multiple BSSID Set bit of that BSSID to one in the BSS Configuration Report TLV. Otherwise, the Multi-AP Agent
shall set the bit to zero.
• If the Multi-AP Agent configures a BSS to be the Transmitted BSSID of a Multiple BSSID Set, the Multi-AP Agent
shall set the Transmitted BSSID bit of that BSSID to one in the BSS Configuration Report TLV. Otherwise, the
Multi-AP Agent shall set the bit to zero.
The Steering Policy TLV defined in section 17.2.11 contains steering related policies. The Local Steering Disallowed STA
list indicates STAs that are only to be steered in response to a steering message indicating Steering Mandate from the
Multi-AP Controller (see section 11.1). The BTM Steering Disallowed STA list indicates STAs that are to be steered using
the Client Association Control mechanism (see section 11.6). The Steering Policy field indicates the policy for Multi-AP
Agent-initiated steering on a given radio. The Channel Utilization Threshold and RCPI Steering Threshold fields indicate
thresholds used in Agent-initiated steering for each radio.
The Metrics Reporting Policy TLV defined in section 17.2.12 contains link metrics reporting related policies. The AP
Metrics Reporting Interval field indicates if periodic AP metrics reporting is to be enabled, and if so the cadence. The STA
Metrics Reporting RCPI Threshold and AP Metrics Channel Utilization Reporting Threshold fields indicate if threshold-
based metric reporting is to be enabled for STA and/or AP metrics, and if so the corresponding thresholds for each radio.
The Channel Scan Reporting Policy TLV defined in section 17.2.37 identifies whether a Multi-AP Agent that implements
Profile-2 is required to report the results of any Independent Channel Scan that it performs to the Multi-AP Controller.
The Unsuccessful Association Policy TLV defined in section 17.2.58 contains policies related to reporting unsuccessful
associations. The Report Unsuccessful Associations bit indicates whether a Multi-AP Agent that implements Profile-2
shall report unsuccessful association attempts of client STAs. The Maximum Reporting Rate value indicates the maximum
rate at which the unsuccessful associations shall be reported.
8 Channel selection
Multi-AP control messages enable the configuration of a Multi-AP Agent with parameters for channel selection.
• If a radio cannot operate on a channel in an operating class due to detection of radar, that channel shall be
indicated as a Non-operable channel
• If conditions exist whereby normal operation of a BSS by the radio on a channel would be unsuccessful (e.g. due
to strong interference), the channel shall be indicated as a Non-operable channel.
If a Multi-AP Agent’s channel preferences change, it shall send an unsolicited Channel Preference Report to the Multi-AP
Controller indicating the Multi-AP Agent’s current preferences.
If a Multi-AP Agent detects a change in the DFS status of any channel, it shall send an unsolicited Channel Preference
Report to the Controller setting the appropriate DFS related Reason Code for the channel per Table 30 of section 17.2.13.
If a Multi-AP Controller receives an unsolicited Channel Preference Report message, then it shall respond within one
second with a 1905 Ack message.
If a Multi-AP Agent sent a Channel Selection Response message indicating acceptance of the Multi-AP Controller’s
request for a given radio, the Multi-AP Agent shall make any necessary adjustments to the operating channel, operating
classes and transmit power of its radios and then, irrespective of whether any adjustments have been made, send an
Operating Channel Report message per section 17.1.13 containing information regarding the current operating
parameters for each of the Multi-AP Agent’s radios.
If a Multi-AP Controller receives an Operating Channel Report message, then it shall respond within one second with a
1905 Ack message.
If a Multi-AP Agent changes the operating channel, operating class and/or nominal transmit power of a radio of its own
accord (i.e. not in response to reception of a Channel Selection Request message), then it shall send an unsolicited
Operating Channel Report message per section 17.1.13 to the Multi-AP Controller indicating the new operating
parameters for the corresponding radio.
Note: The operating classes specified in an Operating Channel Report TLV are equal to the values indicated in the
Operating Classes field of the Supported Operating Classes element (per section 9.4.2.54 of [1]), if the Supported
Operating Classes element is transmitted by the AP operating in the BSS on the corresponding radio. This includes an
operating class corresponding to each channel bandwidth in which the radio is currently operating (e.g. typically 20, 40
and 80 MHz Operating Classes for a VHT80 AP). When a primary channel is used, the 20 MHz Operating Class indicates
that primary channel.
If a Multi-AP Agent is performing a CAC and a Multi-AP Agent receives a CAC request for a different CAC method,
bandwidth, or channel, on a given radio unique identifier, then it shall terminate any current CAC and begin a new CAC
according to the new request within 15 seconds. If a Multi-AP Agent terminates an ongoing CAC due to receiving a new
CAC Request, the Multi-AP Agent shall not send a Channel Preference Report message for the terminated CAC.
If a Multi-AP Agent is performing a CAC and receives a CAC Termination message, it shall respond within one second
with a 1905.1 ACK, terminate any ongoing CAC, and return the radio that was performing the CAC to its most recent
operational configuration. The Multi-AP Agent shall not send a Channel Preference Report message for the terminated
CAC.
If a Multi-AP Agent performing a CAC encounters any of the following three conditions:
• Include one Channel Scan Capabilities TLV in the AP Capability Report message. Operating classes specified in
this TLV shall be 20 MHz operating classes from Table E-4 of [1]. If the "On boot only" bit is set to one, the Scan
Impact field shall be set to 0x00.
• Include one CAC Capabilities TLV in an AP Capabilities Report message. A Multi-AP Agent may restrict its
reported CAC capabilities to match the regulations of the country in which it is operating. The CAC Capabilities
TLV shall include an indication of the country in which the Multi-AP Agent is operating according to the two letter
codes provided in [6]. The Multi-AP Agent shall specify CAC capabilities for each Simultaneous CAC Radio in the
Multi-AP Agent.
• Include one Profile-2 AP Capability TLV in the AP Capability Report message.
If a Multi-AP Agent that implements Profile-2 sends a Profile-2 AP Capability TLV, it shall also perform the following:
If triggered, a Multi-AP Controller shall send a Client Capability Query message per section 17.1.14. If triggered and
supported, a Multi-AP Agent shall send a Client Capability Query message per section 17.1.14.
If a Multi-AP Agent receives a Client Capability Query message, then within one second it shall respond with a Client
Capability Report message per section 17.1.15. The Client Capability Report message shall contain the same MID that
was received in the Client Capability Query message. If the STA specified in the Client Capability Query message is not
associated with any of the BSS operated by the Multi-AP Agent (an error scenario), the Multi-AP Agent shall set the result
code in the Client Capability Report TLV to 0x01 per section 17.2.19 and include an Error Code TLV with the reason code
set to 0x02 and the STA MAC address field included per section 17.2.36 in the Client Capability Report message. If the
STA specified in the Client Capability Query message is associated with any of the BSS operated by the Multi-AP Agent
and the Multi-AP Agent is unable to report the client's capability, the Multi-AP Agent shall set the result code in the Client
Capability Report TLV to 0x01 and include an Error Code TLV with the reason code set to 0x03 in the Client Capability
Report message.
• macThroughputCapacity field is the estimated MAC data rate in Mb/s for the backhaul link in the downlink
direction when reported by a Multi-AP Agent that operates the AP for the link, or the estimated MAC data rate in
Mb/s for the backhaul link in the uplink direction when reported by the Multi-AP Agent that operates the backhaul
STA for the link, if 100% of channel air time and BSS operating bandwidth were to be available.
• linkAvailability field is the predicted percentage of Air Time that the backhaul link would consume given the
current channel condition, assuming sufficient BE traffic is generated over the backhaul link to the client STAs
and/or other backhaul STAs associated with the downstream Multi-AP Agent to fill this Air Time.
Note: Additional clarifications with respect to fields in a 1905 Receiver link metric TLV are as follows:
• The RSSI field is calculated from the RCPI of a number of PPDU received when reported by a Multi-AP Agent
that operates the AP for the link, or the Beacon RSSI when reported by a Multi-AP Agent that operates the
backhaul STA for the link.
Note: A Multi-AP Agent supporting [11] might use the transmitter and receiver Link metric TLVs as defined in [11] to report
the metrics of Generic Phy non-Wi-Fi interfaces.
• One AP Metrics TLV per section 17.2.22 for each of the BSSs specified in the query.
• If the Multi-AP Agent implements Profile-2, it shall include one AP Extended Metrics TLV for each of the BSSs
specified in the query.
• If the Multi-AP Agent implements Profile-2, it shall include one Radio Metrics TLV for each of the radios specified
in the query.
The AP Metrics Response message shall contain the same MID that was received in the AP Metrics Query message.
If a Multi-AP Agent receives a Metric Reporting Policy TLV with AP Metrics Reporting Interval field set to a non-zero
value, it shall send an AP Metrics Response message to the Multi-AP Controller once every reporting interval specified in
the field and containing the following TLVs:
• If the Multi-AP Agent implements Profile-2, it shall include one AP Extended Metrics TLV for each BSS which it is
operating
• If the Multi-AP Agent implements Profile-2, it shall include one Radio Metrics TLV for each radio which it is
operating.
If a Multi-AP Agent receives a Metric Reporting Policy TLV with AP Metrics Channel Utilization Reporting Threshold field
set to a non-zero value for a given radio, it shall measure the channel utilization on that radio in each consecutive
implementation-specific measurement period and, if the most recently measured channel utilization has crossed the
reporting threshold in either direction (with respect to the previous measurement), it shall send an AP Metrics Response
message to the Multi-AP Controller containing the following TLVs:
If triggered, a Multi-AP Controller shall send a Channel Scan Request message (see section 17.1.33) to a Multi-AP Agent.
If a Multi-AP Controller sends a Channel Scan Request to a Multi-AP Agent with the Perform Fresh Scan bit set to zero, it
shall set the Number of Operating Classes field for each radio listed to zero.
A Multi-AP Controller shall not send a Channel Scan Request to a Multi-AP Agent that implements Profile-1.
If a Multi-AP Controller receives a Channel Scan Report message, it shall respond within one second with a 1905 Ack
message.
If a Multi-AP Agent receives a Channel Scan Request message, it shall respond within one second with a 1905 Ack
message.
On-Boot Scan
If a Multi-AP Agent sets the "On boot only" bit to 1 in its Channel Scan Capabilities TLV, it shall perform a
Channel Scan at boot on each of the radio and operating class and channel combinations specified in its Channel
Scan Capabilities and shall store the scan results.
Requested Channel Scan - Fresh
If a Multi-AP Agent has set the "On boot only" bit to 0 in its Channel Scan Capabilities TLV and receives from the
Multi-AP Controller a Channel Scan Request message containing a Channel Scan Request TLV with the “Perform
Fresh Scan” bit set to one and the Multi-AP Agent is currently performing a Requested Channel Scan, the Multi-
AP Agent should abort the current Requested Channel Scan as soon as practical and shall send to the Multi-AP
Controller a Channel Scan Report Message relating to that Channel Scan before acting on the new request as
described in the following paragraph.
If a Multi-AP Agent that has set the "On boot only" bit to 0 in its Channel Scan Capabilities TLV receives from the
Multi-AP Controller a Channel Scan Request message containing a Channel Scan Request TLV with the “Perform
Fresh Scan” bit set to one and is not currently performing a Requested Channel Scan, the Multi-AP Agent shall,
as soon as practical, start a sequence of Channel Scans on the requested radio and operating class and channel
combinations. When finished scanning, or within 5 minutes, whichever comes sooner, the Multi-AP Agent shall
send to the Multi-AP Controller a Channel Scan Report Message (see section 17.1.34) containing one Timestamp
TLV (see section 17.2.41) indicating the current time and one Channel Scan Result TLV (see section 17.2.40) for
each of the operating class and channel combinations listed in the Channel Scan Request TLV. Each Channel
Scan Result TLV shall contain either a success Status Code and the scan result data or a non-Success Scan
Status code, as defined in Table 57, indicating the reason the scan could not be completed. The Multi-AP Agent
shall set the Status Code as follows:
If the requested Channel Scan operating class and channel combination is in the set of operating class and
channel combinations in the Multi-AP Agent's declared Channel Scan Capabilities and the Multi-AP Agent
successfully completed the fresh Channel Scan, the Multi-AP Agent shall set the Status Code to 0x00
(Success).
If the requested Channel Scan operating class and channel combination is not in the set of operating class
and channel combinations in the Multi-AP Agent's declared Channel Scan Capabilities, the Multi-AP Agent
shall set the Status Code to 0x01.
If the Multi-AP Agent received the Channel Scan Request less than the Minimum Scan Interval declared in
the Multi-AP Agent's Channel Scan Capabilities after the previously received Channel Scan Request, the
Multi-AP Agent may set the Status Code to 0x02 and not perform the Channel Scan.
If the Multi-AP Agent has not performed the Channel Scan because the radio is too busy, the Multi-AP Agent
shall set the Status Code to 0x03.
If the Multi-AP Agent has not been able to complete the Channel Scan in the time available, the Multi-AP
Agent shall set the Status Code to 0x04.
If the Multi-AP Agent has aborted the Channel Scan due to receiving another Channel Scan Request, the
Multi-AP Agent shall set the Status Code to 0x05.
The Multi-AP Agent shall store the result of the last successful scan on each radio and operating class and
channel combination.
If a Multi-AP Agent has set the "On boot only" bit to 1 in its Channel Scan Capabilities TLV and receives from the
Multi-AP Controller a Channel Scan Request message containing a Channel Scan Request TLV with the “Perform
Fresh Scan” bit set to one, the Multi-AP Agent shall respond with a Channel Scan Report Message containing
one Timestamp TLV indicating the current time and one Channel Scan Result TLV for each of the operating class
and channel combinations listed in the Channel Scan Request TLV and set the Status Code to 0x06.
Requested Channel Scan - Stored
If a Multi-AP Agent receives a Channel Scan Request message containing a Channel Scan Request TLV with the
“Perform Fresh Scan” bit set to zero, the Multi-AP Agent shall respond with a Channel Scan Report Message (see
section 17.1.34) containing one Timestamp TLV (see section 17.2.41) indicating the current time and one
Channel Scan Result TLV (see section 17.2.40) for each of the operating class and channel combinations for
which it has stored results for each of the radios listed in the Channel Scan Request TLV, even if the Channel
Scan Result is from an Independent Channel Scan and the "Report Independent Channel Scans" bit was set to
zero in the most recently received Channel Scan Reporting Policy TLV. If the Multi-AP Agent has set the "On boot
only" bit to 1 in its Channel Scan Capabilities TLV and has not yet completed the On-boot Scan on an operating
class and channel combination listed in its Channel Scan Capabilities TLV, the Multi-AP Agent shall also include a
Channel Scan Result TLV for that operating class and channel combination with the Status Code set to 0x04.
Independent Channel Scan
A Multi-AP Agent may perform an Independent Channel Scan.
If a Multi-AP Agent performs a set of Independent Channel Scans, and the “Report Independent Channel Scans”
bit was set to one in the most recently received Channel Scan Reporting Policy TLV, then the Multi-AP Agent
shall report the channel scan results to the Multi-AP Controller in a Channel Scan Report message as described
above in Section 10.2.2.2 for a fresh Requested Channel Scan.
If a Multi-AP Agent performs a set of Independent Channel Scans, and has not received a Channel Scan
Reporting Policy TLV, then the Multi-AP Agent shall not report the channel scan results to the Multi-AP Controller.
If the number of neighbors detected during a channel scan would mean that the channel scan report message would not
fit within one 1905.1 CMDU, the Multi-AP Agent shall split the channel scan report across multiple Channel Scan Result
TLVs by splitting the information related to sets of neighbor BSSs into separate Channel Scan Result TLVs and setting
the NumberofNeighbors field to the number of neighbors contained in the corresponding TLV.
zero per section 17.2.24 and include an Error Code TLV with the reason code field set to 0x02 and the STA MAC address
field included per section 17.2.36.
If a Multi-AP Agent receives a Metric Reporting Policy TLV with STA Metrics Reporting RCPI Threshold field set to a non-
zero value for a given radio, the Multi-AP Agent shall monitor the uplink RCPI for each STA associated to a BSS operating
on that radio and, if the most recently measured uplink RCPI for a STA has crossed the STA Metrics Reporting RCPI
Threshold including hysteresis margin in either direction (with respect to the previous measurement), the Multi-AP Agent
shall send an Associated STA Link Metrics Response message to the Multi-AP Controller containing an Associated STA
Link Metrics TLV and if the Multi-AP Agent implements Profile-2 one Associated STA Extended Link Metrics TLV
corresponding to that STA. Unless STA Metrics Reporting RCPI Hysteresis Margin Override field is set to a non-zero
value in the most recently received Metric Reporting Policy TLV (if any) relating to a given radio, a Multi-AP Agent should
use a non-zero implementation-specific hysteresis margin that is sufficient to avoid excessive generation of Associated
STA Link Metrics Response messages caused by rapid fluctuations of uplink RCPI measurements around the RCPI
threshold and the Multi-AP Agent shall not use a hysteresis margin that is greater than 5 dB. If STA Metrics Reporting
RCPI Hysteresis Margin Override field is set to a non-zero value in the most recently received Metric Reporting Policy
TLV, a Multi-AP Agent shall use the value specified for STA Metrics Reporting RCPI Hysteresis Margin Override field as
RCPI hysteresis margin when determining when to send an Associated STA Link Metrics Response message for RCPI
threshold based reporting.
When a Multi-AP Agent measures RCPI or SNR values for the purpose of calculating the Estimated MAC Data Rate and
uplink RCPI used for STA metric reporting, these values may be averaged over time using an implementation-specific
smoothing function. When a non-zero STA Metrics Reporting RCPI Threshold is configured, a Multi-AP Agent should
perform sufficient smoothing of uplink RCPI measurements to avoid excessive generation of Associated STA Link Metrics
Response messages caused by measurement noise.
If a Multi-AP Agent sends an Associated STA Link Metrics TLV, it shall set the values of the Estimated MAC Data Rate
metrics for downlink and uplink of the associated link based on the most recently measured uplink and downlink RCPI or
SNR values. The Estimated MAC Data Rate metric is an estimate of the MAC layer throughput achievable on the link if
100% of channel air time and BSS operating bandwidth were to be available. The algorithm used by the Multi-AP Agent to
calculate the Estimated MAC Data Rate metrics is implementation-specific. A reference method2 is defined in Annex R.7
of [1], which takes RCPI or SNR as inputs, and where with respect to Equation R-1,
𝑀𝑃𝐷𝑈𝑝𝑃𝑃𝐷𝑈 × 𝐴_𝑀𝑆𝐷𝑈_𝐵 × 8
𝐸𝑠𝑡𝑖𝑚𝑎𝑡𝑒𝑑 𝑀𝐴𝐶 𝐷𝑎𝑡𝑎 𝑅𝑎𝑡𝑒 =
𝑃𝑃𝐷𝑈𝐷𝑢𝑟
2 In Equation R-2, P_adjust should take into account the expected interference caused by OBSS and other external
interferers, as well as the expected inter-stream MU-MIMO interference (if applicable). “Inbound” indicates uplink direction,
while “Outbound” indicates downlink direction
© 2020 Wi-Fi Alliance. All Rights Reserved.
Used with the permission of Wi-Fi Alliance under the terms as stated in this document.
Page 68 of 163
Wi-Fi EasyMesh™ Specification v3.0
Agent measures RCPI values for unassociated STA link metric reporting, these values may be averaged over time using
an implementation-specific smoothing function.
If the Multi-AP Agent has collected one or more uplink RCPI measurements, it shall send an Unassociated STA Link
Metrics Response message per section 17.1.21. A Multi-AP Agent may send the uplink RCPI measurements in one or
more Unassociated STA Link Metrics Response messages immediately after some of the measurements become
available or may bundle into a single Unassociated STA Link Metrics Response message. If the Multi-AP Agent cannot
obtain any RCPI measurements on all of the STAs specified in the Unassociated STA Link Metrics Query message after
some implementation-specific timeout, the Multi-AP Agent shall set the number of STAs included field in the Unassociated
STA Link Metrics Response message to zero per section 17.2.26.
If a Multi-AP Controller receives an Unassociated STA Link Metrics Response message, then it shall respond within one
second with a 1905 Ack message.
• Minimizing the number of channels on which the STA is required to scan in order to make the measurements to
only those channels on which BSS of interest are operating
• Setting the Specify SSID field to one unless reports for BSS outside the currently associated ESS are required
• Refraining from setting the Reporting Detail field to value two, and minimizing the number of Element IDs
requested when Reporting Detail field is set to value one
If a Multi-AP Agent receives a Beacon Report from the STA, it shall send a Beacon Metrics Response message to the
Multi-AP Controller per section 17.1.23 for each Beacon Report received from the STA and include all the measurement
reports contained in the Beacon Report from the STA.
If a Multi-AP Controller receives a Beacon Metrics Response message, then it shall respond within one second with a
1905 Ack message.
Note: A Measurement Report message in a Beacon Metrics Report message contains an Actual Measurement Start Time
field indicating the time at which the STA performed the measurements indicated in the report. If the STA only supports
Beacon Table mode (where the STA responds with cached Beacon Report measurements), it is possible that the time of
this measurement will be prior to the time the Beacon Metrics Query was received by the Multi-AP Agent.
11 Client steering
Multi-AP control messages enable efficient steering of STAs between BSSs in a Multi-AP network. These control
messages enable steering of client STAs which support 802.11v BSS Transition Management (BTM) as well as client
STAs which do not support BTM.
• The time delta since the message was received is less than the value of the Steering Opportunity Window field in
the message
• The Multi-AP Agent has not terminated the Steering Opportunity by sending a Steering Completed message
• The STA’s MAC address is not included in the Local Steering Disallowed STA List in the Steering Policy TLV
A Multi-AP Agent’s decision whether or not to steer a STA and whether to steer a STA to a target BSS identified in a
Client Steering Request message that indicates a Steering Opportunity should use implementation-specific mechanisms
per section 11.4.
If triggered, a Multi-AP Agent shall send a Steering Completed message per section 17.1.28 to the Multi-AP Controller to
terminate a Steering Opportunity. The Steering Completed message shall contain a new MID value.
If a Multi-AP Controller receives a Steering Completed message, then it shall respond within one second with a 1905 Ack
message.
• If the Steering Policy field is set to 0x00 (Agent-initiated Steering Disallowed), there are no additional rules by
which the Multi-AP Agent is allowed to steer a STA.
• If the Steering Policy field is set to 0x01 (Agent-initiated RCPI-based Steering Mandated) and the Multi-AP Agent
indicated support for Agent-Initiated RCPI-based Steering in the AP Capability TLV, the Multi-AP Agent shall
additionally follow the RCPI-based steering rules per section 11.3.1.
• If the Steering Policy field is set to 0x02 (Agent-initiated RCPI-based Steering Allowed), the Multi-AP Agent may
additionally follow the RCPI-based steering rules per section 11.3.1.
• The measured uplink RCPI for the STA falls below the RCPI Steering Threshold specified in the Steering Policy
TLV for the corresponding radio.
• The STA’s MAC address is not included in the Local Steering Disallowed STA List in the Steering Policy TLV.
• The Agent has identified a suitable target BSS for the STA.
• Transmit a BTM Request frame to the STA including a Neighbor Report element specifying the BSSID, Operating
Class and Channel Number of the identified target BSS. The Operating Class shall contain an enumerated value
from Table E-4 in Annex E of [1].
▪ If the STA is a Wi-Fi Agile Multiband capable STA, a Multi-AP Agent that implements Profile-2 shall include in
the BTM Request frame:
o A BSS Transition Candidate Preference subelement into the Neighbor Report element and shall
set the value of the Preference field in the subelement to 255 per section 3.5.2 of [8].
o An MBO-OCE IE that contains a Transition Reason Code as specified in Table 18 of [8].
• If the steering attempt is in response to the reception of a Client Steering Request message with Request Mode
bit set to one (indicating a Steering Mandate):
▪ No additional Neighbor Report elements shall be included in the BTM Request frame
▪ The Abridged bit in the BTM Request frame shall be set to the value of the BTM Abridged field in the Client
Steering Request message received for the Steering Mandate
▪ The Disassociation Imminent bit in the BTM Request frame shall be set to the value of the BTM
Disassociation Imminent bit in the Client Steering Request message received for the Steering Mandate.
▪ If the Disassociation Imminent bit is set to one, the Disassociation Timer field in the BTM Request frame (in
TBTTs) shall be set according to the BTM Disassociation Timer field (in TUs) in the Client Steering Request
message received for the Steering Mandate, else the BTM Disassociation Timer field in Client Steering
Request is ignored.
▪ If the Multi-AP Agent receives a BTM Response frame in response to the BTM Request frame, it shall send a
Client Steering BTM Report message per section 17.1.26 containing the BTM Response to the Multi-AP
Controller. The Client Steering BTM Report message shall contain a new MID value.
• If the steering attempt is in response to reception of a Multi-AP Controller initiated Steering Opportunity, the BTM
Disassociation Imminent, the BTM Abridged and the BTM Disassociation Timer fields in the Client Steering
Request message are ignored.
If a Multi-AP Agent attempts to steer a STA that does not indicate support for BSS Transition Management or the STA’s
MAC address is included in the BTM Steering Disallowed STA list indicated in the most recently received Steering Policy
TLV, and:
• If the steering attempt is not in response to the reception of a Client Steering Request message with Request
Mode bit set to one (indicating a Steering Mandate), the Multi-AP Agent may use the Client Association Control
mechanism per section 11.6 to block the STA from associating to any BSS in the network other than the target
BSS(s) and,
• If the Multi-AP Agent has not received indication that the STA has already left the BSS, the Multi-AP Agent shall
send a Disassociation frame or Deauthentication frame to the STA.
If a Multi-AP Agent transmits a BTM Request frame to a STA as result of a steering attempt for a Multi-AP Controller
Initiated Steering Opportunity per section 11.2 or an Agent Initiated Steering per RCPI Threshold per section 11.3, and the
Multi-AP Agent subsequently identifies that the STA does not intend to leave the BSS (e.g. the STA sends a BTM
Response with “Reject” status code), the Multi-AP Agent may attempt to steer the STA using the Client Association
Control mechanism per section 11.6 and by sending a Disassociation frame or Deauthentication frame to the STA.
If a Multi-AP Controller receives a Client Steering BTM Report message, then it shall respond within one second with a
1905 Ack message.
then for each of those associated STAs, the Multi-AP Agent shall include an Error Code TLV with the reason code field
set to 0x01 and the STA MAC address field included per section 17.2.36 in the 1905 Ack message.
If a Multi-AP Agent receives a Client Association Control Request message with Association Control field set to 0x00
(indicating Client Blocking) and all the following conditions are true, it shall reject a first attempt by a STA specified in the
request to associate to the specified BSS operated by the Multi-AP Agent and should not respond to any Probe Request
frames sent by the specified STA(s) to the specified BSS:
• The time delta since the message was received is less than the value of Validity Period field in the Client
Association Control Request message.
• The Multi-AP Agent has not subsequently received a Client Association Control Request message with
Association Control field set to 0x01 (indicating Client Unblocking) specifying the STA.
Otherwise, the Multi-AP Agent shall not perform blocking of the STA.
A Multi-AP Agent that implements Profile-2 shall not reject associations using other association control mechanisms, such
as ACL lists or (if supported) the configuration of an RSSI threshold with the RSSI based Association Rejection feature of
the Wi-Fi Optimized Connectivity program (see [9]).
The Validity Period field in a Client Association Control Request message with Association Control field set to 0x01 (Client
Unblocking) is ignored.
Note: When a Multi-AP Agent rejects an association attempt, it does so either by sending an Authentication frame with a
“Reject” status code or, if it does not reject the authentication, by sending a (Re-)Association Response frame with a
“Reject” status code.
If a Multi-AP Agent rejects an authentication request or (re-)association request as a result of having received a Client
Association Control Request (i.e. if the Multi-AP Agent would have otherwise accepted the authentication or (re-
)association), it shall set the Status Code in the Authentication frame or (Re-)Association Response frame to a value that
does not indicate capabilities mismatch or negotiation failure, and should set the Status Code to value 33 (denied due to
insufficient bandwidth) or 34 (denied due to poor channel conditions).
field set to 0x00. If the association status in the BSS changes, the Multi-AP Agent shall send a new Association Status
Notification message.
12 Backhaul optimization
In a Multi-AP network, the backhaul STA of a Multi-AP Agent connects to a BSS to access backhaul connectivity. A Multi-
AP Agent might have chosen from multiple candidate BSSs during onboarding and subsequently a Multi-AP Controller
might want to move that Multi-AP Agent to a different BSS.
If triggered, a Multi-AP Controller shall send a Backhaul Steering Request message to request the Multi-AP Agent to
connect its backhaul STA to a different BSS per section 17.1.29.
If a Multi-AP Agent receives a Backhaul Steering Request message, then it shall respond within one second with a 1905
Ack message to the Multi-AP Controller and attempt to (re-)associate with the target BSS specified in the message. After
the Multi-AP Agent has associated with the target BSS successfully or 10 seconds has expired since the reception of the
Backhaul Steering Request message, the Multi-AP Agent shall send a Backhaul Steering Response message to the Multi-
AP Controller per section 17.1.30. If the Multi-AP Agent successfully associated with the target BSS specified in the
Backhaul Steering Request message, the Multi-AP Agent shall set the result code in the Backhaul Steering Response
TLV to 0x00.
If the Multi-AP Agent cannot (re-)associate with the target BSS specified in the Backhaul Steering Request message, the
Multi-AP Agent shall set the result code in the Backhaul Steering Response TLV to 0x01 and include an Error Code TLV
in the Backhaul Steering Response message with the reason code set to one of the 0x04, 0x05 and 0x06 per section
17.2.36.
In general, when a Multi-AP Agent performs the steering requested by the Multi-AP Controller, there might be a brief user
data interruption on the STAs that are associated with the Multi-AP Agent due to data path change and the duration of the
steering (similar to steering by using the BSS Transition Management message on a STA). If a Multi-AP Agent’s fronthaul
BSS is operating on the same channel as its backhaul STA and the Multi-AP Agent receives a Backhaul Steering Request
message that requires the backhaul STA to switch to a different channel, there might be connection interruption on the
clients that are associated with the Multi-AP Agent’s fronthaul BSS while the channel switch occurs. The Multi-AP
Controller should attempt to minimize or avoid such interruption if possible in such cases (e.g. by steering the clients to
another fronthaul BSS, if available, prior to triggering backhaul steering).
If a Multi-AP Controller receives a Backhaul Steering Response message, then it shall respond within one second with a
1905 Ack message to the sender of the message.
If a Multi-AP Agent rejects an authentication request or (re-)association request as a result of a “Backhaul STA
association disallowed” configuration and it is not able to provide a suggested BSS transition target, it shall set the Status
Code in the corresponding Authentication frame or (Re-)Association Response frame to 12 (denied other reasons).
A Multi-AP Controller that implements Profile-2 should not request a Multi-AP Agent that implements Profile-1 to associate
its backhaul STA to a BSS configured as “Profile-1 Backhaul STA association disallowed”.
A Multi-AP Controller that implements Profile-2 should not request a Multi-AP Agent that implements Profile-2 to associate
its backhaul STA to a BSS configured as “Profile-2 Backhaul STA association disallowed”.
• Messages (see section 6.3 of [2] and section 17.1) transmitted with CMDU reliable multicast transmission
procedures (see section 15.1) have both the multicast and unicast transmissions of TLVs protected by a message
integrity code (MIC). Unicast transmissions as part of the reliable multicast transmission procedure are not
protected by TLV encryption.
• Messages transmitted with CMDU neighbor multicast transmission procedures (see section 7.2 of [2]) or CMDU
relayed multicast transmission procedures (see section 7.3 of [2]) have the transmission of TLVs protected by a
message integrity code (MIC).
• Messages transmitted with CMDU unicast transmission procedures (see section 7.4 of [2]) are protected by TLV
encryption.
of size 48-bits is used to avoid counter value wrap-around during the lifetime of the 1905 GTK (before the Multi-AP
Controller rekeys the 1905 GTK).
TLV1
TLV1
TLV2
TLV2
...
MIC TLVn+1
• Compute a 256-bit MIC field using HMAC-SHA256 (see [16]) with the 1905 GTK as the key, and the
message_array consisting of the following inputs concatenated in the order shown below:
▪ The first 6 octets of the 1905 CMDU (see Table 6-3 in [2]).
▪ The first 13 octets of the MIC TLV Value (1905 GTK Key ID field, MIC Version field, reserved bits, Integrity
Transmission Counter field, and Source 1905 AL Mac Address field) (see Table 85).
▪ All of the TLVs included in the message (including the End of Message TLV), but not the MIC TLV.
• Include the 1905 GTK Key Id, MIC Version field set to 0x00, Integrity Transmission Counter and the MIC in a MIC
TLV (see section 17.2.68).
• Include the MIC TLV in the message, immediately preceding the End of Message TLV as shown in Figure 15.
• Increment the Integrity Transmission Counter by one.
• If the Integrity Transmission Counter value received in the message is not greater than the Integrity Reception
Counter corresponding to the Source 1905 AL MAC Address field of the MIC TLV of the message, the Multi-AP
device shall ignore and discard the message and shall not relay the message.
• Compute a MIC using the same inputs described in 13.2.2
• If the computed MIC is not identical to the one included in the MIC TLV, the Multi-AP device shall ignore and
discard the message.
• If the computed MIC is identical to the one included in the MIC TLV, the Multi-AP device shall set the Integrity
Reception Counter corresponding to the Multi-AP device corresponding to the Source 1905 AL MAC Address field
in the MIC TLV to the received Integrity Transmission Counter and process the received TLV(s).
Multi-AP message
TLV1
...
TLVn
• Perform the SIV-encrypt function (see section 2.6 in [15]) with the following input parameters:
▪ K = 1905 TK (256 bit) corresponding to the receiver
▪ P = all of the TLVs in the message concatenated (except the End of Message TLV)
▪ AD1 = The first six octets of the 1905 CMDU.
▪ AD2 = The Encryption Transmission Counter value at the sender from the field in Encrypted Payload TLV.
▪ AD3 = Source 1905 AL MAC Address from the field in Encrypted Payload TLV.
▪ AD4 = Destination 1905 AL MAC Address from the field in Encrypted Payload TLV.
• Include the output (Z) of the SIV-encrypt function in the AES-SIV Encryption Output field of the Encrypted Payload
TLV as shown in Figure 16. Note: the output (Z) produced by the SIV-encryption function is the SIV (V)
concatenated with all of encrypted TLVs (C).
• Replace all the unencrypted TLVs except the End of Message TLV with the Encrypted Payload TLV as shown in
Figure 16.
• Increment the Encryption Transmission Counter that corresponds to the destination Multi-AP device by one.
• If the Encryption Transmission Counter value received in the Encrypted Payload TLV is not greater than the
Encryption Reception Counter corresponding to the Source 1905 AL MAC Address field of the Encrypted Payload
TLV, the Multi-AP device shall ignore and discard the entire message.
• If the Destination 1905 AL MAC Address value received in the Encrypted Payload TLV is not the 1905 AL MAC
Address of the receiver, the Multi-AP device shall ignore and discard the entire message.
• If a Multi-AP device receives an Encrypted Payload TLV and the Multi-AP device does not have the
corresponding 1905 TK for the sender, the Multi-AP device shall ignore and discard the message.
• Perform the SIV-decrypt function (see section 2.7 in [15]) with the following input parameters:
▪ K = 1905 TK corresponding to the sender
▪ Z = value of the AES-SIV Encryption Output field.
▪ AD1 = The first six octets of the received 1905 CMDU.
▪ AD2 = The Encryption Transmission Counter value in the Encrypted Payload TLV.
▪ AD3 = Source 1905 AL MAC Address value in the Encrypted Payload TLV.
▪ AD4 = Destination 1905 AL MAC Address value in the Encrypted Payload TLV.
• If the SIV-decrypt function output is the special symbol FAIL (indicating that the message was not successfully
decrypted), the Multi-AP device shall ignore and discard the message and shall increment the Decryption Failure
Counter corresponding to the Multi-AP device.
• If the SIV-decrypt function output is plaintext TLVs, the Multi-AP device shall set the Encryption Reception
Counter corresponding to that Source 1905 AL MAC Address to the received Encryption Transmission Counter
value and process the now decrypted TLVs.
• If a Decryption Failure Counter that corresponds to a Multi-AP Agent exceeds the Decryption Failure Counter
threshold value in the DPP Configuration Object, the Multi-AP Agent shall send a 1905 Decryption Failure
message (see section 17.1.46) to the Multi-AP Controller with the AL MAC address field in the 1905 AL MAC
Address type set to the AL MAC Address of the Multi-AP device that sent the Encrypted Payload TLV.
• If the Decryption Failure Counter that corresponds to the Multi-AP Controller exceeds the Decryption Failure
Counter threshold value in the DPP Configuration Object, the Multi-AP Agent shall re-establish the 1905 PMK
using 1905 DPP Discovery and perform the 1905 4-way handshake procedure to establish a new 1905 TK with
the Multi-AP Controller and set the corresponding Multi-AP Controller specific Encryption Transmission Counter to
one and the Encryption Reception Counter to zero.
• the Multi-AP device shall transmit the CMDU as a relayed multicast transmission per section 7.3 of [2] (i.e. with
the relayIndicator field in the CMDU set to one).
• the Multi-AP device shall transmit the same CMDU as a unicast transmission (using the same MID but with the
relayIndicator field in the CMDU set to zero) per section 7.4 of [2] to other discovered Multi-AP devices on the
Multi-AP network.
• the Multi-AP device shall process a received CMDU with the relayIndicator set to one per section 7.6 of [2].
• the Multi-AP device shall process a received CMDU with the relayIndicator set to zero per section 7.7 of [2].
If a Multi-AP device that implements Profile-3 needs to construct a message only transmitted with CMDU unicast
transmission procedures (see section 7.4 of [2]) to another Multi-AP device that implements Profile-3, the Multi-AP device
shall interpret the second sentence of section 7.1.1 of [2],
"Each CMDU fragment may carry a partial payload of the original CMDU, fragmented at the 1905 protocol TLV
boundaries.",
as follows:
“Each CMDU fragment may carry a partial payload of the original CMDU, fragmented at an octet boundary.”
If a Multi-AP device sends a 1905 message to a Multi-AP device and needs to construct a message to be transmitted with
CMDU neighbor multicast transmission procedures (see section 7.2 of [2]), CMDU relayed multicast transmission
procedures (see section 7.3 of [2] or CMDU reliable multicast transmission procedures including the unicast
retransmissions (see section 15.1), then the Multi-AP device shall interpret the above quoted two sentences from [2] in
their original form.
• collects the underlying information that will be transmitted in one or more TLVs (see section 17.2) (some Profile-3
TLVs might have a length exceed 1492 octets)
• if the message transmission procedures (see Table 16) use encryption, perform the encryption transmission
procedures (see section 13.3.2)
• if the message transmission procedures (see Table 16) use message integrity check, perform the MIC
Transmission procedures and insert the MIC TLV (see section 13.2.2)
• if the aggregate of TLVs exceed 1492 octets, perform CMDU fragmentation (see section 15.2 above and section
7.1.1 of [2])
• if lastFragmentIndicator is zero, perform and complete CMDU reassembly (see section 7.1.2 of [2])
• if the source is a Multi-AP device that implements Profile-3, find the MIC TLV and perform the MIC Reception
procedures (see section 13.2.3)
• if any TLV is an Encryption Payload TLV, perform the decryption reception procedures (see section 13.3.3)
• process the underlying information contained in the TLVs (see section 17.2)
Introduced Last Message type Protocol Value Transmission Relay Use Description
in Multi-AP modified in type indicator CMDU
Profile Multi-AP field Reliable
Profile Multicast?
1 1 1905 Topology STA 0x0001 Reliable See section Yes A message to
Notification capability multicast 15.1 notify that a
message device’s 1905
topology entries
have changed.
1 2 1905 Topology Topology 0x0002 Unicast 0 No A message to
Query message discovery query a Multi-AP
Agent for its
topology
information.
1 3 1905 Topology STA 0x0003 Unicast 0 No A message to
Response capability carry topology
message information in
response to a
topology query.
1 2 1905 AP- AP 0x0007 Relayed 1 No A message to
Autoconfiguration configuration multicast search for the
Search message Controller.
1 3 1905 AP- AP 0x0008 Unicast 0 No A message to
Autoconfiguration configuration answer to a 1905
Response AP-
message Autoconfiguration
Search message.
1 2 1905 AP- AP 0x0009 Unicast 0 No A message to
Autoconfiguration configuration carry a WSC
WSC message registration
frame.
1 1 1905 Ack 1905 CMDU 0x8000 Unicast 0 No A message to
message acknowledge
certain 1905
messages.
1 1 AP Capability AP 0x8001 Unicast 0 No A message to
Query message capability query a fronthaul
Introduced Last Message type Protocol Value Transmission Relay Use Description
in Multi-AP modified in type indicator CMDU
Profile Multi-AP field Reliable
Profile Multicast?
AP’s capability
information.
1 3 AP Capability AP 0x8002 Unicast 0 No A message to
Report message capability report a fronthaul
AP’s capability
information.
1 2 Multi-AP Policy Multi-AP 0x8003 Unicast 0 No A message to
Config Request configuration configure Multi-
message AP control
related policies.
1 1 Channel Channel 0x8004 Unicast 0 No A message to
Preference Selection query operating
Query message channel
preferences for
AP radios of
Multi-AP Agents.
1 2 Channel Channel 0x8005 Unicast 0 No A message to
Preference Selection report operating
Report message channel
preferences for
AP radios of
Multi-AP Agents.
1 1 Channel Channel 0x8006 Unicast 0 No A message to
Selection Selection send channel
Request selection
message configurations for
AP radios of
Multi-AP Agents.
1 1 Channel Channel 0x8007 Unicast 0 No A message to
Selection Selection report the Multi-
Response AP Agent’s
message response to the
Channel
Selection
request.
1 1 Operating Channel 0x8008 Unicast 0 No A message to
Channel Report Selection report the current
message operating
channel
configurations for
AP radios of
Multi-AP Agents.
1 1 Client Capability STA 0x8009 Unicast 0 No A message to
Query message capability query a client’s
capability
information.
1 1 Client Capability STA 0x800A Unicast 0 No A message to
Report message capability report a client’s
capability
information.
1 2 AP Metrics Link metric 0x800B Unicast 0 No A message to
Query Message collection query an AP’s
metrics.
Introduced Last Message type Protocol Value Transmission Relay Use Description
in Multi-AP modified in type indicator CMDU
Profile Multi-AP field Reliable
Profile Multicast?
1 3 AP Metrics Link metric 0x800C Unicast 0 No A message to
Response collection report an AP’s
message metric.
1 1 Associated STA Link metric 0x800D Unicast 0 No A message to
Link Metrics collection query an
Query message associated STA’s
link metrics.
1 2 Associated STA Link metric 0x800E Unicast 0 No A message to
Link Metrics collection report an
Response associated STA’s
message link metrics.
1 1 Unassociated Link metric 0x800F Unicast 0 No A message to
STA Link Metrics collection query an
Query message unassociated
STA’s link
metrics.
1 1 Unassociated Link metric 0x8010 Unicast 0 No A message to
STA Link Metrics collection report an
Response unassociated
message STA’s link
metrics.
1 1 Beacon Metrics Link metric 0x8011 Unicast 0 No A message to
Query message collection query the
Beacon frame
metrics.
1 1 Beacon Metrics Link metric 0x8012 Unicast 0 No A message to
Response collection report the
message Beacon frame
metrics.
1 1 Combined Link metric 0x8013 Unicast 0 No A message to
Infrastructure collection send combined
Metrics message infrastructure
metrics.
1 2 Client Steering Client 0x8014 Unicast 0 No A message to
Request Steering trigger steering
message for one or more
STAs.
1 1 Client Steering Client 0x8015 Unicast 0 No A message to
BTM Report Steering provide BTM
message report received
from a STA.
1 1 Client Client 0x8016 Unicast 0 No A message to
Association Steering enable blocking
Control Request of STA(s)
message association on
Multi-AP Agent.
1 1 Steering Client 0x8017 Unicast 0 No A message to
Completed Steering provide indication
message of termination of
a Steering
Opportunity
Introduced Last Message type Protocol Value Transmission Relay Use Description
in Multi-AP modified in type indicator CMDU
Profile Multi-AP field Reliable
Profile Multicast?
1 1 Higher Layer Higher layer 0x8018 Unicast 0 No A message to
Data message data payload query a client’s
capability
information.
1 1 Backhaul Backhaul 0x8019 Unicast 0 No A message to
Steering Request optimization steer a backhaul
message STA.
1 1 Backhaul Backhaul 0x801A Unicast 0 No A message to
Steering optimization respond to the
Response Backhaul
message Steering Request
message
2 2 Channel Scan Channel 0x801B Unicast 0 No A message to
Request scan request a
message channel scan.
2 2 Channel Scan Channel 0x801C Unicast 0 No A message to
Report message scan report the
channel scan
result.
3 3 DPP CCE DPP 0x801D Unicast 0 No A message to
Indication onboarding advertise CCE IE
message
3 3 1905 Rekey Message 0x801E Unicast 0 No A message to
Request security request the Multi-
message AP Agent to
rekey.
3 3 1905 Decryption Message 0x801F Unicast 0 No A message that
Failure message security indicates
encryption
failures.
2 2 CAC Request DFS CAC 0x8020 Unicast 0 No A message to
message request a DFS
CAC.
2 2 CAC Termination DFS CAC 0x8021 Unicast 0 No A message to
message terminate a DFS
CAC.
2 2 Client Data 0x8022 Unicast 0 No A message to
Disassociation Element report
Stats message disassociated
client's stats
3 3 Service Service 0x8023 Unicast 0 No A message to
Prioritization Prioritization request Service
Request Prioritization
message
2 2 Error Response Traffic 0x8024 Unicast 0 No A message to
message Separation report an error
pertaining to
traffic separation
request.
2 2 Association Client 0x8025 Reliable 0 Yes A message
Status steering multicast notifying
Controller that a
Introduced Last Message type Protocol Value Transmission Relay Use Description
in Multi-AP modified in type indicator CMDU
Profile Multi-AP field Reliable
Profile Multicast?
Notification Multi-AP Agent
message cannot accept
associations from
client devices
2 2 Tunneled Tunnel 0x8026 Unicast 0 No A message
message relaying from
Multi-AP Agent to
Controller the
frame body
without the MAC
header of an
802.11 frame
received by the
Multi-AP Agent
from a STA.
2 2 Backhaul STA Backhaul 0x8027 Unicast 0 No A message to
Capability Query STA query the
message capability Backhaul STA
capability of the
Multi-AP Agent.
2 2 Backhaul STA Backhaul 0x8028 Unicast 0 No A message to
Capability Report STA respond to the
message capability Backhaul STA
Capability Query
message.
3 3 Proxied Encap DPP 0x8029 Unicast 0 No A message to
DPP message onboarding encapsulate DPP
frames.
3 3 Direct Encap DPP 0x802A Unicast 0 No A direct message
DPP message onboarding between Multi-
AP Controller
and Multi-AP
Agent carrying
an encapsulated
DPP frame
3 3 Reconfiguration DPP 0x802B Unicast 0 No A message from
Trigger message onboarding Multi-AP
Controller
triggering Agents
to request for
reconfiguration
3 3 BSS DPP 0x802C Unicast 0 No A message to
Configuration onboarding request bSTA,
Request fBSS and bBSS
message configuration
3 3 BSS DPP 0x802D Unicast 0 No A message
Configuration onboarding carrying bSTA,
Response fBSS and bBSS
message configuration
information
3 3 BSS DPP 0x802E Unicast 0 No A message
Configuration onboarding reporting
Result message
Introduced Last Message type Protocol Value Transmission Relay Use Description
in Multi-AP modified in type indicator CMDU
Profile Multi-AP field Reliable
Profile Multicast?
configuration
information
3 3 Chirp Notification DPP 0x802F Unicast 0 No CCE
message onboarding enablement/
disablement in
Multi-AP Agents
3 3 1905 Encap DPP 0x8030 Unicast 0 No A message to
EAPOL message onboarding encapsulate
EAPOL frames.
3 3 DPP DPP 0x8031 Unicast 0 No A message to
Bootstrapping onboarding send the DPP
URI Notification bootstrapping
message URI information
to the Multi-AP
Controller.
(Reserved) 0x8032
The notation "[Profile-1]" in the messages' definition in the reminder of this section denotes TLVs that are mandatory,
conditionally present or optional when the transmitter implements Profile-1, as detailed in this specification. The notation
"[Profile-2]" in the messages' definition in the reminder of this section denotes TLVs that are mandatory, conditionally
present or optional when the transmitter implements Profile-2, as detailed in this specification. The notation "[Profile-3]" in
the messages' definition in the reminder of this section denotes TLVs that are mandatory, conditionally present or optional
when the transmitter implements Profile-3, as detailed in this specification.The lack of such notation indicates TLVs that
are mandatory, conditionally present or optional for any Multi-AP device.
• Zero or one Client Association Event TLV (see section 17.2.20) [Profile-1].
• One or more Channel Selection Response TLVs (see section 17.2.16) [Profile-1].
• One or more Operating Channel Report TLVs (see section 17.2.17) [Profile-1].
• One STA MAC Address type TLV (see section 17.2.23) [Profile-1].
• One or more Associated STA Link Metrics TLVs (see section 17.2.24) [Profile-1].
• Zero or one Error Code TLV (see section 17.2.36) [Profile-1].
• One or more Associated STA Extended Link Metrics TLVs (see section 17.2.62) [Profile-2].
• One Unassociated STA Link Metrics query TLV (see section 17.2.25) [Profile-1].
• One Unassociated STA Link Metrics response TLV (see section 17.2.26) [Profile-1].
• One AP Metrics TLV (see section 17.2.22) for each BSS the Controller determines to provide the AP Metrics
information.
• For each backhaul link (between two Multi-AP Agents) in the network:
▪ One 1905 transmitter link metric TLV (see section 6.4.11 of [2]) corresponding to the backhaul AP [Profile-1].
▪ One 1905 transmitter link metric TLV (see section 6.4.11 of [2]) corresponding to the backhaul STA [Profile-1].
▪ One 1905 receiver link metric TLV (see section 6.4.12 of [2]) corresponding to the backhaul AP [Profile-1].
▪ One 1905 receiver link metric TLV (see section 6.4.12 of [2]) corresponding to the backhaul STA [Profile-1].
• If the message is sent to a Multi-AP Agent that implements only Profile-1 or is sent from a Multi-AP device that
implements Profile-1:
▪ One Steering Request TLV (see section 17.2.29) [Profile-1].
• If the message is sent to a Multi-AP Agent that implements Profile-2 from a Multi-AP device that implements only
Profile-2:
▪ Zero or one Steering Request TLV (see section 17.2.29) to non-Agile Multiband capable STAs [Profile-2].
▪ Zero or one Profile-2 Steering Request TLV (see section 17.2.57). to Agile Multiband capable STAs [Profile-
2].
• One or more Client Association Control Request TLVs (see section 17.2.31) [Profile-1].
• One or more Profile-2 Error Code TLV (see section 17.2.51) [Profile-1].
• Zero or more Backhaul STA Radio Capabilities TLV (see section 17.2.65) [Profile-1].
• One 1905.1 AL MAC address type TLV (see section 6.4.3 of [2]) [Profile-3].
• Zero or more Service Prioritization Rule TLVs (see section 17.2.70) [Profile-3].
• Zero or one DSCP Mapping Table TLV (see section 17.2.71) [Profile-3].
• One DPP Bootstrapping URI Notification TLV (see section 17.2.81) [Profile-3].
• One or more DPP Chirp Value TLV (see section 17.2.83) [Profile-3].
tlvValue 6 octets Variable Radio Unique Identifier of a radio of the Multi-AP Agent.
1 octet m Number of BSS (802.11 Local interfaces) currently operating on the radio.
6 octets Variable MAC Address of Local Interface (equal to BSSID) operating on the radio.
The above 3 fields are repeated m – 1 times (if m = 0, these fields are omitted).
6 octets Any EUI-48 value The BSSID of the BSS operated by the Multi-AP Agent in which the client
is associated.
2 octets m Number of clients associated to the BSS.
6 octets Any EUI-48 value The MAC address of the associated 802.11 client.
2 octets 0x0000 – 0xFFFE: 0 - 65,534 Time since the 802.11 client’s last association to this Multi-AP device in
0xFFFF: 65,535 or higher seconds.
The above 2 fields are repeated m – 1 times (if m = 0, these fields are omitted).
tlvValue bit 7 0: Not supported Support Unassociated STA Link Metrics reporting on the channels its
1: Supported BSSs are currently operating on.
bit 6 0: Not supported Support Unassociated STA Link Metrics reporting on channels its BSSs
1: Supported are not currently operating on.
tlvValue 6 octets Variable Radio unique identifier of the radio for which capabilities are reported.
1 octet k Number of operating classes supported for the radio, defined per Table E-
4 in [1].
All the supported operating classes are reported per regulatory
restrictions.
1 octet Variable Operating class per Table E-4 in [1], that this radio is capable of operating
on.
1 octet Variable Maximum transmit power EIRP that this radio is capable of transmitting in
the current regulatory domain for the operating class.
The field is coded as a 2's complement signed integer in units of decibels
relative to 1 mW (dBm).
tlvValue 6 octets Any EUI-48 value Radio unique identifier of the radio for which HT capabilities are reported.
bits 7-6 00: 1 Tx spatial stream Maximum number of supported Tx spatial streams.
01: 2 Tx spatial stream
10: 3 Tx spatial stream
11: 4 Tx spatial stream
bits 5-4 00: 1 Rx spatial stream Maximum number of supported Rx spatial streams.
01: 2 Rx spatial stream
10: 3 Rx spatial stream
11: 4 Rx spatial stream
bit 3 0: Not supported Short GI Support for 20 MHz.
1: Supported
bit 2 0: Not supported Short GI Support for 40 MHz.
1: Supported
bit 1 0: Not supported HT support for 40 MHz.
1: Supported
bit 0 Reserved.
tlvValue 6 octets Any EUI-48 value Radio unique identifier of the radio for which VHT capabilities are
reported.
tlvValue 6 octets Any EUI-48 value Radio unique identifier of the radio for which HE capabilities are reported.
6 octets Any EUI-48 value Radio unique identifier of an AP radio for which Multi-AP control policies
are being provided.
1 octet 0x00: Agent Initiated Steering Policy.
Steering Disallowed
0x01: Agent Initiated RCPI-
based Steering Mandated
0x02: Agent Initiated RCPI-
based Steering Allowed
0x03 – 0xFF: Reserved
1 octet variable Channel Utilization Threshold (defined per BSS Load element section
9.4.2.28 of [1]).
1 octet Variable RCPI Steering Threshold.
0 – 220: RCPI threshold
(encoded per Table 9-154 of
[1]).
221 – 255: Reserved
The above 4 fields are repeated for m – 1 times.
tlvValue 6 octets Variable Radio Unique identifier of a radio for which channel
preferences are reported.
1 octet m Number of operating classes for which preferences
are reported in this TLV.
1 octet Variable Operating Class contains an enumerated value
from Table E-4 in Annex E of [1], specifying the
global operating class in which the subsequent
Channel List is valid.
1 octet k Number of channels specified in the Channel List.
1 octet m Number of Operating Classes for which restrictions are reported in this TLV.
1 octet Variable Operating Class contains an enumerated value from Table E-4 in Annex E of [1],
specifying the global operating class in which the subsequent Channel List is valid.
1 octet k Number of channels specified.
1 octet 0x00 – 0xFF The minimum frequency separation (in multiples of 10 MHz) that this radio would
require when operating on the above channel number between the center frequency
of that channel and the center operating frequency of another radio (operating
simultaneous TX/RX) of the Multi-AP Agent.
The above 2 fields are repeated k – 1 times
1 octet Variable Transmit Power Limit EIRP per 20 MHz bandwidth representing the nominal transmit
power limit for this radio.
The field is coded as a 2's complement signed integer in units of decibels relative to 1
mW (dBm).
1 octet 0x00: Accept Indicates the channel selection response code, with respect to
0x01: Decline because request the Channel Selection Request.
violates current preferences which
have changed since last reported
0x02: Decline because request
violates most recently reported
preferences
0x03: Decline because request would
prevent operation of a currently
operating backhaul link (where
backhaul STA and BSS share a
radio)
0x04 – 0xFF: Reserved
1 octet Variable Operating Class. It contains an enumerated value from Table E-4 in Annex E of [1],
specifying the global operating class in which the subsequent Channel is valid.
1 octet Variable Current operating channel number in the Operating Class.
1 octet Variable Current Transmit Power EIRP representing the current nominal transmit power.
The field is coded as a 2's complement signed integer in units of decibels relative to 1
mW (dBm).
This value is less than or equal to the Maximum Transmit Power specified in the AP
Radio Basic Capabilities TLV for the current operating class.
tlvValue 1 octet 0x00: Success Result Code for the client capability report message.
0x01: Failure
0x02 – 0xFF: Reserved
Variable The frame body of the most recently received (Re)Association Request
frame from this client, as defined in Table 9-36 and Table 9-38 of [17] in the
order of the underlying referenced standard. If Result Code is not equal to
0x00, this field is omitted.
tlvValue 6 octets Any EUI-48 value The MAC address of the client.
6 octets Any EUI-48 value The BSSID of the BSS operated by the Multi-AP Agent for which the event
has occurred.
bit 7 1: Client has joined the Association event.
BSS
0: Client has left the BSS
bits 6-0 0 Reserved.
6 octets Any EUI-48 value BSSID of a BSS operated by the Multi-AP device for which the metrics are
to be reported.
The above field is repeated k – 1 times.
tlvValue 6 octets Any EUI-48 value BSSID of a BSS operated by the Multi-AP Agent for which the metrics are
reported.
1 octet Variable Channel Utilization as measured by the radio operating the BSS as defined
in BSS Load element section 9.4.2.28 of [1].
2 octets Variable Unsigned integer indicating the total number of STAs currently associated
with this BSS.
bit 7 1 Include bit for the Estimated Service Parameters Information field for
AC=BE.
This field shall be set to 1.
bit 6 0 or 1 Include bit for the Estimated Service Parameters Information field for
AC=BK.
bit 5 0 or 1 Include bit for the Estimated Service Parameters Information field for
AC=VO.
bit 4 0 or 1 Include bit for the Estimated Service Parameters Information field for
AC=VI.
bits 3 - 0 0 Reserved.
3 octets Variable Estimated Service Parameters Information field for AC=BE (see Figure 9-
588 in [1]), containing Data Format, BA Window Size, Estimated Air Time
Fraction and Data PPDU Target Duration subfields reordered from the
underlying referenced standard into big-endian order.
0 or 3 octets Variable If bit 6 of the 10th octet of tlvValue is set to 1, this field shall be included.
Otherwise, this field shall be omitted.
Estimated Service Parameters Information field for AC=BK (see Figure 9-
588 in[1]), containing Data Format, BA Window Size, Estimated Air Time
Fraction and Data PPDU Target Duration subfields reordered from the
underlying referenced standard into big-endian order.
0 or 3 octets Variable If bit 5 of the 10th octet of tlvValue is set to 1, this field shall be included.
Otherwise, this field shall be omitted.
Estimated Service Parameters Information field for AC=VO (see Figure 9-
588 in [1]), containing Data Format, BA Window Size, Estimated Air Time
Fraction and Data PPDU Target Duration subfields reordered from the
underlying referenced standard into big-endian order.
0 or 3 octets Variable If bit 4 of the 10th octet of tlvValue is set to 1, this field shall be included.
Otherwise, this field shall be omitted.
Estimated Service Parameters Information field for AC=VI (see Figure 9-
588 in [1]), containing Data Format, BA Window Size, Estimated Air Time
Fraction and Data PPDU Target Duration subfields reordered from the
underlying referenced standard into big-endian order.
tlvValue 6 octets Any EUI-48 value MAC address of the associated STA.
tlvValue 6 octets Any EUI-48 value MAC address of the associated STA.
6 octets Any EUI-48 value BSSID of the BSS for which the STA is associated.
4 octets Variable The time delta in ms between the time at which the earliest measurement
that contributed to the data rate estimates were made, and the time at
which this report was sent.
4 octets Variable Estimated MAC Data Rate in downlink (in Mb/s).
tlvValue 1 octet Variable Operating Class contains an enumerated value from table E-4 in Annex E
of [1], specifying the global operating class in which the Channel List is
valid.
1 octet k Number of channels specified in the Channel List.
6 octets Any EUI-48 value STA MAC address for which the metrics are requested.
tlvValue 1 octet Variable Operating Class contains an enumerated value from table E-4 in Annex E
of [1], specifying the global operating class for which the Channels in the
report apply.
1 octet k (>=0) The number of STA entries included in this TLV.
6 octets Any EUI-48 value MAC address of STA for which UL RCPI is being reported.
1 octet Variable A single channel number in Operating Class on which the RCPI
measurement for STA was made.
Channel numbering is dependent on Operating Class according to Annex E
of [1].
4 octets Variable The time delta in ms between the time at which the RCPI for STA was
measured, and the time at which this report was sent.
1 octet Variable Uplink RCPI for STA.
0 – 220: RCPI (encoded
per Table 9-154 of [1]).
221 - 255: Reserved.
The above 4 fields are repeated k – 1 times (if k = 0, these fields are omitted).
tlvValue 6 octets Any EUI-48 value MAC address of the associated STA for which the Beacon report
information is requested.
1 octet Variable Operating Class field to be specified in the Beacon request.
The above 3 fields are repeated h – 1 times (if h = 0, these fields are omitted).
tlvValue 6 octets Any EUI-48 value MAC address of the associated STA for which the Beacon Report
information is requested.
1 octet Reserved.
Variable Variable Contains a Measurement Report element that was received from the STA
since the corresponding Beacon Metrics Query message was received by
the Multi-AP Agent, per Figure 9-199 in [1] in the order of the underlying
referenced standard.
The length of this field is carried in the 2nd octet of the element per Figure
9-122 in [1].
tlvValue 6 octets Variable BSSID - unique identifier of the BSS for which the client blocking request
applies.
1 octet 0x00: Block Association Control.
0x01: Unblock Indicates if the request is to block or unblock the indicated STAs from
0x02-0xFF: Reserved associating.
tlvValue 6 octets Any EUI-48 value The MAC address of the associated backhaul STA operated by the Multi-
AP Agent.
6 octets Any EUI-48 value The BSSID of the target BSS.
1 octet Variable Channel number on which Beacon frames are being transmitted by the
target BSS.
tlvValue 6 octets Any EUI-48 value The MAC address of the associated backhaul STA operated by the Multi-
AP Agent.
6 octets Any EUI-48 value The BSSID of the target BSS.
Variable Variable Higher layer protocol payload (To be defined for specific higher layer
protocol).
tlvValue 6 octets Any EUI-48 value MAC address of the associated STA.
tlvValue 6 octets Variable Radio Unique Identifier of a radio of the Multi-AP Agent.
The above 8 fields are repeated r-1 times (if r=0, these fields are omitted).
tlvValue
Multi-AP Profile 1 octet 0x00: Reserved A 1905 device that receives a Multi-AP Profile TLV with a reserved value
0x01: Multi-AP Profile-1 shall assume the sender implements the same profile implemented by the
receiver.
0x02: Multi-AP Profile-2
0x03: Multi-AP Profile-3
0x04 ~0xFF Reserved
tlvValue
Max 1 octet 0 - 255 The maximum total number of service priroritization rules
Priortization supported by the Multi-AP Agent
Rules
1 octet Reserved
Byte Counter bits 7-6 0: bytes The units used for byte counters when the Multi-AP Agent
Units 1: kibibytes (KiB) reports traffic statistics.
2: mebibytes (MiB)
3: reserved
Prioritization bit 5 0 or 1 Service Prioritization
Max VIDs 1 octet Variable Max Total Number of unique VIDs the Multi-AP Agent supports.
tlvValue 1 octet k Number of BSSIDs and their statuses included in this TLV
6 octets Any EUI- 48 value BSSID of a BSS operated by the Multi-AP device
tlvValue
Report bit 7 0: Do not report Indicates whether Multi-AP Agent should report unsuccessful
Unsuccessful unsuccessful association attempts of client STAs to the Multi-AP Controller
Associations association attempts
1: Report unsuccessful
association attempts
bits 6-0 Reserved
Maximum 4 octets Variable Maximum rate for reporting unsuccessful association attempts (in
Reporting Rate attempts per minute)
tlvValue
tlvValue
RUID 6 octets Variable Radio Unique Identifier of a radio of the Multi-AP Agent for which
metrics are being reported.
Noise 1 octet Variable Radio.Noise as Table 3 & Table 6 of [10].
tlvValue
BSSID 6 octets Variable BSSID of a BSS for which metrics are being reported.
tlvValue
MAC Address 6 octets Any EUI-48 value MAC Address of the associated STA.
BSSID Number 1 octet k (>=0) Number of BSSIDs reported for this STA.
BSSID 6 octets Any EUI-48 value BSSID of the BSS to which the STA is associated.
The above 5 fields are repeated k – 1 times (if k = 0, these fields are omitted).
tlvValue
Status Code 2 octets Variable This field shall be set in accordance with Table 9-46 of [1].
tlvValue
Reason Code 2 octets Variable This field shall be set in accordance with Table 9-45 of [1].
tlvValue
6 octets Variable Radio Unique Identifier of the radio for which capabilities are
reported.
Included bit 7 0: the MAC address is The MAC address include.
not included below
1: the MAC address is
included below
bits 6-0 0 Reserved.
MAC Address 6 octets Any EUI-48 value MAC address of the backhaul STA on this radio.
(This field is present if the MAC address include field is set to 1).
tlvValues
tlvValue
tlvValue
tlvValue
AES-SIV n Variable AES-SIV Encryption Output (i.e., SIV concatenated with all the
encrypted TLVs)
tlvValue
Precedence 1 octet Variable Rule Precedence – higher number means higher priority.
0x00 – 0xFE
0xFF: Reserved.
Output 1 octet 0x00 – 0x09 Rule Output
0x0A – 0xFF: Reserved The value of, or method used to select, the 802.1Q C-TAG PCP
output value.
Always Match bit 7 0 or 1 Rule Always Matches
tlvValue
DSCP PCP 64 octets Each octet: 0x00 – 0x07 List of 64 PCP values (one octet per value) corresponding to the
mapping 0x08 – 0xFF Reserved DSCP markings 0x00 to 0x3F, ordered by increasing DSCP
Value.
This table is used to select a PCP value if a Service Prioritization
Rule specifies Rule Output: 0x08
tlvValue
RUID 6 octets Any EUI-48 value Radio unique identifier of the radio for which HE capabilities are
reported.
n 1 octet Variable Number of roles
Agent Role bit 7-6 0: Wi-Fi 6 support info Multi-AP Agent’s Role of Wi-Fi 6 operations
for the AP role Designation of the Wi-Fi 6 capabilities for a specific role,
1: Wi-Fi 6 support info including AP role and/or backhaul STA role.
for the non-AP STA role
2-3: Reserved
HE 160 bit 5 0: Not supported Support for HE 160 MHz
1: Supported
HE 8080 bit 4 0: Not supported Support for HE 80+80 MHz
1: Supported
MCS NSS bit 3-0 Length of MCS NSS
Length
MCS NSS 4 or 8 or 12 Variable Supported MCS and NSS
octets Supported HE-MCS And NSS Set field as defined in Figure 9-
772d—Supported HE-MCS And NSS Set field format in [17].
HE-MCS And NSS Set field for 160MHz shall be present if
160MHz is supported.
HE-MCS And NSS Set field for 80+80MHz shall be present if
80+80Mhz is supported.
SU bit 7 0: Not supported Support for SU Beamformer.
Beamformer 1: Supported
SU bit 6 0: Not supported Support for SU Beamformee
Beamformee 1: Supported
MU bit 5 0: Not supported Support for MU beamformer Status
Beamformer 1: Supported
Status
Beamformee bit 4 0: Not supported Support for Beamformee STS ≤ 80 MHz
STS Less 80 1: Supported
Beamformee bit 3 0: Not supported Support for Beamformee STS > 80 MHz
STS Greater 80 1: Supported
UL MU-MIMO bit 2 0: Not supported Support for UL MU-MIMO
1: Supported
UL OFDMA bit 1 0: Not supported Support for UL OFDMA.
1: Supported
DL OFDMA bit 0 0: Not supported Support for DL OFDMA
1: Supported
Max DL MU- bit 7-4 variable Max number of users supported per DL MU-MIMO TX in an AP
MIMO TX role
Max UL MU- bit 3-0 variable Max number of users supported per UL MU-MIMO RX in an AP
MIMO RX role
Max DL 1 octet variable Max number of users supported per DL OFDMA TX in an AP
OFDMA TX role
Max UL 1 octet variable Max number of users supported per UL OFDMA RX in an AP
OFDMA RX role
RTS bit 7 0: Not supported Support for RTS
1: Supported
MU RTS bit 6 0: Not supported Support for MU RTS
1: Supported
Multi-BSSID bit 5 0: Not supported Support for Multi-BSSID
1: Supported
MU EDCA bit 4 0: Not supported Support for MU EDCA
1: Supported
TWT bit 3 0: Not supported Support for TWT Requester
Requester 1: Supported
TWT bit 2 0: Not supported Support for TWT Responder
Responder 1: Supported
bit 1-0 Reserved.
tlvValue
MAC Address 6 octets Any EUI-48 value MAC address of the associated STA.
n 1 octet Variable n
TID 1 octet Variable The TID of the corresponding Queue Size field
Queue Size 1 octet Variable Queue Size for this TID. Its format is defined in Table 9-6—QoS
Control field [1]
The above two fields are repeated n-1 times
tlvValue
tlvValue
Number BSS 1 octet m Number of BSS (802.11 Local interfaces) currently operating on
the radio.
BSSID 6 octets Variable MAC Address of Local Interface (equal to BSSID) operating on
the radio.
BackHaul BSS Bit 7 0: in use Backhaul BSS
1: not in use
Fronthaul BSS Bit 6 0: in use Fronthaul BSS
1: not in use
R1 disallowed Bit 5 0: allowed R1 disallowed status
status 1: disallowed
R2 disallowed Bit 4 0: allowed R2 disallowed status
status 1: disallowed
Multiple BSSID Bit 3 0: Not-configured Multiple BSSID Set
1: Configured
Transmitted Bit 2 0: Non-transmitted Transmitted BSSID
BSSID 1: Transmitted
Bit 1-0 Reserved
The above 10 fields are repeated m – 1 times (if m = 0, these fields are omitted).
tlvValue
1 octet lsn Length of the SerialNumber string (octets). Less than or equal to
64.
Serial Number lsn octets (<= Variable A string Identifying the particular device that is unique for the
64 octets) indicated model and manufacturer.
1 octet lsv Length of the SoftwareVersion string (octets). Less than or equal
to 64.
Software lsv octets (<= Variable A string identifying the software version currently installed in the
Version 64 octets) device (i.e. version of the overall device firmware).
1 octet lee Length of the ExecutionEnv string (octets). Less than or equal to
64.
Execution Env lee octets (<= Variable A string identifying the execution environment (operating system)
64 octets) in the device.
1 octet k (>=1) Number of radios
RUID 6 octets Variable Radio Unique Identifier of a radio for which ChipsetVendor
information is being provided.
1 octet lcv Length of the ChipsetVendor string (octets). Less than or equal to
64.
Chipset Vendor lcv octets (<= Variable A string identifying the Wi-Fi chip vendor of this radio.
64 octets)
The above 3 fields are repeated k-1 times
tlvValue
Multi-AP Profile 1 octet 0x00: Reserved Highest profile supported by the Multi-AP Agent with the AL MAC
0x01: Multi-AP Profile- equal to the field above as indicated in its Multi-AP Profile TLV.
1
0x02: Multi-AP Profile-
2
0x03: Multi-AP Profile-
3
0x04-0xFF: Reserved
Security 1 octet 0x00: 1905 Security
not enabled
0x01: 1905 Security
enabled
0x02-0xFF Reserved
The above 3 fields are repeated k-1 times
tlvValue
Num Backhaul 1 octet k Number of AKM suite selectors from Table 9-133 of [1] or Table
BSS AKM Suite 55 of [18] supported by the backhaul BSS of this Multi-AP Agent.
Selectors
BH OUI 3 octets Any OUI value specified
in Table 9-133 of [1] or
Table 55 of [18].
BH AKM Suite 1 octet Any suite type value
Type. specified in Table 9-133
of [1] or Table 55 of [18].
The above two fields are repeated k-1 times (if k = 0, these fields are omitted).
Num Fronthaul 1 octet r Number of AKM suite selectors from Table 9-133 of [1] or Table
BSS AKM Suite 55 of [18] supported by the fronthaul BSS of this Multi-AP Agent.
Selectors
FH OUI 3 octets Any OUI value specified
in Table 9-133 of [1] or
Table 55 of [18].
FH AKM Suite 1 octet Any suite type value
Type specified in Table 9-133
of [1] or Table 55 of [18].
The above two fields are repeated r-1 times (if r = 0, these fields are omitted).
tlvValue
Enrollee MAC bit 7 0 or 1 This is set to specify the address of the Enrollee Multi-AP Agent
Address to the Proxy Agent and Multi-AP Controller
Present
bit 6 Reserved
DPP Frame bit 5 0: DPP Public Action Content type of the encapsulated DPP frame.
Indicator frame
1: GAS frame
bits 4-0 0 Reserved.
Destination 6 octets Variable This field is present if the Enrollee MAC Address present bit is set
STA MAC to one
Address
Frame Type 1 octet Variable If the DPP Frame Indicator (bit 5) is 0, this field is set to the DPP
Public Action frame type (see Table 25 of [18]). Otherwise this
field is set to 255.
Encapsulated 2 octet n Length of encapsulated frame.
frame length
field
Encapsulated n octets Variable If bit 5=0, this field contains a DPP Public Action frame (see Table
frame 29 of [18]) else this field contains a GAS frame that carries the
DPP Configuration Protocol payload.
tlvValue
tlvValue
BSSID 6 octets Variable MAC Address of Local Interface (equal to BSSID) operating on
the radio, on which the URI was received during PBC
onboarding.
bSTA Address 6 octets Variable MAC Address of backhaul STA from which the URI was received
during PBC onboarding
DPP URI n octets Variable DPP URI received during PBC onboarding (note: format of URI is
specified in section 5.2.1 of [18]
tlvValue
Advertise CCE 1 octet 1: Enable Enable/Disable CCE advertisement in beacons and probe
0: Disable responses.
tlvValue
Enrollee MAC bit 7 0 or 1 This is set to specify the address of the Enrollee Multi-AP Agent
Address to the Proxy Agent and Multi-AP Controller
Present
Hash Validity bit 6 1: establish Establish/purge any DPP authentication state pertaining to the
0: purge hash value in this TLV
Destination 6 octets Variable This field is present if the Enrollee MAC Address present bit is set
STA MAC to one
Address
Hash Length 1 octet k Indicates the length of the included hash value.
Hash Value k octets Variable Hash value is computed from public key of Enrollee (See Section
6.2.1 of [18]).
tlvValue
DPP variable variable One or more JSON encoded DPP Configuration Request Object
Configuration attributes (See section 8.1 of [18].
Request Object
tlvValue
DPP variable variable One or more JSON encoded DPP Configuration Object attributes
Configuration (See section 8.1 of [18].
Object
tlvValue
18 Multi-AP Profiles
A Multi-AP device shall implement all the mandatory functionalities in sections, sub-sections and in Table 104, as per the
Multi-AP Profile it indicates in any Multi-AP Profile TLV (see section 17.2.47) and Multi-AP Profile subelement (see Table
15) it sends.
A Multi-AP device includes a Multi-AP Profile TLV in every 1905 Topology Query message, 1905 Topology Response
message, BSS Configuration Request, and 1905 AP-Autoconfiguration Search message it sends. If a Multi-AP device
does not include a Multi-AP Profile TLV in any of those messages, the device implements only Profile-1.
Additionally, a Multi-AP Controller includes a Multi-AP Profile TLV in every 1905 AP-Autoconfiguration Response
message it sends. If a Multi-AP Controller does not include a Multi-AP Profile TLV in any AP-Autoconfiguration Response
message it sends, the Controller implements only Profile-1.
A Multi-AP Agent includes a Multi-AP Profile subelement in every (Re)-Association Request and Responses it sends. If a
Multi-AP Agent does not include a Multi-AP Profile subelement in any of those frames, the Multi-AP Agent implements
only Profile-1.
If a Multi-AP device receives any of the aforementioned messages or frames that includes a Multi-AP Profile TLV or a
Multi-AP Profile subelement, with the Multi-AP Profile field set to a reserved value, it shall assume that the sender of such
a message or frame implements the same profile implemented by the recipient.
A backhaul link between two Multi-AP devices is said to be a "Profile-X Backhaul", where "X" is the lowest of the profiles
implemented by the two devices.
An "X" in Table 104 indicates the profile(s) for which the function applies to.
If a feature is not supported, the corresponding Capabilities TLV(s) is not sent.
Table 104. Profile Section Applicability
Wi-Fi Agile Multiband and tunneled message support 11.4, 11.5, 11.7 X
19 Traffic Separation
19.1 Traffic Separation in Multi-AP Network
19.1.1 Traffic Separation Overview (Informative)
This informative description of traffic separation relies on terms defined in section 3.1.
A Multi-AP Controller is able to configure multiple fronthaul SSIDs in a Multi-AP network. A Multi-AP Profile-2 Network
Segment supports traffic separation for each fronthaul SSIDs using a unique VLAN. The traffic belonging to each VLAN is
distinguished using an 802.1Q C-TAG with a unique VLAN ID, or the lack of thereof.
The rules defined in section 19.1.3 ensure that traffic generated within a Multi-AP network is clearly identifiable as
belonging to one SSID. Traffic generated outside of a Multi-AP network is tagged with a VLAN ID (or untagged as
appropriate) prior to ingressing the Multi-AP network by means not defined in this specification and is expected to be
identified as belonging to an SSID.
A Multi-AP device is a layer-2 (Link Layer) logical device that can be embedded into a more complex physical device
(e.g., a router, or a gateway) that implements both a Multi-AP Agent as well as other, above layer-2, functionalities. Often
in this case, traffic generated outside of the network (e.g., ingressing thru the WAN interface) is classified by the
gateway/routing subsystem and tagged (if needed) before being forwarded to the Multi-AP device subsystem. The
abstract/logical interface between the Multi-AP subsystem and the rest of the device is considered a Multi-AP Logical
Ethernet Interface as per the definition in section 3.1.3 and the rules in section 19.1.3.
If Traffic Separation is not configured on a Multi-AP Agent that implements Profile-2, the Multi-AP Agent might behave in a
transparent manner to VLAN tags applied by other entities.
A Multi-AP Controller configures SSID to VLAN ID mapping in a Traffic Separation Policy. Each mapping from one or
many SSIDs to one VLAN ID is indicated in a Traffic Separation Policy TLV. The Multi-AP Controller distributes the Traffic
Separation Policy to all Multi-AP Agents. It is recommended that a Multi-AP Controller provides each Multi-AP Agent with
a complete list of VLAN ID to SSID mappings, including those VIDs that are mapped to SSIDs that are not configured on a
given Multi-AP Agent, to enable that traffic on all VIDs is forwarded over backhaul links. Multi-AP Agents report to the
Multi-AP Controller the maximum number of VIDs they are able to configure in the Profile-2 AP Capability TLV. A
Controller that intends to use more VIDs than those supported on some of the Multi-AP Agents it manages, may re-
arrange the topology in such a way that traffic for all VIDs downstream of a Multi-AP Agent can be forwarded by such
Agent.
For each Ingress Packet, a Multi-AP Agent adds an 802.1Q C-TAG with a VLAN ID as specified in a Traffic Separation
Policy.
For each Egress Packet, a Multi-AP Agent removes any 802.1Q C-TAG.
For a packet to be transmitted on a Multi-AP Logical Ethernet Interface, if the VLAN ID in the 802.1Q C-TAG is set to one
of the Secondary VLAN IDs, a Multi-AP Agent maintains the 802.1Q C-TAG on those packets.
Multi-AP IEEE 1905.1 management frames are carried in the Primary Network.
A Default 802.1Q Settings TLV identifies a Primary VLAN ID for tagging packets on the Primary Network.
Traffic separation is not supported across a Multi-AP Agent that implements Profile-1. Therefore, a Multi-AP Controller
should not configure any SSID that is mapped to a Secondary VLAN ID on any Multi-AP Agent that implements Profile-1
or on any Multi-AP Agent that is downstream of a Multi-AP Agent that implements Profile-1. If the location of the WAN
connection in a network managed by a Multi-AP Controller changes (e.g., in order to use a backup WAN connection in the
event the main WAN connection fails), the portions of the network where traffic separation is possible may change and the
Multi-AP Controller may need to reconfigure the entire network accordingly, including Secondary SSIDs and VLAN(s).
A Multi-AP Controller that reconfigures VLAN(s) in the entire Multi-AP Profile-2 Network Segment may reconfigure the
traffic separation policy on the Multi-AP Agents, starting from those at the very end of the data-plane tree topology and
finishing at the data-plane root. Failing to do so may result in the inability to deliver reconfiguration CMDUs to downstream
Multi-AP Agents due to Primary VLAN ID mismatch. During VLAN reconfiguration data traffic loss may occur.
As a result of the rules detailed in section 19.1.3, when a Multi-AP Agent transmits a packet on a Profile-1 backhaul Wi-Fi
Interface, it removes the 802.1Q C-VLAN tag. When a Multi-AP Agent transmits a packet on a Profile-2 backhaul Wi-Fi
Interface it maintains the 802.1Q C-VLAN tag. When a BSS on a Multi-AP Agent has been configured as both fronthaul
and backhaul BSS, the Multi-AP Agent removes the 802.1Q C-VLAN tag from the packets it transmits to a fronthaul STA.
Some Multi-AP Agent implementations may be able to comply with the requirements described in section 19.1.3, while
others may only be able to comply when all of the STAs associated with the same BSS require the same VLAN
processing. A Multi-AP Agent indicates its traffic separation capabilities to the Controller within the AP Radio Advanced
Capabilities TLV in the 1905 AP-Autoconfiguration WSC message or BSS Configuration Request. In a Multi-AP network
where Traffic Separation is enabled and a single SSID is used as both fronthaul and backhaul, a Controller that configures
a Multi-AP Agent that has reported Combined Front Back bit set to zero might achieve an equivalent topology by
configuring this Multi-AP Agent with two BSSs, one used exclusively as fronthaul and one used exclusively as backhaul,
both bearing the same SSID and credentials, on the same or on different radios, as permitted by the "Maximum number of
BSSs" supported on each of the Multi-AP Agent's radios.
In a Multi-AP network where Traffic Separation is enabled and both Profile-1 and Profile-2 Multi-AP Agents are expected
to associate with the backhaul BSS, a Controller that configures a Multi-AP Agent that has reported Combined Profile-1
and Profile-2 bit set to zero might achieve an equivalent topology by configuring this Multi-AP Agent with two backhaul
BSSs, both configured as backhaul with same SSID and credentials, one configured with Profile-1 bSTA Disallowed bit
set to one and the other with Profile-2 bSTA Disallowed bit set to one, on the same or on different radios as permitted by
the "Maximum number of BSSs" supported on each of the Multi-AP Agent's radios.
Only Multi-AP Agents that report both the aforementioned Profile-1 bSTA Disallowed and Profile-2 bSTA Disallowed bits
set to one can be expected to support Traffic separation on a BSS that combine fronthaul and Profile-2 backhaul, or
fronthaul and Profile-1 backhaul and Profile-2 backhaul.
In a Multi-AP network where Traffic Separation is enabled and a single SSID is used as both fronthaul and backhaul, and
Multi-AP Agents implementing Profile-1 as well as Multi-AP Agents implementing Profile-2 are expected to associate with
the backhaul SSID, a Multi-AP Controller that configures an Multi-AP Agent that has reported Combined Front Back bit set
to zero, and/or Combined Profile-1 and Profile-2 bit set to zero might achieve an equivalent topology by configuring such
Multi-AP Agent with three BSSs, one used exclusively as fronthaul, a second one used exclusively as backhaul with
Profile-1 bSTA Disallowed bit set to one, and a third one used exclusively as backhaul with Profile-2 bSTA Disallowed bit
set to one. All of the BSSs bear the same SSID and credentials, on the same or on different radios, as permitted by the
"Maximum number of BSSs" supported on each of the Multi-AP Agent's radios.
802.1Q Setting subelement in (Re-)Association Response frames sent by Multi-AP Agents that implement Profile-2 (see
section 5.2). The subsequent paragraphs in 19.1.3 apply to all the scenarios described above.
If a Multi-AP Agent receives a Traffic Separation Policy TLV that includes a set of VIDs that exceeds the Max Total
Number of unique VIDs the Multi-AP Agent supports, the Multi-AP Agent shall send an Error Response message per
section 17.1.37 containing one Profile-2 Error Code TLV for each misconfigured BSS with reason code field set to 0x05
per section 17.2.51. If a Multi-AP Agent receives the Traffic Separation Policy TLV in a Multi-AP Policy Config Request
message, the Multi-AP Agent shall discard the unsupported policy. If a Multi-AP Agent receives the Traffic Separation
Policy TLV in an AP-Autoconfiguration WSC message, the Multi-AP Agent shall tear down the misconfigured BSS, as
defined in sections 7.1.
If a Multi-AP Agent is unable to configure one or more BSS as indicated by the received Traffic Separation Policy TLV and
the combined fronthaul / Profile-1 backhaul / Profile-2 backhaul configuration, the Multi-AP Agent shall send an Error
Response message per section 17.1.37 containing one Profile-2 Error Code TLV for each misconfigured BSS with reason
code field set to 0x07 or 0x08 per section 17.2.51. If a Multi-AP Agent receives the Traffic Separation Policy TLV in a
Multi-AP Policy Config Request message, the Multi-AP Agent shall discard the unsupported policy. If a Multi-AP Agent
receives the Traffic Separation Policy TLV in an AP-Autoconfiguration WSC message, the Multi-AP Agent shall tear down
the misconfigured BSS, as defined in section 7.1.
If a Multi-AP Agent has not received a Multi-AP Default 802.1Q Setting subelement in the (Re-)Association Response
frame, or a Traffic Separation Policy TLV, or the most recently received Traffic Separation Policy TLV has the Number of
SSIDs field set to zero, the Multi-AP Agent shall consider the Primary VLAN ID not configured and may forward VLAN
tagged packets received at the Fronthaul interface or Logical Ethernet interface, and shall not add, modify or remove any
VLAN tag on any packets it sends or receives and shall not perform traffic separation on the basis of any VLAN tag
present in a packet.
If a Multi-AP Agent has received a Traffic Separation Policy and the most recently received Traffic Separation Policy
defines at least one SSID to VLAN ID mapping, then it shall perform VLAN tag processing as described below.
If a Multi-AP Agent sends a 1905.1 packet, it shall send it on the Primary Network. If no Primary VLAN ID is configured on
this Multi-AP Agent, the Multi-AP Agent shall send these 1905 packets on a Wi-Fi backhaul link without an 802.1Q C-Tag.
If a Primary VLAN ID is configured on this Multi-AP Agent, the Multi-AP Agent shall send these packets on a Wi-Fi
backhaul link with an 802.1Q C-Tag with VLAN ID equal to the Primary VLAN ID.
If a Multi-AP Agent generates a frame with EtherType 0x888E (EAPOL) on a Profile-2 Wi-Fi backhaul link and no Primary
VLAN ID is configured, the Multi-AP Agent shall send these frames without an 802.1Q C-Tag. If a Multi-AP Agent
configures a Primary VLAN ID, the Multi-AP Agent shall send EtherType 0x888E frames on a Profile-2 Wi-Fi backhaul link
with an 802.1Q C-Tag with VLAN ID equal to the Primary VLAN ID.
Backhaul STA behavior upon (re)association
• If the Backhaul STA of a Multi-AP Agent has successfully associated with a Backhaul BSS whose latest
(Re)Association Response frame contains a Multi-AP Default 802.1Q Setting subelement in the Multi-AP IE, with
a Primary VLAN ID that differs from the one in use on the newly-associated Agent, or no Primary VLAN ID is
configured on the newly-associated Agent, then the newly-associated Agent shall set its Primary VLAN ID to the
value contained in the (Re)Association Response frame.
• If the Backhaul STA of a Multi-AP Agent has successfully associated with a Backhaul BSS whose latest
(Re)Association Response frame does not contain a Multi-AP Default 802.1Q Setting subelement in the Multi-AP
IE and a Primary VLAN ID is configured on the newly-associated Agent, then the newly-associated Agent shall
unconfigure its Primary VLAN ID and any Traffic Separation Policy until a Traffic Separation Policy is received
from Controller.
If a Multi-AP Agent has learned that the destination address of a packet is on one VLAN and the packet has an 802.1Q C-
TAG containing a different VLAN ID, the Multi-AP Agent shall discard the packet.
Wi-Fi Backhaul
• If a Multi-AP Agent receives a packet that is not classified as an Ingress Packet on a Wi-Fi Backhaul Interface (i.e.
a Profile-2 backhaul), the Multi-AP Agent shall retain the existing VLAN ID in the 802.1Q C-TAG. A Multi-AP
Agent may discard such packets if the 802.1Q C-TAG VLAN ID is not included in the most recently received
Traffic Separation Policy TLV
• If a Multi-AP Agent receives a packet that is classified as an Ingress Packet on a Wi-Fi Backhaul Interface (i.e. a
Profile-1 backhaul), the Multi-AP Agent shall add an 802.1Q C-TAG onto the packet and set the VLAN ID to the
Primary VLAN ID as specified in the Default 802.1Q Settings TLV.
• If a Multi-AP Agent sends a packet that is not classified as an Egress Packet on a Wi-Fi Backhaul Interface (i.e. a
Profile-2 backhaul), the Multi-AP Agent shall retain the existing 802.1Q C-TAG, leaving the VLAN ID unmodified.
• If a Multi-AP Agent sends a packet that is classified as an Egress Packet on a Wi-Fi Backhaul Interface (i.e. a
Profile-1 backhaul), the Multi-AP Agent shall remove the 802.1Q C-TAG on the packet.
Wi-Fi Fronthaul
• If a Multi-AP Agent receives a packet on a Wi-Fi Fronthaul Interface (i.e. from an associated non-backhaul STA)
that has an 802.1Q VLAN Tag, it shall discard that packet.
• If a Multi-AP Agent receives a packet on a Wi-Fi Fronthaul Interface (i.e. from an associated non-backhaul STA)
without an existing 802.1Q VLAN Tag, the Multi-AP Agent shall add an 802.1Q C-TAG onto the packet. If the
SSID of the Wi-Fi Fronthaul Interface is present in the Traffic Separation Policy TLV, the Multi-AP Agent shall tag
the VLAN ID field with the VLAN ID specified in that VLAN ID field in the Traffic Separation Policy TLV that
corresponds to the SSID of the Wi-Fi Fronthaul Interface. If the SSID of the Wi-Fi Fronthaul Interface is not
present in the Traffic Separation Policy TLV, the Multi-AP Agent shall tag the VLAN ID field with the Primary
VLAN ID as specified in the Default 802.1Q Settings TLV.
• If a Multi-AP Agent sends a packet on a Wi-Fi Fronthaul Interface (i.e. to an associated non-backhaul STA), the
Multi-AP Agent shall map the PCP field in the 802.1Q C-TAG to WMM (as specified in [12]) and then remove the
802.1Q C-TAG.
Multi-AP Logical Ethernet
• If a Multi-AP Agent receives a packet on a Multi-AP Logical Ethernet Interface and the packet does not have an
802.1Q VLAN Tag, the Multi-AP Agent shall add an 802.1Q C-TAG, setting the VLAN ID to the Primary VLAN ID
and the PCP value to the Default PCP value specified in the Default 802.1Q Settings TLV.
• If a Multi-AP Agent receives a packet on a Multi-AP Logical Ethernet Interface and the packet has an 802.1Q
VLAN Tag and the first 802.1Q VLAN Tag in the packet is an 802.1Q C-TAG that contains a C-VID value of the
Primary VLAN ID as specified in the Default 802.1Q Settings TLV, then the Multi-AP Agent shall not forward it on
that same interface, with or without a VLAN tag.
• If a Multi-AP Agent receives a packet on a Multi-AP Logical Ethernet Interface and the packet does not have an
802.1Q VLAN Tag, the Multi-AP Agent shall not forward it on that same interface, with or without a VLAN tag.
• If a Multi-AP Agent receives a packet on a Multi-AP Logical Ethernet Interface and the packet has an 802.1Q
VLAN Tag and the first 802.1Q VLAN Tag in the packet is an 802.1Q C-TAG that contains a C-VID value of a
Secondary VLAN ID as specified in the Traffic Separation Policy, then the Multi-AP Agent shall retain the 802.1Q
C-TAG.
• If a Multi-AP Agent receives a packet on a Multi-AP Logical Ethernet Interface and the packet has an 802.1Q
VLAN Tag and the first 802.1Q VLAN Tag is an 802.1Q C-TAG that contains a C-VID that is not listed in the
Traffic Separation Policy, the Multi-AP Agent shall discard the packet.
• If a Multi-AP Agent receives a packet on a Multi-AP Logical Ethernet Interface and the packet has an 802.1Q
VLAN Tag and the first 802.1Q VLAN Tag is not an 802.1Q C-TAG, the Multi-AP Agent shall either discard the
packet or strip the 802.1Q tag that is not a C-TAG and apply the rules described in this section to the resulting
packet.
• If a Multi-AP Agent sends a packet on a Multi-AP Logical Ethernet Interface and the packet has an 802.1Q C-TAG
that contains a C-VID value of the Primary VLAN ID, the Multi-AP Agent shall remove that 802.1Q C-TAG.If a
Multi-AP Agent sends a packet on a Multi-AP Logical Ethernet Interface and the packet has an 802.1Q C-TAG
that contains a C-VID value of a Secondary VLAN ID, the Multi-AP Agent shall retain that 802.1Q C-TAG.
If a Multi-AP Agent includes an 802.1Q C-TAG in an Ethernet frame, the Multi-AP Agent shall insert the tag as the first
and only VLAN tag following the source MAC address as shown in Figure 20.
20 Service Prioritization
20.1 Service Prioritization in Multi-AP Network (Informative)
A Multi-AP network provides service prioritization support for traffic in which a Multi-AP Controller can instruct a Multi-AP
Agent to prioritize specified traffic using a set of Service Prioritization Rules. A Multi-AP Agent examines all Ingress
Packets. If the packet matches a Service Prioritization Rule, the Multi-AP Agent marks the packet with a PCP value in the
packet’s 802.1Q C-TAG.
Within a Multi-AP Profile-2 Network Segment, a Multi-AP Agent maps 802.1Q C-TAG PCP values to 802.11 User Priority /
Access Categories based on Table 105. A Multi-AP Agent provides the corresponding QoS treatment to process packets
in compliance with WMM [12] on Wi-Fi links. On non-Wi-Fi links, implementers may map the 802.1Q C-TAG PCP field to
the link-level QoS mechanism used on that technology.
If a Multi-AP Agent receives a Service Prioritization Request message from the Multi-AP Controller, it shall respond within
one second with a 1905 Ack message per section 17.1.32. If the received set of Service Prioritization Rule TLVs in the
Service Prioritization Request message exceeds the Multi-AP Agent’s declared capabilities, it shall also respond with an
Error Response message per section 17.1.37 containing one or more Profile-2 Error Code TLVs as described below. The
Error Report message shall contain the same MID that was received in the Service Prioritization Request message.
If a Multi-AP Agent receives a Service Prioritization Rule TLV in a Service Prioritization Request message from the Multi-
AP Controller, it shall process that TLV as follows:
• If the Add-Remove Rule bit in the Service Prioritization Rule TLV is set to one:
▪ If the number of stored Service Prioritization Rules has reached the Max Total Number Service Prioritization
Rules supported by the Multi-AP Agent and the Service Prioritization Rule does not have the same Service
Prioritization Rule ID as an existing rule, the Multi-AP Agent shall send an Error Response message including
a Profile-2 Error Code TLV with the reason code field set to 0x02 and the Service Prioritization Rule ID field
set to the Service Prioritization Rule ID per section 17.2.51 and shall discard the rule.
▪ If the Service Prioritization Rule has the same Service Prioritization Rule ID as an existing rule, the Multi-AP
Agent shall overwrite the existing rule with this Service Prioritization Rule. Otherwise, the Multi-AP Agent shall
add this Service Priorotization Rule as a new rule.
▪ If the Always Matches bit is set to zero, a Multi-AP Agent may choose to not install such a rule.
• If the Add-Remove Rule bit in the Service Prioritization Rule TLV is set to zero:
▪ If the Service Prioritization Rule ID is found, the Multi-AP Agent shall remove this Service Prioritization Rule.
▪ If the Service Prioritization Rule ID is not found, the Multi-AP Agent shall include a Profile-2 Error Code TLV
with the reason code field set to 0x01 and the Service Prioritization Rule ID field set to the Service
Prioritization Rule ID per section 17.2.36 in the Error Response message.
If a Multi-AP Agent receives a packet that is not an Ingress Packet, it shall not modify the PCP value in any VLAN tag on
the packet.
If a Multi-AP Agent receives an Ingress Packet, it shall apply the following procedure.
A Multi-AP Agent shall compare each Ingress Packet to each stored Service Prioritization Rule in the order of decreasing
Rule Precedence value.
A Multi-AP Agent shall evaluate a Service Prioritization Rule as matching or not matching as follows:
• If the Always Matches bit is set to one, the Multi-AP Agent shall evaluate the rule as matching.
• If the Always Matches bit is set to zero, the Multi-AP Agent shall evaluate the rule as not matching.
If a Multi-AP Agent evaluates a rule as matching, it shall set the PCP field in the 802.1Q C-TAG according to the Rule
Output value and stop any further rule processing. The Rule Output value indicates one of the following operations:
• 0x00 ~ 0x07: Use this literal value as the output PCP value
• 0x08: If a DSCP Value [24] is present in the source packet and the Multi-AP Agent has received a DSCP Mapping
Table TLV from the Multi-AP Controller, the Multi-AP Agent shall lookup that DSCP Value in the DSCP to PCP
mapping table provided in the most recently received DSCP Mapping Table TLV and use the corresponding PCP
as the output PCP value. Otherwise, it shall use the default PCP value as the output PCP value.
• 0x09: If UP is defined in the 802.11 QoS Control field of the source packet, the Multi-AP Agent shall use that UP
as the output PCP value, otherwise it shall use the default PCP value as the output PCP value.
If a packet does not match any Service Prioritization Rule, a Multi-AP Agent shall mark the packet with the Default PCP.
If a Multi-AP Agent sends a packet over a Wi-Fi link, the Multi-AP Agent shall map from PCP to WMM UP / AC according
to Table 105 and then process packets in compliance with WMM [12].
If a Multi-AP Agent sends a packet over a non-Wi-Fi interface, the Multi-AP Agent should map from PCP to the specific
QoS supported on the link level technology in use.
Table 105. 802.1Q C-TAG PCP to WMM UP & AC Mapping
Priority 802.1Q C-TAG PCP Value WMM UP 802.11 EDCA Access Designation
Category
Lowest 1 1 BK Background
2 2 BK Background
0 0 BE Best Effort
3 3 BE Best Effort
4 4 VI Video (alternate)
5 5 VI Video (primary)
6 6 VO Voice (primary)
Highest
7 7 VO Voice (alternate)
Value Definition
0x00 Reserved.
Implementers of Multi-AP Controllers managing networks where Traffic Separation is enabled and where Agents are daisy
chained (over Wi-Fi or Ethernet backhaul) are reminded that, in order to maintain traffic separation across those backhaul
links, a traffic separation policy containing all VIDs in use in the entire network should be sent to each Agent, even where
those Agents are not configured to support the corresponding fronthaul SSIDs.
Note that, depending on the max number of VIDs advertised by such an Agent, some topologies may not be properly
supported, and a topology change through Backhaul optimization and/or BSS reconfiguration may be necessary.
Implementers of Multi-AP Agents are reminded that the Agents may receive Traffic Separation policies containing SSID to
VLAN ID mappings for SSIDs that are not configured on the Agent.
Implementers of Multi-AP Agents are reminded that a BSS will receive both tagged and untagged EAPOL (0x888E)
frames (e.g., when Traffic Separation is configured and the same BSS is configured to allow association of both Profile-1
and Profile-2 bSTAs). Implementers need to ensure that received EAPOL frames are properly processed by
Supplicant/Authenticator irrespective of whether or not they are tagged.
Implementers of Multi-AP Controllers are reminded that correct sequencing of policy messaging to Agents is essential.
When changing the Traffic Separation policies on an existing Multi-AP network, Multi-AP Agents topologically furthest
from the Controller should be configured before Multi-AP Agents closer to the controller.
Implementers of Multi-AP device should be aware that some Profile-1 devices may send a fragmented CMDU with the
lastFragmentIndicator set to zero and an End of Message TLV.
A Multi-AP Logical Ethernet Interface is an interface designed to be used for connecting a Multi-AP Agent to other Multi-
AP devices. Implementers are reminded that users may also connect other LAN devices to these interfaces.
Implementers of Multi-AP Agents should note that not all Logical Ethernet Interfaces are considered to be Multi-AP
Logical Ethernet Interfaces. In particular, a WAN interface on a residential gateway would not normally be considered to
be a Multi-AP Logical Ethernet Interface, in which case the requirements in this specification (particularly those relating to
VLAN processing for Traffic Separation) would not apply. Implementers need to indicate in the certification process which
Logical Ethernet Interfaces are to be tested as Multi-AP Logical Ethernet Interfaces.
The Multi-AP Controller can indicate its preference for a specific primary channel for a greater than 40 MHz (e.g., 80 MHz,
160 MHz) operation by including two operating classes in the Channel Preference TLV, one for the larger bandwidth and
one for the 20 MHz primary channel. For example, include opclass 128 with channel numbers 58, 106, 122, 138, and 155
with preference values 1 (implying 42 is the most preferred) and opclass 115 with channel numbers 36, 44, and 48 with
preferences 1 (implying 40 is the most preferred) to indicate to the Multi-AP Agent that 80 MHz operation with channel
number 40 as the Primary Channel is the most preferred.