WiFi Fast Roaming
WiFi Fast Roaming
FacebookTwitterLinkedIn
Fast roaming, also known as IEEE 802.11r or Fast BSS Transition (FT), allows a client
device to roam quickly in environments implementing WPA2 Enterprise security, by
ensuring that the client device does not need to re-authenticate to the RADIUS
server every time it roams from one access point to another. This is accomplished
by actually altering the standard authentication, association, and four-way
handshake processes used when a device roams (i.e., re-associates) to a new WiFi
access point.
The simplest explanation is that, after a client connects to the first AP on the
network, the client is "vouched for." When a client device roams to a new AP,
information from the original association is passed to the new AP to provide the
client with credentials. The new AP therefore knows that this client has already
been approved by the authentication server, and thus need not repeat the whole
802.1X/EAP exchange again.
Fast roaming also introduces efficiencies into the process of establishing the new
encryption key between the new AP and the client device, which benefits both
WPA2 Personal (a.k.a. pre-shared key or passphrase) and WPA2 Enterprise (a.k.a.
802.1X or EAP). Support for 802.11r is advertised in the AP beacon and probe
response frames.
1. Authentication (client)
The following lists the revised -- 802.11r -- steps followed by a client device as it
uses Fast BSS Transition (FT) to move from one access point to another.
Note that there is an alternative method called over-the-DS fast BSS transition,
where the credentials are passed from one AP to the others on the network via FT
action management frames over the wired Ethernet network that interconnects
them. This is usually one of those details that muddies the waters of the 802.11r
story. The essential point remains the same: The first AP "vouches" for the client
device to the other APs, so that the remaining APs need not re-verify that the client
device is allowed to connect to the network.
The human brain generally cannot perceive an event that occurs faster than about
100 milliseconds. An interruption in voice or video service during a roam that
occurs faster than this will therefore not be observed by the user. The typical target
roam time for a client is half of this value, or 50 ms, and in most well-designed Wi-Fi
networks, the eight messages that make up the authentication, association, and
four-way handshake collectively will take on the order of 40 ms to 50 ms. Thus, in a
network using WPA2 Personal security, shrinking the number of messages from
eight to four is naturally helpful for efficient airtime utilization, but is really
unimportant to the roaming process from a perceived service-quality perspective.
The real benefit of 802.11r comes from not having to do the 802.1X/EAP exchange
when using WPA2 Enterprise security. Even with a local RADIUS server, this
exchange can easily take several hundred milliseconds, and far longer if your
RADIUS server is not on your LAN, but requires access over the Internet. Thus, fast
roaming should ALWAYS be enabled when you are using WPA2 Enterprise security.
One of the issues with 802.11r is that many older client devices don’t have drivers
that support it, and in fact even have trouble properly detecting and associating to
networks with 802.11r enabled. While adding new information elements to beacon
frames is a scalable part of the 802.11 protocol since the early days of WiFi -- and is
an essential element in backwards compatibility of new APs with older client
devices -- many older client drivers cannot read and interpret the new FT
information element in the beacon frames properly so they see the beacons as
corrupted frames. Therefore, to ensure maximum client compatibility, the common
recommendation is to disable fast roaming when using WPA2 Personal, and only
use it for WPA2 Enterprise networks.