<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: dot1x session persistent on switches? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/dot1x-session-persistent-on-switches/m-p/3894751#M471256</link>
    <description>If you want to rely on ISE to push the re-authentication timer you can do so in your Authz profiles under common tasks. The timer is in seconds so 3600 would be one hour re-auth timer. HTH!</description>
    <pubDate>Mon, 22 Jul 2019 12:27:09 GMT</pubDate>
    <dc:creator>Mike.Cifelli</dc:creator>
    <dc:date>2019-07-22T12:27:09Z</dc:date>
    <item>
      <title>dot1x session persistent on switches?</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-session-persistent-on-switches/m-p/3894719#M471242</link>
      <description>&lt;P&gt;I seem to recall that if a&amp;nbsp;switch looses connection to all PSN nodes, the authentication session will remain active for a during of time? Is this correct or I'm remembering it wrongly?&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2019 11:01:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-session-persistent-on-switches/m-p/3894719#M471242</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2019-07-22T11:01:56Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x session persistent on switches?</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-session-persistent-on-switches/m-p/3894726#M471244</link>
      <description>The session will remain active till the reauthentication timer expires or if you have configured actions based on radius server status on the switch.&lt;BR /&gt;</description>
      <pubDate>Mon, 22 Jul 2019 11:28:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-session-persistent-on-switches/m-p/3894726#M471244</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2019-07-22T11:28:17Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x session persistent on switches?</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-session-persistent-on-switches/m-p/3894746#M471249</link>
      <description>&lt;P&gt;Thanks - In my case I haven't configured the interface level "dot1x reauthentication" command so the clients will be persistent if ISE fails.&lt;/P&gt;&lt;P&gt;Where is the configuration set in ISE?&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2019 12:15:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-session-persistent-on-switches/m-p/3894746#M471249</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2019-07-22T12:15:37Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x session persistent on switches?</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-session-persistent-on-switches/m-p/3894748#M471254</link>
      <description>Do you have “authentication periodic” configured ? Can you share your switchport configuration ?&lt;BR /&gt;</description>
      <pubDate>Mon, 22 Jul 2019 12:19:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-session-persistent-on-switches/m-p/3894748#M471254</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2019-07-22T12:19:17Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x session persistent on switches?</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-session-persistent-on-switches/m-p/3894750#M471255</link>
      <description>&lt;P&gt;interface GigabitEthernet2/0/14&lt;BR /&gt;description DYNAMIC-USER&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan 40&lt;BR /&gt;authentication control-direction in&lt;BR /&gt;authentication event fail action next-method&lt;BR /&gt;authentication event server dead action reinitialize vlan 2104&lt;BR /&gt;authentication event server dead action authorize voice&lt;BR /&gt;authentication event server alive action reinitialize&lt;BR /&gt;authentication host-mode multi-auth&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;&lt;STRONG&gt;authentication periodic&lt;/STRONG&gt;&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;authentication timer restart 5&lt;BR /&gt;authentication timer inactivity server dynamic&lt;BR /&gt;authentication violation replace&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 3&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;spanning-tree bpduguard enable&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2019 12:26:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-session-persistent-on-switches/m-p/3894750#M471255</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2019-07-22T12:26:09Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x session persistent on switches?</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-session-persistent-on-switches/m-p/3894751#M471256</link>
      <description>If you want to rely on ISE to push the re-authentication timer you can do so in your Authz profiles under common tasks. The timer is in seconds so 3600 would be one hour re-auth timer. HTH!</description>
      <pubDate>Mon, 22 Jul 2019 12:27:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-session-persistent-on-switches/m-p/3894751#M471256</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-07-22T12:27:09Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x session persistent on switches?</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-session-persistent-on-switches/m-p/3894755#M471257</link>
      <description>As per your configuration, as Mike said in the reply, If there is a re-authentication timer configuration set in the authorization profile, switch will re-authenticate the clients.&lt;BR /&gt;</description>
      <pubDate>Mon, 22 Jul 2019 12:34:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-session-persistent-on-switches/m-p/3894755#M471257</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2019-07-22T12:34:17Z</dc:date>
    </item>
  </channel>
</rss>

