<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE: Reauthentication Timers in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3810699#M484785</link>
    <description>&lt;P&gt;If I set the Reauthentication in ISE what is the recommended duration? Or should I remove the three reauthentication settings from the switchport completely? Does that make a difference?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And yes we need multi-domain as we authenticate our phones with MAB and only 1 phone and 1 host is allowed per switchport&lt;/P&gt;</description>
    <pubDate>Wed, 27 Feb 2019 10:01:11 GMT</pubDate>
    <dc:creator>Maxee</dc:creator>
    <dc:date>2019-02-27T10:01:11Z</dc:date>
    <item>
      <title>ISE: Reauthentication Timers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3810657#M484783</link>
      <description>&lt;P&gt;Good day all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm having some trouble understanding the reauthentication timers or configuration on IOS and ISE.&lt;/P&gt;&lt;P&gt;We are using the "Closed Mode"-deployment, where we authenticate clients with certificates or mac address and security groups in Active Directory to tell the switchport which VLAN to use. That works fine with our current setup (but with some issues with PXE, where we have to set the tx-period differently on different switch models).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We've deployed IP-Phones (not Cisco) with integrated pass-through port for computers, which we have to keep in mind.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the default switchport configuration we deploy for all our switches since we migrated from ACS to ISE.&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/48&lt;BR /&gt;description Default&lt;BR /&gt;switchport access vlan XX&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan XX&lt;BR /&gt;authentication control-direction in&lt;BR /&gt;authentication event server dead action authorize vlan XX&lt;BR /&gt;authentication event server dead action authorize voice&lt;BR /&gt;authentication event server alive action reinitialize&lt;BR /&gt;authentication host-mode multi-domain&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;authentication timer inactivity server dynamic&lt;BR /&gt;authentication violation restrict&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 5&lt;BR /&gt;dot1x max-reauth-req 3&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;spanning-tree bpduguard enable&lt;BR /&gt;spanning-tree guard root&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now the main issue is that the ISE live logs gets spammed with "Session is started" messages or reauthentications (sometimes simultaneously when the switch was rebooted and all devices authenticated at the same time). My understanding was that if we set "authentication timer reauthenticate server" the ISE dictates the timers, and if we don't set timers on the ISE the reauthentication is disabled. Well that was wrong...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So how can I do better on ISE and the switches to get the optimal results?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 09:07:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3810657#M484783</guid>
      <dc:creator>Maxee</dc:creator>
      <dc:date>2019-02-27T09:07:44Z</dc:date>
    </item>
    <item>
      <title>Re: ISE: Reauthentication Timers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3810678#M484784</link>
      <description>&lt;P&gt;Hello Maxee&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The default configuration on your setup sets your endpoints to be re-authenticated every 1h hour. If you believe that's too often&amp;nbsp;try changing you command manually&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;authentication timer &amp;lt;seconds&amp;gt; or change the&amp;nbsp;Session-Timeout attribute on ISE. Otherwise, some devices for some reason keep reauthenticating which you need to dig in further.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Also, do you need multidomain authentication? Do you authenticate your IP phones as well?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 09:37:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3810678#M484784</guid>
      <dc:creator>socratesp1980</dc:creator>
      <dc:date>2019-02-27T09:37:39Z</dc:date>
    </item>
    <item>
      <title>Re: ISE: Reauthentication Timers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3810699#M484785</link>
      <description>&lt;P&gt;If I set the Reauthentication in ISE what is the recommended duration? Or should I remove the three reauthentication settings from the switchport completely? Does that make a difference?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And yes we need multi-domain as we authenticate our phones with MAB and only 1 phone and 1 host is allowed per switchport&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 10:01:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3810699#M484785</guid>
      <dc:creator>Maxee</dc:creator>
      <dc:date>2019-02-27T10:01:11Z</dc:date>
    </item>
    <item>
      <title>Re: ISE: Reauthentication Timers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3810739#M484786</link>
      <description>It depends how often or if you want re-authentications.  When a new mac is introduced on a certain port authentication occurs anyway. Why would you want to re-authenticate your endpoints all the time?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 27 Feb 2019 10:51:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3810739#M484786</guid>
      <dc:creator>socratesp1980</dc:creator>
      <dc:date>2019-02-27T10:51:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE: Reauthentication Timers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3810774#M484787</link>
      <description>The idea was that if clients re-authenticate regularly we always have the accurate number of devices. But if there is nothing important that speaks for re-authentication then we could probably disable it.</description>
      <pubDate>Wed, 27 Feb 2019 11:32:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3810774#M484787</guid>
      <dc:creator>Maxee</dc:creator>
      <dc:date>2019-02-27T11:32:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISE: Reauthentication Timers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3810971#M484788</link>
      <description>&lt;P&gt;Yes, with the config listed you have enabled re-auth, and told it to honor settings from AAA. It's subtle, but RFC-3580 gives guidance for when you send (for example) a session-timeout, but does not discuss when you do not send it ;-). Also, static re-auth on a port (with yes, a default timer of one hour) pre-dated bringing in support of this over RADIUS. Thus, to support backward compatibility, the switch treats whatever AAA to do with priority, else falls back to what's configured locally. Now, if you want to disable re-auth for groups (or some, most, etc.) of devices, then setting session-timeout to zero on ISE should give the session an otherwise infinite session-time (as if re-auth was not enabled for that session).&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 15:18:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3810971#M484788</guid>
      <dc:creator>jafrazie</dc:creator>
      <dc:date>2019-02-27T15:18:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISE: Reauthentication Timers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3811109#M484840</link>
      <description>The idea was that if clients re-authenticate regularly we always have the accurate number of devices.&lt;BR /&gt;&lt;BR /&gt;You can track this via "Active Endpoints" on your home Summary dashboard. These active endpoints are determined by the Radius accounting state. Another area that can assist with tracking active sessions is under Operations-&amp;gt;Radius-&amp;gt;Live Sessions&lt;BR /&gt;&lt;BR /&gt;But if there is nothing important that speaks for re-authentication then we could probably disable it.&lt;BR /&gt;&lt;BR /&gt;In my opinion this would be something that is determined by your requirements. I know that if you work in the DoD there is a STIG requirement that requires 8021x reauthentication every 60 minutes.&lt;BR /&gt;&lt;BR /&gt;HTH!&lt;BR /&gt;</description>
      <pubDate>Wed, 27 Feb 2019 17:57:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3811109#M484840</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-02-27T17:57:29Z</dc:date>
    </item>
    <item>
      <title>Re: ISE: Reauthentication Timers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3811175#M484841</link>
      <description>The re-authentication could also be useful if we deploy a new configuration like dACL couldn't it?&lt;BR /&gt;&lt;BR /&gt;If devices reauthenticate every 18 hours we don't have to manually reauthenticate them with CoA to pull new configurations. Hm.. Difficult</description>
      <pubDate>Wed, 27 Feb 2019 19:47:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3811175#M484841</guid>
      <dc:creator>Maxee</dc:creator>
      <dc:date>2019-02-27T19:47:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE: Reauthentication Timers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3811176#M484845</link>
      <description>Setting "Session-Timeout" to zero would be nice for some groups but ISE only allows 1-65k seconds...</description>
      <pubDate>Wed, 27 Feb 2019 19:48:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3811176#M484845</guid>
      <dc:creator>Maxee</dc:creator>
      <dc:date>2019-02-27T19:48:34Z</dc:date>
    </item>
    <item>
      <title>Re: ISE: Reauthentication Timers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3811294#M484847</link>
      <description>&lt;P&gt;I am discussing this internally with jafrazie. Can you post result of 'show authentication session interface XXX' command for the interface?&amp;nbsp;Also, can you post Catalyst platform and IOS version? I've tested this recently and when ISE doesn't send any value the result was that no reauthentication timer was applied to the session. Lastly if you want to provide '0' value then use Advanced Attributes Settings as shown below:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2019-02-27 at 3.55.35 PM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/31088iC72B8C9B43F89DFC/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2019-02-27 at 3.55.35 PM.png" alt="Screen Shot 2019-02-27 at 3.55.35 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 22:21:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3811294#M484847</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2019-02-27T22:21:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISE: Reauthentication Timers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3811566#M484849</link>
      <description>&lt;P&gt;I have noticed that MAB seems to always have a reauthentication timer and 802.1X sometimes... That's also what I've noticed in the repeat count report on ISE that most devices with repeats are MAB-Devices and sometimes in between there are 802.1X-Devices.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's on the same Switch (WS-C3560X-48P @ 15.2(4)E7)&lt;/P&gt;&lt;P&gt;All of these examples are without ISE sending timers, just VLAN-IDs&lt;/P&gt;&lt;P&gt;802.1x but somehow there is a reauthentication timer:&lt;/P&gt;&lt;PRE&gt;sh authentication sessions int g0/23 details&lt;BR /&gt;Interface: GigabitEthernet0/23&lt;BR /&gt;MAC Address: 90b1.xxxx.xxxx&lt;BR /&gt;IPv6 Address: Unknown&lt;BR /&gt;IPv4 Address: xx.xx.xx.xx&lt;BR /&gt;User-Name: dummy123.cisco.com&lt;BR /&gt;Status: Authorized&lt;BR /&gt;Domain: DATA&lt;BR /&gt;Oper host mode: multi-domain&lt;BR /&gt;Oper control dir: in&lt;BR /&gt;&lt;STRONG&gt;Session timeout: 3600s (server), Remaining: 2222s&lt;/STRONG&gt;&lt;BR /&gt;Timeout action: Reauthenticate&lt;BR /&gt;Restart timeout: N/A&lt;BR /&gt;Periodic Acct timeout: 172800s (local), Remaining: 74118s&lt;BR /&gt;Common Session ID: 0A1001380000008C163C1C71&lt;BR /&gt;Acct Session ID: 0x0000008C&lt;BR /&gt;Handle: 0xE100003F&lt;BR /&gt;Current Policy: POLICY_Gi0/23&lt;BR /&gt;&lt;BR /&gt;Local Policies:&lt;BR /&gt;Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)&lt;BR /&gt;&lt;BR /&gt;Server Policies:&lt;BR /&gt;Vlan Group: Vlan: 7&lt;BR /&gt;&lt;BR /&gt;Method status list:&lt;BR /&gt;Method State&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;dot1x Authc Success&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;802.1x without session timers&lt;/P&gt;&lt;PRE&gt;sh authentication sessions int g0/34 details&lt;BR /&gt;Interface: GigabitEthernet0/34&lt;BR /&gt;MAC Address: 90b1.xxxx.xxx2&lt;BR /&gt;IPv6 Address: Unknown&lt;BR /&gt;IPv4 Address: xx.xx.xx.xx&lt;BR /&gt;User-Name: dummy1.cisco.com&lt;BR /&gt;Status: Authorized&lt;BR /&gt;Domain: DATA&lt;BR /&gt;Oper host mode: multi-domain&lt;BR /&gt;Oper control dir: in&lt;BR /&gt;&lt;STRONG&gt;Session timeout: N/A&lt;/STRONG&gt;&lt;BR /&gt;Restart timeout: N/A&lt;BR /&gt;Periodic Acct timeout: 172800s (local), Remaining: 169100s&lt;BR /&gt;Common Session ID: 0A1001380000010E2650A11E&lt;BR /&gt;Acct Session ID: 0x00000127&lt;BR /&gt;Handle: 0x0200009A&lt;BR /&gt;Current Policy: POLICY_Gi0/34&lt;BR /&gt;&lt;BR /&gt;Local Policies:&lt;BR /&gt;Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)&lt;BR /&gt;&lt;BR /&gt;Server Policies:&lt;BR /&gt;Vlan Group: Vlan: 401&lt;BR /&gt;&lt;BR /&gt;Method status list:&lt;BR /&gt;Method State&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;dot1x Authc Success&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;MAB with session timers:&lt;/P&gt;&lt;PRE&gt;sh authentication sessions int g0/36 details&lt;BR /&gt;Interface: GigabitEthernet0/36&lt;BR /&gt;MAC Address: 0017.xxxx.xxxx&lt;BR /&gt;IPv6 Address: Unknown&lt;BR /&gt;IPv4 Address: 10.xx.xx.xx&lt;BR /&gt;User-Name: xx-xx-xx-xx-xx-xx&lt;BR /&gt;Status: Authorized&lt;BR /&gt;Domain: DATA&lt;BR /&gt;Oper host mode: multi-domain&lt;BR /&gt;Oper control dir: in&lt;BR /&gt;&lt;STRONG&gt;Session timeout: 3600s (server), Remaining: 2778s&lt;/STRONG&gt;&lt;BR /&gt;Timeout action: Reauthenticate&lt;BR /&gt;Restart timeout: N/A&lt;BR /&gt;Periodic Acct timeout: 172800s (local), Remaining: 91247s&lt;BR /&gt;Common Session ID: 0A1001380000009F174172BC&lt;BR /&gt;Acct Session ID: 0x000000A0&lt;BR /&gt;Handle: 0xF500004F&lt;BR /&gt;Current Policy: POLICY_Gi0/36&lt;BR /&gt;&lt;BR /&gt;Local Policies:&lt;BR /&gt;Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)&lt;BR /&gt;&lt;BR /&gt;Server Policies:&lt;BR /&gt;Vlan Group: Vlan: 118&lt;BR /&gt;&lt;BR /&gt;Method status list:&lt;BR /&gt;Method State&lt;BR /&gt;&lt;BR /&gt;dot1x Stopped&lt;BR /&gt;&lt;STRONG&gt;mab Authc Success&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Feb 2019 09:49:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3811566#M484849</guid>
      <dc:creator>Maxee</dc:creator>
      <dc:date>2019-02-28T09:49:59Z</dc:date>
    </item>
    <item>
      <title>Re: ISE: Reauthentication Timers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3811687#M484850</link>
      <description>&lt;P&gt;On the MAB example you have, it shows the the timer was from the server. Can you confirm that ISE is not sending the 3600 value? If ISE is sending without a authorization profile stating the timer, then that would be a defect on ISE. If ISE is not sending anything and the switch is applying it and indicating that it is from the server, then that would be a defect on the switch.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Feb 2019 12:34:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3811687#M484850</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2019-02-28T12:34:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE: Reauthentication Timers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3811713#M484852</link>
      <description>&lt;P&gt;On the ISE that attribute is not set. And on the switch It's also not configured (maybe a default setting?).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="firefox_2019-02-28_14-03-31.png" style="width: 276px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/31117i0739E7C641EB5675/image-size/large?v=v2&amp;amp;px=999" role="button" title="firefox_2019-02-28_14-03-31.png" alt="firefox_2019-02-28_14-03-31.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Feb 2019 13:07:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3811713#M484852</guid>
      <dc:creator>Maxee</dc:creator>
      <dc:date>2019-02-28T13:07:13Z</dc:date>
    </item>
    <item>
      <title>Re: ISE: Reauthentication Timers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3811720#M484854</link>
      <description>&lt;P&gt;I wonder if there is ghost attributes being sent. Can you go to the details of the live log event for specific endpoint and look at the 'Result' section. You should see it at the bottom of the report. For my VLAN assignment I only see the 3 attributes. If you see additional attributes here for reauth then you may need to delete the authorization profile and recreate it. The other thing I would try is do a 'shut/no shut' in the interface to clear any previous settings (Although I doubt will make any difference would suggest to start cleanly).&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2019-02-28 at 7.09.43 AM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/31118i439F7E6B208452CF/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2019-02-28 at 7.09.43 AM.png" alt="Screen Shot 2019-02-28 at 7.09.43 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Feb 2019 13:12:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3811720#M484854</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2019-02-28T13:12:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE: Reauthentication Timers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3811739#M484856</link>
      <description>After a port bounce the authentication timer was set to N/A.&lt;BR /&gt;&lt;BR /&gt;I disabled authentication periodic on another interface and then the timer was 3600s (local), even after port bounce... After I re-enabled server reauthentication timers the timer was set to 3600s (server). After a port bounce it was N/A.&lt;BR /&gt;&lt;BR /&gt;That's pretty interesting...</description>
      <pubDate>Thu, 28 Feb 2019 13:36:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3811739#M484856</guid>
      <dc:creator>Maxee</dc:creator>
      <dc:date>2019-02-28T13:36:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE: Reauthentication Timers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3811745#M484858</link>
      <description>&lt;P&gt;Good procedure to keep in mind is whenever interface setting has been changed, always shut/no shut the interface to remove any odd states such as this. This includes host-mode, timers, order, priority. Reauthentication may not remove certain state whereas terminate would have. Also, when 'authentication periodic' is enabled and 'authentication timer reauthenticate server' is missing, the switch will default to 1 hour as noted. However, if 'authentication timer reauthenticate server' is in place then no timer will be set unless sent from ISE.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Feb 2019 13:43:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3811745#M484858</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2019-02-28T13:43:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE: Reauthentication Timers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3816354#M484860</link>
      <description>&lt;P&gt;Hi Maxee,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The behaviour that you will get with this config is the following:&lt;/P&gt;
&lt;P&gt;Endpoint connects and 802.1x is checked.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;the switch will try for (3+1) x 5 sec in case 802.1x fails to fall to MAB authentication.&lt;/P&gt;
&lt;P&gt;Once authenticated the reauthentication timer countdown begins (as defined by the server attribute 27 i think).&lt;/P&gt;
&lt;P&gt;The switch will reautheticate the port transparently.&lt;/P&gt;
&lt;P&gt;-if you want you can disable the reauthentication by the following cmd on int:&lt;/P&gt;
&lt;P&gt;no authentication periodic.&lt;/P&gt;
&lt;P&gt;However it is advisable to have it but better to put the reauthentication timer to high value (lets say 8 hours).&lt;/P&gt;
&lt;P&gt;Reauthentication timer is usefull if you perform a change in your Authz profile and you want to reflect the change to already authenticated devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you don't set this timer and authentication periodic is there, then the default is 1 Hour.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please rate if helpfull.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2019 15:04:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-reauthentication-timers/m-p/3816354#M484860</guid>
      <dc:creator>bern81</dc:creator>
      <dc:date>2019-03-08T15:04:43Z</dc:date>
    </item>
  </channel>
</rss>

