<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: dot1x and reauth in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3702118#M494366</link>
    <description>&lt;P&gt;Make sure the ISE is sending both session-timeout value (600) and the terminate-action value (1).&lt;/P&gt;</description>
    <pubDate>Thu, 06 Sep 2018 14:32:12 GMT</pubDate>
    <dc:creator>howon</dc:creator>
    <dc:date>2018-09-06T14:32:12Z</dc:date>
    <item>
      <title>dot1x and reauth</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3699750#M494303</link>
      <description>&lt;P&gt;We are running dot1x and ISE, we only do machine authentication. We have configured reauth every 600 seconds. If we have a skype call going on and the switch is requesting the client to reauth the session "Session timeout: 600s (server), Remaining: 0s" the sound in the call is interrupted for aprox 5 seconds.&lt;/P&gt;
&lt;P&gt;Any one suffer from the same problem ? And how did you solved it ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;/Magnus&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Sep 2018 13:31:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3699750#M494303</guid>
      <dc:creator>MAGNUS SVENSSON</dc:creator>
      <dc:date>2018-09-03T13:31:40Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x and reauth</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3699884#M494304</link>
      <description>&lt;P&gt;A re-auth frequency of 600 seconds (or 10 minutes) is much too often. The best practice is to increase it to 2+ hours (or 7200+ seconds). See the slide 264 in Session Reference from &lt;A href="https://www.ciscolive.com/global/on-demand-library/?search.event=ciscoliveus2018&amp;amp;search=ISE#/session/1511296160606001Af1J" target="_blank" rel="nofollow noopener noreferrer"&gt;Designing ISE for Scale &amp;amp; High Availability - BRKSEC-3699&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;In your case, you might want to adjust it to at least 8 hours.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Sep 2018 17:26:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3699884#M494304</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-09-03T17:26:14Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x and reauth</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3700011#M494360</link>
      <description>&lt;P&gt;yes that timeout is a bit extreme.&amp;nbsp; However, it doesn't change the fact that when a session time DOES occur, that your clients will be happy with a 5 second interruption.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are 802.1X protocol enhancements that can be enabled to allow the EAP process to be sped up.&amp;nbsp; In a non-optimised case, there are around a dozen EAP messages sent from the supplicant to ISE - if there is a lot of latency then this all adds up.&lt;/P&gt;
&lt;P&gt;You don't mention which EAP method you're using, but in the case of EAP-PEAP you can enable two things - one at a time ...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="peap.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/18006i9945519CF5672364/image-size/large?v=v2&amp;amp;px=999" role="button" title="peap.png" alt="peap.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Finally, on the wireless level, there are things that could be done to prevent the need to even speak to the radius server.&amp;nbsp; E.g. 802.1r (Fast Transition/Fast Roaming), etc.&amp;nbsp; That's a whole other discussion and it's dependent on the client support.&amp;nbsp; The idea is that the WLC takes care of the keying material without needing a Radius server to keep generating it.&amp;nbsp; You do it for a certain time period, and then involve the radius server again.&amp;nbsp; But it reduces load on radius server, network and also better experience for clients.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Sep 2018 23:24:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3700011#M494360</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-09-03T23:24:55Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x and reauth</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3700116#M494361</link>
      <description>&lt;P&gt;Hi.&lt;/P&gt;
&lt;P&gt;We have this quit aggressive reauth time because we will not allow unauthorized clients accessing our network, (not for a long time anyway (600 seconds is enough).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think you (Arne) might point me to the right direction. We use EAP-TLS, there is a tickbox "Enable Stateless Session&amp;nbsp; Resume" and "Session ticket time to live". If I would like to stay with 600 seconds with reauth what value would you put in the above parameters.&lt;/P&gt;
&lt;P&gt;When the reauth occurs the skype call is interrupted for like 3-5 seconds, we had a ping going at the same time and the response time went from 2ms to 6ms.&lt;/P&gt;
&lt;P&gt;/Magnus&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Sep 2018 06:10:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3700116#M494361</guid>
      <dc:creator>MAGNUS SVENSSON</dc:creator>
      <dc:date>2018-09-04T06:10:16Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x and reauth</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3701257#M494362</link>
      <description>How is the interface config for dot1x and mab ordering set for? If you are doing mab first then this is expected behavior. You can change the behavior using Cisco VSA sent during authentication. See: &lt;A href="https://community.cisco.com/t5/security-documents/top-ten-mis-configured-cisco-ios-switch-settings-for-ise/ta-p/3643912#toc-hId--1759816418" target="_blank"&gt;https://community.cisco.com/t5/security-documents/top-ten-mis-configured-cisco-ios-switch-settings-for-ise/ta-p/3643912#toc-hId--1759816418&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 05 Sep 2018 14:46:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3701257#M494362</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2018-09-05T14:46:32Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x and reauth</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3701577#M494363</link>
      <description>&lt;P&gt;Hey &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/315922"&gt;@MAGNUS SVENSSON&lt;/a&gt;, I have been meaning to test that in my own lab for some time but just haven't got around to it.&amp;nbsp; Are you able to have a go and let us know how it worked out for you?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the past I did some tests with PEAP optimisations in ISE and analysed the PSN tcpdumps in wireshark - you can see that the number of radius/EAP messages reduces quite a bit. But I have not tried any of the wireless optimisations - you could start with a modern iPhone and enable all the fancy optimisations, and then work your way backwards until you find a config that supports all the devices in your network.&amp;nbsp; Enabling all the nerd knobs in production is probably a recipe for disaster &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Sep 2018 21:25:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3701577#M494363</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-09-05T21:25:01Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x and reauth</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3701921#M494364</link>
      <description>&lt;P&gt;Hi. Here is the portconfiguration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet2/0/32&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;switchport nonegotiate&lt;BR /&gt;&amp;nbsp;switchport block multicast&lt;BR /&gt;&amp;nbsp;switchport block unicast&lt;BR /&gt;&amp;nbsp;ipv6 nd raguard&lt;BR /&gt;&amp;nbsp;ipv6 snooping attach-policy snooping-policy&lt;BR /&gt;&amp;nbsp;ipv6 dhcp guard&lt;BR /&gt;&amp;nbsp;authentication event fail action next-method&lt;BR /&gt;&amp;nbsp;authentication event server dead action authorize vlan 999&lt;BR /&gt;&amp;nbsp;authentication event no-response action authorize vlan 999&lt;BR /&gt;&amp;nbsp;authentication order dot1x mab&lt;BR /&gt;&amp;nbsp;authentication priority dot1x mab&lt;BR /&gt;&amp;nbsp;authentication port-control auto&lt;BR /&gt;&amp;nbsp;authentication periodic&lt;BR /&gt;&amp;nbsp;authentication timer reauthenticate server&lt;BR /&gt;&amp;nbsp;mab&lt;BR /&gt;&amp;nbsp;no snmp trap link-status&lt;BR /&gt;&amp;nbsp;dot1x pae authenticator&lt;BR /&gt;&amp;nbsp;dot1x timeout tx-period 3&lt;BR /&gt;&amp;nbsp;dot1x max-reauth-req 1&lt;BR /&gt;&amp;nbsp;storm-control broadcast level 60.00 40.00&lt;BR /&gt;&amp;nbsp;storm-control action shutdown&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;&amp;nbsp;spanning-tree bpduguard enable&lt;BR /&gt;&amp;nbsp;ip dhcp snooping limit rate 30&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 10:45:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3701921#M494364</guid>
      <dc:creator>MAGNUS SVENSSON</dc:creator>
      <dc:date>2018-09-06T10:45:28Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x and reauth</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3701932#M494365</link>
      <description>&lt;P&gt;I have a case logged with Cisco.&lt;/P&gt;
&lt;P&gt;I will post any result from that.&lt;/P&gt;
&lt;P&gt;/Magnus&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 10:51:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3701932#M494365</guid>
      <dc:creator>MAGNUS SVENSSON</dc:creator>
      <dc:date>2018-09-06T10:51:39Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x and reauth</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3702118#M494366</link>
      <description>&lt;P&gt;Make sure the ISE is sending both session-timeout value (600) and the terminate-action value (1).&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 14:32:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3702118#M494366</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2018-09-06T14:32:12Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x and reauth</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3702712#M494368</link>
      <description>&lt;P&gt;Hi here are some of the radius attribites that we send. I think Terminate-Action = Radius-Request is the value of 1.&lt;/P&gt;
&lt;P&gt;Access Type = ACCESS_ACCEPT&lt;BR /&gt;Session-Timeout = 600&lt;BR /&gt;Termination-Action = RADIUS-Request&lt;/P&gt;
&lt;P&gt;/Magnus&lt;/P&gt;</description>
      <pubDate>Fri, 07 Sep 2018 08:09:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3702712#M494368</guid>
      <dc:creator>MAGNUS SVENSSON</dc:creator>
      <dc:date>2018-09-07T08:09:09Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x and reauth</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3703001#M494369</link>
      <description>&lt;P&gt;Can you post the conditions used in the policy rule? Also, the detailed report should provide where the delays are from the ISE side. If no delays seen in the detailed report, then you will have to look into the switch debug logs to find out the root cause of delay.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Sep 2018 15:55:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3703001#M494369</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2018-09-07T15:55:50Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x and reauth</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3710391#M494370</link>
      <description>The Cisco case is not providing any solution to the problem. Is any one of you able to do the same test. Phone a college (using skype), set the reauth timer (localy on the switchport to like one minute) , authentication timer reauthenticate 60 and report back the result to this community.&lt;BR /&gt;Best regards&lt;BR /&gt;Magnus</description>
      <pubDate>Thu, 20 Sep 2018 12:28:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-and-reauth/m-p/3710391#M494370</guid>
      <dc:creator>MAGNUS SVENSSON</dc:creator>
      <dc:date>2018-09-20T12:28:03Z</dc:date>
    </item>
  </channel>
</rss>

