<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Network Access Control - inactivity timer and reauthentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/network-access-control-inactivity-timer-and-reauthentication/m-p/4277617#M564915</link>
    <description>&lt;P&gt;&lt;SPAN&gt;My question about inactivity timeout, I didn't configure the&amp;nbsp;authentication timer inactivity server but I still send the timeout from the ISE server and it's working.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What is the purpose of the command, if it's work without it?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As you can see, the Server Policies include the Idle timeout and the devices is deleted after 30 secs of inactivity.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-This is normal behavior.&amp;nbsp; If you lean on server policy (AKA ISE) to dynamically push down policy it will apply what you wish to each session.&amp;nbsp; If you did not push it down from ISE, you could statically/manually configure it on each respective interface.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;The inactivity timer is an indirect mechanism the switch uses to infer that an endpoint has disconnected.&amp;nbsp; IMO you are better off&lt;SPAN&gt;&amp;nbsp;dynamically assigning it via the RADIUS Idle-Timeout Attribute [28]. This is actually recommended by Cisco since it provides control over which endpoints are subject to this timer and the length of the timer for each class of endpoints.&amp;nbsp; HTH!&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 22 Jan 2021 13:39:54 GMT</pubDate>
    <dc:creator>Mike.Cifelli</dc:creator>
    <dc:date>2021-01-22T13:39:54Z</dc:date>
    <item>
      <title>Network Access Control - inactivity timer and reauthentication</title>
      <link>https://community.cisco.com/t5/network-access-control/network-access-control-inactivity-timer-and-reauthentication/m-p/4277510#M564912</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am looking for a solution for a customer.&lt;/P&gt;&lt;P&gt;They need to use reauthentication for the industrial network.&lt;/P&gt;&lt;P&gt;All devices are authenticated by MAB as they don't support DOT1X and they are afraid of any network disruption during the reauthentication process.&lt;/P&gt;&lt;P&gt;As a solution which I am testing right now I want to implement reauthentication &lt;SPAN&gt;with a value of RADIUS-Request (this should minimize the downtime) and an inactivity timeout to delete inactive devices.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;My question about inactivity timeout, I didn't configure the&amp;nbsp;authentication timer inactivity server but I still send the timeout from the ISE server and it's working.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What is the purpose of the command, if it's work without it?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is my interface config:&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;switchport access vlan X&lt;BR /&gt;switchport mode access&lt;BR /&gt;authentication event fail action next-method&lt;BR /&gt;authentication event server dead action authorize vlan X&lt;BR /&gt;authentication event server alive action reinitialize&lt;BR /&gt;authentication host-mode multi-auth&lt;BR /&gt;authentication order mab&lt;BR /&gt;authentication priority mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;authentication violation restrict&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And this is the authentication details (I have deleted MAC and IP address)&lt;/P&gt;&lt;P&gt;ession id=0AA348130000003311AF0D06&lt;BR /&gt;Interface: GigabitEthernet1/0/23&lt;BR /&gt;MAC Address:&amp;nbsp;&lt;BR /&gt;IPv6 Address: Unknown&lt;BR /&gt;IPv4 Address:&amp;nbsp;&lt;BR /&gt;User-Name:&amp;nbsp;&lt;BR /&gt;Status: Authorized&lt;BR /&gt;Domain: DATA&lt;BR /&gt;Oper host mode: multi-auth&lt;BR /&gt;Oper control dir: both&lt;BR /&gt;Session timeout: 180s (server), Remaining: 165s&lt;BR /&gt;Timeout action: Reauthenticate&lt;BR /&gt;Restart timeout: N/A&lt;BR /&gt;Periodic Acct timeout: 300s (local), Remaining: 285s&lt;BR /&gt;Session Uptime: 15s&lt;BR /&gt;Common Session ID: 0AA348130000003311AF0D06&lt;BR /&gt;Acct Session ID: 0x000001B0&lt;BR /&gt;Handle: 0x43000022&lt;BR /&gt;Current Policy: POLICY_Gi1/0/23&lt;/P&gt;&lt;P&gt;Local Policies:&lt;BR /&gt;Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)&lt;BR /&gt;Security Policy: Should Secure&lt;BR /&gt;Security Status: Link Unsecure&lt;/P&gt;&lt;P&gt;Server Policies:&lt;BR /&gt;Idle timeout: 30 sec&lt;/P&gt;&lt;P&gt;Method status list:&lt;BR /&gt;Method State&lt;/P&gt;&lt;P&gt;mab Authc Success&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As you can see, the Server Policies include the Idle timeout and the devices is deleted after 30 secs of inactivity.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 10:48:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/network-access-control-inactivity-timer-and-reauthentication/m-p/4277510#M564912</guid>
      <dc:creator>jan.murin</dc:creator>
      <dc:date>2021-01-22T10:48:43Z</dc:date>
    </item>
    <item>
      <title>Re: Network Access Control - inactivity timer and reauthentication</title>
      <link>https://community.cisco.com/t5/network-access-control/network-access-control-inactivity-timer-and-reauthentication/m-p/4277617#M564915</link>
      <description>&lt;P&gt;&lt;SPAN&gt;My question about inactivity timeout, I didn't configure the&amp;nbsp;authentication timer inactivity server but I still send the timeout from the ISE server and it's working.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What is the purpose of the command, if it's work without it?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As you can see, the Server Policies include the Idle timeout and the devices is deleted after 30 secs of inactivity.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-This is normal behavior.&amp;nbsp; If you lean on server policy (AKA ISE) to dynamically push down policy it will apply what you wish to each session.&amp;nbsp; If you did not push it down from ISE, you could statically/manually configure it on each respective interface.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;The inactivity timer is an indirect mechanism the switch uses to infer that an endpoint has disconnected.&amp;nbsp; IMO you are better off&lt;SPAN&gt;&amp;nbsp;dynamically assigning it via the RADIUS Idle-Timeout Attribute [28]. This is actually recommended by Cisco since it provides control over which endpoints are subject to this timer and the length of the timer for each class of endpoints.&amp;nbsp; HTH!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 13:39:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/network-access-control-inactivity-timer-and-reauthentication/m-p/4277617#M564915</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2021-01-22T13:39:54Z</dc:date>
    </item>
    <item>
      <title>Re: Network Access Control - inactivity timer and reauthentication</title>
      <link>https://community.cisco.com/t5/network-access-control/network-access-control-inactivity-timer-and-reauthentication/m-p/4277626#M564916</link>
      <description>&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;I still didn't get it.&lt;/P&gt;&lt;P&gt;What is the purpose of the command "&lt;SPAN&gt;authentication timer inactivity server&lt;/SPAN&gt;"?&lt;/P&gt;&lt;P&gt;From the command reference:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Specifies that the period of inactivity is defined by the Idle-Timeout value (RADIUS Attribute 28) on the authentication, authorization, and accounting (AAA) server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Do I need to configure the command or not?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 13:47:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/network-access-control-inactivity-timer-and-reauthentication/m-p/4277626#M564916</guid>
      <dc:creator>jan.murin</dc:creator>
      <dc:date>2021-01-22T13:47:43Z</dc:date>
    </item>
    <item>
      <title>Re: Network Access Control - inactivity timer and reauthentication</title>
      <link>https://community.cisco.com/t5/network-access-control/network-access-control-inactivity-timer-and-reauthentication/m-p/4277642#M564919</link>
      <description>&lt;P&gt;&lt;SPAN&gt;What is the purpose of the command "&lt;/SPAN&gt;&lt;SPAN&gt;authentication timer inactivity server&lt;/SPAN&gt;&lt;SPAN&gt;"?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-The inactivity timer allows the NAD (switch) to monitor activity from authenticated endpoints.&amp;nbsp; Once the timer expires, the NAD removes the authenticated session.&amp;nbsp; Essentially the timer provides the NAD with a mechanism to conclude that a device has been disconnected.&amp;nbsp; The catch here is that the expired inactivity timer will not guarantee that an endpoint disconnected.&amp;nbsp; It is best practice &amp;amp; Cisco recommends to enable IP device tracking with inactivity timers to ensure the expired timer does not disconnect a connected endpoint.&amp;nbsp; IP device tracking allows the NAD to send ARP probes to endpoints in the IPDT (IP device tracking table).&amp;nbsp; The kicker here is as long as the clients respond to the probes, then your inactivity timer will not trigger forcing a client to be removed from it's auth session.&amp;nbsp; I hope this helps clarify a little better.&amp;nbsp; See here for more information:&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_blank"&gt;ISE Secure Wired Access Prescriptive Deployment Guide - Cisco Community&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-amp-nac-resources/ta-p/3621621#Design" target="_blank"&gt;Cisco ISE &amp;amp; NAC Resources - Cisco Community&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;HTH!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 14:05:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/network-access-control-inactivity-timer-and-reauthentication/m-p/4277642#M564919</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2021-01-22T14:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: Network Access Control - inactivity timer and reauthentication</title>
      <link>https://community.cisco.com/t5/network-access-control/network-access-control-inactivity-timer-and-reauthentication/m-p/4277657#M564920</link>
      <description>&lt;P&gt;Hi mike,&lt;/P&gt;&lt;P&gt;thanks for the answer and for the deployment guide.&lt;/P&gt;&lt;P&gt;However I still has a specific problem.&lt;/P&gt;&lt;P&gt;If I don't configure the switch interface command "authentication timer reauthenticate server", the authentication are not accepting the reauth timeout value from the server, so the reauth timer set on ISE is not working without the command.&lt;/P&gt;&lt;P&gt;However if I don't set the &lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN&gt;authentication timer inactivity server&lt;/SPAN&gt;&lt;SPAN&gt;", the authentication has the correct inactivitity timeout set.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So my question is, why should I configure that command if it looks like I don't need to.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;It may be a bug.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 14:32:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/network-access-control-inactivity-timer-and-reauthentication/m-p/4277657#M564920</guid>
      <dc:creator>jan.murin</dc:creator>
      <dc:date>2021-01-22T14:32:08Z</dc:date>
    </item>
    <item>
      <title>Re: Network Access Control - inactivity timer and reauthentication</title>
      <link>https://community.cisco.com/t5/network-access-control/network-access-control-inactivity-timer-and-reauthentication/m-p/4277896#M564928</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/316970"&gt;@jan.murin&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;first of all, the &lt;STRONG&gt;authentication timer inactivity&lt;/STRONG&gt; command ends an &lt;U&gt;inactive session&lt;/U&gt; after the specify interval &lt;U&gt;to prevent reauthentication of inactive sessions&lt;/U&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;Second, the &lt;U&gt;default value&lt;/U&gt; of the &lt;STRONG&gt;authentication timer reauthentication&lt;/STRONG&gt; command is &lt;STRONG&gt;3600&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;Third, i&lt;SPAN&gt;f you use the&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;authentication&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class="keyword kwd"&gt;timer&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class="keyword kwd"&gt;inactivity&lt;/SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;command, configure the &lt;STRONG&gt;authentication timer reauthentication&lt;/STRONG&gt; interval to be &lt;U&gt;longer than&lt;/U&gt; the &lt;U&gt;inactivity interval&lt;/U&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;In other words ...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN&gt;(config)# interface GigabitEthernet0/0 &lt;BR /&gt;(config-if)# authentication timer reauthenticate 3600&lt;BR /&gt;(config-if)# authentication timer inactivity 1800&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 21:17:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/network-access-control-inactivity-timer-and-reauthentication/m-p/4277896#M564928</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2021-01-22T21:17:28Z</dc:date>
    </item>
    <item>
      <title>Re: Network Access Control - inactivity timer and reauthentication</title>
      <link>https://community.cisco.com/t5/network-access-control/network-access-control-inactivity-timer-and-reauthentication/m-p/5287942#M596236</link>
      <description>&lt;P&gt;Disregard, wrong page&lt;/P&gt;</description>
      <pubDate>Mon, 05 May 2025 15:48:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/network-access-control-inactivity-timer-and-reauthentication/m-p/5287942#M596236</guid>
      <dc:creator>BlackDiamond71</dc:creator>
      <dc:date>2025-05-05T15:48:25Z</dc:date>
    </item>
  </channel>
</rss>

