<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 802.1x Authentication fails after Session Timer Expires in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication-fails-after-session-timer-expires/m-p/5204865#M592274</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/997623"&gt;@EricLu&lt;/a&gt;&amp;nbsp;your configs look alright at first glance.&lt;/P&gt;
&lt;P&gt;Since you're dealing with a Catalyst switch, I would recommend taking a capture of the Ethernet interface to see what happens when the session timeout expires.&amp;nbsp; I would have expected that the&lt;STRONG&gt; switch&lt;/STRONG&gt; would send an &lt;STRONG&gt;EAPOL Identity Request&lt;/STRONG&gt; frame to the supplicant - if you see that, and the supplicant does not respond, then this is not an ISE or switch issue.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, check whether there is a MAC address on that interface at the time of re-auth - if there is none, then there cannot be any re-auth. Some devices go to sleep and then the MAC address times out. You can keep the MAC address "alive" with the device-tracking feature, and the Inactivity Timer value in your IBNS 2.0 config - when that inactivity timer counts down to 0, the device tracking should fire and send off an ARP and get a response - that keeps the CAM table valid.&lt;/P&gt;
&lt;P&gt;Not sure if you have done such a capture before, but here is my cheat sheet - I am using interface twe1/0/25 in this example, and the output file is called TEST.pcap:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;conf t
ip scp server enable
end
monitor capture TEST interface twe1/0/25 both match any
monitor capture TEST file location bootflash:TEST.pcap
monitor capture TEST start
monitor capture TEST stop

&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you're using Windows and putty as your terminal app, then you can SCP the file from the switch - username 'admin' - it will prompt for the password:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;pscp -scp admin@10.2.13.103:TEST.pcap c:/users/abier/TEST.pcap&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 08 Oct 2024 00:01:36 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2024-10-08T00:01:36Z</dc:date>
    <item>
      <title>802.1x Authentication fails after Session Timer Expires</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication-fails-after-session-timer-expires/m-p/5204608#M592263</link>
      <description>&lt;P&gt;Hi folks,&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;TECH USED:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Cisco ISE 3.2 Patch 6&lt;/P&gt;&lt;P&gt;Cisco Switch with aaa capabilities&lt;/P&gt;&lt;P&gt;3rd party Endpoint&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;SCENARIO:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; We are trying to get a 3rd-party-endpoint to authenticate successfully 802.1x. The endpoint is given an individual certificate that is signed on an Internal CA (EAP-TLS Auth.). The endpoint successfully authenticates on initial "connection up" into the switchport (&lt;STRONG&gt;See Image 1&lt;/STRONG&gt;). After the 180 seconds Authentication/Session timer hits 0, the device fails to reinitiate 802.1x Authentication (&lt;STRONG&gt;See Image 2&lt;/STRONG&gt;). Shortly afterwards, the switch falls back to MAC Address Bypass (MAB) instead (&lt;STRONG&gt;See Image 3&lt;/STRONG&gt;).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; Looking at the error logs generated on the switch, we see that the device is not responding to the switch's authentication "keep-alive" and causes the session to timeout (&lt;STRONG&gt;see Image 4&lt;/STRONG&gt;). The team ran a test and increased the session timer to 1800 seconds or 30 minutes. The devices stayed authenticated on 802.1x for 30 minutes before falling back to MAB (&lt;STRONG&gt;See Image 5&lt;/STRONG&gt;).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;I've included the ISE Live Logs for both the successful 802.1x authentication and also one for MAB authentication. (&lt;STRONG&gt;See Document 1 and Document 2&lt;/STRONG&gt;)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;QUESTION:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Any ideas of what we can do to keep the 802.1x session alive after the initial successful connection?&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2024 15:18:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication-fails-after-session-timer-expires/m-p/5204608#M592263</guid>
      <dc:creator>EricLu</dc:creator>
      <dc:date>2024-10-07T15:18:49Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Authentication fails after Session Timer Expires</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication-fails-after-session-timer-expires/m-p/5204619#M592264</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;authentication timer reauthenticate server&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;lt;&amp;lt;- use this make ISE push timer not make SW use it timer&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2024 15:27:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication-fails-after-session-timer-expires/m-p/5204619#M592264</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-10-07T15:27:01Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Authentication fails after Session Timer Expires</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication-fails-after-session-timer-expires/m-p/5204631#M592266</link>
      <description>&lt;P&gt;Hi MHM,&lt;/P&gt;&lt;P&gt;Thanks for your response. I checked and we already have that command configured on the 802.1x switch interface. (See attached for the interface configuration).&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2024 15:46:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication-fails-after-session-timer-expires/m-p/5204631#M592266</guid>
      <dc:creator>EricLu</dc:creator>
      <dc:date>2024-10-07T15:46:19Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Authentication fails after Session Timer Expires</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication-fails-after-session-timer-expires/m-p/5204661#M592268</link>
      <description>&lt;P&gt;In ISE authz policy&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Only make double check&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Session timeout&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="images (2).png" style="width: 764px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230783i9F6428AD94A73153/image-size/medium?v=v2&amp;amp;px=400" role="button" title="images (2).png" alt="images (2).png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; the log detail dont show if ISE send back session timeout to SW&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2024 16:16:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication-fails-after-session-timer-expires/m-p/5204661#M592268</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-10-07T16:16:37Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Authentication fails after Session Timer Expires</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication-fails-after-session-timer-expires/m-p/5204865#M592274</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/997623"&gt;@EricLu&lt;/a&gt;&amp;nbsp;your configs look alright at first glance.&lt;/P&gt;
&lt;P&gt;Since you're dealing with a Catalyst switch, I would recommend taking a capture of the Ethernet interface to see what happens when the session timeout expires.&amp;nbsp; I would have expected that the&lt;STRONG&gt; switch&lt;/STRONG&gt; would send an &lt;STRONG&gt;EAPOL Identity Request&lt;/STRONG&gt; frame to the supplicant - if you see that, and the supplicant does not respond, then this is not an ISE or switch issue.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, check whether there is a MAC address on that interface at the time of re-auth - if there is none, then there cannot be any re-auth. Some devices go to sleep and then the MAC address times out. You can keep the MAC address "alive" with the device-tracking feature, and the Inactivity Timer value in your IBNS 2.0 config - when that inactivity timer counts down to 0, the device tracking should fire and send off an ARP and get a response - that keeps the CAM table valid.&lt;/P&gt;
&lt;P&gt;Not sure if you have done such a capture before, but here is my cheat sheet - I am using interface twe1/0/25 in this example, and the output file is called TEST.pcap:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;conf t
ip scp server enable
end
monitor capture TEST interface twe1/0/25 both match any
monitor capture TEST file location bootflash:TEST.pcap
monitor capture TEST start
monitor capture TEST stop

&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you're using Windows and putty as your terminal app, then you can SCP the file from the switch - username 'admin' - it will prompt for the password:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;pscp -scp admin@10.2.13.103:TEST.pcap c:/users/abier/TEST.pcap&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Oct 2024 00:01:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication-fails-after-session-timer-expires/m-p/5204865#M592274</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-10-08T00:01:36Z</dc:date>
    </item>
  </channel>
</rss>

