<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: I ended up answering my own in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/3229652#M75103</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you explain a bit more about the resolution:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"Once I removed the session timeout value from the WLC and used the re-auth value in the ISE policy"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks in advance,&lt;BR /&gt;Bob&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 09 Dec 2017 22:19:28 GMT</pubDate>
    <dc:creator>Bob Bagheri</dc:creator>
    <dc:date>2017-12-09T22:19:28Z</dc:date>
    <item>
      <title>Cisco ISE and WLC Timeout Best Practices</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/2588220#M75088</link>
      <description>&lt;P&gt;I am fairly new to ISE. Our Cisco WLC is using 802.1x and ISE is configured for PEAP with all inner methods enabled.&lt;/P&gt;&lt;P&gt;I am looking for some guidance around where I should be configuring timeouts. There is a PEAP Session timeout in ISE, a session timeout on the WLC and a RADIUS reauthentication timeout that can be set in the Authorization profile results object in ISE.&lt;/P&gt;&lt;P&gt;Currently I have the WLC configured for its default 1800 second timeout and ISE PEAP timeout at the default 7,200 value.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:20:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/2588220#M75088</guid>
      <dc:creator>nrunge1</dc:creator>
      <dc:date>2019-03-11T05:20:59Z</dc:date>
    </item>
    <item>
      <title>https://supportforums.cisco</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/2588221#M75091</link>
      <description>&lt;P&gt;https://supportforums.cisco.com/discussion/11216441/wlc-webauth-devices-timeout-and-have-reauth&lt;/P&gt;&lt;P&gt;https://supportforums.cisco.com/discussion/11974106/ise-reauthentication-timer&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jan 2015 12:29:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/2588221#M75091</guid>
      <dc:creator>Venkatesh Attuluri</dc:creator>
      <dc:date>2015-01-16T12:29:56Z</dc:date>
    </item>
    <item>
      <title>Refer the link for the</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/2588222#M75093</link>
      <description>&lt;P&gt;Refer the link for the configuration : &lt;A href="http://www.cisco.com/c/en/us/support/docs/wireless/5700-series-wireless-lan-controllers/117717-config-wlc-00.html"&gt;http://www.cisco.com/c/en/us/support/docs/wireless/5700-series-wireless-lan-controllers/117717-config-wlc-00.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jan 2015 13:26:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/2588222#M75093</guid>
      <dc:creator>mohanak</dc:creator>
      <dc:date>2015-01-16T13:26:14Z</dc:date>
    </item>
    <item>
      <title>I probably should have been</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/2588223#M75095</link>
      <description>&lt;P&gt;I probably should have been more specific. We aren't using CWA. It is 802.1X with PEAP as the outer method. AD is the identity source.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think that I get the ISE side stuff (thanks for the links). The session timeout on the WLC is what I am most confused about.&lt;/P&gt;&lt;P&gt;What is the negative impact of turning off the session timeout on the WLC?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 17 Jan 2015 15:16:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/2588223#M75095</guid>
      <dc:creator>nrunge1</dc:creator>
      <dc:date>2015-01-17T15:16:18Z</dc:date>
    </item>
    <item>
      <title>I ended up answering my own</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/2588224#M75096</link>
      <description>&lt;P&gt;I ended up answering my own question. The authorization session timeouts should be set in ISE if at all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once I removed the session timeout value from the WLC and used the re-auth value in the ISE policy I had less complaints about disconnects.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The session timeout on the PEAP settings has not caused any ill affects at it's default. The session resume has taken a huge load off of AAA though. Its worth turning on.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jan 2015 21:25:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/2588224#M75096</guid>
      <dc:creator>nrunge1</dc:creator>
      <dc:date>2015-01-19T21:25:17Z</dc:date>
    </item>
    <item>
      <title>Hi Runge,</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/2588225#M75097</link>
      <description>&lt;P&gt;Hi Runge,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What kind of devices are you connecting to the PEAP SSID?. Do you use&amp;nbsp;Chromebooks?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2017 19:55:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/2588225#M75097</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2017-03-23T19:55:19Z</dc:date>
    </item>
    <item>
      <title>I work at a college so we see</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/2588226#M75098</link>
      <description>&lt;P&gt;I work at a college so we see pretty much everything. To the best of my knowledge not a lot of chromebooks though. We don't deploy and manage any as assets of the college.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Mar 2017 18:26:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/2588226#M75098</guid>
      <dc:creator>nrunge1</dc:creator>
      <dc:date>2017-03-25T18:26:10Z</dc:date>
    </item>
    <item>
      <title>Let me share something else</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/2588227#M75099</link>
      <description>&lt;P&gt;Let me share something else that I found after significant investigation.&lt;/P&gt;
&lt;P&gt;When the enduser device gets a much better signal from an AP different to the one it was originally&amp;nbsp;connected that device roams. You do not necessarily need to move so that happens. Because of that and based on how PEAP works, there is a reauthentication process that is not solved by fast reconnect/session resume which causes disconnections and it is clearly noticed when you are using sensitive applications like video or audio on the wifi. The only way to overcome this is using 802.11r/k BUT not all the manufacturers are supporting properly this standard.&lt;/P&gt;
&lt;P&gt;I am still analyzing fast transition in the WLC and something new is coming from Cisco that helps Apple devices running OS 10+ without causing identified connectivity issues on the rest (android, win, etc) when you configure 802.11r/k in the WLC.&lt;/P&gt;
&lt;P&gt;I will post later the links related to this.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2017 14:51:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/2588227#M75099</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2017-03-27T14:51:45Z</dc:date>
    </item>
    <item>
      <title>You can also use CCKM for</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/2588228#M75100</link>
      <description>&lt;P&gt;For fast roaming you can also use CCKM for Cisco's proprietary "fast transition". Just like 802.1r not all devices support CCKM or 802.1r.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: line-through;"&gt;The Apple FastLane thru Cisco allowing the "adaptive" fast transitions is only applicable on the brand new 1800, 2800, and 3800 APs and the newest WLC 8.3 code. That's a big Cisco gotcha.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Edit: Despite what my TAC engineer said, this is not true. BU says Adaptive FT is supported on any AP that can run the 8.3 code.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2017 22:30:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/2588228#M75100</guid>
      <dc:creator>Mitch D</dc:creator>
      <dc:date>2017-03-28T22:30:25Z</dc:date>
    </item>
    <item>
      <title>Thanks Mitch. In fact, I know</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/2588229#M75101</link>
      <description>&lt;P&gt;Thanks Mitch. In fact, I&amp;nbsp;know about that after talking to Cisco BU but I have not tested it but looks like is a good option because it allows Apple devices to FT without affecting or causing connectivity issues to the rest (android, win, etc).&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2017 22:30:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/2588229#M75101</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2017-03-28T22:30:26Z</dc:date>
    </item>
    <item>
      <title>Re: I ended up answering my own</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/3229652#M75103</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you explain a bit more about the resolution:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"Once I removed the session timeout value from the WLC and used the re-auth value in the ISE policy"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks in advance,&lt;BR /&gt;Bob&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 09 Dec 2017 22:19:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/3229652#M75103</guid>
      <dc:creator>Bob Bagheri</dc:creator>
      <dc:date>2017-12-09T22:19:28Z</dc:date>
    </item>
    <item>
      <title>Re: I ended up answering my own</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/4769376#M579670</link>
      <description>&lt;P&gt;Hi everyone,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyone able to share where in ISE&amp;nbsp;&lt;SPAN&gt;re-auth value can be set as per below user's feedback?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"Once I removed the session timeout value from the WLC and used the re-auth value in the ISE policy"&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 08:42:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/4769376#M579670</guid>
      <dc:creator>ziqex</dc:creator>
      <dc:date>2023-02-06T08:42:32Z</dc:date>
    </item>
    <item>
      <title>Re: I ended up answering my own</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/5071690#M588804</link>
      <description>&lt;P&gt;I'm also confused by what/how to set the AAA timers relevant to the WLC in ISE, but my educated guess is this:&lt;/P&gt;&lt;P&gt;1. Policy Elements -&amp;gt; Results -&amp;gt; &amp;lt;YourAuthorizationProfile&amp;gt; -&amp;gt; Common Tasks -&amp;gt; Reauthentication&lt;/P&gt;&lt;P&gt;2. Policy Elements -&amp;gt; Results -&amp;gt; &amp;lt;YourAuthorizationProfile&amp;gt; -&amp;gt; Advanced Attributes Settings -&amp;gt; Radius: Idle-Timeout&lt;/P&gt;&lt;P&gt;I think the &lt;STRONG&gt;Re-authentication&lt;/STRONG&gt; timer should be 12hrs (43200) but I have also seen recommendations of 24hrs and I understand that's now the Cisco default in the latest 9800 WLCs. I think this timer was disrupting my wifi users because it was originally 3600s and the client had to re-send it's certificate which disrupts the WLAN operation.&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;Idle-Timeout&lt;/STRONG&gt; should be 3600 and refers to the client not sending any data or dropping from the AP.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2024 11:25:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-wlc-timeout-best-practices/m-p/5071690#M588804</guid>
      <dc:creator>j.a.m.e.s</dc:creator>
      <dc:date>2024-04-17T11:25:15Z</dc:date>
    </item>
  </channel>
</rss>

