<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic For #2 - The session should in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/wired-dot1x-session-termination/m-p/2473686#M90624</link>
    <description>&lt;P&gt;For #2 - The session should terminate and restart if the Ehternet adapter on the PC bounces. Are you saying that even though the user disables/enables the adapter, the session remains active in ISE/NAD?&lt;/P&gt;&lt;P&gt;For #1 - I am not really sure as I have never played with this before. My guess would be "No" because once ISE sends the "Access Accept" back to the NAD (your switch in this scenario), the NAD won't know if you are disabling 802.1x. The EAPoL conversation already took place so there is no more 802.1x type traffic coming in and out of the NAD/Client on that port.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I suppose you can set a re-autn and inactivity timer on both the NAD and ISE but keep in mind that it is not recommended for those timers to be set at low values (minimum 1 hour). Otherwise you could overwhelm your ISE servers depending on how large your environment is.&lt;/P&gt;&lt;P&gt;You will need to add the following commands on the switchport:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&lt;STRONG&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;authentication timer inactivity server&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Then in ISE you will need to set the re-auth and the idle timers under the "Authorization Profile"&lt;/P&gt;&lt;P&gt;Another thing to keep in mind is that you should control what your users can and cannot do on their workstations via GPO (Group Policy). In normal circumstances a regular user should not have the privileges to disable 802.1x or their Ethernet adapter &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 30 May 2014 08:31:23 GMT</pubDate>
    <dc:creator>nspasov</dc:creator>
    <dc:date>2014-05-30T08:31:23Z</dc:date>
    <item>
      <title>wired dot1X session termination</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-dot1x-session-termination/m-p/2473685#M90622</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;Question about wired dot1X session termination.&lt;/P&gt;&lt;P&gt;After a client successfully done on the wired dot1x authentication, my authZ rule is follow by the VLAN assignement whereby DHCP server will provision a client IP to the PC.&lt;/P&gt;&lt;P&gt;But when the client doing these 2 action:&lt;BR /&gt;01. after get connected, disable the IEEE 802.1x option on the PC Ethernet port setting&lt;BR /&gt;02. after get connected, disable, then enable the PC Ethernet port setting&amp;nbsp; (bouncing)&lt;/P&gt;&lt;P&gt;I found out these 2 actions will still get the user in authorized state, because it is not link down or port-bounce action. Session still persist at client PC.&lt;/P&gt;&lt;P&gt;My question :&lt;BR /&gt;Anything i can configure either on the switch or ISE will automatic trigger an action like send an EAPOL-Logoff message, causing the switch port to change to the unauthorized state?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Component in use:&lt;/P&gt;&lt;P&gt;&lt;U&gt;client OS: window 7&lt;/U&gt;&lt;BR /&gt;PEAP-MsCHAP V2&lt;BR /&gt;authentication mode : iser or computer authetnication&lt;BR /&gt;no check on single sign on&lt;BR /&gt;no check remember credential for connection each time logged on&lt;BR /&gt;no check fallback to unauthorized network access&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;U&gt;ISE 1.1.3 with patch 4&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;U&gt;Switchport configuration&lt;/U&gt;&lt;BR /&gt;interface G0/1&lt;BR /&gt;switchporGt mode access&lt;BR /&gt;switchport access vlan 61&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;authentication host-mode multi-auth&lt;BR /&gt;authentication order dot1x&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;no shutdown&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:42:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-dot1x-session-termination/m-p/2473685#M90622</guid>
      <dc:creator>yong khang NG</dc:creator>
      <dc:date>2019-03-11T04:42:37Z</dc:date>
    </item>
    <item>
      <title>For #2 - The session should</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-dot1x-session-termination/m-p/2473686#M90624</link>
      <description>&lt;P&gt;For #2 - The session should terminate and restart if the Ehternet adapter on the PC bounces. Are you saying that even though the user disables/enables the adapter, the session remains active in ISE/NAD?&lt;/P&gt;&lt;P&gt;For #1 - I am not really sure as I have never played with this before. My guess would be "No" because once ISE sends the "Access Accept" back to the NAD (your switch in this scenario), the NAD won't know if you are disabling 802.1x. The EAPoL conversation already took place so there is no more 802.1x type traffic coming in and out of the NAD/Client on that port.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I suppose you can set a re-autn and inactivity timer on both the NAD and ISE but keep in mind that it is not recommended for those timers to be set at low values (minimum 1 hour). Otherwise you could overwhelm your ISE servers depending on how large your environment is.&lt;/P&gt;&lt;P&gt;You will need to add the following commands on the switchport:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&lt;STRONG&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;authentication timer inactivity server&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Then in ISE you will need to set the re-auth and the idle timers under the "Authorization Profile"&lt;/P&gt;&lt;P&gt;Another thing to keep in mind is that you should control what your users can and cannot do on their workstations via GPO (Group Policy). In normal circumstances a regular user should not have the privileges to disable 802.1x or their Ethernet adapter &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 May 2014 08:31:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-dot1x-session-termination/m-p/2473686#M90624</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-05-30T08:31:23Z</dc:date>
    </item>
    <item>
      <title>HiThanks for the</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-dot1x-session-termination/m-p/2473687#M90625</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Thanks for the suggestion&lt;/P&gt;&lt;P&gt;All suggestion i will give a try.&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 May 2014 08:47:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-dot1x-session-termination/m-p/2473687#M90625</guid>
      <dc:creator>yong khang NG</dc:creator>
      <dc:date>2014-05-30T08:47:10Z</dc:date>
    </item>
    <item>
      <title>No problem. Give it a try and</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-dot1x-session-termination/m-p/2473688#M90626</link>
      <description>&lt;P&gt;No problem. Give it a try and let us know.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 May 2014 20:09:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-dot1x-session-termination/m-p/2473688#M90626</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-05-30T20:09:37Z</dc:date>
    </item>
  </channel>
</rss>

