cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
869
Views
2
Helpful
0
Comments

You can enable periodic endpoint reauthentication and specify how often it occurs. If you do not set a specific time interval before enabling reauthentication (by executing the “authentication periodic” command), the default interval between reauthentication attempts is 3600 seconds. Reducing this interval will cause your user ports to be reauthenticated more frequently. Use reauthenticatin functionality for two main purposes:

  • From security point of view an attacker could use a hub or another device that maintains the port's link state, allowing a rogue device to be connected after the legitimate device has authenticated. Consequently, the rogue device could gain prolonged access without needing to reauthenticate. The recommended interval is based on your organization's security policies; however, some Cisco documents recommend setting this timer to at least 7200 seconds (2 hours). While reauthenticating at least every 2 hours may not completely prevent this type of attack, it would certainly make it more difficult for the attacker.
  • From network efficiency perspective, there is usually no need to reauthenticate a previously authenticated endpoint that remains connected to the network. After a successful 802.1X authentication, the port remains open until the session is terminated, most typically by a physical link-down event. Because physical connectivity is continuously maintained, the authenticated endpoint remains connected to the port. In some situations, however, reauthentication can be used as de-facto 802.1X keepalive mechanism. For example, if an endpoint is connected to the port via an IP phone that is not capable of proxy EAPoL-Logoff or CDP Enhanced for Second Port Disconnect, the switch does not know when to terminate the session. By reauthenticating the session, the switch can confirm that the authenticated endpoint is still connected.

1000.png

You can also force this timer from ISE, after successful 802.1X authentication takes place. To enable this functionality, instead of specifying the time, use the “server” keyword—in this case, reauthentication timer interval (session timer) is downloaded to the switch from the ISE:

1000.png

Reauthentication timer setting in ISE is configured in seconds and the default value, as you can see above is 1800. If you select any number beyond 65535, the following warning message appears:

1000.png

As you can see below, one of the enhancements in IOS XE 17.5.1 is the increased reauthentication timer support:

1001.png

The reauthentication timer displayed is not a standard recommendation and consider reauthentication timers per deployment based on connection type (wireless/wired), design (what are the persistence rules on the load-balancer), and so on. If there is a load balancer, you need to make sure that persistence is configured in a way that reauthentication can be returned to the original PSN.

As you can see above, when enabling Reauthentication option in ISE Authorization Profile, you have two options to select:

  • If you wish to allow the device to remain connected during the reauthentication (without interrupting user's traffic), select 'RADIUS-Request'. Using this option maintains the current Session ID for the user or device.
  • If you prefer that the device disconnects during reauthentication, select 'Default'—this will interrupt the user's traffic while the reauthentication process is in progress. Using this option regenerates the Session ID.

According to RFC, the two “Termination-Actions” are defined as following:

1000.png

Consider you have configured the Reauthentication timer to 10 seconds. From traffic capturing point of view, the following event occurs after successful authentication:

1001.png

1000.png

As the reauthentication method is configured as 'RADIUS-Request', as you can see below, after successful reauthentication operation, the NAD maintains its assigned Session ID:

1002.png

If you select the 'Default' option, as you see below, the NAD does not maintain its Session ID after the Reauthentication process:

1002.png

20000.png

20001.png

Some important considerations and best practices:

  • Do not assign reauthentication timers to MAB endpoints. On MAB reauthentication, the switch does not re-learn the MAC address of the connected endpoint. It simply sends the previously learned MAC address to ISE.
  • As a best practice, use server-based reauthentication timeouts, if using timeouts at all.
  • Although using the reauthentication feature is beneficial from a security standpoint, it will add extra load on your ISE PSNs.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: