07-09-2013 03:03 AM - edited 07-04-2021 12:22 AM
Hi, we'r working on a scenario like this;
Client logs in to an WLAN via dot1x authentication, though we want to be able to disable re-authentication of the client on the radius when the session-timeout is reached. We also need the accounting logs to make sure that we can also kill the session if a certain traffic limit is reached. (WiSM-1 , 7.0.116 code)
The thing is that, whenever the session timeout occurs(that we set manually on the wlan), the client re-authanticates automatically and we can see access-requests and stuff though in terms of status we only see an "interim-update" accounting package in the radius thus unable to take action. The controller also uses PMK lifetime instead of the session-timeout we set which, I suppose, is derived fromt he session-timeout and some other timers as well. How do we get an accouting log when the session-timeout is reached thus the client needs to reauthenticate? (or how do we differentiate it actually, since we already see a log but its just an interim-update log)
WLC fires this when the PMK timeout is triggered.
15:23:35.224: ec:35:86:95:14:5e Initiating 802.1x due to PMK Timeout Event for STA
.....
15:23:35.562: ec:35:86:95:14:5e Setting re-auth timeout to 300 seconds, got from WLAN config.
15:23:35.562: ec:35:86:95:14:5e Station ec:35:86:95:71:5e setting dot1x reauth timeout = 300
...
15:23:35.563: ec:35:86:95:14:5e Disabling re-auth since PMK lifetime can take care of same.
after the negotiation part(which is also not enough to make differentiation); radius gets this.
15:23:35.588: P6231982: Trace of Accounting-Request packet
...
15:23:35.592: P6231982: Acct-Status-Type = Interim-Update
Is there a way to enforce a session-timeout and make sure that the client will not re-auth automatically after this timeout and get and appropriate radius log?. PS: PMK cannot be disabled before 7.2 and WiSM-1 doesn't support that.
Thanks a lot for your responses in advance
Regards,
A.
07-09-2013 04:30 AM
You have a session timeout and an idle timeout. The session timeout forces a deauth in which the client will be forced to reauth again. There is nothing on the WLC you can do no not have a client reauth again as its the client that will initiate the authentication again.
Sent from Cisco Technical Support iPhone App
07-09-2013 04:48 AM
Hey Scott, thanks for the tip.
The thing is, after an idle-timeout expires, I can see a stop accouting log at the radius side.
But after a session-timeout expires, I can only see an (re)authentication (without any start of course) and an interim-update log which gives no clue if this is a normal interim update or its sent because of the session-timeout. How am I to find which interim-update means a re-auth because of a session-timeout? or is it possible to make it send another accounting log to help me mark the session end?
Regards,
A.
07-09-2013 04:57 AM
You will not be able to change this, but what you can Sonia look at the client in the GUI monitor tab and that will show you how long or the value of the session timer and the idle timer. When the session timer hits zero, then look at the client debug
Sent from Cisco Technical Support iPhone App
07-09-2013 07:23 AM
Hey Scott, I've already got the debugs from both ends (radius and wlc) which are already mentioned above. thanks anyway.
Regards,
A.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide