6-28
RADIUS Authentication, Authorization, and Accounting
Cached Reauthentication
authentication have been changed from their default values. The period of
time represented by
X
is how long 802.1X or Web MAC authentication will wait
for a RADIUS response.
For example:
1.
A cached-reauth-period is set to 900 seconds (15 minutes) and the reauth
period is 180 seconds.
2.
A client is successfully authenticated or reauthenticated.
3.
The RADIUS server becomes unavailable. In 180 seconds from the authen-
tication in step 1, 802.1X or Web/MAC authentication initiates reauthenti-
cation.
4.
In
X
seconds after the initiation of authentication in step 3 (1 to 30 seconds
if default values for 802.1X or Web/MAC authentication are used), 802.1x
or Web/MAC authentication receives notification that the RADIUS server
is unavailable.
5.
802.1X or Web/MAC authentication allows the first cached reauthentica-
tion and starts the cached reauth period.
6.
A number of cached reauthentications occur within the 900 seconds after
the start of the cached reauth period in step 5. These have a period of 180
+
X
seconds.
7.
The cached reauthentication period (900 seconds) ends.
8.
The next reauthentication begins 180 seconds after the last cached reau-
thentication.
9.
In
X
seconds after the reauthentication in step 8, 802.1X or Web/MAC
authentication receives notification that the RADIUS server is still
unavailable.
10. 802.1X or Web/MAC authentication terminates the client’s session.
Determining the Maximum Amount of Time Before Client Session
Termination.
1.
The maximum amount of time between step 2 and step 3 is 180 seconds.
2.
The amount of time between step 3 and step 5 is
X
seconds.
3.
The reauthentication in step 8 happens less than 180 seconds after step 7,
and step 7 happens in 900 seconds after step 5. The maximum amount of
time between step 5 and step 8 is 900 + 180 seconds.
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......