Wireless Access

last person joined: yesterday 

Access network design for branch, remote, outdoor, and campus locations with HPE Aruba Networking access points and mobility controllers.
Expand all | Collapse all

Max authentication failures

This thread has been viewed 6 times
  • 1.  Max authentication failures

    Posted Jun 11, 2012 02:09 PM

    We are running two Aruba 6000 M3 controllers running AOS 6.1.2.7.  We have a third Aruba 6000 M3 acting as a master and a backup LMS to the other two.

     

    We use 802.1x authentication on our wireless.  We use our AD accounts to logon to the wireless.  We have a pretty aggressive password change policy - every 35 days.  Because of this and because of the one to many relationship that many people now have with their mobile devices (wireless devices), account lockouts happen frequently.  An account is locked out after 5 failed attempts.  Because a lockout could impact not only the wireless network access, but access to email and clinical systems (we are a hospital), we are looking at moving email and wireless authentications to a certificate based model using a MDM.  However, until that is deployed, I was looking at the max authenticatioin failures as a stop-gap mechanism.

     

    So, our current lockout counter is set to a max of 5 before the account is locked out.  The counter is reset automatically after 35 minutes.  The account, once locked out, is automatically unlocked after 48 hours.  I was thinking of setting the max authentication failures on the dot1x aaa profile to 2 or 3 with an authentication blacklist timer set to 40 minutes (to get past the lockout counter reset time).  This means that after 2 or 3 failures on the wireless network, the device is blacklisted for 40 minutes.  After 40 minutes, the user is automatically un-blacklisted.  Or, they could be manually un-blacklisted.  The thought process is that anyone who happens to just be mistyping a password would hopefully not be impacted too much by this.  But, in the event of a device continuously trying to get on the wireless network unbeknownst to a user, it wouldn't lockout the account.

     

    I was wondering if there are any caveats to this?  I can think of one which is the blacklist is by controller only.  We have two controllers.  So, that is why I would consider setting the max auth failure threshold to 2. This is a bit aggressive, but that way, even if they roam to another AP that is on a different controller and get blacklisted there, that is only 4 failed attempts and they haven't yet hit the 5 for a lockout event.  Are there any other caveats or things to consider?

     

    Thanks!

    Jodie



  • 2.  RE: Max authentication failures

    EMPLOYEE
    Posted Jun 11, 2012 08:13 PM

    I think that is the best that you can do.

     

    You are right... if you used clearpass Onboard, it would give each device a unique credential and that would keep you away from your current issue.



  • 3.  RE: Max authentication failures

    Posted Jun 12, 2012 09:47 AM

    Thanks for the sanity check.