Wired Intelligent Edge

 View Only
  • 1.  Wired 802.1X Timer

    Posted Jan 02, 2025 02:58 AM

    Hello everyone,

    I'm trying to match my Aruba 802.1X configuration as closely as possible to an existing Cisco setup.
    On the Cisco side, I have configured the following timers:

    dot1x timeout tx-period 5
    dot1x max-reauth-req 1

    From what I've read in the Aruba documentation, tx-period seems to correspond to the discovery-period.
    However, I'm unsure how the command max-reauth-req translates to the Aruba parameters 
    max-eapol-requests or max-retries

    • max-eapol-requests: As far as I understand, this determines how many times an EAPOL
      request(-identity?) is resent if there is no response from the supplicant.
    • max-retries: I'm not entirely sure if this refers to how many times a single authentication exchange is retried.

    Could someone clarify the exact difference and how to configure them so that they mirror the Cisco settings as closely
    as possible? I've already tested various combinations of these parameters, but so far, I haven't arrived at a definitive result.

    Thanks in advance for your help!



  • 2.  RE: Wired 802.1X Timer

    Posted Jan 02, 2025 03:04 AM

    Is that for ArubaOS or AOS-CX switches?

    I would recommend the default settings as described in the Wired Policy Enforcement guide. Both Aruba switches support something called concurrent onboarding, where 802.1X is constantly available and doesn't need to timeout. Useful for devices that are slow booting.



    ------------------------------
    Herman Robers
    ------------------------
    If you have urgent issues, always contact your HPE Aruba Networking partner, distributor, or Aruba TAC Support. Check https://www.arubanetworks.com/support-services/contact-support/ for how to contact HPE Aruba Networking TAC. Any opinions expressed here are solely my own and not necessarily that of Hewlett Packard Enterprise or HPE Aruba Networking.

    In case your problem is solved, please invest the time to post a follow-up with the information on how you solved it. Others can benefit from that.
    ------------------------------



  • 3.  RE: Wired 802.1X Timer

    Posted Jan 02, 2025 06:11 AM

    Hello Herman,

    This is for AOS-CX. At the moment I am trying to avoid concurrent onboarding.

    In the solutions guide you shared, the following configuration is suggested:

    aaa authentication port-access dot1x authenticator
       eapol-timeout 10
       max-eapol-requests 1
       max-retries 1
       enable

    Efforts are being made to minimize failover from 802.1X to MAB by reducing both the number and interval between EAP-Request, Identity messages.

    The discovery-period successfully configures the time between the EAP-Request, Identity messages. Therefore the eapol-timeout does not need to be set in my opinion.
    However neither max-eapol-requests nor max-retries (as suggested above) appear to configure the number of these messages.
    I hope you might be able to assist me with this.

    Thank you!




  • 4.  RE: Wired 802.1X Timer

    Posted Jan 02, 2025 08:33 AM

    It looks like "dot1x max-reauth-req" translates into CX "aaa authentication port-access dot1x authenticator max-eapol-requests". And "dot1x timeout tx-period" is the same as "aaa authentication port-access dot1x authenticator eapol-timeout".

    In the CLI guide for AOS-CX, there is a pretty good description of what each of the settings do. From there it may be possible to get a close enough match, or better implementation as non-concurrent authentication has some timeout challenges and I have not found a universal working setting that works under all circumstances.

    From reading the documentation (have not tested/validated), the max-eapol-requests refers to the eapol requests, the max-retries to the complete authentication process which can have multiple eapol requests each.



    ------------------------------
    Herman Robers
    ------------------------
    If you have urgent issues, always contact your HPE Aruba Networking partner, distributor, or Aruba TAC Support. Check https://www.arubanetworks.com/support-services/contact-support/ for how to contact HPE Aruba Networking TAC. Any opinions expressed here are solely my own and not necessarily that of Hewlett Packard Enterprise or HPE Aruba Networking.

    In case your problem is solved, please invest the time to post a follow-up with the information on how you solved it. Others can benefit from that.
    ------------------------------



  • 5.  RE: Wired 802.1X Timer

    Posted Jan 02, 2025 11:07 AM

    Hello Herman,

    Thank you for your response.

    The dot1x timeout tx-period command on IOS-XE 17.12, which is describe here:

    Configures the number of seconds between retransmission of EAP request ID packets (assuming that no response is received) to the client.

     

    matches the discovery-period, which is described as follows:

     Configures the period the port waits to retransmit the next EAPOL request identity frame on an 802.1X enabled port that has no authenticated clients. 


    This could also be verified on a 6300 running AOS-CX 10.13.

    Regarding the max-eapol-requests command, I would agree with you; however, I was unable to verify this.
    The failover time was approximately 20 seconds when using a value of 1. However, depending on whether it pertains to the total number of
    EAP Request,Identity messages or the retransmissions, it should be around 5 to 10 seconds when configured with
    max-eapol-requests 1

    Unfortunately, the command reference guide does not provide any further information on this.

    Best regards,

    Matthias




  • 6.  RE: Wired 802.1X Timer

    Posted Jan 02, 2025 05:21 PM
    Edited by Yash Jan 02, 2025 05:23 PM

    AOS-CX IDF Port-Access Configuration

    Without concurrent authentication.

    Interface 1/1/1
    description Port-Access-Yash-Recommendation
        no shutdown
        no routing
        vlan access 2
        spanning-tree bpdu-guard
        spanning-tree port-type admin-edge
        loop-protect
        aaa authentication port-access allow-cdp-bpdu
        aaa authentication port-access allow-lldp-bpdu
        aaa authentication port-access client-limit 2
        aaa authentication port-access reject-role Reject_Role
        aaa authentication port-access critical-role RADIUS_DOWN
        port-access allow-flood-traffic enable
        aaa authentication port-access dot1x authenticator
            cached-reauth
            cached-reauth-period 259200
            eapol-timeout 1
            enable
        aaa authentication port-access mac-auth
            cached-reauth
            cached-reauth-period 259200
            enable
        power-over-ethernet pre-std-detect
       client track ip enable
        client track ip update-interval 60
        client device-fingerprint apply-profile Yash
        apply fault-monitor profile Yash-CLIENT_PORT


    With concurrent authentication.

    interface 2/1/1
    description Port-Access-Yash-Recommendation
        no shutdown
        no routing
        vlan access 2
        spanning-tree bpdu-guard
        spanning-tree port-type admin-edge
        loop-protect
        aaa authentication port-access allow-cdp-bpdu
        aaa authentication port-access allow-lldp-bpdu
        aaa authentication port-access client-limit 2
        aaa authentication port-access reject-role Yash-Reject_Role
        aaa authentication port-access critical-role Yash-RADIUS_DOWN
        port-access onboarding-method concurrent enable
        aaa authentication port-access dot1x authenticator
            enable
        aaa authentication port-access mac-auth
            enable
        power-over-ethernet pre-std-detect
        client track ip enable
        client track ip update-interval 60
        client device-fingerprint apply-profile Yash
        apply fault-monitor profile Yash-CLIENT_PORT


    Thank you and regards,

    Yash Nagaraju




  • 7.  RE: Wired 802.1X Timer

    Posted Jan 03, 2025 07:35 AM

    Hello Yash,

    What's the reason for setting the eapol-timeout to a value of 1? The VSG recommends a value of 30.

    Also the Security Guide for AOS CX 10.13. says the following (for a recommended value of 30): 

    Note that reducing the eapol-timeout any further could cause 802.1X to fail in some cases.

    Why might 802.1X auth fail in some cases?

    Also is there any Best Practice Guide where each of these values is explained (and visualized) further?

    Thanks!




  • 8.  RE: Wired 802.1X Timer

    Posted Jan 07, 2025 04:55 PM

    Hello Matthias,

    Let's proceed with the default value 30, as suggested in the Security Guide and VSG.

    A shorter eapol-timeout allows for faster requests to the supplicant. Occasionally, some supplicants may not send or respond to eap request, leading to the authenticator not receiving eap requests. Hence, I recommend a lesser EAPOL timeout.

    Thank you,

    Yash

    AOS-CX IDF Port-Access Configuration

    Without concurrent authentication.

    Interface 1/1/1
    description Port-Access-Yash-Recommendation
        no shutdown
        no routing
        vlan access 2
        spanning-tree bpdu-guard
        spanning-tree port-type admin-edge
        loop-protect
        aaa authentication port-access allow-cdp-bpdu
        aaa authentication port-access allow-lldp-bpdu
        aaa authentication port-access client-limit 2
        aaa authentication port-access reject-role Reject_Role
        aaa authentication port-access critical-role RADIUS_DOWN
        port-access allow-flood-traffic enable
        aaa authentication port-access dot1x authenticator
            cached-reauth
            cached-reauth-period 259200
            eapol-timeout 1
            enable
        aaa authentication port-access mac-auth
            cached-reauth
            cached-reauth-period 259200
            enable
        power-over-ethernet pre-std-detect
       client track ip enable
        client track ip update-interval 60
        client device-fingerprint apply-profile Yash
        apply fault-monitor profile Yash-CLIENT_PORT


    With concurrent authentication.

    interface 2/1/1
    description Port-Access-Yash-Recommendation
        no shutdown
        no routing
        vlan access 2
        spanning-tree bpdu-guard
        spanning-tree port-type admin-edge
        loop-protect
        aaa authentication port-access allow-cdp-bpdu
        aaa authentication port-access allow-lldp-bpdu
        aaa authentication port-access client-limit 2
        aaa authentication port-access reject-role Yash-Reject_Role
        aaa authentication port-access critical-role Yash-RADIUS_DOWN
        port-access onboarding-method concurrent enable
        aaa authentication port-access dot1x authenticator
            enable
        aaa authentication port-access mac-auth
            enable
        power-over-ethernet pre-std-detect
        client track ip enable
        client track ip update-interval 60
        client device-fingerprint apply-profile Yash
        apply fault-monitor profile Yash-CLIENT_PORT


    Thank you and regards,

    Yash Nagaraju




  • 9.  RE: Wired 802.1X Timer

    Posted Jan 03, 2025 03:11 AM

    Note that the Cisco switch is not an Aruba switch and vice versa. If you really want to have an exact match, that may not be possible, and I would take best practices for the specific switch/vendor as those are expected to have the best results in most cases. And I would test with your actual clients and see if the problems you may have had in the past when you came up with those parameters, don't happen on the new switch configuration. I've seen in the past that issues that I had seen with other brand switches, just didn't happen on the Aruba switch because the implementation is different. Testing and optimizing is normally something the Aruba partners that are involved in an implementation take care of.

    If the documentation is not fully clear, you probably need to test it, or ask TAC for a further clarification if you can't test it.

    If the actual behavior does not match the documentation, open a TAC case to get it investigated.



    ------------------------------
    Herman Robers
    ------------------------
    If you have urgent issues, always contact your HPE Aruba Networking partner, distributor, or Aruba TAC Support. Check https://www.arubanetworks.com/support-services/contact-support/ for how to contact HPE Aruba Networking TAC. Any opinions expressed here are solely my own and not necessarily that of Hewlett Packard Enterprise or HPE Aruba Networking.

    In case your problem is solved, please invest the time to post a follow-up with the information on how you solved it. Others can benefit from that.
    ------------------------------