Dell PowerConnect W-Airwave W-Airwave 7.2 Configuration Guide - Page 56

Quiet Period after Failed, Use Server Provided

Page 56 highlights

Table 9 Profiles > AAA > 802.1x Auth Profile Settings (Continued) Field Default Description Enforce Machine No Authentication Machine ap-role Authentication: Default Machine Role Machine 24 Authentication Cache Timeout (1-1000 hrs) Blacklist on Machine No Authentication Failure Machine ap-role Authentication: Default User Role Interval Between 30 Identity Requests (1-65535 sec) Quiet Period after Failed 30 Authentication (1-65535 sec) Reauthentication Interval (60-864000 sec) 86,400 seconds Use Server Provided No Reauthentication Interval Multicast Key Rotation No (60-864000 sec) (For Windows environments only) Select this option to enforce machine authentication before user authentication. If selected, either the Machine Authentication Default Role or the User Authentication Default Role is assigned to the user, depending on which authentication is successful. This setting requires a policy enforcement firewall license. Select the default role to be assigned to the user after completing machine authentication. When a Windows device boots, it logs onto the network domain using a machine account. Within the domain, the device is authenticated before computer group policies and software settings can be executed; this process is known as machine authentication. Machine authentication ensures that only authorized devices are allowed on the network. You can configure 802.1x for both user and machine authentication (select the Enforce Machine Authentication option described in Table 51 on page 272). This tightens the authentication process further since both the device and user need to be authenticated. Role Assignment with Machine Authentication Enabled When you enable machine authentication, there are two additional roles you can define in the 802.1x authentication profile:  Machine authentication default machine role  Machine authentication default user role While you can select the same role for both options, you should define the roles as per the polices that need to be enforced. Also, these roles can be different from the 802.1x authentication default role configured in the AAA profile. With machine authentication enabled, the assigned role depends upon the success or failure of the machine and user authentications. In certain cases, the role that is ultimately assigned to a client can also depend upon attributes returned by the authentication server or server derivation rules configured on the controller. This setting requires a policy enforcement firewall license. Define whether the user is blacklisted upon authentication failure. This setting requires a policy enforcement firewall license. Select the default role to be assigned to the user after completing 802.1x authentication. This setting requires a policy enforcement firewall license. Specify the interval in which identity requests are to be spaced between each other. Specify the amount of time in seconds in which failed authentication denies access to a user, after failed authentication. Select this option to force the client to do a 802.1x re-authentication after the expiration of the default timer for re-authentication. The default value of the timer (Reauthentication Interval) is 24 hours. If the user fails to re-authenticate with valid credentials, the state of the user is cleared. If derivation rules are used to classify 802.1x-authenticated users, then the Reauthentication timer per role overrides this setting. 802.1x re-authentication can be attempted after the expiration of the default timer for reauthentication. Specify whether this is to be supported from the authentication server. Define whether Multicast Key Rotation is enabled or disabled. When enabled, unicast and multicast keys are updated after each reauthorization. It is a best practice to configure the time intervals for reauthentication, multicast key rotation, and unicast key rotation to be at least 15 minutes. 56 | Dell PowerConnect W Configuration Reference Dell PowerConnect W AirWave 7.2 | Configuration Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160

56
|
Dell PowerConnect W Configuration Reference
Dell PowerConnect W AirWave 7.2
| Configuration Guide
Enforce Machine
Authentication
No
(For Windows environments only) Select this option to enforce machine authentication
before user authentication. If selected, either the Machine Authentication Default Role
or the User Authentication Default Role is assigned to the user, depending on which
authentication is successful.
This setting requires a policy enforcement firewall license.
Machine
Authentication: Default
Machine Role
ap-role
Select the default role to be assigned to the user after completing machine
authentication.
Machine
Authentication Cache
Timeout
(1-1000 hrs)
24
When a Windows device boots, it logs onto the network domain using a machine
account. Within the domain, the device is authenticated before computer group policies
and software settings can be executed; this process is known as machine
authentication. Machine authentication ensures that only authorized devices are
allowed on the network.
You can configure 802.1x for both user and machine authentication (select the Enforce
Machine Authentication option described in Table 51 on page 272). This tightens the
authentication process further since both the device and user need to be authenticated.
Role Assignment with Machine Authentication Enabled
When you enable machine authentication, there are two additional roles you can define
in the 802.1x authentication profile:
Machine authentication default machine role
Machine authentication default user role
While you can select the same role for both options, you should define the roles as per
the polices that need to be enforced. Also, these roles can be different from the 802.1x
authentication default role configured in the AAA profile.
With machine authentication enabled, the assigned role depends upon the success or
failure of the machine and user authentications. In certain cases, the role that is
ultimately assigned to a client can also depend upon attributes returned by the
authentication server or server derivation rules configured on the controller.
This setting requires a policy enforcement firewall license.
Blacklist on Machine
Authentication Failure
No
Define whether the user is blacklisted upon authentication failure.
This setting requires a policy enforcement firewall license.
Machine
Authentication: Default
User Role
ap-role
Select the default role to be assigned to the user after completing 802.1x authentication.
This setting requires a policy enforcement firewall license.
Interval Between
Identity Requests
(1-65535 sec)
30
Specify the interval in which identity requests are to be spaced between each other.
Quiet Period after Failed
Authentication
(1-65535 sec)
30
Specify the amount of time in seconds in which failed authentication denies access to a
user, after failed authentication.
Reauthentication
Interval
(60-864000 sec)
86,400
seconds
Select this option to force the client to do a 802.1x re-authentication after the expiration
of the default timer for re-authentication. The default value of the timer
(Reauthentication Interval) is 24 hours. If the user fails to re-authenticate with valid
credentials, the state of the user is cleared.
If derivation rules are used to classify 802.1x-authenticated users, then the
Reauthentication timer per role overrides this setting.
Use Server Provided
Reauthentication
Interval
No
802.1x re-authentication can be attempted after the expiration of the default timer for re-
authentication. Specify whether this is to be supported from the authentication server.
Multicast Key Rotation
(60-864000 sec)
No
Define whether Multicast Key Rotation is enabled or disabled.
When enabled, unicast and multicast keys are updated after each reauthorization. It is a
best practice to configure the time intervals for reauthentication, multicast key rotation,
and unicast key rotation to be at least 15 minutes.
Table 9
Profiles > AAA > 802.1x Auth Profile Settings
(Continued)
Field
Default
Description