<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic For headless device authenticated on the switch, how to ensure that they don't drop-off the network in RUCKUS Self-Help</title>
    <link>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/For-headless-device-authenticated-on-the-switch-how-to-ensure/m-p/54456#M94</link>
    <description>&lt;P&gt;Recently had come across a concern where the given printer was not able to stay authenticated on the mac-auth session it had initiated.&amp;nbsp;&lt;BR /&gt;Digging further into what was causing, it found it to be as the same was classified headless device.&lt;/P&gt;&lt;P&gt;A tiny description of the devices labeled as Headless device(s):&lt;BR /&gt;Headless devices such as printers, badge readers, POS Scanner, Industrial sensors, and actuators, IoT devices etc. are known to have simple NICs which are not capable of 802.1x traffic generation.&lt;/P&gt;&lt;P&gt;Given the current security demand, the need to lock every free access port to the network is ever present to avoid unwanted/uninvited guests accessing internal information.&lt;BR /&gt;&lt;BR /&gt;These devices however can-do mac-auth: where they are verified by their MAC addresses&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Problem posed:&lt;/STRONG&gt;&lt;BR /&gt;As with any authentication:&lt;BR /&gt;the connection [ethernet connection on the switch] once registers as offline due to no activity on the remote end, the session established when the device had authenticated gets logged off.&lt;BR /&gt;and as a part of all process in authentication: we do have a mandatory log off period / timer which does kick out the device, prompting them for a re-auth.&lt;/P&gt;&lt;P&gt;when either of this, happens for a user station on 802.1X its seamless: as the supplicant drivers take care of the re-auth&lt;/P&gt;&lt;P&gt;however, the device logging off the headless device when no traffic is generated can be an issue.&lt;/P&gt;&lt;P&gt;for example : a badge reader : at the door :&lt;BR /&gt;people would not be expected to tap the ID cards every minute, thus the traffic generated is sparse and not continuous. due to this when the device does not transmit&amp;nbsp; and switch moves the device to offline state, as due to no traffic seen.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Workaround that can be tried :&lt;/STRONG&gt;&lt;BR /&gt;when this is seen : forcing a re-auth for the device would work : however when it comes to headless devices.&lt;BR /&gt;they dont generate traffic by themselves, and with port-access control thats imposed by the 802.1x and Mac-ath processes : denies/blocks both inbound and outbound traffic on an interface until authentication is sucessfull&lt;/P&gt;&lt;P&gt;physically reseating the cable : enables the switch to re-learn the connected device on the interface and mac-auth going through will have the same verified. and we will have traffic passing.&lt;/P&gt;&lt;P&gt;this however, is less Ideal as reseating every time : would mean either accessing the wall mounted reader in the closet where connection goes or at the wall mount itself for the task&lt;/P&gt;&lt;P&gt;this can leave bits vulnerable. [ thus defeating the purpose ]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Solution :&lt;/STRONG&gt;&lt;BR /&gt;there are 2 ways to tackle the issue :&lt;BR /&gt;1 &amp;gt; standard and staight forward : exempt that port from authentication.&lt;BR /&gt;this however if discovered can be a loop hole in the network.&lt;/P&gt;&lt;P&gt;2 &amp;gt; use Radius attrubite to extend the session's idle window such that it covers the devices inactive period.&lt;BR /&gt;this would mean no loop hole in the network. and no need for physical intervention untill necessary.&lt;/P&gt;&lt;P&gt;for this when the authentication profile is set on the RADIUS platform : use the RADIUS IETF attribute of Idle-Timeout.&amp;nbsp;this ensures that the session for a given device will only timeout after the specified interval when no traffic is seen from that specific device .&lt;/P&gt;&lt;P&gt;Attribute details :&lt;BR /&gt;Attribute-Name :&lt;BR /&gt;Idle-timeout&lt;BR /&gt;Attribute-ID :&lt;BR /&gt;28&lt;BR /&gt;Attribute-Data Type:&lt;BR /&gt;Integer&lt;BR /&gt;Attribute-Description:&lt;BR /&gt;Idle timeout after which the session is cleared when there is no traffic.&lt;BR /&gt;This is equivalent to configuring the max-sw age command through the CLI&lt;BR /&gt;&lt;BR /&gt;the value is set in seconds : hence would need to time the same to a generalized period :&lt;BR /&gt;&amp;gt; where we can expect the max amount of gap : for ex. : when the office are shutdown during furlough or during the year end shutdown : where for a week's duration&lt;BR /&gt;the traffic would be minimal.&lt;BR /&gt;under this example : we would have 7 days in a week, 24 hours in a day, 60 minutes in a hour, and 60 seconds in a minute.&lt;BR /&gt;i.e. : 7*24*60*60 = 6,04,800&lt;/P&gt;&lt;P&gt;this value when set on the Authentication profile on the Authentication server : on the device's successfull auth will get passed as a Radius attribute.&lt;BR /&gt;that will have the session for the device extended.&lt;/P&gt;&lt;P&gt;this however can be set to any time in seconds as per the design's requirement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 02 Mar 2023 12:09:27 GMT</pubDate>
    <dc:creator>jdryan</dc:creator>
    <dc:date>2023-03-02T12:09:27Z</dc:date>
    <item>
      <title>For headless device authenticated on the switch, how to ensure that they don't drop-off the network</title>
      <link>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/For-headless-device-authenticated-on-the-switch-how-to-ensure/m-p/54456#M94</link>
      <description>&lt;P&gt;Recently had come across a concern where the given printer was not able to stay authenticated on the mac-auth session it had initiated.&amp;nbsp;&lt;BR /&gt;Digging further into what was causing, it found it to be as the same was classified headless device.&lt;/P&gt;&lt;P&gt;A tiny description of the devices labeled as Headless device(s):&lt;BR /&gt;Headless devices such as printers, badge readers, POS Scanner, Industrial sensors, and actuators, IoT devices etc. are known to have simple NICs which are not capable of 802.1x traffic generation.&lt;/P&gt;&lt;P&gt;Given the current security demand, the need to lock every free access port to the network is ever present to avoid unwanted/uninvited guests accessing internal information.&lt;BR /&gt;&lt;BR /&gt;These devices however can-do mac-auth: where they are verified by their MAC addresses&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Problem posed:&lt;/STRONG&gt;&lt;BR /&gt;As with any authentication:&lt;BR /&gt;the connection [ethernet connection on the switch] once registers as offline due to no activity on the remote end, the session established when the device had authenticated gets logged off.&lt;BR /&gt;and as a part of all process in authentication: we do have a mandatory log off period / timer which does kick out the device, prompting them for a re-auth.&lt;/P&gt;&lt;P&gt;when either of this, happens for a user station on 802.1X its seamless: as the supplicant drivers take care of the re-auth&lt;/P&gt;&lt;P&gt;however, the device logging off the headless device when no traffic is generated can be an issue.&lt;/P&gt;&lt;P&gt;for example : a badge reader : at the door :&lt;BR /&gt;people would not be expected to tap the ID cards every minute, thus the traffic generated is sparse and not continuous. due to this when the device does not transmit&amp;nbsp; and switch moves the device to offline state, as due to no traffic seen.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Workaround that can be tried :&lt;/STRONG&gt;&lt;BR /&gt;when this is seen : forcing a re-auth for the device would work : however when it comes to headless devices.&lt;BR /&gt;they dont generate traffic by themselves, and with port-access control thats imposed by the 802.1x and Mac-ath processes : denies/blocks both inbound and outbound traffic on an interface until authentication is sucessfull&lt;/P&gt;&lt;P&gt;physically reseating the cable : enables the switch to re-learn the connected device on the interface and mac-auth going through will have the same verified. and we will have traffic passing.&lt;/P&gt;&lt;P&gt;this however, is less Ideal as reseating every time : would mean either accessing the wall mounted reader in the closet where connection goes or at the wall mount itself for the task&lt;/P&gt;&lt;P&gt;this can leave bits vulnerable. [ thus defeating the purpose ]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Solution :&lt;/STRONG&gt;&lt;BR /&gt;there are 2 ways to tackle the issue :&lt;BR /&gt;1 &amp;gt; standard and staight forward : exempt that port from authentication.&lt;BR /&gt;this however if discovered can be a loop hole in the network.&lt;/P&gt;&lt;P&gt;2 &amp;gt; use Radius attrubite to extend the session's idle window such that it covers the devices inactive period.&lt;BR /&gt;this would mean no loop hole in the network. and no need for physical intervention untill necessary.&lt;/P&gt;&lt;P&gt;for this when the authentication profile is set on the RADIUS platform : use the RADIUS IETF attribute of Idle-Timeout.&amp;nbsp;this ensures that the session for a given device will only timeout after the specified interval when no traffic is seen from that specific device .&lt;/P&gt;&lt;P&gt;Attribute details :&lt;BR /&gt;Attribute-Name :&lt;BR /&gt;Idle-timeout&lt;BR /&gt;Attribute-ID :&lt;BR /&gt;28&lt;BR /&gt;Attribute-Data Type:&lt;BR /&gt;Integer&lt;BR /&gt;Attribute-Description:&lt;BR /&gt;Idle timeout after which the session is cleared when there is no traffic.&lt;BR /&gt;This is equivalent to configuring the max-sw age command through the CLI&lt;BR /&gt;&lt;BR /&gt;the value is set in seconds : hence would need to time the same to a generalized period :&lt;BR /&gt;&amp;gt; where we can expect the max amount of gap : for ex. : when the office are shutdown during furlough or during the year end shutdown : where for a week's duration&lt;BR /&gt;the traffic would be minimal.&lt;BR /&gt;under this example : we would have 7 days in a week, 24 hours in a day, 60 minutes in a hour, and 60 seconds in a minute.&lt;BR /&gt;i.e. : 7*24*60*60 = 6,04,800&lt;/P&gt;&lt;P&gt;this value when set on the Authentication profile on the Authentication server : on the device's successfull auth will get passed as a Radius attribute.&lt;BR /&gt;that will have the session for the device extended.&lt;/P&gt;&lt;P&gt;this however can be set to any time in seconds as per the design's requirement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2023 12:09:27 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/For-headless-device-authenticated-on-the-switch-how-to-ensure/m-p/54456#M94</guid>
      <dc:creator>jdryan</dc:creator>
      <dc:date>2023-03-02T12:09:27Z</dc:date>
    </item>
  </channel>
</rss>

