Re: [WIRELESS-LAN] Wireless 802.1X client exclusions timeout issues

2016-06-07 Thread James Michael Keller


On 06/06/2016 10:24 PM, Kanan E Simpson wrote:
>
> We have it enabled and are using the default settings as well. In our
> environment,  it keeps the  forgotten ipad or wireless device over in
> the corner from locking out the user AD account. We have situations
> where a password will expire and/or the user  will change their AD
> password and forget to change it on other wireless devices. This
> normally will lock out their AD account and then they are not able to
> connect via other devices. It also stops the constant spamming.
>
> Kanan Simpson
>
> Valdosta State University
>
> 

I've used a similar strategy on Aruba, I have failed logins set lower
then the AD failed login limit and the blacklist timer is just longer
then the AD account lockout timer.   This lets the wireless system shun
the offending devices before triggering a lockout.   I have noticed that
BlackBerry gets this right and will stop trying to associate and
indicate to the user that the password on the SSID profile needs to be
updated.   i see a lot of Android just continue to bang away constantly
and get re-banned.

-James

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.



Re: [WIRELESS-LAN] Wireless 802.1X client exclusions timeout issues

2016-06-02 Thread Dennis Xu
We have Cisco WISM2 controllers with client exclusion enabled at 30 seconds. 
From time to time, I do see some users in the blacklist but we never need to 
remove them manually. And I don't recall anyone ever called us for being 
blacklisted. 


Dennis Xu, MASc, CCIE #13056 
Analyst 3, Network Infrastructure 
Computing and Communications Services(CCS) 
University of Guelph 

519-824-4120 Ext 56217 
d...@uoguelph.ca 
www.uoguelph.ca/ccs 

- Original Message -

From: "Mike Atkins" <matk...@nd.edu> 
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU 
Sent: Thursday, June 2, 2016 6:57:03 AM 
Subject: Re: [WIRELESS-LAN] Wireless 802.1X client exclusions timeout issues 



We have Cisco 8510 controllers with client exclusion enabled at the default 60 
seconds. We are using Microsoft NPS for authentication. When students are on 
campus I only see a couple devices in the excluded clients list for each 
controller. We left client exclusion on our open guest SSID as well. 







Mike Atkins 

Network Engineer 

Office of Information Technology 

University of Notre Dame 

Phone: 574-631-7210 





 .__o 

- _-\_<, 

--- (*)/'(*) 



From: The EDUCAUSE Wireless Issues Constituent Group Listserv [mailto: 
WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU ] On Behalf Of Jess Walczak 
Sent: Thursday, June 02, 2016 12:17 AM 
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU 
Subject: [WIRELESS-LAN] Wireless 802.1X client exclusions timeout issues 




We are experiencing the following issue and I am wondering what other folks are 
doing regarding expired password client exclusion blacklisting on their 802.1X 
WLANs. This is specifically about a Cisco environment, but others may have 
knowledge about it (albeit with different vendor-specific language). 



Client(supplicant) connects to our 802.1X WLAN(SSID) and it fails 
authentication 3 times because of an expired password. It is now blacklisted 
(for 60 seconds), during which time the client will usually then try to 
associate with our open WLAN, but cannot join and then retries associating with 
the secure WLAN once again, failing once again. I think we are mainly seeing 
this when a user's Active Directory password expires without their knowledge. 



Here is our environment: 


Cisco 8510 WLCs running 8.0.121.0 code 


Cisco ISE Version 1.4.0.253, Patch 3,5,6 





There are some settings involved: 


1.)"Client Exclusion Policy" (which under Security-->Wireless Protection 
Policy) has 6 elements, all on by default; one of these is "Maximum 802.1x-AAA 
Failure Attempts" which is set to "3" by default, and gives a range of "1-3". 
2.)"Client Exclusion" (under WLANs-->Advanced) is set to "enabled" with a 
timeout of 60 seconds. 


The Client Exclusion Policy is a global setting, and you can enable it for each 
WLAN or not, and pick the timeout in seconds (or 0 seconds, which means it must 
be manually cleared by an admin). My questions are whether other folks are 
leaving this feature on, or have they shortened the timeout, or have they 
disabled it altogether? 



We have this enabled on both WLANs, even on the open one--and this wouldn't 
seem to matter here, and perhaps is causing the client to be unable to connect 
to this one as well, erroneously. The timeout of 60 seconds seems like an 
eternity for a wireless client, and I imagine this feature intends to prevent a 
massive DoS or spoofing attack, except for we've seen iPhones that can register 
100's of thousands of failed login attempts in less than an hour before our 
wireless overhaul, and our AD servers never even broke a sweat. Is it then 
perhaps for the safety of the wireless controller? 


We've resolved this in some instances, even today, by "forgetting this network" 
on the client and powering it off, then finding its session in both ISE and the 
WLC and deleting them each, before powering the client back up. Then, it works 
flawlessly, once again. Because of this, it seems like this setting might be 
more of a nuisance than anything. 





Any thoughts would be appreciated. Thanks!--JW 



Jess Walczak 
Senior Network Analyst 
Information Technology Services 
jwwalc...@stthomas.edu 
University of St. Thomas | stthomas.edu 


** Participation and subscription information for this EDUCAUSE 
Constituent Group discussion list can be found at 
http://www.educause.edu/groups/ . 
** Participation and subscription information for this EDUCAUSE 
Constituent Group discussion list can be found at 
http://www.educause.edu/groups/ . 




**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.



RE: [WIRELESS-LAN] Wireless 802.1X client exclusions timeout issues

2016-06-02 Thread Mike Atkins
We have Cisco 8510 controllers with client exclusion enabled at the default
60 seconds.  We are using Microsoft NPS for authentication.  When students
are on campus I only see a couple devices in the excluded clients list for
each controller.  We left client exclusion on our open guest SSID as well.







*Mike Atkins *

Network Engineer

Office of Information Technology

University of Notre Dame

Phone: 574-631-7210





   .__o

   - _-\_<,

   ---  (*)/'(*)



*From:* The EDUCAUSE Wireless Issues Constituent Group Listserv [mailto:
WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] *On Behalf Of *Jess Walczak
*Sent:* Thursday, June 02, 2016 12:17 AM
*To:* WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
*Subject:* [WIRELESS-LAN] Wireless 802.1X client exclusions timeout issues



We are experiencing the following issue and I am wondering what other folks
are doing regarding expired password client exclusion blacklisting on their
802.1X WLANs.  This is specifically about a Cisco environment, but others
may have knowledge about it (albeit with different vendor-specific
language).

Client(supplicant) connects to our 802.1X WLAN(SSID) and it fails
authentication 3 times because of an expired password.  It is now
blacklisted (for 60 seconds), during which time the client will usually
then try to associate with our open WLAN, but cannot join and then retries
associating with the secure WLAN once again, failing once again.  I think
we are mainly seeing this when a user's Active Directory password expires
without their knowledge.

Here is our environment:

Cisco 8510 WLCs running 8.0.121.0 code

Cisco ISE Version 1.4.0.253, Patch 3,5,6



There are some settings involved:

1.)"Client Exclusion Policy" (which under Security-->Wireless Protection
Policy) has 6 elements, all on by default; one of these is "Maximum
802.1x-AAA Failure Attempts" which is set to "3" by default, and gives a
range of "1-3".
2.)"Client Exclusion" (under WLANs-->Advanced) is set to "enabled" with a
timeout of 60 seconds.

The Client Exclusion Policy is a global setting, and you can enable it for
each WLAN or not, and pick the timeout in seconds (or 0 seconds, which
means it must be manually cleared by an admin).  My questions are whether
other folks are leaving this feature on, or have they shortened the
timeout, or have they disabled it altogether?

We have this enabled on both WLANs, even on the open one--and this wouldn't
seem to matter here, and perhaps is causing the client to be unable to
connect to this one as well, erroneously.  The timeout of 60 seconds seems
like an eternity for a wireless client, and I imagine this feature intends
to prevent a massive DoS or spoofing attack, except for we've seen iPhones
that can register 100's of thousands of failed login attempts in less than
an hour before our wireless overhaul, and our AD servers never even broke a
sweat.  Is it then perhaps for the safety of the wireless controller?

We've resolved this in some instances, even today, by "forgetting this
network" on the client and powering it off, then finding its session in
both ISE and the WLC and deleting them each, before powering the client
back up.  Then, it works flawlessly, once again.  Because of this, it seems
like this setting might be more of a nuisance than anything.



Any thoughts would be appreciated.  Thanks!--JW

Jess Walczak
Senior Network Analyst
Information Technology Services
jwwalc...@stthomas.edu
University of St. Thomas | stthomas.edu

** Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.