3Com Switch 8800 Configuration Guide Chapter 39 802.1x Configuration
39-10
39.2.10 Configuring 802.1x Timers
The following commands are used for configuring the 802.1x timers.
Perform the following configuration in system view.
Table 39-10 Configure 802.1x timers
Operation Command
Configure timers
dot1x timer { handshake-period
handshake-period-value | quiet-period
quiet-period-value | tx-period tx-period-value |
supp-timeout supp-timeout-value | server-timeout
server-timeout-value }
Restore default settings
of the timers
undo dot1x timer { handshake-period | quiet-period |
tx-period | supp-timeout | server-timeout }
handshake-period: This timer begins after the user has passed the authentication.
After setting handshake-period, system will send the handshake packet by the period.
Suppose the dot1x retry time is configured as N, the system will consider the user
having logged off and set the user as logoff state if system doesn’t receive the response
from user for consecutive N times.
handshake-period-value: Handshake period. The value ranges from 1 to 1024 in units
of second and defaults to 30.
quiet-period: Specifies the quiet timer. If an 802.1x user has not passed the
authentication, the Authenticator will keep quiet for a while (which is specified by
quiet-period timer) before launching the authentication again. During the quiet period,
the Authenticator does not do anything related to 802.1x authentication.
quiet-period-value: Specifies how long the quiet period is. The value ranges from 10 to
120 in units of second and defaults to 60.
server-timeout: Specifies the timeout timer of an Authentication Server. If an
Authentication Server has not responded before the specified period expires, the
Authenticator will resend the authentication request.
server-timeout-value: Specifies how long the duration of a timeout timer of an
Authentication Server is. The value ranges from 100 to 300 in units of second and
defaults to 100 seconds.
supp-timeout: Specifies the authentication timeout timer of a Supplicant. After the
Authenticator sends Request/Challenge request packet which requests the MD5
encrypted text, the supp-timeout timer of the Authenticator begins to run. If the
Supplicant does not respond back successfully within the time range set by this timer,
the Authenticator will resend the above packet.