< Home

Logout of 802.1X-authenticated Users

When users go offline but the access device and RADIUS server do not detect the offline events, the following problems may occur:
  • The RADIUS server still performs accounting for the users, causing incorrect accounting.
  • Unauthorized users may spoof IP addresses and MAC addresses of authorized users to access the network.
  • If there are many offline users, these users are still counted as access users of the device. As a result, other users may fail to access the network.

The access device needs to detect user logout immediately, delete the user entry, and instruct the RADIUS server to stop accounting.

A user may log out in the following scenarios: The user proactively logs out on the client, the access device controls user logout, and the RADIUS server logs out the user.

A Client Logs Out

A user sends an EAPoL-Logoff packet through the client software to log out. Upon receipt of the packet, the access device returns an EAP-Failure packet to the client and changes the port status from authorized to unauthorized.

Figure 1 Client logout process

The Access Device Controls User Logout

The access device controls user logout in either of the following ways:
  • Run the cut access-user command to force a user to go offline.
  • Configure user detection to check whether a user is online. If the user does not respond within a specified period, the access device considers the user to be offline and deletes the user entry.
If an administrator detects that an unauthorized user is online or wants a user to go offline and then go online again during a test, the administrator can run the cut access-user command on the access device to force the user to go offline. For a user in normal access state, the access device checks the online status of the user through ARP probing. If the access device detects that the user goes offline, it logs the user out and deletes the user entry.
Figure 2 User logout detection process

Assume that the handshake period of a user is 3T, which can be set by running the authentication timer handshake-period handshake-period command. Here, T = handshake-period/3.
  1. The user sends any packet to trigger 802.1X authentication, and the detection timer starts.
  2. Within several T periods, the access device receives traffic from the client and the user keeps online.
  3. The user sends the last packet. When the current T period expires, the access device determines that the user is online because traffic is still received from the client, and resets the detection timer.
  4. The access device does not receive traffic from the client within a T period, and sends the first ARP request packet. The client does not respond.
  5. The access device does not receive traffic from the client within another T period, and sends the second ARP request packet. The client does not respond.
  6. The access device does not receive traffic from the client within a third T period. The access device determines that ARP probing fails and deletes the user entry.

The RADIUS Server Forces a User to Log Out

The RADIUS server forces a user to log out using either of the following methods:

  • Sends a Disconnect Message (DM) to an access device to force a user to go offline.
  • Uses the standard RADIUS attributes Session-Timeout and Termination-Action. The Session-Timeout attribute specifies the online duration timer of a user. The value of Termination-Action is set to 0, indicating that the user is disconnected by the RADIUS server when the online duration timer expires.
Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >