The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Timeouts
Timeout for Disabled Clients
You can configure a timeout for disabled clients. Clients who fail to authenticate three times when attempting to associate are automatically disabled from further association attempts. After the timeout period expires, the client is allowed to retry authentication until it associates or fails authentication and is excluded again. Use these commands to configure a timeout for disabled clients.
Session Timeout
You can configure a WLAN with a session timeout. The session timeout is the maximum time for a client session to remain active before requiring reauthorization.
![]() Note | If you configure session timeout as 0, it means disabling session-timeout, in case of open system, and 86400 seconds for all other system types. |
![]() Note | When a 802.1x WLAN session timeout value is modified, the associated clients pmk-cache does not change to reflect the new session time out value. |
User Idle Timeout
This is an enhancement to the present implementation of the user idle timeout feature, which is applicable to all WLAN profiles on the controller. With this enhancement, you can configure a user idle timeout for an individual WLAN profile. This user idle timeout is applicable to all the clients that belong to this WLAN profile.
You can also configure a threshold triggered timeout where if a client has not sent a threshold quota of data within the specified user idle timeout, the client is considered to be inactive and is deauthenticated. If the data sent by the client is more than the threshold quota specified within the user idle timeout, the client is considered to be active and the controller refreshes for another timeout period. If the threshold quota is exhausted within the timeout period, the timeout period is refreshed.
Suppose the user idle timeout is specified as 120 seconds and the user idle threshold is specified as 10 megabytes. After a period of 120 seconds, if the client has not sent 10 megabytes of data, the client is considered to be inactive and is deauthenticated. If the client has exhausted 10 megabytes within 120 seconds, the timeout period is refreshed.
Configure user idle timeout for a WLAN by entering this command:
config wlan usertimeout timeout-in-seconds wlan-id
Configure user idle threshold for a WLAN by entering this command:
config wlan user-idle-threshold value-in-bytes wlan-id
The Address Resolution Protocol (ARP) timeout is used to delete ARP entries on Cisco WLC for devices learned from the network.
There are four types of ARP entries:
Normal type—displayed as "Host" on the CLI
Mobile client type—displayed as "Client" on the CLI
Permanent type—displayed as "Permanent" on the CLI
Remote type—displayed as "Client" on the CLI
Only the Normal type ARP entry can be deleted. The other three entries cannot be deleted using the ARP timeout feature.
Configure the ARP timeout value by entering this command:
config network arptimeout value-in-secondsThe default value is 300 seconds; the valid range is 10 to 2147483647 seconds.
Authentication for Sleeping Clients
Clients with guest access that have had successful web authentication are allowed to sleep and wake up without having to go through another authentication process through the login page. You can configure the duration for which the sleeping clients are to be remembered for before reauthentication becomes necessary. The valid range is 10 minutes to 43200 minutes, with the default being 720 minutes. You can configure the duration on a WLAN and on a user group policy that is mapped to the WLAN. The sleeping timer becomes effective after the idle timeout. If the client timeout is lesser than the time configured on the sleeping timer of the WLAN, then the lifetime of the client is used as the sleeping time.
![]() Note | The sleeping timer expires every 6 minutes. |
This feature is supported in the following FlexConnect scenario: local switching and central authentication.
![]() Caution | If the MAC address of a client that goes to sleep mode is spoofed, the fake device such as a laptop can be authenticated. |
From release 8.0 and later, in a High Availability scenario, the sleeping timer is synchronized between active and standby.
A sleeping client does not require reauthentication in the following scenarios:
Suppose there are two controllers in a mobility group. A client that is associated with one controller goes to sleep and then wakes up and gets associated with the other controller.
Suppose there are three controllers in a mobility group. A client that is associated with the second controller that is anchored to the first controller goes to sleep, wakes up, and gets associated with the third controller.
A client sleeps, wakes up and gets associated with the same or different export foreign controller that is anchored to the export anchor.
The sleep client feature works only for WLAN configured with WebAuth security. Web passthrough is supported on Release 8.0 and later.
You can configure the sleeping clients only on a per-WLAN basis.
The authentication of sleeping clients feature is not supported with Layer 2 security and web authentication enabled.
The authentication of sleeping clients feature is supported only on WLANs that have Layer 3 security enabled.
With Layer 3 security, the Authentication, Passthrough, and On MAC Filter failure web policies are supported. The Conditional Web Redirect and Splash Page Web Redirect web policies are not supported.
The central web authentication of sleeping clients is not supported.
The authentication of sleeping clients feature is not supported on guest LANs and remote LANs.
A guest access sleeping client that has a local user policy is not supported. In this case, the WLAN-specific timer is applied.
In a High Availability scenario, the client entry is synchronized between active and standby, but the sleeping timer is not synchronized. If the active controller fails, the client has to get reauthenticated when it associates with the standby controller.
The number of sleeping clients that are supported depends on the controller platform:
Cisco 2504 Wireless Controller—500
Cisco 5508 Wireless Controller—1000
Cisco 5520 Wireless Controller—25000
Cisco Flex 7510 Wireless Controller—25000 with Release 7.6 and later; 9000 in earlier releases
Cisco 8510 Wireless Controller—25000 with Release 7.6 and later; 9000 in earlier releases
Cisco 8540 Wireless Controller—64000
Cisco WiSM2—1000
Cisco Virtual Wireless LAN Controller—500
New mobility is not supported.
Enable or disable authentication for sleeping clients on a WLAN by entering this command: config wlan custom-web sleep-client {enable | disable} wlan-id
Configure the sleeping client timeout on a WLAN by entering this command: config wlan custom-web sleep-client timeout wlan-id duration
View the sleeping client configuration on a WLAN by entering this command: show wlan wlan-id
Delete any unwanted sleeping client entries by entering this command: config custom-web sleep-client delete client-mac-addr
View a summary of all the sleeping client entries by entering this command: show custom-web sleep-client summary
View the details of a sleeping client entry based on the MAC address of the client by entering this command: show custom-web sleep-client detail client-mac-addr