Version 33.6.1 adds passive polling capability to RADIUS reauthentication pause, enabling automatic early resume when RADIUS service becomes available during scheduled maintenance windows.
When RADIUS servers require scheduled maintenance, reauthentication pause allows you to temporarily suspend RADIUS reauthentication for successfully authenticated sessions. This prevents session disconnections during the maintenance window while maintaining security through the existing authentication state.
Key characteristics of reauthentication pause:
Passive polling monitors RADIUS responses (Authentication Success or Authentication Failure) to detect when the service becomes available again during a pause period. Once a configurable threshold of consecutive responses is observed, reauthentication automatically resumes without requiring manual intervention.
Passive polling provides:
Passive polling is configured separately from the pause operation itself. Configure passive polling parameters before initiating a pause, or adjust them during an active pause.
Enable or Disable Passive Polling:
configure netlogin radius reauthentication pause passive-poll [on | off]
Configure Passive Polling Parameters:
configure netlogin radius reauthentication pause passive-poll start-delay <minutes> configure netlogin radius reauthentication pause passive-poll stop-period <minutes> configure netlogin radius reauthentication pause passive-poll observe-period <minutes> configure netlogin radius reauthentication pause passive-poll observe-threshold <count>
Parameters:

Important
Default values are configured to effectively disable passive polling even when turned on. You must explicitly configure appropriate values for start-delay, stop-period, and observe-threshold to enable functional passive polling.Passive polling operates in phases during a reauthentication pause:
Phase 1: Delay Phase (Start Delay):
After a pause is issued, passive polling waits for the configured start-delay before beginning to monitor responses. During this time, RADIUS service is assumed unavailable. This delay allows time for the RADIUS server to be properly shut down after the pause is initiated.
Phase 2: Active Monitoring:
Passive polling monitors RADIUS responses and begins counting when the first response (Authentication Success or Authentication Failure) is received. This indicates the RADIUS service may be coming back online.
Phase 3: Observation Window:
Once a response is received, an observation window starts. If the configured observe-threshold number of consecutive responses is received within the observe-period, reauthentication automatically resumes early.
The observation period uses a non-sliding window:
Phase 4: Stop Phase (Stop Period):
Before the scheduled resume time, passive polling stops monitoring for the configured stop-period duration. This prevents unnecessary monitoring when the scheduled resume is imminent.
Timing diagram:
Pause Start Delay Observation Period Stop Period Scheduled Issued (waiting) (active monitoring) (stopped) Resume |------------|================~~~~~==================|------------| | | | | RADIUS assumed Polling starts Polling stops RADIUS assumed unavailable monitoring available
To pause RADIUS reauthentication:
configure netlogin radius reauthentication pause <duration>
Where duration is the pause duration in minutes (10-1440).
Example pausing for 2 hours (120 minutes):
configure netlogin radius reauthentication pause 120
During the pause:
To manually end the pause and resume reauthentication:
configure netlogin radius reauthentication resume
Manual resume is useful when:
When reauthentication resumes (either automatically via passive polling, manually, or at the scheduled time):
To view the current status of reauthentication pause and passive polling:
show netlogin
Sample output when pause is not in effect:
NetLogin Authentication Mode : web-based DISABLED; 802.1x ENABLED; MAC-based ENABLED
NetLogin Client Aging Time : 15 minutes
Authentication Protocol Order: mac-based, 802.1x, web-based, cep
Maximum Number Of Users : 9216 (Policy Enabled only)
------------------------------------------------
Policy Enabled Configuration
------------------------------------------------
Keep Session On Reauth Service Unavailable : Off
RADIUS Reauthentication Pause : Not in effect
RADIUS Reauthentication Pause Passive Polling : Off
Start delay : 1440 mins
Stop period : 1440 mins
Observation period : 5 mins
Observation threshold : 512
State : count=0 state=INVALID
Sample output during active pause with passive polling:
------------------------------------------------
Policy Enabled Configuration
------------------------------------------------
Keep Session On Reauth Service Unavailable : Off
RADIUS Reauthentication Pause : In effect - Duration: 120 minutes,
Time left: 3540 seconds
RADIUS Reauthentication Pause Passive Polling : On
Start delay : 10 mins
Stop period : 15 mins
Observation period : 5 mins
Observation threshold : 10
State : count=3 state=OBSERVE (180 seconds left)
Passive polling state values:
The count field shows the current number of consecutive responses received during the observation window.
Follow this workflow for RADIUS server scheduled maintenance with passive polling:
# Allow 10 minutes for server shutdown after pause configure netlogin radius reauthentication pause passive-poll start-delay 10 # Stop monitoring 15 minutes before scheduled resume configure netlogin radius reauthentication pause passive-poll stop-period 15 # Require 10 consecutive responses configure netlogin radius reauthentication pause passive-poll observe-threshold 10 # Within a 5-minute window configure netlogin radius reauthentication pause passive-poll observe-period 5 # Enable passive polling configure netlogin radius reauthentication pause passive-poll on
# For a 2-hour maintenance window configure netlogin radius reauthentication pause 120
Alternatively, manually resume reauthentication if you don't want to wait for passive polling:
configure netlogin radius reauthentication resume
Example 1: 2-Hour Maintenance with Aggressive Passive Polling
Scenario: Short maintenance window, want to resume as soon as possible after server is available.
# Configure aggressive passive polling configure netlogin radius reauthentication pause passive-poll start-delay 10 configure netlogin radius reauthentication pause passive-poll stop-period 10 configure netlogin radius reauthentication pause passive-poll observe-threshold 5 configure netlogin radius reauthentication pause passive-poll observe-period 5 configure netlogin radius reauthentication pause passive-poll on # Start 2-hour pause configure netlogin radius reauthentication pause 120
Example 2: 4-Hour Maintenance with Conservative Passive Polling
Scenario: Longer maintenance window, want to be more certain server is stable before resuming.
# Configure conservative passive polling configure netlogin radius reauthentication pause passive-poll start-delay 30 configure netlogin radius reauthentication pause passive-poll stop-period 30 configure netlogin radius reauthentication pause passive-poll observe-threshold 20 configure netlogin radius reauthentication pause passive-poll observe-period 10 configure netlogin radius reauthentication pause passive-poll on # Start 4-hour pause configure netlogin radius reauthentication pause 240
Example 3: Manual Resume Only (No Passive Polling)
Scenario: Want complete control over when to resume, prefer manual verification.
# Disable passive polling configure netlogin radius reauthentication pause passive-poll off # Start pause configure netlogin radius reauthentication pause 180 # After maintenance is complete and verified, manually resume configure netlogin radius reauthentication resume
During a reauthentication pause, new clients attempting first authentication may fail if the RADIUS server is down. These clients can be directed to a fallback VLAN using policy admin profile rules.
Configuring a Blackhole VLAN for Failed Authentication:
# Create a VLAN with L2 forwarding disabled create vlan blackhole_vlan tag 100 disable l2forwarding blackhole_vlan # Create policy profile for the blackhole VLAN configure policy profile 2 name "blackhole" pvid-status "enable" pvid 100 # Apply as admin profile rule configure policy rule admin-profile port 1 mask 16 port-string 1 admin-pid 2
Configuring a DMZ VLAN for Limited Access:
Instead of completely blocking traffic, you can direct failed authentications to a DMZ VLAN with limited network access:
# Create DMZ VLAN with limited features create vlan dmz_vlan tag 200 # Configure limited access on this VLAN (ACLs, routing, etc.) # Create policy profile for DMZ configure policy profile 3 name "dmz" pvid-status "enable" pvid 200 # Apply as admin profile rule configure policy rule admin-profile port 1 mask 16 port-string 1 admin-pid 3
Timing Consideration for DMZ VLAN:
When reauthentication resumes, the authentication mode may reset to "required" if that was the configured mode before the pause. This clears FDB entries associated with the fallback VLAN. For blackhole VLANs this is not an issue, but for DMZ VLANs it causes a brief service interruption.
To minimize delay:
configure netlogin aging-time 1
clear netlogin state mac-address <mac>
In stack configurations:
Passive Polling Doesn't Resume Early:
Sessions Disconnect During Pause:
Unable to Resume Manually:
Burst Overwhelms RADIUS Server:
The pause feature works in conjunction with other NetLogin settings:
See the "Failsafe Authentication Mode" section for configuration details on keep-session-on-reauth-svc-unavail and related settings.