We have a 5505 with a 10 user license. We want the users to be authenicated for 13 hours, but also have the ability for users to log off and others log on during this 13 hour period.
The problem we are having is that when 10 users are authenicated via a secure-id service and some of them log off the 5505 still keeps the cached auth and will not allow additional users. Any thoughts as to the RIGHT config commands to allow "long auth" but still allow users to come and go and be able to stay within the 10 user license?
The command ''timeout uauth xxxx'' will control the cached time for the authenticated users:
ASA(config)# timeout uauth ?
configure mode commands/options: <0:0:0> - <1193:0:0> Idle time after which an authentication will no longer be cached and the user will need to re-authenticate on their connection, default is 0:05:00. The default uauth timer is absolute.
ASA(config)# sh run timeout --> will show you the current idle/absolute time for authentication.
Here is what I have currently in the config: unauth 12:00:00 absolute unauth 12:00:00 so if I change the unauth to 00:15:00 users will stay authenicated for 12 hours if they have activity, but if they do not have any activity within 15 min they will need to re-authenicate correct?
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :