Settle a problem:41
one of the most common operational tasks is managing the guest wireless experience. A seamless connection is expected, but what happens when guests are forced to re-authenticate every few days? This can lead to user frustration and an increase in helpdesk tickets.
Recently, a community member described this exact scenario: a guest network using Meraki MR access points, a Meraki concentrator, and Cisco Identity Services Engine (ISE) 3.1 for authentication. Users could connect successfully, but after exactly three days, they would lose internet access while still appearing connected to the Wi-Fi. The only fix was to “forget” the network and start the authentication process all over again.
Let’s break down this common problem, explore the likely causes, and walk through a step-by-step guide to configure the guest session duration to meet your organization’s policies.
This type of fixed-duration issue is almost always a configured policy, not a random bug. In an ISE-driven guest environment, the “session” is controlled by several timers and policies working together. The 3-day limit is a strong clue. Here are the most likely culprits, from most to least probable.
1. ISE Endpoint Purge Policy (For “Remember Me” Scenarios)
If your guest portal is a simple splash page with an “Accept” button (without a unique username/password for each guest), ISE is likely using a “remember me” function. It works like this:
GuestEndpoints
).The problem arises from ISE’s database maintenance. The Endpoint Purge Policy is designed to remove stale or inactive endpoints to keep the database clean. If this policy is configured to purge endpoints from the GuestEndpoints
group after 3 days, the device’s MAC address is deleted. The next time the device connects, ISE no longer recognizes it, and the user is forced back to the portal.
2. Guest Account Lifecycle (For Sponsored or Self-Registered Guests)
If your guests receive unique credentials (e.g., from a sponsor or through self-registration), each account has a defined lifecycle. This is controlled by the Guest Type in ISE. It’s highly probable that the default or configured Guest Type has an “Account Duration” set to 3 days. Once the account expires, the credentials are no longer valid, forcing a re-authentication.
3. Authorization Profile Timers
While less likely to be the root cause for this specific symptom (which requires “forgetting” the network), the Authorization Profile contains session control attributes. The most relevant is the Reauthentication Timer. An authorization profile can be configured to force re-authentication after a certain period. However, this usually results in a smoother CWA redirect rather than a complete loss of internet that requires forgetting the network.
4. MAC Address Randomization: A Complicating Factor, Not the Cause
The user correctly asked about random MAC addresses. This feature, common in modern mobile operating systems, can complicate “remember me” functions. If a device connects with a different MAC address each day, it will be treated as a new device and sent to the portal every time.
However, it is not the cause of a consistent 3-day timeout. The 3-day limit implies the same MAC address was successfully used for three days before its identity or account expired in ISE.
Before you begin, it’s crucial to follow the advice from the forum: First, make a decision on your policy. How long should a guest have access? Should there be an idle timeout? Once you have defined your requirements, you can configure ISE accordingly.
If you are using sponsored or self-registered guest portals, this is the first place to look.
Contractor
, Daily Guest
).If you are using a simple click-through splash page with a “remember me” function, this is your most likely solution.
GuestEndpoints
) after a set number of days.Purge Endpoints older than
value to a more suitable duration (e.g., 30 Days). This means ISE will “remember” the guest device’s MAC address for 30 days of inactivity before purging it.As a final check, ensure no conflicting timers are set in the Authorization Profile that grants guests network access.
Reauthentication every
is either not configured or is set to a value that aligns with your policy. For most guest workflows, session control is better managed via account lifecycle or endpoint purge, not forced reauthentication.While not the cause of the 3-day timeout, it’s a critical factor for a good guest experience. Meraki has excellent documentation on this topic: Meraki and MAC Address Randomization. The best practice is to inform users that for a seamless, multi-day experience, they should connect to the Guest SSID using their “Device MAC” address if their mobile OS provides that option.
A consistent, timed-out session on a guest network is a clear sign of a configured policy. By systematically investigating the Guest Type, the Endpoint Purge Policy, and the Authorization Profile within Cisco ISE, you can easily identify the 3-day limit and adjust it. By aligning these settings with your organization’s security and usability requirements, you can provide a stable and predictable Wi-Fi experience for your guests.