Part Number: CC3200
Hi.
We had seen this issue in the past in another customer's setup and now we are re-investigating this as it happened to another setup.
It appears that our device will loose connectivity after about 500'.
3.5. Exported and Calculated Key Lifetimes
The following mechanisms are available for communicating the lifetime
of keying material between the EAP peer, server, and authenticator:
AAA protocols (backend authentication server and authenticator)
Lower-layer mechanisms (authenticator and peer)
EAP method-specific negotiation (peer and server)
Where the EAP method does not support the negotiation of the lifetime
of exported EAP keying material, and a key lifetime negotiation
mechanism is not provided by the lower layer, it is possible that
there will not be a way for the peer to learn the lifetime of keying
material. This can leave the peer uncertain of how long the
authenticator will maintain keying material within the key cache. In
this case the lifetime of keying material can be managed as a system
parameter on the peer and authenticator; a default lifetime of 8
hours is RECOMMENDED.
Some questions on our side:
- Does TI triggers the EAP reauthentication
- If yes is there any way to specify when this will happen
- Does it handle the reauthentication regardless of who triggers it
- Are the new keys derived from the reauthentication being used
- Is there some way to know that this happened
Thank you
