Key Lifetime Issues Management How are the key lifetimes managed on the peer, authenticator, and AAA server? Negotiation Out of band management Resource reclamation What happens if resources need to be reclaimed and key state is removed by one or more of the parties? |