1) I've got the key rotation set for every 5 minutes on the RADIUS server (Cisco Secure 3.2). Will TKIP get any additional security?
2) The period of time the PC is given to authenticate is too short. It's actually around 2 minutes which should be long enough but I'd like to lengthen it to an hour or so.
The same broadcast key must be used by all stations connected to an AP (or a VLAN on an AP). When using TKIP, the group transient key is delivered securely after the pairwise transient keys are derived and installed. Because the same group key is used by everyone, it is effectively static unless something forces it to change. Broadcast key rotation updates that group transient key for all stations currently associated to the AP.
I am not aware of a configurable timeout that would control how long a station is given to authenticate overall, but you can usually control how long the AP and RADIUS server wait before timing out on any individual RADIUS message. For example, see radius-server timeout in Cisco APs.
This was first published in October 2003