Hello @Max Hibbin
Usually this blocks are either established in the negotiation from the Network, or by the interface itself. You may try to contact your AP/Network manufacturer or their forums for assistance on L2 Authentication and EAP timers.
On Windows side, there's s a workaround on the service level through a registry change. I know it worked for me until Windows 10 1904, but would require testing on newer versions.
On a test computer, make a backup of your registry, and add the next registry change:
In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dot3svc
Go to New, and then click DWORD Value.
Type BlockTime, and then press ENTER.
Right-click BlockTime, and then click Modify.
Click Decimal under Base.
In the Value data box, type an appropriate value for the blocking period, and then click OK.
(The value that you specify for this registry entry represents the number of minutes that the system waits before it retries a failed authentication. The default value is 20 and the valid range is 1 – 60. If you set this key to 0, it will not apply at all.)
Hope this helps with your query,
------
--If the reply is helpful, please Upvote and Accept as answer--