09/15/19:03 - MS-C3560-1#s 09/15/19:03 - Sep 16 00:03:42.357: AAA/AUTHOR: auth_need : user= 'axtel' ruser= 'MS-C3560-1'rem_addr= '172.18.2.1' priv= 0 list= '' AUTHOR-TYPE= 'commands' 09/15/19:03 - MS-C3560-1#sh run int 09/15/19:03 - Sep 16 00:03:42.357: %SYS-5-CONFIG_I: Configured from console by axtel on vty0 (172.18.2.1) 09/15/19:03 - MS-C3560-1#sh run int gig0/2 09/15/19:03 - Building configuration... 09/15/19:03 - 09/15/19:03 - Current configuration : 220 bytes 09/15/19:03 - ! 09/15/19:03 - interface GigabitEthernet0/2 09/15/19:03 - switchport access vlan 451 09/15/19:03 - switchport mode access 09/15/19:03 - ip access-group ACL-AD in 09/15/19:03 - shutdown 09/15/19:03 - authentication port-control auto 09/15/19:03 - mab 09/15/19:03 - spanning-tree portfast 09/15/19:03 - spanning-tree bpduguard enable 09/15/19:03 - end 09/15/19:03 - 09/15/19:03 - MS-C3560-1# 09/15/19:03 - MS-C3560-1# 09/15/19:03 - Sep 16 00:03:59.440: AAA/AUTHOR: auth_need : user= 'axtel' ruser= 'MS-C3560-1'rem_addr= '172.18.2.1' priv= 15 list= '' AUTHOR-TYPE= 'commands' 09/15/19:04 - MS-C3560-1# 09/15/19:04 - MS-C3560-1# 09/15/19:04 - MS-C3560-1# 09/15/19:04 - MS-C3560-1# 09/15/19:04 - MS-C3560-1# 09/15/19:04 - MS-C3560-1# 09/15/19:04 - MS-C3560-1#conf t 09/15/19:04 - Enter configuration commands, one per line. End with CNTL/Z. 09/15/19:04 - MS-C3560-1(config)# 09/15/19:04 - MS-C3560-1(config)# 09/15/19:04 - MS-C3560-1(config)#int g 09/15/19:04 - Sep 16 00:04:28.556: AAA/AUTHOR: auth_need : user= 'axtel' ruser= 'MS-C3560-1'rem_addr= '172.18.2.1' priv= 15 list= '' AUTHOR-TYPE= 'commands' 09/15/19:04 - MS-C3560-1(config)#int gig0/2 09/15/19:04 - MS-C3560-1(config-if)#no shut 09/15/19:04 - MS-C3560-1(config-if)# 09/15/19:04 - MS-C3560-1(config-if)# 09/15/19:04 - Sep 16 00:04:31.387: AAA/AUTHOR: auth_need : user= 'axtel' ruser= 'MS-C3560-1'rem_addr= '172.18.2.1' priv= 15 list= '' AUTHOR-TYPE= 'commands' 09/15/19:04 - Sep 16 00:04:32.646: AAA/AUTHOR: auth_need : user= 'axtel' ruser= 'MS-C3560-1'rem_addr= '172.18.2.1' priv= 15 list= '' AUTHOR-TYPE= 'commands' 09/15/19:04 - MS-C3560-1(config-if)# 09/15/19:04 - MS-C3560-1(config-if)# 09/15/19:04 - MS-C3560-1(config-if)# 09/15/19:04 - Sep 16 00:04:32.945: %ILPOWER-7-DETECT: Interface Gi0/2: Power Device detected: IEEE PD 09/15/19:04 - MS-C3560-1(config-if)# 09/15/19:04 - Sep 16 00:04:33.647: %ILPOWER-5-POWER_GRANTED: Interface Gi0/2: Power granted 09/15/19:04 - MS-C3560-1(config-if)# 09/15/19:04 - Sep 16 00:04:34.649: %LINK-3-UPDOWN: Interface GigabitEthernet0/2, changed state to down 09/15/19:04 - MS-C3560-1(config-if)# 09/15/19:04 - Sep 16 00:04:36.484: AUTH-EVENT: [Gi0/2] No authorized client found in domain [DATA] 09/15/19:04 - Sep 16 00:04:36.484: AUTH-EVENT: [Gi0/2] Domain authorized client count: 0 09/15/19:04 - Sep 16 00:04:36.484: AUTH-EVENT: [Gi0/2] No authorized client found in domain [DATA] 09/15/19:04 - Sep 16 00:04:36.489: AUTH-EVENT: [Gi0/2] Domain authorized client count: 0 09/15/19:04 - Sep 16 00:04:36.489: AUTH-EVENT: [Gi0/2] Link UP 09/15/19:04 - MS-C3560-1(config-if)# 09/15/19:04 - Sep 16 00:04:38.461: %LINK-3-UPDOWN: Interface GigabitEthernet0/2, changed state to up 09/15/19:04 - Sep 16 00:04:39.462: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/2, changed state to up 09/15/19:04 - MS-C3560-1(config-if)# 09/15/19:04 - Sep 16 00:04:48.328: AUTH-EVENT: [0c85.253e.9229, Gi0/2] New LL MAC: 0c85.253e.9229 and 10 09/15/19:04 - Sep 16 00:04:48.334: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Assigned AAA ID 0x00000030 09/15/19:04 - Sep 16 00:04:48.334: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Allocated new Auth Manager context (handle 0xD1000016) 09/15/19:04 - Sep 16 00:04:48.334: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Initialising Method state to 'Not run' 09/15/19:04 - Sep 16 00:04:48.334: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Adding method Session Mgr IPDT Shim to runnable list for session 0xD1000016 09/15/19:04 - Sep 16 00:04:48.334: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Initialising Method state to 'Not run' 09/15/19:04 - Sep 16 00:04:48.334: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Adding method Session Mgr SISF Shim to runnable list for session 0xD1000016 09/15/19:04 - Sep 16 00:04:48.334: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Initialising Method SM Accounting Feature state to 'Not run' 09/15/19:04 - Sep 16 00:04:48.334: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Adding method SM Accounting Feature to runnable list for session 0xD1000016 09/15/19:04 - Sep 16 00:04:48.334: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Initialising Method iaf state to 'Not run' 09/15/19:04 - Sep 16 00:04:48.334: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Adding method iaf to runnable list for session 0xD1000016 09/15/19:04 - Sep 16 00:04:48.334: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Initialising Method EPM ACL state to 'Not run' 09/15/19:04 - Sep 16 00:04:48.334: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Adding method EPM ACL to runnable list for session 0xD1000016 09/15/19:04 - Sep 16 00:04:48.334: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Initialising Method Tag state to 'Not run' 09/15/19:04 - Sep 16 00:04:48.334: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Adding method Tag to runnable list for session 0xD1000016 09/15/19:04 - Sep 16 00:04:48.334: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Initialising Method SM Reauth Plugin state to 'Not run' 09/15/19:04 - Sep 16 00:04:48.334: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Adding method SM Reauth Plugin to runnable list for session 0xD1000016 09/15/19:04 - Sep 16 00:04:48.334: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Initialising Method SVM state to 'Not run' 09/15/19:04 - Sep 16 00:04:48.334: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Adding method SVM to runnable list for session 0xD1000016 09/15/19:04 - Sep 16 00:04:48.334: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Initialising Method state to 'Not run' 09/15/19:04 - Sep 16 00:04:48.334: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Adding method DSensor CDP Shim to runnable list for session 0xD1000016 09/15/19:04 - Sep 16 00:04:48.334: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Initialising Method state to 'Not run' 09/15/19:04 - Sep 16 00:04:48.334: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Adding method DSensor DHCP Shim to runnable list for session 0xD1000016 09/15/19:04 - Sep 16 00:04:48.334: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Initialising Method state to 'Not run' 09/15/19:04 - Sep 16 00:04:48.334: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Adding method DSensor h323 Shim to runnable list for session 0xD1000016 09/15/19:04 - Sep 16 00:04:48.339: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Initialising Method state to 'Not run' 09/15/19:04 - Sep 16 00:04:48.339: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Adding method DSensor LLDP Shim to runnable list for session 0xD1000016 09/15/19:04 - Sep 16 00:04:48.339: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Initialising Method state to 'Not run' 09/15/19:04 - Sep 16 00:04:48.339: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Adding method DSensor MDNS Shim to runnable list for session 0xD1000016 09/15/19:04 - Sep 16 00:04:48.339: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Initialising Method state to 'Not run' 09/15/19:04 - Sep 16 00:04:48.339: AUTH-DETAIL: [0c8 09/15/19:04 - MS-C3560-1(config-if)#5.253e.9229, Gi0/2] Adding method DSensor SIP Shim to runnable list for session 0xD1000016 09/15/19:04 - Sep 16 00:04:48.339: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Initialising Method state to 'Not run' 09/15/19:04 - Sep 16 00:04:48.339: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Adding method linksec to runnable list for session 0xD1000016 09/15/19:04 - Sep 16 00:04:48.339: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Initialising Method dct state to 'Not run' 09/15/19:04 - Sep 16 00:04:48.339: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Adding method dct to runnable list for session 0xD1000016 09/15/19:04 - Sep 16 00:04:48.339: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Initialising Method state to 'Not run' 09/15/19:04 - Sep 16 00:04:48.339: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Adding method MSP Device ID Mgr to runnable list for session 0xD1000016 09/15/19:04 - Sep 16 00:04:48.339: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Initialising Method state to 'Not run' 09/15/19:04 - Sep 16 00:04:48.339: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Adding method Switch PI to runnable list for session 0xD1000016 09/15/19:04 - Sep 16 00:04:48.339: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Initialising Method CTS Reauth Client state to 'Not run' 09/15/19:04 - Sep 16 00:04:48.339: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Adding method CTS Reauth Client to runnable list for session 0xD1000016 09/15/19:04 - Sep 16 00:04:48.339: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Processing SM CB request for 0xD1000016: Event: New client notification (151) 09/15/19:04 - Sep 16 00:04:48.339: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Create attr list, session 0xD1000016: 09/15/19:04 - Sep 16 00:04:48.339: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] - adding MAC 0c85.253e.9229 09/15/19:04 - Sep 16 00:04:48.339: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] - adding Swidb 0x5C610F8 09/15/19:04 - Sep 16 00:04:48.339: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] - adding AAA_ID=30 09/15/19:04 - Sep 16 00:04:48.339: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] - adding Audit_sid=AC1869FC00000030265556C0 09/15/19:04 - Sep 16 00:04:48.339: AUTH-EVENT: [0c85.253e.9229, Gi0/2] New client 0c85.253e.9229 - client handle 0x00000001 for SM Accounting Feature 09/15/19:04 - Sep 16 00:04:48.339: AUTH-EVENT: [0c85.253e.9229, Gi0/2] New client 0c85.253e.9229 - client handle 0x00000001 for SVM 09/15/19:04 - Sep 16 00:04:48.339: AUTH-EVENT: [Gi0/2] No MACs found 09/15/19:04 - Sep 16 00:04:48.339: AUTH-EVENT: [Gi0/2] Client MAC count: 0, 0 not being deleted 09/15/19:04 - Sep 16 00:04:48.344: AUTH-EVENT: [Gi0/2] No authorized client found in domain [DATA] 09/15/19:04 - Sep 16 00:04:48.344: AUTH-EVENT: [Gi0/2] Domain authorized client count: 0 09/15/19:04 - Sep 16 00:04:48.344: AUTH-EVENT: [Gi0/2] No authorized client found in domain [VOICE] 09/15/19:04 - Sep 16 00:04:48.344: AUTH-EVENT: [Gi0/2] Domain authorized client count: 0 09/15/19:04 - Sep 16 00:04:48.344: AUTH-EVENT: [Gi0/2] No authorized ctx found 09/15/19:04 - Sep 16 00:04:48.344: AUTH-EVENT: [0c85.253e.9229, Gi0/2] New client 0c85.253e.9229 - client handle 0x10000016 for Switch PI 09/15/19:04 - Sep 16 00:04:48.344: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Added record to DB - hdl 0xD1000016 / 0c85.253e.9229. 1 session(s) on IDB 09/15/19:04 - Sep 16 00:04:48.344: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Add record - adding MAC 0c85.253e.9229 09/15/19:04 - Sep 16 00:04:48.344: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Add record - adding SWIDB GigabitEthernet0/2 09/15/19:04 - Sep 16 00:04:48.344: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Add record - adding AAA-ID 30 09/15/19:04 - Sep 16 00:04:48.344: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Add record - adding AUDIT-ID AC1869FC00000030265556C0 09/15/19:04 - Sep 16 00:04:48.344: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Add record - adding TARGET_SCOPE (Client) 09/15/19:04 - Sep 16 00:04:48.344: AUTH-EVENT: Bound session (hdl 0xD1000016) to policy (tgt 0x2F010048) 09/15/19:04 - Sep 16 00:04:48.344: AUTH-SYNC: [0c85.253e.9229, Gi0/2] Delay add/update sync of clid-mac-addr for 0c85.253e.9229 / 0xD1000016 09/15/19:04 - Sep 16 00:04:48.344: AUTH-SYNC: [0c85.253e.9229, Gi0/ 09/15/19:04 - MS-C3560-1(config-if)#2] Delay add/update sync of swidb for 0c85.253e.9229 / 0xD1000016 09/15/19:04 - Sep 16 00:04:48.344: AUTH-SYNC: [0c85.253e.9229, Gi0/2] Delay add/update sync of aaa-unique-id for 0c85.253e.9229 / 0xD1000016 09/15/19:04 - Sep 16 00:04:48.344: AUTH-SYNC: [0c85.253e.9229, Gi0/2] Delay add/update sync of audit-session-id for 0c85.253e.9229 / 0xD1000016 09/15/19:04 - Sep 16 00:04:48.344: AUTH-EVENT: [0c85.253e.9229, Gi0/2] No identity attr list found 09/15/19:04 - Sep 16 00:04:48.344: AUTH-EVENT: Handling client event RX_IDENTITY_UPDATE (17) for PRE, handle 0xD1000016 09/15/19:04 - Sep 16 00:04:48.349: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Policy event will be processed synchronously for 0xD1000016 09/15/19:04 - Sep 16 00:04:48.349: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Processing default action(s) for event RX_IDENTITY_UPDATE for session 0xD1000016. 09/15/19:04 - Sep 16 00:04:48.349: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Session response callbackis called 0x0000000A for session 0xD1000016 - Invalid ctx 09/15/19:04 - Sep 16 00:04:48.349: AUTH-SYNC: [0c85.253e.9229, Gi0/2] Delay add sync of cdp-tlv for 0c85.253e.9229 / 0xD1000016 09/15/19:04 - Sep 16 00:04:48.349: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Received internal event SINGLE_ID_UPDATE (handle 0xD1000016) 09/15/19:04 - Sep 16 00:04:48.349: AUTH-SYNC: [0c85.253e.9229, Gi0/2] Delay remove sync of vlan-id for 0c85.253e.9229 / 0xD1000016 09/15/19:04 - Sep 16 00:04:48.349: AUTH-EVENT: Handling client event SESSION_STARTED (8) for PRE, handle 0xD1000016 09/15/19:04 - Sep 16 00:04:48.349: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Create attr list, session 0xD1000016: 09/15/19:04 - Sep 16 00:04:48.349: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] - adding MAC 0c85.253e.9229 09/15/19:04 - Sep 16 00:04:48.349: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] - adding Swidb 0x5C610F8 09/15/19:04 - Sep 16 00:04:48.349: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] - adding AAA_ID=30 09/15/19:04 - Sep 16 00:04:48.349: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] - adding Audit_sid=AC1869FC00000030265556C0 09/15/19:04 - Sep 16 00:04:48.349: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Initialising Method mab state to 'Not run' 09/15/19:04 - Sep 16 00:04:48.349: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Adding method mab to runnable list for session 0xD1000016 09/15/19:04 - Sep 16 00:04:48.349: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Processing SM CB request for 0xD1000016: Event: Start a method (150) 09/15/19:04 - Sep 16 00:04:48.349: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Context changing state from 'Idle' to 'Running' 09/15/19:04 - Sep 16 00:04:48.349: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Method mab changing state from 'Not run' to 'Running' 09/15/19:04 - Sep 16 00:04:48.349: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Policy processing started for 0xD1000016(0c85.253e.9229) 09/15/19:04 - Sep 16 00:04:48.349: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Policy event will be processed synchronously for 0xD1000016 09/15/19:04 - Sep 16 00:04:48.349: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Processing default action(s) for event SESSION_STARTED for session 0xD1000016. 09/15/19:04 - Sep 16 00:04:48.360: AAA/AUTHEN/8021X (00000000): Pick method list 'default' 09/15/19:04 - Sep 16 00:04:48.360: AAA/AUTHEN(00000000): There is no General DBReply Method Index details may not be specified 09/15/19:04 - Sep 16 00:04:48.360: RADIUS/ENCODE(00000000):Orig. component type = Invalid 09/15/19:04 - Sep 16 00:04:48.360: RADIUS(00000000): Config NAS IP: 10.1.100.252 09/15/19:04 - Sep 16 00:04:48.360: RADIUS(00000000): sending 09/15/19:04 - Sep 16 00:04:48.365: RADIUS(00000000): Send Access-Request to 10.1.100.21:1645 id 1645/48, len 258 09/15/19:04 - Sep 16 00:04:48.365: RADIUS: authenticator E3 4A 39 9B FE 4B D3 8C - BF AA FC FF 21 A9 CF BF 09/15/19:04 - Sep 16 00:04:48.365: RADIUS: User-Name [1] 14 "0c85253e9229" 09/15/19:04 - Sep 16 00:04:48.365: RADIUS: User-Password [2] 18 * 09/15/19:04 - Sep 16 00:04:48.365: RADIUS: Service-Type [6] 6 Call Check [10] 09/15/19:04 - Sep 16 00:04:48.365: RADIUS: Vendor, Cisco [26] 31 09/15/19:04 - Sep 16 00:04:48.365: RADIUS: Cisco AVpair [1 09/15/19:04 - MS-C3560-1(config-if)#] 25 "service-type=Call Check" 09/15/19:04 - Sep 16 00:04:48.365: RADIUS: Framed-MTU [12] 6 1500 09/15/19:04 - Sep 16 00:04:48.365: RADIUS: Called-Station-Id [30] 19 "54-4A-00-90-4A-82" 09/15/19:04 - Sep 16 00:04:48.365: RADIUS: Calling-Station-Id [31] 19 "0C-85-25-3E-92-29" 09/15/19:04 - Sep 16 00:04:48.365: RADIUS: Message-Authenticato[80] 18 09/15/19:04 - Sep 16 00:04:48.365: RADIUS: 2C 4E 9A 11 DB 7C 4B BB DB C3 72 EA BF E2 17 A5 [ ,N|Kr] 09/15/19:04 - Sep 16 00:04:48.365: RADIUS: EAP-Key-Name [102] 2 * 09/15/19:04 - Sep 16 00:04:48.365: RADIUS: Vendor, Cisco [26] 49 09/15/19:04 - Sep 16 00:04:48.365: RADIUS: Cisco AVpair [1] 43 "audit-session-id=AC1869FC00000030265556C0" 09/15/19:04 - Sep 16 00:04:48.365: RADIUS: Vendor, Cisco [26] 18 09/15/19:04 - Sep 16 00:04:48.365: RADIUS: Cisco AVpair [1] 12 "method=mab" 09/15/19:04 - Sep 16 00:04:48.365: RADIUS: NAS-IP-Address [4] 6 10.1.100.252 09/15/19:04 - Sep 16 00:04:48.365: RADIUS: NAS-Port [5] 6 60000 09/15/19:04 - Sep 16 00:04:48.365: RADIUS: NAS-Port-Id [87] 20 "GigabitEthernet0/2" 09/15/19:04 - Sep 16 00:04:48.365: RADIUS: NAS-Port-Type [61] 6 Ethernet [15] 09/15/19:04 - Sep 16 00:04:48.365: RADIUS(00000000): Sending a IPv4 Radius Packet 09/15/19:04 - Sep 16 00:04:48.365: RADIUS(00000000): Started 5 sec timeout 09/15/19:04 - Sep 16 00:04:48.381: RADIUS: Received from id 1645/48 10.1.100.21:1645, Access-Accept, len 262 09/15/19:04 - Sep 16 00:04:48.381: RADIUS: authenticator 45 81 3D 7D 8D 87 C5 79 - ED 40 7D 4D 22 31 8E 2B 09/15/19:04 - Sep 16 00:04:48.381: RADIUS: User-Name [1] 19 "0C-85-25-3E-92-29" 09/15/19:04 - Sep 16 00:04:48.381: RADIUS: State [24] 40 09/15/19:04 - Sep 16 00:04:48.381: RADIUS: 52 65 61 75 74 68 53 65 73 73 69 6F 6E 3A 41 43 [ReauthSession:AC] 09/15/19:04 - Sep 16 00:04:48.381: RADIUS: 31 38 36 39 46 43 30 30 30 30 30 30 33 30 32 36 [1869FC0000003026] 09/15/19:04 - Sep 16 00:04:48.381: RADIUS: 35 35 35 36 43 30 [ 5556C0] 09/15/19:04 - Sep 16 00:04:48.381: RADIUS: Class [25] 50 09/15/19:04 - Sep 16 00:04:48.386: RADIUS: 43 41 43 53 3A 41 43 31 38 36 39 46 43 30 30 30 [CACS:AC1869FC000] 09/15/19:04 - Sep 16 00:04:48.386: RADIUS: 30 30 30 33 30 32 36 35 35 35 36 43 30 3A 69 73 [00030265556C0:is] 09/15/19:04 - Sep 16 00:04:48.386: RADIUS: 65 2F 31 39 39 39 30 39 35 32 39 2F 31 37 36 35 [ e/199909529/1765] 09/15/19:04 - Sep 16 00:04:48.386: RADIUS: Message-Authenticato[80] 18 09/15/19:04 - Sep 16 00:04:48.386: RADIUS: 2D 69 5E A4 5C 4D D3 EB 95 C7 25 08 3D B4 00 C3 [ -i^\M?=] 09/15/19:04 - Sep 16 00:04:48.386: RADIUS: Vendor, Cisco [26] 75 09/15/19:04 - Sep 16 00:04:48.386: RADIUS: Cisco AVpair [1] 69 "ACS:CiscoSecure-Defined-ACL=#ACSACL#-IP-PERMIT_ALL_TRAFFIC-517998c3" 09/15/19:04 - Sep 16 00:04:48.386: RADIUS: Vendor, Cisco [26] 40 09/15/19:04 - Sep 16 00:04:48.386: RADIUS: Cisco AVpair [1] 34 "profile-name=Cisco-IP-Phone-7942" 09/15/19:04 - Sep 16 00:04:48.386: RADIUS(00000000): Received from id 1645/48 09/15/19:04 - Sep 16 00:04:48.386: ERROR: AAA/ATTR: invalid attribute prefix: "ACS" 09/15/19:04 - Sep 16 00:04:48.386: RADIUS/DECODE: parse unknown cisco vsa "profile-name" - IGNORE 09/15/19:04 - Sep 16 00:04:48.386: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Authc success from MAB (2), status OK (0) / event success (0) 09/15/19:04 - Sep 16 00:04:48.386: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Highest prio method: INVALID, Authz method: INVALID, Conn hdl: mab 09/15/19:04 - Sep 16 00:04:48.386: AUTH-EVENT: Raised event APPLY_USER_PROFILE (13) on handle 0xD1000016 09/15/19:04 - Sep 16 00:04:48.386: AUTH-EVENT: Raised event RX_METHOD_AUTHC_SUCCESS (3) on handle 0xD1000016 09/15/19:04 - Sep 16 00:04:48.391: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Queued AUTHC SUCCESS from MAB for session 0xD1000016 (0c85.253e.9229) 09/15/19:04 - Sep 16 00:04:48.391: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Received internal event APPLY_USER_PROFILE (handle 0xD1000016) 09/15/19:04 - Sep 16 00:04:48.391: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Clearing AAA da 09/15/19:04 - MS-C3560-1(config-if)#ta for: 0c85.253e.9229 09/15/19:04 - Sep 16 00:04:48.391: AUTH-EVENT: Raised event RX_IDENTITY_UPDATE (17) on handle 0xD1000016 09/15/19:04 - Sep 16 00:04:48.391: AUTH-SYNC: [0c85.253e.9229, Gi0/2] Delay add/update sync of username for 0c85.253e.9229 / 0xD1000016 09/15/19:04 - Sep 16 00:04:48.391: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Received User-Name 0C-85-25-3E-92-29 for client 0c85.253e.9229 09/15/19:04 - Sep 16 00:04:48.391: AUTH-SYNC: [0c85.253e.9229, Gi0/2] Delay add/update sync of auth-domain for 0c85.253e.9229 / 0xD1000016 09/15/19:04 - Sep 16 00:04:48.391: AUTH-SYNC: [0c85.253e.9229, Gi0/2] Delay add/update sync of target-scope for 0c85.253e.9229 / 0xD1000016 09/15/19:04 - Sep 16 00:04:48.391: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Existing AAA ID: 0x00000030 09/15/19:04 - Sep 16 00:04:48.391: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Method mab changing state from 'Running' to 'Authc Success' 09/15/19:04 - Sep 16 00:04:48.391: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Context changing state from 'Running' to 'Authc Success' 09/15/19:04 - Sep 16 00:04:48.391: AUTH-EVENT: [0c85.253e.9229, Gi0/2] User Profile will be applied (async) for 0xD1000016 - merge 09/15/19:04 - Sep 16 00:04:48.391: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Block events for 0c85.253e.9229 pending async User Profile Application for apply user profile (1). 09/15/19:04 - Sep 16 00:04:48.391: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Pending SVM reponse for user profile applicationxD1000016(0c85.253e.9229) 09/15/19:04 - Sep 16 00:04:48.391: AUTH-EVENT: Handling client event RX_METHOD_AUTHC_SUCCESS (3) for PRE, handle 0xD1000016 09/15/19:04 - Sep 16 00:04:48.391: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Queueing event RX_METHOD_AUTHC_SUCCESS(3) for 0xD1000016 - process in turn later 09/15/19:04 - Sep 16 00:04:48.391: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Queued the event RX_METHOD_AUTHC_SUCCESS for 0xD1000016 09/15/19:04 - Sep 16 00:04:48.391: AUTH-EVENT: Handling client event RX_IDENTITY_UPDATE (17) for PRE, handle 0xD1000016 09/15/19:04 - Sep 16 00:04:48.397: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Queueing event RX_IDENTITY_UPDATE(17) for 0xD1000016 - process in turn later 09/15/19:04 - Sep 16 00:04:48.397: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Queued the event RX_IDENTITY_UPDATE for 0xD1000016 09/15/19:04 - Sep 16 00:04:48.397: %EPM-6-POLICY_REQ: IP 0.0.0.0| MAC 0c85.253e.9229| AuditSessionID AC1869FC00000030265556C0| EVENT APPLY 09/15/19:04 - Sep 16 00:04:48.397: %EPM-6-AAA: POLICY xACSACLx-IP-PERMIT_ALL_TRAFFIC-517998c3| EVENT DOWNLOAD_REQUEST 09/15/19:04 - Sep 16 00:04:48.397: AAA/AUTHOR (0x0): Pick method list 'default' 09/15/19:04 - Sep 16 00:04:48.397: RADIUS/ENCODE(00000000):Orig. component type = Invalid 09/15/19:04 - Sep 16 00:04:48.397: RADIUS(00000000): Config NAS IP: 10.1.100.252 09/15/19:04 - Sep 16 00:04:48.397: RADIUS(00000000): sending 09/15/19:04 - Sep 16 00:04:48.397: RADIUS(00000000): Send Access-Request to 10.1.100.21:1645 id 1645/49, len 147 09/15/19:04 - Sep 16 00:04:48.397: RADIUS: authenticator 44 C4 F7 25 20 1B 71 6A - D9 8D 5B 5A B5 A9 3A 56 09/15/19:04 - Sep 16 00:04:48.397: RADIUS: NAS-IP-Address [4] 6 10.1.100.252 09/15/19:04 - Sep 16 00:04:48.397: RADIUS: User-Name [1] 41 "#ACSACL#-IP-PERMIT_ALL_TRAFFIC-517998c3" 09/15/19:04 - Sep 16 00:04:48.397: RADIUS: Vendor, Cisco [26] 32 09/15/19:04 - Sep 16 00:04:48.397: RADIUS: Cisco AVpair [1] 26 "aaa:service=ip_admission" 09/15/19:04 - Sep 16 00:04:48.402: RADIUS: Vendor, Cisco [26] 30 09/15/19:04 - Sep 16 00:04:48.402: RADIUS: Cisco AVpair [1] 24 "aaa:event=acl-download" 09/15/19:04 - Sep 16 00:04:48.402: RADIUS: Message-Authenticato[80] 18 09/15/19:04 - Sep 16 00:04:48.402: RADIUS: 07 3B AE 52 DC 28 2D 0A 6C 44 B1 18 DB 46 3C 88 [ ;R(-lDF<] 09/15/19:04 - Sep 16 00:04:48.402: RADIUS(00000000): Sending a IPv4 Radius Packet 09/15/19:04 - Sep 16 00:04:48.402: RADIUS(00000000): Started 5 sec timeout 09/15/19:04 - Sep 16 00:04:48.407: RADIUS: Received from id 1645/49 10.1.100.21:1645, Access-Accept, len 205 09/15/19:04 - Sep 16 00:04:48.407: RADIUS: authenticator 8A 30 18 3A 01 B8 E2 90 - 5A FD C9 FF 1E 09/15/19:04 - MS-C3560-1(config-if)#AD A5 8D 09/15/19:04 - Sep 16 00:04:48.407: RADIUS: User-Name [1] 41 "#ACSACL#-IP-PERMIT_ALL_TRAFFIC-517998c3" 09/15/19:04 - Sep 16 00:04:48.407: RADIUS: State [24] 40 09/15/19:04 - Sep 16 00:04:48.407: RADIUS: 52 65 61 75 74 68 53 65 73 73 69 6F 6E 3A 30 61 [ReauthSession:0a] 09/15/19:04 - Sep 16 00:04:48.407: RADIUS: 30 31 36 34 31 35 30 30 30 30 30 30 30 41 35 34 [0164150000000A54] 09/15/19:04 - Sep 16 00:04:48.407: RADIUS: 31 37 37 45 41 30 [ 177EA0] 09/15/19:04 - Sep 16 00:04:48.407: RADIUS: Class [25] 50 09/15/19:04 - Sep 16 00:04:48.407: RADIUS: 43 41 43 53 3A 30 61 30 31 36 34 31 35 30 30 30 [CACS:0a016415000] 09/15/19:04 - Sep 16 00:04:48.407: RADIUS: 30 30 30 30 41 35 34 31 37 37 45 41 30 3A 69 73 [0000A54177EA0:is] 09/15/19:04 - Sep 16 00:04:48.407: RADIUS: 65 2F 31 39 39 39 30 39 35 32 39 2F 31 37 36 36 [ e/199909529/1766] 09/15/19:04 - Sep 16 00:04:48.407: RADIUS: Message-Authenticato[80] 18 09/15/19:04 - Sep 16 00:04:48.407: RADIUS: 04 4C 7A 4A E4 7F 97 D7 CE 33 BA 45 E9 E8 55 D1 [ LzJ3EU] 09/15/19:04 - Sep 16 00:04:48.407: RADIUS: Vendor, Cisco [26] 36 09/15/19:04 - Sep 16 00:04:48.407: RADIUS: Cisco AVpair [1] 30 "ip:inacl#1=permit ip any any" 09/15/19:04 - Sep 16 00:04:48.407: RADIUS(00000000): Received from id 1645/49 09/15/19:04 - Sep 16 00:04:48.407: %EPM-6-AAA: POLICY xACSACLx-IP-PERMIT_ALL_TRAFFIC-517998c3| EVENT DOWNLOAD-SUCCESS 09/15/19:04 - Sep 16 00:04:48.428: AUTH-EVENT: UP SVM CB resp 0xD1000016 Client Ctx:0x7808680 09/15/19:04 - Sep 16 00:04:48.428: AUTH-EVENT: [0c85.253e.9229, Gi0/2] User Profile applied for 0xD1000016 - ASYNC 09/15/19:04 - Sep 16 00:04:48.428: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Queued RESUME_PROCESSING event for 0xD1000016(0c85.253e.9229) - User Profile Application(1) 09/15/19:04 - Sep 16 00:04:48.428: %EPM-6-IPEVENT: IP 0.0.0.0| MAC 0c85.253e.9229| AuditSessionID AC1869FC00000030265556C0| EVENT IP-WAIT 09/15/19:04 - Sep 16 00:04:48.428: AUTH-EVENT: Handling ASYNC RESUME for handle 0xD1000016 09/15/19:04 - Sep 16 00:04:48.428: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Dequeueing event(s): block on User Profile Application(1) / clear on User Profile Application(1) for 0c85.253e.9229 09/15/19:04 - Sep 16 00:04:48.428: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Dequeueing message RX_METHOD_AUTHC_SUCCESS 09/15/19:04 - Sep 16 00:04:48.428: AUTH-EVENT: Handling client event RX_METHOD_AUTHC_SUCCESS (3) for PRE, handle 0xD1000016 09/15/19:04 - Sep 16 00:04:48.428: AUTH-EVENT: PRE will return asynchronous response for RX_METHOD_AUTHC_SUCCESS on D1000016 09/15/19:04 - Sep 16 00:04:48.428: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Policy event will be processed asynchronously for 0xD1000016 09/15/19:04 - Sep 16 00:04:48.428: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Block events for 0c85.253e.9229 pending async PRE Event Handling for AuthC Success (3). 09/15/19:04 - Sep 16 00:04:48.433: AUTH-EVENT: Rcvd IPC call for pre 0xD9000002, inst 0x22010042, hdl 0x1D01004D 09/15/19:04 - Sep 16 00:04:48.433: AUTH-EVENT: Raising ext evt Template Activated (9) on session 0xD1000016, client mab (19), hdl 0x00000000, attr_list 0x9F000CFA 09/15/19:04 - Sep 16 00:04:48.433: AUTH-EVENT: Handling PRE async callback, pre 0xD9000002, inst 0x22010042, pre hdl 0x1D01004D, session handle 0x00000000 09/15/19:04 - Sep 16 00:04:48.433: AUTH-EVENT: [0c85.253e.9229, Gi0/2] PRE Return ASYNC SUCCESS for 0xD1000016 09/15/19:04 - Sep 16 00:04:48.433: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Non-client-based generic callback for 0xD1000016 09/15/19:04 - Sep 16 00:04:48.433: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Processing default action(s) for event RX_METHOD_AUTHC_SUCCESS for session 0xD1000016. 09/15/19:04 - Sep 16 00:04:48.433: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Executing default action handler for AUTHC SUCCESS (0xD1000016) 09/15/19:04 - Sep 16 00:04:48.433: AUTH-EVENT: [0c85.253e.9229, Gi0/2] AUTHC_SUCCESS - authorize by default 09/15/19:04 - Sep 16 00:04:48.433: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Signalling Authz success for client 0c85.253e.9229 09/15/19:04 - Sep 16 00:04:48.433: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Client 0c85.253e.9229, Context c 09/15/19:04 - MS-C3560-1(config-if)#hanging state from 'Authc Success' to 'Authz Success' 09/15/19:04 - Sep 16 00:04:48.433: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Processing SM CB request for 0xD1000016: Event: Authorize request (166) 09/15/19:04 - Sep 16 00:04:48.433: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] Create attr list, session 0xD1000016: 09/15/19:04 - Sep 16 00:04:48.433: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] - adding MAC 0c85.253e.9229 09/15/19:04 - Sep 16 00:04:48.433: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] - adding Swidb 0x5C610F8 09/15/19:04 - Sep 16 00:04:48.433: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] - adding AAA_ID=30 09/15/19:04 - Sep 16 00:04:48.433: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] - adding Audit_sid=AC1869FC00000030265556C0 09/15/19:04 - Sep 16 00:04:48.433: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] - adding Domain=DATA (1) 09/15/19:04 - Sep 16 00:04:48.439: AUTH-DETAIL: [0c85.253e.9229, Gi0/2] - adding Username=0C-85-25-3E-92-29 09/15/19:04 - Sep 16 00:04:48.444: AUTH-EVENT: [Gi0/2] Client MAC count: 1, 1 not being deleted 09/15/19:04 - Sep 16 00:04:48.444: AUTH-EVENT: [Gi0/2] Domain authorized client count: 1 09/15/19:04 - Sep 16 00:04:48.444: AUTH-EVENT: [Gi0/2] No authorized client found in domain [VOICE] 09/15/19:04 - Sep 16 00:04:48.444: AUTH-EVENT: [Gi0/2] Domain authorized client count: 0 09/15/19:04 - Sep 16 00:04:48.444: AUTH-EVENT: [Gi0/2] Authorized client count: 1 09/15/19:04 - Sep 16 00:04:48.444: AUTH-EVENT: Started Auth Manager tick timer 09/15/19:04 - Sep 16 00:04:48.444: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Started Switch (0) timer (1s) for client 0c85.253e.9229 09/15/19:04 - Sep 16 00:04:48.444: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Queued RESUME_PROCESSING event for 0xD1000016(0c85.253e.9229) - PRE Event Handling(75804060) 09/15/19:04 - Sep 16 00:04:48.444: AUTH-EVENT: [0c85.253e.9229, Gi0/2] PRE proc finished, queued RESUME_PROCESSING for 0xD1000016(0c85.253e.9229) 09/15/19:04 - Sep 16 00:04:48.444: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Queuing external PRE event Template Activated for context 0xD1000016 09/15/19:04 - Sep 16 00:04:48.444: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Queueing event EXTERNAL_PRE_EVENT(25) for 0xD1000016 - process in turn later 09/15/19:04 - Sep 16 00:04:48.444: AUTH-EVENT: Handling ASYNC RESUME for handle 0xD1000016 09/15/19:04 - Sep 16 00:04:48.444: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Dequeueing event(s): block on PRE Event Handling(3) / clear on PRE Event Handling(75804060) for 0c85.253e.9229 09/15/19:04 - Sep 16 00:04:48.444: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Dequeueing message RX_IDENTITY_UPDATE 09/15/19:04 - Sep 16 00:04:48.449: AUTH-EVENT: Handling client event RX_IDENTITY_UPDATE (17) for PRE, handle 0xD1000016 09/15/19:04 - Sep 16 00:04:48.449: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Policy event will be processed synchronously for 0xD1000016 09/15/19:04 - Sep 16 00:04:48.449: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Processing default action(s) for event RX_IDENTITY_UPDATE for session 0xD1000016. 09/15/19:04 - Sep 16 00:04:48.449: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Dequeueing message EXTERNAL_PRE_EVENT 09/15/19:04 - Sep 16 00:04:48.449: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Handling external PRE event Template Activated for context 0xD1000016. 09/15/19:04 - Sep 16 00:04:48.449: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Unblock events for 0c85.253e.9229. 09/15/19:04 - Sep 16 00:04:49.471: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Switch timer (0) expired for client 0c85.253e.9229 09/15/19:04 - Sep 16 00:04:49.471: AUTH-SYNC: [0c85.253e.9229, Gi0/2] Delay add/update sync of method for 0c85.253e.9229 / 0xD1000016 09/15/19:04 - Sep 16 00:04:49.471: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Authz complete (SUCCESS) for client 0c85.253e.9229/0xD1000016 reported 09/15/19:04 - Sep 16 00:04:49.471: AUTH-EVENT: Raised event AUTHZ_SUCCESS (10) on handle 0xD1000016 09/15/19:04 - Sep 16 00:04:49.471: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Received internal event AUTHZ_SUCCESS (handle 0xD1000016) 09/15/19:04 - Sep 16 00:04:49.471: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Processing AUTHZ_CB RESULT (success) for 0xD1000016 09/15/19:04 - Sep 16 00:04:49.471: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Processing SM CB request for 0xD1000016: Event: Authz result pro 09/15/19:04 - MS-C3560-1(config-if)#cessed (165) 09/15/19:04 - Sep 16 00:04:49.471: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Authz result processed, result: 0 09/15/19:04 - Sep 16 00:04:49.471: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Device name doesn't exist for the session 09/15/19:04 - Sep 16 00:04:49.471: AUTH-EVENT: [0c85.253e.9229, Gi0/2] IPV4 address doesn't exist for the session 09/15/19:04 - Sep 16 00:04:49.471: AUTH-EVENT: [0c85.253e.9229, Gi0/2] VLAN doesn't exist for the session 09/15/19:04 - Sep 16 00:04:49.471: AUTH-EVENT: [0c85.253e.9229, Gi0/2] AUTH state doesn't exist for the session 09/15/19:04 - Sep 16 00:04:49.471: AUTH-EVENT: Unable to provid attr 1125 for the for the session 0xD1000016 09/15/19:04 - Sep 16 00:04:49.471: AUTH-ERROR: Unable to add aaa attr 1125 09/15/19:04 - Sep 16 00:04:49.471: AUTH-EVENT: Unable to provid attr 1126 for the for the session 0xD1000016 09/15/19:04 - Sep 16 00:04:49.471: AUTH-ERROR: Unable to add aaa attr 1126 09/15/19:04 - Sep 16 00:04:49.471: AUTH-EVENT: Unable to provid attr 1127 for the for the session 0xD1000016 09/15/19:04 - Sep 16 00:04:49.471: AUTH-ERROR: Unable to add aaa attr 1127 09/15/19:04 - Sep 16 00:04:49.471: AUTH-EVENT: Unable to provid attr 1128 for the for the session 0xD1000016 09/15/19:04 - Sep 16 00:04:49.471: AUTH-ERROR: Unable to add aaa attr 1128 09/15/19:04 - Sep 16 00:04:49.471: AUTH-EVENT: Unable to provid attr 1129 for the for the session 0xD1000016 09/15/19:04 - Sep 16 00:04:49.471: AUTH-ERROR: Unable to add aaa attr 1129 09/15/19:04 - Sep 16 00:04:49.471: AUTH-EVENT: No client is registered as attr provider for the attribute 1248 for session 0xD1000016 09/15/19:04 - Sep 16 00:04:49.477: AUTH-EVENT: Started Auth Manager tick timer 09/15/19:04 - Sep 16 00:04:49.477: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Started Accounting (0) timer (300s) for client 0c85.253e.9229 09/15/19:04 - Sep 16 00:04:49.477: AUTH-EVENT: [0c85.253e.9229, Gi0/2] SM Reauth Plugin: Client authz change, result=Success 09/15/19:04 - Sep 16 00:04:49.477: AUTH-SYNC: [0c85.253e.9229, Gi0/2] Sync_data->reauth_on_sso = 0 09/15/19:04 - Sep 16 00:04:49.477: AUTH-SYNC: [0c85.253e.9229, Gi0/2] Syncing update for context (0c85.253e.9229) - method MAB 09/15/19:04 - Sep 16 00:04:49.477: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Signalling Authz complete (success) for client 0xD1000016 09/15/19:04 - Sep 16 00:04:49.477: AUTH-EVENT: CISP Auth run ignored as not registered 09/15/19:04 - Sep 16 00:04:49.477: RADIUS/ENCODE(00000000):Orig. component type = Invalid 09/15/19:04 - Sep 16 00:04:49.477: RADIUS(00000000): Config NAS IP: 10.1.100.252 09/15/19:04 - Sep 16 00:04:49.477: RADIUS(00000000): sending 09/15/19:04 - Sep 16 00:04:49.477: RADIUS(00000000): Send Accounting-Request to 10.1.100.21:1646 id 1646/112, len 452 09/15/19:04 - Sep 16 00:04:49.477: RADIUS: authenticator 27 A7 79 CB 0E D0 F5 43 - F4 0C D1 65 F5 B9 3B D5 09/15/19:04 - Sep 16 00:04:49.477: RADIUS: Vendor, Cisco [26] 22 09/15/19:04 - Sep 16 00:04:49.477: RADIUS: Cisco AVpair [1] 16 "cdp-tlv= " 09/15/19:04 - Sep 16 00:04:49.477: RADIUS: Vendor, Cisco [26] 21 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Cisco AVpair [1] 15 "cdp-tlv= " 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Vendor, Cisco [26] 24 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Cisco AVpair [1] 18 "cdp-tlv= " 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Vendor, Cisco [26] 28 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Cisco AVpair [1] 22 "cdp-tlv= " 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Vendor, Cisco [26] 23 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Cisco AVpair [1] 17 "cdp-tlv= " 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Vendor, Cisco [26] 39 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Cisco AVpair [1] 33 "cdp-tlv= " 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Vendor, Cisco [26] 38 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Cisco AVpair [1] 32 "cdp-tlv= " 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Vendor, Cisco [26] 24 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Cisco AVpair [1] 18 "cdp-tlv= " 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Vendor, Cisco [26] 26 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Ci 09/15/19:04 - MS-C3560-1(config-if)#sco AVpair [1] 20 "cdp-tlv= " 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Vendor, Cisco [26] 35 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Cisco AVpair [1] 29 "cdp-tlv= " 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: User-Name [1] 19 "0C-85-25-3E-92-29" 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Vendor, Cisco [26] 49 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Cisco AVpair [1] 43 "audit-session-id=AC1869FC00000030265556C0" 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Vendor, Cisco [26] 18 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Cisco AVpair [1] 12 "method=mab" 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: NAS-IP-Address [4] 6 10.1.100.252 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: NAS-Port [5] 6 60000 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: NAS-Port-Id [87] 20 "GigabitEthernet0/2" 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: NAS-Port-Type [61] 6 Ethernet [15] 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Acct-Session-Id [44] 10 "00000023" 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Acct-Status-Type [40] 6 Start [1] 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Event-Timestamp [55] 6 1410825889 09/15/19:04 - Sep 16 00:04:49.482: RADIUS: Acct-Delay-Time [41] 6 0 09/15/19:04 - Sep 16 00:04:49.482: RADIUS(00000000): Sending a IPv4 Radius Packet 09/15/19:04 - Sep 16 00:04:49.487: RADIUS(00000000): Started 5 sec timeout 09/15/19:04 - Sep 16 00:04:49.692: RADIUS: Received from id 1646/112 10.1.100.21:1646, Accounting-response, len 20 09/15/19:04 - Sep 16 00:04:49.692: RADIUS: authenticator D5 9A 7B 46 2F B0 E6 C6 - D2 F5 F3 B2 55 45 D2 6C 09/15/19:04 - Sep 16 00:04:49.702: AUTH-EVENT: Auth-mgr aaa_acct_reply 09/15/19:05 - MS-C3560-1(config-if)# 09/15/19:05 - Sep 16 00:05:08.321: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Received internal event SINGLE_ID_UPDATE (handle 0xD1000016) 09/15/19:05 - Sep 16 00:05:08.321: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Device name doesn't exist for the session 09/15/19:05 - Sep 16 00:05:08.321: AUTH-EVENT: [0c85.253e.9229, Gi0/2] VLAN doesn't exist for the session 09/15/19:05 - Sep 16 00:05:08.321: AUTH-EVENT: [0c85.253e.9229, Gi0/2] AUTH state doesn't exist for the session 09/15/19:05 - Sep 16 00:05:08.321: AUTH-EVENT: Unable to provid attr 1125 for the for the session 0xD1000016 09/15/19:05 - Sep 16 00:05:08.321: AUTH-ERROR: Unable to add aaa attr 1125 09/15/19:05 - Sep 16 00:05:08.321: AUTH-EVENT: Unable to provid attr 1126 for the for the session 0xD1000016 09/15/19:05 - Sep 16 00:05:08.321: AUTH-ERROR: Unable to add aaa attr 1126 09/15/19:05 - Sep 16 00:05:08.321: AUTH-EVENT: Unable to provid attr 1127 for the for the session 0xD1000016 09/15/19:05 - Sep 16 00:05:08.321: AUTH-ERROR: Unable to add aaa attr 1127 09/15/19:05 - Sep 16 00:05:08.321: AUTH-EVENT: Unable to provid attr 1128 for the for the session 0xD1000016 09/15/19:05 - Sep 16 00:05:08.326: AUTH-ERROR: Unable to add aaa attr 1128 09/15/19:05 - Sep 16 00:05:08.326: AUTH-EVENT: Unable to provid attr 1129 for the for the session 0xD1000016 09/15/19:05 - Sep 16 00:05:08.326: AUTH-ERROR: Unable to add aaa attr 1129 09/15/19:05 - Sep 16 00:05:08.326: AUTH-EVENT: No client is registered as attr provider for the attribute 1248 for session 0xD1000016 09/15/19:05 - Sep 16 00:05:08.326: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Session method ctx missing for connection handle 17 09/15/19:05 - Sep 16 00:05:08.326: AUTH-SYNC: [0c85.253e.9229, Gi0/2] Delay add/update sync of addr for 0c85.253e.9229 / 0xD1000016 09/15/19:05 - Sep 16 00:05:08.326: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Received internal event SINGLE_ID_UPDATE (handle 0xD1000016) 09/15/19:05 - Sep 16 00:05:08.326: AUTH-SYNC: [0c85.253e.9229, Gi0/2] Delay add/update sync of addr for 0c85.253e.9229 / 0xD1000016 09/15/19:05 - Sep 16 00:05:08.326: RADIUS/ENCODE(00000000):Orig. component type = Invalid 09/15/19:05 - Sep 16 00:05:08.326: RADIUS(00000000): Config NAS IP: 10.1.100.252 09/15/19:05 - Sep 16 00:05:08.326: RADIUS(00000000): sending 09/15/19:05 - Sep 16 00:05:08.332: %EPM-6-POLICY_APP_SUCCESS: Policy Application succeded for Client [172.31.3.4] MAC [0c85.253e.9229] AuditSession ID [AC1869FC00000030265556C0] for POLICY_TYPE [Named Acl] POLICY_NAME [xACSACLx-IP-PERMIT_ALL_TRAFFIC-517998c3] 09/15/19:05 - Sep 16 00:05:08.332: %EPM-6-IPEVENT: IP 172.31.3.4| MAC 0c85.253e.9229| AuditSessionID AC1869FC00000030265556C0| EVENT IP-ASSIGN 09/15/19:05 - Sep 16 00:05:08.332: RADIUS(00000000): Send Accounting-Request to 10.1.100.21:1646 id 1646/113, len 482 09/15/19:05 - Sep 16 00:05:08.332: RADIUS: authenticator 09 A4 0B 9F 3A 9D 4F 0A - EC 55 D2 B2 F9 B1 9D 05 09/15/19:05 - Sep 16 00:05:08.332: RADIUS: Vendor, Cisco [26] 22 09/15/19:05 - Sep 16 00:05:08.332: RADIUS: Cisco AVpair [1] 16 "cdp-tlv= " 09/15/19:05 - Sep 16 00:05:08.332: RADIUS: Vendor, Cisco [26] 21 09/15/19:05 - Sep 16 00:05:08.332: RADIUS: Cisco AVpair [1] 15 "cdp-tlv= " 09/15/19:05 - Sep 16 00:05:08.332: RADIUS: Vendor, Cisco [26] 24 09/15/19:05 - Sep 16 00:05:08.332: RADIUS: Cisco AVpair [1] 18 "cdp-tlv= " 09/15/19:05 - Sep 16 00:05:08.332: RADIUS: Vendor, Cisco [26] 28 09/15/19:05 - Sep 16 00:05:08.332: RADIUS: Cisco AVpair [1] 22 "cdp-tlv= " 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Vendor, Cisco [26] 23 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Cisco AVpair [1] 17 "cdp-tlv= " 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Vendor, Cisco [26] 39 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Cisco AVpair [1] 33 "cdp-tlv= " 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Vendor, Cisco [26] 38 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Cisco AVpair [1] 32 "cdp-tlv= " 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Vendor, Cisco [26] 24 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Cisco AVpair [1] 18 "cdp-tlv= " 09/15/19:05 - Sep 16 00:05:08.337: RADIU 09/15/19:05 - MS-C3560-1(config-if)#S: Vendor, Cisco [26] 26 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Cisco AVpair [1] 20 "cdp-tlv= " 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Vendor, Cisco [26] 35 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Cisco AVpair [1] 29 "cdp-tlv= " 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: User-Name [1] 19 "0C-85-25-3E-92-29" 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Vendor, Cisco [26] 49 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Cisco AVpair [1] 43 "audit-session-id=AC1869FC00000030265556C0" 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Vendor, Cisco [26] 18 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Cisco AVpair [1] 12 "method=mab" 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: NAS-IP-Address [4] 6 10.1.100.252 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: NAS-Port [5] 6 60000 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: NAS-Port-Id [87] 20 "GigabitEthernet0/2" 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: NAS-Port-Type [61] 6 Ethernet [15] 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Acct-Session-Id [44] 10 "00000023" 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Framed-IP-Address [8] 6 172.31.3.4 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Acct-Status-Type [40] 6 Watchdog [3] 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Event-Timestamp [55] 6 1410825908 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Acct-Input-Octets [42] 6 12911390 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Acct-Output-Octets [43] 6 95321879 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Acct-Input-Packets [47] 6 78574 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Acct-Output-Packets [48] 6 165047 09/15/19:05 - Sep 16 00:05:08.337: RADIUS: Acct-Delay-Time [41] 6 0 09/15/19:05 - Sep 16 00:05:08.337: RADIUS(00000000): Sending a IPv4 Radius Packet 09/15/19:05 - Sep 16 00:05:08.342: RADIUS(00000000): Started 5 sec timeout 09/15/19:05 - Sep 16 00:05:08.347: RADIUS: Received from id 1646/113 10.1.100.21:1646, Accounting-response, len 20 09/15/19:05 - Sep 16 00:05:08.347: RADIUS: authenticator BB 03 20 3E 77 6F DA 4D - 1F 88 D2 6F 0B F8 AC E0 09/15/19:05 - Sep 16 00:05:08.347: AUTH-EVENT: Auth-mgr aaa_acct_reply 09/15/19:05 - Sep 16 00:05:08.384: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Received internal event SINGLE_ID_UPDATE (handle 0xD1000016) 09/15/19:05 - Sep 16 00:05:08.384: AUTH-SYNC: [0c85.253e.9229, Gi0/2] Delay add/update sync of addr for 0c85.253e.9229 / 0xD1000016 09/15/19:05 - Sep 16 00:05:08.384: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Received internal event SINGLE_ID_UPDATE (handle 0xD1000016) 09/15/19:05 - Sep 16 00:05:08.384: AUTH-SYNC: [0c85.253e.9229, Gi0/2] Delay add/update sync of addr for 0c85.253e.9229 / 0xD1000016 09/15/19:05 - MS-C3560-1(config-if)# 09/15/19:05 - MS-C3560-1(config-if)# 09/15/19:05 - MS-C3560-1(config-if)# 09/15/19:05 - MS-C3560-1(config-if)# 09/15/19:05 - MS-C3560-1(config-if)# 09/15/19:05 - MS-C3560-1(config-if)# 09/15/19:05 - MS-C3560-1(config-if)# 09/15/19:05 - MS-C3560-1(config-if)#end 09/15/19:05 - MS-C3560-1# 09/15/19:05 - Sep 16 00:05:16.810: AAA/AUTHOR: auth_need : user= 'axtel' ruser= 'MS-C3560-1'rem_addr= '172.18.2.1' priv= 0 list= '' AUTHOR-TYPE= 'commands' 09/15/19:05 - MS-C3560-1# 09/15/19:05 - Sep 16 00:05:16.810: %SYS-5-CONFIG_I: Configured from console by axtel on vty0 (172.18.2.1) 09/15/19:05 - MS-C3560-1# 09/15/19:05 - MS-C3560-1# 09/15/19:05 - MS-C3560-1#show authentication sessions interface gig0/2 details 09/15/19:05 - Interface: GigabitEthernet0/2 09/15/19:05 - MAC Address: 0c85.253e.9229 09/15/19:05 - IPv6 Address: Unknown 09/15/19:05 - IPv4 Address: 172.31.3.4 09/15/19:05 - User-Name: 0C-85-25-3E-92-29 09/15/19:05 - Status: Authorized 09/15/19:05 - Domain: DATA 09/15/19:05 - Oper host mode: single-host 09/15/19:05 - Oper control dir: both 09/15/19:05 - Session timeout: N/A 09/15/19:05 - Common Session ID: AC1869FC00000030265556C0 09/15/19:05 - Acct Session ID: 0x00000023 09/15/19:05 - Handle: 0xD1000016 09/15/19:05 - Current Policy: POLICY_Gi0/2 09/15/19:05 - 09/15/19:05 - Local Policies: 09/15/19:05 - Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150) 09/15/19:05 - Security Policy: Should Secure 09/15/19:05 - Security Status: Link Unsecure 09/15/19:05 - 09/15/19:05 - Server Policies: 09/15/19:05 - ACS ACL: xACSACLx-IP-PERMIT_ALL_TRAFFIC-517998c3 09/15/19:05 - 09/15/19:05 - Method status list: 09/15/19:05 - Method State 09/15/19:05 - mab Authc Success 09/15/19:05 - 09/15/19:05 - MS-C3560-1# 09/15/19:05 - MS-C3560-1# 09/15/19:05 - Sep 16 00:05:23.579: AAA/AUTHOR: auth_need : user= 'axtel' ruser= 'MS-C3560-1'rem_addr= '172.18.2.1' priv= 15 list= '' AUTHOR-TYPE= 'commands' 09/15/19:05 - MS-C3560-1# 09/15/19:05 - MS-C3560-1# 09/15/19:05 - MS-C3560-1#show authentication sessions interface gig0/2 details 09/15/19:05 - Interface: GigabitEthernet0/2 09/15/19:05 - MAC Address: 0c85.253e.9229 09/15/19:05 - IPv6 Address: Unknown 09/15/19:05 - IPv4 Address: 172.31.3.4 09/15/19:05 - User-Name: 0C-85-25-3E-92-29 09/15/19:05 - Status: Authorized 09/15/19:05 - Domain: DATA 09/15/19:05 - Oper host mode: single-host 09/15/19:05 - Oper control dir: both 09/15/19:05 - Session timeout: N/A 09/15/19:05 - Common Session ID: AC1869FC00000030265556C0 09/15/19:05 - Acct Session ID: 0x00000023 09/15/19:05 - Handle: 0xD1000016 09/15/19:05 - Current Policy: POLICY_Gi0/2 09/15/19:05 - 09/15/19:05 - Local Policies: 09/15/19:05 - Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150) 09/15/19:05 - Security Policy: Should Secure 09/15/19:05 - Security Status: Link Unsecure 09/15/19:05 - 09/15/19:05 - Server Policies: 09/15/19:05 - ACS ACL: xACSACLx-IP-PERMIT_ALL_TRAFFIC-517998c3 09/15/19:05 - 09/15/19:05 - Method status list: 09/15/19:05 - Method State 09/15/19:05 - mab Authc Success 09/15/19:05 - 09/15/19:05 - MS-C3560-1# 09/15/19:05 - MS-C3560-1# 09/15/19:05 - Sep 16 00:05:34.774: AAA/AUTHOR: auth_need : user= 'axtel' ruser= 'MS-C3560-1'rem_addr= '172.18.2.1' priv= 15 list= '' AUTHOR-TYPE= 'commands' 09/15/19:05 - MS-C3560-1# 09/15/19:05 - MS-C3560-1# 09/15/19:05 - MS-C3560-1#show authentication sessions interface gig0/2 details 09/15/19:05 - Interface: GigabitEthernet0/2 09/15/19:05 - MAC Address: 0c85.253e.9229 09/15/19:05 - IPv6 Address: Unknown 09/15/19:05 - IPv4 Address: 172.31.3.4 09/15/19:05 - User-Name: 0C-85-25-3E-92-29 09/15/19:05 - Status: Authorized 09/15/19:05 - Domain: DATA 09/15/19:05 - Oper host mode: single-host 09/15/19:05 - Oper control dir: both 09/15/19:05 - Session timeout: N/A 09/15/19:05 - Common Session ID: AC1869FC00000030265556C0 09/15/19:05 - Acct Session ID: 0x00000023 09/15/19:05 - Handle: 0xD1000016 09/15/19:05 - Current Policy: POLICY_Gi0/2 09/15/19:05 - 09/15/19:05 - Local Policies: 09/15/19:05 - Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150) 09/15/19:05 - Security Policy: Should Secure 09/15/19:05 - Security Status: Link Unsecure 09/15/19:05 - 09/15/19:05 - Server Policies: 09/15/19:05 - ACS ACL: xACSACLx-IP-PERMIT_ALL_TRAFFIC-517998c3 09/15/19:05 - 09/15/19:05 - Method status list: 09/15/19:05 - Method State 09/15/19:05 - mab Authc Success 09/15/19:05 - 09/15/19:05 - MS-C3560-1# 09/15/19:05 - MS-C3560-1# 09/15/19:05 - Sep 16 00:05:41.815: AAA/AUTHOR: auth_need : user= 'axtel' ruser= 'MS-C3560-1'rem_addr= '172.18.2.1' priv= 15 list= '' AUTHOR-TYPE= 'commands' 09/15/19:05 - MS-C3560-1# 09/15/19:05 - MS-C3560-1#show authentication sessions interface gig0/2 details 09/15/19:05 - Interface: GigabitEthernet0/2 09/15/19:05 - MAC Address: 0c85.253e.9229 09/15/19:05 - IPv6 Address: Unknown 09/15/19:05 - IPv4 Address: 172.31.3.4 09/15/19:05 - User-Name: 0C-85-25-3E-92-29 09/15/19:05 - Status: Authorized 09/15/19:05 - Domain: DATA 09/15/19:05 - Oper host mode: single-host 09/15/19:05 - Oper control dir: both 09/15/19:05 - Session timeout: N/A 09/15/19:05 - Common Session ID: AC1869FC00000030265556C0 09/15/19:05 - Acct Session ID: 0x00000023 09/15/19:05 - Handle: 0xD1000016 09/15/19:05 - Current Policy: POLICY_Gi0/2 09/15/19:05 - 09/15/19:05 - Local Policies: 09/15/19:05 - Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150) 09/15/19:05 - Security Policy: Should Secure 09/15/19:05 - Security Status: Link Unsecure 09/15/19:05 - 09/15/19:05 - Server Policies: 09/15/19:05 - ACS ACL: xACSACLx-IP-PERMIT_ALL_TRAFFIC-517998c3 09/15/19:05 - 09/15/19:05 - Method status list: 09/15/19:05 - Method State 09/15/19:05 - mab Authc Success 09/15/19:05 - 09/15/19:05 - MS-C3560-1# 09/15/19:05 - MS-C3560-1# 09/15/19:05 - MS-C3560-1# 09/15/19:05 - Sep 16 00:05:46.492: AAA/AUTHOR: auth_need : user= 'axtel' ruser= 'MS-C3560-1'rem_addr= '172.18.2.1' priv= 15 list= '' AUTHOR-TYPE= 'commands' 09/15/19:05 - MS-C3560-1#show authentication sessions interface gig0/2 details 09/15/19:05 - Interface: GigabitEthernet0/2 09/15/19:05 - MAC Address: 0c85.253e.9229 09/15/19:05 - IPv6 Address: Unknown 09/15/19:05 - IPv4 Address: 172.31.3.4 09/15/19:05 - User-Name: 0C-85-25-3E-92-29 09/15/19:05 - Status: Authorized 09/15/19:05 - Domain: DATA 09/15/19:05 - Oper host mode: single-host 09/15/19:05 - Oper control dir: both 09/15/19:05 - Session timeout: N/A 09/15/19:05 - Common Session ID: AC1869FC00000030265556C0 09/15/19:05 - Acct Session ID: 0x00000023 09/15/19:05 - Handle: 0xD1000016 09/15/19:05 - Current Policy: POLICY_Gi0/2 09/15/19:05 - 09/15/19:05 - Local Policies: 09/15/19:05 - Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150) 09/15/19:05 - Security Policy: Should Secure 09/15/19:05 - Security Status: Link Unsecure 09/15/19:05 - 09/15/19:05 - Server Policies: 09/15/19:05 - ACS ACL: xACSACLx-IP-PERMIT_ALL_TRAFFIC-517998c3 09/15/19:05 - 09/15/19:05 - Method status list: 09/15/19:05 - Method State 09/15/19:05 - mab Authc Success 09/15/19:05 - 09/15/19:05 - MS-C3560-1# 09/15/19:05 - Sep 16 00:05:50.388: AAA/AUTHOR: auth_need : user= 'axtel' ruser= 'MS-C3560-1'rem_addr= '172.18.2.1' priv= 15 list= '' AUTHOR-TYPE= 'commands' 09/15/19:05 - MS-C3560-1# 09/15/19:05 - Sep 16 00:06:00.953: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Received internal event MULTI_ID_UPDATE (handle 0xD1000016) 09/15/19:05 - Sep 16 00:06:00.953: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Device name doesn't exist for the session 09/15/19:05 - Sep 16 00:06:00.953: AUTH-EVENT: [0c85.253e.9229, Gi0/2] VLAN doesn't exist for the session 09/15/19:05 - Sep 16 00:06:00.953: AUTH-EVENT: [0c85.253e.9229, Gi0/2] AUTH state doesn't exist for the session 09/15/19:05 - Sep 16 00:06:00.953: AUTH-EVENT: Unable to provid attr 1125 for the for the session 0xD1000016 09/15/19:05 - Sep 16 00:06:00.953: AUTH-ERROR: Unable to add aaa attr 1125 09/15/19:05 - Sep 16 00:06:00.953: AUTH-EVENT: Unable to provid attr 1126 for the for the session 0xD1000016 09/15/19:05 - Sep 16 00:06:00.953: AUTH-ERROR: Unable to add aaa attr 1126 09/15/19:05 - Sep 16 00:06:00.953: AUTH-EVENT: Unable to provid attr 1127 for the for the session 0xD1000016 09/15/19:05 - Sep 16 00:06:00.953: AUTH-ERROR: Unable to add aaa attr 1127 09/15/19:05 - Sep 16 00:06:00.953: AUTH-EVENT: Unable to provid attr 1128 for the for the session 0xD1000016 09/15/19:05 - Sep 16 00:06:00.953: AUTH-ERROR: Unable to add aaa attr 1128 09/15/19:05 - Sep 16 00:06:00.953: AUTH-EVENT: Unable to provid attr 1129 for the for the session 0xD1000016 09/15/19:05 - Sep 16 00:06:00.953: AUTH-ERROR: Unable to add aaa attr 1129 09/15/19:05 - Sep 16 00:06:00.953: AUTH-EVENT: No client is registered as attr provider for the attribute 1248 for session 0xD1000016 09/15/19:05 - Sep 16 00:06:00.959: AUTH-SYNC: [0c85.253e.9229, Gi0/2] Delay add/update sync of cdp-tlv for 0c85.253e.9229 / 0xD1000016 09/15/19:05 - Sep 16 00:06:00.959: RADIUS/ENCODE(00000000):Orig. component type = Invalid 09/15/19:05 - Sep 16 00:06:00.959: RADIUS(00000000): Config NAS IP: 10.1.100.252 09/15/19:05 - Sep 16 00:06:00.959: RADIUS(00000000): sending 09/15/19:05 - Sep 16 00:06:00.959: RADIUS(00000000): Send Accounting-Request to 10.1.100.21:1646 id 1646/114, len 491 09/15/19:05 - Sep 16 00:06:00.959: RADIUS: authenticator EE 3D 1F 66 BA 70 17 2E - CB BB 0E ED 25 F8 01 DC 09/15/19:05 - Sep 16 00:06:00.959: RADIUS: Vendor, Cisco [26] 33 09/15/19:05 - Sep 16 00:06:00.959: RADIUS: Cisco AVpair [1] 27 "cdp-tlv= " 09/15/19:05 - Sep 16 00:06:00.959: RADIUS: Vendor, Cisco [26] 22 09/15/19:05 - Sep 16 00:06:00.959: RADIUS: Cisco AVpair [1] 16 "cdp-tlv= " 09/15/19:05 - Sep 16 00:06:00.959: RADIUS: Vendor, Cisco [26] 21 09/15/19:05 - Sep 16 00:06:00.959: RADIUS: Cisco AVpair [1] 15 "cdp-tlv= " 09/15/19:05 - Sep 16 00:06:00.959: RADIUS: Vendor, Cisco [26] 28 09/15/19:05 - Sep 16 00:06:00.959: RADIUS: Cisco AVpair [1] 22 "cdp-tlv= " 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Vendor, Cisco [26] 23 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Cisco AVpair [1] 17 "cdp-tlv= " 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Vendor, Cisco [26] 39 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Cisco AVpair [1] 33 "cdp-tlv= " 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Vendor, Cisco [26] 38 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Cisco AVpair [1] 32 "cdp-tlv= " 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Vendor, Cisco [26] 24 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Cisco AVpair [1] 18 "cdp-tlv= " 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Vendor, Cisco [26] 26 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Cisco AVpair [1] 20 "cdp-tlv= " 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Vendor, Cisco [26] 35 09/15/19:05 - MS-C3560-1# 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Cisco AVpair [1] 29 "cdp-tlv= " 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Framed-IP-Address [8] 6 172.31.3.4 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: User-Name [1] 19 "0C-85-25-3E-92-29" 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Vendor, Cisco [26] 49 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Cisco AVpair [1] 43 "audit-session-id=AC1869FC00000030265556C0" 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Vendor, Cisco [26] 18 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Cisco AVpair [1] 12 "method=mab" 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: NAS-IP-Address [4] 6 10.1.100.252 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: NAS-Port [5] 6 60000 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: NAS-Port-Id [87] 20 "GigabitEthernet0/2" 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: NAS-Port-Type [61] 6 Ethernet [15] 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Acct-Session-Id [44] 10 "00000023" 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Acct-Status-Type [40] 6 Watchdog [3] 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Event-Timestamp [55] 6 1410825960 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Acct-Input-Octets [42] 6 12924912 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Acct-Output-Octets [43] 6 95628961 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Acct-Input-Packets [47] 6 78687 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Acct-Output-Packets [48] 6 165368 09/15/19:05 - Sep 16 00:06:00.964: RADIUS: Acct-Delay-Time [41] 6 0 09/15/19:05 - Sep 16 00:06:00.964: RADIUS(00000000): Sending a IPv4 Radius Packet 09/15/19:05 - Sep 16 00:06:00.969: RADIUS(00000000): Started 5 sec timeout 09/15/19:05 - Sep 16 00:06:00.974: RADIUS: Received from id 1646/114 10.1.100.21:1646, Accounting-response, len 20 09/15/19:05 - Sep 16 00:06:00.974: RADIUS: authenticator 51 DB 3B 11 47 95 3D EE - 82 68 1A 76 F1 36 69 56 09/15/19:05 - Sep 16 00:06:00.974: AUTH-EVENT: Auth-mgr aaa_acct_reply 09/15/19:05 - MS-C3560-1# 09/15/19:05 - MS-C3560-1# 09/15/19:05 - MS-C3560-1# 09/15/19:05 - MS-C3560-1# 09/15/19:06 - MS-C3560-1#show authentication sessions interface gig0/2 details 09/15/19:06 - Interface: GigabitEthernet0/2 09/15/19:06 - MAC Address: 0c85.253e.9229 09/15/19:06 - IPv6 Address: Unknown 09/15/19:06 - IPv4 Address: 172.31.3.4 09/15/19:06 - User-Name: 0C-85-25-3E-92-29 09/15/19:06 - Status: Authorized 09/15/19:06 - Domain: DATA 09/15/19:06 - Oper host mode: single-host 09/15/19:06 - Oper control dir: both 09/15/19:06 - Session timeout: N/A 09/15/19:06 - Common Session ID: AC1869FC00000030265556C0 09/15/19:06 - Acct Session ID: 0x00000023 09/15/19:06 - Handle: 0xD1000016 09/15/19:06 - Current Policy: POLICY_Gi0/2 09/15/19:06 - 09/15/19:06 - Local Policies: 09/15/19:06 - Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150) 09/15/19:06 - Security Policy: Should Secure 09/15/19:06 - Security Status: Link Unsecure 09/15/19:06 - 09/15/19:06 - Server Policies: 09/15/19:06 - ACS ACL: xACSACLx-IP-PERMIT_ALL_TRAFFIC-517998c3 09/15/19:06 - 09/15/19:06 - Method status list: 09/15/19:06 - Method State 09/15/19:06 - mab Authc Success 09/15/19:06 - 09/15/19:06 - MS-C3560-1# 09/15/19:06 - Sep 16 00:06:16.893: AAA/AUTHOR: auth_need : user= 'axtel' ruser= 'MS-C3560-1'rem_addr= '172.18.2.1' priv= 15 list= '' AUTHOR-TYPE= 'commands' 09/15/19:06 - MS-C3560-1# 09/15/19:06 - MS-C3560-1# 09/15/19:06 - MS-C3560-1# 09/15/19:06 - MS-C3560-1#show authentication sessions interface gig0/2 details 09/15/19:06 - Interface: GigabitEthernet0/2 09/15/19:06 - MAC Address: 0c85.253e.9229 09/15/19:06 - IPv6 Address: Unknown 09/15/19:06 - IPv4 Address: 172.31.3.4 09/15/19:06 - User-Name: 0C-85-25-3E-92-29 09/15/19:06 - Status: Authorized 09/15/19:06 - Domain: DATA 09/15/19:06 - Oper host mode: single-host 09/15/19:06 - Oper control dir: both 09/15/19:06 - Session timeout: N/A 09/15/19:06 - Common Session ID: AC1869FC00000030265556C0 09/15/19:06 - Acct Session ID: 0x00000023 09/15/19:06 - Handle: 0xD1000016 09/15/19:06 - Current Policy: POLICY_Gi0/2 09/15/19:06 - 09/15/19:06 - Local Policies: 09/15/19:06 - Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150) 09/15/19:06 - Security Policy: Should Secure 09/15/19:06 - Security Status: Link Unsecure 09/15/19:06 - 09/15/19:06 - Server Policies: 09/15/19:06 - ACS ACL: xACSACLx-IP-PERMIT_ALL_TRAFFIC-517998c3 09/15/19:06 - 09/15/19:06 - Method status list: 09/15/19:06 - Method State 09/15/19:06 - mab Authc Success 09/15/19:06 - 09/15/19:06 - MS-C3560-1# 09/15/19:06 - MS-C3560-1# 09/15/19:06 - Sep 16 00:06:40.912: AAA/AUTHOR: auth_need : user= 'axtel' ruser= 'MS-C3560-1'rem_addr= '172.18.2.1' priv= 15 list= '' AUTHOR-TYPE= 'commands' 09/15/19:06 - MS-C3560-1# 09/15/19:06 - MS-C3560-1#show authentication sessions interface gig0/2 details 09/15/19:06 - Interface: GigabitEthernet0/2 09/15/19:06 - MAC Address: 0c85.253e.9229 09/15/19:06 - IPv6 Address: Unknown 09/15/19:06 - IPv4 Address: 172.31.3.4 09/15/19:06 - User-Name: 0C-85-25-3E-92-29 09/15/19:06 - Status: Authorized 09/15/19:06 - Domain: DATA 09/15/19:06 - Oper host mode: single-host 09/15/19:06 - Oper control dir: both 09/15/19:06 - Session timeout: N/A 09/15/19:06 - Common Session ID: AC1869FC00000030265556C0 09/15/19:06 - Acct Session ID: 0x00000023 09/15/19:06 - Handle: 0xD1000016 09/15/19:06 - Current Policy: POLICY_Gi0/2 09/15/19:06 - 09/15/19:06 - Local Policies: 09/15/19:06 - Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150) 09/15/19:06 - Security Policy: Should Secure 09/15/19:06 - Security Status: Link Unsecure 09/15/19:06 - 09/15/19:06 - Server Policies: 09/15/19:06 - ACS ACL: xACSACLx-IP-PERMIT_ALL_TRAFFIC-517998c3 09/15/19:06 - 09/15/19:06 - Method status list: 09/15/19:06 - Method State 09/15/19:06 - mab Authc Success 09/15/19:06 - 09/15/19:06 - MS-C3560-1# 09/15/19:06 - MS-C3560-1# 09/15/19:06 - MS-C3560-1# 09/15/19:06 - Sep 16 00:06:47.660: AAA/AUTHOR: auth_need : user= 'axtel' ruser= 'MS-C3560-1'rem_addr= '172.18.2.1' priv= 15 list= '' AUTHOR-TYPE= 'commands' 09/15/19:06 - MS-C3560-1# 09/15/19:06 - MS-C3560-1#show authentication sessions interface gig0/2 details 09/15/19:06 - Interface: GigabitEthernet0/2 09/15/19:06 - MAC Address: 0c85.253e.9229 09/15/19:06 - IPv6 Address: Unknown 09/15/19:06 - IPv4 Address: 172.31.3.4 09/15/19:06 - User-Name: 0C-85-25-3E-92-29 09/15/19:06 - Status: Authorized 09/15/19:06 - Domain: DATA 09/15/19:06 - Oper host mode: single-host 09/15/19:06 - Oper control dir: both 09/15/19:06 - Session timeout: N/A 09/15/19:06 - Common Session ID: AC1869FC00000030265556C0 09/15/19:06 - Acct Session ID: 0x00000023 09/15/19:06 - Handle: 0xD1000016 09/15/19:06 - Current Policy: POLICY_Gi0/2 09/15/19:06 - 09/15/19:06 - Local Policies: 09/15/19:06 - Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150) 09/15/19:06 - Security Policy: Should Secure 09/15/19:06 - Security Status: Link Unsecure 09/15/19:06 - 09/15/19:06 - Server Policies: 09/15/19:06 - ACS ACL: xACSACLx-IP-PERMIT_ALL_TRAFFIC-517998c3 09/15/19:06 - 09/15/19:06 - Method status list: 09/15/19:06 - Method State 09/15/19:06 - mab Authc Success 09/15/19:06 - 09/15/19:06 - MS-C3560-1# 09/15/19:06 - MS-C3560-1# 09/15/19:06 - MS-C3560-1# 09/15/19:06 - Sep 16 00:06:51.913: AAA/AUTHOR: auth_need : user= 'axtel' ruser= 'MS-C3560-1'rem_addr= '172.18.2.1' priv= 15 list= '' AUTHOR-TYPE= 'commands' 09/15/19:06 - MS-C3560-1# 09/15/19:06 - Sep 16 00:07:05.823: AUTH-EVENT: [0c85.253e.9229, Gi0/2] Received internal event SINGLE_ID_UPDATE (handle 0xD1000016) 09/15/19:06 - Sep 16 00:07:05.823: AUTH-SYNC: [0c85.253e.9229, Gi0/2] Delay remove sync of addr for 0c85.253e.9229 / 0xD1000016 09/15/19:06 - MS-C3560-1# 09/15/19:06 - Sep 16 00:07:05.823: %EPM-6-IPEVENT: IP 0.0.0.0| MAC 0c85.253e.9229| AuditSessionID AC1869FC00000030265556C0| EVENT IP-RELEASE 09/15/19:07 - MS-C3560-1#show authentication sessions interface gig0/2 details 09/15/19:07 - Interface: GigabitEthernet0/2 09/15/19:07 - MAC Address: 0c85.253e.9229 09/15/19:07 - IPv6 Address: Unknown 09/15/19:07 - IPv4 Address: Unknown 09/15/19:07 - User-Name: 0C-85-25-3E-92-29 09/15/19:07 - Status: Authorized 09/15/19:07 - Domain: DATA 09/15/19:07 - Oper host mode: single-host 09/15/19:07 - Oper control dir: both 09/15/19:07 - Session timeout: N/A 09/15/19:07 - Common Session ID: AC1869FC00000030265556C0 09/15/19:07 - Acct Session ID: 0x00000023 09/15/19:07 - Handle: 0xD1000016 09/15/19:07 - Current Policy: POLICY_Gi0/2 09/15/19:07 - 09/15/19:07 - Local Policies: 09/15/19:07 - Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150) 09/15/19:07 - Security Policy: Should Secure 09/15/19:07 - Security Status: Link Unsecure 09/15/19:07 - 09/15/19:07 - Server Policies: 09/15/19:07 - 09/15/19:07 - Method status list: 09/15/19:07 - Method State 09/15/19:07 - mab Authc Success 09/15/19:07 - 09/15/19:07 - MS-C3560-1# 09/15/19:07 - Sep 16 00:07:15.618: AAA/AUTHOR: auth_need : user= 'axtel' ruser= 'MS-C3560-1'rem_addr= '172.18.2.1' priv= 15 list= '' AUTHOR-TYPE= 'commands' 09/15/19:07 - MS-C3560-1# 09/15/19:07 - MS-C3560-1# 09/15/19:07 - MS-C3560-1#no debug all 09/15/19:07 - All possible debugging has been turned off 09/15/19:07 - MS-C3560-1# 09/15/19:07 - MS-C3560-1# 09/15/19:07 - Sep 16 00:07:29.806: AAA/AUTHOR: auth_need : user= 'axtel' ruser= 'MS-C3560-1'rem_addr= '172.18.2.1' priv= 15 list= '' AUTHOR-TYPE= 'commands' 09/15/19:07 - MS-C3560-1# 09/15/19:07 - MS-C3560-1#term no mon 09/15/19:07 - MS-C3560-1# 09/15/19:07 - MS-C3560-1# 09/15/19:07 - MS-C3560-1# 09/15/19:07 - MS-C3560-1#sh ver 09/15/19:07 - Cisco IOS Software, C3560C Software (C3560c405ex-UNIVERSALK9-M), Version 15.2(2)E, RELEASE SOFTWARE (fc3) 09/15/19:07 - Technical Support: http://www.cisco.com/techsupport 09/15/19:07 - Copyright (c) 1986-2014 by Cisco Systems, Inc. 09/15/19:07 - Compiled Thu 26-Jun-14 18:51 by prod_rel_team 09/15/19:07 - 09/15/19:07 - ROM: Bootstrap program is C3560C boot loader 09/15/19:07 - BOOTLDR: C3560C Boot Loader (C3560C-HBOOT-M) Version 12.2(55r)EX11, RELEASE SOFTWARE (fc1) 09/15/19:07 - 09/15/19:07 - MS-C3560-1 uptime is 1 week, 10 hours, 41 minutes 09/15/19:07 - System returned to ROM by power-on 09/15/19:07 - System restarted at 13:25:12 UTC Mon Sep 8 2014 09/15/19:07 - System image file is "flash:c3560c405ex-universalk9-mz.152-2.E.bin" 09/15/19:07 - Last reload reason: Unknown reason 09/15/19:07 - 09/15/19:07 - 09/15/19:07 - 09/15/19:07 - This product contains cryptographic features and is subject to United 09/15/19:07 - States and local country laws governing import, export, transfer and 09/15/19:07 - use. Delivery of Cisco cryptographic products does not imply 09/15/19:07 - third-party authority to import, export, distribute or use encryption. 09/15/19:07 - Importers, exporters, distributors and users are responsible for 09/15/19:07 - compliance with U.S. and local country laws. By using this product you 09/15/19:07 - agree to comply with applicable laws and regulations. If you are unable 09/15/19:07 - to comply with U.S. and local laws, return this product immediately. 09/15/19:07 - 09/15/19:07 - A summary of U.S. laws governing Cisco cryptographic products may be found at: 09/15/19:07 - http://www.cisco.com/wwl/export/crypto/tool/stqrg.html 09/15/19:07 - 09/15/19:07 - If you require further assistance please contact us by sending email to 09/15/19:07 - export@cisco.com. 09/15/19:07 - 09/15/19:07 - License Level: ipbase 09/15/19:07 - License Type: Permanent 09/15/19:07 - Next reload license Level: ipbase 09/15/19:07 - 09/15/19:07 - cisco WS-C3560CG-8PC-S (PowerPC) processor (revision E0) with 131072K bytes of memory. 09/15/19:07 - Processor board ID FOC1812Z0XE 09/15/19:07 - Last reset from power-on 09/15/19:07 - 7 Virtual Ethernet interfaces 09/15/19:07 - 10 Gigabit Ethernet interfaces 09/15/19:07 - The password-recovery mechanism is enabled. 09/15/19:07 - 09/15/19:07 - 512K bytes of flash-simulated non-volatile configuration memory. 09/15/19:07 - Base ethernet MAC Address : 54:4A:00:90:4A:80 09/15/19:07 - Motherboard assembly number : 73-13272-08 09/15/19:07 - Power supply part number : 341-0407-01 09/15/19:07 - Motherboard serial number : FOC18111TH7 09/15/19:07 - Power supply serial number : DCB18012157 09/15/19:07 - Model revision number : E0 09/15/19:07 - Motherboard revision number : A0 09/15/19:07 - Model number : WS-C3560CG-8PC-S 09/15/19:07 - System serial number : FOC1812Z0XE 09/15/19:07 - Top Assembly Part Number : 800-33676-03 09/15/19:07 - Top Assembly Revision Number : D0 09/15/19:07 - Version ID : V03 09/15/19:07 - CLEI Code Number : CMMD900ARC 09/15/19:07 - Hardware Board Revision Number : 0x00 09/15/19:07 - 09/15/19:07 - 09/15/19:07 - Switch Ports Model SW Version SW Image 09/15/19:07 - ------ ----- ----- ---------- ---------- 09/15/19:07 - * 1 10 WS-C3560CG-8PC-S 15.2(2)E C3560c405ex-UNIVERSALK9-M 09/15/19:07 - 09/15/19:07 - 09/15/19:07 - Configuration register is 0xF 09/15/19:07 - 09/15/19:10 - MS-C3560-1# 09/15/19:11 - MS-C3560-1#$!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! 09/15/19:11 - MS-C3560-1# 09/15/19:11 - MS-C3560-1# 09/15/19:11 - MS-C3560-1#conf t 09/15/19:11 - Enter configuration commands, one per line. End with CNTL/Z. 09/15/19:11 - MS-C3560-1(config)#mab 09/15/19:11 - MS-C3560-1(config)#mab ? 09/15/19:11 - logging Set logging parameters 09/15/19:11 - request Customize MAB request 09/15/19:11 - 09/15/19:11 - MS-C3560-1(config)#end 09/15/19:11 - MS-C3560-1# 09/15/19:14 - MS-C3560-1# 09/15/19:14 - MS-C3560-1# 09/15/19:14 - MS-C3560-1# 09/15/19:14 - MS-C3560-1# 09/15/19:15 - MS-C3560-1# 09/15/19:15 - MS-C3560-1# 09/15/19:15 - MS-C3560-1# 09/15/19:15 - MS-C3560-1#sh run | inc snmp 09/15/19:15 - snmp-server community public RO 09/15/19:15 - snmp-server community ciscoro RO 10 09/15/19:15 - snmp-server trap-source Vlan100 09/15/19:15 - snmp-server source-interface informs Vlan100 09/15/19:15 - snmp-server enable traps snmp linkdown linkup 09/15/19:15 - snmp-server enable traps mac-notification change move threshold 09/15/19:15 - snmp-server host 10.1.100.21 version 2c ciscoro mac-notification 09/15/19:15 - MS-C3560-1# 09/15/19:15 - MS-C3560-1# 09/15/19:15 - MS-C3560-1#conf t 09/15/19:15 - Enter configuration commands, one per line. End with CNTL/Z. 09/15/19:15 - MS-C3560-1(config)#int gig0/2 09/15/19:15 - MS-C3560-1(config-if)#no shut 09/15/19:15 - MS-C3560-1(config-if)#end 09/15/19:15 - MS-C3560-1# 09/15/19:15 - MS-C3560-1#debug aaa 09/15/19:15 - MS-C3560-1#debug aaa au 09/15/19:15 - MS-C3560-1#debug aaa authe 09/15/19:15 - MS-C3560-1#debug aaa authentication 09/15/19:15 - AAA Authentication debugging is on 09/15/19:16 - MS-C3560-1#debug aaa auth 09/15/19:16 - MS-C3560-1#debug aaa autho 09/15/19:16 - MS-C3560-1#debug aaa authorization 09/15/19:16 - AAA Authorization debugging is on 09/15/19:16 - MS-C3560-1# 09/15/19:16 - MS-C3560-1# 09/15/19:16 - MS-C3560-1#term mon 09/15/19:16 - MS-C3560-1# 09/15/19:16 - MS-C3560-1# 09/15/19:16 - MS-C3560-1# 09/15/19:16 - Sep 16 00:16:10.795: AAA/AUTHOR: auth_need : user= 'axtel' ruser= 'MS-C3560-1'rem_addr= '172.18.2.1' priv= 15 list= '' AUTHOR-TYPE= 'commands' 09/15/19:16 - MS-C3560-1# 09/15/19:16 - Sep 16 00:16:27.679: %EPM-6-IPEVENT: IP 0.0.0.0| MAC 0c85.253e.9229| AuditSessionID AC1869FC00000030265556C0| EVENT IP-RELEASE 09/15/19:17 - MS-C3560-1# 09/15/19:17 - MS-C3560-1# 09/15/19:17 - MS-C3560-1# 09/15/19:22 - 09/15/19:22 - MS-C3560-1#sh run 09/15/19:22 - Building configuration... 09/15/19:22 - 09/15/19:22 - Current configuration : 8687 bytes 09/15/19:22 - ! 09/15/19:22 - ! Last configuration change at 00:15:55 UTC Tue Sep 16 2014 by axtel 09/15/19:22 - ! NVRAM config last updated at 23:21:47 UTC Mon Sep 15 2014 by axtel 09/15/19:22 - ! 09/15/19:22 - version 15.2 09/15/19:22 - no service pad 09/15/19:22 - service timestamps debug datetime msec 09/15/19:22 - service timestamps log datetime msec 09/15/19:22 - no service password-encryption 09/15/19:22 - ! 09/15/19:22 - hostname MS-C3560-1 09/15/19:22 - ! 09/15/19:22 - boot-start-marker 09/15/19:22 - boot-end-marker 09/15/19:22 - ! 09/15/19:22 - enable secret 5 $1$g2ul$I8yODRQq8ZAZ61axIvxzC/ 09/15/19:22 - ! 09/15/19:22 - username axtel privilege 15 secret 5 $1$A3OJ$OFLIp/rGjP7EvnM0fpW5H1 09/15/19:22 - aaa new-model 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - aaa authentication login default local 09/15/19:22 - aaa authentication dot1x default group radius 09/15/19:22 - aaa authorization network default group radius 09/15/19:22 - aaa authorization auth-proxy default group radius 09/15/19:22 - aaa accounting update periodic 5 09/15/19:22 - aaa accounting auth-proxy default start-stop group radius 09/15/19:22 - aaa accounting dot1x default start-stop group radius 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - aaa server radius dynamic-author 09/15/19:22 - client 10.1.100.21 server-key axtel 09/15/19:22 - ! 09/15/19:22 - aaa session-id common 09/15/19:22 - system mtu routing 1500 09/15/19:22 - device-sensor accounting 09/15/19:22 - ip routing 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - ip dhcp snooping 09/15/19:22 - no ip domain-lookup 09/15/19:22 - ip domain-name msaxtel.loc 09/15/19:22 - ip device tracking probe auto-source override 09/15/19:22 - vtp mode transparent 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - authentication mac-move permit 09/15/19:22 - epm logging 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - mka policy mka-policy 09/15/19:22 - replay-protection window-size 5000 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - crypto pki trustpoint TP-self-signed-9456256 09/15/19:22 - enrollment selfsigned 09/15/19:22 - subject-name cn=IOS-Self-Signed-Certificate-9456256 09/15/19:22 - revocation-check none 09/15/19:22 - rsakeypair TP-self-signed-9456256 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - crypto pki certificate chain TP-self-signed-9456256 09/15/19:22 - certificate self-signed 01 09/15/19:22 - 3082024F 308201B8 A0030201 02020101 300D0609 2A864886 F70D0101 04050030 09/15/19:22 - 2E312C30 2A060355 04031323 494F532D 53656C66 2D536967 6E65642D 43657274 09/15/19:22 - 69666963 6174652D 39343536 32353630 1E170D39 33303330 31303030 3035345A 09/15/19:22 - 170D3230 30313031 30303030 30305A30 2E312C30 2A060355 04031323 494F532D 09/15/19:22 - 53656C66 2D536967 6E65642D 43657274 69666963 6174652D 39343536 32353630 09/15/19:22 - 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100 ABC4F407 09/15/19:22 - 25046E36 D923CDEC 1C94AD18 F2F305FF 76E14EC2 A5BB4F00 55CEE67A A54D2CAF 09/15/19:22 - 552DB62F A4F43C17 802F7CC1 BCB9D141 6751AE9C B7523ACB 4970F969 B08086B7 09/15/19:22 - 1E028AD3 824C9605 351BF541 24CC325E C4833C85 8CEAC57E D8D0DDC4 385C8D55 09/15/19:22 - 22739277 7866532A 943669ED B9564708 D0FEA784 3105B2C9 5336F969 02030100 09/15/19:22 - 01A37D30 7B300F06 03551D13 0101FF04 05300301 01FF3028 0603551D 11042130 09/15/19:22 - 1F821D4D 532D4333 3536302D 312E6D61 73746572 73656375 72697479 2E6C6F63 09/15/19:22 - 301F0603 551D2304 18301680 14017057 F9265B02 D67D1A9D 7BC73C7F 77146F16 09/15/19:22 - BC301D06 03551D0E 04160414 017057F9 265B02D6 7D1A9D7B C73C7F77 146F16BC 09/15/19:22 - 300D0609 2A864886 F70D0101 04050003 8181004A 563E830A 80854BBC 0FE9E14E 09/15/19:22 - 3607C37D 1D7B9151 6343381D 64BCAE06 853B2CE7 A42747E2 48046014 3F3C1043 09/15/19:22 - 04F4A063 19FC5CF8 73033589 EFC27E9E BA2ABE8B 6F3BACAC CE8B8CC3 3FA9EB28 09/15/19:22 - A3FFB384 C218EB05 91FC8EF1 8AB06D9B 0DB9519A A9610FC4 867FE116 B28B25CB 09/15/19:22 - E677DA17 60FBA288 A9B60046 2669321E F734E5 09/15/19:22 - quit 09/15/19:22 - cts sxp enable 09/15/19:22 - cts sxp default source-ip 172.24.105.252 09/15/19:22 - cts sxp default password t3l3v1s10n 09/15/19:22 - cts sxp retry period 10 09/15/19:22 - cts sxp connection peer 172.24.105.254 password default mode peer listener hold-time 0 09/15/19:22 - dot1x system-auth-control 09/15/19:22 - spanning-tree mode pvst 09/15/19:22 - spanning-tree extend system-id 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - vlan internal allocation policy ascending 09/15/19:22 - ! 09/15/19:22 - vlan 50-58,97,100,105,151-155,451 09/15/19:22 - ! 09/15/19:22 - vlan 999 09/15/19:22 - name ADMIN 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - interface GigabitEthernet0/1 09/15/19:22 - switchport trunk encapsulation dot1q 09/15/19:22 - switchport trunk allowed vlan 51-53,55-58,97,100,105,151-155,451,999 09/15/19:22 - switchport mode trunk 09/15/19:22 - ! 09/15/19:22 - interface GigabitEthernet0/2 09/15/19:22 - switchport access vlan 451 09/15/19:22 - switchport mode access 09/15/19:22 - ip access-group ACL-AD in 09/15/19:22 - authentication port-control auto 09/15/19:22 - mab 09/15/19:22 - spanning-tree portfast 09/15/19:22 - spanning-tree bpduguard enable 09/15/19:22 - ! 09/15/19:22 - interface GigabitEthernet0/3 09/15/19:22 - description Desktop 09/15/19:22 - switchport access vlan 52 09/15/19:22 - switchport mode access 09/15/19:22 - switchport voice vlan 451 09/15/19:22 - ip access-group ACL-AD in 09/15/19:22 - shutdown 09/15/19:22 - authentication event fail action next-method 09/15/19:22 - authentication host-mode multi-auth 09/15/19:22 - authentication order dot1x mab 09/15/19:22 - authentication priority dot1x mab 09/15/19:22 - authentication port-control auto 09/15/19:22 - authentication violation restrict 09/15/19:22 - mab 09/15/19:22 - dot1x pae authenticator 09/15/19:22 - dot1x timeout tx-period 10 09/15/19:22 - spanning-tree portfast 09/15/19:22 - spanning-tree bpduguard enable 09/15/19:22 - ! 09/15/19:22 - interface GigabitEthernet0/4 09/15/19:22 - switchport access vlan 51 09/15/19:22 - switchport mode access 09/15/19:22 - authentication event fail action next-method 09/15/19:22 - authentication order dot1x mab 09/15/19:22 - authentication priority dot1x mab 09/15/19:22 - authentication port-control auto 09/15/19:22 - authentication periodic 09/15/19:22 - authentication timer reauthenticate server 09/15/19:22 - mab 09/15/19:22 - dot1x pae authenticator 09/15/19:22 - dot1x timeout tx-period 10 09/15/19:22 - spanning-tree portfast 09/15/19:22 - ! 09/15/19:22 - interface GigabitEthernet0/5 09/15/19:22 - description WebAuthUser 09/15/19:22 - switchport access vlan 52 09/15/19:22 - switchport mode access 09/15/19:22 - authentication order mab 09/15/19:22 - authentication priority mab 09/15/19:22 - authentication port-control auto 09/15/19:22 - mab 09/15/19:22 - spanning-tree portfast 09/15/19:22 - ! 09/15/19:22 - interface GigabitEthernet0/6 09/15/19:22 - description Desktop 09/15/19:22 - switchport access vlan 52 09/15/19:22 - switchport mode access 09/15/19:22 - switchport voice vlan 451 09/15/19:22 - ip access-group ACL-AD in 09/15/19:22 - shutdown 09/15/19:22 - macsec 09/15/19:22 - authentication event fail action next-method 09/15/19:22 - authentication host-mode multi-auth 09/15/19:22 - authentication order dot1x mab 09/15/19:22 - authentication priority dot1x mab 09/15/19:22 - authentication port-control auto 09/15/19:22 - authentication violation restrict 09/15/19:22 - mka policy mka-policy 09/15/19:22 - mab 09/15/19:22 - dot1x pae authenticator 09/15/19:22 - dot1x timeout tx-period 10 09/15/19:22 - spanning-tree portfast 09/15/19:22 - spanning-tree bpduguard enable 09/15/19:22 - ! 09/15/19:22 - interface GigabitEthernet0/7 09/15/19:22 - description "Laptop" 09/15/19:22 - switchport access vlan 52 09/15/19:22 - switchport mode access 09/15/19:22 - ip access-group ACL-LIMITADO in 09/15/19:22 - macsec 09/15/19:22 - authentication event fail action next-method 09/15/19:22 - authentication event server alive action reinitialize 09/15/19:22 - authentication open 09/15/19:22 - authentication order dot1x mab 09/15/19:22 - authentication priority dot1x mab 09/15/19:22 - authentication port-control auto 09/15/19:22 - authentication periodic 09/15/19:22 - authentication timer reauthenticate server 09/15/19:22 - mka policy mka-policy 09/15/19:22 - mab 09/15/19:22 - dot1x pae authenticator 09/15/19:22 - dot1x timeout tx-period 10 09/15/19:22 - spanning-tree portfast 09/15/19:22 - ! 09/15/19:22 - interface GigabitEthernet0/8 09/15/19:22 - switchport access vlan 105 09/15/19:22 - switchport mode access 09/15/19:22 - ! 09/15/19:22 - interface GigabitEthernet0/9 09/15/19:22 - ! 09/15/19:22 - interface GigabitEthernet0/10 09/15/19:22 - switchport trunk encapsulation dot1q 09/15/19:22 - switchport trunk allowed vlan 51-53,55-58,105,151-155,451,999 09/15/19:22 - switchport mode trunk 09/15/19:22 - ! 09/15/19:22 - interface Vlan1 09/15/19:22 - no ip address 09/15/19:22 - shutdown 09/15/19:22 - ! 09/15/19:22 - interface Vlan51 09/15/19:22 - ip address 172.24.51.200 255.255.255.0 09/15/19:22 - shutdown 09/15/19:22 - ! 09/15/19:22 - interface Vlan52 09/15/19:22 - ip address 172.24.52.253 255.255.255.0 09/15/19:22 - ip helper-address 10.1.100.21 09/15/19:22 - ! 09/15/19:22 - interface Vlan100 09/15/19:22 - ip address 10.1.100.252 255.255.255.0 09/15/19:22 - ! 09/15/19:22 - interface Vlan105 09/15/19:22 - ip address 172.24.105.252 255.255.255.0 09/15/19:22 - shutdown 09/15/19:22 - ! 09/15/19:22 - interface Vlan451 09/15/19:22 - ip address 172.31.3.132 255.255.255.0 09/15/19:22 - shutdown 09/15/19:22 - ! 09/15/19:22 - interface Vlan999 09/15/19:22 - ip address 172.18.1.6 255.255.255.0 09/15/19:22 - ! 09/15/19:22 - ip forward-protocol nd 09/15/19:22 - ip http server 09/15/19:22 - ip http secure-server 09/15/19:22 - ! 09/15/19:22 - ip route 172.18.0.0 255.255.0.0 172.18.1.1 09/15/19:22 - ! 09/15/19:22 - ip access-list extended ACL-AD 09/15/19:22 - permit udp any eq bootpc any eq bootps 09/15/19:22 - permit ip any host 10.1.100.124 09/15/19:22 - permit udp any any eq tftp 09/15/19:22 - deny ip any any log 09/15/19:22 - ip access-list extended ACL-ALLOW 09/15/19:22 - permit ip any any 09/15/19:22 - ip access-list extended ACL-LIMITADO 09/15/19:22 - permit udp any eq bootpc any eq bootps 09/15/19:22 - permit ip any host 172.24.105.23 09/15/19:22 - permit ip any host 172.24.105.20 09/15/19:22 - deny ip any any 09/15/19:22 - ip access-list extended ACL-POSTURE-REDIRECT 09/15/19:22 - deny udp any any eq domain 09/15/19:22 - deny ip any host 172.24.105.20 09/15/19:22 - deny icmp any any 09/15/19:22 - deny tcp any any eq www 09/15/19:22 - permit ip any any 09/15/19:22 - ip access-list extended ACL-WEBAUTH-REDIRECT 09/15/19:22 - deny ip any host 172.24.105.2 09/15/19:22 - deny ip any host 172.24.105.20 09/15/19:22 - permit tcp any any eq www 09/15/19:22 - permit tcp any any eq 443 09/15/19:22 - ip access-list extended ACL_REDIRECT 09/15/19:22 - deny udp any eq bootpc any eq bootps 09/15/19:22 - deny udp any any eq domain 09/15/19:22 - deny ip any host 10.1.100.21 09/15/19:22 - permit tcp any any eq www 09/15/19:22 - permit tcp any any eq 443 09/15/19:22 - deny ip any any 09/15/19:22 - ip access-list extended webauth 09/15/19:22 - permit ip any any 09/15/19:22 - ! 09/15/19:22 - ip radius source-interface Vlan100 09/15/19:22 - ip sla enable reaction-alerts 09/15/19:22 - logging origin-id ip 09/15/19:22 - logging source-interface Vlan100 09/15/19:22 - logging host 10.1.100.21 transport udp port 20514 09/15/19:22 - access-list 10 permit 10.1.100.21 09/15/19:22 - access-list 10 deny any log 09/15/19:22 - ! 09/15/19:22 - snmp-server community public RO 09/15/19:22 - snmp-server community ciscoro RO 10 09/15/19:22 - snmp-server trap-source Vlan100 09/15/19:22 - snmp-server source-interface informs Vlan100 09/15/19:22 - snmp-server enable traps snmp linkdown linkup 09/15/19:22 - snmp-server enable traps mac-notification change move threshold 09/15/19:22 - snmp-server host 10.1.100.21 version 2c ciscoro mac-notification 09/15/19:22 - ! 09/15/19:22 - radius-server attribute 6 on-for-login-auth 09/15/19:22 - radius-server attribute 8 include-in-access-req 09/15/19:22 - radius-server attribute 25 access-request include 09/15/19:22 - radius-server dead-criteria time 10 tries 3 09/15/19:22 - radius-server host 10.1.100.21 test username ise-test key axtel 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - ! 09/15/19:22 - line con 0 09/15/19:22 - logging synchronous 09/15/19:22 - line vty 0 4 09/15/19:22 - logging synchronous 09/15/19:22 - line vty 5 15 09/15/19:22 - logging synchronous 09/15/19:22 - ! 09/15/19:22 - ntp server 172.18.1.1 09/15/19:22 - mac address-table notification change 09/15/19:22 - mac address-table notification mac-move 09/15/19:22 - ! 09/15/19:22 - end 09/15/19:22 - 09/15/19:22 - MS-C3560-1# 09/15/19:22 - Sep 16 00:22:16.541: AAA/AUTHOR: auth_need : user= 'axtel' ruser= 'MS-C3560-1'rem_addr= '172.18.2.1' priv= 15 list= '' AUTHOR-TYPE= 'commands' 09/15/19:22 - MS-C3560-1# 09/15/19:22 - MS-C3560-1# 09/15/19:22 - MS-C3560-1# 09/15/19:22 - MS-C3560-1# 09/15/19:22 - MS-C3560-1#exit