cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
Announcements

This community is for technical, feature, configuration and deployment questions.
For production deployment issues, please contact the TAC! We will not comment or assist with your TAC case in these forums.
Please see How to Ask the Community for Help for other best practices.

1679
Views
0
Helpful
3
Replies

ACS 4.2 Authentication with Certificates

Hello Community!

I have a Cisco 4506 With IOS 12.2 54SG1

Iam new on Acs 4.2 and i want to use Certificates to authenticate my windows XP Client and Igels.

On Windows Xp i selected :

IEEE 802.1X Authentication enable EAP (Peap)

But i dont understand the Certification of ACS 4.2.

I generated a Self-Signed Certificate. Is this right ? and under installed Certificates the Certificate Status is okay.

Do i have to create for each windows Machine one user Account under user-Setup to authenticate the Machine?

Where do Windows Xp know whitch Certificate he have to take ?

I configures the Switch on Global Configuration like this:

aaa authentication login default group tacacs+ enable

aaa authentication enable default group tacacs+ enable

aaa authentication dot1x default group radius

aaa authorization exec default group tacacs+

aaa authorization commands 15 default group tacacs+

aaa authorization network default group radius

aaa accounting dot1x default start-stop group radius

aaa accounting commands 15 default start-stop group tacacs+

dot1x system-auth-control

tacacs-server host 192.168.10.10

tacacs-server directed-request

tacacs-server key cisco

radius-server host 192.168.10.10 auth-port 1645 acct-port 1646

radius-server key cisco

radius-server vsa send accounting

radius-server vsa send authentication

i configured the ACCess port like this:

interface GigabitEthernet2/1

description PEAP

switchport access vlan 5

switchport mode access

authentication host-mode multi-domain

authentication order mab dot1x

authentication priority mab dot1x

authentication port-control auto

mab

no snmp trap link-status

dot1x pae authenticator

dot1x timeout quiet-period 50

spanning-tree portfast

spanning-tree bpduguard enable

Iam triying to configure ist szenario till 4 days and it still dont work.. On Windows i Only get the Error" authentication failed"

on the Switch the  same : dot1x : Authfailed

What do i wrong ?

Can someone help me.

THX

3 REPLIES 3
Jatin Katyal
Cisco Employee

With Peap, machine and user certificates are not required so you don't need to install it on the machines.

Self-signed Certificate Setup (only if you do not use an external CA)

http://www.cisco.com/en/US/partner/products/sw/secursw/ps2086/products_configuration_example09186a0080545a29.shtml#t14

Self-signed certificates are certificates you create without a root or the intermediate involvement of the CA. They have the same value in both the subject and issuer fields like a Root CA Certificate. Do not use a key size greater than 1024 for compatibility with PEAP and EAP-TLS. If you use a self-signed certificate, the certificate also acts in the capacity of the Root CA Certificate and must be installed in the Certificates (Local Computer) > Trusted Root Certification Authorities > Certificates folder of the client when you use the Microsoft EAP supplicant. It automatically installs in the trusted root certificates store on the server. However, it must still be trusted in the Certificate Trust List in ACS Certificate Setup. See the Root CA Certificates section for more information.

Because self-signed certificates are used as the Root CA Certificate for Server Certificate validation when you use the Microsoft EAP supplicant, and because the validity period cannot be increased from the default of one year

Could you please turn on debugs;

debug dot1x all

debug radius

term mon

Regards,

Jatin

Do rate helpful posts-

~Jatin

Hello Jatin,

thanks for your replay.... do i have to install the Self made certificate local on the ACS 4.2 Server =?

Do i have to add this zertificate with Group Policy to the "Trusted Root Certification Autorities" ?  do Windows Xp user can enable this from the "Trusted Root Certification Autorities ?

Do i have to create user Accounts on the ACS Server ?

The Link that u posted is forbbiden for me.

**********************************************************************************

07:26:39: AUTH-EVENT (Gi2/32): 'restart' timer expired for client 0000.0000.0000

07:26:39: AUTH-EVENT (Gi2/32): Client 0000.0000.0000, Initialising Method dot1x state to 'Not run'

07:26:39: AUTH-EVENT (Gi2/32): Adding method dot1x to runnable list for Auth Mgr context 0xE200002F

07:26:39: AUTH-EVENT (Gi2/32): Sending START to dot1x (handle 0xE200002F)

07:26:39:     dot1x_auth Gi2/32: initial state auth_initialize has enter

07:26:39: dot1x-sm(Gi2/32): 0xEB000032:auth_initialize_enter called

07:26:39:     dot1x_auth Gi2/32: during state auth_initialize, got event 0(cfg_auto)

07:26:39: @@@ dot1x_auth Gi2/32: auth_initialize -> auth_disconnected

07:26:39: dot1x-sm(Gi2/32): 0xEB000032:auth_disconnected_enter called

07:26:39:     dot1x_auth Gi2/32: idle during state auth_disconnected

07:26:39: @@@ dot1x_auth Gi2/32: auth_disconnected -> auth_restart

07:26:39: dot1x-sm(Gi2/32): 0xEB000032:auth_restart_enter called

07:26:39: dot1x-ev(Gi2/32): Sending create new context event to EAP for 0xEB000032 (0000.0000.0000)

07:26:39:     dot1x_auth_bend Gi2/32: initial state auth_bend_initialize has enter

07:26:39: dot1x-sm(Gi2/32): 0xEB000032:auth_bend_initialize_enter called

07:26:39:     dot1x_auth_bend Gi2/32: initial state auth_bend_initialize has idle

07:26:39:     dot1x_auth_bend Gi2/32: during state auth_bend_initialize, got event 16383(idle)

07:26:39: @@@ dot1x_auth_bend Gi2/32: auth_bend_initialize -> auth_bend_idle

07:26:39: dot1x-sm(Gi2/32): 0xEB000032:auth_bend_idle_enter called

07:26:39: dot1x-ev(Gi2/32): Created a client entry (0xEB000032)

07:26:39: dot1x-ev(Gi2/32): Dot1x authentication started for 0xEB000032 (0000.0000.0000)

07:26:39: AUTH-EVENT (Gi2/32): Received handle 0xEB000032 from method

07:26:39: AUTH-EVENT (Gi2/32): Client 0000.0000.0000, Context changing state from 'Authz Failed' to 'Running'

07:26:39: AUTH-EVENT (Gi2/32): Client 0000.0000.0000, Method dot1x changing state from 'Not run' to 'Running'

07:26:39: dot1x-sm(Gi2/32): Posting !EAP_RESTART on Client 0xEB000032

07:26:39:     dot1x_auth Gi2/32: during state auth_restart, got event 6(no_eapRestart)

07:26:39: @@@ dot1x_auth Gi2/32: auth_restart -> auth_connecting

07:26:39: dot1x-sm(Gi2/32): 0xEB000032:auth_connecting_enter called

07:26:39: dot1x-sm(Gi2/32): 0xEB000032:auth_restart_connecting_action called

07:26:39: dot1x-sm(Gi2/32): Posting RX_REQ on Client 0xEB000032

07:26:39:     dot1x_auth Gi2/32: during state auth_connecting, got event 10(eapReq_no_reAuthMax)

07:26:39: @@@ dot1x_auth Gi2/32: auth_connecting -> auth_authenticating

07:26:39: dot1x-sm(Gi2/32): 0xEB000032:auth_authenticating_enter called

07:26:39: dot1x-sm(Gi2/32): 0xEB000032:auth_connecting_authenticating_action called

07:26:39: dot1x-sm(Gi2/32): Posting AUTH_START for 0xEB000032

07:26:39:     dot1x_auth_bend Gi2/32: during state auth_bend_idle, got event 4(eapReq_authStart)

07:26:39: @@@ dot1x_auth_bend Gi2/32: auth_bend_idle -> auth_bend_request

07:26:39: dot1x-sm(Gi2/32): 0xEB000032:auth_bend_request_enter called

07:26:39: dot1x-ev(Gi2/32): Sending EAPOL packet to group PAE address

07:26:39: dot1x-ev(Gi2/32): Role determination not required

07:26:39: dot1x-registry:registry:dot1x_ether_macaddr called

07:26:39: dot1x-ev(Gi2/32): Sending out EAPOL packet

07:26:39: EAPOL pak dump Tx

07:26:39: EAPOL Version: 0x3  type: 0x0  length: 0x0005

07:26:39: EAP code: 0x1  id: 0x1  length: 0x0005 type: 0x1

07:26:39: dot1x-packet(Gi2/32): EAPOL packet sent to client 0xEB000032 (0000.0000.0000)

07:26:39: dot1x-sm(Gi2/32): 0xEB000032:auth_bend_idle_request_action called

07:26:40: AUTH-EVENT: Stopped Auth Manager tick timer

07:27:03: dot1x-ev(Gi2/32): Interface state changed to DOWN

07:27:03: AUTH-EVENT (Gi2/32): Link DOWN

07:27:03: AUTH-EVENT (Gi2/32): Signalling "pre" delete for client 0000.0000.0000

07:27:03: AUTH-EVENT: Enter auth_mgr_idc_client_deleted

07:27:03: AUTH-EVENT: Enter auth_mgr_idc_remove_record

07:27:03: AUTH-SYNC (Gi2/32): Syncing delete for context (0000.0000.0000)

07:27:03: AUTH-EVENT (Gi2/32): Sending DELETE to dot1x (handle 0xE200002F)

07:27:03: dot1x-ev(Gi2/32): Deleting client 0xEB000032 (0000.0000.0000)

07:27:03: AUTH-EVENT (Gi2/32): Signalling "post" delete for client 0000.0000.0000 in domain DATA

07:27:03: AUTH-EVENT (Gi2/32): Authorized client count: 0

07:27:03: AUTH-EVENT (Gi2/32): Authorized client count: 0

07:27:03: AUTH-EVENT (Gi2/32): Setting vlan to 0 on DATA Vlan

07:27:03: AUTH-EVENT (Gi2/32): Unauthorizing interface in shim

07:27:03: AUTH-EVENT (Gi2/32): dot1x_switch_get_default_host_access: Host access set to deny GigabitEthernet2/32

07:27:03: AUTH-EVENT (Gi2/32):  host access set to 2 on GigabitEthernet2/32

07:27:03: AUTH-EVENT (Gi2/32): dot1x_switch_get_default_host_access: Host access set to deny GigabitEthernet2/32

07:27:03: AUTH-EVENT (Gi2/32):  host access set to 2 on GigabitEthernet2/32

07:27:03: AUTH-EVENT (Gi2/32): Authorized client count: 0

07:27:03: AUTH-EVENT (Gi2/32): Setting vlan to 0 on DATA Vlan

07:27:03: AUTH-EVENT (Gi2/32): Unauthorizing interface in shim

07:27:03: AUTH-EVENT (Gi2/32): dot1x_switch_get_default_host_access: Host access set to deny GigabitEthernet2/32

07:27:03: AUTH-EVENT (Gi2/32):  host access set to 2 on GigabitEthernet2/32

07:27:03: AUTH-EVENT (Gi2/32): dot1x_switch_get_default_host_access: Host access set to deny GigabitEthernet2/32

07:27:03: AUTH-EVENT (Gi2/32):  host access set to 2 on GigabitEthernet2/32

07:27:03: AUTH-EVENT (Gi2/32): Queued START

07:27:03: dot1x-ev:dot1x_supp_port_down: No DOT1X subblock found on GigabitEthernet2/32

07:27:03: dot1x-ev:Delete auth client (0xEB000032) message

07:27:03: dot1x-ev:Auth client ctx destroyed

07:27:03: AUTH-EVENT (Gi2/32): Freed Auth Manager context

07:27:03: AUTH-EVENT (Gi2/32): Received internal event START

de-ret-core001#

07:31:41: AUTH-EVENT (Gi2/32): dot1x_pm_mda_port_link_linkcomingup: voice VLAN 4096, data VLAN 198

07:31:41: dot1x-ev(Gi2/32): Interface state changed to UP

07:31:41: AUTH-EVENT (Gi2/32): Enabling dot1x in switch shim

07:31:41: AUTH-EVENT (Gi2/32): dot1x_switch_get_default_host_access: Host access set to deny GigabitEthernet2/32

07:31:41: AUTH-EVENT (Gi2/32):  host access set to 2 on GigabitEthernet2/32

07:31:41: AUTH-EVENT (Gi2/32): dot1x_switch_get_default_host_access: Host access set to deny GigabitEthernet2/32

07:31:41: AUTH-EVENT (Gi2/32):  host access set to 2 on GigabitEthernet2/32

07:31:41: AUTH-EVENT (Gi2/32): Link UP

07:31:41: AUTH-EVENT (Gi2/32): Assigned AAA ID 0x0000004A

07:31:41: AUTH-EVENT (Gi2/32): Retrieved Accounting Session ID 0x0000012C

07:31:41: AUTH-EVENT (Gi2/32): Allocated new Auth Manager context (handle 0xFE000030)

07:31:41: AUTH-EVENT (Gi2/32): Client 0000.0000.0000, Initialising Method dot1x state to 'Not run'

07:31:41: AUTH-EVENT (Gi2/32): Adding method dot1x to runnable list for Auth Mgr context 0xFE000030

07:31:41: AUTH-EVENT: auth_mgr_idc_add_record: Recv audit_sid=C0A8C6C90000002F019D87A3

07:31:41: AUTH-EVENT (Gi2/32): Sending START to dot1x (handle 0xFE000030)

07:31:41:     dot1x_auth Gi2/32: initial state auth_initialize has enter

07:31:41: dot1x-sm(Gi2/32): 0x2F000033:auth_initialize_enter called

07:31:41:     dot1x_auth Gi2/32: during state auth_initialize, got event 0(cfg_auto)

07:31:41: @@@ dot1x_auth Gi2/32: auth_initialize -> auth_disconnected

07:31:41: dot1x-sm(Gi2/32): 0x2F000033:auth_disconnected_enter called

07:31:41:     dot1x_auth Gi2/32: idle during state auth_disconnected

07:31:41: @@@ dot1x_auth Gi2/32: auth_disconnected -> auth_restart

07:31:41: dot1x-sm(Gi2/32): 0x2F000033:auth_restart_enter called

07:31:41: dot1x-ev(Gi2/32): Sending create new context event to EAP for 0x2F000033 (0000.0000.0000)

07:31:41:     dot1x_auth_bend Gi2/32: initial state auth_bend_initialize has enter

07:31:41: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_initialize_enter called

07:31:41:     dot1x_auth_bend Gi2/32: initial state auth_bend_initialize has idle

07:31:41:     dot1x_auth_bend Gi2/32: during state auth_bend_initialize, got event 16383(idle)

07:31:41: @@@ dot1x_auth_bend Gi2/32: auth_bend_initialize -> auth_bend_idle

07:31:41: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_idle_enter called

07:31:41: dot1x-ev(Gi2/32): Created a client entry (0x2F000033)

07:31:41: dot1x-ev(Gi2/32): Dot1x authentication started for 0x2F000033 (0000.0000.0000)

07:31:41: AUTH-EVENT (Gi2/32): Received handle 0x2F000033 from method

07:31:41: AUTH-EVENT (Gi2/32): Client 0000.0000.0000, Context changing state from 'Idle' to 'Running'

07:31:41: AUTH-EVENT (Gi2/32): Client 0000.0000.0000, Method dot1x changing state from 'Not run' to 'Running'

07:31:41: dot1x-ev:DOT1X Supplicant not enabled on GigabitEthernet2/32

07:31:41: dot1x-sm(Gi2/32): Posting !EAP_RESTART on Client 0x2F000033

07:31:41:     dot1x_auth Gi2/32: during state auth_restart, got event 6(no_eapRestart)

07:31:41: @@@ dot1x_auth Gi2/32: auth_restart -> auth_connecting

07:31:41: dot1x-sm(Gi2/32): 0x2F000033:auth_connecting_enter called

07:31:41: dot1x-sm(Gi2/32): 0x2F000033:auth_restart_connecting_action called

07:31:41: dot1x-sm(Gi2/32): Posting RX_REQ on Client 0x2F000033

07:31:41:     dot1x_auth Gi2/32: during state auth_connecting, got event 10(eapReq_no_reAuthMax)

07:31:41: @@@ dot1x_auth Gi2/32: auth_connecting -> auth_authenticating

07:31:41: dot1x-sm(Gi2/32): 0x2F000033:auth_authenticating_enter called

07:31:41: dot1x-sm(Gi2/32): 0x2F000033:auth_connecting_authenticating_action called

07:31:41: dot1x-sm(Gi2/32): Posting AUTH_START for 0x2F000033

07:31:41:     dot1x_auth_bend Gi2/32: during state auth_bend_idle, got event 4(eapReq_authStart)

07:31:41: @@@ dot1x_auth_bend Gi2/32: auth_bend_idle -> auth_bend_request

07:31:41: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_enter called

07:31:41: dot1x-ev(Gi2/32): Sending EAPOL packet to group PAE address

07:31:41: dot1x-ev(Gi2/32): Role determination not required

07:31:41: dot1x-registry:registry:dot1x_ether_macaddr called

07:31:41: dot1x-ev(Gi2/32): Sending out EAPOL packet

07:31:41: EAPOL pak dump Tx

07:31:41: EAPOL Version: 0x3  type: 0x0  length: 0x0005

07:31:41: EAP code: 0x1  id: 0x1  length: 0x0005 type: 0x1

07:31:41: dot1x-packet(Gi2/32): EAPOL packet sent to client 0x2F000033 (0000.0000.0000)

07:31:41: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_idle_request_action called

07:31:52: dot1x-ev(Gi2/32): Role determination not required

07:31:52: dot1x-packet(Gi2/32): queuing an EAPOL pkt on Auth Q

07:31:52: dot1x-ev:Enqueued the eapol packet to the global authenticator queue

07:31:52: EAPOL pak dump rx

07:31:52: EAPOL Version: 0x1  type: 0x1  length: 0x0000

07:31:52: dot1x-ev:

dot1x_auth_queue_event: Int Gi2/32 CODE= 0,TYPE= 0,LEN= 0

07:31:52: dot1x-packet(Gi2/32): Received an EAPOL frame

07:31:52: dot1x-ev(Gi2/32): Received pkt saddr =000b.5d4f.2ecf , daddr = 0180.c200.0003,

                    pae-ether-type = 888e.0101.0000

07:31:52: dot1x-ev(Gi2/32): Couldn't find the supplicant in the list

07:31:52: dot1x-ev(Gi2/32): New client detected, notifying AuthMgr

07:31:52: dot1x-ev(Gi2/32): Sending event (0) to Auth Mgr for 000b.5d4f.2ecf

07:31:52: dot1x-packet(Gi2/32): Received an EAPOL-Start packet

07:31:52: EAPOL pak dump rx

07:31:52: EAPOL Version: 0x1  type: 0x1  length: 0x0000

07:31:52: dot1x-sm(Gi2/32): Posting EAPOL_START on Client 0x2F000033

07:31:52:     dot1x_auth Gi2/32: during state auth_authenticating, got event 4(eapolStart)

07:31:52: @@@ dot1x_auth Gi2/32: auth_authenticating -> auth_aborting

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_authenticating_exit called

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_aborting_enter called

07:31:52: AUTH-EVENT (Gi2/32): Received 'NEW_MAC', current method is dot1x (handle 0xFE000030)

07:31:52: AUTH-EVENT (Gi2/32): New Method MAC: 000b.5d4f.2ecf 1B60E2D4

07:31:52: AUTH-EVENT: auth_mgr_idc_insert_key_in_record: update mac 000b.5d4f.2ecf

07:31:52: AUTH-EVENT (Gi2/32): Sending NEW_MAC to dot1x (handle 0xFE000030)

07:31:52: dot1x-ev(Gi2/32): 802.1x method gets the go ahead from Auth Mgr for 0x2F000033 (000b.5d4f.2ecf)

07:31:52: %AUTHMGR-5-START: Starting 'dot1x' for client (000b.5d4f.2ecf) on Interface Gi2/32 AuditSessionID C0A8C6C90000002F019D87A3

07:31:52: dot1x-sm(Gi2/32): Posting AUTH_ABORT for 0x2F000033

07:31:52:     dot1x_auth_bend Gi2/32: during state auth_bend_request, got event 1(authAbort)

07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_request -> auth_bend_initialize

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_initialize_enter called

07:31:52:     dot1x_auth_bend Gi2/32: idle during state auth_bend_initialize

07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_initialize -> auth_bend_idle

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_idle_enter called

07:31:52: dot1x-sm(Gi2/32): Posting !AUTH_ABORT on Client 0x2F000033

07:31:52:     dot1x_auth Gi2/32: during state auth_aborting, got event 20(no_eapolLogoff_no_authAbort)

07:31:52: @@@ dot1x_auth Gi2/32: auth_aborting -> auth_restart

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_aborting_exit called

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_restart_enter called

07:31:52: dot1x-ev(Gi2/32): Resetting the client 0x2F000033 (000b.5d4f.2ecf)

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_aborting_restart_action called

07:31:52: dot1x-sm(Gi2/32): Posting !EAP_RESTART on Client 0x2F000033

07:31:52:     dot1x_auth Gi2/32: during state auth_restart, got event 6(no_eapRestart)

07:31:52: @@@ dot1x_auth Gi2/32: auth_restart -> auth_connecting

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_connecting_enter called

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_restart_connecting_action called

07:31:52: dot1x-sm(Gi2/32): Posting RX_REQ on Client 0x2F000033

07:31:52:     dot1x_auth Gi2/32: during state auth_connecting, got event 10(eapReq_no_reAuthMax)

07:31:52: @@@ dot1x_auth Gi2/32: auth_connecting -> auth_authenticating

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_authenticating_enter called

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_connecting_authenticating_action called

07:31:52: dot1x-sm(Gi2/32): Posting AUTH_START for 0x2F000033

07:31:52:     dot1x_auth_bend Gi2/32: during state auth_bend_idle, got event 4(eapReq_authStart)

07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_idle -> auth_bend_request

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_enter called

07:31:52: dot1x-ev(Gi2/32): Sending EAPOL packet to group PAE address

07:31:52: dot1x-ev(Gi2/32): Role determination not required

07:31:52: dot1x-registry:registry:dot1x_ether_macaddr called

07:31:52: dot1x-ev(Gi2/32): Sending out EAPOL packet

07:31:52: EAPOL pak dump Tx

07:31:52: EAPOL Version: 0x3  type: 0x0  length: 0x0005

07:31:52: EAP code: 0x1  id: 0x1  length: 0x0005 type: 0x1

07:31:52: dot1x-packet(Gi2/32): EAPOL packet sent to client 0x2F000033 (000b.5d4f.2ecf)

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_idle_request_action called

07:31:52: dot1x-ev(Gi2/32): Role determination not required

07:31:52: dot1x-packet(Gi2/32): Queuing an EAPOL pkt on Authenticator Q

07:31:52: dot1x-ev:Enqueued the eapol packet to the global authenticator queue

07:31:52: EAPOL pak dump rx

07:31:52: EAPOL Version: 0x1  type: 0x0  length: 0x000F

07:31:52: dot1x-ev:

dot1x_auth_queue_event: Int Gi2/32 CODE= 2,TYPE= 1,LEN= 15

07:31:52: dot1x-packet(Gi2/32): Received an EAPOL frame

07:31:52: dot1x-ev(Gi2/32): Received pkt saddr =000b.5d4f.2ecf , daddr = 0180.c200.0003,

                    pae-ether-type = 888e.0100.000f

07:31:52: dot1x-packet(Gi2/32): Received an EAP packet

07:31:52: EAPOL pak dump rx

07:31:52: EAPOL Version: 0x1  type: 0x0  length: 0x000F

07:31:52: dot1x-packet(Gi2/32): Received an EAP packet from 000b.5d4f.2ecf

07:31:52: dot1x-sm(Gi2/32): Posting EAPOL_EAP for 0x2F000033

07:31:52:     dot1x_auth_bend Gi2/32: during state auth_bend_request, got event 6(eapolEap)

07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_request -> auth_bend_response

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_enter called

07:31:52: dot1x-ev(Gi2/32): dot1x_sendRespToServer: Response sent to the server from 0x2F000033 (000b.5d4f.2ecf)

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_response_action called

07:31:52: RADIUS/ENCODE(0000004A):Orig. component type = DOT1X

07:31:52: RADIUS(0000004A): Config NAS IP: 0.0.0.0

07:31:52: RADIUS/ENCODE(0000004A): acct_session_id: 300

07:31:52: RADIUS(0000004A): sending

07:31:52: RADIUS/ENCODE: Best Local IP-Address 192.168.10.10 for Radius-Server 192.168.10.10

07:31:52: RADIUS(0000004A): Send Access-Request to 192.168.10.10:1645 id 1645/116, len 207

07:31:52: RADIUS:  authenticator E9 13 EC CA 3B E8 3A 59 - 23 AE CE F8 7E 7C 0C B0

07:31:52: RADIUS:  User-Name           [1]   12  "Test\snoop"

07:31:52: RADIUS:  Service-Type        [6]   6   Framed                    [2]

07:31:52: RADIUS:  Framed-MTU          [12]  6   1500

07:31:52: RADIUS:  Called-Station-Id   [30]  19  "00-15-62-CE-3C-4F"

07:31:52: RADIUS:  Calling-Station-Id  [31]  19  "00-0B-5D-4F-2E-CF"

07:31:52: RADIUS:  EAP-Message         [79]  17

07:31:52: RADIUS:   02 01 00 0F 01 56 4C 41 42 5C 73 6E 6F 6F 70        [ Test\snoop]

07:31:52: RADIUS:  Message-Authenticato[80]  18

07:31:52: RADIUS:   A1 7B C4 BD 44 08 5D 69 EA 4E 4D 21 6B D1 9A 1C          [ {D]iNM!k]

07:31:52: RADIUS:  EAP-Key-Name        [102] 2   *

07:31:52: RADIUS:  Vendor, Cisco       [26]  49

07:31:52: RADIUS:   Cisco AVpair       [1]   43  "audit-session-id=C0A8C6C90000002F019D87A3"

07:31:52: RADIUS:  NAS-Port-Type       [61]  6   Ethernet                  [15]

07:31:52: RADIUS:  NAS-Port            [5]   6   50232

07:31:52: RADIUS:  NAS-Port-Id         [87]  21  "GigabitEthernet2/32"

07:31:52: RADIUS:  NAS-IP-Address      [4]   6   192.168.10.10

07:31:52: RADIUS: Received from id 1645/116 192.168.10.10:1645, Access-Challenge, len 72

07:31:52: RADIUS:  authenticator FC B5 8D 47 17 BE 3F 1D - 06 62 E9 8F EF 75 77 38

07:31:52: RADIUS:  EAP-Message         [79]  8

07:31:52: RADIUS:   01 1B 00 06 19 21                 [ !]

07:31:52: RADIUS:  State               [24]  26

07:31:52: RADIUS:   45 41 50 3D 30 2E 32 30 34 2E 38 37 2E 31 3B 53  [EAP=0.204.87.1;S]

07:31:52: RADIUS:   56 43 3D 30 2E 32 35 3B          [ VC=0.25;]

07:31:52: RADIUS:  Message-Authenticato[80]  18

07:31:52: RADIUS:   9E D2 63 9A 57 A2 73 65 A8 29 AC 5A C8 6F 78 2F         [ cWse)Zox/]

07:31:52: RADIUS(0000004A): Received from id 1645/116

07:31:52: RADIUS/DECODE: EAP-Message fragments, 6, total 6 bytes

07:31:52: dot1x-sm(Gi2/32): Posting EAP_REQ for 0x2F000033

07:31:52:     dot1x_auth_bend Gi2/32: during state auth_bend_response, got event 7(eapReq)

07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_response -> auth_bend_request

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_exit called

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_enter called

07:31:52: dot1x-ev(Gi2/32): Sending EAPOL packet to group PAE address

07:31:52: dot1x-ev(Gi2/32): Role determination not required

07:31:52: dot1x-registry:registry:dot1x_ether_macaddr called

07:31:52: dot1x-ev(Gi2/32): Sending out EAPOL packet

07:31:52: EAPOL pak dump Tx

07:31:52: EAPOL Version: 0x3  type: 0x0  length: 0x0006

07:31:52: EAP code: 0x1  id: 0x1B length: 0x0006 type: 0x19

07:31:52: dot1x-packet(Gi2/32): EAPOL packet sent to client 0x2F000033 (000b.5d4f.2ecf)

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_request_action called

07:31:52: dot1x-ev(Gi2/32): Role determination not required

07:31:52: dot1x-packet(Gi2/32): Queuing an EAPOL pkt on Authenticator Q

07:31:52: dot1x-ev:Enqueued the eapol packet to the global authenticator queue

07:31:52: EAPOL pak dump rx

07:31:52: EAPOL Version: 0x1  type: 0x0  length: 0x0057

07:31:52: dot1x-ev:

dot1x_auth_queue_event: Int Gi2/32 CODE= 2,TYPE= 25,LEN= 87

07:31:52: dot1x-packet(Gi2/32): Received an EAPOL frame

07:31:52: dot1x-ev(Gi2/32): Received pkt saddr =000b.5d4f.2ecf , daddr = 0180.c200.0003,

                    pae-ether-type = 888e.0100.0057

07:31:52: dot1x-packet(Gi2/32): Received an EAP packet

07:31:52: EAPOL pak dump rx

07:31:52: EAPOL Version: 0x1  type: 0x0  length: 0x0057

07:31:52: dot1x-packet(Gi2/32): Received an EAP packet from 000b.5d4f.2ecf

07:31:52: dot1x-sm(Gi2/32): Posting EAPOL_EAP for 0x2F000033

07:31:52:     dot1x_auth_bend Gi2/32: during state auth_bend_request, got event 6(eapolEap)

07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_request -> auth_bend_response

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_enter called

07:31:52: dot1x-ev(Gi2/32): dot1x_sendRespToServer: Response sent to the server from 0x2F000033 (000b.5d4f.2ecf)

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_response_action called

07:31:52: RADIUS/ENCODE(0000004A):Orig. component type = DOT1X

07:31:52: RADIUS(0000004A): Config NAS IP: 0.0.0.0

07:31:52: RADIUS/ENCODE(0000004A): acct_session_id: 300

07:31:52: RADIUS(0000004A): sending

07:31:52: RADIUS/ENCODE: Best Local IP-Address 192.168.10.10 for Radius-Server 192.168.10.10

07:31:52: RADIUS(0000004A): Send Access-Request to 192.168.10.10:1645 id 1645/117, len 305

07:31:52: RADIUS:  authenticator 4E 83 6A 6E F6 3D FD 20 - 98 60 32 71 EC 97 24 96

07:31:52: RADIUS:  User-Name           [1]   12  "Test\snoop"

07:31:52: RADIUS:  Service-Type        [6]   6   Framed                    [2]

07:31:52: RADIUS:  Framed-MTU          [12]  6   1500

07:31:52: RADIUS:  Called-Station-Id   [30]  19  "00-15-62-CE-3C-4F"

07:31:52: RADIUS:  Calling-Station-Id  [31]  19  "00-0B-5D-4F-2E-CF"

07:31:52: RADIUS:  EAP-Message         [79]  89

07:31:52: RADIUS:   02 1B 00 57 19 80 00 00 00 4D 16 03 01 00 48 01 00 00 44 03 01 4F D2 12 A8 4C E1 6B C1 00 F9 7B 21 9E 35 7C 81 09 A6 67 F1 DF C9 8B 3D 9F 7F D4 06 1E 13 AC 70 00 00 16 00 04 00 05 00 0A 00 09 00 64 00 62  [WMHDOLk{!5|g=pdb]

07:31:52: RADIUS:   00 03 00 06 00 13 00 12 00 63 01 00 00 05 FF 01 00 01 00                 [ c]

07:31:52: RADIUS:  Message-Authenticato[80]  18

07:31:52: RADIUS:   60 A8 28 4B A1 C0 30 D9 91 60 27 FE 70 96 F0 2A          [ `(K0`'p*]

07:31:52: RADIUS:  EAP-Key-Name        [102] 2   *

07:31:52: RADIUS:  Vendor, Cisco       [26]  49

07:31:52: RADIUS:   Cisco AVpair       [1]   43  "audit-session-id=C0A8C6C90000002F019D87A3"

07:31:52: RADIUS:  NAS-Port-Type       [61]  6   Ethernet                  [15]

07:31:52: RADIUS:  NAS-Port            [5]   6   50232

07:31:52: RADIUS:  NAS-Port-Id         [87]  21  "GigabitEthernet2/32"

07:31:52: RADIUS:  State               [24]  26

07:31:52: RADIUS:   45 41 50 3D 30 2E 32 30 34 2E 38 37 2E 31 3B 53  [EAP=0.204.87.1;S]

07:31:52: RADIUS:   56 43 3D 30 2E 32 35 3B          [ VC=0.25;]

07:31:52: RADIUS:  NAS-IP-Address      [4]   6   192.168.10.10

07:31:52: RADIUS: Received from id 1645/117 192.168.10.10:1645, Access-Challenge, len 958

07:31:52: RADIUS:  authenticator D9 73 7F F2 BA 90 4B 55 - B0 DE 60 70 45 88 F5 42

07:31:52: RADIUS:  EAP-Message         [79]  255

07:31:52: RADIUS:   01 1C 03 76 19 80 00 00 03 6C 16 03 01 00 4A 02 00 00 46 03 01 4F D2 12 A9 2C 8E 19 87 52 32 41 CA 4D 98 AD A6 40 7D 1D 49 1B 36 20 3C  [vlJFO,R2AM@}I6 <]

07:31:52: RADIUS:   8E E5 35 BA 51 71 8F C4 20 DE 95 AB 82 1D 52 B2 1E 35 A1 88 B3 16 84 08 7F E1 A2 24 BC 90 F6 23 9C 37 56 8B BB FC B3 E7 C7 00 0A 00 16 03 01 03 0F 0B 00 03 0B 00 03 08 00 03 05 30 82 03 01 30 82 01 E9 A0 03 02 01 02 02 01 01 30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 30  [5Qq R5$#7V000*H0]

07:31:52: RADIUS:   11 31 0F 30 0D 06 03 55 04 03 13 06 61 63 73 30 30 31 30 1E 17 0D 31 32 30 36 30 36  [10Uacs0010120606]

07:31:52: RADIUS:   31 33 33 32 32 34 5A 17 0D 31 33 30 36 30 36 31 33 33  [133224Z130606133]

07:31:52: RADIUS:   32 32 34 5A 30 11 31 0F 30 0D 06 03 55 04 03 13 06 61 63 73 30 30 31 30 82 01 22  [224Z010Uacs0010"]

07:31:52: RADIUS:   30 0D 06 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 82 01 0F 00 30 82 01 0A 02 82 01 01 00 A2 8E 75 73 A2 3F 90 18 60 48 6C BC 6D C7 22      [ 0*H0us?`Hlm"]

07:31:52: RADIUS:  EAP-Message         [79]  255

07:31:52: RADIUS:   2E 8C E0 3E E1 E1 CB F5 2E B0 4F BE DA B2 18 CB 03 8E 64 0E 15 8C 7E 92 8C C4 1E 8D CB 3E 39 AC D7 27 66 A1 52 92 DF B7 67 32 A8 B8 0A 31 72 39  [.>.Od~>9'fRg21r9]

07:31:52: RADIUS:   4A EA AE 00 72 6B 82 7E CD 18 6A 70 DD 32 FB DA C2 48 7B 8E 1A 18 4C 5F D2 87 8F 1F 3F E4 F1 B2 99 67 B6 A1 01 DB 6A B1 93 53 F4 AE 5E  [Jrk~jp2H{L_?gjS^]

07:31:52: RADIUS:   E9 DD 08 2D 62 64 72 C3 CA 61 4F 67 A9 39 59 7F 3D BB 1E 96 84 1B C3 B7 39 F9 BC A2 77 86 E3 F5 CF FB 7A B7 60 DE 14 2F F0 ED 31  [-bdraOg9Y=9wz`/1]

07:31:52: RADIUS:   94 8E 0D F3 7F AC 10 4E 31 B4 D3 F7 2C 2D D3 5B FD 29 41 DC 11 B6 A0 C9 0F E3 7E DC F9 E7 71 21 9B 92 4F 2B C5 8A BF 0F 27 BB 45 A5 55 97 E3 38  [N1,-[)A~q!O+'EU8]

07:31:52: RADIUS:   A2 0D 7B BF 10 8E EB F7 28 A5 4D D4 68 69 29 91 30 B0 86 E5 EE 08 C7 7B 7C 3E D1 59 6F 25 E5 51 8A 44 81 1D DF 9F DF CD B9 7E  [{(Mhi)0{|>Yo?QD~]

07:31:52: RADIUS:   78 A4 9E 88 EF BA 15 FB E6 9D BE BB 5D B5 ED 02 03 01 00 01 A3 64 30 62 30 0C 06            [ x]d0b0]

07:31:52: RADIUS:  EAP-Message         [79]  255

07:31:52: RADIUS:   03 55 1D 13 04 05 30 03 01 01 FF 30 0B 06 03 55 1D 0F 04 04 03 02 02 AC 30 1D 06 03 55 1D 0E 04 16 04 14 9C FF 9E 16 09 62 55 DE E9 C9 FD 75 89 7A F6 EF AC EB 11 A1 30 13 06 03 55 1D 25 04 0C 30 0A 06 08 2B 06 01 05 05 07 03 01 30  [U00U0UbUuz0U?0+0]

07:31:52: RADIUS:   11 06 09 60 86 48 01 86 F8 42 01 01 04 04 03 02 06 40 30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 03 82 01 01 00 9F 34 9C 25 AB 85 0B 08 6F 10 D3 6D 1A 88 70 2E DC C2 50 1B 43 3C  [`HB@0*H4?omp.PC<]

07:31:52: RADIUS:   76 2B 33 76 71 CB 69 D3 F3 15 6D B0 49 19 FA 79 D9 8A D6 F4 7E 26 33 EB 03 BD CC 3A 69 31 17 31  [v+3vqimIy~&3:i11]

07:31:52: RADIUS:   7F 6C 37 F0 E9 D7 5A 11 99 EE 21 5E 80 FF 29 ED 09 C7 D4 13 1B 2A 59 55 84 48 B4 C9 C6 04 6D 47 E3 60 94 EB 37 93 3E 4E  [l7Z!^)*YUHmG`7>N]

07:31:52: RADIUS:   30 64 CB 81 62 52 9A 10 05 91 99 4E 8B 00 99 2E FB FF 1E 22 6F F4 84 08 41 1D B2 38 E9 64 C0 84 41 98 84 C5 3F EC 57 75 C2 F8 6E  [0dbRN."oA8dA?Wun]

07:31:52: RADIUS:   31                 [ 1]

07:31:52: RADIUS:  EAP-Message         [79]  129

07:31:52: RADIUS:   42 AB 79 FB 75 24 2F 24 A0 F3 D0 CE 93 F8 7A 99 85 9F F5 B2 44 00 4D 0D 3C 79 56 2A E2 BB 53 C2 65 21  [Byu$/$zDM

07:31:52: RADIUS:   3C 55 34 8B 7A B8 2D 52 21 80 D0 CA F6 0E 98 22 59 CE 07 0D 89 13 6E 48 16 C3 69 B5 5E 6F 1B 78 E5 DC 4E  [

07:31:52: RADIUS:   2A 59 43 A1 9A 09 90 35 8F D3 AC 2A 9F D0 0F 54 CA E0 95 3A 70 B6 23 93 55 50 8C 0F 39 99 4A 43 F0 B6 C5 CF 6C F3 98 B9 B2 CF FC F4 D3 84 A9 9E 5B  [*YC5*T:p#UP9JCl[]

07:31:52: RADIUS:   16 03 01 00 04 0E 00 00 00

07:31:52: RADIUS:  State               [24]  26

07:31:52: RADIUS:   45 41 50 3D 30 2E 32 30 34 2E 38 37 2E 32 3B 53  [EAP=0.204.87.2;S]

07:31:52: RADIUS:   56 43 3D 30 2E 32 35 3B          [ VC=0.25;]

07:31:52: RADIUS:  Message-Authenticato[80]  18

07:31:52: RADIUS:   EB 58 47 E3 44 87 19 02 60 5F 63 D4 C7 73 FE BF           [ XGD`_cs]

07:31:52: RADIUS(0000004A): Received from id 1645/117

07:31:52: RADIUS/DECODE: EAP-Message fragments, 253+253+253+127, total 886 bytes

07:31:52: dot1x-sm(Gi2/32): Posting EAP_REQ for 0x2F000033

07:31:52:     dot1x_auth_bend Gi2/32: during state auth_bend_response, got event 7(eapReq)

07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_response -> auth_bend_request

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_exit called

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_enter called

07:31:52: dot1x-ev(Gi2/32): Sending EAPOL packet to group PAE address

07:31:52: dot1x-ev(Gi2/32): Role determination not required

07:31:52: dot1x-registry:registry:dot1x_ether_macaddr called

07:31:52: dot1x-ev(Gi2/32): Sending out EAPOL packet

07:31:52: EAPOL pak dump Tx

07:31:52: EAPOL Version: 0x3  type: 0x0  length: 0x0376

07:31:52: EAP code: 0x1  id: 0x1C length: 0x0376 type: 0x19

07:31:52: dot1x-packet(Gi2/32): EAPOL packet sent to client 0x2F000033 (000b.5d4f.2ecf)

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_request_action called

07:31:52: dot1x-ev(Gi2/32): Role determination not required

07:31:52: dot1x-packet(Gi2/32): Queuing an EAPOL pkt on Authenticator Q

07:31:52: dot1x-ev:Enqueued the eapol packet to the global authenticator queue

07:31:52: EAPOL pak dump rx

07:31:52: EAPOL Version: 0x1  type: 0x0  length: 0x0148

07:31:52: dot1x-ev:

dot1x_auth_queue_event: Int Gi2/32 CODE= 2,TYPE= 25,LEN= 328

07:31:52: dot1x-packet(Gi2/32): Received an EAPOL frame

07:31:52: dot1x-ev(Gi2/32): Received pkt saddr =000b.5d4f.2ecf , daddr = 0180.c200.0003,

                    pae-ether-type = 888e.0100.0148

07:31:52: dot1x-packet(Gi2/32): Received an EAP packet

07:31:52: EAPOL pak dump rx

07:31:52: EAPOL Version: 0x1  type: 0x0  length: 0x0148

07:31:52: dot1x-packet(Gi2/32): Received an EAP packet from 000b.5d4f.2ecf

07:31:52: dot1x-sm(Gi2/32): Posting EAPOL_EAP for 0x2F000033

07:31:52:     dot1x_auth_bend Gi2/32: during state auth_bend_request, got event 6(eapolEap)

07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_request -> auth_bend_response

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_enter called

07:31:52: dot1x-ev(Gi2/32): dot1x_sendRespToServer: Response sent to the server from 0x2F000033 (000b.5d4f.2ecf)

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_response_action called

07:31:52: RADIUS/ENCODE(0000004A):Orig. component type = DOT1X

07:31:52: RADIUS/ENCODE: EAP-Message fragment 328 into 253+75, total 328 bytes

07:31:52: RADIUS(0000004A): Config NAS IP: 0.0.0.0

07:31:52: RADIUS/ENCODE(0000004A): acct_session_id: 300

07:31:52: RADIUS(0000004A): sending

07:31:52: RADIUS/ENCODE: Best Local IP-Address 192.168.10.10 for Radius-Server 192.168.10.10

07:31:52: RADIUS(0000004A): Send Access-Request to 192.168.10.10:1645 id 1645/118, len 548

07:31:52: RADIUS:  authenticator 1B B4 3C CD 12 92 53 BE - 5D 64 A7 00 01 E7 CC ED

07:31:52: RADIUS:  User-Name           [1]   12  "Test\snoop"

07:31:52: RADIUS:  Service-Type        [6]   6   Framed                    [2]

07:31:52: RADIUS:  Framed-MTU          [12]  6   1500

07:31:52: RADIUS:  Called-Station-Id   [30]  19  "00-15-62-CE-3C-4F"

07:31:52: RADIUS:  Calling-Station-Id  [31]  19  "00-0B-5D-4F-2E-CF"

07:31:52: RADIUS:  EAP-Message         [79]  255

07:31:52: RADIUS:   02 1C 01 48 19 80 00 00 01 3E 16 03 01 01 06 10 00 01 02 01 00 15 4A 5A 43 4F 40 22 4C 18 37 50 F0 EF 8A EC E5 7F 37 54 F1 66 70 DF 48  [H>JZCO@"L7P7TfpH]

07:31:52: RADIUS:   3B BA B0 52 83 65 C6 50 A9 29 BC FF 49 AA 07 8E DD EF 4D 87 7A 83 C4 11 52 D7 70 89 C7 2B B8 1F 0D 0D CF 67 D4 ED 91 92 F8 22 EA EE 1F E9 9A 3A 1C 70 09 95 49  [;ReP)IMzRp+g":pI]

07:31:52: RADIUS:   D2 3E E3 92 16 D9 B9 8F BB 81 85 35 6B B3 2E 51 C5 01 D7 A0 73 AC 04 D9 77 9B 96 60 82 4C 1D E2 90 3A E4 CF 29 00 5E E4 8F BE 97 F0 A1 7E B5 98 6C 71 9D F7 20  [>5k.Qsw`L:)^~lq ]

07:31:52: RADIUS:   B3 53 3E 3A 9A 72 99 74 52 4C 56 0B 40 77 3B B9 49 F8 0D 48 91 7E 8F E5 02 03 D5 6C 6D  [S>:rtRLV@w;IH~lm]

07:31:52: RADIUS:   37 DD 8F 15 17 EF 48 34 1A AD 36 8A 7F 95 8B 2E 4B F1 C9 26 C5 E4 5D 22 FE AA D0 03 09 9F B2 F6 82 CA B8 84 33 D7 DB 7C 3F C8 C8 78 36 34 B3 9E 0C 3B  [7H46.K&]"3|?x64;]

07:31:52: RADIUS:   81 E2 EC F9 53 C5 82 14 43 80 0D 76 A8 D8 5D D0 04 3B 44 BE 86 DA 3A           [ SCv];D:]

07:31:52: RADIUS:  EAP-Message         [79]  77

07:31:52: RADIUS:   48 55 54 8D F7 8A 26 10 3B 21 DE BC 7D 8F 26 2A 98 4D 3E 9A 08 7D DD D4 14 03 01 00 01 01 16 03 01 00 28 3E C5 CE 60 71  [HUT&;!}&*M>}(>`q]

07:31:52: RADIUS:   7D 46 45 00 B0 C9 4F 5E 94 F1 99 B1 78 DF FC 1F A9 42 A4 AE AB 93 7C 48 BF 61 6A B0 7F 41 E9 63 6C D2 6B   [ }FEO^xB|HajAclk]

07:31:52: RADIUS:  Message-Authenticato[80]  18

07:31:52: RADIUS:   E7 1F 6F 13 F0 FC 1A 08 AE A2 E0 7C 9B CB 98 85                [ o|]

07:31:52: RADIUS:  EAP-Key-Name        [102] 2   *

07:31:52: RADIUS:  Vendor, Cisco       [26]  49

07:31:52: RADIUS:   Cisco AVpair       [1]   43  "audit-session-id=C0A8C6C90000002F019D87A3"

07:31:52: RADIUS:  NAS-Port-Type       [61]  6   Ethernet                  [15]

07:31:52: RADIUS:  NAS-Port            [5]   6   50232

07:31:52: RADIUS:  NAS-Port-Id         [87]  21  "GigabitEthernet2/32"

07:31:52: RADIUS:  State               [24]  26

07:31:52: RADIUS:   45 41 50 3D 30 2E 32 30 34 2E 38 37 2E 32 3B 53  [EAP=0.204.87.2;S]

07:31:52: RADIUS:   56 43 3D 30 2E 32 35 3B          [ VC=0.25;]

07:31:52: RADIUS:  NAS-IP-Address      [4]   6   192.168.10.10

07:31:52: RADIUS: Received from id 1645/118 192.168.10.10:1645, Access-Challenge, len 127

07:31:52: RADIUS:  authenticator 27 41 0D EF B3 3C F8 D1 - C2 62 56 15 B1 7A DD BA

07:31:52: RADIUS:  EAP-Message         [79]  63

07:31:52: RADIUS:   01 1D 00 3D 19 80 00 00 00 33 14 03 01 00 01 01 16 03 01 00 28 C8 10 06 02 B0 68 69 36 A2 31 94 41 B9 FD 22 E7 C9 0F 09 A8 D5 9D 4A 54 93 B1 9F 7F CF 32 9F 2D 08 94 96 40 20 F7 2B  [=3(hi61A"JT2-@ +]

07:31:52: RADIUS:   F1

07:31:52: RADIUS:  State               [24]  26

07:31:52: RADIUS:   45 41 50 3D 30 2E 32 30 34 2E 38 37 2E 33 3B 53  [EAP=0.204.87.3;S]

07:31:52: RADIUS:   56 43 3D 30 2E 32 35 3B          [ VC=0.25;]

07:31:52: RADIUS:  Message-Authenticato[80]  18

07:31:52: RADIUS:   C9 99 CD 3A 10 31 83 76 7F C9 95 D5 92 93 59 D1              [ :1vY]

07:31:52: RADIUS(0000004A): Received from id 1645/118

07:31:52: RADIUS/DECODE: EAP-Message fragments, 61, total 61 bytes

07:31:52: dot1x-sm(Gi2/32): Posting EAP_REQ for 0x2F000033

07:31:52:     dot1x_auth_bend Gi2/32: during state auth_bend_response, got event 7(eapReq)

07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_response -> auth_bend_request

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_exit called

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_enter called

07:31:52: dot1x-ev(Gi2/32): Sending EAPOL packet to group PAE address

07:31:52: dot1x-ev(Gi2/32): Role determination not required

07:31:52: dot1x-registry:registry:dot1x_ether_macaddr called

07:31:52: dot1x-ev(Gi2/32): Sending out EAPOL packet

07:31:52: EAPOL pak dump Tx

07:31:52: EAPOL Version: 0x3  type: 0x0  length: 0x003D

07:31:52: EAP code: 0x1  id: 0x1D length: 0x003D type: 0x19

07:31:52: dot1x-packet(Gi2/32): EAPOL packet sent to client 0x2F000033 (000b.5d4f.2ecf)

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_request_action called

07:31:52: dot1x-ev(Gi2/32): Role determination not required

07:31:52: dot1x-packet(Gi2/32): Queuing an EAPOL pkt on Authenticator Q

07:31:52: dot1x-ev:Enqueued the eapol packet to the global authenticator queue

07:31:52: EAPOL pak dump rx

07:31:52: EAPOL Version: 0x1  type: 0x0  length: 0x0006

07:31:52: dot1x-ev:

dot1x_auth_queue_event: Int Gi2/32 CODE= 2,TYPE= 25,LEN= 6

07:31:52: dot1x-packet(Gi2/32): Received an EAPOL frame

07:31:52: dot1x-ev(Gi2/32): Received pkt saddr =000b.5d4f.2ecf , daddr = 0180.c200.0003,

                    pae-ether-type = 888e.0100.0006

07:31:52: dot1x-packet(Gi2/32): Received an EAP packet

07:31:52: EAPOL pak dump rx

07:31:52: EAPOL Version: 0x1  type: 0x0  length: 0x0006

07:31:52: dot1x-packet(Gi2/32): Received an EAP packet from 000b.5d4f.2ecf

07:31:52: dot1x-sm(Gi2/32): Posting EAPOL_EAP for 0x2F000033

07:31:52:     dot1x_auth_bend Gi2/32: during state auth_bend_request, got event 6(eapolEap)

07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_request -> auth_bend_response

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_enter called

07:31:52: dot1x-ev(Gi2/32): dot1x_sendRespToServer: Response sent to the server from 0x2F000033 (000b.5d4f.2ecf)

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_response_action called

07:31:52: RADIUS/ENCODE(0000004A):Orig. component type = DOT1X

07:31:52: RADIUS(0000004A): Config NAS IP: 0.0.0.0

07:31:52: RADIUS/ENCODE(0000004A): acct_session_id: 300

07:31:52: RADIUS(0000004A): sending

07:31:52: RADIUS/ENCODE: Best Local IP-Address 192.168.10.10 for Radius-Server 192.168.10.10

07:31:52: RADIUS(0000004A): Send Access-Request to 192.168.10.10:1645 id 1645/119, len 224

07:31:52: RADIUS:  authenticator F3 AE 8D EB 66 EA CC 04 - E4 3D 2B C0 2A 80 FA C5

07:31:52: RADIUS:  User-Name           [1]   12  "Test\snoop"

07:31:52: RADIUS:  Service-Type        [6]   6   Framed                    [2]

07:31:52: RADIUS:  Framed-MTU          [12]  6   1500

07:31:52: RADIUS:  Called-Station-Id   [30]  19  "00-15-62-CE-3C-4F"

07:31:52: RADIUS:  Calling-Station-Id  [31]  19  "00-0B-5D-4F-2E-CF"

07:31:52: RADIUS:  EAP-Message         [79]  8

07:31:52: RADIUS:   02 1D 00 06 19 00

07:31:52: RADIUS:  Message-Authenticato[80]  18

07:31:52: RADIUS:   2F 12 21 0A 31 45 E8 9E AA 4C 62 4F 42 56 EB 01         [ /!1ELbOBV]

07:31:52: RADIUS:  EAP-Key-Name        [102] 2   *

07:31:52: RADIUS:  Vendor, Cisco       [26]  49

07:31:52: RADIUS:   Cisco AVpair       [1]   43  "audit-session-id=C0A8C6C90000002F019D87A3"

07:31:52: RADIUS:  NAS-Port-Type       [61]  6   Ethernet                  [15]

07:31:52: RADIUS:  NAS-Port            [5]   6   50232

07:31:52: RADIUS:  NAS-Port-Id         [87]  21  "GigabitEthernet2/32"

07:31:52: RADIUS:  State               [24]  26

07:31:52: RADIUS:   45 41 50 3D 30 2E 32 30 34 2E 38 37 2E 33 3B 53  [EAP=0.204.87.3;S]

07:31:52: RADIUS:   56 43 3D 30 2E 32 35 3B          [ VC=0.25;]

07:31:52: RADIUS:  NAS-IP-Address      [4]   6   192.168.10.10

07:31:52: RADIUS: Received from id 1645/119 192.168.10.10:1645, Access-Challenge, len 101

07:31:52: RADIUS:  authenticator 8D 13 3B A4 D9 A1 11 D4 - 95 FC E2 A8 44 63 E2 6A

07:31:52: RADIUS:  EAP-Message         [79]  37

07:31:52: RADIUS:   01 1E 00 23 19 00 17 03 01 00 18 81 2B 16 5E C3 B8 FB 09 EE 73 49 C1 69 D3 72 9F B0 A1 5A D1 8C E4 05 5B         [ #+^sIirZ[]

07:31:52: RADIUS:  State               [24]  26

07:31:52: RADIUS:   45 41 50 3D 30 2E 32 30 34 2E 38 37 2E 34 3B 53  [EAP=0.204.87.4;S]

07:31:52: RADIUS:   56 43 3D 30 2E 32 35 3B          [ VC=0.25;]

07:31:52: RADIUS:  Message-Authenticato[80]  18

07:31:52: RADIUS:   B0 F6 80 89 FB 12 47 A7 4E B9 33 D6 45 69 0F 7C            [ GN3Ei|]

07:31:52: RADIUS(0000004A): Received from id 1645/119

07:31:52: RADIUS/DECODE: EAP-Message fragments, 35, total 35 bytes

07:31:52: dot1x-sm(Gi2/32): Posting EAP_REQ for 0x2F000033

07:31:52:     dot1x_auth_bend Gi2/32: during state auth_bend_response, got event 7(eapReq)

07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_response -> auth_bend_request

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_exit called

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_enter called

07:31:52: dot1x-ev(Gi2/32): Sending EAPOL packet to group PAE address

07:31:52: dot1x-ev(Gi2/32): Role determination not required

07:31:52: dot1x-registry:registry:dot1x_ether_macaddr called

07:31:52: dot1x-ev(Gi2/32): Sending out EAPOL packet

07:31:52: EAPOL pak dump Tx

07:31:52: EAPOL Version: 0x3  type: 0x0  length: 0x0023

07:31:52: EAP code: 0x1  id: 0x1E length: 0x0023 type: 0x19

07:31:52: dot1x-packet(Gi2/32): EAPOL packet sent to client 0x2F000033 (000b.5d4f.2ecf)

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_request_action called

07:31:52: dot1x-ev(Gi2/32): Role determination not required

07:31:52: dot1x-packet(Gi2/32): Queuing an EAPOL pkt on Authenticator Q

07:31:52: dot1x-ev:Enqueued the eapol packet to the global authenticator queue

07:31:52: EAPOL pak dump rx

07:31:52: EAPOL Version: 0x1  type: 0x0  length: 0x002B

07:31:52: dot1x-ev:

dot1x_auth_queue_event: Int Gi2/32 CODE= 2,TYPE= 25,LEN= 43

07:31:52: dot1x-packet(Gi2/32): Received an EAPOL frame

07:31:52: dot1x-ev(Gi2/32): Received pkt saddr =000b.5d4f.2ecf , daddr = 0180.c200.0003,

                    pae-ether-type = 888e.0100.002b

07:31:52: dot1x-packet(Gi2/32): Received an EAP packet

07:31:52: EAPOL pak dump rx

07:31:52: EAPOL Version: 0x1  type: 0x0  length: 0x002B

07:31:52: dot1x-packet(Gi2/32): Received an EAP packet from 000b.5d4f.2ecf

07:31:52: dot1x-sm(Gi2/32): Posting EAPOL_EAP for 0x2F000033

07:31:52:     dot1x_auth_bend Gi2/32: during state auth_bend_request, got event 6(eapolEap)

07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_request -> auth_bend_response

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_enter called

07:31:52: dot1x-ev(Gi2/32): dot1x_sendRespToServer: Response sent to the server from 0x2F000033 (000b.5d4f.2ecf)

07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_response_action called

07:31:52: RADIUS/ENCODE(0000004A):Orig. component type = DOT1X

07:31:52: RADIUS(0000004A): Config NAS IP: 0.0.0.0

07:31:52: RADIUS/ENCODE(0000004A): acct_session_id: 300

07:31:52: RADIUS(0000004A): sending

07:31:52: RADIUS/ENCODE: Best Local IP-Address 192.168.10.10 for Radius-Server 192.168.10.10

07:31:52: RADIUS(0000004A): Send Access-Request to 192.168.10.10:1645 id 1645/120, len 261

07:31:52: RADIUS:  authenticator DF 0A B9 1D F9 EF DB 31 - A2 3F B2 42 9F EE C1 C0

07:31:52: RADIUS:  User-Name           [1]   12  "Test\snoop"

07:31:52: RADIUS:  Service-Type        [6]   6   Framed                    [2]

07:31:52: RADIUS:  Framed-MTU          [12]  6   1500

07:31:52: RADIUS:  Called-Station-Id   [30]  19  "00-15-62-CE-3C-4F"

07:31:52: RADIUS:  Calling-Station-Id  [31]  19  "00-0B-5D-4F-2E-CF"

07:31:52: RADIUS:  EAP-Message         [79]  45

07:31:52: RADIUS:   02 1E 00 2B 19 00 17 03 01 00 20 5E F7 3E 81 61 6E 70 2D 6E D3 41 4C 8D D6 9F EB 8A 07 9E 15 C7 BA 94 FF F4 6B D7 FE 4A C2 CE 32    [ + ^>anp-nALkJ2]

07:31:52: RADIUS:  Message-Authenticato[80]  18

07:31:52: RADIUS:   D5 92 A7 B5 66 E4 CB 7F F3 08 4E 9F 87 1B 23 BC               [ fN#]

07:31:52: RADIUS:  EAP-Key-Name        [102] 2   *

07:31:52: RADIUS:  Vendor, Cisco       [26]  49

07:31:52: RADIUS:   Cisco AVpair       [1]   43  "audit-session-id=C0A8C6C90000002F019D87A3"

07:31:52: RADIUS:  NAS-Port-Type       [61]  6   Ethernet                  [15]

07:31:52: RADIUS:  NAS-Port            [5]   6   50232

07:31:52: RADIUS:  NAS-Port-Id         [87]  21  "GigabitEthernet2/32"

07:31:52: RADIUS:  State               [24]  26

07:31:52: RADIUS:   45 41 50 3D 30 2E 32 30 34 2E 38 37 2E 34 3B 53  [EAP=0.204.87.4;S]

07:31:52: RADIUS:   56 43 3D 30 2E 32 35 3B          [ VC=0.25;]

07:31:52: RADIUS:  NAS-IP-Address      [4]   6   192.168.10.10

07:31:53: RADIUS: Received from id 1645/120 192.168.10.10:1645, Access-Challenge, len 141

07:31:53: RADIUS:  authenticator B6 76 F9 88 FE F8 65 5A - 9C 9A D3 5A 29 E6 6F 7B

07:31:53: RADIUS:  EAP-Message         [79]  77

07:31:53: RADIUS:   01 1F 00 4B 19 00 17 03 01 00 40 36 34 4D CE 91 2E CA 42 30 1B 9C DB 7A 11 A4 10 39 11 8D E2 FC 6C 7E 0D 65 03 E5 B7 05 C3 5F A5 64 79  [K@64M.B0z9l~e_dy]

07:31:53: RADIUS:   9A 61 1C E2 30 56 57 B6 42 06 4E BD 96 02 78 16 59 0D CA 01 F8 AB CE 51 F2 77 2F EE C5 D3       [ a0VWBNxYQw/]

07:31:53: RADIUS:  State               [24]  26

07:31:53: RADIUS:   45 41 50 3D 30 2E 32 30 34 2E 38 37 2E 35 3B 53  [EAP=0.204.87.5;S]

07:31:53: RADIUS:   56 43 3D 30 2E 32 35 3B          [ VC=0.25;]

07:31:53: RADIUS:  Message-Authenticato[80]  18

07:31:53: RADIUS:   6B 69 DF 80 CC 08 92 85 F6 6C EF E2 BD 58 D2 6F             [ kilXo]

07:31:53: RADIUS(0000004A): Received from id 1645/120

07:31:53: RADIUS/DECODE: EAP-Message fragments, 75, total 75 bytes

07:31:53: dot1x-sm(Gi2/32): Posting EAP_REQ for 0x2F000033

07:31:53:     dot1x_auth_bend Gi2/32: during state auth_bend_response, got event 7(eapReq)

07:31:53: @@@ dot1x_auth_bend Gi2/32: auth_bend_response -> auth_bend_request

07:31:53: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_exit called

07:31:53: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_enter called

07:31:53: dot1x-ev(Gi2/32): Sending EAPOL packet to group PAE address

07:31:53: dot1x-ev(Gi2/32): Role determination not required

07:31:53: dot1x-registry:registry:dot1x_ether_macaddr called

07:31:53: dot1x-ev(Gi2/32): Sending out EAPOL packet

07:31:53: EAPOL pak dump Tx

07:31:53: EAPOL Version: 0x3  type: 0x0  length: 0x004B

07:31:53: EAP code: 0x1  id: 0x1F length: 0x004B type: 0x19

07:31:53: dot1x-packet(Gi2/32): EAPOL packet sent to client 0x2F000033 (000b.5d4f.2ecf)

07:31:53: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_request_action called

07:31:53: dot1x-ev(Gi2/32): Role determination not required

07:31:53: dot1x-packet(Gi2/32): Queuing an EAPOL pkt on Authenticator Q

07:31:53: dot1x-ev:Enqueued the eapol packet to the global authenticator queue

07:31:53: EAPOL pak dump rx

07:31:53: EAPOL Version: 0x1  type: 0x0  length: 0x0063

07:31:53: dot1x-ev:

dot1x_auth_queue_event: Int Gi2/32 CODE= 2,TYPE= 25,LEN= 99

07:31:53: dot1x-packet(Gi2/32): Received an EAPOL frame

07:31:53: dot1x-ev(Gi2/32): Received pkt saddr =000b.5d4f.2ecf , daddr = 0180.c200.0003,

                    pae-ether-type = 888e.0100.0063

07:31:53: dot1x-packet(Gi2/32): Received an EAP packet

07:31:53: EAPOL pak dump rx

07:31:53: EAPOL Version: 0x1  type: 0x0  length: 0x0063

07:31:53: dot1x-packet(Gi2/32): Received an EAP packet from 000b.5d4f.2ecf

07:31:53: dot1x-sm(Gi2/32): Posting EAPOL_EAP for 0x2F000033

07:31:53:     dot1x_auth_bend Gi2/32: during state auth_bend_request, got event 6(eapolEap)

07:31:53: @@@ dot1x_auth_bend Gi2/32: auth_bend_request -> auth_bend_response

07:31:53: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_enter called

07:31:53: dot1x-ev(Gi2/32): dot1x_sendRespToServer: Response sent to the server from 0x2F000033 (000b.5d4f.2ecf)

07:31:53: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_response_action called

07:31:53: RADIUS/ENCODE(0000004A):Orig. component type = DOT1X

07:31:53: RADIUS(0000004A): Config NAS IP: 0.0.0.0

07:31:53: RADIUS/ENCODE(0000004A): acct_session_id: 300

07:31:53: RADIUS(0000004A): sending

07:31:53: RADIUS/ENCODE: Best Local IP-Address 192.168.10.10 for Radius-Server 192.168.10.10

07:31:53: RADIUS(0000004A): Send Access-Request to 192.168.10.10:1645 id 1645/121, len 317

07:31:53: RADIUS:  authenticator E5 ED 72 78 40 54 F1 BB - A0 1D 4B 14 EE 21 52 04

07:31:53: RADIUS:  User-Name           [1]   12  "Test\snoop"

07:31:53: RADIUS:  Service-Type        [6]   6   Framed                    [2]

07:31:53: RADIUS:  Framed-MTU          [12]  6   1500

07:31:53: RADIUS:  Called-Station-Id   [30]  19  "00-15-62-CE-3C-4F"

07:31:53: RADIUS:  Calling-Station-Id  [31]  19  "00-0B-5D-4F-2E-CF"

07:31:53: RADIUS:  EAP-Message         [79]  101

07:31:53: RADIUS:   02 1F 00 63 19 00 17 03 01 00 58 66 A0 97 3E 58 52 D8 A5 43 F6 7B 3D 62 98 32 F3 78 CF A9 50 56 84 A5 9F CA E6 1D 3A 72  [cXf>XRC{=b2xPV:r]

07:31:53: RADIUS:   21 05 2B C9 CC BF 97 42 7C 20 8F C9 96 66 A4 F5 63 3C CB 76 FD 68 B1 B3 4F 29 1D C3 3C 95 8A 8B 21 0C 02 3A 84 14 CE F8 81 4F  [!+B| fc

07:31:53: RADIUS:   92 F2 75 AE 8D 0B BA 5F DF C4 F3 33 57 94 D6 82 D6              [ u_3W]

07:31:53: RADIUS:  Message-Authenticato[80]  18

07:31:53: RADIUS:   94 85 07 92 18 9B B8 D0 05 EC 04 92 DE D6 3E 2C                [ >,]

07:31:53: RADIUS:  EAP-Key-Name        [102] 2   *

07:31:53: RADIUS:  Vendor, Cisco       [26]  49

07:31:53: RADIUS:   Cisco AVpair       [1]   43  "audit-session-id=C0A8C6C90000002F019D87A3"

07:31:53: RADIUS:  NAS-Port-Type       [61]  6   Ethernet                  [15]

07:31:53: RADIUS:  NAS-Port            [5]   6   50232

07:31:53: RADIUS:  NAS-Port-Id         [87]  21  "GigabitEthernet2/32"

07:31:53: RADIUS:  State               [24]  26

07:31:53: RADIUS:   45 41 50 3D 30 2E 32 30 34 2E 38 37 2E 35 3B 53  [EAP=0.204.87.5;S]

07:31:53: RADIUS:   56 43 3D 30 2E 32 35 3B          [ VC=0.25;]

07:31:53: RADIUS:  NAS-IP-Address      [4]   6   192.168.10.10

07:31:53: RADIUS: Received from id 1645/121 192.168.10.10:1645, Access-Challenge, len 149

07:31:53: RADIUS:  authenticator BF E4 10 10 FF CD 33 36 - C1 EC 9F AE 08 98 69 E3

07:31:53: RADIUS:  EAP-Message         [79]  85

07:31:53: RADIUS:   01 20 00 53 19 00 17 03 01 00 48 19 A5 F4 03 9B 47 5C 99 B9 5E 8D 86 A2 76 23 5B A3 D4 2F FF 42 00 C4 E4 67 CD 96 4B E4 7D 65 8B B3 79  [ SHG\^v#[/BgK}ey]

07:31:53: RADIUS:   5A 69 31 D1 A2 13 A2 1A 68 F1 81 33 81 EF 7B A3 A1 B1 49 5E 32 75 2C DD 80 59 45 F9 EB C0 77 0B EF 0A EF 9C 64 B0   [ Zi1h3{I^2u,YEwd]

07:31:53: RADIUS:  State               [24]  26

07:31:53: RADIUS:   45 41 50 3D 30 2E 32 30 34 2E 38 37 2E 36 3B 53  [EAP=0.204.87.6;S]

07:31:53: RADIUS:   56 43 3D 30 2E 32 35 3B          [ VC=0.25;]

07:31:53: RADIUS:  Message-Authenticato[80]  18

07:31:53: RADIUS:   CE 15 CD 59 D8 9D DE 1D FC 7B 17 61 59 65 E1 98             [ Y{aYe]

07:31:53: RADIUS(0000004A): Received from id 1645/121

07:31:53: RADIUS/DECODE: EAP-Message fragments, 83, total 83 bytes

07:31:53: dot1x-sm(Gi2/32): Posting EAP_REQ for 0x2F000033

07:31:53:     dot1x_auth_bend Gi2/32: during state auth_bend_response, got event 7(eapReq)

07:31:53: @@@ dot1x_auth_bend Gi2/32: auth_bend_response -> auth_bend_request

07:31:53: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_exit called

07:31:53: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_enter called

07:31:53: dot1x-ev(Gi2/32): Sending EAPOL packet to group PAE address

07:31:53: dot1x-ev(Gi2/32): Role determination not required

07:31:53: dot1x-registry:registry:dot1x_ether_macaddr called

07:31:53: dot1x-ev(Gi2/32): Sending out EAPOL packet

07:31:53: EAPOL pak dump Tx

07:31:53: EAPOL Version: 0x3  type: 0x0  length: 0x0053

07:31:53: EAP code: 0x1  id: 0x20 length: 0x0053 type: 0x19

07:31:53: dot1x-packet(Gi2/32): EAPOL packet sent to client 0x2F000033 (000b.5d4f.2ecf)

07:31:53: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_request_action called

07:31:53: dot1x-ev(Gi2/32): Role determination not required

07:31:53: dot1x-packet(Gi2/32): Queuing an EAPOL pkt on Authenticator Q

07:31:53: dot1x-ev:Enqueued the eapol packet to the global authenticator queue

07:31:53: EAPOL pak dump rx

07:31:53: EAPOL Version: 0x1  type: 0x0  length: 0x0023

07:31:53: dot1x-ev:

dot1x_auth_queue_event: Int Gi2/32 CODE= 2,TYPE= 25,LEN= 35

07:31:53: dot1x-packet(Gi2/32): Received an EAPOL frame

07:31:53: dot1x-ev(Gi2/32): Received pkt saddr =000b.5d4f.2ecf , daddr = 0180.c200.0003,

                    pae-ether-type = 888e.0100.0023

07:31:53: dot1x-packet(Gi2/32): Received an EAP packet

07:31:53: EAPOL pak dump rx

07:31:53: EAPOL Version: 0x1  type: 0x0  length: 0x0023

07:31:53: dot1x-packet(Gi2/32): Received an EAP packet from 000b.5d4f.2ecf

07:31:53: dot1x-sm(Gi2/32): Posting EAPOL_EAP for 0x2F000033

07:31:53:     dot1x_auth_bend Gi2/32: during state auth_bend_request, got event 6(eapolEap)

07:31:53: @@@ dot1x_auth_bend Gi2/32: auth_bend_request -> auth_bend_response

07:31:53: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_enter called

07:31:53: dot1x-ev(Gi2/32): dot1x_sendRespToServer: Response sent to the server from 0x2F000033 (000b.5d4f.2ecf)

07:31:53: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_response_action called

07:31:53: RADIUS/ENCODE(0000004A):Orig. component type = DOT1X

07:31:53: RADIUS(0000004A): Config NAS IP: 0.0.0.0

07:31:53: RADIUS/ENCODE(0000004A): acct_session_id: 300

07:31:53: RADIUS(0000004A): sending

Hello ikatyal,

now it get under Radius Accounting that the authentification was succssful.

How i can see , that my Client ist using the certificate (ca)

regards

Content for Community-Ad