06-08-2012 05:57 AM - edited 03-10-2019 07:10 PM
Hello Community!
I have a Cisco 4506 With IOS 12.2 54SG1
Iam new on Acs 4.2 and i want to use Certificates to authenticate my windows XP Client and Igels.
On Windows Xp i selected :
IEEE 802.1X Authentication enable EAP (Peap)
But i dont understand the Certification of ACS 4.2.
I generated a Self-Signed Certificate. Is this right ? and under installed Certificates the Certificate Status is okay.
Do i have to create for each windows Machine one user Account under user-Setup to authenticate the Machine?
Where do Windows Xp know whitch Certificate he have to take ?
I configures the Switch on Global Configuration like this:
aaa authentication login default group tacacs+ enable
aaa authentication enable default group tacacs+ enable
aaa authentication dot1x default group radius
aaa authorization exec default group tacacs+
aaa authorization commands 15 default group tacacs+
aaa authorization network default group radius
aaa accounting dot1x default start-stop group radius
aaa accounting commands 15 default start-stop group tacacs+
dot1x system-auth-control
tacacs-server host 192.168.10.10
tacacs-server directed-request
tacacs-server key cisco
radius-server host 192.168.10.10 auth-port 1645 acct-port 1646
radius-server key cisco
radius-server vsa send accounting
radius-server vsa send authentication
i configured the ACCess port like this:
interface GigabitEthernet2/1
description PEAP
switchport access vlan 5
switchport mode access
authentication host-mode multi-domain
authentication order mab dot1x
authentication priority mab dot1x
authentication port-control auto
mab
no snmp trap link-status
dot1x pae authenticator
dot1x timeout quiet-period 50
spanning-tree portfast
spanning-tree bpduguard enable
Iam triying to configure ist szenario till 4 days and it still dont work.. On Windows i Only get the Error" authentication failed"
on the Switch the same : dot1x : Authfailed
What do i wrong ?
Can someone help me.
THX
06-08-2012 07:41 AM
With Peap, machine and user certificates are not required so you don't need to install it on the machines.
Self-signed Certificate Setup (only if you do not use an external CA)
Self-signed certificates are certificates you create without a root or the intermediate involvement of the CA. They have the same value in both the subject and issuer fields like a Root CA Certificate. Do not use a key size greater than 1024 for compatibility with PEAP and EAP-TLS. If you use a self-signed certificate, the certificate also acts in the capacity of the Root CA Certificate and must be installed in the Certificates (Local Computer) > Trusted Root Certification Authorities > Certificates folder of the client when you use the Microsoft EAP supplicant. It automatically installs in the trusted root certificates store on the server. However, it must still be trusted in the Certificate Trust List in ACS Certificate Setup. See the Root CA Certificates section for more information.
Because self-signed certificates are used as the Root CA Certificate for Server Certificate validation when you use the Microsoft EAP supplicant, and because the validity period cannot be increased from the default of one year
Could you please turn on debugs;
debug dot1x all
debug radius
term mon
Regards,
Jatin
Do rate helpful posts-
06-08-2012 08:10 AM
Hello Jatin,
thanks for your replay.... do i have to install the Self made certificate local on the ACS 4.2 Server =?
Do i have to add this zertificate with Group Policy to the "Trusted Root Certification Autorities" ? do Windows Xp user can enable this from the "Trusted Root Certification Autorities ?
Do i have to create user Accounts on the ACS Server ?
The Link that u posted is forbbiden for me.
**********************************************************************************
07:26:39: AUTH-EVENT (Gi2/32): 'restart' timer expired for client 0000.0000.0000
07:26:39: AUTH-EVENT (Gi2/32): Client 0000.0000.0000, Initialising Method dot1x state to 'Not run'
07:26:39: AUTH-EVENT (Gi2/32): Adding method dot1x to runnable list for Auth Mgr context 0xE200002F
07:26:39: AUTH-EVENT (Gi2/32): Sending START to dot1x (handle 0xE200002F)
07:26:39: dot1x_auth Gi2/32: initial state auth_initialize has enter
07:26:39: dot1x-sm(Gi2/32): 0xEB000032:auth_initialize_enter called
07:26:39: dot1x_auth Gi2/32: during state auth_initialize, got event 0(cfg_auto)
07:26:39: @@@ dot1x_auth Gi2/32: auth_initialize -> auth_disconnected
07:26:39: dot1x-sm(Gi2/32): 0xEB000032:auth_disconnected_enter called
07:26:39: dot1x_auth Gi2/32: idle during state auth_disconnected
07:26:39: @@@ dot1x_auth Gi2/32: auth_disconnected -> auth_restart
07:26:39: dot1x-sm(Gi2/32): 0xEB000032:auth_restart_enter called
07:26:39: dot1x-ev(Gi2/32): Sending create new context event to EAP for 0xEB000032 (0000.0000.0000)
07:26:39: dot1x_auth_bend Gi2/32: initial state auth_bend_initialize has enter
07:26:39: dot1x-sm(Gi2/32): 0xEB000032:auth_bend_initialize_enter called
07:26:39: dot1x_auth_bend Gi2/32: initial state auth_bend_initialize has idle
07:26:39: dot1x_auth_bend Gi2/32: during state auth_bend_initialize, got event 16383(idle)
07:26:39: @@@ dot1x_auth_bend Gi2/32: auth_bend_initialize -> auth_bend_idle
07:26:39: dot1x-sm(Gi2/32): 0xEB000032:auth_bend_idle_enter called
07:26:39: dot1x-ev(Gi2/32): Created a client entry (0xEB000032)
07:26:39: dot1x-ev(Gi2/32): Dot1x authentication started for 0xEB000032 (0000.0000.0000)
07:26:39: AUTH-EVENT (Gi2/32): Received handle 0xEB000032 from method
07:26:39: AUTH-EVENT (Gi2/32): Client 0000.0000.0000, Context changing state from 'Authz Failed' to 'Running'
07:26:39: AUTH-EVENT (Gi2/32): Client 0000.0000.0000, Method dot1x changing state from 'Not run' to 'Running'
07:26:39: dot1x-sm(Gi2/32): Posting !EAP_RESTART on Client 0xEB000032
07:26:39: dot1x_auth Gi2/32: during state auth_restart, got event 6(no_eapRestart)
07:26:39: @@@ dot1x_auth Gi2/32: auth_restart -> auth_connecting
07:26:39: dot1x-sm(Gi2/32): 0xEB000032:auth_connecting_enter called
07:26:39: dot1x-sm(Gi2/32): 0xEB000032:auth_restart_connecting_action called
07:26:39: dot1x-sm(Gi2/32): Posting RX_REQ on Client 0xEB000032
07:26:39: dot1x_auth Gi2/32: during state auth_connecting, got event 10(eapReq_no_reAuthMax)
07:26:39: @@@ dot1x_auth Gi2/32: auth_connecting -> auth_authenticating
07:26:39: dot1x-sm(Gi2/32): 0xEB000032:auth_authenticating_enter called
07:26:39: dot1x-sm(Gi2/32): 0xEB000032:auth_connecting_authenticating_action called
07:26:39: dot1x-sm(Gi2/32): Posting AUTH_START for 0xEB000032
07:26:39: dot1x_auth_bend Gi2/32: during state auth_bend_idle, got event 4(eapReq_authStart)
07:26:39: @@@ dot1x_auth_bend Gi2/32: auth_bend_idle -> auth_bend_request
07:26:39: dot1x-sm(Gi2/32): 0xEB000032:auth_bend_request_enter called
07:26:39: dot1x-ev(Gi2/32): Sending EAPOL packet to group PAE address
07:26:39: dot1x-ev(Gi2/32): Role determination not required
07:26:39: dot1x-registry:registry:dot1x_ether_macaddr called
07:26:39: dot1x-ev(Gi2/32): Sending out EAPOL packet
07:26:39: EAPOL pak dump Tx
07:26:39: EAPOL Version: 0x3 type: 0x0 length: 0x0005
07:26:39: EAP code: 0x1 id: 0x1 length: 0x0005 type: 0x1
07:26:39: dot1x-packet(Gi2/32): EAPOL packet sent to client 0xEB000032 (0000.0000.0000)
07:26:39: dot1x-sm(Gi2/32): 0xEB000032:auth_bend_idle_request_action called
07:26:40: AUTH-EVENT: Stopped Auth Manager tick timer
07:27:03: dot1x-ev(Gi2/32): Interface state changed to DOWN
07:27:03: AUTH-EVENT (Gi2/32): Link DOWN
07:27:03: AUTH-EVENT (Gi2/32): Signalling "pre" delete for client 0000.0000.0000
07:27:03: AUTH-EVENT: Enter auth_mgr_idc_client_deleted
07:27:03: AUTH-EVENT: Enter auth_mgr_idc_remove_record
07:27:03: AUTH-SYNC (Gi2/32): Syncing delete for context (0000.0000.0000)
07:27:03: AUTH-EVENT (Gi2/32): Sending DELETE to dot1x (handle 0xE200002F)
07:27:03: dot1x-ev(Gi2/32): Deleting client 0xEB000032 (0000.0000.0000)
07:27:03: AUTH-EVENT (Gi2/32): Signalling "post" delete for client 0000.0000.0000 in domain DATA
07:27:03: AUTH-EVENT (Gi2/32): Authorized client count: 0
07:27:03: AUTH-EVENT (Gi2/32): Authorized client count: 0
07:27:03: AUTH-EVENT (Gi2/32): Setting vlan to 0 on DATA Vlan
07:27:03: AUTH-EVENT (Gi2/32): Unauthorizing interface in shim
07:27:03: AUTH-EVENT (Gi2/32): dot1x_switch_get_default_host_access: Host access set to deny GigabitEthernet2/32
07:27:03: AUTH-EVENT (Gi2/32): host access set to 2 on GigabitEthernet2/32
07:27:03: AUTH-EVENT (Gi2/32): dot1x_switch_get_default_host_access: Host access set to deny GigabitEthernet2/32
07:27:03: AUTH-EVENT (Gi2/32): host access set to 2 on GigabitEthernet2/32
07:27:03: AUTH-EVENT (Gi2/32): Authorized client count: 0
07:27:03: AUTH-EVENT (Gi2/32): Setting vlan to 0 on DATA Vlan
07:27:03: AUTH-EVENT (Gi2/32): Unauthorizing interface in shim
07:27:03: AUTH-EVENT (Gi2/32): dot1x_switch_get_default_host_access: Host access set to deny GigabitEthernet2/32
07:27:03: AUTH-EVENT (Gi2/32): host access set to 2 on GigabitEthernet2/32
07:27:03: AUTH-EVENT (Gi2/32): dot1x_switch_get_default_host_access: Host access set to deny GigabitEthernet2/32
07:27:03: AUTH-EVENT (Gi2/32): host access set to 2 on GigabitEthernet2/32
07:27:03: AUTH-EVENT (Gi2/32): Queued START
07:27:03: dot1x-ev:dot1x_supp_port_down: No DOT1X subblock found on GigabitEthernet2/32
07:27:03: dot1x-ev:Delete auth client (0xEB000032) message
07:27:03: dot1x-ev:Auth client ctx destroyed
07:27:03: AUTH-EVENT (Gi2/32): Freed Auth Manager context
07:27:03: AUTH-EVENT (Gi2/32): Received internal event START
de-ret-core001#
07:31:41: AUTH-EVENT (Gi2/32): dot1x_pm_mda_port_link_linkcomingup: voice VLAN 4096, data VLAN 198
07:31:41: dot1x-ev(Gi2/32): Interface state changed to UP
07:31:41: AUTH-EVENT (Gi2/32): Enabling dot1x in switch shim
07:31:41: AUTH-EVENT (Gi2/32): dot1x_switch_get_default_host_access: Host access set to deny GigabitEthernet2/32
07:31:41: AUTH-EVENT (Gi2/32): host access set to 2 on GigabitEthernet2/32
07:31:41: AUTH-EVENT (Gi2/32): dot1x_switch_get_default_host_access: Host access set to deny GigabitEthernet2/32
07:31:41: AUTH-EVENT (Gi2/32): host access set to 2 on GigabitEthernet2/32
07:31:41: AUTH-EVENT (Gi2/32): Link UP
07:31:41: AUTH-EVENT (Gi2/32): Assigned AAA ID 0x0000004A
07:31:41: AUTH-EVENT (Gi2/32): Retrieved Accounting Session ID 0x0000012C
07:31:41: AUTH-EVENT (Gi2/32): Allocated new Auth Manager context (handle 0xFE000030)
07:31:41: AUTH-EVENT (Gi2/32): Client 0000.0000.0000, Initialising Method dot1x state to 'Not run'
07:31:41: AUTH-EVENT (Gi2/32): Adding method dot1x to runnable list for Auth Mgr context 0xFE000030
07:31:41: AUTH-EVENT: auth_mgr_idc_add_record: Recv audit_sid=C0A8C6C90000002F019D87A3
07:31:41: AUTH-EVENT (Gi2/32): Sending START to dot1x (handle 0xFE000030)
07:31:41: dot1x_auth Gi2/32: initial state auth_initialize has enter
07:31:41: dot1x-sm(Gi2/32): 0x2F000033:auth_initialize_enter called
07:31:41: dot1x_auth Gi2/32: during state auth_initialize, got event 0(cfg_auto)
07:31:41: @@@ dot1x_auth Gi2/32: auth_initialize -> auth_disconnected
07:31:41: dot1x-sm(Gi2/32): 0x2F000033:auth_disconnected_enter called
07:31:41: dot1x_auth Gi2/32: idle during state auth_disconnected
07:31:41: @@@ dot1x_auth Gi2/32: auth_disconnected -> auth_restart
07:31:41: dot1x-sm(Gi2/32): 0x2F000033:auth_restart_enter called
07:31:41: dot1x-ev(Gi2/32): Sending create new context event to EAP for 0x2F000033 (0000.0000.0000)
07:31:41: dot1x_auth_bend Gi2/32: initial state auth_bend_initialize has enter
07:31:41: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_initialize_enter called
07:31:41: dot1x_auth_bend Gi2/32: initial state auth_bend_initialize has idle
07:31:41: dot1x_auth_bend Gi2/32: during state auth_bend_initialize, got event 16383(idle)
07:31:41: @@@ dot1x_auth_bend Gi2/32: auth_bend_initialize -> auth_bend_idle
07:31:41: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_idle_enter called
07:31:41: dot1x-ev(Gi2/32): Created a client entry (0x2F000033)
07:31:41: dot1x-ev(Gi2/32): Dot1x authentication started for 0x2F000033 (0000.0000.0000)
07:31:41: AUTH-EVENT (Gi2/32): Received handle 0x2F000033 from method
07:31:41: AUTH-EVENT (Gi2/32): Client 0000.0000.0000, Context changing state from 'Idle' to 'Running'
07:31:41: AUTH-EVENT (Gi2/32): Client 0000.0000.0000, Method dot1x changing state from 'Not run' to 'Running'
07:31:41: dot1x-ev:DOT1X Supplicant not enabled on GigabitEthernet2/32
07:31:41: dot1x-sm(Gi2/32): Posting !EAP_RESTART on Client 0x2F000033
07:31:41: dot1x_auth Gi2/32: during state auth_restart, got event 6(no_eapRestart)
07:31:41: @@@ dot1x_auth Gi2/32: auth_restart -> auth_connecting
07:31:41: dot1x-sm(Gi2/32): 0x2F000033:auth_connecting_enter called
07:31:41: dot1x-sm(Gi2/32): 0x2F000033:auth_restart_connecting_action called
07:31:41: dot1x-sm(Gi2/32): Posting RX_REQ on Client 0x2F000033
07:31:41: dot1x_auth Gi2/32: during state auth_connecting, got event 10(eapReq_no_reAuthMax)
07:31:41: @@@ dot1x_auth Gi2/32: auth_connecting -> auth_authenticating
07:31:41: dot1x-sm(Gi2/32): 0x2F000033:auth_authenticating_enter called
07:31:41: dot1x-sm(Gi2/32): 0x2F000033:auth_connecting_authenticating_action called
07:31:41: dot1x-sm(Gi2/32): Posting AUTH_START for 0x2F000033
07:31:41: dot1x_auth_bend Gi2/32: during state auth_bend_idle, got event 4(eapReq_authStart)
07:31:41: @@@ dot1x_auth_bend Gi2/32: auth_bend_idle -> auth_bend_request
07:31:41: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_enter called
07:31:41: dot1x-ev(Gi2/32): Sending EAPOL packet to group PAE address
07:31:41: dot1x-ev(Gi2/32): Role determination not required
07:31:41: dot1x-registry:registry:dot1x_ether_macaddr called
07:31:41: dot1x-ev(Gi2/32): Sending out EAPOL packet
07:31:41: EAPOL pak dump Tx
07:31:41: EAPOL Version: 0x3 type: 0x0 length: 0x0005
07:31:41: EAP code: 0x1 id: 0x1 length: 0x0005 type: 0x1
07:31:41: dot1x-packet(Gi2/32): EAPOL packet sent to client 0x2F000033 (0000.0000.0000)
07:31:41: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_idle_request_action called
07:31:52: dot1x-ev(Gi2/32): Role determination not required
07:31:52: dot1x-packet(Gi2/32): queuing an EAPOL pkt on Auth Q
07:31:52: dot1x-ev:Enqueued the eapol packet to the global authenticator queue
07:31:52: EAPOL pak dump rx
07:31:52: EAPOL Version: 0x1 type: 0x1 length: 0x0000
07:31:52: dot1x-ev:
dot1x_auth_queue_event: Int Gi2/32 CODE= 0,TYPE= 0,LEN= 0
07:31:52: dot1x-packet(Gi2/32): Received an EAPOL frame
07:31:52: dot1x-ev(Gi2/32): Received pkt saddr =000b.5d4f.2ecf , daddr = 0180.c200.0003,
pae-ether-type = 888e.0101.0000
07:31:52: dot1x-ev(Gi2/32): Couldn't find the supplicant in the list
07:31:52: dot1x-ev(Gi2/32): New client detected, notifying AuthMgr
07:31:52: dot1x-ev(Gi2/32): Sending event (0) to Auth Mgr for 000b.5d4f.2ecf
07:31:52: dot1x-packet(Gi2/32): Received an EAPOL-Start packet
07:31:52: EAPOL pak dump rx
07:31:52: EAPOL Version: 0x1 type: 0x1 length: 0x0000
07:31:52: dot1x-sm(Gi2/32): Posting EAPOL_START on Client 0x2F000033
07:31:52: dot1x_auth Gi2/32: during state auth_authenticating, got event 4(eapolStart)
07:31:52: @@@ dot1x_auth Gi2/32: auth_authenticating -> auth_aborting
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_authenticating_exit called
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_aborting_enter called
07:31:52: AUTH-EVENT (Gi2/32): Received 'NEW_MAC', current method is dot1x (handle 0xFE000030)
07:31:52: AUTH-EVENT (Gi2/32): New Method MAC: 000b.5d4f.2ecf 1B60E2D4
07:31:52: AUTH-EVENT: auth_mgr_idc_insert_key_in_record: update mac 000b.5d4f.2ecf
07:31:52: AUTH-EVENT (Gi2/32): Sending NEW_MAC to dot1x (handle 0xFE000030)
07:31:52: dot1x-ev(Gi2/32): 802.1x method gets the go ahead from Auth Mgr for 0x2F000033 (000b.5d4f.2ecf)
07:31:52: %AUTHMGR-5-START: Starting 'dot1x' for client (000b.5d4f.2ecf) on Interface Gi2/32 AuditSessionID C0A8C6C90000002F019D87A3
07:31:52: dot1x-sm(Gi2/32): Posting AUTH_ABORT for 0x2F000033
07:31:52: dot1x_auth_bend Gi2/32: during state auth_bend_request, got event 1(authAbort)
07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_request -> auth_bend_initialize
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_initialize_enter called
07:31:52: dot1x_auth_bend Gi2/32: idle during state auth_bend_initialize
07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_initialize -> auth_bend_idle
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_idle_enter called
07:31:52: dot1x-sm(Gi2/32): Posting !AUTH_ABORT on Client 0x2F000033
07:31:52: dot1x_auth Gi2/32: during state auth_aborting, got event 20(no_eapolLogoff_no_authAbort)
07:31:52: @@@ dot1x_auth Gi2/32: auth_aborting -> auth_restart
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_aborting_exit called
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_restart_enter called
07:31:52: dot1x-ev(Gi2/32): Resetting the client 0x2F000033 (000b.5d4f.2ecf)
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_aborting_restart_action called
07:31:52: dot1x-sm(Gi2/32): Posting !EAP_RESTART on Client 0x2F000033
07:31:52: dot1x_auth Gi2/32: during state auth_restart, got event 6(no_eapRestart)
07:31:52: @@@ dot1x_auth Gi2/32: auth_restart -> auth_connecting
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_connecting_enter called
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_restart_connecting_action called
07:31:52: dot1x-sm(Gi2/32): Posting RX_REQ on Client 0x2F000033
07:31:52: dot1x_auth Gi2/32: during state auth_connecting, got event 10(eapReq_no_reAuthMax)
07:31:52: @@@ dot1x_auth Gi2/32: auth_connecting -> auth_authenticating
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_authenticating_enter called
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_connecting_authenticating_action called
07:31:52: dot1x-sm(Gi2/32): Posting AUTH_START for 0x2F000033
07:31:52: dot1x_auth_bend Gi2/32: during state auth_bend_idle, got event 4(eapReq_authStart)
07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_idle -> auth_bend_request
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_enter called
07:31:52: dot1x-ev(Gi2/32): Sending EAPOL packet to group PAE address
07:31:52: dot1x-ev(Gi2/32): Role determination not required
07:31:52: dot1x-registry:registry:dot1x_ether_macaddr called
07:31:52: dot1x-ev(Gi2/32): Sending out EAPOL packet
07:31:52: EAPOL pak dump Tx
07:31:52: EAPOL Version: 0x3 type: 0x0 length: 0x0005
07:31:52: EAP code: 0x1 id: 0x1 length: 0x0005 type: 0x1
07:31:52: dot1x-packet(Gi2/32): EAPOL packet sent to client 0x2F000033 (000b.5d4f.2ecf)
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_idle_request_action called
07:31:52: dot1x-ev(Gi2/32): Role determination not required
07:31:52: dot1x-packet(Gi2/32): Queuing an EAPOL pkt on Authenticator Q
07:31:52: dot1x-ev:Enqueued the eapol packet to the global authenticator queue
07:31:52: EAPOL pak dump rx
07:31:52: EAPOL Version: 0x1 type: 0x0 length: 0x000F
07:31:52: dot1x-ev:
dot1x_auth_queue_event: Int Gi2/32 CODE= 2,TYPE= 1,LEN= 15
07:31:52: dot1x-packet(Gi2/32): Received an EAPOL frame
07:31:52: dot1x-ev(Gi2/32): Received pkt saddr =000b.5d4f.2ecf , daddr = 0180.c200.0003,
pae-ether-type = 888e.0100.000f
07:31:52: dot1x-packet(Gi2/32): Received an EAP packet
07:31:52: EAPOL pak dump rx
07:31:52: EAPOL Version: 0x1 type: 0x0 length: 0x000F
07:31:52: dot1x-packet(Gi2/32): Received an EAP packet from 000b.5d4f.2ecf
07:31:52: dot1x-sm(Gi2/32): Posting EAPOL_EAP for 0x2F000033
07:31:52: dot1x_auth_bend Gi2/32: during state auth_bend_request, got event 6(eapolEap)
07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_request -> auth_bend_response
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_enter called
07:31:52: dot1x-ev(Gi2/32): dot1x_sendRespToServer: Response sent to the server from 0x2F000033 (000b.5d4f.2ecf)
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_response_action called
07:31:52: RADIUS/ENCODE(0000004A):Orig. component type = DOT1X
07:31:52: RADIUS(0000004A): Config NAS IP: 0.0.0.0
07:31:52: RADIUS/ENCODE(0000004A): acct_session_id: 300
07:31:52: RADIUS(0000004A): sending
07:31:52: RADIUS/ENCODE: Best Local IP-Address 192.168.10.10 for Radius-Server 192.168.10.10
07:31:52: RADIUS(0000004A): Send Access-Request to 192.168.10.10:1645 id 1645/116, len 207
07:31:52: RADIUS: authenticator E9 13 EC CA 3B E8 3A 59 - 23 AE CE F8 7E 7C 0C B0
07:31:52: RADIUS: User-Name [1] 12 "Test\snoop"
07:31:52: RADIUS: Service-Type [6] 6 Framed [2]
07:31:52: RADIUS: Framed-MTU [12] 6 1500
07:31:52: RADIUS: Called-Station-Id [30] 19 "00-15-62-CE-3C-4F"
07:31:52: RADIUS: Calling-Station-Id [31] 19 "00-0B-5D-4F-2E-CF"
07:31:52: RADIUS: EAP-Message [79] 17
07:31:52: RADIUS: 02 01 00 0F 01 56 4C 41 42 5C 73 6E 6F 6F 70 [ Test\snoop]
07:31:52: RADIUS: Message-Authenticato[80] 18
07:31:52: RADIUS: A1 7B C4 BD 44 08 5D 69 EA 4E 4D 21 6B D1 9A 1C [ {D]iNM!k]
07:31:52: RADIUS: EAP-Key-Name [102] 2 *
07:31:52: RADIUS: Vendor, Cisco [26] 49
07:31:52: RADIUS: Cisco AVpair [1] 43 "audit-session-id=C0A8C6C90000002F019D87A3"
07:31:52: RADIUS: NAS-Port-Type [61] 6 Ethernet [15]
07:31:52: RADIUS: NAS-Port [5] 6 50232
07:31:52: RADIUS: NAS-Port-Id [87] 21 "GigabitEthernet2/32"
07:31:52: RADIUS: NAS-IP-Address [4] 6 192.168.10.10
07:31:52: RADIUS: Received from id 1645/116 192.168.10.10:1645, Access-Challenge, len 72
07:31:52: RADIUS: authenticator FC B5 8D 47 17 BE 3F 1D - 06 62 E9 8F EF 75 77 38
07:31:52: RADIUS: EAP-Message [79] 8
07:31:52: RADIUS: 01 1B 00 06 19 21 [ !]
07:31:52: RADIUS: State [24] 26
07:31:52: RADIUS: 45 41 50 3D 30 2E 32 30 34 2E 38 37 2E 31 3B 53 [EAP=0.204.87.1;S]
07:31:52: RADIUS: 56 43 3D 30 2E 32 35 3B [ VC=0.25;]
07:31:52: RADIUS: Message-Authenticato[80] 18
07:31:52: RADIUS: 9E D2 63 9A 57 A2 73 65 A8 29 AC 5A C8 6F 78 2F [ cWse)Zox/]
07:31:52: RADIUS(0000004A): Received from id 1645/116
07:31:52: RADIUS/DECODE: EAP-Message fragments, 6, total 6 bytes
07:31:52: dot1x-sm(Gi2/32): Posting EAP_REQ for 0x2F000033
07:31:52: dot1x_auth_bend Gi2/32: during state auth_bend_response, got event 7(eapReq)
07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_response -> auth_bend_request
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_exit called
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_enter called
07:31:52: dot1x-ev(Gi2/32): Sending EAPOL packet to group PAE address
07:31:52: dot1x-ev(Gi2/32): Role determination not required
07:31:52: dot1x-registry:registry:dot1x_ether_macaddr called
07:31:52: dot1x-ev(Gi2/32): Sending out EAPOL packet
07:31:52: EAPOL pak dump Tx
07:31:52: EAPOL Version: 0x3 type: 0x0 length: 0x0006
07:31:52: EAP code: 0x1 id: 0x1B length: 0x0006 type: 0x19
07:31:52: dot1x-packet(Gi2/32): EAPOL packet sent to client 0x2F000033 (000b.5d4f.2ecf)
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_request_action called
07:31:52: dot1x-ev(Gi2/32): Role determination not required
07:31:52: dot1x-packet(Gi2/32): Queuing an EAPOL pkt on Authenticator Q
07:31:52: dot1x-ev:Enqueued the eapol packet to the global authenticator queue
07:31:52: EAPOL pak dump rx
07:31:52: EAPOL Version: 0x1 type: 0x0 length: 0x0057
07:31:52: dot1x-ev:
dot1x_auth_queue_event: Int Gi2/32 CODE= 2,TYPE= 25,LEN= 87
07:31:52: dot1x-packet(Gi2/32): Received an EAPOL frame
07:31:52: dot1x-ev(Gi2/32): Received pkt saddr =000b.5d4f.2ecf , daddr = 0180.c200.0003,
pae-ether-type = 888e.0100.0057
07:31:52: dot1x-packet(Gi2/32): Received an EAP packet
07:31:52: EAPOL pak dump rx
07:31:52: EAPOL Version: 0x1 type: 0x0 length: 0x0057
07:31:52: dot1x-packet(Gi2/32): Received an EAP packet from 000b.5d4f.2ecf
07:31:52: dot1x-sm(Gi2/32): Posting EAPOL_EAP for 0x2F000033
07:31:52: dot1x_auth_bend Gi2/32: during state auth_bend_request, got event 6(eapolEap)
07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_request -> auth_bend_response
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_enter called
07:31:52: dot1x-ev(Gi2/32): dot1x_sendRespToServer: Response sent to the server from 0x2F000033 (000b.5d4f.2ecf)
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_response_action called
07:31:52: RADIUS/ENCODE(0000004A):Orig. component type = DOT1X
07:31:52: RADIUS(0000004A): Config NAS IP: 0.0.0.0
07:31:52: RADIUS/ENCODE(0000004A): acct_session_id: 300
07:31:52: RADIUS(0000004A): sending
07:31:52: RADIUS/ENCODE: Best Local IP-Address 192.168.10.10 for Radius-Server 192.168.10.10
07:31:52: RADIUS(0000004A): Send Access-Request to 192.168.10.10:1645 id 1645/117, len 305
07:31:52: RADIUS: authenticator 4E 83 6A 6E F6 3D FD 20 - 98 60 32 71 EC 97 24 96
07:31:52: RADIUS: User-Name [1] 12 "Test\snoop"
07:31:52: RADIUS: Service-Type [6] 6 Framed [2]
07:31:52: RADIUS: Framed-MTU [12] 6 1500
07:31:52: RADIUS: Called-Station-Id [30] 19 "00-15-62-CE-3C-4F"
07:31:52: RADIUS: Calling-Station-Id [31] 19 "00-0B-5D-4F-2E-CF"
07:31:52: RADIUS: EAP-Message [79] 89
07:31:52: RADIUS: 02 1B 00 57 19 80 00 00 00 4D 16 03 01 00 48 01 00 00 44 03 01 4F D2 12 A8 4C E1 6B C1 00 F9 7B 21 9E 35 7C 81 09 A6 67 F1 DF C9 8B 3D 9F 7F D4 06 1E 13 AC 70 00 00 16 00 04 00 05 00 0A 00 09 00 64 00 62 [WMHDOLk{!5|g=pdb]
07:31:52: RADIUS: 00 03 00 06 00 13 00 12 00 63 01 00 00 05 FF 01 00 01 00 [ c]
07:31:52: RADIUS: Message-Authenticato[80] 18
07:31:52: RADIUS: 60 A8 28 4B A1 C0 30 D9 91 60 27 FE 70 96 F0 2A [ `(K0`'p*]
07:31:52: RADIUS: EAP-Key-Name [102] 2 *
07:31:52: RADIUS: Vendor, Cisco [26] 49
07:31:52: RADIUS: Cisco AVpair [1] 43 "audit-session-id=C0A8C6C90000002F019D87A3"
07:31:52: RADIUS: NAS-Port-Type [61] 6 Ethernet [15]
07:31:52: RADIUS: NAS-Port [5] 6 50232
07:31:52: RADIUS: NAS-Port-Id [87] 21 "GigabitEthernet2/32"
07:31:52: RADIUS: State [24] 26
07:31:52: RADIUS: 45 41 50 3D 30 2E 32 30 34 2E 38 37 2E 31 3B 53 [EAP=0.204.87.1;S]
07:31:52: RADIUS: 56 43 3D 30 2E 32 35 3B [ VC=0.25;]
07:31:52: RADIUS: NAS-IP-Address [4] 6 192.168.10.10
07:31:52: RADIUS: Received from id 1645/117 192.168.10.10:1645, Access-Challenge, len 958
07:31:52: RADIUS: authenticator D9 73 7F F2 BA 90 4B 55 - B0 DE 60 70 45 88 F5 42
07:31:52: RADIUS: EAP-Message [79] 255
07:31:52: RADIUS: 01 1C 03 76 19 80 00 00 03 6C 16 03 01 00 4A 02 00 00 46 03 01 4F D2 12 A9 2C 8E 19 87 52 32 41 CA 4D 98 AD A6 40 7D 1D 49 1B 36 20 3C [vlJFO,R2AM@}I6 <]
07:31:52: RADIUS: 8E E5 35 BA 51 71 8F C4 20 DE 95 AB 82 1D 52 B2 1E 35 A1 88 B3 16 84 08 7F E1 A2 24 BC 90 F6 23 9C 37 56 8B BB FC B3 E7 C7 00 0A 00 16 03 01 03 0F 0B 00 03 0B 00 03 08 00 03 05 30 82 03 01 30 82 01 E9 A0 03 02 01 02 02 01 01 30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 30 [5Qq R5$#7V000*H0]
07:31:52: RADIUS: 11 31 0F 30 0D 06 03 55 04 03 13 06 61 63 73 30 30 31 30 1E 17 0D 31 32 30 36 30 36 [10Uacs0010120606]
07:31:52: RADIUS: 31 33 33 32 32 34 5A 17 0D 31 33 30 36 30 36 31 33 33 [133224Z130606133]
07:31:52: RADIUS: 32 32 34 5A 30 11 31 0F 30 0D 06 03 55 04 03 13 06 61 63 73 30 30 31 30 82 01 22 [224Z010Uacs0010"]
07:31:52: RADIUS: 30 0D 06 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 82 01 0F 00 30 82 01 0A 02 82 01 01 00 A2 8E 75 73 A2 3F 90 18 60 48 6C BC 6D C7 22 [ 0*H0us?`Hlm"]
07:31:52: RADIUS: EAP-Message [79] 255
07:31:52: RADIUS: 2E 8C E0 3E E1 E1 CB F5 2E B0 4F BE DA B2 18 CB 03 8E 64 0E 15 8C 7E 92 8C C4 1E 8D CB 3E 39 AC D7 27 66 A1 52 92 DF B7 67 32 A8 B8 0A 31 72 39 [.>.Od~>9'fRg21r9]
07:31:52: RADIUS: 4A EA AE 00 72 6B 82 7E CD 18 6A 70 DD 32 FB DA C2 48 7B 8E 1A 18 4C 5F D2 87 8F 1F 3F E4 F1 B2 99 67 B6 A1 01 DB 6A B1 93 53 F4 AE 5E [Jrk~jp2H{L_?gjS^]
07:31:52: RADIUS: E9 DD 08 2D 62 64 72 C3 CA 61 4F 67 A9 39 59 7F 3D BB 1E 96 84 1B C3 B7 39 F9 BC A2 77 86 E3 F5 CF FB 7A B7 60 DE 14 2F F0 ED 31 [-bdraOg9Y=9wz`/1]
07:31:52: RADIUS: 94 8E 0D F3 7F AC 10 4E 31 B4 D3 F7 2C 2D D3 5B FD 29 41 DC 11 B6 A0 C9 0F E3 7E DC F9 E7 71 21 9B 92 4F 2B C5 8A BF 0F 27 BB 45 A5 55 97 E3 38 [N1,-[)A~q!O+'EU8]
07:31:52: RADIUS: A2 0D 7B BF 10 8E EB F7 28 A5 4D D4 68 69 29 91 30 B0 86 E5 EE 08 C7 7B 7C 3E D1 59 6F 25 E5 51 8A 44 81 1D DF 9F DF CD B9 7E [{(Mhi)0{|>Yo?QD~]
07:31:52: RADIUS: 78 A4 9E 88 EF BA 15 FB E6 9D BE BB 5D B5 ED 02 03 01 00 01 A3 64 30 62 30 0C 06 [ x]d0b0]
07:31:52: RADIUS: EAP-Message [79] 255
07:31:52: RADIUS: 03 55 1D 13 04 05 30 03 01 01 FF 30 0B 06 03 55 1D 0F 04 04 03 02 02 AC 30 1D 06 03 55 1D 0E 04 16 04 14 9C FF 9E 16 09 62 55 DE E9 C9 FD 75 89 7A F6 EF AC EB 11 A1 30 13 06 03 55 1D 25 04 0C 30 0A 06 08 2B 06 01 05 05 07 03 01 30 [U00U0UbUuz0U?0+0]
07:31:52: RADIUS: 11 06 09 60 86 48 01 86 F8 42 01 01 04 04 03 02 06 40 30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 03 82 01 01 00 9F 34 9C 25 AB 85 0B 08 6F 10 D3 6D 1A 88 70 2E DC C2 50 1B 43 3C [`HB@0*H4?omp.PC<]
07:31:52: RADIUS: 76 2B 33 76 71 CB 69 D3 F3 15 6D B0 49 19 FA 79 D9 8A D6 F4 7E 26 33 EB 03 BD CC 3A 69 31 17 31 [v+3vqimIy~&3:i11]
07:31:52: RADIUS: 7F 6C 37 F0 E9 D7 5A 11 99 EE 21 5E 80 FF 29 ED 09 C7 D4 13 1B 2A 59 55 84 48 B4 C9 C6 04 6D 47 E3 60 94 EB 37 93 3E 4E [l7Z!^)*YUHmG`7>N]
07:31:52: RADIUS: 30 64 CB 81 62 52 9A 10 05 91 99 4E 8B 00 99 2E FB FF 1E 22 6F F4 84 08 41 1D B2 38 E9 64 C0 84 41 98 84 C5 3F EC 57 75 C2 F8 6E [0dbRN."oA8dA?Wun]
07:31:52: RADIUS: 31 [ 1]
07:31:52: RADIUS: EAP-Message [79] 129
07:31:52: RADIUS: 42 AB 79 FB 75 24 2F 24 A0 F3 D0 CE 93 F8 7A 99 85 9F F5 B2 44 00 4D 0D 3C 79 56 2A E2 BB 53 C2 65 21 [Byu$/$zDM
07:31:52: RADIUS: 3C 55 34 8B 7A B8 2D 52 21 80 D0 CA F6 0E 98 22 59 CE 07 0D 89 13 6E 48 16 C3 69 B5 5E 6F 1B 78 E5 DC 4E [
07:31:52: RADIUS: 2A 59 43 A1 9A 09 90 35 8F D3 AC 2A 9F D0 0F 54 CA E0 95 3A 70 B6 23 93 55 50 8C 0F 39 99 4A 43 F0 B6 C5 CF 6C F3 98 B9 B2 CF FC F4 D3 84 A9 9E 5B [*YC5*T:p#UP9JCl[]
07:31:52: RADIUS: 16 03 01 00 04 0E 00 00 00
07:31:52: RADIUS: State [24] 26
07:31:52: RADIUS: 45 41 50 3D 30 2E 32 30 34 2E 38 37 2E 32 3B 53 [EAP=0.204.87.2;S]
07:31:52: RADIUS: 56 43 3D 30 2E 32 35 3B [ VC=0.25;]
07:31:52: RADIUS: Message-Authenticato[80] 18
07:31:52: RADIUS: EB 58 47 E3 44 87 19 02 60 5F 63 D4 C7 73 FE BF [ XGD`_cs]
07:31:52: RADIUS(0000004A): Received from id 1645/117
07:31:52: RADIUS/DECODE: EAP-Message fragments, 253+253+253+127, total 886 bytes
07:31:52: dot1x-sm(Gi2/32): Posting EAP_REQ for 0x2F000033
07:31:52: dot1x_auth_bend Gi2/32: during state auth_bend_response, got event 7(eapReq)
07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_response -> auth_bend_request
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_exit called
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_enter called
07:31:52: dot1x-ev(Gi2/32): Sending EAPOL packet to group PAE address
07:31:52: dot1x-ev(Gi2/32): Role determination not required
07:31:52: dot1x-registry:registry:dot1x_ether_macaddr called
07:31:52: dot1x-ev(Gi2/32): Sending out EAPOL packet
07:31:52: EAPOL pak dump Tx
07:31:52: EAPOL Version: 0x3 type: 0x0 length: 0x0376
07:31:52: EAP code: 0x1 id: 0x1C length: 0x0376 type: 0x19
07:31:52: dot1x-packet(Gi2/32): EAPOL packet sent to client 0x2F000033 (000b.5d4f.2ecf)
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_request_action called
07:31:52: dot1x-ev(Gi2/32): Role determination not required
07:31:52: dot1x-packet(Gi2/32): Queuing an EAPOL pkt on Authenticator Q
07:31:52: dot1x-ev:Enqueued the eapol packet to the global authenticator queue
07:31:52: EAPOL pak dump rx
07:31:52: EAPOL Version: 0x1 type: 0x0 length: 0x0148
07:31:52: dot1x-ev:
dot1x_auth_queue_event: Int Gi2/32 CODE= 2,TYPE= 25,LEN= 328
07:31:52: dot1x-packet(Gi2/32): Received an EAPOL frame
07:31:52: dot1x-ev(Gi2/32): Received pkt saddr =000b.5d4f.2ecf , daddr = 0180.c200.0003,
pae-ether-type = 888e.0100.0148
07:31:52: dot1x-packet(Gi2/32): Received an EAP packet
07:31:52: EAPOL pak dump rx
07:31:52: EAPOL Version: 0x1 type: 0x0 length: 0x0148
07:31:52: dot1x-packet(Gi2/32): Received an EAP packet from 000b.5d4f.2ecf
07:31:52: dot1x-sm(Gi2/32): Posting EAPOL_EAP for 0x2F000033
07:31:52: dot1x_auth_bend Gi2/32: during state auth_bend_request, got event 6(eapolEap)
07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_request -> auth_bend_response
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_enter called
07:31:52: dot1x-ev(Gi2/32): dot1x_sendRespToServer: Response sent to the server from 0x2F000033 (000b.5d4f.2ecf)
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_response_action called
07:31:52: RADIUS/ENCODE(0000004A):Orig. component type = DOT1X
07:31:52: RADIUS/ENCODE: EAP-Message fragment 328 into 253+75, total 328 bytes
07:31:52: RADIUS(0000004A): Config NAS IP: 0.0.0.0
07:31:52: RADIUS/ENCODE(0000004A): acct_session_id: 300
07:31:52: RADIUS(0000004A): sending
07:31:52: RADIUS/ENCODE: Best Local IP-Address 192.168.10.10 for Radius-Server 192.168.10.10
07:31:52: RADIUS(0000004A): Send Access-Request to 192.168.10.10:1645 id 1645/118, len 548
07:31:52: RADIUS: authenticator 1B B4 3C CD 12 92 53 BE - 5D 64 A7 00 01 E7 CC ED
07:31:52: RADIUS: User-Name [1] 12 "Test\snoop"
07:31:52: RADIUS: Service-Type [6] 6 Framed [2]
07:31:52: RADIUS: Framed-MTU [12] 6 1500
07:31:52: RADIUS: Called-Station-Id [30] 19 "00-15-62-CE-3C-4F"
07:31:52: RADIUS: Calling-Station-Id [31] 19 "00-0B-5D-4F-2E-CF"
07:31:52: RADIUS: EAP-Message [79] 255
07:31:52: RADIUS: 02 1C 01 48 19 80 00 00 01 3E 16 03 01 01 06 10 00 01 02 01 00 15 4A 5A 43 4F 40 22 4C 18 37 50 F0 EF 8A EC E5 7F 37 54 F1 66 70 DF 48 [H>JZCO@"L7P7TfpH]
07:31:52: RADIUS: 3B BA B0 52 83 65 C6 50 A9 29 BC FF 49 AA 07 8E DD EF 4D 87 7A 83 C4 11 52 D7 70 89 C7 2B B8 1F 0D 0D CF 67 D4 ED 91 92 F8 22 EA EE 1F E9 9A 3A 1C 70 09 95 49 [;ReP)IMzRp+g":pI]
07:31:52: RADIUS: D2 3E E3 92 16 D9 B9 8F BB 81 85 35 6B B3 2E 51 C5 01 D7 A0 73 AC 04 D9 77 9B 96 60 82 4C 1D E2 90 3A E4 CF 29 00 5E E4 8F BE 97 F0 A1 7E B5 98 6C 71 9D F7 20 [>5k.Qsw`L:)^~lq ]
07:31:52: RADIUS: B3 53 3E 3A 9A 72 99 74 52 4C 56 0B 40 77 3B B9 49 F8 0D 48 91 7E 8F E5 02 03 D5 6C 6D [S>:rtRLV@w;IH~lm]
07:31:52: RADIUS: 37 DD 8F 15 17 EF 48 34 1A AD 36 8A 7F 95 8B 2E 4B F1 C9 26 C5 E4 5D 22 FE AA D0 03 09 9F B2 F6 82 CA B8 84 33 D7 DB 7C 3F C8 C8 78 36 34 B3 9E 0C 3B [7H46.K&]"3|?x64;]
07:31:52: RADIUS: 81 E2 EC F9 53 C5 82 14 43 80 0D 76 A8 D8 5D D0 04 3B 44 BE 86 DA 3A [ SCv];D:]
07:31:52: RADIUS: EAP-Message [79] 77
07:31:52: RADIUS: 48 55 54 8D F7 8A 26 10 3B 21 DE BC 7D 8F 26 2A 98 4D 3E 9A 08 7D DD D4 14 03 01 00 01 01 16 03 01 00 28 3E C5 CE 60 71 [HUT&;!}&*M>}(>`q]
07:31:52: RADIUS: 7D 46 45 00 B0 C9 4F 5E 94 F1 99 B1 78 DF FC 1F A9 42 A4 AE AB 93 7C 48 BF 61 6A B0 7F 41 E9 63 6C D2 6B [ }FEO^xB|HajAclk]
07:31:52: RADIUS: Message-Authenticato[80] 18
07:31:52: RADIUS: E7 1F 6F 13 F0 FC 1A 08 AE A2 E0 7C 9B CB 98 85 [ o|]
07:31:52: RADIUS: EAP-Key-Name [102] 2 *
07:31:52: RADIUS: Vendor, Cisco [26] 49
07:31:52: RADIUS: Cisco AVpair [1] 43 "audit-session-id=C0A8C6C90000002F019D87A3"
07:31:52: RADIUS: NAS-Port-Type [61] 6 Ethernet [15]
07:31:52: RADIUS: NAS-Port [5] 6 50232
07:31:52: RADIUS: NAS-Port-Id [87] 21 "GigabitEthernet2/32"
07:31:52: RADIUS: State [24] 26
07:31:52: RADIUS: 45 41 50 3D 30 2E 32 30 34 2E 38 37 2E 32 3B 53 [EAP=0.204.87.2;S]
07:31:52: RADIUS: 56 43 3D 30 2E 32 35 3B [ VC=0.25;]
07:31:52: RADIUS: NAS-IP-Address [4] 6 192.168.10.10
07:31:52: RADIUS: Received from id 1645/118 192.168.10.10:1645, Access-Challenge, len 127
07:31:52: RADIUS: authenticator 27 41 0D EF B3 3C F8 D1 - C2 62 56 15 B1 7A DD BA
07:31:52: RADIUS: EAP-Message [79] 63
07:31:52: RADIUS: 01 1D 00 3D 19 80 00 00 00 33 14 03 01 00 01 01 16 03 01 00 28 C8 10 06 02 B0 68 69 36 A2 31 94 41 B9 FD 22 E7 C9 0F 09 A8 D5 9D 4A 54 93 B1 9F 7F CF 32 9F 2D 08 94 96 40 20 F7 2B [=3(hi61A"JT2-@ +]
07:31:52: RADIUS: F1
07:31:52: RADIUS: State [24] 26
07:31:52: RADIUS: 45 41 50 3D 30 2E 32 30 34 2E 38 37 2E 33 3B 53 [EAP=0.204.87.3;S]
07:31:52: RADIUS: 56 43 3D 30 2E 32 35 3B [ VC=0.25;]
07:31:52: RADIUS: Message-Authenticato[80] 18
07:31:52: RADIUS: C9 99 CD 3A 10 31 83 76 7F C9 95 D5 92 93 59 D1 [ :1vY]
07:31:52: RADIUS(0000004A): Received from id 1645/118
07:31:52: RADIUS/DECODE: EAP-Message fragments, 61, total 61 bytes
07:31:52: dot1x-sm(Gi2/32): Posting EAP_REQ for 0x2F000033
07:31:52: dot1x_auth_bend Gi2/32: during state auth_bend_response, got event 7(eapReq)
07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_response -> auth_bend_request
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_exit called
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_enter called
07:31:52: dot1x-ev(Gi2/32): Sending EAPOL packet to group PAE address
07:31:52: dot1x-ev(Gi2/32): Role determination not required
07:31:52: dot1x-registry:registry:dot1x_ether_macaddr called
07:31:52: dot1x-ev(Gi2/32): Sending out EAPOL packet
07:31:52: EAPOL pak dump Tx
07:31:52: EAPOL Version: 0x3 type: 0x0 length: 0x003D
07:31:52: EAP code: 0x1 id: 0x1D length: 0x003D type: 0x19
07:31:52: dot1x-packet(Gi2/32): EAPOL packet sent to client 0x2F000033 (000b.5d4f.2ecf)
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_request_action called
07:31:52: dot1x-ev(Gi2/32): Role determination not required
07:31:52: dot1x-packet(Gi2/32): Queuing an EAPOL pkt on Authenticator Q
07:31:52: dot1x-ev:Enqueued the eapol packet to the global authenticator queue
07:31:52: EAPOL pak dump rx
07:31:52: EAPOL Version: 0x1 type: 0x0 length: 0x0006
07:31:52: dot1x-ev:
dot1x_auth_queue_event: Int Gi2/32 CODE= 2,TYPE= 25,LEN= 6
07:31:52: dot1x-packet(Gi2/32): Received an EAPOL frame
07:31:52: dot1x-ev(Gi2/32): Received pkt saddr =000b.5d4f.2ecf , daddr = 0180.c200.0003,
pae-ether-type = 888e.0100.0006
07:31:52: dot1x-packet(Gi2/32): Received an EAP packet
07:31:52: EAPOL pak dump rx
07:31:52: EAPOL Version: 0x1 type: 0x0 length: 0x0006
07:31:52: dot1x-packet(Gi2/32): Received an EAP packet from 000b.5d4f.2ecf
07:31:52: dot1x-sm(Gi2/32): Posting EAPOL_EAP for 0x2F000033
07:31:52: dot1x_auth_bend Gi2/32: during state auth_bend_request, got event 6(eapolEap)
07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_request -> auth_bend_response
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_enter called
07:31:52: dot1x-ev(Gi2/32): dot1x_sendRespToServer: Response sent to the server from 0x2F000033 (000b.5d4f.2ecf)
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_response_action called
07:31:52: RADIUS/ENCODE(0000004A):Orig. component type = DOT1X
07:31:52: RADIUS(0000004A): Config NAS IP: 0.0.0.0
07:31:52: RADIUS/ENCODE(0000004A): acct_session_id: 300
07:31:52: RADIUS(0000004A): sending
07:31:52: RADIUS/ENCODE: Best Local IP-Address 192.168.10.10 for Radius-Server 192.168.10.10
07:31:52: RADIUS(0000004A): Send Access-Request to 192.168.10.10:1645 id 1645/119, len 224
07:31:52: RADIUS: authenticator F3 AE 8D EB 66 EA CC 04 - E4 3D 2B C0 2A 80 FA C5
07:31:52: RADIUS: User-Name [1] 12 "Test\snoop"
07:31:52: RADIUS: Service-Type [6] 6 Framed [2]
07:31:52: RADIUS: Framed-MTU [12] 6 1500
07:31:52: RADIUS: Called-Station-Id [30] 19 "00-15-62-CE-3C-4F"
07:31:52: RADIUS: Calling-Station-Id [31] 19 "00-0B-5D-4F-2E-CF"
07:31:52: RADIUS: EAP-Message [79] 8
07:31:52: RADIUS: 02 1D 00 06 19 00
07:31:52: RADIUS: Message-Authenticato[80] 18
07:31:52: RADIUS: 2F 12 21 0A 31 45 E8 9E AA 4C 62 4F 42 56 EB 01 [ /!1ELbOBV]
07:31:52: RADIUS: EAP-Key-Name [102] 2 *
07:31:52: RADIUS: Vendor, Cisco [26] 49
07:31:52: RADIUS: Cisco AVpair [1] 43 "audit-session-id=C0A8C6C90000002F019D87A3"
07:31:52: RADIUS: NAS-Port-Type [61] 6 Ethernet [15]
07:31:52: RADIUS: NAS-Port [5] 6 50232
07:31:52: RADIUS: NAS-Port-Id [87] 21 "GigabitEthernet2/32"
07:31:52: RADIUS: State [24] 26
07:31:52: RADIUS: 45 41 50 3D 30 2E 32 30 34 2E 38 37 2E 33 3B 53 [EAP=0.204.87.3;S]
07:31:52: RADIUS: 56 43 3D 30 2E 32 35 3B [ VC=0.25;]
07:31:52: RADIUS: NAS-IP-Address [4] 6 192.168.10.10
07:31:52: RADIUS: Received from id 1645/119 192.168.10.10:1645, Access-Challenge, len 101
07:31:52: RADIUS: authenticator 8D 13 3B A4 D9 A1 11 D4 - 95 FC E2 A8 44 63 E2 6A
07:31:52: RADIUS: EAP-Message [79] 37
07:31:52: RADIUS: 01 1E 00 23 19 00 17 03 01 00 18 81 2B 16 5E C3 B8 FB 09 EE 73 49 C1 69 D3 72 9F B0 A1 5A D1 8C E4 05 5B [ #+^sIirZ[]
07:31:52: RADIUS: State [24] 26
07:31:52: RADIUS: 45 41 50 3D 30 2E 32 30 34 2E 38 37 2E 34 3B 53 [EAP=0.204.87.4;S]
07:31:52: RADIUS: 56 43 3D 30 2E 32 35 3B [ VC=0.25;]
07:31:52: RADIUS: Message-Authenticato[80] 18
07:31:52: RADIUS: B0 F6 80 89 FB 12 47 A7 4E B9 33 D6 45 69 0F 7C [ GN3Ei|]
07:31:52: RADIUS(0000004A): Received from id 1645/119
07:31:52: RADIUS/DECODE: EAP-Message fragments, 35, total 35 bytes
07:31:52: dot1x-sm(Gi2/32): Posting EAP_REQ for 0x2F000033
07:31:52: dot1x_auth_bend Gi2/32: during state auth_bend_response, got event 7(eapReq)
07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_response -> auth_bend_request
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_exit called
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_enter called
07:31:52: dot1x-ev(Gi2/32): Sending EAPOL packet to group PAE address
07:31:52: dot1x-ev(Gi2/32): Role determination not required
07:31:52: dot1x-registry:registry:dot1x_ether_macaddr called
07:31:52: dot1x-ev(Gi2/32): Sending out EAPOL packet
07:31:52: EAPOL pak dump Tx
07:31:52: EAPOL Version: 0x3 type: 0x0 length: 0x0023
07:31:52: EAP code: 0x1 id: 0x1E length: 0x0023 type: 0x19
07:31:52: dot1x-packet(Gi2/32): EAPOL packet sent to client 0x2F000033 (000b.5d4f.2ecf)
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_request_action called
07:31:52: dot1x-ev(Gi2/32): Role determination not required
07:31:52: dot1x-packet(Gi2/32): Queuing an EAPOL pkt on Authenticator Q
07:31:52: dot1x-ev:Enqueued the eapol packet to the global authenticator queue
07:31:52: EAPOL pak dump rx
07:31:52: EAPOL Version: 0x1 type: 0x0 length: 0x002B
07:31:52: dot1x-ev:
dot1x_auth_queue_event: Int Gi2/32 CODE= 2,TYPE= 25,LEN= 43
07:31:52: dot1x-packet(Gi2/32): Received an EAPOL frame
07:31:52: dot1x-ev(Gi2/32): Received pkt saddr =000b.5d4f.2ecf , daddr = 0180.c200.0003,
pae-ether-type = 888e.0100.002b
07:31:52: dot1x-packet(Gi2/32): Received an EAP packet
07:31:52: EAPOL pak dump rx
07:31:52: EAPOL Version: 0x1 type: 0x0 length: 0x002B
07:31:52: dot1x-packet(Gi2/32): Received an EAP packet from 000b.5d4f.2ecf
07:31:52: dot1x-sm(Gi2/32): Posting EAPOL_EAP for 0x2F000033
07:31:52: dot1x_auth_bend Gi2/32: during state auth_bend_request, got event 6(eapolEap)
07:31:52: @@@ dot1x_auth_bend Gi2/32: auth_bend_request -> auth_bend_response
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_enter called
07:31:52: dot1x-ev(Gi2/32): dot1x_sendRespToServer: Response sent to the server from 0x2F000033 (000b.5d4f.2ecf)
07:31:52: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_response_action called
07:31:52: RADIUS/ENCODE(0000004A):Orig. component type = DOT1X
07:31:52: RADIUS(0000004A): Config NAS IP: 0.0.0.0
07:31:52: RADIUS/ENCODE(0000004A): acct_session_id: 300
07:31:52: RADIUS(0000004A): sending
07:31:52: RADIUS/ENCODE: Best Local IP-Address 192.168.10.10 for Radius-Server 192.168.10.10
07:31:52: RADIUS(0000004A): Send Access-Request to 192.168.10.10:1645 id 1645/120, len 261
07:31:52: RADIUS: authenticator DF 0A B9 1D F9 EF DB 31 - A2 3F B2 42 9F EE C1 C0
07:31:52: RADIUS: User-Name [1] 12 "Test\snoop"
07:31:52: RADIUS: Service-Type [6] 6 Framed [2]
07:31:52: RADIUS: Framed-MTU [12] 6 1500
07:31:52: RADIUS: Called-Station-Id [30] 19 "00-15-62-CE-3C-4F"
07:31:52: RADIUS: Calling-Station-Id [31] 19 "00-0B-5D-4F-2E-CF"
07:31:52: RADIUS: EAP-Message [79] 45
07:31:52: RADIUS: 02 1E 00 2B 19 00 17 03 01 00 20 5E F7 3E 81 61 6E 70 2D 6E D3 41 4C 8D D6 9F EB 8A 07 9E 15 C7 BA 94 FF F4 6B D7 FE 4A C2 CE 32 [ + ^>anp-nALkJ2]
07:31:52: RADIUS: Message-Authenticato[80] 18
07:31:52: RADIUS: D5 92 A7 B5 66 E4 CB 7F F3 08 4E 9F 87 1B 23 BC [ fN#]
07:31:52: RADIUS: EAP-Key-Name [102] 2 *
07:31:52: RADIUS: Vendor, Cisco [26] 49
07:31:52: RADIUS: Cisco AVpair [1] 43 "audit-session-id=C0A8C6C90000002F019D87A3"
07:31:52: RADIUS: NAS-Port-Type [61] 6 Ethernet [15]
07:31:52: RADIUS: NAS-Port [5] 6 50232
07:31:52: RADIUS: NAS-Port-Id [87] 21 "GigabitEthernet2/32"
07:31:52: RADIUS: State [24] 26
07:31:52: RADIUS: 45 41 50 3D 30 2E 32 30 34 2E 38 37 2E 34 3B 53 [EAP=0.204.87.4;S]
07:31:52: RADIUS: 56 43 3D 30 2E 32 35 3B [ VC=0.25;]
07:31:52: RADIUS: NAS-IP-Address [4] 6 192.168.10.10
07:31:53: RADIUS: Received from id 1645/120 192.168.10.10:1645, Access-Challenge, len 141
07:31:53: RADIUS: authenticator B6 76 F9 88 FE F8 65 5A - 9C 9A D3 5A 29 E6 6F 7B
07:31:53: RADIUS: EAP-Message [79] 77
07:31:53: RADIUS: 01 1F 00 4B 19 00 17 03 01 00 40 36 34 4D CE 91 2E CA 42 30 1B 9C DB 7A 11 A4 10 39 11 8D E2 FC 6C 7E 0D 65 03 E5 B7 05 C3 5F A5 64 79 [K@64M.B0z9l~e_dy]
07:31:53: RADIUS: 9A 61 1C E2 30 56 57 B6 42 06 4E BD 96 02 78 16 59 0D CA 01 F8 AB CE 51 F2 77 2F EE C5 D3 [ a0VWBNxYQw/]
07:31:53: RADIUS: State [24] 26
07:31:53: RADIUS: 45 41 50 3D 30 2E 32 30 34 2E 38 37 2E 35 3B 53 [EAP=0.204.87.5;S]
07:31:53: RADIUS: 56 43 3D 30 2E 32 35 3B [ VC=0.25;]
07:31:53: RADIUS: Message-Authenticato[80] 18
07:31:53: RADIUS: 6B 69 DF 80 CC 08 92 85 F6 6C EF E2 BD 58 D2 6F [ kilXo]
07:31:53: RADIUS(0000004A): Received from id 1645/120
07:31:53: RADIUS/DECODE: EAP-Message fragments, 75, total 75 bytes
07:31:53: dot1x-sm(Gi2/32): Posting EAP_REQ for 0x2F000033
07:31:53: dot1x_auth_bend Gi2/32: during state auth_bend_response, got event 7(eapReq)
07:31:53: @@@ dot1x_auth_bend Gi2/32: auth_bend_response -> auth_bend_request
07:31:53: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_exit called
07:31:53: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_enter called
07:31:53: dot1x-ev(Gi2/32): Sending EAPOL packet to group PAE address
07:31:53: dot1x-ev(Gi2/32): Role determination not required
07:31:53: dot1x-registry:registry:dot1x_ether_macaddr called
07:31:53: dot1x-ev(Gi2/32): Sending out EAPOL packet
07:31:53: EAPOL pak dump Tx
07:31:53: EAPOL Version: 0x3 type: 0x0 length: 0x004B
07:31:53: EAP code: 0x1 id: 0x1F length: 0x004B type: 0x19
07:31:53: dot1x-packet(Gi2/32): EAPOL packet sent to client 0x2F000033 (000b.5d4f.2ecf)
07:31:53: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_request_action called
07:31:53: dot1x-ev(Gi2/32): Role determination not required
07:31:53: dot1x-packet(Gi2/32): Queuing an EAPOL pkt on Authenticator Q
07:31:53: dot1x-ev:Enqueued the eapol packet to the global authenticator queue
07:31:53: EAPOL pak dump rx
07:31:53: EAPOL Version: 0x1 type: 0x0 length: 0x0063
07:31:53: dot1x-ev:
dot1x_auth_queue_event: Int Gi2/32 CODE= 2,TYPE= 25,LEN= 99
07:31:53: dot1x-packet(Gi2/32): Received an EAPOL frame
07:31:53: dot1x-ev(Gi2/32): Received pkt saddr =000b.5d4f.2ecf , daddr = 0180.c200.0003,
pae-ether-type = 888e.0100.0063
07:31:53: dot1x-packet(Gi2/32): Received an EAP packet
07:31:53: EAPOL pak dump rx
07:31:53: EAPOL Version: 0x1 type: 0x0 length: 0x0063
07:31:53: dot1x-packet(Gi2/32): Received an EAP packet from 000b.5d4f.2ecf
07:31:53: dot1x-sm(Gi2/32): Posting EAPOL_EAP for 0x2F000033
07:31:53: dot1x_auth_bend Gi2/32: during state auth_bend_request, got event 6(eapolEap)
07:31:53: @@@ dot1x_auth_bend Gi2/32: auth_bend_request -> auth_bend_response
07:31:53: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_enter called
07:31:53: dot1x-ev(Gi2/32): dot1x_sendRespToServer: Response sent to the server from 0x2F000033 (000b.5d4f.2ecf)
07:31:53: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_response_action called
07:31:53: RADIUS/ENCODE(0000004A):Orig. component type = DOT1X
07:31:53: RADIUS(0000004A): Config NAS IP: 0.0.0.0
07:31:53: RADIUS/ENCODE(0000004A): acct_session_id: 300
07:31:53: RADIUS(0000004A): sending
07:31:53: RADIUS/ENCODE: Best Local IP-Address 192.168.10.10 for Radius-Server 192.168.10.10
07:31:53: RADIUS(0000004A): Send Access-Request to 192.168.10.10:1645 id 1645/121, len 317
07:31:53: RADIUS: authenticator E5 ED 72 78 40 54 F1 BB - A0 1D 4B 14 EE 21 52 04
07:31:53: RADIUS: User-Name [1] 12 "Test\snoop"
07:31:53: RADIUS: Service-Type [6] 6 Framed [2]
07:31:53: RADIUS: Framed-MTU [12] 6 1500
07:31:53: RADIUS: Called-Station-Id [30] 19 "00-15-62-CE-3C-4F"
07:31:53: RADIUS: Calling-Station-Id [31] 19 "00-0B-5D-4F-2E-CF"
07:31:53: RADIUS: EAP-Message [79] 101
07:31:53: RADIUS: 02 1F 00 63 19 00 17 03 01 00 58 66 A0 97 3E 58 52 D8 A5 43 F6 7B 3D 62 98 32 F3 78 CF A9 50 56 84 A5 9F CA E6 1D 3A 72 [cXf>XRC{=b2xPV:r]
07:31:53: RADIUS: 21 05 2B C9 CC BF 97 42 7C 20 8F C9 96 66 A4 F5 63 3C CB 76 FD 68 B1 B3 4F 29 1D C3 3C 95 8A 8B 21 0C 02 3A 84 14 CE F8 81 4F [!+B| fc
07:31:53: RADIUS: 92 F2 75 AE 8D 0B BA 5F DF C4 F3 33 57 94 D6 82 D6 [ u_3W]
07:31:53: RADIUS: Message-Authenticato[80] 18
07:31:53: RADIUS: 94 85 07 92 18 9B B8 D0 05 EC 04 92 DE D6 3E 2C [ >,]
07:31:53: RADIUS: EAP-Key-Name [102] 2 *
07:31:53: RADIUS: Vendor, Cisco [26] 49
07:31:53: RADIUS: Cisco AVpair [1] 43 "audit-session-id=C0A8C6C90000002F019D87A3"
07:31:53: RADIUS: NAS-Port-Type [61] 6 Ethernet [15]
07:31:53: RADIUS: NAS-Port [5] 6 50232
07:31:53: RADIUS: NAS-Port-Id [87] 21 "GigabitEthernet2/32"
07:31:53: RADIUS: State [24] 26
07:31:53: RADIUS: 45 41 50 3D 30 2E 32 30 34 2E 38 37 2E 35 3B 53 [EAP=0.204.87.5;S]
07:31:53: RADIUS: 56 43 3D 30 2E 32 35 3B [ VC=0.25;]
07:31:53: RADIUS: NAS-IP-Address [4] 6 192.168.10.10
07:31:53: RADIUS: Received from id 1645/121 192.168.10.10:1645, Access-Challenge, len 149
07:31:53: RADIUS: authenticator BF E4 10 10 FF CD 33 36 - C1 EC 9F AE 08 98 69 E3
07:31:53: RADIUS: EAP-Message [79] 85
07:31:53: RADIUS: 01 20 00 53 19 00 17 03 01 00 48 19 A5 F4 03 9B 47 5C 99 B9 5E 8D 86 A2 76 23 5B A3 D4 2F FF 42 00 C4 E4 67 CD 96 4B E4 7D 65 8B B3 79 [ SHG\^v#[/BgK}ey]
07:31:53: RADIUS: 5A 69 31 D1 A2 13 A2 1A 68 F1 81 33 81 EF 7B A3 A1 B1 49 5E 32 75 2C DD 80 59 45 F9 EB C0 77 0B EF 0A EF 9C 64 B0 [ Zi1h3{I^2u,YEwd]
07:31:53: RADIUS: State [24] 26
07:31:53: RADIUS: 45 41 50 3D 30 2E 32 30 34 2E 38 37 2E 36 3B 53 [EAP=0.204.87.6;S]
07:31:53: RADIUS: 56 43 3D 30 2E 32 35 3B [ VC=0.25;]
07:31:53: RADIUS: Message-Authenticato[80] 18
07:31:53: RADIUS: CE 15 CD 59 D8 9D DE 1D FC 7B 17 61 59 65 E1 98 [ Y{aYe]
07:31:53: RADIUS(0000004A): Received from id 1645/121
07:31:53: RADIUS/DECODE: EAP-Message fragments, 83, total 83 bytes
07:31:53: dot1x-sm(Gi2/32): Posting EAP_REQ for 0x2F000033
07:31:53: dot1x_auth_bend Gi2/32: during state auth_bend_response, got event 7(eapReq)
07:31:53: @@@ dot1x_auth_bend Gi2/32: auth_bend_response -> auth_bend_request
07:31:53: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_exit called
07:31:53: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_enter called
07:31:53: dot1x-ev(Gi2/32): Sending EAPOL packet to group PAE address
07:31:53: dot1x-ev(Gi2/32): Role determination not required
07:31:53: dot1x-registry:registry:dot1x_ether_macaddr called
07:31:53: dot1x-ev(Gi2/32): Sending out EAPOL packet
07:31:53: EAPOL pak dump Tx
07:31:53: EAPOL Version: 0x3 type: 0x0 length: 0x0053
07:31:53: EAP code: 0x1 id: 0x20 length: 0x0053 type: 0x19
07:31:53: dot1x-packet(Gi2/32): EAPOL packet sent to client 0x2F000033 (000b.5d4f.2ecf)
07:31:53: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_request_action called
07:31:53: dot1x-ev(Gi2/32): Role determination not required
07:31:53: dot1x-packet(Gi2/32): Queuing an EAPOL pkt on Authenticator Q
07:31:53: dot1x-ev:Enqueued the eapol packet to the global authenticator queue
07:31:53: EAPOL pak dump rx
07:31:53: EAPOL Version: 0x1 type: 0x0 length: 0x0023
07:31:53: dot1x-ev:
dot1x_auth_queue_event: Int Gi2/32 CODE= 2,TYPE= 25,LEN= 35
07:31:53: dot1x-packet(Gi2/32): Received an EAPOL frame
07:31:53: dot1x-ev(Gi2/32): Received pkt saddr =000b.5d4f.2ecf , daddr = 0180.c200.0003,
pae-ether-type = 888e.0100.0023
07:31:53: dot1x-packet(Gi2/32): Received an EAP packet
07:31:53: EAPOL pak dump rx
07:31:53: EAPOL Version: 0x1 type: 0x0 length: 0x0023
07:31:53: dot1x-packet(Gi2/32): Received an EAP packet from 000b.5d4f.2ecf
07:31:53: dot1x-sm(Gi2/32): Posting EAPOL_EAP for 0x2F000033
07:31:53: dot1x_auth_bend Gi2/32: during state auth_bend_request, got event 6(eapolEap)
07:31:53: @@@ dot1x_auth_bend Gi2/32: auth_bend_request -> auth_bend_response
07:31:53: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_response_enter called
07:31:53: dot1x-ev(Gi2/32): dot1x_sendRespToServer: Response sent to the server from 0x2F000033 (000b.5d4f.2ecf)
07:31:53: dot1x-sm(Gi2/32): 0x2F000033:auth_bend_request_response_action called
07:31:53: RADIUS/ENCODE(0000004A):Orig. component type = DOT1X
07:31:53: RADIUS(0000004A): Config NAS IP: 0.0.0.0
07:31:53: RADIUS/ENCODE(0000004A): acct_session_id: 300
07:31:53: RADIUS(0000004A): sending
06-18-2012 10:18 AM
Hello ikatyal,
now it get under Radius Accounting that the authentification was succssful.
How i can see , that my Client ist using the certificate (ca)
regards
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide