cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
4226
Views
0
Helpful
3
Replies

ISE 802.1x Authentication not working

MarioLieb
Level 1
Level 1

Hi Guys 

 

i have some trouble with 802.1x authentication in the LAN and i hope you can help me, because i have no idea ...

We use Port- Based- Security within our LAN. We use Cisco ISE to authenticate Computers against the AD. 

The error which i now have accore on some Windows 10 Clients but not on all and not everytime. If the Client starts up or cable were plugin, the Switch tries to Authenticate the Client. The ISE sends an OK to the Switch but the Switch doesn´t authenticate the Client. If we Login on Windows and Restart the EAP- Service than the Authentication works. Maybe some one can figure out where the problem is. 

In my opinion it is not a Network Issue but i have to point ist out ...

 

THX 

 

Jul 24 09:30:38.461 CET: %LINK-3-UPDOWN: Interface GigabitEthernet2/0/13, changed state to down
Jul 24 09:30:39.870 CET: %SYS-5-CONFIG_I: Configured from console by liebm on vty0 (10.165.116.112)
Jul 24 09:30:41.904 CET: dot1x-ev:[Gi2/0/13] Interface state changed to UP
Jul 24 09:30:41.908 CET: dot1x-ev:DOT1X Supplicant not enabled on GigabitEthernet2/0/13
Jul 24 09:30:41.943 CET: dot1x_auth Gi2/0/13: initial state auth_initialize has enter
Jul 24 09:30:41.943 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F: initialising
Jul 24 09:30:41.943 CET: dot1x_auth Gi2/0/13: during state auth_initialize, got event 0(cfg_auto)
Jul 24 09:30:41.943 CET: @@@ dot1x_auth Gi2/0/13: auth_initialize -> auth_disconnected
Jul 24 09:30:41.943 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F: disconnected
Jul 24 09:30:41.943 CET: dot1x_auth Gi2/0/13: idle during state auth_disconnected
Jul 24 09:30:41.943 CET: @@@ dot1x_auth Gi2/0/13: auth_disconnected -> auth_restart
Jul 24 09:30:41.943 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F: entering restart
Jul 24 09:30:41.943 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending create new context event to EAP for 0x4500045F (3c52.8276.5346)
Jul 24 09:30:41.943 CET: dot1x_auth_bend Gi2/0/13: initial state auth_bend_initialize has enter
Jul 24 09:30:41.943 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F: entering init state
Jul 24 09:30:41.943 CET: dot1x_auth_bend Gi2/0/13: initial state auth_bend_initialize has idle
Jul 24 09:30:41.943 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_initialize, got event 16383(idle)
Jul 24 09:30:41.943 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_initialize -> auth_bend_idle
Jul 24 09:30:41.943 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering idle state
Jul 24 09:30:41.943 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Created a client entry (0x4500045F)
Jul 24 09:30:41.943 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Dot1x authentication started for 0x4500045F (3c52.8276.5346)
Jul 24 09:30:41.950 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting !EAP_RESTART on Client 0x4500045F
Jul 24 09:30:41.950 CET: dot1x_auth Gi2/0/13: during state auth_restart, got event 6(no_eapRestart)
Jul 24 09:30:41.950 CET: @@@ dot1x_auth Gi2/0/13: auth_restart -> auth_connecting
Jul 24 09:30:41.950 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:enter connecting state
Jul 24 09:30:41.950 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F: restart connecting
Jul 24 09:30:41.950 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting RX_REQ on Client 0x4500045F
Jul 24 09:30:41.950 CET: dot1x_auth Gi2/0/13: during state auth_connecting, got event 10(eapReq_no_reAuthMax)
Jul 24 09:30:41.950 CET: @@@ dot1x_auth Gi2/0/13: auth_connecting -> auth_authenticating
Jul 24 09:30:41.950 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F: authenticating state entered
Jul 24 09:30:41.950 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:connecting authenticating action
Jul 24 09:30:41.950 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting AUTH_START for 0x4500045F
Jul 24 09:30:41.950 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_idle, got event 4(eapReq_authStart)
Jul 24 09:30:41.950 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_idle -> auth_bend_request
Jul 24 09:30:41.950 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering request state
Jul 24 09:30:41.950 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending EAPOL packet
Jul 24 09:30:41.950 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jul 24 09:30:41.950 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending out EAPOL packet to MAC 3c52.8276.5346
Jul 24 09:30:41.950 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jul 24 09:30:41.950 CET: dot1x-packet: length: 0x0005
Jul 24 09:30:41.950 CET: dot1x-packet:EAP code: 0x1 id: 0x1 length: 0x0005
Jul 24 09:30:41.950 CET: dot1x-packet: type: 0x1
Jul 24 09:30:41.953 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] EAPOL packet sent to client 0x4500045F
Jul 24 09:30:41.953 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:idle request action
Jul 24 09:30:41.988 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] queuing an EAPOL pkt on Auth Q
Jul 24 09:30:41.988 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x1
Jul 24 09:30:41.988 CET: dot1x-packet: length: 0x0000
Jul 24 09:30:41.988 CET: dot1x-ev:[Gi2/0/13] Dequeued pkt: Int Gi2/0/13 CODE= 0,TYPE= 0,LEN= 0

Jul 24 09:30:41.988 CET: dot1x-ev:[Gi2/0/13] Received pkt saddr =3c52.8276.5346 , daddr = 0180.c200.0003, pae-ether-type = 888e.0101.0000
Jul 24 09:30:41.988 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] Received an EAPOL-Start packet
Jul 24 09:30:41.988 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x1
Jul 24 09:30:41.988 CET: dot1x-packet: length: 0x0000
Jul 24 09:30:41.988 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAPOL_START on Client 0x4500045F
Jul 24 09:30:41.988 CET: dot1x_auth Gi2/0/13: during state auth_authenticating, got event 4(eapolStart)
Jul 24 09:30:41.988 CET: @@@ dot1x_auth Gi2/0/13: auth_authenticating -> auth_aborting
Jul 24 09:30:41.988 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:exiting authenticating state
Jul 24 09:30:41.988 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F: entering aborting state
Jul 24 09:30:41.992 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting AUTH_ABORT for 0x4500045F
Jul 24 09:30:41.992 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_request, got event 1(authAbort)
Jul 24 09:30:41.992 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_request -> auth_bend_initialize
Jul 24 09:30:41.992 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F: entering init state
Jul 24 09:30:41.992 CET: dot1x_auth_bend Gi2/0/13: idle during state auth_bend_initialize
Jul 24 09:30:41.992 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_initialize -> auth_bend_idle
Jul 24 09:30:41.992 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering idle state
Jul 24 09:30:41.992 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting !AUTH_ABORT on Client 0x4500045F
Jul 24 09:30:41.992 CET: dot1x_auth Gi2/0/13: during state auth_aborting, got event 20(no_eapolLogoff_no_authAbort)
Jul 24 09:30:41.992 CET: @@@ dot1x_auth Gi2/0/13: auth_aborting -> auth_restart
Jul 24 09:30:41.992 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:exiting aborting state
Jul 24 09:30:41.992 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F: entering restart
Jul 24 09:30:41.992 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Resetting the client 0x4500045F
Jul 24 09:30:41.992 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending create new context event to EAP for 0x4500045F (3c52.8276.5346)
Jul 24 09:30:41.992 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:restart action for aborting state
Jul 24 09:30:41.992 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting !EAP_RESTART on Client 0x4500045F
Jul 24 09:30:41.992 CET: dot1x_auth Gi2/0/13: during state auth_restart, got event 6(no_eapRestart)
Jul 24 09:30:41.992 CET: @@@ dot1x_auth Gi2/0/13: auth_restart -> auth_connecting
Jul 24 09:30:41.992 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:enter connecting state
Jul 24 09:30:41.992 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F: restart connecting
Jul 24 09:30:42.030 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting RX_REQ on Client 0x4500045F
Jul 24 09:30:42.030 CET: dot1x_auth Gi2/0/13: during state auth_connecting, got event 10(eapReq_no_reAuthMax)
Jul 24 09:30:42.030 CET: @@@ dot1x_auth Gi2/0/13: auth_connecting -> auth_authenticating
Jul 24 09:30:42.030 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F: authenticating state entered
Jul 24 09:30:42.030 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:connecting authenticating action
Jul 24 09:30:42.030 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting AUTH_START for 0x4500045F
Jul 24 09:30:42.030 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_idle, got event 4(eapReq_authStart)
Jul 24 09:30:42.030 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_idle -> auth_bend_request
Jul 24 09:30:42.030 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering request state
Jul 24 09:30:42.030 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending EAPOL packet
Jul 24 09:30:42.030 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jul 24 09:30:42.030 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending out EAPOL packet to MAC 3c52.8276.5346
Jul 24 09:30:42.030 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jul 24 09:30:42.030 CET: dot1x-packet: length: 0x0005
Jul 24 09:30:42.030 CET: dot1x-packet:EAP code: 0x1 id: 0x1 length: 0x0005
Jul 24 09:30:42.030 CET: dot1x-packet: type: 0x1
Jul 24 09:30:42.030 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] EAPOL packet sent to client 0x4500045F
Jul 24 09:30:42.030 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:idle request action
Jul 24 09:30:42.069 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] Queuing an EAPOL pkt on Authenticator Q
Jul 24 09:30:42.069 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jul 24 09:30:42.069 CET: dot1x-packet: length: 0x0024
Jul 24 09:30:42.069 CET: dot1x-ev:[Gi2/0/13] Dequeued pkt: Int Gi2/0/13 CODE= 2,TYPE= 1,LEN= 36

Jul 24 09:30:42.069 CET: dot1x-ev:[Gi2/0/13] Received pkt saddr =3c52.8276.5346 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0024
Jul 24 09:30:42.069 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jul 24 09:30:42.069 CET: dot1x-packet: length: 0x0024
Jul 24 09:30:42.069 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAPOL_EAP for 0x4500045F
Jul 24 09:30:42.069 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_request, got event 6(eapolEap)
Jul 24 09:30:42.069 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_request -> auth_bend_response
Jul 24 09:30:42.069 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering response state
Jul 24 09:30:42.069 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Response sent to the server from 0x4500045F
Jul 24 09:30:42.069 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:request response action
Jul 24 09:30:42.093 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAP_REQ for 0x4500045F
Jul 24 09:30:42.093 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_response, got event 7(eapReq)
Jul 24 09:30:42.093 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_response -> auth_bend_request
Jul 24 09:30:42.093 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:exiting response state
Jul 24 09:30:42.097 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering request state
Jul 24 09:30:42.097 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending EAPOL packet
Jul 24 09:30:42.097 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jul 24 09:30:42.097 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending out EAPOL packet to MAC 3c52.8276.5346
Jul 24 09:30:42.097 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jul 24 09:30:42.097 CET: dot1x-packet: length: 0x0006
Jul 24 09:30:42.097 CET: dot1x-packet:EAP code: 0x1 id: 0xAA length: 0x0006
Jul 24 09:30:42.097 CET: dot1x-packet: type: 0x19
Jul 24 09:30:42.097 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] EAPOL packet sent to client 0x4500045F
Jul 24 09:30:42.097 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:response request action
Jul 24 09:30:42.132 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] Queuing an EAPOL pkt on Authenticator Q
Jul 24 09:30:42.132 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jul 24 09:30:42.132 CET: dot1x-packet: length: 0x00A6
Jul 24 09:30:42.132 CET: dot1x-ev:[Gi2/0/13] Dequeued pkt: Int Gi2/0/13 CODE= 2,TYPE= 25,LEN= 166

Jul 24 09:30:42.132 CET: dot1x-ev:[Gi2/0/13] Received pkt saddr =3c52.8276.5346 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.00a6
Jul 24 09:30:42.132 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jul 24 09:30:42.132 CET: dot1x-packet: length: 0x00A6
Jul 24 09:30:42.132 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAPOL_EAP for 0x4500045F
Jul 24 09:30:42.132 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_request, got event 6(eapolEap)
Jul 24 09:30:42.132 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_request -> auth_bend_response
Jul 24 09:30:42.132 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering response state
Jul 24 09:30:42.135 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Response sent to the server from 0x4500045F
Jul 24 09:30:42.135 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:request response action
Jul 24 09:30:42.146 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAP_REQ for 0x4500045F
Jul 24 09:30:42.146 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_response, got event 7(eapReq)
Jul 24 09:30:42.146 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_response -> auth_bend_request
Jul 24 09:30:42.146 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:exiting response state
Jul 24 09:30:42.146 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering request state
Jul 24 09:30:42.146 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending EAPOL packet
Jul 24 09:30:42.149 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jul 24 09:30:42.149 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending out EAPOL packet to MAC 3c52.8276.5346
Jul 24 09:30:42.149 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jul 24 09:30:42.149 CET: dot1x-packet: length: 0x03F4
Jul 24 09:30:42.149 CET: dot1x-packet:EAP code: 0x1 id: 0xAB length: 0x03F4
Jul 24 09:30:42.149 CET: dot1x-packet: type: 0x19
Jul 24 09:30:42.149 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] EAPOL packet sent to client 0x4500045F
Jul 24 09:30:42.149 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:response request action
Jul 24 09:30:42.156 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] Queuing an EAPOL pkt on Authenticator Q
Jul 24 09:30:42.156 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jul 24 09:30:42.156 CET: dot1x-packet: length: 0x0006
Jul 24 09:30:42.156 CET: dot1x-ev:[Gi2/0/13] Dequeued pkt: Int Gi2/0/13 CODE= 2,TYPE= 25,LEN= 6

Jul 24 09:30:42.156 CET: dot1x-ev:[Gi2/0/13] Received pkt saddr =3c52.8276.5346 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0006
Jul 24 09:30:42.156 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jul 24 09:30:42.156 CET: dot1x-packet: length: 0x0006
Jul 24 09:30:42.156 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAPOL_EAP for 0x4500045F
Jul 24 09:30:42.156 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_request, got event 6(eapolEap)
Jul 24 09:30:42.156 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_request -> auth_bend_response
Jul 24 09:30:42.156 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering response state
Jul 24 09:30:42.156 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Response sent to the server from 0x4500045F
Jul 24 09:30:42.156 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:request response action
Jul 24 09:30:42.181 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAP_REQ for 0x4500045F
Jul 24 09:30:42.181 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_response, got event 7(eapReq)
Jul 24 09:30:42.181 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_response -> auth_bend_request
Jul 24 09:30:42.181 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:exiting response state
Jul 24 09:30:42.181 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering request state
Jul 24 09:30:42.181 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending EAPOL packet
Jul 24 09:30:42.181 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jul 24 09:30:42.181 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending out EAPOL packet to MAC 3c52.8276.5346
Jul 24 09:30:42.181 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jul 24 09:30:42.181 CET: dot1x-packet: length: 0x03F0
Jul 24 09:30:42.181 CET: dot1x-packet:EAP code: 0x1 id: 0xAC length: 0x03F0
Jul 24 09:30:42.181 CET: dot1x-packet: type: 0x19
Jul 24 09:30:42.181 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] EAPOL packet sent to client 0x4500045F
Jul 24 09:30:42.181 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:response request action
Jul 24 09:30:42.184 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] Queuing an EAPOL pkt on Authenticator Q
Jul 24 09:30:42.184 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jul 24 09:30:42.184 CET: dot1x-packet: length: 0x0006
Jul 24 09:30:42.184 CET: dot1x-ev:[Gi2/0/13] Dequeued pkt: Int Gi2/0/13 CODE= 2,TYPE= 25,LEN= 6

Jul 24 09:30:42.184 CET: dot1x-ev:[Gi2/0/13] Received pkt saddr =3c52.8276.5346 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0006
Jul 24 09:30:42.184 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jul 24 09:30:42.184 CET: dot1x-packet: length: 0x0006
Jul 24 09:30:42.187 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAPOL_EAP for 0x4500045F
Jul 24 09:30:42.187 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_request, got event 6(eapolEap)
Jul 24 09:30:42.187 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_request -> auth_bend_response
Jul 24 09:30:42.187 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering response state
Jul 24 09:30:42.187 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Response sent to the server from 0x4500045F
Jul 24 09:30:42.187 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:request response action
Jul 24 09:30:42.194 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAP_REQ for 0x4500045F
Jul 24 09:30:42.194 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_response, got event 7(eapReq)
Jul 24 09:30:42.194 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_response -> auth_bend_request
Jul 24 09:30:42.194 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:exiting response state
Jul 24 09:30:42.194 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering request state
Jul 24 09:30:42.194 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending EAPOL packet
Jul 24 09:30:42.194 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jul 24 09:30:42.194 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending out EAPOL packet to MAC 3c52.8276.5346
Jul 24 09:30:42.194 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jul 24 09:30:42.194 CET: dot1x-packet: length: 0x03F0
Jul 24 09:30:42.194 CET: dot1x-packet:EAP code: 0x1 id: 0xAD length: 0x03F0
Jul 24 09:30:42.194 CET: dot1x-packet: type: 0x19
Jul 24 09:30:42.198 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] EAPOL packet sent to client 0x4500045F
Jul 24 09:30:42.198 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:response request action
Jul 24 09:30:42.212 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] Queuing an EAPOL pkt on Authenticator Q
Jul 24 09:30:42.212 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jul 24 09:30:42.212 CET: dot1x-packet: length: 0x0006
Jul 24 09:30:42.212 CET: dot1x-ev:[Gi2/0/13] Dequeued pkt: Int Gi2/0/13 CODE= 2,TYPE= 25,LEN= 6

Jul 24 09:30:42.212 CET: dot1x-ev:[Gi2/0/13] Received pkt saddr =3c52.8276.5346 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0006
Jul 24 09:30:42.212 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jul 24 09:30:42.212 CET: dot1x-packet: length: 0x0006
Jul 24 09:30:42.212 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAPOL_EAP for 0x4500045F
Jul 24 09:30:42.212 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_request, got event 6(eapolEap)
Jul 24 09:30:42.212 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_request -> auth_bend_response
Jul 24 09:30:42.212 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering response state
Jul 24 09:30:42.212 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Response sent to the server from 0x4500045F
Jul 24 09:30:42.212 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:request response action
Jul 24 09:30:42.222 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAP_REQ for 0x4500045F
Jul 24 09:30:42.222 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_response, got event 7(eapReq)
Jul 24 09:30:42.222 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_response -> auth_bend_request
Jul 24 09:30:42.222 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:exiting response state
Jul 24 09:30:42.222 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering request state
Jul 24 09:30:42.222 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending EAPOL packet
Jul 24 09:30:42.222 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jul 24 09:30:42.222 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending out EAPOL packet to MAC 3c52.8276.5346
Jul 24 09:30:42.222 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jul 24 09:30:42.222 CET: dot1x-packet: length: 0x0355
Jul 24 09:30:42.222 CET: dot1x-packet:EAP code: 0x1 id: 0xAE length: 0x0355
Jul 24 09:30:42.222 CET: dot1x-packet: type: 0x19
Jul 24 09:30:42.222 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] EAPOL packet sent to client 0x4500045F
Jul 24 09:30:42.222 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:response request action
Jul 24 09:30:42.229 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] Queuing an EAPOL pkt on Authenticator Q
Jul 24 09:30:42.229 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jul 24 09:30:42.229 CET: dot1x-packet: length: 0x0088
Jul 24 09:30:42.229 CET: dot1x-ev:[Gi2/0/13] Dequeued pkt: Int Gi2/0/13 CODE= 2,TYPE= 25,LEN= 136

Jul 24 09:30:42.229 CET: dot1x-ev:[Gi2/0/13] Received pkt saddr =3c52.8276.5346 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0088
Jul 24 09:30:42.229 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jul 24 09:30:42.229 CET: dot1x-packet: length: 0x0088
Jul 24 09:30:42.229 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAPOL_EAP for 0x4500045F
Jul 24 09:30:42.229 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_request, got event 6(eapolEap)
Jul 24 09:30:42.229 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_request -> auth_bend_response
Jul 24 09:30:42.229 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering response state
Jul 24 09:30:42.229 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Response sent to the server from 0x4500045F
Jul 24 09:30:42.233 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:request response action
Jul 24 09:30:42.236 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAP_REQ for 0x4500045F
Jul 24 09:30:42.240 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_response, got event 7(eapReq)
Jul 24 09:30:42.240 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_response -> auth_bend_request
Jul 24 09:30:42.240 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:exiting response state
Jul 24 09:30:42.240 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering request state
Jul 24 09:30:42.240 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending EAPOL packet
Jul 24 09:30:42.240 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jul 24 09:30:42.240 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending out EAPOL packet to MAC 3c52.8276.5346
Jul 24 09:30:42.240 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jul 24 09:30:42.240 CET: dot1x-packet: length: 0x0039
Jul 24 09:30:42.240 CET: dot1x-packet:EAP code: 0x1 id: 0xAF length: 0x0039
Jul 24 09:30:42.240 CET: dot1x-packet: type: 0x19
Jul 24 09:30:42.240 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] EAPOL packet sent to client 0x4500045F
Jul 24 09:30:42.240 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:response request action
Jul 24 09:30:42.264 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] Queuing an EAPOL pkt on Authenticator Q
Jul 24 09:30:42.264 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jul 24 09:30:42.264 CET: dot1x-packet: length: 0x0006
Jul 24 09:30:42.264 CET: dot1x-ev:[Gi2/0/13] Dequeued pkt: Int Gi2/0/13 CODE= 2,TYPE= 25,LEN= 6

Jul 24 09:30:42.264 CET: dot1x-ev:[Gi2/0/13] Received pkt saddr =3c52.8276.5346 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0006
Jul 24 09:30:42.264 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jul 24 09:30:42.264 CET: dot1x-packet: length: 0x0006
Jul 24 09:30:42.264 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAPOL_EAP for 0x4500045F
Jul 24 09:30:42.264 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_request, got event 6(eapolEap)
Jul 24 09:30:42.264 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_request -> auth_bend_response
Jul 24 09:30:42.264 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering response state
Jul 24 09:30:42.264 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Response sent to the server from 0x4500045F
Jul 24 09:30:42.264 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:request response action
Jul 24 09:30:42.275 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAP_REQ for 0x4500045F
Jul 24 09:30:42.275 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_response, got event 7(eapReq)
Jul 24 09:30:42.275 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_response -> auth_bend_request
Jul 24 09:30:42.275 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:exiting response state
Jul 24 09:30:42.275 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering request state
Jul 24 09:30:42.275 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending EAPOL packet
Jul 24 09:30:42.275 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jul 24 09:30:42.275 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending out EAPOL packet to MAC 3c52.8276.5346
Jul 24 09:30:42.275 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jul 24 09:30:42.278 CET: dot1x-packet: length: 0x0024
Jul 24 09:30:42.278 CET: dot1x-packet:EAP code: 0x1 id: 0xB0 length: 0x0024
Jul 24 09:30:42.278 CET: dot1x-packet: type: 0x19
Jul 24 09:30:42.278 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] EAPOL packet sent to client 0x4500045F
Jul 24 09:30:42.278 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:response request action
Jul 24 09:30:42.292 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] Queuing an EAPOL pkt on Authenticator Q
Jul 24 09:30:42.292 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jul 24 09:30:42.292 CET: dot1x-packet: length: 0x0043
Jul 24 09:30:42.292 CET: dot1x-ev:[Gi2/0/13] Dequeued pkt: Int Gi2/0/13 CODE= 2,TYPE= 25,LEN= 67

Jul 24 09:30:42.292 CET: dot1x-ev:[Gi2/0/13] Received pkt saddr =3c52.8276.5346 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0043
Jul 24 09:30:42.292 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jul 24 09:30:42.292 CET: dot1x-packet: length: 0x0043
Jul 24 09:30:42.292 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAPOL_EAP for 0x4500045F
Jul 24 09:30:42.292 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_request, got event 6(eapolEap)
Jul 24 09:30:42.292 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_request -> auth_bend_response
Jul 24 09:30:42.292 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering response state
Jul 24 09:30:42.292 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Response sent to the server from 0x4500045F
Jul 24 09:30:42.292 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:request response action
Jul 24 09:30:42.303 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAP_REQ for 0x4500045F
Jul 24 09:30:42.303 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_response, got event 7(eapReq)
Jul 24 09:30:42.303 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_response -> auth_bend_request
Jul 24 09:30:42.303 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:exiting response state
Jul 24 09:30:42.303 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering request state
Jul 24 09:30:42.303 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending EAPOL packet
Jul 24 09:30:42.303 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jul 24 09:30:42.303 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending out EAPOL packet to MAC 3c52.8276.5346
Jul 24 09:30:42.303 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jul 24 09:30:42.303 CET: dot1x-packet: length: 0x0040
Jul 24 09:30:42.303 CET: dot1x-packet:EAP code: 0x1 id: 0xB1 length: 0x0040
Jul 24 09:30:42.303 CET: dot1x-packet: type: 0x19
Jul 24 09:30:42.303 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] EAPOL packet sent to client 0x4500045F
Jul 24 09:30:42.303 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:response request action
Jul 24 09:30:42.306 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] Queuing an EAPOL pkt on Authenticator Q
Jul 24 09:30:42.306 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jul 24 09:30:42.306 CET: dot1x-packet: length: 0x0079
Jul 24 09:30:42.306 CET: dot1x-ev:[Gi2/0/13] Dequeued pkt: Int Gi2/0/13 CODE= 2,TYPE= 25,LEN= 121

Jul 24 09:30:42.306 CET: dot1x-ev:[Gi2/0/13] Received pkt saddr =3c52.8276.5346 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0079
Jul 24 09:30:42.306 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jul 24 09:30:42.306 CET: dot1x-packet: length: 0x0079
Jul 24 09:30:42.310 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAPOL_EAP for 0x4500045F
Jul 24 09:30:42.310 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_request, got event 6(eapolEap)
Jul 24 09:30:42.310 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_request -> auth_bend_response
Jul 24 09:30:42.310 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering response state
Jul 24 09:30:42.310 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Response sent to the server from 0x4500045F
Jul 24 09:30:42.310 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:request response action
Jul 24 09:30:42.331 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAP_REQ for 0x4500045F
Jul 24 09:30:42.331 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_response, got event 7(eapReq)
Jul 24 09:30:42.331 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_response -> auth_bend_request
Jul 24 09:30:42.331 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:exiting response state
Jul 24 09:30:42.331 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering request state
Jul 24 09:30:42.331 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending EAPOL packet
Jul 24 09:30:42.331 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jul 24 09:30:42.331 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending out EAPOL packet to MAC 3c52.8276.5346
Jul 24 09:30:42.331 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jul 24 09:30:42.331 CET: dot1x-packet: length: 0x0052
Jul 24 09:30:42.334 CET: dot1x-packet:EAP code: 0x1 id: 0xB2 length: 0x0052
Jul 24 09:30:42.334 CET: dot1x-packet: type: 0x19
Jul 24 09:30:42.334 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] EAPOL packet sent to client 0x4500045F
Jul 24 09:30:42.334 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:response request action
Jul 24 09:30:42.338 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] Queuing an EAPOL pkt on Authenticator Q
Jul 24 09:30:42.338 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jul 24 09:30:42.338 CET: dot1x-packet: length: 0x0025
Jul 24 09:30:42.338 CET: dot1x-ev:[Gi2/0/13] Dequeued pkt: Int Gi2/0/13 CODE= 2,TYPE= 25,LEN= 37

Jul 24 09:30:42.338 CET: dot1x-ev:[Gi2/0/13] Received pkt saddr =3c52.8276.5346 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0025
Jul 24 09:30:42.338 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jul 24 09:30:42.338 CET: dot1x-packet: length: 0x0025
Jul 24 09:30:42.338 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAPOL_EAP for 0x4500045F
Jul 24 09:30:42.338 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_request, got event 6(eapolEap)
Jul 24 09:30:42.338 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_request -> auth_bend_response
Jul 24 09:30:42.338 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering response state
Jul 24 09:30:42.338 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Response sent to the server from 0x4500045F
Jul 24 09:30:42.338 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:request response action
Jul 24 09:30:42.345 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAP_REQ for 0x4500045F
Jul 24 09:30:42.345 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_response, got event 7(eapReq)
Jul 24 09:30:42.348 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_response -> auth_bend_request
Jul 24 09:30:42.348 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:exiting response state
Jul 24 09:30:42.348 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering request state
Jul 24 09:30:42.348 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending EAPOL packet
Jul 24 09:30:42.348 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jul 24 09:30:42.348 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending out EAPOL packet to MAC 3c52.8276.5346
Jul 24 09:30:42.348 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jul 24 09:30:42.348 CET: dot1x-packet: length: 0x002E
Jul 24 09:30:42.348 CET: dot1x-packet:EAP code: 0x1 id: 0xB3 length: 0x002E
Jul 24 09:30:42.348 CET: dot1x-packet: type: 0x19
Jul 24 09:30:42.348 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] EAPOL packet sent to client 0x4500045F
Jul 24 09:30:42.348 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:response request action
Jul 24 09:30:42.404 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] Queuing an EAPOL pkt on Authenticator Q
Jul 24 09:30:42.404 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jul 24 09:30:42.404 CET: dot1x-packet: length: 0x002E
Jul 24 09:30:42.404 CET: dot1x-ev:[Gi2/0/13] Dequeued pkt: Int Gi2/0/13 CODE= 2,TYPE= 25,LEN= 46

Jul 24 09:30:42.404 CET: dot1x-ev:[Gi2/0/13] Received pkt saddr =3c52.8276.5346 , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.002e
Jul 24 09:30:42.404 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jul 24 09:30:42.404 CET: dot1x-packet: length: 0x002E
Jul 24 09:30:42.404 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAPOL_EAP for 0x4500045F
Jul 24 09:30:42.404 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_request, got event 6(eapolEap)
Jul 24 09:30:42.404 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_request -> auth_bend_response
Jul 24 09:30:42.404 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering response state
Jul 24 09:30:42.404 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Response sent to the server from 0x4500045F
Jul 24 09:30:42.404 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:request response action
Jul 24 09:30:42.457 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] Received an EAP Success
Jul 24 09:30:42.460 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAP_SUCCESS for 0x4500045F
Jul 24 09:30:42.460 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_response, got event 11(eapSuccess)
Jul 24 09:30:42.460 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_response -> auth_bend_success
Jul 24 09:30:42.460 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:exiting response state
Jul 24 09:30:42.460 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering success state
Jul 24 09:30:42.460 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:response success action
Jul 24 09:30:42.460 CET: dot1x_auth_bend Gi2/0/13: idle during state auth_bend_success
Jul 24 09:30:42.460 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_success -> auth_bend_idle
Jul 24 09:30:42.460 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering idle state
Jul 24 09:30:42.460 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting AUTH_SUCCESS on Client 0x4500045F
Jul 24 09:30:42.460 CET: dot1x_auth Gi2/0/13: during state auth_authenticating, got event 12(authSuccess_portValid)
Jul 24 09:30:42.460 CET: @@@ dot1x_auth Gi2/0/13: auth_authenticating -> auth_authc_result
Jul 24 09:30:42.460 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:exiting authenticating state
Jul 24 09:30:42.460 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0x4500045F:entering authc result state
Jul 24 09:30:42.460 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] EAP Key data detected adding to attribute list
Jul 24 09:30:42.946 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Processing client delete for hdl 0x4500045F sent by Auth Mgr
Jul 24 09:30:42.946 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] 3c52.8276.5346: sending canned failure due to method termination
Jul 24 09:30:42.946 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending EAPOL packet
Jul 24 09:30:42.946 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jul 24 09:30:42.946 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending out EAPOL packet to MAC 3c52.8276.5346
Jul 24 09:30:42.946 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jul 24 09:30:42.946 CET: dot1x-packet: length: 0x0004
Jul 24 09:30:42.946 CET: dot1x-packet:EAP code: 0x4 id: 0xB3 length: 0x0004
Jul 24 09:30:42.946 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] EAPOL canned status packet sent to client 0x4500045F
Jul 24 09:30:42.946 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Deleting client 0x4500045F (3c52.8276.5346)
Jul 24 09:30:42.960 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Delete auth client (0x4500045F) message
Jul 24 09:30:42.963 CET: dot1x-ev:Auth client ctx destroyed
Jul 24 09:30:42.974 CET: dot1x_auth Gi2/0/13: initial state auth_initialize has enter
Jul 24 09:30:42.974 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0xF5000460: initialising
Jul 24 09:30:42.974 CET: dot1x_auth Gi2/0/13: during state auth_initialize, got event 0(cfg_auto)
Jul 24 09:30:42.974 CET: @@@ dot1x_auth Gi2/0/13: auth_initialize -> auth_disconnected
Jul 24 09:30:42.974 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0xF5000460: disconnected
Jul 24 09:30:42.974 CET: dot1x_auth Gi2/0/13: idle during state auth_disconnected
Jul 24 09:30:42.974 CET: @@@ dot1x_auth Gi2/0/13: auth_disconnected -> auth_restart
Jul 24 09:30:42.974 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0xF5000460: entering restart
Jul 24 09:30:42.974 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending create new context event to EAP for 0xF5000460 (3c52.8276.5346)
Jul 24 09:30:42.977 CET: dot1x_auth_bend Gi2/0/13: initial state auth_bend_initialize has enter
Jul 24 09:30:42.977 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0xF5000460: entering init state
Jul 24 09:30:42.977 CET: dot1x_auth_bend Gi2/0/13: initial state auth_bend_initialize has idle
Jul 24 09:30:42.977 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_initialize, got event 16383(idle)
Jul 24 09:30:42.977 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_initialize -> auth_bend_idle
Jul 24 09:30:42.977 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0xF5000460:entering idle state
Jul 24 09:30:42.977 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Created a client entry (0xF5000460)
Jul 24 09:30:42.977 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Dot1x authentication started for 0xF5000460 (3c52.8276.5346)
Jul 24 09:30:42.977 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting !EAP_RESTART on Client 0xF5000460
Jul 24 09:30:42.977 CET: dot1x_auth Gi2/0/13: during state auth_restart, got event 6(no_eapRestart)
Jul 24 09:30:42.977 CET: @@@ dot1x_auth Gi2/0/13: auth_restart -> auth_connecting
Jul 24 09:30:42.977 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0xF5000460:enter connecting state
Jul 24 09:30:42.977 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0xF5000460: restart connecting
Jul 24 09:30:42.977 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting RX_REQ on Client 0xF5000460
Jul 24 09:30:42.977 CET: dot1x_auth Gi2/0/13: during state auth_connecting, got event 10(eapReq_no_reAuthMax)
Jul 24 09:30:42.981 CET: @@@ dot1x_auth Gi2/0/13: auth_connecting -> auth_authenticating
Jul 24 09:30:42.981 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0xF5000460: authenticating state entered
Jul 24 09:30:42.981 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0xF5000460:connecting authenticating action
Jul 24 09:30:42.981 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting AUTH_START for 0xF5000460
Jul 24 09:30:42.981 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_idle, got event 4(eapReq_authStart)
Jul 24 09:30:42.981 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_idle -> auth_bend_request
Jul 24 09:30:42.981 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0xF5000460:entering request state
Jul 24 09:30:42.981 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending EAPOL packet
Jul 24 09:30:42.981 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jul 24 09:30:42.981 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending out EAPOL packet to MAC 3c52.8276.5346
Jul 24 09:30:42.981 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jul 24 09:30:42.981 CET: dot1x-packet: length: 0x0005
Jul 24 09:30:42.981 CET: dot1x-packet:EAP code: 0x1 id: 0x1 length: 0x0005
Jul 24 09:30:42.981 CET: dot1x-packet: type: 0x1
Jul 24 09:30:42.981 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] EAPOL packet sent to client 0xF5000460
Jul 24 09:30:42.981 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0xF5000460:idle request action
Jul 24 09:30:44.054 CET: %LINK-3-UPDOWN: Interface GigabitEthernet2/0/13, changed state to up
Jul 24 09:30:45.141 CET: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet2/0/13, changed state to up
Jul 24 09:30:48.248 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAP_REQ for 0xF5000460
Jul 24 09:30:48.248 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_request, got event 7(eapReq)
Jul 24 09:30:48.248 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_request -> auth_bend_request
Jul 24 09:30:48.248 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0xF5000460:request request action
Jul 24 09:30:48.248 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0xF5000460:entering request state
Jul 24 09:30:48.248 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending EAPOL packet
Jul 24 09:30:48.248 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jul 24 09:30:48.252 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending out EAPOL packet to MAC 3c52.8276.5346
Jul 24 09:30:48.252 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jul 24 09:30:48.252 CET: dot1x-packet: length: 0x0005
Jul 24 09:30:48.252 CET: dot1x-packet:EAP code: 0x1 id: 0x1 length: 0x0005
Jul 24 09:30:48.252 CET: dot1x-packet: type: 0x1
Jul 24 09:30:48.252 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] EAPOL packet sent to client 0xF5000460
Jul 24 09:30:53.380 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAP_REQ for 0xF5000460
Jul 24 09:30:53.380 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_request, got event 7(eapReq)
Jul 24 09:30:53.380 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_request -> auth_bend_request
Jul 24 09:30:53.380 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0xF5000460:request request action
Jul 24 09:30:53.380 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0xF5000460:entering request state
Jul 24 09:30:53.380 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending EAPOL packet
Jul 24 09:30:53.380 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jul 24 09:30:53.380 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending out EAPOL packet to MAC 3c52.8276.5346
Jul 24 09:30:53.380 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jul 24 09:30:53.380 CET: dot1x-packet: length: 0x0005
Jul 24 09:30:53.380 CET: dot1x-packet:EAP code: 0x1 id: 0x1 length: 0x0005
Jul 24 09:30:53.380 CET: dot1x-packet: type: 0x1
Jul 24 09:30:53.380 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] EAPOL packet sent to client 0xF5000460
Jul 24 09:30:58.532 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Received an EAP Timeout
Jul 24 09:30:58.532 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting EAP_TIMEOUT for 0xF5000460
Jul 24 09:30:58.532 CET: dot1x_auth_bend Gi2/0/13: during state auth_bend_request, got event 12(eapTimeout)
Jul 24 09:30:58.532 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_request -> auth_bend_timeout
Jul 24 09:30:58.532 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0xF5000460:entering timeout state
Jul 24 09:30:58.532 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0xF5000460:request timeout action
Jul 24 09:30:58.532 CET: dot1x_auth_bend Gi2/0/13: idle during state auth_bend_timeout
Jul 24 09:30:58.532 CET: @@@ dot1x_auth_bend Gi2/0/13: auth_bend_timeout -> auth_bend_idle
Jul 24 09:30:58.535 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0xF5000460:entering idle state
Jul 24 09:30:58.535 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] Posting AUTH_TIMEOUT on Client 0xF5000460
Jul 24 09:30:58.535 CET: dot1x_auth Gi2/0/13: during state auth_authenticating, got event 14(authTimeout)
Jul 24 09:30:58.535 CET: @@@ dot1x_auth Gi2/0/13: auth_authenticating -> auth_authc_result
Jul 24 09:30:58.535 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0xF5000460:exiting authenticating state
Jul 24 09:30:58.535 CET: dot1x-sm:[3c52.8276.5346, Gi2/0/13] 0xF5000460:entering authc result state
Jul 24 09:30:58.535 CET: %DOT1X-5-FAIL: Authentication failed for client (3c52.8276.5346) on Interface Gi2/0/13 AuditSessionID 0AA564060000074173DF59E4
Jul 24 09:30:58.535 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] Dot1x did not receive any key data
Jul 24 09:30:58.535 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Processing client delete for hdl 0xF5000460 sent by Auth Mgr
Jul 24 09:30:58.535 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] 3c52.8276.5346: sending canned failure due to method termination
Jul 24 09:30:58.535 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending EAPOL packet
Jul 24 09:30:58.535 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jul 24 09:30:58.535 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Sending out EAPOL packet to MAC 3c52.8276.5346
Jul 24 09:30:58.535 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jul 24 09:30:58.535 CET: dot1x-packet: length: 0x0004
Jul 24 09:30:58.535 CET: dot1x-packet:EAP code: 0x4 id: 0x1 length: 0x0004
Jul 24 09:30:58.535 CET: dot1x-packet:[3c52.8276.5346, Gi2/0/13] EAPOL canned status packet sent to client 0xF5000460
Jul 24 09:30:58.535 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Deleting client 0xF5000460 (3c52.8276.5346)
Jul 24 09:30:58.539 CET: dot1x-ev:[3c52.8276.5346, Gi2/0/13] Delete auth client (0xF5000460) message
Jul 24 09:30:58.539 CET: dot1x-ev:Auth client ctx destroyed
Jul 24 09:30:58.556 CET: %MAB-5-FAIL: Authentication failed for client (3c52.8276.5346) on Interface Gi2/0/13 AuditSessionID 0AA564060000074173DF59E4

 

interface GigabitEthernet2/0/13
switchport access vlan 410
switchport mode access
switchport voice vlan 362
srr-queue bandwidth share 5 80 5 10
priority-queue out
authentication control-direction in
authentication event fail action next-method
authentication event server dead action authorize voice
authentication event server alive action reinitialize
authentication host-mode multi-auth
authentication open
authentication order dot1x mab webauth
authentication priority dot1x mab webauth
authentication port-control auto
authentication periodic
authentication timer reauthenticate server
authentication timer restart 3600
authentication timer inactivity 180
authentication violation restrict
mab
no snmp trap link-status
mls qos trust dscp
dot1x pae authenticator
dot1x timeout tx-period 5
storm-control broadcast level pps 500 300
storm-control multicast level pps 500 300
storm-control action shutdown
spanning-tree portfast edge
spanning-tree bpduguard enable
end

 

 

 

 

3 Replies 3

thomas
Cisco Employee
Cisco Employee

You may NOT use port security with 802.1X.

You must disable port security to use 802.1X and vice-versa.

This is called out in the ISE Secure Wired Access Prescriptive Deployment Guide if you search on "port security" in the doc.

THX for your answer but as you can see i don´t use Port-Sec on the Port

 

interface GigabitEthernet2/0/13
switchport access vlan 410
switchport mode access
switchport voice vlan 362
srr-queue bandwidth share 5 80 5 10
priority-queue out
authentication control-direction in
authentication event fail action next-method
authentication event server dead action authorize voice
authentication event server alive action reinitialize
authentication host-mode multi-auth
authentication open
authentication order dot1x mab webauth
authentication priority dot1x mab webauth
authentication port-control auto
authentication periodic
authentication timer reauthenticate server
authentication timer restart 3600
authentication timer inactivity 180
authentication violation restrict
mab
no snmp trap link-status
mls qos trust dscp
dot1x pae authenticator
dot1x timeout tx-period 5
storm-control broadcast level pps 500 300
storm-control multicast level pps 500 300
storm-control action shutdown
spanning-tree portfast edge
spanning-tree bpduguard enable
end

 

nunw-01-01-006#show port-security interface gi 2/0/13
Port Security              : Disabled
Port Status                : Secure-down
Violation Mode             : Shutdown
Aging Time                 : 0 mins
Aging Type                 : Absolute
SecureStatic Address Aging : Disabled
Maximum MAC Addresses      : 1
Total MAC Addresses        : 0
Configured MAC Addresses   : 0
Sticky MAC Addresses       : 0
Last Source Address:Vlan   : 0000.0000.0000:0
Security Violation Count   : 0

 

Regards Mario

MarioLieb
Level 1
Level 1

One side note from me point. I made some test´s if I remove spanning-tree portfast edge from the port the authentication works.

BUT this is not a solutions it´s a … workaround. Any good idea ?