01-29-2019 08:59 AM - edited 03-08-2019 05:11 PM
Hello Community,
I was wondering if you could enlighten me in any way about a weird behavior that do not allow me to authenticate users nor computers on a new switch stack.
The environment is a 2960x five member stack pile running IOS 15.2(4)E6 universal in legacy dot1x config-mode
Switch Ports Model SW Version SW Image ------ ----- ----- ---------- ---------- * 1 52 WS-C2960X-48LPD-L 15.2(4)E6 C2960X-UNIVERSALK9-M 2 52 WS-C2960X-48LPD-L 15.2(4)E6 C2960X-UNIVERSALK9-M 3 52 WS-C2960X-48LPD-L 15.2(4)E6 C2960X-UNIVERSALK9-M 4 52 WS-C2960X-48LPD-L 15.2(4)E6 C2960X-UNIVERSALK9-M 5 52 WS-C2960X-48LPD-L 15.2(4)E6 C2960X-UNIVERSALK9-M Switch#authentication display config-mode Current configuration mode is legacy
I set the very same config as other stacks or stand alone switches. Also I am running another 5 members stack that went from legacy-mode to new-style with that same config.
I could not authenticate any computers while it stucks Unauthenticated
Switch#show authentication sessions Interface MAC Address Method Domain Status Fg Session ID Gi2/0/36 0022.6812.3f6c dot1x DATA Unauth 0A10400D000000304188BAA0 Session count = 1
If I ask for some details I see that there is a Policy applied to the port and a service template.
Switch#show authentication sessions int Gi2/0/36 det Interface: GigabitEthernet2/0/36 MAC Address: 0022.6812.3f6c IPv6 Address: Unknown IPv4 Address: Unknown User-Name: DOMAIN\USERNAME Status: Unauthorized Domain: DATA Oper host mode: multi-domain Oper control dir: in Session timeout: N/A Restart timeout: N/A Periodic Acct timeout: N/A Common Session ID: 0A10400D000000304188BAA0 Acct Session ID: Unknown Handle: 0x03000017 Current Policy: POLICY_Gi2/0/36 Local Policies: Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150) Method status list: Method State dot1x Authc Success mab Stopped
However I did not configure any of them while setting a LEGACY mode config.
Switch#show policy-map POLICY_Gi2/0/36 Switch#show template DEFAULT_LINKSEC_POLICY_SHOULD_SECURE Template Class Type -------- ----- ---- No Template named DEFAULT_LINKSEC_POLICY_SHOULD_SECURE Switch#show run interface Gi2/0/36 interface GigabitEthernet2/0/36 description Plug 90: Regular - Regular User switchport access vlan 999 switchport mode access switchport voice vlan 3 switchport port-security maximum 2 switchport port-security violation restrict switchport port-security aging time 2 switchport port-security aging type inactivity power inline never srr-queue bandwidth share 1 30 35 5 priority-queue out authentication control-direction in authentication event fail action next-method authentication event server dead action authorize vlan 4 authentication event server dead action authorize voice authentication event server alive action reinitialize authentication host-mode multi-domain authentication port-control auto authentication periodic authentication timer reauthenticate server authentication timer inactivity server dynamic authentication violation restrict mab mls qos trust device cisco-phone mls qos trust cos macro description cisco-phone dot1x pae authenticator dot1x timeout tx-period 10 auto qos voip cisco-phone spanning-tree portfast edge spanning-tree bpduguard enable service-policy input AUTOQOS-SRND4-CISCOPHONE-POLICY end
My test computer is authenticating correctly in any other switches (stacked or not) in closed mode.
a "debug dot1x any" shows this
Switch#clear authentication sessi int gi2/0/36 Jan 29 17:35:48.900 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Processing client delete for hdl 0x74000018 sent by Auth Mgr Jan 29 17:35:48.903 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Deleting client 0x74000018 (0022.6812.3f6c) Jan 29 17:35:48.903 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Delete auth client (0x74000018) message Jan 29 17:35:48.907 CET: dot1x-ev:Auth client ctx destroyed Jan 29 17:36:07.733 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] queuing an EAPOL pkt on Auth Q Jan 29 17:36:07.733 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x1 Jan 29 17:36:07.733 CET: dot1x-packet: length: 0x0000 Jan 29 17:36:07.733 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 0,TYPE= 0,LEN= 0 Jan 29 17:36:07.733 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0101.0000 Jan 29 17:36:07.733 CET: dot1x-ev:[Gi2/0/36] Couldn't find the supplicant in the list Jan 29 17:36:07.733 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] New client detected, sending session start event for 0022.6812.3f6c Jan 29 17:36:07.736 CET: dot1x-ev:AAA auth ready returns Unknown error 0, result = TRUE Jan 29 17:36:07.736 CET: dot1x_auth Gi2/0/36: initial state auth_initialize has enter Jan 29 17:36:07.736 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019: initialising Jan 29 17:36:07.736 CET: dot1x_auth Gi2/0/36: during state auth_initialize, got event 0(cfg_auto) Jan 29 17:36:07.736 CET: @@@ dot1x_auth Gi2/0/36: auth_initialize -> auth_disconnected Jan 29 17:36:07.736 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019: disconnected Jan 29 17:36:07.736 CET: dot1x_auth Gi2/0/36: idle during state auth_disconnected Jan 29 17:36:07.736 CET: @@@ dot1x_auth Gi2/0/36: auth_disconnected -> auth_restart Jan 29 17:36:07.736 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019: entering restart Jan 29 17:36:07.736 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending create new context event to EAP for 0x27000019 (0022.6812.3f6c) Jan 29 17:36:07.736 CET: dot1x_auth_bend Gi2/0/36: initial state auth_bend_initialize has enter Jan 29 17:36:07.736 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019: entering init state Jan 29 17:36:07.740 CET: dot1x_auth_bend Gi2/0/36: initial state auth_bend_initialize has idle Jan 29 17:36:07.740 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_initialize, got event 16383(idle) Jan 29 17:36:07.740 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_initialize -> auth_bend_idle Jan 29 17:36:07.740 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering idle state Jan 29 17:36:07.740 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Created a client entry (0x27000019) Jan 29 17:36:07.740 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Dot1x authentication started for 0x27000019 (0022.6812.3f6c) Jan 29 17:36:07.740 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting !EAP_RESTART on Client 0x27000019 Jan 29 17:36:07.740 CET: dot1x_auth Gi2/0/36: during state auth_restart, got event 6(no_eapRestart) Jan 29 17:36:07.740 CET: @@@ dot1x_auth Gi2/0/36: auth_restart -> auth_connecting Jan 29 17:36:07.740 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:enter connecting state Jan 29 17:36:07.740 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019: restart connecting Jan 29 17:36:07.740 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting RX_REQ on Client 0x27000019 Jan 29 17:36:07.740 CET: dot1x_auth Gi2/0/36: during state auth_connecting, got event 10(eapReq_no_reAuthMax) Jan 29 17:36:07.740 CET: @@@ dot1x_auth Gi2/0/36: auth_connecting -> auth_authenticating Jan 29 17:36:07.740 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019: authenticating state entered Jan 29 17:36:07.740 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:connecting authenticating action Jan 29 17:36:07.743 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting AUTH_START for 0x27000019 Jan 29 17:36:07.743 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_idle, got event 4(eapReq_authStart) Jan 29 17:36:07.743 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_idle -> auth_bend_request Jan 29 17:36:07.743 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering request state Jan 29 17:36:07.743 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet Jan 29 17:36:07.743 CET: dot1x-registry:registry:dot1x_ether_macaddr called Jan 29 17:36:07.743 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c Jan 29 17:36:07.743 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0 Jan 29 17:36:07.743 CET: dot1x-packet: length: 0x0005 Jan 29 17:36:07.743 CET: dot1x-packet:EAP code: 0x1 id: 0x1 length: 0x0005 Jan 29 17:36:07.743 CET: dot1x-packet: type: 0x1 Jan 29 17:36:07.743 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL packet sent to client 0x27000019 Jan 29 17:36:07.743 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:idle request action Jan 29 17:36:07.799 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Queuing an EAPOL pkt on Authenticator Q Jan 29 17:36:07.803 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0 Jan 29 17:36:07.803 CET: dot1x-packet: length: 0x0014 Jan 29 17:36:07.803 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 2,TYPE= 1,LEN= 20 Jan 29 17:36:07.803 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0014 Jan 29 17:36:07.803 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0 Jan 29 17:36:07.803 CET: dot1x-packet: length: 0x0014 Jan 29 17:36:07.803 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_EAP for 0x27000019 Jan 29 17:36:07.803 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_request, got event 6(eapolEap) Jan 29 17:36:07.803 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_request -> auth_bend_response Jan 29 17:36:07.803 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering response state Jan 29 17:36:07.803 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Response sent to the server from 0x27000019 Jan 29 17:36:07.803 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:request response action Jan 29 17:36:07.845 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAP_REQ for 0x27000019 Jan 29 17:36:07.845 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_response, got event 7(eapReq) Jan 29 17:36:07.845 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_response -> auth_bend_request Jan 29 17:36:07.848 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting response state Jan 29 17:36:07.848 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering request state Jan 29 17:36:07.848 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet Jan 29 17:36:07.848 CET: dot1x-registry:registry:dot1x_ether_macaddr called Jan 29 17:36:07.848 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c Jan 29 17:36:07.848 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0 Jan 29 17:36:07.848 CET: dot1x-packet: length: 0x0006 Jan 29 17:36:07.848 CET: dot1x-packet:EAP code: 0x1 id: 0xE5 length: 0x0006 Jan 29 17:36:07.848 CET: dot1x-packet: type: 0xD Jan 29 17:36:07.848 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL packet sent to client 0x27000019 Jan 29 17:36:07.848 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:response request action Jan 29 17:36:07.859 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Queuing an EAPOL pkt on Authenticator Q Jan 29 17:36:07.859 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0 Jan 29 17:36:07.859 CET: dot1x-packet: length: 0x0006 Jan 29 17:36:07.859 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 2,TYPE= 3,LEN= 6 Jan 29 17:36:07.859 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0006 Jan 29 17:36:07.859 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0 Jan 29 17:36:07.859 CET: dot1x-packet: length: 0x0006 Jan 29 17:36:07.859 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_EAP for 0x27000019 Jan 29 17:36:07.859 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_request, got event 6(eapolEap) Jan 29 17:36:07.859 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_request -> auth_bend_response Jan 29 17:36:07.859 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering response state Jan 29 17:36:07.859 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Response sent to the server from 0x27000019 Jan 29 17:36:07.859 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:request response action Jan 29 17:36:07.915 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAP_REQ for 0x27000019 Jan 29 17:36:07.918 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_response, got event 7(eapReq) Jan 29 17:36:07.918 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_response -> auth_bend_request Jan 29 17:36:07.918 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting response state Jan 29 17:36:07.918 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering request state Jan 29 17:36:07.918 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet Jan 29 17:36:07.918 CET: dot1x-registry:registry:dot1x_ether_macaddr called Jan 29 17:36:07.918 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c Jan 29 17:36:07.918 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0 Jan 29 17:36:07.918 CET: dot1x-packet: length: 0x0006 Jan 29 17:36:07.918 CET: dot1x-packet:EAP code: 0x1 id: 0xE6 length: 0x0006 Jan 29 17:36:07.918 CET: dot1x-packet: type: 0x19 Jan 29 17:36:07.918 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL packet sent to client 0x27000019 Jan 29 17:36:07.918 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:response request action Jan 29 17:36:07.943 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Queuing an EAPOL pkt on Authenticator Q Jan 29 17:36:07.943 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0 Jan 29 17:36:07.943 CET: dot1x-packet: length: 0x006D Jan 29 17:36:07.943 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 2,TYPE= 25,LEN= 109 Jan 29 17:36:07.943 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.006d Jan 29 17:36:07.943 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0 Jan 29 17:36:07.946 CET: dot1x-packet: length: 0x006D Jan 29 17:36:07.946 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_EAP for 0x27000019 Jan 29 17:36:07.946 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_request, got event 6(eapolEap) Jan 29 17:36:07.946 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_request -> auth_bend_response Jan 29 17:36:07.946 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering response state Jan 29 17:36:07.946 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Response sent to the server from 0x27000019 Jan 29 17:36:07.946 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:request response action Jan 29 17:36:08.002 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAP_REQ for 0x27000019 Jan 29 17:36:08.002 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_response, got event 7(eapReq) Jan 29 17:36:08.002 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_response -> auth_bend_request Jan 29 17:36:08.002 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting response state Jan 29 17:36:08.002 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering request state Jan 29 17:36:08.002 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet Jan 29 17:36:08.002 CET: dot1x-registry:registry:dot1x_ether_macaddr called Jan 29 17:36:08.002 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c Jan 29 17:36:08.002 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0 Jan 29 17:36:08.002 CET: dot1x-packet: length: 0x03F4 Jan 29 17:36:08.002 CET: dot1x-packet:EAP code: 0x1 id: 0xE7 length: 0x03F4 Jan 29 17:36:08.002 CET: dot1x-packet: type: 0x19 Jan 29 17:36:08.005 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL packet sent to client 0x27000019 Jan 29 17:36:08.005 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:response request action Jan 29 17:36:08.005 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Queuing an EAPOL pkt on Authenticator Q Jan 29 17:36:08.005 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0 Jan 29 17:36:08.005 CET: dot1x-packet: length: 0x0006 Jan 29 17:36:08.005 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 2,TYPE= 25,LEN= 6 Jan 29 17:36:08.005 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0006 Jan 29 17:36:08.005 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0 Jan 29 17:36:08.005 CET: dot1x-packet: length: 0x0006 Jan 29 17:36:08.005 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_EAP for 0x27000019 Jan 29 17:36:08.005 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_request, got event 6(eapolEap) Jan 29 17:36:08.005 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_request -> auth_bend_response Jan 29 17:36:08.005 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering response state Jan 29 17:36:08.005 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Response sent to the server from 0x27000019 Jan 29 17:36:08.005 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:request response action Jan 29 17:36:08.065 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAP_REQ for 0x27000019 Jan 29 17:36:08.065 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_response, got event 7(eapReq) Jan 29 17:36:08.065 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_response -> auth_bend_request Jan 29 17:36:08.065 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting response state Jan 29 17:36:08.065 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering request state Jan 29 17:36:08.065 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet Jan 29 17:36:08.065 CET: dot1x-registry:registry:dot1x_ether_macaddr called Jan 29 17:36:08.068 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c Jan 29 17:36:08.068 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0 Jan 29 17:36:08.068 CET: dot1x-packet: length: 0x03F0 Jan 29 17:36:08.068 CET: dot1x-packet:EAP code: 0x1 id: 0xE8 length: 0x03F0 Jan 29 17:36:08.068 CET: dot1x-packet: type: 0x19 Jan 29 17:36:08.068 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL packet sent to client 0x27000019 Jan 29 17:36:08.068 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:response request action Jan 29 17:36:08.075 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Queuing an EAPOL pkt on Authenticator Q Jan 29 17:36:08.075 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0 Jan 29 17:36:08.075 CET: dot1x-packet: length: 0x0006 Jan 29 17:36:08.075 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 2,TYPE= 25,LEN= 6 Jan 29 17:36:08.075 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0006 Jan 29 17:36:08.075 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0 Jan 29 17:36:08.075 CET: dot1x-packet: length: 0x0006 Jan 29 17:36:08.075 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_EAP for 0x27000019 Jan 29 17:36:08.075 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_request, got event 6(eapolEap) Jan 29 17:36:08.079 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_request -> auth_bend_response Jan 29 17:36:08.079 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering response state Jan 29 17:36:08.079 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Response sent to the server from 0x27000019 Jan 29 17:36:08.079 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:request response action Jan 29 17:36:08.142 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAP_REQ for 0x27000019 Jan 29 17:36:08.142 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_response, got event 7(eapReq) Jan 29 17:36:08.142 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_response -> auth_bend_request Jan 29 17:36:08.142 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting response state Jan 29 17:36:08.142 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering request state Jan 29 17:36:08.142 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet Jan 29 17:36:08.142 CET: dot1x-registry:registry:dot1x_ether_macaddr called Jan 29 17:36:08.142 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c Jan 29 17:36:08.142 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0 Jan 29 17:36:08.142 CET: dot1x-packet: length: 0x03C3 Jan 29 17:36:08.142 CET: dot1x-packet:EAP code: 0x1 id: 0xE9 length: 0x03C3 Jan 29 17:36:08.142 CET: dot1x-packet: type: 0x19 Jan 29 17:36:08.142 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL packet sent to client 0x27000019 Jan 29 17:36:08.142 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:response request action Jan 29 17:36:08.163 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Queuing an EAPOL pkt on Authenticator Q Jan 29 17:36:08.163 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0 Jan 29 17:36:08.163 CET: dot1x-packet: length: 0x0150 Jan 29 17:36:08.163 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 2,TYPE= 25,LEN= 336 Jan 29 17:36:08.166 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0150 Jan 29 17:36:08.166 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0 Jan 29 17:36:08.166 CET: dot1x-packet: length: 0x0150 Jan 29 17:36:08.166 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_EAP for 0x27000019 Jan 29 17:36:08.166 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_request, got event 6(eapolEap) Jan 29 17:36:08.166 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_request -> auth_bend_response Jan 29 17:36:08.166 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering response state Jan 29 17:36:08.166 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Response sent to the server from 0x27000019 Jan 29 17:36:08.166 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:request response action Jan 29 17:36:08.212 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAP_REQ for 0x27000019 Jan 29 17:36:08.212 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_response, got event 7(eapReq) Jan 29 17:36:08.212 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_response -> auth_bend_request Jan 29 17:36:08.212 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting response state Jan 29 17:36:08.212 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering request state Jan 29 17:36:08.212 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet Jan 29 17:36:08.212 CET: dot1x-registry:registry:dot1x_ether_macaddr called Jan 29 17:36:08.212 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c Jan 29 17:36:08.212 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0 Jan 29 17:36:08.212 CET: dot1x-packet: length: 0x0041 Jan 29 17:36:08.212 CET: dot1x-packet:EAP code: 0x1 id: 0xEA length: 0x0041 Jan 29 17:36:08.212 CET: dot1x-packet: type: 0x19 Jan 29 17:36:08.212 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL packet sent to client 0x27000019 Jan 29 17:36:08.212 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:response request action Jan 29 17:36:08.247 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Queuing an EAPOL pkt on Authenticator Q Jan 29 17:36:08.247 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0 Jan 29 17:36:08.247 CET: dot1x-packet: length: 0x0006 Jan 29 17:36:08.247 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 2,TYPE= 25,LEN= 6 Jan 29 17:36:08.247 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0006 Jan 29 17:36:08.247 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0 Jan 29 17:36:08.247 CET: dot1x-packet: length: 0x0006 Jan 29 17:36:08.250 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_EAP for 0x27000019 Jan 29 17:36:08.250 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_request, got event 6(eapolEap) Jan 29 17:36:08.250 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_request -> auth_bend_response Jan 29 17:36:08.250 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering response state Jan 29 17:36:08.250 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Response sent to the server from 0x27000019 Jan 29 17:36:08.250 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:request response action Jan 29 17:36:08.320 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAP_REQ for 0x27000019 Jan 29 17:36:08.320 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_response, got event 7(eapReq) Jan 29 17:36:08.320 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_response -> auth_bend_request Jan 29 17:36:08.320 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting response state Jan 29 17:36:08.320 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering request state Jan 29 17:36:08.320 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet Jan 29 17:36:08.320 CET: dot1x-registry:registry:dot1x_ether_macaddr called Jan 29 17:36:08.320 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c Jan 29 17:36:08.320 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0 Jan 29 17:36:08.320 CET: dot1x-packet: length: 0x002B Jan 29 17:36:08.320 CET: dot1x-packet:EAP code: 0x1 id: 0xEB length: 0x002B Jan 29 17:36:08.320 CET: dot1x-packet: type: 0x19 Jan 29 17:36:08.320 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL packet sent to client 0x27000019 Jan 29 17:36:08.320 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:response request action Jan 29 17:36:08.337 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Queuing an EAPOL pkt on Authenticator Q Jan 29 17:36:08.337 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0 Jan 29 17:36:08.341 CET: dot1x-packet: length: 0x003B Jan 29 17:36:08.341 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 2,TYPE= 25,LEN= 59 Jan 29 17:36:08.341 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.003b Jan 29 17:36:08.341 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0 Jan 29 17:36:08.341 CET: dot1x-packet: length: 0x003B Jan 29 17:36:08.341 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_EAP for 0x27000019 Jan 29 17:36:08.341 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_request, got event 6(eapolEap) Jan 29 17:36:08.341 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_request -> auth_bend_response Jan 29 17:36:08.341 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering response state Jan 29 17:36:08.341 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Response sent to the server from 0x27000019 Jan 29 17:36:08.341 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:request response action Jan 29 17:36:08.362 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAP_REQ for 0x27000019 Jan 29 17:36:08.362 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_response, got event 7(eapReq) Jan 29 17:36:08.362 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_response -> auth_bend_request Jan 29 17:36:08.362 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting response state Jan 29 17:36:08.362 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering request state Jan 29 17:36:08.362 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet Jan 29 17:36:08.362 CET: dot1x-registry:registry:dot1x_ether_macaddr called Jan 29 17:36:08.362 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c Jan 29 17:36:08.362 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0 Jan 29 17:36:08.362 CET: dot1x-packet: length: 0x004B Jan 29 17:36:08.362 CET: dot1x-packet:EAP code: 0x1 id: 0xEC length: 0x004B Jan 29 17:36:08.362 CET: dot1x-packet: type: 0x19 Jan 29 17:36:08.362 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL packet sent to client 0x27000019 Jan 29 17:36:08.362 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:response request action Jan 29 17:36:08.376 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Queuing an EAPOL pkt on Authenticator Q Jan 29 17:36:08.376 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0 Jan 29 17:36:08.376 CET: dot1x-packet: length: 0x006B Jan 29 17:36:08.376 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 2,TYPE= 25,LEN= 107 Jan 29 17:36:08.376 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.006b Jan 29 17:36:08.376 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0 Jan 29 17:36:08.376 CET: dot1x-packet: length: 0x006B Jan 29 17:36:08.376 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_EAP for 0x27000019 Jan 29 17:36:08.376 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_request, got event 6(eapolEap) Jan 29 17:36:08.376 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_request -> auth_bend_response Jan 29 17:36:08.376 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering response state Jan 29 17:36:08.376 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Response sent to the server from 0x27000019 Jan 29 17:36:08.376 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:request response action Jan 29 17:36:08.481 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAP_REQ for 0x27000019 Jan 29 17:36:08.481 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_response, got event 7(eapReq) Jan 29 17:36:08.481 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_response -> auth_bend_request Jan 29 17:36:08.481 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting response state Jan 29 17:36:08.481 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering request state Jan 29 17:36:08.481 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet Jan 29 17:36:08.481 CET: dot1x-registry:registry:dot1x_ether_macaddr called Jan 29 17:36:08.481 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c Jan 29 17:36:08.481 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0 Jan 29 17:36:08.481 CET: dot1x-packet: length: 0x005B Jan 29 17:36:08.481 CET: dot1x-packet:EAP code: 0x1 id: 0xED length: 0x005B Jan 29 17:36:08.481 CET: dot1x-packet: type: 0x19 Jan 29 17:36:08.481 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL packet sent to client 0x27000019 Jan 29 17:36:08.481 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:response request action Jan 29 17:36:08.519 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Queuing an EAPOL pkt on Authenticator Q Jan 29 17:36:08.519 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0 Jan 29 17:36:08.519 CET: dot1x-packet: length: 0x002B Jan 29 17:36:08.519 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 2,TYPE= 25,LEN= 43 Jan 29 17:36:08.519 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.002b Jan 29 17:36:08.519 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0 Jan 29 17:36:08.519 CET: dot1x-packet: length: 0x002B Jan 29 17:36:08.519 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_EAP for 0x27000019 Jan 29 17:36:08.519 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_request, got event 6(eapolEap) Jan 29 17:36:08.519 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_request -> auth_bend_response Jan 29 17:36:08.519 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering response state Jan 29 17:36:08.519 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Response sent to the server from 0x27000019 Jan 29 17:36:08.519 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:request response action Jan 29 17:36:08.568 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAP_REQ for 0x27000019 Jan 29 17:36:08.568 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_response, got event 7(eapReq) Jan 29 17:36:08.568 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_response -> auth_bend_request Jan 29 17:36:08.568 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting response state Jan 29 17:36:08.568 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering request state Jan 29 17:36:08.568 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet Jan 29 17:36:08.568 CET: dot1x-registry:registry:dot1x_ether_macaddr called Jan 29 17:36:08.568 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c Jan 29 17:36:08.568 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0 Jan 29 17:36:08.568 CET: dot1x-packet: length: 0x002B Jan 29 17:36:08.568 CET: dot1x-packet:EAP code: 0x1 id: 0xEE length: 0x002B Jan 29 17:36:08.568 CET: dot1x-packet: type: 0x19 Jan 29 17:36:08.568 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL packet sent to client 0x27000019 Jan 29 17:36:08.568 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:response request action Jan 29 17:36:08.582 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Queuing an EAPOL pkt on Authenticator Q Jan 29 17:36:08.582 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0 Jan 29 17:36:08.582 CET: dot1x-packet: length: 0x002B Jan 29 17:36:08.582 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 2,TYPE= 25,LEN= 43 Jan 29 17:36:08.582 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.002b Jan 29 17:36:08.582 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0 Jan 29 17:36:08.582 CET: dot1x-packet: length: 0x002B Jan 29 17:36:08.582 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_EAP for 0x27000019 Jan 29 17:36:08.582 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_request, got event 6(eapolEap) Jan 29 17:36:08.582 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_request -> auth_bend_response Jan 29 17:36:08.582 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering response state Jan 29 17:36:08.582 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Response sent to the server from 0x27000019 Jan 29 17:36:08.582 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:request response action Jan 29 17:36:08.718 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Received an EAP Success Jan 29 17:36:08.718 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAP_SUCCESS for 0x27000019 Jan 29 17:36:08.718 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_response, got event 11(eapSuccess) Jan 29 17:36:08.718 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_response -> auth_bend_success Jan 29 17:36:08.718 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting response state Jan 29 17:36:08.718 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering success state Jan 29 17:36:08.718 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:response success action Jan 29 17:36:08.718 CET: dot1x_auth_bend Gi2/0/36: idle during state auth_bend_success Jan 29 17:36:08.718 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_success -> auth_bend_idle Jan 29 17:36:08.718 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering idle state Jan 29 17:36:08.722 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting AUTH_SUCCESS on Client 0x27000019 Jan 29 17:36:08.722 CET: dot1x_auth Gi2/0/36: during state auth_authenticating, got event 12(authSuccess_portValid) Jan 29 17:36:08.722 CET: @@@ dot1x_auth Gi2/0/36: auth_authenticating -> auth_authc_result Jan 29 17:36:08.722 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting authenticating state Jan 29 17:36:08.722 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering authc result state Jan 29 17:36:08.722 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAP Key data detected adding to attribute list Jan 29 17:36:08.722 CET: %DOT1X_SWITCH-5-ERR_VLAN_NOT_FOUND: Attempt to assign non-existent or shutdown VLAN 21 to 802.1x port GigabitEthernet2/0/36 AuditSessionID 0A10400D00000034428D670E Jan 29 17:36:08.725 CET: %EPM-6-POLICY_REQ: IP 0.0.0.0| MAC 0022.6812.3f6c| AuditSessionID 0A10400D00000034428D670E| EVENT APPLY Jan 29 17:36:08.725 CET: dot1x-redundancy:[0022.6812.3f6c, Gi2/0/36] State for client successfully retrieved Jan 29 17:36:08.729 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Received Authz fail (result: 3) for the client 0x27000019 (0022.6812.3f6c) Jan 29 17:36:08.729 CET: dot1x-redundancy:[0022.6812.3f6c, Gi2/0/36] State for client successfully retrieved Jan 29 17:36:08.729 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting_AUTHZ_FAIL on Client 0x27000019 Jan 29 17:36:08.729 CET: dot1x_auth Gi2/0/36: during state auth_authc_result, got event 22(authzFail) Jan 29 17:36:08.729 CET: @@@ dot1x_auth Gi2/0/36: auth_authc_result -> auth_held Jan 29 17:36:08.729 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019: held Jan 29 17:36:08.729 CET: %DOT1X-5-RESULT_OVERRIDE: Authentication result overridden for client (0022.6812.3f6c) on Interface Gi2/0/36 AuditSessionID 0A10400D00000034428D670E Jan 29 17:36:08.732 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet Jan 29 17:36:08.732 CET: dot1x-registry:registry:dot1x_ether_macaddr called Jan 29 17:36:08.732 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c Jan 29 17:36:08.732 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0 Jan 29 17:36:08.732 CET: dot1x-packet: length: 0x0004 Jan 29 17:36:08.732 CET: dot1x-packet:EAP code: 0x4 id: 0xEE length: 0x0004 Jan 29 17:36:08.732 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL canned status packet sent to client 0x27000019 Jan 29 17:36:09.732 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] queuing an EAPOL pkt on Auth Q Jan 29 17:36:09.736 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x1 Jan 29 17:36:09.736 CET: dot1x-packet: length: 0x0000 Jan 29 17:36:09.736 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 0,TYPE= 0,LEN= 0 Jan 29 17:36:09.736 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0101.0000 Jan 29 17:36:09.736 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Received an EAPOL-Start packet Jan 29 17:36:09.736 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x1 Jan 29 17:36:09.736 CET: dot1x-packet: length: 0x0000 Jan 29 17:36:09.736 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_START on Client 0x27000019 Jan 29 17:36:09.736 CET: dot1x_auth Gi2/0/36: during state auth_held, got event 4(eapolStart) (ignored) Jan 29 17:36:14.734 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] queuing an EAPOL pkt on Auth Q Jan 29 17:36:14.737 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x1 Jan 29 17:36:14.737 CET: dot1x-packet: length: 0x0000 Jan 29 17:36:14.737 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 0,TYPE= 0,LEN= 0 Jan 29 17:36:14.737 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0101.0000 Jan 29 17:36:14.737 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Received an EAPOL-Start packet Jan 29 17:36:14.737 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x1 Jan 29 17:36:14.737 CET: dot1x-packet: length: 0x0000 Jan 29 17:36:14.737 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_START on Client 0x27000019 Jan 29 17:36:14.737 CET: dot1x_auth Gi2/0/36: during state auth_held, got event 4(eapolStart) (ignored) Jan 29 17:36:19.736 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] queuing an EAPOL pkt on Auth Q Jan 29 17:36:19.736 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x1 Jan 29 17:36:19.736 CET: dot1x-packet: length: 0x0000 Jan 29 17:36:19.736 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 0,TYPE= 0,LEN= 0 Jan 29 17:36:19.736 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0101.0000 Jan 29 17:36:19.736 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Received an EAPOL-Start packet Jan 29 17:36:19.736 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x1 Jan 29 17:36:19.736 CET: dot1x-packet: length: 0x0000 Jan 29 17:36:19.736 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_START on Client 0x27000019 Jan 29 17:36:19.736 CET: dot1x_auth Gi2/0/36: during state auth_held, got event 4(eapolStart) (ignored)
Do you have any clue?
Thank you all in advance for your time.
Yours Alfred
01-29-2019 02:48 PM - edited 01-29-2019 02:59 PM
Hello,
I am not really sure what you are asking to be honest, but the service template you see is part of IBNS2.0. It usually is part of:
event authentication-success match-all
class always do-until-failure
activate service-template DEFAULT_LINKSEC_POLICY_SHOULD_SECURE
If you need legacy, did you type:
3850#Device# authentication display legacy
and reload the device ?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide