cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
694
Views
0
Helpful
1
Replies

Legacy Config Dot1x Closed Mode Does not authenticate any user

PlanaRamirez
Level 1
Level 1

Hello Community,

 

I was wondering if you could enlighten me in any way about a weird behavior that do not allow me to authenticate users nor computers on a new switch stack.

 

The environment is a 2960x five member stack pile running IOS 15.2(4)E6 universal in legacy dot1x config-mode

 

Switch Ports Model SW Version SW Image
------ ----- ----- ---------- ----------
* 1 52 WS-C2960X-48LPD-L 15.2(4)E6 C2960X-UNIVERSALK9-M
 2 52 WS-C2960X-48LPD-L 15.2(4)E6 C2960X-UNIVERSALK9-M
 3 52 WS-C2960X-48LPD-L 15.2(4)E6 C2960X-UNIVERSALK9-M
 4 52 WS-C2960X-48LPD-L 15.2(4)E6 C2960X-UNIVERSALK9-M
 5 52 WS-C2960X-48LPD-L 15.2(4)E6 C2960X-UNIVERSALK9-M

Switch#authentication display config-mode
Current configuration mode is legacy

 

I set the very same config as other stacks or stand alone switches. Also I am running another 5 members stack that went from legacy-mode to new-style with that same config.

 

I could not authenticate any computers while it stucks Unauthenticated

 

Switch#show authentication sessions

Interface MAC Address Method Domain Status Fg Session ID
Gi2/0/36 0022.6812.3f6c dot1x DATA Unauth 0A10400D000000304188BAA0

Session count = 1

 

If I ask for some details I see that there is a Policy applied to the port and a service template.

Switch#show authentication sessions int Gi2/0/36 det
 Interface: GigabitEthernet2/0/36
 MAC Address: 0022.6812.3f6c
 IPv6 Address: Unknown
 IPv4 Address: Unknown
 User-Name: DOMAIN\USERNAME
 Status: Unauthorized
 Domain: DATA
 Oper host mode: multi-domain
 Oper control dir: in
 Session timeout: N/A
 Restart timeout: N/A
Periodic Acct timeout: N/A
 Common Session ID: 0A10400D000000304188BAA0
 Acct Session ID: Unknown
 Handle: 0x03000017
 Current Policy: POLICY_Gi2/0/36

Local Policies:
 Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)

Method status list:
 Method State

dot1x Authc Success
 mab Stopped

However I did not configure any of them while setting a LEGACY mode config.

Switch#show policy-map POLICY_Gi2/0/36
Switch#show template DEFAULT_LINKSEC_POLICY_SHOULD_SECURE

Template Class Type
-------- ----- ----
No Template named DEFAULT_LINKSEC_POLICY_SHOULD_SECURE

Switch#show run interface Gi2/0/36
interface GigabitEthernet2/0/36
 description Plug 90: Regular - Regular User
 switchport access vlan 999
 switchport mode access
 switchport voice vlan 3
 switchport port-security maximum 2
 switchport port-security violation restrict
 switchport port-security aging time 2
 switchport port-security aging type inactivity
 power inline never
 srr-queue bandwidth share 1 30 35 5
 priority-queue out
 authentication control-direction in
 authentication event fail action next-method
 authentication event server dead action authorize vlan 4
 authentication event server dead action authorize voice
 authentication event server alive action reinitialize
 authentication host-mode multi-domain
 authentication port-control auto
 authentication periodic
 authentication timer reauthenticate server
 authentication timer inactivity server dynamic
 authentication violation restrict
 mab
 mls qos trust device cisco-phone
 mls qos trust cos
 macro description cisco-phone
 dot1x pae authenticator
 dot1x timeout tx-period 10
 auto qos voip cisco-phone
 spanning-tree portfast edge
 spanning-tree bpduguard enable
 service-policy input AUTOQOS-SRND4-CISCOPHONE-POLICY
end

My test computer is authenticating correctly in any other switches (stacked or not) in closed mode.

a "debug dot1x any" shows this

Switch#clear authentication sessi int gi2/0/36
Jan 29 17:35:48.900 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Processing client delete for hdl 0x74000018 sent by Auth Mgr
Jan 29 17:35:48.903 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Deleting client 0x74000018 (0022.6812.3f6c)
Jan 29 17:35:48.903 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Delete auth client (0x74000018) message
Jan 29 17:35:48.907 CET: dot1x-ev:Auth client ctx destroyed
Jan 29 17:36:07.733 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] queuing an EAPOL pkt on Auth Q
Jan 29 17:36:07.733 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x1
Jan 29 17:36:07.733 CET: dot1x-packet: length: 0x0000
Jan 29 17:36:07.733 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 0,TYPE= 0,LEN= 0
Jan 29 17:36:07.733 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0101.0000
Jan 29 17:36:07.733 CET: dot1x-ev:[Gi2/0/36] Couldn't find the supplicant in the list
Jan 29 17:36:07.733 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] New client detected, sending session start event for 0022.6812.3f6c
Jan 29 17:36:07.736 CET: dot1x-ev:AAA auth ready returns Unknown error 0, result = TRUE
Jan 29 17:36:07.736 CET: dot1x_auth Gi2/0/36: initial state auth_initialize has enter
Jan 29 17:36:07.736 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019: initialising
Jan 29 17:36:07.736 CET: dot1x_auth Gi2/0/36: during state auth_initialize, got event 0(cfg_auto)
Jan 29 17:36:07.736 CET: @@@ dot1x_auth Gi2/0/36: auth_initialize -> auth_disconnected
Jan 29 17:36:07.736 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019: disconnected
Jan 29 17:36:07.736 CET: dot1x_auth Gi2/0/36: idle during state auth_disconnected
Jan 29 17:36:07.736 CET: @@@ dot1x_auth Gi2/0/36: auth_disconnected -> auth_restart
Jan 29 17:36:07.736 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019: entering restart
Jan 29 17:36:07.736 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending create new context event to EAP for 0x27000019 (0022.6812.3f6c)
Jan 29 17:36:07.736 CET: dot1x_auth_bend Gi2/0/36: initial state auth_bend_initialize has enter
Jan 29 17:36:07.736 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019: entering init state
Jan 29 17:36:07.740 CET: dot1x_auth_bend Gi2/0/36: initial state auth_bend_initialize has idle
Jan 29 17:36:07.740 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_initialize, got event 16383(idle)
Jan 29 17:36:07.740 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_initialize -> auth_bend_idle
Jan 29 17:36:07.740 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering idle state
Jan 29 17:36:07.740 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Created a client entry (0x27000019)
Jan 29 17:36:07.740 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Dot1x authentication started for 0x27000019 (0022.6812.3f6c)
Jan 29 17:36:07.740 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting !EAP_RESTART on Client 0x27000019
Jan 29 17:36:07.740 CET: dot1x_auth Gi2/0/36: during state auth_restart, got event 6(no_eapRestart)
Jan 29 17:36:07.740 CET: @@@ dot1x_auth Gi2/0/36: auth_restart -> auth_connecting
Jan 29 17:36:07.740 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:enter connecting state
Jan 29 17:36:07.740 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019: restart connecting
Jan 29 17:36:07.740 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting RX_REQ on Client 0x27000019
Jan 29 17:36:07.740 CET: dot1x_auth Gi2/0/36: during state auth_connecting, got event 10(eapReq_no_reAuthMax)
Jan 29 17:36:07.740 CET: @@@ dot1x_auth Gi2/0/36: auth_connecting -> auth_authenticating
Jan 29 17:36:07.740 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019: authenticating state entered
Jan 29 17:36:07.740 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:connecting authenticating action
Jan 29 17:36:07.743 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting AUTH_START for 0x27000019
Jan 29 17:36:07.743 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_idle, got event 4(eapReq_authStart)
Jan 29 17:36:07.743 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_idle -> auth_bend_request
Jan 29 17:36:07.743 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering request state
Jan 29 17:36:07.743 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet
Jan 29 17:36:07.743 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jan 29 17:36:07.743 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c
Jan 29 17:36:07.743 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jan 29 17:36:07.743 CET: dot1x-packet: length: 0x0005
Jan 29 17:36:07.743 CET: dot1x-packet:EAP code: 0x1 id: 0x1 length: 0x0005
Jan 29 17:36:07.743 CET: dot1x-packet: type: 0x1
Jan 29 17:36:07.743 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL packet sent to client 0x27000019
Jan 29 17:36:07.743 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:idle request action
Jan 29 17:36:07.799 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Queuing an EAPOL pkt on Authenticator Q
Jan 29 17:36:07.803 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jan 29 17:36:07.803 CET: dot1x-packet: length: 0x0014
Jan 29 17:36:07.803 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 2,TYPE= 1,LEN= 20
Jan 29 17:36:07.803 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0014
Jan 29 17:36:07.803 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jan 29 17:36:07.803 CET: dot1x-packet: length: 0x0014
Jan 29 17:36:07.803 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_EAP for 0x27000019
Jan 29 17:36:07.803 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_request, got event 6(eapolEap)
Jan 29 17:36:07.803 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_request -> auth_bend_response
Jan 29 17:36:07.803 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering response state
Jan 29 17:36:07.803 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Response sent to the server from 0x27000019
Jan 29 17:36:07.803 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:request response action
Jan 29 17:36:07.845 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAP_REQ for 0x27000019
Jan 29 17:36:07.845 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_response, got event 7(eapReq)
Jan 29 17:36:07.845 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_response -> auth_bend_request
Jan 29 17:36:07.848 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting response state
Jan 29 17:36:07.848 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering request state
Jan 29 17:36:07.848 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet
Jan 29 17:36:07.848 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jan 29 17:36:07.848 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c
Jan 29 17:36:07.848 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jan 29 17:36:07.848 CET: dot1x-packet: length: 0x0006
Jan 29 17:36:07.848 CET: dot1x-packet:EAP code: 0x1 id: 0xE5 length: 0x0006
Jan 29 17:36:07.848 CET: dot1x-packet: type: 0xD
Jan 29 17:36:07.848 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL packet sent to client 0x27000019
Jan 29 17:36:07.848 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:response request action
Jan 29 17:36:07.859 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Queuing an EAPOL pkt on Authenticator Q
Jan 29 17:36:07.859 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jan 29 17:36:07.859 CET: dot1x-packet: length: 0x0006
Jan 29 17:36:07.859 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 2,TYPE= 3,LEN= 6
Jan 29 17:36:07.859 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0006
Jan 29 17:36:07.859 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jan 29 17:36:07.859 CET: dot1x-packet: length: 0x0006
Jan 29 17:36:07.859 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_EAP for 0x27000019
Jan 29 17:36:07.859 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_request, got event 6(eapolEap)
Jan 29 17:36:07.859 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_request -> auth_bend_response
Jan 29 17:36:07.859 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering response state
Jan 29 17:36:07.859 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Response sent to the server from 0x27000019
Jan 29 17:36:07.859 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:request response action
Jan 29 17:36:07.915 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAP_REQ for 0x27000019
Jan 29 17:36:07.918 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_response, got event 7(eapReq)
Jan 29 17:36:07.918 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_response -> auth_bend_request
Jan 29 17:36:07.918 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting response state
Jan 29 17:36:07.918 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering request state
Jan 29 17:36:07.918 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet
Jan 29 17:36:07.918 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jan 29 17:36:07.918 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c
Jan 29 17:36:07.918 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jan 29 17:36:07.918 CET: dot1x-packet: length: 0x0006
Jan 29 17:36:07.918 CET: dot1x-packet:EAP code: 0x1 id: 0xE6 length: 0x0006
Jan 29 17:36:07.918 CET: dot1x-packet: type: 0x19
Jan 29 17:36:07.918 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL packet sent to client 0x27000019
Jan 29 17:36:07.918 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:response request action
Jan 29 17:36:07.943 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Queuing an EAPOL pkt on Authenticator Q
Jan 29 17:36:07.943 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jan 29 17:36:07.943 CET: dot1x-packet: length: 0x006D
Jan 29 17:36:07.943 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 2,TYPE= 25,LEN= 109
Jan 29 17:36:07.943 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.006d
Jan 29 17:36:07.943 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jan 29 17:36:07.946 CET: dot1x-packet: length: 0x006D
Jan 29 17:36:07.946 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_EAP for 0x27000019
Jan 29 17:36:07.946 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_request, got event 6(eapolEap)
Jan 29 17:36:07.946 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_request -> auth_bend_response
Jan 29 17:36:07.946 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering response state
Jan 29 17:36:07.946 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Response sent to the server from 0x27000019
Jan 29 17:36:07.946 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:request response action
Jan 29 17:36:08.002 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAP_REQ for 0x27000019
Jan 29 17:36:08.002 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_response, got event 7(eapReq)
Jan 29 17:36:08.002 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_response -> auth_bend_request
Jan 29 17:36:08.002 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting response state
Jan 29 17:36:08.002 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering request state
Jan 29 17:36:08.002 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet
Jan 29 17:36:08.002 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jan 29 17:36:08.002 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c
Jan 29 17:36:08.002 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jan 29 17:36:08.002 CET: dot1x-packet: length: 0x03F4
Jan 29 17:36:08.002 CET: dot1x-packet:EAP code: 0x1 id: 0xE7 length: 0x03F4
Jan 29 17:36:08.002 CET: dot1x-packet: type: 0x19
Jan 29 17:36:08.005 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL packet sent to client 0x27000019
Jan 29 17:36:08.005 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:response request action
Jan 29 17:36:08.005 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Queuing an EAPOL pkt on Authenticator Q
Jan 29 17:36:08.005 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jan 29 17:36:08.005 CET: dot1x-packet: length: 0x0006
Jan 29 17:36:08.005 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 2,TYPE= 25,LEN= 6
Jan 29 17:36:08.005 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0006
Jan 29 17:36:08.005 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jan 29 17:36:08.005 CET: dot1x-packet: length: 0x0006
Jan 29 17:36:08.005 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_EAP for 0x27000019
Jan 29 17:36:08.005 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_request, got event 6(eapolEap)
Jan 29 17:36:08.005 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_request -> auth_bend_response
Jan 29 17:36:08.005 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering response state
Jan 29 17:36:08.005 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Response sent to the server from 0x27000019
Jan 29 17:36:08.005 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:request response action
Jan 29 17:36:08.065 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAP_REQ for 0x27000019
Jan 29 17:36:08.065 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_response, got event 7(eapReq)
Jan 29 17:36:08.065 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_response -> auth_bend_request
Jan 29 17:36:08.065 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting response state
Jan 29 17:36:08.065 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering request state
Jan 29 17:36:08.065 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet
Jan 29 17:36:08.065 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jan 29 17:36:08.068 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c
Jan 29 17:36:08.068 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jan 29 17:36:08.068 CET: dot1x-packet: length: 0x03F0
Jan 29 17:36:08.068 CET: dot1x-packet:EAP code: 0x1 id: 0xE8 length: 0x03F0
Jan 29 17:36:08.068 CET: dot1x-packet: type: 0x19
Jan 29 17:36:08.068 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL packet sent to client 0x27000019
Jan 29 17:36:08.068 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:response request action
Jan 29 17:36:08.075 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Queuing an EAPOL pkt on Authenticator Q
Jan 29 17:36:08.075 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jan 29 17:36:08.075 CET: dot1x-packet: length: 0x0006
Jan 29 17:36:08.075 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 2,TYPE= 25,LEN= 6
Jan 29 17:36:08.075 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0006
Jan 29 17:36:08.075 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jan 29 17:36:08.075 CET: dot1x-packet: length: 0x0006
Jan 29 17:36:08.075 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_EAP for 0x27000019
Jan 29 17:36:08.075 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_request, got event 6(eapolEap)
Jan 29 17:36:08.079 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_request -> auth_bend_response
Jan 29 17:36:08.079 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering response state
Jan 29 17:36:08.079 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Response sent to the server from 0x27000019
Jan 29 17:36:08.079 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:request response action
Jan 29 17:36:08.142 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAP_REQ for 0x27000019
Jan 29 17:36:08.142 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_response, got event 7(eapReq)
Jan 29 17:36:08.142 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_response -> auth_bend_request
Jan 29 17:36:08.142 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting response state
Jan 29 17:36:08.142 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering request state
Jan 29 17:36:08.142 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet
Jan 29 17:36:08.142 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jan 29 17:36:08.142 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c
Jan 29 17:36:08.142 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jan 29 17:36:08.142 CET: dot1x-packet: length: 0x03C3
Jan 29 17:36:08.142 CET: dot1x-packet:EAP code: 0x1 id: 0xE9 length: 0x03C3
Jan 29 17:36:08.142 CET: dot1x-packet: type: 0x19
Jan 29 17:36:08.142 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL packet sent to client 0x27000019
Jan 29 17:36:08.142 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:response request action
Jan 29 17:36:08.163 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Queuing an EAPOL pkt on Authenticator Q
Jan 29 17:36:08.163 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jan 29 17:36:08.163 CET: dot1x-packet: length: 0x0150
Jan 29 17:36:08.163 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 2,TYPE= 25,LEN= 336
Jan 29 17:36:08.166 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0150
Jan 29 17:36:08.166 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jan 29 17:36:08.166 CET: dot1x-packet: length: 0x0150
Jan 29 17:36:08.166 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_EAP for 0x27000019
Jan 29 17:36:08.166 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_request, got event 6(eapolEap)
Jan 29 17:36:08.166 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_request -> auth_bend_response
Jan 29 17:36:08.166 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering response state
Jan 29 17:36:08.166 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Response sent to the server from 0x27000019
Jan 29 17:36:08.166 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:request response action
Jan 29 17:36:08.212 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAP_REQ for 0x27000019
Jan 29 17:36:08.212 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_response, got event 7(eapReq)
Jan 29 17:36:08.212 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_response -> auth_bend_request
Jan 29 17:36:08.212 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting response state
Jan 29 17:36:08.212 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering request state
Jan 29 17:36:08.212 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet
Jan 29 17:36:08.212 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jan 29 17:36:08.212 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c
Jan 29 17:36:08.212 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jan 29 17:36:08.212 CET: dot1x-packet: length: 0x0041
Jan 29 17:36:08.212 CET: dot1x-packet:EAP code: 0x1 id: 0xEA length: 0x0041
Jan 29 17:36:08.212 CET: dot1x-packet: type: 0x19
Jan 29 17:36:08.212 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL packet sent to client 0x27000019
Jan 29 17:36:08.212 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:response request action
Jan 29 17:36:08.247 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Queuing an EAPOL pkt on Authenticator Q
Jan 29 17:36:08.247 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jan 29 17:36:08.247 CET: dot1x-packet: length: 0x0006
Jan 29 17:36:08.247 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 2,TYPE= 25,LEN= 6
Jan 29 17:36:08.247 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.0006
Jan 29 17:36:08.247 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jan 29 17:36:08.247 CET: dot1x-packet: length: 0x0006
Jan 29 17:36:08.250 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_EAP for 0x27000019
Jan 29 17:36:08.250 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_request, got event 6(eapolEap)
Jan 29 17:36:08.250 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_request -> auth_bend_response
Jan 29 17:36:08.250 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering response state
Jan 29 17:36:08.250 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Response sent to the server from 0x27000019
Jan 29 17:36:08.250 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:request response action
Jan 29 17:36:08.320 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAP_REQ for 0x27000019
Jan 29 17:36:08.320 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_response, got event 7(eapReq)
Jan 29 17:36:08.320 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_response -> auth_bend_request
Jan 29 17:36:08.320 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting response state
Jan 29 17:36:08.320 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering request state
Jan 29 17:36:08.320 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet
Jan 29 17:36:08.320 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jan 29 17:36:08.320 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c
Jan 29 17:36:08.320 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jan 29 17:36:08.320 CET: dot1x-packet: length: 0x002B
Jan 29 17:36:08.320 CET: dot1x-packet:EAP code: 0x1 id: 0xEB length: 0x002B
Jan 29 17:36:08.320 CET: dot1x-packet: type: 0x19
Jan 29 17:36:08.320 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL packet sent to client 0x27000019
Jan 29 17:36:08.320 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:response request action
Jan 29 17:36:08.337 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Queuing an EAPOL pkt on Authenticator Q
Jan 29 17:36:08.337 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jan 29 17:36:08.341 CET: dot1x-packet: length: 0x003B
Jan 29 17:36:08.341 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 2,TYPE= 25,LEN= 59
Jan 29 17:36:08.341 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.003b
Jan 29 17:36:08.341 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jan 29 17:36:08.341 CET: dot1x-packet: length: 0x003B
Jan 29 17:36:08.341 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_EAP for 0x27000019
Jan 29 17:36:08.341 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_request, got event 6(eapolEap)
Jan 29 17:36:08.341 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_request -> auth_bend_response
Jan 29 17:36:08.341 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering response state
Jan 29 17:36:08.341 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Response sent to the server from 0x27000019
Jan 29 17:36:08.341 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:request response action
Jan 29 17:36:08.362 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAP_REQ for 0x27000019
Jan 29 17:36:08.362 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_response, got event 7(eapReq)
Jan 29 17:36:08.362 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_response -> auth_bend_request
Jan 29 17:36:08.362 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting response state
Jan 29 17:36:08.362 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering request state
Jan 29 17:36:08.362 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet
Jan 29 17:36:08.362 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jan 29 17:36:08.362 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c
Jan 29 17:36:08.362 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jan 29 17:36:08.362 CET: dot1x-packet: length: 0x004B
Jan 29 17:36:08.362 CET: dot1x-packet:EAP code: 0x1 id: 0xEC length: 0x004B
Jan 29 17:36:08.362 CET: dot1x-packet: type: 0x19
Jan 29 17:36:08.362 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL packet sent to client 0x27000019
Jan 29 17:36:08.362 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:response request action
Jan 29 17:36:08.376 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Queuing an EAPOL pkt on Authenticator Q
Jan 29 17:36:08.376 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jan 29 17:36:08.376 CET: dot1x-packet: length: 0x006B
Jan 29 17:36:08.376 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 2,TYPE= 25,LEN= 107
Jan 29 17:36:08.376 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.006b
Jan 29 17:36:08.376 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jan 29 17:36:08.376 CET: dot1x-packet: length: 0x006B
Jan 29 17:36:08.376 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_EAP for 0x27000019
Jan 29 17:36:08.376 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_request, got event 6(eapolEap)
Jan 29 17:36:08.376 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_request -> auth_bend_response
Jan 29 17:36:08.376 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering response state
Jan 29 17:36:08.376 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Response sent to the server from 0x27000019
Jan 29 17:36:08.376 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:request response action
Jan 29 17:36:08.481 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAP_REQ for 0x27000019
Jan 29 17:36:08.481 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_response, got event 7(eapReq)
Jan 29 17:36:08.481 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_response -> auth_bend_request
Jan 29 17:36:08.481 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting response state
Jan 29 17:36:08.481 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering request state
Jan 29 17:36:08.481 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet
Jan 29 17:36:08.481 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jan 29 17:36:08.481 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c
Jan 29 17:36:08.481 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jan 29 17:36:08.481 CET: dot1x-packet: length: 0x005B
Jan 29 17:36:08.481 CET: dot1x-packet:EAP code: 0x1 id: 0xED length: 0x005B
Jan 29 17:36:08.481 CET: dot1x-packet: type: 0x19
Jan 29 17:36:08.481 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL packet sent to client 0x27000019
Jan 29 17:36:08.481 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:response request action
Jan 29 17:36:08.519 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Queuing an EAPOL pkt on Authenticator Q
Jan 29 17:36:08.519 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jan 29 17:36:08.519 CET: dot1x-packet: length: 0x002B
Jan 29 17:36:08.519 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 2,TYPE= 25,LEN= 43
Jan 29 17:36:08.519 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.002b
Jan 29 17:36:08.519 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jan 29 17:36:08.519 CET: dot1x-packet: length: 0x002B
Jan 29 17:36:08.519 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_EAP for 0x27000019
Jan 29 17:36:08.519 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_request, got event 6(eapolEap)
Jan 29 17:36:08.519 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_request -> auth_bend_response
Jan 29 17:36:08.519 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering response state
Jan 29 17:36:08.519 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Response sent to the server from 0x27000019
Jan 29 17:36:08.519 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:request response action
Jan 29 17:36:08.568 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAP_REQ for 0x27000019
Jan 29 17:36:08.568 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_response, got event 7(eapReq)
Jan 29 17:36:08.568 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_response -> auth_bend_request
Jan 29 17:36:08.568 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting response state
Jan 29 17:36:08.568 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering request state
Jan 29 17:36:08.568 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet
Jan 29 17:36:08.568 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jan 29 17:36:08.568 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c
Jan 29 17:36:08.568 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jan 29 17:36:08.568 CET: dot1x-packet: length: 0x002B
Jan 29 17:36:08.568 CET: dot1x-packet:EAP code: 0x1 id: 0xEE length: 0x002B
Jan 29 17:36:08.568 CET: dot1x-packet: type: 0x19
Jan 29 17:36:08.568 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL packet sent to client 0x27000019
Jan 29 17:36:08.568 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:response request action
Jan 29 17:36:08.582 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Queuing an EAPOL pkt on Authenticator Q
Jan 29 17:36:08.582 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jan 29 17:36:08.582 CET: dot1x-packet: length: 0x002B
Jan 29 17:36:08.582 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 2,TYPE= 25,LEN= 43
Jan 29 17:36:08.582 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0100.002b
Jan 29 17:36:08.582 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0
Jan 29 17:36:08.582 CET: dot1x-packet: length: 0x002B
Jan 29 17:36:08.582 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_EAP for 0x27000019
Jan 29 17:36:08.582 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_request, got event 6(eapolEap)
Jan 29 17:36:08.582 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_request -> auth_bend_response
Jan 29 17:36:08.582 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering response state
Jan 29 17:36:08.582 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Response sent to the server from 0x27000019
Jan 29 17:36:08.582 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:request response action
Jan 29 17:36:08.718 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Received an EAP Success
Jan 29 17:36:08.718 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAP_SUCCESS for 0x27000019
Jan 29 17:36:08.718 CET: dot1x_auth_bend Gi2/0/36: during state auth_bend_response, got event 11(eapSuccess)
Jan 29 17:36:08.718 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_response -> auth_bend_success
Jan 29 17:36:08.718 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting response state
Jan 29 17:36:08.718 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering success state
Jan 29 17:36:08.718 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:response success action
Jan 29 17:36:08.718 CET: dot1x_auth_bend Gi2/0/36: idle during state auth_bend_success
Jan 29 17:36:08.718 CET: @@@ dot1x_auth_bend Gi2/0/36: auth_bend_success -> auth_bend_idle
Jan 29 17:36:08.718 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering idle state
Jan 29 17:36:08.722 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting AUTH_SUCCESS on Client 0x27000019
Jan 29 17:36:08.722 CET: dot1x_auth Gi2/0/36: during state auth_authenticating, got event 12(authSuccess_portValid)
Jan 29 17:36:08.722 CET: @@@ dot1x_auth Gi2/0/36: auth_authenticating -> auth_authc_result
Jan 29 17:36:08.722 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:exiting authenticating state
Jan 29 17:36:08.722 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019:entering authc result state
Jan 29 17:36:08.722 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAP Key data detected adding to attribute list
Jan 29 17:36:08.722 CET: %DOT1X_SWITCH-5-ERR_VLAN_NOT_FOUND: Attempt to assign non-existent or shutdown VLAN 21 to 802.1x port GigabitEthernet2/0/36 AuditSessionID 0A10400D00000034428D670E
Jan 29 17:36:08.725 CET: %EPM-6-POLICY_REQ: IP 0.0.0.0| MAC 0022.6812.3f6c| AuditSessionID 0A10400D00000034428D670E| EVENT APPLY
Jan 29 17:36:08.725 CET: dot1x-redundancy:[0022.6812.3f6c, Gi2/0/36] State for client successfully retrieved
Jan 29 17:36:08.729 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Received Authz fail (result: 3) for the client 0x27000019 (0022.6812.3f6c)
Jan 29 17:36:08.729 CET: dot1x-redundancy:[0022.6812.3f6c, Gi2/0/36] State for client successfully retrieved
Jan 29 17:36:08.729 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting_AUTHZ_FAIL on Client 0x27000019
Jan 29 17:36:08.729 CET: dot1x_auth Gi2/0/36: during state auth_authc_result, got event 22(authzFail)
Jan 29 17:36:08.729 CET: @@@ dot1x_auth Gi2/0/36: auth_authc_result -> auth_held
Jan 29 17:36:08.729 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] 0x27000019: held
Jan 29 17:36:08.729 CET: %DOT1X-5-RESULT_OVERRIDE: Authentication result overridden for client (0022.6812.3f6c) on Interface Gi2/0/36 AuditSessionID 0A10400D00000034428D670E
Jan 29 17:36:08.732 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending EAPOL packet
Jan 29 17:36:08.732 CET: dot1x-registry:registry:dot1x_ether_macaddr called
Jan 29 17:36:08.732 CET: dot1x-ev:[0022.6812.3f6c, Gi2/0/36] Sending out EAPOL packet to MAC 0022.6812.3f6c
Jan 29 17:36:08.732 CET: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0
Jan 29 17:36:08.732 CET: dot1x-packet: length: 0x0004
Jan 29 17:36:08.732 CET: dot1x-packet:EAP code: 0x4 id: 0xEE length: 0x0004
Jan 29 17:36:08.732 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] EAPOL canned status packet sent to client 0x27000019
Jan 29 17:36:09.732 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] queuing an EAPOL pkt on Auth Q
Jan 29 17:36:09.736 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x1
Jan 29 17:36:09.736 CET: dot1x-packet: length: 0x0000
Jan 29 17:36:09.736 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 0,TYPE= 0,LEN= 0
Jan 29 17:36:09.736 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0101.0000
Jan 29 17:36:09.736 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Received an EAPOL-Start packet
Jan 29 17:36:09.736 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x1
Jan 29 17:36:09.736 CET: dot1x-packet: length: 0x0000
Jan 29 17:36:09.736 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_START on Client 0x27000019
Jan 29 17:36:09.736 CET: dot1x_auth Gi2/0/36: during state auth_held, got event 4(eapolStart) (ignored)
Jan 29 17:36:14.734 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] queuing an EAPOL pkt on Auth Q
Jan 29 17:36:14.737 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x1
Jan 29 17:36:14.737 CET: dot1x-packet: length: 0x0000
Jan 29 17:36:14.737 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 0,TYPE= 0,LEN= 0
Jan 29 17:36:14.737 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0101.0000
Jan 29 17:36:14.737 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Received an EAPOL-Start packet
Jan 29 17:36:14.737 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x1
Jan 29 17:36:14.737 CET: dot1x-packet: length: 0x0000
Jan 29 17:36:14.737 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_START on Client 0x27000019
Jan 29 17:36:14.737 CET: dot1x_auth Gi2/0/36: during state auth_held, got event 4(eapolStart) (ignored)
Jan 29 17:36:19.736 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] queuing an EAPOL pkt on Auth Q
Jan 29 17:36:19.736 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x1
Jan 29 17:36:19.736 CET: dot1x-packet: length: 0x0000
Jan 29 17:36:19.736 CET: dot1x-ev:[Gi2/0/36] Dequeued pkt: Int Gi2/0/36 CODE= 0,TYPE= 0,LEN= 0
Jan 29 17:36:19.736 CET: dot1x-ev:[Gi2/0/36] Received pkt saddr =0022.6812.3f6c , daddr = 0180.c200.0003, pae-ether-type = 888e.0101.0000
Jan 29 17:36:19.736 CET: dot1x-packet:[0022.6812.3f6c, Gi2/0/36] Received an EAPOL-Start packet
Jan 29 17:36:19.736 CET: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x1
Jan 29 17:36:19.736 CET: dot1x-packet: length: 0x0000
Jan 29 17:36:19.736 CET: dot1x-sm:[0022.6812.3f6c, Gi2/0/36] Posting EAPOL_START on Client 0x27000019
Jan 29 17:36:19.736 CET: dot1x_auth Gi2/0/36: during state auth_held, got event 4(eapolStart) (ignored)


Do you have any clue?

Thank you all in advance for your time.

Yours Alfred

1 Reply 1

Hello,

 

I am not really sure what you are asking to be honest, but the service template you see is part of IBNS2.0. It usually is part of:

 

event authentication-success match-all
 class always do-until-failure
  activate service-template DEFAULT_LINKSEC_POLICY_SHOULD_SECURE

 

If you need legacy, did you type:

 

3850#Device# authentication display legacy

 

and reload the device ?

Review Cisco Networking products for a $25 gift card