pedrophsp

Respostas no Fórum

Visualizando 25 posts - 1 até 25 (de 123 do total)
  • Autor
    Posts
  • em resposta a: Grupo de Estudos – CCIE v5 2016/2017 #188935

    pedrophsp
    Participante

    Olá Pessoal,

    Tenho interesse também, se puder me add ( [email protected] ) agradeço.

    Pedro Almeida

    em resposta a: BGP – Multiplos caminhos #187723

    pedrophsp
    Participante

    O que eu entendi é que ele quer mudar o caminho do endereço do destino 8.4.4.0 via R4.

    Atual LAN 128.0.1.0/24>R1 destino 8.4.4.0 via R3
    LAN 128.0.2.0/24>R1

    Proposto LAN 128.0.1.0/24>R1 destino 8.4.4.0 via R3
    LAN 128.0.2.0/24>R1 destino 8.4.4.0 via R4

    Queria saber como fizeram essa “distribuição” nos links. Eu só consigo manipular as rotas que estão na RIB, certo? No caso de um endereço público, consigo criar um route-map com match a esse ip e set para o As secundário ou usaria o next-hop?

    Abraços

    em resposta a: BGP – Multiplos caminhos #187716

    pedrophsp
    Participante

    Olá pessoal, conseguiram resolver a questão do balanceamento?

    em resposta a: IP Base License 4500 Catalyst – Informações #118075

    pedrophsp
    Participante

    Olá Zekkerj,

    Sim, foi o único "valor" de rotas que encontrei sobre o OSPF. Vi alguns cenários com mais de 1000 rotas, com certeza depende muito do hw do equipamento.

     

    Obrigado pelo suporte.

     

    em resposta a: IP Base License 4500 Catalyst – Informações #118073

    pedrophsp
    Participante

    Em alguns fóruns encontrei cenários com muito mais rotas do que mencionada na documentação da cisco.

     

    "OSPF for Routed Access: Starting from Cisco IOS Release 12.2(55)SE, the IP Base image supports a new feature called OSPF for Routed Access. OSPF for Routed Access is designed specifically to enable you to extend Layer 3 routing capabilities to the wiring closet. It supports only one OSPFv2 and one OSPFv3 instance, with a maximum number of 200 dynamically learned routes."

     

     

    em resposta a: IP Base License 4500 Catalyst – Informações #118070

    pedrophsp
    Participante

    É o que estou pensando…Quero ver se em alguma documentação da Cisco conste essa informação. Obrigado Daniel

    WS-C4510R+E

    License Information for ‘WS-X45-SUP7-E’

    License Level: ipbase   Type: Permanent

    Next reboot license Level: ipbase

    cat4500e-universal.SPA.03.05.03.E.152-1.E3.bin

    em resposta a: Passei na TSHOOT! #79806

    pedrophsp
    Participante

    Olá pessoal, tudo bem?

    Alguém fez o novo exame 300-135?

     

     

    em resposta a: PASSEI 642-813 CCNP SWITCH #91025

    pedrophsp
    Participante

    Olá pessoal,

     

    Fiz a prova de switching (19/11) e realmente cairam os labs AAA dot1x, LACP e MLS/EIGRP e muito sobre FHRP. Agora, começando o route da CloudCampus 🙂  

    em resposta a: PASSEI 642-813 CCNP SWITCH #91017

    pedrophsp
    Participante

     Olá Leonardo, tudo bem?

     

    STP caiu muita coisa?

     

    Abraços.


    pedrophsp
    Participante

    Olá pessoal,

    Fiz este curso e gostei muito. Na época pensei que era equivalente ao LPI e resolvi fazer. Quando chegou na hora do certificado tinha que pagar 250us. Achei caro e não paguei. Então preferi focar para LPI que são reconhecidas em todo o lugar e compensa o investimento.

    Grande abraço.

     

     

     

     

    em resposta a: Oportunidade – Barueri-SP #114892

    pedrophsp
    Participante

    Jundiaí?

    em resposta a: VAGA CCIE #115133

    pedrophsp
    Participante

    Orra 25 mil eu andava de mercedes c250 kkkk tranquilooo sendo CLT ou não. O importante é curtir o emprego.

    em resposta a: PASSEI 642-813 CCNP SWITCH #90988

    pedrophsp
    Participante

    Flyner, obrigado pela informação.

     

    em resposta a: PASSEI 642-813 CCNP SWITCH #90986

    pedrophsp
    Participante

    Só queria saber mesmo o que era o INE, achei no google "http://www.ine.com/self-paced/ccnp/bootcamps/ccnp-routing-switching-course.htm" . Estou me organizando para começar os estudos para CCNP (sw, route e tshoot).

     

    Diego, meu email é [email protected]

     

    Obrigado.

     

    em resposta a: PASSEI 642-813 CCNP SWITCH #90983

    pedrophsp
    Participante

    Olá Diego, parabéns pela conquista! Sucesso…

    Essas video aulas INE são pagas?

     

    em resposta a: Oportunidade – Barueri-SP #114878

    pedrophsp
    Participante

    Só iniciante?

    em resposta a: Vaga para Analista de Segurança Jr – SP #114907

    pedrophsp
    Participante

    Desculpem pelo meu jeito de expressar, mas se júnior é mais ou menos isso, o pleno tem que cobrar o escanteio e cabecear pro gol, ou bater o penalti  ir ao gol pegar.  É mais uma vaga que você tem que saber de tudo e ainda engraxar sapato.

    Vejo muitas vagas assim, temos que torcer para que 1 se encaixe com o seu perfil.

    em resposta a: Passei na TSHOOT! #79765

    pedrophsp
    Participante

    Parabéns Fernando, sucesso.

    em resposta a: Aironet 1600 + RADIUS 2008 – Ajuda #114572

    pedrophsp
    Participante

    Aldrin, consegui  resolver.

    Obrigado.

    I solved this problem. I configured one more option in Connection Request Policies – My Policy:

    Settings                                                                             Value

    Authentication Provider                                                   Local Computer

    Extensible Authentication Protocol Method                     Microsoft: Protected EAP (PEAP)

    Override Authentication                                                   Disabled

    Extensible Authentication Protocol Configuration    Configure

    @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

    In Network Policies – My Policy

    Settings                                                                                           Value

    Authentication Method                                                    EAP

    Access Permission                                                         Grand Access

    Update Noncompliant Client                                           True

    NAP Enforcement                                                            Allow full network access

    Extensible Authentication Protocol Method                     Microsoft: Protected EAP (PEAP)

    Extensible Authentication Protocol Configuration    Configure

    Extended State                                                                 <Blank>

    BAP Percentage of Capacity                                            ReduceMultink if server reaches 50% for 2 minutes

    Encryption                                                                        Basic encryption (MPPE 40-bit), Strong encryption (MPPE 56-bit), Strongest encryption (MPPE 128-bit)

    Encryption Policy                                                             Enabled

    NAS Port Type                                                                 Wireless – IEEE 802.11

    @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

    This options ( in red ) i added in my NPS and the authentication working now.

     

    Valeu..

     

     

    em resposta a: Aironet 1600 + RADIUS 2008 – Ajuda #114571

    pedrophsp
    Participante

    Alias 1600, me desculpe srsr

    em resposta a: Aironet 1600 + RADIUS 2008 – Ajuda #114568

    pedrophsp
    Participante

    Cisco IOS Software, C1600 Software (AP1G2-K9W7-M), Version 15.2(2)JB2, RELEASE SOFTWARE (fc1)

    Technical Support: http://www.cisco.com/techsupport

    Copyright (c) 1986-2013 by Cisco Systems, Inc.

    Compiled Mon 29-Jul-13 12:16 by prod_rel_team

    em resposta a: Aironet 1600 + RADIUS 2008 – Ajuda #114566

    pedrophsp
    Participante

    Neste tutorial, fala sobre a alteração do atributo para equipamento Cisco.

    http://www.networkingnut.net/configuring-radius-server-on-windows-2008-r2-for-cisco-device-logins/

    em resposta a: Aironet 1600 + RADIUS 2008 – Ajuda #114565

    pedrophsp
    Participante

    Concordo com você. O server está sim com o Microsoft Protected EAP – EAP MSCHAPv2.

    O cliente (aironet) só tem a opção Methods Accepted: with EAP (imagem2). 

    Se tive alguma opção como na figura "metodo de autenticacao" para configurar o EAP, mas não tem….

     

    em resposta a: Aironet 1600 + RADIUS 2008 – Ajuda #114563

    pedrophsp
    Participante

    Sim, sempre deixei standard pois os fabricantes que usava naõ continha na lista do Vendor.

     

    EventViewer

    Authentication Details:

        Connection Request Policy Name:    Empresa – Wireless

        Network Policy Name:        Empresa – Redes Wireless

        Authentication Provider:        Windows

        Authentication Server:        empresa.local

        Authentication Type:        EAP

        EAP Type:            –

        Account Session Identifier:        –

        Logging Results:            Accounting information was written to the local log file.

        Reason Code:            22

        Reason:                The client could not be authenticated  because the Extensible Authentication Protocol (EAP) Type cannot be processed by the server.

     

    Testei em outra máquina, retorna o mesmo erro.

     

    Li algo sobre alterar alguns atributos que no Cisco é diferente do RADIUS, também no log tem uma parte que não é suportado:

    un 10 15:11:18.734: RADIUS:  AAA Unsupported Attr: ssid              [347] 2  

    Jun 10 15:11:18.734: RADIUS:  AAA Unsupported Attr: service-type      [345] 4   1

    Jun 10 15:11:18.734: RADIUS:  AAA Unsupported Attr: interface         [222] 3  

    To pesquisando, vamos ver se encontro a solução.  Não quero fazer nenhuma alteração no meu RADIUS- server pois ele está em produção e não vejo problema na configuração dele.

     

     

    em resposta a: Aironet 1600 + RADIUS 2008 – Ajuda #114561

    pedrophsp
    Participante

    Fiz o degub no ap, vou procurar na net se tem algo relacionado a isso.

    ap#

    Jun 10 15:11:17.626: AAA/BIND(000003AE): Bind i/f 

    Jun 10 15:11:17.626: dot11_auth_dot1x_start: in the dot11_auth_dot1x_start

    Jun 10 15:11:17.626: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 001e.58a2.ba4b

    Jun 10 15:11:17.626: dot11_auth_dot1x_send_id_req_to_client: Client 001e.58a2.ba4b timer started for 30 seconds

    Jun 10 15:11:17.670: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b

    Jun 10 15:11:17.670: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,EAP_START) for 001e.58a2.ba4b

    Jun 10 15:11:17.670: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 001e.58a2.ba4b

    Jun 10 15:11:17.670: dot11_auth_dot1x_send_id_req_to_client: Client 001e.58a2.ba4b timer started for 30 seconds

    Jun 10 15:11:17.734: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b

    Jun 10 15:11:17.734: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,CLIENT_REPLY) for 001e.58a2.ba4b

    Jun 10 15:11:17.734: dot11_auth_dot1x_send_response_to_server: Sending client 001e.58a2.ba4b data to server

    Jun 10 15:11:17.734: AAA/AUTHEN/PPP (000003AE): Pick method list ‘eap_methods1’

    Jun 10 15:11:17.734: dot11_auth_dot1x_send_response_to_server: Started timer server_timeout 60 seconds

    Jun 10 15:11:17.734: RADIUS/ENCODE(000003AE):Orig. component type = DOT11

    Jun 10 15:11:17.734: RADIUS:  AAA Unsupported Attr: ssid              [347] 2  

    Jun 10 15:11:17.734: RADIUS:  AAA Unsupported Attr: service-type      [345] 4   1

    Jun 10 15:11:17.734: RADIUS:  AAA Unsupported Attr: interface         [222] 3  

    Jun 10 15:11:17.734: RADIUS:   33                 [ 3]

    Jun 10 15:11:17.734: RADIUS(000003AE): Config NAS IP: 172.16.254.116

    Jun 10 15:11:17.734: RADIUS(000003AE): Config NAS IPv6:

    Jun 10 15:11:17.734: RADIUS/ENCODE(000003AE): acct_session_id: 930

    Jun 10 15:11:17.734: RADIUS(000003AE): Config NAS IP: 172.16.254.116

    Jun 10 15:11:17.734: RADIUS(000003AE): sending

    Jun 10 15:11:17.734: RADIUS(000003AE): Send Access-Request to 172.16.0.32:1812 id 1645/64, len 176

    Jun 10 15:11:17.734: RADIUS:  authenticator 28 49 B0 61 F5 A0 C9 CB – 09 C6 A3 74 BA 90 A4 F4

    Jun 10 15:11:17.734: RADIUS:  User-Name           [1]   28  "host/WM-WSUS-998.empresa.local"

    Jun 10 15:11:17.734: RADIUS:  Framed-MTU          [12]  6   1400                     

    Jun 10 15:11:17.734: RADIUS:  Called-Station-Id   [30]  22  "2C-3E-CF-0B-BF-60:1A"

    Jun 10 15:11:17.734: RADIUS:  Calling-Station-Id  [31]  16  "001e.58a2.ba4b"

    Jun 10 15:11:17.734: RADIUS:  Service-Type        [6]   6   Login                     [1]

    Jun 10 15:11:17.734: RADIUS:  Message-Authenticato[80]  18 

    Jun 10 15:11:17.734: RADIUS:   E8 41 93 41 BF D0 5F E3 F4 F0 08 96 91 4F 32 B3             [ AA_O2]

    Jun 10 15:11:17.734: RADIUS:  EAP-Message         [79]  33 

    Jun 10 15:11:17.738: RADIUS:   02 02 00 1F 01 68 6F 73 74 2F 57 4D 2D 57 53 55 53 2D 39 39 38  [host/WM-WSUS-998]

    Jun 10 15:11:17.738: RADIUS:   2E 63 62 61 2E 6C 6F 63 61 6C        [ .cba.local]

    Jun 10 15:11:17.738: RADIUS:  NAS-Port-Type       [61]  6   802.11 wireless           [19]

    Jun 10 15:11:17.738: RADIUS:  NAS-Port            [5]   6   357                      

    Jun 10 15:11:17.738: RADIUS:  NAS-Port-Id         [87]  5   "357"

    Jun 10 15:11:17.738: RADIUS:  NAS-IP-Address      [4]   6   172.16.254.116           

    Jun 10 15:11:17.738: RADIUS:  Nas-Identifier      [32]  4   "ap"

    Jun 10 15:11:17.738: RADIUS(000003AE): Sending a IPv4 Radius Packet

    Jun 10 15:11:17.738: RADIUS(000003AE): Started 5 sec timeout

    Jun 10 15:11:17.738: RADIUS: Received from id 1645/64 172.16.0.32:1812, Access-Reject, len 44

    Jun 10 15:11:17.738: RADIUS:  authenticator 24 C7 7C A3 D9 18 CE 9C – 18 E3 E8 4C 6B B3 F3 EB

    Jun 10 15:11:17.738: RADIUS:  EAP-Message         [79]  6  

    Jun 10 15:11:17.738: RADIUS:   04 02 00 04

    Jun 10 15:11:17.738: RADIUS:  Message-Authenticato[80]  18 

    Jun 10 15:11:17.738: RADIUS:   7D D8 FD 68 DE 63 DC 5C C4 6F 0D 36 C9 D7 EE 9B            [ }hco6]

    Jun 10 15:11:17.742: RADIUS(000003AE): Received from id 1645/64

    Jun 10 15:11:17.742: RADIUS/DECODE: EAP-Message fragments, 4, total 4 bytes

    Jun 10 15:11:17.742: dot11_auth_dot1x_parse_aaa_resp: Received server response: FAIL

    Jun 10 15:11:17.742: dot11_auth_dot1x_parse_aaa_resp: found eap pak in server response

    Jun 10 15:11:17.742: Client 001e.58a2.ba4b failed: by EAP authentication server

    Jun 10 15:11:17.742: dot11_auth_dot1x_run_rfsm: Executing Action(SERVER_WAIT,SERVER_FAIL) for 001e.58a2.ba4b

    Jun 10 15:11:17.742: dot11_auth_dot1x_send_response_to_client: Forwarding server message to client 001e.58a2.ba4b

    Jun 10 15:11:17.742: dot11_auth_dot1x_send_response_to_client: Started timer client_timeout 30 seconds

    Jun 10 15:11:17.742: dot11_auth_dot1x_send_client_fail: Authentication failed for 001e.58a2.ba4b

    Jun 10 15:11:17.742: %DOT11-7-AUTH_FAILED: Station 001e.58a2.ba4b Authentication failed

    Jun 10 15:11:18.626: AAA/BIND(000003AF): Bind i/f 

    Jun 10 15:11:18.626: dot11_auth_dot1x_start: in the dot11_auth_dot1x_start

    Jun 10 15:11:18.626: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 001e.58a2.ba4b

    Jun 10 15:11:18.626: dot11_auth_dot1x_send_id_req_to_client: Client 001e.58a2.ba4b timer started for 30 seconds

    Jun 10 15:11:18.674: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b

    Jun 10 15:11:18.674: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,EAP_START) for 001e.58a2.ba4b

    Jun 10 15:11:18.674: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 001e.58a2.ba4b

    Jun 10 15:11:18.674: dot11_auth_dot1x_send_id_req_to_client: Client 001e.58a2.ba4b timer started for 30 seconds

    Jun 10 15:11:18.718: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b

    Jun 10 15:11:18.718: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,CLIENT_REPLY) for 001e.58a2.ba4b

    Jun 10 15:11:18.718: dot11_auth_dot1x_send_response_to_server: Sending client 001e.58a2.ba4b data to server

    Jun 10 15:11:18.718: AAA/AUTHEN/PPP (000003AF): Pick method list ‘eap_methods1’

    Jun 10 15:11:18.718: dot11_auth_dot1x_send_response_to_server: Started timer server_timeout 60 seconds

    Jun 10 15:11:18.718: RADIUS/ENCODE(000003AF):Orig. component type = DOT11

    Jun 10 15:11:18.718: RADIUS:  AAA Unsupported Attr: ssid              [347] 2  

    Jun 10 15:11:18.718: RADIUS:  AAA Unsupported Attr: service-type      [345] 4   1

    Jun 10 15:11:18.718: RADIUS:  AAA Unsupported Attr: interface         [222] 3  

    Jun 10 15:11:18.718: RADIUS:   33                 [ 3]

    Jun 10 15:11:18.718: RADIUS(000003AF): Config NAS IP: 172.16.254.116

    Jun 10 15:11:18.718: RADIUS(000003AF): Config NAS IPv6:

    Jun 10 15:11:18.718: RADIUS/ENCODE(000003AF): acct_session_id: 931

    Jun 10 15:11:18.718: RADIUS(000003AF): Config NAS IP: 172.16.254.116

    Jun 10 15:11:18.718: RADIUS(000003AF): sending

    Jun 10 15:11:18.718: RADIUS(000003AF): Send Access-Request to 172.16.0.32:1812 id 1645/65, len 158

    Jun 10 15:11:18.718: RADIUS:  authenticator 7E 23 58 CD B6 E3 BC 0A – 86 49 37 61 D4 DA AF 02

    Jun 10 15:11:18.718: RADIUS:  User-Name           [1]   19  "EmpresaPedro.Almeida"

    Jun 10 15:11:18.718: RADIUS:  Framed-MTU          [12]  6   1400                     

    Jun 10 15:11:18.718: RADIUS:  Called-Station-Id   [30]  22  "2C-3E-CF-0B-BF-60:1A"

    Jun 10 15:11:18.718: RADIUS:  Calling-Station-Id  [31]  16  "001e.58a2.ba4b"

    Jun 10 15:11:18.718: RADIUS:  Service-Type        [6]   6   Login                     [1]

    Jun 10 15:11:18.718: RADIUS:  Message-Authenticato[80]  18 

    Jun 10 15:11:18.718: RADIUS:   6A 0A DC DB 76 E2 DF C0 A2 69 A8 70 E8 41 6B D8            [ jvipAk]

    Jun 10 15:11:18.718: RADIUS:  EAP-Message         [79]  24 

    Jun 10 15:11:18.718: RADIUS:   02 02 00 16 01 43 42 41 5C 50 65 64 72 6F 2E 41 6C 6D 65 69 64  [EmpresaPedro.Almeid]

    Jun 10 15:11:18.718: RADIUS:   61                 [ a]

    Jun 10 15:11:18.718: RADIUS:  NAS-Port-Type       [61]  6   802.11 wireless           [19]

    Jun 10 15:11:18.718: RADIUS:  NAS-Port            [5]   6   358                      

    Jun 10 15:11:18.718: RADIUS:  NAS-Port-Id         [87]  5   "358"

    Jun 10 15:11:18.718: RADIUS:  NAS-IP-Address      [4]   6   172.16.254.116           

    Jun 10 15:11:18.718: RADIUS:  Nas-Identifier      [32]  4   "ap"

    Jun 10 15:11:18.718: RADIUS(000003AF): Sending a IPv4 Radius Packet

    Jun 10 15:11:18.718: RADIUS(000003AF): Started 5 sec timeout

    Jun 10 15:11:18.722: RADIUS: Received from id 1645/65 172.16.0.32:1812, Access-Challenge, len 90

    Jun 10 15:11:18.722: RADIUS:  authenticator C1 78 11 EF 87 D5 52 8A – 01 A4 06 B5 94 4D 75 32

    Jun 10 15:11:18.722: RADIUS:  Session-Timeout     [27]  6   30                       

    Jun 10 15:11:18.722: RADIUS:  EAP-Message         [79]  8  

    Jun 10 15:11:18.722: RADIUS:   01 03 00 06 19 20                 [  ]

    Jun 10 15:11:18.722: RADIUS:  State               [24]  38 

    Jun 10 15:11:18.722: RADIUS:   20 6D 03 29 00 00 01 37 00 01 02 00 AC 10 00 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 7B 20 F3 53         [  m)7 0{ S]

    Jun 10 15:11:18.722: RADIUS:  Message-Authenticato[80]  18 

    Jun 10 15:11:18.726: RADIUS:   65 A4 D8 17 8F 5E 3B 33 B5 97 B6 37 82 E8 E6 76            [ e^;37v]

    Jun 10 15:11:18.726: RADIUS(000003AF): Received from id 1645/65

    Jun 10 15:11:18.726: RADIUS/DECODE: EAP-Message fragments, 6, total 6 bytes

    Jun 10 15:11:18.726: dot11_auth_dot1x_parse_aaa_resp: Received server response: GET_CHALLENGE_RESPONSE

    Jun 10 15:11:18.726: dot11_auth_dot1x_parse_aaa_resp: found session timeout 30 sec

    Jun 10 15:11:18.726: dot11_auth_dot1x_parse_aaa_resp: found eap pak in server response

    Jun 10 15:11:18.726: dot11_auth_dot1x_run_rfsm: Executing Action(SERVER_WAIT,SERVER_REPLY) for 001e.58a2.ba4b

    Jun 10 15:11:18.726: dot11_auth_dot1x_send_response_to_client: Forwarding server message to client 001e.58a2.ba4b

    Jun 10 15:11:18.726: dot11_auth_dot1x_send_response_to_client: Started timer client_timeout 30 seconds

    Jun 10 15:11:18.734: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b

    Jun 10 15:11:18.734: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,CLIENT_REPLY) for 001e.58a2.ba4b

    Jun 10 15:11:18.734: dot11_auth_dot1x_send_response_to_server: Sending client 001e.58a2.ba4b data to server

    Jun 10 15:11:18.734: AAA/AUTHEN/PPP (000003AF): Pick method list ‘eap_methods1’

    Jun 10 15:11:18.734: dot11_auth_dot1x_send_response_to_server: Started timer server_timeout 60 seconds

    Jun 10 15:11:18.734: RADIUS/ENCODE(000003AF):Orig. component type = DOT11

    Jun 10 15:11:18.734: RADIUS:  AAA Unsupported Attr: ssid              [347] 2  

    Jun 10 15:11:18.734: RADIUS:  AAA Unsupported Attr: service-type      [345] 4   1

    Jun 10 15:11:18.734: RADIUS:  AAA Unsupported Attr: interface         [222] 3  

    Jun 10 15:11:18.734: RADIUS:   33                 [ 3]

    Jun 10 15:11:18.734: RADIUS(000003AF): Config NAS IP: 172.16.254.116

    Jun 10 15:11:18.734: RADIUS(000003AF): Config NAS IPv6:

    Jun 10 15:11:18.734: RADIUS/ENCODE(000003AF): acct_session_id: 931

    Jun 10 15:11:18.738: RADIUS(000003AF): Config NAS IP: 172.16.254.116

    Jun 10 15:11:18.738: RADIUS(000003AF): sending

    Jun 10 15:11:18.738: RADIUS(000003AF): Send Access-Request to 172.16.0.32:1812 id 1645/66, len 279

    Jun 10 15:11:18.738: RADIUS:  authenticator B0 62 8C 3F 5B 6F 37 6E – 46 22 B8 8A 6F BE B5 17

    Jun 10 15:11:18.738: RADIUS:  User-Name           [1]   19  "EmpresaPedro.Almeida"

    Jun 10 15:11:18.738: RADIUS:  Framed-MTU          [12]  6   1400                     

    Jun 10 15:11:18.738: RADIUS:  Called-Station-Id   [30]  22  "2C-3E-CF-0B-BF-60:1A"

    Jun 10 15:11:18.738: RADIUS:  Calling-Station-Id  [31]  16  "001e.58a2.ba4b"

    Jun 10 15:11:18.738: RADIUS:  Service-Type        [6]   6   Login                     [1]

    Jun 10 15:11:18.738: RADIUS:  Message-Authenticato[80]  18 

    Jun 10 15:11:18.738: RADIUS:   A9 00 6C A4 2A 55 2A 19 D9 85 87 3B 6D 99 73 0A           [ l*U*;ms]

    Jun 10 15:11:18.738: RADIUS:  EAP-Message         [79]  107

    Jun 10 15:11:18.738: RADIUS:   02 03 00 69 19 80 00 00 00 5F 16 03 01 00 5A 01 00 00 56 03 01 53 97 4A 5C 97 7D D0 49 A6 7B D4 14 96 7A 5B 06 A7 AF 89 EB 74 91 3B 62 CB AC 64  [i_ZVSJ}I{z[t;bd]

    Jun 10 15:11:18.738: RADIUS:   8A DE D7 98 78 00 00 18 00 2F 00 35 00 05 00 0A C0 13 C0 14 C0 09 C0 0A 00 32 00 38 00 13 00 04 01 00 00 15 FF 01 00 01 00 00 0A 00 06 00 04 00 17 00 18 00 0B 00 02 01 00             [ x/528]

    Jun 10 15:11:18.738: RADIUS:  NAS-Port-Type       [61]  6   802.11 wireless           [19]

    Jun 10 15:11:18.738: RADIUS:  NAS-Port            [5]   6   358                      

    Jun 10 15:11:18.738: RADIUS:  NAS-Port-Id         [87]  5   "358"

    Jun 10 15:11:18.738: RADIUS:  State               [24]  38 

    Jun 10 15:11:18.738: RADIUS:   20 6D 03 29 00 00 01 37 00 01 02 00 AC 10 00 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 7B 20 F3 53         [  m)7 0{ S]

    Jun 10 15:11:18.738: RADIUS:  NAS-IP-Address      [4]   6   172.16.254.116           

    Jun 10 15:11:18.738: RADIUS:  Nas-Identifier      [32]  4   "ap"

    Jun 10 15:11:18.738: RADIUS(000003AF): Sending a IPv4 Radius Packet

    Jun 10 15:11:18.738: RADIUS(000003AF): Started 5 sec timeout

    Jun 10 15:11:23.734: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b

    Jun 10 15:11:23.734: dot11_auth_dot1x_run_rfsm: Executing Action(SERVER_WAIT,EAP_START) for 001e.58a2.ba4b

    Jun 10 15:11:23.734: dot11_auth_dot1x_ignore_event: Ignore event: do nothing

    Jun 10 15:11:23.762: RADIUS(000003AF): Request timed out

    Jun 10 15:11:23.762: RADIUS: Retransmit to (172.16.0.32:1812,1813) for id 1645/66

    Jun 10 15:11:23.762: RADIUS(000003AF): Started 5 sec timeout

    Jun 10 15:11:24.750: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b

    Jun 10 15:11:24.750: dot11_auth_dot1x_run_rfsm: Executing Action(SERVER_WAIT,EAP_START) for 001e.58a2.ba4b

    Jun 10 15:11:24.750: dot11_auth_dot1x_ignore_event: Ignore event: do nothing

    Jun 10 15:11:25.762: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b

    Jun 10 15:11:25.762: dot11_auth_dot1x_run_rfsm: Executing Action(SERVER_WAIT,EAP_START) for 001e.58a2.ba4b

    Jun 10 15:11:25.762: dot11_auth_dot1x_ignore_event: Ignore event: do nothing

    Jun 10 15:11:27.626: AAA/BIND(000003B0): Bind i/f 

    Jun 10 15:11:27.626: dot11_auth_dot1x_start: in the dot11_auth_dot1x_start

    Jun 10 15:11:27.626: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 001e.58a2.ba4b

    Jun 10 15:11:27.626: dot11_auth_dot1x_send_id_req_to_client: Client 001e.58a2.ba4b timer started for 30 seconds

    Jun 10 15:11:27.670: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b

    Jun 10 15:11:27.670: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,EAP_START) for 001e.58a2.ba4b

    Jun 10 15:11:27.670: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 001e.58a2.ba4b

    Jun 10 15:11:27.670: dot11_auth_dot1x_send_id_req_to_client: Client 001e.58a2.ba4b timer started for 30 seconds

    Jun 10 15:11:28.274: RADIUS(000003AF): Request timed out

    Jun 10 15:11:28.274: RADIUS: Retransmit to (172.16.0.32:1812,1813) for id 1645/66

    Jun 10 15:11:28.274: RADIUS(000003AF): Started 5 sec timeout

    Jun 10 15:11:28.718: AAA/BIND(000003B1): Bind i/f 

    Jun 10 15:11:28.718: dot11_auth_dot1x_start: in the dot11_auth_dot1x_start

    Jun 10 15:11:28.718: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 001e.58a2.ba4b

    Jun 10 15:11:28.718: dot11_auth_dot1x_send_id_req_to_client: Client 001e.58a2.ba4b timer started for 30 seconds

    Jun 10 15:11:32.946: RADIUS(000003AF): Request timed out

    Jun 10 15:11:32.946: RADIUS: Retransmit to (172.16.0.32:1812,1813) for id 1645/66

    Jun 10 15:11:32.946: RADIUS(000003AF): Started 5 sec timeout

    Jun 10 15:11:37.242: RADIUS(000003AF): Request timed out

    Jun 10 15:11:37.242: RADIUS: Retransmit to (172.16.0.32:1812,1813) for id 1645/66

    Jun 10 15:11:37.242: RADIUS(000003AF): Started 5 sec timeout

    Jun 10 15:11:41.562: RADIUS(000003AF): Request timed out

    Jun 10 15:11:41.562: RADIUS: Fail-over denied to  (172.16.0.32:1812,1813) for id 1645/66

    Jun 10 15:11:41.562: RADIUS: No response from (172.16.0.32:1812,1813) for id 1645/66

    Jun 10 15:11:41.562: RADIUS/DECODE: No response from radius-server; parse response; FAIL

    Jun 10 15:11:41.562: RADIUS/DECODE: Case error(no response/ bad packet/ op decode);parse response; FAIL

    ap#

Visualizando 25 posts - 1 até 25 (de 123 do total)