Respostas no Fórum
-
AutorPosts
-
pedrophspParticipantepedrophspParticipante
O que eu entendi é que ele quer mudar o caminho do endereço do destino 8.4.4.0 via R4.
Atual LAN 128.0.1.0/24>R1 destino 8.4.4.0 via R3
LAN 128.0.2.0/24>R1Proposto LAN 128.0.1.0/24>R1 destino 8.4.4.0 via R3
LAN 128.0.2.0/24>R1 destino 8.4.4.0 via R4Queria saber como fizeram essa “distribuição” nos links. Eu só consigo manipular as rotas que estão na RIB, certo? No caso de um endereço público, consigo criar um route-map com match a esse ip e set para o As secundário ou usaria o next-hop?
Abraços
pedrophspParticipanteOlá pessoal, conseguiram resolver a questão do balanceamento?
pedrophspParticipanteOlá Zekkerj,
Sim, foi o único "valor" de rotas que encontrei sobre o OSPF. Vi alguns cenários com mais de 1000 rotas, com certeza depende muito do hw do equipamento.
Obrigado pelo suporte.
pedrophspParticipanteEm alguns fóruns encontrei cenários com muito mais rotas do que mencionada na documentação da cisco.
"OSPF for Routed Access: Starting from Cisco IOS Release 12.2(55)SE, the IP Base image supports a new feature called OSPF for Routed Access. OSPF for Routed Access is designed specifically to enable you to extend Layer 3 routing capabilities to the wiring closet. It supports only one OSPFv2 and one OSPFv3 instance, with a maximum number of 200 dynamically learned routes."
pedrophspParticipanteÉ o que estou pensando…Quero ver se em alguma documentação da Cisco conste essa informação. Obrigado Daniel
WS-C4510R+E
License Information for ‘WS-X45-SUP7-E’
License Level: ipbase Type: Permanent
Next reboot license Level: ipbase
cat4500e-universal.SPA.03.05.03.E.152-1.E3.bin
pedrophspParticipanteOlá pessoal, tudo bem?
Alguém fez o novo exame 300-135?
pedrophspParticipanteOlá pessoal,
Fiz a prova de switching (19/11) e realmente cairam os labs AAA dot1x, LACP e MLS/EIGRP e muito sobre FHRP. Agora, começando o route da CloudCampus 🙂
pedrophspParticipanteOlá Leonardo, tudo bem?
STP caiu muita coisa?
Abraços.
novembro 2, 2014 às 9:02 am em resposta a: Curso de Linux que custava US$ 2.400 será oferecido de graça na internet #113352pedrophspParticipanteOlá pessoal,
Fiz este curso e gostei muito. Na época pensei que era equivalente ao LPI e resolvi fazer. Quando chegou na hora do certificado tinha que pagar 250us. Achei caro e não paguei. Então preferi focar para LPI que são reconhecidas em todo o lugar e compensa o investimento.
Grande abraço.
pedrophspParticipanteJundiaí?
pedrophspParticipanteOrra 25 mil eu andava de mercedes c250 kkkk tranquilooo sendo CLT ou não. O importante é curtir o emprego.
pedrophspParticipanteFlyner, obrigado pela informação.
pedrophspParticipanteSó queria saber mesmo o que era o INE, achei no google "http://www.ine.com/self-paced/ccnp/bootcamps/ccnp-routing-switching-course.htm" . Estou me organizando para começar os estudos para CCNP (sw, route e tshoot).
Diego, meu email é [email protected]
Obrigado.
pedrophspParticipanteOlá Diego, parabéns pela conquista! Sucesso…
Essas video aulas INE são pagas?
pedrophspParticipanteSó iniciante?
pedrophspParticipanteDesculpem pelo meu jeito de expressar, mas se júnior é mais ou menos isso, o pleno tem que cobrar o escanteio e cabecear pro gol, ou bater o penalti ir ao gol pegar. É mais uma vaga que você tem que saber de tudo e ainda engraxar sapato.
Vejo muitas vagas assim, temos que torcer para que 1 se encaixe com o seu perfil.
pedrophspParticipanteParabéns Fernando, sucesso.
pedrophspParticipanteAldrin, consegui resolver.
Obrigado.
I solved this problem. I configured one more option in Connection Request Policies – My Policy:
Settings Value
Authentication Provider Local Computer
Extensible Authentication Protocol Method Microsoft: Protected EAP (PEAP)
Override Authentication Disabled
Extensible Authentication Protocol Configuration Configure
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
In Network Policies – My Policy
Settings Value
Authentication Method EAP
Access Permission Grand Access
Update Noncompliant Client True
NAP Enforcement Allow full network access
Extensible Authentication Protocol Method Microsoft: Protected EAP (PEAP)
Extensible Authentication Protocol Configuration Configure
Extended State <Blank>
BAP Percentage of Capacity ReduceMultink if server reaches 50% for 2 minutes
Encryption Basic encryption (MPPE 40-bit), Strong encryption (MPPE 56-bit), Strongest encryption (MPPE 128-bit)
Encryption Policy Enabled
NAS Port Type Wireless – IEEE 802.11
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
This options ( in red ) i added in my NPS and the authentication working now.
Valeu..
pedrophspParticipanteAlias 1600, me desculpe srsr
pedrophspParticipanteCisco IOS Software, C1600 Software (AP1G2-K9W7-M), Version 15.2(2)JB2, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2013 by Cisco Systems, Inc.
Compiled Mon 29-Jul-13 12:16 by prod_rel_team
pedrophspParticipanteNeste tutorial, fala sobre a alteração do atributo para equipamento Cisco.
http://www.networkingnut.net/configuring-radius-server-on-windows-2008-r2-for-cisco-device-logins/
pedrophspParticipanteConcordo com você. O server está sim com o Microsoft Protected EAP – EAP MSCHAPv2.
O cliente (aironet) só tem a opção Methods Accepted: with EAP (imagem2).
Se tive alguma opção como na figura "metodo de autenticacao" para configurar o EAP, mas não tem….
pedrophspParticipanteSim, sempre deixei standard pois os fabricantes que usava naõ continha na lista do Vendor.
EventViewer
Authentication Details:
Connection Request Policy Name: Empresa – Wireless
Network Policy Name: Empresa – Redes Wireless
Authentication Provider: Windows
Authentication Server: empresa.local
Authentication Type: EAP
EAP Type: –
Account Session Identifier: –
Logging Results: Accounting information was written to the local log file.
Reason Code: 22
Reason: The client could not be authenticated because the Extensible Authentication Protocol (EAP) Type cannot be processed by the server.
Testei em outra máquina, retorna o mesmo erro.
Li algo sobre alterar alguns atributos que no Cisco é diferente do RADIUS, também no log tem uma parte que não é suportado:
un 10 15:11:18.734: RADIUS: AAA Unsupported Attr: ssid [347] 2
Jun 10 15:11:18.734: RADIUS: AAA Unsupported Attr: service-type [345] 4 1
Jun 10 15:11:18.734: RADIUS: AAA Unsupported Attr: interface [222] 3
To pesquisando, vamos ver se encontro a solução. Não quero fazer nenhuma alteração no meu RADIUS- server pois ele está em produção e não vejo problema na configuração dele.
pedrophspParticipanteFiz o degub no ap, vou procurar na net se tem algo relacionado a isso.
ap#
Jun 10 15:11:17.626: AAA/BIND(000003AE): Bind i/f
Jun 10 15:11:17.626: dot11_auth_dot1x_start: in the dot11_auth_dot1x_start
Jun 10 15:11:17.626: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 001e.58a2.ba4b
Jun 10 15:11:17.626: dot11_auth_dot1x_send_id_req_to_client: Client 001e.58a2.ba4b timer started for 30 seconds
Jun 10 15:11:17.670: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b
Jun 10 15:11:17.670: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,EAP_START) for 001e.58a2.ba4b
Jun 10 15:11:17.670: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 001e.58a2.ba4b
Jun 10 15:11:17.670: dot11_auth_dot1x_send_id_req_to_client: Client 001e.58a2.ba4b timer started for 30 seconds
Jun 10 15:11:17.734: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b
Jun 10 15:11:17.734: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,CLIENT_REPLY) for 001e.58a2.ba4b
Jun 10 15:11:17.734: dot11_auth_dot1x_send_response_to_server: Sending client 001e.58a2.ba4b data to server
Jun 10 15:11:17.734: AAA/AUTHEN/PPP (000003AE): Pick method list ‘eap_methods1’
Jun 10 15:11:17.734: dot11_auth_dot1x_send_response_to_server: Started timer server_timeout 60 seconds
Jun 10 15:11:17.734: RADIUS/ENCODE(000003AE):Orig. component type = DOT11
Jun 10 15:11:17.734: RADIUS: AAA Unsupported Attr: ssid [347] 2
Jun 10 15:11:17.734: RADIUS: AAA Unsupported Attr: service-type [345] 4 1
Jun 10 15:11:17.734: RADIUS: AAA Unsupported Attr: interface [222] 3
Jun 10 15:11:17.734: RADIUS: 33 [ 3]
Jun 10 15:11:17.734: RADIUS(000003AE): Config NAS IP: 172.16.254.116
Jun 10 15:11:17.734: RADIUS(000003AE): Config NAS IPv6:
Jun 10 15:11:17.734: RADIUS/ENCODE(000003AE): acct_session_id: 930
Jun 10 15:11:17.734: RADIUS(000003AE): Config NAS IP: 172.16.254.116
Jun 10 15:11:17.734: RADIUS(000003AE): sending
Jun 10 15:11:17.734: RADIUS(000003AE): Send Access-Request to 172.16.0.32:1812 id 1645/64, len 176
Jun 10 15:11:17.734: RADIUS: authenticator 28 49 B0 61 F5 A0 C9 CB – 09 C6 A3 74 BA 90 A4 F4
Jun 10 15:11:17.734: RADIUS: User-Name [1] 28 "host/WM-WSUS-998.empresa.local"
Jun 10 15:11:17.734: RADIUS: Framed-MTU [12] 6 1400
Jun 10 15:11:17.734: RADIUS: Called-Station-Id [30] 22 "2C-3E-CF-0B-BF-60:1A"
Jun 10 15:11:17.734: RADIUS: Calling-Station-Id [31] 16 "001e.58a2.ba4b"
Jun 10 15:11:17.734: RADIUS: Service-Type [6] 6 Login [1]
Jun 10 15:11:17.734: RADIUS: Message-Authenticato[80] 18
Jun 10 15:11:17.734: RADIUS: E8 41 93 41 BF D0 5F E3 F4 F0 08 96 91 4F 32 B3 [ AA_O2]
Jun 10 15:11:17.734: RADIUS: EAP-Message [79] 33
Jun 10 15:11:17.738: RADIUS: 02 02 00 1F 01 68 6F 73 74 2F 57 4D 2D 57 53 55 53 2D 39 39 38 [host/WM-WSUS-998]
Jun 10 15:11:17.738: RADIUS: 2E 63 62 61 2E 6C 6F 63 61 6C [ .cba.local]
Jun 10 15:11:17.738: RADIUS: NAS-Port-Type [61] 6 802.11 wireless [19]
Jun 10 15:11:17.738: RADIUS: NAS-Port [5] 6 357
Jun 10 15:11:17.738: RADIUS: NAS-Port-Id [87] 5 "357"
Jun 10 15:11:17.738: RADIUS: NAS-IP-Address [4] 6 172.16.254.116
Jun 10 15:11:17.738: RADIUS: Nas-Identifier [32] 4 "ap"
Jun 10 15:11:17.738: RADIUS(000003AE): Sending a IPv4 Radius Packet
Jun 10 15:11:17.738: RADIUS(000003AE): Started 5 sec timeout
Jun 10 15:11:17.738: RADIUS: Received from id 1645/64 172.16.0.32:1812, Access-Reject, len 44
Jun 10 15:11:17.738: RADIUS: authenticator 24 C7 7C A3 D9 18 CE 9C – 18 E3 E8 4C 6B B3 F3 EB
Jun 10 15:11:17.738: RADIUS: EAP-Message [79] 6
Jun 10 15:11:17.738: RADIUS: 04 02 00 04
Jun 10 15:11:17.738: RADIUS: Message-Authenticato[80] 18
Jun 10 15:11:17.738: RADIUS: 7D D8 FD 68 DE 63 DC 5C C4 6F 0D 36 C9 D7 EE 9B [ }hco6]
Jun 10 15:11:17.742: RADIUS(000003AE): Received from id 1645/64
Jun 10 15:11:17.742: RADIUS/DECODE: EAP-Message fragments, 4, total 4 bytes
Jun 10 15:11:17.742: dot11_auth_dot1x_parse_aaa_resp: Received server response: FAIL
Jun 10 15:11:17.742: dot11_auth_dot1x_parse_aaa_resp: found eap pak in server response
Jun 10 15:11:17.742: Client 001e.58a2.ba4b failed: by EAP authentication server
Jun 10 15:11:17.742: dot11_auth_dot1x_run_rfsm: Executing Action(SERVER_WAIT,SERVER_FAIL) for 001e.58a2.ba4b
Jun 10 15:11:17.742: dot11_auth_dot1x_send_response_to_client: Forwarding server message to client 001e.58a2.ba4b
Jun 10 15:11:17.742: dot11_auth_dot1x_send_response_to_client: Started timer client_timeout 30 seconds
Jun 10 15:11:17.742: dot11_auth_dot1x_send_client_fail: Authentication failed for 001e.58a2.ba4b
Jun 10 15:11:17.742: %DOT11-7-AUTH_FAILED: Station 001e.58a2.ba4b Authentication failed
Jun 10 15:11:18.626: AAA/BIND(000003AF): Bind i/f
Jun 10 15:11:18.626: dot11_auth_dot1x_start: in the dot11_auth_dot1x_start
Jun 10 15:11:18.626: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 001e.58a2.ba4b
Jun 10 15:11:18.626: dot11_auth_dot1x_send_id_req_to_client: Client 001e.58a2.ba4b timer started for 30 seconds
Jun 10 15:11:18.674: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b
Jun 10 15:11:18.674: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,EAP_START) for 001e.58a2.ba4b
Jun 10 15:11:18.674: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 001e.58a2.ba4b
Jun 10 15:11:18.674: dot11_auth_dot1x_send_id_req_to_client: Client 001e.58a2.ba4b timer started for 30 seconds
Jun 10 15:11:18.718: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b
Jun 10 15:11:18.718: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,CLIENT_REPLY) for 001e.58a2.ba4b
Jun 10 15:11:18.718: dot11_auth_dot1x_send_response_to_server: Sending client 001e.58a2.ba4b data to server
Jun 10 15:11:18.718: AAA/AUTHEN/PPP (000003AF): Pick method list ‘eap_methods1’
Jun 10 15:11:18.718: dot11_auth_dot1x_send_response_to_server: Started timer server_timeout 60 seconds
Jun 10 15:11:18.718: RADIUS/ENCODE(000003AF):Orig. component type = DOT11
Jun 10 15:11:18.718: RADIUS: AAA Unsupported Attr: ssid [347] 2
Jun 10 15:11:18.718: RADIUS: AAA Unsupported Attr: service-type [345] 4 1
Jun 10 15:11:18.718: RADIUS: AAA Unsupported Attr: interface [222] 3
Jun 10 15:11:18.718: RADIUS: 33 [ 3]
Jun 10 15:11:18.718: RADIUS(000003AF): Config NAS IP: 172.16.254.116
Jun 10 15:11:18.718: RADIUS(000003AF): Config NAS IPv6:
Jun 10 15:11:18.718: RADIUS/ENCODE(000003AF): acct_session_id: 931
Jun 10 15:11:18.718: RADIUS(000003AF): Config NAS IP: 172.16.254.116
Jun 10 15:11:18.718: RADIUS(000003AF): sending
Jun 10 15:11:18.718: RADIUS(000003AF): Send Access-Request to 172.16.0.32:1812 id 1645/65, len 158
Jun 10 15:11:18.718: RADIUS: authenticator 7E 23 58 CD B6 E3 BC 0A – 86 49 37 61 D4 DA AF 02
Jun 10 15:11:18.718: RADIUS: User-Name [1] 19 "EmpresaPedro.Almeida"
Jun 10 15:11:18.718: RADIUS: Framed-MTU [12] 6 1400
Jun 10 15:11:18.718: RADIUS: Called-Station-Id [30] 22 "2C-3E-CF-0B-BF-60:1A"
Jun 10 15:11:18.718: RADIUS: Calling-Station-Id [31] 16 "001e.58a2.ba4b"
Jun 10 15:11:18.718: RADIUS: Service-Type [6] 6 Login [1]
Jun 10 15:11:18.718: RADIUS: Message-Authenticato[80] 18
Jun 10 15:11:18.718: RADIUS: 6A 0A DC DB 76 E2 DF C0 A2 69 A8 70 E8 41 6B D8 [ jvipAk]
Jun 10 15:11:18.718: RADIUS: EAP-Message [79] 24
Jun 10 15:11:18.718: RADIUS: 02 02 00 16 01 43 42 41 5C 50 65 64 72 6F 2E 41 6C 6D 65 69 64 [EmpresaPedro.Almeid]
Jun 10 15:11:18.718: RADIUS: 61 [ a]
Jun 10 15:11:18.718: RADIUS: NAS-Port-Type [61] 6 802.11 wireless [19]
Jun 10 15:11:18.718: RADIUS: NAS-Port [5] 6 358
Jun 10 15:11:18.718: RADIUS: NAS-Port-Id [87] 5 "358"
Jun 10 15:11:18.718: RADIUS: NAS-IP-Address [4] 6 172.16.254.116
Jun 10 15:11:18.718: RADIUS: Nas-Identifier [32] 4 "ap"
Jun 10 15:11:18.718: RADIUS(000003AF): Sending a IPv4 Radius Packet
Jun 10 15:11:18.718: RADIUS(000003AF): Started 5 sec timeout
Jun 10 15:11:18.722: RADIUS: Received from id 1645/65 172.16.0.32:1812, Access-Challenge, len 90
Jun 10 15:11:18.722: RADIUS: authenticator C1 78 11 EF 87 D5 52 8A – 01 A4 06 B5 94 4D 75 32
Jun 10 15:11:18.722: RADIUS: Session-Timeout [27] 6 30
Jun 10 15:11:18.722: RADIUS: EAP-Message [79] 8
Jun 10 15:11:18.722: RADIUS: 01 03 00 06 19 20 [ ]
Jun 10 15:11:18.722: RADIUS: State [24] 38
Jun 10 15:11:18.722: RADIUS: 20 6D 03 29 00 00 01 37 00 01 02 00 AC 10 00 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 7B 20 F3 53 [ m)7 0{ S]
Jun 10 15:11:18.722: RADIUS: Message-Authenticato[80] 18
Jun 10 15:11:18.726: RADIUS: 65 A4 D8 17 8F 5E 3B 33 B5 97 B6 37 82 E8 E6 76 [ e^;37v]
Jun 10 15:11:18.726: RADIUS(000003AF): Received from id 1645/65
Jun 10 15:11:18.726: RADIUS/DECODE: EAP-Message fragments, 6, total 6 bytes
Jun 10 15:11:18.726: dot11_auth_dot1x_parse_aaa_resp: Received server response: GET_CHALLENGE_RESPONSE
Jun 10 15:11:18.726: dot11_auth_dot1x_parse_aaa_resp: found session timeout 30 sec
Jun 10 15:11:18.726: dot11_auth_dot1x_parse_aaa_resp: found eap pak in server response
Jun 10 15:11:18.726: dot11_auth_dot1x_run_rfsm: Executing Action(SERVER_WAIT,SERVER_REPLY) for 001e.58a2.ba4b
Jun 10 15:11:18.726: dot11_auth_dot1x_send_response_to_client: Forwarding server message to client 001e.58a2.ba4b
Jun 10 15:11:18.726: dot11_auth_dot1x_send_response_to_client: Started timer client_timeout 30 seconds
Jun 10 15:11:18.734: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b
Jun 10 15:11:18.734: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,CLIENT_REPLY) for 001e.58a2.ba4b
Jun 10 15:11:18.734: dot11_auth_dot1x_send_response_to_server: Sending client 001e.58a2.ba4b data to server
Jun 10 15:11:18.734: AAA/AUTHEN/PPP (000003AF): Pick method list ‘eap_methods1’
Jun 10 15:11:18.734: dot11_auth_dot1x_send_response_to_server: Started timer server_timeout 60 seconds
Jun 10 15:11:18.734: RADIUS/ENCODE(000003AF):Orig. component type = DOT11
Jun 10 15:11:18.734: RADIUS: AAA Unsupported Attr: ssid [347] 2
Jun 10 15:11:18.734: RADIUS: AAA Unsupported Attr: service-type [345] 4 1
Jun 10 15:11:18.734: RADIUS: AAA Unsupported Attr: interface [222] 3
Jun 10 15:11:18.734: RADIUS: 33 [ 3]
Jun 10 15:11:18.734: RADIUS(000003AF): Config NAS IP: 172.16.254.116
Jun 10 15:11:18.734: RADIUS(000003AF): Config NAS IPv6:
Jun 10 15:11:18.734: RADIUS/ENCODE(000003AF): acct_session_id: 931
Jun 10 15:11:18.738: RADIUS(000003AF): Config NAS IP: 172.16.254.116
Jun 10 15:11:18.738: RADIUS(000003AF): sending
Jun 10 15:11:18.738: RADIUS(000003AF): Send Access-Request to 172.16.0.32:1812 id 1645/66, len 279
Jun 10 15:11:18.738: RADIUS: authenticator B0 62 8C 3F 5B 6F 37 6E – 46 22 B8 8A 6F BE B5 17
Jun 10 15:11:18.738: RADIUS: User-Name [1] 19 "EmpresaPedro.Almeida"
Jun 10 15:11:18.738: RADIUS: Framed-MTU [12] 6 1400
Jun 10 15:11:18.738: RADIUS: Called-Station-Id [30] 22 "2C-3E-CF-0B-BF-60:1A"
Jun 10 15:11:18.738: RADIUS: Calling-Station-Id [31] 16 "001e.58a2.ba4b"
Jun 10 15:11:18.738: RADIUS: Service-Type [6] 6 Login [1]
Jun 10 15:11:18.738: RADIUS: Message-Authenticato[80] 18
Jun 10 15:11:18.738: RADIUS: A9 00 6C A4 2A 55 2A 19 D9 85 87 3B 6D 99 73 0A [ l*U*;ms]
Jun 10 15:11:18.738: RADIUS: EAP-Message [79] 107
Jun 10 15:11:18.738: RADIUS: 02 03 00 69 19 80 00 00 00 5F 16 03 01 00 5A 01 00 00 56 03 01 53 97 4A 5C 97 7D D0 49 A6 7B D4 14 96 7A 5B 06 A7 AF 89 EB 74 91 3B 62 CB AC 64 [i_ZVSJ}I{z[t;bd]
Jun 10 15:11:18.738: RADIUS: 8A DE D7 98 78 00 00 18 00 2F 00 35 00 05 00 0A C0 13 C0 14 C0 09 C0 0A 00 32 00 38 00 13 00 04 01 00 00 15 FF 01 00 01 00 00 0A 00 06 00 04 00 17 00 18 00 0B 00 02 01 00 [ x/528]
Jun 10 15:11:18.738: RADIUS: NAS-Port-Type [61] 6 802.11 wireless [19]
Jun 10 15:11:18.738: RADIUS: NAS-Port [5] 6 358
Jun 10 15:11:18.738: RADIUS: NAS-Port-Id [87] 5 "358"
Jun 10 15:11:18.738: RADIUS: State [24] 38
Jun 10 15:11:18.738: RADIUS: 20 6D 03 29 00 00 01 37 00 01 02 00 AC 10 00 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 7B 20 F3 53 [ m)7 0{ S]
Jun 10 15:11:18.738: RADIUS: NAS-IP-Address [4] 6 172.16.254.116
Jun 10 15:11:18.738: RADIUS: Nas-Identifier [32] 4 "ap"
Jun 10 15:11:18.738: RADIUS(000003AF): Sending a IPv4 Radius Packet
Jun 10 15:11:18.738: RADIUS(000003AF): Started 5 sec timeout
Jun 10 15:11:23.734: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b
Jun 10 15:11:23.734: dot11_auth_dot1x_run_rfsm: Executing Action(SERVER_WAIT,EAP_START) for 001e.58a2.ba4b
Jun 10 15:11:23.734: dot11_auth_dot1x_ignore_event: Ignore event: do nothing
Jun 10 15:11:23.762: RADIUS(000003AF): Request timed out
Jun 10 15:11:23.762: RADIUS: Retransmit to (172.16.0.32:1812,1813) for id 1645/66
Jun 10 15:11:23.762: RADIUS(000003AF): Started 5 sec timeout
Jun 10 15:11:24.750: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b
Jun 10 15:11:24.750: dot11_auth_dot1x_run_rfsm: Executing Action(SERVER_WAIT,EAP_START) for 001e.58a2.ba4b
Jun 10 15:11:24.750: dot11_auth_dot1x_ignore_event: Ignore event: do nothing
Jun 10 15:11:25.762: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b
Jun 10 15:11:25.762: dot11_auth_dot1x_run_rfsm: Executing Action(SERVER_WAIT,EAP_START) for 001e.58a2.ba4b
Jun 10 15:11:25.762: dot11_auth_dot1x_ignore_event: Ignore event: do nothing
Jun 10 15:11:27.626: AAA/BIND(000003B0): Bind i/f
Jun 10 15:11:27.626: dot11_auth_dot1x_start: in the dot11_auth_dot1x_start
Jun 10 15:11:27.626: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 001e.58a2.ba4b
Jun 10 15:11:27.626: dot11_auth_dot1x_send_id_req_to_client: Client 001e.58a2.ba4b timer started for 30 seconds
Jun 10 15:11:27.670: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b
Jun 10 15:11:27.670: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,EAP_START) for 001e.58a2.ba4b
Jun 10 15:11:27.670: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 001e.58a2.ba4b
Jun 10 15:11:27.670: dot11_auth_dot1x_send_id_req_to_client: Client 001e.58a2.ba4b timer started for 30 seconds
Jun 10 15:11:28.274: RADIUS(000003AF): Request timed out
Jun 10 15:11:28.274: RADIUS: Retransmit to (172.16.0.32:1812,1813) for id 1645/66
Jun 10 15:11:28.274: RADIUS(000003AF): Started 5 sec timeout
Jun 10 15:11:28.718: AAA/BIND(000003B1): Bind i/f
Jun 10 15:11:28.718: dot11_auth_dot1x_start: in the dot11_auth_dot1x_start
Jun 10 15:11:28.718: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 001e.58a2.ba4b
Jun 10 15:11:28.718: dot11_auth_dot1x_send_id_req_to_client: Client 001e.58a2.ba4b timer started for 30 seconds
Jun 10 15:11:32.946: RADIUS(000003AF): Request timed out
Jun 10 15:11:32.946: RADIUS: Retransmit to (172.16.0.32:1812,1813) for id 1645/66
Jun 10 15:11:32.946: RADIUS(000003AF): Started 5 sec timeout
Jun 10 15:11:37.242: RADIUS(000003AF): Request timed out
Jun 10 15:11:37.242: RADIUS: Retransmit to (172.16.0.32:1812,1813) for id 1645/66
Jun 10 15:11:37.242: RADIUS(000003AF): Started 5 sec timeout
Jun 10 15:11:41.562: RADIUS(000003AF): Request timed out
Jun 10 15:11:41.562: RADIUS: Fail-over denied to (172.16.0.32:1812,1813) for id 1645/66
Jun 10 15:11:41.562: RADIUS: No response from (172.16.0.32:1812,1813) for id 1645/66
Jun 10 15:11:41.562: RADIUS/DECODE: No response from radius-server; parse response; FAIL
Jun 10 15:11:41.562: RADIUS/DECODE: Case error(no response/ bad packet/ op decode);parse response; FAIL
ap#
-
AutorPosts