Description of 802.1X Authentication Trace Information
This section describes trace information about wireless 802.1X authentication.
In 802.1X authentication scenarios, the client and server need to interact with each other in many steps. If a large number of trace packets are concurrently printed within 1s, trace information may be lost. If key information is missing, you are advised to collect debugging information or obtain trace packets on the server-side interface.
Collect debugging information.
<AC> debugging cm <AC> debugging aaa all <AC> debugging radius all <AC> debugging tm all <AC> terminal monitor <AC> terminal debugging
Wireless 802.1X Authentication Process
Module Overview
Module name |
Function |
---|---|
EAP |
Processes EAP packets exchanged between the device and users. |
CM |
Manages the login, logout, and authorization of authenticated users. |
AAA |
Manages user authentication domains, authentication policies, accounting policies, and authorization policies. |
RADIUS |
Processes packets exchanged between the device and RADIUS server. |
TM |
Forwards authorization messages. |
WLAN_AC |
Processes STA association messages and communicates with APs. |
AP |
Processes user packets, performs four-way handshake with users to negotiate keys, and communicates with the AC. |
Wireless EAP-TLS Authentication Process
Description of the Wireless 802.1X Authentication Process
- Wi-Fi network association phase: If a STA successfully associates with the Wi-Fi network, the WLAN module sends an authentication request packet to the EAP module. If the association fails, the STA leaves the network.
- EAP authentication negotiation phase:
- The AC sends an EAP Request Identity packet to obtain the user name. (After receiving the authentication start packet from the WLAN module, the EAP module sends an EAP Request Identity packet. If the STA sends an EAP Start packet, the AC is triggered to send an EAP Request Identity packet again.)
- The STA sends an EAP Response Identity packet carrying the user name to the AC. The AC then forwards this packet to the RADIUS server through a RADIUS Access Request packet.
- The AC forwards the EAP Request in the RADIUS Access Challenge packet to the STA for negotiating the EAP authentication mode (EAP-TLS, EAP-PEAP, etc.). If the STA accepts the EAP authentication mode of the server, the STA sends a Client Hello packet. Otherwise, the STA sends an EAP NAK packet carrying the expected authentication mode. Then the server sends another EAP authentication mode.
- TLS tunnel negotiation and EAP authentication phase: The EAP-TLS authentication mode is used as an example to describe RADIUS and EAP packets exchanged in this phase.
- The STA sends a Client Hello packet carrying a random number, a list of supported encryption algorithms, and supported TLS protocol versions.
- The RADIUS server sends a Server Hello packet carrying the TLS version to be used, a random number generated by the server, the encryption algorithm to be used, the server certificate (if its size exceeds the MTU, the EAP RADIUS attribute is encapsulated in multiple RADIUS packets for transmission), and the client certificate request.
- If the STA accepts the Server Hello packet, it sends an EAP Response packet carrying a random number, a code change notification, the client certificate (if its size exceeds the MTU, the EAP RADIUS attribute is encapsulated in multiple RADIUS packets for transmission), and the TLS Finished attribute.
- The RADIUS server sends a Change-Cipher-Spec packet carrying the TLS Finished attribute to establish a TLS tunnel.
- Authorization phase after successful authentication: The AC sends a RADIUS Access Accept packet carrying authorization information (such as VLAN, ACL, Redirect-URL, User-Group, and CAR) to the AP. If the authorization succeeds, the AC sends a RADIUS Accounting Request packet to instruct the RADIUS server to start accounting.
- Authentication success notification phase: If the RADIUS server successfully authenticates the STA, the AC forwards the RADIUS Access Accept packet carrying EAP success to the STA. If the RADIUS server fails to authenticate the STA, the EAP module of the AC encapsulates the received RADIUS Access Reject packet into an EAP failure packet and sends the EAP failure packet to the STA.
- Four-way handshake phase for key negotiation: The STA and AP negotiate a key to encrypt data packets exchanged between them. If the key negotiation succeeds, the AP allows the STA to access the network. If the authentication or key negotiation fails, the AP denies the STA's access to the network and the STA disconnects from the Wi-Fi network.
- STA access phase: The AP allows the STA to apply for an IP address and access the network. The AP reports the STA's IP address to the AC. If the AC detects that the STA's IP address changes, the AC sends a RADIUS Accounting Request message to the RADIUS server for the accounting update and instructs the AP to update the authorization for the STA.
EAP Packet Exchange Information
EAP packets of wireless network adapters can be obtained using the Network Monitor software but not Wireshark.
The following figure shows the EAP-TLS interaction information.
The client and server verify the digital certificate of each other. The server provides its own certificate to the client. After verifying the server certificate, the client submits its own digital certificate to the server. The server then uses the digital certificate to verify the client identity.
Description of Trace Information About Successful 802.1X Authentication
Entries of successfully authenticated users:
[AC] display access-user ------------------------------------------------------------------------------------------------------ UserID Username IP address MAC Status ------------------------------------------------------------------------------------------------------ 32786 skl 20.1.1.36 84c9-b272-47e0 Success ------------------------------------------------------------------------------------------------------ Total: 1, printed: 1 [AC] display access-user mac-address 84c9-b272-47e0 Basic: User ID : 32786 User name : skl User MAC : 84c9-b272-47e0 User IP address : 20.1.1.36 User vpn-instance : - User IPv6 address : - User access Interface : Wlan-Dbss17498 User vlan event : Success //Authentication succeeds. QinQVlan/UserVlan : 0/200 User vlan source : user request User access time : 2020/06/29 15:07:01 User accounting session ID : AC6605_00000000000200b1****0200012 User accounting mult session ID : 84A9C48D3BA084C9B27247E05EFA0****0B4B727 User access type : 802.1x AP name : AP-8 Radio ID : 0 AP MAC : 84a9-c48d-3ba0 SSID : dot1x_129.77 Online time : 59(s) User Group Priority : 0 AAA: User authentication type : 802.1x authentication //The authentication mode is 802.1X. Current authentication method : RADIUS Current authorization method : - Current accounting method : RADIUS ------------------------------------------------------------------------------------------------------ Total: 1, printed: 1
The 802.1X authentication is successful. The key information is described in the following table.
No. |
Item |
Trace Information |
Description |
---|---|---|---|
1 |
STA association with an SSID |
[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7] [WSTA] Receive STA (Re)associate request message. Assoc local:1, AP ID:0, Radio ID:0, Wlan ID:4, Type(1:assoc, 2:reassoc):1, Pmk:0, Wapi IE:22, Bk ID Num:0, SFN Flag:0, Ability:40, 2.4G CHs:0, 5G CHs:0. FT Roam:0, FT Access:0, Rssi:-54, Old Ap Mac:0000-0000-0000, Auth Type:5 UniCipher:5 MultiCipher:5. Ap delay num:0, Vap delay num:0, Ap sta mac:0000-0000-0000, Vap sta Mac:0000-0000-0000, ProcessId:2048. Message len:138, Element len:126, Total len:135, Fix len:88, Ext num:1, Ext Len:26, AGV:0, Assoc duration time:5905 |
An association request from the STA is received. Old Ap Mac:0000-0000-0000 indicates that the STA is not roaming. |
2 |
SSID configuration |
[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Get sta cfg info VapProfileID:4, VlanId:200, IsBoundVlanPool:0, HacServiceVlanInPool:0, MaxUserNumber:64, VlanMobilityGroupId:1, HomeAgent:0, Fordward:0 Bssid:84a9-c48d-3ba3, ssid:dot1x_129.77, Ap mac:84a9-c48d-3ba0, Ap name:AP-8, AC IP:100.1.1.1, IsDot1xOrWapi:1, Is Ppsk:0, l3 switch:0 |
The VAP configuration (VapProfileID:4) is obtained. You can run the display vap-profile all command to query VapProfile corresponding to the index (the index starts from 0 with Name of default) in ascending order. [AC-diagnose] display vap-profile all FMode : Forward mode STA U/D : Rate limit client up/down VAP U/D : Rate limit VAP up/down BR2G/5G : Beacon 2.4G/5G rate ------------------------------------------------------------------------------------------------------------------------ Name FMode Type VLAN AuthType STA U/D(Kbps) VAP U/D(Kbps) BR2G/5G(Mbps) Reference SSID ------------------------------------------------------------------------------------------------------------------------ default direct service VLAN 1 Open -/- -/- 1/6 0 HUAWEI-WLAN mac tunnel service VLAN 200 Open+MAC -/- -/- 1/6 0 mac open tunnel service VLAN 200 Open -/- -/- 1/6 0 open test tunnel service VLAN 155 Open -/- -/- 1/6 2 test1 dot1x tunnel service VLAN 200 WPA2+802.1X -/- -/- 1/6 1 dot1x_129.77 test2 tunnel service VLAN 156 Open -/- -/- 1/6 2 test2 portal tunnel service VLAN 200 Open+Portal -/- -/- 1/6 0 portal_129_77 test123 direct service VLAN 1 Open -/- -/- 1/6 0 HUAWEI-WLAN wlan-vap tunnel service VLAN 101 Open+Portal -/- -/- 1/6 0 portal_local ------------------------------------------------------------------------------------------------------------------------ Total: 9 |
3 |
VAP information |
[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Process STA associate request message:(ApId:0RadioId:0WlanId:4 EssId:4 Assoc Type(1:Assoc,2:Reassoc):1 Vlan:200, Type:3093, Seq Num:12, Max num:64). |
The association request of the STA is processed. RadioId:0 indicates 2.4 GHz and RadioId:1 indicates 5 GHz. # wlan ap-group name default radio 0 vap-profile test wlan 1 vap-profile test2 wlan 2 vap-profile dot1x wlan 4 radio 1 vap-profile test wlan 1 vap-profile test2 wlan 2 |
4 |
802.1X authentication request sent by the WLAN module to the EAP module |
[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WADP] Send EAP authentication request message to EAPOL(Ret Code:0).srcChId:187,dstChId:209,msg:232,SrcForkId:7168,EsapForkId:7168,IfIndex:2466381824,VlanId:200,SN:5 |
The WLAN module sends an authentication request packet to the EAP module. |
5 |
The SSID is successfully associated. |
[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSEC] Initiate eapol start message (Interface:2466381824, Vlan:200, Sn:5, Code:0). [BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Process associate authentication successfully(State:2, Pre AP:4294967295). |
The WLAN module successfully processed the STA association request. |
6 |
802.1X authentication request processing |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:The serialNo carried in wlan request start pkt is 5. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:EAPOL receive dot1x user associate start msg from WLAN.(MAC=, Index=4294967295, CMIndex=4294967295, ulvACNodeId=7168, ulIfIndex=2466381824, vlan=200) |
The EAP module receives an authentication start request from the WLAN module. |
7 |
Use name of the STA |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send a EAPoL request identity packet to user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: OUT 84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8 88 8e 01 00 00 05 01 05 00 05 01 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:5 EAPOL packet: Code:Request(1); Id:5; Length:5; Type:Identity(1) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send EAP_request packet to user successfully.(Index=5) |
The EAP module sends an EAP Request-Identity (ID: 5) packet to the STA. |
8 |
EAP Start packet received from the STA |
[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Process eapol start message up sucessfully. [BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WADP] Receive EAP authentication ack message from EAPOL(Value:0, Code:0, Current SN:5, Response SN:5). [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0, [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: IN 01 80 c2 00 00 03 84 c9 b2 72 47 e0 81 00 e0 c8 88 8e 01 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Start(1); Length:0 EAPOL packet: Code:Unknown(0); Id:0; Length:0; Type:Unknown(0) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EapoL start packet from user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive start packet from user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:User is exist status, receive a eap start packet. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Start a new authentication. |
The EAP module receives an EAP Start packet from the STA and re-authenticates the STA. |
9 |
User name requested again |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send a EAPoL request identity packet to user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: OUT 84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8 88 8e 01 00 00 05 01 06 00 05 01 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:5 EAPOL packet: Code:Request(1); Id:6; Length:5; Type:Identity(1) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send EAP_request packet to user successfully.(Index=6) |
The EAP module sends an EAP Request-Identity (ID: 6) packet to the STA. |
10 |
User name received from the STA |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0, [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: IN fc e3 3c 9e 6d 66 84 c9 b2 72 47 e0 81 00 e0 c8 88 8e 01 00 00 08 02 05 00 08 01 73 6b 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:8 EAPOL packet: Code:Response(2); Id:5; Length:8; Type:Identity(1) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EAPoL response identity packet from user. |
The EAP module receives an EAP Response-Identity (ID: 5) packet from the STA. If the packet ID has expired, the packet is not processed. |
11 |
Authentication request messages. |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA receive AAA_SRV_MSG_AUTHEN_REQ message(31) from UCM module(232). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: DestIndex:18 SrcIndex:18 Slot:7168 User:skl MAC:84c9-b272-47e0 Slot:0 SubSlot:0 Port:0 VLAN:200 IP:255.255.255.255 AccessType:eap AuthenType:EAPRELAY AdminLevel:0 EapSize:8 AuthenCode:1X ulInterface:2466381824 ChallengeLen:16 ChapID:0 LineType:0 LineIndex:0 PortType:19 AcctSessionId:AC6605_00000000000200b19aa00200012 |
The AAA module receives an authentication request from the UCM module, carrying the following information:
|
12 |
Authentication server type of RADIUS |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA_MAIN initiate EapRelayAuthenReq event to AAA_AUTHEN module. CID:0 Result:0 Info:608579692 [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:User authentication domain name is [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:The authentication place is RADIUS. |
The authentication domain domaintest carried in the authentication request is obtained. NOTE:
If no authentication domain is bound to the authentication profile but an authentication policy and server template are bound to the authentication profile, the domain name is not displayed. The AAA module finds that the authentication mode is RADIUS. |
13 |
Authentication request sent to the server |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Send a authentication request packet to radius server( server ip = 12.12.12.7). [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 12.12.12.7 Protocol: Standard Code : 1 Len : 349 ID : 18 [User-Name ] [5 ] [skl] [NAS-Port ] [6 ] [200] [Service-Type ] [6 ] [2] [Framed-Protocol ] [6 ] [1] [Calling-Station-Id ] [16] [84c9-b272-47e0] [NAS-Identifier ] [15] [AC] [NAS-Port-Type ] [6 ] [19] [NAS-Port-Id ] [36] [slot=0;subslot=0;port=0;vlanid=200] [EAP-Message ] [10] [02 06 00 08 01 73 6b 6c ] [Message-Authenticator ] [18] [a1 97 e1 26 3a a4 11 b7 23 1c a9 fd 84 a7 2d cf ] [Called-Station-Id ] [32] [84-A9-C4-8D-3B-A0:dot1x_129.77] [NAS-IP-Address ] [6 ] [12.12.12.77] [Framed-Mtu ] [6 ] [1500] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [Acct-Session-Id ] [36] [AC6605_00000000000200b19aa00200012] [WLAN-Pairwise-Cipher ] [6 ] [0] [WLAN-Group-Cipher ] [6 ] [0] [WLAN-AKM-Suite ] [6 ] [0] [WLAN-Group-Mgmt-Cipher ] [6 ] [0] [HW-NAS-Startup-Time-Stamp ] [6 ] [1593441916] [HW-IP-Host-Address ] [35] [255.255.255.255 84:c9:b2:72:47:e0] [HW-Connect-ID ] [6 ] [32786] [HW-Version ] [22] [Huawei AC6605-26-PWR] [HW-Product-ID ] [4 ] [AC] [HW-AP-Information ] [16] [84A9-C48D-3BA0] [HW-Access-Type ] [6 ] [1] |
The RADIUS module sends a RADIUS authentication request packet to the RADIUS server. NOTE:
EAP packets are encapsulated in the EAP-Message attribute. |
14 |
Server challenge received |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Received a authentication challenge packet from radius server(server ip = 12.12.12.7). [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 12.12.12.7 Server Port : 1812 Protocol: Standard Code : 11 Len : 62 ID : 18 [State ] [16] [\001r\376\345g0] [EAP-Message ] [8 ] [01 0b 00 06 19 20 ] [Message-Authenticator ] [18] [00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ] |
The RADIUS module receives a RADIUS authentication challenge packet from the RADIUS server. The challenge packet is used to negotiate the authentication mode (MD5, PEAP, or TLS) between the server and client, and transmit the certificate, user name, and password. NOTE:
EAP packets are encapsulated in the EAP-Message attribute. |
15 |
Server response type |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA send AAA_SRV_MSG_AUTHEN_ACK message(36) to UCM module(232). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: DestIndex:18 SrcIndex:18 Slot:4294967295 Result:2 DomainIndex:65535 ServiceScheme:65535 AuthedPalace:3 VLAN:65535 IsCallBackVerify:0 IsCallbackUser:0 IfSessionTimeout:0 IfRemanentVolume:0 IfIdleCut:0 SessionTimeout:4294967295 RemanentVolume:4294967295 IdleTimeout:4294967295 EAPSessionTimeout:4294967295 EAPPasswordRetry:4294967295 RTAcctInterval:4294967295 Priority:[255,255] AdminLevel:255 NextHop:4294967295 Role:0 LiAdmin:0 EapSize:6 ReplyMessage: TunnelType:0 MediumType:0 PrivateGroupID: SerialNo:7 WlanReasonCode:0 |
The AAA module transparently transmits the authentication challenge packet to the UCM module. The result can be:
|
16 |
Challenge packet carrying EAP packets forwarded to the STA |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request challenge packet to user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: OUT 84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8 88 8e 01 00 00 06 01 0b 00 06 19 20 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:6 EAPOL packet: Code:Request(1); Id:11; Length:6; Type:PEAP(25) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send EAP_request packet to user successfully.(Index=6) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send request/challenge packet to user successfully.enter request status.(local index:6) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0, |
The EAP module sends an EAP Challenge Request packet (EAP-Message attribute value in the RADIUS authentication challenge packet) to the STA. |
17 |
EAP response packet received from the STA |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: IN fc e3 3c 9e 6d 66 84 c9 b2 72 47 e0 81 00 e0 c8 88 8e 01 00 00 69 02 0b 00 69 19 80 00 00 00 5f 16 03 01 00 5a 01 00 00 56 03 01 5e f9 92 c8 7c dd 19 50 72 93 2b cd a3 94 e5 30 88 5a dd 34 fb 8a ae a3 55 cc 84 ea 83 1f 1e 4a 00 00 18 00 2f 00 35 00 05 00 0a c0 13 c0 14 c0 09 c0 0a 00 32 00 38 00 13 00 04 01 00 00 15 ff 01 00 01 00 00 0a 00 06 00 04 00 17 00 18 00 0b 00 02 01 00 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:105 EAPOL packet: Code:Response(2); Id:11; Length:105; Type:PEAP(25) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EAPoL response challenge packet from user. |
The EAP module receives an EAP Challenge Response packet from the STA. |
18 |
EAP response packet encapsulated in the RADIUS authentication request packet and sent to the server (The preceding authentication request and authentication challenge interaction processes are repeated.) |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Send a authentication request packet to radius server( server ip = 12.12.12.7). [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 12.12.12.7 Protocol: Standard Code : 1 Len : 468 ID : 19 [User-Name ] [5 ] [skl] [NAS-Port ] [6 ] [200] [Service-Type ] [6 ] [2] [Framed-Protocol ] [6 ] [1] [Calling-Station-Id ] [16] [84c9-b272-47e0] [NAS-Identifier ] [15] [AC] [NAS-Port-Type ] [6 ] [19] [NAS-Port-Id ] [36] [slot=0;subslot=0;port=0;vlanid=200] [State ] [16] [\001r\376\345g0] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [EAP-Message ] [107] [02 0b 00 69 19 80 00 00 00 5f 16 03 01 00 5a 01 00 00 56 03 01 5e f9 92 c8 7c dd 19 50 72 93 2b cd a3 94 e5 30 88 5a dd 34 fb 8a ae a3 55 cc 84 ea 83 1f 1e 4a 00 00 18 00 2f 00 35 00 05 00 0a c0 13 c0 14 c0 09 c0 0a 00 32 00 38 00 13 00 04 01 00 00 15 ff 01 00 01 00 00 0a 00 06 00 04 00 17 00 18 00 0b 00 02 01 00 ] [Message-Authenticator ] [18] [b1 13 20 a9 a3 66 8f e1 34 c7 e7 d4 16 28 0d b8 ] [Called-Station-Id ] [32] [84-A9-C4-8D-3B-A0:dot1x_129.77] [Login-IP-Host ] [6 ] [0.0.0.0] [NAS-IP-Address ] [6 ] [12.12.12.77] [Framed-Mtu ] [6 ] [1500] [Acct-Session-Id ] [36] [AC6605_00000000000200b19aa00200012] [WLAN-Pairwise-Cipher ] [6 ] [0] [WLAN-Group-Cipher ] [6 ] [0] [WLAN-AKM-Suite ] [6 ] [0] [WLAN-Group-Mgmt-Cipher ] [6 ] [0] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [HW-NAS-Startup-Time-Stamp ] [6 ] [1593441916] [HW-IP-Host-Address ] [35] [255.255.255.255 84:c9:b2:72:47:e0] [HW-Connect-ID ] [6 ] [32786] [HW-Version ] [22] [Huawei AC6605-26-PWR] [HW-Product-ID ] [4 ] [AC] [HW-AP-Information ] [16] [84A9-C48D-3BA0] [HW-Access-Type ] [6 ] [1] |
The RADIUS module sends a RADIUS authentication request packet to the RADIUS server. |
19 |
Authentication result returned by the server after multiple authentication challenge interactions are complete (accept: successful authentication; reject: authentication failure) |
[BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]: Received a authentication accept packet from radius server(server ip = 12.12.12.7). [BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 12.12.12.7 Server Port : 1812 Protocol: Standard Code : 2 Len : 176 ID : 26 [EAP-Message ] [6 ] [03 13 00 04 ] [State ] [16] [\001r\376\345g0] [MS-MPPE-Send-Key ] [52] [27 cf b9 be 04 b4 e7 6c 4c 98 3d d0 91 b4 4e 2b a1 80 30 c7 34 9d 87 39 be 55 37 4e 6a b1 ec 17 92 4f 94 cb 99 4a 12 c2 f8 23 89 61 1c 16 04 87 cb f8 ] [MS-MPPE-Recv-Key ] [52] [27 cf b9 aa e0 54 51 d1 34 5e 1d 1e f2 3c 2f 65 01 93 99 0e 66 11 61 93 3d 56 f0 e9 5f a5 60 95 c9 f0 07 8e f6 68 a2 6b 70 9c 2b 36 ed f3 53 1c b7 0e ] [Message-Authenticator ] [18] [00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ] |
The RADIUS module receives the authentication success packet from the RADIUS server. If the authentication succeeds, the RADIUS server responds with a RADIUS Access Accept packet. Otherwise, the RADIUS server responds with a RADIUS Access Reject packet. When the authentication is successful, MS-MPPE-Send-Key is carried in the response packet for four-way handshake. |
20 |
Authentication success packet sent to the EAP module |
[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]: AAA send AAA_SRV_MSG_AUTHEN_ACK message(36) to UCM module(232). [BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]: DestIndex:18 SrcIndex:18 Slot:4294967295 Result:0 DomainIndex:69 ServiceScheme:65535 AuthedPalace:3 VLAN:65535 IsCallBackVerify:0 IsCallbackUser:0 IfSessionTimeout:0 IfRemanentVolume:0 IfIdleCut:0 SessionTimeout:4294967295 RemanentVolume:4294967295 IdleTimeout:4294967295 EAPSessionTimeout:4294967295 EAPPasswordRetry:4294967295 RTAcctInterval:4294967295 Priority:[255,255] AdminLevel:255 NextHop:4294967295 Role:0 LiAdmin:0 EapSize:4 ReplyMessage: TunnelType:0 MediumType:0 PrivateGroupID: SerialNo:7 WlanReasonCode:0 |
The AAA module sends an authentication response packet to the UCM module. Result:0 indicates that the authentication is successful. |
21 |
EAP success packet sent to the STA |
[BTRACE][2020/06/29 15:07:02][7168][EAPoL][84c9-b272-47e0]:Send EAP-Success packet to user. [BTRACE][2020/06/29 15:07:02][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:02][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: OUT 84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8 88 8e 01 00 00 04 03 13 00 04 [BTRACE][2020/06/29 15:07:02][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:4 EAPOL packet: Code:Success(3); Id:19; Length:4; Type:Unknown(0) [BTRACE][2020/06/29 15:07:02][7168][EAPoL][84c9-b272-47e0]:Send EAP_success packet to user successfully.(Index=6) |
The EAP module sends an EAP success packet to the STA. |
22 |
Accounting-Start packet |
[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]: AAA receive AAA_SRV_MSG_ACCT_REQ message(32) from UCM module(232). [BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]: DestIndex:18 SrcIndex:18 Slot:7168 AcctType:Start AcctMethod:RADIUS AcctSessionID:AC6605_00000000000200b19aa00200012 ucIfTwoLevelAcct:255 RTAcctInterval:65535 AuthedPlace:3 RdsGroup:2 TacTempletID:128 CopyRdsGroup:65535 UpBytes:[0,0] DnBytes:[0,0] UpPkts:[0,0] DnPkts:[0,0] AcctStartTime:1593443221 UTCAcctStartTime:4294967295 UTCAcctStopTime:4294967295 AcctStartSeconds:4294967295 AcctStopSeconds:4294967295 SessionLength:0 UserName:skl MAC:84c9-b272-47e0 Domain:69 AccessType:eap AuthenCode:1X IP:255.255.255.255 Priority:[0,0] Slot:0 SubSlot:0 Port:0 Interface:2466381824 |
The AAA module receives an accounting-start packet from the UCM module. |
23 |
Content of the accounting-start packet |
[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]: AAA send AAA_RD_MSG_ACCTSTARTREQ message(53) to RADIUS module(235). [BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]: CID:23 TemplateNo:2 SerialNo:0 SrcMsg:AAA_RD_MSG_ACCTSTARTREQ PriyServer:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF Vrf:4294967295 SendServer:12.12.12.7 Vrf:4294967295 CID:32786 AcctType:1 UserName:skl AcctSessionID:AC6605_00000000000200b19aa00200012 Interface:2466381824 SessionLength:0 TerminateCause:0 Authentic:1 UpBytes:[0,0] DnBytes:[0,0] UpPkts:0 DnPkts:0 FramedIP:4294967295 NASPortType:19 Phy:0/0/0 Vlan:200 Priority:0/0 Timestamp:1593443221 FramedProtocol:1 Domain: IPHostAddr:255.255.255.255 84:c9:b2:72:47:e0 UpCIR:0 UpPIR:0 DnCIR:0 DnPIR:0 |
The AAA module sends an accounting-start packet to the RADIUS module. AcctType:
|
24 |
Accounting-Start packet sent to the server |
[BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]: Send a accounting request packet to radius server( server ip = 12.12.12.7). [BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 12.12.12.7 Protocol: Standard Code : 4 Len : 283 ID : 20 [User-Name ] [5 ] [skl] [NAS-IP-Address ] [6 ] [12.12.12.77] [NAS-Port ] [6 ] [200] [NAS-Identifier ] [15] [AC] [Acct-Status-Type ] [6 ] [1] [Acct-Delay-Time ] [6 ] [0] [Acct-Session-Id ] [36] [AC6605_00000000000200b19aa00200012] [Acct-Authentic ] [6 ] [1] [Event-Timestamp ] [6 ] [1593443221] [NAS-Port-Type ] [6 ] [19] [Calling-Station-Id ] [16] [84c9-b272-47e0] [NAS-Port-Id ] [36] [slot=0;subslot=0;port=0;vlanid=200] [Called-Station-Id ] [32] [84-A9-C4-8D-3B-A0:dot1x_129.77] [Framed-Protocol ] [6 ] [1] [BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]: [Service-Type ] [6 ] [2] [HW-IP-Host-Address ] [35] [255.255.255.255 84:c9:b2:72:47:e0] [HW-Connect-ID ] [6 ] [32786] [HW-AP-Information ] [16] [84A9-C48D-3BA0] [HW-Access-Type ] [6 ] [1] |
The RADIUS module sends an Accounting-Start packet to the server. Acct-Status-Type attribute:
|
25 |
Successful four-step handshake |
[BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSEC] Eap Inform STA online, the location of 4-way-handshake is in AP. [BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSEC] Dot1x pmk to ap. [BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSEC] 4-way-handshake success (Code:0, State:2). [BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Process STA authentication done request(Auth Code:0, State:2, Assoc flag:0, Cache Flag:0, Ft Flag:0). [BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WADP] Receive EAP authentication Send PMK Message from EAPOL. |
The WLAN module negotiates the key with the user (actually on the AP). By default, the AC displays a message indicating that the negotiation is successful. If the negotiation fails on the AP, a handshake failure trace message is displayed. |
26 |
Accounting response packet received |
[BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]: Received a accounting response packet from radius server(server ip = 12.12.12.7). [BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 12.12.12.7 Server Port : 1813 Protocol: Standard Code : 5 Len : 20 ID : 20 |
The RADIUS module receives an Accounting Response packet. |
27 |
Real-time accounting packet sent to the server |
[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]: AAA send AAA_RD_MSG_ACCTRTREQ message(54) to RADIUS module(235). CID:32786 AcctType:3 UserName:skl AcctSessionID:AC6605_00000000000200b19aa00200012 Interface:2466381824 SessionLength:0 TerminateCause:0 Authentic:1 UpBytes:[0,0] DnBytes:[0,0] UpPkts:0 DnPkts:0 FramedIP:335610315 NASPortType:19 Phy:0/0/0 Vlan:200 Priority:0/0 Timestamp:1593443221 FramedProtocol:1 Domain: IPHostAddr:20.1.1.203 84:c9:b2:72:47:e0 UpCIR:0 UpPIR:0 DnCIR:0 DnPIR:0 |
The AAA module sends a real-time accounting packet to the RADIUS module. Acct-Status-Type attribute:
|
28 |
Accounting response packet received |
[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]: AAA receive AAA_RD_MSG_ACCTRT_ACK message(57) from RADIUS module(235). SessionTimeout:0 RemanentVolume:0 |
The AAA module receives an accounting response packet from the RADIUS module. When a large number of packets are printed concurrently, the trace information is lost. In this case, no information indicating that the RADIUS server receives response packets is displayed. |
Description of Common Abnormal Trace Information When 802.1X Authentication Fails
No. |
Abnormal Trace Information |
Description |
Possible Cause |
---|---|---|---|
1 |
[BTRACE][2020/07/16 11:47:08][7168][RADIUS][5cd9-98bc-034c]: Received a authentication reject packet from radius server(server ip = 12.12.12.1). [BTRACE][2020/07/16 11:47:08][7168][RADIUS][5cd9-98bc-034c]: Server Template: 2 Server IP : 12.12.12.1 Server Port : 1812 Protocol: Standard Code : 3 Len : 176 ID : 132 [EAP-Message ] [6 ] [04 27 00 04 ] [State ] [16] [\001sU\272\245\336] [Reply-Message ] [116] [ErrorReason is Incorrect user name or password or Incorrect dataSource or Incorrect access device key.ErrCode:4101] [Message-Authenticator ] [18] [00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ] [BTRACE][2020/07/16 11:47:08][7168][RADIUS][5cd9-98bc-034c]:Send authentication reject message to AAA. [BTRACE][2020/07/16 11:47:08][7168][AAA][5cd9-98bc-034c]: AAA receive AAA_RD_MSG_AUTHENREJECT message(51) from RADIUS module(235). [BTRACE][2020/07/16 11:47:08][7168][AAA][5cd9-98bc-034c]: CID:36 TemplateNo:2 SerialNo:36 SrcMsg:AAA_RD_MSG_AUTHENREQ PriyServer::: Vrf:0 SendServer:12.12.12.1 Vrf:0 SessionTimeout:0 IdleTimeout:0 AcctInterimInterval:0 RemanentVolume:0 InputPeakRate:0 InputAverageRate:0 OutputPeakRate:0 OutputAverageRate:0 InputBasicRate:0 OutputBasicRate:0 InputPBS:0 OutputPBS:0 Priority:[0,0] DNS:[0.0.0.0, 0.0.0.0] ServiceType:0 LoginService:0 AdminLevel:0 FramedProtocol:0 LoginIpHost:0 NextHop:0 EapLength:4 ReplyMessage:ErrorReason is Incorrect user name or password or Incorrect dataSource or Incorrect access device key.ErrCode:4101 TunnelType:0 MediumType:0 PrivateGroupID: WlanReasonCode:0 [BTRACE][2020/07/16 11:47:08][7168][AAA][5cd9-98bc-034c]:Radius authentication is rejected. [BTRACE][2020/07/16 11:47:08][7168][AAA][5cd9-98bc-034c]: [AAA ERROR]authen finish,the authen fail code is:6,reason is:Radius authentication is rejected. |
The authentication request is rejected by the RADIUS server. |
The user name or password is incorrect. |
2 |
[BTRACE][2020/07/16 11:45:58][7168][AAA][5cd9-98bc-034c]: AAA receive AAA_RD_MSG_SERVERNOREPLY message(61) from RADIUS module(235). [BTRACE][2020/07/16 11:45:58][7168][AAA][5cd9-98bc-034c]: CID:35 TemplateNo:2 SerialNo:35 SrcMsg:AAA_RD_MSG_AUTHENREQ PriyServer::: Vrf:0 SendServer:12.12.12.1 Vrf:0 [BTRACE][2020/07/16 11:45:58][7168][AAA][5cd9-98bc-034c]:Radius authentication has no response. |
No response packet is received from the RADIUS server. |
|
3 |
[BTRACE][2020/06/25 01:39:42][WLAN_AC][30f7-721d-8821]:[WSEC] 4-way-handshake failed (Code:00000103). |
The key fails to be negotiated in the four-way handshake. |
Check whether the user supports the TLS version of the server and whether the server AD authentication is successful. |
4 |
[BTRACE][2020/07/16 11:39:18][7168][AAA][5cd9-98bc-034c]: [AAA ERROR][AAA Make Radius Acct Req] No accounting server configured. [BTRACE][2020/07/16 11:39:18][7168][CM][5cd9-98bc-034c]: CM NAC SetLeavingFlag. (EAPOL=1) [BTRACE][2020/07/16 11:39:18][7168][CM][5cd9-98bc-034c]: CM NAC SetLeavingFlag. (WLAN=1) |
The accounting fails and the user goes offline. |
The accounting server is not configured. |
5 |
[BTRACE][2019/11/21 15:25:01][7177][EAPoL][000c-291a-4b03]:User is still in quiet status.(MAC:000c-291a-4b03) [BTRACE][2019/11/21 15:25:01][7177][EAPoL][000c-291a-4b03]:Quiet table check failure,drop the packet. [BTRACE][2019/11/21 15:25:01][7177][EAPoL][000c-291a-4b03]:Failed to check packet,drop the packet.(MAC=000c-291a-4b03). |
The STA is in quiet state, and its packets are discarded. |
The STA is added to the quiet table because the number of consecutive authentication failures within a specified period exceeds the threshold. Check the reasons for the authentication failures. [HUAWEI] display dot1x quiet-user all
---------------------------------------------------------------
MacAddress Quiet Remain Time(Sec)
---------------------------------------------------------------
000c-291a-4b03 49
---------------------------------------------------------------
1 silent mac address(es) found, 1 printed.
|
6 |
[BTRACE][2020/06/30 14:45:11][7177][EAPoL][c85b-768c-9e27]:No response of request identity from user. [BTRACE][2020/06/30 14:45:11][7177][EAPoL][c85b-768c-9e27]:Resend EAP_request/identity times exceed max times.(Index=1951) [BTRACE][2020/06/30 14:45:11][7177][EAPoL][c85b-768c-9e27]:Send EAP-Failure packet to user. [BTRACE][2020/06/30 14:45:11][7177][EAPoL][c85b-768c-9e27]:Add a Eap Packet Node to EAPOL Ucib, MAC is c85b-768c-9e27. [BTRACE][2020/06/30 14:45:11][7177][EAPoL][c85b-768c-9e27]: EAPOL packet: OUT c8 5b 76 8c 9e 27 5c e8 83 90 f3 10 81 00 00 cd 88 8e 01 00 00 04 04 34 00 04 [BTRACE][2020/06/30 14:45:11][7177][EAPoL][c85b-768c-9e27]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:4 EAPOL packet: Code:Failure(4); Id:52; Length:4; Type:-(0) [BTRACE][2020/06/30 14:45:11][7177][EAPoL][c85b-768c-9e27]:Send EAP_failure packet to user successfully.(Index=1951) |
The EAP Request-Identity packet is retransmitted for the maximum number of times, but the STA still does not respond. Then the device sends an EAP Failure packet. |
Possible causes:
|
7 |
[BTRACE][2018/12/13 07:49:40][EAPoL][0016-17ad-f620]:No response of request challenge from user. //The device does not receive any response from the client. [BTRACE][2018/12/13 07:49:40][EAPoL][0016-17ad-f620]:Resend EAP_request/identity times exceed max times.(Index=159) [BTRACE][2018/12/13 07:49:40][EAPoL][0016-17ad-f620]:Send EAP-Failure packet to user. |
The EAP Challenge-Identity packet is retransmitted for the maximum number of times, but the STA still does not respond. Then the device sends an EAP Failure packet. |
No response to Request Challenge packets may be related to some services on which 802.1X authentication in the operating system of the STA depends. The specific principles are not clear. For example:
|
8 |
[BTRACE][2020/10/24 16:48:14][6144][RADIUS][64e5-99f3-18f6]: Received a authentication accept packet from radius server(server ip = 12.12.12.1). [BTRACE][2020/10/24 16:48:14][6144][RADIUS][64e5-99f3-18f6]: Server Template: 4 Server IP : 12.12.12.1 Server Port : 1812 Protocol: Standard Code : 2 Len : 194 ID : 194 [Tunnel-Type ] [6 ] [13] [Tunnel-Medium-Type ] [6 ] [6] [Tunnel-Private-Group-ID ] [6 ] [201] [EAP-Message ] [6 ] [03 4a 00 04 ] [State ] [16] [\001uY\311\025N] [MS-MPPE-Send-Key ] [52] [fb a1 e9 55 16 62 a3 e5 da 35 fc ce 3e 8f ae 7d ac 0a d6 0b 20 59 ad 82 a8 66 88 06 6a 81 10 82 61 95 2e cf 44 50 c0 79 e5 3f a4 32 43 45 a5 9e 2b c4 ] [MS-MPPE-Recv-Key ] [52] [fb a1 e9 65 b1 18 6d 60 8f 0a ed af 53 1e 26 8a e6 18 9d 26 8c 21 c8 4f c2 8a 6a d5 a8 85 8a 9d ba d8 be 8d 97 b8 b8 d3 24 04 21 23 90 71 33 35 f4 6b ] [Message-Authenticator ] [18] [00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ] [BTRACE][2020/10/24 16:48:14][6144][RADIUS][64e5-99f3-18f6]:Send authentication reply message to AAA. [BTRACE][2020/10/24 16:48:14][6144][AAA][64e5-99f3-18f6]: AAA receive AAA_RD_MSG_AUTHENACCEPT message(50) from RADIUS module(235). [BTRACE][2020/10/24 16:48:14][6144][AAA][64e5-99f3-18f6]: CID:57 TemplateNo:4 SerialNo:73 SrcMsg:AAA_RD_MSG_AUTHENREQ PriyServer::: Vrf:0 SendServer:12.12.12.1 Vrf:0 SessionTimeout:0 IdleTimeout:0 AcctInterimInterval:0 RemanentVolume:0 InputPeakRate:0 InputAverageRate:0 OutputPeakRate:0 OutputAverageRate:0 InputBasicRate:0 OutputBasicRate:0 InputPBS:0 OutputPBS:0 Priority:[0,0] DNS:[0.0.0.0, 0.0.0.0] ServiceType:0 LoginService:0 AdminLevel:0 FramedProtocol:0 LoginIpHost:0 NextHop:0 EapLength:4 ReplyMessage: TunnelType:13 MediumType:6 PrivateGroupID:201 WlanReasonCode:0 [BTRACE][2020/10/24 16:48:14][6144][AAA][64e5-99f3-18f6]: [AAA ERROR]AAA check authen ack, check VLANID error! [BTRACE][2020/10/24 16:48:14][6144][AAA][64e5-99f3-18f6]:Radius authorization data error. [BTRACE][2020/10/24 16:48:14][6144][AAA][64e5-99f3-18f6]:[AAA ERROR]authen finish,the authen fail code is:16,reason is:Radius authorization data error. |
Authorization VLAN check failed. |
|
9 |
Received a authentication accept packet from radius server(server ip = 12.12.12.1). [BTRACE][2020/10/24 16:52:19][6144][RADIUS][64e5-99f3-18f6]: Server Template: 4 Server IP : 12.12.12.1 Server Port : 1812 Protocol: Standard Code : 2 Len : 182 ID : 205 [Filter-Id ] [6 ] [3000] [EAP-Message ] [6 ] [03 4c 00 04 ] [State ] [16] [\001uY\314\321\003] [MS-MPPE-Send-Key ] [52] [bd ce 7f 1d bf 78 33 d4 6c 45 d8 d0 1b f7 ee d2 02 16 7a ac fd 62 25 88 f7 84 7a 22 44 d8 01 8a 99 a3 33 66 7d 47 e9 a7 ed 88 d5 01 f8 62 4f 9d cd 56 ] [MS-MPPE-Recv-Key ] [52] [bd ce 7f 54 6f 27 35 d1 01 5c f1 5e aa e8 27 91 c7 8b 89 2f 06 8f ac 46 13 5c 92 78 ec cf 39 aa dc bb f8 ff b1 b8 5c 42 6b f8 ca 80 76 b1 e8 35 c9 ed ] [Message-Authenticator ] [18] [00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ] [BTRACE][2020/10/24 16:52:19][6144][RADIUS][64e5-99f3-18f6]:Send authentication reply message to AAA. [BTRACE][2020/10/24 16:52:19][6144][AAA][64e5-99f3-18f6]: AAA receive AAA_RD_MSG_AUTHENACCEPT message(50) from RADIUS module(235). [BTRACE][2020/10/24 16:52:19][6144][AAA][64e5-99f3-18f6]: CID:58 TemplateNo:4 SerialNo:75 SrcMsg:AAA_RD_MSG_AUTHENREQ PriyServer::: Vrf:0 SendServer:12.12.12.1 Vrf:0 SessionTimeout:0 IdleTimeout:0 AcctInterimInterval:0 RemanentVolume:0 InputPeakRate:0 InputAverageRate:0 OutputPeakRate:0 OutputAverageRate:0 InputBasicRate:0 OutputBasicRate:0 InputPBS:0 OutputPBS:0 Priority:[0,0] DNS:[0.0.0.0, 0.0.0.0] ServiceType:0 LoginService:0 AdminLevel:0 FramedProtocol:0 LoginIpHost:0 NextHop:0 EapLength:4 ReplyMessage: TunnelType:0 MediumType:0 PrivateGroupID: ACLID:3000 WlanReasonCode:0 [BTRACE][2020/10/24 16:52:19][6144][AAA][64e5-99f3-18f6]: [AAA ERROR]AAA check radius authen ack, check acl error! [BTRACE][2020/10/24 16:52:19][6144][AAA][64e5-99f3-18f6]:Radius authorization data error. [BTRACE][2020/10/24 16:52:19][6144][AAA][64e5-99f3-18f6]: [AAA ERROR]authen finish,the authen fail code is:16,reason is:Radius authorization data error. |
Authorization ACL check failed. |
In wireless scenarios, ensure that the authorization ACL has been created on the device. The ACL ID ranges from 3000 to 3031, and the maximum rule ID in the ACL is 64. |
Other Common Trace Information About 802.1X Authentication
No. |
Trace Information |
Description |
---|---|---|
1 |
[BTRACE][2020/06/29 15:07:01][2048][WLAN_AC][84c9-b272-47e0]:[Process:2][WSTA] Flow fork SingleSta MsgType3093 Vcpu:7 Ret:0 Len:318. |
Messages are copied between CPUs, and you can ignore this trace information. Process:2 indicates the core that is processing packets (messages). [AC-diagnose] display process-list ************************************************* Accumulate total process number :10 Forward mode: centralized ---------------------------------------------- ProcessID ProcessName PID ---------------------------------------------- 0 vos.o 196 1 wmc 197 2 wmi 199 3 wmi 200 4 dhcp 201 5 dhcp 202 6 nac 203 7 nac 204 8 ucm_gc 205 9 web_fc 206 *************************************************** |
2 |
[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7] [WSTA] Receive STA (Re)associate request message. Assoc local:1, AP ID:0, Radio ID:0, Wlan ID:4, Type(1:assoc, 2:reassoc):1, Pmk:0, Wapi IE:22, Bk ID Num:0, SFN Flag:0, Ability:40, 2.4G CHs:0, 5G CHs:0. FT Roam:0, FT Access:0, Rssi:-54, Old Ap Mac:0000-0000-0000, Auth Type:5 UniCipher:5 MultiCipher:5. Ap delay num:0, Vap delay num:0, Ap sta mac:0000-0000-0000, Vap sta Mac:0000-0000-0000, ProcessId:2048. Message len:138, Element len:126, Total len:135, Fix len:88, Ext num:1, Ext Len:26, AGV:0, Assoc duration time:5905 |
An association request from the STA is received. Old Ap Mac:0000-0000-0000 indicates that the STA is not roaming. |
3 |
[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Get sta cfg info VapProfileID:4, VlanId:200, IsBoundVlanPool:0, HacServiceVlanInPool:0, MaxUserNumber:64, VlanMobilityGroupId:1, HomeAgent:0, Fordward:0 Bssid:84a9-c48d-3ba3, ssid:dot1x_129.77, Ap mac:84a9-c48d-3ba0, Ap name:AP-8, AC IP:100.1.1.1, IsDot1xOrWapi:1, Is Ppsk:0, l3 switch:0 |
The VAP configuration (VapProfileID:4) is obtained. You can run the display vap-profile all command to query VapProfile corresponding to the index (the index starts from 0 with Name of default) in ascending order. |
4 |
[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Process STA associate request message:(ApId:0RadioId:0WlanId:4 EssId:4 Assoc Type(1:Assoc,2:Reassoc):1 Vlan:200, Type:3093, Seq Num:12, Max num:64). |
The association request of the STA is processed. RadioId:0 indicates 2.4 GHz and RadioId:1 indicates 5 GHz. |
5 |
[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Check vap ap reach max proc(Ap delay num:0, Vap delay num:0, Ap sta mac:0000-0000-0000, Vap sta Mac:0000-0000-0000. [BTRACE][2020/06/29 15:07:01][2048][WLAN_AC][84c9-b272-47e0]:[Process:2][WSTA] Send STA associate Response message and add sta request (ap:0, radio:0, wlan:0, len:0, response :0, code:0). [BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Add sta data roam info 0:MgIP: 0.0.0.0, IpVer:2, StaDataIp:0, Ret:1 [BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Add sta data roam info 1:MgIP: 0.0.0.0, Ap2AcIP:100.1.1.1 [BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Send STA associate response message. (FT access:0, FT roam:0, Flag:1, loacl:1, Type:5) [BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Send STA associate response message. (Ap:0, Radio:0, WlanId:4, Type:1, Code:0, Len:326, OpType:0, Flag:0, Detect:1) [BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Roam send add STA and IP-MAC request message (Code:0). [BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Send add STA and IP-MAC request message (Rt:0, Type:0, ablitity:1). [BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] STA (Re)associate request first assoc request response (Type:3093, Code:0). [BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] End to process STA first associate add request (Code:0). [BTRACE][2020/06/29 15:07:01][2048][WLAN_AC][84c9-b272-47e0]:[Process:2][WSTA] Capwap deliver message to sta process (Type:26, prim:0, len:236, fork:7168, code:0) [BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Process add STA response message (Radio:0, Wlan:4, OpType:0, TryTimes:1 Code:0). |
The WLAN module processes the association request from the STA. |
6 |
[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WADP] Send EAP authentication request message to EAPOL(Ret Code:0).srcChId:187,dstChId:209,msg:232,SrcForkId:7168,EsapForkId:7168,IfIndex:2466381824,VlanId:200,SN:5 |
The WLAN module sends an authentication request packet to the EAP module. |
7 |
[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSEC] Initiate eapol start message (Interface:2466381824, Vlan:200, Sn:5, Code:0). [BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Process associate authentication successfully(State:2, Pre AP:4294967295). |
The WLAN module successfully processes the STA association request. |
8 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:The serialNo carried in wlan request start pkt is 5. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:EAPOL receive dot1x user associate start msg from WLAN.(MAC=, Index=4294967295, CMIndex=4294967295, ulvACNodeId=7168, ulIfIndex=2466381824, vlan=200) |
The EAP module receives an authentication start request from the WLAN module. |
9 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send a EAPoL request identity packet to user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: OUT 84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8 88 8e 01 00 00 05 01 05 00 05 01 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:5 EAPOL packet: Code:Request(1); Id:5; Length:5; Type:Identity(1) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send EAP_request packet to user successfully.(Index=5) |
The EAP module sends an EAP Request-Identity (ID: 5) packet to the STA. |
10 |
[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Process eapol start message up sucessfully. [BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WADP] Receive EAP authentication ack message from EAPOL(Value:0, Code:0, Current SN:5, Response SN:5). [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0, [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: IN 01 80 c2 00 00 03 84 c9 b2 72 47 e0 81 00 e0 c8 88 8e 01 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Start(1); Length:0 EAPOL packet: Code:Unknown(0); Id:0; Length:0; Type:Unknown(0) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EapoL start packet from user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive start packet from user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:User is exist status, receive a eap start packet. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Start a new authentication. |
The EAP module receives an EAP Start packet from the STA and re-authenticates the STA. |
11 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send a EAPoL request identity packet to user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: OUT 84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8 88 8e 01 00 00 05 01 06 00 05 01 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:5 EAPOL packet: Code:Request(1); Id:6; Length:5; Type:Identity(1) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send EAP_request packet to user successfully.(Index=6) |
The EAP module sends an EAP Request-Identity (ID: 6) packet to the STA. |
12 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0, [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: IN fc e3 3c 9e 6d 66 84 c9 b2 72 47 e0 81 00 e0 c8 88 8e 01 00 00 08 02 05 00 08 01 73 6b 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:8 EAPOL packet: Code:Response(2); Id:5; Length:8; Type:Identity(1) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EAPoL response identity packet from user. |
The EAP module receives an EAP Response-Identity (ID: 5) packet from the STA. NOTE:
If the packet ID has expired, the packet is not processed. |
13 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0, [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: IN fc e3 3c 9e 6d 66 84 c9 b2 72 47 e0 81 00 e0 c8 88 8e 01 00 00 08 02 06 00 08 01 73 6b 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:8 EAPOL packet: Code:Response(2); Id:6; Length:8; Type:Identity(1) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EAPoL response identity packet from user. |
The EAP module receives an EAP Response-Identity (ID: 6) packet with a correct packet ID from the STA, and obtains the user name from the packet. |
14 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:EAPoL Send authentication message to server. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send authentication request message to user connection manager module successfully.(local index:6) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request to UCM module successfully.(local index:6) |
The EAP module sends an authentication request packet to the UCM module. |
15 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive ESAP_SRV_MSG_AUTH_REQ from EAPOL module (msg code: 184 CID:18). [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:cib is optimized for struct CM NAC WLAN[CM NAC Fill ExtendCib]:ulApId = 0,ucRadioId = 0,ucWirelessAccessType = 5. |
The UCM module receives an authentication request packet from the EAP module. |
16 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]: [CM NAC Find Access Type Auth Seq](AccessType=13, seqIndex=1) |
The UCM module obtains the authentication type of EAP (13) through configuration. Other common authentication types include MAC (23) and Portal (24). |
17 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM WLAN Get Ap Info. Ap Info is 84A9-C48D-3BA0. [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication request message to AAA module (CID:18). [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:State from IDLE(substate:BUTT) to AUTH(substate:BUTT). (cib=18, event=AUTH_REQ) |
The UCM module sends an authentication request packet to the AAA module. |
18 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA receive AAA_SRV_MSG_AUTHEN_REQ message(31) from UCM module(232). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: DestIndex:18 SrcIndex:18 Slot:7168 User:skl MAC:84c9-b272-47e0 Slot:0 SubSlot:0 Port:0 VLAN:200 IP:255.255.255.255 AccessType:eap AuthenType:EAPRELAY AdminLevel:0 EapSize:8 AuthenCode:1X ulInterface:2466381824 ChallengeLen:16 ChapID:0 LineType:0 LineIndex:0 PortType:19 AcctSessionId:AC6605_00000000000200b19aa00200012 |
The AAA module receives an authentication request packet from the UCM module, carrying the following information:
|
19 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA_MAIN initiate EapRelayAuthenReq event to AAA_AUTHEN module. CID:0 Result:0 Info:608579692 [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:User authentication domain name is [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:The authentication place is RADIUS. |
The AAA module finds that the authentication mode is RADIUS. If no authentication domain is bound to the authentication profile but an authentication policy or server template is bound to the authentication profile, the domain name is not displayed. |
20 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA send AAA_RD_MSG_AUTHENREQ message(49) to RADIUS module(235). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: CID:22 TemplateNo:2 SerialNo:7 PriyServer::: Vrf:0 SendServer::: Vrf:0 AccessType:eap AuthenMethod:EAPRELAY UserName:skl CallingStationId:84c9-b272-47e0 Slot:0 SubSlot:0 Port:0 Vlan:200 Interface:2466381824 CID:32786 AcctSessionId:AC6605_00000000000200b19aa00200012 PortType:19 ServiceType:2 FramedProtocol:1 FramedIP:255.255.255.255 EapLength:8 StartupTimeStamp:1593441916 LoginIP:255.255.255.255 IPHostAddr:255.255.255.255 84:c9:b2:72:47:e0 ProductID:AC szVersion:Huawei AC6605-26-PWR SecurityStr: |
The AAA module sends an authentication request packet to the RADIUS module. |
21 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Receive authentication request message from AAA module. |
The RADIUS module receives an authentication request packet from the AAA module. |
22 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Send a authentication request packet to radius server( server ip = 172.168.10.7). [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 172.168.10.7 Protocol: Standard Code : 1 Len : 349 ID : 18 [User-Name ] [5 ] [skl] [NAS-Port ] [6 ] [200] [Service-Type ] [6 ] [2] [Framed-Protocol ] [6 ] [1] [Calling-Station-Id ] [16] [84c9-b272-47e0] [NAS-Identifier ] [15] [AC] [NAS-Port-Type ] [6 ] [19] [NAS-Port-Id ] [36] [slot=0;subslot=0;port=0;vlanid=200] [EAP-Message ] [10] [02 06 00 08 01 73 6b 6c ] [Message-Authenticator ] [18] [a1 97 e1 26 3a a4 11 b7 23 1c a9 fd 84 a7 2d cf ] [Called-Station-Id ] [32] [84-A9-C4-8D-3B-A0:dot1x_129.77] [NAS-IP-Address ] [6 ] [172.168.10.77] [Framed-Mtu ] [6 ] [1500] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [Acct-Session-Id ] [36] [AC6605_00000000000200b19aa00200012] [WLAN-Pairwise-Cipher ] [6 ] [0] [WLAN-Group-Cipher ] [6 ] [0] [WLAN-AKM-Suite ] [6 ] [0] [WLAN-Group-Mgmt-Cipher ] [6 ] [0] [HW-NAS-Startup-Time-Stamp ] [6 ] [1593441916] [HW-IP-Host-Address ] [35] [255.255.255.255 84:c9:b2:72:47:e0] [HW-Connect-ID ] [6 ] [32786] [HW-Version ] [22] [Huawei AC6605-26-PWR] [HW-Product-ID ] [4 ] [AC] [HW-AP-Information ] [16] [84A9-C48D-3BA0] [HW-Access-Type ] [6 ] [1] |
The RADIUS module sends a RADIUS Access Request packet to the RADIUS server. (EAP packets are encapsulated in the EAP-Message attribute.) |
23 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Received a authentication challenge packet from radius server(server ip = 172.168.10.7). [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 172.168.10.7 Server Port : 1812 Protocol: Standard Code : 11 Len : 62 ID : 18 [State ] [16] [\001r\376\345g0] [EAP-Message ] [8 ] [01 0b 00 06 19 20 ] [Message-Authenticator ] [18] [00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ] |
The RADIUS module receives a RADIUS Access Challenge packet from the RADIUS server. (EAP packets are encapsulated in the EAP-Message attribute.) |
24 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Send authentication challenge message to AAA. |
The RADIUS module sends an authentication challenge packet to the AAA module. |
25 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA receive AAA_RD_MSG_AUTHENCHALLENGE message(52) from RADIUS module(235). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: CID:22 TemplateNo:2 SerialNo:7 SrcMsg:AAA_RD_MSG_AUTHENREQ PriyServer::: Vrf:0 SendServer:172.168.10.7 Vrf:0 EapSessionTime:4294967295 EapPasswordRetry:4294967295 TerminationAction:4294967295 EapLength:6 RDReplyMessage: State:0172fee5673000000172fee56730 |
The AAA module receives an authentication challenge packet from the RADIUS module. |
26 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA send AAA_SRV_MSG_AUTHEN_ACK message(36) to UCM module(232). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: DestIndex:18 SrcIndex:18 Slot:4294967295 Result:2 DomainIndex:65535 ServiceScheme:65535 AuthedPalace:3 VLAN:65535 IsCallBackVerify:0 IsCallbackUser:0 IfSessionTimeout:0 IfRemanentVolume:0 IfIdleCut:0 SessionTimeout:4294967295 RemanentVolume:4294967295 IdleTimeout:4294967295 EAPSessionTimeout:4294967295 EAPPasswordRetry:4294967295 RTAcctInterval:4294967295 Priority:[255,255] AdminLevel:255 NextHop:4294967295 Role:0 LiAdmin:0 EapSize:6 ReplyMessage: TunnelType:0 MediumType:0 PrivateGroupID: SerialNo:7 WlanReasonCode:0 |
The AAA module transparently transmits an authentication challenge packet to the UCM module. (For the result: 0 indicates the successful authentication, 1 indicates the authentication failure, and 2 indicates the authentication challenge.) |
27 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive AAA_SRV_MSG_AUTHEN_ACK from AAA module (msg code: 36 CID:18). [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_CIB_S] enter in CMNACFillAAAAckInfo. [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_CIB_S] enter in CM_NAC_ProAckInfo. |
The UCM module receives an authentication challenge packet from the AAA module. |
28 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication ack message to AAA module (CID:18). |
The UCM module sends an authentication challenge packet to the EAP module. |
29 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authen ack message from UCM module.(Result=2,local index=6,MAC=84c9-b272-47e0,RadiusTemplateIndex=65535,Reason=255) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authentication ack message from server.(result:SRV_AUTH_CHALLENGE) |
The EAP module receives an authentication challenge packet from the UCM module. |
30 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request challenge packet to user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: OUT 84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8 88 8e 01 00 00 06 01 0b 00 06 19 20 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:6 EAPOL packet: Code:Request(1); Id:11; Length:6; Type:PEAP(25) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send EAP_request packet to user successfully.(Index=6) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send request/challenge packet to user successfully.enter request status.(local index:6) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0, |
The EAP module sends an EAP Challenge Request packet (that is, the value of the EAP-Message attribute in the RADIUS Access Challenge packet) to the STA. |
31 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: IN fc e3 3c 9e 6d 66 84 c9 b2 72 47 e0 81 00 e0 c8 88 8e 01 00 00 69 02 0b 00 69 19 80 00 00 00 5f 16 03 01 00 5a 01 00 00 56 03 01 5e f9 92 c8 7c dd 19 50 72 93 2b cd a3 94 e5 30 88 5a dd 34 fb 8a ae a3 55 cc 84 ea 83 1f 1e 4a 00 00 18 00 2f 00 35 00 05 00 0a c0 13 c0 14 c0 09 c0 0a 00 32 00 38 00 13 00 04 01 00 00 15 ff 01 00 01 00 00 0a 00 06 00 04 00 17 00 18 00 0b 00 02 01 00 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:105 EAPOL packet: Code:Response(2); Id:11; Length:105; Type:PEAP(25) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EAPoL response challenge packet from user. |
The EAP module receives an EAP Challenge Response packet from the STA. |
32 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:EAPoL Send authentication message to server. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send authentication request message to user connection manager module successfully.(local index:6) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request to UCM module successfully.(local index:6) |
The EAP module sends an authentication request packet to the UCM module. |
33 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive ESAP_SRV_MSG_AUTH_REQ from EAPOL module (msg code: 184 CID:18). [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM WLAN Get Ap Info. Ap Info is 84A9-C48D-3BA0. |
The UCM module receives an authentication request packet from the EAP module. |
34 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication request message to AAA module (CID:18). |
The UCM module sends an authentication request packet to the AAA module. |
35 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA receive AAA_SRV_MSG_AUTHEN_REQ message(31) from UCM module(232). |
The AAA module receives an authentication request packet from the UCM module. |
36 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: DestIndex:18 SrcIndex:18 Slot:7168 User:skl MAC:84c9-b272-47e0 Slot:0 SubSlot:0 Port:0 VLAN:200 IP:255.255.255.255 AccessType:eap AuthenType:EAPRELAY AdminLevel:0 EapSize:105 AuthenCode:1X ulInterface:2466381824 ChallengeLen:16 ChapID:0 LineType:0 LineIndex:0 PortType:19 AcctSessionId:AC6605_00000000000200b19aa00200012 [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA_MAIN initiate EapRelayAuthenReq event to AAA_AUTHEN module. CID:0 Result:0 Info:542008332 [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA send AAA_RD_MSG_AUTHENREQ message(49) to RADIUS module(235). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: CID:22 TemplateNo:2 SerialNo:7 PriyServer::: Vrf:0 SendServer::: Vrf:0 AccessType:eap AuthenMethod:EAPRELAY UserName:skl CallingStationId:84c9-b272-47e0 Slot:0 SubSlot:0 Port:0 Vlan:200 Interface:2466381824 CID:32786 AcctSessionId:AC6605_00000000000200b19aa00200012 PortType:19 ServiceType:2 FramedProtocol:1 FramedIP:255.255.255.255 EapLength:105 StartupTimeStamp:1593441916 LoginIP:0.0.0.0 IPHostAddr:255.255.255.255 84:c9:b2:72:47:e0 ProductID:AC szVersion:Huawei AC6605-26-PWR SecurityStr: |
The AAA module sends an authentication request packet to the RADIUS module. |
37 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Receive authentication request message from AAA module. |
The RADIUS module receives an authentication request packet from the AAA module. |
38 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Send a authentication request packet to radius server( server ip = 172.168.10.7). [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 172.168.10.7 Protocol: Standard Code : 1 Len : 468 ID : 19 [User-Name ] [5 ] [skl] [NAS-Port ] [6 ] [200] [Service-Type ] [6 ] [2] [Framed-Protocol ] [6 ] [1] [Calling-Station-Id ] [16] [84c9-b272-47e0] [NAS-Identifier ] [15] [AC] [NAS-Port-Type ] [6 ] [19] [NAS-Port-Id ] [36] [slot=0;subslot=0;port=0;vlanid=200] [State ] [16] [\001r\376\345g0] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [EAP-Message ] [107] [02 0b 00 69 19 80 00 00 00 5f 16 03 01 00 5a 01 00 00 56 03 01 5e f9 92 c8 7c dd 19 50 72 93 2b cd a3 94 e5 30 88 5a dd 34 fb 8a ae a3 55 cc 84 ea 83 1f 1e 4a 00 00 18 00 2f 00 35 00 05 00 0a c0 13 c0 14 c0 09 c0 0a 00 32 00 38 00 13 00 04 01 00 00 15 ff 01 00 01 00 00 0a 00 06 00 04 00 17 00 18 00 0b 00 02 01 00 ] [Message-Authenticator ] [18] [b1 13 20 a9 a3 66 8f e1 34 c7 e7 d4 16 28 0d b8 ] [Called-Station-Id ] [32] [84-A9-C4-8D-3B-A0:dot1x_129.77] [Login-IP-Host ] [6 ] [0.0.0.0] [NAS-IP-Address ] [6 ] [172.168.10.77] [Framed-Mtu ] [6 ] [1500] [Acct-Session-Id ] [36] [AC6605_00000000000200b19aa00200012] [WLAN-Pairwise-Cipher ] [6 ] [0] [WLAN-Group-Cipher ] [6 ] [0] [WLAN-AKM-Suite ] [6 ] [0] [WLAN-Group-Mgmt-Cipher ] [6 ] [0] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [HW-NAS-Startup-Time-Stamp ] [6 ] [1593441916] [HW-IP-Host-Address ] [35] [255.255.255.255 84:c9:b2:72:47:e0] [HW-Connect-ID ] [6 ] [32786] [HW-Version ] [22] [Huawei AC6605-26-PWR] [HW-Product-ID ] [4 ] [AC] [HW-AP-Information ] [16] [84A9-C48D-3BA0] [HW-Access-Type ] [6 ] [1] |
The RADIUS module sends a RADIUS Access Request packet to the RADIUS server. |
39 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Received a authentication challenge packet from radius server(server ip = 172.168.10.7). [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 172.168.10.7 Server Port : 1812 Protocol: Standard Code : 11 Len : 1164 ID : 19 [State ] [16] [\001r\376\345g0] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [EAP-Message ] [255] [01 0c 04 4c 19 c0 00 00 07 40 16 03 01 07 3b 02 00 00 4d 03 01 5e f9 92 ca ec 4e 76 65 d5 68 71 0f 9d fa fb 42 aa d2 e7 eb b4 c8 b8 96 6f df 5e e7 f6 c0 48 c4 20 5e f9 92 ca e3 30 78 2a 97 3d e6 b3 62 83 79 43 92 4f e6 b7 b0 15 4e 44 c3 4e b0 8a d5 37 c0 57 00 2f 00 00 05 ff 01 00 01 00 0b 00 06 e2 00 06 df 00 03 a0 30 82 03 9c 30 82 02 84 a0 03 02 01 02 02 0a 61 0d d3 b3 00 00 00 00 00 02 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 2c 31 0b 30 09 06 03 55 04 06 13 02 43 4e 31 0f 30 0d 06 03 55 04 0b 13 06 48 55 41 57 45 49 31 0c 30 0a 06 03 55 04 03 13 03 54 53 4d 30 20 17 0d 31 35 30 37 30 39 31 30 33 38 33 38 5a 18 0f 32 30 36 35 30 37 30 39 31 30 33 36 33 33 5a 30 75 31 0b 30 09 06 03 55 04 06 13 02 43 4e 31 11 30 0f 06 03 55 04 07 13 08 73 ] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [EAP-Message ] [255] [68 65 6e 7a 68 65 6e 31 0f 30 0d 06 03 55 04 0a 13 06 68 75 61 77 65 69 31 0c 30 0a 06 03 55 04 0b 13 03 4f 53 53 31 0f 30 0d 06 03 55 04 03 13 06 72 61 64 69 75 73 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 53 75 70 70 6f 72 74 5f 65 40 68 75 61 77 65 69 2e 63 6f 6d 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 a6 47 91 ba 08 ae 89 47 58 53 7c 31 21 f9 97 fc 78 99 4b 49 ab 60 64 62 f8 c1 9a ca df d3 02 be 85 7e 44 42 b5 a3 79 bd d0 e4 85 65 06 96 94 45 6e 5a 8e ce b9 60 c9 e5 52 41 7a 98 4a 61 49 08 1d de 32 35 33 e8 8f dd 1f 58 21 47 a0 9f c7 a4 15 23 bb c4 72 58 5b 29 2e 26 7a 65 d5 58 99 e1 cc 66 eb b1 e1 3f 1e 6e 10 c4 cd 60 05 4e 9f 91 93 a7 b2 26 58 2d 34 58 63 53 f4 5f 84 1a ec 6f ] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [EAP-Message ] [255] [8f 2a d5 ee 6b 11 dc 3c 9e 88 67 2d eb 46 e6 61 25 92 cc 92 7e b9 a4 0b 3c 50 cf 60 b4 39 46 70 79 9f 00 65 7d 5e 74 d3 89 a3 e0 c5 9f 49 e9 de c2 5d ea 03 75 c7 a4 6b c5 77 dd 42 bb 8d 28 e0 89 d1 a4 31 4a 1c 94 b9 d9 63 70 09 b5 24 cd 13 51 b9 b6 ee a5 c9 cc cf 22 df 31 35 b3 af 4e 6b dd 76 87 0e e2 d1 62 d7 01 2a 91 d2 6f 2f 15 34 16 80 2f b3 ac c1 6e 3a e9 49 08 56 36 5a 30 0f 02 03 01 00 01 a3 75 30 73 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 04 f0 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 1d 06 03 55 1d 0e 04 16 04 14 cc 2a e0 d3 7a ea 48 64 da 1a 6f b1 8c 47 47 b9 d1 8d 29 1f 30 1f 06 03 55 1d 23 04 18 30 16 80 14 ff 0f 11 2b 98 6e bd cd d5 46 8d 44 a1 11 28 6e 94 c8 ab 55 30 0c 06 03 55 1d 13 01 01 ff 04 02 30 00 30 ] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [EAP-Message ] [255] [0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 00 93 05 d3 50 f2 5a 05 c9 98 17 2c a1 f3 bc a0 34 77 7b 28 17 30 9f 7b 85 b9 03 b4 7c c6 65 2d 87 23 11 25 3b 19 59 c4 04 c5 b4 3c 08 ab a0 9a d7 b5 b2 b0 e5 d5 8e 93 6e 73 57 32 ae 41 82 a9 b3 61 05 45 66 a8 cb d7 b6 28 87 7c 33 ca e1 77 cf 3b c4 e9 dd 55 3d f6 2d 68 12 95 c3 4a 46 52 71 37 4f 21 0e cf 32 e8 f3 a2 93 79 ee c8 11 ab 2f 7a 8e 66 a0 71 c1 ca b0 da 91 4d 91 3a de 34 08 13 8f ec 6b ae 0b 4e e0 31 83 fa 63 5b ce d3 b4 37 5c 90 50 ab cb f1 24 fa 62 e9 ab 44 c8 53 77 93 00 ef 8a ff 17 02 ed 97 c1 f7 df bd 4a f4 bb 4b 23 f7 31 f9 dd cb ec 52 78 4f 57 59 ae 9d 59 b2 d0 ae 05 73 cb ee 86 75 f1 34 c6 43 dc f0 33 23 a9 1f 66 06 f9 b4 90 1c 52 6b a2 91 87 a9 43 63 b8 2e 13 65 53 f9 b8 a6 ] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [EAP-Message ] [90] [93 e1 be 7b 9b 3e b6 2d 99 b5 ca 0d cc 73 c6 ab ce c4 22 15 59 e5 00 03 39 30 82 03 35 30 82 02 1d a0 03 02 01 02 02 10 65 22 e4 6d c1 27 ec a5 42 f4 5e fb f0 0f f5 98 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 2c 31 0b 30 09 06 03 55 04 06 13 02 43 4e 31 0f ] [Message-Authenticator ] [18] [00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ] |
The RADIUS module receives a RADIUS Access Challenge packet carrying the EAP-Message attribute from the RADIUS server. |
40 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Send authentication challenge message to AAA. |
The RADIUS module sends an authentication challenge packet to the AAA module. |
41 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA receive AAA_RD_MSG_AUTHENCHALLENGE message(52) from RADIUS module(235). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: CID:22 TemplateNo:2 SerialNo:7 SrcMsg:AAA_RD_MSG_AUTHENREQ PriyServer::: Vrf:0 SendServer:172.168.10.7 Vrf:0 EapSessionTime:4294967295 EapPasswordRetry:4294967295 TerminationAction:4294967295 EapLength:1100 RDReplyMessage: State:0172fee5673000000172fee56730 |
The AAA module receives an authentication challenge packet from the RADIUS module. |
42 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA send AAA_SRV_MSG_AUTHEN_ACK message(36) to UCM module(232). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: DestIndex:18 SrcIndex:18 Slot:4294967295 Result:2 DomainIndex:65535 ServiceScheme:65535 AuthedPalace:3 VLAN:65535 IsCallBackVerify:0 IsCallbackUser:0 IfSessionTimeout:0 IfRemanentVolume:0 IfIdleCut:0 SessionTimeout:4294967295 RemanentVolume:4294967295 IdleTimeout:4294967295 EAPSessionTimeout:4294967295 EAPPasswordRetry:4294967295 RTAcctInterval:4294967295 Priority:[255,255] AdminLevel:255 NextHop:4294967295 Role:0 LiAdmin:0 EapSize:1100 ReplyMessage: TunnelType:0 MediumType:0 PrivateGroupID: SerialNo:7 WlanReasonCode:0 |
The AAA module sends an authentication challenge packet to the UCM module. |
43 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive AAA_SRV_MSG_AUTHEN_ACK from AAA module (msg code: 36 CID:18). |
The UCM module receives an authentication ACK packet from the AAA module. |
44 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_CIB_S] enter in CMNACFillAAAAckInfo. [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_CIB_S] enter in CM_NAC_ProAckInfo. [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication ack message to AAA module (CID:18). |
The UCM module sends an authentication ACK packet to the EAP module. |
45 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authen ack message from UCM module.(Result=2,local index=6,MAC=84c9-b272-47e0,RadiusTemplateIndex=65535,Reason=255) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authentication ack message from server.(result:SRV_AUTH_CHALLENGE) |
The EAP module receives an authentication challenge packet from the UCM module. |
46 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request challenge packet to user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: OUT 84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8 88 8e 01 00 04 4c 01 0c 04 4c 19 c0 00 00 07 40 16 03 01 07 3b 02 00 00 4d 03 01 5e f9 92 ca ec 4e 76 65 d5 68 71 0f 9d fa fb 42 aa d2 e7 eb b4 c8 b8 96 6f df 5e e7 f6 c0 48 c4 20 5e f9 92 ca e3 30 78 2a 97 3d e6 b3 62 83 79 43 92 4f e6 b7 b0 15 4e 44 c3 4e b0 8a d5 37 c0 57 00 2f 00 00 05 ff 01 00 01 00 0b 00 06 e2 00 06 df 00 03 a0 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:1100 EAPOL packet: Code:Request(1); Id:12; Length:1100; Type:PEAP(25) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send EAP_request packet to user successfully.(Index=6) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send request/challenge packet to user successfully.enter request status.(local index:6) |
The EAP module sends an EAP PEAP Request packet to the STA. |
47 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0, [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: IN fc e3 3c 9e 6d 66 84 c9 b2 72 47 e0 81 00 e0 c8 88 8e 01 00 00 06 02 0c 00 06 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:6 EAPOL packet: Code:Response(2); Id:12; Length:6; Type:PEAP(25) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EAPoL response challenge packet from user. |
The EAP module receives an EAP PEAP Response packet from the STA. |
48 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:EAPoL Send authentication message to server. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send authentication request message to user connection manager module successfully.(local index:6) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request to UCM module successfully.(local index:6) |
The EAP module sends an authentication request packet to the UCM module. |
49 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive ESAP_SRV_MSG_AUTH_REQ from EAPOL module (msg code: 184 CID:18). [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM WLAN Get Ap Info. Ap Info is 84A9-C48D-3BA0. |
The UCM module receives an authentication request packet from the EAP module. |
50 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication request message to AAA module (CID:18). |
The UCM module sends an authentication request packet to the AAA module. |
51 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA receive AAA_SRV_MSG_AUTHEN_REQ message(31) from UCM module(232). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: DestIndex:18 SrcIndex:18 Slot:7168 User:skl MAC:84c9-b272-47e0 Slot:0 SubSlot:0 Port:0 VLAN:200 IP:255.255.255.255 AccessType:eap AuthenType:EAPRELAY AdminLevel:0 EapSize:6 AuthenCode:1X ulInterface:2466381824 ChallengeLen:16 ChapID:0 LineType:0 LineIndex:0 PortType:19 AcctSessionId:AC6605_00000000000200b19aa00200012 |
The AAA module receives an authentication request packet from the UCM module. |
52 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA_MAIN initiate EapRelayAuthenReq event to AAA_AUTHEN module. CID:0 Result:0 Info:542008332 [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA send AAA_RD_MSG_AUTHENREQ message(49) to RADIUS module(235). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: CID:22 TemplateNo:2 SerialNo:7 PriyServer::: Vrf:0 SendServer::: Vrf:0 AccessType:eap AuthenMethod:EAPRELAY UserName:skl CallingStationId:84c9-b272-47e0 Slot:0 SubSlot:0 Port:0 Vlan:200 Interface:2466381824 CID:32786 AcctSessionId:AC6605_00000000000200b19aa00200012 PortType:19 ServiceType:2 FramedProtocol:1 FramedIP:255.255.255.255 EapLength:6 StartupTimeStamp:1593441916 LoginIP:0.0.0.0 IPHostAddr:255.255.255.255 84:c9:b2:72:47:e0 ProductID:AC szVersion:Huawei AC6605-26-PWR SecurityStr: |
The AAA module sends an authentication request packet to the RADIUS module. |
53 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Receive authentication request message from AAA module. |
The RADIUS module receives an authentication request packet from the AAA module. |
54 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Send a authentication request packet to radius server( server ip = 172.168.10.7). [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 172.168.10.7 Protocol: Standard Code : 1 Len : 369 ID : 20 [User-Name ] [5 ] [skl] [NAS-Port ] [6 ] [200] [Service-Type ] [6 ] [2] [Framed-Protocol ] [6 ] [1] [Calling-Station-Id ] [16] [84c9-b272-47e0] [NAS-Identifier ] [15] [AC] [NAS-Port-Type ] [6 ] [19] [NAS-Port-Id ] [36] [slot=0;subslot=0;port=0;vlanid=200] [State ] [16] [\001r\376\345g0] [EAP-Message ] [8 ] [02 0c 00 06 19 00 ] [Message-Authenticator ] [18] [14 7f b0 0a e9 0e 93 79 5e 0d 9a c6 c3 9d 75 56 ] [Called-Station-Id ] [32] [84-A9-C4-8D-3B-A0:dot1x_129.77] [Login-IP-Host ] [6 ] [0.0.0.0] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [NAS-IP-Address ] [6 ] [172.168.10.77] [Framed-Mtu ] [6 ] [1500] [Acct-Session-Id ] [36] [AC6605_00000000000200b19aa00200012] [WLAN-Pairwise-Cipher ] [6 ] [0] [WLAN-Group-Cipher ] [6 ] [0] [WLAN-AKM-Suite ] [6 ] [0] [WLAN-Group-Mgmt-Cipher ] [6 ] [0] [HW-NAS-Startup-Time-Stamp ] [6 ] [1593441916] [HW-IP-Host-Address ] [35] [255.255.255.255 84:c9:b2:72:47:e0] [HW-Connect-ID ] [6 ] [32786] [HW-Version ] [22] [Huawei AC6605-26-PWR] [HW-Product-ID ] [4 ] [AC] [HW-AP-Information ] [16] [84A9-C48D-3BA0] [HW-Access-Type ] [6 ] [1] |
The RADIUS module sends a RADIUS Access Request packet to the RADIUS server. |
55 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Received a authentication challenge packet from radius server(server ip = 172.168.10.7). [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 172.168.10.7 Server Port : 1812 Protocol: Standard Code : 11 Len : 834 ID : 20 [State ] [16] [\001r\376\345g0] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [EAP-Message ] [255] [01 0d 03 04 19 00 30 0d 06 03 55 04 0b 13 06 48 55 41 57 45 49 31 0c 30 0a 06 03 55 04 03 13 03 54 53 4d 30 20 17 0d 31 35 30 37 30 39 31 30 32 36 33 33 5a 18 0f 32 30 36 35 30 37 30 39 31 30 33 36 33 33 5a 30 2c 31 0b 30 09 06 03 55 04 06 13 02 43 4e 31 0f 30 0d 06 03 55 04 0b 13 06 48 55 41 57 45 49 31 0c 30 0a 06 03 55 04 03 13 03 54 53 4d 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 df d5 97 c5 9e e0 1c 05 b1 b6 ba 9d d8 8f 44 21 25 fd f1 9c 09 71 e2 2a f9 5d ba 7c 7c 36 e2 b6 34 ea 3e 58 81 b9 a6 08 0a b3 ad 20 f2 f1 cd 16 4c 78 2e 63 2b a7 98 95 63 22 52 e2 85 da 68 8f 2e e8 79 bd b7 63 c3 5a 7b 72 c4 e6 83 c3 e9 0f 41 0c 36 62 6a f9 b7 a4 03 b2 ab f4 79 fb bb 42 7e 21 b7 4f 12 29 6d 31 2e ] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [EAP-Message ] [255] [7e 21 31 e3 7f ed 9f e2 3f 4e 29 69 c4 99 51 9e b6 97 ae 7a e4 bb 88 d5 49 b3 88 79 63 65 b7 c7 b8 7b 83 e6 35 cf a4 24 72 02 b6 7d 26 ac c0 8b ab 94 dc 09 a4 b6 b8 9c 05 60 cb 05 df b8 61 99 01 14 71 cc 84 ac 16 d0 2c 37 1c 29 20 eb 53 e9 b4 07 4b 1d be 99 77 f4 e6 c5 12 43 3a c2 4d bf c6 ca 03 40 a9 43 3a b5 c3 50 58 a6 53 96 2e dd 5b 62 d1 dc c7 3b a8 c9 53 cc 78 d1 6c ff 40 94 af cb 01 4e da f2 0f 66 0c 15 21 bd 61 2e 79 cd f9 b9 01 37 fc 72 93 02 03 01 00 01 a3 51 30 4f 30 0b 06 03 55 1d 0f 04 04 03 02 01 86 30 0f 06 03 55 1d 13 01 01 ff 04 05 30 03 01 01 ff 30 1d 06 03 55 1d 0e 04 16 04 14 ff 0f 11 2b 98 6e bd cd d5 46 8d 44 a1 11 28 6e 94 c8 ab 55 30 10 06 09 2b 06 01 04 01 82 37 15 01 04 03 02 01 00 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 ] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [EAP-Message ] [255] [00 03 82 01 01 00 66 e1 ae a7 5e 49 97 84 9b 8b ee ff 1e 92 1e 14 62 34 39 2a 71 fb aa 5d cf 46 7a 68 1b b2 2d 75 3f d7 cd 51 61 e8 89 93 15 fd ba ca dd 98 4d af b5 3b 71 c1 30 7f dd 86 2b 51 43 da c1 ae e6 13 4f e8 07 6d 95 12 80 13 f0 bd d2 ed dc be 3c 3d be a5 e7 94 b2 2d 44 c9 53 8f 23 39 d9 94 73 e0 58 cb b2 51 5e e3 93 9e f5 34 75 bb 39 f0 15 d8 f9 a2 22 94 7c 0f 3c 5e 40 92 ad fb cc 9f 94 fb a0 4d 84 4a 24 ba 2e 9a b3 e6 67 84 bc 9b 14 0b 17 50 55 cf 64 3b 3e 47 0d ed e9 2c 99 09 ed 88 3b 15 74 17 ca f4 f3 28 b7 bf c9 9f 9b 93 6d da db c5 73 03 5f 04 f3 ac 28 e9 31 4c df d1 84 fd 10 bf 9e 02 ef 80 e7 3e b0 ca 61 18 db ee 04 48 31 52 c9 65 95 ab 15 a0 1e e2 7d 3d da 95 be 3a a1 a5 a9 8d f7 d4 a9 b5 a3 71 a4 d6 2c 93 e0 dc f4 d0 76 2a 84 17 26 ] [EAP-Message ] [15] [35 55 c8 b7 18 8e ae 8f f9 0e 00 00 00 ] [Message-Authenticator ] [18] [00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ] |
The RADIUS module receives a RADIUS Access Challenge packet from the RADIUS server. |
56 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA receive AAA_RD_MSG_AUTHENCHALLENGE message(52) from RADIUS module(235). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: CID:22 TemplateNo:2 SerialNo:7 SrcMsg:AAA_RD_MSG_AUTHENREQ PriyServer::: Vrf:0 SendServer:172.168.10.7 Vrf:0 EapSessionTime:4294967295 EapPasswordRetry:4294967295 TerminationAction:4294967295 EapLength:772 RDReplyMessage: State:0172fee5673000000172fee56730 |
The AAA module receives an authentication challenge packet from the RADIUS module. |
57 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA send AAA_SRV_MSG_AUTHEN_ACK message(36) to UCM module(232). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: DestIndex:18 SrcIndex:18 Slot:4294967295 Result:2 DomainIndex:65535 ServiceScheme:65535 AuthedPalace:3 VLAN:65535 IsCallBackVerify:0 IsCallbackUser:0 IfSessionTimeout:0 IfRemanentVolume:0 IfIdleCut:0 SessionTimeout:4294967295 RemanentVolume:4294967295 IdleTimeout:4294967295 EAPSessionTimeout:4294967295 EAPPasswordRetry:4294967295 RTAcctInterval:4294967295 Priority:[255,255] AdminLevel:255 NextHop:4294967295 Role:0 LiAdmin:0 EapSize:772 ReplyMessage: TunnelType:0 MediumType:0 PrivateGroupID: SerialNo:7 WlanReasonCode:0 |
The AAA module sends an authentication challenge packet to the UCM module. |
58 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive AAA_SRV_MSG_AUTHEN_ACK from AAA module (msg code: 36 CID:18). |
The CM module receives an authentication ACK packet from the AAA module. |
59 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_CIB_S] enter in CMNACFillAAAAckInfo. [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_CIB_S] enter in CM_NAC_ProAckInfo. [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication ack message to AAA module (CID:18). |
The CM module sends an authentication ACK packet to the EAP module. |
60 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authen ack message from UCM module.(Result=2,local index=6,MAC=84c9-b272-47e0,RadiusTemplateIndex=65535,Reason=255) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authentication ack message from server.(result:SRV_AUTH_CHALLENGE) |
The EAP module receives an authentication challenge packet from the UCM module. |
61 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request challenge packet to user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: OUT 84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8 88 8e 01 00 03 04 01 0d 03 04 19 00 30 0d 06 03 55 04 0b 13 06 48 55 41 57 45 49 31 0c 30 0a 06 03 55 04 03 13 03 54 53 4d 30 20 17 0d 31 35 30 37 30 39 31 30 32 36 33 33 5a 18 0f 32 30 36 35 30 37 30 39 31 30 33 36 33 33 5a 30 2c 31 0b 30 09 06 03 55 04 06 13 02 43 4e 31 0f 30 0d 06 03 55 04 0b 13 06 48 55 41 57 45 49 31 0c 30 0a 06 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:772 EAPOL packet: Code:Request(1); Id:13; Length:772; Type:PEAP(25) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send EAP_request packet to user successfully.(Index=6) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send request/challenge packet to user successfully.enter request status.(local index:6) |
The EAP module sends an EAP PEAP Request packet to the STA. |
62 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0, [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: IN fc e3 3c 9e 6d 66 84 c9 b2 72 47 e0 81 00 e0 c8 88 8e 01 00 01 50 02 0d 01 50 19 80 00 00 01 46 16 03 01 01 06 10 00 01 02 01 00 4a 58 0e c5 92 a5 1a 6c 55 b3 4b 7d 0e da a5 c1 7d d9 9a 0e b2 56 64 19 3e bc 83 df f9 63 10 f6 1d 40 e4 1d 3a 79 9e f1 bd 26 78 49 7d 5d e3 13 87 24 f9 00 e9 fc 3c e5 11 b4 59 0b 3f dd 40 ca 82 18 b2 82 e2 db 54 f9 ec 7f 4e cf 96 69 6b 0f 7e 30 47 0a b1 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:336 EAPOL packet: Code:Response(2); Id:13; Length:336; Type:PEAP(25) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EAPoL response challenge packet from user. |
The EAP module receives an EAP PEAP Response packet from the STA. |
63 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:EAPoL Send authentication message to server. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send authentication request message to user connection manager module successfully.(local index:6) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request to UCM module successfully.(local index:6) |
The EAP module sends an authentication request packet to the UCM module. |
64 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive ESAP_SRV_MSG_AUTH_REQ from EAPOL module (msg code: 184 CID:18). |
The UCM module receives an authentication request packet from the EAP module. |
65 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM WLAN Get Ap Info. Ap Info is 84A9-C48D-3BA0. [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication request message to AAA module (CID:18). |
The UCM module sends an authentication request packet to the AAA module. |
66 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA receive AAA_SRV_MSG_AUTHEN_REQ message(31) from UCM module(232). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: DestIndex:18 SrcIndex:18 Slot:7168 User:skl MAC:84c9-b272-47e0 Slot:0 SubSlot:0 Port:0 VLAN:200 IP:255.255.255.255 AccessType:eap AuthenType:EAPRELAY AdminLevel:0 EapSize:336 AuthenCode:1X ulInterface:2466381824 ChallengeLen:16 ChapID:0 LineType:0 LineIndex:0 PortType:19 AcctSessionId:AC6605_00000000000200b19aa00200012 |
The AAA module receives an authentication request packet from the UCM module. |
67 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA send AAA_RD_MSG_AUTHENREQ message(49) to RADIUS module(235). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: CID:22 TemplateNo:2 SerialNo:7 PriyServer::: Vrf:0 SendServer::: Vrf:0 AccessType:eap AuthenMethod:EAPRELAY UserName:skl CallingStationId:84c9-b272-47e0 Slot:0 SubSlot:0 Port:0 Vlan:200 Interface:2466381824 CID:32786 AcctSessionId:AC6605_00000000000200b19aa00200012 PortType:19 ServiceType:2 FramedProtocol:1 FramedIP:255.255.255.255 EapLength:336 StartupTimeStamp:1593441916 LoginIP:0.0.0.0 IPHostAddr:255.255.255.255 84:c9:b2:72:47:e0 ProductID:AC szVersion:Huawei AC6605-26-PWR SecurityStr: |
The AAA module sends an authentication request packet to the RADIUS module. |
68 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Receive authentication request message from AAA module. |
The RADIUS module receives an authentication request packet from the AAA module. |
69 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Send a authentication request packet to radius server( server ip = 172.168.10.7). [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 172.168.10.7 Protocol: Standard Code : 1 Len : 701 ID : 21 [User-Name ] [5 ] [skl] [NAS-Port ] [6 ] [200] [Service-Type ] [6 ] [2] [Framed-Protocol ] [6 ] [1] [Calling-Station-Id ] [16] [84c9-b272-47e0] [NAS-Identifier ] [15] [AC] [NAS-Port-Type ] [6 ] [19] [NAS-Port-Id ] [36] [slot=0;subslot=0;port=0;vlanid=200] [State ] [16] [\001r\376\345g0] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [EAP-Message ] [255] [02 0d 01 50 19 80 00 00 01 46 16 03 01 01 06 10 00 01 02 01 00 4a 58 0e c5 92 a5 1a 6c 55 b3 4b 7d 0e da a5 c1 7d d9 9a 0e b2 56 64 19 3e bc 83 df f9 63 10 f6 1d 40 e4 1d 3a 79 9e f1 bd 26 78 49 7d 5d e3 13 87 24 f9 00 e9 fc 3c e5 11 b4 59 0b 3f dd 40 ca 82 18 b2 82 e2 db 54 f9 ec 7f 4e cf 96 69 6b 0f 7e 30 47 0a b1 93 88 3f 0d 5e e1 e0 f3 53 2e 66 1d 9f 25 e7 e4 2d 62 1e 73 f3 46 fb d3 bf c9 a0 e3 9b 8b 35 5e 18 7c 53 cb 31 cb 0d 6d d8 eb 37 e5 9a 29 cd ae b6 16 da 31 ac 38 65 89 f5 7c 2f ac d0 8e 56 00 41 43 e1 6f ec 56 80 07 50 2f 40 4d cd f6 e9 f2 4e 0a f1 06 97 01 40 ff 26 bd 86 12 3a 2e 99 0c ce 24 3d cd 22 bf dc 40 e4 78 c7 aa eb e3 88 a6 13 57 dd c2 5a ea 97 ba 81 b0 75 28 27 9b 8b 31 07 e1 12 23 89 f2 a4 21 51 da 93 6b 25 61 14 05 1e fc af ] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [EAP-Message ] [85] [f4 1b 25 e9 86 99 2d ba ee 1e f4 77 a7 df 16 48 e2 8a 1a 9f 50 49 a1 df 14 03 01 00 01 01 16 03 01 00 30 ff 2c c5 f0 c0 4a 79 19 3a 5e 2c de 0c 8e 81 c0 98 64 f9 d0 b2 fd 05 53 9e 0b ca 0e 4f 87 90 d7 fc 6b e9 43 50 16 92 ee d2 82 6d 5b 6d 47 49 74 ] [Message-Authenticator ] [18] [fb 5e f3 a3 d1 48 0d 86 f6 60 ba 2b 4b bd 6b 95 ] [Called-Station-Id ] [32] [84-A9-C4-8D-3B-A0:dot1x_129.77] [Login-IP-Host ] [6 ] [0.0.0.0] [NAS-IP-Address ] [6 ] [172.168.10.77] [Framed-Mtu ] [6 ] [1500] [Acct-Session-Id ] [36] [AC6605_00000000000200b19aa00200012] [WLAN-Pairwise-Cipher ] [6 ] [0] [WLAN-Group-Cipher ] [6 ] [0] [WLAN-AKM-Suite ] [6 ] [0] [WLAN-Group-Mgmt-Cipher ] [6 ] [0] [HW-NAS-Startup-Time-Stamp ] [6 ] [1593441916] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [HW-IP-Host-Address ] [35] [255.255.255.255 84:c9:b2:72:47:e0] [HW-Connect-ID ] [6 ] [32786] [HW-Version ] [22] [Huawei AC6605-26-PWR] [HW-Product-ID ] [4 ] [AC] [HW-AP-Information ] [16] [84A9-C48D-3BA0] [HW-Access-Type ] [6 ] [1] |
The RADIUS module sends a RADIUS Access Request packet to the RADIUS server. |
70 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Received a authentication challenge packet from radius server(server ip = 172.168.10.7). [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 172.168.10.7 Server Port : 1812 Protocol: Standard Code : 11 Len : 121 ID : 21 [State ] [16] [\001r\376\345g0] [EAP-Message ] [67] [01 0e 00 41 19 00 14 03 01 00 01 01 16 03 01 00 30 ac 39 a7 9b 17 6c 1d 9b 90 fb 85 f8 82 ea b5 0b 00 b6 54 1a 8a 35 1b e2 ec 99 81 65 f3 d6 60 58 07 e3 56 f8 2d 44 1d 37 aa b1 6b 1c a8 ef 1a 33 ] [Message-Authenticator ] [18] [00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ] |
The RADIUS module receives a RADIUS Access Challenge packet from the RADIUS server. |
71 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA receive AAA_RD_MSG_AUTHENCHALLENGE message(52) from RADIUS module(235). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: CID:22 TemplateNo:2 SerialNo:7 SrcMsg:AAA_RD_MSG_AUTHENREQ PriyServer::: Vrf:0 SendServer:172.168.10.7 Vrf:0 EapSessionTime:4294967295 EapPasswordRetry:4294967295 TerminationAction:4294967295 EapLength:65 RDReplyMessage: State:0172fee5673000000172fee56730 |
The RADIUS module sends an authentication challenge packet to the AAA module. |
72 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA send AAA_SRV_MSG_AUTHEN_ACK message(36) to UCM module(232). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: DestIndex:18 SrcIndex:18 Slot:4294967295 Result:2 DomainIndex:65535 ServiceScheme:65535 AuthedPalace:3 VLAN:65535 IsCallBackVerify:0 IsCallbackUser:0 IfSessionTimeout:0 IfRemanentVolume:0 IfIdleCut:0 SessionTimeout:4294967295 RemanentVolume:4294967295 IdleTimeout:4294967295 EAPSessionTimeout:4294967295 EAPPasswordRetry:4294967295 RTAcctInterval:4294967295 Priority:[255,255] AdminLevel:255 NextHop:4294967295 Role:0 LiAdmin:0 EapSize:65 ReplyMessage: TunnelType:0 MediumType:0 PrivateGroupID: SerialNo:7 WlanReasonCode:0 |
The AAA module transparently transmits an authentication challenge packet to the UCM module. |
73 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive AAA_SRV_MSG_AUTHEN_ACK from AAA module (msg code: 36 CID:18). |
The UCM module receives an authentication challenge packet from the AAA module. |
74 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_CIB_S] enter in CMNACFillAAAAckInfo. [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_CIB_S] enter in CM_NAC_ProAckInfo. [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication ack message to AAA module (CID:18). |
The UCM module sends an authentication challenge packet to the EAP module. |
75 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authen ack message from UCM module.(Result=2,local index=6,MAC=84c9-b272-47e0,RadiusTemplateIndex=65535,Reason=255) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authentication ack message from server.(result:SRV_AUTH_CHALLENGE) |
The EAP module receives an authentication challenge packet from the UCM module. |
76 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request challenge packet to user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: OUT 84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8 88 8e 01 00 00 41 01 0e 00 41 19 00 14 03 01 00 01 01 16 03 01 00 30 ac 39 a7 9b 17 6c 1d 9b 90 fb 85 f8 82 ea b5 0b 00 b6 54 1a 8a 35 1b e2 ec 99 81 65 f3 d6 60 58 07 e3 56 f8 2d 44 1d 37 aa b1 6b 1c a8 ef 1a 33 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:65 EAPOL packet: Code:Request(1); Id:14; Length:65; Type:PEAP(25) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send EAP_request packet to user successfully.(Index=6) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send request/challenge packet to user successfully.enter request status.(local index:6) |
The EAP module sends an EAP PEAP Request packet to the STA. |
77 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0, [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: IN fc e3 3c 9e 6d 66 84 c9 b2 72 47 e0 81 00 e0 c8 88 8e 01 00 00 06 02 0e 00 06 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:6 EAPOL packet: Code:Response(2); Id:14; Length:6; Type:PEAP(25) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EAPoL response challenge packet from user. |
The EAP module receives an EAP PEAP Response packet from the STA. |
78 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:EAPoL Send authentication message to server. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send authentication request message to user connection manager module successfully.(local index:6) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request to UCM module successfully.(local index:6) |
The EAP module sends an authentication request packet to the UCM module. |
79 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive ESAP_SRV_MSG_AUTH_REQ from EAPOL module (msg code: 184 CID:18). |
The UCM module receives an authentication request packet from the EAP module. |
80 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM WLAN Get Ap Info. Ap Info is 84A9-C48D-3BA0. [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication request message to AAA module (CID:18). |
The UCM module sends an authentication request packet to the AAA module. |
81 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA receive AAA_SRV_MSG_AUTHEN_REQ message(31) from UCM module(232). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: DestIndex:18 SrcIndex:18 Slot:7168 User:skl MAC:84c9-b272-47e0 Slot:0 SubSlot:0 Port:0 VLAN:200 IP:255.255.255.255 AccessType:eap AuthenType:EAPRELAY AdminLevel:0 EapSize:6 AuthenCode:1X ulInterface:2466381824 ChallengeLen:16 ChapID:0 LineType:0 LineIndex:0 PortType:19 AcctSessionId:AC6605_00000000000200b19aa00200012 [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA_MAIN initiate EapRelayAuthenReq event to AAA_AUTHEN module. CID:0 Result:0 Info:598445172 |
The AAA module receives an authentication request packet from the UCM module. |
82 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA_MAIN initiate EapRelayAuthenReq event to AAA_AUTHEN module. CID:0 Result:0 Info:598445172 [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA send AAA_RD_MSG_AUTHENREQ message(49) to RADIUS module(235). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: CID:22 TemplateNo:2 SerialNo:7 PriyServer::: Vrf:0 SendServer::: Vrf:0 AccessType:eap AuthenMethod:EAPRELAY UserName:skl CallingStationId:84c9-b272-47e0 Slot:0 SubSlot:0 Port:0 Vlan:200 Interface:2466381824 CID:32786 AcctSessionId:AC6605_00000000000200b19aa00200012 PortType:19 ServiceType:2 FramedProtocol:1 FramedIP:255.255.255.255 EapLength:6 StartupTimeStamp:1593441916 LoginIP:0.0.0.0 IPHostAddr:255.255.255.255 84:c9:b2:72:47:e0 ProductID:AC szVersion:Huawei AC6605-26-PWR SecurityStr: |
The AAA module sends an authentication request packet to the RADIUS module. |
83 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Receive authentication request message from AAA module. |
The RADIUS module receives an authentication request packet from the AAA module. |
84 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Send a authentication request packet to radius server( server ip = 172.168.10.7). [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 172.168.10.7 Protocol: Standard Code : 1 Len : 369 ID : 22 [User-Name ] [5 ] [skl] [NAS-Port ] [6 ] [200] [Service-Type ] [6 ] [2] [Framed-Protocol ] [6 ] [1] [Calling-Station-Id ] [16] [84c9-b272-47e0] [NAS-Identifier ] [15] [AC] [NAS-Port-Type ] [6 ] [19] [NAS-Port-Id ] [36] [slot=0;subslot=0;port=0;vlanid=200] [State ] [16] [\001r\376\345g0] [EAP-Message ] [8 ] [02 0e 00 06 19 00 ] [Message-Authenticator ] [18] [e5 2b ce 74 30 62 4a 2e 97 d6 d9 99 d4 70 ee 21 ] [Called-Station-Id ] [32] [84-A9-C4-8D-3B-A0:dot1x_129.77] [Login-IP-Host ] [6 ] [0.0.0.0] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [NAS-IP-Address ] [6 ] [172.168.10.77] [Framed-Mtu ] [6 ] [1500] [Acct-Session-Id ] [36] [AC6605_00000000000200b19aa00200012] [WLAN-Pairwise-Cipher ] [6 ] [0] [WLAN-Group-Cipher ] [6 ] [0] [WLAN-AKM-Suite ] [6 ] [0] [WLAN-Group-Mgmt-Cipher ] [6 ] [0] [HW-NAS-Startup-Time-Stamp ] [6 ] [1593441916] [HW-IP-Host-Address ] [35] [255.255.255.255 84:c9:b2:72:47:e0] [HW-Connect-ID ] [6 ] [32786] [HW-Version ] [22] [Huawei AC6605-26-PWR] [HW-Product-ID ] [4 ] [AC] [HW-AP-Information ] [16] [84A9-C48D-3BA0] [HW-Access-Type ] [6 ] [1] |
The RADIUS module sends a RADIUS Access Request packet to the RADIUS server. |
85 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Received a authentication challenge packet from radius server(server ip = 172.168.10.7). [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 172.168.10.7 Server Port : 1812 Protocol: Standard Code : 11 Len : 99 ID : 22 [State ] [16] [\001r\376\345g0] [EAP-Message ] [45] [01 0f 00 2b 19 00 17 03 01 00 20 72 a0 35 9b 97 e5 1a fd d2 03 d2 e4 45 a6 05 4a c2 a5 5a e4 89 d7 ec 81 16 10 e8 29 d4 c7 9b f8 ] [Message-Authenticator ] [18] [00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ] |
The RADIUS module receives a RADIUS Access Challenge packet from the RADIUS server. |
86 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Send authentication challenge message to AAA. |
The RADIUS module sends an authentication challenge packet to the AAA module. |
87 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA receive AAA_RD_MSG_AUTHENCHALLENGE message(52) from RADIUS module(235). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: CID:22 TemplateNo:2 SerialNo:7 SrcMsg:AAA_RD_MSG_AUTHENREQ PriyServer::: Vrf:0 SendServer:172.168.10.7 Vrf:0 EapSessionTime:4294967295 EapPasswordRetry:4294967295 TerminationAction:4294967295 EapLength:43 RDReplyMessage: State:0172fee5673000000172fee56730 |
The AAA module receives an authentication challenge packet from the RADIUS module. |
88 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA send AAA_SRV_MSG_AUTHEN_ACK message(36) to UCM module(232). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: DestIndex:18 SrcIndex:18 Slot:4294967295 Result:2 DomainIndex:65535 ServiceScheme:65535 AuthedPalace:3 VLAN:65535 IsCallBackVerify:0 IsCallbackUser:0 IfSessionTimeout:0 IfRemanentVolume:0 IfIdleCut:0 SessionTimeout:4294967295 RemanentVolume:4294967295 IdleTimeout:4294967295 EAPSessionTimeout:4294967295 EAPPasswordRetry:4294967295 RTAcctInterval:4294967295 Priority:[255,255] AdminLevel:255 NextHop:4294967295 Role:0 LiAdmin:0 EapSize:43 ReplyMessage: TunnelType:0 MediumType:0 PrivateGroupID: SerialNo:7 WlanReasonCode:0 |
The AAA module transparently transmits an authentication challenge packet to the UCM module. |
89 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive AAA_SRV_MSG_AUTHEN_ACK from AAA module (msg code: 36 CID:18). |
The UCM module receives an authentication challenge packet from the AAA module. |
90 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_CIB_S] enter in CMNACFillAAAAckInfo. [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_CIB_S] enter in CM_NAC_ProAckInfo. [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication ack message to AAA module (CID:18). |
The UCM module sends an authentication challenge packet to the EAP module, which is incorrectly written as the AAA module in the trace information. |
91 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authen ack message from UCM module.(Result=2,local index=6,MAC=84c9-b272-47e0,RadiusTemplateIndex=65535,Reason=255) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authentication ack message from server.(result:SRV_AUTH_CHALLENGE) |
The EAP module receives an authentication challenge packet from the UCM module. |
92 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request challenge packet to user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: OUT 84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8 88 8e 01 00 00 2b 01 0f 00 2b 19 00 17 03 01 00 20 72 a0 35 9b 97 e5 1a fd d2 03 d2 e4 45 a6 05 4a c2 a5 5a e4 89 d7 ec 81 16 10 e8 29 d4 c7 9b f8 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:43 EAPOL packet: Code:Request(1); Id:15; Length:43; Type:PEAP(25) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send EAP_request packet to user successfully.(Index=6) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send request/challenge packet to user successfully.enter request status.(local index:6) |
The EAP module sends an EAP PEAP Request packet to the STA. |
93 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0, [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: IN fc e3 3c 9e 6d 66 84 c9 b2 72 47 e0 81 00 e0 c8 88 8e 01 00 00 2b 02 0f 00 2b 19 00 17 03 01 00 20 81 f4 31 55 48 1b ae ae a8 8d 03 94 1c bc 88 1b 99 b6 f7 49 63 35 34 ae 56 f0 fc 77 d1 cd 05 04 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:43 EAPOL packet: Code:Response(2); Id:15; Length:43; Type:PEAP(25) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EAPoL response challenge packet from user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:EAPoL Send authentication message to server. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send authentication request message to user connection manager module successfully.(local index:6) |
The EAP module receives an EAP PEAP Response packet from the STA. |
94 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request to UCM module successfully.(local index:6) |
The EAP module sends an authentication request packet to the UCM module. |
95 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive ESAP_SRV_MSG_AUTH_REQ from EAPOL module (msg code: 184 CID:18). |
The UCM module receives an authentication request packet from the EAP module. |
96 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM WLAN Get Ap Info. Ap Info is 84A9-C48D-3BA0. [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication request message to AAA module (CID:18). |
The UCM module sends an authentication request packet to the AAA module. |
97 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA receive AAA_SRV_MSG_AUTHEN_REQ message(31) from UCM module(232). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: DestIndex:18 SrcIndex:18 Slot:7168 User:skl MAC:84c9-b272-47e0 Slot:0 SubSlot:0 Port:0 VLAN:200 IP:255.255.255.255 AccessType:eap AuthenType:EAPRELAY AdminLevel:0 EapSize:43 AuthenCode:1X ulInterface:2466381824 ChallengeLen:16 ChapID:0 LineType:0 LineIndex:0 PortType:19 AcctSessionId:AC6605_00000000000200b19aa00200012 [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA_MAIN initiate EapRelayAuthenReq event to AAA_AUTHEN module. CID:0 Result:0 Info:541994588 |
The AAA module receives an authentication request packet from the UCM module. |
98 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA send AAA_RD_MSG_AUTHENREQ message(49) to RADIUS module(235). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: CID:22 TemplateNo:2 SerialNo:7 PriyServer::: Vrf:0 SendServer::: Vrf:0 AccessType:eap AuthenMethod:EAPRELAY UserName:skl CallingStationId:84c9-b272-47e0 Slot:0 SubSlot:0 Port:0 Vlan:200 Interface:2466381824 CID:32786 AcctSessionId:AC6605_00000000000200b19aa00200012 PortType:19 ServiceType:2 FramedProtocol:1 FramedIP:255.255.255.255 EapLength:43 StartupTimeStamp:1593441916 LoginIP:0.0.0.0 IPHostAddr:255.255.255.255 84:c9:b2:72:47:e0 ProductID:AC szVersion:Huawei AC6605-26-PWR SecurityStr: |
The AAA module sends an authentication request packet to the RADIUS module. |
99 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Receive authentication request message from AAA module. |
The RADIUS module receives an authentication request packet from the AAA module. |
100 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Send a authentication request packet to radius server( server ip = 172.168.10.7). [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 172.168.10.7 Protocol: Standard Code : 1 Len : 406 ID : 23 [User-Name ] [5 ] [skl] [NAS-Port ] [6 ] [200] [Service-Type ] [6 ] [2] [Framed-Protocol ] [6 ] [1] [Calling-Station-Id ] [16] [84c9-b272-47e0] [NAS-Identifier ] [15] [AC] [NAS-Port-Type ] [6 ] [19] [NAS-Port-Id ] [36] [slot=0;subslot=0;port=0;vlanid=200] [State ] [16] [\001r\376\345g0] [EAP-Message ] [45] [02 0f 00 2b 19 00 17 03 01 00 20 81 f4 31 55 48 1b ae ae a8 8d 03 94 1c bc 88 1b 99 b6 f7 49 63 35 34 ae 56 f0 fc 77 d1 cd 05 04 ] [Message-Authenticator ] [18] [7a bf 92 93 36 45 ae f4 dd 55 8c 60 5f 18 05 82 ] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [Called-Station-Id ] [32] [84-A9-C4-8D-3B-A0:dot1x_129.77] [Login-IP-Host ] [6 ] [0.0.0.0] [NAS-IP-Address ] [6 ] [172.168.10.77] [Framed-Mtu ] [6 ] [1500] [Acct-Session-Id ] [36] [AC6605_00000000000200b19aa00200012] [WLAN-Pairwise-Cipher ] [6 ] [0] [WLAN-Group-Cipher ] [6 ] [0] [WLAN-AKM-Suite ] [6 ] [0] [WLAN-Group-Mgmt-Cipher ] [6 ] [0] [HW-NAS-Startup-Time-Stamp ] [6 ] [1593441916] [HW-IP-Host-Address ] [35] [255.255.255.255 84:c9:b2:72:47:e0] [HW-Connect-ID ] [6 ] [32786] [HW-Version ] [22] [Huawei AC6605-26-PWR] [HW-Product-ID ] [4 ] [AC] [HW-AP-Information ] [16] [84A9-C48D-3BA0] [HW-Access-Type ] [6 ] [1] |
The RADIUS module sends a RADIUS Access Request packet to the RADIUS server. |
101 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Received a authentication challenge packet from radius server(server ip = 172.168.10.7). [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 172.168.10.7 Server Port : 1812 Protocol: Standard Code : 11 Len : 115 ID : 23 [State ] [16] [\001r\376\345g0] [EAP-Message ] [61] [01 10 00 3b 19 00 17 03 01 00 30 a0 46 a3 7a 82 67 30 72 d1 a2 ac 8d 50 90 57 77 eb ac 5a f8 f9 c6 16 fd 01 e7 bb 41 81 1b 66 c2 c6 c8 f8 bf ab 20 d9 13 37 fa c9 69 c2 ed a8 0b ] [Message-Authenticator ] [18] [00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ] |
The RADIUS module receives a RADIUS Access Challenge packet from the RADIUS server. |
102 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Send authentication challenge message to AAA. |
The RADIUS module sends an authentication challenge packet to the AAA module. |
103 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA receive AAA_RD_MSG_AUTHENCHALLENGE message(52) from RADIUS module(235). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: CID:22 TemplateNo:2 SerialNo:7 SrcMsg:AAA_RD_MSG_AUTHENREQ PriyServer::: Vrf:0 SendServer:172.168.10.7 Vrf:0 EapSessionTime:4294967295 EapPasswordRetry:4294967295 TerminationAction:4294967295 EapLength:59 RDReplyMessage: State:0172fee5673000000172fee56730 |
The AAA module receives an authentication challenge packet from the RADIUS module. |
104 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA send AAA_SRV_MSG_AUTHEN_ACK message(36) to UCM module(232). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: DestIndex:18 SrcIndex:18 Slot:4294967295 Result:2 DomainIndex:65535 ServiceScheme:65535 AuthedPalace:3 VLAN:65535 IsCallBackVerify:0 IsCallbackUser:0 IfSessionTimeout:0 IfRemanentVolume:0 IfIdleCut:0 SessionTimeout:4294967295 RemanentVolume:4294967295 IdleTimeout:4294967295 EAPSessionTimeout:4294967295 EAPPasswordRetry:4294967295 RTAcctInterval:4294967295 Priority:[255,255] AdminLevel:255 NextHop:4294967295 Role:0 LiAdmin:0 EapSize:59 ReplyMessage: TunnelType:0 MediumType:0 PrivateGroupID: SerialNo:7 WlanReasonCode:0 |
The AAA module transparently transmits an authentication challenge packet to the UCM module. |
105 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive AAA_SRV_MSG_AUTHEN_ACK from AAA module (msg code: 36 CID:18). |
The UCM module receives an authentication challenge packet from the AAA module. |
106 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_CIB_S] enter in CMNACFillAAAAckInfo. [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_CIB_S] enter in CM_NAC_ProAckInfo. [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication ack message to AAA module (CID:18). |
The UCM module sends an authentication response packet to the EAP module. |
107 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authen ack message from UCM module.(Result=2,local index=6,MAC=84c9-b272-47e0,RadiusTemplateIndex=65535,Reason=255) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authentication ack message from server.(result:SRV_AUTH_CHALLENGE) |
The EAP module receives an authentication challenge packet from the UCM module. |
108 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request challenge packet to user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: OUT 84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8 88 8e 01 00 00 3b 01 10 00 3b 19 00 17 03 01 00 30 a0 46 a3 7a 82 67 30 72 d1 a2 ac 8d 50 90 57 77 eb ac 5a f8 f9 c6 16 fd 01 e7 bb 41 81 1b 66 c2 c6 c8 f8 bf ab 20 d9 13 37 fa c9 69 c2 ed a8 0b [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:59 EAPOL packet: Code:Request(1); Id:16; Length:59; Type:PEAP(25) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send EAP_request packet to user successfully.(Index=6) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send request/challenge packet to user successfully.enter request status.(local index:6) |
The EAP module sends an EAP PEAP Request packet to the STA. |
109 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0, [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: IN fc e3 3c 9e 6d 66 84 c9 b2 72 47 e0 81 00 e0 c8 88 8e 01 00 00 5b 02 10 00 5b 19 00 17 03 01 00 50 57 c6 88 0b 98 19 63 2e ac 85 48 9f 61 f6 3a 4a 4d 6b f7 45 db fa e7 13 28 3a 19 e8 da bf b8 42 f0 c1 08 e8 f0 9c b3 e1 0e 8e c3 7c 3b 19 2e 59 ed 76 d4 72 25 e5 a2 0e 6a bc a0 22 55 80 86 1e 92 85 f0 58 3a e1 5f c8 d6 82 d0 40 cb 60 8b 9c [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:91 EAPOL packet: Code:Response(2); Id:16; Length:91; Type:PEAP(25) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EAPoL response challenge packet from user. |
The EAP module receives an EAP PEAP Response packet from the STA. |
110 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:EAPoL Send authentication message to server. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send authentication request message to user connection manager module successfully.(local index:6) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request to UCM module successfully.(local index:6) |
The EAP module sends an authentication request packet to the UCM module. |
111 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive ESAP_SRV_MSG_AUTH_REQ from EAPOL module (msg code: 184 CID:18). |
The UCM module receives an authentication request packet from the EAP module. |
112 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM WLAN Get Ap Info. Ap Info is 84A9-C48D-3BA0. [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication request message to AAA module (CID:18). |
The UCM module sends an authentication request packet to the AAA module. |
113 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA receive AAA_SRV_MSG_AUTHEN_REQ message(31) from UCM module(232). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: DestIndex:18 SrcIndex:18 Slot:7168 User:skl MAC:84c9-b272-47e0 Slot:0 SubSlot:0 Port:0 VLAN:200 IP:255.255.255.255 AccessType:eap AuthenType:EAPRELAY AdminLevel:0 EapSize:91 AuthenCode:1X ulInterface:2466381824 ChallengeLen:16 ChapID:0 LineType:0 LineIndex:0 PortType:19 AcctSessionId:AC6605_00000000000200b19aa00200012 [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA_MAIN initiate EapRelayAuthenReq event to AAA_AUTHEN module. CID:0 Result:0 Info:608704588 |
The AAA module receives an authentication request packet from the UCM module. |
114 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA send AAA_RD_MSG_AUTHENREQ message(49) to RADIUS module(235). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: CID:22 TemplateNo:2 SerialNo:7 PriyServer::: Vrf:0 SendServer::: Vrf:0 AccessType:eap AuthenMethod:EAPRELAY UserName:skl CallingStationId:84c9-b272-47e0 Slot:0 SubSlot:0 Port:0 Vlan:200 Interface:2466381824 CID:32786 AcctSessionId:AC6605_00000000000200b19aa00200012 PortType:19 ServiceType:2 FramedProtocol:1 FramedIP:255.255.255.255 EapLength:91 StartupTimeStamp:1593441916 LoginIP:0.0.0.0 IPHostAddr:255.255.255.255 84:c9:b2:72:47:e0 ProductID:AC szVersion:Huawei AC6605-26-PWR SecurityStr: |
The AAA module sends an authentication request packet to the RADIUS module. |
115 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Receive authentication request message from AAA module. |
The RADIUS module receives an authentication request packet from the AAA module. |
116 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Send a authentication request packet to radius server( server ip = 172.168.10.7). [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 172.168.10.7 Protocol: Standard Code : 1 Len : 454 ID : 24 [User-Name ] [5 ] [skl] [NAS-Port ] [6 ] [200] [Service-Type ] [6 ] [2] [Framed-Protocol ] [6 ] [1] [Calling-Station-Id ] [16] [84c9-b272-47e0] [NAS-Identifier ] [15] [AC] [NAS-Port-Type ] [6 ] [19] [NAS-Port-Id ] [36] [slot=0;subslot=0;port=0;vlanid=200] [State ] [16] [\001r\376\345g0] [EAP-Message ] [93] [02 10 00 5b 19 00 17 03 01 00 50 57 c6 88 0b 98 19 63 2e ac 85 48 9f 61 f6 3a 4a 4d 6b f7 45 db fa e7 13 28 3a 19 e8 da bf b8 42 f0 c1 08 e8 f0 9c b3 e1 0e 8e c3 7c 3b 19 2e 59 ed 76 d4 72 25 e5 a2 0e 6a bc a0 22 55 80 86 1e 92 85 f0 58 3a e1 5f c8 d6 82 d0 40 cb 60 8b 9c ] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [Message-Authenticator ] [18] [e0 f4 65 d0 c7 5e 57 84 fd 4a 3f cc 22 8c 56 41 ] [Called-Station-Id ] [32] [84-A9-C4-8D-3B-A0:dot1x_129.77] [Login-IP-Host ] [6 ] [0.0.0.0] [NAS-IP-Address ] [6 ] [172.168.10.77] [Framed-Mtu ] [6 ] [1500] [Acct-Session-Id ] [36] [AC6605_00000000000200b19aa00200012] [WLAN-Pairwise-Cipher ] [6 ] [0] [WLAN-Group-Cipher ] [6 ] [0] [WLAN-AKM-Suite ] [6 ] [0] [WLAN-Group-Mgmt-Cipher ] [6 ] [0] [HW-NAS-Startup-Time-Stamp ] [6 ] [1593441916] [HW-IP-Host-Address ] [35] [255.255.255.255 84:c9:b2:72:47:e0] [HW-Connect-ID ] [6 ] [32786] [HW-Version ] [22] [Huawei AC6605-26-PWR] [HW-Product-ID ] [4 ] [AC] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [HW-AP-Information ] [16] [84A9-C48D-3BA0] [HW-Access-Type ] [6 ] [1] |
The RADIUS module sends a RADIUS Access Request packet to the RADIUS server. |
117 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Received a authentication challenge packet from radius server(server ip = 172.168.10.7). [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 172.168.10.7 Server Port : 1812 Protocol: Standard Code : 11 Len : 147 ID : 24 [State ] [16] [\001r\376\345g0] [EAP-Message ] [93] [01 11 00 5b 19 00 17 03 01 00 50 b1 39 a1 56 89 5c 50 67 7c 2c 26 26 85 e6 3d f4 dc 4f 59 2d 65 2d 5f e2 6d 80 a9 72 b6 92 18 81 45 e5 05 3a 42 ab ad 50 c6 ce 6a 56 86 be 09 75 46 39 9d bb cd 60 41 55 55 69 ce 58 22 20 77 9a bf 07 53 b9 83 07 5e 2e 23 8f 1e 99 c8 5a 87 1d ] [Message-Authenticator ] [18] [00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ] |
The RADIUS module receives a RADIUS Access Challenge packet from the RADIUS server. |
118 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Send authentication challenge message to AAA. |
The RADIUS module sends an authentication challenge packet to the AAA module. |
119 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA receive AAA_RD_MSG_AUTHENCHALLENGE message(52) from RADIUS module(235). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: CID:22 TemplateNo:2 SerialNo:7 SrcMsg:AAA_RD_MSG_AUTHENREQ PriyServer::: Vrf:0 SendServer:172.168.10.7 Vrf:0 EapSessionTime:4294967295 EapPasswordRetry:4294967295 TerminationAction:4294967295 EapLength:91 RDReplyMessage: State:0172fee5673000000172fee56730 |
The AAA module receives an authentication challenge packet from the RADIUS module. |
120 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA send AAA_SRV_MSG_AUTHEN_ACK message(36) to UCM module(232). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: DestIndex:18 SrcIndex:18 Slot:4294967295 Result:2 DomainIndex:65535 ServiceScheme:65535 AuthedPalace:3 VLAN:65535 IsCallBackVerify:0 IsCallbackUser:0 IfSessionTimeout:0 IfRemanentVolume:0 IfIdleCut:0 SessionTimeout:4294967295 RemanentVolume:4294967295 IdleTimeout:4294967295 EAPSessionTimeout:4294967295 EAPPasswordRetry:4294967295 RTAcctInterval:4294967295 Priority:[255,255] AdminLevel:255 NextHop:4294967295 Role:0 LiAdmin:0 EapSize:91 ReplyMessage: TunnelType:0 MediumType:0 PrivateGroupID: SerialNo:7 WlanReasonCode:0 [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive AAA_SRV_MSG_AUTHEN_ACK from AAA module (msg code: 36 CID:18). |
The AAA module transparently transmits an authentication challenge packet to the UCM module. |
121 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_CIB_S] enter in CMNACFillAAAAckInfo. [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_CIB_S] enter in CM_NAC_ProAckInfo. [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication ack message to AAA module (CID:18). |
The UCM module sends an authentication challenge packet to the EAP module. |
122 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authen ack message from UCM module.(Result=2,local index=6,MAC=84c9-b272-47e0,RadiusTemplateIndex=65535,Reason=255) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authentication ack message from server.(result:SRV_AUTH_CHALLENGE) |
The EAP module receives an authentication challenge packet from the UCM module. |
123 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request challenge packet to user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: OUT 84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8 88 8e 01 00 00 5b 01 11 00 5b 19 00 17 03 01 00 50 b1 39 a1 56 89 5c 50 67 7c 2c 26 26 85 e6 3d f4 dc 4f 59 2d 65 2d 5f e2 6d 80 a9 72 b6 92 18 81 45 e5 05 3a 42 ab ad 50 c6 ce 6a 56 86 be 09 75 46 39 9d bb cd 60 41 55 55 69 ce 58 22 20 77 9a bf 07 53 b9 83 07 5e 2e 23 8f 1e 99 c8 5a 87 1d [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:91 EAPOL packet: Code:Request(1); Id:17; Length:91; Type:PEAP(25) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send EAP_request packet to user successfully.(Index=6) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send request/challenge packet to user successfully.enter request status.(local index:6) |
The EAP module sends an EAP PEAP Request packet to the STA. |
124 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0, [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: IN fc e3 3c 9e 6d 66 84 c9 b2 72 47 e0 81 00 e0 c8 88 8e 01 00 00 2b 02 11 00 2b 19 00 17 03 01 00 20 a8 f0 20 1f 43 d7 a8 16 15 f3 6a e6 ea 39 17 d8 31 bc 40 de 83 84 b6 2b 75 2c 05 eb dc 6d 67 38 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:43 EAPOL packet: Code:Response(2); Id:17; Length:43; Type:PEAP(25) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EAPoL response challenge packet from user. |
The EAP module receives an EAP PEAP Response packet from the STA. |
125 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:EAPoL Send authentication message to server. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send authentication request message to user connection manager module successfully.(local index:6) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request to UCM module successfully.(local index:6) |
The EAP module sends an authentication request packet to the UCM module. |
126 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive ESAP_SRV_MSG_AUTH_REQ from EAPOL module (msg code: 184 CID:18). |
The UCM module receives an authentication request packet from the EAP module. |
127 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM WLAN Get Ap Info. Ap Info is 84A9-C48D-3BA0. [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication request message to AAA module (CID:18). |
The UCM module sends an authentication request packet to the AAA module. |
128 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA receive AAA_SRV_MSG_AUTHEN_REQ message(31) from UCM module(232). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: DestIndex:18 SrcIndex:18 Slot:7168 User:skl MAC:84c9-b272-47e0 Slot:0 SubSlot:0 Port:0 VLAN:200 IP:255.255.255.255 AccessType:eap AuthenType:EAPRELAY AdminLevel:0 EapSize:43 AuthenCode:1X ulInterface:2466381824 ChallengeLen:16 ChapID:0 LineType:0 LineIndex:0 PortType:19 AcctSessionId:AC6605_00000000000200b19aa00200012 [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA_MAIN initiate EapRelayAuthenReq event to AAA_AUTHEN module. CID:0 Result:0 Info:608704588 |
The AAA module receives an authentication request packet from the UCM module. |
129 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA send AAA_RD_MSG_AUTHENREQ message(49) to RADIUS module(235). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: CID:22 TemplateNo:2 SerialNo:7 PriyServer::: Vrf:0 SendServer::: Vrf:0 AccessType:eap AuthenMethod:EAPRELAY UserName:skl CallingStationId:84c9-b272-47e0 Slot:0 SubSlot:0 Port:0 Vlan:200 Interface:2466381824 CID:32786 AcctSessionId:AC6605_00000000000200b19aa00200012 PortType:19 ServiceType:2 FramedProtocol:1 FramedIP:255.255.255.255 EapLength:43 StartupTimeStamp:1593441916 LoginIP:0.0.0.0 IPHostAddr:255.255.255.255 84:c9:b2:72:47:e0 ProductID:AC szVersion:Huawei AC6605-26-PWR SecurityStr: |
The AAA module sends an authentication request packet to the RADIUS module. |
130 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Receive authentication request message from AAA module. |
The RADIUS module receives an authentication request packet from the AAA module. |
131 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Send a authentication request packet to radius server( server ip = 172.168.10.7). [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 172.168.10.7 Protocol: Standard Code : 1 Len : 406 ID : 25 [User-Name ] [5 ] [skl] [NAS-Port ] [6 ] [200] [Service-Type ] [6 ] [2] [Framed-Protocol ] [6 ] [1] [Calling-Station-Id ] [16] [84c9-b272-47e0] [NAS-Identifier ] [15] [AC] [NAS-Port-Type ] [6 ] [19] [NAS-Port-Id ] [36] [slot=0;subslot=0;port=0;vlanid=200] [State ] [16] [\001r\376\345g0] [EAP-Message ] [45] [02 11 00 2b 19 00 17 03 01 00 20 a8 f0 20 1f 43 d7 a8 16 15 f3 6a e6 ea 39 17 d8 31 bc 40 de 83 84 b6 2b 75 2c 05 eb dc 6d 67 38 ] [Message-Authenticator ] [18] [0d da 19 aa 6d 97 ba 8b 75 1e 5e 1c 5d 11 23 d5 ] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [Called-Station-Id ] [32] [84-A9-C4-8D-3B-A0:dot1x_129.77] [Login-IP-Host ] [6 ] [0.0.0.0] [NAS-IP-Address ] [6 ] [172.168.10.77] [Framed-Mtu ] [6 ] [1500] [Acct-Session-Id ] [36] [AC6605_00000000000200b19aa00200012] [WLAN-Pairwise-Cipher ] [6 ] [0] [WLAN-Group-Cipher ] [6 ] [0] [WLAN-AKM-Suite ] [6 ] [0] [WLAN-Group-Mgmt-Cipher ] [6 ] [0] [HW-NAS-Startup-Time-Stamp ] [6 ] [1593441916] [HW-IP-Host-Address ] [35] [255.255.255.255 84:c9:b2:72:47:e0] [HW-Connect-ID ] [6 ] [32786] [HW-Version ] [22] [Huawei AC6605-26-PWR] [HW-Product-ID ] [4 ] [AC] [HW-AP-Information ] [16] [84A9-C48D-3BA0] [HW-Access-Type ] [6 ] [1] |
The RADIUS module sends a RADIUS Access Request packet to the RADIUS server. |
132 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Received a authentication challenge packet from radius server(server ip = 172.168.10.7). [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 172.168.10.7 Server Port : 1812 Protocol: Standard Code : 11 Len : 179 ID : 25 [State ] [16] [\001r\376\345g0] [EAP-Message ] [125] [01 12 00 7b 19 00 17 03 01 00 70 73 ca 43 cd d9 7e 13 50 73 d7 a2 aa 8f fb d7 fa 2e 24 78 75 a4 54 c9 fb 50 9f fe f2 49 a6 4c b7 a4 7f 43 9a 8f 1b 6c f1 9f 76 e0 6a a3 51 78 94 9b b6 25 fd 95 67 dc 5a db 6f 52 11 98 70 48 4a 13 6e af c0 22 67 76 61 d6 32 a1 8d 43 ba b1 a0 37 48 06 ca 5c cd 7b 87 b4 b9 06 4b a4 a8 a0 20 86 33 44 c5 6d 60 53 9c 1d db 48 d4 86 1c 64 a6 ] [Message-Authenticator ] [18] [00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ] |
The RADIUS module receives a RADIUS Access Challenge packet from the RADIUS server. |
133 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Send authentication challenge message to AAA. |
The RADIUS module sends an authentication challenge packet to the AAA module. |
134 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA receive AAA_RD_MSG_AUTHENCHALLENGE message(52) from RADIUS module(235). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: CID:22 TemplateNo:2 SerialNo:7 SrcMsg:AAA_RD_MSG_AUTHENREQ PriyServer::: Vrf:0 SendServer:172.168.10.7 Vrf:0 EapSessionTime:4294967295 EapPasswordRetry:4294967295 TerminationAction:4294967295 EapLength:123 RDReplyMessage: State:0172fee5673000000172fee56730 |
The AAA module receives an authentication challenge packet from the RADIUS module. |
135 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA send AAA_SRV_MSG_AUTHEN_ACK message(36) to UCM module(232). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: DestIndex:18 SrcIndex:18 Slot:4294967295 Result:2 DomainIndex:65535 ServiceScheme:65535 AuthedPalace:3 VLAN:65535 IsCallBackVerify:0 IsCallbackUser:0 IfSessionTimeout:0 IfRemanentVolume:0 IfIdleCut:0 SessionTimeout:4294967295 RemanentVolume:4294967295 IdleTimeout:4294967295 EAPSessionTimeout:4294967295 EAPPasswordRetry:4294967295 RTAcctInterval:4294967295 Priority:[255,255] AdminLevel:255 NextHop:4294967295 Role:0 LiAdmin:0 EapSize:123 ReplyMessage: TunnelType:0 MediumType:0 PrivateGroupID: SerialNo:7 WlanReasonCode:0 |
The AAA module transparently transmits an authentication challenge packet to the UCM module. |
136 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive AAA_SRV_MSG_AUTHEN_ACK from AAA module (msg code: 36 CID:18). |
The UCM module receives an authentication response packet from the AAA module. |
137 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_CIB_S] enter in CMNACFillAAAAckInfo. [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_CIB_S] enter in CM_NAC_ProAckInfo. [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication ack message to AAA module (CID:18). |
The UCM module sends an authentication response packet to the EAP module. |
138 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authen ack message from UCM module.(Result=2,local index=6,MAC=84c9-b272-47e0,RadiusTemplateIndex=65535,Reason=255) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authentication ack message from server.(result:SRV_AUTH_CHALLENGE) |
The EAP module receives an authentication challenge packet from the UCM module. |
139 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request challenge packet to user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: OUT 84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8 88 8e 01 00 00 7b 01 12 00 7b 19 00 17 03 01 00 70 73 ca 43 cd d9 7e 13 50 73 d7 a2 aa 8f fb d7 fa 2e 24 78 75 a4 54 c9 fb 50 9f fe f2 49 a6 4c b7 a4 7f 43 9a 8f 1b 6c f1 9f 76 e0 6a a3 51 78 94 9b b6 25 fd 95 67 dc 5a db 6f 52 11 98 70 48 4a 13 6e af c0 22 67 76 61 d6 32 a1 8d 43 ba b1 a0 37 48 06 ca 5c cd 7b 87 b4 b9 06 4b a4 a8 a0 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:123 EAPOL packet: Code:Request(1); Id:18; Length:123; Type:PEAP(25) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send EAP_request packet to user successfully.(Index=6) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send request/challenge packet to user successfully.enter request status.(local index:6) |
The EAP module sends an EAP PEAP Request packet to the STA. |
140 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0, [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: IN fc e3 3c 9e 6d 66 84 c9 b2 72 47 e0 81 00 e0 c8 88 8e 01 00 00 2b 02 12 00 2b 19 00 17 03 01 00 20 aa 99 c7 68 00 31 14 f6 a9 ac 5d fd f1 d9 ac 53 22 1e a5 17 3e b8 a9 55 f4 2e 2e ac ba 66 7f f4 [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:43 EAPOL packet: Code:Response(2); Id:18; Length:43; Type:PEAP(25) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EAPoL response challenge packet from user. |
The EAP module receives an EAP PEAP Response packet from the STA. |
141 |
[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:EAPoL Send authentication message to server. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send authentication request message to user connection manager module successfully.(local index:6) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request to UCM module successfully.(local index:6) |
The EAP module sends an authentication request packet to the UCM module. |
142 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive ESAP_SRV_MSG_AUTH_REQ from EAPOL module (msg code: 184 CID:18). |
The UCM module receives an authentication request packet from the EAP module. |
143 |
[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM WLAN Get Ap Info. Ap Info is 84A9-C48D-3BA0. [BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication request message to AAA module (CID:18). |
The UCM module sends an authentication request packet to the AAA module. |
144 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA receive AAA_SRV_MSG_AUTHEN_REQ message(31) from UCM module(232). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: DestIndex:18 SrcIndex:18 Slot:7168 User:skl MAC:84c9-b272-47e0 Slot:0 SubSlot:0 Port:0 VLAN:200 IP:255.255.255.255 AccessType:eap AuthenType:EAPRELAY AdminLevel:0 EapSize:43 AuthenCode:1X ulInterface:2466381824 ChallengeLen:16 ChapID:0 LineType:0 LineIndex:0 PortType:19 AcctSessionId:AC6605_00000000000200b19aa00200012 [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA_MAIN initiate EapRelayAuthenReq event to AAA_AUTHEN module. CID:0 Result:0 Info:607416084 |
The AAA module receives an authentication request packet from the UCM module. |
145 |
[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA_MAIN initiate EapRelayAuthenReq event to AAA_AUTHEN module. CID:0 Result:0 Info:607416084 [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: AAA send AAA_RD_MSG_AUTHENREQ message(49) to RADIUS module(235). [BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]: CID:22 TemplateNo:2 SerialNo:7 PriyServer::: Vrf:0 SendServer::: Vrf:0 AccessType:eap AuthenMethod:EAPRELAY UserName:skl CallingStationId:84c9-b272-47e0 Slot:0 SubSlot:0 Port:0 Vlan:200 Interface:2466381824 CID:32786 AcctSessionId:AC6605_00000000000200b19aa00200012 PortType:19 ServiceType:2 FramedProtocol:1 FramedIP:255.255.255.255 EapLength:43 StartupTimeStamp:1593441916 LoginIP:0.0.0.0 IPHostAddr:255.255.255.255 84:c9:b2:72:47:e0 ProductID:AC szVersion:Huawei AC6605-26-PWR SecurityStr: |
The AAA module sends an authentication request packet to the RADIUS module. |
146 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Receive authentication request message from AAA module. |
The RADIUS module receives an authentication request packet from the AAA module. |
147 |
[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Send a authentication request packet to radius server( server ip = 172.168.10.7). [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 172.168.10.7 Protocol: Standard Code : 1 Len : 406 ID : 26 [User-Name ] [5 ] [skl] [NAS-Port ] [6 ] [200] [Service-Type ] [6 ] [2] [Framed-Protocol ] [6 ] [1] [Calling-Station-Id ] [16] [84c9-b272-47e0] [NAS-Identifier ] [15] [AC] [NAS-Port-Type ] [6 ] [19] [NAS-Port-Id ] [36] [slot=0;subslot=0;port=0;vlanid=200] [State ] [16] [\001r\376\345g0] [EAP-Message ] [45] [02 12 00 2b 19 00 17 03 01 00 20 aa 99 c7 68 00 31 14 f6 a9 ac 5d fd f1 d9 ac 53 22 1e a5 17 3e b8 a9 55 f4 2e 2e ac ba 66 7f f4 ] [Message-Authenticator ] [18] [f4 69 e2 32 9b 7c d2 ff 27 43 d3 d6 00 b0 70 26 ] [BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]: [Called-Station-Id ] [32] [84-A9-C4-8D-3B-A0:dot1x_129.77] [Login-IP-Host ] [6 ] [0.0.0.0] [NAS-IP-Address ] [6 ] [172.168.10.77] [Framed-Mtu ] [6 ] [1500] [Acct-Session-Id ] [36] [AC6605_00000000000200b19aa00200012] [WLAN-Pairwise-Cipher ] [6 ] [0] [WLAN-Group-Cipher ] [6 ] [0] [WLAN-AKM-Suite ] [6 ] [0] [WLAN-Group-Mgmt-Cipher ] [6 ] [0] [HW-NAS-Startup-Time-Stamp ] [6 ] [1593441916] [HW-IP-Host-Address ] [35] [255.255.255.255 84:c9:b2:72:47:e0] [HW-Connect-ID ] [6 ] [32786] [HW-Version ] [22] [Huawei AC6605-26-PWR] [HW-Product-ID ] [4 ] [AC] [HW-AP-Information ] [16] [84A9-C48D-3BA0] [HW-Access-Type ] [6 ] [1] |
The RADIUS module sends a RADIUS Access Request packet to the RADIUS server. |
148 |
[BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]: Received a authentication accept packet from radius server(server ip = 172.168.10.7). [BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 172.168.10.7 Server Port : 1812 Protocol: Standard Code : 2 Len : 176 ID : 26 [EAP-Message ] [6 ] [03 13 00 04 ] [State ] [16] [\001r\376\345g0] [MS-MPPE-Send-Key ] [52] [27 cf b9 be 04 b4 e7 6c 4c 98 3d d0 91 b4 4e 2b a1 80 30 c7 34 9d 87 39 be 55 37 4e 6a b1 ec 17 92 4f 94 cb 99 4a 12 c2 f8 23 89 61 1c 16 04 87 cb f8 ] [MS-MPPE-Recv-Key ] [52] [27 cf b9 aa e0 54 51 d1 34 5e 1d 1e f2 3c 2f 65 01 93 99 0e 66 11 61 93 3d 56 f0 e9 5f a5 60 95 c9 f0 07 8e f6 68 a2 6b 70 9c 2b 36 ed f3 53 1c b7 0e ] [Message-Authenticator ] [18] [00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ] |
The RADIUS module receives an authentication success packet from the RADIUS server.
|
149 |
[BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]:Send authentication reply message to AAA. |
The RADIUS module sends an authentication success packet to the AAA module. |
150 |
[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]: AAA receive AAA_RD_MSG_AUTHENACCEPT message(50) from RADIUS module(235). [BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]: CID:22 TemplateNo:2 SerialNo:7 SrcMsg:AAA_RD_MSG_AUTHENREQ PriyServer::: Vrf:0 SendServer:172.168.10.7 Vrf:0 SessionTimeout:0 IdleTimeout:0 AcctInterimInterval:0 RemanentVolume:0 InputPeakRate:0 InputAverageRate:0 OutputPeakRate:0 OutputAverageRate:0 InputBasicRate:0 OutputBasicRate:0 InputPBS:0 OutputPBS:0 Priority:[0,0] DNS:[0.0.0.0, 0.0.0.0] ServiceType:0 LoginService:0 AdminLevel:0 FramedProtocol:0 LoginIpHost:0 NextHop:0 EapLength:4 ReplyMessage: TunnelType:0 MediumType:0 PrivateGroupID: WlanReasonCode:0 |
The AAA module receives an authentication success packet from the RADIUS module. |
151 |
[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]: AAA send AAA_SRV_MSG_AUTHEN_ACK message(36) to UCM module(232). [BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]: DestIndex:18 SrcIndex:18 Slot:4294967295 Result:0 DomainIndex:69 ServiceScheme:65535 AuthedPalace:3 VLAN:65535 IsCallBackVerify:0 IsCallbackUser:0 IfSessionTimeout:0 IfRemanentVolume:0 IfIdleCut:0 SessionTimeout:4294967295 RemanentVolume:4294967295 IdleTimeout:4294967295 EAPSessionTimeout:4294967295 EAPPasswordRetry:4294967295 RTAcctInterval:4294967295 Priority:[255,255] AdminLevel:255 NextHop:4294967295 Role:0 LiAdmin:0 EapSize:4 ReplyMessage: TunnelType:0 MediumType:0 PrivateGroupID: SerialNo:7 WlanReasonCode:0 |
The AAA module sends an authentication response packet to the UCM module. ("Result:0" indicates the successful authentication.) |
152 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM receive AAA_SRV_MSG_AUTHEN_ACK from AAA module (msg code: 36 CID:18). |
The UCM module receives an authentication success packet from the AAA module. |
153 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Get Local Authorize]Authen ACL str len.(len=0) [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_CIB_S] enter in CMNACFillAAAAckInfo. |
Authorization ACL information is obtained. len=0 indicates that no authorization ACL is available. |
154 |
[BTRACE][2020/06/29 15:07:02][2048][WLAN_AC][84c9-b272-47e0]:[Process:2][WSTA] Send static user ap tunnel info oper event return (Type:5, ap:0, vlan:200) |
AP DBSS ELB subscription information is published. |
155 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_CIB_S] enter in CM_NAC_ProAckInfo. |
The UCM module saves authorization information. |
156 |
[BTRACE][2020/06/29 15:07:02][2048][WLAN_AC][84c9-b272-47e0]:[Process:2][WSTA] Oper config fwd user elb (Type:1, Ap:0, radio:0, wlan:4, vlan:200) [BTRACE][2020/06/29 15:07:02][2048][WLAN_AC][84c9-b272-47e0]:[Process:2][WSTA] Update fwd elb tunnlel port (Type:1, ap:0, radio:0, wlan:4, vlan:200, access mode:0, direct:0, tunnel:1, vap:1, code:0) [BTRACE][2020/06/29 15:07:02][2048][WLAN_AC][84c9-b272-47e0]:[Process:2]Process user auth update elb table (ap:0, radio:0, wlan:4, vlan:200, Code:0) |
The user ELB table is updated. |
157 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_ACCTDATA_S]Come in CMFillAcctInfo. [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_ACCTDATA_S]Cib acct data is null in CMFillAcctInfo. [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM_NAC_ChangeWlanUserServiceVlan] Wlan user service-vlan=200, author dynamic vlan: 65535, original dynamic vlan: 0, type: 3, local author bitmap: 0xffffffff. [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Set Parse Ok Acl](oldUserGroup=65535, newGroupId=65535, newAclId[65535,65535,65535,65535], newAclV6Id[65535,65535,65535,65535], newUclGroupId=65535) [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:UserGroupChanged:0 [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Set Parse Ok Acl]: default GroupID=65535 [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Set Parse Ok Acl]:AclIdCache[65535,65535,65535,65535] [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[Get Authorize Info From AAA](inCarFlag=0, outCarFlag=0, GroupID=65535, VLAN=0, voiceVlanflag=0,InDscpValue=255, In8021pValue=255, ServiceSchemeName=, IdleCutFlowDirection=4, IdleCutTime=0, IdleCutSecond=0, IdleCutFlow=0,redirect acl id:65535, EapSessionTimeout=4294967295, SessionTimeout=4294967295, Priority =255,ucDownPriority =255,VlanSource:0, AccountingSep:0) [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM fill user authorization information (CID:18). |
The UCM module saves authorization information. |
158 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Goto Next State](CID=18, Event=81, CM EVENT START NEXT AUTH=58) [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:State from AUTH(substate:BUTT) to GLOCTRL(substate:BUTT). (cib=18, event=CM_EVENT_GC_USER_ACCESS_REQ) |
The UCM module switches the user entry status from AUTH to GLOCTRL. |
159 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Goto Next State](CID=18, Event=6, CM EVENT START NEXT AUTH=58) [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:State from GLOCTRL(substate:BUTT) to AUTH(substate:BUTT). (cib=18, event=AUTH_GC_PASS) |
The UCM module switches the user entry status from GLOCTRL to AUTH. |
160 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM NAC State Auth Entity, OpenUser:0,FailType:46 |
FailType:46 indicates that the authentication is successful and no error occurs. |
161 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:User authentication success (CID:18). |
The UCM module determines that the user authentication is successful. |
162 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:State from AUTH(substate:BUTT) to ADDUSER(substate:BUTT). (cib=18, event=AUTH_GC_PASS) |
The UCM module switches the user entry status from AUTH to ADDUSER. |
163 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]: [CM NAC Proc Port Vlan]Vlan change.(IfIndex=2466381824, IsPortBased=0, newVlan=0, VlanType=3, IsPortbasedGuestAuthened=0) |
The UCM module processes the authorization VLAN. newVlan=0 indicates that the RADIUS server does not deliver the authorization VLAN. |
164 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]: [CM_NAC_CheckIfClearVlan] clear authorised vlan, set modify flag. |
The UCM module deletes the original authorization VLAN information. |
165 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC CheckIfSupportAuthor](PreAuthFlag 0 RemarkInGroupFlag 0 CarFlag 0 authormap 0x 00000000 00000000 accesstype 13 ulRet 1). |
The UCM module checks whether authorization is supported. ulRet 1 indicates that authorization is supported. |
166 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]: [CM Get MCIB Info] Cid:18, FixedCid:32786 [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM_NAC_GetMCIBInfoFromNac:UserGroupID=65535,UclGroupID=65535,usAclID[65535,65535,65535,65535],v6AclID[65535,65535,65535,65535] [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:NotifyTM PreAuthFlag = 0, OldPreAuthFlag = 0,Cib AccessType = 13. [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:NotifyTM UserGroup = 65535, UclGroup = 65535, UserGroupPriority = 255. [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:RemarkDscp = 255 Remark8021p = 255 DnRemark8021p = 255 DnRemarkDscp = 255. [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Get QosInfo From Nac] CM send QoS to TM. UserName=,Valid=0,Cir=0,Pir=0,FlowMappingProfileIndex=0,FlowQueueProfileIndex=0 [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM_NAC_GetMCIBInfoFromNac ucUserGroupChanged = 0, HttpsToCpuFlag:0, Dot1xUrlFlag:0 [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]: [CM Get MCIB Info]DetectVlanId=0, Cib GateWay=0xffffffff. [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]: CM_SendSetTableMsg: CID:18, Command:0,UserGroup:65535 UclGroupId:65535, aclNum:65535,usAclID[65535,65535,65535,65535],ucHttpFwdFlg=0 [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]: CM_SendSetTableMsg: OldDestSlotFlag:0x 00000000 00000000 00000000 00000000, NewDestSlotFlag: 0x 00000000 00000000 00000000 00000001 |
The UCM module fills in the authorization request packet. |
167 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Proc Lpu](OpType=0, WlanFlag=1, WANFlag=0, vlan=0, Ret=0). |
The UCM module sends an authorization request packet to the TM module. Ret=0 indicates that the packet is successfully sent. |
168 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:Open user access ability (CID:18). |
The UCM module instructs the EAP module to clear the authentication failure count on the port. |
169 |
[BTRACE][2020/06/29 15:07:02][7168][TM][84c9-b272-47e0]: [TM DBG]SrcNode = 7168, DstNode = 7168. [TM DBG] Rev CM_SET(MsgCode=197) from UCM. Slot:7168 SourceIndex:18 Command:ADD_CIB Slot:0 . [BTRACE][2020/06/29 15:07:02][7168][TM][84c9-b272-47e0]: [TM DBG]Proc EventCall.Index:3 [BTRACE][2020/06/29 15:07:02][7168][TM][84c9-b272-47e0]: [TM DBG]Proc EventCall.(OpType=0) (mac=84c9-b272-47e0, IPV6=00000000:00000000:00000000:00000000, IPV4=0xffffffff, Slot=0, ISPVlan=0) (AuthVlan=0, AuthVlanType=3, PvcVlan=200, PvcVlanType=3, UsrGroup=65535, UclGroup=65535, IsPortBased=0, IfIndex=2466381824) (PreAuthFlag=0,OldPreAuthFlag=0, AuthModifyBmp=0x4, ArpDeny=0,ucHttpFwdFlg=0) (UserGroupPriority=255) [BTRACE][2020/06/29 15:07:02][7168][TM][84c9-b272-47e0]: [TM DBG] (WlanFlag=1, RemoteUser=0, UCRemoteUser=0) [BTRACE][2020/06/29 15:07:02][7168][TM][84c9-b272-47e0]: [TM DBG]Proc EventCall.(ForwardInterface=0,ForwardPdtIndex=0, ISPVlan=0) |
The TM module processes the authorization request packet from the UCM module. |
170 |
[BTRACE][2020/06/29 15:07:02][7168][TM][84c9-b272-47e0]: TM send authorization para info to Ap: AclID = 65535,65535 UpRateLimitValue = -1 DownRateLimitValue = -1 Mac = 84c9-b272-47e0 Isolated = 0 InterIsolated = 0 VLAN = 200 UserGroup = 65535 UclGroup = 65535 Optype = 0 UserUpFlag = 1 PushFlag = 0 AccessType = 13 IsPortBased = 0 UserVlanType = 3 AuthenUserAddCIB = 1 IfIndex = -1828585472 IpAddr = 255.255.255.255 VrfIndex = 0 Cid = -1 PortalLayer3Flag = 0 AckIndex = 3 preauthfalg = 0 httpflag = 0 denyallflag = 0 UpFlowstatistics = 0 DownFlowstatistics = 0 Redirect AclId = 65535, RedirectURL = , IPSecFlag = 255, ArpDeny = 0,fwdflg=0 |
The TM module sends an authorization packet to the AP. |
171 |
[BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WADP] Qos remark info new (In:255, out:255, in1p:255, out1p:255, inDscp:255, outDscp:255).Url len:0, send len:173 [BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7]User auth update elb table (ap:0, radio:0, wlan:4, vlan:200, ap fork:2048, old ap fork:4294967295) [BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] UpDateStaAccessVlan Same Vlan Return [BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Update sta user name skl |
The WLAN processes the user authorization information. |
172 |
[BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7] [WADP] Send User Authorization Info to Ap. (ApID:0,InterIsolated:0,Isolated:0,ArpDeny:0,Optype:0,DownRateLimitValue:4294967295,UpRateLimitValue:4294967295 UserGroup:65535,VLAN:200,PortalPushFlag:0,HttpSendTol4:0,BeforeAuth_En:0,DenyAll:0,ServiceVlan:200 AclID:65535,65535,65535,65535,65535,65535,65535,65535,ReportIP:0,RetCode:0,IdleCutTime:0,IdleCutFlow:0,IdleCutSecond:0) |
The WLAN module forwards the authorization packet to the AP.
|
173 |
[BTRACE][2020/06/29 15:07:02][2048][WLAN_AC][84c9-b272-47e0]:[Process:2][WSTA] Sta auth response deliver to sta process (Type:514822, prim:0, len:236, fork:7168, code:0) [BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WADP] Send User Authorization Result to Esap(src TID:187, dst TID:204, src fork ID:7168, dst fork ID:7168, Command:0, Code:0, Id:3. [BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WADP] Receive Sending User Authorization Info from Ap Response(module:0, prim type:0, data type:2533, code:0, RetCode:0) |
The WLAN module sends an AP authorization response to the TM module. |
174 |
[BTRACE][2020/06/29 15:07:02][7168][TM][84c9-b272-47e0]:TM send ack message to CM module, result: Add CIB OK |
The TM module sends an authorization success packet to the UCM module. |
175 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM receive ESAP_SRV_MSG_CIB_SET_ACK from TM module (msg code: 198 CID:18). |
The UCM module receives an authorization response packet from the TM module. |
176 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]: In ADD USER recevie CM_EVENT_ADD_SUCCESS clear authorize modify bitmap. |
The UCM module clears the authorization flag after authorization check is complete. |
177 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Send Auth Ack](DownModule=0, NewAuthorizeType=6, AckModuleId=209, ExpResult=8, CMAAAAuth=0x2447ed14). |
The UCM module sends an authentication success packet to the EAP module. |
178 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Start Reauth Timer](Cib AuthData AAASuccFlag=1, NacCib ReauthTimeLen=0). |
The UCM module checks the reauthentication configuration. (If [CM NAC Start Reauth Timer].(TimeLen=xx) is displayed, reauthentication is enabled.) |
179 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[AfterUp]CM login request, make start accounting request.(CID=18) [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM WLAN Get Ap Info. Ap Info is 84A9-C48D-3BA0. [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM fill data flow info.(TariffLevel=0) [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM send accounting request message to AAA module (CID:18). [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM make accounting request.(acctType = 1, CID=18) [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_ACCTDATA_S]Come in CMSetAcctWaitFlag. |
The UCM module sends an Accounting Start packet to the AAA module. |
180 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:State from ADDUSER(substate:BUTT) to UP(substate:BUTT). (cib=18, event=ADD_OK) |
The UCM module switches the user table status from ADDUSER to UP. |
181 |
[BTRACE][2020/06/29 15:07:02][7168][EAPoL][84c9-b272-47e0]:Receive authen ack message from UCM module.(Result=0,local index=6,MAC=84c9-b272-47e0,RadiusTemplateIndex=2,Reason=0) [BTRACE][2020/06/29 15:07:02][7168][EAPoL][84c9-b272-47e0]:Receive authentication ack message from server.(result:AUTH_PASS) |
The EAP module receives an authentication success packet from the UCM module. |
182 |
[BTRACE][2020/06/29 15:07:02][7168][EAPoL][84c9-b272-47e0]:Send EAP-Success packet to user. [BTRACE][2020/06/29 15:07:02][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:02][7168][EAPoL][84c9-b272-47e0]: EAPOL packet: OUT 84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8 88 8e 01 00 00 04 03 13 00 04 [BTRACE][2020/06/29 15:07:02][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:4 EAPOL packet: Code:Success(3); Id:19; Length:4; Type:Unknown(0) [BTRACE][2020/06/29 15:07:02][7168][EAPoL][84c9-b272-47e0]:Send EAP_success packet to user successfully.(Index=6) |
The EAP module sends an EAP success packet to the STA. |
183 |
[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]: AAA receive AAA_SRV_MSG_ACCT_REQ message(32) from UCM module(232). [BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]: DestIndex:18 SrcIndex:18 Slot:7168 AcctType:Start AcctMethod:RADIUS AcctSessionID:AC6605_00000000000200b19aa00200012 ucIfTwoLevelAcct:255 RTAcctInterval:65535 AuthedPlace:3 RdsGroup:2 TacTempletID:128 CopyRdsGroup:65535 UpBytes:[0,0] DnBytes:[0,0] UpPkts:[0,0] DnPkts:[0,0] AcctStartTime:1593443221 UTCAcctStartTime:4294967295 UTCAcctStopTime:4294967295 AcctStartSeconds:4294967295 AcctStopSeconds:4294967295 SessionLength:0 UserName:skl MAC:84c9-b272-47e0 Domain:69 AccessType:eap AuthenCode:1X IP:255.255.255.255 Priority:[0,0] Slot:0 SubSlot:0 Port:0 Interface:2466381824 |
The AAA module receives an Accounting-Start packet from the UCM module. |
184 |
[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]: AAA send AAA_RD_MSG_ACCTSTARTREQ message(53) to RADIUS module(235). [BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]: CID:23 TemplateNo:2 SerialNo:0 SrcMsg:AAA_RD_MSG_ACCTSTARTREQ PriyServer:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF Vrf:4294967295 SendServer:172.168.10.7 Vrf:4294967295 CID:32786 AcctType:1 UserName:skl AcctSessionID:AC6605_00000000000200b19aa00200012 Interface:2466381824 SessionLength:0 TerminateCause:0 Authentic:1 UpBytes:[0,0] DnBytes:[0,0] UpPkts:0 DnPkts:0 FramedIP:4294967295 NASPortType:19 Phy:0/0/0 Vlan:200 Priority:0/0 Timestamp:1593443221 FramedProtocol:1 Domain: IPHostAddr:255.255.255.255 84:c9:b2:72:47:e0 UpCIR:0 UpPIR:0 DnCIR:0 DnPIR:0 |
The AAA module sends an Accounting-Start packet to the RADIUS module. AcctType is described as follows:
|
185 |
[BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]:Receive accounting start request message from AAA module. |
The RADIUS module receives an accounting-start packet from the AAA module. |
186 |
[BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]: Send a accounting request packet to radius server( server ip = 172.168.10.7). [BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 172.168.10.7 Protocol: Standard Code : 4 Len : 283 ID : 20 [User-Name ] [5 ] [skl] [NAS-IP-Address ] [6 ] [172.168.10.77] [NAS-Port ] [6 ] [200] [NAS-Identifier ] [15] [AC] [Acct-Status-Type ] [6 ] [1] [Acct-Delay-Time ] [6 ] [0] [Acct-Session-Id ] [36] [AC6605_00000000000200b19aa00200012] [Acct-Authentic ] [6 ] [1] [Event-Timestamp ] [6 ] [1593443221] [NAS-Port-Type ] [6 ] [19] [Calling-Station-Id ] [16] [84c9-b272-47e0] [NAS-Port-Id ] [36] [slot=0;subslot=0;port=0;vlanid=200] [Called-Station-Id ] [32] [84-A9-C4-8D-3B-A0:dot1x_129.77] [Framed-Protocol ] [6 ] [1] [BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]: [Service-Type ] [6 ] [2] [HW-IP-Host-Address ] [35] [255.255.255.255 84:c9:b2:72:47:e0] [HW-Connect-ID ] [6 ] [32786] [HW-AP-Information ] [16] [84A9-C48D-3BA0] [HW-Access-Type ] [6 ] [1] |
The RADIUS module sends an Accounting-Start packet to the RADIUS server. Acct-Status-Type is described as follows:
|
187 |
[BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSEC] Eap Inform STA online, the location of 4-way-handshake is in AP. [BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSEC] Dot1x pmk to ap. [BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSEC] 4-way-handshake success (Code:0, State:2). [BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Process STA authentication done request(Auth Code:0, State:2, Assoc flag:0, Cache Flag:0, Ft Flag:0). [BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WADP] Receive EAP authentication Send PMK Message from EAPOL. |
The WLAN module negotiates the key with the STA (actually on the AP). By default, the AC displays a message indicating that the negotiation is successful. If the negotiation fails on the AP, a handshake failure trace message is displayed. |
188 |
[BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]: Received a accounting response packet from radius server(server ip = 172.168.10.7). [BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]: Server Template: 2 Server IP : 172.168.10.7 Server Port : 1813 Protocol: Standard Code : 5 Len : 20 ID : 20 |
The RADIUS module receives an accounting response packet. |
189 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_ACCTDATA_S]Come in CMGetUserInfo. |
The RADIUS module sends an accounting response packet to the AAA module. |
190 |
[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]: AAA receive AAA_RD_MSG_ACCTSTART_ACK message(56) from RADIUS module(235). [BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]: CID:23 TemplateNo:2 SerialNo:0 SrcMsg:AAA_RD_MSG_ACCTSTARTREQ PriyServer::: Vrf:0 SendServer::: Vrf:0 SessionTimeout:0 RemanentVolume:0 |
The AAA module receives an accounting response packet. |
191 |
[BTRACE][2020/06/29 15:07:02][2048][WLAN_AC][84c9-b272-47e0]:[Process:2][WSTA] Flow fork SingleSta MsgType3044 Vcpu:7 Ret:0 Len:72. |
The WLAN module copies messages between CPUs. |
192 |
[BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WADP] AP report user IP to UCM (IP:20.1.1.203, Version:4, Type:0, LearnType:1, LeaseTime:0, RetCode:0). |
The AP reports the IP address of the STA to the UCM module. |
193 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]: CM_NAC_TransWlanUpdateIpMsg: Recieve update ip message from Wlan,CID = 18, OpeType = 0, IpVersion =0 ip v4=20.1.1.203, Ipv6=1401:1CB::. [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]: CM_NAC_TransWlanUpdateIpMsg: Recieve update ip message from Wlan,CID = 18, OpeType = 0, IpVersion =0 ip v4=20.1.1.203, Ipv6=1401:1CB::. [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]: CM NAC Update Ip Process (mac:84c9-b272-47e0 ip:20.1.1.203 ipv6::: vrf:0) [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]: CM SetCibUserIP: ucIsUpdateV6 = 0 [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]: CM SetCibUserIP: Update ipv4 = 0x140101cb [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]: CM SetCibUserIP:add hash ip, ulNewIpv4Addr = 0x140101cb [CM NAC Update Ip Process]: pstCib->ucUserType = 1 [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Update Ip], new IP=0x140101cb new IPV6=:: vrf = 0 |
The UCM module updates the IP address of the STA. |
194 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM WLAN Get Ap Info. Ap Info is 84A9-C48D-3BA0. [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM fill data flow info.(TariffLevel=0) [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM send accounting request message to AAA module (CID:18). [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM make accounting request.(acctType = 3, CID=18) [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_ACCTDATA_S]Come in CMSetAcctWaitFlag. |
The UCM module sends a real-time accounting packet to the AAA module. (The accounting is triggered by the IP address update.) |
195 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]: [CM Get MCIB Info] Cid:18, FixedCid:32786 [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM_NAC_GetMCIBInfoFromNac:UserGroupID=65535,UclGroupID=65535,usAclID[65535,65535,65535,65535],v6AclID[65535,65535,65535,65535] [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:NotifyTM PreAuthFlag = 0, OldPreAuthFlag = 0,Cib AccessType = 13. [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:NotifyTM UserGroup = 65535, UclGroup = 65535, UserGroupPriority = 255. [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:RemarkDscp = 255 Remark8021p = 255 DnRemark8021p = 255 DnRemarkDscp = 255. [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Get QosInfo From Nac] CM send QoS to TM. UserName=,Valid=0,Cir=0,Pir=0,FlowMappingProfileIndex=0,FlowQueueProfileIndex=0 [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM_NAC_GetMCIBInfoFromNac ucUserGroupChanged = 0, HttpsToCpuFlag:0, Dot1xUrlFlag:0 [BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]: [CM Get MCIB Info]DetectVlanId=0, Cib GateWay=0xffffffff. |
The UCM module sends an authorization packet to the TM module. (The authorization is triggered by the IP address update.) |
196 |
[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]: AAA receive AAA_SRV_MSG_ACCT_REQ message(32) from UCM module(232). |
The AAA module receives an accounting request packet from the UCM module. |
197 |
[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]: AAA send AAA_RD_MSG_ACCTRTREQ message(54) to RADIUS module(235). CID:32786 AcctType:3 UserName:skl AcctSessionID:AC6605_00000000000200b19aa00200012 Interface:2466381824 SessionLength:0 TerminateCause:0 Authentic:1 UpBytes:[0,0] DnBytes:[0,0] UpPkts:0 DnPkts:0 FramedIP:335610315 NASPortType:19 Phy:0/0/0 Vlan:200 Priority:0/0 Timestamp:1593443221 FramedProtocol:1 Domain: IPHostAddr:20.1.1.203 84:c9:b2:72:47:e0 UpCIR:0 UpPIR:0 DnCIR:0 DnPIR:0 |
The AAA module sends a real-time accounting packet to the RADIUS module. |
198 |
[BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]: Receive accounting realtime request message from AAA module. |
The RADIUS module receives a real-time accounting packet from the AAA module. |
199 |
[BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]: Send a accounting request packet to radius server( server ip = 172.168.10.7). |
The RADIUS module sends an accounting packet to the RADIUS server. |
200 |
[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]: [Cib is optimized for struct CM_ACCTDATA_S]Come in CMGetUserInfo. [BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]: Send accounting realtime response message to AAA. |
The RADIUS module sends an accounting response packet to the AAA module. |
201 |
[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]: AAA receive AAA_RD_MSG_ACCTRT_ACK message(57) from RADIUS module(235). SessionTimeout:0 RemanentVolume:0 |
The AAA module receives an accounting response packet from the RADIUS module. |
202 |
[BTRACE][2020/06/29 15:07:20][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WADP] AP report user IP to UCM same return (IP:20.1.1.203, Version:4, LearnType:1, LeaseTime:0). |
The AP reports the IP address of the STA to the UCM module. After finding that the IP address is the same as that recorded in the UCM module, the UCM module does not update the IP address repeatedly. |