1

[BTRACE][2020/06/29 15:07:01][2048][WLAN_AC][84c9-b272-47e0]:[Process:2][WSTA] Flow fork SingleSta MsgType3093 Vcpu:7 Ret:0 Len:318.

该行无需关注,消息在CPU之间复制。Process:2表示当前哪个核在处理报文(消息)。

[AC-diagnose] display process-list

*************************************************

Accumulate total process number :10

Forward mode: centralized

----------------------------------------------

ProcessID ProcessName PID

----------------------------------------------

0 vos.o 196

1 wmc 197

2 wmi 199

3 wmi 200

4 dhcp 201

5 dhcp 202

6 nac 203

7 nac 204

8 ucm_gc 205

9 web_fc 206

***************************************************

2

[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7] [WSTA] Receive STA (Re)associate request message.

Assoc local:1, AP ID:0, Radio ID:0, Wlan ID:4, Type(1:assoc, 2:reassoc):1, Pmk:0, Wapi IE:22, Bk ID Num:0, SFN Flag:0, Ability:40, 2.4G CHs:0, 5G CHs:0. FT Roam:0, FT Access:0, Rssi:-54, Old Ap Mac:0000-0000-0000, Auth Type:5 UniCipher:5 MultiCipher:5. Ap delay num:0, Vap delay num:0, Ap sta mac:0000-0000-0000, Vap sta Mac:0000-0000-0000, ProcessId:2048. Message len:138, Element len:126, Total len:135, Fix len:88, Ext num:1, Ext Len:26, AGV:0, Assoc duration time:5905

收到无线用户关联请求,Old Ap Mac:0000-0000-0000说明非漫游。

3

[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Get sta cfg info VapProfileID:4, VlanId:200, IsBoundVlanPool:0, HacServiceVlanInPool:0, MaxUserNumber:64, VlanMobilityGroupId:1, HomeAgent:0, Fordward:0 Bssid:84a9-c48d-3ba3, ssid:dot1x_129.77, Ap mac:84a9-c48d-3ba0, Ap name:AP-8, AC IP:100.1.1.1, IsDot1xOrWapi:1, Is Ppsk:0, l3 switch:0

获取VAP配置信息,VapProfileID:4,通过display vap-profile all查询索引对应的VapProfile(索引从0(Name: default)开始依次递增)。

4

[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Process STA associate request message:(ApId:0RadioId:0WlanId:4EssId:4 Assoc Type(1:Assoc,2:Reassoc):1 Vlan:200, Type:3093, Seq Num:12, Max num:64).

处理无线用户关联请求,RadioId:0表示2.4G,1表示5G。

5

[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Check vap ap reach max proc(Ap delay num:0, Vap delay num:0, Ap sta mac:0000-0000-0000, Vap sta Mac:0000-0000-0000.

[BTRACE][2020/06/29 15:07:01][2048][WLAN_AC][84c9-b272-47e0]:[Process:2][WSTA] Send STA associate Response message and add sta request (ap:0, radio:0, wlan:0, len:0, response :0, code:0).

[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Add sta data roam info 0:MgIP: 0.0.0.0, IpVer:2, StaDataIp:0, Ret:1

[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Add sta data roam info 1:MgIP: 0.0.0.0, Ap2AcIP:100.1.1.1

[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Send STA associate response message. (FT access:0, FT roam:0, Flag:1, loacl:1, Type:5)

[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Send STA associate response message. (Ap:0, Radio:0, WlanId:4, Type:1, Code:0, Len:326, OpType:0, Flag:0, Detect:1)

[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Roam send add STA and IP-MAC request message (Code:0).

[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Send add STA and IP-MAC request message (Rt:0, Type:0, ablitity:1).

[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] STA (Re)associate request first assoc request response (Type:3093, Code:0).

[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] End to process STA first associate add request (Code:0).

[BTRACE][2020/06/29 15:07:01][2048][WLAN_AC][84c9-b272-47e0]:[Process:2][WSTA] Capwap deliver message to sta process (Type:26, prim:0, len:236, fork:7168, code:0)

[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Process add STA response message (Radio:0, Wlan:4, OpType:0, TryTimes:1 Code:0).

WLAN模块处理无线用户关联请求。

6

[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WADP] Send EAP authentication request message to EAPOL(Ret Code:0).srcChId:187,dstChId:209,msg:232,SrcForkId:7168,EsapForkId:7168,IfIndex:2466381824,VlanId:200,SN:5

WLAN模块发送认证请求给EAP模块。

7

[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSEC] Initiate eapol start message (Interface:2466381824, Vlan:200, Sn:5, Code:0).

[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Process associate authentication successfully(State:2, Pre AP:4294967295).

WLAN模块处理用户关联成功。

8

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:The serialNo carried in wlan request start pkt is 5.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:EAPOL receive dot1x user associate start msg from WLAN.(MAC=, Index=4294967295, CMIndex=4294967295, ulvACNodeId=7168, ulIfIndex=2466381824, vlan=200)

EAP模块收到WLAN模块的开始认证请求。

9

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send a EAPoL request identity packet to user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

EAPOL packet: OUT

84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8

88 8e 01 00 00 05 01 05 00 05 01

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:5 EAPOL packet: Code:Request(1); Id:5; Length:5;Type:Identity(1)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send EAP_request packet to user successfully.(Index=5)

EAP模块发送EAP Request-Identity(ID:5)报文给用户。

10

[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Process eapol start message up sucessfully.

[BTRACE][2020/06/29 15:07:01][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WADP] Receive EAP authentication ack message from EAPOL(Value:0, Code:0, Current SN:5, Response SN:5).

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0,

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

EAPOL packet: IN

01 80 c2 00 00 03 84 c9 b2 72 47 e0 81 00 e0 c8

88 8e 01 01 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

802.1x packet:

Version:802.1X-2001(1); Type:Start(1); Length:0

EAPOL packet:

Code:Unknown(0); Id:0; Length:0; Type:Unknown(0)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EapoL start packet from user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive start packet from user. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:User is exist status, receive a eap start packet. [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Start a new authentication.

EAP模块收到用户发送的EAP Start报文,重新开始认证。

11

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send a EAPoL request identity packet to user.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

EAPOL packet: OUT

84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8

88 8e 01 00 00 05 01 06 00 05 01

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]: 802.1x packet: Version:802.1X-2001(1); Type:Eap(0); Length:5 EAPOL packet: Code:Request(1); Id:6; Length:5; Type:Identity(1) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send EAP_request packet to user successfully.(Index=6)

EAP模块发送EAP Request-Identity(ID:6)报文给用户。

12

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0,

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

EAPOL packet: IN

fc e3 3c 9e 6d 66 84 c9 b2 72 47 e0 81 00 e0 c8

88 8e 01 00 00 08 02 05 00 08 01 73 6b 6c 00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

802.1x packet:

Version:802.1X-2001(1); Type:Eap(0); Length:8

EAPOL packet:

Code:Response(2); Id:5; Length:8;Type:Identity(1) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EAPoL response identity packet from user.

EAP模块收到用户发送的EAP Response-Identity(ID:5)报文。

说明:

如果报文ID已过期,则不处理。

13

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0,

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

EAPOL packet: IN

fc e3 3c 9e 6d 66 84 c9 b2 72 47 e0 81 00 e0 c8

88 8e 01 00 00 08 02 06 00 08 01 73 6b 6c 00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

802.1x packet:

Version:802.1X-2001(1); Type:Eap(0); Length:8

EAPOL packet:

Code:Response(2); Id:6; Length:8; Type:Identity(1) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EAPoL response identity packet from user.

EAP模块收到用户发送的EAP Response-Identity(ID:6)报文,报文ID正确,从报文中获取用户名。

14

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:EAPoL Send authentication message to server.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send authentication request message to user connection manager module successfully.(local index:6)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request to UCM module successfully.(local index:6)

EAP模块发送认证请求给UCM模块。

15

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive ESAP_SRV_MSG_AUTH_REQ from EAPOL module (msg code: 184 CID:18).

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:cib is optimized for struct CM NAC WLAN[CM NAC Fill ExtendCib]:ulApId = 0,ucRadioId = 0,ucWirelessAccessType = 5.

UCM收到EAP模块发送的认证请求。

16

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:

[CM NAC Find Access Type Auth Seq](AccessType=13, seqIndex=1)

UCM模块通过配置获取认证类型EAP(13),常见的还有MAC(23)、Portal(24)。

17

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM WLAN Get Ap Info. Ap Info is 84A9-C48D-3BA0.

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication request message to AAA module (CID:18).

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:State from IDLE(substate:BUTT) to AUTH(substate:BUTT). (cib=18, event=AUTH_REQ)

UCM模块发送认证请求给AAA模块。

18

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA receive AAA_SRV_MSG_AUTHEN_REQ message(31) from UCM module(232).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

DestIndex:18 SrcIndex:18 Slot:7168

User:sklMAC:84c9-b272-47e0

Slot:0 SubSlot:0 Port:0 VLAN:200

IP:255.255.255.255 AccessType:eap AuthenType:EAPRELAY

AdminLevel:0 EapSize:8 AuthenCode:1X ulInterface:2466381824 ChallengeLen:16 ChapID:0 LineType:0 LineIndex:0 PortType:19 AcctSessionId:AC6605_00000000000200b19aa00200012

AAA模块收到UCM模块的认证请求:

用户名 User:skl

认证类型 AccessType:eap

19

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA_MAIN initiate EapRelayAuthenReq event to AAA_AUTHEN module.

CID:0 Result:0 Info:608579692

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:User authentication domain name is

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:The authentication place is RADIUS.

AAA模块查询认证方式为RADIUS。

认证模板下不绑定认证域,直接绑定认证策略、服务器模板时,不打印域名。

20

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA send AAA_RD_MSG_AUTHENREQ message(49) to RADIUS module(235).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

CID:22 TemplateNo:2 SerialNo:7

PriyServer::: Vrf:0

SendServer::: Vrf:0

AccessType:eap AuthenMethod:EAPRELAY

UserName:sklCallingStationId:84c9-b272-47e0

Slot:0 SubSlot:0 Port:0 Vlan:200 Interface:2466381824

CID:32786 AcctSessionId:AC6605_00000000000200b19aa00200012

PortType:19 ServiceType:2 FramedProtocol:1 FramedIP:255.255.255.255

EapLength:8 StartupTimeStamp:1593441916 LoginIP:255.255.255.255

IPHostAddr:255.255.255.255 84:c9:b2:72:47:e0

ProductID:AC szVersion:Huawei AC6605-26-PWR

SecurityStr:

AAA模块发送认证请求给RADIUS模块。

21

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Receive authentication request message from AAA module.

RADIUS模块收到AAA模块的认证请求消息。

22

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Send a authentication request packet to radius server( server ip = 172.168.10.7).

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Server Template: 2

Server IP : 172.168.10.7

Protocol: Standard

Code : 1

Len : 349

ID : 18

[User-Name ] [5 ] [skl]

[NAS-Port ] [6 ] [200]

[Service-Type ] [6 ] [2]

[Framed-Protocol ] [6 ] [1]

[Calling-Station-Id ] [16] [84c9-b272-47e0]

[NAS-Identifier ] [15] [AC]

[NAS-Port-Type ] [6 ] [19]

[NAS-Port-Id ] [36] [slot=0;subslot=0;port=0;vlanid=200]

[EAP-Message ] [10] [02 06 00 08 01 73 6b 6c ]

[Message-Authenticator ] [18] [a1 97 e1 26 3a a4 11 b7 23 1c a9 fd 84 a7 2d cf ]

[Called-Station-Id ] [32] [84-A9-C4-8D-3B-A0:dot1x_129.77]

[NAS-IP-Address ] [6 ] [172.168.10.77]

[Framed-Mtu ] [6 ] [1500]

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

[Acct-Session-Id ] [36] [AC6605_00000000000200b19aa00200012]

[WLAN-Pairwise-Cipher ] [6 ] [0]

[WLAN-Group-Cipher ] [6 ] [0]

[WLAN-AKM-Suite ] [6 ] [0]

[WLAN-Group-Mgmt-Cipher ] [6 ] [0]

[HW-NAS-Startup-Time-Stamp ] [6 ] [1593441916]

[HW-IP-Host-Address ] [35] [255.255.255.255 84:c9:b2:72:47:e0]

[HW-Connect-ID ] [6 ] [32786]

[HW-Version ] [22] [Huawei AC6605-26-PWR]

[HW-Product-ID ] [4 ] [AC]

[HW-AP-Information ] [16] [84A9-C48D-3BA0]

[HW-Access-Type ] [6 ] [1]

RADIUS模块发送Radius Access Request报文(备注:EAP报文封装在EAP-Message属性中)给RADIUS服务器。

23

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Received a authentication challenge packet from radius server(server ip = 172.168.10.7).

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Server Template: 2

Server IP : 172.168.10.7

Server Port : 1812

Protocol: Standard

Code : 11

Len : 62

ID : 18

[State ] [16] [\001r\376\345g0]

[EAP-Message ] [8 ] [01 0b 00 06 19 20 ]

[Message-Authenticator ] [18] [00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ]

RADIUS模块收到RADIUS服务器的Radius Access Challenge报文(备注:EAP报文封装在EAP-Message属性中)。

24

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Send authentication challenge message to AAA.

RADIUS模块发送认证Challenge消息给AAA模块。

25

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA receive AAA_RD_MSG_AUTHENCHALLENGE message(52) from RADIUS module(235).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

CID:22 TemplateNo:2 SerialNo:7

SrcMsg:AAA_RD_MSG_AUTHENREQ

PriyServer::: Vrf:0

SendServer:172.168.10.7 Vrf:0

EapSessionTime:4294967295 EapPasswordRetry:4294967295 TerminationAction:4294967295 EapLength:6

RDReplyMessage: State:0172fee5673000000172fee56730

AAA模块收到RADIUS模块的认证Challenge消息。

26

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA send AAA_SRV_MSG_AUTHEN_ACK message(36) to UCM module(232).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

DestIndex:18 SrcIndex:18 Slot:4294967295

Result:2 DomainIndex:65535 ServiceScheme:65535 AuthedPalace:3 VLAN:65535 IsCallBackVerify:0 IsCallbackUser:0 IfSessionTimeout:0 IfRemanentVolume:0 IfIdleCut:0 SessionTimeout:4294967295 RemanentVolume:4294967295 IdleTimeout:4294967295 EAPSessionTimeout:4294967295 EAPPasswordRetry:4294967295 RTAcctInterval:4294967295 Priority:[255,255] AdminLevel:255 NextHop:4294967295 Role:0 LiAdmin:0 EapSize:6 ReplyMessage: TunnelType:0 MediumType:0 PrivateGroupID: SerialNo:7 WlanReasonCode:0

AAA模块透传认证Challenge消息给UCM模块 (Result: 0 认证成功,1 认证失败,2 认证挑战)。

27

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive AAA_SRV_MSG_AUTHEN_ACK from AAA module (msg code: 36 CID:18).

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_CIB_S] enter in CMNACFillAAAAckInfo.

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_CIB_S] enter in CM_NAC_ProAckInfo.

UCM模块收到AAA模块的认证Challenge消息。

28

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication ack message to AAA module (CID:18).

UCM模块发送认证Challenge消息给EAP模块。

29

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authen ack message from UCM module.(Result=2,local index=6,MAC=84c9-b272-47e0,RadiusTemplateIndex=65535,Reason=255)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authentication ack message from server.(result:SRV_AUTH_CHALLENGE)

EAP模块收到UCM模块的认证Challenge消息。

30

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request challenge packet to user.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

EAPOL packet: OUT

84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8

88 8e 01 00 00 06 01 0b 00 06 19 20

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

802.1x packet:

Version:802.1X-2001(1); Type:Eap(0); Length:6

EAPOL packet:

Code:Request(1); Id:11; Length:6; Type:PEAP(25)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send EAP_request packet to user successfully.(Index=6)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send request/challenge packet to user successfully.enter request status.(local index:6)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0,

EAP模块发送EAP Challenge Request报文(即Radius Access Challenge报文中的EAP-Message属性值)给用户。

31

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

EAPOL packet: IN

fc e3 3c 9e 6d 66 84 c9 b2 72 47 e0 81 00 e0 c8

88 8e 01 00 00 69 02 0b 00 69 19 80 00 00 00 5f

16 03 01 00 5a 01 00 00 56 03 01 5e f9 92 c8 7c

dd 19 50 72 93 2b cd a3 94 e5 30 88 5a dd 34 fb

8a ae a3 55 cc 84 ea 83 1f 1e 4a 00 00 18 00 2f

00 35 00 05 00 0a c0 13 c0 14 c0 09 c0 0a 00 32

00 38 00 13 00 04 01 00 00 15 ff 01 00 01 00 00

0a 00 06 00 04 00 17 00 18 00 0b 00 02 01 00

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

802.1x packet:

Version:802.1X-2001(1); Type:Eap(0); Length:105

EAPOL packet:

Code:Response(2); Id:11; Length:105;Type:PEAP(25)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EAPoL response challenge packet from user.

EAP模块收到用户的EAP Challenge Response报文。

32

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:EAPoL Send authentication message to server.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send authentication request message to user connection manager module successfully.(local index:6)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request to UCM module successfully.(local index:6)

EAP模块发送认证请求消息给UCM模块。

33

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive ESAP_SRV_MSG_AUTH_REQ from EAPOL module (msg code: 184 CID:18).

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM WLAN Get Ap Info. Ap Info is 84A9-C48D-3BA0.

UCM模块收到EAP模块的认证请求消息。

34

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication request message to AAA module (CID:18).

UCM模块发送认证请求消息给AAA模块。

35

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA receive AAA_SRV_MSG_AUTHEN_REQ message(31) from UCM module(232).

AAA模块收到UCM模块的认证请求消息。

36

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

DestIndex:18 SrcIndex:18 Slot:7168

User:skl MAC:84c9-b272-47e0

Slot:0 SubSlot:0 Port:0 VLAN:200

IP:255.255.255.255 AccessType:eap AuthenType:EAPRELAY

AdminLevel:0 EapSize:105 AuthenCode:1X

ulInterface:2466381824 ChallengeLen:16 ChapID:0

LineType:0 LineIndex:0 PortType:19

AcctSessionId:AC6605_00000000000200b19aa00200012

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA_MAIN initiate EapRelayAuthenReq event to AAA_AUTHEN module.

CID:0 Result:0 Info:542008332

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA send AAA_RD_MSG_AUTHENREQ message(49) to RADIUS module(235).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

CID:22 TemplateNo:2 SerialNo:7

PriyServer::: Vrf:0

SendServer::: Vrf:0

AccessType:eap AuthenMethod:EAPRELAY

UserName:skl CallingStationId:84c9-b272-47e0

Slot:0 SubSlot:0 Port:0 Vlan:200 Interface:2466381824

CID:32786 AcctSessionId:AC6605_00000000000200b19aa00200012

PortType:19 ServiceType:2 FramedProtocol:1 FramedIP:255.255.255.255

EapLength:105 StartupTimeStamp:1593441916 LoginIP:0.0.0.0

IPHostAddr:255.255.255.255 84:c9:b2:72:47:e0

ProductID:AC szVersion:Huawei AC6605-26-PWR

SecurityStr:

AAA模块发送认证请求消息给RADIUS模块。

37

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Receive authentication request message from AAA module.

RADIUS模块收到AAA模块的认证请求消息。

38

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Send a authentication request packet to radius server( server ip = 172.168.10.7).

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Server Template: 2

Server IP : 172.168.10.7

Protocol: Standard

Code : 1

Len : 468

ID : 19

[User-Name ] [5 ] [skl]

[NAS-Port ] [6 ] [200]

[Service-Type ] [6 ] [2]

[Framed-Protocol ] [6 ] [1]

[Calling-Station-Id ] [16] [84c9-b272-47e0]

[NAS-Identifier ] [15] [AC]

[NAS-Port-Type ] [6 ] [19]

[NAS-Port-Id ] [36] [slot=0;subslot=0;port=0;vlanid=200]

[State ] [16] [\001r\376\345g0]

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

[EAP-Message ] [107] [02 0b 00 69 19 80 00 00 00 5f 16 03 01 00 5a 01 00 00 56 03 01 5e f9 92 c8 7c dd 19 50 72 93 2b cd a3 94 e5 30 88 5a dd 34 fb 8a ae a3 55 cc 84 ea 83 1f 1e 4a 00 00 18 00 2f 00 35 00 05 00 0a c0 13 c0 14 c0 09 c0 0a 00 32 00 38 00 13 00 04 01 00 00 15 ff 01 00 01 00 00 0a 00 06 00 04 00 17 00 18 00 0b 00 02 01 00 ]

[Message-Authenticator ] [18] [b1 13 20 a9 a3 66 8f e1 34 c7 e7 d4 16 28 0d b8 ]

[Called-Station-Id ] [32] [84-A9-C4-8D-3B-A0:dot1x_129.77]

[Login-IP-Host ] [6 ] [0.0.0.0]

[NAS-IP-Address ] [6 ] [172.168.10.77]

[Framed-Mtu ] [6 ] [1500]

[Acct-Session-Id ] [36] [AC6605_00000000000200b19aa00200012]

[WLAN-Pairwise-Cipher ] [6 ] [0]

[WLAN-Group-Cipher ] [6 ] [0]

[WLAN-AKM-Suite ] [6 ] [0]

[WLAN-Group-Mgmt-Cipher ] [6 ] [0]

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

[HW-NAS-Startup-Time-Stamp ] [6 ] [1593441916]

[HW-IP-Host-Address ] [35] [255.255.255.255 84:c9:b2:72:47:e0]

[HW-Connect-ID ] [6 ] [32786]

[HW-Version ] [22] [Huawei AC6605-26-PWR]

[HW-Product-ID ] [4 ] [AC]

[HW-AP-Information ] [16] [84A9-C48D-3BA0]

[HW-Access-Type ] [6 ] [1]

RADIUS模块发送Radius Access Request报文给RADIUS服务器。

39

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Received a authentication challenge packet from radius server(server ip = 172.168.10.7).

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Server Template: 2

Server IP : 172.168.10.7

Server Port : 1812

Protocol: Standard

Code : 11

Len : 1164

ID : 19

[State ] [16] [\001r\376\345g0]

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

[EAP-Message ] [255] [01 0c 04 4c 19 c0 00 00 07 40 16 03 01 07 3b 02 00 00 4d 03 01 5e f9 92 ca ec 4e 76 65 d5 68 71 0f 9d fa fb 42 aa d2 e7 eb b4 c8 b8 96 6f df 5e e7 f6 c0 48 c4 20 5e f9 92 ca e3 30 78 2a 97 3d e6 b3 62 83 79 43 92 4f e6 b7 b0 15 4e 44 c3 4e b0 8a d5 37 c0 57 00 2f 00 00 05 ff 01 00 01 00 0b 00 06 e2 00 06 df 00 03 a0 30 82 03 9c 30 82 02 84 a0 03 02 01 02 02 0a 61 0d d3 b3 00 00 00 00 00 02 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 2c 31 0b 30 09 06 03 55 04 06 13 02 43 4e 31 0f 30 0d 06 03 55 04 0b 13 06 48 55 41 57 45 49 31 0c 30 0a 06 03 55 04 03 13 03 54 53 4d 30 20 17 0d 31 35 30 37 30 39 31 30 33 38 33 38 5a 18 0f 32 30 36 35 30 37 30 39 31 30 33 36 33 33 5a 30 75 31 0b 30 09 06 03 55 04 06 13 02 43 4e 31 11 30 0f 06 03 55 04 07 13 08 73 ]

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

[EAP-Message ] [255] [68 65 6e 7a 68 65 6e 31 0f 30 0d 06 03 55 04 0a 13 06 68 75 61 77 65 69 31 0c 30 0a 06 03 55 04 0b 13 03 4f 53 53 31 0f 30 0d 06 03 55 04 03 13 06 72 61 64 69 75 73 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 53 75 70 70 6f 72 74 5f 65 40 68 75 61 77 65 69 2e 63 6f 6d 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 a6 47 91 ba 08 ae 89 47 58 53 7c 31 21 f9 97 fc 78 99 4b 49 ab 60 64 62 f8 c1 9a ca df d3 02 be 85 7e 44 42 b5 a3 79 bd d0 e4 85 65 06 96 94 45 6e 5a 8e ce b9 60 c9 e5 52 41 7a 98 4a 61 49 08 1d de 32 35 33 e8 8f dd 1f 58 21 47 a0 9f c7 a4 15 23 bb c4 72 58 5b 29 2e 26 7a 65 d5 58 99 e1 cc 66 eb b1 e1 3f 1e 6e 10 c4 cd 60 05 4e 9f 91 93 a7 b2 26 58 2d 34 58 63 53 f4 5f 84 1a ec 6f ]

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

[EAP-Message ] [255] [8f 2a d5 ee 6b 11 dc 3c 9e 88 67 2d eb 46 e6 61 25 92 cc 92 7e b9 a4 0b 3c 50 cf 60 b4 39 46 70 79 9f 00 65 7d 5e 74 d3 89 a3 e0 c5 9f 49 e9 de c2 5d ea 03 75 c7 a4 6b c5 77 dd 42 bb 8d 28 e0 89 d1 a4 31 4a 1c 94 b9 d9 63 70 09 b5 24 cd 13 51 b9 b6 ee a5 c9 cc cf 22 df 31 35 b3 af 4e 6b dd 76 87 0e e2 d1 62 d7 01 2a 91 d2 6f 2f 15 34 16 80 2f b3 ac c1 6e 3a e9 49 08 56 36 5a 30 0f 02 03 01 00 01 a3 75 30 73 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 04 f0 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 1d 06 03 55 1d 0e 04 16 04 14 cc 2a e0 d3 7a ea 48 64 da 1a 6f b1 8c 47 47 b9 d1 8d 29 1f 30 1f 06 03 55 1d 23 04 18 30 16 80 14 ff 0f 11 2b 98 6e bd cd d5 46 8d 44 a1 11 28 6e 94 c8 ab 55 30 0c 06 03 55 1d 13 01 01 ff 04 02 30 00 30 ]

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

[EAP-Message ] [255] [0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 00 93 05 d3 50 f2 5a 05 c9 98 17 2c a1 f3 bc a0 34 77 7b 28 17 30 9f 7b 85 b9 03 b4 7c c6 65 2d 87 23 11 25 3b 19 59 c4 04 c5 b4 3c 08 ab a0 9a d7 b5 b2 b0 e5 d5 8e 93 6e 73 57 32 ae 41 82 a9 b3 61 05 45 66 a8 cb d7 b6 28 87 7c 33 ca e1 77 cf 3b c4 e9 dd 55 3d f6 2d 68 12 95 c3 4a 46 52 71 37 4f 21 0e cf 32 e8 f3 a2 93 79 ee c8 11 ab 2f 7a 8e 66 a0 71 c1 ca b0 da 91 4d 91 3a de 34 08 13 8f ec 6b ae 0b 4e e0 31 83 fa 63 5b ce d3 b4 37 5c 90 50 ab cb f1 24 fa 62 e9 ab 44 c8 53 77 93 00 ef 8a ff 17 02 ed 97 c1 f7 df bd 4a f4 bb 4b 23 f7 31 f9 dd cb ec 52 78 4f 57 59 ae 9d 59 b2 d0 ae 05 73 cb ee 86 75 f1 34 c6 43 dc f0 33 23 a9 1f 66 06 f9 b4 90 1c 52 6b a2 91 87 a9 43 63 b8 2e 13 65 53 f9 b8 a6 ]

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

[EAP-Message ] [90] [93 e1 be 7b 9b 3e b6 2d 99 b5 ca 0d cc 73 c6 ab ce c4 22 15 59 e5 00 03 39 30 82 03 35 30 82 02 1d a0 03 02 01 02 02 10 65 22 e4 6d c1 27 ec a5 42 f4 5e fb f0 0f f5 98 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 2c 31 0b 30 09 06 03 55 04 06 13 02 43 4e 31 0f ]

[Message-Authenticator ] [18] [00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ]

RADIUS模块收到RADIUS服务器Radius Access Challenge报文(携带EAP-Message属性)。

40

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Send authentication challenge message to AAA.

RADIUS模块发送认证Challenge消息给AAA模块。

41

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA receive AAA_RD_MSG_AUTHENCHALLENGE message(52) from RADIUS module(235).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

CID:22 TemplateNo:2 SerialNo:7

SrcMsg:AAA_RD_MSG_AUTHENREQ

PriyServer::: Vrf:0

SendServer:172.168.10.7 Vrf:0

EapSessionTime:4294967295 EapPasswordRetry:4294967295 TerminationAction:4294967295 EapLength:1100

RDReplyMessage: State:0172fee5673000000172fee56730

AAA模块收到RADIUS模块的认证Challenge消息。

42

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA send AAA_SRV_MSG_AUTHEN_ACK message(36) to UCM module(232).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

DestIndex:18 SrcIndex:18 Slot:4294967295

Result:2 DomainIndex:65535 ServiceScheme:65535

AuthedPalace:3 VLAN:65535 IsCallBackVerify:0 IsCallbackUser:0

IfSessionTimeout:0 IfRemanentVolume:0 IfIdleCut:0

SessionTimeout:4294967295 RemanentVolume:4294967295 IdleTimeout:4294967295

EAPSessionTimeout:4294967295 EAPPasswordRetry:4294967295

RTAcctInterval:4294967295 Priority:[255,255]

AdminLevel:255 NextHop:4294967295 Role:0 LiAdmin:0

EapSize:1100 ReplyMessage:

TunnelType:0 MediumType:0 PrivateGroupID:

SerialNo:7 WlanReasonCode:0

AAA模块发送认证Challenge消息给UCM模块。

43

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive AAA_SRV_MSG_AUTHEN_ACK from AAA module (msg code: 36 CID:18).

UCM模块收到AAA模块的消息。

44

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_CIB_S] enter in CMNACFillAAAAckInfo.

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_CIB_S] enter in CM_NAC_ProAckInfo.

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication ack message to AAA module (CID:18).

UCM模块发送消息给EAP模块。

45

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authen ack message from UCM module.(Result=2,local index=6,MAC=84c9-b272-47e0,RadiusTemplateIndex=65535,Reason=255)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authentication ack message from server.(result:SRV_AUTH_CHALLENGE)

EAP模块收到UCM模块的认证Challenge消息。

46

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request challenge packet to user.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

EAPOL packet: OUT

84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8

88 8e 01 00 04 4c 01 0c 04 4c 19 c0 00 00 07 40

16 03 01 07 3b 02 00 00 4d 03 01 5e f9 92 ca ec

4e 76 65 d5 68 71 0f 9d fa fb 42 aa d2 e7 eb b4

c8 b8 96 6f df 5e e7 f6 c0 48 c4 20 5e f9 92 ca

e3 30 78 2a 97 3d e6 b3 62 83 79 43 92 4f e6 b7

b0 15 4e 44 c3 4e b0 8a d5 37 c0 57 00 2f 00 00

05 ff 01 00 01 00 0b 00 06 e2 00 06 df 00 03 a0

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

802.1x packet:

Version:802.1X-2001(1); Type:Eap(0); Length:1100

EAPOL packet:

Code:Request(1); Id:12; Length:1100; Type:PEAP(25) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send EAP_request packet to user successfully.(Index=6) [BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send request/challenge packet to user successfully.enter request status.(local index:6)

EAP模块发送EAP PEAP Request报文给用户。

47

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0,

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

EAPOL packet: IN

fc e3 3c 9e 6d 66 84 c9 b2 72 47 e0 81 00 e0 c8

88 8e 01 00 00 06 02 0c 00 06 19 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

802.1x packet:

Version:802.1X-2001(1); Type:Eap(0); Length:6

EAPOL packet:

Code:Response(2); Id:12; Length:6; Type:PEAP(25)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EAPoL response challenge packet from user.

EAP模块收到用户的EAP PEAP Response报文。

48

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:EAPoL Send authentication message to server.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send authentication request message to user connection manager module successfully.(local index:6)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request to UCM module successfully.(local index:6)

EAP模块发送认证请求消息给UCM模块。

49

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive ESAP_SRV_MSG_AUTH_REQ from EAPOL module (msg code: 184 CID:18).

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM WLAN Get Ap Info. Ap Info is 84A9-C48D-3BA0.

UCM模块收到EAP模块的认证请求消息。

50

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication request message to AAA module (CID:18).

UCM模块发送认证请求消息给AAA模块。

51

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA receive AAA_SRV_MSG_AUTHEN_REQ message(31) from UCM module(232).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

DestIndex:18 SrcIndex:18 Slot:7168

User:skl MAC:84c9-b272-47e0

Slot:0 SubSlot:0 Port:0 VLAN:200

IP:255.255.255.255 AccessType:eap AuthenType:EAPRELAY

AdminLevel:0 EapSize:6 AuthenCode:1X

ulInterface:2466381824 ChallengeLen:16 ChapID:0

LineType:0 LineIndex:0 PortType:19

AcctSessionId:AC6605_00000000000200b19aa00200012

AAA模块收到UCM模块的认证请求消息。

52

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA_MAIN initiate EapRelayAuthenReq event to AAA_AUTHEN module.

CID:0 Result:0 Info:542008332

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA send AAA_RD_MSG_AUTHENREQ message(49) to RADIUS module(235).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

CID:22 TemplateNo:2 SerialNo:7

PriyServer::: Vrf:0

SendServer::: Vrf:0

AccessType:eap AuthenMethod:EAPRELAY

UserName:skl CallingStationId:84c9-b272-47e0

Slot:0 SubSlot:0 Port:0 Vlan:200 Interface:2466381824

CID:32786 AcctSessionId:AC6605_00000000000200b19aa00200012

PortType:19 ServiceType:2 FramedProtocol:1 FramedIP:255.255.255.255

EapLength:6 StartupTimeStamp:1593441916 LoginIP:0.0.0.0

IPHostAddr:255.255.255.255 84:c9:b2:72:47:e0

ProductID:AC szVersion:Huawei AC6605-26-PWR

SecurityStr:

AAA模块发送认证请求消息给RADIUS模块。

53

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Receive authentication request message from AAA module.

RADIUS模块收到AAA模块的认证请求消息。

54

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Send a authentication request packet to radius server( server ip = 172.168.10.7).

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Server Template: 2

Server IP : 172.168.10.7

Protocol: Standard

Code : 1

Len : 369

ID : 20

[User-Name ] [5 ] [skl]

[NAS-Port ] [6 ] [200]

[Service-Type ] [6 ] [2]

[Framed-Protocol ] [6 ] [1]

[Calling-Station-Id ] [16] [84c9-b272-47e0]

[NAS-Identifier ] [15] [AC]

[NAS-Port-Type ] [6 ] [19]

[NAS-Port-Id ] [36] [slot=0;subslot=0;port=0;vlanid=200]

[State ] [16] [\001r\376\345g0]

[EAP-Message ] [8 ] [02 0c 00 06 19 00 ]

[Message-Authenticator ] [18] [14 7f b0 0a e9 0e 93 79 5e 0d 9a c6 c3 9d 75 56 ]

[Called-Station-Id ] [32] [84-A9-C4-8D-3B-A0:dot1x_129.77]

[Login-IP-Host ] [6 ] [0.0.0.0]

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

[NAS-IP-Address ] [6 ] [172.168.10.77]

[Framed-Mtu ] [6 ] [1500]

[Acct-Session-Id ] [36] [AC6605_00000000000200b19aa00200012]

[WLAN-Pairwise-Cipher ] [6 ] [0]

[WLAN-Group-Cipher ] [6 ] [0]

[WLAN-AKM-Suite ] [6 ] [0]

[WLAN-Group-Mgmt-Cipher ] [6 ] [0]

[HW-NAS-Startup-Time-Stamp ] [6 ] [1593441916]

[HW-IP-Host-Address ] [35] [255.255.255.255 84:c9:b2:72:47:e0]

[HW-Connect-ID ] [6 ] [32786]

[HW-Version ] [22] [Huawei AC6605-26-PWR]

[HW-Product-ID ] [4 ] [AC]

[HW-AP-Information ] [16] [84A9-C48D-3BA0]

[HW-Access-Type ] [6 ] [1]

RADIUS模块发送Radius Access Request报文给RADIUS服务器。

55

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Received a authentication challenge packet from radius server(server ip = 172.168.10.7).

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Server Template: 2

Server IP : 172.168.10.7

Server Port : 1812

Protocol: Standard

Code : 11

Len : 834

ID : 20

[State ] [16] [\001r\376\345g0]

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

[EAP-Message ] [255] [01 0d 03 04 19 00 30 0d 06 03 55 04 0b 13 06 48 55 41 57 45 49 31 0c 30 0a 06 03 55 04 03 13 03 54 53 4d 30 20 17 0d 31 35 30 37 30 39 31 30 32 36 33 33 5a 18 0f 32 30 36 35 30 37 30 39 31 30 33 36 33 33 5a 30 2c 31 0b 30 09 06 03 55 04 06 13 02 43 4e 31 0f 30 0d 06 03 55 04 0b 13 06 48 55 41 57 45 49 31 0c 30 0a 06 03 55 04 03 13 03 54 53 4d 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 df d5 97 c5 9e e0 1c 05 b1 b6 ba 9d d8 8f 44 21 25 fd f1 9c 09 71 e2 2a f9 5d ba 7c 7c 36 e2 b6 34 ea 3e 58 81 b9 a6 08 0a b3 ad 20 f2 f1 cd 16 4c 78 2e 63 2b a7 98 95 63 22 52 e2 85 da 68 8f 2e e8 79 bd b7 63 c3 5a 7b 72 c4 e6 83 c3 e9 0f 41 0c 36 62 6a f9 b7 a4 03 b2 ab f4 79 fb bb 42 7e 21 b7 4f 12 29 6d 31 2e ]

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

[EAP-Message ] [255] [7e 21 31 e3 7f ed 9f e2 3f 4e 29 69 c4 99 51 9e b6 97 ae 7a e4 bb 88 d5 49 b3 88 79 63 65 b7 c7 b8 7b 83 e6 35 cf a4 24 72 02 b6 7d 26 ac c0 8b ab 94 dc 09 a4 b6 b8 9c 05 60 cb 05 df b8 61 99 01 14 71 cc 84 ac 16 d0 2c 37 1c 29 20 eb 53 e9 b4 07 4b 1d be 99 77 f4 e6 c5 12 43 3a c2 4d bf c6 ca 03 40 a9 43 3a b5 c3 50 58 a6 53 96 2e dd 5b 62 d1 dc c7 3b a8 c9 53 cc 78 d1 6c ff 40 94 af cb 01 4e da f2 0f 66 0c 15 21 bd 61 2e 79 cd f9 b9 01 37 fc 72 93 02 03 01 00 01 a3 51 30 4f 30 0b 06 03 55 1d 0f 04 04 03 02 01 86 30 0f 06 03 55 1d 13 01 01 ff 04 05 30 03 01 01 ff 30 1d 06 03 55 1d 0e 04 16 04 14 ff 0f 11 2b 98 6e bd cd d5 46 8d 44 a1 11 28 6e 94 c8 ab 55 30 10 06 09 2b 06 01 04 01 82 37 15 01 04 03 02 01 00 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 ]

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

[EAP-Message ] [255] [00 03 82 01 01 00 66 e1 ae a7 5e 49 97 84 9b 8b ee ff 1e 92 1e 14 62 34 39 2a 71 fb aa 5d cf 46 7a 68 1b b2 2d 75 3f d7 cd 51 61 e8 89 93 15 fd ba ca dd 98 4d af b5 3b 71 c1 30 7f dd 86 2b 51 43 da c1 ae e6 13 4f e8 07 6d 95 12 80 13 f0 bd d2 ed dc be 3c 3d be a5 e7 94 b2 2d 44 c9 53 8f 23 39 d9 94 73 e0 58 cb b2 51 5e e3 93 9e f5 34 75 bb 39 f0 15 d8 f9 a2 22 94 7c 0f 3c 5e 40 92 ad fb cc 9f 94 fb a0 4d 84 4a 24 ba 2e 9a b3 e6 67 84 bc 9b 14 0b 17 50 55 cf 64 3b 3e 47 0d ed e9 2c 99 09 ed 88 3b 15 74 17 ca f4 f3 28 b7 bf c9 9f 9b 93 6d da db c5 73 03 5f 04 f3 ac 28 e9 31 4c df d1 84 fd 10 bf 9e 02 ef 80 e7 3e b0 ca 61 18 db ee 04 48 31 52 c9 65 95 ab 15 a0 1e e2 7d 3d da 95 be 3a a1 a5 a9 8d f7 d4 a9 b5 a3 71 a4 d6 2c 93 e0 dc f4 d0 76 2a 84 17 26 ]

[EAP-Message ] [15] [35 55 c8 b7 18 8e ae 8f f9 0e 00 00 00 ]

[Message-Authenticator ] [18] [00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ]

RADIUS模块收到RADIUS服务器的Radius Access Challenge报文。

56

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA receive AAA_RD_MSG_AUTHENCHALLENGE message(52) from RADIUS module(235).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

CID:22 TemplateNo:2 SerialNo:7

SrcMsg:AAA_RD_MSG_AUTHENREQ

PriyServer::: Vrf:0

SendServer:172.168.10.7 Vrf:0

EapSessionTime:4294967295 EapPasswordRetry:4294967295 TerminationAction:4294967295 EapLength:772

RDReplyMessage: State:0172fee5673000000172fee56730

AAA模块收到RADIUS模块的认证Challenge消息。

57

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA send AAA_SRV_MSG_AUTHEN_ACK message(36) to UCM module(232).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

DestIndex:18 SrcIndex:18 Slot:4294967295

Result:2DomainIndex:65535 ServiceScheme:65535

AuthedPalace:3 VLAN:65535 IsCallBackVerify:0 IsCallbackUser:0

IfSessionTimeout:0 IfRemanentVolume:0 IfIdleCut:0

SessionTimeout:4294967295 RemanentVolume:4294967295 IdleTimeout:4294967295

EAPSessionTimeout:4294967295 EAPPasswordRetry:4294967295

RTAcctInterval:4294967295 Priority:[255,255]

AdminLevel:255 NextHop:4294967295 Role:0 LiAdmin:0

EapSize:772 ReplyMessage:

TunnelType:0 MediumType:0 PrivateGroupID:

SerialNo:7 WlanReasonCode:0

AAA模块发送认证挑战消息给UCM模块。

58

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive AAA_SRV_MSG_AUTHEN_ACK from AAA module (msg code: 36 CID:18).

CM模块收到AAA模块消息。

59

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_CIB_S] enter in CMNACFillAAAAckInfo.

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_CIB_S] enter in CM_NAC_ProAckInfo.

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication ack message to AAA module (CID:18).

CM模块发送消息给EAP模块。

60

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authen ack message from UCM module.(Result=2,local index=6,MAC=84c9-b272-47e0,RadiusTemplateIndex=65535,Reason=255)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authentication ack message from server.(result:SRV_AUTH_CHALLENGE)

EAP模块收到UCM模块的认证Challenge消息。

61

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request challenge packet to user.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

EAPOL packet: OUT

84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8

88 8e 01 00 03 04 01 0d 03 04 19 00 30 0d 06 03

55 04 0b 13 06 48 55 41 57 45 49 31 0c 30 0a 06

03 55 04 03 13 03 54 53 4d 30 20 17 0d 31 35 30

37 30 39 31 30 32 36 33 33 5a 18 0f 32 30 36 35

30 37 30 39 31 30 33 36 33 33 5a 30 2c 31 0b 30

09 06 03 55 04 06 13 02 43 4e 31 0f 30 0d 06 03

55 04 0b 13 06 48 55 41 57 45 49 31 0c 30 0a 06

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

802.1x packet:

Version:802.1X-2001(1); Type:Eap(0); Length:772

EAPOL packet:

Code:Request(1); Id:13; Length:772;Type:PEAP(25)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send EAP_request packet to user successfully.(Index=6)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send request/challenge packet to user successfully.enter request status.(local index:6)

EAP模块发送EAP PEAP Request报文给用户

62

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0,

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

EAPOL packet: IN

fc e3 3c 9e 6d 66 84 c9 b2 72 47 e0 81 00 e0 c8

88 8e 01 00 01 50 02 0d 01 50 19 80 00 00 01 46

16 03 01 01 06 10 00 01 02 01 00 4a 58 0e c5 92

a5 1a 6c 55 b3 4b 7d 0e da a5 c1 7d d9 9a 0e b2

56 64 19 3e bc 83 df f9 63 10 f6 1d 40 e4 1d 3a

79 9e f1 bd 26 78 49 7d 5d e3 13 87 24 f9 00 e9

fc 3c e5 11 b4 59 0b 3f dd 40 ca 82 18 b2 82 e2

db 54 f9 ec 7f 4e cf 96 69 6b 0f 7e 30 47 0a b1

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

802.1x packet:

Version:802.1X-2001(1); Type:Eap(0); Length:336

EAPOL packet:

Code:Response(2); Id:13; Length:336; Type:PEAP(25)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EAPoL response challenge packet from user.

EAP模块收到用户的EAP PEAP Response报文。

63

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:EAPoL Send authentication message to server.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send authentication request message to user connection manager module successfully.(local index:6)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request to UCM module successfully.(local index:6)

EAP模块发送认证请求消息给UCM模块。

64

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive ESAP_SRV_MSG_AUTH_REQ from EAPOL module (msg code: 184 CID:18).

UCM模块收到EAP模块认证请求消息。

65

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM WLAN Get Ap Info. Ap Info is 84A9-C48D-3BA0.

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication request message to AAA module (CID:18).

UCM模块发送认证请求消息给AAA模块。

66

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA receive AAA_SRV_MSG_AUTHEN_REQ message(31) from UCM module(232).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

DestIndex:18 SrcIndex:18 Slot:7168

User:skl MAC:84c9-b272-47e0

Slot:0 SubSlot:0 Port:0 VLAN:200

IP:255.255.255.255 AccessType:eap AuthenType:EAPRELAY

AdminLevel:0 EapSize:336 AuthenCode:1X

ulInterface:2466381824 ChallengeLen:16 ChapID:0

LineType:0 LineIndex:0 PortType:19

AcctSessionId:AC6605_00000000000200b19aa00200012

AAA模块收到UCM模块的认证请求消息。

67

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA send AAA_RD_MSG_AUTHENREQ message(49) to RADIUS module(235).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

CID:22 TemplateNo:2 SerialNo:7

PriyServer::: Vrf:0

SendServer::: Vrf:0

AccessType:eap AuthenMethod:EAPRELAY

UserName:skl CallingStationId:84c9-b272-47e0

Slot:0 SubSlot:0 Port:0 Vlan:200 Interface:2466381824

CID:32786 AcctSessionId:AC6605_00000000000200b19aa00200012

PortType:19 ServiceType:2 FramedProtocol:1 FramedIP:255.255.255.255

EapLength:336 StartupTimeStamp:1593441916 LoginIP:0.0.0.0

IPHostAddr:255.255.255.255 84:c9:b2:72:47:e0

ProductID:AC szVersion:Huawei AC6605-26-PWR

SecurityStr:

AAA模块发送认证请求消息给RADIUS模块。

68

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Receive authentication request message from AAA module.

RADIUS模块收到AAA模块的认证请求消息。

69

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Send a authentication request packet to radius server( server ip = 172.168.10.7).

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Server Template: 2

Server IP : 172.168.10.7

Protocol: Standard

Code : 1

Len : 701

ID : 21

[User-Name ] [5 ] [skl]

[NAS-Port ] [6 ] [200]

[Service-Type ] [6 ] [2]

[Framed-Protocol ] [6 ] [1]

[Calling-Station-Id ] [16] [84c9-b272-47e0]

[NAS-Identifier ] [15] [AC]

[NAS-Port-Type ] [6 ] [19]

[NAS-Port-Id ] [36] [slot=0;subslot=0;port=0;vlanid=200]

[State ] [16] [\001r\376\345g0]

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

[EAP-Message ] [255] [02 0d 01 50 19 80 00 00 01 46 16 03 01 01 06 10 00 01 02 01 00 4a 58 0e c5 92 a5 1a 6c 55 b3 4b 7d 0e da a5 c1 7d d9 9a 0e b2 56 64 19 3e bc 83 df f9 63 10 f6 1d 40 e4 1d 3a 79 9e f1 bd 26 78 49 7d 5d e3 13 87 24 f9 00 e9 fc 3c e5 11 b4 59 0b 3f dd 40 ca 82 18 b2 82 e2 db 54 f9 ec 7f 4e cf 96 69 6b 0f 7e 30 47 0a b1 93 88 3f 0d 5e e1 e0 f3 53 2e 66 1d 9f 25 e7 e4 2d 62 1e 73 f3 46 fb d3 bf c9 a0 e3 9b 8b 35 5e 18 7c 53 cb 31 cb 0d 6d d8 eb 37 e5 9a 29 cd ae b6 16 da 31 ac 38 65 89 f5 7c 2f ac d0 8e 56 00 41 43 e1 6f ec 56 80 07 50 2f 40 4d cd f6 e9 f2 4e 0a f1 06 97 01 40 ff 26 bd 86 12 3a 2e 99 0c ce 24 3d cd 22 bf dc 40 e4 78 c7 aa eb e3 88 a6 13 57 dd c2 5a ea 97 ba 81 b0 75 28 27 9b 8b 31 07 e1 12 23 89 f2 a4 21 51 da 93 6b 25 61 14 05 1e fc af ]

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

[EAP-Message ] [85] [f4 1b 25 e9 86 99 2d ba ee 1e f4 77 a7 df 16 48 e2 8a 1a 9f 50 49 a1 df 14 03 01 00 01 01 16 03 01 00 30 ff 2c c5 f0 c0 4a 79 19 3a 5e 2c de 0c 8e 81 c0 98 64 f9 d0 b2 fd 05 53 9e 0b ca 0e 4f 87 90 d7 fc 6b e9 43 50 16 92 ee d2 82 6d 5b 6d 47 49 74 ]

[Message-Authenticator ] [18] [fb 5e f3 a3 d1 48 0d 86 f6 60 ba 2b 4b bd 6b 95 ]

[Called-Station-Id ] [32] [84-A9-C4-8D-3B-A0:dot1x_129.77]

[Login-IP-Host ] [6 ] [0.0.0.0]

[NAS-IP-Address ] [6 ] [172.168.10.77]

[Framed-Mtu ] [6 ] [1500]

[Acct-Session-Id ] [36] [AC6605_00000000000200b19aa00200012]

[WLAN-Pairwise-Cipher ] [6 ] [0]

[WLAN-Group-Cipher ] [6 ] [0]

[WLAN-AKM-Suite ] [6 ] [0]

[WLAN-Group-Mgmt-Cipher ] [6 ] [0]

[HW-NAS-Startup-Time-Stamp ] [6 ] [1593441916]

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

[HW-IP-Host-Address ] [35] [255.255.255.255 84:c9:b2:72:47:e0]

[HW-Connect-ID ] [6 ] [32786]

[HW-Version ] [22] [Huawei AC6605-26-PWR]

[HW-Product-ID ] [4 ] [AC]

[HW-AP-Information ] [16] [84A9-C48D-3BA0]

[HW-Access-Type ] [6 ] [1]

RADIUS模块发送Radius Access Request报文给RADIUS服务器。

70

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Received a authentication challenge packet from radius server(server ip = 172.168.10.7).

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Server Template: 2

Server IP : 172.168.10.7

Server Port : 1812

Protocol: Standard

Code : 11

Len : 121

ID : 21

[State ] [16] [\001r\376\345g0]

[EAP-Message ] [67] [01 0e 00 41 19 00 14 03 01 00 01 01 16 03 01 00 30 ac 39 a7 9b 17 6c 1d 9b 90 fb 85 f8 82 ea b5 0b 00 b6 54 1a 8a 35 1b e2 ec 99 81 65 f3 d6 60 58 07 e3 56 f8 2d 44 1d 37 aa b1 6b 1c a8 ef 1a 33 ]

[Message-Authenticator ] [18] [00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ]

RADIUS模块收到RADIUS服务器Radius Access Challenge报文。

71

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA receive AAA_RD_MSG_AUTHENCHALLENGE message(52) from RADIUS module(235).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

CID:22 TemplateNo:2 SerialNo:7

SrcMsg:AAA_RD_MSG_AUTHENREQ

PriyServer::: Vrf:0

SendServer:172.168.10.7 Vrf:0

EapSessionTime:4294967295 EapPasswordRetry:4294967295 TerminationAction:4294967295 EapLength:65

RDReplyMessage: State:0172fee5673000000172fee56730

RADIUS模块发送认证认证Challenge消息给AAA模块。

72

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA send AAA_SRV_MSG_AUTHEN_ACK message(36) to UCM module(232).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

DestIndex:18 SrcIndex:18 Slot:4294967295

Result:2DomainIndex:65535 ServiceScheme:65535

AuthedPalace:3 VLAN:65535 IsCallBackVerify:0 IsCallbackUser:0

IfSessionTimeout:0 IfRemanentVolume:0 IfIdleCut:0

SessionTimeout:4294967295 RemanentVolume:4294967295 IdleTimeout:4294967295

EAPSessionTimeout:4294967295 EAPPasswordRetry:4294967295

RTAcctInterval:4294967295 Priority:[255,255]

AdminLevel:255 NextHop:4294967295 Role:0 LiAdmin:0

EapSize:65 ReplyMessage:

TunnelType:0 MediumType:0 PrivateGroupID:

SerialNo:7 WlanReasonCode:0

AAA模块透传认证Challenge消息给UCM模块。

73

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive AAA_SRV_MSG_AUTHEN_ACK from AAA module (msg code: 36 CID:18).

UCM模块收到AAA模块的认证Challenge消息。

74

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_CIB_S] enter in CMNACFillAAAAckInfo.

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_CIB_S] enter in CM_NAC_ProAckInfo.

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication ack message to AAA module (CID:18).

UCM模块发送认证Challenge消息给EAP模块。

75

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authen ack message from UCM module.(Result=2,local index=6,MAC=84c9-b272-47e0,RadiusTemplateIndex=65535,Reason=255)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authentication ack message from server.(result:SRV_AUTH_CHALLENGE)

EAP模块收到UCM模块的认证Challenge消息。

76

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request challenge packet to user.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

EAPOL packet: OUT

84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8

88 8e 01 00 00 41 01 0e 00 41 19 00 14 03 01 00

01 01 16 03 01 00 30 ac 39 a7 9b 17 6c 1d 9b 90

fb 85 f8 82 ea b5 0b 00 b6 54 1a 8a 35 1b e2 ec

99 81 65 f3 d6 60 58 07 e3 56 f8 2d 44 1d 37 aa

b1 6b 1c a8 ef 1a 33

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

802.1x packet:

Version:802.1X-2001(1); Type:Eap(0); Length:65

EAPOL packet:

Code:Request(1); Id:14; Length:65; Type:PEAP(25)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send EAP_request packet to user successfully.(Index=6)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send request/challenge packet to user successfully.enter request status.(local index:6)

EAP模块发送EAP PEAP Request报文给用户。

77

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0,

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

EAPOL packet: IN

fc e3 3c 9e 6d 66 84 c9 b2 72 47 e0 81 00 e0 c8

88 8e 01 00 00 06 02 0e 00 06 19 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

802.1x packet:

Version:802.1X-2001(1);Type:Eap(0); Length:6

EAPOL packet:

Code:Response(2); Id:14; Length:6; Type:PEAP(25)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EAPoL response challenge packet from user.

EAP模块收到用户的EAP PEAP Response报文。

78

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:EAPoL Send authentication message to server.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send authentication request message to user connection manager module successfully.(local index:6)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request to UCM module successfully.(local index:6)

EAP模块发送认证请求消息给UCM模块。

79

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive ESAP_SRV_MSG_AUTH_REQ from EAPOL module (msg code: 184 CID:18).

UCM模块收到EAP模块的认证请求消息。

80

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM WLAN Get Ap Info. Ap Info is 84A9-C48D-3BA0.

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication request message to AAA module (CID:18).

UCM模块发送认证请求消息给AAA模块。

81

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA receive AAA_SRV_MSG_AUTHEN_REQ message(31) from UCM module(232).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

DestIndex:18 SrcIndex:18 Slot:7168

User:skl MAC:84c9-b272-47e0

Slot:0 SubSlot:0 Port:0 VLAN:200

IP:255.255.255.255 AccessType:eap AuthenType:EAPRELAY

AdminLevel:0 EapSize:6 AuthenCode:1X

ulInterface:2466381824 ChallengeLen:16 ChapID:0

LineType:0 LineIndex:0 PortType:19

AcctSessionId:AC6605_00000000000200b19aa00200012

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA_MAIN initiate EapRelayAuthenReq event to AAA_AUTHEN module.

CID:0 Result:0 Info:598445172

AAA模块收到UCM模块的认证请求消息。

82

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA_MAIN initiate EapRelayAuthenReq event to AAA_AUTHEN module.

CID:0 Result:0 Info:598445172

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA send AAA_RD_MSG_AUTHENREQ message(49) to RADIUS module(235).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

CID:22 TemplateNo:2 SerialNo:7

PriyServer::: Vrf:0

SendServer::: Vrf:0

AccessType:eap AuthenMethod:EAPRELAY

UserName:skl CallingStationId:84c9-b272-47e0

Slot:0 SubSlot:0 Port:0 Vlan:200 Interface:2466381824

CID:32786 AcctSessionId:AC6605_00000000000200b19aa00200012

PortType:19 ServiceType:2 FramedProtocol:1 FramedIP:255.255.255.255

EapLength:6 StartupTimeStamp:1593441916 LoginIP:0.0.0.0

IPHostAddr:255.255.255.255 84:c9:b2:72:47:e0

ProductID:AC szVersion:Huawei AC6605-26-PWR

SecurityStr:

AAA模块发送认证请求消息给RADIUS模块。

83

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Receive authentication request message from AAA module.

RADIUS模块收到AAA模块的认证请求消息。

84

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Send a authentication request packet to radius server( server ip = 172.168.10.7).

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Server Template: 2

Server IP : 172.168.10.7

Protocol: Standard

Code : 1

Len : 369

ID : 22

[User-Name ] [5 ] [skl]

[NAS-Port ] [6 ] [200]

[Service-Type ] [6 ] [2]

[Framed-Protocol ] [6 ] [1]

[Calling-Station-Id ] [16] [84c9-b272-47e0]

[NAS-Identifier ] [15] [AC]

[NAS-Port-Type ] [6 ] [19]

[NAS-Port-Id ] [36] [slot=0;subslot=0;port=0;vlanid=200]

[State ] [16] [\001r\376\345g0]

[EAP-Message ] [8 ] [02 0e 00 06 19 00 ]

[Message-Authenticator ] [18] [e5 2b ce 74 30 62 4a 2e 97 d6 d9 99 d4 70 ee 21 ]

[Called-Station-Id ] [32] [84-A9-C4-8D-3B-A0:dot1x_129.77]

[Login-IP-Host ] [6 ] [0.0.0.0]

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

[NAS-IP-Address ] [6 ] [172.168.10.77]

[Framed-Mtu ] [6 ] [1500]

[Acct-Session-Id ] [36] [AC6605_00000000000200b19aa00200012]

[WLAN-Pairwise-Cipher ] [6 ] [0]

[WLAN-Group-Cipher ] [6 ] [0]

[WLAN-AKM-Suite ] [6 ] [0]

[WLAN-Group-Mgmt-Cipher ] [6 ] [0]

[HW-NAS-Startup-Time-Stamp ] [6 ] [1593441916]

[HW-IP-Host-Address ] [35] [255.255.255.255 84:c9:b2:72:47:e0]

[HW-Connect-ID ] [6 ] [32786]

[HW-Version ] [22] [Huawei AC6605-26-PWR]

[HW-Product-ID ] [4 ] [AC]

[HW-AP-Information ] [16] [84A9-C48D-3BA0]

[HW-Access-Type ] [6 ] [1]

RADIUS模块发送Radius Access Request报文给RADIUS服务器。

85

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Received a authentication challenge packet from radius server(server ip = 172.168.10.7).

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Server Template: 2

Server IP : 172.168.10.7

Server Port : 1812

Protocol: Standard

Code : 11

Len : 99

ID : 22

[State ] [16] [\001r\376\345g0]

[EAP-Message ] [45] [01 0f 00 2b 19 00 17 03 01 00 20 72 a0 35 9b 97 e5 1a fd d2 03 d2 e4 45 a6 05 4a c2 a5 5a e4 89 d7 ec 81 16 10 e8 29 d4 c7 9b f8 ]

[Message-Authenticator ] [18] [00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ]

RADIUS模块收到RADIUS服务器Radius Access Challenge报文。

86

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Send authentication challenge message to AAA.

RADIUS模块发送认证Challenge消息给AAA模块。

87

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA receive AAA_RD_MSG_AUTHENCHALLENGE message(52) from RADIUS module(235).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

CID:22 TemplateNo:2 SerialNo:7

SrcMsg:AAA_RD_MSG_AUTHENREQ

PriyServer::: Vrf:0

SendServer:172.168.10.7 Vrf:0

EapSessionTime:4294967295 EapPasswordRetry:4294967295 TerminationAction:4294967295 EapLength:43

RDReplyMessage: State:0172fee5673000000172fee56730

AAA模块收到RADIUS模块的认证Challenge消息。

88

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA send AAA_SRV_MSG_AUTHEN_ACK message(36) to UCM module(232).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

DestIndex:18 SrcIndex:18 Slot:4294967295

Result:2DomainIndex:65535 ServiceScheme:65535

AuthedPalace:3 VLAN:65535 IsCallBackVerify:0 IsCallbackUser:0

IfSessionTimeout:0 IfRemanentVolume:0 IfIdleCut:0

SessionTimeout:4294967295 RemanentVolume:4294967295 IdleTimeout:4294967295

EAPSessionTimeout:4294967295 EAPPasswordRetry:4294967295

RTAcctInterval:4294967295 Priority:[255,255]

AdminLevel:255 NextHop:4294967295 Role:0 LiAdmin:0

EapSize:43 ReplyMessage:

TunnelType:0 MediumType:0 PrivateGroupID:

SerialNo:7 WlanReasonCode:0

AAA模块透传认证Challenge消息给UCM模块。

89

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive AAA_SRV_MSG_AUTHEN_ACK from AAA module (msg code: 36 CID:18).

UCM模块收到AAA模块的认证Challenge消息。

90

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_CIB_S] enter in CMNACFillAAAAckInfo.

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_CIB_S] enter in CM_NAC_ProAckInfo.

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication ack message to AAA module (CID:18).

UCM模块发送认证Challenge消息给EAP模块(trace误写为AAA模块)。

91

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authen ack message from UCM module.(Result=2,local index=6,MAC=84c9-b272-47e0,RadiusTemplateIndex=65535,Reason=255)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authentication ack message from server.(result:SRV_AUTH_CHALLENGE)

EAP模块收到UCM模块的认证Challenge消息。

92

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request challenge packet to user.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

EAPOL packet: OUT

84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8

88 8e 01 00 00 2b 01 0f 00 2b 19 00 17 03 01 00

20 72 a0 35 9b 97 e5 1a fd d2 03 d2 e4 45 a6 05

4a c2 a5 5a e4 89 d7 ec 81 16 10 e8 29 d4 c7 9b

f8

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

802.1x packet:

Version:802.1X-2001(1); Type:Eap(0); Length:43

EAPOL packet:

Code:Request(1); Id:15; Length:43; Type:PEAP(25)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send EAP_request packet to user successfully.(Index=6)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send request/challenge packet to user successfully.enter request status.(local index:6)

EAP模块发送EAP PEAP Request报文给用户。

93

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0,

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

EAPOL packet: IN

fc e3 3c 9e 6d 66 84 c9 b2 72 47 e0 81 00 e0 c8

88 8e 01 00 00 2b 02 0f 00 2b 19 00 17 03 01 00

20 81 f4 31 55 48 1b ae ae a8 8d 03 94 1c bc 88

1b 99 b6 f7 49 63 35 34 ae 56 f0 fc 77 d1 cd 05

04

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

802.1x packet:

Version:802.1X-2001(1); Type:Eap(0); Length:43

EAPOL packet:

Code:Response(2); Id:15; Length:43; Type:PEAP(25)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EAPoL response challenge packet from user.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:EAPoL Send authentication message to server.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send authentication request message to user connection manager module successfully.(local index:6)

EAP模块收到用户的EAP PEAP Response报文。

94

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request to UCM module successfully.(local index:6)

EAP模块发送认证请求消息给UCM模块。

95

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive ESAP_SRV_MSG_AUTH_REQ from EAPOL module (msg code: 184 CID:18).

UCM模块收到EAP模块的认证请求消息。

96

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM WLAN Get Ap Info. Ap Info is 84A9-C48D-3BA0.

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication request message to AAA module (CID:18).

UCM模块发送认证请求消息给AAA模块。

97

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA receive AAA_SRV_MSG_AUTHEN_REQ message(31) from UCM module(232).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

DestIndex:18 SrcIndex:18 Slot:7168

User:skl MAC:84c9-b272-47e0

Slot:0 SubSlot:0 Port:0 VLAN:200

IP:255.255.255.255 AccessType:eap AuthenType:EAPRELAY

AdminLevel:0 EapSize:43 AuthenCode:1X

ulInterface:2466381824 ChallengeLen:16 ChapID:0

LineType:0 LineIndex:0 PortType:19

AcctSessionId:AC6605_00000000000200b19aa00200012

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA_MAIN initiate EapRelayAuthenReq event to AAA_AUTHEN module.

CID:0 Result:0 Info:541994588

AAA模块收到UCM模块的让你走请求消息。

98

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA send AAA_RD_MSG_AUTHENREQ message(49) to RADIUS module(235).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

CID:22 TemplateNo:2 SerialNo:7

PriyServer::: Vrf:0

SendServer::: Vrf:0

AccessType:eap AuthenMethod:EAPRELAY

UserName:skl CallingStationId:84c9-b272-47e0

Slot:0 SubSlot:0 Port:0 Vlan:200 Interface:2466381824

CID:32786 AcctSessionId:AC6605_00000000000200b19aa00200012

PortType:19 ServiceType:2 FramedProtocol:1 FramedIP:255.255.255.255

EapLength:43 StartupTimeStamp:1593441916 LoginIP:0.0.0.0

IPHostAddr:255.255.255.255 84:c9:b2:72:47:e0

ProductID:AC szVersion:Huawei AC6605-26-PWR

SecurityStr:

AAA模块发送认证请求消息给RADIUS模块。

99

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Receive authentication request message from AAA module.

RADIUS模块收到AAA模块的认证请求消息。

100

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Send a authentication request packet to radius server( server ip = 172.168.10.7).

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Server Template: 2

Server IP : 172.168.10.7

Protocol: Standard

Code : 1

Len : 406

ID : 23

[User-Name ] [5 ] [skl]

[NAS-Port ] [6 ] [200]

[Service-Type ] [6 ] [2]

[Framed-Protocol ] [6 ] [1]

[Calling-Station-Id ] [16] [84c9-b272-47e0]

[NAS-Identifier ] [15] [AC]

[NAS-Port-Type ] [6 ] [19]

[NAS-Port-Id ] [36] [slot=0;subslot=0;port=0;vlanid=200]

[State ] [16] [\001r\376\345g0]

[EAP-Message ] [45] [02 0f 00 2b 19 00 17 03 01 00 20 81 f4 31 55 48 1b ae ae a8 8d 03 94 1c bc 88 1b 99 b6 f7 49 63 35 34 ae 56 f0 fc 77 d1 cd 05 04 ]

[Message-Authenticator ] [18] [7a bf 92 93 36 45 ae f4 dd 55 8c 60 5f 18 05 82 ]

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

[Called-Station-Id ] [32] [84-A9-C4-8D-3B-A0:dot1x_129.77]

[Login-IP-Host ] [6 ] [0.0.0.0]

[NAS-IP-Address ] [6 ] [172.168.10.77]

[Framed-Mtu ] [6 ] [1500]

[Acct-Session-Id ] [36] [AC6605_00000000000200b19aa00200012]

[WLAN-Pairwise-Cipher ] [6 ] [0]

[WLAN-Group-Cipher ] [6 ] [0]

[WLAN-AKM-Suite ] [6 ] [0]

[WLAN-Group-Mgmt-Cipher ] [6 ] [0]

[HW-NAS-Startup-Time-Stamp ] [6 ] [1593441916]

[HW-IP-Host-Address ] [35] [255.255.255.255 84:c9:b2:72:47:e0]

[HW-Connect-ID ] [6 ] [32786]

[HW-Version ] [22] [Huawei AC6605-26-PWR]

[HW-Product-ID ] [4 ] [AC]

[HW-AP-Information ] [16] [84A9-C48D-3BA0]

[HW-Access-Type ] [6 ] [1]

RADIUS模块发送Radius Access Request报文给RADIUS服务器。

101

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Received a authentication challenge packet from radius server(server ip = 172.168.10.7).

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Server Template: 2

Server IP : 172.168.10.7

Server Port : 1812

Protocol: Standard

Code : 11

Len : 115

ID : 23

[State ] [16] [\001r\376\345g0]

[EAP-Message ] [61] [01 10 00 3b 19 00 17 03 01 00 30 a0 46 a3 7a 82 67 30 72 d1 a2 ac 8d 50 90 57 77 eb ac 5a f8 f9 c6 16 fd 01 e7 bb 41 81 1b 66 c2 c6 c8 f8 bf ab 20 d9 13 37 fa c9 69 c2 ed a8 0b ]

[Message-Authenticator ] [18] [00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ]

RADIUS模块收到RADIUS服务器的Radius Access Challenge报文。

102

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Send authentication challenge message to AAA.

RADIUS模块发送认证Challenge消息给AAA模块。

103

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA receive AAA_RD_MSG_AUTHENCHALLENGE message(52) from RADIUS module(235).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

CID:22 TemplateNo:2 SerialNo:7

SrcMsg:AAA_RD_MSG_AUTHENREQ

PriyServer::: Vrf:0

SendServer:172.168.10.7 Vrf:0

EapSessionTime:4294967295 EapPasswordRetry:4294967295 TerminationAction:4294967295 EapLength:59

RDReplyMessage: State:0172fee5673000000172fee56730

AAA模块收到RADIUS模块的认证Challenge消息。

104

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA send AAA_SRV_MSG_AUTHEN_ACK message(36) to UCM module(232).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

DestIndex:18 SrcIndex:18 Slot:4294967295

Result:2 DomainIndex:65535 ServiceScheme:65535

AuthedPalace:3 VLAN:65535 IsCallBackVerify:0 IsCallbackUser:0

IfSessionTimeout:0 IfRemanentVolume:0 IfIdleCut:0

SessionTimeout:4294967295 RemanentVolume:4294967295 IdleTimeout:4294967295

EAPSessionTimeout:4294967295 EAPPasswordRetry:4294967295

RTAcctInterval:4294967295 Priority:[255,255]

AdminLevel:255 NextHop:4294967295 Role:0 LiAdmin:0

EapSize:59 ReplyMessage:

TunnelType:0 MediumType:0 PrivateGroupID:

SerialNo:7 WlanReasonCode:0

AAA模块透传认证Challenge消息给UCM模块。

105

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive AAA_SRV_MSG_AUTHEN_ACK from AAA module (msg code: 36 CID:18).

UCM模块收到AAA模块的认证Challenge消息。

106

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_CIB_S] enter in CMNACFillAAAAckInfo.

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_CIB_S] enter in CM_NAC_ProAckInfo.

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication ack message to AAA module (CID:18).

UCM模块发送认证回应消息给EAP模块。

107

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authen ack message from UCM module.(Result=2,local index=6,MAC=84c9-b272-47e0,RadiusTemplateIndex=65535,Reason=255)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authentication ack message from server.(result:SRV_AUTH_CHALLENGE)

EAP模块收到UCM模块的认证Challenge消息。

108

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request challenge packet to user.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

EAPOL packet: OUT

84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8

88 8e 01 00 00 3b 01 10 00 3b 19 00 17 03 01 00

30 a0 46 a3 7a 82 67 30 72 d1 a2 ac 8d 50 90 57

77 eb ac 5a f8 f9 c6 16 fd 01 e7 bb 41 81 1b 66

c2 c6 c8 f8 bf ab 20 d9 13 37 fa c9 69 c2 ed a8

0b

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

802.1x packet:

Version:802.1X-2001(1); Type:Eap(0); Length:59

EAPOL packet:

Code:Request(1); Id:16; Length:59; Type:PEAP(25)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send EAP_request packet to user successfully.(Index=6)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send request/challenge packet to user successfully.enter request status.(local index:6)

EAP模块发送EAP PEAP Request报文给用户。

109

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0,

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

EAPOL packet: IN

fc e3 3c 9e 6d 66 84 c9 b2 72 47 e0 81 00 e0 c8

88 8e 01 00 00 5b 02 10 00 5b 19 00 17 03 01 00

50 57 c6 88 0b 98 19 63 2e ac 85 48 9f 61 f6 3a

4a 4d 6b f7 45 db fa e7 13 28 3a 19 e8 da bf b8

42 f0 c1 08 e8 f0 9c b3 e1 0e 8e c3 7c 3b 19 2e

59 ed 76 d4 72 25 e5 a2 0e 6a bc a0 22 55 80 86

1e 92 85 f0 58 3a e1 5f c8 d6 82 d0 40 cb 60 8b

9c

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

802.1x packet:

Version:802.1X-2001(1); Type:Eap(0); Length:91

EAPOL packet:

Code:Response(2); Id:16; Length:91;Type:PEAP(25)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EAPoL response challenge packet from user.

EAP模块收到用户的EAP PEAP Response报文。

110

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:EAPoL Send authentication message to server.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send authentication request message to user connection manager module successfully.(local index:6)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request to UCM module successfully.(local index:6)

EAP模块发送认证请求消息给UCM模块。

111

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive ESAP_SRV_MSG_AUTH_REQ from EAPOL module (msg code: 184 CID:18).

UCM模块收到EAP模块的认证请求消息。

112

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM WLAN Get Ap Info. Ap Info is 84A9-C48D-3BA0.

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication request message to AAA module (CID:18).

UCM模块发送认证请求消息给AAA模块。

113

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA receive AAA_SRV_MSG_AUTHEN_REQ message(31) from UCM module(232).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

DestIndex:18 SrcIndex:18 Slot:7168

User:skl MAC:84c9-b272-47e0

Slot:0 SubSlot:0 Port:0 VLAN:200

IP:255.255.255.255 AccessType:eap AuthenType:EAPRELAY

AdminLevel:0 EapSize:91 AuthenCode:1X

ulInterface:2466381824 ChallengeLen:16 ChapID:0

LineType:0 LineIndex:0 PortType:19

AcctSessionId:AC6605_00000000000200b19aa00200012

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA_MAIN initiate EapRelayAuthenReq event to AAA_AUTHEN module.

CID:0 Result:0 Info:608704588

AAA模块收到UCM模块的认证请求消息。

114

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA send AAA_RD_MSG_AUTHENREQ message(49) to RADIUS module(235).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

CID:22 TemplateNo:2 SerialNo:7

PriyServer::: Vrf:0

SendServer::: Vrf:0

AccessType:eap AuthenMethod:EAPRELAY

UserName:skl CallingStationId:84c9-b272-47e0

Slot:0 SubSlot:0 Port:0 Vlan:200 Interface:2466381824

CID:32786 AcctSessionId:AC6605_00000000000200b19aa00200012

PortType:19 ServiceType:2 FramedProtocol:1 FramedIP:255.255.255.255

EapLength:91 StartupTimeStamp:1593441916 LoginIP:0.0.0.0

IPHostAddr:255.255.255.255 84:c9:b2:72:47:e0

ProductID:AC szVersion:Huawei AC6605-26-PWR

SecurityStr:

AAA模块发送认证请求消息给RADIUS模块。

115

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Receive authentication request message from AAA module.

RADIUS模块收到AAA模块的认证请求消息。

116

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Send a authentication request packet to radius server( server ip = 172.168.10.7).

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Server Template: 2

Server IP : 172.168.10.7

Protocol: Standard

Code : 1

Len : 454

ID : 24

[User-Name ] [5 ] [skl]

[NAS-Port ] [6 ] [200]

[Service-Type ] [6 ] [2]

[Framed-Protocol ] [6 ] [1]

[Calling-Station-Id ] [16] [84c9-b272-47e0]

[NAS-Identifier ] [15] [AC]

[NAS-Port-Type ] [6 ] [19]

[NAS-Port-Id ] [36] [slot=0;subslot=0;port=0;vlanid=200]

[State ] [16] [\001r\376\345g0]

[EAP-Message ] [93] [02 10 00 5b 19 00 17 03 01 00 50 57 c6 88 0b 98 19 63 2e ac 85 48 9f 61 f6 3a 4a 4d 6b f7 45 db fa e7 13 28 3a 19 e8 da bf b8 42 f0 c1 08 e8 f0 9c b3 e1 0e 8e c3 7c 3b 19 2e 59 ed 76 d4 72 25 e5 a2 0e 6a bc a0 22 55 80 86 1e 92 85 f0 58 3a e1 5f c8 d6 82 d0 40 cb 60 8b 9c ]

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

[Message-Authenticator ] [18] [e0 f4 65 d0 c7 5e 57 84 fd 4a 3f cc 22 8c 56 41 ]

[Called-Station-Id ] [32] [84-A9-C4-8D-3B-A0:dot1x_129.77]

[Login-IP-Host ] [6 ] [0.0.0.0]

[NAS-IP-Address ] [6 ] [172.168.10.77]

[Framed-Mtu ] [6 ] [1500]

[Acct-Session-Id ] [36] [AC6605_00000000000200b19aa00200012]

[WLAN-Pairwise-Cipher ] [6 ] [0]

[WLAN-Group-Cipher ] [6 ] [0]

[WLAN-AKM-Suite ] [6 ] [0]

[WLAN-Group-Mgmt-Cipher ] [6 ] [0]

[HW-NAS-Startup-Time-Stamp ] [6 ] [1593441916]

[HW-IP-Host-Address ] [35] [255.255.255.255 84:c9:b2:72:47:e0]

[HW-Connect-ID ] [6 ] [32786]

[HW-Version ] [22] [Huawei AC6605-26-PWR]

[HW-Product-ID ] [4 ] [AC]

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

[HW-AP-Information ] [16] [84A9-C48D-3BA0]

[HW-Access-Type ] [6 ] [1]

RADIUS模块发送Radius Access Request报文给RADIUS服务器。

117

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Received a authentication challenge packet from radius server(server ip = 172.168.10.7).

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Server Template: 2

Server IP : 172.168.10.7

Server Port : 1812

Protocol: Standard

Code : 11

Len : 147

ID : 24

[State ] [16] [\001r\376\345g0]

[EAP-Message ] [93] [01 11 00 5b 19 00 17 03 01 00 50 b1 39 a1 56 89 5c 50 67 7c 2c 26 26 85 e6 3d f4 dc 4f 59 2d 65 2d 5f e2 6d 80 a9 72 b6 92 18 81 45 e5 05 3a 42 ab ad 50 c6 ce 6a 56 86 be 09 75 46 39 9d bb cd 60 41 55 55 69 ce 58 22 20 77 9a bf 07 53 b9 83 07 5e 2e 23 8f 1e 99 c8 5a 87 1d ]

[Message-Authenticator ] [18] [00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ]

RADIUS模块收到RADIUS服务器的Radius Access Challenge报文。

118

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Send authentication challenge message to AAA.

RADIUS模块发送认证Challenge消息给AAA模块。

119

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA receive AAA_RD_MSG_AUTHENCHALLENGE message(52) from RADIUS module(235).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

CID:22 TemplateNo:2 SerialNo:7

SrcMsg:AAA_RD_MSG_AUTHENREQ

PriyServer::: Vrf:0

SendServer:172.168.10.7 Vrf:0

EapSessionTime:4294967295 EapPasswordRetry:4294967295 TerminationAction:4294967295 EapLength:91

RDReplyMessage: State:0172fee5673000000172fee56730

AAA模块收到RADIUS模块的认证Challenge消息。

120

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA send AAA_SRV_MSG_AUTHEN_ACK message(36) to UCM module(232).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

DestIndex:18 SrcIndex:18 Slot:4294967295

Result:2 DomainIndex:65535 ServiceScheme:65535

AuthedPalace:3 VLAN:65535 IsCallBackVerify:0 IsCallbackUser:0

IfSessionTimeout:0 IfRemanentVolume:0 IfIdleCut:0

SessionTimeout:4294967295 RemanentVolume:4294967295 IdleTimeout:4294967295

EAPSessionTimeout:4294967295 EAPPasswordRetry:4294967295

RTAcctInterval:4294967295 Priority:[255,255]

AdminLevel:255 NextHop:4294967295 Role:0 LiAdmin:0

EapSize:91 ReplyMessage:

TunnelType:0 MediumType:0 PrivateGroupID:

SerialNo:7 WlanReasonCode:0

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive AAA_SRV_MSG_AUTHEN_ACK from AAA module (msg code: 36 CID:18).

AAA模块透传认证Challenge消息给UCM模块。

121

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_CIB_S] enter in CMNACFillAAAAckInfo.

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_CIB_S] enter in CM_NAC_ProAckInfo.

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication ack message to AAA module (CID:18).

UCM模块发送认证Challenge消息给EAP模块。

122

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authen ack message from UCM module.(Result=2,local index=6,MAC=84c9-b272-47e0,RadiusTemplateIndex=65535,Reason=255)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authentication ack message from server.(result:SRV_AUTH_CHALLENGE)

EAP模块收到UCM模块的认证Challenge消息。

123

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request challenge packet to user.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

EAPOL packet: OUT

84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8

88 8e 01 00 00 5b 01 11 00 5b 19 00 17 03 01 00

50 b1 39 a1 56 89 5c 50 67 7c 2c 26 26 85 e6 3d

f4 dc 4f 59 2d 65 2d 5f e2 6d 80 a9 72 b6 92 18

81 45 e5 05 3a 42 ab ad 50 c6 ce 6a 56 86 be 09

75 46 39 9d bb cd 60 41 55 55 69 ce 58 22 20 77

9a bf 07 53 b9 83 07 5e 2e 23 8f 1e 99 c8 5a 87

1d

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

802.1x packet:

Version:802.1X-2001(1); Type:Eap(0); Length:91

EAPOL packet:

Code:Request(1); Id:17; Length:91; Type:PEAP(25)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send EAP_request packet to user successfully.(Index=6)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send request/challenge packet to user successfully.enter request status.(local index:6)

EAP模块发送EAP PEAP Request报文给用户。

124

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0,

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

EAPOL packet: IN

fc e3 3c 9e 6d 66 84 c9 b2 72 47 e0 81 00 e0 c8

88 8e 01 00 00 2b 02 11 00 2b 19 00 17 03 01 00

20 a8 f0 20 1f 43 d7 a8 16 15 f3 6a e6 ea 39 17

d8 31 bc 40 de 83 84 b6 2b 75 2c 05 eb dc 6d 67

38

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

802.1x packet:

Version:802.1X-2001(1); Type:Eap(0); Length:43

EAPOL packet:

Code:Response(2); Id:17; Length:43; Type:PEAP(25)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EAPoL response challenge packet from user.

EAP模块收到用户的EAP PEAP Response报文。

125

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:EAPoL Send authentication message to server.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send authentication request message to user connection manager module successfully.(local index:6)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request to UCM module successfully.(local index:6)

EAP模块发送认证请求消息给UCM模块。

126

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive ESAP_SRV_MSG_AUTH_REQ from EAPOL module (msg code: 184 CID:18).

UCM模块收到EAP模块的认证请求消息。

127

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM WLAN Get Ap Info. Ap Info is 84A9-C48D-3BA0.

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication request message to AAA module (CID:18).

UCM模块发送认证请求消息给AAA模块。

128

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA receive AAA_SRV_MSG_AUTHEN_REQ message(31) from UCM module(232).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

DestIndex:18 SrcIndex:18 Slot:7168

User:skl MAC:84c9-b272-47e0

Slot:0 SubSlot:0 Port:0 VLAN:200

IP:255.255.255.255 AccessType:eap AuthenType:EAPRELAY

AdminLevel:0 EapSize:43 AuthenCode:1X

ulInterface:2466381824 ChallengeLen:16 ChapID:0

LineType:0 LineIndex:0 PortType:19

AcctSessionId:AC6605_00000000000200b19aa00200012

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA_MAIN initiate EapRelayAuthenReq event to AAA_AUTHEN module.

CID:0 Result:0 Info:608704588

AAA模块收到UCM模块的认证请求消息。

129

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA send AAA_RD_MSG_AUTHENREQ message(49) to RADIUS module(235).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

CID:22 TemplateNo:2 SerialNo:7

PriyServer::: Vrf:0

SendServer::: Vrf:0

AccessType:eap AuthenMethod:EAPRELAY

UserName:skl CallingStationId:84c9-b272-47e0

Slot:0 SubSlot:0 Port:0 Vlan:200 Interface:2466381824

CID:32786 AcctSessionId:AC6605_00000000000200b19aa00200012

PortType:19 ServiceType:2 FramedProtocol:1 FramedIP:255.255.255.255

EapLength:43 StartupTimeStamp:1593441916 LoginIP:0.0.0.0

IPHostAddr:255.255.255.255 84:c9:b2:72:47:e0

ProductID:AC szVersion:Huawei AC6605-26-PWR

SecurityStr:

AAA模块发送认证请求消息给RADIUS模块。

130

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Receive authentication request message from AAA module.

RADIUS模块收到AAA模块的认证请求消息。

131

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Send a authentication request packet to radius server( server ip = 172.168.10.7).

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Server Template: 2

Server IP : 172.168.10.7

Protocol: Standard

Code : 1

Len : 406

ID : 25

[User-Name ] [5 ] [skl]

[NAS-Port ] [6 ] [200]

[Service-Type ] [6 ] [2]

[Framed-Protocol ] [6 ] [1]

[Calling-Station-Id ] [16] [84c9-b272-47e0]

[NAS-Identifier ] [15] [AC]

[NAS-Port-Type ] [6 ] [19]

[NAS-Port-Id ] [36] [slot=0;subslot=0;port=0;vlanid=200]

[State ] [16] [\001r\376\345g0]

[EAP-Message ] [45] [02 11 00 2b 19 00 17 03 01 00 20 a8 f0 20 1f 43 d7 a8 16 15 f3 6a e6 ea 39 17 d8 31 bc 40 de 83 84 b6 2b 75 2c 05 eb dc 6d 67 38 ]

[Message-Authenticator ] [18] [0d da 19 aa 6d 97 ba 8b 75 1e 5e 1c 5d 11 23 d5 ]

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

[Called-Station-Id ] [32] [84-A9-C4-8D-3B-A0:dot1x_129.77]

[Login-IP-Host ] [6 ] [0.0.0.0]

[NAS-IP-Address ] [6 ] [172.168.10.77]

[Framed-Mtu ] [6 ] [1500]

[Acct-Session-Id ] [36] [AC6605_00000000000200b19aa00200012]

[WLAN-Pairwise-Cipher ] [6 ] [0]

[WLAN-Group-Cipher ] [6 ] [0]

[WLAN-AKM-Suite ] [6 ] [0]

[WLAN-Group-Mgmt-Cipher ] [6 ] [0]

[HW-NAS-Startup-Time-Stamp ] [6 ] [1593441916]

[HW-IP-Host-Address ] [35] [255.255.255.255 84:c9:b2:72:47:e0]

[HW-Connect-ID ] [6 ] [32786]

[HW-Version ] [22] [Huawei AC6605-26-PWR]

[HW-Product-ID ] [4 ] [AC]

[HW-AP-Information ] [16] [84A9-C48D-3BA0]

[HW-Access-Type ] [6 ] [1]

RADIUS模块发送Radius Access Request报文给RADIUS服务器。

132

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Received a authentication challenge packet from radius server(server ip = 172.168.10.7).

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Server Template: 2

Server IP : 172.168.10.7

Server Port : 1812

Protocol: Standard

Code : 11

Len : 179

ID : 25

[State ] [16] [\001r\376\345g0]

[EAP-Message ] [125] [01 12 00 7b 19 00 17 03 01 00 70 73 ca 43 cd d9 7e 13 50 73 d7 a2 aa 8f fb d7 fa 2e 24 78 75 a4 54 c9 fb 50 9f fe f2 49 a6 4c b7 a4 7f 43 9a 8f 1b 6c f1 9f 76 e0 6a a3 51 78 94 9b b6 25 fd 95 67 dc 5a db 6f 52 11 98 70 48 4a 13 6e af c0 22 67 76 61 d6 32 a1 8d 43 ba b1 a0 37 48 06 ca 5c cd 7b 87 b4 b9 06 4b a4 a8 a0 20 86 33 44 c5 6d 60 53 9c 1d db 48 d4 86 1c 64 a6 ]

[Message-Authenticator ] [18] [00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ]

RADIUS模块收到RADIUS服务器的Radius Access Challenge报文。

133

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Send authentication challenge message to AAA.

RADIUS模块发送认证Challenge消息给AAA模块。

134

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA receive AAA_RD_MSG_AUTHENCHALLENGE message(52) from RADIUS module(235).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

CID:22 TemplateNo:2 SerialNo:7

SrcMsg:AAA_RD_MSG_AUTHENREQ

PriyServer::: Vrf:0

SendServer:172.168.10.7 Vrf:0

EapSessionTime:4294967295 EapPasswordRetry:4294967295 TerminationAction:4294967295 EapLength:123

RDReplyMessage: State:0172fee5673000000172fee56730

AAA模块收到RADIUS模块的认证Challenge消息。

135

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA send AAA_SRV_MSG_AUTHEN_ACK message(36) to UCM module(232).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

DestIndex:18 SrcIndex:18 Slot:4294967295

Result:2 DomainIndex:65535 ServiceScheme:65535

AuthedPalace:3 VLAN:65535 IsCallBackVerify:0 IsCallbackUser:0

IfSessionTimeout:0 IfRemanentVolume:0 IfIdleCut:0

SessionTimeout:4294967295 RemanentVolume:4294967295 IdleTimeout:4294967295

EAPSessionTimeout:4294967295 EAPPasswordRetry:4294967295

RTAcctInterval:4294967295 Priority:[255,255]

AdminLevel:255 NextHop:4294967295 Role:0 LiAdmin:0

EapSize:123 ReplyMessage:

TunnelType:0 MediumType:0 PrivateGroupID:

SerialNo:7 WlanReasonCode:0

AAA模块透传认证Challenge消息给UCM模块。

136

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive AAA_SRV_MSG_AUTHEN_ACK from AAA module (msg code: 36 CID:18).

UCM模块收到AAA模块的认证回应消息。

137

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_CIB_S] enter in CMNACFillAAAAckInfo.

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_CIB_S] enter in CM_NAC_ProAckInfo.

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication ack message to AAA module (CID:18).

UCM模块发送认证回应消息给EAP模块。

138

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authen ack message from UCM module.(Result=2,local index=6,MAC=84c9-b272-47e0,RadiusTemplateIndex=65535,Reason=255)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive authentication ack message from server.(result:SRV_AUTH_CHALLENGE)

EAP模块收到UCM模块的认证Challenge消息。

139

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request challenge packet to user.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

EAPOL packet: OUT

84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8

88 8e 01 00 00 7b 01 12 00 7b 19 00 17 03 01 00

70 73 ca 43 cd d9 7e 13 50 73 d7 a2 aa 8f fb d7

fa 2e 24 78 75 a4 54 c9 fb 50 9f fe f2 49 a6 4c

b7 a4 7f 43 9a 8f 1b 6c f1 9f 76 e0 6a a3 51 78

94 9b b6 25 fd 95 67 dc 5a db 6f 52 11 98 70 48

4a 13 6e af c0 22 67 76 61 d6 32 a1 8d 43 ba b1

a0 37 48 06 ca 5c cd 7b 87 b4 b9 06 4b a4 a8 a0

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

802.1x packet:

Version:802.1X-2001(1); Type:Eap(0); Length:123

EAPOL packet:

Code:Request(1); Id:18; Length:123; Type:PEAP(25)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send EAP_request packet to user successfully.(Index=6)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send request/challenge packet to user successfully.enter request status.(local index:6)

EAP模块发送EAP PEAP Request报文给用户。

140

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive EAP packet, get packet information.(L2Type=157409104, QinqVlan=0, Vlan=0,

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive an eap packet from user.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

EAPOL packet: IN

fc e3 3c 9e 6d 66 84 c9 b2 72 47 e0 81 00 e0 c8

88 8e 01 00 00 2b 02 12 00 2b 19 00 17 03 01 00

20 aa 99 c7 68 00 31 14 f6 a9 ac 5d fd f1 d9 ac

53 22 1e a5 17 3e b8 a9 55 f4 2e 2e ac ba 66 7f

f4

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:

802.1x packet:

Version:802.1X-2001(1); Type:Eap(0); Length:43

EAPOL packet:

Code:Response(2); Id:18; Length:43; Type:PEAP(25)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Receive a EAPoL response challenge packet from user.

EAP模块收到用户的EAP PEAP Response报文。

141

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:EAPoL Send authentication message to server.

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Send authentication request message to user connection manager module successfully.(local index:6)

[BTRACE][2020/06/29 15:07:01][7168][EAPoL][84c9-b272-47e0]:Eapol send authentication request to UCM module successfully.(local index:6)

EAP模块发送认证请求消息给UCM模块。

142

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM receive ESAP_SRV_MSG_AUTH_REQ from EAPOL module (msg code: 184 CID:18).

UCM模块收到EAP模块的认证请求消息。

143

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM WLAN Get Ap Info. Ap Info is 84A9-C48D-3BA0.

[BTRACE][2020/06/29 15:07:01][7168][CM][84c9-b272-47e0]:CM send authentication request message to AAA module (CID:18).

UCM模块发送认证请求消息给AAA模块。

144

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA receive AAA_SRV_MSG_AUTHEN_REQ message(31) from UCM module(232).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

DestIndex:18 SrcIndex:18 Slot:7168

User:skl MAC:84c9-b272-47e0

Slot:0 SubSlot:0 Port:0 VLAN:200

IP:255.255.255.255 AccessType:eap AuthenType:EAPRELAY

AdminLevel:0 EapSize:43 AuthenCode:1X

ulInterface:2466381824 ChallengeLen:16 ChapID:0

LineType:0 LineIndex:0 PortType:19

AcctSessionId:AC6605_00000000000200b19aa00200012

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA_MAIN initiate EapRelayAuthenReq event to AAA_AUTHEN module.

CID:0 Result:0 Info:607416084

AAA模块收到UCM模块的认证请求消息。

145

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA_MAIN initiate EapRelayAuthenReq event to AAA_AUTHEN module.

CID:0 Result:0 Info:607416084

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

AAA send AAA_RD_MSG_AUTHENREQ message(49) to RADIUS module(235).

[BTRACE][2020/06/29 15:07:01][7168][AAA][84c9-b272-47e0]:

CID:22 TemplateNo:2 SerialNo:7

PriyServer::: Vrf:0

SendServer::: Vrf:0

AccessType:eap AuthenMethod:EAPRELAY

UserName:skl CallingStationId:84c9-b272-47e0

Slot:0 SubSlot:0 Port:0 Vlan:200 Interface:2466381824

CID:32786 AcctSessionId:AC6605_00000000000200b19aa00200012

PortType:19 ServiceType:2 FramedProtocol:1 FramedIP:255.255.255.255

EapLength:43 StartupTimeStamp:1593441916 LoginIP:0.0.0.0

IPHostAddr:255.255.255.255 84:c9:b2:72:47:e0

ProductID:AC szVersion:Huawei AC6605-26-PWR

SecurityStr:

AAA模块发送认证请求消息给RADIUS模块。

146

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:Receive authentication request message from AAA module.

RADIUS模块收到AAA模块的认证请求消息。

147

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Send a authentication request packet to radius server( server ip = 172.168.10.7).

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

Server Template: 2

Server IP : 172.168.10.7

Protocol: Standard

Code : 1

Len : 406

ID : 26

[User-Name ] [5 ] [skl]

[NAS-Port ] [6 ] [200]

[Service-Type ] [6 ] [2]

[Framed-Protocol ] [6 ] [1]

[Calling-Station-Id ] [16] [84c9-b272-47e0]

[NAS-Identifier ] [15] [AC]

[NAS-Port-Type ] [6 ] [19]

[NAS-Port-Id ] [36] [slot=0;subslot=0;port=0;vlanid=200]

[State ] [16] [\001r\376\345g0]

[EAP-Message ] [45] [02 12 00 2b 19 00 17 03 01 00 20 aa 99 c7 68 00 31 14 f6 a9 ac 5d fd f1 d9 ac 53 22 1e a5 17 3e b8 a9 55 f4 2e 2e ac ba 66 7f f4 ]

[Message-Authenticator ] [18] [f4 69 e2 32 9b 7c d2 ff 27 43 d3 d6 00 b0 70 26 ]

[BTRACE][2020/06/29 15:07:01][7168][RADIUS][84c9-b272-47e0]:

[Called-Station-Id ] [32] [84-A9-C4-8D-3B-A0:dot1x_129.77]

[Login-IP-Host ] [6 ] [0.0.0.0]

[NAS-IP-Address ] [6 ] [172.168.10.77]

[Framed-Mtu ] [6 ] [1500]

[Acct-Session-Id ] [36] [AC6605_00000000000200b19aa00200012]

[WLAN-Pairwise-Cipher ] [6 ] [0]

[WLAN-Group-Cipher ] [6 ] [0]

[WLAN-AKM-Suite ] [6 ] [0]

[WLAN-Group-Mgmt-Cipher ] [6 ] [0]

[HW-NAS-Startup-Time-Stamp ] [6 ] [1593441916]

[HW-IP-Host-Address ] [35] [255.255.255.255 84:c9:b2:72:47:e0]

[HW-Connect-ID ] [6 ] [32786]

[HW-Version ] [22] [Huawei AC6605-26-PWR]

[HW-Product-ID ] [4 ] [AC]

[HW-AP-Information ] [16] [84A9-C48D-3BA0]

[HW-Access-Type ] [6 ] [1]

RADIUS模块发送Radius Access Request报文给RADIUS服务器。

148

[BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]:

Received a authentication accept packet from radius server(server ip = 172.168.10.7).

[BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]:

Server Template: 2

Server IP : 172.168.10.7

Server Port : 1812

Protocol: Standard

Code : 2

Len : 176

ID : 26

[EAP-Message ] [6 ] [03 13 00 04 ]

[State ] [16] [\001r\376\345g0]

[MS-MPPE-Send-Key ] [52] [27 cf b9 be 04 b4 e7 6c 4c 98 3d d0 91 b4 4e 2b a1 80 30 c7 34 9d 87 39 be 55 37 4e 6a b1 ec 17 92 4f 94 cb 99 4a 12 c2 f8 23 89 61 1c 16 04 87 cb f8 ] [MS-MPPE-Recv-Key ] [52] [27 cf b9 aa e0 54 51 d1 34 5e 1d 1e f2 3c 2f 65 01 93 99 0e 66 11 61 93 3d 56 f0 e9 5f a5 60 95 c9 f0 07 8e f6 68 a2 6b 70 9c 2b 36 ed f3 53 1c b7 0e ]

[Message-Authenticator ] [18] [00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ]

RADIUS模块收到RADIUS服务器的认证成功报文:

成功时回复Radius Access Accept报文

失败时回复Radius Access Reject报文

149

[BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]:Send authentication reply message to AAA.

RADIUS模块发送认证成功消息给AAA模块。

150

[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]:

AAA receive AAA_RD_MSG_AUTHENACCEPT message(50) from RADIUS module(235).

[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]:

CID:22 TemplateNo:2 SerialNo:7

SrcMsg:AAA_RD_MSG_AUTHENREQ

PriyServer::: Vrf:0

SendServer:172.168.10.7 Vrf:0

SessionTimeout:0 IdleTimeout:0

AcctInterimInterval:0 RemanentVolume:0

InputPeakRate:0 InputAverageRate:0

OutputPeakRate:0 OutputAverageRate:0

InputBasicRate:0 OutputBasicRate:0

InputPBS:0 OutputPBS:0

Priority:[0,0] DNS:[0.0.0.0, 0.0.0.0]

ServiceType:0 LoginService:0 AdminLevel:0 FramedProtocol:0

LoginIpHost:0 NextHop:0

EapLength:4 ReplyMessage:

TunnelType:0 MediumType:0 PrivateGroupID:

WlanReasonCode:0

AAA模块收到RADIUS模块的认证成功消息。

151

[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]:

AAA send AAA_SRV_MSG_AUTHEN_ACK message(36) to UCM module(232).

[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]:

DestIndex:18 SrcIndex:18 Slot:4294967295

Result:0 DomainIndex:69 ServiceScheme:65535 AuthedPalace:3 VLAN:65535 IsCallBackVerify:0 IsCallbackUser:0 IfSessionTimeout:0 IfRemanentVolume:0 IfIdleCut:0 SessionTimeout:4294967295 RemanentVolume:4294967295 IdleTimeout:4294967295 EAPSessionTimeout:4294967295 EAPPasswordRetry:4294967295 RTAcctInterval:4294967295 Priority:[255,255] AdminLevel:255 NextHop:4294967295 Role:0 LiAdmin:0 EapSize:4 ReplyMessage: TunnelType:0 MediumType:0 PrivateGroupID: SerialNo:7 WlanReasonCode:0

AAA模块发送认证回应消息给UCM模块(Result: 0表示认证成功)。

152

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM receive AAA_SRV_MSG_AUTHEN_ACK from AAA module (msg code: 36 CID:18).

UCM模块收到AAA模块的认证成功消息。

153

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Get Local Authorize]Authen ACL str len.(len=0)

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_CIB_S] enter in CMNACFillAAAAckInfo.

获取授权ACL信息,len=0表示没有授权ACL。

154

[BTRACE][2020/06/29 15:07:02][2048][WLAN_AC][84c9-b272-47e0]:[Process:2][WSTA] Send static user ap tunnel info oper event return (Type:5, ap:0, vlan:200)

发布AP DBSS ELB订阅信息。

155

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_CIB_S] enter in CM_NAC_ProAckInfo.

UCM模块保存授权信息。

156

[BTRACE][2020/06/29 15:07:02][2048][WLAN_AC][84c9-b272-47e0]:[Process:2][WSTA] Oper config fwd user elb (Type:1, Ap:0, radio:0, wlan:4, vlan:200)

[BTRACE][2020/06/29 15:07:02][2048][WLAN_AC][84c9-b272-47e0]:[Process:2][WSTA] Update fwd elb tunnlel port (Type:1, ap:0, radio:0, wlan:4, vlan:200, access mode:0, direct:0, tunnel:1, vap:1, code:0)

[BTRACE][2020/06/29 15:07:02][2048][WLAN_AC][84c9-b272-47e0]:[Process:2]Process user auth update elb table (ap:0, radio:0, wlan:4, vlan:200, Code:0)

更新用户ELB表。

157

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_ACCTDATA_S]Come in CMFillAcctInfo.

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_ACCTDATA_S]Cib acct data is null in CMFillAcctInfo.

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM_NAC_ChangeWlanUserServiceVlan] Wlan user service-vlan=200, author dynamic vlan: 65535, original dynamic vlan: 0, type: 3, local author bitmap: 0xffffffff.

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Set Parse Ok Acl](oldUserGroup=65535, newGroupId=65535, newAclId[65535,65535,65535,65535], newAclV6Id[65535,65535,65535,65535], newUclGroupId=65535)

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:UserGroupChanged:0

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Set Parse Ok Acl]: default GroupID=65535

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Set Parse Ok Acl]:AclIdCache[65535,65535,65535,65535]

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[Get Authorize Info From AAA](inCarFlag=0, outCarFlag=0, GroupID=65535, VLAN=0, voiceVlanflag=0,InDscpValue=255, In8021pValue=255, ServiceSchemeName=, IdleCutFlowDirection=4, IdleCutTime=0, IdleCutSecond=0, IdleCutFlow=0,redirect acl id:65535, EapSessionTimeout=4294967295, SessionTimeout=4294967295, Priority =255,ucDownPriority =255,VlanSource:0, AccountingSep:0)

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM fill user authorization information (CID:18).

UCM模块保存授权信息。

158

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Goto Next State](CID=18, Event=81, CM EVENT START NEXT AUTH=58)

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:State from AUTH(substate:BUTT) to GLOCTRL(substate:BUTT). (cib=18, event=CM_EVENT_GC_USER_ACCESS_REQ)

UCM模块切换用户表项状态:AUTH->GLOCTRL。

159

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Goto Next State](CID=18, Event=6, CM EVENT START NEXT AUTH=58)

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:State from GLOCTRL(substate:BUTT) to AUTH(substate:BUTT). (cib=18, event=AUTH_GC_PASS)

UCM模块切换用户表项状态:GLOCTRL->AUTH。

160

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM NAC State Auth Entity, OpenUser:0,FailType:46

FailType:46表示认证成功无错误。

161

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:User authentication success (CID:18).

UCM模块判断用户认证成功。

162

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:State from AUTH(substate:BUTT) to ADDUSER(substate:BUTT). (cib=18, event=AUTH_GC_PASS)

UCM模块切换用户表项状态:AUTHL->ADDUSER。

163

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:

[CM NAC Proc Port Vlan]Vlan change.(IfIndex=2466381824, IsPortBased=0, newVlan=0, VlanType=3, IsPortbasedGuestAuthened=0)

UCM模块处理授权VLAN,newVlan=0说明RADIUS服务器没有下发授权VLAN。

164

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:

[CM_NAC_CheckIfClearVlan] clear authorised vlan, set modify flag.

UCM模块删除旧的授权VLAN信息。

165

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC CheckIfSupportAuthor](PreAuthFlag 0 RemarkInGroupFlag 0 CarFlag 0 authormap 0x 00000000 00000000 accesstype 13 ulRet 1).

UCM模块检查是否支持授权,ulRet 1表示支持授权。

166

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:

[CM Get MCIB Info] Cid:18, FixedCid:32786

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM_NAC_GetMCIBInfoFromNac:UserGroupID=65535,UclGroupID=65535,usAclID[65535,65535,65535,65535],v6AclID[65535,65535,65535,65535]

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:NotifyTM PreAuthFlag = 0, OldPreAuthFlag = 0,Cib AccessType = 13.

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:NotifyTM UserGroup = 65535, UclGroup = 65535, UserGroupPriority = 255.

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:RemarkDscp = 255 Remark8021p = 255 DnRemark8021p = 255 DnRemarkDscp = 255.

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Get QosInfo From Nac] CM send QoS to TM. UserName=,Valid=0,Cir=0,Pir=0,FlowMappingProfileIndex=0,FlowQueueProfileIndex=0

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM_NAC_GetMCIBInfoFromNac ucUserGroupChanged = 0, HttpsToCpuFlag:0, Dot1xUrlFlag:0

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:

[CM Get MCIB Info]DetectVlanId=0, Cib GateWay=0xffffffff.

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:

CM_SendSetTableMsg: CID:18, Command:0,UserGroup:65535 UclGroupId:65535, aclNum:65535,usAclID[65535,65535,65535,65535],ucHttpFwdFlg=0

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:

CM_SendSetTableMsg: OldDestSlotFlag:0x 00000000 00000000 00000000 00000000, NewDestSlotFlag: 0x 00000000 00000000 00000000 00000001

UCM模块填充授权请求消息。

167

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Proc Lpu](OpType=0, WlanFlag=1, WANFlag=0, vlan=0, Ret=0).

UCM模块发送授权请求给TM模块,Ret=0表示发送成功。

168

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:Open user access ability (CID:18).

UCM模块通知EAP模块清除端口认证失败计数。

169

[BTRACE][2020/06/29 15:07:02][7168][TM][84c9-b272-47e0]:

[TM DBG]SrcNode = 7168, DstNode = 7168.

[TM DBG] Rev CM_SET(MsgCode=197) from UCM. Slot:7168 SourceIndex:18

Command:ADD_CIB Slot:0 .

[BTRACE][2020/06/29 15:07:02][7168][TM][84c9-b272-47e0]:

[TM DBG]Proc EventCall.Index:3

[BTRACE][2020/06/29 15:07:02][7168][TM][84c9-b272-47e0]:

[TM DBG]Proc EventCall.(OpType=0)

(mac=84c9-b272-47e0, IPV6=00000000:00000000:00000000:00000000, IPV4=0xffffffff, Slot=0, ISPVlan=0)

(AuthVlan=0, AuthVlanType=3, PvcVlan=200, PvcVlanType=3, UsrGroup=65535, UclGroup=65535, IsPortBased=0, IfIndex=2466381824)

(PreAuthFlag=0,OldPreAuthFlag=0, AuthModifyBmp=0x4, ArpDeny=0,ucHttpFwdFlg=0)

(UserGroupPriority=255)

[BTRACE][2020/06/29 15:07:02][7168][TM][84c9-b272-47e0]:

[TM DBG]

(WlanFlag=1, RemoteUser=0, UCRemoteUser=0)

[BTRACE][2020/06/29 15:07:02][7168][TM][84c9-b272-47e0]:

[TM DBG]Proc EventCall.(ForwardInterface=0,ForwardPdtIndex=0, ISPVlan=0)

TM模块处理UCM模块的授权请求消息。

170

[BTRACE][2020/06/29 15:07:02][7168][TM][84c9-b272-47e0]:

TM send authorization para info to Ap: AclID = 65535,65535 UpRateLimitValue = -1 DownRateLimitValue = -1 Mac = 84c9-b272-47e0 Isolated = 0 InterIsolated = 0 VLAN = 200 UserGroup = 65535 UclGroup = 65535 Optype = 0 UserUpFlag = 1 PushFlag = 0 AccessType = 13 IsPortBased = 0 UserVlanType = 3 AuthenUserAddCIB = 1 IfIndex = -1828585472 IpAddr = 255.255.255.255 VrfIndex = 0 Cid = -1 PortalLayer3Flag = 0 AckIndex = 3 preauthfalg = 0 httpflag = 0 denyallflag = 0 UpFlowstatistics = 0 DownFlowstatistics = 0 Redirect AclId = 65535, RedirectURL = , IPSecFlag = 255, ArpDeny = 0,fwdflg=0

TM模块向AP发送授权消息。

171

[BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WADP] Qos remark info new (In:255, out:255, in1p:255, out1p:255, inDscp:255, outDscp:255).Url len:0, send len:173

[BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7]User auth update elb table (ap:0, radio:0, wlan:4, vlan:200, ap fork:2048, old ap fork:4294967295)

[BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] UpDateStaAccessVlan Same Vlan Return

[BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Update sta user name skl

WLAN处理用户授权信息。

172

[BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7]

[WADP]Send User Authorization Info to Ap.

(ApID:0,InterIsolated:0,Isolated:0,ArpDeny:0,Optype:0,DownRateLimitValue:4294967295,UpRateLimitValue:4294967295

UserGroup:65535,VLAN:200,PortalPushFlag:0,HttpSendTol4:0,BeforeAuth_En:0,DenyAll:0,ServiceVlan:200

AclID:65535,65535,65535,65535,65535,65535,65535,65535,ReportIP:0,RetCode:0,IdleCutTime:0,IdleCutFlow:0,IdleCutSecond:0)

WLAN模块转发授权消息给AP。

通知打开端口权限。

下发ACL等授权。

173

[BTRACE][2020/06/29 15:07:02][2048][WLAN_AC][84c9-b272-47e0]:[Process:2][WSTA] Sta auth response deliver to sta process (Type:514822, prim:0, len:236, fork:7168, code:0)

[BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WADP] Send User Authorization Result to Esap(src TID:187, dst TID:204, src fork ID:7168, dst fork ID:7168, Command:0, Code:0, Id:3. [BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WADP] Receive Sending User Authorization Info from Ap Response(module:0, prim type:0, data type:2533, code:0, RetCode:0)

WLAN模块发送AP授权回应消息给TM模块。

174

[BTRACE][2020/06/29 15:07:02][7168][TM][84c9-b272-47e0]:TM send ack message to CM module, result: Add CIB OK

TM模块发送授权成功消息给UCM模块。

175

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM receive ESAP_SRV_MSG_CIB_SET_ACK from TM module (msg code: 198 CID:18).

UCM模块收到TM模块授权回应消息。

176

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:

In ADD USER recevie CM_EVENT_ADD_SUCCESS clear authorize modify bitmap.

UCM模块检查授权结束,清除下发授权的标记。

177

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Send Auth Ack](DownModule=0, NewAuthorizeType=6, AckModuleId=209, ExpResult=8, CMAAAAuth=0x2447ed14).

UCM模块向EAP模块发送认证成功消息。

178

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Start Reauth Timer](Cib AuthData AAASuccFlag=1, NacCib ReauthTimeLen=0).

UCM模块检查重认证设置(打印[CM NAC Start Reauth Timer].(TimeLen=xx)时说明开启重认证)。

179

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[AfterUp]CM login request, make start accounting request.(CID=18)

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM WLAN Get Ap Info. Ap Info is 84A9-C48D-3BA0.

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM fill data flow info.(TariffLevel=0)

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM send accounting request message to AAA module (CID:18).

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM make accounting request.(acctType = 1, CID=18)

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_ACCTDATA_S]Come in CMSetAcctWaitFlag.

UCM模块向AAA模块发送“开始计费”请求消息。

180

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:State from ADDUSER(substate:BUTT) to UP(substate:BUTT). (cib=18, event=ADD_OK)

UCM模块用户表状态切换:ADDUSER->UP。

181

[BTRACE][2020/06/29 15:07:02][7168][EAPoL][84c9-b272-47e0]:Receive authen ack message from UCM module.(Result=0,local index=6,MAC=84c9-b272-47e0,RadiusTemplateIndex=2,Reason=0)

[BTRACE][2020/06/29 15:07:02][7168][EAPoL][84c9-b272-47e0]:Receive authentication ack message from server.(result:AUTH_PASS)

EAP模块收到UCM模块发送的认证成功消息。

182

[BTRACE][2020/06/29 15:07:02][7168][EAPoL][84c9-b272-47e0]:Send EAP-Success packet to user. [BTRACE][2020/06/29 15:07:02][7168][EAPoL][84c9-b272-47e0]:Add a Eap Packet Node to EAPOL Ucib, MAC is 84c9-b272-47e0. [BTRACE][2020/06/29 15:07:02][7168][EAPoL][84c9-b272-47e0]:

EAPOL packet: OUT

84 c9 b2 72 47 e0 fc e3 3c 9e 6d 66 81 00 00 c8

88 8e 01 00 00 04 03 13 00 04

[BTRACE][2020/06/29 15:07:02][7168][EAPoL][84c9-b272-47e0]:

802.1x packet:

Version:802.1X-2001(1); Type:Eap(0); Length:4 EAPOL packet:

Code:Success(3); Id:19; Length:4; Type:Unknown(0) [BTRACE][2020/06/29 15:07:02][7168][EAPoL][84c9-b272-47e0]:Send EAP_success packet to user successfully.(Index=6)

EAP模块发送EAP success报文给用户。

183

[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]:

AAA receive AAA_SRV_MSG_ACCT_REQ message(32) from UCM module(232).

[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]:

DestIndex:18 SrcIndex:18 Slot:7168

AcctType:Start AcctMethod:RADIUS AcctSessionID:AC6605_00000000000200b19aa00200012 ucIfTwoLevelAcct:255 RTAcctInterval:65535 AuthedPlace:3 RdsGroup:2 TacTempletID:128 CopyRdsGroup:65535 UpBytes:[0,0] DnBytes:[0,0] UpPkts:[0,0] DnPkts:[0,0] AcctStartTime:1593443221 UTCAcctStartTime:4294967295 UTCAcctStopTime:4294967295 AcctStartSeconds:4294967295 AcctStopSeconds:4294967295 SessionLength:0 UserName:skl MAC:84c9-b272-47e0 Domain:69 AccessType:eap AuthenCode:1X IP:255.255.255.255 Priority:[0,0] Slot:0 SubSlot:0 Port:0 Interface:2466381824

AAA模块收到UCM模块“开始计费”消息。

184

[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]:

AAA send AAA_RD_MSG_ACCTSTARTREQ message(53) to RADIUS module(235).

[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]:

CID:23 TemplateNo:2 SerialNo:0

SrcMsg:AAA_RD_MSG_ACCTSTARTREQ

PriyServer:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF Vrf:4294967295

SendServer:172.168.10.7 Vrf:4294967295

CID:32786 AcctType:1 UserName:skl AcctSessionID:AC6605_00000000000200b19aa00200012 Interface:2466381824 SessionLength:0 TerminateCause:0 Authentic:1 UpBytes:[0,0] DnBytes:[0,0] UpPkts:0 DnPkts:0 FramedIP:4294967295 NASPortType:19 Phy:0/0/0 Vlan:200 Priority:0/0 Timestamp:1593443221 FramedProtocol:1 Domain: IPHostAddr:255.255.255.255 84:c9:b2:72:47:e0 UpCIR:0 UpPIR:0 DnCIR:0 DnPIR:0

AAA模块发送“开始计费”消息给RADIUS模块 ,AcctType:

1表示开始计费

2表示停止计费

3表示实时计费

185

[BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]:Receive accounting start request message from AAA module.

RADIUS模块收到AAA模块的“开始计费”消息。

186

[BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]:

Send a accounting request packet to radius server( server ip = 172.168.10.7).

[BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]:

Server Template: 2

Server IP : 172.168.10.7

Protocol: Standard

Code : 4

Len : 283

ID : 20

[User-Name ] [5 ] [skl]

[NAS-IP-Address ] [6 ] [172.168.10.77]

[NAS-Port ] [6 ] [200]

[NAS-Identifier ] [15] [AC]

[Acct-Status-Type ] [6 ] [1]

[Acct-Delay-Time ] [6 ] [0]

[Acct-Session-Id ] [36] [AC6605_00000000000200b19aa00200012]

[Acct-Authentic ] [6 ] [1]

[Event-Timestamp ] [6 ] [1593443221] [NAS-Port-Type ] [6 ] [19]

[Calling-Station-Id ] [16] [84c9-b272-47e0] [NAS-Port-Id ] [36] [slot=0;subslot=0;port=0;vlanid=200]

[Called-Station-Id ] [32]

[84-A9-C4-8D-3B-A0:dot1x_129.77]

[Framed-Protocol ] [6 ] [1]

[BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]: [Service-Type ] [6 ] [2]

[HW-IP-Host-Address ] [35] [255.255.255.255 84:c9:b2:72:47:e0]

[HW-Connect-ID ] [6 ] [32786]

[HW-AP-Information ] [16] [84A9-C48D-3BA0] [HW-Access-Type ] [6 ] [1]

RADIUS模块发送“开始计费”报文给服务器 ,Acct-Status-Type属性:

1表示开始计费

2表示停止计费

3表示实时计费

187

[BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSEC] Eap Inform STA online, the location of 4-way-handshake is in AP.

[BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSEC] Dot1x pmk to ap.

[BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSEC] 4-way-handshake success (Code:0, State:2). [BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WSTA] Process STA authentication done request(Auth Code:0, State:2, Assoc flag:0, Cache Flag:0, Ft Flag:0). [BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WADP] Receive EAP authentication Send PMK Message from EAPOL.

WLAN模块和用户协商密钥(实际在AP上完成),AC侧默认打印成功,AP侧协商失败会增加1条握手失败trace打印。

188

[BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]:

Received a accounting response packet from radius server(server ip = 172.168.10.7).

[BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]:

Server Template: 2

Server IP : 172.168.10.7

Server Port : 1813

Protocol: Standard

Code : 5

Len : 20

ID : 20

RADIUS模块收到计费响应报文。

189

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_ACCTDATA_S]Come in CMGetUserInfo.

RADIUS模块发送计费响应消息给AAA模块。

190

[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]:

AAA receive AAA_RD_MSG_ACCTSTART_ACK message(56) from RADIUS module(235).

[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]:

CID:23 TemplateNo:2 SerialNo:0

SrcMsg:AAA_RD_MSG_ACCTSTARTREQ

PriyServer::: Vrf:0

SendServer::: Vrf:0

SessionTimeout:0 RemanentVolume:0

AAA模块收到计费响应消息。

191

[BTRACE][2020/06/29 15:07:02][2048][WLAN_AC][84c9-b272-47e0]:[Process:2][WSTA] Flow fork SingleSta MsgType3044 Vcpu:7 Ret:0 Len:72.

WLAN模块在CPU之间复制消息。

192

[BTRACE][2020/06/29 15:07:02][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WADP] AP report user IP to UCM (IP:20.1.1.203, Version:4, Type:0, LearnType:1, LeaseTime:0, RetCode:0).

AP上报用户IP地址给UCM模块。

193

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:

CM_NAC_TransWlanUpdateIpMsg: Recieve update ip message from Wlan,CID = 18, OpeType = 0, IpVersion =0 ip v4=20.1.1.203, Ipv6=1401:1CB::.

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:

CM_NAC_TransWlanUpdateIpMsg: Recieve update ip message from Wlan,CID = 18, OpeType = 0, IpVersion =0 ip v4=20.1.1.203, Ipv6=1401:1CB::.

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:

CM NAC Update Ip Process (mac:84c9-b272-47e0 ip:20.1.1.203 ipv6::: vrf:0)

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:

CM SetCibUserIP: ucIsUpdateV6 = 0

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:

CM SetCibUserIP: Update ipv4 = 0x140101cb

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:

CM SetCibUserIP:add hash ip, ulNewIpv4Addr = 0x140101cb

[CM NAC Update Ip Process]: pstCib->ucUserType = 1

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Update Ip], new IP=0x140101cb new IPV6=:: vrf = 0

UCM模块更新用户IP地址。

194

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM WLAN Get Ap Info. Ap Info is 84A9-C48D-3BA0.

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM fill data flow info.(TariffLevel=0)

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM send accounting request message to AAA module (CID:18).

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM make accounting request.(acctType = 3, CID=18)

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_ACCTDATA_S]Come in CMSetAcctWaitFlag.

UCM模块发送“实时计费”消息给AAA模块(特别说明:本次计费由IP地址更新触发)。

195

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:

[CM Get MCIB Info] Cid:18, FixedCid:32786

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM_NAC_GetMCIBInfoFromNac:UserGroupID=65535,UclGroupID=65535,usAclID[65535,65535,65535,65535],v6AclID[65535,65535,65535,65535]

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:NotifyTM PreAuthFlag = 0, OldPreAuthFlag = 0,Cib AccessType = 13.

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:NotifyTM UserGroup = 65535, UclGroup = 65535, UserGroupPriority = 255.

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:RemarkDscp = 255 Remark8021p = 255 DnRemark8021p = 255 DnRemarkDscp = 255.

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:[CM NAC Get QosInfo From Nac] CM send QoS to TM. UserName=,Valid=0,Cir=0,Pir=0,FlowMappingProfileIndex=0,FlowQueueProfileIndex=0

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:CM_NAC_GetMCIBInfoFromNac ucUserGroupChanged = 0, HttpsToCpuFlag:0, Dot1xUrlFlag:0

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:

[CM Get MCIB Info]DetectVlanId=0, Cib GateWay=0xffffffff.

UCM模块发送授权消息给TM模块(特别说明:本次授权由IP地址更新触发)。

196

[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]:

AAA receive AAA_SRV_MSG_ACCT_REQ message(32) from UCM module(232).

AAA模块收到UCM模块计费请求消息。

197

[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]:

AAA send AAA_RD_MSG_ACCTRTREQ message(54) to RADIUS module(235).

CID:32786 AcctType:3 UserName:skl AcctSessionID:AC6605_00000000000200b19aa00200012 Interface:2466381824 SessionLength:0 TerminateCause:0 Authentic:1 UpBytes:[0,0] DnBytes:[0,0] UpPkts:0 DnPkts:0 FramedIP:335610315 NASPortType:19 Phy:0/0/0 Vlan:200 Priority:0/0 Timestamp:1593443221 FramedProtocol:1 Domain: IPHostAddr:20.1.1.203 84:c9:b2:72:47:e0 UpCIR:0 UpPIR:0 DnCIR:0 DnPIR:0

AAA模块发送“实时计费”消息给RADIUS模块。

198

[BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]:

Receive accounting realtime request message from AAA module.

RADIUS模块收到AAA模块“实时计费”消息。

199

[BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]:

Send a accounting request packet to radius server( server ip = 172.168.10.7).

RADIUS模块发送计费报文给RADIUS服务器。

200

[BTRACE][2020/06/29 15:07:02][7168][CM][84c9-b272-47e0]:

[Cib is optimized for struct CM_ACCTDATA_S]Come in CMGetUserInfo.

[BTRACE][2020/06/29 15:07:02][7168][RADIUS][84c9-b272-47e0]:

Send accounting realtime response message to AAA.

RADIUS模块发送计费响应消息给AAA模块。

201

[BTRACE][2020/06/29 15:07:02][7168][AAA][84c9-b272-47e0]:

AAA receive AAA_RD_MSG_ACCTRT_ACK message(57) from RADIUS module(235).

SessionTimeout:0 RemanentVolume:0

AAA模块收到RADIUS模块计费响应报文。

202

[BTRACE][2020/06/29 15:07:20][7168][WLAN_AC][84c9-b272-47e0]:[Process:7][WADP] AP report user IP to UCM same return (IP:20.1.1.203, Version:4, LearnType:1, LeaseTime:0).

AP上报用户IP地址给UCM模块,和UCM模块已记录的IP地址相同,UCM模块不再重复更新IP地址。

Ca recorder服务器维护,故障处理:802.1X认证失败相关推荐

  1. 如何修复win无线服务器,win10 无线802 1X认证故障处理 以 升级后网络故障常规解决方法...

    本帖最后由 郭友友 于 2016-7-5 14:05 编辑 [问题现象]当升级Windows10 后无法连接到的 WPA-2 企业网络(尤其是校园网),即使用证书进行服务器端或相互身份的验证 (EAP ...

  2. 802.1x认证失败配置(guest vlan)

    ##华三 guest vlan 配置 # interface GigabitEthernet1/0/2port access vlan 10dot1xundo dot1x handshakedot1x ...

  3. AD域帐户密码过期,终端802.1x认证自动重连导致AD账号被锁,员工无法上网、办公怎么办?

    搭建了微软 Active Directory(AD)或 OpenLDAP 的企业,通常会让员工使用 AD 域账号或OpenLDAP 账号密码登录电脑终端.OA.VPN.VDI或进行网络接入 802.1 ...

  4. 无线802.1x认证服务器,TP-Link无线路由器+Radius认证服务器实现无线终端802.1X认证...

    本文档详细介绍了如何在windows 2008上安装CA.NPS并配置NPS为radius服务器,实现无线客户端基于802.1X认证的步骤,其中还介绍了家用无线路由器Radius相关一些配置方法. 实 ...

  5. 锐捷服务器无线认证配置,【WLAN从入门到精通之对接案例】配置802.1X认证示例_Web(锐捷SAM服务器)...

    原标题:[WLAN从入门到精通之对接案例]配置802.1X认证示例_Web(锐捷SAM服务器) 802.1X认证简介 802.1X认证是网络接入控制方案(NAC)中的一种,它是基于端口对用户的网络访问 ...

  6. 无线AP配服务器,胖AP结合远程radius服务器做802.1X认证的典型配置

    (1)胖AP配置 #和三层交换机互联地址 interface Vlan-interface1 ip address 192.168.0.50 255.255.255.0 #缺省路由,下一跳指向三层交换 ...

  7. Windows Server 2008 R2Cisco2960 配置Radius服务 实现802.1x认证 实战

    实战配置Windows Server 2008 R2 Radius服务 与Cisco 2960 实现 802.1x认证 实验拓扑 1.Radius服务器 安装 dc  域名 wjl.com ,和ca  ...

  8. server2012 AD域 radius 802.1x认证

    server2012 AD域 radius 802.1x认证 原创泠泠七弦2020-11-25 17:40:06 保姆级教程:WINserver2012 AD域 radius 802.1x认证. 觉得 ...

  9. linux需要wifi网络认证,无线802.1x认证简介及配置方法

    无线802.1x认证简介及配置方法 简介: 华东理工大学无线网络ECUST.1x(以ECUST.1x为例,ECUST-dorm.1x相同)采用802.1x接入方式,这是一种安全且方便的接入方式.第一次 ...

最新文章

  1. MyEclipse中运行环境jre、编译级别、tomcat运行环境区别
  2. 了解你所不知道的SMON功能(一):清理临时段
  3. FireFox与IE兼容性汇编
  4. windows聚焦壁纸不更新_技术编辑示范win10系统锁屏壁纸聚焦不更新的处理教程
  5. 重新认识访问者模式:从实践到本质
  6. JavaScript-jQuery事件
  7. ServiceMash服务网格--理解lstio/envoy
  8. OPPO Reno6系列新机获3C认证:支持5G 标配65W快充
  9. Improved Word Representation Learning with Sememes
  10. python 爬网站 实例_python爬虫实战:之爬取京东商城实例教程!(含源代码)
  11. 实验五:编写、调试具有多个段的程序
  12. Redis系列(二)-Hredis客户端设计及开源
  13. Android 分区布局详解
  14. 电力拖动自动控制系统_专插本专业全面分析:电子工程及其自动化
  15. html批量处理图片尺寸,如何批量修改图片尺寸
  16. 携程的旅游知识图谱构建和应用
  17. python爬虫之批量下载小说
  18. MATLAB学习(一)——————format 命令
  19. html 中长单词换行问题
  20. Python深度学习笔记04——tensorflow实现神经网络(壹)

热门文章

  1. 数据结构与算法(四)图形结构篇
  2. Mysql数据库,巧妙使用IFNULL()函数,累计求和.
  3. android 12.0 第三方输入法app设置系统默认输入法
  4. python 点击屏幕
  5. 钗头凤·红酥手·世情薄
  6. ant design图片hover蒙层
  7. Python爬虫拓展应用:最新版本问卷星自动刷,包括解决智能验证、滑块等问题
  8. excel实用技巧:如何将收藏内容制成二维码以便管理
  9. 分享一个免费的听书、说书(文字转语音)、读书的好工具
  10. 对于学习知识的一点心得体会