aaa服务器上通过radius的123号属性直接下发到bras的ipv6的pd前缀属性,失败
interface Virtual-Template1
ppp authentication-mode pap chap domain default enable xxxxx
ppp account-statistics enable
ppp nd-prefix-route enable
ipv6 dhcp select server
ipv6 dhcp client-detect
ipv6 dhcp relay client-information record
ipv6 dhcp relay release-agent
ipv6 dhcp relay client-link-address enable
ipv6 nd ra prefix default 2592000 604800
ipv6 address auto link-local
ipv6 nd autoconfig other-flag
undo ipv6 nd ra halt
ipv6 nd ra no-advlinkmtu
ipv6 nd unsolicited-na-learning enable
#
domain name xxxx
authorization-attribute user-group xxxx-1
authorization-attribute ip-pool-group xxxx-group
authorization-attribute ipv6-nd-prefix-pool pppoe-pd-xx
authorization-attribute primary-dns ipv6 2408:8001:7000::
authorization-attribute user-priority inbound 0
authorization-attribute user-priority outbound 0
authentication ppp radius-scheme abc
authorization ppp radius-scheme abc
accounting ppp broadcast radius-scheme abc radius-scheme ccc
accounting dual-stack separate
accounting start-delay 2
redirect active-time 120
#
radius scheme abc
primary authentication 12.12.12.12
primary accounting 12.12.12.12
key authentication cipher $c$3$6o3Wb2prL2qu0SIkezQata6OeTs0WBn7LPY=
key accounting cipher $c$3$F1gNzmiKWhDe7ZCzpSTA26z/cznWuW/wen8=
retry realtime-accounting 10
timer response-timeout 10
user-name-format without-domain
nas-ip 119.6.1.121
attribute translate
attribute vendor-id 2011 version 1.1
#
#
interface Route-Aggregation13.1
description PPPOE
user-vlan dot1q vid 121 second-dot1q 101 to 164
ipv6 address auto link-local
ipv6 nd autoconfig managed-address-flag
ipv6 nd autoconfig other-flag
undo ipv6 nd ra halt
pppoe-server bind virtual-template 1
pppoe-server access-line-id trust
pppoe-server access-line-id bas-info
pppoe-server access-line-id circuit-id parse-mode cn-telecom
pppoe-server nas-port-id interface route-aggregation 13
aaa nas-ip 119.6.1.121
debug和现实已经收到 123属性
Mar 5 15:44:02:304 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6;
Service-Type=Framed-User
Framed-Protocol=PPP
Session-Timeout=432000
Acct-Interim-Interval=14400
Framed-IP-Address=101.204.171.297
Framed-IP-Netmask=255.255.255.255
Delegated-IPv6-Prefix=2408:8266:3FF:7::/64
H3c-Input-Average-Rate=655360000
H3c-Input-Peak-Rate=655360000
H3c-Output-Average-Rate=2621440000
H3c-Output-Peak-Rate=2621440000
Hw-Domain-Name="swgzx"
*Mar 5 15:44:02:304 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6;
02 04 00 81 2b 33 8a 0b 0f 35 81 15 15 c5 03 e2
d7 2a 2d 22 06 06 00 00 00 02 07 06 00 00 00 01
1b 06 00 06 97 80 55 06 00 00 38 40 08 06 65 cc
47 c5 09 06 ff ff ff ff 7b 0c 00 40 24 08 82 66
03 ff 00 07 1a 0c 00 00 63 a2 02 06 27 10 00 00
1a 0c 00 00 63 a2 01 06 27 10 00 00 1a 0c 00 00
63 a2 05 06 9c 40 00 00 1a 0c 00 00 63 a2 04 06
9c 40 00 00 1a 0d 00 00 07 db 8a 07 73 77 67 7a
78
*Mar 5 15:44:02:304 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6;
Sent reply message successfully.
*Mar 5 15:44:02:304 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6;
PAM_RADIUS: Processing RADIUS authentication.
*Mar 5 15:44:02:304 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6;
PAM_RADIUS: Fetched authentication reply-data successfully, resultCode: 0
*Mar 5 15:44:02:305 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6;
PAM_RADIUS: Processing RADIUS authorization.
*Mar 5 15:44:02:305 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6;
PAM_RADIUS: RADIUS Authorization successfully.
*Mar 5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_PAP_EVENT: -MDC=1-Slot=6;
PPP Event:
BAS44(1935400026df) PAP Receive AAA Result Event
State WaitAAA
*Mar 5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_PAP_PKT: -MDC=1-Slot=6;
PPP Packet:
BAS44(1935400026df) Output PAP(c023) Packet, PktLen 36
State WaitAAA, code Ack(02), id 1, Len 32
Msg Len: 27 Msg :Welcome to use this device.
*Mar 5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_PAP_STATE: -MDC=1-Slot=6;
PPP State Change:
BAS44(1935400026df) PAP: WaitAAA --> ServerSuccess
*Mar 5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6;
PPP Event:
BAS44(1935400026df) IPCP Open Event
State initial
*Mar 5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6;
PPP State Change:
BAS44(1935400026df) IPCP: initial --> starting
*Mar 5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6;
PPP Event:
BAS44(1935400026df) IPCP Lower Up Event
State starting
*Mar 5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6;
PPP State Change:
BAS44(1935400026df) IPCP: starting --> reqsent
*Mar 5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6;
PPP Packet:
BAS44(1935400026df) Output IPCP(8021) Packet, PktLen 14
Current State reqsent, code ConfReq(01), id 0, len 10
IP Address(3), len 6, val 65 cc 47 c1
*Mar 5 15:44:02:311 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6;
PPP Event:
BAS44(1935400026df) IPv6CP Open Event
State initial
*Mar 5 15:44:02:311 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6;
PPP State Change:
BAS44(1935400026df) IPv6CP: initial --> starting
*Mar 5 15:44:02:311 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6;
PPP Event:
BAS44(1935400026df) IPv6CP Lower Up Event
State starting
*Mar 5 15:44:02:311 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6;
PPP State Change:
BAS44(1935400026df) IPv6CP: starting --> reqsent
*Mar 5 15:44:02:311 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6;
PPP Packet:
BAS44(1935400026df) Output IPv6CP(8057) Packet, PktLen 18
Current State reqsent, code ConfReq(01), id 0, len 14
IPv6CP InterfaceID(1), len a, val 90 e7 10 61 68 00 00 00
*Mar 5 15:44:02:312 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6;
PPP Packet:
BAS44(1935400026df) Input IPCP(8021) Packet, PktLen 26
Current State reqsent, code ConfReq(01), id 1, len 22
IP Address(3), len 6, val 00 00 00 00
Primary DNS Server Address(81), len 6, val 00 00 00 00
Secondary DNS Server Address(83), len 6, val 00 00 00 00
*Mar 5 15:44:02:312 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6;
PPP Event:
BAS44(1935400026df) IPCP RCR-(Receive Config Bad Request) Event
State reqsent
*Mar 5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6;
PPP Packet:
BAS44(1935400026df) Output IPCP(8021) Packet, PktLen 20
Current State reqsent, code ConfRej(04), id 1, len 16
Primary DNS Server Address(81), len 6, val 00 00 00 00
Secondary DNS Server Address(83), len 6, val 00 00 00 00
*Mar 5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6;
PPP Packet:
BAS44(1935400026df) Input IPv6CP(8057) Packet, PktLen 18
Current State reqsent, code ConfReq(01), id 1, len 14
IPv6CP InterfaceID(1), len a, val ee cf 70 ff fe aa 07 82
*Mar 5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6;
PPP Packet:
BAS44(1935400026df) Input IPCP(8021) Packet, PktLen 14
Current State reqsent, code ConfAck(02), id 0, len 10
IP Address(3), len 6, val 65 cc 47 c1
*Mar 5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6;
PPP Event:
BAS44(1935400026df) IPCP RCA(Receive Config Ack) Event
State reqsent
*Mar 5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6;
PPP State Change:
BAS44(1935400026df) IPCP: reqsent --> ackrcvd
*Mar 5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6;
PPP Packet:
BAS44(1935400026df) Input IPv6CP(8057) Packet, PktLen 18
Current State reqsent, code ConfAck(02), id 0, len 14
IPv6CP InterfaceID(1), len a, val 90 e7 10 61 68 00 00 00
*Mar 5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6;
PPP Event:
BAS44(1935400026df) IPv6CP RCA(Receive Config Ack) Event
State reqsent
*Mar 5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6;
PPP State Change:
BAS44(1935400026df) IPv6CP: reqsent --> ackrcvd
*Mar 5 15:44:02:314 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6;
PPP Event:
BAS44(1935400026df) IPv6CP RCR+(Receive Config Good Request) Event
State ackrcvd
*Mar 5 15:44:02:314 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6;
PPP Packet:
BAS44(1935400026df) Output IPv6CP(8057) Packet, PktLen 18
Current State ackrcvd, code ConfAck(02), id 1, len 14
IPv6CP InterfaceID(1), len a, val ee cf 70 ff fe aa 07 82
*Mar 5 15:44:02:314 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6;
PPP State Change:
BAS44(1935400026df) IPv6CP: ackrcvd --> opened
*Mar 5 15:44:02:316 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6;
PPP Packet:
BAS44(1935400026df) Input IPCP(8021) Packet, PktLen 14
Current State ackrcvd, code ConfReq(01), id 2, len 10
IP Address(3), len 6, val 00 00 00 00
*Mar 5 15:44:02:316 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6;
PPP Event:
BAS44(1935400026df) IPCP RCR-(Receive Config Bad Request) Event
State ackrcvd
*Mar 5 15:44:02:316 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6;
PPP Packet:
BAS44(1935400026df) Output IPCP(8021) Packet, PktLen 14
Current State ackrcvd, code ConfNak(03), id 2, len 10
IP Address(3), len 6, val 65 cc 47 c5
*Mar 5 15:44:02:318 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6;
PPP Packet:
BAS44(1935400026df) Input IPCP(8021) Packet, PktLen 14
Current State ackrcvd, code ConfReq(01), id 3, len 10
IP Address(3), len 6, val 65 cc 47 c5
*Mar 5 15:44:02:318 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6;
PPP Event:
BAS44(1935400026df) IPCP RCR+(Receive Config Good Request) Event
State ackrcvd
*Mar 5 15:44:02:318 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6;
PPP Packet:
BAS44(1935400026df) Output IPCP(8021) Packet, PktLen 14
Current State ackrcvd, code ConfAck(02), id 3, len 10
IP Address(3), len 6, val 65 cc 47 c5
*Mar 5 15:44:02:319 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6;
PPP State Change:
BAS44(1935400026df) IPCP: ackrcvd --> opened
*Mar 5 15:44:03:640 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6;
Response timed out.
*Mar 5 15:44:03:640 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6;
Found request context, dstIP: 221.10.94.5; dstPort: 1813; VPN instance: --(public); socketfd: 124; pktID:33.
*Mar 5 15:44:03:641 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6;
Reached the maximum retries.
*Mar 5 15:44:03:641 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6;
Got next server failed.
*Mar 5 15:44:03:641 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6;
Sent reply error message to PAM.
*Mar 5 15:44:04:387 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6;
PAM_RADIUS: RADIUS accounting started.
*Mar 5 15:44:04:387 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6;
PAM_RADIUS: Sent accounting-start request successfully.
*Mar 5 15:44:04:390 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6;
Got request data successfully, primitive: accounting-start.
*Mar 5 15:44:04:390 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6;
Getting RADIUS server info.
*Mar 5 15:44:04:390 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6;
Got RADIUS server info successfully.
*Mar 5 15:44:04:390 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6;
Created request context successfully.
*Mar 5 15:44:04:390 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6;
Created request packet successfully, dstIP: 116.169.61.143, dstPort: 1813, VPN instance: --(public), socketFd: 158, pktID: 15.
*Mar 5 15:44:04:390 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6;
Added packet socketfd to epoll successfully, socketFd: 158.
*Mar 5 15:44:04:391 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6;
Mapped PAM item to RADIUS attribute successfully.
*Mar 5 15:44:04:391 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6;
Got RADIUS username format successfully, format: 2.
*Mar 5 15:44:04:391 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6;
Added attribute user-name successfully, user-name: test12.
*Mar 5 15:44:04:391 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6;
Filled RADIUS attributes in packet successfully.
*Mar 5 15:44:04:391 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6;
Composed request packet successfully.
*Mar 5 15:44:04:391 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6;
Created response timeout timer successfully.
*Mar 5 15:44:04:391 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6;
Sent request packet successfully.
(0)
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论