• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
  • 漏洞说明
  • 全部
  • 全部
  • 大数据引擎
  • 知了引擎
产品线
搜索
取消
案例类型
发布者
是否解决
是否官方
时间
搜索引擎
匹配模式
高级搜索

aaa服务器上通过radius的123号属性直接下发到bras的ipv6的pd

2025-03-06提问
  • 0关注
  • 0收藏,217浏览
粉丝:0人 关注:0人

问题描述:

aaa服务器上通过radius的123号属性直接下发到bras的ipv6的pd前缀属性,失败

interface Virtual-Template1 

 ppp authentication-mode pap chap domain default enable xxxxx

 ppp account-statistics enable

 ppp nd-prefix-route enable

 ipv6 dhcp select server

 ipv6 dhcp client-detect

 ipv6 dhcp relay client-information record

 ipv6 dhcp relay release-agent

 ipv6 dhcp relay client-link-address enable

 ipv6 nd ra prefix default 2592000 604800

 ipv6 address auto link-local

 ipv6 nd autoconfig other-flag

 undo ipv6 nd ra halt

 ipv6 nd ra no-advlinkmtu

 ipv6 nd unsolicited-na-learning enable

#

domain name xxxx

 authorization-attribute user-group xxxx-1

 authorization-attribute ip-pool-group xxxx-group

 authorization-attribute ipv6-nd-prefix-pool pppoe-pd-xx

 authorization-attribute primary-dns ipv6 2408:8001:7000::

 authorization-attribute user-priority inbound 0

 authorization-attribute user-priority outbound 0

 authentication ppp radius-scheme abc

 authorization ppp radius-scheme abc

 accounting ppp broadcast radius-scheme abc radius-scheme ccc

 accounting dual-stack separate

 accounting start-delay 2

 redirect active-time 120

#

radius scheme abc

 primary authentication 12.12.12.12

 primary accounting  12.12.12.12

 key authentication cipher $c$3$6o3Wb2prL2qu0SIkezQata6OeTs0WBn7LPY=

 key accounting cipher $c$3$F1gNzmiKWhDe7ZCzpSTA26z/cznWuW/wen8=

 retry realtime-accounting 10

 timer response-timeout 10

 user-name-format without-domain

 nas-ip 119.6.1.121

 attribute translate

 attribute vendor-id 2011 version 1.1

#

#

interface Route-Aggregation13.1

 description PPPOE

 user-vlan dot1q vid 121 second-dot1q 101 to 164

 ipv6 address auto link-local

 ipv6 nd autoconfig managed-address-flag

 ipv6 nd autoconfig other-flag

 undo ipv6 nd ra halt

 pppoe-server bind virtual-template 1

 pppoe-server access-line-id trust

 pppoe-server access-line-id bas-info

 pppoe-server access-line-id circuit-id parse-mode cn-telecom

 pppoe-server nas-port-id interface route-aggregation 13

 aaa nas-ip 119.6.1.121

组网及组网描述:

debug和现实已经收到 123属性

Mar  5 15:44:02:304 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

    Service-Type=Framed-User

    Framed-Protocol=PPP

    Session-Timeout=432000

    Acct-Interim-Interval=14400

    Framed-IP-Address=101.204.171.297

    Framed-IP-Netmask=255.255.255.255

    Delegated-IPv6-Prefix=2408:8266:3FF:7::/64

    H3c-Input-Average-Rate=655360000

    H3c-Input-Peak-Rate=655360000

    H3c-Output-Average-Rate=2621440000

    H3c-Output-Peak-Rate=2621440000

    Hw-Domain-Name="swgzx"

*Mar  5 15:44:02:304 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

 02 04 00 81 2b 33 8a 0b 0f 35 81 15 15 c5 03 e2 

 d7 2a 2d 22 06 06 00 00 00 02 07 06 00 00 00 01 

 1b 06 00 06 97 80 55 06 00 00 38 40 08 06 65 cc 

 47 c5 09 06 ff ff ff ff 7b 0c 00 40 24 08 82 66 

 03 ff 00 07 1a 0c 00 00 63 a2 02 06 27 10 00 00 

 1a 0c 00 00 63 a2 01 06 27 10 00 00 1a 0c 00 00 

 63 a2 05 06 9c 40 00 00 1a 0c 00 00 63 a2 04 06 

 9c 40 00 00 1a 0d 00 00 07 db 8a 07 73 77 67 7a 

 78 

*Mar  5 15:44:02:304 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6; 

Sent reply message successfully.

*Mar  5 15:44:02:304 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6; 

PAM_RADIUS: Processing RADIUS authentication.

*Mar  5 15:44:02:304 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6; 

PAM_RADIUS: Fetched authentication reply-data successfully, resultCode: 0

*Mar  5 15:44:02:305 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6; 

PAM_RADIUS: Processing RADIUS authorization.

*Mar  5 15:44:02:305 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6; 

PAM_RADIUS: RADIUS Authorization successfully.

*Mar  5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_PAP_EVENT: -MDC=1-Slot=6; 

  PPP Event: 

      BAS44(1935400026df) PAP Receive AAA Result Event 

      State WaitAAA 

*Mar  5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_PAP_PKT: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Output PAP(c023) Packet, PktLen 36 

      State WaitAAA, code Ack(02), id 1, Len 32 

      Msg  Len: 27  Msg :Welcome to use this device.

*Mar  5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_PAP_STATE: -MDC=1-Slot=6; 

  PPP State Change: 

      BAS44(1935400026df) PAP: WaitAAA --> ServerSuccess 

*Mar  5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6; 

  PPP Event: 

      BAS44(1935400026df) IPCP Open Event 

      State initial 

*Mar  5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6; 

  PPP State Change: 

      BAS44(1935400026df) IPCP: initial --> starting 

*Mar  5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6; 

  PPP Event: 

      BAS44(1935400026df) IPCP Lower Up Event 

      State starting 

*Mar  5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6; 

  PPP State Change: 

      BAS44(1935400026df) IPCP: starting --> reqsent 

*Mar  5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Output IPCP(8021) Packet, PktLen 14 

      Current State reqsent, code ConfReq(01), id 0, len 10 

      IP Address(3), len 6, val 65 cc 47 c1 

*Mar  5 15:44:02:311 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6; 

  PPP Event: 

      BAS44(1935400026df) IPv6CP Open Event 

      State initial 

*Mar  5 15:44:02:311 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6; 

  PPP State Change: 

      BAS44(1935400026df) IPv6CP: initial --> starting 

*Mar  5 15:44:02:311 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6; 

  PPP Event: 

      BAS44(1935400026df) IPv6CP Lower Up Event 

      State starting 

*Mar  5 15:44:02:311 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6; 

  PPP State Change: 

      BAS44(1935400026df) IPv6CP: starting --> reqsent 

*Mar  5 15:44:02:311 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Output IPv6CP(8057) Packet, PktLen 18 

      Current State reqsent, code ConfReq(01), id 0, len 14 

      IPv6CP InterfaceID(1), len a, val 90 e7 10 61 68 00 00 00 

*Mar  5 15:44:02:312 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Input IPCP(8021) Packet, PktLen 26 

      Current State reqsent, code ConfReq(01), id 1, len 22 

      IP Address(3), len 6, val 00 00 00 00 

      Primary DNS Server Address(81), len 6, val 00 00 00 00 

      Secondary DNS Server Address(83), len 6, val 00 00 00 00 

*Mar  5 15:44:02:312 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6; 

  PPP Event: 

      BAS44(1935400026df) IPCP RCR-(Receive Config Bad Request) Event 

      State reqsent 

*Mar  5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Output IPCP(8021) Packet, PktLen 20 

      Current State reqsent, code ConfRej(04), id 1, len 16 

      Primary DNS Server Address(81), len 6, val 00 00 00 00 

      Secondary DNS Server Address(83), len 6, val 00 00 00 00 

*Mar  5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Input IPv6CP(8057) Packet, PktLen 18 

      Current State reqsent, code ConfReq(01), id 1, len 14 

      IPv6CP InterfaceID(1), len a, val ee cf 70 ff fe aa 07 82 

*Mar  5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Input IPCP(8021) Packet, PktLen 14 

      Current State reqsent, code ConfAck(02), id 0, len 10 

      IP Address(3), len 6, val 65 cc 47 c1 

*Mar  5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6; 

  PPP Event: 

      BAS44(1935400026df) IPCP RCA(Receive Config Ack) Event 

      State reqsent 

*Mar  5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6; 

  PPP State Change: 

      BAS44(1935400026df) IPCP: reqsent --> ackrcvd 

*Mar  5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Input IPv6CP(8057) Packet, PktLen 18 

      Current State reqsent, code ConfAck(02), id 0, len 14 

      IPv6CP InterfaceID(1), len a, val 90 e7 10 61 68 00 00 00 

*Mar  5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6; 

  PPP Event: 

      BAS44(1935400026df) IPv6CP RCA(Receive Config Ack) Event 

      State reqsent 

*Mar  5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6; 

  PPP State Change: 

      BAS44(1935400026df) IPv6CP: reqsent --> ackrcvd 

*Mar  5 15:44:02:314 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6; 

  PPP Event: 

      BAS44(1935400026df) IPv6CP RCR+(Receive Config Good Request) Event 

      State ackrcvd 

*Mar  5 15:44:02:314 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Output IPv6CP(8057) Packet, PktLen 18 

      Current State ackrcvd, code ConfAck(02), id 1, len 14 

      IPv6CP InterfaceID(1), len a, val ee cf 70 ff fe aa 07 82 

*Mar  5 15:44:02:314 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6; 

  PPP State Change: 

      BAS44(1935400026df) IPv6CP: ackrcvd --> opened 

*Mar  5 15:44:02:316 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Input IPCP(8021) Packet, PktLen 14 

      Current State ackrcvd, code ConfReq(01), id 2, len 10 

      IP Address(3), len 6, val 00 00 00 00 

*Mar  5 15:44:02:316 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6; 

  PPP Event: 

      BAS44(1935400026df) IPCP RCR-(Receive Config Bad Request) Event 

      State ackrcvd 

*Mar  5 15:44:02:316 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Output IPCP(8021) Packet, PktLen 14 

      Current State ackrcvd, code ConfNak(03), id 2, len 10 

      IP Address(3), len 6, val 65 cc 47 c5 

*Mar  5 15:44:02:318 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Input IPCP(8021) Packet, PktLen 14 

      Current State ackrcvd, code ConfReq(01), id 3, len 10 

      IP Address(3), len 6, val 65 cc 47 c5 

*Mar  5 15:44:02:318 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6; 

  PPP Event: 

      BAS44(1935400026df) IPCP RCR+(Receive Config Good Request) Event 

      State ackrcvd 

*Mar  5 15:44:02:318 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Output IPCP(8021) Packet, PktLen 14 

      Current State ackrcvd, code ConfAck(02), id 3, len 10 

      IP Address(3), len 6, val 65 cc 47 c5 

*Mar  5 15:44:02:319 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6; 

  PPP State Change: 

      BAS44(1935400026df) IPCP: ackrcvd --> opened 

*Mar  5 15:44:03:640 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Response timed out.

*Mar  5 15:44:03:640 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Found request context, dstIP: 221.10.94.5; dstPort: 1813; VPN instance: --(public); socketfd: 124; pktID:33.

*Mar  5 15:44:03:641 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Reached the maximum retries.

*Mar  5 15:44:03:641 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6; 

Got next server failed.

*Mar  5 15:44:03:641 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Sent reply error message to PAM.

*Mar  5 15:44:04:387 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6; 

PAM_RADIUS: RADIUS accounting started.

*Mar  5 15:44:04:387 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6; 

PAM_RADIUS: Sent accounting-start request successfully.

*Mar  5 15:44:04:390 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Got request data successfully, primitive: accounting-start.

*Mar  5 15:44:04:390 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Getting RADIUS server info.

*Mar  5 15:44:04:390 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Got RADIUS server info successfully.

*Mar  5 15:44:04:390 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Created request context successfully.

*Mar  5 15:44:04:390 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Created request packet successfully, dstIP: 116.169.61.143, dstPort: 1813, VPN instance: --(public), socketFd: 158, pktID: 15.

*Mar  5 15:44:04:390 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Added packet socketfd to epoll successfully, socketFd: 158.

*Mar  5 15:44:04:391 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Mapped PAM item to RADIUS attribute successfully.

*Mar  5 15:44:04:391 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6; 

Got RADIUS username format successfully, format: 2.

*Mar  5 15:44:04:391 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6; 

Added attribute user-name successfully, user-name: test12.

*Mar  5 15:44:04:391 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Filled RADIUS attributes in packet successfully.

*Mar  5 15:44:04:391 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Composed request packet successfully.

*Mar  5 15:44:04:391 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Created response timeout timer successfully.

*Mar  5 15:44:04:391 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Sent request packet successfully.

1 个回答
粉丝:0人 关注:0人

*Mar  5 15:44:03:641 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Reached the maximum retries.

*Mar  5 15:44:03:641 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6; 

Got next server failed.

暂无评论

编辑答案

你正在编辑答案

如果你要对问题或其他回答进行点评或询问,请使用评论功能。


分享扩散:

提出建议

    +

亲~登录后才可以操作哦!

确定

亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册

注册后可访问此模块

跳转hclhub

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作

举报

×

侵犯我的权益 >
对根叔社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 pub.zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明