• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
  • 漏洞说明
  • 全部
  • 全部
  • 大数据引擎
  • 知了引擎
产品线
搜索
取消
案例类型
发布者
是否解决
是否官方
时间
搜索引擎
匹配模式
高级搜索

H3C WX3010H-L对接Cisco ISE 802.1X认证成功后终端无法接入

2019-04-10提问
  • 0关注
  • 1收藏,1074浏览
粉丝:0人 关注:0人

问题描述:

如题,WX3010H-L与Cisco ISE对接,后台及AC log 都提示认证成功及上线,但真是情况终端无法接入,测试终端类型安卓、ipad、windows,安卓提示密码错误(密码是正确的),ipad一直在转圈圈,重复认证,window提示无法接入。



radius debug信息及ise 认证结果见附件

最佳答案

粉丝:21人 关注:20人

附件里面没有debug信息,从日志上看有认证通过,这个得debug结合抓包看下具体报文交互过程。

radius 信息如下

zhiliao_4PnQH 发表时间:2019-04-10
回复zhiliao_4PnQH:

建议还是以附件形式上传,同时提供测试终端的mac地址,这样好分析

这周吃啥 发表时间:2019-04-10
1 个回答
zhiliao_4PnQH 知了小白
粉丝:0人 关注:0人

*Apr 10 13:40:16:976 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Processing RADIUS authentication. *Apr 10 13:40:16:976 2019 AC RADIUS/7/EVENT: Processing AAA request data. *Apr 10 13:40:16:977 2019 AC RADIUS/7/EVENT: Got request data successfully, primitive: authentication. *Apr 10 13:40:16:977 2019 AC RADIUS/7/EVENT: Getting RADIUS server info. *Apr 10 13:40:16:977 2019 AC RADIUS/7/EVENT: Got RADIUS server info successfully. *Apr 10 13:40:16:977 2019 AC RADIUS/7/EVENT: Created request context successfully. *Apr 10 13:40:16:977 2019 AC RADIUS/7/EVENT: Created request packet successfully, dstIP: 10.115.6.100, dstPort: 1812, VPN instance: --(public), socketFd: 152, pktID: 214. *Apr 10 13:40:16:977 2019 AC RADIUS/7/EVENT: Added packet socketfd to epoll successfully, socketFd: 152. *Apr 10 13:40:16:977 2019 AC RADIUS/7/EVENT: Mapped PAM item to RADIUS attribute successfully. *Apr 10 13:40:16:977 2019 AC RADIUS/7/EVENT: Got RADIUS username format successfully, format: 0. *Apr 10 13:40:16:978 2019 AC RADIUS/7/EVENT: Added attribute user-name successfully, user-name: zhangyang. *Apr 10 13:40:16:978 2019 AC RADIUS/7/EVENT: Filled RADIUS attributes in packet successfully. *Apr 10 13:40:16:978 2019 AC RADIUS/7/EVENT: Composed request packet successfully. *Apr 10 13:40:16:978 2019 AC RADIUS/7/EVENT: Created response timeout timer successfully. *Apr 10 13:40:16:978 2019 AC RADIUS/7/PACKET: User-Name="zhangyang" Service-Type=Framed-User Framed-Protocol=PPP NAS-Identifier="AC" NAS-Port=801 NAS-Port-Type=Wireless-802.11 NAS-Port- Calling-Station- Called-Station- Acct-Session- H3c-User-Vlan-Id=801 EAP-Message=0x0201000e017a68616e6779616e67 Message-Authenticator=0x00000000000000000000000000000000 Framed-MTU=1450 H3c-Ip-Host-Addr="0.0.0.0 78:67:d7:60:6f:55" NAS-IP-Address=10.115.10.254 H3c-Product- H3c-Nas-Startup-Timestamp=1544356380 *Apr 10 13:40:16:979 2019 AC RADIUS/7/EVENT: Sent request packet successfully. *Apr 10 13:40:16:980 2019 AC RADIUS/7/PACKET: 01 d6 01 17 91 1d a9 f2 6e 2f 80 ab 2c 6d 31 2f c6 36 b3 9b 01 0b 7a 68 61 6e 67 79 61 6e 67 06 06 00 00 00 02 07 06 00 00 00 01 20 04 41 43 05 06 00 00 03 21 3d 06 00 00 00 13 57 0d 56 4c 41 4e 49 44 3d 38 30 31 3b 1f 13 37 38 2d 36 37 2d 44 37 2d 36 30 2d 36 46 2d 35 35 1e 18 38 30 2d 46 36 2d 32 45 2d 44 44 2d 38 38 2d 36 30 3a 74 65 73 74 2c 28 30 30 30 30 30 30 30 34 32 30 31 39 30 34 31 30 30 35 34 30 31 36 30 30 30 30 30 31 35 66 30 38 31 30 30 31 33 34 1a 0c 00 00 63 a2 85 06 00 00 03 21 4f 10 02 01 00 0e 01 7a 68 61 6e 67 79 61 6e 67 50 12 0f 18 94 96 f5 7c 95 8a 4f 3c e6 79 f6 6f 61 66 0c 06 00 00 05 aa 1a 21 00 00 63 a2 3c 1b 30 2e 30 2e 30 2e 30 20 37 38 3a 36 37 3a 64 37 3a 36 30 3a 36 66 3a 35 35 *Apr 10 13:40:16:980 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Sent authentication request successfully. *Apr 10 13:40:16:980 2019 AC RADIUS/7/PACKET: 04 06 0a 73 0a fe 1a 15 00 00 63 a2 ff 0f 48 33 43 20 57 58 33 30 31 30 48 2d 4c 1a 0c 00 00 63 a2 3b 06 5c 0d 02 1c *Apr 10 13:40:16:981 2019 AC RADIUS/7/EVENT: Sent request packet and create request context successfully. *Apr 10 13:40:16:981 2019 AC RADIUS/7/EVENT: Added request context to global table successfully. *Apr 10 13:40:16:981 2019 AC RADIUS/7/EVENT: Processing AAA request data. *Apr 10 13:40:16:987 2019 AC RADIUS/7/EVENT: Reply SocketFd recieved EPOLLIN event. *Apr 10 13:40:16:987 2019 AC RADIUS/7/EVENT: Received reply packet succuessfully. *Apr 10 13:40:16:988 2019 AC RADIUS/7/EVENT: Found request context, dstIP: 10.115.6.100, dstPort: 1812, VPN instance: --(public), socketFd: 152, pktID: 214. *Apr 10 13:40:16:988 2019 AC RADIUS/7/EVENT: The reply packet is valid. *Apr 10 13:40:16:988 2019 AC RADIUS/7/EVENT: Decoded reply packet successfully. *Apr 10 13:40:16:989 2019 AC RADIUS/7/PACKET: State=0x363443504d53657373696f6e49443d30613733303636345f5659493455465657584f4558466d6a724c385742685a50387234356e79416878536b707a6d42575030633b333453657373696f6e49443d6973652d6d61737465722f3334333734393633372f3630303b EAP-Message=0x015800060d20 Message-Authenticator=0xcd099df3cad99c128825429f2f05e423 *Apr 10 13:40:16:990 2019 AC RADIUS/7/PACKET: 0b d6 00 98 6b 26 e3 c3 17 1a b6 c9 8c 3c 4e 0f 81 39 84 f7 18 6a 36 34 43 50 4d 53 65 73 73 69 6f 6e 49 44 3d 30 61 37 33 30 36 36 34 5f 56 59 49 34 55 46 56 57 58 4f 45 58 46 6d 6a 72 4c 38 57 42 68 5a 50 38 72 34 35 6e 79 41 68 78 53 6b 70 7a 6d 42 57 50 30 63 3b 33 34 53 65 73 73 69 6f 6e 49 44 3d 69 73 65 2d 6d 61 73 74 65 72 2f 33 34 33 37 34 39 36 33 37 2f 36 30 30 3b 4f 08 01 58 00 06 0d 20 50 12 cd 09 9d f3 ca d9 9c 12 88 25 42 9f 2f 05 e4 23 *Apr 10 13:40:16:990 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Processing RADIUS authentication. *Apr 10 13:40:16:990 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Fetched authentication reply-data successfully, resultCode: 2 *Apr 10 13:40:16:990 2019 AC RADIUS/7/EVENT: Sent reply message successfully. *Apr 10 13:40:17:010 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Processing RADIUS authentication. *Apr 10 13:40:17:011 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Sent authentication request successfully. *Apr 10 13:40:17:011 2019 AC RADIUS/7/EVENT: Processing AAA request data. *Apr 10 13:40:17:011 2019 AC RADIUS/7/EVENT: Got request data successfully, primitive: authentication. *Apr 10 13:40:17:011 2019 AC RADIUS/7/EVENT: Getting RADIUS server info. *Apr 10 13:40:17:011 2019 AC RADIUS/7/EVENT: Got RADIUS server info successfully. *Apr 10 13:40:17:011 2019 AC RADIUS/7/EVENT: Created request context successfully. *Apr 10 13:40:17:012 2019 AC RADIUS/7/EVENT: Created request packet successfully, dstIP: 10.115.6.100, dstPort: 1812, VPN instance: --(public), socketFd: 152, pktID: 215. *Apr 10 13:40:17:012 2019 AC RADIUS/7/EVENT: Added packet socketfd to epoll successfully, socketFd: 152. *Apr 10 13:40:17:012 2019 AC RADIUS/7/EVENT: Mapped PAM item to RADIUS attribute successfully. *Apr 10 13:40:17:012 2019 AC RADIUS/7/EVENT: Got RADIUS username format successfully, format: 0. *Apr 10 13:40:17:012 2019 AC RADIUS/7/EVENT: Added attribute user-name successfully, user-name: zhangyang. *Apr 10 13:40:17:013 2019 AC RADIUS/7/EVENT: Filled RADIUS attributes in packet successfully. *Apr 10 13:40:17:013 2019 AC RADIUS/7/EVENT: Composed request packet successfully. *Apr 10 13:40:17:013 2019 AC RADIUS/7/EVENT: Created response timeout timer successfully. *Apr 10 13:40:17:014 2019 AC RADIUS/7/PACKET: User-Name="zhangyang" Service-Type=Framed-User Framed-Protocol=PPP NAS-Identifier="AC" NAS-IP-Address=10.115.10.254 NAS-Port=801 NAS-Port-Type=Wireless-802.11 NAS-Port- Calling-Station- Called-Station- Acct-Session- H3c-User-Vlan-Id=801 EAP-Message=0x025800080319152b Message-Authenticator=0x00000000000000000000000000000000 Framed-MTU=1450 H3c-Ip-Host-Addr="0.0.0.0 78:67:d7:60:6f:55" State=0x363443504d53657373696f6e49443d30613733303636345f5659493455465657584f4558466d6a724c385742685a50387234356e79416878536b707a6d42575030633b333453657373696f6e49443d6973652d6d61737465722f3334333734393633372f3630303b *Apr 10 13:40:17:014 2019 AC RADIUS/7/PACKET: H3c-Product- H3c-Nas-Startup-Timestamp=1544356380 *Apr 10 13:40:17:014 2019 AC RADIUS/7/EVENT: Sent request packet successfully. *Apr 10 13:40:17:015 2019 AC RADIUS/7/PACKET: 01 d7 01 7b 83 03 cc bd 76 29 8b 0c 23 4d 4a de a7 ec 11 66 01 0b 7a 68 61 6e 67 79 61 6e 67 06 06 00 00 00 02 07 06 00 00 00 01 20 04 41 43 04 06 0a 73 0a fe 05 06 00 00 03 21 3d 06 00 00 00 13 57 0d 56 4c 41 4e 49 44 3d 38 30 31 3b 1f 13 37 38 2d 36 37 2d 44 37 2d 36 30 2d 36 46 2d 35 35 1e 18 38 30 2d 46 36 2d 32 45 2d 44 44 2d 38 38 2d 36 30 3a 74 65 73 74 2c 28 30 30 30 30 30 30 30 34 32 30 31 39 30 34 31 30 30 35 34 30 31 36 30 30 30 30 30 31 35 66 30 38 31 30 30 31 33 34 1a 0c 00 00 63 a2 85 06 00 00 03 21 4f 0a 02 58 00 08 03 19 15 2b 50 12 b3 69 99 17 a1 35 46 f4 f5 f4 f6 c7 d6 81 e1 a1 0c 06 00 00 05 aa 1a 21 00 00 63 a2 3c 1b 30 2e 30 2e 30 2e 30 20 37 38 3a 36 37 3a 64 37 3a 36 30 3a 36 66 3a 35 35 *Apr 10 13:40:17:016 2019 AC RADIUS/7/PACKET: 18 6a 36 34 43 50 4d 53 65 73 73 69 6f 6e 49 44 3d 30 61 37 33 30 36 36 34 5f 56 59 49 34 55 46 56 57 58 4f 45 58 46 6d 6a 72 4c 38 57 42 68 5a 50 38 72 34 35 6e 79 41 68 78 53 6b 70 7a 6d 42 57 50 30 63 3b 33 34 53 65 73 73 69 6f 6e 49 44 3d 69 73 65 2d 6d 61 73 74 65 72 2f 33 34 33 37 34 39 36 33 37 2f 36 30 30 3b 1a 15 00 00 63 a2 ff 0f 48 33 43 20 57 58 33 30 31 30 48 2d 4c 1a 0c 00 00 63 a2 3b 06 5c 0d 02 1c *Apr 10 13:40:17:016 2019 AC RADIUS/7/EVENT: Sent request packet and create request context successfully. *Apr 10 13:40:17:016 2019 AC RADIUS/7/EVENT: Added request context to global table successfully. *Apr 10 13:40:17:017 2019 AC RADIUS/7/EVENT: Processing AAA request data. *Apr 10 13:40:17:017 2019 AC RADIUS/7/EVENT: Reply SocketFd recieved EPOLLIN event. *Apr 10 13:40:17:017 2019 AC RADIUS/7/EVENT: Received reply packet succuessfully. *Apr 10 13:40:17:017 2019 AC RADIUS/7/EVENT: Found request context, dstIP: 10.115.6.100, dstPort: 1812, VPN instance: --(public), socketFd: 152, pktID: 215. *Apr 10 13:40:17:018 2019 AC RADIUS/7/EVENT: The reply packet is valid. *Apr 10 13:40:17:018 2019 AC RADIUS/7/EVENT: Decoded reply packet successfully. *Apr 10 13:40:17:019 2019 AC RADIUS/7/PACKET: State=0x363443504d53657373696f6e49443d30613733303636345f5659493455465657584f4558466d6a724c385742685a50387234356e79416878536b707a6d42575030633b333453657373696f6e49443d6973652d6d61737465722f3334333734393633372f3630303b EAP-Message=0x015900061921 Message-Authenticator=0x8d69a90a1b877d9db3e45a272163a383 *Apr 10 13:40:17:019 2019 AC RADIUS/7/PACKET: 0b d7 00 98 07 07 d5 c3 b6 ef bc 78 9f 24 9c 33 b5 ec d2 9c 18 6a 36 34 43 50 4d 53 65 73 73 69 6f 6e 49 44 3d 30 61 37 33 30 36 36 34 5f 56 59 49 34 55 46 56 57 58 4f 45 58 46 6d 6a 72 4c 38 57 42 68 5a 50 38 72 34 35 6e 79 41 68 78 53 6b 70 7a 6d 42 57 50 30 63 3b 33 34 53 65 73 73 69 6f 6e 49 44 3d 69 73 65 2d 6d 61 73 74 65 72 2f 33 34 33 37 34 39 36 33 37 2f 36 30 30 3b 4f 08 01 59 00 06 19 21 50 12 8d 69 a9 0a 1b 87 7d 9d b3 e4 5a 27 21 63 a3 83 *Apr 10 13:40:17:020 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Processing RADIUS authentication. *Apr 10 13:40:17:020 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Fetched authentication reply-data successfully, resultCode: 2 *Apr 10 13:40:17:020 2019 AC RADIUS/7/EVENT: Sent reply message successfully. *Apr 10 13:40:17:043 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Processing RADIUS authentication. *Apr 10 13:40:17:044 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Sent authentication request successfully. *Apr 10 13:40:17:044 2019 AC RADIUS/7/EVENT: Processing AAA request data. *Apr 10 13:40:17:045 2019 AC RADIUS/7/EVENT: Got request data successfully, primitive: authentication. *Apr 10 13:40:17:046 2019 AC RADIUS/7/EVENT: Getting RADIUS server info. *Apr 10 13:40:17:046 2019 AC RADIUS/7/EVENT: Got RADIUS server info successfully. *Apr 10 13:40:17:046 2019 AC RADIUS/7/EVENT: Created request context successfully. *Apr 10 13:40:17:046 2019 AC RADIUS/7/EVENT: Created request packet successfully, dstIP: 10.115.6.100, dstPort: 1812, VPN instance: --(public), socketFd: 152, pktID: 216. *Apr 10 13:40:17:046 2019 AC RADIUS/7/EVENT: Added packet socketfd to epoll successfully, socketFd: 152. *Apr 10 13:40:17:047 2019 AC RADIUS/7/EVENT: Mapped PAM item to RADIUS attribute successfully. *Apr 10 13:40:17:047 2019 AC RADIUS/7/EVENT: Got RADIUS username format successfully, format: 0. *Apr 10 13:40:17:048 2019 AC RADIUS/7/EVENT: Added attribute user-name successfully, user-name: zhangyang. *Apr 10 13:40:17:051 2019 AC RADIUS/7/EVENT: Filled RADIUS attributes in packet successfully. *Apr 10 13:40:17:056 2019 AC RADIUS/7/EVENT: Composed request packet successfully. *Apr 10 13:40:17:057 2019 AC RADIUS/7/EVENT: Created response timeout timer successfully. *Apr 10 13:40:17:059 2019 AC RADIUS/7/PACKET: User-Name="zhangyang" Service-Type=Framed-User Framed-Protocol=PPP NAS-Identifier="AC" NAS-IP-Address=10.115.10.254 NAS-Port=801 NAS-Port-Type=Wireless-802.11 NAS-Port- Calling-Station- Called-Station- Acct-Session- H3c-User-Vlan-Id=801 EAP-Message=0x025900a119810000009716030100920100008e03035cad79e9b777680f03dd0405330e8aa7053b3e6b51975d0aa5d897bbbf682f8d00002c00ffc02cc02bc024c023c00ac009c008c030c02fc028c027c014c013c012009d009c003d003c0035002f000a01000039000a00080006001700180019000b00020100000d00120010040102010501060104030203050306030005000501000000000012000000170000 *Apr 10 13:40:17:066 2019 AC RADIUS/7/PACKET: Message-Authenticator=0x00000000000000000000000000000000 Framed-MTU=1450 H3c-Ip-Host-Addr="0.0.0.0 78:67:d7:60:6f:55" State=0x363443504d53657373696f6e49443d30613733303636345f5659493455465657584f4558466d6a724c385742685a50387234356e79416878536b707a6d42575030633b333453657373696f6e49443d6973652d6d61737465722f3334333734393633372f3630303b H3c-Product- H3c-Nas-Startup-Timestamp=1544356380 *Apr 10 13:40:17:068 2019 AC RADIUS/7/EVENT: Sent request packet successfully. *Apr 10 13:40:17:069 2019 AC RADIUS/7/PACKET: 01 d8 02 14 f6 96 24 93 3d 5e 02 a5 85 e8 bb ae 73 17 37 b1 01 0b 7a 68 61 6e 67 79 61 6e 67 06 06 00 00 00 02 07 06 00 00 00 01 20 04 41 43 04 06 0a 73 0a fe 05 06 00 00 03 21 3d 06 00 00 00 13 57 0d 56 4c 41 4e 49 44 3d 38 30 31 3b 1f 13 37 38 2d 36 37 2d 44 37 2d 36 30 2d 36 46 2d 35 35 1e 18 38 30 2d 46 36 2d 32 45 2d 44 44 2d 38 38 2d 36 30 3a 74 65 73 74 2c 28 30 30 30 30 30 30 30 34 32 30 31 39 30 34 31 30 30 35 34 30 31 36 30 30 30 30 30 31 35 66 30 38 31 30 30 31 33 34 1a 0c 00 00 63 a2 85 06 00 00 03 21 4f a3 02 59 00 a1 19 81 00 00 00 97 16 03 01 00 92 01 00 00 8e 03 03 5c ad 79 e9 b7 77 68 0f 03 dd 04 05 33 0e 8a a7 05 3b 3e 6b 51 97 5d 0a a5 d8 97 bb bf 68 2f 8d 00 00 2c 00 ff c0 2c c0 2b c0 24 c0 *Apr 10 13:40:17:071 2019 AC RADIUS/7/PACKET: 23 c0 0a c0 09 c0 08 c0 30 c0 2f c0 28 c0 27 c0 14 c0 13 c0 12 00 9d 00 9c 00 3d 00 3c 00 35 00 2f 00 0a 01 00 00 39 00 0a 00 08 00 06 00 17 00 18 00 19 00 0b 00 02 01 00 00 0d 00 12 00 10 04 01 02 01 05 01 06 01 04 03 02 03 05 03 06 03 00 05 00 05 01 00 00 00 00 00 12 00 00 00 17 00 00 50 12 ef 2f 79 39 09 33 86 d8 01 82 ac 76 ab 20 fd fb 0c 06 00 00 05 aa 1a 21 00 00 63 a2 3c 1b 30 2e 30 2e 30 2e 30 20 37 38 3a 36 37 3a 64 37 3a 36 30 3a 36 66 3a 35 35 18 6a 36 34 43 50 4d 53 65 73 73 69 6f 6e 49 44 3d 30 61 37 33 30 36 36 34 5f 56 59 49 34 55 46 56 57 58 4f 45 58 46 6d 6a 72 4c 38 57 42 68 5a 50 38 72 34 35 6e 79 41 68 78 53 6b 70 7a 6d 42 57 50 30 63 3b 33 34 53 65 73 73 69 6f 6e 49 44 3d 69 73 65 2d 6d 61 *Apr 10 13:40:17:072 2019 AC RADIUS/7/PACKET: 73 74 65 72 2f 33 34 33 37 34 39 36 33 37 2f 36 30 30 3b 1a 15 00 00 63 a2 ff 0f 48 33 43 20 57 58 33 30 31 30 48 2d 4c 1a 0c 00 00 63 a2 3b 06 5c 0d 02 1c *Apr 10 13:40:17:073 2019 AC RADIUS/7/EVENT: Sent request packet and create request context successfully. *Apr 10 13:40:17:073 2019 AC RADIUS/7/EVENT: Added request context to global table successfully. *Apr 10 13:40:17:073 2019 AC RADIUS/7/EVENT: Processing AAA request data. *Apr 10 13:40:17:073 2019 AC RADIUS/7/EVENT: Reply SocketFd recieved EPOLLIN event. *Apr 10 13:40:17:074 2019 AC RADIUS/7/EVENT: Received reply packet succuessfully. *Apr 10 13:40:17:074 2019 AC RADIUS/7/EVENT: Found request context, dstIP: 10.115.6.100, dstPort: 1812, VPN instance: --(public), socketFd: 152, pktID: 216. *Apr 10 13:40:17:074 2019 AC RADIUS/7/EVENT: The reply packet is valid. *Apr 10 13:40:17:075 2019 AC RADIUS/7/EVENT: Decoded reply packet successfully. *Apr 10 13:40:17:080 2019 AC RADIUS/7/PACKET: State=0x363443504d53657373696f6e49443d30613733303636345f5659493455465657584f4558466d6a724c385742685a50387234356e79416878536b707a6d42575030633b333453657373696f6e49443d6973652d6d61737465722f3334333734393633372f3630303b EAP-Message=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 *Apr 10 13:40:17:083 2019 AC RADIUS/7/PACKET: EAP-Message=0x86f70d01010105000382010f003082010a0282010100bd9af407ff6d6c8be1b51d295e1cb4731194d6295c7b289eb5194358c55af8512d908c230d64aaa8765f6d2f046ee727289c9319859f835b18174a32257e90634b3a8c20e8cbf1d020af49a784f48aae2a0ccf3505bae809409c2d1c8996e81669d9a741a994978585277ca09b4661449b0623baecea4fa05229d46af1ec7545726bf7ca130e2f1601d74afe6250da4291e51aab36bdd3fb4a1476903ea155fc9650cdfc0ef8468598867ca12f1d1049e70f9b3035d453b73cb0f3e126eba46415324aca610401179a74d559dcdeefd7195612e18a287f8a81de42f1a4cfbeadec14ceef36738c *Apr 10 13:40:17:085 2019 AC RADIUS/7/PACKET: EAP-Message=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 *Apr 10 13:40:17:086 2019 AC RADIUS/7/PACKET: EAP-Message=0x2f22b5fabe2906a765d61be9bbdcdb8fe44dcd355b1acc433ff9eb3e5a0dd7c7799a1a1999e75c16001f014093c79089460475c8bed61c8c8000ee5742989543052a76586e9d1c8e22b2f5817ca74b55bcd472dc26536a0c9801caa4c7b46c00dadc169bf77a32796a427378cd85db0d476630dd9ce18bab611d7e6f6fb66a0bc8273b9a3f837f6a01fa6b94c0e8584c0348d4221bd74194a94898f972f77c5ed52873197916030300040e000000 Message-Authenticator=0x2ddf2987c52cffb360abee6cd065c459 *Apr 10 13:40:17:089 2019 AC RADIUS/7/PACKET: 0b d8 04 3d 6a 70 d2 b1 15 a6 9a 2b 77 e2 ee 43 60 80 d9 6b 18 6a 36 34 43 50 4d 53 65 73 73 69 6f 6e 49 44 3d 30 61 37 33 30 36 36 34 5f 56 59 49 34 55 46 56 57 58 4f 45 58 46 6d 6a 72 4c 38 57 42 68 5a 50 38 72 34 35 6e 79 41 68 78 53 6b 70 7a 6d 42 57 50 30 63 3b 33 34 53 65 73 73 69 6f 6e 49 44 3d 69 73 65 2d 6d 61 73 74 65 72 2f 33 34 33 37 34 39 36 33 37 2f 36 30 30 3b 4f ff 01 5a 03 a5 19 01 16 03 03 00 4a 02 00 00 46 03 03 28 93 21 bf 5c 09 62 32 bb e6 7e 2e 20 a1 1d 9d f1 72 88 ca cf 5b 16 d8 2b b6 62 06 12 66 d5 3b 20 0e df 36 fd e9 b2 78 77 bb 63 95 23 89 61 bb be 9b 0a 0f ec 09 53 59 c3 e3 87 1a ca 1d f8 36 a0 00 3d 00 16 03 03 03 42 0b 00 03 3e 00 03 3b 00 03 38 30 82 03 34 30 82 02 1c a0 03 02 01 *Apr 10 13:40:17:095 2019 AC RADIUS/7/PACKET: 02 02 10 5c a2 ec 5d 00 00 00 00 66 9b 23 f3 08 54 96 81 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 1e 31 1c 30 1a 06 03 55 04 03 13 13 69 73 65 2d 6d 61 73 74 65 72 2e 6a 6e 67 68 2e 63 6f 6d 30 1e 17 0d 31 39 30 34 30 32 30 35 30 30 31 33 5a 17 0d 32 30 30 34 30 31 30 35 30 30 31 33 5a 30 1e 31 1c 30 1a 06 03 55 04 03 13 13 69 73 65 2d 6d 61 73 74 65 72 2e 6a 6e 67 68 2e 63 6f 6d 30 82 01 22 30 0d 06 09 2a 86 48 4f ff 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 bd 9a f4 07 ff 6d 6c 8b e1 b5 1d 29 5e 1c b4 73 11 94 d6 29 5c 7b 28 9e b5 19 43 58 c5 5a f8 51 2d 90 8c 23 0d 64 aa a8 76 5f 6d 2f 04 6e e7 27 28 9c 93 19 85 9f 83 5b 18 17 4a 32 25 7e 90 63 4b 3a 8c 20 e8 cb f1 d0 20 af 49 *Apr 10 13:40:17:097 2019 AC RADIUS/7/PACKET: a7 84 f4 8a ae 2a 0c cf 35 05 ba e8 09 40 9c 2d 1c 89 96 e8 16 69 d9 a7 41 a9 94 97 85 85 27 7c a0 9b 46 61 44 9b 06 23 ba ec ea 4f a0 52 29 d4 6a f1 ec 75 45 72 6b f7 ca 13 0e 2f 16 01 d7 4a fe 62 50 da 42 91 e5 1a ab 36 bd d3 fb 4a 14 76 90 3e a1 55 fc 96 50 cd fc 0e f8 46 85 98 86 7c a1 2f 1d 10 49 e7 0f 9b 30 35 d4 53 b7 3c b0 f3 e1 26 eb a4 64 15 32 4a ca 61 04 01 17 9a 74 d5 59 dc de ef d7 19 56 12 e1 8a 28 7f 8a 81 de 42 f1 a4 cf be ad ec 14 ce ef 36 73 8c 4f ff 52 0d e0 e2 3d ec f0 9a 52 18 10 e6 64 2d a2 58 6c af 7b 5c 99 95 d0 ef 09 02 03 01 00 01 a3 6e 30 6c 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0b 06 03 55 1d 0f 04 04 03 02 02 ec 30 1d 06 03 55 1d 0e 04 16 04 14 47 c4 cd 43 84 d4 c2 d4 cb 55 *Apr 10 13:40:17:098 2019 AC RADIUS/7/PACKET: a2 1f 73 a2 f5 20 c5 5a 14 5f 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 11 06 09 60 86 48 01 86 f8 42 01 01 04 04 03 02 06 40 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 08 75 4e c3 a3 62 46 06 83 7d b1 bd 35 d4 12 23 67 ca 6b f1 66 d8 d8 50 0d 4a b8 c2 40 9a 5f 99 51 55 19 a3 8c 1b 55 a3 d3 89 cb a5 d5 59 ab 47 41 6e 86 41 95 cc a2 37 32 13 b8 3f bf 6a 61 97 ca ed 36 ab a8 3c 3f 11 56 b3 84 29 54 17 78 2c f1 c8 92 a0 54 1b 57 34 90 39 ba 4f b0 2f 22 b5 fa be 29 06 a7 65 d6 1b e9 bb dc db 8f e4 4d cd 35 5b 1a cc 43 3f f9 eb 3e 5a 0d d7 c7 79 9a 1a 19 99 e7 5c 16 00 1f 01 40 93 c7 90 89 46 04 75 c8 be d6 1c 8c 80 00 ee 57 42 98 95 43 05 2a 76 *Apr 10 13:40:17:099 2019 AC RADIUS/7/PACKET: 58 6e 9d 1c 8e 22 b2 f5 81 7c a7 4b 55 bc d4 72 dc 26 53 6a 0c 98 01 ca a4 c7 b4 6c 00 da dc 16 9b f7 7a 32 79 6a 42 73 78 cd 85 db 0d 47 66 30 dd 9c e1 8b ab 61 1d 7e 6f 6f b6 6a 0b c8 27 3b 9a 3f 83 7f 6a 01 fa 6b 94 c0 e8 58 4c 03 48 d4 22 1b d7 41 94 a9 48 98 f9 72 f7 7c 5e d5 28 73 19 79 16 03 03 00 04 0e 00 00 00 50 12 2d df 29 87 c5 2c ff b3 60 ab ee 6c d0 65 c4 59 *Apr 10 13:40:17:099 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Processing RADIUS authentication. *Apr 10 13:40:17:100 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Fetched authentication reply-data successfully, resultCode: 2 *Apr 10 13:40:17:100 2019 AC RADIUS/7/EVENT: Sent reply message successfully. *Apr 10 13:40:17:131 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Processing RADIUS authentication. *Apr 10 13:40:17:131 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Sent authentication request successfully. *Apr 10 13:40:17:132 2019 AC RADIUS/7/EVENT: Processing AAA request data. *Apr 10 13:40:17:132 2019 AC RADIUS/7/EVENT: Got request data successfully, primitive: authentication. *Apr 10 13:40:17:132 2019 AC RADIUS/7/EVENT: Getting RADIUS server info. *Apr 10 13:40:17:132 2019 AC RADIUS/7/EVENT: Got RADIUS server info successfully. *Apr 10 13:40:17:132 2019 AC RADIUS/7/EVENT: Created request context successfully. *Apr 10 13:40:17:132 2019 AC RADIUS/7/EVENT: Created request packet successfully, dstIP: 10.115.6.100, dstPort: 1812, VPN instance: --(public), socketFd: 152, pktID: 217. *Apr 10 13:40:17:132 2019 AC RADIUS/7/EVENT: Added packet socketfd to epoll successfully, socketFd: 152. *Apr 10 13:40:17:132 2019 AC RADIUS/7/EVENT: Mapped PAM item to RADIUS attribute successfully. *Apr 10 13:40:17:132 2019 AC RADIUS/7/EVENT: Got RADIUS username format successfully, format: 0. *Apr 10 13:40:17:132 2019 AC RADIUS/7/EVENT: Added attribute user-name successfully, user-name: zhangyang. *Apr 10 13:40:17:133 2019 AC RADIUS/7/EVENT: Filled RADIUS attributes in packet successfully. *Apr 10 13:40:17:133 2019 AC RADIUS/7/EVENT: Composed request packet successfully. *Apr 10 13:40:17:133 2019 AC RADIUS/7/EVENT: Created response timeout timer successfully. *Apr 10 13:40:17:134 2019 AC RADIUS/7/PACKET: User-Name="zhangyang" Service-Type=Framed-User Framed-Protocol=PPP NAS-Identifier="AC" NAS-IP-Address=10.115.10.254 NAS-Port=801 NAS-Port-Type=Wireless-802.11 NAS-Port- Calling-Station- Called-Station- Acct-Session- H3c-User-Vlan-Id=801 *Apr 10 13:40:17:135 2019 AC RADIUS/7/PACKET: EAP-Message=0x025a01701981000001661603030106100001020100a31b956fb825e7f0b9b61cf72de591df402acfa9d6e18436691b4af594ae0ac18a4eb4c5c84bccdb611996d3fda6dac33f16914e413d9b25664918e76cf7f6862db5dacc7e3a4e138193fbe0a8eca0e7590ef8082772732d41221eef5aa3a33a5993d0063aaac7b06e71bbcb91e21ae784033d5d2679262d691e03ec6552f6e3b41d6ad73d1e9341ff9e3bbe197b3c8a3d1badc4883b587beae6786726be5fc65f5ce03772e9f59857e9eb26bdd32aa9468b9e95e0c3b66da5ae0506471c35424516bf882e23b27eeb50fecb899c993dca849ac6550b7feaaeaf11b18cb9ff92a43c186efd1e3096 EAP-Message=0x88888fa1a708ddd0319799d91de8bf01bc57a3d29b54596f1403030001011603030050bd59a7713079b382e87c9737a8394f34f076b4f170baf8f2e33ded67b1b2142af607662edf60d07f22b7d58d9553899283af2b72a4572f2232e59658f11db4decc9e1786302d41bb4571aee498e037ce *Apr 10 13:40:17:135 2019 AC RADIUS/7/PACKET: Message-Authenticator=0x00000000000000000000000000000000 Framed-MTU=1450 H3c-Ip-Host-Addr="0.0.0.0 78:67:d7:60:6f:55" State=0x363443504d53657373696f6e49443d30613733303636345f5659493455465657584f4558466d6a724c385742685a50387234356e79416878536b707a6d42575030633b333453657373696f6e49443d6973652d6d61737465722f3334333734393633372f3630303b H3c-Product- H3c-Nas-Startup-Timestamp=1544356380 *Apr 10 13:40:17:136 2019 AC RADIUS/7/EVENT: Sent request packet successfully. *Apr 10 13:40:17:137 2019 AC RADIUS/7/PACKET: 01 d9 02 e5 84 e0 78 bd f0 9d 29 da 0f ae 34 d2 d1 b8 c9 3e 01 0b 7a 68 61 6e 67 79 61 6e 67 06 06 00 00 00 02 07 06 00 00 00 01 20 04 41 43 04 06 0a 73 0a fe 05 06 00 00 03 21 3d 06 00 00 00 13 57 0d 56 4c 41 4e 49 44 3d 38 30 31 3b 1f 13 37 38 2d 36 37 2d 44 37 2d 36 30 2d 36 46 2d 35 35 1e 18 38 30 2d 46 36 2d 32 45 2d 44 44 2d 38 38 2d 36 30 3a 74 65 73 74 2c 28 30 30 30 30 30 30 30 34 32 30 31 39 30 34 31 30 30 35 34 30 31 36 30 30 30 30 30 31 35 66 30 38 31 30 30 31 33 34 1a 0c 00 00 63 a2 85 06 00 00 03 21 4f ff 02 5a 01 70 19 81 00 00 01 66 16 03 03 01 06 10 00 01 02 01 00 a3 1b 95 6f b8 25 e7 f0 b9 b6 1c f7 2d e5 91 df 40 2a cf a9 d6 e1 84 36 69 1b 4a f5 94 ae 0a c1 8a 4e b4 c5 c8 4b cc db 61 19 96 d3 *Apr 10 13:40:17:138 2019 AC RADIUS/7/PACKET: fd a6 da c3 3f 16 91 4e 41 3d 9b 25 66 49 18 e7 6c f7 f6 86 2d b5 da cc 7e 3a 4e 13 81 93 fb e0 a8 ec a0 e7 59 0e f8 08 27 72 73 2d 41 22 1e ef 5a a3 a3 3a 59 93 d0 06 3a aa c7 b0 6e 71 bb cb 91 e2 1a e7 84 03 3d 5d 26 79 26 2d 69 1e 03 ec 65 52 f6 e3 b4 1d 6a d7 3d 1e 93 41 ff 9e 3b be 19 7b 3c 8a 3d 1b ad c4 88 3b 58 7b ea e6 78 67 26 be 5f c6 5f 5c e0 37 72 e9 f5 98 57 e9 eb 26 bd d3 2a a9 46 8b 9e 95 e0 c3 b6 6d a5 ae 05 06 47 1c 35 42 45 16 bf 88 2e 23 b2 7e eb 50 fe cb 89 9c 99 3d ca 84 9a c6 55 0b 7f ea ae af 11 b1 8c b9 ff 92 a4 3c 18 6e fd 1e 30 96 4f 75 88 88 8f a1 a7 08 dd d0 31 97 99 d9 1d e8 bf 01 bc 57 a3 d2 9b 54 59 6f 14 03 03 00 01 01 16 03 03 00 50 bd 59 a7 71 30 79 b3 82 e8 7c 97 37 a8 39 4f *Apr 10 13:40:17:139 2019 AC RADIUS/7/PACKET: 34 f0 76 b4 f1 70 ba f8 f2 e3 3d ed 67 b1 b2 14 2a f6 07 66 2e df 60 d0 7f 22 b7 d5 8d 95 53 89 92 83 af 2b 72 a4 57 2f 22 32 e5 96 58 f1 1d b4 de cc 9e 17 86 30 2d 41 bb 45 71 ae e4 98 e0 37 ce 50 12 27 ce a5 ec 36 c8 01 ba d4 2b 55 48 68 b9 35 9e 0c 06 00 00 05 aa 1a 21 00 00 63 a2 3c 1b 30 2e 30 2e 30 2e 30 20 37 38 3a 36 37 3a 64 37 3a 36 30 3a 36 66 3a 35 35 18 6a 36 34 43 50 4d 53 65 73 73 69 6f 6e 49 44 3d 30 61 37 33 30 36 36 34 5f 56 59 49 34 55 46 56 57 58 4f 45 58 46 6d 6a 72 4c 38 57 42 68 5a 50 38 72 34 35 6e 79 41 68 78 53 6b 70 7a 6d 42 57 50 30 63 3b 33 34 53 65 73 73 69 6f 6e 49 44 3d 69 73 65 2d 6d 61 73 74 65 72 2f 33 34 33 37 34 39 36 33 37 2f 36 30 30 3b 1a 15 00 00 63 a2 ff 0f 48 33 43 20 *Apr 10 13:40:17:139 2019 AC RADIUS/7/PACKET: 57 58 33 30 31 30 48 2d 4c 1a 0c 00 00 63 a2 3b 06 5c 0d 02 1c *Apr 10 13:40:17:139 2019 AC RADIUS/7/EVENT: Sent request packet and create request context successfully. *Apr 10 13:40:17:139 2019 AC RADIUS/7/EVENT: Added request context to global table successfully. *Apr 10 13:40:17:139 2019 AC RADIUS/7/EVENT: Processing AAA request data. *Apr 10 13:40:17:153 2019 AC RADIUS/7/EVENT: Reply SocketFd recieved EPOLLIN event. *Apr 10 13:40:17:154 2019 AC RADIUS/7/EVENT: Received reply packet succuessfully. *Apr 10 13:40:17:154 2019 AC RADIUS/7/EVENT: Found request context, dstIP: 10.115.6.100, dstPort: 1812, VPN instance: --(public), socketFd: 152, pktID: 217. *Apr 10 13:40:17:154 2019 AC RADIUS/7/EVENT: The reply packet is valid. *Apr 10 13:40:17:155 2019 AC RADIUS/7/EVENT: Decoded reply packet successfully. *Apr 10 13:40:17:155 2019 AC RADIUS/7/PACKET: State=0x363443504d53657373696f6e49443d30613733303636345f5659493455465657584f4558466d6a724c385742685a50387234356e79416878536b707a6d42575030633b333453657373696f6e49443d6973652d6d61737465722f3334333734393633372f3630303b EAP-Message=0x015b006119011403030001011603030050b9c36a836befcd0f3386a35f5292ac59243b619b4f6091a4c839cdac58c4dca77993683f2db18441bb936ae3b81a403cf168d5c5515fb7345c20509026d418287ad0988a2ea62a1eb5fe3a7bc5d7fc0a Message-Authenticator=0xad6a15776201b4105f4b299cd38bed62 *Apr 10 13:40:17:156 2019 AC RADIUS/7/PACKET: 0b d9 00 f3 fd bf 1f a8 c9 a1 fd 3d a9 1e 6c db 96 57 bb 33 18 6a 36 34 43 50 4d 53 65 73 73 69 6f 6e 49 44 3d 30 61 37 33 30 36 36 34 5f 56 59 49 34 55 46 56 57 58 4f 45 58 46 6d 6a 72 4c 38 57 42 68 5a 50 38 72 34 35 6e 79 41 68 78 53 6b 70 7a 6d 42 57 50 30 63 3b 33 34 53 65 73 73 69 6f 6e 49 44 3d 69 73 65 2d 6d 61 73 74 65 72 2f 33 34 33 37 34 39 36 33 37 2f 36 30 30 3b 4f 63 01 5b 00 61 19 01 14 03 03 00 01 01 16 03 03 00 50 b9 c3 6a 83 6b ef cd 0f 33 86 a3 5f 52 92 ac 59 24 3b 61 9b 4f 60 91 a4 c8 39 cd ac 58 c4 dc a7 79 93 68 3f 2d b1 84 41 bb 93 6a e3 b8 1a 40 3c f1 68 d5 c5 51 5f b7 34 5c 20 50 90 26 d4 18 28 7a d0 98 8a 2e a6 2a 1e b5 fe 3a 7b c5 d7 fc 0a 50 12 ad 6a 15 77 62 01 b4 10 5f 4b 29 9c d3 *Apr 10 13:40:17:156 2019 AC RADIUS/7/PACKET: 8b ed 62 *Apr 10 13:40:17:157 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Processing RADIUS authentication. *Apr 10 13:40:17:157 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Fetched authentication reply-data successfully, resultCode: 2 *Apr 10 13:40:17:157 2019 AC RADIUS/7/EVENT: Sent reply message successfully. *Apr 10 13:40:17:197 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Processing RADIUS authentication. *Apr 10 13:40:17:198 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Sent authentication request successfully. *Apr 10 13:40:17:198 2019 AC RADIUS/7/EVENT: Processing AAA request data. *Apr 10 13:40:17:198 2019 AC RADIUS/7/EVENT: Got request data successfully, primitive: authentication. *Apr 10 13:40:17:198 2019 AC RADIUS/7/EVENT: Getting RADIUS server info. *Apr 10 13:40:17:198 2019 AC RADIUS/7/EVENT: Got RADIUS server info successfully. *Apr 10 13:40:17:198 2019 AC RADIUS/7/EVENT: Created request context successfully. *Apr 10 13:40:17:199 2019 AC RADIUS/7/EVENT: Created request packet successfully, dstIP: 10.115.6.100, dstPort: 1812, VPN instance: --(public), socketFd: 152, pktID: 218. *Apr 10 13:40:17:199 2019 AC RADIUS/7/EVENT: Added packet socketfd to epoll successfully, socketFd: 152. *Apr 10 13:40:17:199 2019 AC RADIUS/7/EVENT: Mapped PAM item to RADIUS attribute successfully. *Apr 10 13:40:17:199 2019 AC RADIUS/7/EVENT: Got RADIUS username format successfully, format: 0. *Apr 10 13:40:17:199 2019 AC RADIUS/7/EVENT: Added attribute user-name successfully, user-name: zhangyang. *Apr 10 13:40:17:200 2019 AC RADIUS/7/EVENT: Filled RADIUS attributes in packet successfully. *Apr 10 13:40:17:200 2019 AC RADIUS/7/EVENT: Composed request packet successfully. *Apr 10 13:40:17:200 2019 AC RADIUS/7/EVENT: Created response timeout timer successfully. *Apr 10 13:40:17:200 2019 AC RADIUS/7/PACKET: User-Name="zhangyang" Service-Type=Framed-User Framed-Protocol=PPP NAS-Identifier="AC" NAS-IP-Address=10.115.10.254 NAS-Port=801 NAS-Port-Type=Wireless-802.11 NAS-Port- Calling-Station- Called-Station- Acct-Session- H3c-User-Vlan-Id=801 EAP-Message=0x025b00061901 Message-Authenticator=0x00000000000000000000000000000000 Framed-MTU=1450 H3c-Ip-Host-Addr="0.0.0.0 78:67:d7:60:6f:55" State=0x363443504d53657373696f6e49443d30613733303636345f5659493455465657584f4558466d6a724c385742685a50387234356e79416878536b707a6d42575030633b333453657373696f6e49443d6973652d6d61737465722f3334333734393633372f3630303b *Apr 10 13:40:17:201 2019 AC RADIUS/7/PACKET: H3c-Product- H3c-Nas-Startup-Timestamp=1544356380 *Apr 10 13:40:17:201 2019 AC RADIUS/7/EVENT: Sent request packet successfully. *Apr 10 13:40:17:202 2019 AC RADIUS/7/PACKET: 01 da 01 79 57 be c8 9e 32 84 46 52 33 17 36 b7 31 95 76 fa 01 0b 7a 68 61 6e 67 79 61 6e 67 06 06 00 00 00 02 07 06 00 00 00 01 20 04 41 43 04 06 0a 73 0a fe 05 06 00 00 03 21 3d 06 00 00 00 13 57 0d 56 4c 41 4e 49 44 3d 38 30 31 3b 1f 13 37 38 2d 36 37 2d 44 37 2d 36 30 2d 36 46 2d 35 35 1e 18 38 30 2d 46 36 2d 32 45 2d 44 44 2d 38 38 2d 36 30 3a 74 65 73 74 2c 28 30 30 30 30 30 30 30 34 32 30 31 39 30 34 31 30 30 35 34 30 31 36 30 30 30 30 30 31 35 66 30 38 31 30 30 31 33 34 1a 0c 00 00 63 a2 85 06 00 00 03 21 4f 08 02 5b 00 06 19 01 50 12 87 63 69 90 6a 98 e4 43 05 89 3d 26 3c 55 cb 3a 0c 06 00 00 05 aa 1a 21 00 00 63 a2 3c 1b 30 2e 30 2e 30 2e 30 20 37 38 3a 36 37 3a 64 37 3a 36 30 3a 36 66 3a 35 35 18 6a *Apr 10 13:40:17:203 2019 AC RADIUS/7/PACKET: 36 34 43 50 4d 53 65 73 73 69 6f 6e 49 44 3d 30 61 37 33 30 36 36 34 5f 56 59 49 34 55 46 56 57 58 4f 45 58 46 6d 6a 72 4c 38 57 42 68 5a 50 38 72 34 35 6e 79 41 68 78 53 6b 70 7a 6d 42 57 50 30 63 3b 33 34 53 65 73 73 69 6f 6e 49 44 3d 69 73 65 2d 6d 61 73 74 65 72 2f 33 34 33 37 34 39 36 33 37 2f 36 30 30 3b 1a 15 00 00 63 a2 ff 0f 48 33 43 20 57 58 33 30 31 30 48 2d 4c 1a 0c 00 00 63 a2 3b 06 5c 0d 02 1c *Apr 10 13:40:17:203 2019 AC RADIUS/7/EVENT: Sent request packet and create request context successfully. *Apr 10 13:40:17:203 2019 AC RADIUS/7/EVENT: Added request context to global table successfully. *Apr 10 13:40:17:203 2019 AC RADIUS/7/EVENT: Processing AAA request data. *Apr 10 13:40:17:205 2019 AC RADIUS/7/EVENT: Reply SocketFd recieved EPOLLIN event. *Apr 10 13:40:17:205 2019 AC RADIUS/7/EVENT: Received reply packet succuessfully. *Apr 10 13:40:17:206 2019 AC RADIUS/7/EVENT: Found request context, dstIP: 10.115.6.100, dstPort: 1812, VPN instance: --(public), socketFd: 152, pktID: 218. *Apr 10 13:40:17:206 2019 AC RADIUS/7/EVENT: The reply packet is valid. *Apr 10 13:40:17:206 2019 AC RADIUS/7/EVENT: Decoded reply packet successfully. *Apr 10 13:40:17:207 2019 AC RADIUS/7/PACKET: State=0x363443504d53657373696f6e49443d30613733303636345f5659493455465657584f4558466d6a724c385742685a50387234356e79416878536b707a6d42575030633b333453657373696f6e49443d6973652d6d61737465722f3334333734393633372f3630303b EAP-Message=0x015c004b1901170303004039b855d5db8e9ff250345e889b5eb50c261f378e7815b2f9fd7d58d1748205197caf9a3bfa676a52b1b51de9179cfbffa4910fa87b7c082f468f42231ab8f4d6 Message-Authenticator=0x3ed667e2654d69872da0c252655f3aef *Apr 10 13:40:17:208 2019 AC RADIUS/7/PACKET: 0b da 00 dd fb bc 89 65 b5 60 62 67 65 23 f3 e1 fa 65 3b 90 18 6a 36 34 43 50 4d 53 65 73 73 69 6f 6e 49 44 3d 30 61 37 33 30 36 36 34 5f 56 59 49 34 55 46 56 57 58 4f 45 58 46 6d 6a 72 4c 38 57 42 68 5a 50 38 72 34 35 6e 79 41 68 78 53 6b 70 7a 6d 42 57 50 30 63 3b 33 34 53 65 73 73 69 6f 6e 49 44 3d 69 73 65 2d 6d 61 73 74 65 72 2f 33 34 33 37 34 39 36 33 37 2f 36 30 30 3b 4f 4d 01 5c 00 4b 19 01 17 03 03 00 40 39 b8 55 d5 db 8e 9f f2 50 34 5e 88 9b 5e b5 0c 26 1f 37 8e 78 15 b2 f9 fd 7d 58 d1 74 82 05 19 7c af 9a 3b fa 67 6a 52 b1 b5 1d e9 17 9c fb ff a4 91 0f a8 7b 7c 08 2f 46 8f 42 23 1a b8 f4 d6 50 12 3e d6 67 e2 65 4d 69 87 2d a0 c2 52 65 5f 3a ef *Apr 10 13:40:17:208 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Processing RADIUS authentication. *Apr 10 13:40:17:208 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Fetched authentication reply-data successfully, resultCode: 2 *Apr 10 13:40:17:209 2019 AC RADIUS/7/EVENT: Sent reply message successfully. *Apr 10 13:40:17:220 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Processing RADIUS authentication. *Apr 10 13:40:17:220 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Sent authentication request successfully. *Apr 10 13:40:17:221 2019 AC RADIUS/7/EVENT: Processing AAA request data. *Apr 10 13:40:17:221 2019 AC RADIUS/7/EVENT: Got request data successfully, primitive: authentication. *Apr 10 13:40:17:221 2019 AC RADIUS/7/EVENT: Getting RADIUS server info. *Apr 10 13:40:17:221 2019 AC RADIUS/7/EVENT: Got RADIUS server info successfully. *Apr 10 13:40:17:221 2019 AC RADIUS/7/EVENT: Created request context successfully. *Apr 10 13:40:17:221 2019 AC RADIUS/7/EVENT: Created request packet successfully, dstIP: 10.115.6.100, dstPort: 1812, VPN instance: --(public), socketFd: 152, pktID: 219. *Apr 10 13:40:17:221 2019 AC RADIUS/7/EVENT: Added packet socketfd to epoll successfully, socketFd: 152. *Apr 10 13:40:17:222 2019 AC RADIUS/7/EVENT: Mapped PAM item to RADIUS attribute successfully. *Apr 10 13:40:17:222 2019 AC RADIUS/7/EVENT: Got RADIUS username format successfully, format: 0. *Apr 10 13:40:17:222 2019 AC RADIUS/7/EVENT: Added attribute user-name successfully, user-name: zhangyang. *Apr 10 13:40:17:222 2019 AC RADIUS/7/EVENT: Filled RADIUS attributes in packet successfully. *Apr 10 13:40:17:223 2019 AC RADIUS/7/EVENT: Composed request packet successfully. *Apr 10 13:40:17:223 2019 AC RADIUS/7/EVENT: Created response timeout timer successfully. *Apr 10 13:40:17:223 2019 AC RADIUS/7/PACKET: User-Name="zhangyang" Service-Type=Framed-User Framed-Protocol=PPP NAS-Identifier="AC" NAS-IP-Address=10.115.10.254 NAS-Port=801 NAS-Port-Type=Wireless-802.11 NAS-Port- Calling-Station- Called-Station- Acct-Session- H3c-User-Vlan-Id=801 EAP-Message=0x025c004b19011703030040c71339aa0186b5cdb628a83c2ed1d8d996246b85b5275ac8756be6ddb45fb490e75512a672299fa4435d205e8c16635041e995b2e56082b942fb7087a74a4e4d Message-Authenticator=0x00000000000000000000000000000000 Framed-MTU=1450 H3c-Ip-Host-Addr="0.0.0.0 78:67:d7:60:6f:55" *Apr 10 13:40:17:224 2019 AC RADIUS/7/PACKET: State=0x363443504d53657373696f6e49443d30613733303636345f5659493455465657584f4558466d6a724c385742685a50387234356e79416878536b707a6d42575030633b333453657373696f6e49443d6973652d6d61737465722f3334333734393633372f3630303b H3c-Product- H3c-Nas-Startup-Timestamp=1544356380 *Apr 10 13:40:17:224 2019 AC RADIUS/7/EVENT: Sent request packet successfully. *Apr 10 13:40:17:236 2019 AC RADIUS/7/PACKET: 01 db 01 be 14 58 6e 81 5d 2c dd ba 62 53 64 dc 74 5b 46 7e 01 0b 7a 68 61 6e 67 79 61 6e 67 06 06 00 00 00 02 07 06 00 00 00 01 20 04 41 43 04 06 0a 73 0a fe 05 06 00 00 03 21 3d 06 00 00 00 13 57 0d 56 4c 41 4e 49 44 3d 38 30 31 3b 1f 13 37 38 2d 36 37 2d 44 37 2d 36 30 2d 36 46 2d 35 35 1e 18 38 30 2d 46 36 2d 32 45 2d 44 44 2d 38 38 2d 36 30 3a 74 65 73 74 2c 28 30 30 30 30 30 30 30 34 32 30 31 39 30 34 31 30 30 35 34 30 31 36 30 30 30 30 30 31 35 66 30 38 31 30 30 31 33 34 1a 0c 00 00 63 a2 85 06 00 00 03 21 4f 4d 02 5c 00 4b 19 01 17 03 03 00 40 c7 13 39 aa 01 86 b5 cd b6 28 a8 3c 2e d1 d8 d9 96 24 6b 85 b5 27 5a c8 75 6b e6 dd b4 5f b4 90 e7 55 12 a6 72 29 9f a4 43 5d 20 5e 8c 16 63 50 41 e9 95 b2 e5 60 *Apr 10 13:40:17:241 2019 AC RADIUS/7/PACKET: 82 b9 42 fb 70 87 a7 4a 4e 4d 50 12 1a a3 d4 79 b3 8d 51 b0 72 9a 4e e6 2d fc 5a 33 0c 06 00 00 05 aa 1a 21 00 00 63 a2 3c 1b 30 2e 30 2e 30 2e 30 20 37 38 3a 36 37 3a 64 37 3a 36 30 3a 36 66 3a 35 35 18 6a 36 34 43 50 4d 53 65 73 73 69 6f 6e 49 44 3d 30 61 37 33 30 36 36 34 5f 56 59 49 34 55 46 56 57 58 4f 45 58 46 6d 6a 72 4c 38 57 42 68 5a 50 38 72 34 35 6e 79 41 68 78 53 6b 70 7a 6d 42 57 50 30 63 3b 33 34 53 65 73 73 69 6f 6e 49 44 3d 69 73 65 2d 6d 61 73 74 65 72 2f 33 34 33 37 34 39 36 33 37 2f 36 30 30 3b 1a 15 00 00 63 a2 ff 0f 48 33 43 20 57 58 33 30 31 30 48 2d 4c 1a 0c 00 00 63 a2 3b 06 5c 0d 02 1c *Apr 10 13:40:17:241 2019 AC RADIUS/7/EVENT: Sent request packet and create request context successfully. *Apr 10 13:40:17:241 2019 AC RADIUS/7/EVENT: Added request context to global table successfully. *Apr 10 13:40:17:241 2019 AC RADIUS/7/EVENT: Processing AAA request data. *Apr 10 13:40:17:241 2019 AC RADIUS/7/EVENT: Reply SocketFd recieved EPOLLIN event. *Apr 10 13:40:17:242 2019 AC RADIUS/7/EVENT: Received reply packet succuessfully. *Apr 10 13:40:17:242 2019 AC RADIUS/7/EVENT: Found request context, dstIP: 10.115.6.100, dstPort: 1812, VPN instance: --(public), socketFd: 152, pktID: 219. *Apr 10 13:40:17:243 2019 AC RADIUS/7/EVENT: The reply packet is valid. *Apr 10 13:40:17:245 2019 AC RADIUS/7/EVENT: Decoded reply packet successfully. *Apr 10 13:40:17:246 2019 AC RADIUS/7/PACKET: State=0x363443504d53657373696f6e49443d30613733303636345f5659493455465657584f4558466d6a724c385742685a50387234356e79416878536b707a6d42575030633b333453657373696f6e49443d6973652d6d61737465722f3334333734393633372f3630303b EAP-Message=0x015d006b1901170303006054c2778f7c3d08bea15f04240134334f69f4746f87c36b794fba7096b81433bb233909df20d9a6f88c3618481d62b00d940a90b4233cea34c28285a123e17093df3dfe55c32af5061ef36d64419e0eb96370986bca9dd1794327d7d6c3d77591 Message-Authenticator=0xa8e5ae16d851ce5a153b7367c1c11507 *Apr 10 13:40:17:250 2019 AC RADIUS/7/PACKET: 0b db 00 fd 46 a8 e0 6f 65 cd 45 d2 d2 a8 0f 7d 15 40 ad 02 18 6a 36 34 43 50 4d 53 65 73 73 69 6f 6e 49 44 3d 30 61 37 33 30 36 36 34 5f 56 59 49 34 55 46 56 57 58 4f 45 58 46 6d 6a 72 4c 38 57 42 68 5a 50 38 72 34 35 6e 79 41 68 78 53 6b 70 7a 6d 42 57 50 30 63 3b 33 34 53 65 73 73 69 6f 6e 49 44 3d 69 73 65 2d 6d 61 73 74 65 72 2f 33 34 33 37 34 39 36 33 37 2f 36 30 30 3b 4f 6d 01 5d 00 6b 19 01 17 03 03 00 60 54 c2 77 8f 7c 3d 08 be a1 5f 04 24 01 34 33 4f 69 f4 74 6f 87 c3 6b 79 4f ba 70 96 b8 14 33 bb 23 39 09 df 20 d9 a6 f8 8c 36 18 48 1d 62 b0 0d 94 0a 90 b4 23 3c ea 34 c2 82 85 a1 23 e1 70 93 df 3d fe 55 c3 2a f5 06 1e f3 6d 64 41 9e 0e b9 63 70 98 6b ca 9d d1 79 43 27 d7 d6 c3 d7 75 91 50 12 a8 e5 ae *Apr 10 13:40:17:251 2019 AC RADIUS/7/PACKET: 16 d8 51 ce 5a 15 3b 73 67 c1 c1 15 07 *Apr 10 13:40:17:251 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Processing RADIUS authentication. *Apr 10 13:40:17:251 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Fetched authentication reply-data successfully, resultCode: 2 *Apr 10 13:40:17:252 2019 AC RADIUS/7/EVENT: Sent reply message successfully. *Apr 10 13:40:17:263 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Processing RADIUS authentication. *Apr 10 13:40:17:263 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Sent authentication request successfully. *Apr 10 13:40:17:264 2019 AC RADIUS/7/EVENT: Processing AAA request data. *Apr 10 13:40:17:264 2019 AC RADIUS/7/EVENT: Got request data successfully, primitive: authentication. *Apr 10 13:40:17:264 2019 AC RADIUS/7/EVENT: Getting RADIUS server info. *Apr 10 13:40:17:264 2019 AC RADIUS/7/EVENT: Got RADIUS server info successfully. *Apr 10 13:40:17:265 2019 AC RADIUS/7/EVENT: Created request context successfully. *Apr 10 13:40:17:265 2019 AC RADIUS/7/EVENT: Created request packet successfully, dstIP: 10.115.6.100, dstPort: 1812, VPN instance: --(public), socketFd: 152, pktID: 220. *Apr 10 13:40:17:265 2019 AC RADIUS/7/EVENT: Added packet socketfd to epoll successfully, socketFd: 152. *Apr 10 13:40:17:265 2019 AC RADIUS/7/EVENT: Mapped PAM item to RADIUS attribute successfully. *Apr 10 13:40:17:266 2019 AC RADIUS/7/EVENT: Got RADIUS username format successfully, format: 0. *Apr 10 13:40:17:266 2019 AC RADIUS/7/EVENT: Added attribute user-name successfully, user-name: zhangyang. *Apr 10 13:40:17:266 2019 AC RADIUS/7/EVENT: Filled RADIUS attributes in packet successfully. *Apr 10 13:40:17:266 2019 AC RADIUS/7/EVENT: Composed request packet successfully. *Apr 10 13:40:17:266 2019 AC RADIUS/7/EVENT: Created response timeout timer successfully. *Apr 10 13:40:17:268 2019 AC RADIUS/7/PACKET: User-Name="zhangyang" Service-Type=Framed-User Framed-Protocol=PPP NAS-Identifier="AC" NAS-IP-Address=10.115.10.254 NAS-Port=801 NAS-Port-Type=Wireless-802.11 NAS-Port- Calling-Station- Called-Station- Acct-Session- H3c-User-Vlan-Id=801 EAP-Message=0x025d008b1901170303008026d37c7c2627caa2e449570e75c767f953b1caf0546ec3dd76a5d328650abde1337618885d12f6feb3f4ef4995bf6e5573a54022f7cc66d3b61e8752579ed4ba04b1b84a739afe13ecc9c23881a607671fae0d4bfae57246478ffd31cb0007adb795279297a2c0d256fb6438aecb47473110cd84271d872e3217804a7b42d28b Message-Authenticator=0x00000000000000000000000000000000 Framed-MTU=1450 *Apr 10 13:40:17:268 2019 AC RADIUS/7/PACKET: H3c-Ip-Host-Addr="0.0.0.0 78:67:d7:60:6f:55" State=0x363443504d53657373696f6e49443d30613733303636345f5659493455465657584f4558466d6a724c385742685a50387234356e79416878536b707a6d42575030633b333453657373696f6e49443d6973652d6d61737465722f3334333734393633372f3630303b H3c-Product- H3c-Nas-Startup-Timestamp=1544356380 *Apr 10 13:40:17:269 2019 AC RADIUS/7/EVENT: Sent request packet successfully. *Apr 10 13:40:17:271 2019 AC RADIUS/7/PACKET: 01 dc 01 fe f0 95 87 e9 5a 56 4d 97 85 ed e4 b6 0b ef 83 51 01 0b 7a 68 61 6e 67 79 61 6e 67 06 06 00 00 00 02 07 06 00 00 00 01 20 04 41 43 04 06 0a 73 0a fe 05 06 00 00 03 21 3d 06 00 00 00 13 57 0d 56 4c 41 4e 49 44 3d 38 30 31 3b 1f 13 37 38 2d 36 37 2d 44 37 2d 36 30 2d 36 46 2d 35 35 1e 18 38 30 2d 46 36 2d 32 45 2d 44 44 2d 38 38 2d 36 30 3a 74 65 73 74 2c 28 30 30 30 30 30 30 30 34 32 30 31 39 30 34 31 30 30 35 34 30 31 36 30 30 30 30 30 31 35 66 30 38 31 30 30 31 33 34 1a 0c 00 00 63 a2 85 06 00 00 03 21 4f 8d 02 5d 00 8b 19 01 17 03 03 00 80 26 d3 7c 7c 26 27 ca a2 e4 49 57 0e 75 c7 67 f9 53 b1 ca f0 54 6e c3 dd 76 a5 d3 28 65 0a bd e1 33 76 18 88 5d 12 f6 fe b3 f4 ef 49 95 bf 6e 55 73 a5 40 22 f7 cc *Apr 10 13:40:17:273 2019 AC RADIUS/7/PACKET: 66 d3 b6 1e 87 52 57 9e d4 ba 04 b1 b8 4a 73 9a fe 13 ec c9 c2 38 81 a6 07 67 1f ae 0d 4b fa e5 72 46 47 8f fd 31 cb 00 07 ad b7 95 27 92 97 a2 c0 d2 56 fb 64 38 ae cb 47 47 31 10 cd 84 27 1d 87 2e 32 17 80 4a 7b 42 d2 8b 50 12 71 e1 12 7f 73 e3 2a 5e 5f f5 58 c8 70 65 2a d6 0c 06 00 00 05 aa 1a 21 00 00 63 a2 3c 1b 30 2e 30 2e 30 2e 30 20 37 38 3a 36 37 3a 64 37 3a 36 30 3a 36 66 3a 35 35 18 6a 36 34 43 50 4d 53 65 73 73 69 6f 6e 49 44 3d 30 61 37 33 30 36 36 34 5f 56 59 49 34 55 46 56 57 58 4f 45 58 46 6d 6a 72 4c 38 57 42 68 5a 50 38 72 34 35 6e 79 41 68 78 53 6b 70 7a 6d 42 57 50 30 63 3b 33 34 53 65 73 73 69 6f 6e 49 44 3d 69 73 65 2d 6d 61 73 74 65 72 2f 33 34 33 37 34 39 36 33 37 2f 36 30 30 3b 1a 15 00 *Apr 10 13:40:17:274 2019 AC RADIUS/7/PACKET: 00 63 a2 ff 0f 48 33 43 20 57 58 33 30 31 30 48 2d 4c 1a 0c 00 00 63 a2 3b 06 5c 0d 02 1c *Apr 10 13:40:17:276 2019 AC RADIUS/7/EVENT: Sent request packet and create request context successfully. *Apr 10 13:40:17:277 2019 AC RADIUS/7/EVENT: Added request context to global table successfully. *Apr 10 13:40:17:277 2019 AC RADIUS/7/EVENT: Processing AAA request data. *Apr 10 13:40:17:284 2019 AC RADIUS/7/EVENT: Reply SocketFd recieved EPOLLIN event. *Apr 10 13:40:17:284 2019 AC RADIUS/7/EVENT: Received reply packet succuessfully. *Apr 10 13:40:17:284 2019 AC RADIUS/7/EVENT: Found request context, dstIP: 10.115.6.100, dstPort: 1812, VPN instance: --(public), socketFd: 152, pktID: 220. *Apr 10 13:40:17:285 2019 AC RADIUS/7/EVENT: The reply packet is valid. *Apr 10 13:40:17:285 2019 AC RADIUS/7/EVENT: Decoded reply packet successfully. *Apr 10 13:40:17:286 2019 AC RADIUS/7/PACKET: State=0x363443504d53657373696f6e49443d30613733303636345f5659493455465657584f4558466d6a724c385742685a50387234356e79416878536b707a6d42575030633b333453657373696f6e49443d6973652d6d61737465722f3334333734393633372f3630303b EAP-Message=0x015e007b19011703030070719942ec86cd7ed3e50221b8b502945384c1e68aa44183f28303cbc1e1b5318229b5d8d1e729350d69b93c9c6277c0d9244a75c92a9953b9874503d57c91b88c89d7dd20d3c1a5ba376c4ad5e3869374ef4c0dce95937a7a1bda6748a08b361d72b40d22187a9a3ac7690b2681c57069 Message-Authenticator=0xb75410e24752f6ff2668f397a01df74e *Apr 10 13:40:17:287 2019 AC RADIUS/7/PACKET: 0b dc 01 0d 70 3a ac 92 c1 f2 5a 09 3a 76 87 ab 65 e6 22 5f 18 6a 36 34 43 50 4d 53 65 73 73 69 6f 6e 49 44 3d 30 61 37 33 30 36 36 34 5f 56 59 49 34 55 46 56 57 58 4f 45 58 46 6d 6a 72 4c 38 57 42 68 5a 50 38 72 34 35 6e 79 41 68 78 53 6b 70 7a 6d 42 57 50 30 63 3b 33 34 53 65 73 73 69 6f 6e 49 44 3d 69 73 65 2d 6d 61 73 74 65 72 2f 33 34 33 37 34 39 36 33 37 2f 36 30 30 3b 4f 7d 01 5e 00 7b 19 01 17 03 03 00 70 71 99 42 ec 86 cd 7e d3 e5 02 21 b8 b5 02 94 53 84 c1 e6 8a a4 41 83 f2 83 03 cb c1 e1 b5 31 82 29 b5 d8 d1 e7 29 35 0d 69 b9 3c 9c 62 77 c0 d9 24 4a 75 c9 2a 99 53 b9 87 45 03 d5 7c 91 b8 8c 89 d7 dd 20 d3 c1 a5 ba 37 6c 4a d5 e3 86 93 74 ef 4c 0d ce 95 93 7a 7a 1b da 67 48 a0 8b 36 1d 72 b4 0d 22 18 *Apr 10 13:40:17:287 2019 AC RADIUS/7/PACKET: 7a 9a 3a c7 69 0b 26 81 c5 70 69 50 12 b7 54 10 e2 47 52 f6 ff 26 68 f3 97 a0 1d f7 4e *Apr 10 13:40:17:288 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Processing RADIUS authentication. *Apr 10 13:40:17:288 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Fetched authentication reply-data successfully, resultCode: 2 *Apr 10 13:40:17:289 2019 AC RADIUS/7/EVENT: Sent reply message successfully. *Apr 10 13:40:17:301 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Processing RADIUS authentication. *Apr 10 13:40:17:301 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Sent authentication request successfully. *Apr 10 13:40:17:301 2019 AC RADIUS/7/EVENT: Processing AAA request data. *Apr 10 13:40:17:301 2019 AC RADIUS/7/EVENT: Got request data successfully, primitive: authentication. *Apr 10 13:40:17:301 2019 AC RADIUS/7/EVENT: Getting RADIUS server info. *Apr 10 13:40:17:302 2019 AC RADIUS/7/EVENT: Got RADIUS server info successfully. *Apr 10 13:40:17:302 2019 AC RADIUS/7/EVENT: Created request context successfully. *Apr 10 13:40:17:302 2019 AC RADIUS/7/EVENT: Created request packet successfully, dstIP: 10.115.6.100, dstPort: 1812, VPN instance: --(public), socketFd: 152, pktID: 221. *Apr 10 13:40:17:302 2019 AC RADIUS/7/EVENT: Added packet socketfd to epoll successfully, socketFd: 152. *Apr 10 13:40:17:303 2019 AC RADIUS/7/EVENT: Mapped PAM item to RADIUS attribute successfully. *Apr 10 13:40:17:303 2019 AC RADIUS/7/EVENT: Got RADIUS username format successfully, format: 0. *Apr 10 13:40:17:303 2019 AC RADIUS/7/EVENT: Added attribute user-name successfully, user-name: zhangyang. *Apr 10 13:40:17:303 2019 AC RADIUS/7/EVENT: Filled RADIUS attributes in packet successfully. *Apr 10 13:40:17:303 2019 AC RADIUS/7/EVENT: Composed request packet successfully. *Apr 10 13:40:17:303 2019 AC RADIUS/7/EVENT: Created response timeout timer successfully. *Apr 10 13:40:17:304 2019 AC RADIUS/7/PACKET: User-Name="zhangyang" Service-Type=Framed-User Framed-Protocol=PPP NAS-Identifier="AC" NAS-IP-Address=10.115.10.254 NAS-Port=801 NAS-Port-Type=Wireless-802.11 NAS-Port- Calling-Station- Called-Station- Acct-Session- H3c-User-Vlan-Id=801 EAP-Message=0x025e004b19011703030040acbfff99c26716cc485c00327a8d6f7b674c1ce0a9e149dffa18f4dacd20b3b3f6bde33103f7f3f156fe87b2653e2b34575c5bb22bac9d40bad19e3f469d4b73 Message-Authenticator=0x00000000000000000000000000000000 Framed-MTU=1450 H3c-Ip-Host-Addr="0.0.0.0 78:67:d7:60:6f:55" *Apr 10 13:40:17:304 2019 AC RADIUS/7/PACKET: State=0x363443504d53657373696f6e49443d30613733303636345f5659493455465657584f4558466d6a724c385742685a50387234356e79416878536b707a6d42575030633b333453657373696f6e49443d6973652d6d61737465722f3334333734393633372f3630303b H3c-Product- H3c-Nas-Startup-Timestamp=1544356380 *Apr 10 13:40:17:305 2019 AC RADIUS/7/EVENT: Sent request packet successfully. *Apr 10 13:40:17:308 2019 AC RADIUS/7/PACKET: 01 dd 01 be 26 3a 2c c0 df e5 0e b3 47 1a a9 9f 8a 7d 1c 92 01 0b 7a 68 61 6e 67 79 61 6e 67 06 06 00 00 00 02 07 06 00 00 00 01 20 04 41 43 04 06 0a 73 0a fe 05 06 00 00 03 21 3d 06 00 00 00 13 57 0d 56 4c 41 4e 49 44 3d 38 30 31 3b 1f 13 37 38 2d 36 37 2d 44 37 2d 36 30 2d 36 46 2d 35 35 1e 18 38 30 2d 46 36 2d 32 45 2d 44 44 2d 38 38 2d 36 30 3a 74 65 73 74 2c 28 30 30 30 30 30 30 30 34 32 30 31 39 30 34 31 30 30 35 34 30 31 36 30 30 30 30 30 31 35 66 30 38 31 30 30 31 33 34 1a 0c 00 00 63 a2 85 06 00 00 03 21 4f 4d 02 5e 00 4b 19 01 17 03 03 00 40 ac bf ff 99 c2 67 16 cc 48 5c 00 32 7a 8d 6f 7b 67 4c 1c e0 a9 e1 49 df fa 18 f4 da cd 20 b3 b3 f6 bd e3 31 03 f7 f3 f1 56 fe 87 b2 65 3e 2b 34 57 5c 5b b2 2b ac *Apr 10 13:40:17:309 2019 AC RADIUS/7/PACKET: 9d 40 ba d1 9e 3f 46 9d 4b 73 50 12 c4 a0 1f e5 ab 70 2b 9e 60 eb 67 85 b8 2c 10 d4 0c 06 00 00 05 aa 1a 21 00 00 63 a2 3c 1b 30 2e 30 2e 30 2e 30 20 37 38 3a 36 37 3a 64 37 3a 36 30 3a 36 66 3a 35 35 18 6a 36 34 43 50 4d 53 65 73 73 69 6f 6e 49 44 3d 30 61 37 33 30 36 36 34 5f 56 59 49 34 55 46 56 57 58 4f 45 58 46 6d 6a 72 4c 38 57 42 68 5a 50 38 72 34 35 6e 79 41 68 78 53 6b 70 7a 6d 42 57 50 30 63 3b 33 34 53 65 73 73 69 6f 6e 49 44 3d 69 73 65 2d 6d 61 73 74 65 72 2f 33 34 33 37 34 39 36 33 37 2f 36 30 30 3b 1a 15 00 00 63 a2 ff 0f 48 33 43 20 57 58 33 30 31 30 48 2d 4c 1a 0c 00 00 63 a2 3b 06 5c 0d 02 1c *Apr 10 13:40:17:309 2019 AC RADIUS/7/EVENT: Sent request packet and create request context successfully. *Apr 10 13:40:17:309 2019 AC RADIUS/7/EVENT: Added request context to global table successfully. *Apr 10 13:40:17:310 2019 AC RADIUS/7/EVENT: Processing AAA request data. *Apr 10 13:40:17:310 2019 AC RADIUS/7/EVENT: Reply SocketFd recieved EPOLLIN event. *Apr 10 13:40:17:310 2019 AC RADIUS/7/EVENT: Received reply packet succuessfully. *Apr 10 13:40:17:311 2019 AC RADIUS/7/EVENT: Found request context, dstIP: 10.115.6.100, dstPort: 1812, VPN instance: --(public), socketFd: 152, pktID: 221. *Apr 10 13:40:17:312 2019 AC RADIUS/7/EVENT: The reply packet is valid. *Apr 10 13:40:17:312 2019 AC RADIUS/7/EVENT: Decoded reply packet successfully. *Apr 10 13:40:17:314 2019 AC RADIUS/7/PACKET: State=0x363443504d53657373696f6e49443d30613733303636345f5659493455465657584f4558466d6a724c385742685a50387234356e79416878536b707a6d42575030633b333453657373696f6e49443d6973652d6d61737465722f3334333734393633372f3630303b EAP-Message=0x015f004b19011703030040cc5136db8d668c79b4fe8a94fb49153779363a8f3af7324823a43fb441c50617a50dacd3ce92953b6e03ddb327ce47e46c2921198b8d09030b2573a49ac4702c Message-Authenticator=0x29a86882399481f731a5ffcf2d47dd48 *Apr 10 13:40:17:314 2019 AC RADIUS/7/PACKET: 0b dd 00 dd fa 5a b5 1f 67 27 98 4d 0a cc 71 f4 12 e0 db ae 18 6a 36 34 43 50 4d 53 65 73 73 69 6f 6e 49 44 3d 30 61 37 33 30 36 36 34 5f 56 59 49 34 55 46 56 57 58 4f 45 58 46 6d 6a 72 4c 38 57 42 68 5a 50 38 72 34 35 6e 79 41 68 78 53 6b 70 7a 6d 42 57 50 30 63 3b 33 34 53 65 73 73 69 6f 6e 49 44 3d 69 73 65 2d 6d 61 73 74 65 72 2f 33 34 33 37 34 39 36 33 37 2f 36 30 30 3b 4f 4d 01 5f 00 4b 19 01 17 03 03 00 40 cc 51 36 db 8d 66 8c 79 b4 fe 8a 94 fb 49 15 37 79 36 3a 8f 3a f7 32 48 23 a4 3f b4 41 c5 06 17 a5 0d ac d3 ce 92 95 3b 6e 03 dd b3 27 ce 47 e4 6c 29 21 19 8b 8d 09 03 0b 25 73 a4 9a c4 70 2c 50 12 29 a8 68 82 39 94 81 f7 31 a5 ff cf 2d 47 dd 48 *Apr 10 13:40:17:315 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Processing RADIUS authentication. *Apr 10 13:40:17:315 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Fetched authentication reply-data successfully, resultCode: 2 *Apr 10 13:40:17:316 2019 AC RADIUS/7/EVENT: Sent reply message successfully. *Apr 10 13:40:17:327 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Processing RADIUS authentication. *Apr 10 13:40:17:327 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Sent authentication request successfully. *Apr 10 13:40:17:327 2019 AC RADIUS/7/EVENT: Processing AAA request data. *Apr 10 13:40:17:327 2019 AC RADIUS/7/EVENT: Got request data successfully, primitive: authentication. *Apr 10 13:40:17:327 2019 AC RADIUS/7/EVENT: Getting RADIUS server info. *Apr 10 13:40:17:327 2019 AC RADIUS/7/EVENT: Got RADIUS server info successfully. *Apr 10 13:40:17:328 2019 AC RADIUS/7/EVENT: Created request context successfully. *Apr 10 13:40:17:328 2019 AC RADIUS/7/EVENT: Created request packet successfully, dstIP: 10.115.6.100, dstPort: 1812, VPN instance: --(public), socketFd: 152, pktID: 222. *Apr 10 13:40:17:328 2019 AC RADIUS/7/EVENT: Added packet socketfd to epoll successfully, socketFd: 152. *Apr 10 13:40:17:328 2019 AC RADIUS/7/EVENT: Mapped PAM item to RADIUS attribute successfully. *Apr 10 13:40:17:328 2019 AC RADIUS/7/EVENT: Got RADIUS username format successfully, format: 0. *Apr 10 13:40:17:328 2019 AC RADIUS/7/EVENT: Added attribute user-name successfully, user-name: zhangyang. *Apr 10 13:40:17:328 2019 AC RADIUS/7/EVENT: Filled RADIUS attributes in packet successfully. *Apr 10 13:40:17:328 2019 AC RADIUS/7/EVENT: Composed request packet successfully. *Apr 10 13:40:17:328 2019 AC RADIUS/7/EVENT: Created response timeout timer successfully. *Apr 10 13:40:17:329 2019 AC RADIUS/7/PACKET: User-Name="zhangyang" Service-Type=Framed-User Framed-Protocol=PPP NAS-Identifier="AC" NAS-IP-Address=10.115.10.254 NAS-Port=801 NAS-Port-Type=Wireless-802.11 NAS-Port- Calling-Station- Called-Station- Acct-Session- H3c-User-Vlan-Id=801 EAP-Message=0x025f00061901 Message-Authenticator=0x00000000000000000000000000000000 Framed-MTU=1450 H3c-Ip-Host-Addr="0.0.0.0 78:67:d7:60:6f:55" State=0x363443504d53657373696f6e49443d30613733303636345f5659493455465657584f4558466d6a724c385742685a50387234356e79416878536b707a6d42575030633b333453657373696f6e49443d6973652d6d61737465722f3334333734393633372f3630303b *Apr 10 13:40:17:330 2019 AC RADIUS/7/PACKET: H3c-Product- H3c-Nas-Startup-Timestamp=1544356380 *Apr 10 13:40:17:330 2019 AC RADIUS/7/EVENT: Sent request packet successfully. *Apr 10 13:40:17:331 2019 AC RADIUS/7/PACKET: 01 de 01 79 a0 41 f8 80 a0 2b 54 f9 3c ee fd c6 01 ba ee 45 01 0b 7a 68 61 6e 67 79 61 6e 67 06 06 00 00 00 02 07 06 00 00 00 01 20 04 41 43 04 06 0a 73 0a fe 05 06 00 00 03 21 3d 06 00 00 00 13 57 0d 56 4c 41 4e 49 44 3d 38 30 31 3b 1f 13 37 38 2d 36 37 2d 44 37 2d 36 30 2d 36 46 2d 35 35 1e 18 38 30 2d 46 36 2d 32 45 2d 44 44 2d 38 38 2d 36 30 3a 74 65 73 74 2c 28 30 30 30 30 30 30 30 34 32 30 31 39 30 34 31 30 30 35 34 30 31 36 30 30 30 30 30 31 35 66 30 38 31 30 30 31 33 34 1a 0c 00 00 63 a2 85 06 00 00 03 21 4f 08 02 5f 00 06 19 01 50 12 80 fc 36 4b 66 bb 78 8f 1d b8 71 3e fd 4a d0 02 0c 06 00 00 05 aa 1a 21 00 00 63 a2 3c 1b 30 2e 30 2e 30 2e 30 20 37 38 3a 36 37 3a 64 37 3a 36 30 3a 36 66 3a 35 35 18 6a *Apr 10 13:40:17:332 2019 AC RADIUS/7/PACKET: 36 34 43 50 4d 53 65 73 73 69 6f 6e 49 44 3d 30 61 37 33 30 36 36 34 5f 56 59 49 34 55 46 56 57 58 4f 45 58 46 6d 6a 72 4c 38 57 42 68 5a 50 38 72 34 35 6e 79 41 68 78 53 6b 70 7a 6d 42 57 50 30 63 3b 33 34 53 65 73 73 69 6f 6e 49 44 3d 69 73 65 2d 6d 61 73 74 65 72 2f 33 34 33 37 34 39 36 33 37 2f 36 30 30 3b 1a 15 00 00 63 a2 ff 0f 48 33 43 20 57 58 33 30 31 30 48 2d 4c 1a 0c 00 00 63 a2 3b 06 5c 0d 02 1c *Apr 10 13:40:17:332 2019 AC RADIUS/7/EVENT: Sent request packet and create request context successfully. *Apr 10 13:40:17:332 2019 AC RADIUS/7/EVENT: Added request context to global table successfully. *Apr 10 13:40:17:332 2019 AC RADIUS/7/EVENT: Processing AAA request data. *Apr 10 13:40:17:352 2019 AC RADIUS/7/EVENT: Reply SocketFd recieved EPOLLIN event. *Apr 10 13:40:17:352 2019 AC RADIUS/7/EVENT: Received reply packet succuessfully. *Apr 10 13:40:17:352 2019 AC RADIUS/7/EVENT: Found request context, dstIP: 10.115.6.100, dstPort: 1812, VPN instance: --(public), socketFd: 152, pktID: 222. *Apr 10 13:40:17:353 2019 AC RADIUS/7/EVENT: The reply packet is valid. *Apr 10 13:40:17:353 2019 AC RADIUS/7/EVENT: Decoded reply packet successfully. *Apr 10 13:40:17:354 2019 AC RADIUS/7/PACKET: User-Name="zhangyang" State=0x52656175746853657373696f6e3a30613733303636345f5659493455465657584f4558466d6a724c385742685a50387234356e79416878536b707a6d4257503063 Class=0x434143533a30613733303636345f5659493455465657584f4558466d6a724c385742685a50387234356e79416878536b707a6d42575030633a6973652d6d61737465722f3334333734393633372f363030 Tunnel-Type:1=VLAN Tunnel-Medium-Type:1=IEEE-802 EAP-Message=0x035f0004 Message-Authenticator=0x054307f242b334bae9572eb65b2a63a0 Tunnel-Private-Group-Id:1="600" MS-MPPE-Send-Key=****** MS-MPPE-Receive-Key=****** *Apr 10 13:40:17:355 2019 AC RADIUS/7/PACKET: 02 de 01 53 37 84 c9 66 83 e6 78 40 86 13 8e b4 6c 87 e8 4d 01 0b 7a 68 61 6e 67 79 61 6e 67 18 43 52 65 61 75 74 68 53 65 73 73 69 6f 6e 3a 30 61 37 33 30 36 36 34 5f 56 59 49 34 55 46 56 57 58 4f 45 58 46 6d 6a 72 4c 38 57 42 68 5a 50 38 72 34 35 6e 79 41 68 78 53 6b 70 7a 6d 42 57 50 30 63 19 53 43 41 43 53 3a 30 61 37 33 30 36 36 34 5f 56 59 49 34 55 46 56 57 58 4f 45 58 46 6d 6a 72 4c 38 57 42 68 5a 50 38 72 34 35 6e 79 41 68 78 53 6b 70 7a 6d 42 57 50 30 63 3a 69 73 65 2d 6d 61 73 74 65 72 2f 33 34 33 37 34 39 36 33 37 2f 36 30 30 40 06 01 00 00 0d 41 06 01 00 00 06 4f 06 03 5f 00 04 50 12 05 43 07 f2 42 b3 34 ba e9 57 2e b6 5b 2a 63 a0 51 06 01 36 30 30 1a 3a 00 00 01 37 10 34 91 1c dc c3 54 2f 9f 38 9d *Apr 10 13:40:17:355 2019 AC RADIUS/7/PACKET: a6 53 19 e7 ef 61 9f 29 67 5c 6a 26 53 65 2e e5 f3 61 c1 49 6a d7 4c 94 97 a4 ee a2 3f 0c c3 3f b8 f3 6c f8 90 0e e2 aa f4 1a 3a 00 00 01 37 11 34 f7 5f 61 d3 2d 8c bd 5f c8 1f a7 9d f0 a8 d3 09 30 ef 8a 9e f7 3c 8f 84 5f b0 4b d1 8b 21 d9 bf 48 a9 42 b7 57 a3 84 c5 c0 c2 97 08 78 50 5a 29 a4 7f *Apr 10 13:40:17:356 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Processing RADIUS authentication. *Apr 10 13:40:17:356 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Fetched authentication reply-data successfully, resultCode: 0 %Apr 10 13:40:17:356 2019 AC DOT1X/6/DOT1X_WLAN_LOGIN_SUCC: -Username=zhangyang-UserMAC=7867-d760-6f55-BSSID=80f6-2edd-8861-SSID=test-VLANID=801; A user passed 802.1X authentication and came online. *Apr 10 13:40:17:356 2019 AC RADIUS/7/EVENT: PAM_RADIUS: Processing RADIUS authorization. *Apr 10 13:40:17:356 2019 AC RADIUS/7/EVENT: PAM_RADIUS: RADIUS Authorization successfully. *Apr 10 13:40:17:357 2019 AC RADIUS/7/EVENT: Sent reply message successfully. %Apr 10 13:40:19:405 2019 AC STAMGR/6/STAMGR_CLIENT_OFFLINE: Client b8c1-11cd-6759 went offline from BSS 1cab-3475-2f40 with SSID JNGH on AP 1cab-3475-2f20. State changed to Unauth. Reason:Received disassociation frame in Run state: reason code=8 

编辑答案

你正在编辑答案

如果你要对问题或其他回答进行点评或询问,请使用评论功能。

分享扩散:

提出建议

    +

亲~登录后才可以操作哦!

确定

亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册

注册后可访问此模块

跳转hclhub

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作

举报

×

侵犯我的权益 >
对根叔社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 pub.zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明