Communication sans fil/mobilité : Réseau local sans fil (WLAN)

Exemple local de configuration d'authentification EAP WLC NGWC 5760 et 3850

17 décembre 2015 - Traduction automatique
Autres versions: PDFpdf | Anglais (22 août 2015) | Commentaires

Introduction

Ce document décrit le processus pas à pas utilisé afin de configurer les contrôleurs sans-fil de nouvelle génération de Cisco (NGWC) 5760 et 3850 contrôleurs LAN Sans fil (WLCs) pour l'authentification locale de Protocole EAP (Extensible Authentication Protocol) des utilisateurs du réseau Sans fil. La méthode d'authentification utilisée dans ce document est PEAP-MSChapv2, qui est l'une des méthodes plus-communes disponibles dans les suppliants.

Contribué par Tiago Antunes, ingénieur TAC Cisco.

Conditions préalables

Conditions requises

Cisco recommande que vous répondiez à ces exigences avant que vous tentiez cette configuration :

  • Ayez une connaissance de base du WLC et du Point d'accès léger (recouvrements). Ce document ne couvre pas la configuration de démarrage pour les 5760 et les 3850 WLCs. Pour plus d'informations sur cette tâche particuar, visitez s'il vous plaît obtenir commencé par le WLC 5760 et 3850 sur les forum de support.
  • Ayez une connaissance fonctionnelle du serveur d'Authentification, autorisation et comptabilité (AAA).
  • Ayez une connaissance complète des réseaux Sans fil et des problèmes de sécurité Sans fil.
  • Ce document suppose que les points d'accès sans fil ont déjà joint le WLC 5760 et/ou 3850.
  • Ce document suppose que le suppliant est correctement configuré pour les méthodes d'authentification qui sont utilisées.

Composants utilisés

Les informations contenues dans ce document sont basées sur les versions de matériel et de logiciel suivantes :

  • Afin de tirer bénéfice du GUI sur les 5760 et les 3850, et exécuter également le code le plus récent, s'assurent que vous utilisez le code 03.02.02.SE.150-1.EX2 ou en haut. (C'est en juin 25 valides, 2013.)
  • Le Point d'accès (AP) utilisé dans ce document est AP1142N.
  • Le supplicant utilisé dans ce document est entreprise de Windows 7 de Microsoft (MS), avec un adaptateur USB du TP-lien n600 de carte et une version 3.1 à deux bandes Sans fil de Cisco Anyconnect.

Les informations contenues dans ce document ont été créées à partir des périphériques d'un environnement de laboratoire spécifique. Tous les périphériques utilisés dans ce document ont démarré avec une configuration effacée (par défaut). Si votre réseau est opérationnel, assurez-vous que vous comprenez l'effet potentiel de toute commande.

Informations générales

L'EAP local est une méthode d'authentification qui permet l'authentification d'utilisateur et de client sans fil localement sur le contrôleur. Quand vous activez l'EAP local, le contrôleur sert de serveur d'authentification et de base de données locale des utilisateurs, ainsi il enlève la dépendance à l'égard un serveur d'authentification externe. L'EAP local récupère des identifiants utilisateurs de la base de données locale des utilisateurs.

Sélectionnez cette commande CLI afin de visualiser les méthodes que l'EAP local prend en charge pour l'authentification entre le contrôleur et le client sans fil :

3850-1(config-eap-profile)#method ?  fast      EAP-FAST method allowed
 gtc       EAP-GTC method allowed
 leap      EAP-LEAP method allowed
 md5       EAP-MD5 method allowed
 mschapv2  EAP-MSCHAPV2 method allowed
  peap      EAP-PEAP method allowed
 tls       EAP-TLS method allowed

Configurez

Diagramme du réseau

Configurations

Terminez-vous ces étapes afin de configurer l'authentification EAP locale :

  1. Sélectionnez cette commande CLI afin de créer un utilisateur de test :

    user-name test
     privilege 15
     password 0 cisco
     type network-user description pass=cisco
  2. Sélectionnez cette commande CLI afin d'activer l'AAA :

    aaa new-model
  3. Définissez l'authentification et l'autorisation pour l'AAA :


    1. Sélectionnez cette commande dans le CLI afin de faire la session d'EAP local-terminée.

      aaa authentication dot1x default local
    2. Sélectionnez cette commande CLI afin de préparer une liste de méthode pour le téléchargement de créance :

      Remarque: Dans cet exemple, les gens du pays sont configurés dans l'author_list de liste de méthode. Ce nom de liste de méthode est l'un des paramètres pour la commande CLI d'author_list d'autorisation d'authen_list d'authentification locale d'AAA.


      aaa authorization credential-download author_list  local
    3. Sélectionnez cette commande CLI afin de définir une liste de méthode d'authentification, qui est utilisée par l'EAP local pour la vérification des qualifications quand l'EAP demande l'EAP local avec l'événement EAP_VERIFY_PASSWORD_EVENT :

      Remarque: Ce nom de liste de méthode est le paramètre pour la commande CLI d'author_list d'autorisation d'authen_list d'authentification locale d'AAA.


      aaa authentication dot1x authen_list local
    4. Sélectionnez cette commande CLI afin de spécifier où l'EAP local doit le télécharger/vérifie les qualifications :

      Remarque: Vous devez définir l'authen_list et l'author_list avant que ceci se produise ; référez-vous aux étapes 2 et 3 pour plus d'informations sur la façon définir la liste de méthode.


      aaa local authentication authen_list authorization author_list
  4. Sélectionnez cette commande CLI afin de commencer le processus de dot1x :

    dot1x system-auth-control
  5. Créez l'eap profile afin de définir les méthodes d'authentification prises en charge. Dans cet exemple, on permet PEAP-MSchapv2 :

    eap profile PEAPProfile
     method peap
     method mschapv2
  6. Configurez l'Identifiant SSID (Service Set Identifier) afin d'utiliser l'eap profile que vous avez créé :

    wlan TiagoNGWC 1 TiagoNGWC

     client vlan VLAN0080
     ip dhcp server 192.168.80.14
     local-auth PEAPProfile
  7. Installez le pool DHCP et le Switch Virtual Interface (SVI) pour le client VLAN. Dans cet exemple, ceci est terminé directement sur le NGWC avec l'utilisation de VLAN80 :

    ip dhcp excluded-address 192.168.80.1 192.168.80.99
    !
    ip dhcp pool VLAN80
     network 192.168.80.0 255.255.255.0
     default-router 192.168.80.14

    interface Vlan80
     ip address 192.168.80.14 255.255.255.0

Vérifiez

Employez cette section afin de vérifier que vos configurations fonctionnent correctement.

3850-1#show wlan  name TiagoNGWC       
WLAN Profile Name     : TiagoNGWC
================================================
Identifier                                     : 1
Network Name (SSID)                            : TiagoNGWC
Status                                         : Enabled
Broadcast SSID                                 : Enabled
Maximum number of Associated Clients           : 0
AAA Policy Override                            : Disabled
Network Admission Control
  NAC-State                                    : Disabled
Number of Active Clients                       : 1
Exclusionlist Timeout                          : 60
Session Timeout                                : 1800 seconds
CHD per WLAN                                   : Enabled
Webauth DHCP exclusion                         : Disabled
Interface                                      : VLAN0080
Interface Status                               : Up
Multicast Interface                            : Unconfigured
WLAN IPv4 ACL                                  : unconfigured
WLAN IPv6 ACL                                  : unconfigured
DHCP Server                                    : 192.168.80.14
DHCP Address Assignment Required               : Disabled
DHCP Option 82                                 : Disabled
DHCP Option 82 Format                          : ap-mac
DHCP Option 82 Ascii Mode                      : Disabled
DHCP Option 82 Rid Mode                        : Disabled
QoS Service Policy - Input
  Policy Name                                  : unknown
  Policy State                                 : None
QoS Service Policy - Output
  Policy Name                                  : unknown
  Policy State                                 : None
QoS Client Service Policy
  Input  Policy Name                           : unknown
  Output Policy Name                           : unknown
WMM                                            : Allowed
Channel Scan Defer Priority:
  Priority (default)                           : 4
  Priority (default)                           : 5
  Priority (default)                           : 6
Scan Defer Time (msecs)                        : 100
Media Stream Multicast-direct                  : Disabled
CCX - AironetIe Support                        : Enabled
CCX - Gratuitous ProbeResponse (GPR)           : Disabled
CCX - Diagnostics Channel Capability           : Disabled
Dot11-Phone Mode (7920)                        : Invalid
Wired Protocol                                 : None
Peer-to-Peer Blocking Action                   : Disabled
Radio Policy                                   : All
DTIM period for 802.11a radio                  : 1
DTIM period for 802.11b radio                  : 1
Local EAP Authentication                       : PEAPProfile
Mac Filter Authorization list name             : Disabled
Accounting list name                           : Disabled
802.1x authentication list name                : Disabled
Security
    802.11 Authentication                      : Open System
    Static WEP Keys                            : Disabled
    802.1X                                     : Disabled
    Wi-Fi Protected Access (WPA/WPA2)          : Enabled
        WPA (SSN IE)                           : Disabled
        WPA2 (RSN IE)                          : Enabled
            TKIP Cipher                        : Disabled
            AES Cipher                         : Enabled
        Auth Key Management
            802.1x                             : Enabled
            PSK                                : Disabled
            CCKM                               : Disabled
    CKIP                                       : Disabled
    IP Security                                : Disabled
    IP Security Passthru                       : Disabled
    L2TP                                       : Disabled
    Web Based Authentication                   : Disabled
    Conditional Web Redirect                   : Disabled
    Splash-Page Web Redirect                   : Disabled
    Auto Anchor                                : Disabled
    Sticky Anchoring                           : Enabled
    Cranite Passthru                           : Disabled
    Fortress Passthru                          : Disabled
    PPTP                                       : Disabled
    Infrastructure MFP protection              : Enabled
    Client MFP                                 : Optional
    Webauth On-mac-filter Failure              : Disabled
    Webauth Authentication List Name           : Disabled
    Webauth Parameter Map                      : Disabled
    Tkip MIC Countermeasure Hold-down Timer    : 60
Call Snooping                                  : Disabled
Passive Client                                 : Disabled
Non Cisco WGB                                  : Disabled
Band Select                                    : Disabled
Load Balancing                                 : Disabled
IP Source Guard                                : Disabled
3850-1#show wireless client mac-address 6470.0227.0a89 detail 

Client MAC Address : 6470.0227.0a89
Client Username : tiago
AP MAC Address : 64d8.146f.e5a0
AP Name: APd48c.b52f.4a1e
Client State : Associated
Wireless LAN Id : 1
Wireless LAN Name: TiagoNGWC
BSSID : 64d8.146f.e5a0
Connected For : 323 secs
Protocol : 802.11n - 2.4 GHz
Channel : 6
IPv4 Address : 192.168.80.100
IPv6 Address : Unknown
Association Id : 1
Authentication Algorithm : Open System
...
Policy Manager State : RUN
Policy Manager Rule Created : Yes
NPU Fast Fast Notified : Yes
Last Policy Manager State : RUN
Client Entry Create Time : 153207 seconds
Policy Type : WPA2
Authentication Key Management : 802.1x
Encryption Cipher : CCMP (AES)
Management Frame Protection : No
EAP Type : PEAP
Interface : VLAN0080
VLAN : 80
Quarantine VLAN : 0
Access VLAN : 80
...

Dépannez

Employez cette section afin de dépanner vos configurations.

Suivis d'enable pour des questions de client sans fil

Sélectionnez ces commandes CLI afin de tracer pour des questions de client sans fil :

set trace group-wireless-client level debug
debug client mac <MAC>

Sélectionnez cette commande CLI afin de filtrer sur une adresse MAC spécifique :

set trace group-wireless-client filter mac <MAC>

Sélectionnez cette commande CLI afin de visualiser la sortie non filtrée :

show trace messages group-wireless-client

Sélectionnez cette commande CLI afin de visualiser la sortie filtrée :

show trace sys-filtered-traces

Sélectionnez cette commande CLI afin de visualiser les configurations :

show trace all-buffer settings  

Vous pourriez devoir visualiser d'autres suivis, dépendants au moment si la question est avec le Cisco IOS® ou le Fed. Si vous rencontrez des questions quand vous tentez de récupérer des adresses IP, l'enable mettent au point le cheminement de périphérique d'IP.

Debugs pour le dot1x et l'EAP

Voici les commandes de débogage utilisées pour le dot1x et les configurations d'EAP :

debug aaa wireless all
debug dot1x all
debug eap all

Debugs d'exemple

Voici quelques ouptuts de commande de débogage d'exemple :

3850-1#
*Sep 19 07:00:21.423: 6470.0227.0A89 Association received from mobile on AP
 64D8.146F.E5A0  1 wcm: cct Msg Sent at 1379573926 se
*Sep 19 07:00:21.423: 6470.0227.0A89 qos upstream policy is unknown and
 downstreampolicy is unknown 1 wcm: Sent at 1379573926 se
*Sep 19 07:00:21.423: 6470.0227.0A89 apChanged 0 wlanChanged 0 mscb ipAddr
 192.168.80.100, apf RadiusOverride 0x0, numIPv6Addr=0 1 wcm: = 0^M
*Sep 19 07:00:21.423: 6470.0227.0A89 Applying WLAN policy on MSCB. 1 wcm:
 ipAddr 192.168.80.100, apf RadiusOverride 0x0, numIPv6Addr=0
*Sep 19 07:00:21.424: 6470.0227.0A89 Applying WLAN ACL policies to client 1
 wcm:  192.168.80.100, apf RadiusOverride 0x0, numIPv6Addr=0
*Sep 19 07:00:21.424: 6470.0227.0A89 No Interface ACL used for Wireless
 client in WCM(NGWC) 1 wcm: pf RadiusOverride 0x0, numIPv6Addr=0
*Sep 19 07:00:21.424: 6470.0227.0A89 Applying site-specific IPv6 override for
 station  6470.0227.0A89  - vapId 1, site 'default-group', interface
 'VLAN0080' 1 wcm:
*Sep 19 07:00:21.424: 6470.0227.0A89 Applying local bridging Interface Policy
 for station  6470.0227.0A89  - vlan 80, interface 'VLAN0080' 1 wcm: erface
 'VLAN0080'
*Sep 19 07:00:21.424: 6470.0227.0A89 STA - rates (8): 1 wcm:
 130 132 139 12 18 150 24 36 48 72 96 108 0 0 0 0
*Sep 19 07:00:21.424: 6470.0227.0A89 STA - rates (12): 1 wcm:
 130 132 139 12 18 150 24 36 48 72 96 108 0 0 0 0
*Sep 19 07:00:21.424: 6470.0227.0A89 new capwap_wtp_iif_id d7844000000004,sm
 capwap_wtp_iif_id d7844000000004 1 wcm: an 80, interface 'VLAN0080'
*Sep 19 07:00:21.424: 6470.0227.0A89 In >= L2AUTH_COMPLETE for station
 6470.0227.0A89  1 wcm: _iif_id d7844000000004
*Sep 19 07:00:21.424:  6470.0227.0A89  192.168.80.100 RUN (20) Change state
 to START (0) last state RUN (20)
 1 wcm:
*Sep 19 07:00:21.424: 6470.0227.0A89 WCDB_CHANGE: 1 wcm:  Client 1 m_vlan 80
 Radio iif id 0xdf0f4000000005 bssid iif id 0xcd248000000015, bssid
 64D8.146F.E5A0
*Sep 19 07:00:21.424: 6470.0227.0A89 WCDB_AUTH: 1 wcm:  Adding opt82 len 0
*Sep 19 07:00:21.425: 6470.0227.0A89 WCDB_LLM: 1 wcm:  NoRun Prev Mob 1, Curr
 Mob 1 llmReq 5, return True
*Sep 19 07:00:21.425: 6470.0227.0A89 auth state 0 mob state 1 setWme 0 wme 1
 roam_sent 0
 1 wcm: rn True
*Sep 19 07:00:21.425: 6470.0227.0A89 WCDB_CHANGE: 1 wcm:  auth=ASSOCIATION(0)
 vlan 80 radio 0 client_id 0xde51c000000021 mobility=Local(1) src_int
 0xd7844000000004 dst_int 0x0 ackflag 2 reassoc_client 0 llm_notif 1 ip
 192.168.80.100 ip_learn_type ARP
*Sep 19 07:00:21.425:  6470.0227.0A89  192.168.80.100 START (0) Initializing
 policy 1 wcm: 0 client_id 0xde51c000000021 mobility=Local(1) src_int
 0xd7844000000004 dst_int 0x0 ackflag 2 reassoc_client 0 llm_notif 1 ip
 192.168.80.100 ip_learn_type ARP
*Sep 19 07:00:21.425: PEM recv processing msg Del SCB(4)  1 wcm: T (0)
 Initializing policy
*Sep 19 07:00:21.425:  6470.0227.0A89  192.168.80.100 START (0) Change state
 to AUTHCHECK (2) last state RUN (20)
 1 wcm: bility=Local(1) src_int 0xd7844000000004 dst_int 0x0 ackflag 2
  reassoc_client 0 llm_notif 1 ip  192.168.80.100 ip_learn_type ARP
*Sep 19 07:00:21.425:  6470.0227.0A89  192.168.80.100 AUTHCHECK (2) Change
 state to 8021X_REQD (3) last state RUN (20)
 1 wcm: y=Local(1) src_int 0xd7844000000004 dst_int 0x0 ackflag 2
  reassoc_client 0 llm_notif 1 ip  192.168.80.100 ip_learn_type ARP
*Sep 19 07:00:21.425:  6470.0227.0A89  192.168.80.100 8021X_REQD (3) DHCP
 required on AP  64D8.146F.E5A0  vapId 1 apVapId 1for this client 1 wcm:
 0xd7844000000004 dst_int 0x0 ackflag 2 reassoc_client 0 llm_notif 1 ip
 192.168.80.100 ip_learn_type ARP
*Sep 19 07:00:21.425: 6470.0227.0A89 Not Using WMM Compliance code qosCap 00
 1 wcm: uired on AP  64D8.146F.E5A0  vapId 1 apVapId 1for this client
*Sep 19 07:00:21.425:  6470.0227.0A89  192.168.80.100 8021X_REQD (3) Plumbed
 mobile LWAPP rule on AP  64D8.146F.E5A0  vapId 1 apVapId 1 1 wcm: nt
*Sep 19 07:00:21.425: 6470.0227.0A89 apfPemAddUser2 (apf_policy.c: 1 wcm:161)
 Changing state for mobile  6470.0227.0A89  on AP  64D8.146F.E5A0  from
 Associated to Associated
*Sep 19 07:00:21.426: 6470.0227.0A89 Stopping deletion of Mobile Station: 1
 wcm:  (callerId: 48)
*Sep 19 07:00:21.426: 6470.0227.0A89 Ms Timeout = 0, Session Timeout = 1800
 1 wcm: llerId: 48)
*Sep 19 07:00:21.426: 6470.0227.0A89 Sending Assoc Response to station on
 BSSID  64D8.146F.E5A0  (status 0) ApVapId 1 Slot 0 1 wcm: .146F.E5A0  from
 Associated to Associated
*Sep 19 07:00:21.426: 6470.0227.0A89 apfProcessAssocReq (apf_80211.c: 1 wcm:
 5260) Changing state for mobile  6470.0227.0A89  on AP  64D8.146F.E5A0 from
 Associated to Associated
*Sep 19 07:00:21.426:  6470.0227.0A89  192.168.80.100 8021X_REQD (3) Handling
 pemDelScb Event skipping delete 1 wcm: 7.0A89  on AP  64D8.146F.E5A0  from
 Associated to Associated
*Sep 19 07:00:21.435: dot1x-sm:[6470.0227.0a89, Ca0] Posting RESTART on
 Client 0x60000009
*Sep 19 07:00:21.435:     dot1x_auth Ca0: during state auth_authenticated,
 got event 13(restart)
*Sep 19 07:00:21.435: @@@ dot1x_auth Ca0: auth_authenticated -> auth_restart
*Sep 19 07:00:21.435: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:exiting
 authenticated state
*Sep 19 07:00:21.435: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:
 entering restart
*Sep 19 07:00:21.435: dot1x-ev:[6470.0227.0a89, Ca0] Override cfg -
 MAC 6470.0227.0a89 - profile PEAPProfile
*Sep 19 07:00:21.435: dot1x-ev:[6470.0227.0a89, Ca0] Override cfg -
 SuppTimeout 30s, ReAuthMax 2, MaxReq 2, TxPeriod 30s
*Sep 19 07:00:21.435: dot1x-ev:[6470.0227.0a89, Ca0] Sending create new
 context event to EAP for 0x60000009 (6470.0227.0a89)

*Sep 19 07:00:21.435: EAP-EVENT: Received context create from LL
 (Dot1x-Authenticator) (0x60000009)
*Sep 19 07:00:21.436: EAP-AUTH-EVENT: Received AAA ID 0x0000001F from LL
*Sep 19 07:00:21.436: EAP-AUTH-AAA-EVENT: Assigning AAA ID 0x0000001F
*Sep 19 07:00:21.436: EAP-AUTH-EVENT: Received Session ID
 "c0a82104523aa0a30000001f" from LL
*Sep 19 07:00:21.436: EAP-AUTH-EVENT: Setting authentication mode:
 Passthrough
*Sep 19 07:00:21.436: EAP-EVENT: Using EAP profile "PEAPProfile"
 (handle 0x26000052)

*Sep 19 07:00:21.436:     eap_authen : initial state eap_auth_initialize
 has enter
*Sep 19 07:00:21.436: EAP-EVENT: Allocated new EAP context
 (handle = 0x26000052)
*Sep 19 07:00:21.436: dot1x-sm:[6470.0227.0a89, Ca0] Posting
 !EAP_RESTART on Client 0x60000009
*Sep 19 07:00:21.436:     dot1x_auth Ca0: during state auth_restart, got
 event 6(no_eapRestart)
*Sep 19 07:00:21.436: @@@ dot1x_auth Ca0: auth_restart -> auth_connecting
*Sep 19 07:00:21.436: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:enter
 connecting state
*Sep 19 07:00:21.436: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009: restart
 connecting
*Sep 19 07:00:21.436: EAP-EVENT: Received EAP event
 'EAP_AUTHENTICATOR_START' on handle 0x26000052
*Sep 19 07:00:21.436:     eap_authen : during state eap_auth_initialize,
 got event 25(eapStartTmo)
*Sep 19 07:00:21.436: @@@ eap_authen : eap_auth_initialize ->
 eap_auth_select_action
*Sep 19 07:00:21.436:     eap_authen : during state eap_auth_select_action,
 got event 20(eapDecisionPropose)
*Sep 19 07:00:21.436: @@@ eap_authen : eap_auth_select_action ->
 eap_auth_propose_method
*Sep 19 07:00:21.436:     eap_authen : idle during state
 eap_auth_propose_method
*Sep 19 07:00:21.436: @@@ eap_authen : eap_auth_propose_method ->
 eap_auth_method_request
*Sep 19 07:00:21.436:     eap_authen : idle during state
 eap_auth_method_request
*Sep 19 07:00:21.436: @@@ eap_authen : eap_auth_method_request ->
 eap_auth_tx_packet
*Sep 19 07:00:21.436: EAP-AUTH-EVENT: Current method = Identity
*Sep 19 07:00:21.436: EAP-EVENT: Sending LL (Dot1x-Authenticator) event
 'EAP_CUSTOMIZE_ID_REQUEST' on handle 0x26000052
*Sep 19 07:00:21.436:     eap_authen : idle during state eap_auth_tx_packet
*Sep 19 07:00:21.437: @@@ eap_authen : eap_auth_tx_packet -> eap_auth_idle
*Sep 19 07:00:21.437: EAP-AUTH-TX-PAK: Code:REQUEST  ID:0xA   Length:0x0047
 Type:IDENTITY

*Sep 19 07:00:21.437:     Payload:  006E6574776F726B69643D546961676F ...
*Sep 19 07:00:21.437: EAP-EVENT: Started 'Authenticator ReqId Retransmit'
 timer (30s) for EAP sesion handle 0x26000052
*Sep 19 07:00:21.437: EAP-EVENT: Started EAP tick timer
*Sep 19 07:00:21.437: EAP-EVENT: Sending LL (Dot1x-Authenticator) event
 'EAP_TX_PACKET' on handle 0x26000052
*Sep 19 07:00:21.437: dot1x-sm:[6470.0227.0a89, Ca0] Posting RX_REQ on Client
 0x60000009
*Sep 19 07:00:21.437:     dot1x_auth Ca0: during state auth_connecting, got
 event 10(eapReq_no_reAuthMax)
*Sep 19 07:00:21.437: @@@ dot1x_auth Ca0: auth_connecting ->
 auth_authenticating
*Sep 19 07:00:21.437: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:
 authenticating state entered
*Sep 19 07:00:21.437: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:connecting
 authenticating action
*Sep 19 07:00:21.437: dot1x-sm:[6470.0227.0a89, Ca0] Posting AUTH_START for
 0x60000009
*Sep 19 07:00:21.437:     dot1x_auth_bend Ca0: during state auth_bend_idle,
 got event 4(eapReq_authStart)
*Sep 19 07:00:21.437: @@@ dot1x_auth_bend Ca0: auth_bend_idle ->
 auth_bend_request
*Sep 19 07:00:21.437: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:entering
 request state
*Sep 19 07:00:21.437: dot1x-ev:[6470.0227.0a89, Ca0] Sending EAPOL packet
*Sep 19 07:00:21.437: dot1x-packet:[6470.0227.0a89, Ca0] Platform changed
 src mac  of EAPOL packet
*Sep 19 07:00:21.438: dot1x-registry:registry:dot1x_ether_macaddr called
*Sep 19 07:00:21.438: dot1x-packet:EAPOL pak Tx - Ver: 0x3  type: 0x0
*Sep 19 07:00:21.438: dot1x-packet: length: 0x0047
*Sep 19 07:00:21.438: dot1x-packet:EAP code: 0x1  id: 0xA  length: 0x0047
*Sep 19 07:00:21.438: dot1x-packet: type: 0x1
*Sep 19 07:00:21.438: dot1x-packet:[6470.0227.0a89, Ca0] EAPOL packet sent
 to client 0x60000009
*Sep 19 07:00:21.438: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:idle request
 action
*Sep 19 07:00:22.149: dot1x-packet:[6470.0227.0a89, Ca0] Queuing an EAPOL
 pkt on Authenticator Q
*Sep 19 07:00:22.149: dot1x-packet:EAPOL pak rx - Ver: 0x3  type: 0x0
*Sep 19 07:00:22.149: dot1x-packet: length: 0x000A
*Sep 19 07:00:22.149: dot1x-ev:[Ca0] Dequeued pkt: Int Ca0 CODE= 2,TYPE= 1,
 LEN= 10

*Sep 19 07:00:22.149: dot1x-ev:[Ca0] Received pkt saddr =6470.0227.0a89,
 daddr = 64d8.146f.e5a0, pae-ether-type = 888e.0300.000a
*Sep 19 07:00:22.149: dot1x-packet:EAPOL pak rx - Ver: 0x3  type: 0x0
*Sep 19 07:00:22.150: dot1x-packet: length: 0x000A
*Sep 19 07:00:22.150: dot1x-sm:[6470.0227.0a89, Ca0] Posting EAPOL_EAP for
 0x60000009
*Sep 19 07:00:22.150:     dot1x_auth_bend Ca0: during state
 auth_bend_request, got event 6(eapolEap)
*Sep 19 07:00:22.150: @@@ dot1x_auth_bend Ca0: auth_bend_request ->
 auth_bend_response
*Sep 19 07:00:22.150: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:entering
 response state
*Sep 19 07:00:22.150: dot1x-ev:[6470.0227.0a89, Ca0] Response sent to the
 server from 0x60000009
*Sep 19 07:00:22.150: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:request
 response action
*Sep 19 07:00:22.150: EAP-EVENT: Received LL (Dot1x-Authenticator) event
 'EAP_RX_PACKET' on handle 0x26000052
*Sep 19 07:00:22.150: EAP-AUTH-RX-PAK: Code:RESPONSE ID:0xA Length:0x000A
 Type:IDENTITY
*Sep 19 07:00:22.150:     Payload:  746961676F
*Sep 19 07:00:22.150:     eap_authen : during state eap_auth_idle, got
 event 1(eapRxPacket)
*Sep 19 07:00:22.150: @@@ eap_authen : eap_auth_idle -> eap_auth_received
*Sep 19 07:00:22.150: EAP-AUTH-EVENT: EAP Response received by context
 0x26000052
*Sep 19 07:00:22.150: EAP-AUTH-EVENT: EAP Response type = Identity
*Sep 19 07:00:22.150: EAP-EVENT: Stopping 'Authenticator ReqId Retransmit'
 timer for EAP sesion handle 0x26000052
*Sep 19 07:00:22.150:     eap_authen : during state eap_auth_received, got
 event 10(eapMethodData)
*Sep 19 07:00:22.150: @@@ eap_authen : eap_auth_received ->
 eap_auth_method_response
*Sep 19 07:00:22.151: EAP-AUTH-EVENT: Received peer identity: tiago
*Sep 19 07:00:22.151: EAP-EVENT: Sending LL (Dot1x-Authenticator) event
 'EAP_IDENTITY' on handle 0x26000052
*Sep 19 07:00:22.151:     eap_authen : during state
 eap_auth_method_response, got event 13(eapMethodEnd)
*Sep 19 07:00:22.151: @@@ eap_authen : eap_auth_method_response ->
 eap_auth_select_action
*Sep 19 07:00:22.151:     eap_authen : during state eap_auth_select_action,
 got event 19(eapDecisionPass)
*Sep 19 07:00:22.151: @@@ eap_authen : eap_auth_select_action ->
 eap_auth_passthru_init
*Sep 19 07:00:22.151:     eap_authen : during state eap_auth_passthru_init,
 got event 22(eapPthruIdentity)
*Sep 19 07:00:22.151: @@@ eap_authen : eap_auth_passthru_init ->
 eap_auth_aaa_req
*Sep 19 07:00:22.151: EAP-EVENT: Sending LL (Dot1x-Authenticator) event
 'EAP_GET_PEER_MAC_ADDRESS' on handle 0x26000052
*Sep 19 07:00:22.151: EAP-AUTH-AAA-EVENT: Adding Audit-Session-ID
 "c0a82104523aa0a30000001f" to RADIUS Req
*Sep 19 07:00:22.151: EAP-AUTH-AAA-EVENT: Added Audit-Session-ID
*Sep 19 07:00:22.151: EAP-AUTH-AAA-EVENT: Adding IDB "0x38167B5C" to
 RADIUS Req
*Sep 19 07:00:22.151: EAP-AUTH-AAA-EVENT: Added IDB
*Sep 19 07:00:22.151: EAP-AUTH-AAA-EVENT: Adding EAP profile name
 "PEAPProfile" to RADIUS Req
*Sep 19 07:00:22.151: EAP-AUTH-AAA-EVENT: Added EAP profile name to request
*Sep 19 07:00:22.151: EAP-EVENT: Sending LL (Dot1x-Authenticator) event
 'EAP_CUSTOMIZE_AAA_REQUEST' on handle 0x26000052
*Sep 19 07:00:22.151: EAP-AUTH-AAA-EVENT: eap_auth_aaa_authen_request_shim
 aaa_service 19, eap aaa_list handle 0, mlist handle 0
*Sep 19 07:00:22.151: EAP-AUTH-AAA-EVENT: Request sent successfully
*Sep 19 07:00:22.151:     eap_authen : during state eap_auth_aaa_req, got
 event 24(eapAAAReqOk)
*Sep 19 07:00:22.151: @@@ eap_authen : eap_auth_aaa_req ->
 eap_auth_aaa_idle
*Sep 19 07:00:22.152: EAP-EVENT: Received context create from LL
 (AAA_LOCAL_EAP) (0x00000019)
*Sep 19 07:00:22.152: EAP-AUTH-EVENT: Setting authentication mode: Local
*Sep 19 07:00:22.152: EAP-EVENT: Using EAP profile "PEAPProfile"
 (handle 0xCE000053)
*Sep 19 07:00:22.152:     eap_authen : initial state eap_auth_initialize
 has enter
*Sep 19 07:00:22.152:     eap_authen : during state eap_auth_initialize,
 got event 25(eapStartTmo)
*Sep 19 07:00:22.152: @@@ eap_authen : eap_auth_initialize ->
 eap_auth_select_action
*Sep 19 07:00:22.152:     eap_authen : during state eap_auth_select_action,
 got event 20(eapDecisionPropose)
*Sep 19 07:00:22.152: @@@ eap_authen : eap_auth_select_action ->
 eap_auth_propose_method
*Sep 19 07:00:22.152:     eap_authen : idle during state
 eap_auth_propose_method
*Sep 19 07:00:22.152: @@@ eap_authen : eap_auth_propose_method ->
 eap_auth_method_request
*Sep 19 07:00:22.152:     eap_authen : during state eap_auth_method_request,
 got event 21(eapDecisionWait)
*Sep 19 07:00:22.152: @@@ eap_authen : eap_auth_method_request ->
 eap_auth_idle
*Sep 19 07:00:22.152: EAP-EVENT: Allocated new EAP context
 (handle = 0xCE000053)
*Sep 19 07:00:22.152: EAP-EVENT: Received LL (AAA_LOCAL_EAP) event
 'EAP_RX_PACKET' on handle 0xCE000053

*Sep 19 07:00:22.152: EAP-AUTH-RX-PAK: Code:RESPONSE ID:0xA Length:0x000A
 Type:IDENTITY
*Sep 19 07:00:22.152:     Payload:  746961676F
*Sep 19 07:00:22.152:     eap_authen : during state eap_auth_idle, got event
 1(eapRxPacket)
*Sep 19 07:00:22.152: @@@ eap_authen : eap_auth_idle -> eap_auth_received
*Sep 19 07:00:22.152: EAP-AUTH-EVENT: EAP Response received by context
 0xCE000053
*Sep 19 07:00:22.152: EAP-AUTH-EVENT: EAP Response type = Identity
*Sep 19 07:00:22.152:     eap_authen : during state eap_auth_received, got
 event 10(eapMethodData)
*Sep 19 07:00:22.152: @@@ eap_authen : eap_auth_received ->
 eap_auth_method_response
*Sep 19 07:00:22.152: EAP-AUTH-EVENT: Received peer identity: tiago
*Sep 19 07:00:22.153:     eap_authen : during state eap_auth_method_response
 got event 13(eapMethodEnd)
*Sep 19 07:00:22.153: @@@ eap_authen : eap_auth_method_response ->
 eap_auth_select_action
*Sep 19 07:00:22.153: EAP-AUTH-EVENT: Using authentication mode: Local
*Sep 19 07:00:22.153: EAP-EVENT: Local methods by EAP type: [025 026]
*Sep 19 07:00:22.153:     eap_authen : during state eap_auth_select_action,
 got event 20(eapDecisionPropose)
*Sep 19 07:00:22.153: @@@ eap_authen : eap_auth_select_action ->
 eap_auth_propose_method
*Sep 19 07:00:22.153:     eap_authen : idle during state
 eap_auth_propose_method
*Sep 19 07:00:22.153: @@@ eap_authen : eap_auth_propose_method ->
 eap_auth_method_request
*Sep 19 07:00:22.153: EAP-AUTH-EVENT: Maximum EAP packet size: 1456
*Sep 19 07:00:22.153: EAP-EVENT: Sending method (PEAP) event 'New Context'
 on handle 0xCE000053

*Sep 19 07:00:22.153: EAP-EVENT: Sending method (PEAP) event 'Receive Packet'
 on handle 0xCE000053
*Sep 19 07:00:22.153: EAP-AUTH-EVENT: Waiting for asynchronous reply from
 method (PEAP)
*Sep 19 07:00:22.153:     eap_authen : during state eap_auth_method_request,
 got event 15(eapMethodWaitReply)
*Sep 19 07:00:22.153: @@@ eap_authen : eap_auth_method_request ->
 eap_auth_idle
*Sep 19 07:00:22.154: EAP-EVENT: Received Method (PEAP) event
 'EAP_METHOD_REPLY' on handle 0xCE000053
*Sep 19 07:00:22.154:     eap_authen : during state eap_auth_idle, got event
 4(eapMethodReply)
*Sep 19 07:00:22.154: @@@ eap_authen : eap_auth_idle ->
 eap_auth_method_response
*Sep 19 07:00:22.154: EAP-AUTH-EVENT: Handling asynchronous method response
 for context 0xCE000053
*Sep 19 07:00:22.154: EAP-AUTH-EVENT: EAP method state: Continue
*Sep 19 07:00:22.154: EAP-AUTH-EVENT: EAP method decision: Unknown
*Sep 19 07:00:22.154:     eap_authen : during state eap_auth_method_response,
 got event 14(eapMethodContinue)
*Sep 19 07:00:22.154: @@@ eap_authen : eap_auth_method_response ->
 eap_auth_method_request
*Sep 19 07:00:22.154:     eap_authen : idle during state
 eap_auth_method_request
*Sep 19 07:00:22.154: @@@ eap_authen : eap_auth_method_request ->
 eap_auth_tx_packet
*Sep 19 07:00:22.154: EAP-AUTH-EVENT: Current method = 25
*Sep 19 07:00:22.154:     eap_authen : idle during state eap_auth_tx_packet
*Sep 19 07:00:22.154: @@@ eap_authen : eap_auth_tx_packet -> eap_auth_idle
*Sep 19 07:00:22.154: EAP-AUTH-TX-PAK: Code:REQUEST  ID:0xB   Length:0x0006
 Type:PEAP
*Sep 19 07:00:22.154:     Payload:  21
*Sep 19 07:00:22.154: EAP-EVENT: Sending LL (AAA_LOCAL_EAP) event
 'EAP_TX_PACKET' on handle 0xCE000053
*Sep 19 07:00:22.154: EAP-EVENT: eap_aaa_reply
*Sep 19 07:00:22.154: EAP-AUTH-AAA-EVENT: Reply received session_label
 BB000020
*Sep 19 07:00:22.154: EAP-AUTH-AAA-EVENT: Response contains EAP Message,
 code: 1
*Sep 19 07:00:22.155: EAP-EVENT: Received AAA event 'EAP_AAA_RX_PACKET' on
 handle 0x26000052
*Sep 19 07:00:22.155: EAP-AUTH-RX-AAA-PAK: Code:REQUEST ID:0xB Length:0x0006
 Type:PEAP
*Sep 19 07:00:22.155:     Payload:  21
*Sep 19 07:00:22.155:     eap_authen : during state eap_auth_aaa_idle, got
 event 5(eapAAARxPacket)
*Sep 19 07:00:22.155: @@@ eap_authen : eap_auth_aaa_idle ->
 eap_auth_aaa_resp
*Sep 19 07:00:22.155:     eap_authen : idle during state eap_auth_aaa_resp
*Sep 19 07:00:22.155: @@@ eap_authen : eap_auth_aaa_resp ->
 eap_auth_tx_packet2
*Sep 19 07:00:22.155: EAP-AUTH-EVENT: Current method = 25
*Sep 19 07:00:22.155:     eap_authen : idle during state eap_auth_tx_packet2
*Sep 19 07:00:22.155: @@@ eap_authen : eap_auth_tx_packet2 -> eap_auth_idle2
*Sep 19 07:00:22.155: EAP-AUTH-TX-PAK: Code:REQUEST  ID:0xB   Length:0x0006
 Type:PEAP

*Sep 19 07:00:22.155:     Payload:  21
*Sep 19 07:00:22.155: EAP-EVENT: Started 'Authenticator Retransmit' timer
 (30s) for EAP sesion handle 0x26000052
*Sep 19 07:00:22.155: EAP-EVENT: Started EAP tick timer
*Sep 19 07:00:22.155: EAP-EVENT: Sending LL (Dot1x-Authenticator) event
 'EAP_TX_PACKET' on handle 0x26000052
*Sep 19 07:00:22.155: dot1x-sm:[6470.0227.0a89, Ca0] Posting EAP_REQ for
 0x60000009
*Sep 19 07:00:22.155:     dot1x_auth_bend Ca0: during state
 auth_bend_response, got event 7(eapReq)
*Sep 19 07:00:22.155: @@@ dot1x_auth_bend Ca0: auth_bend_response ->
 auth_bend_request
*Sep 19 07:00:22.155: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:exiting
 response state
*Sep 19 07:00:22.155: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:entering
 request state
*Sep 19 07:00:22.155: dot1x-ev:[6470.0227.0a89, Ca0] Sending EAPOL packet
*Sep 19 07:00:22.155: dot1x-packet:[6470.0227.0a89, Ca0] Platform changed
 src mac  of EAPOL packet
*Sep 19 07:00:22.155: dot1x-registry:registry:dot1x_ether_macaddr called
*Sep 19 07:00:22.155: dot1x-packet:EAPOL pak Tx - Ver: 0x3  type: 0x0
*Sep 19 07:00:22.155: dot1x-packet: length: 0x0006
*Sep 19 07:00:22.155: dot1x-packet:EAP code: 0x1  id: 0xB  length: 0x0006
*Sep 19 07:00:22.155: dot1x-packet: type: 0x19
*Sep 19 07:00:22.156: dot1x-packet:[6470.0227.0a89, Ca0] EAPOL packet sent
 to client 0x60000009
*Sep 19 07:00:22.156: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:response
 request action
*Sep 19 07:00:22.395: dot1x-packet:[6470.0227.0a89, Ca0] Queuing an EAPOL
 pkt on Authenticator Q
*Sep 19 07:00:22.395: dot1x-packet:EAPOL pak rx - Ver: 0x3  type: 0x0
*Sep 19 07:00:22.395: dot1x-packet: length: 0x0098
*Sep 19 07:00:22.395: dot1x-ev:[Ca0] Dequeued pkt: Int Ca0 CODE= 2,TYPE= 25,
 LEN= 152

*Sep 19 07:00:22.396: dot1x-ev:[Ca0] Received pkt saddr =6470.0227.0a89 ,
 daddr = 64d8.146f.e5a0, pae-ether-type = 888e.0300.0098
*Sep 19 07:00:22.396: dot1x-packet:EAPOL pak rx - Ver: 0x3  type: 0x0
*Sep 19 07:00:22.396: dot1x-packet: length: 0x0098
*Sep 19 07:00:22.396: dot1x-sm:[6470.0227.0a89, Ca0] Posting EAPOL_EAP for
 0x60000009
*Sep 19 07:00:22.396:     dot1x_auth_bend Ca0: during state
 auth_bend_request, got event 6(eapolEap)
*Sep 19 07:00:22.396: @@@ dot1x_auth_bend Ca0: auth_bend_request ->
 auth_bend_response
*Sep 19 07:00:22.396: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:entering
 response state
*Sep 19 07:00:22.396: dot1x-ev:[6470.0227.0a89, Ca0] Response sent to the
 server from 0x60000009
*Sep 19 07:00:22.396: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:request
 response action
*Sep 19 07:00:22.396: EAP-EVENT: Received LL (Dot1x-Authenticator) event
 'EAP_RX_PACKET' on handle 0x26000052
*Sep 19 07:00:22.396: EAP-AUTH-RX-PAK: Code:RESPONSE ID:0xB Length:0x0098
 Type:PEAP
*Sep 19 07:00:22.396:     Payload:  810000008E1603010089010000850301 ...
*Sep 19 07:00:22.396:     eap_authen : during state eap_auth_idle2, got
 event 1(eapRxPacket)
*Sep 19 07:00:22.396: @@@ eap_authen : eap_auth_idle2 -> eap_auth_received2
*Sep 19 07:00:22.396: EAP-AUTH-EVENT: EAP Response received by context
 0x26000052
*Sep 19 07:00:22.396: EAP-AUTH-EVENT: EAP Response type = Method (25)
*Sep 19 07:00:22.396: EAP-EVENT: Stopping 'Authenticator Retransmit' timer
 for EAP sesion handle 0x26000052
*Sep 19 07:00:22.396:     eap_authen : during state eap_auth_received2, got
 event 10(eapMethodData)
*Sep 19 07:00:22.397: @@@ eap_authen : eap_auth_received2->eap_auth_aaa_req
*Sep 19 07:00:22.397: EAP-AUTH-AAA-EVENT: Adding Audit-Session-ID
 "c0a82104523aa0a30000001f" to RADIUS Req
*Sep 19 07:00:22.397: EAP-AUTH-AAA-EVENT: Added Audit-Session-ID
*Sep 19 07:00:22.397: EAP-AUTH-AAA-EVENT: Adding IDB "0x38167B5C" to
 RADIUS Req
*Sep 19 07:00:22.397: EAP-AUTH-AAA-EVENT: Added IDB
*Sep 19 07:00:22.397: EAP-AUTH-AAA-EVENT: Adding EAP profile name
 "PEAPProfile" to RADIUS Req
*Sep 19 07:00:22.397: EAP-AUTH-AAA-EVENT: Added EAP profile name to request
*Sep 19 07:00:22.397: EAP-EVENT: Sending LL (Dot1x-Authenticator) event
 'EAP_CUSTOMIZE_AAA_REQUEST' on handle 0x26000052
*Sep 19 07:00:22.397: EAP-AUTH-AAA-EVENT: eap_auth_aaa_authen_request_shim
 aaa_service 19, eap aaa_list handle 0, mlist handle 0
*Sep 19 07:00:22.397: EAP-AUTH-AAA-EVENT: Request sent successfully
*Sep 19 07:00:22.397:     eap_authen : during state eap_auth_aaa_req, got
 event 24(eapAAAReqOk)
*Sep 19 07:00:22.397: @@@ eap_authen : eap_auth_aaa_req -> eap_auth_aaa_idle
*Sep 19 07:00:22.397: EAP-EVENT: Received LL (AAA_LOCAL_EAP) event
 'EAP_RX_PACKET' on handle 0xCE000053
*Sep 19 07:00:22.398: EAP-AUTH-RX-PAK: Code:RESPONSE  ID:0xB  Length:0x0098
 Type:PEAP
*Sep 19 07:00:22.398:     Payload:  810000008E1603010089010000850301 ...
*Sep 19 07:00:22.398:     eap_authen : during state eap_auth_idle, got event
 1(eapRxPacket)
*Sep 19 07:00:22.398: @@@ eap_authen : eap_auth_idle -> eap_auth_received
*Sep 19 07:00:22.398: EAP-AUTH-EVENT: EAP Response received by context
 0xCE000053
*Sep 19 07:00:22.398: EAP-AUTH-EVENT: EAP Response type = Method (25)
*Sep 19 07:00:22.398:     eap_authen : during state eap_auth_received, got
 event 10(eapMethodData)
*Sep 19 07:00:22.398: @@@ eap_authen : eap_auth_received ->
 eap_auth_method_response
*Sep 19 07:00:22.398: EAP-EVENT: Sending method (PEAP) event 'Receive Packet'
 on handle 0xCE000053
*Sep 19 07:00:22.398: EAP-AUTH-EVENT: Waiting for asynchronous reply from
 method (PEAP)
*Sep 19 07:00:22.398:     eap_authen : during state eap_auth_method_response,
 got event 15(eapMethodWaitReply)
*Sep 19 07:00:22.398: @@@ eap_authen : eap_auth_method_response ->
 eap_auth_idle
*Sep 19 07:00:22.399: EAP-EVENT: Received Method (PEAP) event
 'EAP_METHOD_REPLY' on handle 0xCE000053
*Sep 19 07:00:22.399:     eap_authen : during state eap_auth_idle, got event
 4(eapMethodReply)
*Sep 19 07:00:22.399: @@@ eap_authen : eap_auth_idle ->
 eap_auth_method_response
*Sep 19 07:00:22.399: EAP-AUTH-EVENT: Handling asynchronous method response
 for context 0xCE000053
*Sep 19 07:00:22.399: EAP-AUTH-EVENT: EAP method state: Continue
*Sep 19 07:00:22.399: EAP-AUTH-EVENT: EAP method decision: Unknown
*Sep 19 07:00:22.399:     eap_authen : during state eap_auth_method_response,
 got event 14(eapMethodContinue)
*Sep 19 07:00:22.399: @@@ eap_authen : eap_auth_method_response ->
 eap_auth_method_request
*Sep 19 07:00:22.399:     eap_authen : idle during state
 eap_auth_method_request
*Sep 19 07:00:22.399: @@@ eap_authen : eap_auth_method_request ->
 eap_auth_tx_packet
*Sep 19 07:00:22.399: EAP-AUTH-EVENT: Current method = 25
*Sep 19 07:00:22.399:     eap_authen : idle during state eap_auth_tx_packet
*Sep 19 07:00:22.399: @@@ eap_authen : eap_auth_tx_packet -> eap_auth_idle
*Sep 19 07:00:22.399: EAP-AUTH-TX-PAK: Code:REQUEST  ID:0xC   Length:0x02B1
 Type:PEAP
*Sep 19 07:00:22.399:     Payload:  81000002A7160301004A020000460301 ...
*Sep 19 07:00:22.399: EAP-EVENT: Sending LL (AAA_LOCAL_EAP) event
 'EAP_TX_PACKET' on handle 0xCE000053
*Sep 19 07:00:22.399: EAP-EVENT: eap_aaa_reply
*Sep 19 07:00:22.400: EAP-AUTH-AAA-EVENT: Reply received session_label
 BB000020
*Sep 19 07:00:22.400: EAP-AUTH-AAA-EVENT: Response contains EAP Message,
 code: 1
*Sep 19 07:00:22.400: EAP-EVENT: Received AAA event 'EAP_AAA_RX_PACKET' on
 handle 0x26000052
*Sep 19 07:00:22.400: EAP-AUTH-RX-AAA-PAK: Code:REQUEST ID:0xC Length:0x02B1
 Type:PEAP
*Sep 19 07:00:22.400:     Payload:  81000002A7160301004A020000460301 ...
*Sep 19 07:00:22.400:     eap_authen : during state eap_auth_aaa_idle, got
 event 5(eapAAARxPacket)
*Sep 19 07:00:22.400: @@@ eap_authen : eap_auth_aaa_idle ->
 eap_auth_aaa_resp
*Sep 19 07:00:22.400:     eap_authen : idle during state eap_auth_aaa_resp
*Sep 19 07:00:22.400: @@@ eap_authen : eap_auth_aaa_resp ->
 eap_auth_tx_packet2
*Sep 19 07:00:22.400: EAP-AUTH-EVENT: Current method = 25
*Sep 19 07:00:22.400:     eap_authen : idle during state eap_auth_tx_packet2
*Sep 19 07:00:22.400: @@@ eap_authen : eap_auth_tx_packet2 -> eap_auth_idle2
*Sep 19 07:00:22.400: EAP-AUTH-TX-PAK: Code:REQUEST  ID:0xC   Length:0x02B1
 Type:PEAP
*Sep 19 07:00:22.400:     Payload:  81000002A7160301004A020000460301 ...
*Sep 19 07:00:22.400: EAP-EVENT: Started 'Authenticator Retransmit' timer
 (30s) for EAP sesion handle 0x26000052
*Sep 19 07:00:22.400: EAP-EVENT: Started EAP tick timer
*Sep 19 07:00:22.400: EAP-EVENT: Sending LL (Dot1x-Authenticator) event
 'EAP_TX_PACKET' on handle 0x26000052
*Sep 19 07:00:22.400: dot1x-sm:[6470.0227.0a89, Ca0] Posting EAP_REQ for
 0x60000009
*Sep 19 07:00:22.400:     dot1x_auth_bend Ca0: during state
 auth_bend_response, got event 7(eapReq)
*Sep 19 07:00:22.400: @@@ dot1x_auth_bend Ca0: auth_bend_response ->
 auth_bend_request
*Sep 19 07:00:22.400: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:exiting
 response state
*Sep 19 07:00:22.400: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:entering
 request state
*Sep 19 07:00:22.400: dot1x-ev:[6470.0227.0a89, Ca0] Sending EAPOL packet
*Sep 19 07:00:22.401: dot1x-packet:[6470.0227.0a89, Ca0] Platform changed
 src mac  of EAPOL packet
*Sep 19 07:00:22.401: dot1x-registry:registry:dot1x_ether_macaddr called
*Sep 19 07:00:22.401: dot1x-packet:EAPOL pak Tx - Ver: 0x3  type: 0x0
*Sep 19 07:00:22.401: dot1x-packet: length: 0x02B1
*Sep 19 07:00:22.401: dot1x-packet:EAP code: 0x1  id: 0xC  length: 0x02B1
*Sep 19 07:00:22.401: dot1x-packet: type: 0x19
*Sep 19 07:00:22.401: dot1x-packet:[6470.0227.0a89, Ca0] EAPOL packet sent
 to client 0x60000009
*Sep 19 07:00:22.401: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:response
 request action
*Sep 19 07:00:22.646: dot1x-packet:[6470.0227.0a89, Ca0] Queuing an EAPOL
 pkt on Authenticator Q
*Sep 19 07:00:22.646: dot1x-packet:EAPOL pak rx - Ver: 0x3  type: 0x0
*Sep 19 07:00:22.646: dot1x-packet: length: 0x00C8
*Sep 19 07:00:22.646: dot1x-ev:[Ca0] Dequeued pkt: Int Ca0 CODE= 2,TYPE= 25,
 LEN= 200

*Sep 19 07:00:22.646: dot1x-ev:[Ca0] Received pkt saddr =6470.0227.0a89 ,
 daddr = 64d8.146f.e5a0, pae-ether-type = 888e.0300.00c8
*Sep 19 07:00:22.646: dot1x-packet:EAPOL pak rx - Ver: 0x3  type: 0x0
*Sep 19 07:00:22.646: dot1x-packet: length: 0x00C8
*Sep 19 07:00:22.647: dot1x-sm:[6470.0227.0a89, Ca0] Posting EAPOL_EAP for
 0x60000009
*Sep 19 07:00:22.647:     dot1x_auth_bend Ca0: during state
 auth_bend_request, got event 6(eapolEap)
*Sep 19 07:00:22.647: @@@ dot1x_auth_bend Ca0: auth_bend_request ->
 auth_bend_response
*Sep 19 07:00:22.647: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:entering
 response state
*Sep 19 07:00:22.647: dot1x-ev:[6470.0227.0a89, Ca0] Response sent to the
 server from 0x60000009
*Sep 19 07:00:22.647: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:request
 response action
*Sep 19 07:00:22.647: EAP-EVENT: Received LL (Dot1x-Authenticator) event
 'EAP_RX_PACKET' on handle 0x26000052
*Sep 19 07:00:22.647: EAP-AUTH-RX-PAK: Code:RESPONSE ID:0xC Length:0x00C8
 Type:PEAP
*Sep 19 07:00:22.647:     Payload:  81000000BE1603010086100000820080 ...
*Sep 19 07:00:22.647:     eap_authen : during state eap_auth_idle2, got
 event 1(eapRxPacket)
*Sep 19 07:00:22.647: @@@ eap_authen : eap_auth_idle2 -> eap_auth_received2
*Sep 19 07:00:22.647: EAP-AUTH-EVENT: EAP Response received by context
 0x26000052
*Sep 19 07:00:22.647: EAP-AUTH-EVENT: EAP Response type = Method (25)
*Sep 19 07:00:22.647: EAP-EVENT: Stopping 'Authenticator Retransmit' timer
 for EAP sesion handle 0x26000052
*Sep 19 07:00:22.647:     eap_authen : during state eap_auth_received2, got
 event 10(eapMethodData)
*Sep 19 07:00:22.647: @@@ eap_authen : eap_auth_received2 ->
 eap_auth_aaa_req
*Sep 19 07:00:22.647: EAP-AUTH-AAA-EVENT: Adding Audit-Session-ID
 "c0a82104523aa0a30000001f" to RADIUS Req
*Sep 19 07:00:22.647: EAP-AUTH-AAA-EVENT: Added Audit-Session-ID
*Sep 19 07:00:22.647: EAP-AUTH-AAA-EVENT: Adding IDB "0x38167B5C" to
 RADIUS Req
*Sep 19 07:00:22.647: EAP-AUTH-AAA-EVENT: Added IDB
*Sep 19 07:00:22.648:
 EAP-AUTH-AAA-EVENT: Adding EAP profile name "PEAPProfile" to RADIUS Req
*Sep 19 07:00:22.648: EAP-AUTH-AAA-EVENT: Added EAP profile name to request
*Sep 19 07:00:22.648: EAP-EVENT: Sending LL (Dot1x-Authenticator) event
 'EAP_CUSTOMIZE_AAA_REQUEST' on handle 0x26000052
*Sep 19 07:00:22.648: EAP-AUTH-AAA-EVENT: eap_auth_aaa_authen_request_shim
 aaa_service 19, eap aaa_list handle 0, mlist handle 0
*Sep 19 07:00:22.648: EAP-AUTH-AAA-EVENT: Request sent successfully
*Sep 19 07:00:22.648:     eap_authen : during state eap_auth_aaa_req, got
 event 24(eapAAAReqOk)
*Sep 19 07:00:22.648: @@@ eap_authen : eap_auth_aaa_req -> eap_auth_aaa_idle
*Sep 19 07:00:22.648: EAP-EVENT: Received LL (AAA_LOCAL_EAP) event
 'EAP_RX_PACKET' on handle 0xCE000053
*Sep 19 07:00:22.648: EAP-AUTH-RX-PAK: Code:RESPONSE  ID:0xC   Length:0x00C8
 Type:PEAP
*Sep 19 07:00:22.648:     Payload:  81000000BE1603010086100000820080 ...
*Sep 19 07:00:22.648:     eap_authen : during state eap_auth_idle, got event
 1(eapRxPacket)
*Sep 19 07:00:22.648: @@@ eap_authen : eap_auth_idle -> eap_auth_received
*Sep 19 07:00:22.648: EAP-AUTH-EVENT: EAP Response received by context
 0xCE000053
*Sep 19 07:00:22.648: EAP-AUTH-EVENT: EAP Response type = Method (25)
*Sep 19 07:00:22.649:     eap_authen : during state eap_auth_received, got
 event 10(eapMethodData)
*Sep 19 07:00:22.649: @@@ eap_authen : eap_auth_received ->
 eap_auth_method_response
*Sep 19 07:00:22.649: EAP-EVENT: Sending method (PEAP) event 'Receive Packet'
 on handle 0xCE000053
*Sep 19 07:00:22.649: EAP-AUTH-EVENT: Waiting for asynchronous reply from
 method (PEAP)
*Sep 19 07:00:22.649:     eap_authen : during state eap_auth_method_response,
 got event 15(eapMethodWaitReply)
*Sep 19 07:00:22.649: @@@ eap_authen : eap_auth_method_response ->
 eap_auth_idle
*Sep 19 07:00:22.675: EAP-EVENT: Received Method (PEAP) event
 'EAP_METHOD_REPLY' on handle 0xCE000053
*Sep 19 07:00:22.675:     eap_authen : during state eap_auth_idle, got
 event 4(eapMethodReply)
*Sep 19 07:00:22.675: @@@ eap_authen : eap_auth_idle ->
 eap_auth_method_response
*Sep 19 07:00:22.675: EAP-AUTH-EVENT: Handling asynchronous method response
 for context 0xCE000053
*Sep 19 07:00:22.675: EAP-AUTH-EVENT: EAP method state: Continue
*Sep 19 07:00:22.675: EAP-AUTH-EVENT: EAP method decision: Unknown
*Sep 19 07:00:22.675:     eap_authen : during state eap_auth_method_response,
 got event 14(eapMethodContinue)
*Sep 19 07:00:22.675: @@@ eap_authen : eap_auth_method_response ->
 eap_auth_method_request
*Sep 19 07:00:22.675:     eap_authen : idle during state
 eap_auth_method_request
*Sep 19 07:00:22.675: @@@ eap_authen : eap_auth_method_request ->
 eap_auth_tx_packet
*Sep 19 07:00:22.675: EAP-AUTH-EVENT: Current method = 25
*Sep 19 07:00:22.675:     eap_authen : idle during state eap_auth_tx_packet
*Sep 19 07:00:22.675: @@@ eap_authen : eap_auth_tx_packet -> eap_auth_idle
*Sep 19 07:00:22.675: EAP-AUTH-TX-PAK: Code:REQUEST  ID:0xD   Length:0x003D
 Type:PEAP
*Sep 19 07:00:22.676:     Payload:  81000000331403010001011603010028 ...
*Sep 19 07:00:22.676: EAP-EVENT: Sending LL (AAA_LOCAL_EAP) event
 'EAP_TX_PACKET' on handle 0xCE000053
*Sep 19 07:00:22.676: EAP-EVENT: eap_aaa_reply
*Sep 19 07:00:22.676: EAP-AUTH-AAA-EVENT: Reply received session_label
 BB000020
*Sep 19 07:00:22.676: EAP-AUTH-AAA-EVENT: Response contains EAP Message,
 code: 1
*Sep 19 07:00:22.676: EAP-EVENT: Received AAA event 'EAP_AAA_RX_PACKET' on
 handle 0x26000052
*Sep 19 07:00:22.676: EAP-AUTH-RX-AAA-PAK: Code:REQUEST ID:0xD Length:0x003D
 Type:PEAP
*Sep 19 07:00:22.676:     Payload:  81000000331403010001011603010028 ...
*Sep 19 07:00:22.676:     eap_authen : during state eap_auth_aaa_idle, got
 event 5(eapAAARxPacket)
*Sep 19 07:00:22.676: @@@ eap_authen : eap_auth_aaa_idle ->
 eap_auth_aaa_resp
*Sep 19 07:00:22.676:     eap_authen : idle during state eap_auth_aaa_resp
*Sep 19 07:00:22.676: @@@ eap_authen : eap_auth_aaa_resp ->
 eap_auth_tx_packet2
*Sep 19 07:00:22.676: EAP-AUTH-EVENT: Current method = 25
*Sep 19 07:00:22.676:     eap_authen : idle during state eap_auth_tx_packet2
*Sep 19 07:00:22.676: @@@ eap_authen : eap_auth_tx_packet2 -> eap_auth_idle2
*Sep 19 07:00:22.676: EAP-AUTH-TX-PAK: Code:REQUEST  ID:0xD   Length:0x003D
 Type:PEAP
*Sep 19 07:00:22.676:     Payload:  81000000331403010001011603010028 ...
*Sep 19 07:00:22.676: EAP-EVENT: Started 'Authenticator Retransmit' timer
 (30s) for EAP sesion handle 0x26000052
*Sep 19 07:00:22.676: EAP-EVENT: Started EAP tick timer
*Sep 19 07:00:22.676: EAP-EVENT: Sending LL (Dot1x-Authenticator) event
 'EAP_TX_PACKET' on handle 0x26000052
*Sep 19 07:00:22.677: dot1x-sm:[6470.0227.0a89, Ca0] Posting EAP_REQ for
 0x60000009
*Sep 19 07:00:22.677:     dot1x_auth_bend Ca0: during state
 auth_bend_response, got event 7(eapReq)
*Sep 19 07:00:22.677: @@@ dot1x_auth_bend Ca0: auth_bend_response ->
 auth_bend_request
*Sep 19 07:00:22.677: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:exiting
 response state
*Sep 19 07:00:22.677: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:entering
 request state
*Sep 19 07:00:22.677: dot1x-ev:[6470.0227.0a89, Ca0] Sending EAPOL packet
*Sep 19 07:00:22.677: dot1x-packet:[6470.0227.0a89, Ca0] Platform changed src
 mac  of EAPOL packet
*Sep 19 07:00:22.677: dot1x-registry:registry:dot1x_ether_macaddr called
*Sep 19 07:00:22.677: dot1x-packet:EAPOL pak Tx - Ver: 0x3  type: 0x0
*Sep 19 07:00:22.677: dot1x-packet: length: 0x003D
*Sep 19 07:00:22.677: dot1x-packet:EAP code: 0x1  id: 0xD  length: 0x003D
*Sep 19 07:00:22.677: dot1x-packet: type: 0x19
*Sep 19 07:00:22.677: dot1x-packet:[6470.0227.0a89, Ca0] EAPOL packet sent to
 client 0x60000009
*Sep 19 07:00:22.677: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:response
 request action
*Sep 19 07:00:22.902: dot1x-packet:[6470.0227.0a89, Ca0] Queuing an EAPOL
 pkt on Authenticator Q
*Sep 19 07:00:22.903: dot1x-packet:EAPOL pak rx - Ver: 0x3  type: 0x0
*Sep 19 07:00:22.903: dot1x-packet: length: 0x0006
*Sep 19 07:00:22.903: dot1x-ev:[Ca0] Dequeued pkt: Int Ca0 CODE= 2,TYPE= 25,
 LEN= 6

*Sep 19 07:00:22.903: dot1x-ev:[Ca0] Received pkt saddr =6470.0227.0a89 ,
 daddr = 64d8.146f.e5a0, pae-ether-type = 888e.0300.0006
*Sep 19 07:00:22.903: dot1x-packet:EAPOL pak rx - Ver: 0x3  type: 0x0
*Sep 19 07:00:22.903: dot1x-packet: length: 0x0006
*Sep 19 07:00:22.903: dot1x-sm:[6470.0227.0a89, Ca0] Posting EAPOL_EAP for
 0x60000009
*Sep 19 07:00:22.903:     dot1x_auth_bend Ca0: during state
 auth_bend_request, got event 6(eapolEap)
*Sep 19 07:00:22.903: @@@ dot1x_auth_bend Ca0: auth_bend_request ->
 auth_bend_response
*Sep 19 07:00:22.903: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:entering
 response state
*Sep 19 07:00:22.903: dot1x-ev:[6470.0227.0a89, Ca0] Response sent to the
 server from 0x60000009
*Sep 19 07:00:22.903: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:request
 response action
*Sep 19 07:00:22.904: EAP-EVENT: Received LL (Dot1x-Authenticator) event
 'EAP_RX_PACKET' on handle 0x26000052
*Sep 19 07:00:22.904: EAP-AUTH-RX-PAK: Code:RESPONSE  ID:0xD   Length:0x0006
 Type:PEAP
*Sep 19 07:00:22.904:     Payload:  01
*Sep 19 07:00:22.904:     eap_authen : during state eap_auth_idle2,got event
 1(eapRxPacket)
*Sep 19 07:00:22.904: @@@ eap_authen : eap_auth_idle2 -> eap_auth_received2
*Sep 19 07:00:22.904: EAP-AUTH-EVENT: EAP Response received by context
 0x26000052
*Sep 19 07:00:22.904: EAP-AUTH-EVENT: EAP Response type = Method (25)
*Sep 19 07:00:22.904: EAP-EVENT: Stopping 'Authenticator Retransmit' timer
 for EAP sesion handle 0x26000052
*Sep 19 07:00:22.904:     eap_authen : during state eap_auth_received2, got
 event 10(eapMethodData)
*Sep 19 07:00:22.904: @@@ eap_authen : eap_auth_received2 -> eap_auth_aaa_req
*Sep 19 07:00:22.904: EAP-AUTH-AAA-EVENT: Adding Audit-Session-ID
 "c0a82104523aa0a30000001f" to RADIUS Req
*Sep 19 07:00:22.904: EAP-AUTH-AAA-EVENT: Added Audit-Session-ID
*Sep 19 07:00:22.904: EAP-AUTH-AAA-EVENT: Adding IDB "0x38167B5C" to
 RADIUS Req
*Sep 19 07:00:22.904: EAP-AUTH-AAA-EVENT: Added IDB
*Sep 19 07:00:22.904: EAP-AUTH-AAA-EVENT: Adding EAP profile name
 "PEAPProfile" to RADIUS Req

*Sep 19 07:00:22.904: EAP-AUTH-AAA-EVENT: Added EAP profile name to request
*Sep 19 07:00:22.904: EAP-EVENT: Sending LL (Dot1x-Authenticator) event
 'EAP_CUSTOMIZE_AAA_REQUEST' on handle 0x26000052
*Sep 19 07:00:22.904: EAP-AUTH-AAA-EVENT: eap_auth_aaa_authen_request_shim
 aaa_service 19, eap aaa_list handle 0, mlist handle 0
*Sep 19 07:00:22.905: EAP-AUTH-AAA-EVENT: Request sent successfully
*Sep 19 07:00:22.905:     eap_authen : during state eap_auth_aaa_req, got
 event 24(eapAAAReqOk)
*Sep 19 07:00:22.905: @@@ eap_authen : eap_auth_aaa_req -> eap_auth_aaa_idle
*Sep 19 07:00:22.905: EAP-EVENT: Received LL (AAA_LOCAL_EAP) event
 'EAP_RX_PACKET' on handle 0xCE000053
*Sep 19 07:00:22.905: EAP-AUTH-RX-PAK: Code:RESPONSE ID:0xD Length:0x0006
 Type:PEAP
*Sep 19 07:00:22.905:     Payload:  01
*Sep 19 07:00:22.905:     eap_authen : during state eap_auth_idle, got event
 1(eapRxPacket)
*Sep 19 07:00:22.905: @@@ eap_authen : eap_auth_idle -> eap_auth_received
*Sep 19 07:00:22.905: EAP-AUTH-EVENT: EAP Response received by context
 0xCE000053
*Sep 19 07:00:22.905: EAP-AUTH-EVENT: EAP Response type = Method (25)
*Sep 19 07:00:22.905:     eap_authen : during state eap_auth_received, got
 event 10(eapMethodData)
*Sep 19 07:00:22.905: @@@ eap_authen : eap_auth_received ->
 eap_auth_method_response
*Sep 19 07:00:22.905: EAP-EVENT: Sending method (PEAP) event 'Receive Packet'
 on handle 0xCE000053
*Sep 19 07:00:22.905: EAP-EVENT: Received context create from LL (PEAP)
 (0x69000006)
*Sep 19 07:00:22.905: EAP-AUTH-EVENT: Setting authentication mode: Local
*Sep 19 07:00:22.905: EAP-EVENT: Using EAP profile "PEAP Inner Method EAP
 Profile" (handle 0x99000054)
*Sep 19 07:00:22.905:     eap_authen : initial state eap_auth_initialize has
 enter
*Sep 19 07:00:22.905: EAP-EVENT: Allocated new EAP context
 (handle = 0x99000054)
*Sep 19 07:00:22.906: EAP-AUTH-EVENT: Waiting for asynchronous reply from
 method (PEAP)
*Sep 19 07:00:22.906:     eap_authen : during state eap_auth_method_response,
 got event 15(eapMethodWaitReply)
*Sep 19 07:00:22.906: @@@ eap_authen : eap_auth_method_response ->
 eap_auth_idle
*Sep 19 07:00:22.906: EAP-EVENT: Received EAP event 'EAP_AUTHENTICATOR_START'
 on handle 0x99000054
*Sep 19 07:00:22.906:     eap_authen : during state eap_auth_initialize, got
 event 25(eapStartTmo)
*Sep 19 07:00:22.906: @@@ eap_authen : eap_auth_initialize ->
 eap_auth_select_action
*Sep 19 07:00:22.906:     eap_authen : during state eap_auth_select_action,
 got event 20(eapDecisionPropose)
*Sep 19 07:00:22.906: @@@ eap_authen : eap_auth_select_action ->
 eap_auth_propose_method
*Sep 19 07:00:22.906:     eap_authen : idle during state
 eap_auth_propose_method
*Sep 19 07:00:22.906: @@@ eap_authen : eap_auth_propose_method ->
 eap_auth_method_request
*Sep 19 07:00:22.908: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:response
 request action
*Sep 19 07:00:23.148: dot1x-packet:[6470.0227.0a89, Ca0] Queuing an EAPOL pkt
 on Authenticator Q
*Sep 19 07:00:23.148: dot1x-packet:EAPOL pak rx - Ver: 0x3  type: 0x0
*Sep 19 07:00:23.148: dot1x-packet: length: 0x0048
*Sep 19 07:00:23.148: dot1x-ev:[Ca0] Dequeued pkt: Int Ca0 CODE= 2,TYPE= 25,
 LEN= 72

*Sep 19 07:00:23.148: dot1x-ev:[Ca0] Received pkt saddr =6470.0227.0a89 ,
 daddr = 64d8.146f.e5a0, pae-ether-type = 888e.0300.0048
*Sep 19 07:00:23.148: dot1x-packet:EAPOL pak rx - Ver: 0x3  type: 0x0
*Sep 19 07:00:23.148: dot1x-packet: length: 0x0048
*Sep 19 07:00:23.148: dot1x-sm:[6470.0227.0a89, Ca0] Posting EAPOL_EAP for
 0x60000009
*Sep 19 07:00:23.148:     dot1x_auth_bend Ca0: during state
 auth_bend_request, got event 6(eapolEap)
*Sep 19 07:00:23.148: @@@ dot1x_auth_bend Ca0: auth_bend_request ->
 auth_bend_response
*Sep 19 07:00:23.148: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:entering
 response state
*Sep 19 07:00:23.148: dot1x-ev:[6470.0227.0a89, Ca0] Response sent to the
 server from 0x60000009
*Sep 19 07:00:23.148: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:request
 response action
*Sep 19 07:00:23.149: EAP-EVENT: Received LL (Dot1x-Authenticator) event
 'EAP_RX_PACKET' on handle 0x26000052
*Sep 19 07:00:23.149: EAP-AUTH-RX-PAK: Code:RESPONSE ID:0xE Length:0x0048
 Type:PEAP
*Sep 19 07:00:23.149:    Payload:  011703010018E5BC67F95BDE2D2BF45C ...
*Sep 19 07:00:23.149:    eap_authen : during state eap_auth_idle2, got event
 1(eapRxPacket)
*Sep 19 07:00:23.149: @@@ eap_authen : eap_auth_idle2 -> eap_auth_received2
*Sep 19 07:00:23.149: EAP-AUTH-EVENT: EAP Response received by context
 0x26000052
*Sep 19 07:00:23.149: EAP-AUTH-EVENT: EAP Response type = Method (25)
*Sep 19 07:00:23.149: EAP-EVENT: Stopping 'Authenticator Retransmit' timer
 for EAP sesion handle 0x26000052
*Sep 19 07:00:23.149:     eap_authen : during state eap_auth_received2, got
 event 10(eapMethodData)
*Sep 19 07:00:23.149: @@@ eap_authen : eap_auth_received2 -> eap_auth_aaa_req
*Sep 19 07:00:23.149: EAP-AUTH-AAA-EVENT: Adding Audit-Session-ID
 "c0a82104523aa0a30000001f" to RADIUS Req
*Sep 19 07:00:23.149: EAP-AUTH-AAA-EVENT: Added Audit-Session-ID
*Sep 19 07:00:23.149: EAP-AUTH-AAA-EVENT: Adding IDB "0x38167B5C" to RADIUS
 Req
*Sep 19 07:00:23.149: EAP-AUTH-AAA-EVENT: Added IDB
*Sep 19 07:00:23.149: EAP-AUTH-AAA-EVENT: Adding EAP profile name
 "PEAPProfile" to RADIUS Req
*Sep 19 07:00:23.149: EAP-AUTH-AAA-EVENT: Added EAP profile name to request
*Sep 19 07:00:23.149: EAP-EVENT: Sending LL (Dot1x-Authenticator) event
 'EAP_CUSTOMIZE_AAA_REQUEST' on handle 0x26000052
*Sep 19 07:00:23.149: EAP-AUTH-AAA-EVENT: eap_auth_aaa_authen_request_shim
 aaa_service 19, eap aaa_list handle 0, mlist handle 0
*Sep 19 07:00:23.150: EAP-AUTH-AAA-EVENT: Request sent successfully
*Sep 19 07:00:23.150:     eap_authen : during state eap_auth_aaa_req, got
 event 24(eapAAAReqOk)
*Sep 19 07:00:23.150: @@@ eap_authen : eap_auth_aaa_req -> eap_auth_aaa_idle
*Sep 19 07:00:23.150: EAP-EVENT: Received LL (AAA_LOCAL_EAP) event
 'EAP_RX_PACKET' on handle 0xCE000053
*Sep 19 07:00:23.150: EAP-AUTH-RX-PAK: Code:RESPONSE ID:0xE Length:0x0048
 Type:PEAP
*Sep 19 07:00:23.150:     Payload:  011703010018E5BC67F95BDE2D2BF45C ...
*Sep 19 07:00:23.150:     eap_authen : during state eap_auth_idle, got event
 1(eapRxPacket)
*Sep 19 07:00:23.150: @@@ eap_authen : eap_auth_idle -> eap_auth_received
*Sep 19 07:00:23.150: EAP-AUTH-EVENT: EAP Response received by context
 0xCE000053
*Sep 19 07:00:23.150: EAP-AUTH-EVENT: EAP Response type = Method (25)
*Sep 19 07:00:23.150:     eap_authen : during state eap_auth_received, got
 event 10(eapMethodData)
*Sep 19 07:00:23.150: @@@ eap_authen : eap_auth_received ->
 eap_auth_method_response
*Sep 19 07:00:23.150: EAP-EVENT: Sending method (PEAP) event 'Receive Packet'
 on handle 0xCE000053
*Sep 19 07:00:23.150: EAP-AUTH-EVENT: Waiting for asynchronous reply from
 method (PEAP)
*Sep 19 07:00:23.150:     eap_authen : during state eap_auth_method_response,
 got event 15(eapMethodWaitReply)
*Sep 19 07:00:23.150: @@@ eap_authen : eap_auth_method_response ->
 eap_auth_idle
*Sep 19 07:00:23.151: EAP-EVENT: Received LL (PEAP) event 'EAP_RX_PACKET' on
 handle 0x99000054
*Sep 19 07:00:23.151: EAP-AUTH-RX-PAK: Code:RESPONSE ID:0xE Length:0x000A
 Type:IDENTITY
*Sep 19 07:00:23.151:     Payload:  746961676F
*Sep 19 07:00:23.151:     eap_authen : during state eap_auth_idle, got event
 1(eapRxPacket)
*Sep 19 07:00:23.151: @@@ eap_authen : eap_auth_idle -> eap_auth_received
*Sep 19 07:00:23.151: EAP-AUTH-EVENT: EAP Response received by context
 0x99000054
*Sep 19 07:00:23.151: EAP-AUTH-EVENT: EAP Response type = Identity
*Sep 19 07:00:23.151:     eap_authen : during state eap_auth_received, got
 event 10(eapMethodData)
*Sep 19 07:00:23.151: @@@ eap_authen : eap_auth_received ->
 eap_auth_method_response
*Sep 19 07:00:23.151: EAP-AUTH-EVENT: Received peer identity: tiago
*Sep 19 07:00:23.151:     eap_authen : during state eap_auth_method_response,
 got event 13(eapMethodEnd)
*Sep 19 07:00:23.151: @@@ eap_authen : eap_auth_method_response ->
 eap_auth_select_action
*Sep 19 07:00:23.151: EAP-AUTH-EVENT: Using authentication mode: Local
*Sep 19 07:00:23.151: EAP-EVENT: Sending LL (PEAP) event
 'EAP_GET_CREDENTIAL_PROFILE_FROM_USERNAME' on handle 0x99000054
*Sep 19 07:00:23.151: EAP-EVENT: Sending LL (AAA_LOCAL_EAP) event
 'EAP_GET_CREDENTIAL_PROFILE_FROM_USERNAME' on handle 0xCE000053
*Sep 19 07:00:23.151: EAP-AUTH-EVENT: Waiting for asynchronous reply from LL
 (AAA_LOCAL_EAP)
*Sep 19 07:00:23.151: EAP-AUTH-EVENT: Waiting for asynchronous reply from LL
 (PEAP)
*Sep 19 07:00:23.152: EAP-EVENT: Local methods by EAP type: [006 026]
*Sep 19 07:00:23.152:     eap_authen : during state eap_auth_select_action,
 got event 21(eapDecisionWait)
*Sep 19 07:00:23.152: @@@ eap_authen : eap_auth_select_action ->
 eap_auth_idle
*Sep 19 07:00:23.152: EAP-EVENT: Received LL (AAA_LOCAL_EAP) event
 'EAP_LL_REPLY' on handle 0xCE000053
*Sep 19 07:00:23.152: EAP-AUTH-EVENT: Relaying LL response for context
 0xCE000053
*Sep 19 07:00:23.152: EAP-AUTH-EVENT: Using credential profile name: tiago
 (0xCE000053)
*Sep 19 07:00:23.152: EAP-EVENT: Sending method (PEAP) event 'LL Response'
 on handle 0xCE000053
*Sep 19 07:00:23.152: EAP-EVENT: Received LL (PEAP) event 'EAP_LL_REPLY' on
 handle 0x99000054
*Sep 19 07:00:23.152:     eap_authen : during state eap_auth_idle, got event
 2(eapLLReply)
*Sep 19 07:00:23.152: @@@ eap_authen : eap_auth_idle ->
 eap_auth_select_action
*Sep 19 07:00:23.152: EAP-AUTH-EVENT: Using credential profile name: tiago
 (0x99000054)
*Sep 19 07:00:23.152:     eap_authen : during state eap_auth_select_action,
 got event 20(eapDecisionPropose)
*Sep 19 07:00:23.152: @@@ eap_authen : eap_auth_select_action ->
 eap_auth_propose_method
*Sep 19 07:00:23.152:     eap_authen : idle during state
 eap_auth_propose_method
*Sep 19 07:00:23.152: @@@ eap_authen : eap_auth_propose_method ->
 eap_auth_method_request
*Sep 19 07:00:23.152: EAP-AUTH-EVENT: Maximum EAP packet size: 1464
*Sep 19 07:00:23.152: EAP-EVENT: Sending method (GTC) event 'New Context' on
 handle 0x99000054
*Sep 19 07:00:23.153: EAP-EVENT: Sending method (GTC) event 'Receive Packet'
 on handle 0x99000054
*Sep 19 07:00:23.153: EAP-AUTH-EVENT: Method (GTC) state: Continue
*Sep 19 07:00:23.153: EAP-AUTH-EVENT: Method (GTC) decision: Unknown
*Sep 19 07:00:23.153:     eap_authen : idle during state
 eap_auth_method_request
*Sep 19 07:00:23.153: @@@ eap_authen : eap_auth_method_request ->
 eap_auth_tx_packet
*Sep 19 07:00:23.153: EAP-AUTH-EVENT: Current method = 6
*Sep 19 07:00:23.153:     eap_authen : idle during state
 eap_auth_tx_packet
*Sep 19 07:00:23.153: @@@ eap_authen : eap_auth_tx_packet -> eap_auth_idle
*Sep 19 07:00:23.153: EAP-AUTH-TX-PAK: Code:REQUEST ID:0xF Length:0x0005
 Type:GTC
*Sep 19 07:00:23.153: EAP-EVENT: Sending LL (PEAP) event 'EAP_TX_PACKET' on
 handle 0x99000054
*Sep 19 07:00:23.153: EAP-EVENT: Received Method (PEAP) event
 'EAP_METHOD_REPLY' on handle 0xCE000053
*Sep 19 07:00:23.153:     eap_authen : during state eap_auth_idle, got event
 4(eapMethodReply)
*Sep 19 07:00:23.153: @@@ eap_authen : eap_auth_idle ->
 eap_auth_method_response
*Sep 19 07:00:23.153: EAP-AUTH-EVENT: Handling asynchronous method response
 for context 0xCE000053
*Sep 19 07:00:23.153: EAP-AUTH-EVENT: EAP method state: Continue
*Sep 19 07:00:23.153: EAP-AUTH-EVENT: EAP method decision: Unknown
*Sep 19 07:00:23.153:     eap_authen : during state eap_auth_method_response,
 got event 14(eapMethodContinue)
*Sep 19 07:00:23.153: @@@ eap_authen : eap_auth_method_response ->
 eap_auth_method_request
*Sep 19 07:00:23.153:     eap_authen : idle during state
 eap_auth_method_request
*Sep 19 07:00:23.153: @@@ eap_authen : eap_auth_method_request ->
 eap_auth_tx_packet
*Sep 19 07:00:23.153: EAP-AUTH-EVENT: Current method = 25
*Sep 19 07:00:23.153:     eap_authen : idle during state eap_auth_tx_packet
*Sep 19 07:00:23.153: @@@ eap_authen : eap_auth_tx_packet -> eap_auth_idle
*Sep 19 07:00:23.153: EAP-AUTH-TX-PAK: Code:REQUEST  ID:0xF   Length:0x002B
 Type:PEAP
*Sep 19 07:00:23.153:     Payload:  011703010020377AEA34B95C78A82976 ...
*Sep 19 07:00:23.153: EAP-EVENT: Sending LL (AAA_LOCAL_EAP) event
 'EAP_TX_PACKET' on handle 0xCE000053
*Sep 19 07:00:23.154: EAP-EVENT: eap_aaa_reply
*Sep 19 07:00:23.154: EAP-AUTH-AAA-EVENT: Reply received session_label
 BB000020
*Sep 19 07:00:23.154: EAP-AUTH-AAA-EVENT: Response contains EAP Message,
 code: 1
*Sep 19 07:00:23.154: EAP-EVENT: Received AAA event 'EAP_AAA_RX_PACKET' on
 handle 0x26000052
*Sep 19 07:00:23.154: EAP-AUTH-RX-AAA-PAK: Code:REQUEST ID:0xF Length:0x002B
 Type:PEAP
*Sep 19 07:00:23.154:     Payload:  011703010020377AEA34B95C78A82976 ...
*Sep 19 07:00:23.154:     eap_authen : during state eap_auth_aaa_idle, got
 event 5(eapAAARxPacket)
*Sep 19 07:00:23.154: @@@ eap_authen : eap_auth_aaa_idle -> eap_auth_aaa_resp
*Sep 19 07:00:23.154:     eap_authen : idle during state eap_auth_aaa_resp
*Sep 19 07:00:23.154: @@@ eap_authen : eap_auth_aaa_resp ->
 eap_auth_tx_packet2
*Sep 19 07:00:23.154: EAP-AUTH-EVENT: Current method = 25
*Sep 19 07:00:23.154:     eap_authen : idle during state eap_auth_tx_packet2
*Sep 19 07:00:23.154: @@@ eap_authen : eap_auth_tx_packet2 -> eap_auth_idle2
*Sep 19 07:00:23.154: EAP-AUTH-TX-PAK: Code:REQUEST  ID:0xF   Length:0x002B
 Type:PEAP
*Sep 19 07:00:23.154:     Payload:  011703010020377AEA34B95C78A82976 ...
*Sep 19 07:00:23.154: EAP-EVENT: Started 'Authenticator Retransmit' timer
 (30s) for EAP sesion handle 0x26000052
*Sep 19 07:00:23.154: EAP-EVENT: Started EAP tick timer
*Sep 19 07:00:23.154: EAP-EVENT: Sending LL (Dot1x-Authenticator) event
 'EAP_TX_PACKET' on handle 0x26000052
*Sep 19 07:00:23.154: dot1x-sm:[6470.0227.0a89, Ca0] Posting EAP_REQ for
 0x60000009
*Sep 19 07:00:23.154: dot1x_auth_bend Ca0: during state auth_bend_response,
 got event 7(eapReq)
*Sep 19 07:00:23.154: @@@ dot1x_auth_bend Ca0: auth_bend_response ->
 auth_bend_request
*Sep 19 07:00:23.154: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:exiting
 response state
*Sep 19 07:00:23.871: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:response
 request action
*Sep 19 07:00:24.114: dot1x-packet:[6470.0227.0a89, Ca0] Queuing an EAPOL pkt
 on Authenticator Q
*Sep 19 07:00:24.114: dot1x-packet:EAPOL pak rx - Ver: 0x3  type: 0x0
*Sep 19 07:00:24.114: dot1x-packet: length: 0x0048
*Sep 19 07:00:24.114: dot1x-ev:[Ca0] Dequeued pkt: Int Ca0 CODE= 2,TYPE= 25,
 LEN= 72

*Sep 19 07:00:24.114: dot1x-ev:[Ca0] Received pkt saddr =6470.0227.0a89 ,
 daddr = 64d8.146f.e5a0, pae-ether-type = 888e.0300.0048
*Sep 19 07:00:24.115: dot1x-packet:EAPOL pak rx - Ver: 0x3  type: 0x0
*Sep 19 07:00:24.115: dot1x-packet: length: 0x0048
*Sep 19 07:00:24.115: dot1x-sm:[6470.0227.0a89, Ca0] Posting EAPOL_EAP for
 0x60000009
*Sep 19 07:00:24.115: dot1x_auth_bend Ca0: during state auth_bend_request,
 got event 6(eapolEap)
*Sep 19 07:00:24.115: @@@ dot1x_auth_bend Ca0: auth_bend_request ->
 auth_bend_response
*Sep 19 07:00:24.115: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:entering
 response state
*Sep 19 07:00:24.115: dot1x-ev:[6470.0227.0a89, Ca0] Response sent to the
 server from 0x60000009
*Sep 19 07:00:24.115: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:request
 response action
*Sep 19 07:00:24.115: EAP-EVENT: Received LL (Dot1x-Authenticator) event
 'EAP_RX_PACKET' on handle 0x26000052
*Sep 19 07:00:24.115: EAP-AUTH-RX-PAK: Code:RESPONSE ID:0x12 Length:0x0048
 Type:PEAP
*Sep 19 07:00:24.115:     Payload:  0117030100186DEF131BC85E44CBDD50 ...
*Sep 19 07:00:24.115:     eap_authen : during state eap_auth_idle2, got
 event 1(eapRxPacket)
*Sep 19 07:00:24.115: @@@ eap_authen : eap_auth_idle2 -> eap_auth_received2
*Sep 19 07:00:24.115: EAP-AUTH-EVENT: EAP Response received by context
 0x26000052
*Sep 19 07:00:24.115: EAP-AUTH-EVENT: EAP Response type = Method (25)
*Sep 19 07:00:24.115: EAP-EVENT: Stopping 'Authenticator Retransmit' timer
 for EAP sesion handle 0x26000052
*Sep 19 07:00:24.115:     eap_authen : during state eap_auth_received2, got
 event 10(eapMethodData)
*Sep 19 07:00:24.115: @@@ eap_authen : eap_auth_received2 -> eap_auth_aaa_req
*Sep 19 07:00:24.116: EAP-AUTH-AAA-EVENT: Adding Audit-Session-ID
 "c0a82104523aa0a30000001f" to RADIUS Req
*Sep 19 07:00:24.116: EAP-AUTH-AAA-EVENT: Added Audit-Session-ID
*Sep 19 07:00:24.116: EAP-AUTH-AAA-EVENT: Adding IDB "0x38167B5C" to
 RADIUS Req
*Sep 19 07:00:24.116: EAP-AUTH-AAA-EVENT: Added IDB
*Sep 19 07:00:24.116: EAP-AUTH-AAA-EVENT: Adding EAP profile name
 "PEAPProfile" to RADIUS Req
*Sep 19 07:00:24.116: EAP-AUTH-AAA-EVENT: Added EAP profile name to request
*Sep 19 07:00:24.116: EAP-EVENT: Sending LL (Dot1x-Authenticator) event
 'EAP_CUSTOMIZE_AAA_REQUEST' on handle 0x26000052
*Sep 19 07:00:24.116: EAP-AUTH-AAA-EVENT: eap_auth_aaa_authen_request_shim
 aaa_service 19, eap aaa_list handle 0, mlist handle 0
*Sep 19 07:00:24.116: EAP-AUTH-AAA-EVENT: Request sent successfully
*Sep 19 07:00:24.116:     eap_authen : during state eap_auth_aaa_req, got
 event 24(eapAAAReqOk)
*Sep 19 07:00:24.116: @@@ eap_authen : eap_auth_aaa_req -> eap_auth_aaa_idle
*Sep 19 07:00:24.116: EAP-EVENT: Received LL (AAA_LOCAL_EAP) event
 'EAP_RX_PACKET' on handle 0xCE000053
*Sep 19 07:00:24.116: EAP-AUTH-RX-PAK: Code:RESPONSE  ID:0x12  Length:0x0048
 Type:PEAP
*Sep 19 07:00:24.117:     Payload:  0117030100186DEF131BC85E44CBDD50 ...
*Sep 19 07:00:24.117:     eap_authen : during state eap_auth_idle, got event
 1(eapRxPacket)
*Sep 19 07:00:24.117: @@@ eap_authen : eap_auth_idle -> eap_auth_received
*Sep 19 07:00:24.117: EAP-AUTH-EVENT: EAP Response received by context
 0xCE000053
*Sep 19 07:00:24.117: EAP-AUTH-EVENT: EAP Response type = Method (25)
*Sep 19 07:00:24.117:     eap_authen : during state eap_auth_received, got
 event 10(eapMethodData)
*Sep 19 07:00:24.117: @@@ eap_authen : eap_auth_received ->
 eap_auth_method_response
*Sep 19 07:00:24.117: EAP-EVENT: Sending method (PEAP) event 'Receive Packet'
 on handle 0xCE000053
*Sep 19 07:00:24.117: EAP-AUTH-EVENT: Waiting for asynchronous reply from
 method (PEAP)
*Sep 19 07:00:24.117:     eap_authen : during state eap_auth_method_response,
 got event 15(eapMethodWaitReply)
*Sep 19 07:00:24.117: @@@ eap_authen : eap_auth_method_response ->
 eap_auth_idle
*Sep 19 07:00:24.118: EAP-EVENT: Received Method (PEAP) event
 'EAP_METHOD_REPLY' on handle 0xCE000053
*Sep 19 07:00:24.118:     eap_authen : during state eap_auth_idle, got event
 4(eapMethodReply)
*Sep 19 07:00:24.118: @@@ eap_authen : eap_auth_idle ->
 eap_auth_method_response
*Sep 19 07:00:24.118: EAP-AUTH-EVENT: Handling asynchronous method response
 for context 0xCE000053
*Sep 19 07:00:24.118: EAP-EVENT: Sending LL (AAA_LOCAL_EAP) event
 'EAP_KEY_AVAILABLE' on handle 0xCE000053
*Sep 19 07:00:24.118: EAP-AUTH-EVENT: EAP method state: Done
*Sep 19 07:00:24.118: EAP-AUTH-EVENT: EAP method decision: Unconditional
 Success
*Sep 19 07:00:24.118:     eap_authen : during state eap_auth_method_response,
 got event 13(eapMethodEnd)
*Sep 19 07:00:24.118: @@@ eap_authen : eap_auth_method_response ->
 eap_auth_select_action
*Sep 19 07:00:24.118:     eap_authen : during state eap_auth_select_action,
 got event 18(eapDecisionSuccess)
*Sep 19 07:00:24.118: @@@ eap_authen : eap_auth_select_action ->
 eap_auth_success
*Sep 19 07:00:24.118: EAP-EVENT: Received get canned status from lower layer
 (0xCE000053)
*Sep 19 07:00:24.118: EAP-AUTH-TX-PAK: Code:SUCCESS  ID:0x12  Length:0x0004
*Sep 19 07:00:24.118: EAP-EVENT: Sending method (PEAP) event 'Free Context'
 on handle 0xCE000053
*Sep 19 07:00:24.119: EAP-EVENT: Sending LL (AAA_LOCAL_EAP) event
 'EAP_SUCCESS' on handle
0xCE000053
*Sep 19 07:00:24.119: EAP-EVENT: Received free context (0xCE000053) from LL
 (AAA_LOCAL_EAP)
*Sep 19 07:00:24.119: EAP-EVENT: eap_aaa_reply
*Sep 19 07:00:24.119: EAP-AUTH-AAA-EVENT: Reply received session_label
 BB000020
*Sep 19 07:00:24.119: EAP-AUTH-AAA-EVENT: Response contains EAP Message,
 code: 3
*Sep 19 07:00:24.119: EAP-AUTH-AAA-EVENT: Response contains MS MPPE Send Key,
 length:139
*Sep 19 07:00:24.119: EAP-AUTH-AAA-EVENT: Response contains MS MPPE Recv Key,
 length:97
*Sep 19 07:00:24.119: EAP-EVENT: Sending LL (Dot1x-Authenticator) event
 'EAP_KEY_AVAILABLE' on handle 0x26000052
*Sep 19 07:00:24.119: EAP-AUTH-AAA-EVENT: Authorization not required for
 this context
*Sep 19 07:00:24.119: EAP-EVENT: Received LL (AAA_LOCAL_EAP) event
 'EAP_DELETE' on handle 0xCE000053
*Sep 19 07:00:24.119: EAP-AUTH-AAA-ERROR: Failed to delete aaa coord
 transaction for 0xCE000053
*Sep 19 07:00:24.119: EAP-AUTH-EVENT: Freed EAP auth context
*Sep 19 07:00:24.119: EAP-EVENT: Freed EAP context
*Sep 19 07:00:24.120: EAP-EVENT: Received AAA event 'EAP_AAA_SUCCESS' on
 handle 0x26000052

*Sep 19 07:00:24.120:     eap_authen : during state eap_auth_aaa_idle, got
 event 7(eapAAASuccess)
*Sep 19 07:00:24.120: @@@ eap_authen : eap_auth_aaa_idle -> eap_auth_success
*Sep 19 07:00:24.120: EAP-AUTH-TX-PAK: Code:SUCCESS  ID:0x12  Length:0x0004
*Sep 19 07:00:24.120: EAP-AUTH-EVENT: SUCCESS for EAP method ID: 25, name:
 PEAP, on handle 0x26000052
*Sep 19 07:00:24.120: EAP-EVENT: Sending LL (Dot1x-Authenticator) event
 'EAP_SUCCESS' on handle 0x26000052
*Sep 19 07:00:24.120: dot1x-packet:[6470.0227.0a89, Ca0] Received an EAP
 Success
*Sep 19 07:00:24.120: dot1x-sm:[6470.0227.0a89, Ca0] Posting EAP_SUCCESS for
 0x60000009
*Sep 19 07:00:24.120:     dot1x_auth_bend Ca0: during state
 auth_bend_response, got event 11(eapSuccess)
*Sep 19 07:00:24.120: @@@ dot1x_auth_bend Ca0: auth_bend_response ->
 auth_bend_success
*Sep 19 07:00:24.120: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:exiting
 response state
*Sep 19 07:00:24.120: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:entering
 success state
*Sep 19 07:00:24.120: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:response
 success action
*Sep 19 07:00:24.120:     dot1x_auth_bend Ca0: idle during state
 auth_bend_success
*Sep 19 07:00:24.121: @@@ dot1x_auth_bend Ca0: auth_bend_success ->
 auth_bend_idle
*Sep 19 07:00:24.121: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:entering
 idle state
*Sep 19 07:00:24.121: dot1x-sm:[6470.0227.0a89, Ca0] Posting AUTH_SUCCESS on
 Client 0x60000009
*Sep 19 07:00:24.121:     dot1x_auth Ca0: during state auth_authenticating,
 got event 12(authSuccess_portValid)
*Sep 19 07:00:24.121: @@@ dot1x_auth Ca0: auth_authenticating ->
 auth_authc_result
*Sep 19 07:00:24.121: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:exiting
 authenticating state
*Sep 19 07:00:24.121: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:entering
 authc result state
*Sep 19 07:00:24.121: dot1x-ev:[6470.0227.0a89, Ca0] Sending EAPOL success
 immediately
*Sep 19 07:00:24.121: dot1x-ev:[6470.0227.0a89, Ca0] Sending EAPOL packet
*Sep 19 07:00:24.121: dot1x-packet:[6470.0227.0a89, Ca0] Platform changed
 src mac  of EAPOL packet
*Sep 19 07:00:24.121: dot1x-registry:registry:dot1x_ether_macaddr called
*Sep 19 07:00:24.121: dot1x-packet:EAPOL pak Tx - Ver: 0x3  type: 0x0
*Sep 19 07:00:24.121: dot1x-packet: length: 0x0004
*Sep 19 07:00:24.121: dot1x-packet:EAP code: 0x3  id: 0x12 length: 0x0004
*Sep 19 07:00:24.121: dot1x-packet:[6470.0227.0a89, Ca0] EAPOL packet sent
 to client 0x60000009
*Sep 19 07:00:24.122: dot1x-ev:[6470.0227.0a89, Ca0] Received Authz Success
 for the client 0x60000009 (6470.0227.0a89)
*Sep 19 07:00:24.122: dot1x-sm:[6470.0227.0a89, Ca0] Posting AUTHZ_SUCCESS
 on Client 0x60000009

*Sep 19 07:00:24.122:     dot1x_auth Ca0: during state auth_authc_result,
 got event 23(authzSuccess)
*Sep 19 07:00:24.122: @@@ dot1x_auth Ca0: auth_authc_result ->
 auth_authenticated
*Sep 19 07:00:24.122: dot1x-sm:[6470.0227.0a89, Ca0] 0x60000009:entering
 authenticated state
*Sep 19 07:00:24.122: dot1x-ev:[6470.0227.0a89, Ca0] EAPOL success packet
 was sent earlier.
*Sep 19 07:00:24.122: EAP-EVENT: Received free context (0x26000052) from LL
 (Dot1x-Authenticator)
*Sep 19 07:00:24.122: EAP-EVENT: Received LL (Dot1x-Authenticator) event
 'EAP_DELETE' on handle 0x26000052
*Sep 19 07:00:24.123: EAP-AUTH-AAA-ERROR: Failed to delete aaa coord
 transaction for 0x26000052
*Sep 19 07:00:24.123: EAP-AUTH-EVENT: Freed EAP auth context
*Sep 19 07:00:24.123: EAP-EVENT: Freed EAP context
*Sep 19 07:00:24.122: 6470.0227.0A89
client incoming attribute size are 304 1 wcm:  pemDelScb Event skipping
 delete
*Sep 19 07:00:24.636:  6470.0227.0A89  192.168.80.100 8021X_REQD (3) Change
 state to L2AUTHCOMPLETE (4) last state RUN (20)

 1 wcm: ^K4D8.146F.E5A
*Sep 19 07:00:24.636: 6470.0227.0A89 WCDB_CHANGE: 1 wcm:  Client 1 m_vlan 80
 Radio iif id 0xdf0f4000000005 bssid iif id 0xcd248000000015,
 bssid 64D8.146F.E5A0
*Sep 19 07:00:24.636: 6470.0227.0A89 WCDB_AUTH: 1 wcm:  Adding opt82 len 0
*Sep 19 07:00:24.636: 6470.0227.0A89 WCDB_CHANGE: 1 wcm:  Suppressing SPI
 (L2 Auth for reassoc) pemstate 4 state L2_AUTH(1) vlan 80 client_id
 0xde51c000000021 mob 1 ackflag 2 dropd 0
*Sep 19 07:00:24.636:  6470.0227.0A89  192.168.80.100 L2AUTHCOMPLETE (4)
 pemAdvanceState2: 1 wcm:  MOBILITY-COMPLETE with state 4.
*Sep 19 07:00:24.636: 6470.0227.0A89 Send request to EPM 1 wcm: UTHCOMPLETE
 (4) pemAdvanceState2: MOBILITY-COMPLETE with state 4.
*Sep 19 07:00:24.649: 6470.0227.0A89 Received _EPM_SPI_STATUS_SUCCESS for
 request sent for client 1 wcm:  for client
*Sep 19 07:00:24.649: 6470.0227.0A89 Post-auth policy ACK recvd from EPM,
 unset flag on MSCB 1 wcm: ient
*Sep 19 07:00:24.907: EAP-EVENT: Stopped EAP tick timer



Conversations connexes de la communauté de soutien de Cisco

Le site Cisco Support Community est un forum où vous pouvez poser des questions, répondre à des questions, faire part de suggestions et collaborer avec vos pairs.


Document ID: 116532