03-15-2021 02:18 PM
Hello All,
Having a problem with 802.1X Microsoft Machine authentication:
We are using XMC 8.5.4.23 and X435-8P-4S with EXOS 31.2.1.1.
Config of X435 is:
In fat the most relevant parts
configure vlan default delete ports all
configure vr VR-Default delete ports 1-12
configure vr VR-Default add ports 1-12
configure vlan default delete ports 1-12
create qosprofile "QP2"
create qosprofile "QP3"
create qosprofile "QP4"
create qosprofile "QP5"
create qosprofile "QP6"
create qosprofile "QP7"
configure ports group "Default (IRL.0)" add 1-11
configure ports group "Default (TXQ.0)" add 1-11
create vlan "nt_login"
create vlan "unauthenticated"
configure vlan unauthenticated tag 4000
create vlan "UZ-Produktiv"
configure vlan UZ-Produktiv tag 10
create vlan "v2125-Telefonie_Telefone"
configure vlan v2125-Telefonie_Telefone tag 2125
create vlan "vlan2019-Man-FW"
configure vlan vlan2019-Man-FW tag 2019
create vlan "vlan2024-Man-Switch"
configure vlan vlan2024-Man-Switch tag 2024
disable port 1
configure ports 11 auto off speed 1000 duplex full
configure ports 12 auto off speed 1000 duplex full
configure vlan vlan2019-Man-FW add ports 3 untagged
configure vlan vlan2024-Man-Switch add ports 4 untagged
configure qosscheduler strict-priority ports "Default (TXQ.0)"
configure qosscheduler strict-priority ports 12
configure qosprofile QP1 maxbuffer 100 weight 1 ports "Default (TXQ.0)"
configure qosprofile QP2 maxbuffer 100 weight 1
configure qosprofile QP2 maxbuffer 100 weight 1 ports "Default (TXQ.0)"
configure qosprofile QP3 maxbuffer 100 weight 1
configure qosprofile QP3 maxbuffer 100 weight 1 ports "Default (TXQ.0)"
configure qosprofile QP4 maxbuffer 100 weight 1
configure qosprofile QP4 maxbuffer 100 weight 1 ports "Default (TXQ.0)"
configure qosprofile QP5 maxbuffer 100 weight 1
configure qosprofile QP5 maxbuffer 100 weight 1 ports "Default (TXQ.0)"
configure qosprofile QP6 maxbuffer 100 weight 1
configure qosprofile QP6 maxbuffer 100 weight 1 ports "Default (TXQ.0)"
configure qosprofile QP7 maxbuffer 100 weight 1
configure qosprofile QP7 maxbuffer 100 weight 1 ports "Default (TXQ.0)"
configure qosprofile QP8 maxbuffer 100 weight 1 ports "Default (TXQ.0)"
configure dot1p type 0 qosprofile QP1 ingress-meter ingmeter0
configure dot1p type 1 qosprofile QP2 ingress-meter ingmeter1
configure dot1p type 2 qosprofile QP3 ingress-meter ingmeter2
configure dot1p type 3 qosprofile QP4 ingress-meter ingmeter3
configure dot1p type 4 qosprofile QP5 ingress-meter ingmeter4
configure dot1p type 5 qosprofile QP6 ingress-meter ingmeter5
configure dot1p type 6 qosprofile QP7 ingress-meter ingmeter6
configure dot1p type 7 qosprofile QP8 ingress-meter ingmeter7
configure cos-index 8 qosprofile QP4 replace-tos 64
#
# Module policy configuration.
#
configure netlogin port 2 authentication mode optional
configure policy profile 1 name "Failsafe" pvid-status "enable" pvid 4095
configure policy profile 2 name "Access Point" pvid-status "enable" pvid 4095 auth-override "enable"
configure policy profile 3 name "Administrator" pvid-status "enable" pvid 4095
configure policy profile 4 name "Deny Access" pvid-status "enable" pvid 0
configure policy profile 5 name "Guest Access" pvid-status "enable" pvid 4095 cos-status "enable" cos 1
configure policy profile 6 name "Enterprise Access" pvid-status "enable" pvid 4095 cos-status "enable" cos 3
configure policy profile 7 name "Quarantine" pvid-status "enable" pvid 0
configure policy profile 8 name "Server" pvid-status "enable" pvid 4095 cos-status "enable" cos 4
configure policy profile 9 name "Printer" pvid-status "enable" pvid 0 cos-status "enable" cos 1
configure policy profile 10 name "Unregistered" pvid-status "enable" pvid 0
configure policy profile 11 name "Enterprise User" pvid-status "enable" pvid 4095 cos-status "enable" cos 4
configure policy profile 12 name "VoIP Phone" pvid-status "enable" pvid 4095 cos-status "enable" cos 6
configure policy profile 13 name "Notification" pvid-status "enable" pvid 4095 cos-status "enable" cos 4
configure policy profile 14 name "Assessing" pvid-status "enable" pvid 0
configure policy profile 15 name "VoIP Phone Tagged" pvid-status "enable" pvid 2125 cos-status "enable" cos 6 egress-vlans 2125 nsi 82125
configure policy profile 16 name "Wired 802.1X VLAN10 Machine" pvid-status "enable" pvid 10 untagged-vlans 10 nsi 80010
configure policy maptable response both
enable policy
#
# Module aaa configuration.
#
configure radius mgmt-access primary server 10.8.64.161 1812 client-ip 10.8.25.200 vr VR-Default
configure radius mgmt-access primary shared-secret encrypted "#$xxxxxx"
configure radius mgmt-access secondary server 10.16.64.161 1812 client-ip 10.8.25.200 vr VR-Default
configure radius mgmt-access secondary shared-secret encrypted "#$xxxxxx="
configure radius netlogin primary server 10.8.64.161 1812 client-ip 10.8.25.200 vr VR-Default
configure radius netlogin primary shared-secret encrypted "#$xxxxx"
configure radius netlogin secondary server 10.16.64.161 1812 client-ip 10.8.25.200 vr VR-Default
configure radius netlogin secondary shared-secret encrypted "#$xxxxxxx"
configure radius-accounting mgmt-access primary server 10.8.64.161 1813 client-ip 10.8.25.200 vr VR-Default
configure radius-accounting mgmt-access primary shared-secret encrypted "#$xxxxxxx"
configure radius-accounting mgmt-access secondary server 10.8.64.161 1813 client-ip 10.8.25.200 vr VR-Default
configure radius-accounting mgmt-access secondary shared-secret encrypted "#$xxxxxxx"
configure radius-accounting netlogin primary server 10.8.64.161 1813 client-ip 10.8.25.200 vr VR-Default
configure radius-accounting netlogin primary shared-secret encrypted "#$xxxxxx"
configure radius-accounting netlogin secondary server 10.8.64.161 1813 client-ip 10.8.25.200 vr VR-Default
configure radius-accounting netlogin secondary shared-secret encrypted "#$xxxxxxx"
enable radius netlogin
create account admin xxxxx encrypted "$5xxxxx/"
#
# Module acl configuration.
#
configure access-list zone SYSTEM application Mrp application-priority 2
configure access-list zone SYSTEM application IpSecurity application-priority 3
configure access-list zone SYSTEM application FIPSnooping application-priority 4
configure access-list zone SYSTEM application Dot1Ag application-priority 5
configure access-list zone SYSTEM application Dot1AgDefault application-priority 6
configure access-list zone SYSTEM application NetLogin application-priority 7
configure access-list zone SYSTEM application FDB application-priority 8
configure access-list zone SYSTEM application HealthCheckLAG application-priority 9
configure access-list zone SYSTEM application IdentityManager application-priority 10
configure access-list zone SYSTEM application VMTracking application-priority 11
configure access-list zone SYSTEM application PolicyManager application-priority 12
configure access-list zone SYSTEM application Policy application-priority 13
configure access-list zone SYSTEM application L2PT_PF application-priority 14
configure access-list zone SYSTEM application Snmp application-priority 17
configure access-list zone SYSTEM application Telnet application-priority 18
configure access-list zone SYSTEM application Http application-priority 19
configure access-list zone SYSTEM application Ssh2 application-priority 20
configure access-list zone SYSTEM application VlanManager application-priority 21
configure access-list zone SYSTEM application SlppGuard application-priority 22
configure access-list zone SYSTEM application ElrpHwAssist application-priority 23
#
# Module ems configuration.
#
enable log debug-mode
configure log filter DefaultFilter add events nl severity debug-verbose
configure log filter DefaultFilter add events AAA severity debug-verbose
enable log target console
#
# Module exsshd configuration.
#
enable ssh2
#
# Module lldp configuration.
#
configure lldp port 1 advertise port-description
configure lldp port 1 advertise system-capabilities
configure lldp port 1 advertise management-address
configure lldp port 2 advertise port-description
configure lldp port 2 advertise system-capabilities
configure lldp port 2 advertise management-address
configure lldp port 2 advertise vendor-specific med capabilities
configure lldp port 3 advertise port-description
configure lldp port 3 advertise system-capabilities
configure lldp port 3 advertise management-address
configure lldp port 4 advertise port-description
configure lldp port 4 advertise system-capabilities
configure lldp port 4 advertise management-address
configure lldp port 5 advertise port-description
configure lldp port 5 advertise system-capabilities
configure lldp port 5 advertise management-address
configure lldp port 6 advertise port-description
configure lldp port 6 advertise system-capabilities
configure lldp port 6 advertise management-address
configure lldp port 7 advertise port-description
configure lldp port 7 advertise system-capabilities
configure lldp port 7 advertise management-address
configure lldp port 8 advertise port-description
configure lldp port 8 advertise system-capabilities
configure lldp port 8 advertise management-address
configure lldp port 9 advertise port-description
configure lldp port 9 advertise system-capabilities
configure lldp port 9 advertise management-address
configure lldp port 10 advertise port-description
configure lldp port 10 advertise system-capabilities
configure lldp port 10 advertise management-address
configure lldp port 11 advertise port-description
configure lldp port 11 advertise system-capabilities
configure lldp port 11 advertise management-address
configure lldp port 12 advertise port-description
configure lldp port 12 advertise system-capabilities
configure lldp port 12 advertise management-address
configure lldp port 2 advertise vendor-specific med policy application voice vlan v2125-Telefonie_Telefone dscp 46
configure vlan UZ-Produktiv add nsi 80010
configure vlan vlan2019-Man-FW add nsi 82019
configure vlan vlan2024-Man-Switch add nsi 82024
configure vlan v2125-Telefonie_Telefone add nsi 82125
#
# Module netLogin configuration.
#
enable netlogin dot1x mac
configure netlogin mac authentication database-order radius
enable netlogin ports 1-2 dot1x
enable netlogin ports 2 mac
configure netlogin add mac-list ff:ff:ff:ff:ff:ff 48
#
# Module netTools configuration.
#
configure dns-client add name-server 192.168.8.2 vr VR-Default
configure dns-client add name-server 10.8.64.2 vr VR-Default
configure sntp-client primary 192.168.8.2 vr VR-Default
configure sntp-client secondary 192.168.17.2 vr VR-Default
configure sntp-client broadcast vr VR-Default
enable sntp-client
#
# Module ntp configuration.
#
#
# Module poe configuration.
#
#
# Module snmpMaster configuration.
#
configure snmpv3 engine-id 03:00:04:96:e4:6a:c2
configure snmpv3 add user "xxxxx" engine-id 80:00:07:7c:03:00:04:96:e4:6a:c2 authentication sha auth-encrypted localized-key xxxxx privacy aes 128 privacy-encrypted localized-key xxxxxx
configure snmpv3 add group "admin" user "xxxxx" sec-model usm
configure snmpv3 add target-params "TV1v3snmpuser" user "snmpuser" mp-model snmpv3 sec-model usm sec-level priv
configure snmpv3 add notify "TVInformTag" tag "TVInformTag" type inform
enable snmp access
disable snmp access snmp-v1v2c
enable snmp access snmpv3
#
# Module stp configuration.
#
disable stpd s0
More text in second posting
Solved! Go to Solution.
03-15-2021 04:29 PM
Hi,
Dot1x is not working in 31.2.
NAC failing since update from 31.1.1.3 to 31.2.1.1 | Extreme Networks Support Community
03-15-2021 04:04 PM
Hello Mark,
what is the output for “show netlogin session port 1”?
what is the output for “show port 1 information detail”?
When the port is up.
03-15-2021 02:22 PM
Even more debug output:
03/11/2021 14:24:05.67 <Summ:nl.dot1x.eapolPktRcvd> EAPOL Packet received on port 1, VLAN instance 4095, VLAN ID 0
03/11/2021 14:24:05.67 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_EAPOL_START being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:24:05.67 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, AUTHENTICATING -> ABORTING
03/11/2021 14:24:05.67 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:24:05.67 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, RESPONSE -> INITIALIZE
03/11/2021 14:24:05.67 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:05.67 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, INITIALIZE -> IDLE
03/11/2021 14:24:05.67 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:05.67 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, ABORTING -> RESTART
03/11/2021 14:24:05.67 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:24:05.67 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, RESTART -> CONNECTING
03/11/2021 14:24:05.67 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:24:05.67 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_EAP_REQ being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:24:05.67 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, CONNECTING -> AUTHENTICATING
03/11/2021 14:24:05.67 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:24:05.67 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_EAP_REQ being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:05.67 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, IDLE -> REQUEST
03/11/2021 14:24:05.67 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:05.67 <Summ:nl.dot1x.eapolPktSent> An EAPOL packet was sent to the 802.1X client 68:84:7E:99:59:F1 on port 1
03/11/2021 14:24:05.68 <Summ:nl.dot1x.eapolPktRcvd> EAPOL Packet received on port 1, VLAN instance 4095, VLAN ID 0
03/11/2021 14:24:05.68 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_EAPOL_EAP being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:05.68 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, REQUEST -> RESPONSE
03/11/2021 14:24:05.68 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:05.68 <Summ:nl.dot1x.eapPktSent> An EAP packet was sent to RADIUS for client 68:84:7E:99:59:F1 via AAA
03/11/2021 14:24:05.68 <Summ:AAA.Trace> emsSmServer: aaaRecv: received 754 bytes from peer 10
03/11/2021 14:24:05.68 <Summ:AAA.Trace> emsSmServer: aaaRecv got message 10
03/11/2021 14:24:05.68 <Summ:AAA.reqFromPeer> Handle request from peer 10
03/11/2021 14:24:05.68 <Summ:AAA.RADIUS.Trace> aaa:radiusEnabled: SrvrSet: 2 realm:3 enabled? :1
03/11/2021 14:24:05.68 <Summ:AAA.usingRadius> Authenticate using RADIUS Server
03/11/2021 14:24:05.68 <Summ:AAA.Trace> _aaaGetReq[NETLOGIN]-:Authenticat using Radius, user data ptr 0x57aba8
03/11/2021 14:24:05.68 <Summ:AAA.Trace> aaaAuthenticate- Sending to radius for peer 10
03/11/2021 14:24:05.68 <Summ:AAA.Trace> Queuing a RADIUS authen eap request
03/11/2021 14:24:05.68 <Summ:AAA.Trace> Processing EAP request
03/11/2021 14:24:05.68 <Info:AAA.RADIUS.ApiReq> EAP request for 68-84-7E-99-59-F1(username 'host/UZWS557.<domain>') on port 1.
03/11/2021 14:24:05.68 <Summ:AAA.Trace> aaaRequestUpdateEnqueue() - queue 0x53398c, request 0x5c7f80 for peer 10, count 1, transId 667, authMethod 2
03/11/2021 14:24:05.68 <Info:AAA.RADIUS.sendSuccess> Access Request(packet length 180, source UDP port 32769, id 248) sent to server #primary netlogin for user 68-84-7E-99-59-F1(userName 'host/UZWS557.<domain>') for the dot1x agent on port 1
03/11/2021 14:24:05.68 <Info:AAA.RADIUS.RecvRspns> Received an Authentication Challenge Response (packet length 64, destination UDP port 32769, id 248) from authentication server #primary netlogin for 68-84-7E-99-59-F1(userName 'host/UZWS557.<domain>') on port 1.
03/11/2021 14:24:05.68 <Summ:AAA.RADIUS.Trace> rad_callback() - start - request 0x529d90
03/11/2021 14:24:05.68 <Summ:AAA.Trace> __aaaReqFindRadiusInQueue-:pkt-id 667
03/11/2021 14:24:05.68 <Summ:AAA.Trace> __aaaReqFindRadiusInQueue-:found by transId 667
03/11/2021 14:24:05.68 <Summ:AAA.Trace> _aaaRespondToClient- :Peer 10
03/11/2021 14:24:05.68 <Summ:AAA.Trace> _aaaRespondToClient-: sent message to client:peer 10
03/11/2021 14:24:05.68 <Summ:AAA.Trace> aaaRequestDequeueNO_LOCK() - queue 0x53398c, request 0x5c7f80 for peer 10, count 0, transId 667, authMethod 2
03/11/2021 14:24:05.68 <Summ:nl.dot1x.AAAResult> 802.1X received authentication result 253 for client 68:84:7E:99:59:F1 from AAA
03/11/2021 14:24:05.68 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_EAP_REQ being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:05.68 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, RESPONSE -> REQUEST
03/11/2021 14:24:05.68 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:05.68 <Summ:nl.dot1x.eapolPktSent> An EAPOL packet was sent to the 802.1X client 68:84:7E:99:59:F1 on port 1
03/11/2021 14:24:05.68 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_EAP_REQ being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:24:05.69 <Summ:nl.dot1x.eapolPktRcvd> EAPOL Packet received on port 1, VLAN instance 4095, VLAN ID 0
03/11/2021 14:24:05.69 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_EAPOL_EAP being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:05.69 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, REQUEST -> RESPONSE
03/11/2021 14:24:05.69 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:05.69 <Summ:AAA.Trace> emsSmServer: aaaRecv: received 892 bytes from peer 10
03/11/2021 14:24:05.69 <Summ:AAA.Trace> emsSmServer: aaaRecv got message 10
03/11/2021 14:24:05.69 <Summ:AAA.reqFromPeer> Handle request from peer 10
03/11/2021 14:24:05.69 <Summ:AAA.RADIUS.Trace> aaa:radiusEnabled: SrvrSet: 2 realm:3 enabled? :1
03/11/2021 14:24:05.69 <Summ:AAA.usingRadius> Authenticate using RADIUS Server
03/11/2021 14:24:05.69 <Summ:AAA.Trace> _aaaGetReq[NETLOGIN]-:Authenticat using Radius, user data ptr 0x57aba8
03/11/2021 14:24:05.69 <Summ:AAA.Trace> aaaAuthenticate- Sending to radius for peer 10
03/11/2021 14:24:05.69 <Summ:AAA.Trace> Queuing a RADIUS authen eap request
03/11/2021 14:24:05.69 <Summ:AAA.Trace> Processing EAP request
03/11/2021 14:24:05.69 <Info:AAA.RADIUS.ApiReq> Challenge response for 68-84-7E-99-59-F1(username 'host/UZWS557.<domain>') on port 1.
03/11/2021 14:24:05.69 <Summ:AAA.Trace> aaaRequestUpdateEnqueue() - queue 0x53398c, request 0x5c7f80 for peer 10, count 1, transId 667, authMethod 2
03/11/2021 14:24:05.69 <Info:AAA.RADIUS.sendSuccess> Access Request(packet length 337, source UDP port 32769, id 249) sent to server #primary netlogin for user 68-84-7E-99-59-F1(userName 'host/UZWS557.<domain>') for the dot1x agent on port 1
03/11/2021 14:24:05.69 <Summ:nl.dot1x.eapPktSent> An EAP packet was sent to RADIUS for client 68:84:7E:99:59:F1 via AAA
03/11/2021 14:24:05.69 <Info:AAA.RADIUS.RecvRspns> Received an Authentication Challenge Response (packet length 1068, destination UDP port 32769, id 249) from authentication server #primary netlogin for 68-84-7E-99-59-F1(userName 'host/UZWS557.<domain>') on port 1.
03/11/2021 14:24:05.69 <Summ:AAA.RADIUS.Trace> rad_callback() - start - request 0x529d90
03/11/2021 14:24:05.70 <Summ:AAA.Trace> __aaaReqFindRadiusInQueue-:pkt-id 667
03/11/2021 14:24:05.70 <Summ:AAA.Trace> __aaaReqFindRadiusInQueue-:found by transId 667
03/11/2021 14:24:05.70 <Summ:AAA.Trace> _aaaRespondToClient- :Peer 10
03/11/2021 14:24:05.70 <Summ:AAA.Trace> _aaaRespondToClient-: Failed to construct user authentication message
03/11/2021 14:24:05.70 <Summ:AAA.Trace> aaaRequestDequeueNO_LOCK() - queue 0x53398c, request 0x5c7f80 for peer 10, count 0, transId 667, authMethod 2
03/11/2021 14:24:23.70 <Summ:nl.dot1x.eapolPktRcvd> EAPOL Packet received on port 1, VLAN instance 4095, VLAN ID 0
03/11/2021 14:24:23.70 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_EAPOL_START being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:24:23.70 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, AUTHENTICATING -> ABORTING
03/11/2021 14:24:23.70 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:24:23.70 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, RESPONSE -> INITIALIZE
03/11/2021 14:24:23.70 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:23.70 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, INITIALIZE -> IDLE
03/11/2021 14:24:23.70 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:23.70 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, ABORTING -> RESTART
03/11/2021 14:24:23.70 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:24:23.70 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, RESTART -> CONNECTING
03/11/2021 14:24:23.70 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:24:23.70 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_EAP_REQ being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:24:23.70 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, CONNECTING -> AUTHENTICATING
03/11/2021 14:24:23.70 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:24:23.70 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_EAP_REQ being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:23.70 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, IDLE -> REQUEST
03/11/2021 14:24:23.70 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:23.70 <Summ:nl.dot1x.eapolPktSent> An EAPOL packet was sent to the 802.1X client 68:84:7E:99:59:F1 on port 1
03/11/2021 14:24:23.71 <Summ:nl.dot1x.eapolPktRcvd> EAPOL Packet received on port 1, VLAN instance 4095, VLAN ID 0
03/11/2021 14:24:23.71 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_EAPOL_EAP being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:23.71 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, REQUEST -> RESPONSE
03/11/2021 14:24:23.71 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:23.71 <Summ:nl.dot1x.eapPktSent> An EAP packet was sent to RADIUS for client 68:84:7E:99:59:F1 via AAA
03/11/2021 14:24:23.71 <Summ:AAA.Trace> emsSmServer: aaaRecv: received 754 bytes from peer 10
03/11/2021 14:24:23.71 <Summ:AAA.Trace> emsSmServer: aaaRecv got message 10
03/11/2021 14:24:23.71 <Summ:AAA.reqFromPeer> Handle request from peer 10
03/11/2021 14:24:23.71 <Summ:AAA.RADIUS.Trace> aaa:radiusEnabled: SrvrSet: 2 realm:3 enabled? :1
03/11/2021 14:24:23.71 <Summ:AAA.usingRadius> Authenticate using RADIUS Server
03/11/2021 14:24:23.71 <Summ:AAA.Trace> _aaaGetReq[NETLOGIN]-:Authenticat using Radius, user data ptr 0x57ac40
03/11/2021 14:24:23.71 <Summ:AAA.Trace> aaaAuthenticate- Sending to radius for peer 10
03/11/2021 14:24:23.71 <Summ:AAA.Trace> Queuing a RADIUS authen eap request
03/11/2021 14:24:23.71 <Summ:AAA.Trace> Processing EAP request
03/11/2021 14:24:23.71 <Info:AAA.RADIUS.ApiReq> EAP request for 68-84-7E-99-59-F1(username 'host/UZWS557.<domain>) on port 1.
03/11/2021 14:24:23.71 <Summ:AAA.Trace> aaaRequestUpdateEnqueue() - queue 0x53398c, request 0x5c7f80 for peer 10, count 1, transId 668, authMethod 2
03/11/2021 14:24:23.71 <Info:AAA.RADIUS.sendSuccess> Access Request(packet length 180, source UDP port 32769, id 250) sent to server #primary netlogin for user 68-84-7E-99-59-F1(userName 'host/UZWS557.<domain>') for the dot1x agent on port 1
03/11/2021 14:24:23.71 <Info:AAA.RADIUS.RecvRspns> Received an Authentication Challenge Response (packet length 64, destination UDP port 32769, id 250) from authentication server #primary netlogin for 68-84-7E-99-59-F1(userName 'host/UZWS557.<domain>') on port 1.
03/11/2021 14:24:23.71 <Summ:AAA.RADIUS.Trace> rad_callback() - start - request 0x529d90
03/11/2021 14:24:23.71 <Summ:AAA.Trace> __aaaReqFindRadiusInQueue-:pkt-id 668
03/11/2021 14:24:23.71 <Summ:AAA.Trace> __aaaReqFindRadiusInQueue-:found by transId 668
03/11/2021 14:24:23.71 <Summ:AAA.Trace> _aaaRespondToClient- :Peer 10
03/11/2021 14:24:23.71 <Summ:AAA.Trace> _aaaRespondToClient-: sent message to client:peer 10
03/11/2021 14:24:23.71 <Summ:AAA.Trace> aaaRequestDequeueNO_LOCK() - queue 0x53398c, request 0x5c7f80 for peer 10, count 0, transId 668, authMethod 2
03/11/2021 14:24:23.71 <Summ:nl.dot1x.AAAResult> 802.1X received authentication result 253 for client 68:84:7E:99:59:F1 from AAA
03/11/2021 14:24:23.71 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_EAP_REQ being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:23.71 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, RESPONSE -> REQUEST
03/11/2021 14:24:23.71 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:23.71 <Summ:nl.dot1x.eapolPktSent> An EAPOL packet was sent to the 802.1X client 68:84:7E:99:59:F1 on port 1
03/11/2021 14:24:23.71 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_EAP_REQ being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:24:23.72 <Summ:nl.dot1x.eapolPktRcvd> EAPOL Packet received on port 1, VLAN instance 4095, VLAN ID 0
03/11/2021 14:24:23.72 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_EAPOL_EAP being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:23.72 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, REQUEST -> RESPONSE
03/11/2021 14:24:23.72 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:23.72 <Summ:AAA.Trace> emsSmServer: aaaRecv: received 892 bytes from peer 10
03/11/2021 14:24:23.72 <Summ:AAA.Trace> emsSmServer: aaaRecv got message 10
03/11/2021 14:24:23.72 <Summ:AAA.reqFromPeer> Handle request from peer 10
03/11/2021 14:24:23.72 <Summ:AAA.RADIUS.Trace> aaa:radiusEnabled: SrvrSet: 2 realm:3 enabled? :1
03/11/2021 14:24:23.72 <Summ:AAA.usingRadius> Authenticate using RADIUS Server
03/11/2021 14:24:23.72 <Summ:AAA.Trace> _aaaGetReq[NETLOGIN]-:Authenticat using Radius, user data ptr 0x57ac40
03/11/2021 14:24:23.72 <Summ:AAA.Trace> aaaAuthenticate- Sending to radius for peer 10
03/11/2021 14:24:23.72 <Summ:AAA.Trace> Queuing a RADIUS authen eap request
03/11/2021 14:24:23.72 <Summ:AAA.Trace> Processing EAP request
03/11/2021 14:24:23.72 <Info:AAA.RADIUS.ApiReq> Challenge response for 68-84-7E-99-59-F1(username 'host/UZWS557.<domain>') on port 1.
03/11/2021 14:24:23.72 <Summ:AAA.Trace> aaaRequestUpdateEnqueue() - queue 0x53398c, request 0x5c7f80 for peer 10, count 1, transId 668, authMethod 2
03/11/2021 14:24:23.72 <Info:AAA.RADIUS.sendSuccess> Access Request(packet length 337, source UDP port 32769, id 251) sent to server #primary netlogin for user 68-84-7E-99-59-F1(userName 'host/UZWS557.<domain>') for the dot1x agent on port 1
03/11/2021 14:24:23.72 <Summ:nl.dot1x.eapPktSent> An EAP packet was sent to RADIUS for client 68:84:7E:99:59:F1 via AAA
03/11/2021 14:24:23.73 <Info:AAA.RADIUS.RecvRspns> Received an Authentication Challenge Response (packet length 1068, destination UDP port 32769, id 251) from authentication server #primary netlogin for 68-84-7E-99-59-F1(userName 'host/UZWS557.<domain>') on port 1.
03/11/2021 14:24:23.73 <Summ:AAA.RADIUS.Trace> rad_callback() - start - request 0x529d90
03/11/2021 14:24:23.73 <Summ:AAA.Trace> __aaaReqFindRadiusInQueue-:pkt-id 668
03/11/2021 14:24:23.73 <Summ:AAA.Trace> __aaaReqFindRadiusInQueue-:found by transId 668
03/11/2021 14:24:23.73 <Summ:AAA.Trace> _aaaRespondToClient- :Peer 10
03/11/2021 14:24:23.73 <Summ:AAA.Trace> _aaaRespondToClient-: Failed to construct user authentication message
03/11/2021 14:24:23.73 <Summ:AAA.Trace> aaaRequestDequeueNO_LOCK() - queue 0x53398c, request 0x5c7f80 for peer 10, count 0, transId 668, authMethod 2
* swuz200.7 # disable port 1
03/11/2021 14:24:41.73 <Summ:nl.dot1x.eapolPktRcvd> EAPOL Packet received on port 1, VLAN instance 4095, VLAN ID 0
03/11/2021 14:24:41.73 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_EAPOL_START being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:24:41.73 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, AUTHENTICATING -> ABORTING
03/11/2021 14:24:41.73 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:24:41.73 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, RESPONSE -> INITIALIZE
03/11/2021 14:24:41.73 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:41.73 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, INITIALIZE -> IDLE
03/11/2021 14:24:41.73 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:41.73 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, ABORTING -> RESTART
03/11/2021 14:24:41.73 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:24:41.73 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, RESTART -> CONNECTING
03/11/2021 14:24:41.73 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:24:41.73 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_EAP_REQ being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:24:41.73 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, CONNECTING -> AUTHENTICATING
03/11/2021 14:24:41.73 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:24:41.73 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_EAP_REQ being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:41.73 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, IDLE -> REQUEST
03/11/2021 14:24:41.73 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:41.73 <Summ:nl.dot1x.eapolPktSent> An EAPOL packet was sent to the 802.1X client 68:84:7E:99:59:F1 on port 1
03/11/2021 14:24:41.74 <Summ:nl.dot1x.eapolPktRcvd> EAPOL Packet received on port 1, VLAN instance 4095, VLAN ID 0
03/11/2021 14:24:41.74 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_EAPOL_EAP being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:41.74 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, REQUEST -> RESPONSE
03/11/2021 14:24:41.74 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:41.74 <Summ:AAA.Trace> emsSmServer: aaaRecv: received 754 bytes from peer 10
03/11/2021 14:24:41.74 <Summ:AAA.Trace> emsSmServer: aaaRecv got message 10
03/11/2021 14:24:41.74 <Summ:AAA.reqFromPeer> Handle request from peer 10
03/11/2021 14:24:41.74 <Summ:AAA.RADIUS.Trace> aaa:radiusEnabled: SrvrSet: 2 realm:3 enabled? :1
03/11/2021 14:24:41.74 <Summ:AAA.usingRadius> Authenticate using RADIUS Server
03/11/2021 14:24:41.74 <Summ:AAA.Trace> _aaaGetReq[NETLOGIN]-:Authenticat using Radius, user data ptr 0x57ac58
03/11/2021 14:24:41.74 <Summ:AAA.Trace> aaaAuthenticate- Sending to radius for peer 10
03/11/2021 14:24:41.74 <Summ:AAA.Trace> Queuing a RADIUS authen eap request
03/11/2021 14:24:41.74 <Summ:AAA.Trace> Processing EAP request
03/11/2021 14:24:41.74 <Info:AAA.RADIUS.ApiReq> EAP request for 68-84-7E-99-59-F1(username 'host/UZWS557.<domain>') on port 1.
03/11/2021 14:24:41.74 <Summ:AAA.Trace> aaaRequestUpdateEnqueue() - queue 0x53398c, request 0x5c7f80 for peer 10, count 1, transId 669, authMethod 2
03/11/2021 14:24:41.74 <Info:AAA.RADIUS.sendSuccess> Access Request(packet length 180, source UDP port 32769, id 252) sent to server #primary netlogin for user 68-84-7E-99-59-F1(userName 'host/UZWS557.<domain>') for the dot1x agent on port 1
03/11/2021 14:24:41.74 <Summ:nl.dot1x.eapPktSent> An EAP packet was sent to RADIUS for client 68:84:7E:99:59:F1 via AAA
03/11/2021 14:24:41.75 <Info:AAA.RADIUS.RecvRspns> Received an Authentication Challenge Response (packet length 64, destination UDP port 32769, id 252) from authentication server #primary netlogin for 68-84-7E-99-59-F1(userName 'host/UZWS557.<domain>') on port 1.
03/11/2021 14:24:41.75 <Summ:AAA.RADIUS.Trace> rad_callback() - start - request 0x529d90
03/11/2021 14:24:41.75 <Summ:AAA.Trace> __aaaReqFindRadiusInQueue-:pkt-id 669
03/11/2021 14:24:41.75 <Summ:AAA.Trace> __aaaReqFindRadiusInQueue-:found by transId 669
03/11/2021 14:24:41.75 <Summ:AAA.Trace> _aaaRespondToClient- :Peer 10
03/11/2021 14:24:41.75 <Summ:AAA.Trace> _aaaRespondToClient-: sent message to client:peer 10
03/11/2021 14:24:41.75 <Summ:AAA.Trace> aaaRequestDequeueNO_LOCK() - queue 0x53398c, request 0x5c7f80 for peer 10, count 0, transId 669, authMethod 2
03/11/2021 14:24:41.75 <Summ:nl.dot1x.AAAResult> 802.1X received authentication result 253 for client 68:84:7E:99:59:F1 from AAA
03/11/2021 14:24:41.75 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_EAP_REQ being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:41.75 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, RESPONSE -> REQUEST
03/11/2021 14:24:41.75 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:41.75 <Summ:nl.dot1x.eapolPktSent> An EAPOL packet was sent to the 802.1X client 68:84:7E:99:59:F1 on port 1
03/11/2021 14:24:41.75 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_EAP_REQ being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:24:41.75 <Summ:nl.dot1x.eapolPktRcvd> EAPOL Packet received on port 1, VLAN instance 4095, VLAN ID 0
03/11/2021 14:24:41.75 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_EAPOL_EAP being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:41.75 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, REQUEST -> RESPONSE
03/11/2021 14:24:41.75 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:24:41.75 <Summ:nl.dot1x.eapPktSent> An EAP packet was sent to RADIUS for client 68:84:7E:99:59:F1 via AAA
03/11/2021 14:24:41.75 <Summ:AAA.Trace> emsSmServer: aaaRecv: received 892 bytes from peer 10
03/11/2021 14:24:41.75 <Summ:AAA.Trace> emsSmServer: aaaRecv got message 10
03/11/2021 14:24:41.75 <Summ:AAA.reqFromPeer> Handle request from peer 10
03/11/2021 14:24:41.75 <Summ:AAA.RADIUS.Trace> aaa:radiusEnabled: SrvrSet: 2 realm:3 enabled? :1
03/11/2021 14:24:41.75 <Summ:AAA.usingRadius> Authenticate using RADIUS Server
03/11/2021 14:24:41.75 <Summ:AAA.Trace> _aaaGetReq[NETLOGIN]-:Authenticat using Radius, user data ptr 0x57ac58
03/11/2021 14:24:41.75 <Summ:AAA.Trace> aaaAuthenticate- Sending to radius for peer 10
03/11/2021 14:24:41.75 <Summ:AAA.Trace> Queuing a RADIUS authen eap request
03/11/2021 14:24:41.75 <Summ:AAA.Trace> Processing EAP request
03/11/2021 14:24:41.75 <Info:AAA.RADIUS.ApiReq> Challenge response for 68-84-7E-99-59-F1(username 'host/UZWS557.<domain>') on port 1.
03/11/2021 14:24:41.75 <Summ:AAA.Trace> aaaRequestUpdateEnqueue() - queue 0x53398c, request 0x5c7f80 for peer 10, count 1, transId 669, authMethod 2
03/11/2021 14:24:41.75 <Info:AAA.RADIUS.sendSuccess> Access Request(packet length 337, source UDP port 32769, id 253) sent to server #primary netlogin for user 68-84-7E-99-59-F1(userName 'host/UZWS557.<domain>') for the dot1x agent on port 1
03/11/2021 14:24:41.76 <Info:AAA.RADIUS.RecvRspns> Received an Authentication Challenge Response (packet length 1068, destination UDP port 327) from authentication server #primary netlogin for 68-84-7E-99-59-F1(userName 'host/UZWS557.<domain>') on port 1.
03/11/2021 14:24:41.76 <Summ:AAA.RADIUS.Trace> rad_callback() - start - request 0x529d90
03/11/2021 14:24:41.76 <Summ:AAA.Trace> __aaaReqFindRadiusInQueue-:pkt-id 669
03/11/2021 14:24:41.76 <Summ:AAA.Trace> __aaaReqFindRadiusInQueue-:found by transId 669
03/11/2021 14:24:41.76 <Summ:AAA.Trace> _aaaRespondToClient- :Peer 10
03/11/2021 14:24:41.76 <Summ:AAA.Trace> _aaaRespondToClient-: Failed to construct user authentication message
03/11/2021 14:24:41.76 <Summ:AAA.Trace> aaaRequestDequeueNO_LOCK() - queue 0x53398c, request 0x5c7f80 for peer 10, count 0, transId 669, authMethod 2
03/11/2021 14:25:11.73 <Summ:nl.dot1x.timerExpiry> Timer AWHILE for client 68:84:7E:99:59:F1 expired
03/11/2021 14:25:11.73 <Info:nl.ClientAuthFailure> Authentication failed for Network Login 802.1x user host/UZWS557.<domain> Mac 68:84:7E:99:59:F1 port 1
03/11/2021 14:25:11.73 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_AWHILE_TIMER_EXPIRY being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:25:11.73 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, RESPONSE -> TIMEOUT
03/11/2021 14:25:11.73 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:25:11.73 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_AUTH_TIMEOUT being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:25:11.73 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, AUTHENTICATING -> ABORTING
03/11/2021 14:25:11.73 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:25:11.73 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, TIMEOUT -> INITIALIZE
03/11/2021 14:25:11.73 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:25:11.73 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, INITIALIZE -> IDLE
03/11/2021 14:25:11.73 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:25:11.73 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, ABORTING -> RESTART
03/11/2021 14:25:11.73 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:25:11.73 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, RESTART -> CONNECTING
03/11/2021 14:25:11.73 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:25:11.73 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, IDLE -> IDLE
03/11/2021 14:25:11.73 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
* swuz200.7 # enable port 1
* swuz200.7 #
* swuz200.7 #
* swuz200.7 # disable port 1
03/11/2021 14:25:34.27 <Info:vlan.msgs.portLinkStateDown> Port 1 link down
03/11/2021 14:25:34.27 <Summ:nl.mac.DeleteClient> Delete client request, 1, 68:84:7E:99:59:F1
* swuz200.8 #
* swuz200.8 #
* swuz200.8 #
* swuz200.8 #
* swuz200.8 # 03/11/2021 14:25:48.55 <Summ:AAA.Trace> auth_rds_state_machine(): Client timeout, user 'host/UZWS557.<domain>' auth_id 666
03/11/2021 14:25:48.55 <Summ:AAA.RADIUS.Trace> rad_callback() - start - request 0x529d90
03/11/2021 14:25:48.55 <Summ:AAA.Trace> __aaaReqFindRadiusInQueue-:pkt-id 666
03/11/2021 14:26:06.55 <Summ:AAA.Trace> auth_rds_state_machine(): Client timeout, user 'host/UZWS557.<domain>' auth_id 667
03/11/2021 14:26:06.55 <Summ:AAA.RADIUS.Trace> rad_callback() - start - request 0x529d90
03/11/2021 14:26:06.55 <Summ:AAA.Trace> __aaaReqFindRadiusInQueue-:pkt-id 667
03/11/2021 14:26:24.55 <Summ:AAA.Trace> auth_rds_state_machine(): Client timeout, user 'host/UZWS557.<domain>' auth_id 668
03/11/2021 14:26:24.55 <Summ:AAA.RADIUS.Trace> rad_callback() - start - request 0x529d90
03/11/2021 14:26:24.55 <Summ:AAA.Trace> __aaaReqFindRadiusInQueue-:pkt-id 668
03/11/2021 14:26:42.55 <Summ:AAA.Trace> auth_rds_state_machine(): Client timeout, user 'host/UZWS557.<domain>' auth_id 669
03/11/2021 14:26:42.55 <Summ:AAA.RADIUS.Trace> rad_callback() - start - request 0x529d90
03/11/2021 14:26:42.55 <Summ:AAA.Trace> __aaaReqFindRadiusInQueue-:pkt-id 669
03-15-2021 02:21 PM
Debug output on Switch:
In fat the problem
03/11/2021 14:23:39.47 <Info:vlan.msgs.portLinkStateDown> Port 1 link down
03/11/2021 14:23:42.73 <Info:vlan.msgs.portLinkStateUp> Port 1 link UP at speed 1 Gbps and full-duplex
03/11/2021 14:23:43.20 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, INITIALIZE -> INITIALIZE
03/11/2021 14:23:43.20 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:23:43.20 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, INITIALIZE -> DISCONNECTED
03/11/2021 14:23:43.20 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:23:43.20 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, DISCONNECTED -> RESTART
03/11/2021 14:23:43.20 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:23:43.20 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, RESTART -> CONNECTING
03/11/2021 14:23:43.20 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:23:43.20 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, INITIALIZE -> INITIALIZE
03/11/2021 14:23:43.20 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:23:43.20 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, INITIALIZE -> IDLE
03/11/2021 14:23:43.20 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:23:43.20 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_EAP_REQ being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:23:43.20 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, CONNECTING -> AUTHENTICATING
03/11/2021 14:23:43.20 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:23:43.20 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_EAP_REQ being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:23:43.20 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, IDLE -> REQUEST
03/11/2021 14:23:43.20 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:23:47.57 <Summ:nl.dot1x.eapolPktRcvd> EAPOL Packet received on port 1, VLAN instance 4095, VLAN ID 0
03/11/2021 14:23:47.57 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_EAPOL_START being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:23:47.57 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, AUTHENTICATING -> ABORTING
03/11/2021 14:23:47.57 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:23:47.57 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, REQUEST -> INITIALIZE
03/11/2021 14:23:47.57 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:23:47.57 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, INITIALIZE -> IDLE
03/11/2021 14:23:47.57 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:23:47.57 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, ABORTING -> RESTART
03/11/2021 14:23:47.57 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:23:47.57 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, RESTART -> CONNECTING
03/11/2021 14:23:47.58 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:23:47.58 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_EAP_REQ being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:23:47.58 <Summ:nl.dot1x.authPaeSMTrans> Authenticator PAE State Machine Transition for client 68:84:7E:99:59:F1, CONNECTING -> AUTHENTICATING
03/11/2021 14:23:47.58 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:23:47.58 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_EAP_REQ being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:23:47.58 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, IDLE -> REQUEST
03/11/2021 14:23:47.58 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:23:47.58 <Summ:nl.dot1x.eapolPktSent> An EAPOL packet was sent to the 802.1X client 68:84:7E:99:59:F1 on port 1
03/11/2021 14:23:47.58 <Summ:nl.dot1x.eapolPktRcvd> EAPOL Packet received on port 1, VLAN instance 4095, VLAN ID 0
03/11/2021 14:23:47.58 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_EAPOL_EAP being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:23:47.58 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, REQUEST -> RESPONSE
03/11/2021 14:23:47.58 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:23:47.58 <Summ:AAA.Trace> emsSmServer: aaaRecv: received 754 bytes from peer 10
03/11/2021 14:23:47.58 <Summ:AAA.Trace> emsSmServer: aaaRecv got message 10
03/11/2021 14:23:47.58 <Summ:AAA.reqFromPeer> Handle request from peer 10
03/11/2021 14:23:47.58 <Summ:AAA.RADIUS.Trace> aaa:radiusEnabled: SrvrSet: 2 realm:3 enabled? :1
03/11/2021 14:23:47.58 <Summ:AAA.usingRadius> Authenticate using RADIUS Server
03/11/2021 14:23:47.58 <Summ:AAA.Trace> _aaaGetReq[NETLOGIN]-:Authenticat using Radius, user data ptr 0x57abc0
03/11/2021 14:23:47.58 <Summ:AAA.Trace> aaaAuthenticate- Sending to radius for peer 10
03/11/2021 14:23:47.58 <Summ:AAA.Trace> Queuing a RADIUS authen eap request
03/11/2021 14:23:47.58 <Summ:AAA.Trace> Processing EAP request
03/11/2021 14:23:47.58 <Info:AAA.RADIUS.ApiReq> EAP request for 68-84-7E-99-59-F1(username 'host/UZWS557.<domein>') on port 1.
03/11/2021 14:23:47.58 <Summ:AAA.Trace> aaaRequestUpdateEnqueue() - queue 0x53398c, request 0x5c7f80 for peer 10, count 1, transId 666, authMethod 2
03/11/2021 14:23:47.58 <Info:AAA.RADIUS.sendSuccess> Access Request(packet length 180, source UDP port 32769, id 246) sent to server #primary netlogin for user 68-84-7E-99-59-F1(userName 'host/UZWS557.<domain>') for the dot1x agent on port 1
03/11/2021 14:23:47.58 <Summ:nl.dot1x.eapPktSent> An EAP packet was sent to RADIUS for client 68:84:7E:99:59:F1 via AAA
03/11/2021 14:23:47.66 <Info:AAA.RADIUS.RecvRspns> Received an Authentication Challenge Response (packet length 64, destination UDP port 32769, id 246) from authentication server #primary netlogin for 68-84-7E-99-59-F1(userName 'host/UZWS557.<domain>') on port 1.
03/11/2021 14:23:47.66 <Summ:AAA.RADIUS.Trace> rad_callback() - start - request 0x529d90
03/11/2021 14:23:47.66 <Summ:AAA.Trace> __aaaReqFindRadiusInQueue-:pkt-id 666
03/11/2021 14:23:47.66 <Summ:AAA.Trace> __aaaReqFindRadiusInQueue-:found by transId 666
03/11/2021 14:23:47.66 <Summ:AAA.Trace> _aaaRespondToClient- :Peer 10
03/11/2021 14:23:47.66 <Summ:AAA.Trace> _aaaRespondToClient-: sent message to client:peer 10
03/11/2021 14:23:47.66 <Summ:AAA.Trace> aaaRequestDequeueNO_LOCK() - queue 0x53398c, request 0x5c7f80 for peer 10, count 0, transId 666, authMethod 2
03/11/2021 14:23:47.66 <Summ:nl.dot1x.AAAResult> 802.1X received authentication result 253 for client 68:84:7E:99:59:F1 from AAA
03/11/2021 14:23:47.66 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_EAP_REQ being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:23:47.66 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, RESPONSE -> REQUEST
03/11/2021 14:23:47.66 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:23:47.66 <Summ:nl.dot1x.eapolPktSent> An EAPOL packet was sent to the 802.1X client 68:84:7E:99:59:F1 on port 1
03/11/2021 14:23:47.66 <Summ:nl.dot1x.authPaeSMEvent> Event DOT1X_EVENT_EAP_REQ being dispatched to client 68:84:7E:99:59:F1's Authenticator PAE State Machine
03/11/2021 14:23:47.67 <Summ:nl.dot1x.eapolPktRcvd> EAPOL Packet received on port 1, VLAN instance 4095, VLAN ID 0
03/11/2021 14:23:47.67 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_EAPOL_EAP being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:23:47.67 <Summ:nl.dot1x.backAuthSMTrans> Backend Authentication State Machine Transition for client 68:84:7E:99:59:F1, REQUEST -> RESPONSE
03/11/2021 14:23:47.67 <Summ:nl.dot1x.backAuthSMEvent> Event DOT1X_EVENT_ENTER_STATE being dispatched to client 68:84:7E:99:59:F1's Backend Authentication State Machine
03/11/2021 14:23:47.67 <Summ:AAA.Trace> emsSmServer: aaaRecv: received 892 bytes from peer 10
03/11/2021 14:23:47.67 <Summ:AAA.Trace> emsSmServer: aaaRecv got message 10
03/11/2021 14:23:47.67 <Summ:AAA.reqFromPeer> Handle request from peer 10
03/11/2021 14:23:47.67 <Summ:AAA.RADIUS.Trace> aaa:radiusEnabled: SrvrSet: 2 realm:3 enabled? :1
03/11/2021 14:23:47.67 <Summ:AAA.usingRadius> Authenticate using RADIUS Server
03/11/2021 14:23:47.67 <Summ:AAA.Trace> _aaaGetReq[NETLOGIN]-:Authenticat using Radius, user data ptr 0x57abc0
03/11/2021 14:23:47.67 <Summ:AAA.Trace> aaaAuthenticate- Sending to radius for peer 10
03/11/2021 14:23:47.67 <Summ:AAA.Trace> Queuing a RADIUS authen eap request
03/11/2021 14:23:47.67 <Summ:AAA.Trace> Processing EAP request
03/11/2021 14:23:47.67 <Info:AAA.RADIUS.ApiReq> Challenge response for 68-84-7E-99-59-F1(username 'host/UZWS557.<domain>') on port 1.
03/11/2021 14:23:47.67 <Summ:AAA.Trace> aaaRequestUpdateEnqueue() - queue 0x53398c, request 0x5c7f80 for peer 10, count 1, transId 666, authMethod 2
03/11/2021 14:23:47.67 <Info:AAA.RADIUS.sendSuccess> Access Request(packet length 337, source UDP port 32769, id 247) sent to server #primary netlogin for user 68-84-7E-99-59-F1(userName 'host/UZWS557.<domain>') for the dot1x agent on port 1
03/11/2021 14:23:47.68 <Summ:nl.dot1x.eapPktSent> An EAP packet was sent to RADIUS for client 68:84:7E:99:59:F1 via AAA
03/11/2021 14:23:47.68 <Info:AAA.RADIUS.RecvRspns> Received an Authentication Challenge Response (packet length 1068, destination UDP port 32769, id 247) from authentication server #primary netlogin for 68-84-7E-99-59-F1(userName 'host/UZWS557.<domain>') on port 1.
03/11/2021 14:23:47.68 <Summ:AAA.RADIUS.Trace> rad_callback() - start - request 0x529d90
03/11/2021 14:23:47.68 <Summ:AAA.Trace> __aaaReqFindRadiusInQueue-:pkt-id 666
03/11/2021 14:23:47.68 <Summ:AAA.Trace> __aaaReqFindRadiusInQueue-:found by transId 666
03/11/2021 14:23:47.68 <Summ:AAA.Trace> _aaaRespondToClient- :Peer 10
03/11/2021 14:23:47.68 <Summ:AAA.Trace> _aaaRespondToClient-: Failed to construct user authentication message
03/11/2021 14:23:47.68 <Summ:AAA.Trace> aaaRequestDequeueNO_LOCK() - queue 0x53398c, request 0x5c7f80 for peer 10, count 0, transId 666, authMethod 2
For some reason the Port 1 gets into vlan instance 4095 = vlan ID 0?
We think this is why it does not work.
We do not know how to prevent this and where it comes from?
The PC is in the right LDAP group and the group configuration is OK.
This was tested before in a configuration without Policy and that worked great.
But then we could not get the telephone (port 2) tagged in the vlan for telephones.
Yes, we use Fabric Attach in this setup
Any help or insight is greatly appreciated?
If more information is need please let us know.