Avaya WLAN Security Switch 2300 Series Troubleshooting And Debug Manual page 56

Table of Contents

Advertisement

56
AAA Jan 31 22:44:46.868218 DEBUG (0) RADIUS: Authenticator=0x33 b6 52 70 93 ec 63 67 6b 78 13 c6
48 c5 d7 e8
AAA Jan 31 22:44:46.868299 DEBUG (1872) RADIUS: 79 RAD_ATTR_EAP_MSG
0x30b0004....
AAA Jan 31 22:44:46.868379 DEBUG (1872) RADIUS: 81 RAD_TUNNEL_PRIVATE_GROUP_ID
vlen=8 vlan-eng
AAA Jan 31 22:44:46.868457 DEBUG (1872) RADIUS: VSA=10, len=15, MICROSOFT
RAD_ATTR_UNKNOWN vlen 7 0x1545241....
AAA Jan 31 22:44:46.868562 DEBUG (1872) RADIUS: VSA=26, len=51, MICROSOFT MS-CHAP-V2-
Success vlen 43 0x1533d35....
AAA Jan 31 22:44:46.868624 DEBUG (1872) RADIUS: VSA=16, len=58, MICROSOFT MS-MPPE-
Send-Key vlen 52
AAA Jan 31 22:44:46.868682 DEBUG (1872) RADIUS: VSA=17, len=58, MICROSOFT MS-MPPE-
Recv-Key vlen 52
AAA Jan 31 22:44:46.868760 DEBUG (1872) RADIUS: 25 RAD_ATTR_CLASS
0x450504eb....
AAA Jan 31 22:44:46.868837 DEBUG (1872) RADIUS: 80
RAD_ATTR_EAP_MSG_AUTHENTICATOR vlen=16 0x22620286....
Decode of packet received.
AAA Jan 31 22:44:46.869027 DEBUG (1872) RADIUS: Input: 79 RAD_ATTR_EAP_MSG
0x30b0004....
AAA Jan 31 22:44:46.869102 DEBUG (1872) RADIUS: Call decode fn rad_dec_no_op
AAA Jan 31 22:44:46.869156 DEBUG (1872) RADIUS: rad_dec_no_op RAD_ATTR_EAP_MSG ignored
AAA Jan 31 22:44:46.869231 DEBUG (1872) RADIUS: Input: 81
RAD_TUNNEL_PRIVATE_GROUP_ID vlen=8 vlan-eng
AAA Jan 31 22:44:46.869288 DEBUG (1872) RADIUS: Call decode fn rad_dec_tunnel_private_group_id
AAA Jan 31 22:44:46.869364 DEBUG (1872) RADIUS: (rad_dec_tunnel_private_group_id)
RAD_TUNNEL_PRIVATE_GROUP_ID vlan-eng
Decode the "Tunnel-Private-Group-ID" value and pass it to authorization for use as the
user's VLAN. In this case the VLAN is "vlan-eng". If you have configured other attributes
on the RADIUS server they will appear in this list. All Avaya authorization attributes are of
type "string", so you will be able to read the contents clearly in the trace. This is very
useful when troubleshooting "authorization errors" on the WSS as you can see what the
WSS thinks the RADIUS server is sending. Keep in mind that this is from the perspective of
the WSS, and so is not a complete replacement for an Ethernet sniffer trace... But it's a
very good starting point.
AAA Jan 31 22:44:46.869455 DEBUG (1872) RADIUS: Input: VSA=10, len=15, MICROSOFT
RAD_ATTR_UNKNOWN vlen 7 0x1545241....
NN47250-700 (Version 04.01)
vlen=4
vlen=30
vlen=4

Advertisement

Table of Contents
loading

Table of Contents