[ Pobierz całość w formacie PDF ]
Jan 7 19:29:44.127: AAA: name=Async11 flags=0x11 type=4 shelf=0 slot=0 adapter=
0 port=11 channel=0
Jan 7 19:29:44.127: AAA: parse name=Serial0:0 idb type=12 tty=-1
Jan 7 19:29:44.127: AAA: name=Serial0:0 flags=0x51 type=1 shelf=0 slot=0 adapte
r=0 port=0 channel=0
Jan 7 19:29:44.127: AAA/AUTHEN: create_user (0x612B7E1C) user='jeremy@hgw.com'
ruser='' port='Async11' rem_addr='408/5550945' authen_type=CHAP service=PPP priv
=1
Jan 7 19:29:44.127: As11 VPDN: Bind interface direction=1
Jan 7 19:29:44.127: L2F: MID state closed
Jan 7 19:29:44.127: L2F: Open UDP socket to 172.22.66.25
Jan 7 19:29:44.131: L2F: Tunnel state opening
Jan 7 19:29:44.131: As11 L2F: MID jeremy@hgw.com state waiting_for_tunnel
Jan 7 19:29:44.131: As11 VPDN: jeremy@hgw.com is forwarded
Jan 7 19:29:44.135: L2F: L2F_CONF received
Jan 7 19:29:44.135: L2F: Removing resend packet (L2F_CONF)
Jan 7 19:29:44.135: ENT_HGW L2F: Tunnel state open
Jan 7 19:29:44.135: L2F: L2F_OPEN received
Jan 7 19:29:44.139: L2F: Removing resend packet (L2F_OPEN)
Jan 7 19:29:44.139: L2F: Building nas2gw_mid0
Jan 7 19:29:44.139: L2F: L2F_CLIENT_INFO: CLID/DNIS 408/5550945
Jan 7 19:29:44.139: L2F: L2F_CLIENT_INFO: NAS-Port Async11
Jan 7 19:29:44.139: L2F: L2F_CLIENT_INFO: Client-Bandwidth-Kbps 115
Jan 7 19:29:44.139: L2F: L2F_CLIENT_INFO: NAS-Rate L2F/28800/50000
Jan 7 19:29:44.139: As11 L2F: MID jeremy@hgw.com state opening
Jan 7 19:29:44.139: RADIUS: ustruct sharecount=3
Jan 7 19:29:44.139: RADIUS: Initial Transmit Async11 id 53 172.22.66.18:1646, A
ccounting-Request, len 108
Jan 7 19:29:44.139: Attribute 4 6 AC164217
Jan 7 19:29:44.139: Attribute 5 6 0000000B
Jan 7 19:29:44.139: Attribute 61 6 00000000
Jan 7 19:29:44.139: Attribute 1 16 6A657265
Jan 7 19:29:44.139: Attribute 30 9 35373130
Jan 7 19:29:44.139: Attribute 31 5 34303828
Jan 7 19:29:44.139: Attribute 40 6 00000001
Jan 7 19:29:44.139: Attribute 45 6 00000002
Jan 7 19:29:44.139: Attribute 6 6 00000002
Jan 7 19:29:44.139: Attribute 44 10 30303030
Jan 7 19:29:44.139: Attribute 7 6 00000001
Jan 7 19:29:44.139: Attribute 41 6 00000000
Jan 7 19:29:44.227: L2F: L2F_OPEN received
Jan 7 19:29:44.227: L2F: Got a MID management packet
Jan 7 19:29:44.227: L2F: Removing resend packet (L2F_OPEN)
Jan 7 19:29:44.227: As11 L2F: MID jeremy@hgw.com state open
Jan 7 19:29:44.227: As11 L2F: MID synced NAS/HG Clid=64/34 Mid=1
Jan 7 19:29:44.227: As11 PPP: Phase is FORWARDED
Jan 7 19:29:44.795: RADIUS: Received from id 53 172.22.66.18:1646, Accounting-r
esponse, len 20
Jan 7 19:29:45.131: %LINEPROTO-5-UPDOWN: Line protocol on Interface Async11, ch
anged state to up
102 Access VPN Solutions Using Tunneling Technology
Debug Output from Configuring Access VPN with Remote AAA
Table 11 describes the debug output events in more detail.
Table 11 Time Stamps and Descriptions of Access VPN Events on the NAS
Time Stamp Description
19:29:44:007 to LCP negotiation is finished. The NAS sends a CHAP challenge to the client. The client sends a
19:29:44:115 CHAP response with the username jeremy@hgw.com.
19:29:44:119 The NAS is searching for tunnel information.
19:29:44:119 The AAA subsystem inside the Cisco IOS software displays the call-path information. The
current call uses TTY line 11, asynchronous interface 11, and serial B-channel 0:0.
19:29:44:119 The local authorization module is accessed. The running configuration wants authorization for
PPP and VPN services, and a AAA list called default. The default authorization method is
RADIUS.
19:29:44:119 The RADIUS module inside the Cisco IOS software transmits authentication and authorization
attributes to the remote RADIUS server. The server is located at IP address 172.22.66.18.
RADIUS authentication on UNIX platforms listens to port 1645. All authentication packets go
out this port.
The NAS requests RADIUS attributes to be negotiated by the AAA server.
19:29:44:123 The remote RADIUS server performs its authentication and authorization for hgw.com. The NAS
receives vendor specific AV pairs from the AAA server.
19:29:44:127 The RADIUS module transfers the attribute information to the local AAA subsystem. The post
authorization status is equal to pass. The domain name hgw.com has been authenticated (see the
free_user field).
[ Pobierz całość w formacie PDF ]