Authenticating between a Cisco 3640 and radius server
Nat
freeradius at connect.com.fj
Tue Sep 13 01:07:53 CEST 2005
HI Amos,
Your radius is sending out access-accept packets to the NAS-192.168.82.50:1645.
Would it be possible to get all relevant 'aaa' config lines from your CISCO router.
regards
NAT
Authenticating between a Cisco 3640 and radius server
Amos Cottrill
Tue, 06 Sep 2005 04:30:48 -0700
I setup free radius on a linux box and am trying to authenticate a user from a cisco 3640 router. Below
is the output I am receiving when using radiusd -xxyz -l stdout. The router will not let me login, so
something isn't working properly. Any suggestions??? I set the radius server up to use port 1645, so it
resembles the cisco settings.
Thread 1 waiting to be assigned a request
Thread 2 waiting to be assigned a request
Thread 3 waiting to be assigned a request
rad_recv: Access-Request packet from host 192.168.82.50:1645, id=3, length=74
--- Walking the entire request list ---
Waking up in 31 seconds...
Threads: total/active/spare threads = 5/0/5
Thread 5 got semaphore
Thread 5 handling request 0, (1 handled so far)
NAS-IP-Address = 192.168.82.50
NAS-Port = 131
NAS-Port-Type = Virtual
User-Name = "cisco"
Calling-Station-Id = "10.0.1.19"
User-Password = "harley"
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 0
modcall[authorize]: module "preprocess" returns ok for request 0
modcall[authorize]: module "chap" returns noop for request 0
modcall[authorize]: module "mschap" returns noop for request 0
rlm_realm: No '@' in User-Name = "cisco", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 0
rlm_eap: No EAP-Message, not doing EAP
modcall[authorize]: module "eap" returns noop for request 0
users: Matched cisco at 152
modcall[authorize]: module "files" returns ok for request 0
modcall: group authorize returns ok for request 0
auth: type Local
auth: user supplied User-Password matches local User-Password
Login OK: [cisco] (from client spare_3640 port 131 cli 10.0.1.19)
Sending Access-Accept of id 3 to 192.168.82.50:1645
Service-Type = Login-User
Login-Service = Telnet
Finished request 0
Going to the next request
Thread 5 waiting to be assigned a request
rad_recv: Access-Request packet from host 192.168.82.50:1645, id=3, length=74
Sending duplicate reply to client spare_3640:1645 - ID: 3
Re-sending Access-Accept of id 3 to 192.168.82.50:1645
--- Walking the entire request list ---
Waking up in 1 seconds...
--- Walking the entire request list ---
Cleaning up request 0 ID 3 with timestamp 43171770
Nothing to do. Sleeping until we see a request.
rad_recv: Access-Request packet from host 192.168.82.50:1645, id=3, length=74
--- Walking the entire request list ---
Waking up in 31 seconds...
Thread 4 got semaphore
Thread 4 handling request 1, (1 handled so far)
NAS-IP-Address = 192.168.82.50
NAS-Port = 131
NAS-Port-Type = Virtual
User-Name = "cisco"
Calling-Station-Id = "10.0.1.19"
User-Password = "harley"
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 1
modcall[authorize]: module "preprocess" returns ok for request 1
modcall[authorize]: module "chap" returns noop for request 1
modcall[authorize]: module "mschap" returns noop for request 1
rlm_realm: No '@' in User-Name = "cisco", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 1
rlm_eap: No EAP-Message, not doing EAP
modcall[authorize]: module "eap" returns noop for request 1
users: Matched cisco at 152
modcall[authorize]: module "files" returns ok for request 1
modcall: group authorize returns ok for request 1
auth: type Local
auth: user supplied User-Password matches local User-Password
Login OK: [cisco] (from client spare_3640 port 131 cli 10.0.1.19)
Sending Access-Accept of id 3 to 192.168.82.50:1645
Service-Type = Login-User
Login-Service = Telnet
Finished request 1
Going to the next request
Thread 4 waiting to be assigned a request
rad_recv: Access-Request packet from host 192.168.82.50:1645, id=3, length=74
Sending duplicate reply to client spare_3640:1645 - ID: 3
Re-sending Access-Accept of id 3 to 192.168.82.50:1645
--- Walking the entire request list ---
Waking up in 1 seconds...
--- Walking the entire request list ---
Cleaning up request 1 ID 3 with timestamp 4317177a
Nothing to do. Sleeping until we see a request.
--
Amos Cottrill
Assistant Network Coordinator - SEOVEC
[EMAIL PROTECTED]
Ph:(740) 594-7663 ext 119
Fax:(740) 592-6251
More information about the Freeradius-Announce
mailing list