Table Of Contents
L2F Debug Output for the L2F Case Study
Debug Output from Configuring Basic Dial Access for the NAS
Debug Output from Configuring Access VPN with Local AAA
Debug Output from Configuring Access VPN with Remote AAA
L2F Debug Output for the L2F Case Study
This appendix contains comprehensive debug output from the configuration tasks in this case study. The output is a powerful tool that can help you understand the entire process of how an access VPN is established when a user dials in.
The most important lines of output in this appendix are shown in bold. Tables at the end of the output explain these bold lines.
This appendix is divided into the following sections:
•
Debug Output from Configuring Basic Dial Access for the NAS
•
Debug Output from Configuring Access VPN with Local AAA
•
Debug Output from Configuring Access VPN with Remote AAA
Note
If you are accessing the NAS and home gateway through a Telnet connection, you need to enable the terminal monitor command. This command ensures that your EXEC session is receiving the logging and debug output from the devices.
Debug Output from Configuring Basic Dial Access for the NAS
The following debug output is produced when a client dials into the NAS via the public switched telephone network (PSTN) and is authenticated locally on the NAS.
For more information on how to configure basic dial access for the NAS, see "Configuring the NAS for Basic Dial Access."
Enable the following debug commands on the NAS:
•
debug isdn q931
•
debug ppp negotiation
•
debug ppp authentication
•
debug modem csm
•
debug ip peer
From the client, dial the PRI telephone number assigned to the NAS' T1 trunks. The username is jeremy; the password is subaru. The user is locally authenticated by the NAS.
As the NAS receives the modem call from the client, the following debug command output appears on the NAS' terminal screen.
*Jan 1 21:22:16.410: TTY14: destroy timer type 1
*Jan 1 21:22:16.410: TTY14: destroy timer type 0
*Jan 1 21:22:16.410: tty14: Modem: IDLE->READY
*Jan 1 21:22:18.410: %LINK-3-UPDOWN: Interface Async14, changed state to up
*Jan 1 21:22:18.410: As14 PPP: Treating connection as a dedicated line
*Jan 1 21:22:18.410: As14 PPP: Phase is ESTABLISHING, Active Open
*Jan 1 21:22:18.410: As14 LCP: O CONFREQ [Closed] id 1 len 25
*Jan 1 21:22:18.410: As14 LCP: ACCM 0x000A0000 (0x0206000A0000)
*Jan 1 21:22:18.410: As14 LCP: AuthProto CHAP (0x0305C22305)
*Jan 1 21:22:18.410: As14 LCP: MagicNumber 0x151213B2 (0x0506151213B2)
*Jan 1 21:22:18.410: As14 LCP: PFC (0x0702)
*Jan 1 21:22:18.410: As14 LCP: ACFC (0x0802)
*Jan 1 21:22:18.542: As14 LCP: I CONFACK [REQsent] id 1 len 25
*Jan 1 21:22:18.542: As14 LCP: ACCM 0x000A0000 (0x0206000A0000)
*Jan 1 21:22:18.542: As14 LCP: AuthProto CHAP (0x0305C22305)
*Jan 1 21:22:18.542: As14 LCP: MagicNumber 0x151213B2 (0x0506151213B2)
*Jan 1 21:22:18.542: As14 LCP: PFC (0x0702)
*Jan 1 21:22:18.542: As14 LCP: ACFC (0x0802)
*Jan 1 21:22:19.262: As14 LCP: I CONFREQ [ACKrcvd] id 2 len 23
*Jan 1 21:22:19.262: As14 LCP: ACCM 0x000A0000 (0x0206000A0000)
*Jan 1 21:22:19.262: As14 LCP: MagicNumber 0x001A9072 (0x0506001A9072)
*Jan 1 21:22:19.262: As14 LCP: PFC (0x0702)
*Jan 1 21:22:19.262: As14 LCP: ACFC (0x0802)
*Jan 1 21:22:19.262: As14 LCP: Callback 6 (0x0D0306)
*Jan 1 21:22:19.262: As14 LCP: O CONFREJ [ACKrcvd] id 2 len 7
*Jan 1 21:22:19.262: As14 LCP: Callback 6 (0x0D0306)
*Jan 1 21:22:19.374: As14 LCP: I CONFREQ [ACKrcvd] id 3 len 20
*Jan 1 21:22:19.374: As14 LCP: ACCM 0x000A0000 (0x0206000A0000)
*Jan 1 21:22:19.374: As14 LCP: MagicNumber 0x001A9072 (0x0506001A9072)
*Jan 1 21:22:19.374: As14 LCP: PFC (0x0702)
*Jan 1 21:22:19.374: As14 LCP: ACFC (0x0802)
*Jan 1 21:22:19.374: As14 LCP: O CONFACK [ACKrcvd] id 3 len 20
*Jan 1 21:22:19.374: As14 LCP: ACCM 0x000A0000 (0x0206000A0000)
*Jan 1 21:22:19.374: As14 LCP: MagicNumber 0x001A9072 (0x0506001A9072)
*Jan 1 21:22:19.374: As14 LCP: PFC (0x0702)
*Jan 1 21:22:19.374: As14 LCP: ACFC (0x0802)
*Jan 1 21:22:19.374: As14 LCP: State is Open
*Jan 1 21:22:19.374: As14 PPP: Phase is AUTHENTICATING, by this end
*Jan 1 21:22:19.374: As14 CHAP: O CHALLENGE id 1 len 28 from "ISP_NAS"
*Jan 1 21:22:19.518: As14 CHAP: I RESPONSE id 1 len 27 from "jeremy"
*Jan 1 21:22:19.518: As14 CHAP: O SUCCESS id 1 len 4
*Jan 1 21:22:19.518: As14 PPP: Phase is UP
*Jan 1 21:22:19.518: As14 IPCP: O CONFREQ [Closed] id 1 len 10
*Jan 1 21:22:19.518: As14 IPCP: Address 172.22.66.23 (0x0306AC164217)
*Jan 1 21:22:19.630: As14 IPCP: I CONFREQ [REQsent] id 1 len 40
*Jan 1 21:22:19.630: As14 IPCP: CompressType VJ 15 slots CompressSlotID (0x0
*Jan 1 21:22:19.630: As14 IPCP: Address 0.0.0.0 (0x030600000000)
*Jan 1 21:22:19.630: As14 IPCP: PrimaryDNS 0.0.0.0 (0x810600000000)
*Jan 1 21:22:19.630: As14 IPCP: PrimaryWINS 0.0.0.0 (0x820600000000)
*Jan 1 21:22:19.630: As14 IPCP: SecondaryDNS 0.0.0.0 (0x830600000000)
*Jan 1 21:22:19.630: As14 IPCP: SecondaryWINS 0.0.0.0 (0x840600000000)
*Jan 1 21:22:19.630: As14 IPCP: Using pool 'dialin_pool'
*Jan 1 21:22:19.630: ip_get_pool: As14: using pool dialin_pool
*Jan 1 21:22:19.630: ip_get_pool: As14: returning address = 172.22.66.55
*Jan 1 21:22:19.630: As14 IPCP: Pool returned 172.22.66.55
*Jan 1 21:22:19.630: As14 IPCP: O CONFREJ [REQsent] id 1 len 22
*Jan 1 21:22:19.630: As14 IPCP: CompressType VJ 15 slots CompressSlotID (0x0
*Jan 1 21:22:19.630: As14 IPCP: PrimaryWINS 0.0.0.0 (0x820600000000)
*Jan 1 21:22:19.630: As14 IPCP: SecondaryWINS 0.0.0.0 (0x840600000000)
*Jan 1 21:22:19.646: As14 CCP: I CONFREQ [Not negotiated] id 1 len 15
*Jan 1 21:22:19.646: As14 CCP: MS-PPC supported bits 0x00000001 (0x120600000
*Jan 1 21:22:19.646: As14 CCP: Stacker history 1 check mode EXTENDED (0x1105
*Jan 1 21:22:19.646: As14 LCP: O PROTREJ [Open] id 2 len 21 protocol CCP
*Jan 1 21:22:19.646: As14 LCP: (0x80FD0101000F12060000000111050001)
*Jan 1 21:22:19.646: As14 LCP: (0x04)
*Jan 1 21:22:19.646: As14 IPCP: I CONFACK [REQsent] id 1 len 10
*Jan 1 21:22:19.646: As14 IPCP: Address 172.22.66.23 (0x0306AC164217)
*Jan 1 21:22:20.518: %LINEPROTO-5-UPDOWN: Line protocol on Interface Async14, c
*Jan 1 21:22:21.518: As14 IPCP: TIMEout: State ACKrcvd
*Jan 1 21:22:21.518: As14 IPCP: O CONFREQ [ACKrcvd] id 2 len 10
*Jan 1 21:22:21.518: As14 IPCP: Address 172.22.66.23 (0x0306AC164217)
*Jan 1 21:22:21.626: As14 IPCP: I CONFACK [REQsent] id 2 len 10
*Jan 1 21:22:21.626: As14 IPCP: Address 172.22.66.23 (0x0306AC164217)
*Jan 1 21:22:22.634: As14 IPCP: I CONFREQ [ACKrcvd] id 2 len 34
*Jan 1 21:22:22.634: As14 IPCP: Address 0.0.0.0 (0x030600000000)
*Jan 1 21:22:22.634: As14 IPCP: PrimaryDNS 0.0.0.0 (0x810600000000)
*Jan 1 21:22:22.634: As14 IPCP: PrimaryWINS 0.0.0.0 (0x820600000000)
*Jan 1 21:22:22.634: As14 IPCP: SecondaryDNS 0.0.0.0 (0x830600000000)
*Jan 1 21:22:22.634: As14 IPCP: SecondaryWINS 0.0.0.0 (0x840600000000)
*Jan 1 21:22:22.634: As14 IPCP: O CONFREJ [ACKrcvd] id 2 len 16
*Jan 1 21:22:22.634: As14 IPCP: PrimaryWINS 0.0.0.0 (0x820600000000)
*Jan 1 21:22:22.634: As14 IPCP: SecondaryWINS 0.0.0.0 (0x840600000000)
*Jan 1 21:22:22.742: As14 IPCP: I CONFREQ [ACKrcvd] id 3 len 22
*Jan 1 21:22:22.746: As14 IPCP: Address 0.0.0.0 (0x030600000000)
*Jan 1 21:22:22.746: As14 IPCP: PrimaryDNS 0.0.0.0 (0x810600000000)
*Jan 1 21:22:22.746: As14 IPCP: SecondaryDNS 0.0.0.0 (0x830600000000)
*Jan 1 21:22:22.746: As14 IPCP: O CONFNAK [ACKrcvd] id 3 len 22
*Jan 1 21:22:22.746: As14 IPCP: Address 172.22.66.55 (0x0306AC164237)
*Jan 1 21:22:22.746: As14 IPCP: PrimaryDNS 171.68.10.70 (0x8106AB440A46)
*Jan 1 21:22:22.746: As14 IPCP: SecondaryDNS 171.68.10.140 (0x8306AB440A8C)
*Jan 1 21:22:22.854: As14 IPCP: I CONFREQ [ACKrcvd] id 4 len 22
*Jan 1 21:22:22.854: As14 IPCP: Address 172.22.66.55 (0x0306AC164237)
*Jan 1 21:22:22.858: As14 IPCP: PrimaryDNS 171.68.10.70 (0x8106AB440A46)
*Jan 1 21:22:22.858: As14 IPCP: SecondaryDNS 171.68.10.140 (0x8306AB440A8C)
*Jan 1 21:22:22.858: ip_get_pool: As14: validate address = 172.22.66.55
*Jan 1 21:22:22.858: ip_get_pool: As14: using pool dialin_pool
*Jan 1 21:22:22.858: ip_get_pool: As14: returning address = 172.22.66.55
*Jan 1 21:22:22.858: set_ip_peer_addr: As14: address = 172.22.66.55 (3) is redu
*Jan 1 21:22:22.858: As14 IPCP: O CONFACK [ACKrcvd] id 4 len 22
*Jan 1 21:22:22.858: As14 IPCP: Address 172.22.66.55 (0x0306AC164237)
*Jan 1 21:22:22.858: As14 IPCP: PrimaryDNS 171.68.10.70 (0x8106AB440A46)
*Jan 1 21:22:22.858: As14 IPCP: SecondaryDNS 171.68.10.140 (0x8306AB440A8C)
*Jan 1 21:22:22.858: As14 IPCP: State is Open
*Jan 1 21:22:22.858: As14 IPCP: Install route to 172.22.66.55
describes the debug output events in more detail.
Table 8 Time Stamps and Descriptions for Basic Dial Negotiation Events
Time Stamp
|
Description
|
21:22:16.410
|
A modem call comes in to the access server on TTY line 14.
|
21:22:18:410
|
Interface async 4 comes up. After PPP launches, TTY line 14 becomes async interface 14.
|
21:22:18:410
|
An incoming PPP frame is recognized. PPP is launched on TTY line 14.
|
21:22:19:262
|
Incoming config request (I CONFREQ). The remote test PC requests a set of options to be negotiated. The PC asks the Cisco AS5300 to support the callback option.
|
21:22:19:262
|
Outgoing config reject (O CONFREJ). The Cisco AS5300 rejects the callback option. The access server is not configured to support Microsoft Callback in this case study.
|
21:22:19:374
|
Incoming config request (I CONFREQ). The test PC requests a new set of options. Notice that Microsoft Callback is not requested.
|
21:22:19:374
|
Outgoing config acknowledgment (O CONFACK). The Cisco AS5300 accepts the new set of options.
|
21:22:19:374
|
LCP is now open (LCP: State is Open). Both sides have acknowledged (CONFACK) the other side's configuration request (CONFREQ).
|
21:22:19:374
|
After LCP negotiates, authentication starts. Authentication must take place before any network protocols, such as IP, are delivered. Both sides authenticate with the method negotiated during LCP. The Cisco AS5300 authenticates the client using CHAP. The client does not authenticate the access server.
|
21:22:19:374
|
Outgoing challenge sent from ISP_NAS.
|
21:22:19:518
|
Incoming CHAP response from the test PC, which shows the username jeremy.
|
21:22:19:518
|
An outgoing success message is sent from the NAS—authentication is successful.
|
21:22:19:518
|
PPP is up. The Cisco AS5300 PPP link is now open and available to negotiate any network protocols supported by both peers.
|
21:22:19:646
|
The client requests support for Microsoft Point-to-Point Compression (MPPC). The Cisco AS5300 rejects this request. The access server's integrated modems already support hardware compression, and the Cisco IOS is not configured to support software compression.
|
21:22:22:634
|
The primary and secondary DNS addresses are negotiated. At first, the client asks for 0.0.0.0. addresses. The access server sends out a CONFNAK and supplies the correct values, which include an IP address from the pool, the primary DNS address, and the backup DNS address.
|
21:22:22:854
|
The client sends an incoming request saying that the new values are accepted. Whenever the access server sends out a CONFNAK that includes values, the client still has to accept the new values.
|
21:22:22:858
|
An outgoing CONFACK is sent for IPCP. The state is open for IPCP. A route is negotiated and installed for the IPCP peer, which is assigned IP address 172.22.66.55.
|
Debug Output from Configuring Access VPN with Local AAA
The following debug output is produced by an access VPN that is using local AAA. The client dials in to the NAS, is forwarded to the home gateway using L2F, and the tunnel and username are authenticated using local AAA.
For more information on how to configure the access VPN for local AAA, see "Configuring the Access VPN to Work with Local AAA."
Enable the following debug commands on the NAS.
•
debug isdn q931
•
debug modem csm
•
debug ppp authentication
•
debug ppp negotiation
•
debug vpdn event
•
debug vpdn l2x-events
Enable the following debug commands on the home gateway:
•
debug vpdn events
•
debug vpdn l2x-events
•
debug ppp negotiation
•
debug ppp authentication
•
debug vtemplate
•
debug ip peer
Send an asynchronous PPP modem call in to the access server. As the call is forwarded to the home gateway, the following debug output appears on the NAS' terminal screen:
*Jan 2 01:04:48.817: ISDN Se0:23: RX <- SETUP pd = 8 callref = 0x0266
*Jan 2 01:04:48.817: Bearer Capability i = 0x8090A2
*Jan 2 01:04:48.817: Channel ID i = 0xA98381
*Jan 2 01:04:48.821: Progress Ind i = 0x8283 - Origination address is n
*Jan 2 01:04:48.821: Calling Party Number i = '!', 0x83, '4089548042'
*Jan 2 01:04:48.821: Called Party Number i = 0xC1, '5550945'
*Jan 2 01:04:48.821: ISDN Se0:23: TX -> CALL_PROC pd = 8 callref = 0x8266
*Jan 2 01:04:48.821: Channel ID i = 0xA98381
*Jan 2 01:04:48.821: ISDN Se0:23: TX -> ALERTING pd = 8 callref = 0x8266
*Jan 2 01:04:48.821: EVENT_FROM_ISDN::dchan_idb=0x60E9DD98, call_id=0x2E, ces=0
bchan=0x0, event=0x1, cause=0x0
*Jan 2 01:04:48.821: VDEV_ALLOCATE: slot 1 and port 21 is allocated.
*Jan 2 01:04:48.821: EVENT_FROM_ISDN:(002E): DEV_INCALL at slot 1 and port 21
*Jan 2 01:04:48.825: CSM_PROC_IDLE: CSM_EVENT_ISDN_CALL at slot 1, port 21
*Jan 2 01:04:48.825: Mica Modem(1/21): Configure(0x1 = 0x0)
*Jan 2 01:04:48.825: Mica Modem(1/21): Configure(0x23 = 0x0)
*Jan 2 01:04:48.825: Mica Modem(1/21): Call Setup
*Jan 2 01:04:48.913: Mica Modem(1/21): State Transition to Call Setup
*Jan 2 01:04:48.913: Mica Modem(1/21): Went offhook
*Jan 2 01:04:48.913: CSM_PROC_IC1_RING: CSM_EVENT_MODEM_OFFHOOK at slot 1, port
*Jan 2 01:04:48.913: ISDN Se0:23: TX -> CONNECT pd = 8 callref = 0x8266
*Jan 2 01:04:48.945: ISDN Se0:23: RX <- CONNECT_ACK pd = 8 callref = 0x0266
*Jan 2 01:04:48.945: EVENT_FROM_ISDN::dchan_idb=0x60E9DD98, call_id=0x2E, ces=0
bchan=0x0, event=0x4, cause=0x0
*Jan 2 01:04:48.949: EVENT_FROM_ISDN:(002E): DEV_CONNECTED at slot 1 and port 2
*Jan 2 01:04:48.949: CSM_PROC_IC4_WAIT_FOR_CARRIER: CSM_EVENT_ISDN_CONNECTED at
*Jan 2 01:04:48.949: Mica Modem(1/21): Link Initiate
*Jan 2 01:04:50.049: Mica Modem(1/21): State Transition to Connect
*Jan 2 01:04:55.201: Mica Modem(1/21): State Transition to Link
*Jan 2 01:05:12.753: Mica Modem(1/21): State Transition to Trainup
*Jan 2 01:05:14.489: Mica Modem(1/21): State Transition to EC Negotiating
*Jan 2 01:05:15.149: Mica Modem(1/21): State Transition to Steady State
*Jan 2 01:05:17.969: %LINK-3-UPDOWN: Interface Async22, changed state to up
*Jan 2 01:05:17.969: As22 PPP: Treating connection as a dedicated line
*Jan 2 01:05:17.969: As22 PPP: Phase is ESTABLISHING, Active Open
*Jan 2 01:05:17.969: As22 LCP: O CONFREQ [Closed] id 1 len 39
*Jan 2 01:05:17.969: As22 LCP: ACCM 0x000A0000 (0x0206000A0000)
*Jan 2 01:05:17.969: As22 LCP: AuthProto CHAP (0x0305C22305)
*Jan 2 01:05:17.969: As22 LCP: MagicNumber 0x15DE3BBE (0x050615DE3BBE)
*Jan 2 01:05:17.969: As22 LCP: PFC (0x0702)
*Jan 2 01:05:17.969: As22 LCP: ACFC (0x0802)
*Jan 2 01:05:17.969: As22 LCP: MRRU 1524 (0x110405F4)
*Jan 2 01:05:17.969: As22 LCP: EndpointDisc 1 Local (0x130A014953505F4E4153)
*Jan 2 01:05:18.101: As22 LCP: I CONFREJ [REQsent] id 1 len 18
*Jan 2 01:05:18.101: As22 LCP: MRRU 1524 (0x110405F4)
*Jan 2 01:05:18.101: As22 LCP: EndpointDisc 1 Local (0x130A014953505F4E4153)
*Jan 2 01:05:18.105: As22 LCP: O CONFREQ [REQsent] id 2 len 25
*Jan 2 01:05:18.105: As22 LCP: ACCM 0x000A0000 (0x0206000A0000)
*Jan 2 01:05:18.105: As22 LCP: AuthProto CHAP (0x0305C22305)
*Jan 2 01:05:18.105: As22 LCP: MagicNumber 0x15DE3BBE (0x050615DE3BBE)
*Jan 2 01:05:18.105: As22 LCP: PFC (0x0702)
*Jan 2 01:05:18.105: As22 LCP: ACFC (0x0802)
*Jan 2 01:05:18.213: As22 LCP: I CONFREQ [REQsent] id 2 len 23
*Jan 2 01:05:18.213: As22 LCP: ACCM 0x000A0000 (0x0206000A0000)
*Jan 2 01:05:18.213: As22 LCP: MagicNumber 0x00E6BDE9 (0x050600E6BDE9)
*Jan 2 01:05:18.213: As22 LCP: PFC (0x0702)
*Jan 2 01:05:18.213: As22 LCP: ACFC (0x0802)
*Jan 2 01:05:18.217: As22 LCP: Callback 6 (0x0D0306)
*Jan 2 01:05:18.217: As22 LCP: O CONFREJ [REQsent] id 2 len 7
*Jan 2 01:05:18.217: As22 LCP: Callback 6 (0x0D0306)
*Jan 2 01:05:18.229: As22 LCP: I CONFACK [REQsent] id 2 len 25
*Jan 2 01:05:18.229: As22 LCP: ACCM 0x000A0000 (0x0206000A0000)
*Jan 2 01:05:18.229: As22 LCP: AuthProto CHAP (0x0305C22305)
*Jan 2 01:05:18.229: As22 LCP: MagicNumber 0x15DE3BBE (0x050615DE3BBE)
*Jan 2 01:05:18.233: As22 LCP: PFC (0x0702)
*Jan 2 01:05:18.233: As22 LCP: ACFC (0x0802)
*Jan 2 01:05:18.325: As22 LCP: I CONFREQ [ACKrcvd] id 3 len 20
*Jan 2 01:05:18.325: As22 LCP: ACCM 0x000A0000 (0x0206000A0000)
*Jan 2 01:05:18.325: As22 LCP: MagicNumber 0x00E6BDE9 (0x050600E6BDE9)
*Jan 2 01:05:18.325: As22 LCP: PFC (0x0702)
*Jan 2 01:05:18.325: As22 LCP: ACFC (0x0802)
*Jan 2 01:05:18.325: As22 LCP: O CONFACK [ACKrcvd] id 3 len 20
*Jan 2 01:05:18.325: As22 LCP: ACCM 0x000A0000 (0x0206000A0000)
*Jan 2 01:05:18.329: As22 LCP: MagicNumber 0x00E6BDE9 (0x050600E6BDE9)
*Jan 2 01:05:18.329: As22 LCP: PFC (0x0702)
*Jan 2 01:05:18.329: As22 LCP: ACFC (0x0802)
*Jan 2 01:05:18.329: As22 LCP: State is Open
*Jan 2 01:05:18.329: As22 PPP: Phase is AUTHENTICATING, by this end
*Jan 2 01:05:18.329: As22 CHAP: O CHALLENGE id 1 len 28 from "ISP_NAS"
*Jan 2 01:05:18.469: As22 CHAP: I RESPONSE id 1 len 35 from "jeremy@hgw.com"
*Jan 2 01:05:18.469: VPDN: Got DNIS string 5550945
*Jan 2 01:05:18.469: As22 VPDN: Looking for tunnel -- hgw.com --
*Jan 2 01:05:18.473: L2F: Tunnel state closed
*Jan 2 01:05:18.473: As22 VPDN: Get tunnel info for hgw.com with NAS ISP_NAS, I
*Jan 2 01:05:18.473: As22 VPDN: Forward to address 172.22.66.25
*Jan 2 01:05:18.473: As22 VPDN: Forwarding...
*Jan 2 01:05:18.473: As22 VPDN: Bind interface direction=1
*Jan 2 01:05:18.473: L2F: MID state closed
*Jan 2 01:05:18.473: L2F: Open UDP socket to 172.22.66.25
*Jan 2 01:05:18.473: L2F: Tunnel state opening
*Jan 2 01:05:18.473: As22 L2F: MID jeremy@hgw.com state waiting_for_tunnel
*Jan 2 01:05:18.473: As22 VPDN: jeremy@hgw.com is forwarded
*Jan 2 01:05:18.477: L2F: L2F_CONF received
*Jan 2 01:05:18.477: L2F: Removing resend packet (L2F_CONF)
*Jan 2 01:05:18.477: ISP_NAS L2F: Tunnel state open
*Jan 2 01:05:18.481: L2F: L2F_OPEN received
*Jan 2 01:05:18.481: L2F: Removing resend packet (L2F_OPEN)
*Jan 2 01:05:18.481: L2F: Building nas2gw_mid0
*Jan 2 01:05:18.481: L2F: L2F_CLIENT_INFO: CLID/DNIS 4089548042/5550945
*Jan 2 01:05:18.481: L2F: L2F_CLIENT_INFO: NAS-Port Async22
*Jan 2 01:05:18.481: L2F: L2F_CLIENT_INFO: Client-Bandwidth-Kbps 115
*Jan 2 01:05:18.481: L2F: L2F_CLIENT_INFO: NAS-Rate L2F/0/0
*Jan 2 01:05:18.481: As22 L2F: MID jeremy@hgw.com state opening
*Jan 2 01:05:18.481: VPDN: Chap authentication succeeded for ISP_NAS
*Jan 2 01:05:18.569: L2F: L2F_OPEN received
*Jan 2 01:05:18.569: L2F: Got a MID management packet
*Jan 2 01:05:18.569: L2F: Removing resend packet (L2F_OPEN)
*Jan 2 01:05:18.569: As22 L2F: MID jeremy@hgw.com state open
*Jan 2 01:05:18.569: As22 L2F: MID synced NAS/HG Clid=8/8 Mid=1
*Jan 2 01:05:18.569: As22 PPP: Phase is FORWARDED
*Jan 2 01:05:19.473: %LINEPROTO-5-UPDOWN: Line protocol on Interface Async22, c
describes the debug output events in more detail.
Table 9 Time Stamps and Descriptions of Access VPN Events on the NAS
Time Stamp
|
Description
|
01:04:48.817
|
The inbound call is received from the PRI TDM stream. The ISDN bearer capability reports that the call is an analog call (0x8090A2).
|
01:04:48.825 to 01:04:48.913
|
The access server routes the call to the onboard MICA modem at 1/21 and begins negotiation with the remote site.
|
01:04:48.913 to 01:05:17.969
|
Both sides successfully negotiate, and asynchronous interface 22 comes up. At this point, the NAS still does not know that the call is an access VPN call.
|
01:05:17.969
|
The first phase of PPP negotiation begins, which is link control protocol (LCP) negotiation. In this phase, the remote peers negotiate what type of authentication to use. The NAS demands that the client authenticate with CHAP.
|
01:05:18.213 to 01:05:18.329
|
The client asks the NAS to support call back. The NAS denies the request. The client now resends the same request without the rejected option.
|
01:05:18.329
|
The NAS sends the authentication CHAP challenge to the client.
|
01:05:18.469
|
The client responds with "jeremy@hgw.com." The NAS saves the client's response and later forwards it to the home gateway.
|
01:05:18.469
|
The NAS found a DNIS string. VPDN authorization is about to begin.
|
01:05:18.473
|
• Tunnel information is found for the domain name hgw.com, tunnel name ISP_NAS, and the tunnel IP endpoint 172.22.66.25.
• A UDP socket interface is opened to the home gateway's IP address. Because L2F is a UDP packet, a socket interface needs to be created.
• Because no tunnel currently exists for jeremy@hgw.com, the message "waiting_for_tunnel" appears. After the tunnel is established, the message "jeremy@hgw.com is forwarded" appears.
• The tunnel is authenticated and established between the NAS and home gateway. CHAP is the default tunnel authentication method.
|
01:05:18.473 to 01:05:18.569
|
The L2F protocol begins. A bidirectional authentication takes place between the NAS and the home gateway.
|
01:05:18.481
|
Cisco proprietary L2F client information is forwarded to the home gateway. This information is used by the home gateway for accounting purposes. L2F uses standard AV pairs to forward this information.
|
01:05:18.569
|
The PPP session is forwarded to the home gateway. Notice that IPCP negotiation does not occur on the NAS, but occurs on the home gateway. See the home gateway's debug output.
|
01:05:19.473
|
The asynchronous line protocol is up, which enables network layer communication.
|
As the call is forwarded from the NAS to the home gateway, the following debug output appears on the home gateway's terminal screen.
*Feb 4 14:14:40.413: L2F: L2F_CONF received
*Feb 4 14:14:40.413: L2F: Creating new tunnel for ISP_NAS
*Feb 4 14:14:40.413: L2F: Tunnel state closed
*Feb 4 14:14:40.413: L2F: Got a tunnel named ISP_NAS, responding
*Feb 4 14:14:40.417: L2F: Open UDP socket to 172.22.66.23
*Feb 4 14:14:40.417: ISP_NAS L2F: Tunnel state opening
*Feb 4 14:14:40.417: L2F: L2F_OPEN received
*Feb 4 14:14:40.417: L2F: Removing resend packet (L2F_CONF)
*Feb 4 14:14:40.417: VPDN: Chap authentication succeeded for ISP_NAS
*Feb 4 14:14:40.417: ISP_NAS L2F: Tunnel state open
*Feb 4 14:14:40.421: L2F: L2F_OPEN received
*Feb 4 14:14:40.421: L2F: L2F_CLIENT_INFO: CLID/DNIS 4089548042/5550945
*Feb 4 14:14:40.421: L2F: L2F_CLIENT_INFO: NAS-Port Async21
*Feb 4 14:14:40.421: L2F: L2F_CLIENT_INFO: Client-Bandwidth-Kbps 115
*Feb 4 14:14:40.421: L2F: L2F_CLIENT_INFO: NAS-Rate L2F/0/0
*Feb 4 14:14:40.421: L2F: Got a MID management packet
*Feb 4 14:14:40.421: L2F: MID state closed
*Feb 4 14:14:40.421: L2F: Start create mid intf process for jeremy@hgw.com
*Feb 4 14:14:40.421: Vi1 VTEMPLATE: Reuse Vi1, recycle queue size 0
*Feb 4 14:14:40.421: Vi1 VTEMPLATE: Hardware address 0050.d193.e000
*Feb 4 14:14:40.421: Vi1 VPDN: Virtual interface created for jeremy@hgw.com
*Feb 4 14:14:40.421: Vi1 VPDN: Set to Async interface
*Feb 4 14:14:40.425: Vi1 PPP: Phase is DOWN, Setup
*Feb 4 14:14:40.425: Vi1 VPDN: Clone from Vtemplate 1 filterPPP=0 blocking
*Feb 4 14:14:40.425: Vi1 VTEMPLATE: Has a new cloneblk vtemplate, now it has vt
*Feb 4 14:14:40.425: Vi1 VTEMPLATE: ************* CLONE VACCESS1 **************
*Feb 4 14:14:40.425: Vi1 VTEMPLATE: Clone from Virtual-Template1
interface Virtual-Access1
ip unnumbered fastethernet 0/0
ip unnumbered fastethernet 0/0
peer default ip address pool default
1d02h: %LINK-3-UPDOWN: Interface Virtual-Access1, changed state to up
*Feb 4 14:14:40.505: Vi1 PPP: Treating connection as a dedicated line
*Feb 4 14:14:40.505: Vi1 PPP: Phase is ESTABLISHING, Active Open
*Feb 4 14:14:40.505: Vi1 LCP: O CONFREQ [Closed] id 1 len 39
*Feb 4 14:14:40.505: Vi1 LCP: ACCM 0x000A0000 (0x0206000A0000)
*Feb 4 14:14:40.505: Vi1 LCP: AuthProto CHAP (0x0305C22305)
*Feb 4 14:14:40.505: Vi1 LCP: MagicNumber 0x566F3EA8 (0x0506566F3EA8)
*Feb 4 14:14:40.505: Vi1 LCP: PFC (0x0702)
*Feb 4 14:14:40.505: Vi1 LCP: ACFC (0x0802)
*Feb 4 14:14:40.505: Vi1 LCP: MRRU 1524 (0x110405F4)
*Feb 4 14:14:40.505: Vi1 LCP: EndpointDisc 1 Local (0x130A01454E545F484757)
*Feb 4 14:14:40.505: Vi1 VPDN: Bind interface direction=2
*Feb 4 14:14:40.505: Vi1 PPP: Treating connection as a dedicated line
*Feb 4 14:14:40.505: Vi1 LCP: I FORCED CONFREQ len 21
*Feb 4 14:14:40.505: Vi1 LCP: ACCM 0x000A0000 (0x0206000A0000)
*Feb 4 14:14:40.505: Vi1 LCP: AuthProto CHAP (0x0305C22305)
*Feb 4 14:14:40.505: Vi1 LCP: MagicNumber 0x15B7E4FD (0x050615B7E4FD)
*Feb 4 14:14:40.505: Vi1 LCP: PFC (0x0702)
*Feb 4 14:14:40.505: Vi1 LCP: ACFC (0x0802)
*Feb 4 14:14:40.505: Vi1 VPDN: PPP LCP accepted rcv CONFACK
*Feb 4 14:14:40.505: Vi1 VPDN: PPP LCP accepted sent CONFACK
*Feb 4 14:14:40.505: Vi1 PPP: Phase is AUTHENTICATING, by this end
*Feb 4 14:14:40.505: Vi1 CHAP: O CHALLENGE id 2 len 28 from "ENT_HGW"
*Feb 4 14:14:40.505: Vi1 L2F: Transfer NAS-Rate L2F/0/0 to LCP
*Feb 4 14:14:40.509: Vi1 CHAP: I RESPONSE id 1 len 35 from "jeremy@hgw.com"
*Feb 4 14:14:40.509: Vi1 L2F: Finish create mid intf for jeremy@hgw.com
*Feb 4 14:14:40.509: Vi1 L2F: MID jeremy@hgw.com state open
*Feb 4 14:14:40.509: Vi1 CHAP: O SUCCESS id 1 len 4
*Feb 4 14:14:40.509: Vi1 PPP: Phase is UP
*Feb 4 14:14:40.509: Vi1 IPCP: O CONFREQ [Closed] id 1 len 10
*Feb 4 14:14:40.509: Vi1 IPCP: Address 172.22.66.25 (0x0306AC164219)
*Feb 4 14:14:40.617: Vi1 IPCP: I CONFREQ [REQsent] id 1 len 40
*Feb 4 14:14:40.617: Vi1 IPCP: CompressType VJ 15 slots CompressSlotID (0x02
*Feb 4 14:14:40.617: Vi1 IPCP: Address 0.0.0.0 (0x030600000000)
*Feb 4 14:14:40.617: Vi1 IPCP: PrimaryDNS 0.0.0.0 (0x810600000000)
*Feb 4 14:14:40.617: Vi1 IPCP: PrimaryWINS 0.0.0.0 (0x820600000000)
*Feb 4 14:14:40.621: Vi1 IPCP: SecondaryDNS 0.0.0.0 (0x830600000000)
*Feb 4 14:14:40.621: Vi1 IPCP: SecondaryWINS 0.0.0.0 (0x840600000000)
*Feb 4 14:14:40.621: Vi1 IPCP: Using pool 'default'
*Feb 4 14:14:40.621: ip_get_pool: Vi1: using pool default
*Feb 4 14:14:40.621: ip_get_pool: Vi1: returning address = 172.30.2.1
*Feb 4 14:14:40.621: Vi1 IPCP: Pool returned 172.30.2.1
*Feb 4 14:14:40.621: Vi1 IPCP: O CONFREJ [REQsent] id 1 len 10
*Feb 4 14:14:40.621: Vi1 IPCP: CompressType VJ 15 slots CompressSlotID (0x02
*Feb 4 14:14:40.633: Vi1 CCP: I CONFREQ [Not negotiated] id 1 len 15
*Feb 4 14:14:40.633: Vi1 CCP: MS-PPC supported bits 0x00000001 (0x1206000000
*Feb 4 14:14:40.633: Vi1 CCP: Stacker history 1 check mode EXTENDED (0x11050
*Feb 4 14:14:40.633: Vi1 LCP: O PROTREJ [Open] id 2 len 21 protocol CCP
*Feb 4 14:14:40.633: Vi1 LCP: (0x80FD0101000F12060000000111050001)
*Feb 4 14:14:40.633: Vi1 LCP: (0x04)
*Feb 4 14:14:40.633: Vi1 IPCP: I CONFACK [REQsent] id 1 len 10
*Feb 4 14:14:40.637: Vi1 IPCP: Address 172.22.66.25 (0x0306AC164219)
1d02h: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1, changed
*Feb 4 14:14:42.505: Vi1 LCP: TIMEout: State Open
*Feb 4 14:14:42.509: Vi1 IPCP: TIMEout: State ACKrcvd
*Feb 4 14:14:42.509: Vi1 IPCP: O CONFREQ [ACKrcvd] id 2 len 10
*Feb 4 14:14:42.509: Vi1 IPCP: Address 172.22.66.25 (0x0306AC164219)
*Feb 4 14:14:42.613: Vi1 IPCP: I CONFACK [REQsent] id 2 len 10
*Feb 4 14:14:42.617: Vi1 IPCP: Address 172.22.66.25 (0x0306AC164219)
*Feb 4 14:14:43.621: Vi1 IPCP: I CONFREQ [ACKrcvd] id 2 len 34
*Feb 4 14:14:43.621: Vi1 IPCP: Address 0.0.0.0 (0x030600000000)
*Feb 4 14:14:43.621: Vi1 IPCP: PrimaryDNS 0.0.0.0 (0x810600000000)
*Feb 4 14:14:43.621: Vi1 IPCP: PrimaryWINS 0.0.0.0 (0x820600000000)
*Feb 4 14:14:43.621: Vi1 IPCP: SecondaryDNS 0.0.0.0 (0x830600000000)
*Feb 4 14:14:43.621: Vi1 IPCP: SecondaryWINS 0.0.0.0 (0x840600000000)
*Feb 4 14:14:43.621: Vi1 IPCP: O CONFNAK [ACKrcvd] id 2 len 34
*Feb 4 14:14:43.621: Vi1 IPCP: Address 172.30.2.1 (0x0306AC1E0201)
*Feb 4 14:14:43.621: Vi1 IPCP: PrimaryDNS 172.23.1.10 (0x8106AC17010A)
*Feb 4 14:14:43.621: Vi1 IPCP: PrimaryWINS 172.23.1.11 (0x8206AC17010B)
*Feb 4 14:14:43.621: Vi1 IPCP: SecondaryDNS 172.23.2.10 (0x8306AC17020A)
*Feb 4 14:14:43.621: Vi1 IPCP: SecondaryWINS 172.23.2.11 (0x8406AC17020B)
*Feb 4 14:14:43.749: Vi1 IPCP: I CONFREQ [ACKrcvd] id 3 len 34
*Feb 4 14:14:43.749: Vi1 IPCP: Address 172.30.2.1 (0x0306AC1E0201)
*Feb 4 14:14:43.749: Vi1 IPCP: PrimaryDNS 172.23.1.10 (0x8106AC17010A)
*Feb 4 14:14:43.749: Vi1 IPCP: PrimaryWINS 172.23.1.11 (0x8206AC17010B)
*Feb 4 14:14:43.749: Vi1 IPCP: SecondaryDNS 172.23.2.10 (0x8306AC17020A)
*Feb 4 14:14:43.749: Vi1 IPCP: SecondaryWINS 172.23.2.11 (0x8406AC17020B)
*Feb 4 14:14:43.749: ip_get_pool: Vi1: validate address = 172.30.2.1
*Feb 4 14:14:43.749: ip_get_pool: Vi1: using pool default
*Feb 4 14:14:43.749: ip_get_pool: Vi1: returning address = 172.30.2.1
*Feb 4 14:14:43.749: set_ip_peer_addr: Vi1: address = 172.30.2.1 (3) is redunda
*Feb 4 14:14:43.749: Vi1 IPCP: O CONFACK [ACKrcvd] id 3 len 34
*Feb 4 14:14:43.749: Vi1 IPCP: Address 172.30.2.1 (0x0306AC1E0201)
*Feb 4 14:14:43.749: Vi1 IPCP: PrimaryDNS 172.23.1.10 (0x8106AC17010A)
*Feb 4 14:14:43.749: Vi1 IPCP: PrimaryWINS 172.23.1.11 (0x8206AC17010B)
*Feb 4 14:14:43.753: Vi1 IPCP: SecondaryDNS 172.23.2.10 (0x8306AC17020A)
*Feb 4 14:14:43.753: Vi1 IPCP: SecondaryWINS 172.23.2.11 (0x8406AC17020B)
*Feb 4 14:14:43.753: Vi1 IPCP: State is Open
*Feb 4 14:14:43.753: Vi1 IPCP: Install route to 172.30.2.1
describes the debug output events in more detail.
Table 10 Time Stamps and Descriptions of Access VPN Events on the Home Gateway
Time Stamp
|
Description
|
14:14:40.413 to 14:14:40:417
|
The home gateway receives the request from the NAS to open an L2F tunnel. The home gateway authenticates the tunnel and opens it.
|
14:14:40:421
|
The NAS forwards the client's client information to the home gateway.
|
14:14:40:421 to 14:14:40:425
|
A virtual-access interface is cloned from virtual template 1, which is not a physical interface, but it is treated like a regular interface that uses the IP address of the Fast Ethernet 0/0 interface
The debug output following "interface Virtual-Access1" lists every command that has been configured for virtual template 1. Enter the clear vtemplate command to reset the command history.
|
14:14:40.505
|
The NAS forces the information from the LCP negotiation with the client onto the virtual-access interface.
|
14:14:40:505 to 14:14:40:509
|
The home gateway sends a CHAP challenge to the client. The client responds and is authenticated by the home gateway.
|
14:14:40:621
|
The home gateway assigns the client the IP address 172.30.2.1 from the default pool.
|
14:14:40:637
|
The line protocol on interface Virtual-Access1 is changed to the up state.
|
14:14:43.621
|
The client requests IP addresses of DNS and WINS servers.
|
14:14:43.749 to 14:14:43.753
|
The home gateway receives a positive acknowledgment from the client confirming the IP addresses of the DNS and WNIS servers.
|
14:14:43:753
|
The home gateway installs the route to the client's IP address, 172.30.2.1
|
Debug Output from Configuring Access VPN with Remote AAA
The following debug output is produced by an access VPN using remote AAA. The client dials in to the NAS, is forwarded to the home gateway using L2F. The NAS authenticates the tunnel using CiscoSecure UNIX, and the home gateway authenticates the username using CiscoSecure NT.
For more information on how to configure the access VPN for remote AAA, see "Configuring the Access VPN to Work with Remote AAA."
Enable the following debug commands on the NAS:
•
debug isdn q931
•
debug modem csm
•
debug radius
•
debug aaa authentication
•
debug aaa authorization
•
debug ppp authentication
•
debug ppp negotiation
•
debug vpdn event
•
debug vpdn l2x-event
Enable the following debug commands on the home gateway:
•
debug radius
•
debug aaa authentication
•
debug aaa authorization
•
debug ppp negotiation
•
debug ppp authentication
•
debug vtemplate
•
debug ip peer
•
debug vpdn l2x-errors
•
debug vpdn l2x-events
•
debug vpdn events
Launch an asynchronous PPP modem call in to the NAS. As the NAS receives the call and forwards it to the home gateway, the following debug output appears on the NAS:
Jan 7 19:29:15.775: ISDN Se0:23: RX <- SETUP pd = 8 callref = 0x0301
Jan 7 19:29:15.775: Bearer Capability i = 0x9090A2
Jan 7 19:29:15.775: Channel ID i = 0xA98381
Jan 7 19:29:15.775: Calling Party Number i = 0x0083, '408'
Jan 7 19:29:15.775: Called Party Number i = 0xC1, '5550945'
Jan 7 19:29:15.779: ISDN Se0:23: TX -> CALL_PROC pd = 8 callref = 0x8301
Jan 7 19:29:15.779: Channel ID i = 0xA98381
Jan 7 19:29:15.779: ISDN Se0:23: TX -> ALERTING pd = 8 callref = 0x8301
Jan 7 19:29:15.779: EVENT_FROM_ISDN::dchan_idb=0x60E97CDC, call_id=0x53, ces=0x
bchan=0x0, event=0x1, cause=0x0
Jan 7 19:29:15.779: VDEV_ALLOCATE: slot 1 and port 10 is allocated.
Jan 7 19:29:15.779: EVENT_FROM_ISDN:(0053): DEV_INCALL at slot 1 and port 10
Jan 7 19:29:15.779: CSM_PROC_IDLE: CSM_EVENT_ISDN_CALL at slot 1, port 10
Jan 7 19:29:15.779: Mica Modem(1/10): Configure(0x1 = 0x0)
Jan 7 19:29:15.779: Mica Modem(1/10): Configure(0x23 = 0x0)
Jan 7 19:29:15.779: Mica Modem(1/10): Call Setup
Jan 7 19:29:15.923: Mica Modem(1/10): State Transition to Call Setup
Jan 7 19:29:15.923: Mica Modem(1/10): Went offhook
Jan 7 19:29:15.923: CSM_PROC_IC1_RING: CSM_EVENT_MODEM_OFFHOOK at slot 1, port
Jan 7 19:29:15.923: ISDN Se0:23: TX -> CONNECT pd = 8 callref = 0x8301
Jan 7 19:29:15.939: ISDN Se0:23: RX <- CONNECT_ACK pd = 8 callref = 0x0301
Jan 7 19:29:15.943: EVENT_FROM_ISDN::dchan_idb=0x60E97CDC, call_id=0x53, ces=0x
bchan=0x0, event=0x4, cause=0x0
Jan 7 19:29:15.943: EVENT_FROM_ISDN:(0053): DEV_CONNECTED at slot 1 and port 10
Jan 7 19:29:15.943: CSM_PROC_IC4_WAIT_FOR_CARRIER: CSM_EVENT_ISDN_CONNECTED at
Jan 7 19:29:15.943: Mica Modem(1/10): Link Initiate
Jan 7 19:29:17.059: Mica Modem(1/10): State Transition to Connect
Jan 7 19:29:22.211: Mica Modem(1/10): State Transition to Link
Jan 7 19:29:33.715: Mica Modem(1/10): State Transition to Trainup
Jan 7 19:29:36.951: Mica Modem(1/10): State Transition to EC Negotiating
Jan 7 19:29:37.491: Mica Modem(1/10): State Transition to Steady State
Jan 7 19:29:40.339: %LINK-3-UPDOWN: Interface Async11, changed state to up
Jan 7 19:29:40.339: As11 PPP: Treating connection as a dedicated line
Jan 7 19:29:40.339: As11 PPP: Phase is ESTABLISHING, Active Open
Jan 7 19:29:40.339: As11 AAA/AUTHOR/FSM: (0): LCP succeeds trivially
Jan 7 19:29:40.339: As11 LCP: O CONFREQ [Closed] id 3 len 25
Jan 7 19:29:40.339: As11 LCP: ACCM 0x000A0000 (0x0206000A0000)
Jan 7 19:29:40.339: As11 LCP: AuthProto CHAP (0x0305C22305)
Jan 7 19:29:40.339: As11 LCP: MagicNumber 0x33911E0F (0x050633911E0F)
Jan 7 19:29:40.339: As11 LCP: PFC (0x0702)
Jan 7 19:29:40.339: As11 LCP: ACFC (0x0802)
Jan 7 19:29:40.443: As11 LCP: I CONFACK [REQsent] id 3 len 25
Jan 7 19:29:40.443: As11 LCP: ACCM 0x000A0000 (0x0206000A0000)
Jan 7 19:29:40.443: As11 LCP: AuthProto CHAP (0x0305C22305)
Jan 7 19:29:40.443: As11 LCP: MagicNumber 0x33911E0F (0x050633911E0F)
Jan 7 19:29:40.443: As11 LCP: PFC (0x0702)
Jan 7 19:29:40.443: As11 LCP: ACFC (0x0802)
Jan 7 19:29:40.859: As11 LCP: I CONFREQ [ACKrcvd] id 2 len 23
Jan 7 19:29:40.859: As11 LCP: ACCM 0x000A0000 (0x0206000A0000)
Jan 7 19:29:40.859: As11 LCP: MagicNumber 0x0002D813 (0x05060002D813)
Jan 7 19:29:40.859: As11 LCP: PFC (0x0702)
Jan 7 19:29:40.859: As11 LCP: ACFC (0x0802)
Jan 7 19:29:40.859: As11 LCP: Callback 6 (0x0D0306)
Jan 7 19:29:40.859: As11 LCP: O CONFREJ [ACKrcvd] id 2 len 7
Jan 7 19:29:40.859: As11 LCP: Callback 6 (0x0D0306)
Jan 7 19:29:42.339: As11 LCP: TIMEout: State ACKrcvd
Jan 7 19:29:42.339: As11 LCP: O CONFREQ [ACKrcvd] id 4 len 25
Jan 7 19:29:42.339: As11 LCP: ACCM 0x000A0000 (0x0206000A0000)
Jan 7 19:29:42.339: As11 LCP: AuthProto CHAP (0x0305C22305)
Jan 7 19:29:42.339: As11 LCP: MagicNumber 0x33911E0F (0x050633911E0F)
Jan 7 19:29:42.339: As11 LCP: PFC (0x0702)
Jan 7 19:29:42.339: As11 LCP: ACFC (0x0802)
Jan 7 19:29:42.439: As11 LCP: I CONFACK [REQsent] id 4 len 25
Jan 7 19:29:42.439: As11 LCP: ACCM 0x000A0000 (0x0206000A0000)
Jan 7 19:29:42.439: As11 LCP: AuthProto CHAP (0x0305C22305)
Jan 7 19:29:42.439: As11 LCP: MagicNumber 0x33911E0F (0x050633911E0F)
Jan 7 19:29:42.439: As11 LCP: PFC (0x0702)
Jan 7 19:29:42.439: As11 LCP: ACFC (0x0802)
Jan 7 19:29:43.859: As11 LCP: I CONFREQ [ACKrcvd] id 3 len 23
Jan 7 19:29:43.859: As11 LCP: ACCM 0x000A0000 (0x0206000A0000)
Jan 7 19:29:43.859: As11 LCP: MagicNumber 0x0002D813 (0x05060002D813)
Jan 7 19:29:43.863: As11 LCP: PFC (0x0702)
Jan 7 19:29:43.863: As11 LCP: ACFC (0x0802)
Jan 7 19:29:43.863: As11 LCP: Callback 6 (0x0D0306)
Jan 7 19:29:43.863: As11 LCP: O CONFREJ [ACKrcvd] id 3 len 7
Jan 7 19:29:43.863: As11 LCP: Callback 6 (0x0D0306)
Jan 7 19:29:44.003: As11 LCP: I CONFREQ [ACKrcvd] id 4 len 20
Jan 7 19:29:44.003: As11 LCP: ACCM 0x000A0000 (0x0206000A0000)
Jan 7 19:29:44.003: As11 LCP: MagicNumber 0x0002D813 (0x05060002D813)
Jan 7 19:29:44.003: As11 LCP: PFC (0x0702)
Jan 7 19:29:44.003: As11 LCP: ACFC (0x0802)
Jan 7 19:29:44.007: As11 LCP: O CONFACK [ACKrcvd] id 4 len 20
Jan 7 19:29:44.007: As11 LCP: ACCM 0x000A0000 (0x0206000A0000)
Jan 7 19:29:44.007: As11 LCP: MagicNumber 0x0002D813 (0x05060002D813)
Jan 7 19:29:44.007: As11 LCP: PFC (0x0702)
Jan 7 19:29:44.007: As11 LCP: ACFC (0x0802)
Jan 7 19:29:44.007: As11 LCP: State is Open
Jan 7 19:29:44.007: As11 PPP: Phase is AUTHENTICATING, by this end
Jan 7 19:29:44.007: As11 CHAP: O CHALLENGE id 2 len 28 from "ISP_NAS"
Jan 7 19:29:44.115: As11 CHAP: I RESPONSE id 2 len 35 from "jeremy@hgw.com"
Jan 7 19:29:44.115: As11 PPP: Phase is FORWARDING
Jan 7 19:29:44.115: sVPDN: Got DNIS string As11
Jan 7 19:29:44.119: As11 VPDN: Looking for tunnel -- hgw.com --
Jan 7 19:29:44.119: AAA: parse name=Async11 idb type=10 tty=11
Jan 7 19:29:44.119: AAA: name=Async11 flags=0x11 type=4 shelf=0 slot=0 adapter=
Jan 7 19:29:44.119: AAA: parse name=Serial0:0 idb type=12 tty=-1
Jan 7 19:29:44.119: AAA: name=Serial0:0 flags=0x51 type=1 shelf=0 slot=0 adapte
Jan 7 19:29:44.119: AAA/AUTHEN: create_user (0x6118F250) user='hgw.com' ruser='
' port='Async11' rem_addr='' authen_type=NONE service=LOGIN priv=0
Jan 7 19:29:44.119: AAA/AUTHOR/VPDN (338468652): Port='Async11' list='default'
Jan 7 19:29:44.119: AAA/AUTHOR/VPDN: (338468652) send AV service=ppp
Jan 7 19:29:44.119: AAA/AUTHOR/VPDN: (338468652) send AV protocol=vpdn
Jan 7 19:29:44.119: AAA/AUTHOR/VPDN (338468652) found list "default"
Jan 7 19:29:44.119: AAA/AUTHOR/VPDN: (338468652) Method=RADIUS
Jan 7 19:29:44.119: RADIUS: authenticating to get author data
Jan 7 19:29:44.119: RADIUS: ustruct sharecount=2
Jan 7 19:29:44.119: RADIUS: Initial Transmit Async11 id 52 172.22.66.18:1645, A
Jan 7 19:29:44.119: Attribute 4 6 AC164217
Jan 7 19:29:44.119: Attribute 5 6 0000000B
Jan 7 19:29:44.119: Attribute 61 6 00000000
Jan 7 19:29:44.119: Attribute 1 9 6867772E
Jan 7 19:29:44.119: Attribute 2 18 99DFD8F8
Jan 7 19:29:44.119: Attribute 6 6 00000005
Jan 7 19:29:44.123: RADIUS: Received from id 52 172.22.66.18:1645, Access-Accep
Jan 7 19:29:44.123: Attribute 26 31 0000000901197670
Jan 7 19:29:44.123: Attribute 26 32 00000009011A7670
Jan 7 19:29:44.123: Attribute 26 31 0000000901197670
Jan 7 19:29:44.123: Attribute 26 39 0000000901217670
Jan 7 19:29:44.123: RADIUS: saved authorization data for user 6118F250 at 61075
Jan 7 19:29:44.127: RADIUS: cisco AVPair "vpdn:gw-password=cisco"
Jan 7 19:29:44.127: RADIUS: cisco AVPair "vpdn:nas-password=cisco"
Jan 7 19:29:44.127: RADIUS: cisco AVPair "vpdn:tunnel-id=ISP_NAS"
Jan 7 19:29:44.127: RADIUS: cisco AVPair "vpdn:ip-addresses=172.22.66.25"
Jan 7 19:29:44.127: AAA/AUTHOR (338468652): Post authorization status = PASS_AD
Jan 7 19:29:44.127: AAA/AUTHOR/VPDN: Processing AV service=ppp
Jan 7 19:29:44.127: AAA/AUTHOR/VPDN: Processing AV protocol=vpdn
Jan 7 19:29:44.127: AAA/AUTHOR/VPDN: Processing AV gw-password=cisco
Jan 7 19:29:44.127: AAA/AUTHOR/VPDN: Processing AV nas-password=cisco
Jan 7 19:29:44.127: AAA/AUTHOR/VPDN: Processing AV tunnel-id=ISP_NAS
Jan 7 19:29:44.127: AAA/AUTHOR/VPDN: Processing AV ip-addresses=172.22.66.25
Jan 7 19:29:44.127: As11 VPDN: Get tunnel info for hgw.com with NAS ISP_NAS, IP
Jan 7 19:29:44.127: AAA/AUTHEN: free_user (0x6118F250) user='hgw.com' ruser=''
port='Async11' rem_addr='' authen_type=NONE service=LOGIN priv=0
Jan 7 19:29:44.127: L2F: Tunnel state closed
Jan 7 19:29:44.127: As11 VPDN: Forward to address 172.22.66.25
Jan 7 19:29:44.127: As11 VPDN: Forwarding...
Jan 7 19:29:44.127: AAA: parse name=Async11 idb type=10 tty=11
Jan 7 19:29:44.127: AAA: name=Async11 flags=0x11 type=4 shelf=0 slot=0 adapter=
Jan 7 19:29:44.127: AAA: parse name=Serial0:0 idb type=12 tty=-1
Jan 7 19:29:44.127: AAA: name=Serial0:0 flags=0x51 type=1 shelf=0 slot=0 adapte
Jan 7 19:29:44.127: AAA/AUTHEN: create_user (0x612B7E1C) user='jeremy@hgw.com'
ruser='' port='Async11' rem_addr='408/5550945' authen_type=CHAP service=PPP priv
Jan 7 19:29:44.127: As11 VPDN: Bind interface direction=1
Jan 7 19:29:44.127: L2F: MID state closed
Jan 7 19:29:44.127: L2F: Open UDP socket to 172.22.66.25
Jan 7 19:29:44.131: L2F: Tunnel state opening
Jan 7 19:29:44.131: As11 L2F: MID jeremy@hgw.com state waiting_for_tunnel
Jan 7 19:29:44.131: As11 VPDN: jeremy@hgw.com is forwarded
Jan 7 19:29:44.135: L2F: L2F_CONF received
Jan 7 19:29:44.135: L2F: Removing resend packet (L2F_CONF)
Jan 7 19:29:44.135: ENT_HGW L2F: Tunnel state open
Jan 7 19:29:44.135: L2F: L2F_OPEN received
Jan 7 19:29:44.139: L2F: Removing resend packet (L2F_OPEN)
Jan 7 19:29:44.139: L2F: Building nas2gw_mid0
Jan 7 19:29:44.139: L2F: L2F_CLIENT_INFO: CLID/DNIS 408/5550945
Jan 7 19:29:44.139: L2F: L2F_CLIENT_INFO: NAS-Port Async11
Jan 7 19:29:44.139: L2F: L2F_CLIENT_INFO: Client-Bandwidth-Kbps 115
Jan 7 19:29:44.139: L2F: L2F_CLIENT_INFO: NAS-Rate L2F/28800/50000
Jan 7 19:29:44.139: As11 L2F: MID jeremy@hgw.com state opening
Jan 7 19:29:44.139: RADIUS: ustruct sharecount=3
Jan 7 19:29:44.139: RADIUS: Initial Transmit Async11 id 53 172.22.66.18:1646, A
ccounting-Request, len 108
Jan 7 19:29:44.139: Attribute 4 6 AC164217
Jan 7 19:29:44.139: Attribute 5 6 0000000B
Jan 7 19:29:44.139: Attribute 61 6 00000000
Jan 7 19:29:44.139: Attribute 1 16 6A657265
Jan 7 19:29:44.139: Attribute 30 9 35373130
Jan 7 19:29:44.139: Attribute 31 5 34303828
Jan 7 19:29:44.139: Attribute 40 6 00000001
Jan 7 19:29:44.139: Attribute 45 6 00000002
Jan 7 19:29:44.139: Attribute 6 6 00000002
Jan 7 19:29:44.139: Attribute 44 10 30303030
Jan 7 19:29:44.139: Attribute 7 6 00000001
Jan 7 19:29:44.139: Attribute 41 6 00000000
Jan 7 19:29:44.227: L2F: L2F_OPEN received
Jan 7 19:29:44.227: L2F: Got a MID management packet
Jan 7 19:29:44.227: L2F: Removing resend packet (L2F_OPEN)
Jan 7 19:29:44.227: As11 L2F: MID jeremy@hgw.com state open
Jan 7 19:29:44.227: As11 L2F: MID synced NAS/HG Clid=64/34 Mid=1
Jan 7 19:29:44.227: As11 PPP: Phase is FORWARDED
Jan 7 19:29:44.795: RADIUS: Received from id 53 172.22.66.18:1646, Accounting-r
Jan 7 19:29:45.131: %LINEPROTO-5-UPDOWN: Line protocol on Interface Async11, ch
describes the debug output events in more detail.
Table 11 Time Stamps and Descriptions of Access VPN Events on the NAS
Time Stamp
|
Description
|
19:29:44:007 to 19:29:44:115
|
LCP negotiation is finished. The NAS sends a CHAP challenge to the client. The client sends a CHAP response with the username jeremy@hgw.com.
|
19:29:44:119
|
The NAS is searching for tunnel information.
|
19:29:44:119
|
The AAA subsystem inside the Cisco IOS software displays the call-path information. The current call uses TTY line 11, asynchronous interface 11, and serial B-channel 0:0.
|
19:29:44:119
|
The local authorization module is accessed. The running configuration wants authorization for PPP and VPN services, and a AAA list called default. The default authorization method is RADIUS.
|
19:29:44:119
|
The RADIUS module inside the Cisco IOS software transmits authentication and authorization attributes to the remote RADIUS server. The server is located at IP address 172.22.66.18. RADIUS authentication on UNIX platforms listens to port 1645. All authentication packets go out this port.
The NAS requests RADIUS attributes to be negotiated by the AAA server.
|
19:29:44:123
|
The remote RADIUS server performs its authentication and authorization for hgw.com. The NAS receives vendor specific AV pairs from the AAA server.
|
19:29:44:127
|
The RADIUS module transfers the attribute information to the local AAA subsystem. The post authorization status is equal to pass. The domain name hgw.com has been authenticated (see the free_user field).
|
19:29:44:127
|
The NAS attempts to forward the L2F tunnel to the home gateway at IP address 172.22.66.25. The home gateway authenticates the tunnel. A UDP socket is opened from the NAS to 172.22.66.25. The first IP connection is made between the NAS and the home gateway.
|
19:29:44:139
|
An accounting packet is sent to the AAA RADIUS server at IP address 172.22.66.18. RADIUS accounting listens on port 1646 on UNIX platforms. All accounting packets go out this port.
|
19:29:45:131
|
The line protocol on asynchronous interface 11 is up, which means the L2F tunnel is established between the NAS and the home gateway.
|
The following debug output appears on the home gateway's terminal screen.
Jan 7 19:29:44.132: L2F: L2F_CONF received
Jan 7 19:29:44.132: L2F: Creating new tunnel for ISP_NAS
Jan 7 19:29:44.132: L2F: Tunnel state closed
Jan 7 19:29:44.132: L2F: Got a tunnel named ISP_NAS, responding
Jan 7 19:29:44.132: AAA: parse name=<no string> idb type=-1 tty=-1
Jan 7 19:29:44.132: AAA/AUTHEN: create_user (0x612D550C) user='ENT_HGW' ruser='
' port='' rem_addr='' authen_type=CHAP service=PPP priv=1
Jan 7 19:29:44.132: AAA/AUTHEN/START (384300079): port='' list='default' action
Jan 7 19:29:44.132: AAA/AUTHEN/START (384300079): found list default
Jan 7 19:29:44.132: AAA/AUTHEN/START (384300079): Method=LOCAL
Jan 7 19:29:44.132: AAA/AUTHEN (384300079): status = PASS
Jan 7 19:29:44.132: AAA/AUTHEN: free_user (0x612D550C) user='ENT_HGW' ruser=''
port='' rem_addr='' authen_type=CHAP service=PPP priv=1
Jan 7 19:29:44.132: AAA: parse name=<no string> idb type=-1 tty=-1
Jan 7 19:29:44.132: AAA/AUTHEN: create_user (0x612D550C) user='ISP_NAS' ruser='
' port='' rem_addr='' authen_type=CHAP service=PPP priv=1
Jan 7 19:29:44.132: AAA/AUTHEN/START (2545876944): port='' list='default' actio
Jan 7 19:29:44.132: AAA/AUTHEN/START (2545876944): found list default
Jan 7 19:29:44.132: AAA/AUTHEN/START (2545876944): Method=LOCAL
Jan 7 19:29:44.132: AAA/AUTHEN (2545876944): status = PASS
Jan 7 19:29:44.132: AAA/AUTHEN: free_user (0x612D550C) user='ISP_NAS' ruser=''
port='' rem_addr='' authen_type=CHAP service=PPP priv=1
Jan 7 19:29:44.132: L2F: Open UDP socket to 172.22.66.23
Jan 7 19:29:44.132: ISP_NAS L2F: Tunnel state opening
Jan 7 19:29:44.136: L2F: L2F_OPEN received
Jan 7 19:29:44.136: L2F: Removing resend packet (L2F_CONF)
Jan 7 19:29:44.136: AAA: parse name=<no string> idb type=-1 tty=-1
Jan 7 19:29:44.136: AAA/AUTHEN: create_user (0x612D550C) user='ISP_NAS' ruser='
' port='' rem_addr='' authen_type=CHAP service=PPP priv=1
Jan 7 19:29:44.136: AAA/AUTHEN/START (1465065509): port='' list='default' actio
Jan 7 19:29:44.136: AAA/AUTHEN/START (1465065509): found list default
Jan 7 19:29:44.136: AAA/AUTHEN/START (1465065509): Method=LOCAL
Jan 7 19:29:44.136: AAA/AUTHEN (1465065509): status = PASS
Jan 7 19:29:44.136: VPDN: Chap authentication succeeded for ISP_NAS
Jan 7 19:29:44.136: AAA/AUTHEN: free_user (0x612D550C) user='ISP_NAS' ruser=''
port='' rem_addr='' authen_type=CHAP service=PPP priv=1
Jan 7 19:29:44.136: ISP_NAS L2F: Tunnel state open
Jan 7 19:29:44.140: L2F: L2F_OPEN received
Jan 7 19:29:44.140: L2F: L2F_CLIENT_INFO: CLID/DNIS 408/5550945
Jan 7 19:29:44.140: L2F: L2F_CLIENT_INFO: NAS-Port Async11
Jan 7 19:29:44.140: L2F: L2F_CLIENT_INFO: Client-Bandwidth-Kbps 115
Jan 7 19:29:44.140: L2F: L2F_CLIENT_INFO: NAS-Rate L2F/28800/50000
Jan 7 19:29:44.140: L2F: Got a MID management packet
Jan 7 19:29:44.140: L2F: MID state closed
Jan 7 19:29:44.140: L2F: Start create mid intf process for jeremy@hgw.com
Jan 7 19:29:44.140: Vi1 VTEMPLATE: Reuse Vi1, recycle queue size 0
Jan 7 19:29:44.140: Vi1 VTEMPLATE: Hardware address 0050.d193.e000
Jan 7 19:29:44.140: Vi1 VPDN: Virtual interface created for jeremy@hgw.com
Jan 7 19:29:44.140: Vi1 VPDN: Set to Async interface
Jan 7 19:29:44.140: Vi1 PPP: Phase is DOWN, Setup
Jan 7 19:29:44.140: Vi1 VPDN: Clone from Vtemplate 1 filterPPP=0 blocking
Jan 7 19:29:44.140: Vi1 VTEMPLATE: Has a new cloneblk vtemplate, now it has vte
Jan 7 19:29:44.140: Vi1 VTEMPLATE: ************* CLONE VACCESS1 ***************
Jan 7 19:29:44.144: Vi1 VTEMPLATE: Clone from Virtual-Template1
interface Virtual-Access1
ip unnumbered fastethernet 0/0
ip unnumbered fastethernet 0/0
peer default ip address pool default
6w5d: %LINK-3-UPDOWN: Interface Virtual-Access1, changed state to up
Jan 7 19:29:44.224: Vi1 PPP: Treating connection as a dedicated line
Jan 7 19:29:44.224: Vi1 PPP: Phase is ESTABLISHING, Active Open
Jan 7 19:29:44.224: Vi1 AAA/AUTHOR/FSM: (0): LCP succeeds trivially
Jan 7 19:29:44.224: Vi1 LCP: O CONFREQ [Closed] id 1 len 39
Jan 7 19:29:44.224: Vi1 LCP: ACCM 0x000A0000 (0x0206000A0000)
Jan 7 19:29:44.224: Vi1 LCP: AuthProto CHAP (0x0305C22305)
Jan 7 19:29:44.224: Vi1 LCP: MagicNumber 0x47ADAD67 (0x050647ADAD67)
Jan 7 19:29:44.224: Vi1 LCP: PFC (0x0702)
Jan 7 19:29:44.224: Vi1 LCP: ACFC (0x0802)
Jan 7 19:29:44.224: Vi1 LCP: MRRU 1524 (0x110405F4)
Jan 7 19:29:44.224: Vi1 LCP: EndpointDisc 1 Local (0x130A01454E545F484757)
Jan 7 19:29:44.224: Vi1 VPDN: Bind interface direction=2
Jan 7 19:29:44.224: Vi1 PPP: Treating connection as a dedicated line
Jan 7 19:29:44.224: Vi1 LCP: I FORCED CONFREQ len 21
Jan 7 19:29:44.224: Vi1 LCP: ACCM 0x000A0000 (0x0206000A0000)
Jan 7 19:29:44.224: Vi1 LCP: AuthProto CHAP (0x0305C22305)
Jan 7 19:29:44.224: Vi1 LCP: MagicNumber 0x33911E0F (0x050633911E0F)
Jan 7 19:29:44.224: Vi1 LCP: PFC (0x0702)
Jan 7 19:29:44.224: Vi1 LCP: ACFC (0x0802)
Jan 7 19:29:44.224: Vi1 VPDN: PPP LCP accepted rcv CONFACK
Jan 7 19:29:44.224: Vi1 VPDN: PPP LCP accepted sent CONFACK
Jan 7 19:29:44.224: Vi1 PPP: Phase is AUTHENTICATING, by this end
Jan 7 19:29:44.224: Vi1 CHAP: O CHALLENGE id 3 len 28 from "ENT_HGW"
Jan 7 19:29:44.224: Vi1 L2F: Transfer NAS-Rate L2F/28800/50000 to LCP
Jan 7 19:29:44.228: Vi1 CHAP: I RESPONSE id 2 len 35 from "jeremy@hgw.com"
Jan 7 19:29:44.228: Vi1 L2F: Finish create mid intf for jeremy@hgw.com
Jan 7 19:29:44.228: Vi1 L2F: MID jeremy@hgw.com state open
Jan 7 19:29:44.228: AAA: parse name=Virtual-Access1 idb type=21 tty=-1
Jan 7 19:29:44.228: AAA: name=Virtual-Access1 flags=0x11 type=5 shelf=0 slot=0
adapter=0 port=1 channel=0
Jan 7 19:29:44.228: AAA/AUTHEN: create_user (0x612F1F78) user='jeremy@hgw.com'
ruser='' port='Virtual-Access1' rem_addr='408/5550945' authen_type=CHAP service=
Jan 7 19:29:44.228: AAA/AUTHEN/START (101773535): port='Virtual-Access1' list='
' action=LOGIN service=PPP
Jan 7 19:29:44.228: AAA/AUTHEN/START (101773535): using "default" list
Jan 7 19:29:44.228: AAA/AUTHEN/START (101773535): Method=LOCAL
Jan 7 19:29:44.228: AAA/AUTHEN (101773535): status = ERROR
Jan 7 19:29:44.228: AAA/AUTHEN/START (101773535): Method=RADIUS
Jan 7 19:29:44.228: RADIUS: ustruct sharecount=1
Jan 7 19:29:44.228: RADIUS: Initial Transmit Virtual-Access1 id 119 172.22.66.1
3:1645, Access-Request, len 99
Jan 7 19:29:44.228: Attribute 4 6 AC164219
Jan 7 19:29:44.228: Attribute 5 6 00000001
Jan 7 19:29:44.228: Attribute 61 6 00000005
Jan 7 19:29:44.228: Attribute 1 16 6A657265
Jan 7 19:29:44.228: Attribute 30 9 35373130
Jan 7 19:29:44.228: Attribute 31 5 34303803
Jan 7 19:29:44.228: Attribute 3 19 02A4F6DD
Jan 7 19:29:44.228: Attribute 6 6 00000002
Jan 7 19:29:44.228: Attribute 7 6 00000001
Jan 7 19:29:44.692: RADIUS: Received from id 119 172.22.66.13:1645, Access-Acce
Jan 7 19:29:44.692: Attribute 6 6 00000002
Jan 7 19:29:44.692: Attribute 7 6 00000001
Jan 7 19:29:44.692: Attribute 8 6 FFFFFFFE
Jan 7 19:29:44.692: AAA/AUTHEN (101773535): status = PASS
Jan 7 19:29:44.692: Vi1 AAA/AUTHOR/LCP: Authorize LCP
Jan 7 19:29:44.692: AAA/AUTHOR/LCP Vi1 (3630870259): Port='Virtual-Access1' lis
Jan 7 19:29:44.692: AAA/AUTHOR/LCP: Vi1 (3630870259) user='jeremy@hgw.com'
Jan 7 19:29:44.692: AAA/AUTHOR/LCP: Vi1 (3630870259) send AV service=ppp
Jan 7 19:29:44.692: AAA/AUTHOR/LCP: Vi1 (3630870259) send AV protocol=lcp
Jan 7 19:29:44.692: AAA/AUTHOR/LCP (3630870259) found list "default"
Jan 7 19:29:44.692: AAA/AUTHOR/LCP: Vi1 (3630870259) Method=RADIUS
Jan 7 19:29:44.692: AAA/AUTHOR (3630870259): Post authorization status = PASS_R
Jan 7 19:29:44.692: Vi1 AAA/AUTHOR/LCP: Processing AV service=ppp
Jan 7 19:29:44.692: Vi1 CHAP: O SUCCESS id 2 len 4
Jan 7 19:29:44.692: Vi1 PPP: Phase is UP
Jan 7 19:29:44.696: Vi1 AAA/AUTHOR/FSM: (0): Can we start IPCP?
Jan 7 19:29:44.696: AAA/AUTHOR/FSM Vi1 (2925705703): Port='Virtual-Access1' lis
Jan 7 19:29:44.696: AAA/AUTHOR/FSM: Vi1 (2925705703) user='jeremy@hgw.com'
Jan 7 19:29:44.696: AAA/AUTHOR/FSM: Vi1 (2925705703) send AV service=ppp
Jan 7 19:29:44.696: AAA/AUTHOR/FSM: Vi1 (2925705703) send AV protocol=ip
Jan 7 19:29:44.696: AAA/AUTHOR/FSM (2925705703) found list "default"
Jan 7 19:29:44.696: AAA/AUTHOR/FSM: Vi1 (2925705703) Method=RADIUS
Jan 7 19:29:44.696: RADIUS: Using NAS default peer
Jan 7 19:29:44.696: RADIUS: Authorize IP address 0.0.0.0
Jan 7 19:29:44.696: AAA/AUTHOR (2925705703): Post authorization status = PASS_R
Jan 7 19:29:44.696: Vi1 AAA/AUTHOR/FSM: We can start IPCP
Jan 7 19:29:44.696: Vi1 IPCP: O CONFREQ [Closed] id 1 len 10
Jan 7 19:29:44.696: Vi1 IPCP: Address 172.22.66.25 (0x0306AC164219)
Jan 7 19:29:44.696: RADIUS: ustruct sharecount=2
Jan 7 19:29:44.696: RADIUS: Initial Transmit Virtual-Access1 id 120 172.22.66.1
3:1646, Accounting-Request, len 108
Jan 7 19:29:44.696: Attribute 4 6 AC164219
Jan 7 19:29:44.696: Attribute 5 6 00000001
Jan 7 19:29:44.696: Attribute 61 6 00000005
Jan 7 19:29:44.696: Attribute 1 16 6A657265
Jan 7 19:29:44.696: Attribute 30 9 35373130
Jan 7 19:29:44.696: Attribute 31 5 34303828
Jan 7 19:29:44.696: Attribute 40 6 00000001
Jan 7 19:29:44.696: Attribute 45 6 00000001
Jan 7 19:29:44.696: Attribute 6 6 00000002
Jan 7 19:29:44.700: Attribute 44 10 30303030
Jan 7 19:29:44.700: Attribute 7 6 00000001
Jan 7 19:29:44.700: Attribute 41 6 00000000
Jan 7 19:29:44.740: RADIUS: Received from id 120 172.22.66.13:1646, Accounting-
Jan 7 19:29:44.804: Vi1 IPCP: I CONFREQ [REQsent] id 1 len 40
Jan 7 19:29:44.804: Vi1 IPCP: CompressType VJ 15 slots CompressSlotID (0x020
Jan 7 19:29:44.804: Vi1 IPCP: Address 0.0.0.0 (0x030600000000)
Jan 7 19:29:44.804: Vi1 IPCP: PrimaryDNS 171.68.10.70 (0x8106AB440A46)
Jan 7 19:29:44.804: Vi1 IPCP: PrimaryWINS 171.68.235.228 (0x8206AB44EBE4)
Jan 7 19:29:44.804: Vi1 IPCP: SecondaryDNS 171.68.10.140 (0x8306AB440A8C)
Jan 7 19:29:44.808: Vi1 IPCP: SecondaryWINS 171.68.235.229 (0x8406AB44EBE5)
Jan 7 19:29:44.808: Vi1 AAA/AUTHOR/IPCP: Start. Her address 0.0.0.0, we want 0
Jan 7 19:29:44.808: Vi1 AAA/AUTHOR/IPCP: Processing AV service=ppp
Jan 7 19:29:44.808: Vi1 AAA/AUTHOR/IPCP: Processing AV addr=0.0.0.0
Jan 7 19:29:44.808: Vi1 AAA/AUTHOR/IPCP: Authorization succeeded
Jan 7 19:29:44.808: Vi1 AAA/AUTHOR/IPCP: Done. Her address 0.0.0.0, we want 0.
Jan 7 19:29:44.808: Vi1 IPCP: Using pool 'default'
Jan 7 19:29:44.808: ip_get_pool: Vi1: using pool default
Jan 7 19:29:44.808: ip_get_pool: Vi1: returning address = 172.30.2.1
Jan 7 19:29:44.808: Vi1 IPCP: Pool returned 172.30.2.1
Jan 7 19:29:44.808: Vi1 IPCP: O CONFREJ [REQsent] id 1 len 10
Jan 7 19:29:44.808: Vi1 IPCP: CompressType VJ 15 slots CompressSlotID (0x020
Jan 7 19:29:44.808: Vi1 CCP: I CONFREQ [Not negotiated] id 1 len 15
Jan 7 19:29:44.808: Vi1 CCP: MS-PPC supported bits 0x00000001 (0x12060000000
Jan 7 19:29:44.808: Vi1 CCP: Stacker history 1 check mode EXTENDED (0x110500
Jan 7 19:29:44.808: Vi1 LCP: O PROTREJ [Open] id 2 len 21 protocol CCP
Jan 7 19:29:44.808: Vi1 LCP: (0x80FD0101000F12060000000111050001)
Jan 7 19:29:44.808: Vi1 LCP: (0x04)
Jan 7 19:29:44.808: Vi1 IPCP: I CONFACK [REQsent] id 1 len 10
Jan 7 19:29:44.808: Vi1 IPCP: Address 172.22.66.25 (0x0306AC164219)
6w5d: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1, changed s
Jan 7 19:29:46.224: Vi1 LCP: TIMEout: State Open
Jan 7 19:29:46.696: Vi1 IPCP: TIMEout: State ACKrcvd
Jan 7 19:29:46.696: Vi1 IPCP: O CONFREQ [ACKrcvd] id 2 len 10
Jan 7 19:29:46.696: Vi1 IPCP: Address 172.22.66.25 (0x0306AC164219)
Jan 7 19:29:46.784: Vi1 IPCP: I CONFACK [REQsent] id 2 len 10
Jan 7 19:29:46.784: Vi1 IPCP: Address 172.22.66.25 (0x0306AC164219)
Jan 7 19:29:47.792: Vi1 IPCP: I CONFREQ [ACKrcvd] id 2 len 34
Jan 7 19:29:47.792: Vi1 IPCP: Address 0.0.0.0 (0x030600000000)
Jan 7 19:29:47.792: Vi1 IPCP: PrimaryDNS 171.68.10.70 (0x8106AB440A46)
Jan 7 19:29:47.792: Vi1 IPCP: PrimaryWINS 171.68.235.228 (0x8206AB44EBE4)
Jan 7 19:29:47.792: Vi1 IPCP: SecondaryDNS 171.68.10.140 (0x8306AB440A8C)
Jan 7 19:29:47.792: Vi1 IPCP: SecondaryWINS 171.68.235.229 (0x8406AB44EBE5)
Jan 7 19:29:47.792: Vi1 AAA/AUTHOR/IPCP: Start. Her address 0.0.0.0, we want 1
Jan 7 19:29:47.792: Vi1 AAA/AUTHOR/IPCP: Processing AV service=ppp
Jan 7 19:29:47.792: Vi1 AAA/AUTHOR/IPCP: Processing AV addr=0.0.0.0
Jan 7 19:29:47.792: Vi1 AAA/AUTHOR/IPCP: Authorization succeeded
Jan 7 19:29:47.792: Vi1 AAA/AUTHOR/IPCP: Done. Her address 0.0.0.0, we want 17
Jan 7 19:29:47.792: Vi1 IPCP: O CONFNAK [ACKrcvd] id 2 len 34
Jan 7 19:29:47.792: Vi1 IPCP: Address 172.30.2.1 (0x0306AC1E0201)
Jan 7 19:29:47.792: Vi1 IPCP: PrimaryDNS 172.23.1.10 (0x8106AC17010A)
Jan 7 19:29:47.792: Vi1 IPCP: PrimaryWINS 172.23.1.11 (0x8206AC17010B)
Jan 7 19:29:47.792: Vi1 IPCP: SecondaryDNS 172.23.2.10 (0x8306AC17020A)
Jan 7 19:29:47.792: Vi1 IPCP: SecondaryWINS 172.23.2.11 (0x8406AC17020B)
Jan 7 19:29:47.952: Vi1 IPCP: I CONFREQ [ACKrcvd] id 3 len 34
Jan 7 19:29:47.952: Vi1 IPCP: Address 172.30.2.1 (0x0306AC1E0201)
Jan 7 19:29:47.952: Vi1 IPCP: PrimaryDNS 172.23.1.10 (0x8106AC17010A)
Jan 7 19:29:47.952: Vi1 IPCP: PrimaryWINS 172.23.1.11 (0x8206AC17010B)
Jan 7 19:29:47.952: Vi1 IPCP: SecondaryDNS 172.23.2.10 (0x8306AC17020A)
Jan 7 19:29:47.952: Vi1 IPCP: SecondaryWINS 172.23.2.11 (0x8406AC17020B)
Jan 7 19:29:47.952: Vi1 AAA/AUTHOR/IPCP: Start. Her address 172.30.2.1, we wan
Jan 7 19:29:47.952: AAA/AUTHOR/IPCP Vi1 (1744344778): Port='Virtual-Access1' li
Jan 7 19:29:47.952: AAA/AUTHOR/IPCP: Vi1 (1744344778) user='jeremy@hgw.com'
Jan 7 19:29:47.952: AAA/AUTHOR/IPCP: Vi1 (1744344778) send AV service=ppp
Jan 7 19:29:47.952: AAA/AUTHOR/IPCP: Vi1 (1744344778) send AV protocol=ip
Jan 7 19:29:47.952: AAA/AUTHOR/IPCP: Vi1 (1744344778) send AV addr*172.30.2.1
Jan 7 19:29:47.952: AAA/AUTHOR/IPCP (1744344778) found list "default"
Jan 7 19:29:47.952: AAA/AUTHOR/IPCP: Vi1 (1744344778) Method=RADIUS
Jan 7 19:29:47.952: RADIUS: Using NAS default peer
Jan 7 19:29:47.952: RADIUS: Authorize IP address 172.30.2.1
Jan 7 19:29:47.952: AAA/AUTHOR (1744344778): Post authorization status = PASS_R
Jan 7 19:29:47.952: set_ip_peer_addr: Vi1: address = 172.30.2.1 (4) is redundan
Jan 7 19:29:47.952: Vi1 AAA/AUTHOR/IPCP: Processing AV service=ppp
Jan 7 19:29:47.952: Vi1 AAA/AUTHOR/IPCP: Processing AV addr=172.30.2.1
Jan 7 19:29:47.952: Vi1 AAA/AUTHOR/IPCP: Authorization succeeded
Jan 7 19:29:47.952: Vi1 AAA/AUTHOR/IPCP: Done. Her address 172.30.2.1, we want
Jan 7 19:29:47.952: Vi1 IPCP: O CONFACK [ACKrcvd] id 3 len 34
Jan 7 19:29:47.956: Vi1 IPCP: Address 172.30.2.1 (0x0306AC1E0201)
Jan 7 19:29:47.956: Vi1 IPCP: PrimaryDNS 172.23.1.10 (0x8106AC17010A)
Jan 7 19:29:47.956: Vi1 IPCP: PrimaryWINS 172.23.1.11 (0x8206AC17010B)
Jan 7 19:29:47.956: Vi1 IPCP: SecondaryDNS 172.23.2.10 (0x8306AC17020A)
Jan 7 19:29:47.956: Vi1 IPCP: SecondaryWINS 172.23.2.11 (0x8406AC17020B)
Jan 7 19:29:47.956: Vi1 IPCP: State is Open
Jan 7 19:29:47.956: Vi1 IPCP: Install route to 172.30.2.1
describes the debug output events in more detail.
Table 12 Time Stamps and Descriptions of Access VPN Events on the Home Gateway
Time Stamp
|
Description
|
19:27:36.066 to 19:27:36.074
|
The home gateway receives a request from the NAS to open an L2F tunnel. The home gateway authenticates the tunnel and opens it.
|
19:27:36.070
|
The home gateway receives a SENDAUTH packet from the NAS, which wants to authenticate the home gateway.
|
19:27:36.074
|
The NAS authenticates the home gateway and sends an L2F_OPEN packet to open the tunnel.
|
19:27:36.074
|
The home gateway authenticates the tunnel by using local AAA.
|
19:27:36.074 to 19:27:36.078
|
The L2F tunnel is opened.
|
19.27.36.078
|
The NAS forwards the client information to the home gateway.
|
19:27:36.078 to 19:27:36.082
|
A virtual-access interface is cloned from virtual template 1, which is not a physical interface, but is treated like a regular interface that uses the IP address of the Fast Ethernet 0/0 interface.
The debug output following "interface Virtual-Access1" lists every command that has been configured for virtual template 1. Enter the clear vtemplate command to reset the command history.
|
19:27:36.162
|
The NAS forces the information from the LCP negotiation with the client onto the virtual-access interface.
|
19:27:36.162
|
The home gateway sends a CHAP challenge to the client, who responds and is authenticated by the home gateway.
|
19:27:36.282
|
The home gateway assigns the client the IP address 172.30.2.1 from the default pool.
|
19:27:36.294
|
The line protocol on interface Virtual-Access1 changes to the up state.
|
19:27:39.282
|
The client requests IP addresses of DNS and WINS servers.
|
19:27:39.414
|
The home gateway receives a positive acknowledgment from the client confirming the IP addresses of the DNS and WNIS servers.
|
19:27:39.414
|
The home gateway installs the route to the client's IP address, 172.30.2.1.
|