Loading...
Loading...
IE3400 configured with RADIUS non-standard port doesn't authenticate. only works with RADIUS Standard ports 1812 and 1813 port. while IE is configured with non-standard port Ex. 12000 and 120001. IE’s SMD service is Dead and report destination port is not reachable, though RADIUS server is responding to respective duplicate request / response.
while using non-standard RADIUS ports.
NA
NON-working debugs, RADIUS: id 3, priority 1, host 10.106.64.5, auth-port 21000, acct-port 21001, hostname ISE State: current UP, duration 25402s, previous duration 60s Dead: total time 111266s, count 17 Platform State from SMD: current DEAD, duration 59403s, previous duration 3630s SMD Platform Dead: total time 59403s, count 1 Platform State from WNCD (1) : current UP Platform State from WNCD (2) : current UP Platform State from WNCD (3) : current UP Platform State from WNCD (4) : current UP Platform State from WNCD (5) : current UP Platform State from WNCD (6) : current UP Platform State from WNCD (7) : current UP Platform State from WNCD (8) : current UP, duration 0s, previous duration 0s Platform Dead: total time 0s, count 0UP Quarantined: No Authen: request 2005, timeouts 1986, failover 0, retransmission 1324 Response: accept 18, reject 0, challenge 0 Response: unexpected 0, server error 0, incorrect 0, time 86144204ms Transaction: success 19, failure 662 Throttled: transaction 0, timeout 0, failure 0 "set platform software trace smd aaa debug" and "set platform software trace smd radius debug" attached debug outputs, please see below timeouts, RADIUS: id 1, priority 1, host 10.106.64.5, auth-port 21000, acct-port 21001, hostname ISE State: current UP, duration 9723s, previous duration 49656s Dead: total time 111206s, count 16 Platform State from SMD: current DEAD, duration 1452909s, previous duration 3621s SMD Platform Dead: total time 1452909s, count 1 Platform State from WNCD (1) : current UP Platform State from WNCD (2) : current UP Platform State from WNCD (3) : current UP Platform State from WNCD (4) : current UP Platform State from WNCD (5) : current UP Platform State from WNCD (6) : current UP Platform State from WNCD (7) : current UP Platform State from WNCD (8) : current UP, duration 0s, previous duration 0s Platform Dead: total time 0s, count 0UP Quarantined: No Authen: request 52580, timeouts 52179, failover 0, retransmission 34790 Response: accept 393, reject 0, challenge 0 Response: unexpected 8, server error 0, incorrect 0, time 8638736ms Transaction: success 401, failure 17389 Throttled: transaction 0, timeout 0, failure 0 Malformed responses: 0 Bad authenticators: 0 Dot1x transactions: Response: total responses: 0, avg response time: 0ms Transaction: timeouts 0, failover 0 Transaction: total 0, success 0, failure 0 MAC auth transactions: Response: total responses: 0, avg response time: 0ms Transaction: timeouts 0, failover 0 Transaction: total 0, success 0, failure 0 Author: request 0, timeouts 0, failover 0, retransmission 0 Response: accept 0, reject 0, challenge 0 Response: unexpected 0, server error 0, incorrect 0, time 0ms Transaction: success 0, failure 0 Throttled: transaction 0, timeout 0, failure 0 Malformed responses: 0 Bad authenticators: 0 MAC author transactions: Response: total responses: 0, avg response time: 0ms Transaction: timeouts 0, failover 0 Transaction: total 0, success 0, failure 0 Account: request 4143, timeouts 3750, failover 0, retransmission 2504 Request: start 0, interim 0, stop 0 Response: start 0, interim 0, stop 0 Response: unexpected 42, server error 0, incorrect 0, time 15ms Transaction: success 393, failure 1246 Throttled: transaction 0, timeout 0, failure 0 Malformed responses: 0 Bad authenticators: 0 Elapsed time since counters last cleared: 2w2d20h35m Estimated Outstanding Access Transactions: 0 Estimated Outstanding Accounting Transactions: 0 Estimated Throttled Access Transactions: 0 Estimated Throttled Accounting Transactions: 0 Maximum Throttled Transactions: access 0, accounting 0 Consecutive Response Failures: total 18618 SMD Platform : max 16142, current 16142 total 16142 WNCD Platform: max 0, current 0 total 0 IOSD Platform : max 1309, current 0 total 2476 Consecutive Timeouts: total 55911 SMD Platform : max 48428, current 48428 total 48428 WNCD Platform: max 0, current 0 total 0 SMD is reporting error while Events enqueue limit reached. 2023/03/20 06:00:20.401532 {smd_R0-0}{1}: [smd] [6625]: (ERR): imsp read sanet packet for if_id = 11 2023/03/20 06:00:20.401529 {smd_R0-0}{1}: [smd] [6625]: (ERR): dst_mac 1:80:c2:0:0:3 2023/03/20 06:00:20.401515 {smd_R0-0}{1}: [smd] [6625]: (ERR): packet len 70 2023/03/20 06:00:15.400631 {smd_R0-0}{1}: [smd] [6625]: (ERR): imsp read sanet packet for if_id = 11 2023/03/20 06:00:15.400628 {smd_R0-0}{1}: [smd] [6625]: (ERR): dst_mac 1:80:c2:0:0:3 2023/03/20 06:00:15.400614 {smd_R0-0}{1}: [smd] [6625]: (ERR): packet len 70 2023/03/20 06:00:10.411275 {smd_R0-0}{1}: [smd] [6625]: (ERR): imsp read sanet packet for if_id = 11 2023/03/20 06:00:10.411273 {smd_R0-0}{1}: [smd] [6625]: (ERR): dst_mac 1:80:c2:0:0:3 2023/03/20 06:00:10.411261 {smd_R0-0}{1}: [smd] [6625]: (ERR): packet len 70 2023/03/20 06:00:05.186895 {smd_R0-0}{1}: [auth-mgr] [6625]: (ERR): [a036.9fe2.821a:Gi1/8] Failed to search/create timer main rec while timer stop 2023/03/20 06:00:05.186816 {smd_R0-0}{1}: [sm-eventq_db] [6625]: (ERR): [0000.0000.0000:unknown] events Enqueue : Queue limit reached: event drop count 9 2023/03/20 06:00:05.185299 {smd_R0-0}{1}: [sm-eventq_db] [6625]: (ERR): [0000.0000.0000:unknown] NULL epm rec while populating success params 2023/03/20 05:59:27.550570 {smd_R0-0}{1}: [aaa] [6625]: (debug): Valid server internal check: server ISE with handle 6f000005 : is valid 2023/03/20 05:59:27.550567 {smd_R0-0}{1}: [aaa] [6625]: (debug): Removed Group(Handle): private_sg-16135(3808431903) fromServer(Handle): ISE(1862270981) : group count : 2 2023/03/20 05:59:27.550522 {smd_R0-0}{1}: [aaa] [6625]: (debug): Valid server internal check: server ISE with handle 6f000005 : is valid 2023/03/20 05:59:27.550491 {smd_R0-0}{1}: [aaa] [6625]: (debug): Valid server internal check: server ISE with handle 6f000005 : is valid 2023/03/20 05:59:27.550489 {smd_R0-0}{1}: [aaa] [6625]: (debug): AAA Sg Is valid server : server ISE with handle 6f000005 is valid 2023/03/20 05:59:27.550487 {smd_R0-0}{1}: [aaa] [6625]: (debug): Valid server internal check: server ISE with handle 6f000005 : is valid 2023/03/20 05:59:27.550485 {smd_R0-0}{1}: [aaa] [6625]: (debug): AAA Sg Is valid server : server ISE with handle 6f000005 is valid 2023/03/20 05:59:27.550482 {smd_R0-0}{1}: [aaa] [6625]: (debug): Valid server internal check: server ISE with handle 6f000005 : is valid 2023/03/20 05:59:27.550477 {smd_R0-0}{1}: [aaa] [6625]: (debug): Valid server internal check: server ISE with handle 6f000005 : is valid 2023/03/20 05:59:27.550475 {smd_R0-0}{1}: [aaa] [6625]: (debug): Valid server internal check: server ISE with handle 6f000005 : is valid 2023/03/20 05:59:27.550452 {smd_R0-0}{1}: [aaa-test] [6625]: (ERR): AAA/SG/TEST: No Test response from server (10.106.64.5:21000,21001) 2023/03/20 05:59:27.550449 {smd_R0-0}{1}: [aaa] [6625]: (debug): Valid server internal check: server ISE with handle 6f000005 : is valid --More-- 2023/03/20 05:59:27.550447 {smd_R0-0}{1}: [aaa] [6625]: (debug): Valid server internal check: server ISE with handle 6f000005 : is valid 2023/03/20 05:59:27.550441 {smd_R0-0}{1}: [aaa] [6625]: (debug): Valid server internal check: server ISE with handle 6f000005 : is valid 2023/03/20 05:59:27.550437 {smd_R0-0}{1}: [aaa] [6625]: (debug): Valid server internal check: server ISE with handle 6f000005 : is valid 2023/03/20 05:59:27.550331 {smd_R0-0}{1}: [aaa-authen] [6625]: (ERR): Invalid Mac address receivedwhile getting mac without delimiter 2023/03/20 05:59:27.550330 {smd_R0-0}{1}: [aaa-authen] [6625]: (ERR): Supported MAC formats:AABBCCDDEEFF/AABB.CCDD.EEFF/AA-BB-CC-DD-EE-FF/AA:BB:CC:DD:EE:FF 2023/03/20 05:59:27.550328 {smd_R0-0}{1}: [aaa-authen] [6625]: (ERR): Invalid or unsupported MAC string length 2023/03/20 05:59:27.550324 {smd_R0-0}{1}: [aaa-authen] [6625]: (debug): MAC address in AAA request is 2023/03/20 05:59:27.550321 {smd_R0-0}{1}: [aaa-authen] [6625]: (debug): AAA AUTHEN(00000000): Unable to retrieve WLAN PROF NAME from AAA req attr list 2023/03/20 05:59:27.550288 {smd_R0-0}{1}: [radius] [6625]: (ERR): RADIUS/DECODE: Case error(no response/ bad packet/ op decode);parse response; FAIL 2023/03/20 05:59:27.550286 {smd_R0-0}{1}: [radius] [6625]: (ERR): RADIUS/DECODE: No response from radius-server; parse response; FAIL 2023/03/20 05:59:27.550281 {smd_R0-0}{1}: [aaa] [6625]: (ERR): Server handle to ptr internal: server validity check failed 2023/03/20 05:59:27.550279 {smd_R0-0}{1}: [aaa] [6625]: (ERR): Valid server internal check: server handle is invalid 2023/03/20 05:59:27.550276 {smd_R0-0}{1}: [radius] [6625]: (debug): RADIUS-Response: Access-Request with server hdl 0 Auth port 0 Acct Port 0
Cisco Integration
Learn more about where this data comes from
Bug Scrub Advisor
Streamline upgrades with automated vendor bug scrubs
BugZero Enterprise
Wish you caught this bug sooner? Get proactive today.