• 全部
  • 經驗案例
  • 典型配置
  • 技術公告
  • FAQ
  • 漏洞說明
  • 全部
  • 全部
  • 大數據引擎
  • 知了引擎
產品線
搜索
取消
案例類型
發布者
是否解決
是否官方
時間
搜索引擎
匹配模式
高級搜索

aaa服務器上通過radius的123號屬性直接下發到bras的ipv6的pd

2025-03-06提問
  • 0關注
  • 0收藏,644瀏覽
粉絲:0人 關注:0人

問題描述:

aaa服務器上通過radius的123號屬性直接下發到bras的ipv6的pd前綴屬性,失敗

interface Virtual-Template1 

 ppp authentication-mode pap chap domain default enable xxxxx

 ppp account-statistics enable

 ppp nd-prefix-route enable

 ipv6 dhcp select server

 ipv6 dhcp client-detect

 ipv6 dhcp relay client-information record

 ipv6 dhcp relay release-agent

 ipv6 dhcp relay client-link-address enable

 ipv6 nd ra prefix default 2592000 604800

 ipv6 address auto link-local

 ipv6 nd autoconfig other-flag

 undo ipv6 nd ra halt

 ipv6 nd ra no-advlinkmtu

 ipv6 nd unsolicited-na-learning enable

#

domain name xxxx

 authorization-attribute user-group xxxx-1

 authorization-attribute ip-pool-group xxxx-group

 authorization-attribute ipv6-nd-prefix-pool pppoe-pd-xx

 authorization-attribute primary-dns ipv6 2408:8001:7000::

 authorization-attribute user-priority inbound 0

 authorization-attribute user-priority outbound 0

 authentication ppp radius-scheme abc

 authorization ppp radius-scheme abc

 accounting ppp broadcast radius-scheme abc radius-scheme ccc

 accounting dual-stack separate

 accounting start-delay 2

 redirect active-time 120

#

radius scheme abc

 primary authentication 12.12.12.12

 primary accounting  12.12.12.12

 key authentication cipher $c$3$6o3Wb2prL2qu0SIkezQata6OeTs0WBn7LPY=

 key accounting cipher $c$3$F1gNzmiKWhDe7ZCzpSTA26z/cznWuW/wen8=

 retry realtime-accounting 10

 timer response-timeout 10

 user-name-format without-domain

 nas-ip 119.6.1.121

 attribute translate

 attribute vendor-id 2011 version 1.1

#

#

interface Route-Aggregation13.1

 description PPPOE

 user-vlan dot1q vid 121 second-dot1q 101 to 164

 ipv6 address auto link-local

 ipv6 nd autoconfig managed-address-flag

 ipv6 nd autoconfig other-flag

 undo ipv6 nd ra halt

 pppoe-server bind virtual-template 1

 pppoe-server access-line-id trust

 pppoe-server access-line-id bas-info

 pppoe-server access-line-id circuit-id parse-mode cn-telecom

 pppoe-server nas-port-id interface route-aggregation 13

 aaa nas-ip 119.6.1.121

組網及組網描述:

debug和現實已經收到 123屬性

Mar  5 15:44:02:304 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

    Service-Type=Framed-User

    Framed-Protocol=PPP

    Session-Timeout=432000

    Acct-Interim-Interval=14400

    Framed-IP-Address=101.204.171.297

    Framed-IP-Netmask=255.255.255.255

    Delegated-IPv6-Prefix=2408:8266:3FF:7::/64

    H3c-Input-Average-Rate=655360000

    H3c-Input-Peak-Rate=655360000

    H3c-Output-Average-Rate=2621440000

    H3c-Output-Peak-Rate=2621440000

    Hw-Domain-Name="swgzx"

*Mar  5 15:44:02:304 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

 02 04 00 81 2b 33 8a 0b 0f 35 81 15 15 c5 03 e2 

 d7 2a 2d 22 06 06 00 00 00 02 07 06 00 00 00 01 

 1b 06 00 06 97 80 55 06 00 00 38 40 08 06 65 cc 

 47 c5 09 06 ff ff ff ff 7b 0c 00 40 24 08 82 66 

 03 ff 00 07 1a 0c 00 00 63 a2 02 06 27 10 00 00 

 1a 0c 00 00 63 a2 01 06 27 10 00 00 1a 0c 00 00 

 63 a2 05 06 9c 40 00 00 1a 0c 00 00 63 a2 04 06 

 9c 40 00 00 1a 0d 00 00 07 db 8a 07 73 77 67 7a 

 78 

*Mar  5 15:44:02:304 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6; 

Sent reply message successfully.

*Mar  5 15:44:02:304 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6; 

PAM_RADIUS: Processing RADIUS authentication.

*Mar  5 15:44:02:304 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6; 

PAM_RADIUS: Fetched authentication reply-data successfully, resultCode: 0

*Mar  5 15:44:02:305 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6; 

PAM_RADIUS: Processing RADIUS authorization.

*Mar  5 15:44:02:305 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6; 

PAM_RADIUS: RADIUS Authorization successfully.

*Mar  5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_PAP_EVENT: -MDC=1-Slot=6; 

  PPP Event: 

      BAS44(1935400026df) PAP Receive AAA Result Event 

      State WaitAAA 

*Mar  5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_PAP_PKT: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Output PAP(c023) Packet, PktLen 36 

      State WaitAAA, code Ack(02), id 1, Len 32 

      Msg  Len: 27  Msg :Welcome to use this device.

*Mar  5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_PAP_STATE: -MDC=1-Slot=6; 

  PPP State Change: 

      BAS44(1935400026df) PAP: WaitAAA --> ServerSuccess 

*Mar  5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6; 

  PPP Event: 

      BAS44(1935400026df) IPCP Open Event 

      State initial 

*Mar  5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6; 

  PPP State Change: 

      BAS44(1935400026df) IPCP: initial --> starting 

*Mar  5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6; 

  PPP Event: 

      BAS44(1935400026df) IPCP Lower Up Event 

      State starting 

*Mar  5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6; 

  PPP State Change: 

      BAS44(1935400026df) IPCP: starting --> reqsent 

*Mar  5 15:44:02:310 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Output IPCP(8021) Packet, PktLen 14 

      Current State reqsent, code ConfReq(01), id 0, len 10 

      IP Address(3), len 6, val 65 cc 47 c1 

*Mar  5 15:44:02:311 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6; 

  PPP Event: 

      BAS44(1935400026df) IPv6CP Open Event 

      State initial 

*Mar  5 15:44:02:311 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6; 

  PPP State Change: 

      BAS44(1935400026df) IPv6CP: initial --> starting 

*Mar  5 15:44:02:311 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6; 

  PPP Event: 

      BAS44(1935400026df) IPv6CP Lower Up Event 

      State starting 

*Mar  5 15:44:02:311 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6; 

  PPP State Change: 

      BAS44(1935400026df) IPv6CP: starting --> reqsent 

*Mar  5 15:44:02:311 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Output IPv6CP(8057) Packet, PktLen 18 

      Current State reqsent, code ConfReq(01), id 0, len 14 

      IPv6CP InterfaceID(1), len a, val 90 e7 10 61 68 00 00 00 

*Mar  5 15:44:02:312 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Input IPCP(8021) Packet, PktLen 26 

      Current State reqsent, code ConfReq(01), id 1, len 22 

      IP Address(3), len 6, val 00 00 00 00 

      Primary DNS Server Address(81), len 6, val 00 00 00 00 

      Secondary DNS Server Address(83), len 6, val 00 00 00 00 

*Mar  5 15:44:02:312 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6; 

  PPP Event: 

      BAS44(1935400026df) IPCP RCR-(Receive Config Bad Request) Event 

      State reqsent 

*Mar  5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Output IPCP(8021) Packet, PktLen 20 

      Current State reqsent, code ConfRej(04), id 1, len 16 

      Primary DNS Server Address(81), len 6, val 00 00 00 00 

      Secondary DNS Server Address(83), len 6, val 00 00 00 00 

*Mar  5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Input IPv6CP(8057) Packet, PktLen 18 

      Current State reqsent, code ConfReq(01), id 1, len 14 

      IPv6CP InterfaceID(1), len a, val ee cf 70 ff fe aa 07 82 

*Mar  5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Input IPCP(8021) Packet, PktLen 14 

      Current State reqsent, code ConfAck(02), id 0, len 10 

      IP Address(3), len 6, val 65 cc 47 c1 

*Mar  5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6; 

  PPP Event: 

      BAS44(1935400026df) IPCP RCA(Receive Config Ack) Event 

      State reqsent 

*Mar  5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6; 

  PPP State Change: 

      BAS44(1935400026df) IPCP: reqsent --> ackrcvd 

*Mar  5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Input IPv6CP(8057) Packet, PktLen 18 

      Current State reqsent, code ConfAck(02), id 0, len 14 

      IPv6CP InterfaceID(1), len a, val 90 e7 10 61 68 00 00 00 

*Mar  5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6; 

  PPP Event: 

      BAS44(1935400026df) IPv6CP RCA(Receive Config Ack) Event 

      State reqsent 

*Mar  5 15:44:02:313 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6; 

  PPP State Change: 

      BAS44(1935400026df) IPv6CP: reqsent --> ackrcvd 

*Mar  5 15:44:02:314 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6; 

  PPP Event: 

      BAS44(1935400026df) IPv6CP RCR+(Receive Config Good Request) Event 

      State ackrcvd 

*Mar  5 15:44:02:314 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Output IPv6CP(8057) Packet, PktLen 18 

      Current State ackrcvd, code ConfAck(02), id 1, len 14 

      IPv6CP InterfaceID(1), len a, val ee cf 70 ff fe aa 07 82 

*Mar  5 15:44:02:314 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6; 

  PPP State Change: 

      BAS44(1935400026df) IPv6CP: ackrcvd --> opened 

*Mar  5 15:44:02:316 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Input IPCP(8021) Packet, PktLen 14 

      Current State ackrcvd, code ConfReq(01), id 2, len 10 

      IP Address(3), len 6, val 00 00 00 00 

*Mar  5 15:44:02:316 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6; 

  PPP Event: 

      BAS44(1935400026df) IPCP RCR-(Receive Config Bad Request) Event 

      State ackrcvd 

*Mar  5 15:44:02:316 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Output IPCP(8021) Packet, PktLen 14 

      Current State ackrcvd, code ConfNak(03), id 2, len 10 

      IP Address(3), len 6, val 65 cc 47 c5 

*Mar  5 15:44:02:318 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Input IPCP(8021) Packet, PktLen 14 

      Current State ackrcvd, code ConfReq(01), id 3, len 10 

      IP Address(3), len 6, val 65 cc 47 c5 

*Mar  5 15:44:02:318 2025 SR8800 USRTRACE/7/PPP_FSM_EVENT: -MDC=1-Slot=6; 

  PPP Event: 

      BAS44(1935400026df) IPCP RCR+(Receive Config Good Request) Event 

      State ackrcvd 

*Mar  5 15:44:02:318 2025 SR8800 USRTRACE/7/PPP_FSM_PACKET: -MDC=1-Slot=6; 

  PPP Packet: 

      BAS44(1935400026df) Output IPCP(8021) Packet, PktLen 14 

      Current State ackrcvd, code ConfAck(02), id 3, len 10 

      IP Address(3), len 6, val 65 cc 47 c5 

*Mar  5 15:44:02:319 2025 SR8800 USRTRACE/7/PPP_FSM_STATE: -MDC=1-Slot=6; 

  PPP State Change: 

      BAS44(1935400026df) IPCP: ackrcvd --> opened 

*Mar  5 15:44:03:640 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Response timed out.

*Mar  5 15:44:03:640 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Found request context, dstIP: 221.10.94.5; dstPort: 1813; VPN instance: --(public); socketfd: 124; pktID:33.

*Mar  5 15:44:03:641 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Reached the maximum retries.

*Mar  5 15:44:03:641 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6; 

Got next server failed.

*Mar  5 15:44:03:641 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Sent reply error message to PAM.

*Mar  5 15:44:04:387 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6; 

PAM_RADIUS: RADIUS accounting started.

*Mar  5 15:44:04:387 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6; 

PAM_RADIUS: Sent accounting-start request successfully.

*Mar  5 15:44:04:390 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Got request data successfully, primitive: accounting-start.

*Mar  5 15:44:04:390 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Getting RADIUS server info.

*Mar  5 15:44:04:390 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Got RADIUS server info successfully.

*Mar  5 15:44:04:390 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Created request context successfully.

*Mar  5 15:44:04:390 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Created request packet successfully, dstIP: 116.169.61.143, dstPort: 1813, VPN instance: --(public), socketFd: 158, pktID: 15.

*Mar  5 15:44:04:390 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Added packet socketfd to epoll successfully, socketFd: 158.

*Mar  5 15:44:04:391 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Mapped PAM item to RADIUS attribute successfully.

*Mar  5 15:44:04:391 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6; 

Got RADIUS username format successfully, format: 2.

*Mar  5 15:44:04:391 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6; 

Added attribute user-name successfully, user-name: test12.

*Mar  5 15:44:04:391 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Filled RADIUS attributes in packet successfully.

*Mar  5 15:44:04:391 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Composed request packet successfully.

*Mar  5 15:44:04:391 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Created response timeout timer successfully.

*Mar  5 15:44:04:391 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Sent request packet successfully.

1 個回答
粉絲:0人 關注:0人

*Mar  5 15:44:03:641 2025 SR8800 USRTRACE/7/RADIUS_PACKET: -MDC=1-Slot=6; 

Reached the maximum retries.

*Mar  5 15:44:03:641 2025 SR8800 USRTRACE/7/RADIUS_EVENT: -MDC=1-Slot=6; 

Got next server failed.

暫無評論

編輯答案

你正在編輯答案

如果你要對問題或其他回答進行點評或詢問,請使用評論功能。

分享擴散:

提出建議

    +

親~登錄後才可以操作哦!

確定

親~檢測到您登陸的賬號未在http://hclhub.h3c.com進行注冊

注冊後可訪問此模塊

跳轉hclhub

你的郵箱還未認證,請認證郵箱或綁定手機後進行當前操作

舉報

×

侵犯我的權益 >
對根叔社區有害的內容 >
辱罵、歧視、挑釁等(不友善)

侵犯我的權益

×

泄露了我的隱私 >
侵犯了我企業的權益 >
抄襲了我的內容 >
誹謗我 >
辱罵、歧視、挑釁等(不友善)
騷擾我

泄露了我的隱私

×

您好,當您發現根叔知了上有泄漏您隱私的內容時,您可以向根叔知了進行舉報。 請您把以下內容通過郵件發送到pub.zhiliao@h3c.com 郵箱,我們會盡快處理。
  • 1. 您認為哪些內容泄露了您的隱私?(請在郵件中列出您舉報的內容、鏈接地址,並給出簡短的說明)
  • 2. 您是誰?(身份證明材料,可以是身份證或護照等證件)

侵犯了我企業的權益

×

您好,當您發現根叔知了上有關於您企業的造謠與誹謗、商業侵權等內容時,您可以向根叔知了進行舉報。 請您把以下內容通過郵件發送到 pub.zhiliao@h3c.com 郵箱,我們會在審核後盡快給您答複。
  • 1. 您舉報的內容是什麼?(請在郵件中列出您舉報的內容和鏈接地址)
  • 2. 您是誰?(身份證明材料,可以是身份證或護照等證件)
  • 3. 是哪家企業?(營業執照,單位登記證明等證件)
  • 4. 您與該企業的關係是?(您是企業法人或被授權人,需提供企業委托授權書)
我們認為知名企業應該坦然接受公眾討論,對於答案中不準確的部分,我們歡迎您以正式或非正式身份在根叔知了上進行澄清。

抄襲了我的內容

×

原文鏈接或出處

誹謗我

×

您好,當您發現根叔知了上有誹謗您的內容時,您可以向根叔知了進行舉報。 請您把以下內容通過郵件發送到pub.zhiliao@h3c.com 郵箱,我們會盡快處理。
  • 1. 您舉報的內容以及侵犯了您什麼權益?(請在郵件中列出您舉報的內容、鏈接地址,並給出簡短的說明)
  • 2. 您是誰?(身份證明材料,可以是身份證或護照等證件)
我們認為知名企業應該坦然接受公眾討論,對於答案中不準確的部分,我們歡迎您以正式或非正式身份在根叔知了上進行澄清。

對根叔社區有害的內容

×

垃圾廣告信息
色情、暴力、血腥等違反法律法規的內容
政治敏感
不規範轉載 >
辱罵、歧視、挑釁等(不友善)
騷擾我
誘導投票

不規範轉載

×

舉報說明