Quantcast
Channel: SRX Services Gateway topics
Viewing all articles
Browse latest Browse all 3959

Juniper SRX 210he is not received IP WAN from ISP

$
0
0

Hi everyone,

I have a problem that I configure PPPoE client on Juniper SRX210he with username and password provided by radius server, but I show that SRX210 didn't receive IP WAN from BRAS but I used that username and password to connect PPPoE to BRAS from another device such as Draytek vigor or Laptop, It worked. I showed log on BRAS MX80. 

 

Dec 21 09:34:17.019428 ###################################################################
Dec 21 09:34:17.019459 ########################### TERMINATE REQ RCVD #########################
Dec 21 09:34:17.019489 ###################################################################
Dec 21 09:34:17.019519 Auth-FSM: Trigger Acct-Stop, Save off client-msg-cookie. session-id:16191
Dec 21 09:34:17.019556 authd_auth_aaa_msg_destroy: removing msg from recv queue
Dec 21 09:34:17.019595 authd_auth_aaa_msg_destructauth_aaa_msg: 0x22b9b64
Dec 21 09:34:17.019632 doPersistedDataUpdates
Dec 21 09:34:17.019665 doPersistedDataUpdates
Dec 21 09:34:17.019696 Special (undelivered) terminate response for session-id:16191 to keep outstanding messages below quota. Actual response could be delayed depending on timeouts and configured values.
Dec 21 09:34:18.231051 RadiusServer: server[0] used for last request - 192.168.10.5 no timeout
Dec 21 09:34:18.292599 RadiusServer: 192.168.10.5 timeout (g:5, r:60)
Dec 21 09:34:18.292689 RadiusServer: marking current time for initial timeout for 192.168.10.5
Dec 21 09:34:18.292751 Radius result is CLIENT_REQ_TIMEOUT
Dec 21 09:34:18.292786 authd_radius_acctg_callback Result is Smiley SadCLIENT_REQ_TIMEOUT) reply_codeSmiley Sad(null)) 0 session-id:16191
Dec 21 09:34:18.292843 ======= Accounting RESPONSE Received ==============
Dec 21 09:34:18.292899 AccFsm::current state=Acc-Stop-Sent(4) event=2 session-id:16191
Dec 21 09:34:18.292935 ACC-FSMSmiley TonguerocessAccStartRsp_a2 for session-id:16191
Dec 21 09:34:18.292973 persistOnlyPrivateData m_inFlight
Dec 21 09:34:18.293042 accFsmExecute::new state=Acc-Stop-Sent(4)
Dec 21 09:34:18.293079 doPersistedDataUpdates
Dec 21 09:34:18.293285 RadiusServer: server[0] used for last request - 192.168.10.5 no timeout
Dec 21 09:34:18.293324 RadiusServer: 192.168.10.5 request timeout. Seconds since first request timeout: 0 (g:5, r:60). Not DEAD yet
Dec 21 09:34:18.293366 Radius result is CLIENT_REQ_TIMEOUT
Dec 21 09:34:18.293398 authd_radius_acctg_callback Result is Smiley SadCLIENT_REQ_TIMEOUT) reply_codeSmiley Sad(null)) 0 session-id:16191
Dec 21 09:34:18.293440 ======= Accounting RESPONSE Received ==============
Dec 21 09:34:18.293479 AccFsm::current state=Acc-Stop-Sent(4) event=7 session-id:16191
Dec 21 09:34:18.293513 ACC-FSMSmiley TonguerocessAccInterimRsp_a5 for session-id:16191
Dec 21 09:34:18.293548 persistOnlyPrivateData m_inFlight
Dec 21 09:34:18.293594 accFsmExecute::new state=Acc-Stop-Sent(4)
Dec 21 09:34:18.293630 doPersistedDataUpdates
Dec 21 09:34:28.915962 RadiusServer: server[0] used for last request - 192.168.10.5 no timeout
Dec 21 09:34:28.916047 RadiusServer: 192.168.10.5 request timeout. Seconds since first request timeout: 10. Change server state.
Dec 21 09:34:28.916563 RadiusServer: profile - RADIUS, radius server - 192.168.10.5 status set to UNREACHABLE
Dec 21 09:34:28.919185 Framework : : SNMP trap (jnxAccessAuthServerDisabled, jnxUserAAAServerName = 192.168.10.5) result: <snmp-generate-trap-results xmlns="http://xml.juniper.net/junos/15.1R7/junos-snmp">
<snmp-generate-trap-result>trap sent successfully</snmp-generate-trap-result>
</snmp-generate-trap-results>

Dec 21 09:34:28.919311 Framework : enter - authd_add_server_info_node_to_list
Dec 21 09:34:28.919345 Framework : authd_add_server_info_node_to_list: server info added to list of dead servers
Dec 21 09:34:28.919377 Framework : enter authd_create_and_start_state_timer
Dec 21 09:34:28.919422 Framework : authd_create_and_start_state_timer : started timer for 30 seconds for dead servers, &servers_info 0x0x7295700
Dec 21 09:34:28.919481 Radius result is CLIENT_REQ_TIMEOUT
Dec 21 09:34:28.919515 authd_radius_acctg_callback Result is Smiley SadCLIENT_REQ_TIMEOUT) reply_codeSmiley Sad(null)) 0 session-id:16191
Dec 21 09:34:28.919569 ======= Accounting RESPONSE Received ==============
Dec 21 09:34:28.919619 AccFsm::current state=Acc-Stop-Sent(4) event=11 session-id:16191
Dec 21 09:34:28.919655 ACC-FSMSmiley TonguerocessAccStopRsp_a8 for session-id:16191
Dec 21 09:34:28.919701 AuthFsm::current state=AuthAcctStopAckWait(6) event=26 astEntry=0x2cc85b0 aaa msg=0 session-id:16191
Dec 21 09:34:28.919736 Auth-FSM: Posting a Client-Session-Cleanup-Ack to the client daemon for session-id:16191
Dec 21 09:34:28.919776 ****astEntry:0x2cc85b0 aaaMsg:0 replyOpcode:1 replySubOpcode:20 replyStatus:1
Dec 21 09:34:28.920149 authd_build_aaa_request: Found no dynRequest
Dec 21 09:34:28.920193 SEQ SendClientMsg:jpppd-test-client session-id:16191 reply-code=1 (OK), result-subopcode=20 (CLIENT_SESSION_CLEANUP_ACK), cookie=4, ex_cookie=1357, rply_len=28, num_tlv_blocks=0
Dec 21 09:34:28.920244 authd_auth_aaa_msg_destructauth_aaa_msg: 0x22ba0e0
Dec 21 09:34:28.920286 ###################################################################
Dec 21 09:34:28.920318 ####################### TERMINATE ACK SENT ########################
Dec 21 09:34:28.920348 ###################################################################
Dec 21 09:34:28.920387 Delete session-id:16191
Dec 21 09:34:28.920424 Begin to logout Subscriber
Dec 21 09:34:28.920462 subscriberLogout session-id:16191
Dec 21 09:34:28.920569 UserAccess:test4 session-id:16191 state:log-out -0/0/0.0 reason: aaa shutdown-administrative-reset
Dec 21 09:34:28.920885 doPersistedDataUpdates
Dec 21 09:34:28.920926 doPersistedDataUpdates
Dec 21 09:34:28.920962 findSession AST-Table couldn't find the session-id:16191
Dec 21 09:34:28.920999 findSession AST-Table couldn't find the session-id:16191
Dec 21 09:34:28.921034 accFsmExecute::new state=Acc-Stop-Ackd(6)
Dec 21 09:34:28.921065 doPersistedDataUpdates
Dec 21 09:34:58.920594 RadiusServer: authd_radius_mark_servers_alive: profile - RADIUS, radius server - 192.168.10.5 status set to ALIVE
Dec 21 09:34:58.922043 Framework : : SNMP trap (jnxAccessAuthServerEnabled, jnxUserAAAServerName = 192.168.10.5) result: <snmp-generate-trap-results xmlns="http://xml.juniper.net/junos/15.1R7/junos-snmp">
<snmp-generate-trap-result>trap sent successfully</snmp-generate-trap-result>
</snmp-generate-trap-results>

 My config of SRX210he :

interfaces {
ge-0/0/0 {
unit 0 {
encapsulation ppp-over-ether;
}
}
fe-0/0/7 {
unit 0 {
family inet {
address 192.168.10.150/24;
}
}
}
pp0 {
unit 0 {
apply-macro "test radius";
ppp-options {
chap {
default-chap-secret "$9$Xru7bsgoJDHq4on/ApB1"; ## SECRET-DATA
local-name test4;
no-rfc2486;
passive;
}
pap {
local-name test4;
no-rfc2486;
local-password "$9$Vbw4aGDi.fTUDtuBIcS"; ## SECRET-DATA
passive;
}
}
pppoe-options {
underlying-interface ge-0/0/0.0;
idle-timeout 0;
access-concentrator ISP-Local;
service-name ISP-VNTT;
auto-reconnect 5;
client;
}
family inet {
mtu 1492;
negotiate-address;
}
}
}
}

 

Please help me to solve this, thanks very much.


Viewing all articles
Browse latest Browse all 3959

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>