The IPV6 single-stack portal authentication of a wireless terminal at a site fails

2023-06-29 23:16:43 Published
  • 0 Followed
  • 0Collected ,616Browsed

Problem Description

The IPV6 single-stack portal authentication of a wireless terminal at a site fails


Solution

Turn on the debug information on the AC to check and find that the radius server returns access-reject (CODE=3) and the authentication request is rejected. The reason for the rejection is that the terminal password is incorrect. When the terminal switches from the IPV4 single-stack wireless service to the IPV6 single-stack wireless service, some terminals will retain the IPV4 address and not release it. When the terminal has an arp message with an IPV4 address or a DHCP lease renewal message, the AC will learn the IPV4 address of the terminal, and when the AC learns the dual-stack address of the wireless terminal, it will be in the radius access-request message by default Carries a dual stack address. So far, the problem has been finally determined that the AC mistakenly carried the remaining IPV4 address of the wireless terminal in the radius request packet access-request, which caused the radius server to fail to query and reject the request. By default, the AC is enabled to learn the IP address of the terminal through the arp packets and DHCP packets sent by the terminal. It can be solved by disabling the IPV4 address learning function.

Please rate this case:   
0 Comments

No Comments

Add Comments: