.................................................................................................................................... ........................................................................................................................
How to Configure for a TLS Demo Out of the Box8950 AAA Certificate Manager
22-26 365-360-001R6.0
Issue 1, December 2008
.................................................................................................................................... ........................................................................................................................
State = "2"
Packet authenticator is valid
Recv: Access-Challenge after 30 ms.
Message-Authenticator = "95224CCC2B120F28B9269A5A43BB17AE"
State = "3"
Session-Timeout = 180
EAP-Message = "Request/EAP-TLS(4): flags=00()
frag.length=513"
Sending a 1515 byte message to the EAP TLS client:
Handshake,v3.1
ServerHello
version 3.1
random =
404431C5EC97CB06362A839E2844835F197242365A832C2F5D4B7060E46C55C
B
session_id = 4617932DD7F525296FCADC70844DD701
cipher_suite = TLS_RSA_WITH_3DES_EDE_CBC_SHA
compression_method = NULL
Certificate
CertificateRequest
ServerHelloDone
Received a 1646 byte message from the EAP TLS client:
Handshake,v3.1
Certificate
ClientKeyExchange
Handshake,v3.1
CertificateVerify
ChangeCipherSpec,v3.1
Handshake,v3.1
Finished
Xmit: Access-Request
User-Name = "steve"
NAS-IP-Address = 127.0.0.1
NAS-Port = 1
Message-Authenticator = "00000000000000000000000000000000"
EAP-Message = "Response/EAP-TLS(4):
flags=C0(LM)msg.length=1646
frag.length=1002"
State = "3"
Packet authenticator is valid
Recv: Access-Challenge after 10 ms.