I'm running XR version 4.2.1 on an ASR9010 with RSP440. (went through all mandatory SMUs when upgraded from 4.2.0,etc). I'm trying to run radius AAA authen/autho on it and radius packets originating from interface loopback X is a must.
For some reason, all radius packets are being originated from the Ip address of the uplink interface (G0/5/0/0).
LC/0/5/CPU0:Jul 16 12:30:59.632 : radiusd: rctx found is 0x504a2b18
LC/0/5/CPU0:Jul 16 12:30:59.632 : radiusd: Reached retry count for the server 3,Trying to move to next server
LC/0/5/CPU0:Jul 16 12:30:59.632 : radiusd: Server X.X.X.X/1812/1813 is UP & Quarantined: NO
LC/0/5/CPU0:Jul 16 12:30:59.632 : radiusd: rad_nas_reply_to_client: Received response from id : 39,packet type 1
aaa authorization subscriber TESTRADIUS group radius group xxxx
aaa authentication subscriber TESTRADIUS group radius group xxxx
aaa authentication ppp TESTRADIUS group xxxx
aaa authentication login default local
I'm not sure if it's relevant, but I'm running BNG funcionality and the source-interface command for the tftp server seemed to work just fine. Can't find any SMUs that would solve this issue on 4.2.0 or 4.2.1. Saw a post from another guy that saw this same behavior on 3.8.2 but his post was not answered.
Help anyone? Is there a special command other than what I pasted here that I might be missing?
Introduction: The "external-out enable" command is available for
configuration under the "router ospf process" in case of the IOS-XR
operating system. This command basically enables advertisement of
intra-area routes on the device as external routes in th...
IntroductionIn this article we'll discuss how to troubleshoot packet
loss in the asr9000 and specifically understanding the NP drop counters,
what they mean and what you can do to mitigate them. This document will
be an ongoing effort to improve troublesh...