This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

LAUNCHXL-CC3235SF: WPA2-ENTERPRISE Feature Not Working

Part Number: LAUNCHXL-CC3235SF


Tool/software:

şŠBÀ€…BBFC`CBÀbFC`CBBFS`C„FCFC{FF}e„bFC(3CFóBAËgÂJaÆã„̬CZ`bFkå„BBŽ'€È†–‡ZBŒ„J„p‚nKCbKŒ0„bAÈäÁ¡–„T[{FF}á¡ö„DBòö„T´üaö„T´ıÅaöROEÂŁöBOEÂŁöROEÂŁöROEÂ¥!öDÂ¥öTÂ¥!öD!Dä{FF}!Tä{FF}¡ö¡–¡T¡T¡O¡OT¼ıR”ÁÔcRC|BŒ0„ZãüÈúR”ÁÔc„C¬BŒ0„ZãüH¡aöBT¡öBDÂ¥aöBDÂşÁöRDÂÁöRTRT¡öRDÂR”ÁÔcCışú@{FF}@{FF}Ÿ@{FF}BVä NVT: FF FA 9F FF 00 CE 00 20 18 40 23 A7 E2 08 10 E2 4A 6A E4 42 !T¬–ScÉw!T¬–SCC{FF}ÁTaT¬–ScC NVT: FF FC 21 ¦fcôrBc¥ccs ËÂ`_ä˧sˆÅã׌zBîcã`Hb”ÁÄB„BĎKRŽêä@€.pKàj@àòeş’J†ˆt!ş§¨…Ãb„CFCpCBcFSp{FF}úCF!B„BzB†ƒ b p,Çs rcrÆBãBşşŠB@€eBBFC`CBÀbFC`CBBFS`C„FCFC{FF}…D„bFC(3CFóBAËgÂJaÆãUHÆBcFS´cB„BBŽÍbȆ–‡ZBŒ„J„´%„aÆÕjé?Œ0„Zã$ÈäÁaö„T[{FF}Áaö„D[{FF}¡¡öDÂ¥!öDÂ¥!öDÂ¥öTÂ¥!öDÂ¥¡öD!Tä{FF}!Tä{FF}¡–ÂáaöDၡD¡aD¡D¡aT[{FF}¡D[{FF}!¡TÂR”ÁÔcRC|BŒ0„ZãüÈ¥öBDÂúR”ÁÔc„CŒBŒ0„ZãüH¡aöBT¡öBTÂşÁöRTÂÁöRTaöTÂR”ÁÔcCışúúş}b{FF}¯@{FF}†JVä NVT: FF FA 9F FF 00 CE 00 86 8C 73 9E 8D 6F 72 E2 4A 6A E4 42 81 !D¬–ScÉw!D¬–SCC NVT: FF FC 21 ¦fcôrBc÷bËÂ`_ä˧sˆ±@׌zBîcãŽbâ!RB'Ьä@€.pKà@àòeş’M¶ˆt!ş§¨…#Ãb„CFCp €cFSp{FF}úCF!B(RBAˆÇ b,Ç{bSzCSBbWòşşŠB@€eBBFC`CB@bFC`CBBFS`C„FCFC{FF}e„bFC(SCFóBAËgÂJaÆãUHÆBcFS´cbkbˆ¶rBŽòBBŒ„#0KCbKŒ0„bAÈäÁaö„T[{FF}áö„OaÂŁvBTÂ¥!öTÂ¥!öTÂ¥öTÂ¥öDÂ¥!öTÂ¥!öO%!Tä{FF}!Tä{FF}¡–¡–a¶ÂaTÂaTD¡T¡aD[{FF}R”ÁÔcRC|BŒ0„ZãüÈ¥áöBDÂúR”ÁÔc„C¬BŒ0„ZãüH¡öBD¡öBDÂşÁöRTÂÁöRTaöBDÂR”ÁÔcC NVT: FF FE FA úş}b{FF}¯@{FF}JVä NVT: FF FA 9F FF 00 CE 00 20 18 40 23 A7 E2 08 10 E2 4A 6A E4 42 áT¬–ScÉw!T¬–SCC NVT: FF FC 21 ¦fcôrBc÷bËÂ`_ä˧sˆ±@׌zB¤cã¢bâ!RBЬä@€.pK°à@àòşŽJ6ˆt!ş§¨…#b„CFCpCBcFSp{FF}úbF!B@ZB b bCÇ{bSzCSBbWòş{FF}şŠBÀ€…DBBFC`CBÀbFC`CBBFS`C„FCFC{FF}…”s bFC(cÂbϝBAËgÂJaÆãAHÆ@BÃb„bFkå„BBŽKVȆ–‡ZBŒ„J„p‚cnKCbKŒ0„bAÈäÁö„T[{FF}aö„OÂ¥!öDÂ¥öDTä{FF}!–T¡öT¾ı¡T¡T¡T¡¡DÂR”ÁÔcRC|!Œ0„ZãşÈ¥aöBTÂúR”ÁÔc„C¬BŒ0„ZãüH¡aöBT¡¡öBT¡aöBDÂşÁöRTÂÁöRDÂÁ!öBD¡öRD¡öRTÂR”ÁÔcCışúúş}b{FF}¯@{FF}†NVä NVT: FF FA 9F FF 00 CE 00 86 8C 73 9E 8D 6F 72 E2 4A 6A E4 42 FC !¦0Âàb ÇjâşäBÁaö„OAÂááö„T!Oõ õbã¦wş!T¬–SCÇwş¥öBTÂşcFÍBDBRcC‡ƒvÔB,KÈâæBãBú¥¡öBTÂú<!÷bËÂ`_ä!0…Mb@ŒHŒzB0cãA¤ãHb”ÁÄB„Bύòà§úä@€pK°à@àò%~Ž 6ˆt!ş§¨…Ãb„CFC`CBcFS`{FF}úşşŠBÀ€eBBFCpCBÀbFCpCBBFSpC„FCFC{FF}e„bFC8SCFóBVVãKC(ÆB̬CZ`bFkå„BBŽKVȆ–‡ZBŒúB‡ò#0KCbK?Œ0„bAÈäÁv„T[{FF}Á¡FT[{FF}¥!öDÂ¥öDÂ¥öDÂ¥!öTTä{FF}Dä{FF}!–!–¡D[{FF}!T¡T!T!T¡¡T[{FF}R”ÁÔcRC|BŒ0„ZãüÈ¥aöBDÂúR”ÁÔc„CŒBŒ0„ZãüH¡BT¡!öBTÂşöRDÂÁaöBDÂÁöBOA!öRO!öRDÂR”ÁÔcCış@{FF}¯@{FF}†Jä NVT: FF FA 9F FF 00 CE 00 20 18 40 23 A7 E2 08 10 E2 4A 6A E4 42 T¬–ScÉw!T¬–SCC NVT: FF FC 21 ¦fcôrBc÷bËÂ`_ä˧sˆ±p׌zBîcãŽbâ!RB'Ьäà@€.pK°à@àòşŽ 6ˆt!ş§¨…Ãb„CFCpCBcFSp{FF}úCF!BÄBKBƃ!b`„B¦œskrcbÃÆBãB{FF}şşŠBÀ€eBBFC`CBÀbFC`CBBFS`C„FCFC{FF}…D„bFC(SCFóBAËgÂJaÆãUHc@BÃb„bFkå„BBŽK–Ȇ–‡ZBŒ„J„p‚nKCbKŒ0„bAÈäÁö„T[{FF}¥¡vDÂ¥¡vDÂ¥¡vDÂ¥vDᥡvTOOÂÁ!DO!ÖT"D!ց¡öT´ıT¡aD¡D¡aT¡T[{FF}R”ÁÔcRC|BŒ0„ZãüÈ¥aöBDÂúR”ÁÔc„C¬BŒ0„ZãüH¡¡öBT¡¡öBTÂşÁöRDÂÁaöRDÂÁöBT!öRO!öROÂR”ÁÔcCışúúşı@{FF}¯@{FF}JVä NVT: FF FA 9F FF 00 CE 00 20 18 40 23 A7 E2 08 10 E2 4A 6A E4 42 T¬–ScGwT¬–SCC NVT: FF FC 21 ¦fcôrBc÷bËÂ`_ä˧sˆ±@׌zBîcãŽbâ!RBЬä@€.pK°à@àòşŽJ6ˆt!ş§¨…#b„CFCpCBcFSp{FF}úbFÍB@Zc†Åêv„RÅKˆâ¦BãBşşŠB@€…DBBFC`CBÀbFC`CBBFS`C„FCFC{FF}eD„bFC(ÓCFóBAËgÂJaÆã„̬CZ`bFkå„BBŽK–Ȇ–‡ZBŒ„J„p‚nKCbKŒ0„bAÈäÁaö„OAÂ¥¡öTÂ¥vTÂ¥¡vO%Tä{FF}Dä{FF}!ցöÂ!O!T!DÂO!!TÂR”ÁÔcRC|BŒ0„ZãüÈ¥öBDÂúR”ÁÔc„C¬BŒ0„ZãüH¡öÄ¡!öBDæıÁaöRDÂÁaöRTBöBT!öRO!öBTÂR”ÁÔcCışúúş}b{FF}¯@{FF}¶JVä NVT: FF FA 9F FF 00 CE 00 20 18 40 23 A7 E2 08 10 E2 4A 6A E4 42 aT¬–ScÉwT¬–SCC NVT: FF FC 21 ¦fcôrBc÷bËÂ`_äË…Wb@ŒzB0cãŽbâ!RBЬä@€.pKà@àòşŽ 6ˆt!ş§¨…#b„CFCpCBcFSp{FF}úCFÍBDBRRjcBb …ƒv„RÅKÈâÆBãBşşŠBÀ€…DBBFC`CB@bFC`CBBFS`C„FCFC{FF}ÁbFCpCBÀCFóBAËgÂJaÆã„̬CZ`bFkB„BBŽ"Èå`Â"„ÂŒ„JµcnKCbK?`„Zã$ÈäÁ!„T[{FF}Á¡F€D[{FF}Á¡6„D[{FF}¥¡vDÂ¥vTÂ¥vDTä{FF}Tä{FF}ÖÖ!T¡¡D[{FF}!T¡aD!DTÂR”ÁÔcRC|BŒ0„ZãüÈ¥aöBDÂúR”ÁÔc„CcŒBŒ0„ZãüH¡¡öBD¡!öBTÂ¥öBTÂ¥öBDÂ¥BTÂ¥öBDÂşÁöRDÂÁöROA¡öBO!öROÂR”ÁÔcCışú

I am trying to establish a connection with my freeradius server using SL_WLAN_ENT_EAP_METHOD_PEAP0_MSCHAPv2 with a WPA2 Enterprise but I get this log 

(4) Received Access-Request Id 243 from 192.168.7.1:35629 to 192.168.7.104:1812 length 134
(4) User-Name = "userlim"
(4) NAS-IP-Address = 192.168.7.1
(4) NAS-Identifier = "RalinkAP0"
(4) NAS-Port = 0
(4) Called-Station-Id = "D8-44-89-52-CC-11"
(4) Calling-Station-Id = "90-E2-02-28-6C-BD"
(4) Framed-MTU = 1400
(4) NAS-Port-Type = Wireless-802.11
(4) EAP-Message = 0x0201000c01757365726c696d
(4) Message-Authenticator = 0x735ffeed436d7ccbc55294d05855fe1d
(4) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default
(4) authorize {
(4) policy filter_username {
(4) if (&User-Name) {
(4) if (&User-Name) -> TRUE
(4) if (&User-Name) {
(4) if (&User-Name =~ / /) {
(4) if (&User-Name =~ / /) -> FALSE
(4) if (&User-Name =~ /@[^@]*@/ ) {
(4) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
(4) if (&User-Name =~ /\.\./ ) {
(4) if (&User-Name =~ /\.\./ ) -> FALSE
(4) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
(4) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
(4) if (&User-Name =~ /\.$/) {
(4) if (&User-Name =~ /\.$/) -> FALSE
(4) if (&User-Name =~ /@\./) {
(4) if (&User-Name =~ /@\./) -> FALSE
(4) } # if (&User-Name) = notfound
(4) } # policy filter_username = notfound
(4) [preprocess] = ok
(4) [chap] = noop
(4) [mschap] = noop
(4) [digest] = noop
(4) suffix: Checking for suffix after "@"
(4) suffix: No '@' in User-Name = "userlim", looking up realm NULL
(4) suffix: No such realm "NULL"
(4) [suffix] = noop
(4) eap: Peer sent EAP Response (code 2) ID 1 length 12
(4) eap: EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize
(4) [eap] = ok
(4) } # authorize = ok
(4) Found Auth-Type = eap
(4) # Executing group from file /etc/freeradius/3.0/sites-enabled/default
(4) authenticate {
(4) eap: Peer sent packet with method EAP Identity (1)
(4) eap: Calling submodule eap_peap to process data
(4) eap_peap: (TLS) PEAP -Initiating new session
(4) eap: Sending EAP Request (code 1) ID 2 length 6
(4) eap: EAP session adding &reply:State = 0xbbc0f936bbc2e00e
(4) [eap] = handled
(4) } # authenticate = handled
(4) Using Post-Auth-Type Challenge
(4) # Executing group from file /etc/freeradius/3.0/sites-enabled/default
(4) Challenge { ... } # empty sub-section is ignored
(4) session-state: Saving cached attributes
(4) Framed-MTU = 994
(4) Sent Access-Challenge Id 243 from 192.168.7.104:1812 to 192.168.7.1:35629 length 64
(4) EAP-Message = 0x010200061920
(4) Message-Authenticator = 0x00000000000000000000000000000000
(4) State = 0xbbc0f936bbc2e00efcfdfb92fa493726
(4) Finished request
Waking up in 4.9 seconds.
(5) Received Access-Request Id 233 from 192.168.7.1:35629 to 192.168.7.104:1812 length 134
(5) User-Name = "userlim"
(5) NAS-IP-Address = 192.168.7.1
(5) NAS-Identifier = "RalinkAP0"
(5) NAS-Port = 0
(5) Called-Station-Id = "D8-44-89-52-CC-11"
(5) Calling-Station-Id = "90-E2-02-28-6C-BD"
(5) Framed-MTU = 1400
(5) NAS-Port-Type = Wireless-802.11
(5) EAP-Message = 0x0201000c01757365726c696d
(5) Message-Authenticator = 0xd3af64c520a1460595772263f342a399
(5) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default
(5) authorize {
(5) policy filter_username {
(5) if (&User-Name) {
(5) if (&User-Name) -> TRUE
(5) if (&User-Name) {
(5) if (&User-Name =~ / /) {
(5) if (&User-Name =~ / /) -> FALSE
(5) if (&User-Name =~ /@[^@]*@/ ) {
(5) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
(5) if (&User-Name =~ /\.\./ ) {
(5) if (&User-Name =~ /\.\./ ) -> FALSE
(5) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
(5) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
(5) if (&User-Name =~ /\.$/) {
(5) if (&User-Name =~ /\.$/) -> FALSE
(5) if (&User-Name =~ /@\./) {
(5) if (&User-Name =~ /@\./) -> FALSE
(5) } # if (&User-Name) = notfound
(5) } # policy filter_username = notfound
(5) [preprocess] = ok
(5) [chap] = noop
(5) [mschap] = noop
(5) [digest] = noop
(5) suffix: Checking for suffix after "@"
(5) suffix: No '@' in User-Name = "userlim", looking up realm NULL
(5) suffix: No such realm "NULL"
(5) [suffix] = noop
(5) eap: Peer sent EAP Response (code 2) ID 1 length 12
(5) eap: EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize
(5) [eap] = ok
(5) } # authorize = ok
(5) Found Auth-Type = eap
(5) # Executing group from file /etc/freeradius/3.0/sites-enabled/default
(5) authenticate {
(5) eap: Peer sent packet with method EAP Identity (1)
(5) eap: Calling submodule eap_peap to process data
(5) eap_peap: (TLS) PEAP -Initiating new session
(5) eap: Sending EAP Request (code 1) ID 2 length 6
(5) eap: EAP session adding &reply:State = 0x5dafcec95dadd7da
(5) [eap] = handled
(5) } # authenticate = handled
(5) Using Post-Auth-Type Challenge
(5) # Executing group from file /etc/freeradius/3.0/sites-enabled/default
(5) Challenge { ... } # empty sub-section is ignored
(5) session-state: Saving cached attributes
(5) Framed-MTU = 994
(5) Sent Access-Challenge Id 233 from 192.168.7.104:1812 to 192.168.7.1:35629 length 64
(5) EAP-Message = 0x010200061920
(5) Message-Authenticator = 0x00000000000000000000000000000000
(5) State = 0x5dafcec95dadd7dacbb9cc55cd3e88a5
(5) Finished request
Waking up in 4.9 seconds.
(4) Cleaning up request packet ID 243 with timestamp +20 due to cleanup_delay was reached
(5) Cleaning up request packet ID 233 with timestamp +20 due to cleanup_delay was reached
Ready to process requests
(6) Received Access-Request Id 252 from 192.168.7.1:35629 to 192.168.7.104:1812 length 134
(6) User-Name = "userlim"
(6) NAS-IP-Address = 192.168.7.1
(6) NAS-Identifier = "RalinkAP0"
(6) NAS-Port = 0
(6) Called-Station-Id = "D8-44-89-52-CC-11"
(6) Calling-Station-Id = "90-E2-02-28-6C-BD"
(6) Framed-MTU = 1400
(6) NAS-Port-Type = Wireless-802.11
(6) EAP-Message = 0x0201000c01757365726c696d
(6) Message-Authenticator = 0xdc7afd539f504470ad17d487aed60819
(6) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default
(6) authorize {
(6) policy filter_username {
(6) if (&User-Name) {
(6) if (&User-Name) -> TRUE
(6) if (&User-Name) {
(6) if (&User-Name =~ / /) {
(6) if (&User-Name =~ / /) -> FALSE
(6) if (&User-Name =~ /@[^@]*@/ ) {
(6) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
(6) if (&User-Name =~ /\.\./ ) {
(6) if (&User-Name =~ /\.\./ ) -> FALSE
(6) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
(6) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
(6) if (&User-Name =~ /\.$/) {
(6) if (&User-Name =~ /\.$/) -> FALSE
(6) if (&User-Name =~ /@\./) {
(6) if (&User-Name =~ /@\./) -> FALSE
(6) } # if (&User-Name) = notfound
(6) } # policy filter_username = notfound
(6) [preprocess] = ok
(6) [chap] = noop
(6) [mschap] = noop
(6) [digest] = noop
(6) suffix: Checking for suffix after "@"
(6) suffix: No '@' in User-Name = "userlim", looking up realm NULL
(6) suffix: No such realm "NULL"
(6) [suffix] = noop
(6) eap: Peer sent EAP Response (code 2) ID 1 length 12
(6) eap: EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize
(6) [eap] = ok
(6) } # authorize = ok
(6) Found Auth-Type = eap
(6) # Executing group from file /etc/freeradius/3.0/sites-enabled/default
(6) authenticate {
(6) eap: Peer sent packet with method EAP Identity (1)
(6) eap: Calling submodule eap_peap to process data
(6) eap_peap: (TLS) PEAP -Initiating new session
(6) eap: Sending EAP Request (code 1) ID 2 length 6
(6) eap: EAP session adding &reply:State = 0xaefd2c12aeff351f
(6) [eap] = handled
(6) } # authenticate = handled
(6) Using Post-Auth-Type Challenge
(6) # Executing group from file /etc/freeradius/3.0/sites-enabled/default
(6) Challenge { ... } # empty sub-section is ignored
(6) session-state: Saving cached attributes
(6) Framed-MTU = 994
(6) Sent Access-Challenge Id 252 from 192.168.7.104:1812 to 192.168.7.1:35629 length 64
(6) EAP-Message = 0x010200061920
(6) Message-Authenticator = 0x00000000000000000000000000000000
(6) State = 0xaefd2c12aeff351f29722eb92fec0bd2
(6) Finished request
Waking up in 4.9 seconds.
(6) Cleaning up request packet ID 252 with timestamp +196 due to cleanup_delay was reached
Ready to process requests  

This is the output of my freeradius server in debug mode. I try with wifi -HTTP code but it does not get ip address.