Enabling EAPHost Tracing
Trace logs containing debugging information can assist users in finding the root causes of issues that occur during the EAP authentication process. The debugging information can include API calls performed, internal function calls performed, and state transitions performed.
Tracing can be enabled on both the client side and the authenticator side. Tracing can also be enabled for calls to the Routing and Remote Access Service (RRAS) APIs. For more information, see Tracing on the Routing and Remote Access Service.
Note
Trace logs are available in English only.
When EAPHost tracing is enabled, logging information is stored in an .etl file in a user-specified location. If errors occur during EAP authentication, tracing generates an .etl file that can be sent to Microsoft Developer Support for root cause analysis. Partners that have access to Microsoft windows build shares, symbols, and traceformat files can convert the .etl files into a plain text file using the tracerpt tool.
Network policy server (NPS) failures are not captured in the EAPHost logs. If you are trying to troubleshoot a NPS failure, view the IASSAM.LOG and IASNAP.LOG files (see Tools for Troubleshooting NAP - Log files).
Tracing on the Client
To enable tracing on the client side:
- Open an elevated command prompt window.
- Run the following command: logman start trace EapHostPeer -o .\EapHostPeer.etl -p {5F31090B-D990-4e91-B16D-46121D0255AA} 0x4000ffff 0 -ets
- Reproduce the scenario that you want to trace.
- Run the following command: logman stop EapHostPeer -ets
- Convert the etl file into text using the following command: tracerpt EapHostPeer.etl –pdb <pdbpath> -tp <tracemessagefilesdirectorypath> -o EapHostPeer.txt
Note
If you do not have access to the tracerpt tool, avoid the last step and send the .etl file to Microsoft Developer Support.
Tracing on the Authenticator
To enable tracing on the authenticator side:
- Open an elevated command prompt window.
- Run the following command: logman start trace EapHostAuthr -o .\EapHostAuthr.etl -p {F6578502-DF4E-4a67-9661-E3A2F05D1D9B} 0x4000ffff 0 -ets
- Reproduce the scenario that you want to trace.
- Run the following command: logman stop EapHostAuthr -ets
- Convert the etl file into text using the following command: tracerpt EapHostAuthr.etl –pdb <pdbpath> -tp <tracemessagefilesdirectorypath> -o EapHostAuthr.txt
Note
If you do not have access to the tracerpt tool, avoid the last step and instead send the .etl file to Microsoft Developer Support.
Event tracing
In Windows 7 and later versions of Windows, EapHost provides event based tracing on the authenticator and the peer. The advantage of event based tracing is that no symbol files are needed to view the trace messages. To enable event tracing:
- Open EventViewer.
- Critical EapHost messages are logged under: “Custom Views\Administrative Events”
- Non-critical messages are logged under: “Applications and Services\Microsoft\Windows\EapHost
- "Analytic" and "Debug" type event messages can be seen under the same path by selecting Show Analytic and Debug Logs from the view menu in the title bar.
Tracing on the Routing and Remote Access Service
To enable RRAS tracing:
- Open an elevated command prompt window.
- Run the following command: netsh ras set tr * en
- Open %systemroot%\tracing to view RAS traces
To disable RRAS tracing:
- Open an elevated command prompt window.
- Run the following command: netsh ras set tr * dis
For more information, see Netsh Commands.