Hello Michael,

I setup a new RADIUS filter with the following settings:

Condition:
                Node_info.mac starts with xx:xx:xx (vendor part of MAC)
Merge Answer: yes
Answer:
                Reply Egreess-VLANID 1
                Reply Egreess-VLANID 4
Reply Egreess-VLANID 200
                Replay HP-Port-MA-Port-Mode 1

The final RADIUS Reply:
REST-HTTP-Status-Code = 200
Reply-Message = "Request processed by PacketFence"
Tunnel-Medium-Type = IEEE-802
Tunnel-Type = VLAN
Egress-VLANID = 1
Egress-VLANID = 4
Egress-VLANID = 200
HP-Port-MA-Port-Mode = 1
Tunnel-Private-Group-Id = "254"

All VLAN IDs are present on the switch.
But the switch says:

Log:
02400 dca: macAuth client, RADIUS-assigned VID validation
            error. MAC C8665D6E5AC0 port 5 VLAN-Id 0 or unknown.

Port-Access:
Port Access MAC-Based Status
         Auths/  Unauth  Untagged Tagged          % In  RADIUS Cntrl
  Port   Guests  Clients VLAN     VLANs  Port COS Limit ACL    Dir   Port Mode



Johannes Mudrich
Mitarbeiter
IT

Altmark-Klinikum gGmbH
Ernst-von-Bergmann-Straße 22
39638 Gardelegen

Tel.:    03907 791229
Fax.:    03907 791248
Mail:    j.mudr...@altmark-klinikum.de

------ ------- ------- -------- ------ -------- ----- ------ ----- ----------
  5      0/0     1       None     No     No       No    No     both  1000FDx

It’s a HPE/Aruba 2510-48G (J9772A)

What did I miss?
And how do I check for registered devices only in the filter conditions? 
Couldn’t find a suitable option even in the developers guide. Is there a 
documentation somewhere describing all the options?
I also tried “radius_request.calling-station-id” at first. But this didn’t work 
at all. So I switched to “node_info.mac”.

When I remove the Egress-VLANs from the filter, it seems to works. Just without 
the tagged VLANs.

Thanks
Johannes


Von: michael.weber [mailto:michael.we...@my-chi.de]
Gesendet: Donnerstag, 23. März 2023 13:57
An: Mudrich, J. <j.mudr...@altmark-klinikum.de>
Cc: packetfence-users@lists.sourceforge.net
Betreff: Re: AW: [PacketFence-users] secure AP Uplink Ports

Let me know if you some more input. I can provide screenshots and other stuff, 
that's not a problem :)

Am 23.03.2023 08:48 schrieb "Mudrich, J." 
<j.mudr...@altmark-klinikum.de<mailto:j.mudr...@altmark-klinikum.de>>:
Hello Michael,

THANK YOU! That sounds promising. Now I just have to understand. :D
I’ll get back to you if I have further questions.

Kind regards
Johannes







Johannes Mudrich
Mitarbeiter
IT

Altmark-Klinikum gGmbH
Ernst-von-Bergmann-Straße 22
39638 Gardelegen
Tel.:

 03907 791229

Fax.:

 03907 791248

Mail:

 j.mudr...@altmark-klinikum.de<mailto:j.mudr...@altmark-klinikum.de>

Von: Michael Weber [mailto:michael.we...@my-chi.de]
Gesendet: Donnerstag, 23. März 2023 07:53
An: 
packetfence-users@lists.sourceforge.net<mailto:packetfence-users@lists.sourceforge.net>
Cc: Mudrich, J. 
<j.mudr...@altmark-klinikum.de<mailto:j.mudr...@altmark-klinikum.de>>
Betreff: AW: [PacketFence-users] secure AP Uplink Ports

Hello Johannes Mudrich

Perhaps this idea is what you are looking for 😊

to secure our APs we do the following:

  1.  MAC authentication for our APs
  2.  Create Radius Filter Engine that matches your AP/requirements and Modify 
the Reply:

Answers:

Reply:Egress-VLAN-Name - 1VLXXX-VLAN1

Reply:Egress-VLAN-Name - 1VLXXX-VLAN2

Reply:HP-Port-MA-Port-Mode - 1



Scopes

returnRadiusAccessAccept

This is working with our HP Switches and should work with every AP (if your 
Radius Filter is set correct 😉 )
Idea: detect the AP in the Port, authenticate it based on your rules and modify 
the the radius answer to set the allowed tagged VLANs and set the Port from 
user based authentication to port based (HP-Port-MA-Port-Mode / 
HPE-Port-MA-Port-Mode). That way the AP will “unlock” the switchport as long as 
a link is active.
“Generally, the “Port Based” method supports one 802.1X-authenticated client on 
a port, which opens the port to an unlimited number of clients.”

If someone unpluggs the AP the Port switches back to user based, and no 
“unsecure” devices are allowed. Plug in the AP, the normal Authentication is 
done and based on the RADIUS Filter configured before the RADIUS response will 
contain the “command” to switch back to port based authentication.

WiFi Clients are automatically allowed on the switchport. You must configure 
802.1x/MAC auth on the WiFi Controller/AP to authentication the WiFi clients.

I am only using HPe but other vendors should be able to switch the 802.1x 
Authentication to Port-based, too.


Best  Regards
Michael Weber

Von: Mudrich, J. via PacketFence-users 
<packetfence-users@lists.sourceforge.net<mailto:packetfence-users@lists.sourceforge.net>>
Gesendet: Mittwoch, 22. März 2023 07:26
An: 
packetfence-users@lists.sourceforge.net<mailto:packetfence-users@lists.sourceforge.net>
Cc: Mudrich, J. 
<j.mudr...@altmark-klinikum.de<mailto:j.mudr...@altmark-klinikum.de>>
Betreff: Re: [PacketFence-users] secure AP Uplink Ports

Hello Mirko,

the Problem with MAC based authentication is, that the port will be blocked as 
soon as a new MAC is registered on the port. So this doesn’t work for access 
point uplink ports. Especially when providing a guest SSID.
On our switches port-security only works with SNMP-traps which I didn’t want to 
setup since we already configured everything for RADIUS. Also it didn’t work 
with PF for some reason.

kind regards
Johannes

Von: sgiops sgiops via PacketFence-users 
[mailto:packetfence-users@lists.sourceforge.net]
Gesendet: Dienstag, 21. März 2023 15:29
An: 
packetfence-users@lists.sourceforge.net<mailto:packetfence-users@lists.sourceforge.net>
Cc: sgiops sgiops <thesgi...@gmail.com<mailto:thesgi...@gmail.com>>
Betreff: Re: [PacketFence-users] secure AP Uplink Ports

Hello Johannes,

Maybe you are describing the "port-security" functionality (this is usually a 
feature provided by the switch OS). Or you can use mac address based 
authentication by manually registering the node (AP).

Regards

Mirko

Il giorno mar 21 mar 2023 alle ore 15:19 Mudrich, J. via PacketFence-users 
<packetfence-users@lists.sourceforge.net<mailto:packetfence-users@lists.sourceforge.net>>
 ha scritto:
Hello everyone,

I have another question regarding port security: Is there any way I can secure 
a port on an edge switch where an access point is connected?
I’m thinking of a scenario where someone takes a ladder, pulls the cable from 
an access point and connects his own device.
Maybe some mechanism like: If port comes up without APs MAC, close the port.

Thanks
Johannes


Johannes Mudrich
Mitarbeiter
IT

Altmark-Klinikum gGmbH
Ernst-von-Bergmann-Straße 22
39638 Gardelegen
Tel.:

 03907 791229

Fax.:

 03907 791248

Mail:

 j.mudr...@altmark-klinikum.de<mailto:j.mudr...@altmark-klinikum.de>


[cid:image001.png@01D95D61.164AC4F0]<https://www.salusaltmarkholding.de/>

Salus Altmark Holding gGmbH
Tel.: +49 39325700
Sitz der Gesellschaft:
Seepark 5 | 39116 Magdeburg
www.salusaltmarkholding.de<https://www.salusaltmarkholding.de>

[cid:image002.png@01D95D61.164AC4F0]<https://ddei5-0-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fwww.instagram.com%2fsalusaltmarkholding%2f&umid=68CF739B-F790-CF05-B367-97AFFC11F843&auth=3e2d8a84646f95c9f39ab0aaf495a2c8b99c6f77-ad373ec5dbccc94ec82f17e0ec30cf2a06af4445>
 [cid:image003.png@01D95D61.164AC4F0] 
<https://ddei5-0-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fwww.facebook.com%2fSalusAltmarkHolding&umid=68CF739B-F790-CF05-B367-97AFFC11F843&auth=3e2d8a84646f95c9f39ab0aaf495a2c8b99c6f77-f35887faea570e08d5c4784d2c3d0a7f01fc396c>
  [cid:image004.png@01D95D61.164AC4F0] 
<https://ddei5-0-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fde.linkedin.com%2fcompany%2fsalus%2dggmbh&umid=68CF739B-F790-CF05-B367-97AFFC11F843&auth=3e2d8a84646f95c9f39ab0aaf495a2c8b99c6f77-438da3e55fc4fc2089ba5ceb19c1b3740e0e627c>
  [cid:image005.png@01D95D61.164AC4F0] 
<https://ddei5-0-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fwww.xing.com%2fpages%2fsalusaltmarkholdingggmbh&umid=68CF739B-F790-CF05-B367-97AFFC11F843&auth=3e2d8a84646f95c9f39ab0aaf495a2c8b99c6f77-19f49f8e02c4aaa3b1c763f0a5fc5a377da1394f>
  [cid:image006.png@01D95D61.164AC4F0] 
<https://ddei5-0-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fwww.youtube.com%2fuser%2fSALUSgGmbH&umid=68CF739B-F790-CF05-B367-97AFFC11F843&auth=3e2d8a84646f95c9f39ab0aaf495a2c8b99c6f77-52911fcf4a921f402e1f47166a7761d29c0fc4eb>


Registergericht: AG Stendal: HRB 112594
Geschäftsführer: Jürgen Richter
Aufsichtsratsvorsitz: Wolfgang Beck
Gemäß Art. 13 DSGVO informieren wir darüber, dass Ihre Daten elektronisch 
gespeichert werden. Nähere Informationen: 
www.salusaltmarkholding.de/datenschutz<https://www.salusaltmarkholding.de/datenschutz>


Ab Januar 2022 nehmen wir keine Mails mit doc-, xls- und ppt-Anhängen mehr an.
Bitte verwenden Sie die aktuellen Office-Formate docx, xlsx, pptx oder pdf.



Johannes Mudrich
Mitarbeiter
IT

Altmark-Klinikum gGmbH
Ernst-von-Bergmann-Straße 22
39638 Gardelegen
Tel.:

 03907 791229

Fax.:

 03907 791248

Mail:

 j.mudr...@altmark-klinikum.de<mailto:j.mudr...@altmark-klinikum.de>

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net<mailto:PacketFence-users@lists.sourceforge.net>
https://ddei5-0-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2flists.sourceforge.net%2flists%2flistinfo%2fpacketfence%2dusers&umid=68CF739B-F790-CF05-B367-97AFFC11F843&auth=3e2d8a84646f95c9f39ab0aaf495a2c8b99c6f77-0852dc3a501a63499af9bd1956b065734995a301






_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to