Hi Mark,

just had another look at the repository. Looks like the naming of the modules 
is a bit misleading. The “Aruba Networks” module is only for the wireless 
controllers.
There are some new modules in the repository which are missing at least in my 
installation. Even though I recently upgraded to PF13. There is now 
“ArubaOS_CX_10_x” and “ArubaOS_Switch_16_x”. Tried to manually add them into my 
installation but failed. Would be nice to know how to do that correctly.

Regarding your problem: Really seems to be some network issue.
Please report how your test went.

Regards
Johannes

Von: Mark Okuno [mailto:mark.ok...@ucsb.edu]
Gesendet: Samstag, 16. Dezember 2023 00:13
An: Mudrich, J. <j.mudr...@altmark-klinikum.de>
Cc: packetfence-users@lists.sourceforge.net
Betreff: Re: [PacketFence-users] Compatibility with PacketFence v9.0.0 and 
Aruba 6300M CX-OS

Thank you Johannes,

 I'd like to give a shout-out to a former member of the packetfence-users group 
who also offered their configurations and thoughts, Jeremy Plumley.

The configuration commands from the GitHub site look to be for some other 
platform of Aruba switches.  I don't think they work for CX-OS.

I did try the configurations that you've provided, and I still cannot get 
RADIUS communication to push to PacketFence v9.0.  I enabled tracking on the 
RADIUS server configuration, and you can see that the switch claims it to be 
unreachable.

sw-5543-aruba-6300m(config)# show radius-server detail
******* Global RADIUS Configuration *******

Shared-Secret: None
Timeout: 5
Auth-Type: pap
Retries: 1
Initial TLS Connection Timeout: 30
TLS Timeout: 5
Tracking Time Interval (seconds): 60
Tracking Retries: 1
Tracking User-name: radius-tracking-user
Tracking Password: None
Status-Server Time Interval (seconds): 300
Number of Servers: 1
AAA Server Status Trap: Disabled

****** RADIUS Server Information ******
Server-Name                     : *************
Auth-Port                       : 1812
Accounting-Port                 : 1813
VRF                             : default
TLS Enabled                     : No
Shared-Secret                   : 
AQBapel/kzL87c0/Q30ElPeMbbHcRJed2vrDm1zZ68ViM0+SEgAAAP3GZAevEUCGnQWsACTGTIOOJA==
Timeout                         : 5
Retries                         : 1
Auth-Type                       : chap
Server-Group                    : packetfence
Group-Priority                  : 1
ClearPass-Username              :
ClearPass-Password              : None
Tracking                        : enabled
Tracking-Mode                   : any
Reachability-Status             : unreachable, Since Fri Dec 15 13:21:38 PST 
2023
Tracking-Last-Attempted         : Fri Dec 15 14:53:44 PST 2023
Next-Tracking-Request           : 25 seconds

sw-5543-aruba-6300m(config)#

I've tried both CHAP and PAP protocols.  What's interesting is that in the 
logs, I can see that the switch resolves the route to the IP address of the 
PacketFence server.
2023-12-15T13:18:14.701289-08:00 sw-5543-aruba-6300m radius-srv-trkd[4423]: 
Event|2306|LOG_INFO|CDTR|1|Route is "resolved" for RADIUS Server with 
Address:**.**.**.**, VRF_ID:0


However, the switch fails to reach the RADIUS service on PacketFence over the 
default authport 1812, which almost suggests an issue at layer 4 somewhere in 
the communication pipe.
2023-12-15T13:21:38.603197-08:00 sw-5543-aruba-6300m radius-srv-trkd[4423]: 
Event|2304|LOG_INFO|CDTR|1|RADIUS Server with Address:**.**.**.**, 
Authport:1812, VRF_ID:0 is "unreachable"

What's also curious to me is that, even though I've associated AAA 
authentication for dot1x and mac-auth with the packetfence server-group, when I 
execute a show aaa authentication, I only see the local group associated.  The 
following are the configs I mention.

aaa authentication port-access dot1x authenticator
    radius server-group packetfence
    enable

aaa authentication port-access mac-auth
    radius server-group packetfence
    enable

Here is the output of a show aaa authentication.

sw-5543-aruba-6300m(config)# show aaa authentication
AAA Authentication:
  Fail-through                          : Enabled
  Limit Login Attempts                  : Not set
  Lockout Time                          : 300
  Console Login Attempts                : Not set
  Console Lockout Time                  : 300

Authentication for default channel:



Johannes Mudrich
Mitarbeiter
Verwaltung, IT

Altmark-Klinikum gGmbH
Ernst-von-Bergmann-Straße 22
39638 Gardelegen

Tel.:    03907 791229
Fax.:    03907 791248
Mail:    j.mudr...@altmark-klinikum.de

--------------------------------------------------------------------------------------------------------------------------------------------
GROUP NAME                       | GROUP PRIORITY
--------------------------------------------------------------------------------------------------------------------------------------------
local                            | 0
--------------------------------------------------------------------------------------------------------------------------------------------
sw-5543-aruba-6300m(config)#

I've also tried using Aruba Networks and Aruba Switches in the PacketFence 
switch configuration module as well.

Thank you for the suggestions Jeremy and Johannes!  My next step may be trying 
to build a test environment of the latest version of PacketFence and see if 
that works.


Happy Holidays!

Best,

Mark Okuno
UCSB Library, IT Operations
University of California, Santa Barbara


On Tue, Dec 12, 2023 at 11:32 PM Mudrich, J. 
<j.mudr...@altmark-klinikum.de<mailto:j.mudr...@altmark-klinikum.de>> wrote:
Hi Again,

I just had a look into the Github repository and found something:
packetfence/docs/network/networkdevice/aruba_switchs.asciidoc at devel · 
inverse-inc/packetfence · 
GitHub<https://ddei5-0-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fgithub.com%2finverse%2dinc%2fpacketfence%2fblob%2fdevel%2fdocs%2fnetwork%2fnetworkdevice%2faruba%5fswitchs.asciidoc&umid=1BE6A4E5-0C94-8A06-91CB-D0E8D29775F0&auth=3e2d8a84646f95c9f39ab0aaf495a2c8b99c6f77-5dad526cbb70661e7086d85a97d9d986880738f6>
Maybe this helps. Going to test this myself.

Kind regards
Johannes



Johannes Mudrich
Mitarbeiter
Verwaltung, IT

Altmark-Klinikum gGmbH
Ernst-von-Bergmann-Straße 22
39638 Gardelegen
Tel.:

 03907 791229

Fax.:

 03907 791248

Mail:

 j.mudr...@altmark-klinikum.de<mailto:j.mudr...@altmark-klinikum.de>

Von: Mudrich, J.
Gesendet: Mittwoch, 13. Dezember 2023 08:19
An: 
'packetfence-users@lists.sourceforge.net<mailto:packetfence-users@lists.sourceforge.net>'
 
<packetfence-users@lists.sourceforge.net<mailto:packetfence-users@lists.sourceforge.net>>
Cc: Mark Okuno <mark.ok...@ucsb.edu<mailto:mark.ok...@ucsb.edu>>
Betreff: AW: [PacketFence-users] Compatibility with PacketFence v9.0.0 and 
Aruba 6300M CX-OS

Hi Mark,

I was also testing Aruba CX switches some month ago. I used PF12 and the “Aruba 
Networks” type in my test environment. So I’m not sure if this applies to you.
That’s what I did:


(config)# radius-server host [Radius IP] key [Radius PW]

(config)# radius dyn-authorization enable

(config)# aaa authentication allow-fail-through



## SNMPV1 / not using traps

(config)# snmp-server community [SNMP-Community]

(config-community)# access-level rw



## Mac-Auth

(config)# Interface [Ports/Port-Range]

(config-if) # aaa authentication port-access mac-auth

(config-if-macauth)# enable



(config)# aaa authentication port-access mac-auth enable



## 802.1x

(config)# Interface [Ports/Port-Range]

(config-if)# aaa authentication port-access dot1x authenticator

(config-if)# cached-reauth

(config-if)# cached-reauth-period 60

(config-if)# max-eapol-requests 1

(config-if)# max-retries 1

(config-if)# quiet-period 5

(config-if)# discovery-period 10

(config-if)# enable



(config)# aaa authentication port-access dot1x authenticator enable



At least authentication was working. CoA did not work, SNMP did not work. 
Meaning even manual port resetting in the GUI did not work. I had to physically 
disconnect the Port for reauthentication.

I put this project on hold since I could not find any more documentation.



kind regards

Johannes

Von: Mark Okuno via PacketFence-users 
[mailto:packetfence-users@lists.sourceforge.net]
Gesendet: Montag, 11. Dezember 2023 22:38
An: 
packetfence-users@lists.sourceforge.net<mailto:packetfence-users@lists.sourceforge.net>
Cc: Mark Okuno <mark.ok...@ucsb.edu<mailto:mark.ok...@ucsb.edu>>
Betreff: [PacketFence-users] Compatibility with PacketFence v9.0.0 and Aruba 
6300M CX-OS

Hello packetfence-users,

I am looking to replace a fleet of HP Procurve and Cisco Catalyst switches with 
Aruba CX-OS switches.  I was wondering if anyone can confirm whether they have 
successfully configured RADIUS communication between an Aruba CX-OS switch and 
PacketFence version 9.0.0 (I'm attempting to configure MAC Authentication 
Bypass).  I do see SNMP traffic with the switch in the /usr/local/pf/logs logs, 
but I do not see any RADIUS communication traffic.  I know I'm on a 
significantly older version of PF, and there does not seem to be any Aruba 
CX-OS option to choose from when selecting the switch type when configuring the 
network switch in PF.  I've selected the general option of Aruba Switches.

I also do not see any documentation for an Aruba CX-OS configuration setup in 
PacketFence documentation.  There is an Aruba section, however it looks like 
these configurations are for the older Aruba OS syntax.

Network Devices Configuration Guide 
(packetfence.org)<https://ddei5-0-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fwww.packetfence.org%2fdoc%2fPacketFence%5fNetwork%5fDevices%5fConfiguration%5fGuide.html&umid=1BE6A4E5-0C94-8A06-91CB-D0E8D29775F0&auth=3e2d8a84646f95c9f39ab0aaf495a2c8b99c6f77-bfe448912ef9ccff8f6c57135fe5ec303d2d0258>


In case anyone else is using Aruba CX-OS and can point out where I've gone 
wrong, the following are my general RADIUS and SNMP configurations.

radius-server host <PacketFence IP Address> key ciphertext 
**********************

aaa group server radius packetfence
    server <PacketFence IP Address>

aaa accounting all-mgmt default start-stop group radius packetfence

aaa accounting port-access start-stop group packetfence

radius dyn-authorization enable

aaa authentication port-access dot1x authenticator
    radius server-group packetfence
    enable

aaa authentication port-access mac-auth
    radius server-group packetfence
    enable

snmp-server community ***************************
    access-level rw

snmp-server community ***************

snmp-server host <PacketFence IP Address> inform version v2c

snmp-server host <PacketFence IP Address> trap version v2c

The following is the interface configuration.  The access VLAN specified is a 
blackhole VLAN, and is not tagged across trunk interfaces.

interface 1/1/48
    no shutdown
    no routing
    vlan access 666
    aaa authentication port-access auth-precedence mac-auth dot1x
    aaa authentication port-access dot1x authenticator
        reauth
        reauth-period 14400
        enable
    aaa authentication port-access mac-auth
        reauth
        reauth-period 14400
        enable


Thank you packetfence-users!


Best,

Mark Okuno
UCSB Library, IT Operations
University of California, Santa Barbara




[cid:image001.png@01DA3183.465CE1E0]<https://www.salusaltmarkholding.de/>

Salus Altmark Holding gGmbH
Tel.: +49 39325700
Sitz der Gesellschaft:
Seepark 5 | 39116 Magdeburg
www.salusaltmarkholding.de<https://www.salusaltmarkholding.de>

[cid:image003.png@01DA3183.465CE1E0]<https://ddei5-0-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fwww.instagram.com%2fsalusaltmarkholding%2f&umid=1BE6A4E5-0C94-8A06-91CB-D0E8D29775F0&auth=3e2d8a84646f95c9f39ab0aaf495a2c8b99c6f77-b915fe837bce1b5067684c4328db584022e64ed4>
 [cid:image005.png@01DA3183.465CE1E0] 
<https://ddei5-0-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fwww.facebook.com%2fSalusAltmarkHolding&umid=1BE6A4E5-0C94-8A06-91CB-D0E8D29775F0&auth=3e2d8a84646f95c9f39ab0aaf495a2c8b99c6f77-f843d307e4045345a6d916f8493e25d1e84407ba>
  [cid:image007.png@01DA3183.465CE1E0] 
<https://ddei5-0-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fde.linkedin.com%2fcompany%2fsalus%2dggmbh&umid=1BE6A4E5-0C94-8A06-91CB-D0E8D29775F0&auth=3e2d8a84646f95c9f39ab0aaf495a2c8b99c6f77-1315f54e6a8bcee1edde00afafc5d4e1308e227e>
  [cid:image009.png@01DA3183.465CE1E0] 
<https://ddei5-0-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fwww.xing.com%2fpages%2fsalusaltmarkholdingggmbh&umid=1BE6A4E5-0C94-8A06-91CB-D0E8D29775F0&auth=3e2d8a84646f95c9f39ab0aaf495a2c8b99c6f77-d2fbe245b25c7f157c07b52a344575f971969b1b>
  [cid:image011.png@01DA3183.465CE1E0] 
<https://ddei5-0-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fwww.youtube.com%2fuser%2fSALUSgGmbH&umid=1BE6A4E5-0C94-8A06-91CB-D0E8D29775F0&auth=3e2d8a84646f95c9f39ab0aaf495a2c8b99c6f77-1613ad1f244bb12af5ad08fa667a336e1e42d974>


Registergericht: AG Stendal: HRB 112594
Geschäftsführer: Jürgen Richter
Aufsichtsratsvorsitz: Wolfgang Beck
Gemäß Art. 13 DSGVO informieren wir darüber, dass Ihre Daten elektronisch 
gespeichert werden. Nähere Informationen: 
www.salusaltmarkholding.de/datenschutz<https://www.salusaltmarkholding.de/datenschutz>



Ab Januar 2022 nehmen wir keine Mails mit doc-, xls- und ppt-Anhängen mehr an.
Bitte verwenden Sie die aktuellen Office-Formate docx, xlsx, pptx oder pdf.

[Finanziert von der Europäischen Union]



_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to