Hi Rexford, sorry I don't understand where you enabled Radius. Its ok to add APs by IP address on the pf side.
I was asking about connection profile to check if its matching a condition for devices connecting to your open ssid. El vie, 19 de jul de 2024, 08:52, Rexford Nyarko via PacketFence-users < packetfence-users@lists.sourceforge.net> escribió: > Hello Enrique, > No, at the moment I am not matching SSID or anything like that. > However, I just enabled radius service on the trunk interface where PF > talks to unifi AP and controller. Now when I try connecting a client to the > open wifi I see the following in the logs. > > Jul 19 11:26:14 controller auth[7653]: Ignoring request to auth address * > port 1812 bound to server packetfence from unknown client 10.2.0.6 port > 35316 proto udp > Jul 19 11:26:17 controller auth[7653]: Ignoring request to auth address * > port 1812 bound to server packetfence from unknown client 10.2.0.6 port > 35316 proto udp > Jul 19 11:26:23 controller auth[7653]: Ignoring request to auth address * > port 1812 bound to server packetfence from unknown client 10.2.0.6 port > 35316 proto udp > > However, this unknown client is 10.2.0.6 is my Unifi AP added by Mac > Address. > Do I need to remove it and add it via the controller using IP? > > > Warm regards, > Rexford A. Nyarko. > > > On Fri, Jul 19, 2024 at 6:12 AM Enrique Gross via PacketFence-users < > packetfence-users@lists.sourceforge.net> wrote: > >> And in your connection profile are you matching like SSID? >> >> El jue, 18 jul 2024 a las 15:57, Rexford Nyarko (<rexfordn...@gmail.com>) >> escribió: >> >>> Hello Enrique, >>> >>> Yes, they are all reachable one to the other, AP, Unifi controller and >>> PF. This is quite weird for me considering the Web auth works fine without >>> problems. >>> The radius server is using PF's IP. apart from setting the radius >>> password on the switch in PF and the Unifi controller is there anything >>> else I need to do for radius config? >>> >>> Warm regards, >>> Rexford A. Nyarko. >>> >>> >>> On Thu, Jul 18, 2024 at 6:03 PM Enrique Gross <egr...@jcc-advance.com.ar> >>> wrote: >>> >>>> Hi Rexford >>>> >>>> Try to troubleshoot connection between APs and Radius server IP (PF >>>> management address). Can you ICMP that ip address? the radius server you >>>> configured on the radius profile on Unifi controller, and applied to SSID. >>>> >>>> El jue, 18 jul 2024 a las 14:48, Rexford Nyarko (<rexfordn...@gmail.com>) >>>> escribió: >>>> >>>>> Hello Enrique, >>>>> >>>>> Thanks again for getting back to me. >>>>> Yes I have mapped the VLAN ID on the switch config for the AP. But >>>>> still, the client devices are unable to get an IP. so they just disconnect >>>>> once you try to connect. >>>>> >>>>> I have also checked the logs, there isn't anything happening when I >>>>> try to connect a client to the open SSID. I can't figure out what I am >>>>> missing. >>>>> >>>>> Warm regards, >>>>> Rexford A. Nyarko. >>>>> >>>>> >>>>> On Thu, Jul 18, 2024 at 4:07 PM Enrique Gross via PacketFence-users < >>>>> packetfence-users@lists.sourceforge.net> wrote: >>>>> >>>>>> Hi Rexford >>>>>> >>>>>> You don't need to put registration VLAN as default/untagged, >>>>>> registration vlan goes with tag. >>>>>> >>>>>> Have you mapped roles and VLAN ID on the switch config, on the PF >>>>>> side? >>>>>> >>>>>> Looking at packetfence.log, will help you to know what is happening >>>>>> with the user/device when connecting to AP. >>>>>> >>>>>> Enrique >>>>>> >>>>>> El jue, 18 jul 2024 a las 11:10, Rexford Nyarko (< >>>>>> rexfordn...@gmail.com>) escribió: >>>>>> >>>>>>> Hello Enrique, >>>>>>> Thank you for your response. >>>>>>> Yes I have AP the AP connected via Trunk. However the same still >>>>>>> happens, clients are not able to connect to the Open network in order to >>>>>>> access the registration portal. >>>>>>> Do I need to make the registration VLAN 20 the default /untagged >>>>>>> VLAN on the trunk ports? In that case, the AP can directly communicate >>>>>>> with >>>>>>> PF on the default network. Thanks in advance. >>>>>>> >>>>>>> Warm regards, >>>>>>> Rexford A. Nyarko. >>>>>>> >>>>>>> >>>>>>> On Wed, Jul 17, 2024 at 8:14 AM Enrique Gross via PacketFence-users < >>>>>>> packetfence-users@lists.sourceforge.net> wrote: >>>>>>> >>>>>>>> Hi Rexford >>>>>>>> >>>>>>>> Hope you are doing well >>>>>>>> >>>>>>>> When configuring SSID on the Unifi side with Radius, it is ok that >>>>>>>> you can not set VLAN 20 as registration. On the PF side, it's in the >>>>>>>> roles >>>>>>>> (Role mapping by VLAN ID) when configuring APs that you will set up >>>>>>>> your >>>>>>>> VLAN for registration, prod or other vlan. So, as long registration >>>>>>>> vlan, >>>>>>>> prod, etc vlans are vlan trunk to AP, that's fine. >>>>>>>> >>>>>>>> So, an unreg user will be evaluated upon connection, as the >>>>>>>> condition is unreg it will be placed on registration vlan that is >>>>>>>> defined >>>>>>>> on your Switch roles. >>>>>>>> >>>>>>>> Sorry for my bad english, hope it helps. >>>>>>>> >>>>>>>> Enrique. >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> El lun, 15 jul 2024 a las 5:22, Rexford Nyarko via >>>>>>>> PacketFence-users (<packetfence-users@lists.sourceforge.net>) >>>>>>>> escribió: >>>>>>>> >>>>>>>>> Hello All, >>>>>>>>> >>>>>>>>> First, my user environment consists mostly of Linux, windows >>>>>>>>> users and occasionally Mac. Network hardware consists of Cisco 2960 >>>>>>>>> switches for LAN and Unifi AP AC Pro for wireless connectivity. I >>>>>>>>> need to >>>>>>>>> have an authentication setup such that users log in with their LDAP >>>>>>>>> credentials and users are assigned VLANS based on their *memberOf* >>>>>>>>> LDAP >>>>>>>>> attribute. >>>>>>>>> >>>>>>>>> Here's what I have done so far, >>>>>>>>> 1. Installed PF 13.2 with two interfaces, 1 separate for >>>>>>>>> management and another trunk with all VLAN interfaces added. >>>>>>>>> 2. Configured LDAP Authentication source >>>>>>>>> 3. Configured a connection Profile using the LDAP auth source. >>>>>>>>> 4. Added Unifi APs individually to PF via MAC Address. (Initially, >>>>>>>>> I tried adding the controller IP method but that didn't work with some >>>>>>>>> weird errors about not being able to instantiate Switch) >>>>>>>>> 5. Configured Unifi Controller and Wifi with guest profile and >>>>>>>>> external Captive portal pointing to PF as instructed in the >>>>>>>>> documentation. >>>>>>>>> 6. Enabled the captive portal and respective services on the >>>>>>>>> trunk interface. >>>>>>>>> All to this point everything works great. As soon as a user >>>>>>>>> connects to the open SSID they get redirected to the captive portal >>>>>>>>> on PF >>>>>>>>> and authenticate successfully with LDAP. This works great no problem. >>>>>>>>> I >>>>>>>>> intend to keep that and later change the auth source for guest Portal. >>>>>>>>> >>>>>>>>> Now I am trying to do vlan assignment. I followed the PF >>>>>>>>> documentation for Ubiquity to set up the controller with the Raduis >>>>>>>>> profile >>>>>>>>> SSID and all. However, things are not working as expected. I am a bit >>>>>>>>> confused here. >>>>>>>>> 1. I have created interfaces, registration VLAN - 20 and >>>>>>>>> Isolation VLAN - 30 on the trunk interface. >>>>>>>>> 2. I also have added 3 other production VLANs where I manage DNS >>>>>>>>> and DHCP >>>>>>>>> 3. the open SSID on unifi controller cannot be set to the >>>>>>>>> Registration VLAN 20 when Radius is enabled. So there is no way to >>>>>>>>> communicate with PF via the Registration VLAN hence users cannot get >>>>>>>>> IPs >>>>>>>>> from PF on the open SSID and therefore cannot log in. >>>>>>>>> I need advice on how to get this working. Do I have to make the >>>>>>>>> registration VLAN the native or default vlan on the trunk and >>>>>>>>> configure the >>>>>>>>> guest captive portal on a different vlan which i can assign in the >>>>>>>>> unifi >>>>>>>>> controller? >>>>>>>>> >>>>>>>>> Also, I have a problem where DNS queries on each vlan/subnet >>>>>>>>> points to the PF interface outside that subnet. eg pf.example.com >>>>>>>>> - 192.168.0.1/24 on registration vlan, and PF on captive portal >>>>>>>>> vlan 40 the IP is 192.168.1.1/24 but DNS query from captive >>>>>>>>> portal interface gives registration vlan IP of PF. >>>>>>>>> I would prefer that queries from each vlan would provide the >>>>>>>>> respective PF interface on that vlan, >>>>>>>>> Any help is appreciated. >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> Warm regards, >>>>>>>>> Rexford. >>>>>>>>> _______________________________________________ >>>>>>>>> PacketFence-users mailing list >>>>>>>>> PacketFence-users@lists.sourceforge.net >>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> -- >>>>>>>> >>>>>>>> [image: Imágenes integradas 1] >>>>>>>> _______________________________________________ >>>>>>>> PacketFence-users mailing list >>>>>>>> PacketFence-users@lists.sourceforge.net >>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>>> >>>>>>> >>>>>> >>>>>> -- >>>>>> >>>>>> [image: Imágenes integradas 1] >>>>>> _______________________________________________ >>>>>> PacketFence-users mailing list >>>>>> PacketFence-users@lists.sourceforge.net >>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>> >>>>> >>>> >>>> -- >>>> >>>> [image: Imágenes integradas 1] >>>> >>> >> >> -- >> >> [image: Imágenes integradas 1] >> _______________________________________________ >> PacketFence-users mailing list >> PacketFence-users@lists.sourceforge.net >> https://lists.sourceforge.net/lists/listinfo/packetfence-users >> > _______________________________________________ > PacketFence-users mailing list > PacketFence-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/packetfence-users >
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users