Hi Chris,
> Just a comment to your idea of using RADIUS accounting in place of
> locationlog ; is there some way of duplicating the RADIUS traffic flow
> ? Perhaps duplicating then diverting it (a T-connection), perhaps
> setting up a socket arrangement ...
With RADIUS proxying and Huntgroups you can do stuff similar to that.
For the record, we do not plan on replacing locationlog with RADIUS
accounting, we plan on having RADIUS accounting information update the
locationlog.
>
> As a current workaround, we are thinking of setting up an automatic
> deauthentication daily at, say, 2 or 3 am and closing all locationlog
> entries. Anyone still connected at that time would be forced to
> reauthenticate. Is there an easy way of configuring this in pf.conf ?
> (Otherwise it shouldn't be a big deal to write a small script for
> cron.) Of course, this timing would work for us as a university - it
> might not be very practical for a globally diversified business.
>
We have done that several times and there are several ways to do it ;)
For something like a semester massive de-registration the
expire_deadline in pf.conf can do. However for daily deadlines it is not
convenient.
Another configuration parameter is the expire_window. For example, if
you put it to 1d then all users will be unregistered 1 day after their
registration so someone registering at noon on the 18th would be
un-registered at noon on the 19th. Not exactly as you want but not far
from it and it's all built-in.
Another thing you can do is to use the new lib/pf/web/custom.pm
mechanism to customize node registration. Override
pf::web::web_node_register to set unregdate to
POSIX::strftime("%Y-%m-%d 02:00:00", localtime(time + 60 * 60 * 24));
See lib/pf/web/custom.pm there is an example that is commented out that
does session duration for guests.
Lastly, a cron job that does pfcmd node view all then awk then pfcmd
manage deregister ... would also do the trick.
So, there's more than one way to do it. Personally I would go with
lib/pf/web/custom.pm modifications.
>
> Yes, the pfcmd_vlan (pfsetvlan) log entries aren't there ... !
>
Not good.
> To answer your 127.0.0.1 questions :
> - Yes, the 'local trap' is in switches.conf
> - However, the local trap appears just *once* in logs/snmptrapd.log !
> That can't be correct ... Any further ideas of what, if anything,
> in the Debian port, might be causing that ? snmptrapd seems to be
> functioning ok otherwise ... why would it choke on 127.0.0.1 ?
What's in your conf/snmptrapd.conf?
> - Just ran a tcpdump scan on the PF server loopback and there was
> just *one* trap sent between the AP and the server - nothing to
> loopback
When you *registered* there was no trap from 127.0.0.1? It's not normal
and it won't work if you don't get one.
On your last test when you registered was there a call to flip.pl in the
logs? flip.pl should send a local (127.0.0.1) trap then pfsetvlan acts
on it calling pfcmd_vlan. Help me figure out what's not working properly
please. I'm thinking it might be snmptrapd or maybe firewall running on
the loopback?
>
> On another issue (but related to traps), from the time v2 was
> installed we had difficulty reading some traps with the routine
> reading complaining of 'bad' or 'incomplete' records. (Sorry, I no
> longer have the log entries for this.) The error cascaded into the
> database, which refused to accept a null field. A colleague, more
> versed in SNMP than I am, wrote a patch that seemingly fixes this. I'd
> like to send this on to you, in case it's useful.
>
> Please find the Cisco.pm perl modules attached - both the new and the
> original : do a diff between them ...
Not sure why we are not grabbing the ifIndex out of this trap in the
original.. I'll look into it. Thanks for letting me know.
>
> Finally, there is a new version of the 'installation of PF on Debian'
> doc coming soon. Please just throw away the former one I sent some
> months ago - it was preliminary and is full of errors and
> inaccuracies. This one is quite a bit 'tighter'. Also, the
> accompanying scripts - httpd, etc. - have been rewritten.
Great! Can't wait to get it. On our side of things the debian packaging
is on the horizon (post 2.0.1) so your guide will definitely help us get
that done quicker. And we will need testers ;)
Cheers!
--
Olivier Bilodeau
[email protected] :: +1.514.447.4918 *115 :: www.inverse.ca
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
(www.packetfence.org)
------------------------------------------------------------------------------
Protect Your Site and Customers from Malware Attacks
Learn about various malware tactics and how to avoid them. Understand
malware threats, the impact they can have on your business, and how you
can protect your company and customers by using code signing.
http://p.sf.net/sfu/oracle-sfdevnl
_______________________________________________
Packetfence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users