Olivier said:
> add something in pf::web::custom to categorize the node based on domain using 
> a regexp on the username then modify pf::vlan::custom to return VLANs based 
> on said categories

Actually Inverse already did something very similar for me they helped me make 
the following change to my vlan::custom file:

if (defined($user_name) && $user_name =~ /\@umhb/i) {
        return $switch->getVlanByName('customVlan1');
    } elsif (defined($user_name) && $user_name =~ /\@cru/i) {
        return $switch->getVlanByName('customVlan2');
    }

This should have the net effect of returning cutomVlan1 for my users in the 
umhb.edu domain and customVlan2 for the users in my Cru domain.  My problem is 
that I don't seem to be getting that far.  The user is accepted (right now the 
user is accepted no matter what but I am looking into that) but for some reason 
it doesn't seem like FR is telling PF that the user is good to go and to accept 
them.

Jake Sallee
Godfather of Bandwidth
Network Engineer
University of Mary Hardin-Baylor
900 College St.
Belton, Texas
76513
Fone: 254-295-4658
Phax: 254-295-4221


-----Original Message-----
From: Olivier Bilodeau [mailto:[email protected]] 
Sent: Tuesday, May 17, 2011 9:08 AM
To: [email protected]
Subject: Re: [Packetfence-users] Trouble with RADIUS and Captive Portal auth

On 17/05/11 10:01 AM, Sallee, Stephen (Jake) wrote:
> I agree that if the users were on the local box authen::local would be the 
> best choice, but all of my users are in our AD.  What I need the captive 
> portal to do is authenticate them against our AD and assign them a vlan based 
> on the domain in the username. 

AD authentication should be done with the authentication::ldap module.
I'm pretty sure it's covered in one of our guides.

Domain-based VLAN assignment will need a bit more work.
You could:
a) create several authenti...:ldap with one for each domain and there would be 
a drop down available on the captive portal to chose the domain then you alter 
the pf::web::custom to categorize the nodes properly then modify 
pf::vlan::custom to return VLANs based on said categories

b)
- add something in pf::web::custom to categorize the node based on domain using 
a regexp on the username then modify pf::vlan::custom to return VLANs based on 
said categories


--
Olivier Bilodeau
[email protected]  ::  +1.514.447.4918 *115  ::  www.inverse.ca Inverse inc. 
:: Leaders behind SOGo (www.sogo.nu) and PacketFence
(www.packetfence.org)

------------------------------------------------------------------------------
Achieve unprecedented app performance and reliability What every C/C++ and 
Fortran developer should know.
Learn how Intel has extended the reach of its next-generation tools to help 
boost performance applications - inlcuding clusters.
http://p.sf.net/sfu/intel-dev2devmay
_______________________________________________
Packetfence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

------------------------------------------------------------------------------
Achieve unprecedented app performance and reliability
What every C/C++ and Fortran developer should know.
Learn how Intel has extended the reach of its next-generation tools
to help boost performance applications - inlcuding clusters.
http://p.sf.net/sfu/intel-dev2devmay
_______________________________________________
Packetfence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to