Sorry if missunderstood you Francois ,
Now i understand what you meant . I have configured only one switchport for
testing the other ports remained intact .
Thanks man ,
On Wed, Jul 13, 2011 at 10:46 AM, Francois Gaudreault <
[email protected]> wrote:
> **
> That's not what I said!
>
> I said (in other words) that you cannot have a device authorized with
> port-security (the switchport port-security mac-address line) on *two
> switchports that are on the same VLAN*. Well, technically you could, but
> you will not receive SNMP traps for the new port. This situation will never
> happen if PF is working properly, since we go de-authorize the node on the
> old switchport before authorize the node on the new port.
>
>
> On 11-07-13 8:57 AM, Paulo Maia wrote:
>
> So i cannot have 2 ports on the same vlan ? is that itt ?
>
> On Wed, Jul 13, 2011 at 9:03 AM, Francois Gaudreault <
> [email protected]> wrote:
>
>> Paulo,
>>
>> I don't see any security traps coming from the switch with the log you
>> sent. Make sure the device is NOT authorized on any other port of the
>> switch on the same VLAN of port 15. Otherwise, the switch will not send
>> SNMP traps.
>>
>>
>> On 11-07-12 8:53 PM, Paulo Maia wrote:
>>
>> any1?
>>
>> On Tue, Jul 12, 2011 at 4:54 PM, Paulo Maia <[email protected]> wrote:
>>
>>> Updating ,
>>>
>>> I update the switch configuration refering to the guide in Documentation
>>> guide at the website
>>>
>>> switch configuraiton
>>>
>>> interface FastEthernet0/15
>>> switchport mode access
>>> switchport port-security maximum 1 vlan access
>>> switchport port-security
>>> switchport port-security violation restrict
>>> switchport port-security mac-address 0200.0001.0015
>>> snmp trap mac-notification added
>>>
>>> snmp-server enable traps port-security
>>> snmp-server enable traps port-security trap-rate 1
>>> snmp-server host 172.20.0.190 version 2c 1np@net_ro port-security
>>>
>>>
>>>
>>> tcpdump -i eth0 host 172.20.0.11
>>>
>>> 12:01:37.006396 IP 172.20.0.11.52527 > 172.20.0.190.snmptrap:
>>> C=1np@net_ro V2Trap(139) system.sysUpTime.0=65838428 [|snmp]
>>> 12:01:38.013022 IP 172.20.0.11.52527 > 172.20.0.190.snmptrap:
>>> C=1np@net_ro V2Trap(139) system.sysUpTime.0=65838529 [|snmp]
>>> 12:01:39.019618 IP 172.20.0.11.52527 > 172.20.0.190.snmptrap:
>>> C=1np@net_ro V2Trap(139) system.sysUpTime.0=65838629 [|snmp]
>>> 12:01:40.999211 IP 172.20.0.11.52527 > 172.20.0.190.snmptrap:
>>> C=1np@net_ro V2Trap(139) system.sysUpTime.0=65838827 [|snmp]
>>> 12:01:42.005930 IP 172.20.0.11.52527 > 172.20.0.190.snmptrap:
>>> C=1np@net_ro V2Trap(139) system.sysUpTime.0=65838928 [|snmp]
>>> 12:01:43.012548 IP 172.20.0.11.52527 > 172.20.0.190.snmptrap:
>>> C=1np@net_ro V2Trap(139) system.sysUpTime.0=65839029 [|snmp]
>>> 12:01:44.019088 IP 172.20.0.11.52527 > 172.20.0.190.snmptrap:
>>> C=1np@net_ro V2Trap(139) system.sysUpTime.0=65839129 [|snmp]
>>> 12:01:45.998813 IP 172.20.0.11.52527 > 172.20.0.190.snmptrap:
>>> C=1np@net_ro V2Trap(139) system.sysUpTime.0=65839327 [|snmp]
>>> 12:01:47.005536 IP 172.20.0.11.52527 > 172.20.0.190.snmptrap:
>>> C=1np@net_ro V2Trap(139) system.sysUpTime.0=65839428 [|snmp]
>>>
>>> At this point i have the mac-address registed in packetfence the
>>> interface is connected but no conectivity . no ip address
>>>
>>> I dont know if im missing configuration in PacketFence idk if i have to
>>> set a violation rule to block the unknow mac-addresses
>>>
>>> Thanks ,
>>>
>>>
>>>
>>> On Tue, Jul 12, 2011 at 2:40 PM, Paulo Maia <[email protected]> wrote:
>>>
>>>> Hello Everyone on the list ,
>>>> This is my first post , So im trying to authenticate (allow) only the
>>>> mac-addresses i have registered in packetfence database i added then in
>>>> NODES
>>>> Im dont use dynamic vlan assigment so its static vlans , basicly i work
>>>> with class b adresses so i have 172.16 to 172.31 vlans and no guest vlan .
>>>> So i added a swich for testing in CONFIGURATION -> SWITCH , i have
>>>> configured the snmp comunity read key , and SNMP Trap Community key as well
>>>> . IP address 172.20.0.11
>>>>
>>>> cisco 2960
>>>> ....
>>>> .....
>>>> .....
>>>> #snmp-server enables traps
>>>> #snmp-server host 172.20.0.190 1np@net_ro
>>>>
>>>> 172.20.0.190 is my PacketFence address .
>>>>
>>>> This is the output of tcpdump -i eth0 host 172.20.0.11 (switch)
>>>> 10:34:10.510621 IP 172.20.0.11.51414 > 172.20.0.190.snmptrap:
>>>> C=1np@net_ro Trap(263) E:cisco.9.41.2 172.20.0.11 enterpriseSpecific
>>>> s=1 65313768[|snmp]
>>>> 10:34:20.161398 IP 172.20.0.11.51414 > 172.20.0.190.snmptrap:
>>>> C=1np@net_ro Trap(74) 17 172.20.0.11 enterpriseSpecific s=2 65314735
>>>> [|snmp]
>>>> 10:34:21.163528 IP 172.20.0.11.51414 > 172.20.0.190.snmptrap:
>>>> C=1np@net_ro Trap(122) E:cisco.1.694 172.20.0.11 linkDown 65314835
>>>> [|snmp]
>>>> 10:34:22.157971 IP 172.20.0.11.51414 > 172.20.0.190.snmptrap:
>>>> C=1np@net_ro Trap(201) E:cisco.9.41.2 172.20.0.11 enterpriseSpecific
>>>> s=1 65314935 [|snmp]
>>>> 10:34:29.455876 IP 172.20.0.11.51414 > 172.20.0.190.snmptrap:
>>>> C=1np@net_ro Trap(199) E:cisco.9.41.2 172.20.0.11 enterpriseSpecific
>>>> s=1 65315664 [|snmp]
>>>> 10:34:30.462501 IP 172.20.0.11.51414 > 172.20.0.190.snmptrap:
>>>> C=1np@net_ro Trap(122) E:cisco.1.694 172.20.0.11 linkUp 65315765
>>>> [|snmp]
>>>> 10:34:57.473365 IP 172.20.0.11.51414 > 172.20.0.190.snmptrap:
>>>> C=1np@net_ro Trap(74) 17 172.20.0.11 enterpriseSpecific s=2 65318466
>>>> [|snmp]
>>>> 10:35:10.534309 IP 172.20.0.11.51414 > 172.20.0.190.snmptrap:
>>>> C=1np@net_ro Trap(263) E:cisco.9.41.2 172.20.0.11 enterpriseSpecific
>>>> s=1 65319772[|snmp]
>>>> 10:36:10.562140 IP 172.20.0.11.51414 > 172.20.0.190.snmptrap:
>>>> C=1np@net_ro Trap(263) E:cisco.9.41.2 172.20.0.11 enterpriseSpecific
>>>> s=1 65325775[|snmp]
>>>> 10:37:10.598366 IP 172.20.0.11.51414 > 172.20.0.190.snmptrap:
>>>> C=1np@net_ro Trap(263) E:cisco.9.41.2 172.20.0.11 enterpriseSpecific
>>>> s=1 65331779[|snmp]
>>>> 10:37:25.802362 IP 172.20.0.11.51414 > 172.20.0.190.snmptrap:
>>>> C=1np@net_ro Trap(51) E:cisco.1.694 172.20.0.11 *authenticationFailure
>>>> * 65333299 [|snmp]
>>>> 10:37:26.808989 IP 172.20.0.11.51414 > 172.20.0.190.snmptrap:
>>>> C=1np@net_ro Trap(51) E:cisco.1.694 172.20.0.11 authenticationFailure
>>>> 65333400 [|snmp]
>>>> 10:37:27.803041 IP 172.20.0.11.51414 > 172.20.0.190.snmptrap:
>>>> C=1np@net_ro Trap(51) E:cisco.1.694 172.20.0.11 authenticationFailure
>>>> 65333499 [|snmp]
>>>> 10:37:28.801649 IP 172.20.0.11.51414 > 172.20.0.190.snmptrap:
>>>> C=1np@net_ro Trap(51) E:cisco.1.694 172.20.0.11 authenticationFailure
>>>> 65333599 [|snmp]
>>>> 10:37:29.807865 IP 172.20.0.11.51414 > 172.20.0.190.snmptrap:
>>>> C=1np@net_ro Trap(51) E:cisco.1.694 172.20.0.11 authenticationFailure
>>>> 65333700 [|snmp]
>>>> 10:37:30.806099 IP 172.20.0.11.51414 > 172.20.0.190.snmptrap:
>>>> C=1np@net_ro Trap(51) E:cisco.1.694 172.20.0.11 authenticationFailure
>>>> 65333800 [|snmp]
>>>> 10:38:10.626237 IP 172.20.0.11.51414 > 172.20.0.190.snmptrap:
>>>> C=1np@net_ro Trap(263) E:cisco.9.41.2 172.20.0.11 enterpriseSpecific
>>>> s=1 65337782[|snmp]
>>>> 10:38:55.066754 arp who-has 172.20.0.11 tell 172.20.0.99
>>>> 10:39:10.666726 IP 172.20.0.11.51414 > 172.20.0.190.snmptrap:
>>>> C=1np@net_ro Trap(263) E:cisco.9.41.2 172.20.0.11 enterpriseSpecific
>>>> s=1 65343785[|snmp]
>>>>
>>>>
>>>> This set of packets are coming when a plug the network cable , altough
>>>> this machine does not have the mac-address in packetfence database and
>>>> still
>>>> this computer is allowed into the network .
>>>>
>>>> I have search a lot in mailarchives and foruns , but i could not find
>>>> anything .
>>>>
>>>> So i came to you guys . Can anyone help me ? Where im going wrong ?
>>>>
>>>> Thanks for your help .
>>>> Paulo
>>>>
>>>
>>>
>>
>> ------------------------------------------------------------------------------
>> AppSumo Presents a FREE Video for the SourceForge Community by Eric
>> Ries, the creator of the Lean Startup Methodology on "Lean Startup
>> Secrets Revealed." This video shows you how to validate your ideas,
>> optimize your ideas and identify your business
>> strategy.http://p.sf.net/sfu/appsumosfdev2dev
>>
>>
>> _______________________________________________
>> Packetfence-users mailing
>> [email protected]https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>
>>
>>
>> --
>> Francois Gaudreault, ing. [email protected] :: +1.514.447.4918
>> (x130) :: www.inverse.ca
>> Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
>> (www.packetfence.org)
>>
>>
>>
>> ------------------------------------------------------------------------------
>> AppSumo Presents a FREE Video for the SourceForge Community by Eric
>> Ries, the creator of the Lean Startup Methodology on "Lean Startup
>> Secrets Revealed." This video shows you how to validate your ideas,
>> optimize your ideas and identify your business strategy.
>> http://p.sf.net/sfu/appsumosfdev2dev
>> _______________________________________________
>> Packetfence-users mailing list
>> [email protected]
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>
>>
>
> ------------------------------------------------------------------------------
> AppSumo Presents a FREE Video for the SourceForge Community by Eric
> Ries, the creator of the Lean Startup Methodology on "Lean Startup
> Secrets Revealed." This video shows you how to validate your ideas,
> optimize your ideas and identify your business
> strategy.http://p.sf.net/sfu/appsumosfdev2dev
>
>
> _______________________________________________
> Packetfence-users mailing
> [email protected]https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
>
>
> --
> Francois Gaudreault, ing. [email protected] :: +1.514.447.4918
> (x130) :: www.inverse.ca
> Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
> (www.packetfence.org)
>
>
>
> ------------------------------------------------------------------------------
> AppSumo Presents a FREE Video for the SourceForge Community by Eric
> Ries, the creator of the Lean Startup Methodology on "Lean Startup
> Secrets Revealed." This video shows you how to validate your ideas,
> optimize your ideas and identify your business strategy.
> http://p.sf.net/sfu/appsumosfdev2dev
> _______________________________________________
> Packetfence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
>
------------------------------------------------------------------------------
AppSumo Presents a FREE Video for the SourceForge Community by Eric
Ries, the creator of the Lean Startup Methodology on "Lean Startup
Secrets Revealed." This video shows you how to validate your ideas,
optimize your ideas and identify your business strategy.
http://p.sf.net/sfu/appsumosfdev2dev
_______________________________________________
Packetfence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users