Tim B <timb333@...> writes: > > > Hi, > > I've been asked to evaluate PacketFence and the switches used at this site (Cisco Catalyst 500) are not on the supported hardware list. A quick review of the mailing list archive suggests that the HCL is understandably limited to the switches the developers have been able to get hold of. > > > Reading through the admin guide it looks like PacketFence can work by receiving a SNMP trap when the port state changes, querying the MAC address in that trap, then responding with a SNMP write to change the VLAN of the port. Looks like there are improved MAC Auth and 802.1X support as well, but I suspect these switches are unlikely to support those features. > > > Anybody had any luck with Cisco Catalyst 500 switches or other similar switches in the family? I'm still trying to get a switch out of the production environment to test. > > Regards, > > Tim > > > ------------------------------------------------------------------------------ > RSA® Conference 2012 > Save $700 by Nov 18 > Register now! > http://p.sf.net/sfu/rsa-sfdev2dev1 > > _______________________________________________ > Packetfence-users mailing list > Packetfence-users@... > https://lists.sourceforge.net/lists/listinfo/packetfence-users >
I am trying to setup packetfence 3.0.3 with SL6.1. I have a Catalyst 500 12 Port as spare. How can I help? ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-novd2d _______________________________________________ Packetfence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
