Yes I believe all is fine as I can ping from the client (192.168.2.10) to
the PacketFence server registration interface (192.168.2.1) when the
packetfence service is *stopped* but as soon as I start the service I can
no longer ping.
On Wed, Mar 21, 2012 at 1:24 PM, Francois Gaudreault <[email protected]
> wrote:
> Hi Andrew,
>
> Are you sure the networking side is fine? VLANs are created on the
> switch, trunks are OK, etc.
>
> On 12-03-21 7:21 AM, Adrian Mulgrew wrote:
> > Ok so still haven't made any progress.
> > My theory is that something on the PacketFence server is blocking the
> > traffic from my client or it's configured not to respond. I know this
> > because if I ping the PF server from my client on the 192.168.2.0
> > network the request times out. But if I stop the packetfence service
> > then I immediately get ping replies from the server.
> > So I thought the most likely thing to be blocking would be ipables. So I
> > started packetfence service then did a 'sudo service iptables stop' but
> > I still don't get any ping responses from the server. So I guess it's
> > something other than iptables blocking. Anybody have some idea?
> >
> > Thanks
> >
> >
> >
> > On Tue, Mar 20, 2012 at 1:10 PM, Adrian Mulgrew
> > <[email protected] <mailto:[email protected]>> wrote:
> >
> > Hi Jake,
> >
> > I don't think this will work either as even if I try to open
> > http://192.168.2.1 or https://192.168.2.1 (that's the PF server
> > registration interface) I get no response.
> > So as far as I can tell the only traffic this port responds to is
> DHCP .
> >
> >
> >
> > On Mon, Mar 19, 2012 at 8:05 PM, Sallee, Stephen (Jake)
> > <[email protected] <mailto:[email protected]>> wrote:
> >
> > > I tried configuring the external dns manually on the client
> > but I don't think this will work as there is no routing between
> > the registration vlan and the normal vlan____
> >
> > __ __
> >
> > Try editing the host file on your client to contain an entry
> > that should direct you to your PF box. IE: <IP of PF Server>
> > google.com <http://google.com>____
> >
> > __ __
> >
> > __ __
> >
> > Jake Sallee____
> >
> > Godfather of Bandwidth____
> >
> > System Engineer____
> >
> > University of Mary Hardin-Baylor____
> >
> > 900 College St.____
> >
> > Belton TX. 76513____
> >
> > Fone: 254-295-4658 <tel:254-295-4658>____
> >
> > Phax: 254-295-4221 <tel:254-295-4221>____
> >
> > __ __
> >
> > *From:*Adrian Mulgrew [mailto:[email protected]
> > <mailto:[email protected]>]
> > *Sent:* Monday, March 19, 2012 12:20 PM
> >
> >
> > *To:* [email protected]
> > <mailto:[email protected]>
> > *Subject:* Re: [Packetfence-users] Unable to access captive
> > portal from registration vlan____
> >
> > __ __
> >
> > Hi,____
> >
> > __ __
> >
> > Wireshark on the client sees the DNS request packets going out
> > but no reply. On the PF server I can see the requests coming in
> > but no reply from the PF server. In fact pretty much the only
> > traffic coming out of the PF server is DHCP and SNMP traffic.____
> >
> > __ __
> >
> > I tried configuring the external dns manually on the client but
> > I don't think this will work as there is no routing between the
> > registration vlan and the normal vlan____
> >
> > __ __
> >
> > Nslookup from the packetfence server works fine.____
> >
> > __ __
> >
> > Anything else I can check?____
> >
> > On Mon, Mar 19, 2012 at 4:07 PM, Sallee, Stephen (Jake)
> > <[email protected] <mailto:[email protected]>> wrote:____
> >
> > What does a wireshark capture on the client show? If you can
> > capture the traffic on the server as well, that would help.____
> >
> > ____
> >
> > Also, try manually setting your DNS to one of your other DNS
> > servers (NOT PF) and while on the registration vlan see if you
> > can go anywhere.____
> >
> > ____
> >
> > You can also try doing a DNS lookup on the PF server using
> > either dig or nslookup.____
> >
> > ____
> >
> > Jake Sallee____
> >
> > Godfather of Bandwidth____
> >
> > System Engineer____
> >
> > University of Mary Hardin-Baylor____
> >
> > 900 College St.____
> >
> > Belton TX. 76513____
> >
> > Fone: 254-295-4658 <tel:254-295-4658>____
> >
> > Phax: 254-295-4221 <tel:254-295-4221>____
> >
> > ____
> >
> > *From:*Adrian Mulgrew [mailto:[email protected]
> > <mailto:[email protected]>]
> > *Sent:* Monday, March 19, 2012 10:58 AM
> > *To:* [email protected]
> > <mailto:[email protected]>
> > *Subject:* Re: [Packetfence-users] Unable to access captive
> > portal from registration vlan____
> >
> > ____
> >
> > Hi Jake,____
> >
> > ____
> >
> > The only firewall is iptables but that's configured by PF so
> > would expect it to allow DNS traffic?____
> >
> > ____
> >
> > I've checked and named is running and configured to run from the
> > webui.____
> >
> > ____
> >
> > Below is my iptables.conf if that's any help?____
> >
> > ____
> >
> > Thanks____
> >
> > ____
> >
> > Adrian____
> >
> > ____
> >
> > ____
> >
> > *filter____
> >
> > ____
> >
> > ### INPUT ###____
> >
> > :INPUT DROP [0:0]____
> >
> > # accept loopback stuff____
> >
> > -A INPUT --in-interface lo --jump ACCEPT____
> >
> > # accept anything related____
> >
> > -A INPUT --match state --state ESTABLISHED,RELATED --jump
> ACCEPT____
> >
> > # Accept Ping (easier troubleshooting)____
> >
> > -A INPUT --protocol icmp --icmp-type echo-request --jump
> ACCEPT____
> >
> > ____
> >
> > :input-management-if - [0:0]____
> >
> > # SSH____
> >
> > -A input-management-if --match state --state NEW --match tcp
> > --protocol tcp --dport 22 --jump ACCEPT____
> >
> > # Web Admin____
> >
> > -A input-management-if --protocol tcp --match tcp --dport
> > %%web_admin_port%% --jump ACCEPT____
> >
> > # HTTPS for email confirmation on the captive portal____
> >
> > -A input-management-if --protocol tcp --match tcp --dport 443
> > --jump ACCEPT____
> >
> > # RADIUS____
> >
> > -A input-management-if --protocol tcp --match tcp --dport 1812
> > --jump ACCEPT____
> >
> > -A input-management-if --protocol udp --match udp --dport 1812
> > --jump ACCEPT____
> >
> > -A input-management-if --protocol tcp --match tcp --dport 1813
> > --jump ACCEPT____
> >
> > -A input-management-if --protocol udp --match udp --dport 1813
> > --jump ACCEPT____
> >
> > # SNMP Traps____
> >
> > -A input-management-if --protocol udp --match udp --dport 162
> > --jump ACCEPT____
> >
> > # DHCP (for IP Helpers to mgmt to track users' IP in production
> > VLANs)____
> >
> > -A input-management-if --protocol udp --match udp --dport 67
> > --jump ACCEPT____
> >
> > -A input-management-if --protocol tcp --match tcp --dport 67
> > --jump ACCEPT____
> >
> > # OpenVAS Administration Interface____
> >
> > -A input-management-if --protocol tcp --match tcp --dport 9392
> > --jump ACCEPT____
> >
> > ____
> >
> > :input-internal-vlan-if - [0:0]____
> >
> > # DNS____
> >
> > -A input-internal-vlan-if --protocol udp --match udp --dport 53
> > --jump ACCEPT____
> >
> > # DHCP____
> >
> > -A input-internal-vlan-if --protocol udp --match udp --dport 67
> > --jump ACCEPT____
> >
> > -A input-internal-vlan-if --protocol tcp --match tcp --dport 67
> > --jump ACCEPT____
> >
> > # HTTP (captive-portal)____
> >
> > -A input-internal-vlan-if --protocol tcp --match tcp --dport 80
> > --jump ACCEPT____
> >
> > -A input-internal-vlan-if --protocol tcp --match tcp --dport 443
> > --jump ACCEPT____
> >
> > ____
> >
> > :input-internal-inline-if - [0:0]____
> >
> > # DHCP____
> >
> > -A input-internal-inline-if --protocol udp --match udp --dport
> > 67 --jump ACCEPT____
> >
> > -A input-internal-inline-if --protocol tcp --match tcp --dport
> > 67 --jump ACCEPT____
> >
> > # HTTP (captive-portal)____
> >
> > # prevent registered users from reaching it____
> >
> > -A input-internal-inline-if --protocol tcp --match tcp --dport
> > 80 --match mark --mark 0x1 --jump DROP____
> >
> > -A input-internal-inline-if --protocol tcp --match tcp --dport
> > 443 --match mark --mark 0x1 --jump DROP____
> >
> > # allow everyone else behind inline interface (not registered,
> > isolated, etc.)____
> >
> > -A input-internal-inline-if --protocol tcp --match tcp --dport
> > 80 --jump ACCEPT____
> >
> > -A input-internal-inline-if --protocol tcp --match tcp --dport
> > 443 --jump ACCEPT____
> >
> > ____
> >
> > ____
> >
> > ____
> >
> > ____
> >
> > On Mon, Mar 19, 2012 at 1:23 PM, Sallee, Stephen (Jake)
> > <[email protected] <mailto:[email protected]>> wrote:____
> >
> > Sorry if it sounds silly, but have you made sure that:____
> >
> > 1)There are no firewalls blocking you and____
> >
> > 2)Named is running on the PF box____
> >
> > ____
> >
> > Also, make sure that the config is set to run DNS, it is in the
> > config tab -> services in the webUI.____
> >
> > ____
> >
> > Jake Sallee____
> >
> > Godfather of Bandwidth____
> >
> > System Engineer____
> >
> > University of Mary Hardin-Baylor____
> >
> > 900 College St.____
> >
> > Belton TX. 76513____
> >
> > Fone: 254-295-4658 <tel:254-295-4658>____
> >
> > Phax: 254-295-4221 <tel:254-295-4221>____
> >
> > ____
> >
> > *From:*Adrian Mulgrew [mailto:[email protected]
> > <mailto:[email protected]>]
> > *Sent:* Friday, March 16, 2012 11:42 AM
> > *To:* [email protected]
> > <mailto:[email protected]>
> > *Subject:* [Packetfence-users] Unable to access captive portal
> > from registration vlan____
> >
> > ____
> >
> > Hi,____
> >
> > ____
> >
> > I am stuck in the registration vlan 2. When my client connects
> > it gets moved to registration network and obtains a DHCP IP
> > 192.168.2.10 with DNS server 192.168.2.1 (PF Server).____
> >
> > I then open a Chrome browser and type in www.google.com
> > <http://www.google.com>. As I understand it, PF should be
> > running it's own DNS server on this VLAN which will intercept
> > the request and redirect to a registration page. But for me, all
> > that happens is the page times out saying unable to resolve the
> > URL.____
> >
> > ____
> >
> > Does the PF installation automatically setup a DNS server or do
> > I have to do this manually? Also what is the URL it should be
> > redirecting clients to for the registration page?____
> >
> > ____
> >
> > Thanks____
> >
> > ____
> >
> > Adrian____
> >
> > ____
> >
> >
> >
> ------------------------------------------------------------------------------
> > This SF email is sponsosred by:
> > Try Windows Azure free for 90 days Click Here
> > http://p.sf.net/sfu/sfd2d-msazure
> > _______________________________________________
> > Packetfence-users mailing list
> > [email protected]
> > <mailto:[email protected]>
> >
> https://lists.sourceforge.net/lists/listinfo/packetfence-users____
> >
> > ____
> >
> >
> >
> ------------------------------------------------------------------------------
> > This SF email is sponsosred by:
> > Try Windows Azure free for 90 days Click Here
> > http://p.sf.net/sfu/sfd2d-msazure
> > _______________________________________________
> > Packetfence-users mailing list
> > [email protected]
> > <mailto:[email protected]>
> >
> https://lists.sourceforge.net/lists/listinfo/packetfence-users____
> >
> > __ __
> >
> >
> >
> ------------------------------------------------------------------------------
> > This SF email is sponsosred by:
> > Try Windows Azure free for 90 days Click Here
> > http://p.sf.net/sfu/sfd2d-msazure
> > _______________________________________________
> > Packetfence-users mailing list
> > [email protected]
> > <mailto:[email protected]>
> > https://lists.sourceforge.net/lists/listinfo/packetfence-users
> >
> >
> >
> >
> >
> >
> ------------------------------------------------------------------------------
> > This SF email is sponsosred by:
> > Try Windows Azure free for 90 days Click Here
> > http://p.sf.net/sfu/sfd2d-msazure
> >
> >
> >
> > _______________________________________________
> > Packetfence-users mailing list
> > [email protected]
> > https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
>
> --
> Francois Gaudreault, ing. jr
> [email protected] :: +1.514.447.4918 (x130) :: www.inverse.ca
> Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
> (www.packetfence.org)
>
>
> ------------------------------------------------------------------------------
> This SF email is sponsosred by:
> Try Windows Azure free for 90 days Click Here
> http://p.sf.net/sfu/sfd2d-msazure
> _______________________________________________
> Packetfence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
------------------------------------------------------------------------------
This SF email is sponsosred by:
Try Windows Azure free for 90 days Click Here
http://p.sf.net/sfu/sfd2d-msazure
_______________________________________________
Packetfence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users