Sorry, can you let me know how to switch logging to debug.

On Wed, Mar 21, 2012 at 1:50 PM, Adrian Mulgrew <[email protected]>wrote:

> Yes I believe all is fine as I can ping from the client (192.168.2.10) to
> the PacketFence server registration interface  (192.168.2.1) when the
> packetfence service is *stopped* but as soon as I start the service I can
> no longer ping.
>
>
> On Wed, Mar 21, 2012 at 1:24 PM, Francois Gaudreault <
> [email protected]> wrote:
>
>> Hi Andrew,
>>
>> Are you sure the networking side is fine?  VLANs are created on the
>> switch, trunks are OK, etc.
>>
>> On 12-03-21 7:21 AM, Adrian Mulgrew wrote:
>> > Ok so still haven't made any progress.
>> > My theory is that something on the PacketFence server is blocking the
>> > traffic from my client or it's configured not to respond. I know this
>> > because if I ping the PF server from my client on the 192.168.2.0
>> > network the request times out. But if I stop the packetfence service
>> > then I immediately get ping replies from the server.
>> > So I thought the most likely thing to be blocking would be ipables. So I
>> > started packetfence service then did a 'sudo service iptables stop' but
>> > I still don't get any ping responses from the server. So I guess it's
>> > something other than iptables blocking. Anybody have some idea?
>> >
>> > Thanks
>> >
>> >
>> >
>> > On Tue, Mar 20, 2012 at 1:10 PM, Adrian Mulgrew
>> > <[email protected] <mailto:[email protected]>> wrote:
>> >
>> >     Hi Jake,
>> >
>> >     I don't think this will work either as even if I try to open
>> >     http://192.168.2.1 or https://192.168.2.1 (that's the PF server
>> >     registration interface) I get no response.
>> >     So as far as I can tell the only traffic this port responds to is
>> DHCP .
>> >
>> >
>> >
>> >     On Mon, Mar 19, 2012 at 8:05 PM, Sallee, Stephen (Jake)
>> >     <[email protected] <mailto:[email protected]>> wrote:
>> >
>> >          > I tried configuring the external dns manually on the client
>> >         but I don't think this will work as there is no routing between
>> >         the registration vlan and the normal vlan____
>> >
>> >         __ __
>> >
>> >         Try editing the host file on your client to contain an entry
>> >         that should direct you to your PF box.  IE: <IP of PF Server>
>> >         google.com <http://google.com>____
>> >
>> >         __ __
>> >
>> >         __ __
>> >
>> >         Jake Sallee____
>> >
>> >         Godfather of Bandwidth____
>> >
>> >         System Engineer____
>> >
>> >         University of Mary Hardin-Baylor____
>> >
>> >         900 College St.____
>> >
>> >         Belton TX. 76513____
>> >
>> >         Fone: 254-295-4658 <tel:254-295-4658>____
>> >
>> >         Phax: 254-295-4221 <tel:254-295-4221>____
>> >
>> >         __ __
>> >
>> >         *From:*Adrian Mulgrew [mailto:[email protected]
>> >         <mailto:[email protected]>]
>> >         *Sent:* Monday, March 19, 2012 12:20 PM
>> >
>> >
>> >         *To:* [email protected]
>> >         <mailto:[email protected]>
>> >         *Subject:* Re: [Packetfence-users] Unable to access captive
>> >         portal from registration vlan____
>> >
>> >         __ __
>> >
>> >         Hi,____
>> >
>> >         __ __
>> >
>> >         Wireshark on the client sees the DNS request packets going out
>> >         but no reply. On the PF server I can see the requests coming in
>> >         but no reply from the PF server. In fact pretty much the only
>> >         traffic coming out of the PF server is DHCP and SNMP
>> traffic.____
>> >
>> >         __ __
>> >
>> >         I tried configuring the external dns manually on the client but
>> >         I don't think this will work as there is no routing between the
>> >         registration vlan and the normal vlan____
>> >
>> >         __ __
>> >
>> >         Nslookup from the packetfence server works fine.____
>> >
>> >         __ __
>> >
>> >         Anything else I can check?____
>> >
>> >         On Mon, Mar 19, 2012 at 4:07 PM, Sallee, Stephen (Jake)
>> >         <[email protected] <mailto:[email protected]>> wrote:____
>> >
>> >         What does a wireshark capture on the client show?  If you can
>> >         capture the traffic on the server as well, that would help.____
>> >
>> >         ____
>> >
>> >         Also, try manually setting your DNS to one of your other DNS
>> >         servers (NOT PF) and while on the registration vlan see if you
>> >         can go anywhere.____
>> >
>> >         ____
>> >
>> >         You can also try doing a DNS lookup on the PF server using
>> >         either dig or nslookup.____
>> >
>> >         ____
>> >
>> >         Jake Sallee____
>> >
>> >         Godfather of Bandwidth____
>> >
>> >         System Engineer____
>> >
>> >         University of Mary Hardin-Baylor____
>> >
>> >         900 College St.____
>> >
>> >         Belton TX. 76513____
>> >
>> >         Fone: 254-295-4658 <tel:254-295-4658>____
>> >
>> >         Phax: 254-295-4221 <tel:254-295-4221>____
>> >
>> >         ____
>> >
>> >         *From:*Adrian Mulgrew [mailto:[email protected]
>> >         <mailto:[email protected]>]
>> >         *Sent:* Monday, March 19, 2012 10:58 AM
>> >         *To:* [email protected]
>> >         <mailto:[email protected]>
>> >         *Subject:* Re: [Packetfence-users] Unable to access captive
>> >         portal from registration vlan____
>> >
>> >         ____
>> >
>> >         Hi Jake,____
>> >
>> >         ____
>> >
>> >         The only firewall is iptables but that's configured by PF so
>> >         would expect it to allow DNS traffic?____
>> >
>> >         ____
>> >
>> >         I've checked and named is running and configured to run from the
>> >         webui.____
>> >
>> >         ____
>> >
>> >         Below is my iptables.conf if that's any help?____
>> >
>> >         ____
>> >
>> >         Thanks____
>> >
>> >         ____
>> >
>> >         Adrian____
>> >
>> >         ____
>> >
>> >         ____
>> >
>> >         *filter____
>> >
>> >         ____
>> >
>> >         ### INPUT ###____
>> >
>> >         :INPUT DROP [0:0]____
>> >
>> >         # accept loopback stuff____
>> >
>> >         -A INPUT --in-interface lo --jump ACCEPT____
>> >
>> >         # accept anything related____
>> >
>> >         -A INPUT --match state --state ESTABLISHED,RELATED --jump
>> ACCEPT____
>> >
>> >         # Accept Ping (easier troubleshooting)____
>> >
>> >         -A INPUT --protocol icmp --icmp-type echo-request --jump
>> ACCEPT____
>> >
>> >         ____
>> >
>> >         :input-management-if - [0:0]____
>> >
>> >         # SSH____
>> >
>> >         -A input-management-if --match state --state NEW --match tcp
>> >         --protocol tcp --dport 22 --jump ACCEPT____
>> >
>> >         # Web Admin____
>> >
>> >         -A input-management-if --protocol tcp --match tcp --dport
>> >         %%web_admin_port%% --jump ACCEPT____
>> >
>> >         # HTTPS for email confirmation on the captive portal____
>> >
>> >         -A input-management-if --protocol tcp --match tcp --dport 443
>> >         --jump ACCEPT____
>> >
>> >         # RADIUS____
>> >
>> >         -A input-management-if --protocol tcp --match tcp --dport 1812
>> >         --jump ACCEPT____
>> >
>> >         -A input-management-if --protocol udp --match udp --dport 1812
>> >         --jump ACCEPT____
>> >
>> >         -A input-management-if --protocol tcp --match tcp --dport 1813
>> >         --jump ACCEPT____
>> >
>> >         -A input-management-if --protocol udp --match udp --dport 1813
>> >         --jump ACCEPT____
>> >
>> >         # SNMP Traps____
>> >
>> >         -A input-management-if --protocol udp --match udp --dport 162
>> >           --jump ACCEPT____
>> >
>> >         # DHCP (for IP Helpers to mgmt to track users' IP in production
>> >         VLANs)____
>> >
>> >         -A input-management-if --protocol udp --match udp --dport 67
>> >           --jump ACCEPT____
>> >
>> >         -A input-management-if --protocol tcp --match tcp --dport 67
>> >           --jump ACCEPT____
>> >
>> >         # OpenVAS Administration Interface____
>> >
>> >         -A input-management-if --protocol tcp --match tcp --dport 9392
>> >         --jump ACCEPT____
>> >
>> >         ____
>> >
>> >         :input-internal-vlan-if - [0:0]____
>> >
>> >         # DNS____
>> >
>> >         -A input-internal-vlan-if --protocol udp --match udp --dport 53
>> >           --jump ACCEPT____
>> >
>> >         # DHCP____
>> >
>> >         -A input-internal-vlan-if --protocol udp --match udp --dport 67
>> >           --jump ACCEPT____
>> >
>> >         -A input-internal-vlan-if --protocol tcp --match tcp --dport 67
>> >           --jump ACCEPT____
>> >
>> >         # HTTP (captive-portal)____
>> >
>> >         -A input-internal-vlan-if --protocol tcp --match tcp --dport 80
>> >           --jump ACCEPT____
>> >
>> >         -A input-internal-vlan-if --protocol tcp --match tcp --dport 443
>> >         --jump ACCEPT____
>> >
>> >         ____
>> >
>> >         :input-internal-inline-if - [0:0]____
>> >
>> >         # DHCP____
>> >
>> >         -A input-internal-inline-if --protocol udp --match udp --dport
>> >         67  --jump ACCEPT____
>> >
>> >         -A input-internal-inline-if --protocol tcp --match tcp --dport
>> >         67  --jump ACCEPT____
>> >
>> >         # HTTP (captive-portal)____
>> >
>> >         # prevent registered users from reaching it____
>> >
>> >         -A input-internal-inline-if --protocol tcp --match tcp --dport
>> >         80  --match mark --mark 0x1 --jump DROP____
>> >
>> >         -A input-internal-inline-if --protocol tcp --match tcp --dport
>> >         443 --match mark --mark 0x1 --jump DROP____
>> >
>> >         # allow everyone else behind inline interface (not registered,
>> >         isolated, etc.)____
>> >
>> >         -A input-internal-inline-if --protocol tcp --match tcp --dport
>> >         80  --jump ACCEPT____
>> >
>> >         -A input-internal-inline-if --protocol tcp --match tcp --dport
>> >         443 --jump ACCEPT____
>> >
>> >         ____
>> >
>> >         ____
>> >
>> >         ____
>> >
>> >         ____
>> >
>> >         On Mon, Mar 19, 2012 at 1:23 PM, Sallee, Stephen (Jake)
>> >         <[email protected] <mailto:[email protected]>> wrote:____
>> >
>> >         Sorry if it sounds silly, but have you made sure that:____
>> >
>> >         1)There are no firewalls blocking you and____
>> >
>> >         2)Named is running on the PF box____
>> >
>> >         ____
>> >
>> >         Also, make sure that the config is set to run DNS, it is in the
>> >         config tab -> services in the webUI.____
>> >
>> >         ____
>> >
>> >         Jake Sallee____
>> >
>> >         Godfather of Bandwidth____
>> >
>> >         System Engineer____
>> >
>> >         University of Mary Hardin-Baylor____
>> >
>> >         900 College St.____
>> >
>> >         Belton TX. 76513____
>> >
>> >         Fone: 254-295-4658 <tel:254-295-4658>____
>> >
>> >         Phax: 254-295-4221 <tel:254-295-4221>____
>> >
>> >         ____
>> >
>> >         *From:*Adrian Mulgrew [mailto:[email protected]
>> >         <mailto:[email protected]>]
>> >         *Sent:* Friday, March 16, 2012 11:42 AM
>> >         *To:* [email protected]
>> >         <mailto:[email protected]>
>> >         *Subject:* [Packetfence-users] Unable to access captive portal
>> >         from registration vlan____
>> >
>> >         ____
>> >
>> >         Hi,____
>> >
>> >         ____
>> >
>> >         I am stuck in the registration vlan 2. When my client connects
>> >         it gets moved to registration network and obtains a DHCP IP
>> >         192.168.2.10 with DNS server 192.168.2.1 (PF Server).____
>> >
>> >         I then open a Chrome browser and type in www.google.com
>> >         <http://www.google.com>. As I understand it, PF should be
>> >         running it's own DNS server on this VLAN which will intercept
>> >         the request and redirect to a registration page. But for me, all
>> >         that happens is the page times out saying unable to resolve the
>> >         URL.____
>> >
>> >         ____
>> >
>> >         Does the PF installation automatically setup a DNS server or do
>> >         I have to do this manually? Also what is the URL it should be
>> >         redirecting clients to for the registration page?____
>> >
>> >         ____
>> >
>> >         Thanks____
>> >
>> >         ____
>> >
>> >         Adrian____
>> >
>> >         ____
>> >
>> >
>> >
>> ------------------------------------------------------------------------------
>> >         This SF email is sponsosred by:
>> >         Try Windows Azure free for 90 days Click Here
>> >         http://p.sf.net/sfu/sfd2d-msazure
>> >         _______________________________________________
>> >         Packetfence-users mailing list
>> >         [email protected]
>> >         <mailto:[email protected]>
>> >
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users____
>> >
>> >         ____
>> >
>> >
>> >
>> ------------------------------------------------------------------------------
>> >         This SF email is sponsosred by:
>> >         Try Windows Azure free for 90 days Click Here
>> >         http://p.sf.net/sfu/sfd2d-msazure
>> >         _______________________________________________
>> >         Packetfence-users mailing list
>> >         [email protected]
>> >         <mailto:[email protected]>
>> >
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users____
>> >
>> >         __ __
>> >
>> >
>> >
>> ------------------------------------------------------------------------------
>> >         This SF email is sponsosred by:
>> >         Try Windows Azure free for 90 days Click Here
>> >         http://p.sf.net/sfu/sfd2d-msazure
>> >         _______________________________________________
>> >         Packetfence-users mailing list
>> >         [email protected]
>> >         <mailto:[email protected]>
>> >         https://lists.sourceforge.net/lists/listinfo/packetfence-users
>> >
>> >
>> >
>> >
>> >
>> >
>> ------------------------------------------------------------------------------
>> > This SF email is sponsosred by:
>> > Try Windows Azure free for 90 days Click Here
>> > http://p.sf.net/sfu/sfd2d-msazure
>> >
>> >
>> >
>> > _______________________________________________
>> > Packetfence-users mailing list
>> > [email protected]
>> > https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>
>>
>> --
>> Francois Gaudreault, ing. jr
>> [email protected]  ::  +1.514.447.4918 (x130) ::  www.inverse.ca
>> Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
>> (www.packetfence.org)
>>
>>
>> ------------------------------------------------------------------------------
>> This SF email is sponsosred by:
>> Try Windows Azure free for 90 days Click Here
>> http://p.sf.net/sfu/sfd2d-msazure
>> _______________________________________________
>> Packetfence-users mailing list
>> [email protected]
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>
>
>
------------------------------------------------------------------------------
This SF email is sponsosred by:
Try Windows Azure free for 90 days Click Here 
http://p.sf.net/sfu/sfd2d-msazure
_______________________________________________
Packetfence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to