Note: added the list back in the discussion. > > I am testing with Cisco Aironet APs, mainly 1242s, and 1262s. Another > thing that I forgot to mention, is that I am testing with PacketFence > 3.0.1, which I believe does not have the feature controllerIp in > switches.conf. >
Ok. Good to know. Back to the original point then. See below. > > > > I wanted to ask how other PacketFence users were implementing > > deauthentication in a WDS environment. This problem occurs for the > > following reason. In a WDS environment, the AP that negotiates the > > FreeRadius request is the IP that is used for the NAS-IP-Attribute, > > which is the WDS AP IP address. When PacketFence attempts to > > deauthenticate a node, it uses the IP of the WDS and therefore the > > deauthentication fails. So I wanted to ask for recommendations and how > > to do this. I attempted to create a SSH session, but it results in a > > SOAP error based on FreeRadius logs. How else could this be > implemented. > > Any ideas are appreciated. I'm not familiar with the WDS architecture too much. Where should the deauth take place if it's not the NAS-IP then? Regards, -- Olivier Bilodeau [email protected] :: +1.514.447.4918 *115 :: www.inverse.ca Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence (www.packetfence.org) ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ PacketFence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
