Note: added the list back in the discussion.

> 
> I am testing with Cisco Aironet APs, mainly 1242s, and 1262s. Another
> thing that I forgot to mention, is that I am testing with PacketFence
> 3.0.1, which I believe does not have the feature controllerIp in
> switches.conf.
> 

Ok. Good to know. Back to the original point then. See below.


>     >
>     > I wanted to ask how other PacketFence users were implementing
>     > deauthentication in a WDS environment. This problem occurs for the
>     > following reason. In a WDS environment, the AP that negotiates the
>     > FreeRadius request is the IP that is used for the NAS-IP-Attribute,
>     > which is the WDS AP IP address. When PacketFence attempts to
>     > deauthenticate a node, it uses the IP of the WDS and therefore the
>     > deauthentication fails. So I wanted to ask for recommendations and how
>     > to do this. I attempted to create a SSH session, but it results in a
>     > SOAP error based on FreeRadius logs. How else could this be
>     implemented.
>     > Any ideas are appreciated.

I'm not familiar with the WDS architecture too much. Where should the
deauth take place if it's not the NAS-IP then?

Regards,
-- 
Olivier Bilodeau
[email protected]  ::  +1.514.447.4918 *115  ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
(www.packetfence.org)

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to