Hello again,

I had a few more questions about Packet Fence that I was hoping I could get answered. After working with the In-line configuration with the ZEN installation, I thought I would try deploying a VLAN enforcement set up, but have run into a few stumbling blocks. I imagine this is partially due to my lack of understanding the software.

First, I'm interested primarily in deploying Packet Fence as a captive portal with some sort of "abuse control," preferably through MAC address blocking and bandwidth limiting. I know Packet Fence can do both of these things, but the violation configuration pages suggest it relies on a VLAN enforcement setup to work. Are these controls usable using In-line only enforcement? How? MAC blocking did not seem to work with my In-line setup, despite the violation being acknowledged by the software (entered into violation.conf) and there did not seem to be any bandwidth limit checks being done according to the logs (I set the sample from the ZEN installation to "TOT1KB1M" as a test and was never cut off, for example).

Second, I'm attempting a Packet Fence installation with VLAN enforcement on Debian 6 (which I understand may be a problem in itself). I'm hoping to simplify the process because the environment I wish to put Packet Fence into does not require anything extraordinary (it will be a simple guest wireless portal, where traffic flows in one interface and out the other. In case of remediation, a single tertiary VLAN to dump the extra traffic is enough). To do something like this, could I simply have this setup? Packet Fence interface on a VLAN-trunked port containing the registration and isolation VLANs, with the outside network as the native VLAN. A secondary port for the connecting traffic (in this case, a test laptop) with the registration VLAN native.
A tertiary port for remediation, with the isolation VLAN native.
Or does Packet Fence require all pieces of the setup to work properly? I've attempted a similar set up to what I suggested and am unable to gain network access after registering. I don't know if this is a problem with my setup, or something the software can be configured to adapt for.

Please let me know if I am over-complicating things, as there may be an easier configuration for my needs.
Sorry for the long email, and thank you for your time.

Christian
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to