Hello,

I've deployed Packetfence 3.6.1 with Cisco 3560 flawlessly (dot1x and mab
auth's).
I also have set periodic authentication and all works fine.

But the problem begins when I enable accounting on Cisco. Once the switch
try to perform the reauth against the client machine, packetfence says the
following:

radius.log:

Fri Dec 14 17:36:36 2012 : Auth: Login OK: [domain/I005466] (from client
192.168.72.254 port 50006 cli 54-04-A6-F4-84-A1 via TLS tunnel)
Fri Dec 14 17:36:36 2012 : Info: rlm_perl: MAC address is empty or invalid
in this request. It could be normal on certain radius calls
Fri Dec 14 17:36:36 2012 : Auth: Login OK: [domain/I005466] (from client
192.168.72.254 port 50006 cli 54-04-A6-F4-84-A1)

packetfence.log:

Dec 14 17:36:30 pf::WebAPI(3493) INFO: handling radius autz request: from
switch_ip => 192.168.72.254, connection_type => Ethernet-EAP mac =>
54:04:a6:f4:84:a1, port => 50006,
username => host/I005466.cartoons.com (pf::radius::authorize)
Dec 14 17:36:30 pf::WebAPI(3493) INFO: MAC: 54:04:a6:f4:84:a1, PID: 1,
Status: reg. Returned VLAN: 800 (pf::vlan::fetchVlanForNode)
Dec 14 17:36:30 pf::WebAPI(3493) WARN: Role-based Network Access Control is
not supported on network device type pf::SNMP::Cisco::Catalyst_3560.
(pf::SNMP::supportsRoleBasedEn
forcement)


even the packetfence log says that a vlan is returned, cisco don't get it,
and obviously, the client gets disconnected because no vlan is returned
from packetfence to the switch.

It only happens when the periodic reauthentication is enabled, because, on
a "clean" authentication (computer startup), the cisco sends correctly all
the accounting data to radius and I can see it on the PF node information.

Here some of Cisco config:

!
!
aaa group server radius packetfence
 server 192.168.72.253 auth-port 1812 acct-port 1813
!
aaa authentication login default local
aaa authentication dot1x default group packetfence
aaa authorization network default group packetfence
!
aaa session-id common
system mtu routing 1500
vtp mode transparent
authentication mac-move permit
!
!
...
!
interface FastEthernet0/6
 switchport mode access
 switchport voice vlan 120
 ip access-group 100 in
 srr-queue bandwidth share 10 10 60 20
 srr-queue bandwidth shape 10 0 0 0
 priority-queue out
 authentication host-mode multi-auth
 authentication order dot1x mab
 authentication priority dot1x mab
 authentication port-control auto
 authentication periodic
 authentication timer reauthenticate 1800
 mab
 mls qos trust device cisco-phone
 mls qos trust cos
 no snmp trap link-status
 dot1x pae authenticator
 dot1x timeout quiet-period 2
 dot1x timeout tx-period 3
 no mdix auto
 mac access-group DG in
 spanning-tree portfast
 service-policy input AutoQoS-Police-CiscoPhone
!

Thanks in advance!

Alex
------------------------------------------------------------------------------
Master Visual Studio, SharePoint, SQL, ASP.NET, C# 2012, HTML5, CSS,
MVC, Windows 8 Apps, JavaScript and much more. Keep your skills current
with LearnDevNow - 3,200 step-by-step video tutorials by Microsoft
MVPs and experts. ON SALE this month only -- learn more at:
http://p.sf.net/sfu/learnnow-d2d
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to