Hello Jason,

in packetfence-tunnel file (for 802.1x) in the section authorize, use:
update request {
         Tmp-String-0 := ¨EMPLOYEE¨
}

Then in the request forwarded to packetfence in the file 
/usr/local/pf/lib/pf/radius/custom.pm write your own authorize and 
_parseRequest function (copy it from radius.pm) and you should see 
_parseRequest($radius_request) this function must return a new attribute 
based of the radius attribute Tmp-String-0.

So with this new attribute you should be able to set a category for the 
node and then associate a category to a vlan id (vlan/custom.pm 
getNormalVlan)


Regards
Fabrice


  Le 2013-04-19 11:24, Jason 'XenoPhage' Frisvold a écrit :
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Hi there,
>
>       I'm *almost* there with my packetfence implementation.  At least,
> phase 1 ..  I have RADIUS talking to LDAP now.  The 802.1x user is
> passed to the ldap browser account, the full DN is returned, and then
> the user account is verified.  The problem I'm having right now is
> that despite having a correct login, packetfence is still denying the
> user.
>
>       I believe I still need just a bit more configuration in RADIUS to
> make this work.  Specifically, my LDAP users are group members, and
> I'd like to have packetfence put the user into a specific VLAN based
> on group membership.  I do this for our VPN concentrator by placing
> the group information into the RADIUS users file, something like this :
>
> DEFAULT Ldap-Group == "cn=employee,ou=groups,o=myorg"
>          Class = EMPLOYEE
>
>       EMPLOYEE is the name of the VLAN, which the VPN concentrator maps to
> a specific IP Pool for users.  I can easily do this in RADIUS for
> packetfence, but I'm not sure how to map the class to the vlan on the
> packetfence side.  Can someone please point me in the right direction?
>
> Thanks,
>
> - -- 
> - ---------------------------
> Jason 'XenoPhage' Frisvold
> [email protected]
> - ---------------------------
>
> "Any sufficiently advanced magic is indistinguishable from technology.\"
> - - Niven's Inverse of Clarke's Third Law
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.13 (GNU/Linux)
> Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
>
> iEYEARECAAYFAlFxYb0ACgkQO80o6DJ8UvmITgCeO3f0c8O1/1bmW010mR4+OIlp
> 7hoAniq+389ip3EA4ADeDcUEFLp9hsfu
> =6leK
> -----END PGP SIGNATURE-----
>
> ------------------------------------------------------------------------------
> Precog is a next-generation analytics platform capable of advanced
> analytics on semi-structured data. The platform includes APIs for building
> apps and a phenomenal toolset for data science. Developers can use
> our toolset for easy data analysis & visualization. Get a free account!
> http://www2.precog.com/precogplatform/slashdotnewsletter
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users


-- 
Fabrice Durand
[email protected] ::  +1.514.447.4918 (x135) ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org)


------------------------------------------------------------------------------
Precog is a next-generation analytics platform capable of advanced
analytics on semi-structured data. The platform includes APIs for building
apps and a phenomenal toolset for data science. Developers can use
our toolset for easy data analysis & visualization. Get a free account!
http://www2.precog.com/precogplatform/slashdotnewsletter
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to