Due to a dumb bug in Palo Alto Networks firewall OS (starting at version 5.0.3, 
DHCP replies broken for VLAN interfaces), I recently lost DHCP visibility for 
half of my PF clients. 

I see four potential sources of DHCP lease information for the iplog. I'm 
leaning towards #2, unless #1 already exists: 

    1. Radius accounting logs. Does PacketFence already take these into 
account? Could it? 
    2. Syslog. The firewall could send syslog packets including " dhcp lease 
started ip 137.22.254.189 --> mac 1c:2d:3e:4f:5a:6b, interface 
ethernet1/10.185" to PF and then I would write something a lot like 
pfdhcplistener to process them. Complication: Do the functions like 
iplog_open() and iplog_close_now() continue to exist in PF 4.0? 
    3. Forged DHCP packets. In theory, I could create a syslog listener that 
reinjected raw, forged DHCP packets into pfdhcplistener. 
    4. (R)SPAN port or ACL capture. This is substantially complicated by the 
firewall, Aruba hardware, and Cisco Nexus hardware that changes how ACL capture 
works. 


Should I spend some time on #2? 


I'm running a patched PacketFence 3.5 , to be 4.0 in June, probably. 
-- 

Rich Graves http://claimid.com/rcgraves 
Carleton.edu Sr UNIX and Security Admin 
------------------------------------------------------------------------------
Learn Graph Databases - Download FREE O'Reilly Book
"Graph Databases" is the definitive new guide to graph databases and 
their applications. This 200-page book is written by three acclaimed 
leaders in the field. The early access version is available now. 
Download your free book today! http://p.sf.net/sfu/neotech_d2d_may
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to