Hi there,

I am trying to setup Packetfence 4 to do Inline enforcement (as I have some unmanaged switches) and so I went to work on Saturday to try and set it up, so this is the setup:

Cisco ASA Firewall internal IP address 192.168.10.1
Packetfence ETH1 will be route to firewall through which all traffic will go from my wired and wireless subnets (192.168.16.0/24 and 192.168.15.0/24) - IP address 192.168.10.254
ETH0 Management is 192.168.16.254

I set on my core switch default gateway to be 192.168.16.254.

My issue is that I can't ping 192.168.10.254 from the core switch.

From the firewall I can ping 192.168.16.254 so it is routing that way but can't seem to get further.

From the Packetfence I can ping 8.8.8.8 (so get to the internet), but DNS works but probably just need to add DNS server to ifcfg-eth1 or whatever.

Here are my conf files:

[general]
#
# general.domain
#
# Domain name of PacketFence system.
domain=cmcrc.com
#
# general.dnsservers
#
# Comma-delimited list of DNS servers.  Passthroughs are created to allow queries to these servers from even "trapped" nodes.
dnsservers=192.168.16.77,192.168.16.40,172.16.16.98
#
# general.dhcpservers
#
# Comma-delimited list of DHCP servers.  Passthroughs are created to allow DHCP transactions from even "trapped" nodes.
dhcpservers=192.168.16.77,192.168.15.250
#
# general.timezone
#
# System's timezone in string format. Supported list:
timezone=Australia/Sydney

#[registration]
#auth=ldap
[trapping]
#
# trapping.range
#
# Comma-delimited list of address ranges/CIDR blocks that PacketFence will monitor/detect/trap on.  Gateway, network, and
# broadcast addresses are ignored.
range=192.168.15.0/24,192.168.16.0/24,172.16.0.0/22
#
# trapping.whitelist
#
# Comma-delimited list of MAC addresses that are immune to isolation. In
# inline enforcement, the firewall is opened for them as if they were
# registered. This "feature" will probably be reworked in the future.
whitelist=192.168.16.40,192.168.16.77,192.168.16.98
#
# trapping.detection
#
#
# Enables snort-based worm detection.  If you don't have a span interface available, don't bother enabling it.  If you do,
# you'll most definately want this on.
detection=enabled
#
# trapping.detection_engine
#
# Let you choose from our supported IDS: snort or suricata
#
detection_engine=suricata
#
# trapping.wireless_ips
#
# Enable wids trapping detection
wireless_ips=enabled

[registration]
#
# registration.range
#
#
range=192.168.15.0/24,192.168.16.0/24,172.16.0.0/22
#
# registration.nbregpages
#
# The number of registration pages to show to the user
nbregpages=1

#[guests_self_registration]
#modes=email,sms,sponsor
[alerting]
#
# alerting.emailaddr
#
# Email address to which notifications of rogue DHCP servers, violations with an action of "email", or any other
# PacketFence-related message goes to.
#
# alerting.fromaddr
#
# Source email address for email notifications. Empty means root@<server-domain-name>.
# Source email address for email notifications. Empty means root@<server-domain-name>.

[scan]
#
# scan.engine
#
# Which scan engine to use to perform client-side policy compliance.
engine=openvas
#
# scan.registration
#
# If this option is enabled, the PF system will scan each host after
# registration is complete.
registration=enabled
#
# scan.user
#
# Username to log into scanning engine with.
user=sysadmin
#
# scan.pass
#
# Password to log into scanning engine with.
pass=C@p1t@lsys!
#
# scan.openvas_configid
#
# ID of the scanning configuration on the OpenVAS server
openvas_configid=daba56c8-73ec-11df-a475-002264764cea
#
# scan.openvas_reportformatid
#
# ID of the .NBE report format on the OpenVAS server
openvas_reportformatid=9ca6fe72-1f62-11e1-9e7c-406186ea4fc5

[database]
#
# database.pass
#
# Password for the mysql database used by PacketFence.
pass=5Zs4LecTxvkXhp

[inline]
#
# inline.should_reauth_on_vlan_change
# Should have to reauthenticate the node if it change vlan
should_reauth_on_vlan_change=enabled
#
# inline.interfaceSNAT
# Choose the interface(s) you want to use to enable snat (by default it´s the management interface)
interfaceSNAT=eth1

[captive_portal]
#
# captive_portal.network_detection_ip
#
# This IP is used as the webserver who hosts the common/network-access-detection.gif which is used to detect if network
# access was enabled.
# It cannot be a domain name since it is used in registration or quarantine where DNS is blackholed.
# It is recommended that you allow your users to reach your packetfence server and put your LAN's PacketFence IP.
# By default we will make this reach PacketFence's website as an easy solution.
#
network_detection_ip=192.168.16.254

[provisioning]
#
# provisioning.autoconfig
#
# Enable or disable the XML mobile config generation for wireless on iPhones, iPods, and iPads
autoconfig=enabled

[interface eth1]
enforcement=inline
ip=192.168.10.254
type=internal
mask=255.255.255.0

[interface eth2]
type=monitor

[interface eth0]
ip=192.168.16.254
type=management
mask=255.255.255.0
enforcement=

[interface eth0.3]
mask=255.255.255.0
type=dhcp-listener
gateway=192.168.15.250
ip=192.168.15.252
snmptrapd_binary=/usr/sbin/snmptrapd
# services.radiusd
#
# Should radiusd be managed by PacketFence?
radiusd=enabled
#
# services.snort_binary
#
# Location of the snort binary. Only necessary to change if you are not running the RPMed version.
snort_binary=/usr/sbin/snort
#
# services.suricata_binary
#
# Location of the suricata binary.
suricata_binary=/usr/bin/suricata
#
# services.httpd_binary
#
# Location of the apache binary. Only necessary to change if you are not running the RPMed version.
httpd_binary=/usr/sbin/httpd
#
# services.dhcpd_binary
#
# Location of the dhcpd binary. Only necessary to change if you are not running the RPMed version.
dhcpd_binary=/usr/sbin/dhcpd
#
# services.named_binary
#
# Location of the named binary. Only necessary to change if you are not running the RPMed version.
named_binary=/usr/sbin/named

Networks.conf

[172.16.0.0]
dns=192.168.16.77
dhcp_start=172.16.0.10
gateway=172.16.0.254
named=enabled
dhcp_max_lease_time=86400
dhcpd=enabled
type=vlan_registration
netmask=255.255.252.0
dhcp_end=172.16.0.246
dhcp_default_lease_time=86400
domain-name=vlan_registration.cmcrc.com

[192.168.30.0]
dns=192.168.16.77
dhcp_start=192.168.30.10
gateway=192.168.30.254
named=enabled
dhcp_max_lease_time=86400
dhcpd=enabled
type=vlan_isolation
netmask=255.255.255.0
dhcp_end=192.168.30.246
dhcp_default_lease_time=86400
domain-name=vlan_isolation.cmcrc.com

[192.168.10.0]
dns=192.168.16.77
dhcp_start=192.168.10.10
gateway=192.168.10.254
domain-name=inline.cmcrc.com
named=enabled
dhcp_max_lease_time=86400
dhcpd=enabled
type=inline
netmask=255.255.255.0
dhcp_end=192.168.10.246
dhcp_default_lease_time=86400

Switches.conf which I understand in my situation is not required.

#
# Copyright 2006-2008 Inverse inc.
#
# See the enclosed file COPYING for license information (GPL).
# If you did not receive this file, see

[default]
vlans = 1,2,3,4,5
normalVlan = 1
registrationVlan = 2
isolationVlan = 3
macDetectionVlan = 4
voiceVlan = 5
inlineVlan = 6
inlineTrigger =
normalRole = normal
registrationRole = registration
isolationRole = isolation
macDetectionRole = macDetection
voiceRole = voice
inlineRole = inline
VoIPEnabled = no

mode = testing
macSearchesMaxNb = 30
macSearchesSleepInterval = 2
uplink = dynamic

#
# Command Line Interface
#
# cliTransport could be: Telnet, SSH or Serial
cliTransport = Telnet
cliUser =
cliPwd =
cliEnablePwd =

#
# SNMP section
#

# PacketFence -> Switch
SNMPVersion = 1
SNMPCommunityRead = public
SNMPCommunityWrite = private
#SNMPEngineID = 0000000000000
#SNMPUserNameRead = readUser
#SNMPAuthProtocolRead = MD5
#SNMPAuthPasswordRead = authpwdread
#SNMPPrivProtocolRead = DES
#SNMPPrivPasswordRead = privpwdread
#SNMPUserNameWrite = writeUser
#SNMPAuthProtocolWrite = MD5
#SNMPAuthPasswordWrite = authpwdwrite
#SNMPPrivProtocolWrite = DES
#SNMPPrivPasswordWrite = privpwdwrite

# Switch -> PacketFence
SNMPVersionTrap = 1
SNMPCommunityTrap = public
#SNMPAuthProtocolTrap = MD5
#SNMPAuthPasswordTrap = authpwdread
#SNMPPrivProtocolTrap = DES
#SNMPPrivPasswordTrap = privpwdread

#
# Web Services Interface
#
# wsTransport could be: http or https
wsTransport = http
wsUser =
wsPwd =
#
# RADIUS NAS Client config
#
# RADIUS shared secret with switch
radiusSecret=

[192.168.0.1]
type = Cisco::Catalyst_2900XL
mode = production
uplink = 23,24
#SNMPVersion = 3
#SNMPEngineID = 0000000000000
#SNMPUserNameRead = readUser
#SNMPAuthProtocolRead = MD5
#SNMPAuthPasswordRead = authpwdread
#SNMPPrivProtocolRead = DES
#SNMPPrivPasswordRead = privpwdread
#SNMPUserNameWrite = writeUser
#SNMPAuthProtocolWrite = MD5
#SNMPAuthPasswordWrite = authpwdwrite
#SNMPPrivProtocolWrite = DES
#SNMPPrivPasswordWrite = privpwdwrite
#SNMPVersionTrap = 3
#SNMPUserNameTrap = readUser
#SNMPAuthProtocolTrap = MD5
#SNMPAuthPasswordTrap = authpwdread
#SNMPPrivProtocolTrap = DES
#SNMPPrivPasswordTrap = privpwdread


Any help gratefully received!


Alastair Ferguson
IT Manager
Capital Markets CRC Limited (CMCRC)
Telephone: +61 2 8088 4222
Mobile: +61 424 235 159
Fax: +61 2 8088 4201
www.cmcrc.com 



Capital Markets CRC Ltd - Confidential Communication
The information contained in this e-mail is confidential.  It is intended for the addressee only.  If you receive this e-mail by mistake please promptly inform us by reply e-mail and then delete the e-mail and destroy any printed copy. You must not disclose or use in any way the information in the e-mail. There is no warranty that this e-mail is error or virus free. It may be a private communication, and if so, does not represent the views of the CMCRC and its associates.  If it is a private communication, care should be taken in opening it to ensure that undue offence is not given.



------------------------------------------------------------------------------
How ServiceNow helps IT people transform IT departments:
1. A cloud service to automate IT design, transition and operations
2. Dashboards that offer high-level views of enterprise services
3. A single system of record for all IT processes
http://p.sf.net/sfu/servicenow-d2d-j
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to