I amd sorry...
I was trying to attach. Configuration file.
-----------------------------------------
Hi,
I have configured that One switch(cisco 2960) and PF servers on Ubuntu 13.04
and test windows7 PC ...
now, 1) plugged test windows PC (DHCP) on my switch
2) switch VLAN 4(MAC Detection) -> VLAN 2(Registration)... that's OK.
3) Test PC Open web browser but...Captive Portal not open.
<----------prob 1.
4) unplugged the Test PC's LAN cable.... switch 'linkDown' message popup..
5) I looked at the switch. But....VLAN still did not change(VLAN 2.....).
<----------prob 2.
-------------------------------------------------
switches.conf
#
# Copyright 2006-2008 Inverse inc.
#
# See the enclosed file COPYING for license information (GPL).
# If you did not receive this file, see
# http://www.fsf.org/licensing/licenses/gpl.html
[default]
vlans=1,2,3,4,5
normalVlan=1
registrationVlan=2
isolationVlan=3
macDetectionVlan=4
voiceVlan=5
inlineVlan=6
inlineTrigger=
normalRole=normal
registrationRole=registration
isolationRole=isolation
macDetectionRole=macDetection
voiceRole=voice
inlineRole=inline
VoIPEnabled=N
mode=testing
macSearchesMaxNb=30
macSearchesSleepInterval=2
SNMPCommunityRead=public
SNMPCommunityWrite=public
SNMPCommunityTrap=public
#
# Command Line Interface
#
# cliTransport could be: Telnet, SSH or Serial
cliTransport=Telnet
#SNMPEngineID = 0000000000000
#SNMPUserNameRead = readUser
#SNMPAuthProtocolRead = MD5
#SNMPAuthPasswordRead = authpwdread
#SNMPPrivProtocolRead = DES
#SNMPPrivPasswordRead = privpwdread
#SNMPUserNameWrite = writeUser
#SNMPAuthProtocolWrite = MD5
#SNMPAuthPasswordWrite = authpwdwrite
#SNMPPrivProtocolWrite = DES
#SNMPPrivPasswordWrite = privpwdwrite
# Switch -> PacketFence
SNMPVersionTrap=1
type=Accton::ES3526XA
SNMPVersion=1
[192.168.1.1]
mode=production
deauthMethod=SNMP
registrationRole=Registration
type=Cisco::Catalyst_2960G
uplink=24
cliPwd=toor123!@#
cliEnablePwd=toor123!@#
#SNMPVersion = 3
#SNMPEngineID = 0000000000000
#SNMPUserNameRead = readUser
#SNMPAuthProtocolRead = MD5
#SNMPAuthPasswordRead = authpwdread
#SNMPPrivProtocolRead = DES
#SNMPPrivPasswordRead = privpwdread
#SNMPUserNameWrite = writeUser
#SNMPAuthProtocolWrite = MD5
#SNMPAuthPasswordWrite = authpwdwrite
#SNMPPrivProtocolWrite = DES
#SNMPPrivPasswordWrite = privpwdwrite
#SNMPVersionTrap = 3
#SNMPUserNameTrap = readUser
#SNMPAuthProtocolTrap = MD5
#SNMPAuthPasswordTrap = authpwdread
#SNMPPrivProtocolTrap = DES
#SNMPPrivPasswordTrap = privpwdread
pf.conf
[general]
#
# general.domain
#
# Domain name of PacketFence system.
domain=192.168.2.1
#
# general.dhcpservers
#
# Comma-delimited list of DHCP servers. Passthroughs are created to allow DHCP
transactions from even "trapped" nodes.
dhcpservers=192.168.2.1,192.168.3.1
[alerting]
#
# alerting.emailaddr
#
# Email address to which notifications of rogue DHCP servers, violations with
an action of "email", or any other
# PacketFence-related message goes to.
[email protected]
[database]
#
# database.pass
#
# Password for the mysql database used by PacketFence.
pass=toor123!@#
[captive_portal]
#
# captive_portal.network_detection_ip
#
# This IP is used as the webserver who hosts the
common/network-access-detection.gif which is used to detect if network
# access was enabled.
# It cannot be a domain name since it is used in registration or quarantine
where DNS is blackholed.
# It is recommended that you allow your users to reach your packetfence server
and put your LAN's PacketFence IP.
# By default we will make this reach PacketFence's website as an easy solution.
#
network_detection_ip=192.168.2.1
[interface eth2]
ip=192.168.1.5
type=management
mask=255.255.255.0
[interface eth2.2]
enforcement=vlan
ip=192.168.2.1
type=internal
mask=255.255.255.0
[interface eth2.3]
enforcement=vlan
ip=192.168.3.1
type=internal
mask=255.255.255.0
switch configuration...
pf2960#sh running-configBuilding configuration...
Current configuration : 2719 bytes!! Last configuration change at 00:20:12 UTC
Mon Mar 1 1993!version 12.2no service padservice timestamps debug datetime
msecservice timestamps log datetime msecno service password-encryption!hostname
pf2960!boot-start-markerboot-end-marker!enable secret 5
$1$4GZA$qBvlLebCG./NEHXxIwQ8/1enable password toor123!@#!no aaa new-modelsystem
mtu routing 1500!!cluster enable pf 0!!!!!!spanning-tree mode pvstspanning-tree
extend system-id!vlan internal allocation policy ascending!!!!!!interface
GigabitEthernet0/1 switchport access vlan 2 switchport mode access switchport
port-security maximum 1 vlan access switchport port-security switchport
port-security violation restrict switchport port-security mac-address
0022.195d.2940!interface GigabitEthernet0/2 switchport access vlan 4 switchport
mode access switchport port-security maximum 1 vlan access switchport
port-security switchport port-security violation restrict switchport
port-security mac-address 0200.0001.0102!interface GigabitEthernet0/3
switchport access vlan 2 switchport mode access switchport port-security
maximum 1 vlan access switchport port-security switchport port-security
violation restrict switchport port-security mac-address
0200.0001.0103!interface GigabitEthernet0/4 switchport access vlan 4 switchport
mode access switchport port-security maximum 1 vlan access switchport
port-security switchport port-security violation restrict switchport
port-security mac-address 0200.0001.0104!interface GigabitEthernet0/5
switchport access vlan 2 switchport mode access!interface
GigabitEthernet0/6!interface GigabitEthernet0/7!interface
GigabitEthernet0/8!interface GigabitEthernet0/9!interface
GigabitEthernet0/10!interface GigabitEthernet0/11!interface
GigabitEthernet0/12!interface GigabitEthernet0/13!interface
GigabitEthernet0/14!interface GigabitEthernet0/15!interface
GigabitEthernet0/16!interface GigabitEthernet0/17!interface
GigabitEthernet0/18!interface GigabitEthernet0/19!interface
GigabitEthernet0/20!interface GigabitEthernet0/21!interface
GigabitEthernet0/22!interface GigabitEthernet0/23!interface GigabitEthernet0/24
switchport mode trunk!interface Vlan1 ip address 192.168.1.1 255.255.255.0!ip
http serverip http secure-server!logging esm configsnmp-server community public
RWsnmp-server enable traps port-securitysnmp-server enable traps port-security
trap-rate 1snmp-server host 192.168.1.5 public port-security!line con 0line
vty 0 4 password toor123!@# loginline vty 5 15 password toor123!@#
login!!monitor session 1 source interface Gi0/24monitor session 1 destination
interface Gi0/23end
pf2960#
------------------------------------------------------------------------------
Get 100% visibility into Java/.NET code with AppDynamics Lite!
It's a free troubleshooting tool designed for production.
Get down to code-level detail for bottlenecks, with <2% overhead.
Download for free and get started troubleshooting in minutes.
http://pubads.g.doubleclick.net/gampad/clk?id=48897031&iu=/4140/ostg.clktrk
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users