I amd sorry...
 
I was trying to attach. Configuration file. 
 
-----------------------------------------
Hi,
 
I have configured that One switch(cisco 2960) and PF servers on Ubuntu 13.04 
and test windows7 PC ...
 
now, 1) plugged test windows PC (DHCP) on my switch 
        2) switch VLAN 4(MAC Detection) -> VLAN 2(Registration)... that's OK.
 
3) Test PC Open web browser but...Captive Portal not open.      
<----------prob 1.
 
4) unplugged the Test PC's LAN cable.... switch 'linkDown' message popup..
 
5) I looked at the switch. But....VLAN still did not change(VLAN 2.....).      
<----------prob 2.
-------------------------------------------------
 
 
switches.conf
 
#
# Copyright 2006-2008 Inverse inc.
#
# See the enclosed file COPYING for license information (GPL).
# If you did not receive this file, see
# http://www.fsf.org/licensing/licenses/gpl.html
[default]
vlans=1,2,3,4,5
normalVlan=1
registrationVlan=2
isolationVlan=3
macDetectionVlan=4
voiceVlan=5
inlineVlan=6
inlineTrigger=
normalRole=normal
registrationRole=registration
isolationRole=isolation
macDetectionRole=macDetection
voiceRole=voice
inlineRole=inline
VoIPEnabled=N
mode=testing
macSearchesMaxNb=30
macSearchesSleepInterval=2
SNMPCommunityRead=public
SNMPCommunityWrite=public
SNMPCommunityTrap=public
#
# Command Line Interface 
#
# cliTransport could be: Telnet, SSH or Serial
cliTransport=Telnet
#SNMPEngineID = 0000000000000
#SNMPUserNameRead = readUser
#SNMPAuthProtocolRead = MD5
#SNMPAuthPasswordRead = authpwdread
#SNMPPrivProtocolRead = DES 
#SNMPPrivPasswordRead = privpwdread
#SNMPUserNameWrite = writeUser
#SNMPAuthProtocolWrite = MD5
#SNMPAuthPasswordWrite = authpwdwrite
#SNMPPrivProtocolWrite = DES 
#SNMPPrivPasswordWrite = privpwdwrite
# Switch -> PacketFence
SNMPVersionTrap=1
type=Accton::ES3526XA
SNMPVersion=1
 
[192.168.1.1]
mode=production
deauthMethod=SNMP
registrationRole=Registration
type=Cisco::Catalyst_2960G
uplink=24
cliPwd=toor123!@#
cliEnablePwd=toor123!@#
#SNMPVersion = 3
#SNMPEngineID = 0000000000000
#SNMPUserNameRead = readUser
#SNMPAuthProtocolRead = MD5
#SNMPAuthPasswordRead = authpwdread
#SNMPPrivProtocolRead = DES 
#SNMPPrivPasswordRead = privpwdread
#SNMPUserNameWrite = writeUser
#SNMPAuthProtocolWrite = MD5
#SNMPAuthPasswordWrite = authpwdwrite
#SNMPPrivProtocolWrite = DES 
#SNMPPrivPasswordWrite = privpwdwrite
#SNMPVersionTrap = 3
#SNMPUserNameTrap = readUser
#SNMPAuthProtocolTrap = MD5
#SNMPAuthPasswordTrap = authpwdread
#SNMPPrivProtocolTrap = DES
#SNMPPrivPasswordTrap = privpwdread

 
 
 
 
pf.conf
 
[general]
#
# general.domain
#
# Domain name of PacketFence system.
domain=192.168.2.1
#
# general.dhcpservers
#
# Comma-delimited list of DHCP servers.  Passthroughs are created to allow DHCP 
transactions from even "trapped" nodes.
dhcpservers=192.168.2.1,192.168.3.1
 
[alerting]
#
# alerting.emailaddr
#
# Email address to which notifications of rogue DHCP servers, violations with 
an action of "email", or any other 
# PacketFence-related message goes to.
[email protected]
 
[database]
#
# database.pass
#
# Password for the mysql database used by PacketFence.
pass=toor123!@#
 
[captive_portal]
#
# captive_portal.network_detection_ip
#
# This IP is used as the webserver who hosts the 
common/network-access-detection.gif which is used to detect if network
# access was enabled. 
# It cannot be a domain name since it is used in registration or quarantine 
where DNS is blackholed.
# It is recommended that you allow your users to reach your packetfence server 
and put your LAN's PacketFence IP.
# By default we will make this reach PacketFence's website as an easy solution.
#
network_detection_ip=192.168.2.1
 
[interface eth2]
ip=192.168.1.5
type=management
mask=255.255.255.0
 
[interface eth2.2]
enforcement=vlan
ip=192.168.2.1
type=internal
mask=255.255.255.0
 
[interface eth2.3]
enforcement=vlan
ip=192.168.3.1
type=internal
mask=255.255.255.0





switch configuration...
pf2960#sh running-configBuilding configuration...
Current configuration : 2719 bytes!! Last configuration change at 00:20:12 UTC 
Mon Mar 1 1993!version 12.2no service padservice timestamps debug datetime 
msecservice timestamps log datetime msecno service password-encryption!hostname 
pf2960!boot-start-markerboot-end-marker!enable secret 5 
$1$4GZA$qBvlLebCG./NEHXxIwQ8/1enable password toor123!@#!no aaa new-modelsystem 
mtu routing 1500!!cluster enable pf 0!!!!!!spanning-tree mode pvstspanning-tree 
extend system-id!vlan internal allocation policy ascending!!!!!!interface 
GigabitEthernet0/1 switchport access vlan 2 switchport mode access switchport 
port-security maximum 1 vlan access switchport port-security switchport 
port-security violation restrict switchport port-security mac-address 
0022.195d.2940!interface GigabitEthernet0/2 switchport access vlan 4 switchport 
mode access switchport port-security maximum 1 vlan access switchport 
port-security switchport port-security violation restrict switchport 
port-security mac-address 0200.0001.0102!interface GigabitEthernet0/3 
switchport access vlan 2 switchport mode access switchport port-security 
maximum 1 vlan access switchport port-security switchport port-security 
violation restrict switchport port-security mac-address 
0200.0001.0103!interface GigabitEthernet0/4 switchport access vlan 4 switchport 
mode access switchport port-security maximum 1 vlan access switchport 
port-security switchport port-security violation restrict switchport 
port-security mac-address 0200.0001.0104!interface GigabitEthernet0/5 
switchport access vlan 2 switchport mode access!interface 
GigabitEthernet0/6!interface GigabitEthernet0/7!interface 
GigabitEthernet0/8!interface GigabitEthernet0/9!interface 
GigabitEthernet0/10!interface GigabitEthernet0/11!interface 
GigabitEthernet0/12!interface GigabitEthernet0/13!interface 
GigabitEthernet0/14!interface GigabitEthernet0/15!interface 
GigabitEthernet0/16!interface GigabitEthernet0/17!interface 
GigabitEthernet0/18!interface GigabitEthernet0/19!interface 
GigabitEthernet0/20!interface GigabitEthernet0/21!interface 
GigabitEthernet0/22!interface GigabitEthernet0/23!interface GigabitEthernet0/24 
switchport mode trunk!interface Vlan1 ip address 192.168.1.1 255.255.255.0!ip 
http serverip http secure-server!logging esm configsnmp-server community public 
RWsnmp-server enable traps port-securitysnmp-server enable traps port-security 
trap-rate 1snmp-server host 192.168.1.5 public  port-security!line con 0line 
vty 0 4 password toor123!@# loginline vty 5 15 password toor123!@# 
login!!monitor session 1 source interface Gi0/24monitor session 1 destination 
interface Gi0/23end
pf2960#
------------------------------------------------------------------------------
Get 100% visibility into Java/.NET code with AppDynamics Lite!
It's a free troubleshooting tool designed for production.
Get down to code-level detail for bottlenecks, with <2% overhead. 
Download for free and get started troubleshooting in minutes. 
http://pubads.g.doubleclick.net/gampad/clk?id=48897031&iu=/4140/ostg.clktrk
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to