First: Putting back the list in CC. Please keep answering the list, not my 
personnal email.

Second: The device is put in VLAN 700 on the controller side ? Do you already 
had this setup (assigning VLAN by name to your Cisco) by the past ? If so, what 
was the VSA used to pass the dvz-user-11 parameter ?

Derek

--
Derek Wuelfrath
[email protected] :: +1.514.447.4918 (x110) :: www.inverse.ca
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence 
(www.packetfence.org)

On 2013-08-21, at 4:01 AM, Manfred Kruse <[email protected]> wrote:

> I'm sorry for the missing information...
> 
> As far as I can see, the problem is that the radius offers 
> "Tunnel-Private-Group-Id:0" two times. First with VLAN 700 and the     second 
> with "dvz-user-11".
> 
> My radius authenticates users through ldap and assigns the VLAN by name. In 
> this case "dvz-user-11" will assign VLAN 120.
> Here are some configs and logs. If you need other information, please tell me 
> which one.
> 
> Interface config:
> interface GigabitEthernet2/1
>  description Test_packetfence1
>  switchport access vlan 2
>  switchport mode access
>  authentication host-mode multi-domain
>  authentication order dot1x mab
>  authentication priority dot1x mab
>  authentication port-control auto
>  authentication periodic
>  authentication timer restart 10800
>  authentication timer reauthenticate 10800
>  mab
>  no snmp trap link-status
>  dot1x pae authenticator
>  dot1x timeout quiet-period 2
>  dot1x timeout tx-period 3
> 
> switches.conf:
> [10.11.251.199]
> mode=production
> guestVlan=
> triggerInline=
> deauthMethod=RADIUS
> type=Cisco::Catalyst_4500
> macDetectionVlan=2
> isolationVlan=701
> radiusSecret=password
> uplink=dynamic
> registrationVlan=700
> inlineVlan=703
> 
> 
> packetfence-tunnel:
> server packetfence-tunnel {
> 
> authorize {
>         ldap
>         suffix
>         ntdomain
>         eap {
>                 ok = return
>         }
>         files
>         expiration
>         logintime
>         packetfence
> }
> 
> authenticate {
>         Auth-Type MS-CHAP {
>                 mschap
>         }
>         eap
> }
> 
> session {
>         radutmp
> }
> 
> post-auth {
>         exec
>         packetfence
>         Post-Auth-Type REJECT {
>                 attr_filter.access_reject
>         }
> }
> 
> pre-proxy {
> }
> 
> post-proxy {
>         eap
> }
> } # packetfence-tunnel server block
> 
> 
> Cisco Switch:
> Aug 21 10:12:06 CEST: %AUTHMGR-5-START: Starting 'dot1x' for client 
> (0023.ae85.cce8) on Interface Gi2/1 AuditSessionID 0A0BFBC700000B8EE255179A
> Aug 21 10:12:07 CEST: %DOT1X-5-SUCCESS: Authentication successful for client 
> (0023.ae85.cce8) on Interface Gi2/1 AuditSessionID 0A0BFBC700000B8EE255179A
> Aug 21 10:12:07 CEST: %AUTHMGR-7-RESULT: Authentication result 'success' from 
> 'dot1x' for client (0023.ae85.cce8) on Interface Gi2/1 AuditSessionID 
> 0A0BFBC700000B8EE255179A
> Aug 21 10:12:07 CEST: %AUTHMGR-5-VLANASSIGN: VLAN 120 assigned to Interface 
> Gi2/1 AuditSessionID 0A0BFBC700000B8EE255179A
> Aug 21 10:12:08 CEST: %AUTHMGR-5-SUCCESS: Authorization succeeded for client 
> (0023.ae85.cce8) on Interface Gi2/1 AuditSessionID 0A0BFBC700000B8EE255179A
> Aug 21 10:12:08 CEST: %LINK-3-UPDOWN: Interface GigabitEthernet2/1, changed 
> state to up
> Aug 21 10:12:09 CEST: %LINEPROTO-5-UPDOWN: Line protocol on Interface 
> GigabitEthernet2/1, changed state to up
> 
> 
> packetfence.log:
> Aug 21 09:12:07 pf::WebAPI(11569) INFO: handling radius autz request: from 
> switch_ip => 10.11.251.199, connection_type => Ethernet-EAP mac => 
> 00:23:ae:85:cc:e8, port => 50201, username => fhms250288 
> (pf::radius::authorize)
> Aug 21 09:12:07 pf::WebAPI(11569) INFO: MAC: 00:23:ae:85:cc:e8 is of status 
> unreg; belongs into registration VLAN (pf::vlan::getRegistrationVlan)
> Aug 21 09:12:07 pf::WebAPI(11569) WARN: Role-based Network Access Control is 
> not supported on network device type     pf::SNMP::Cisco::Catalyst_4500.  
> (pf::SNMP::supportsRoleBasedEnforcement)
> 
> 
> Radius log:
> rlm_perl: Returning vlan 700 to request from 00:23:ae:85:cc:e8 port 50201
> rlm_perl: PacketFence RESULT RESPONSE CODE: 2 (2 means OK)
> rlm_perl: Added pair NAS-Port-Type = Ethernet
> rlm_perl: Added pair Service-Type = Framed-User
> rlm_perl: Added pair State = 0x25b4bf4424bca58d40aa891c80b9057d
> rlm_perl: Added pair Called-Station-Id = E8-B7-48-6D-77-40
> rlm_perl: Added pair Calling-Station-Id = 00-23-AE-85-CC-E8
> rlm_perl: Added pair FreeRADIUS-Proxied-To = 127.0.0.1
> rlm_perl: Added pair Cisco-AVPair = audit-session-id=0A0BFBC700000B8EE255179A
> rlm_perl: Added pair User-Name = fhms250288
> rlm_perl: Added pair EAP-Message = 0x020800061a03
> rlm_perl: Added pair NAS-Port = 50201
> rlm_perl: Added pair NAS-IP-Address = 10.11.251.199
> rlm_perl: Added pair EAP-Type = MS-CHAP-V2
> rlm_perl: Added pair Framed-MTU = 1500
> rlm_perl: Added pair NAS-Port-Id = GigabitEthernet2/1
> rlm_perl: Added pair MS-MPPE-Send-Key = 0x8e62b829d4be00146a4c4e81aad73271
> rlm_perl: Added pair MS-MPPE-Encryption-Types = 0x00000006
> rlm_perl: Added pair Tunnel-Type = 13
> rlm_perl: Added pair Tunnel-Medium-Type = 6
> rlm_perl: Added pair MS-MPPE-Encryption-Policy = 0x00000001
> rlm_perl: Added pair Message-Authenticator = 
> 0x00000000000000000000000000000000
> rlm_perl: Added pair Tunnel-Private-Group-ID = 700
> rlm_perl: Added pair User-Name = fhms250288
> rlm_perl: Added pair MS-MPPE-Recv-Key = 0x17a462a2f0aff05b03c2b03032fcd564
> rlm_perl: Added pair EAP-Message = 0x03080004
> rlm_perl: Added pair Tunnel-Private-Group-Id = dvz-user-11
> rlm_perl: Added pair NT-Password = 
> 0x4245434543414342453043313544374143343643303538354132393444373230
> rlm_perl: Added pair LM-Password = 
> 0x4233344345353232433345344338373734313745414635304346414332394333
> rlm_perl: Added pair Password-With-Header = 
> {SSHA}E36341idst8rYvurwLO3G3guGAl47tlB
> rlm_perl: Added pair Ldap-UserDn = 
> uid=fhms250288,ou=people,dc=fh-muenster,dc=de
> rlm_perl: Added pair Auth-Type = EAP
> ++[packetfence] returns ok
> } # server packetfence-tunnel
> [peap] Got tunneled reply code 2
>         MS-MPPE-Send-Key = 0x8e62b829d4be00146a4c4e81aad73271
>         MS-MPPE-Encryption-Types = 0x00000006
>         Tunnel-Type:0 = VLAN
>         Tunnel-Medium-Type:0 = IEEE-802
>         MS-MPPE-Encryption-Policy = 0x00000001
>         Message-Authenticator = 0x00000000000000000000000000000000
>         Tunnel-Private-Group-Id:0 = "700"
>         User-Name = "fhms250288"
>         MS-MPPE-Recv-Key = 0x17a462a2f0aff05b03c2b03032fcd564
>         EAP-Message = 0x03080004
>         Tunnel-Private-Group-Id:0 = "dvz-user-11"
> [peap] Got tunneled reply RADIUS code 2
>         MS-MPPE-Send-Key = 0x8e62b829d4be00146a4c4e81aad73271
>         MS-MPPE-Encryption-Types = 0x00000006
>         Tunnel-Type:0 = VLAN
>         Tunnel-Medium-Type:0 = IEEE-802
>         MS-MPPE-Encryption-Policy = 0x00000001
>         Message-Authenticator = 0x00000000000000000000000000000000
>         Tunnel-Private-Group-Id:0 = "700"
>         User-Name = "fhms250288"
>         MS-MPPE-Recv-Key = 0x17a462a2f0aff05b03c2b03032fcd564
>         EAP-Message = 0x03080004
>         Tunnel-Private-Group-Id:0 = "dvz-user-11"
> [peap] Tunneled authentication was successful.
> [peap] SUCCESS
> [peap] Saving tunneled attributes for later
> ++[eap] returns handled
> } # server packetfence
> Sending Access-Challenge of id 211 to 10.11.251.199 port 1645
>         EAP-Message = 
> 0x0109002b19001703010020d7ead58cadb36c1522054afcf75f9fdf2aea742625ac3ad7ef65521e8310a13c
>         Message-Authenticator = 0x00000000000000000000000000000000
>         State = 0x400b87c947029ed7a3d8631e2047bbf1
> Finished request 16.
> Going to the next request
> Waking up in 4.6 seconds.
> rad_recv: Access-Request packet from host 10.11.251.199 port 1645, id=212, 
> length=252
>         User-Name = "fhms250288"
>         Service-Type = Framed-User
>         Framed-MTU = 1500
>         Called-Station-Id = "E8-B7-48-6D-77-40"
>         Calling-Station-Id = "00-23-AE-85-CC-E8"
>         EAP-Message = 
> 0x0209002b190017030100206cd1de9ebd4e2268d0973c653e05fe89f1e022fe3a155399dc3510b9390ef53b
>         Message-Authenticator = 0x5e29cb7c3146bebddc8a7ddfa1007779
>         Cisco-AVPair = "audit-session-id=0A0BFBC700000B8EE255179A"
>         NAS-Port-Type = Ethernet
>         NAS-Port = 50201
>         NAS-Port-Id = "GigabitEthernet2/1"
>         State = 0x400b87c947029ed7a3d8631e2047bbf1
>         NAS-IP-Address = 10.11.251.199
> server packetfence {
> # Executing section authorize from file 
> /usr/local/pf/raddb//sites-enabled/packetfence
> +- entering group authorize {...}
> [suffix] No '@' in User-Name = "fhms250288", looking up realm NULL
> [suffix] No such realm "NULL"
> ++[suffix] returns noop
> ++[preprocess] returns ok
> [eap] EAP packet type response id 9 length 43
> [eap] Continuing tunnel setup.
> ++[eap] returns ok
> Found Auth-Type = EAP
> # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence
> +- entering group authenticate {...}
> [eap] Request found, released from the list
> [eap] EAP/peap
> [eap] processing type peap
> [peap] processing EAP-TLS
> [peap] eaptls_verify returned 7
> [peap] Done initial handshake
> [peap] eaptls_process returned 7
> [peap] EAPTLS_OK
> [peap] Session established.  Decoding tunneled attributes.
> [peap] Peap state send tlv success
> [peap] Received EAP-TLV response.
> [peap] Success
> [peap] Using saved attributes from the original Access-Accept
>         Tunnel-Type:0 = VLAN
>         Tunnel-Medium-Type:0 = IEEE-802
>         Tunnel-Private-Group-Id:0 = "700"
>         User-Name = "fhms250288"
>         Tunnel-Private-Group-Id:0 = "dvz-user-11"
> [eap] Freeing handler
> ++[eap] returns ok
> Login OK: [fhms250288] (from client 10.11.251.199 port 50201 cli 
> 00-23-AE-85-CC-E8)
> # Executing section post-auth from file 
> /usr/local/pf/raddb//sites-enabled/packetfence
> +- entering group post-auth {...}
> ++[exec] returns noop
> ++? if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25))
> ? Evaluating !(EAP-Type ) -> FALSE
> ?? Evaluating (EAP-Type != 21 ) -> TRUE
> ?? Evaluating (EAP-Type != 25) -> FALSE
> ++? if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25)) -> FALSE
> } # server packetfence
> Sending Access-Accept of id 212 to 10.11.251.199 port 1645
>         Tunnel-Type:0 = VLAN
>         Tunnel-Medium-Type:0 = IEEE-802
>         Tunnel-Private-Group-Id:0 = "700"
>         User-Name = "fhms250288"
>         Tunnel-Private-Group-Id:0 = "dvz-user-11"
>         MS-MPPE-Recv-Key = 
> 0xc51a61abd244b11b786e44ce28da6873249f78c428013ddaa49141a1b8200cb3
>         MS-MPPE-Send-Key = 
> 0x67e0b005a8a668a0d04b9b00abf8a71b389a7268836d36b733db16bda718d1b1
>         EAP-Message = 0x03090004
>         Message-Authenticator = 0x00000000000000000000000000000000
> Finished request 17.
> 
> Greetings!
> Manfred Kruse
> -- 
> Herr Manfred Kruse
> Netzwerkadministrator
> Datenverarbeitungszentrale
> Netzwerk-Infrastruktur, Netzwerkdienste
> Fachhochschule Münster
> – University of Applied Sciences –
> Corrensstr. 25
> D-48149 Münster
> Fon: (49)0251 / 83 - 64942
> Fax: (49)0251 / 83 - 64910
> mail: [email protected]
> www.fh-muenster.de/dvz/index.php

------------------------------------------------------------------------------
Introducing Performance Central, a new site from SourceForge and 
AppDynamics. Performance Central is your source for news, insights, 
analysis and resources for efficient Application Performance Management. 
Visit us today!
http://pubads.g.doubleclick.net/gampad/clk?id=48897511&iu=/4140/ostg.clktrk
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to