Hello all.

Regarding this issue, I've been searching for a while and I did found
others reporting similar issues (same errors in logs) but for some reason
didn't apply to my case.

The environment

PF is in Vlan enforcement mode. Although it's working, I'm aware that's not
the best configuration. I'm still learning :)

Native Vlan = 1
Guest Vlan = 10
Registration Vlan = 11


in PF.CONF

[interface eth1.10]
enforcement=inline
ip=192.168.70.2
type=dhcp-listener
mask=255.255.255.192
gateway=192.168.70.1

[interface eth1.11]
enforcement=vlan
ip=10.10.150.1
type=internal
mask=255.255.255.0


Aironet 1250 config


!
! Last configuration change at 05:51:46 UTC Thu Mar 4 1993
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname wifi02
!
logging rate-limit console 9
enable secret XXXXXXXXXXXXXXXXXXXXXXXXX
aaa new-model
!
!
aaa group server radius rad_eap

 server OTHER_RADIUS auth-port 1812 acct-port 1813
 server OTHER_RADIUS auth-port 1812 acct-port 1813
!
aaa group server radius rad_acct
!
aaa group server radius rad_admin
!
aaa group server tacacs+ tac_admin
!
aaa group server radius rad_pmip
!
aaa group server radius dummy
!
aaa group server radius rad_acct1
 server OTHER_RADIUS auth-port 1812 acct-port 1813
 server OTHER_RADIUS auth-port 1812 acct-port 1813
!
aaa group server radius rad_mac
 server PACKETFENCESRV auth-port 1812 acct-port 1813
!
aaa group server radius rad_mac3
 server PACKETFENCESRV auth-port 1812 acct-port 1813
!
aaa authentication login default local
aaa authentication login eap_methods group rad_eap
aaa authentication login mac_methods local
aaa authentication login mac_methods3 group rad_mac3
aaa authorization exec default local
aaa accounting network acct_methods start-stop group rad_acct
aaa accounting network acct_methods1 start-stop group rad_acct1
!
!
!
!
!
aaa session-id common
ip domain name act.XXXXXXXXXX

ip name-server xxx.xxx.xxx.xxx

ip name-server xxx.xxx.xxx.xxx

!
!
dot11 syslog
dot11 vlan-name Guest vlan 10
dot11 vlan-name Registration vlan 11
dot11 vlan-name Voice vlan 100
!
dot11 ssid TWGuest
   vlan 11 backup 10
   authentication open mac-address mac_methods3
   mbssid guest-mode
!
dot11 ssid CORPSECURE
   vlan 1
   authentication open eap eap_methods
   authentication key-management wpa version 2
   accounting acct_methods1
   mbssid guest-mode
!
dot11 ssid CORPVOIP

   vlan 100
   authentication open
   authentication key-management wpa version 2
   wpa-psk ascii 7 HEX_LON_ENC_PASS

!
dot11 aaa csid ietf
crypto pki token default removal timeout 0
!
!
username XXXXXXXX password 7 XXXXXXX

!
!
bridge irb
!
!
interface Dot11Radio0
 no ip address
 no ip route-cache
 !
 encryption vlan 1 mode ciphers aes-ccm tkip
 !
 encryption vlan 100 mode ciphers tkip
 !
 ssid TWGuest
 !
 ssid Tasko
 !
 ssid TaskoV
 !
 antenna gain 0
 mbssid
 speed  11.0 basic-12.0 basic-18.0 basic-24.0 basic-36.0 basic-48.0 basic-54.0
 station-role root
 world-mode dot11d country-code PT both
 no cdp enable
!
interface Dot11Radio0.1
 encapsulation dot1Q 1 native
 no ip route-cache
 bridge-group 1
 bridge-group 1 subscriber-loop-control
 bridge-group 1 spanning-disabled
 bridge-group 1 block-unknown-source
 no bridge-group 1 source-learning
 no bridge-group 1 unicast-flooding
!
interface Dot11Radio0.10
 encapsulation dot1Q 10
 no ip route-cache
 bridge-group 10
 bridge-group 10 subscriber-loop-control
 bridge-group 10 spanning-disabled
 bridge-group 10 block-unknown-source
 no bridge-group 10 source-learning
 no bridge-group 10 unicast-flooding
!
interface Dot11Radio0.11
 encapsulation dot1Q 11
 no ip route-cache
 bridge-group 11
 bridge-group 11 subscriber-loop-control
 bridge-group 11 spanning-disabled
 bridge-group 11 block-unknown-source
 no bridge-group 11 source-learning
 no bridge-group 11 unicast-flooding
!
interface Dot11Radio0.100
 encapsulation dot1Q 100
 no ip route-cache
 bridge-group 100
 bridge-group 100 subscriber-loop-control
 bridge-group 100 spanning-disabled
 bridge-group 100 block-unknown-source
 no bridge-group 100 source-learning
 no bridge-group 100 unicast-flooding
!
interface Dot11Radio1
 no ip address
 no ip route-cache
 shutdown
 antenna gain 0
 no dfs band block
 speed  basic-6.0 basic-9.0 basic-12.0 basic-18.0 basic-24.0
basic-36.0 basic-48.0 basic-54.0 m0. m1. m2. m3. m4. m5. m6. m7. m8.
m9. m10. m11. m12. m13. m14. m15.
 channel dfs
 station-role root
 no cdp enable
 bridge-group 1
 bridge-group 1 subscriber-loop-control
 bridge-group 1 spanning-disabled
 bridge-group 1 block-unknown-source
 no bridge-group 1 source-learning
 no bridge-group 1 unicast-flooding
!
interface GigabitEthernet0
 no ip address
 no ip route-cache
 duplex auto
 speed auto
!
interface GigabitEthernet0.1
 encapsulation dot1Q 1 native
 no ip route-cache
 bridge-group 1
 bridge-group 1 spanning-disabled
 no bridge-group 1 source-learning
!
interface GigabitEthernet0.10
 encapsulation dot1Q 10
 no ip route-cache
 bridge-group 10
 bridge-group 10 spanning-disabled
 no bridge-group 10 source-learning
!
interface GigabitEthernet0.11
 encapsulation dot1Q 11
 no ip route-cache
 bridge-group 11
 bridge-group 11 spanning-disabled
 no bridge-group 11 source-learning
!
interface GigabitEthernet0.100
 encapsulation dot1Q 100
 no ip route-cache
 bridge-group 100
 bridge-group 100 spanning-disabled
 no bridge-group 100 source-learning
!
interface BVI1
 ip address xxx.xxx.xxx.xxx xxx.xxx.xxx.0
 no ip route-cache
!
ip default-gateway xxx.xxx.xxx.xxx
ip http server
no ip http secure-server
ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
ip radius source-interface BVI1
access-list 111 permit tcp any any neq telnet
snmp-server view dot11view ieee802dot11 included
snmp-server community public RO
snmp-server community notpublic RW
snmp-server contact security@
snmp-server enable traps disassociate
snmp-server enable traps deauthenticate
snmp-server enable traps authenticate-fail
snmp-server enable traps dot11-qos
snmp-server enable traps switch-over
snmp-server enable traps rogue-ap
snmp-server enable traps wlan-wep
snmp-server enable traps aaa_server

snmp-server host PACKETFENCESRV version 2c public  disassociate
deauthenticate authenticate-fail
radius-server attribute 32 include-in-access-req format %h
radius-server host OTHER_RADIUS auth-port 1812 acct-port 1813 key 7 STRONG

radius-server host OTHER_RADIUS auth-port 1812 acct-port 1813 key 7 STRONG

radius-server host PACKETFENCESRV auth-port 1812 acct-port 1813 key 7 STRONG

radius-server deadtime 5
radius-server vsa send accounting
radius-server vsa send authentication
!
bridge 1 route ip
!
!
wlccp wds aaa csid ietf
!
line con 0
line vty 0 4
 transport input all
!
end



Logs from my Mobile Phone wifi connection

I've noted that AP send TWO CISCO-AVPair attributes. Since I don't know if
the last one "overwrite" the first I've searched on how to limit that
information but with no luck.

RADIUSD Debug



rad_recv: Access-Request packet from host 192.168.69.244 port 1645, id=16,
length=173
        User-Name = "0446655af9d5"
        User-Password = "0446655af9d5"
        Called-Station-Id = "00-23-5E-B0-38-00"
        Calling-Station-Id = "04-46-65-5A-F9-D5"
        Cisco-AVPair = "ssid=TWGuest"
        Service-Type = Login-User
        Cisco-AVPair = "service-type=Login"
        NAS-Port-Type = Wireless-802.11
        NAS-Port = 260
        NAS-Port-Id = "260"
        NAS-IP-Address = 192.168.69.244
        NAS-Identifier = "wifi02"
server packetfence {
# Executing section authorize from file
/usr/local/pf/raddb//sites-enabled/packetfence
+- entering group authorize {...}
[suffix] No '@' in User-Name = "0446655af9d5", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] No EAP-Message, not doing EAP
++[eap] returns noop
[files] users: Matched entry DEFAULT at line 1
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
rlm_perl: Added pair Service-Type = Login-User
rlm_perl: Added pair Calling-Station-Id = 04-46-65-5A-F9-D5
rlm_perl: Added pair Called-Station-Id = 00-23-5E-B0-38-00
rlm_perl: Added pair Cisco-AVPair = ssid=TWGuest
rlm_perl: Added pair Cisco-AVPair = service-type=Login
rlm_perl: Added pair User-Name = 0446655af9d5
rlm_perl: Added pair NAS-Identifier = wifi02
rlm_perl: Added pair User-Password = 0446655af9d5
rlm_perl: Added pair NAS-IP-Address = 192.168.69.244
rlm_perl: Added pair NAS-Port = 260
rlm_perl: Added pair NAS-Port-Id = 260
rlm_perl: Added pair Auth-Type = Accept
++[packetfence] returns noop
Found Auth-Type = Accept
Auth-Type = Accept, accepting the user
Login OK: [0446655af9d5] (from client 192.168.69.244 port 260 cli
04-46-65-5A-F9-D5)
# Executing section post-auth from file
/usr/local/pf/raddb//sites-enabled/packetfence
+- entering group post-auth {...}
++[exec] returns noop
++? if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25))
? Evaluating !(EAP-Type ) -> TRUE
?? Skipping (EAP-Type != 21 )
?? Skipping (EAP-Type != 25)
++? if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25)) -> TRUE
++- entering if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25)) {...}
rlm_perl: Returning vlan 10 to request from 04:46:65:5a:f9:d5 port 260
rlm_perl: PacketFence RESULT RESPONSE CODE: 2 (2 means OK)
rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
rlm_perl: Added pair Service-Type = Login-User
rlm_perl: Added pair Called-Station-Id = 00-23-5E-B0-38-00
rlm_perl: Added pair Calling-Station-Id = 04-46-65-5A-F9-D5
rlm_perl: Added pair Cisco-AVPair = ssid=TWGuest
rlm_perl: Added pair Cisco-AVPair = service-type=Login
rlm_perl: Added pair User-Name = 0446655af9d5
rlm_perl: Added pair NAS-Identifier = wifi02
rlm_perl: Added pair User-Password = 0446655af9d5
rlm_perl: Added pair NAS-Port = 260
rlm_perl: Added pair NAS-IP-Address = 192.168.69.244
rlm_perl: Added pair NAS-Port-Id = 260
rlm_perl: Added pair Tunnel-Private-Group-ID = 10
rlm_perl: Added pair Tunnel-Type = 13
rlm_perl: Added pair Tunnel-Medium-Type = 6
rlm_perl: Added pair Auth-Type = Accept
+++[packetfence] returns ok
++- if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25)) returns ok
} # server packetfence
Sending Access-Accept of id 16 to 192.168.69.244 port 1645
        Tunnel-Private-Group-Id:0 = "10"
        Tunnel-Type:0 = VLAN
        Tunnel-Medium-Type:0 = IEEE-802
Finished request 45.
Going to the next request
Waking up in 4.9 seconds.
Cleaning up request 45 ID 16 with timestamp +52434
Ready to process requests.


Packerfence.log


Sep 17 09:48:30 pf::WebAPI(1796) INFO: handling radius autz request: from
switch_ip => 192.168.69.244, connection_type => Wireless-802.11-NoEAP mac
=> 04:46:65:5a:f9:d5, port => 260, username => 0446655af9d5
(pf::radius::authorize)
Sep 17 09:48:31 pf::WebAPI(1796) WARN: Unable to extract SSID for module
pf::SNMP::Cisco::Aironet_WDS. SSID-based VLAN assignments won't work. Make
sure you enable Vendor Specific Attributes (VSA) on the AP if you want them
to work. (pf::SNMP::Cisco::Aironet_WDS::extractSsid)
Sep 17 09:48:31 pf::WebAPI(1796) INFO: Username was NOT defined or unable
to match a role - returning node based role 'guest'
(pf::vlan::getNormalVlan)
Sep 17 09:48:31 pf::WebAPI(1796) INFO: MAC: 04:46:65:5a:f9:d5, PID:
convidado, Status: reg. Returned VLAN: 10 (pf::vlan::fetchVlanForNode)
Sep 17 09:48:31 pf::WebAPI(1796) WARN: No parameter guestRole found in
conf/switches.conf for the switch 192.168.69.244 (pf::SNMP::getRoleByName)
Sep 17 09:48:32 pfdhcplistener(4768) INFO: DHCPREQUEST from
04:46:65:5a:f9:d5 (192.168.70.10) (main::parse_dhcp_request)
Sep 17 09:48:32 pfdhcplistener(4768) INFO: 04:46:65:5a:f9:d5 requested an
IP. DHCP Fingerprint: OS::1112 (Samsung Android). Modified node with
last_dhcp = 2013-09-17 09:48:32,computername =
android-cfbfb835f3c74cd4,dhcp_fingerprint = 1,33,3,6,15,28,51,58,59
(main::listen_dhcp)


Any help would be very appreciated.

Best regards,

Pedro

-- 
<a href="http://www.4shared.com/ref/4817829/1";>Join 4Shared Now!</a>
------------------------------------------------------------------------------
LIMITED TIME SALE - Full Year of Microsoft Training For Just $49.99!
1,500+ hours of tutorials including VisualStudio 2012, Windows 8, SharePoint
2013, SQL 2012, MVC 4, more. BEST VALUE: New Multi-Library Power Pack includes
Mobile, Cloud, Java, and UX Design. Lowest price ever! Ends 9/20/13. 
http://pubads.g.doubleclick.net/gampad/clk?id=58041151&iu=/4140/ostg.clktrk
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to