Hello I think i have a similar problem with a Cisco Aironet SAP2602i. I use your debug instruction in Aironet.pm. Cisco-AVPair return an array instead a string.
(pf::SNMP::Cisco::Aironet::extractSsid)
Sep 23 10:44:47 pf::WebAPI(9316) WARN: Radius Request: $VAR1 = {
'NAS-Port-Type' => 'Wireless-802.11',
'Service-Type' => 'Login-User',
'Cisco-NAS-Port' => '1220',
'Calling-Station-Id' => '2020.7a8e.c9db',
'Called-Station-Id' => '0c69.03ca.76d0',
'Cisco-AVPair' => [
'ssid=TEST',
'service-type=Login'
],
'User-Name' => '20207a8ec9db',
'User-Password' => '20207a8ec9db',
'NAS-IP-Address' => '192.168.XX.XX',
'NAS-Port' => '1220',
'NAS-Port-Id' => '1220',
'WISPr-Location-Name' => 'SALLE DE TESTS'
};
If I fix the function to read the first line of the table the test works
for my new AP but of course not for my oldest AP.
Fabrice Le 20/09/2013 14:55, Derek Wuelfrath a écrit :
Pedro, Have you restarted PacketFence after adding the lines, cause I don't see the PACKETFENCE DEBUGGING line in the logs. Derek -- Derek Wuelfrath [email protected] :: +1.514.447.4918 (x110) :: www.inverse.ca Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence (www.packetfence.org) On 2013-09-20, at 6:02 AM, Pedro Tavares <[email protected]> wrote:Hello Derek, Thank you for your help on this. I've done as you instructed and here are the logs (packetfence.log and radiusd -X) Hopefully those are the relevant logs :) Best regards, Pedro ####Packetfence.log Sep 20 09:34:40 pf::WebAPI(8473) INFO: handling radius autz request: from switch_ip => 192.168.69.244, connection_type => Wireless-802.11-NoEAP mac => 04:46:65:5a:f9:d5, port => 333, username => 0446655af9d5 (pf::radius::authorize) Sep 20 09:34:40 pf::WebAPI(8473) WARN: Unable to extract SSID for module pf::SNMP::Cisco::Aironet_1250. SSID-based VLAN assignments won't work. Make sure you enable Vendor Specific Attributes (VSA) on the AP if you want them to work. (pf::SNMP::Cisco::Aironet::extractSsid) Sep 20 09:34:41 pf::WebAPI(8473) INFO: highest priority violation for 04:46:65:5a:f9:d5 is 1200001. Target VLAN for violation: registration (11) (pf::vlan::getViolationVlan) Sep 20 09:34:41 pf::WebAPI(8473) WARN: Role-based Network Access Control is not supported on network device type pf::SNMP::Cisco::Aironet_1250. (pf::SNMP::supportsRoleBasedEnforcement) Sep 20 09:34:49 pfdhcplistener(8540) INFO: DHCPOFFER from 10.10.150.1 (00:1d:09:f0:64:26) to host 04:46:65:5a:f9:d5 (10.10.150.10) (main::parse_dhcp_offer) Sep 20 09:34:49 pfdhcplistener(8540) INFO: DHCPREQUEST from 04:46:65:5a:f9:d5 (10.10.150.10) (main::parse_dhcp_request) Sep 20 09:34:49 pfdhcplistener(8540) INFO: could not resolve 10.10.150.10 to mac in ARP table (pf::iplog::ip2macinarp) Sep 20 09:34:49 pfdhcplistener(8540) INFO: resolved 10.10.150.10 to mac (04:46:65:5a:f9:d5) in ARP table (pf::iplog::ip2macinarp) Sep 20 09:34:49 pfdhcplistener(8540) INFO: oldip (192.168.70.10) and newip (10.10.150.10) are different for 04:46:65:5a:f9:d5 - closing iplog entry (main::update_iplog) Sep 20 09:34:50 pfdhcplistener(8540) INFO: 04:46:65:5a:f9:d5 requested an IP. DHCP Fingerprint: OS::1112 (Samsung Android). Modified node with last_dhcp = 2013-09-20 09:34:50,computername = android-cfbfb835f3c74cd4,dhcp_fingerprint = 1,33,3,6,15,28,51,58,59 (main::listen_dhcp) Radiusd -X -d /usr/local/pf/raddb [root@pfense bin]# radiusd -X -d /usr/local/pf/raddb/ FreeRADIUS Version 2.2.0, for host x86_64-unknown-linux-gnu, built on Oct 18 2012 at 13:58:38 Copyright (C) 1999-2012 The FreeRADIUS server project and contributors. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. You may redistribute copies of FreeRADIUS under the terms of the GNU General Public License v2. Starting - reading configuration files ... including configuration file /usr/local/pf/raddb//radiusd.conf including configuration file /usr/local/pf/raddb//proxy.conf including configuration file /usr/local/pf/raddb//clients.conf including files in directory /usr/local/pf/raddb//modules/ including configuration file /usr/local/pf/raddb//modules/always including configuration file /usr/local/pf/raddb//modules/pap including configuration file /usr/local/pf/raddb//modules/unix including configuration file /usr/local/pf/raddb//modules/mschap including configuration file /usr/local/pf/raddb//modules/sqlcounter_expire_on_login including configuration file /usr/local/pf/raddb//modules/realm including configuration file /usr/local/pf/raddb//modules/otp including configuration file /usr/local/pf/raddb//modules/ntlm_auth including configuration file /usr/local/pf/raddb//modules/counter including configuration file /usr/local/pf/raddb//modules/checkval including configuration file /usr/local/pf/raddb//modules/inner-eap including configuration file /usr/local/pf/raddb//modules/soh including configuration file /usr/local/pf/raddb//modules/pam including configuration file /usr/local/pf/raddb//modules/mac2vlan including configuration file /usr/local/pf/raddb//modules/acct_unique including configuration file /usr/local/pf/raddb//modules/expiration including configuration file /usr/local/pf/raddb//modules/smsotp including configuration file /usr/local/pf/raddb//modules/etc_group including configuration file /usr/local/pf/raddb//modules/preprocess including configuration file /usr/local/pf/raddb//modules/perl including configuration file /usr/local/pf/raddb//modules/ippool including configuration file /usr/local/pf/raddb//modules/sql_log including configuration file /usr/local/pf/raddb//modules/wimax including configuration file /usr/local/pf/raddb//modules/chap including configuration file /usr/local/pf/raddb//modules/digest including configuration file /usr/local/pf/raddb//modules/rediswho including configuration file /usr/local/pf/raddb//modules/detail including configuration file /usr/local/pf/raddb//modules/logintime including configuration file /usr/local/pf/raddb//modules/detail.log including configuration file /usr/local/pf/raddb//modules/ldap including configuration file /usr/local/pf/raddb//modules/echo including configuration file /usr/local/pf/raddb//modules/mac2ip including configuration file /usr/local/pf/raddb//modules/attr_rewrite including configuration file /usr/local/pf/raddb//modules/policy including configuration file /usr/local/pf/raddb//modules/radutmp including configuration file /usr/local/pf/raddb//modules/smbpasswd including configuration file /usr/local/pf/raddb//modules/expr including configuration file /usr/local/pf/raddb//modules/attr_filter including configuration file /usr/local/pf/raddb//modules/replicate including configuration file /usr/local/pf/raddb//modules/sradutmp including configuration file /usr/local/pf/raddb//modules/redis including configuration file /usr/local/pf/raddb//modules/linelog including configuration file /usr/local/pf/raddb//modules/detail.example.com including configuration file /usr/local/pf/raddb//modules/passwd including configuration file /usr/local/pf/raddb//modules/dynamic_clients including configuration file /usr/local/pf/raddb//modules/cui including configuration file /usr/local/pf/raddb//modules/files including configuration file /usr/local/pf/raddb//modules/exec including configuration file /usr/local/pf/raddb//modules/opendirectory including configuration file /usr/local/pf/raddb//eap.conf including configuration file /usr/local/pf/raddb//sql.conf including configuration file /usr/local/pf/raddb//sql/mysql/packetfence.conf including configuration file /usr/local/pf/raddb//policy.conf including files in directory /usr/local/pf/raddb//sites-enabled/ including configuration file /usr/local/pf/raddb//sites-enabled/default including configuration file /usr/local/pf/raddb//sites-enabled/packetfence including configuration file /usr/local/pf/raddb//sites-enabled/packetfence-soh including configuration file /usr/local/pf/raddb//sites-enabled/control-socket including configuration file /usr/local/pf/raddb//sites-enabled/packetfence-tunnel including configuration file /usr/local/pf/raddb//sites-enabled/inner-tunnel main { user = "pf" group = "pf" allow_core_dumps = no } including dictionary file /usr/local/pf/raddb//dictionary main { name = "radiusd" prefix = "/usr" localstatedir = "/usr/local/pf/var" sbindir = "/usr/sbin" logdir = "/usr/local/pf/logs" run_dir = "/usr/local/pf/var/run" libdir = "/usr/lib/freeradius" radacctdir = "/usr/local/pf/logs/radacct" hostname_lookups = no max_request_time = 30 cleanup_delay = 5 max_requests = 1024 pidfile = "/usr/local/pf/var/run/radiusd.pid" checkrad = "/usr/sbin/checkrad" debug_level = 0 proxy_requests = yes log { stripped_names = no auth = yes auth_badpass = no auth_goodpass = no } security { max_attributes = 200 reject_delay = 1 status_server = yes } } radiusd: #### Loading Realms and Home Servers #### proxy server { retry_delay = 5 retry_count = 3 default_fallback = no dead_time = 120 wake_all_if_all_dead = no } home_server localhost { ipaddr = 127.0.0.1 port = 1812 type = "auth" secret = "XXXXXXXXX:REMOVED" response_window = 20 max_outstanding = 65536 require_message_authenticator = yes zombie_period = 40 status_check = "status-server" ping_interval = 30 check_interval = 30 num_answers_to_alive = 3 num_pings_to_alive = 3 revive_interval = 120 status_check_timeout = 4 coa { irt = 2 mrt = 16 mrc = 5 mrd = 30 } } home_server_pool my_auth_failover { type = fail-over home_server = localhost } realm example.com { auth_pool = my_auth_failover } realm LOCAL { } radiusd: #### Loading Clients #### client localhost { ipaddr = 127.0.0.1 require_message_authenticator = no secret = "XXXXXXXXX:REMOVED" nastype = "other" } radiusd: #### Instantiating modules #### instantiate { Module: Linked to module rlm_exec Module: Instantiating module "exec" from file /usr/local/pf/raddb//modules/exec exec { wait = no input_pairs = "request" shell_escape = yes } Module: Linked to module rlm_expr Module: Instantiating module "expr" from file /usr/local/pf/raddb//modules/expr Module: Linked to module rlm_expiration Module: Instantiating module "expiration" from file /usr/local/pf/raddb//modules/expiration expiration { reply-message = "Password Has Expired " } Module: Linked to module rlm_logintime Module: Instantiating module "logintime" from file /usr/local/pf/raddb//modules/logintime logintime { reply-message = "You are calling outside your allowed timespan " minimum-timeout = 60 } } radiusd: #### Loading Virtual Servers #### server { # from file /usr/local/pf/raddb//radiusd.conf modules { Module: Creating Auth-Type = digest Module: Creating Post-Auth-Type = REJECT Module: Checking authenticate {...} for more modules to load Module: Linked to module rlm_pap Module: Instantiating module "pap" from file /usr/local/pf/raddb//modules/pap pap { encryption_scheme = "auto" auto_header = no } Module: Linked to module rlm_chap Module: Instantiating module "chap" from file /usr/local/pf/raddb//modules/chap Module: Linked to module rlm_mschap Module: Instantiating module "mschap" from file /usr/local/pf/raddb//modules/mschap mschap { use_mppe = yes require_encryption = yes require_strong = no with_ntdomain_hack = yes ntlm_auth = "/usr/bin/ntlm_auth --request-nt-key --username=%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-response:-00}" allow_retry = yes } Module: Linked to module rlm_digest Module: Instantiating module "digest" from file /usr/local/pf/raddb//modules/digest Module: Linked to module rlm_unix Module: Instantiating module "unix" from file /usr/local/pf/raddb//modules/unix unix { radwtmp = "/usr/local/pf/logs/radwtmp" } Module: Linked to module rlm_eap Module: Instantiating module "eap" from file /usr/local/pf/raddb//eap.conf eap { default_eap_type = "peap" timer_expire = 60 ignore_unknown_eap_types = no cisco_accounting_username_bug = no max_sessions = 2048 } Module: Linked to sub-module rlm_eap_md5 Module: Instantiating eap-md5 Module: Linked to sub-module rlm_eap_tls Module: Instantiating eap-tls tls { rsa_key_exchange = no dh_key_exchange = yes rsa_key_length = 512 dh_key_length = 512 verify_depth = 0 pem_file_type = yes private_key_file = "/usr/local/pf/conf/ssl/server.key" certificate_file = "/usr/local/pf/conf/ssl/server.crt" dh_file = "/usr/local/pf/raddb//certs/dh" random_file = "/dev/urandom" fragment_size = 1024 include_length = yes check_crl = no cipher_list = "DEFAULT" make_cert_command = "/usr/local/pf/raddb//certs/bootstrap" cache { enable = no lifetime = 24 max_entries = 255 } verify { } ocsp { enable = no override_cert_url = yes url = "http://127.0.0.1/ocsp/" use_nonce = yes timeout = 0 softfail = no } } Module: Linked to sub-module rlm_eap_ttls Module: Instantiating eap-ttls ttls { default_eap_type = "md5" copy_request_to_tunnel = yes use_tunneled_reply = yes virtual_server = "packetfence-tunnel" include_length = yes } Module: Linked to sub-module rlm_eap_peap Module: Instantiating eap-peap peap { default_eap_type = "mschapv2" copy_request_to_tunnel = yes use_tunneled_reply = yes proxy_tunneled_request_as_eap = yes virtual_server = "packetfence-tunnel" soh = no } Module: Linked to sub-module rlm_eap_mschapv2 Module: Instantiating eap-mschapv2 mschapv2 { with_ntdomain_hack = no send_error = no } Module: Checking authorize {...} for more modules to load Module: Linked to module rlm_preprocess Module: Instantiating module "preprocess" from file /usr/local/pf/raddb//modules/preprocess preprocess { huntgroups = "/usr/local/pf/raddb//huntgroups" hints = "/usr/local/pf/raddb//hints" with_ascend_hack = no ascend_channels_per_line = 23 with_ntdomain_hack = no with_specialix_jetstream_hack = no with_cisco_vsa_hack = no with_alvarion_vsa_hack = no } reading pairlist file /usr/local/pf/raddb//huntgroups reading pairlist file /usr/local/pf/raddb//hints Module: Linked to module rlm_realm Module: Instantiating module "suffix" from file /usr/local/pf/raddb//modules/realm realm suffix { format = "suffix" delimiter = "@" ignore_default = no ignore_null = no } Module: Linked to module rlm_files Module: Instantiating module "files" from file /usr/local/pf/raddb//modules/files files { usersfile = "/usr/local/pf/raddb//users" acctusersfile = "/usr/local/pf/raddb//acct_users" preproxy_usersfile = "/usr/local/pf/raddb//preproxy_users" compat = "no" } reading pairlist file /usr/local/pf/raddb//users reading pairlist file /usr/local/pf/raddb//acct_users reading pairlist file /usr/local/pf/raddb//preproxy_users Module: Checking preacct {...} for more modules to load Module: Linked to module rlm_acct_unique Module: Instantiating module "acct_unique" from file /usr/local/pf/raddb//modules/acct_unique acct_unique { key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port" } Module: Checking accounting {...} for more modules to load Module: Linked to module rlm_detail Module: Instantiating module "detail" from file /usr/local/pf/raddb//modules/detail detail { detailfile = "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d" header = "%t" detailperm = 384 dirperm = 493 locking = no log_packet_header = no } Module: Linked to module rlm_radutmp Module: Instantiating module "radutmp" from file /usr/local/pf/raddb//modules/radutmp radutmp { filename = "/usr/local/pf/logs/radutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes perm = 384 callerid = yes } Module: Linked to module rlm_attr_filter Module: Instantiating module "attr_filter.accounting_response" from file /usr/local/pf/raddb//modules/attr_filter attr_filter attr_filter.accounting_response { attrsfile = "/usr/local/pf/raddb//attrs.accounting_response" key = "%{User-Name}" relaxed = no } reading pairlist file /usr/local/pf/raddb//attrs.accounting_response Module: Checking session {...} for more modules to load Module: Checking post-proxy {...} for more modules to load Module: Checking post-auth {...} for more modules to load Module: Instantiating module "attr_filter.access_reject" from file /usr/local/pf/raddb//modules/attr_filter attr_filter attr_filter.access_reject { attrsfile = "/usr/local/pf/raddb//attrs.access_reject" key = "%{User-Name}" relaxed = no } reading pairlist file /usr/local/pf/raddb//attrs.access_reject } # modules } # server server packetfence { # from file /usr/local/pf/raddb//sites-enabled/packetfence modules { Module: Checking authenticate {...} for more modules to load Module: Checking authorize {...} for more modules to load Module: Linked to module rlm_perl Module: Instantiating module "packetfence" from file /usr/local/pf/raddb//modules/perl perl packetfence { module = "/usr/local/pf/raddb//packetfence.pm" func_authorize = "authorize" func_authenticate = "authenticate" func_accounting = "accounting" func_preacct = "preacct" func_checksimul = "checksimul" func_detach = "detach" func_xlat = "xlat" func_pre_proxy = "pre_proxy" func_post_proxy = "post_proxy" func_post_auth = "post_auth" func_recv_coa = "recv_coa" func_send_coa = "send_coa" } Module: Checking preacct {...} for more modules to load Module: Checking accounting {...} for more modules to load Module: Linked to module rlm_sql Module: Instantiating module "sql" from file /usr/local/pf/raddb//sql.conf sql { driver = "rlm_sql_mysql" server = "localhost" port = "3306" login = "pf" password = "XXXXXXXXX:REMOVED" radius_db = "pf" read_groups = yes sqltrace = no sqltracefile = "/usr/local/pf/logs/sqltrace.sql" readclients = yes deletestalesessions = yes num_sql_socks = 5 lifetime = 0 max_queries = 0 sql_user_name = "%{User-Name}" default_user_profile = "" nas_query = "SELECT id, nasname, shortname, type, secret FROM radius_nas" authorize_check_query = "SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id" authorize_reply_query = "SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id" authorize_group_check_query = "SELECT id, groupname, attribute, Value, op FROM radgroupcheck WHERE groupname = '%{Sql-Group}'ORDER BY id" authorize_group_reply_query = "SELECT id, groupname, attribute, value, op FROM radgroupreply WHERE groupname = '%{Sql-Group}'ORDER BY id" accounting_onoff_query = "UPDATE radacct SET acctstoptime='%S', acctsessiontime = unix_timestamp('%S') - unix_timestamp(acctstarttime), acctterminatecause = '%{Acct-Terminate-Cause}', acctstopdelay = %{%{Acct-Delay-Time}:-0} WHERE acctstoptime IS NULL AND nasipaddress = '%{NAS-IP-Address}' AND acctstarttime <= '%S'" accounting_update_query = "CALL acct_update ('%S', '%{Acct-Session-Time}','%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Ac ct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Ac ct-Output-Octets}:-0}','%{Acct-Session-Id}', '%{SQL-User-Name}' , '%{NAS-IP-Address}', '%{Framed-IP-Address}', '%{Acct-Status-Type}')" accounting_update_query_alt = "INSERT INTO radacct(acctsessionid, acctuniqueid, username, realm, nasipaddress, nasportid, nasporttype, acctstarttime, acctsessiontime, acctauthentic, connectinfo_start, acctinputoctets, acctoutputoctets, calledstationid, callingstationid, servicetype, framedprotocol, framedipaddress, acctstartdelay, xascendsessionsvrkey) VALUES ('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}','%{SQL-User-Name}','%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}', '%{NAS-Port-Type}', DATE_SUB('%S',INTERVAL (%{%{Acct-Session-Time}:-0} + %{%{Acct-Delay-Time}:-0}) SECOND), '%{Acct-Session-Time}', '%{Acct-Authentic}', '', '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''), REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':',''), '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', '0', '%{X-Ascend-Session-Svr-Key}')" accounting_start_query = "CALL acct_start ('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}','%{NAS-Port-Type}', '%S', NULL, '0', '%{Acct-Authentic}', '%{Connect-Info}', '', '0', '0', REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''), REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':',''), '', '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}','%{%{Acct-Delay-Time}:-0}', '0', '%{X-Ascend-Session-Svr-Key}', '%{Acct-Status-Type}')" accounting_start_query_alt = "UPDATE radacct SET acctstarttime = '%S', acctstartdelay = '%{%{Acct-Delay-Time }:-0}', connectinfo_start = '%{Connect-Info}' WHERE acctsessionid = '%{Acct-Session-Id}'AND username = '%{SQL-User-Name}' AND nasipaddress = '%{NAS-IP-Address}'" accounting_stop_query = "CALL acct_stop ('%S','%{Acct-Session-Time}','%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', '%{Acct-Terminate-Cause}', '%{%{Acct-Delay-Time}:-0}', '%{Connect-Info}', '%{Acct-Session-Id}', '%{SQL-User-Name}', '%{NAS-IP-Address}', '%{Acct-Status-Type}')" accounting_stop_query_alt = "INSERT INTO radacct(acctsessionid, acctuniqueid, username, realm, nasipaddress, naspor tid, nasporttype, acctstarttime, acctstoptime, acctsessiontime, acctauthentic, connectinfo_start, connectinfo_stop, acctinputoctets, acctoutputoctets,calledstationid, callingstationid, acctterminatecause, servicetype, framedprotocol, framedipaddress, acctstartdelay, acctstopdelay) VALUES ('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}','%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}', '%{NAS-Port-Type}', DATE_SUB('%S', INTERVAL (%{%{Acct-Session-Time}:-0} + %{%{Acct-Delay-Time}:-0}) SECOND), '%S', '%{Acct-Session-Time}', '%{Acct-Authentic}', '', '%{Connect-Info}', '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''), REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':', ''), '%{Acct-Terminate-Cause}', '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', '0', '%{%{Acct-Delay-Time}:-0}')" group_membership_query = "SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority" connect_failure_retry_delay = 60 simul_count_query = "" simul_verify_query = "SELECT radacctid, acctsessionid, username, nasipaddress, nasportid, framedipaddress, callingstationid, framedprotocol FROM radacct WHERE username = '%{SQL-User-Name}' AND acctstoptime IS NULL" postauth_query = "INSERT INTO radpostauth(username, pass, reply, authdate) VALUES ('%{User-Name}','%{%{User-Password}:-%{Chap-Password}}','%{reply:Packet-Type}', '%S')" safe-characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /" } rlm_sql (sql): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked rlm_sql (sql): Attempting to connect to pf@localhost:3306/pf rlm_sql (sql): starting 0 rlm_sql (sql): Attempting to connect rlm_sql_mysql #0 rlm_sql_mysql: Starting connect to MySQL server for #0 rlm_sql (sql): Connected new DB handle, #0 rlm_sql (sql): starting 1 rlm_sql (sql): Attempting to connect rlm_sql_mysql #1 rlm_sql_mysql: Starting connect to MySQL server for #1 rlm_sql (sql): Connected new DB handle, #1 rlm_sql (sql): starting 2 rlm_sql (sql): Attempting to connect rlm_sql_mysql #2 rlm_sql_mysql: Starting connect to MySQL server for #2 rlm_sql (sql): Connected new DB handle, #2 rlm_sql (sql): starting 3 rlm_sql (sql): Attempting to connect rlm_sql_mysql #3 rlm_sql_mysql: Starting connect to MySQL server for #3 rlm_sql (sql): Connected new DB handle, #3 rlm_sql (sql): starting 4 rlm_sql (sql): Attempting to connect rlm_sql_mysql #4 rlm_sql_mysql: Starting connect to MySQL server for #4 rlm_sql (sql): Connected new DB handle, #4 rlm_sql (sql): Processing generate_sql_clients rlm_sql (sql) in generate_sql_clients: query is SELECT id, nasname, shortname, type, secret FROM radius_nas rlm_sql (sql): Reserving sql socket id: 4 rlm_sql (sql): Read entry nasname=192.168.69.244,shortname=192.168.69.244,secret=XXXXXXXXX:REMOVED rlm_sql (sql): Adding client 192.168.69.244 (192.168.69.244, server=<none>) to clients list rlm_sql (sql): Read entry nasname=192.168.69.246,shortname=192.168.69.246,secret=XXXXXXXXX:REMOVED rlm_sql (sql): Adding client 192.168.69.246 (192.168.69.246, server=<none>) to clients list rlm_sql (sql): Released sql socket id: 4 Module: Checking post-proxy {...} for more modules to load Module: Checking post-auth {...} for more modules to load } # modules } # server server soh-server { # from file /usr/local/pf/raddb//sites-enabled/packetfence-soh modules { Module: Checking authorize {...} for more modules to load Module: Instantiating module "packetfence-soh" from file /usr/local/pf/raddb//modules/perl perl packetfence-soh { module = "/usr/local/pf/raddb//packetfence-soh.pm" func_authorize = "authorize" func_authenticate = "authenticate" func_accounting = "accounting" func_preacct = "preacct" func_checksimul = "checksimul" func_detach = "detach" func_xlat = "xlat" func_pre_proxy = "pre_proxy" func_post_proxy = "post_proxy" func_post_auth = "post_auth" func_recv_coa = "recv_coa" func_send_coa = "send_coa" } } # modules } # server server packetfence-tunnel { # from file /usr/local/pf/raddb//sites-enabled/packetfence-tunnel modules { Module: Checking authenticate {...} for more modules to load Module: Checking authorize {...} for more modules to load Module: Instantiating module "ntdomain" from file /usr/local/pf/raddb//modules/realm realm ntdomain { format = "prefix" delimiter = "\" ignore_default = no ignore_null = no } Module: Checking session {...} for more modules to load Module: Checking post-proxy {...} for more modules to load Module: Checking post-auth {...} for more modules to load } # modules } # server server inner-tunnel { # from file /usr/local/pf/raddb//sites-enabled/inner-tunnel modules { Module: Checking authenticate {...} for more modules to load Module: Checking authorize {...} for more modules to load Module: Checking session {...} for more modules to load Module: Checking post-proxy {...} for more modules to load Module: Checking post-auth {...} for more modules to load } # modules } # server radiusd: #### Opening IP addresses and Ports #### listen { type = "auth" virtual_server = "packetfence" ipaddr = 192.168.69.247 port = 0 } listen { type = "acct" virtual_server = "packetfence" ipaddr = 192.168.69.247 port = 0 } listen { type = "control" listen { socket = "/usr/local/pf/var/run/radiusd.sock" mode = "rw" } } listen { type = "auth" ipaddr = 127.0.0.1 port = 18120 } ... adding new socket proxy address * port 56024 Listening on authentication address 192.168.69.247 port 1812 as server packetfence Listening on accounting address 192.168.69.247 port 1813 as server packetfence Listening on command file /usr/local/pf/var/run/radiusd.sock Listening on authentication address 127.0.0.1 port 18120 as server inner-tunnel Listening on proxy address 192.168.69.247 port 1814 Ready to process requests. rad_recv: Access-Request packet from host 192.168.69.244 port 1645, id=185, length=173 User-Name = "0446655af9d5" User-Password = "0446655af9d5" Called-Station-Id = "00-23-5E-B0-38-00" Calling-Station-Id = "04-46-65-5A-F9-D5" Cisco-AVPair = "ssid=TWGuest" Service-Type = Login-User Cisco-AVPair = "service-type=Login" NAS-Port-Type = Wireless-802.11 NAS-Port = 333 NAS-Port-Id = "333" NAS-IP-Address = 192.168.69.244 NAS-Identifier = "wifi02" server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] No '@' in User-Name = "0446655af9d5", looking up realm NULL [suffix] No such realm "NULL" ++[suffix] returns noop ++[preprocess] returns ok [eap] No EAP-Message, not doing EAP ++[eap] returns noop [files] users: Matched entry DEFAULT at line 1 ++[files] returns ok ++[expiration] returns noop ++[logintime] returns noop rlm_perl: Added pair NAS-Port-Type = Wireless-802.11 rlm_perl: Added pair Service-Type = Login-User rlm_perl: Added pair Calling-Station-Id = 04-46-65-5A-F9-D5 rlm_perl: Added pair Called-Station-Id = 00-23-5E-B0-38-00 rlm_perl: Added pair Cisco-AVPair = ssid=TWGuest rlm_perl: Added pair Cisco-AVPair = service-type=Login rlm_perl: Added pair User-Name = 0446655af9d5 rlm_perl: Added pair NAS-Identifier = wifi02 rlm_perl: Added pair User-Password = 0446655af9d5 rlm_perl: Added pair NAS-IP-Address = 192.168.69.244 rlm_perl: Added pair NAS-Port = 333 rlm_perl: Added pair NAS-Port-Id = 333 rlm_perl: Added pair Auth-Type = Accept ++[packetfence] returns noop Found Auth-Type = Accept Auth-Type = Accept, accepting the user Login OK: [0446655af9d5] (from client 192.168.69.244 port 333 cli 04-46-65-5A-F9-D5) # Executing section post-auth from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group post-auth {...} ++[exec] returns noop ++? if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25)) ? Evaluating !(EAP-Type ) -> TRUE ?? Skipping (EAP-Type != 21 ) ?? Skipping (EAP-Type != 25) ++? if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25)) -> TRUE ++- entering if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25)) {...} rlm_perl: Returning vlan 11 to request from 04:46:65:5a:f9:d5 port 333 rlm_perl: PacketFence RESULT RESPONSE CODE: 2 (2 means OK) rlm_perl: Added pair NAS-Port-Type = Wireless-802.11 rlm_perl: Added pair Service-Type = Login-User rlm_perl: Added pair Called-Station-Id = 00-23-5E-B0-38-00 rlm_perl: Added pair Calling-Station-Id = 04-46-65-5A-F9-D5 rlm_perl: Added pair Cisco-AVPair = ssid=TWGuest rlm_perl: Added pair Cisco-AVPair = service-type=Login rlm_perl: Added pair User-Name = 0446655af9d5 rlm_perl: Added pair NAS-Identifier = wifi02 rlm_perl: Added pair User-Password = 0446655af9d5 rlm_perl: Added pair NAS-Port = 333 rlm_perl: Added pair NAS-IP-Address = 192.168.69.244 rlm_perl: Added pair NAS-Port-Id = 333 rlm_perl: Added pair Tunnel-Private-Group-ID = 11 rlm_perl: Added pair Tunnel-Type = 13 rlm_perl: Added pair Tunnel-Medium-Type = 6 rlm_perl: Added pair Auth-Type = Accept +++[packetfence] returns ok ++- if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25)) returns ok } # server packetfence Sending Access-Accept of id 185 to 192.168.69.244 port 1645 Tunnel-Private-Group-Id:0 = "11" Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Finished request 0. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 192.168.69.244 port 1645, id=185, length=173 Sending duplicate reply to client 192.168.69.244 port 1645 - ID: 185 Sending Access-Accept of id 185 to 192.168.69.244 port 1645 Waking up in 4.9 seconds. Cleaning up request 0 ID 185 with timestamp +13 Ready to process requests. Em 19-09-2013 14:51, Derek Wuelfrath escreveu:Hello Pedro Can you edit the /usr/local/pf/lib/SNMP/Cisco/Aironet_WDS.pm file and add the following: in sub extractSsid, just after the "my $logger … " line (at line 204 if you use latest version of PacketFence), add the following two lines use Data::Dumper; $logger->info("PACKETFENCE DEBUGGING: " . Dump($radius_request)); Then, restart PacketFence and retry. Paste the relevant log output. Cheers! dw. -- Derek Wuelfrath dwuelfrath-tiT8nZ+Z9Bqw5LPnMra/[email protected] <mailto:dwuelfrath-tiT8nZ+Z9Bqw5LPnMra/[email protected]> :: +1.514.447.4918 (x110) :: www.inverse.ca <http://www.inverse.ca/> Inverse inc. :: Leaders behind SOGo (www.sogo.nu <http://www.sogo.nu/>) and PacketFence (www.packetfence.org <http://www.packetfence.org/>) On 2013-09-17, at 5:33 AM, "Pedro, Tavares" <[email protected] <mailto:[email protected]>> wrote:Hello all. Regarding this issue, I've been searching for a while and I did found others reporting similar issues (same errors in logs) but for some reason didn't apply to my case. The environment PF is in Vlan enforcement mode. Although it's working, I'm aware that's not the best configuration. I'm still learning :) Native Vlan = 1------------------------------------------------------------------------------ LIMITED TIME SALE - Full Year of Microsoft Training For Just $49.99! 1,500+ hours of tutorials including VisualStudio 2012, Windows 8, SharePoint 2013, SQL 2012, MVC 4, more. BEST VALUE: New Multi-Library Power Pack includes Mobile, Cloud, Java, and UX Design. Lowest price ever! Ends 9/20/13. http://pubads.g.doubleclick.net/gampad/clk?id=58041151&iu=/4140/ostg.clktrk _______________________________________________ PacketFence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users------------------------------------------------------------------------------ LIMITED TIME SALE - Full Year of Microsoft Training For Just $49.99! 1,500+ hours of tutorials including VisualStudio 2012, Windows 8, SharePoint 2013, SQL 2012, MVC 4, more. BEST VALUE: New Multi-Library Power Pack includes Mobile, Cloud, Java, and UX Design. Lowest price ever! Ends 9/20/13. http://pubads.g.doubleclick.net/gampad/clk?id=58041151&iu=/4140/ostg.clktrk _______________________________________________ PacketFence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
<<attachment: fabrice_monnier.vcf>>
------------------------------------------------------------------------------ October Webinars: Code for Performance Free Intel webinars can help you accelerate application performance. Explore tips for MPI, OpenMP, advanced profiling, and more. Get the most from the latest Intel processors and coprocessors. See abstracts and register > http://pubads.g.doubleclick.net/gampad/clk?id=60133471&iu=/4140/ostg.clktrk
_______________________________________________ PacketFence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
