Hi, all.

I have succesfully  cisco sg300 switchs with 802.1.X mac-auth-bypass with 
dynamic vlan,

here a little howto:


first : use firmware 1.1.2.0, others are buggy


sg300 configuration (packetfence server is 192.168.0.1)
---------------------------------------------------------

global
------



dot1x system-auth-control
radius-server host 192.168.0.1 timeout 10 retransmit 5 key secret
aaa authentication enable SSH enable
aaa authentication login SSH local
aaa authentication dot1x default radius none



interface vlan 106   (choose a non packetfence managed vlan)
 dot1x guest-vlan  


snmp-server engineID local 800000090320bbc0c0e078
snmp-server host 192.168.0.1 version 3 auth readUser
snmp-server group readGroup v3 auth notify DefaultSuper read DefaultSuper
snmp-server group readGroup v3 priv notify DefaultSuper read DefaultSuper
snmp-server group writeGroup v3 auth notify DefaultSuper read DefaultSuper 
write DefaultSuper
snmp-server group writeGroup v3 priv notify DefaultSuper read DefaultSuper 
write DefaultSuper
snmp-server user readUser readGroup v3 auth md5 authpwdread priv privpwdread
snmp-server user writeUser writeGroup v3 auth md5 authpwdwrite priv privpwdwrite
snmp-server enable traps



port
----
int giX
    switchport mode access
    dot1x guest-vlan timeout 180
    dot1x host-mode multi-sessions
    dot1x reauthentication
    dot1x timeout reauth-period 7200
    dot1x port-control auto
    dot1x mac-authentication mac-only



Packetfence configuration
--------------------------

1) we need to change default_eap_type from peap to md5, or it doesn't work

/usr/local/pf/conf/radiusd/eap.conf
default_eap_type = md5


2) (I use Cisco::Catalyst_3550 type, it's work fine)

/usr/local/pf/conf/switches.conf


mode=production
SNMPAuthProtocolRead=MD5
guestVlan=106
SNMPUserNameTrap=readUser
SNMPPrivPasswordTrap=privpwdread
SNMPAuthProtocolTrap=MD5
SNMPAuthProtocolWrite=MD5
SNMPUserNameWrite=writeUser
description=sw-edge01
SNMPVersionTrap=3
SNMPEngineID = 800000090320bbc0c0e078
type=Cisco::Catalyst_3550           
SNMPUserNameRead=readUser
VoIPEnabled=N
ODISOVlan=100
isolationVlan=108
radiusSecret=secret
SNMPVersion=3
SNMPPrivPasswordRead=privpwdread
SNMPPrivProtocolWrite=DES
SNMPAuthPasswordWrite=authpwdwrite
SNMPPrivPasswordWrite=privpwdwrite
SNMPAuthPasswordRead=authpwdread
SNMPPrivProtocolTrap=DES
registrationVlan=107
SNMPPrivProtocolRead=DES
SNMPAuthPasswordTrap=authpwdread




Best Regards,

Alexandre Derumier

------------------------------------------------------------------------------
Android is increasing in popularity, but the open development platform that
developers love is also attractive to malware creators. Download this white
paper to learn more about secure code signing practices that can help keep
Android apps secure.
http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to