Hello Ali, there is no mail server coming with PacketFence but you can install postfix and set the relayhost value to your internal mail server.
Regards Fabrice Le 2014-06-11 00:26, Ali Tekeoglu a écrit : > Hello Fabrice, > > Thank you for clarifying the "Mac-Detection Vlan" concept, appreciated. > > After removing the access VLAN 4 (mac-detection) and Port-Security > with Static-Mac address configuration from the switchport > configuration, I was able to get 802.1X/MAB and Port Security working > together. > Haven't tested 802.1X with a properly configured 802.1X client but it > should work. > Now, my client machine gets assigned to registration VLAN through MAB > authentication after 802.1X fails over to MAB in two seconds. > > > > I have another question for the PacketFence users though :) > Does PacketFence come with any kind of email server in default > installation on Ubuntu 12.04 ? > > So, once my Unregistered Client gets assigned a DHCP IP address from > the Registration VLAN, it goes to the Captive Portal with a browser. > > In the Captive Portal, it has 3 options to Register; > > 1-) Register through emailing a Sponsor (and wait in the Reg VLAN > until Sponsor activates the access through clicking the link in the > email sent by PF) > > 2-) Register through sending an activation email to client's email > account. ( Client gets 10 minutes of Normal VLAN IP address to let him > get into his email account in order to get the activation code sent by > PacketFence) > > 3-) Register through SMS. > > > > I tried all, but PacketFence was not able to send email to client's > gmail.com account nor sponsor's email account. > > Here is the error messages from /usr/local/pf/logs/packetfence.log file > > Jun 10 17:10:23 httpd.portal(2561) INFO: mac : 00:23:5a:47:21:78 > (captiveportal::PacketFence::Controller::CaptivePortal::validateMac) > Jun 10 17:10:23 httpd.portal(2561) INFO: registering 00:23:5a:47:21:78 > guest by email > (captiveportal::PacketFence::Controller::Signup::doEmailSelfRegistration) > Jun 10 17:10:23 httpd.portal(2561) INFO: Matched rule (catchall) in > source email, returning actions. (pf::Authentication::Source::match) > Jun 10 17:10:23 httpd.portal(2561) INFO: person [email protected] > modified to [email protected] (pf::person::person_modify) > Jun 10 17:10:23 httpd.portal(2561) INFO: re-evaluating access for node > 00:23:5a:47:21:78 (manage_register called) > (pf::enforcement::reevaluate_access) > Jun 10 17:10:23 httpd.portal(2561) INFO: switch port for > 00:23:5a:47:21:78 is 192.168.3.10 ifIndex 10033 connection type: Wired > MAC Auth (pf::enforcement::_vlan_reevaluation) > Jun 10 17:10:24 httpd.portal(2561) INFO: new activation code > successfully generated (pf::email_activation::create) > Jun 10 17:10:24 httpd.portal(2561) ERROR: Can't send email to > [email protected]: Connection refused (pf::email_activation::__ANON__) > > > I have checked the Perl Module ( lib/pf/email_activation.pm ) but > there is no sub routine called _ANON_. > > > Thank you for all the help and suggestions, > > Regards, > > --ali > > >> Hi Guys, >> >> i think there is a misunderstood about pf work. >> >> There is no need of mac-detection vlan for port-sec mac-auth and 802.1x. >> >> You can try first only port-security, this technique use only snmp to >> talk to the switch (so configure snmp community public private and >> snmptrap to pf, also configure snmp in the pf switch config). >> If a device plug in a port security enabled port then packetfence will >> receive a snmp trap and check if the device is reg or no (answer a role >> based vlan id or registration vlan) >> >> In case of unreg device, your device will be in the reg vlan and pf will >> give you ip configuration and your device will hit the portal. >> Once register in the portal pf will send a snmp write on the switch to >> change the vlan of the port where the device is. >> >> In the case of mac-auth, pf will receive a radius request and check if >> the device is reg or no and follow the same workflow as before (snmp + >> radius config to do on each side). >> >> In the case of 802.1x, radius will check your username and password and >> if it is ok then send ask packetfence for the vlan to return and follow >> the same workflow as before (snmp + radius config to do on each side). >> >> So try first port-sec (it?s really simple) and try after the other >> method and you will be able to understand how it work and you will be >> able to mix different method. >> >> regards >> Fabrice > ------------------------------------------------------------------------------ > HPCC Systems Open Source Big Data Platform from LexisNexis Risk Solutions > Find What Matters Most in Your Big Data with HPCC Systems > Open Source. Fast. Scalable. Simple. Ideal for Dirty Data. > Leverages Graph Analysis for Fast Processing & Easy Data Exploration > http://p.sf.net/sfu/hpccsystems > _______________________________________________ > PacketFence-users mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/packetfence-users -- Fabrice Durand [email protected] :: +1.514.447.4918 (x135) :: www.inverse.ca Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence (http://packetfence.org) ------------------------------------------------------------------------------ HPCC Systems Open Source Big Data Platform from LexisNexis Risk Solutions Find What Matters Most in Your Big Data with HPCC Systems Open Source. Fast. Scalable. Simple. Ideal for Dirty Data. Leverages Graph Analysis for Fast Processing & Easy Data Exploration http://p.sf.net/sfu/hpccsystems _______________________________________________ PacketFence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
