New PacketFence user here. I am trying to configure PacketFence for
hybrid mode. I am trying to configure the inline side first. I have
successfully been able to get a client to get a dhcp address, redirect
to the registration page, login via LDAP, but then get stuck at: Unable
to detect network connectivity. Restarting the client or PacketFence
services does not help.
i think I have a networking issue on packetfence. I have eth0 - where
all of my management, inline, and other vlans are defined. Eth1 is also
installed, and this is intended to be the outgoing/WAN interface for
Inline configuration. I never see a reference in the PF configs for
this interface though. I assigned it an IP via the PF GUI, and its
pingable (outside the Inline L2 network). So, that part at least
worked. I had tried putting all interfaces on eth0, and SNAT using the
management IP address, that yielded no success either. Currently all
vlans are defined on eth0, with eth1 configured/intended on being the
outside/WAN/SNAT interface for INLINE enforcement. I will post the pf
and network conf here to see if that helps. I am ready to provide any
more information if there are any ideas. thanks.
So the flow of traffic should look like VLAN400 (10.99.0.2) eth0
------> Vlan1 (10.1.99.253) eth1
[general]
#
# general.domain
#
# Domain name of PacketFence system.
domain=some.edu
#
# general.dnsservers
#
# Comma-delimited list of DNS servers. Passthroughs are created to
allow queries to these servers from even "trapped" nodes.
dnsservers=10.1.1.19
#
# general.dhcpservers
#
# Comma-delimited list of DHCP servers. Passthroughs are created to
allow DHCP transactions from even "trapped" nodes.
dhcpservers=10.1.1.19,10.1.1.29
[network]
#
# network.interfaceSNAT
# Choose interface(s) where you want to enable snat for passthrough (by
default it's the management interface)
interfaceSNAT=10.1.99.253
[trapping]
#
# trapping.range
#
# Comma-delimited list of address ranges/CIDR blocks that PacketFence
will monitor/detect/trap on. Gateway, network, and
# broadcast addresses are ignored.
range=10.0.0.0/16
[registration]
#
# registration.device_registration
#
# Enable or Disable the ability to register a gaming device using the
specific portal page designed to do it
device_registration=enabled
#
# registration.device_registration_role
#
# The role to assign to gaming devices. If none is specified, the role
of the registrant is used.
device_registration_role=default
[guests_self_registration]
#
# guests_self_registration.guest_pid
#
# What field should we assign to the pid of the guest? Defaults to
email.
guest_pid=phone
[alerting]
#
# alerting.emailaddr
#
# Email address to which notifications of rogue DHCP servers,
violations with an action of "email", or any other
# PacketFence-related message goes to.
[email protected]
#
# alerting.smtpserver
#
# Server through which to send messages to the above emailaddr. The
default is localhost - be sure you're running an SMTP
# host locally if you don't change it!
[email protected]
#
# alerting.subjectprefix
#
#Subject prefix for email notifications of rogue DHCP servers,
violations with an action of "email", or any other
#PacketFence-related message.
subjectprefix=PF ALERT
[database]
#
# database.pass
#
# Password for the mysql database used by PacketFence.
pass=secret_pass
[inline]
#
# inline.interfaceSNAT
# Choose the interface(s) you want to use to enable snat (by default
it´s the management interface)
interfaceSNAT=10.1.99.253
[servicewatch]
#
# servicewatch.restart
#
# Should pfcmd service pf watch restart PF if services are not running?
# You must make sure to call the watch command. Installing it in the
cron is the
# recommended approach:
# */5 * * * * /usr/local/pf/bin/pfcmd service pf watch
restart=enabled
[captive_portal]
#
# captive_portal.network_detection_ip
#
# This IP is used as the webserver who hosts the
common/network-access-detection.gif which is used to detect if network
# access was enabled.
# It cannot be a domain name since it is used in registration or
quarantine where DNS is blackholed.
# It is recommended that you allow your users to reach your packetfence
server and put your LAN's PacketFence IP.
# By default we will make this reach PacketFence's website as an easy
solution.
#
network_detection_ip=10.1.144.45
#
# captive_portal.secure_redirect
#
# If secure_redirect is enabled, the captive portal uses HTTPS when
redirecting
# captured clients. This is the default behavior.
secure_redirect=disabled
[interface eth0]
ip=10.1.144.45
type=management
mask=255.255.0.0
[interface eth0.400]
enforcement=inlinel2
ip=10.99.0.2
type=internal
mask=255.255.224.0
[interface eth0.401]
enforcement=vlan
ip=10.99.128.1
type=internal
mask=255.255.224.0
[interface eth0.402]
enforcement=vlan
ip=10.99.224.1
type=internal
mask=255.255.224.0
networks
[10.99.0.0]
dns=10.1.1.19
dhcp_start=10.99.0.10
gateway=10.99.0.2
domain-name=inlinel2.some.edu
named=enabled
dhcp_max_lease_time=86400
dhcpd=enabled
fake_mac_enabled=disabled
dhcp_end=10.99.31.246
type=inlinel2
netmask=255.255.224.0
dhcp_default_lease_time=86400
[10.99.128.0]
dns=10.99.128.1
dhcp_start=10.99.128.10
gateway=10.99.128.1
domain-name=vlan-registration.some.edu
named=enabled
dhcp_max_lease_time=30
dhcpd=disabled
fake_mac_enabled=disabled
dhcp_end=10.99.159.246
type=vlan-registration
netmask=255.255.224.0
dhcp_default_lease_time=30
[10.99.224.0]
dns=10.99.224.1
dhcp_start=10.99.224.10
gateway=10.99.224.1
domain-name=vlan-isolation.some.edu
named=enabled
dhcp_max_lease_time=30
dhcpd=disabled
fake_mac_enabled=disabled
dhcp_end=10.99.255.246
type=vlan-isolation
netmask=255.255.224.0
dhcp_default_lease_time=30
------------------------------------------------------------------------------
Slashdot TV.
Video for Nerds. Stuff that matters.
http://tv.slashdot.org/
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users