You can install postfix and add in main.cf: relayhost = 10.0.0.1

Regards
Fabrice


Le 2014-10-27 15:09, Christopher Mielke a écrit :
> It is working now. I had neglected to set the “NAC State” option to
> “RADIUS NAC”.
>
> I do have an unrelated question. We do not allow any outbound SMTP that is
> not routed through an SMTP relay we have on campus. How can I configure
> PacketFence to relay all mail through this gateway? Let me know if you
> would prefer I open a different thread.
>
> Thanks,
> _______________________________________
> Chris Mielke  |  Lead, ISS Network Systems
> Drake Technology Services (DTS) | Drake University
>   
> T  515.271.4640
> E  [email protected]
>
>
>
>
> On 10/27/14, 12:41 PM, "Fabrice DURAND" <[email protected]> wrote:
>
>> Ok this is better, so now i think you have a misconfiguration in the WLC.
>>
>> Check if that is the same on the WLC
>> https://github.com/inverse-inc/packetfence/blob/devel/docs/images/SSID_6.p
>> ng
>> (NAC State)
>>
>> Regards
>> Fabrice
>>
>>
>>
>> Le 2014-10-27 12:48, Christopher Mielke a écrit :
>>> Ok, I believe the switch type was incorrect. I set it to Cisco::WLC_http
>>> and now receive the following output from RADIUS:
>>>
>>> +++[packetfence] = ok
>>> ++} # if (!EAP-Type || (EAP-Type != EAP-TTLS  && EAP-Type != PEAP)) = ok
>>> +} # group post-auth = ok
>>> Sending Access-Accept of id 68 to 172.31.255.20 port 32768
>>>     Cisco-AVPair += "url-redirect-acl=PreAuth4WebRedirect"
>>>     Cisco-AVPair += "url-redirect=http://192.168.254.10/cep1cb5c0";
>>>     User-Name = "a0:88:b4:17:73:a4"
>>> Finished request 1.
>>>
>>> However, when I view the client on the controller the redirect URL is
>>> applied, but the PreAuth ACL is not. When I open a browser I am not
>>> redirect to the captive portal. The client is fully connected and free
>>> to
>>> roam the Internet. If I set the switch type in PacketFence back to
>>> Cisco::WLC_2500 the PreAuth ACL is set, but I never receive the redirect
>>> URL. I cannot connect to the captive portal or anything else.
>>>
>>>
>>>
>>> Thanks,
>>> _______________________________________
>>> Chris Mielke  |  Lead, ISS Network Systems
>>> Drake Technology Services (DTS) | Drake University
>>>    
>>> T  515.271.4640
>>> E  [email protected]
>>>
>>>
>>>
>>>
>>> On 10/27/14, 11:25 AM, "Christopher Mielke" <[email protected]>
>>> wrote:
>>>
>>>> Here is the output:
>>>>
>>>> rad_recv: Access-Request packet from host 172.31.255.20 port 32768,
>>>> id=67,
>>>> length=186
>>>>    User-Name = "a0:88:b4:17:73:a4"
>>>>    Called-Station-Id = "00-27-0d-4a-77-b0:DUGuest-Test"
>>>>    Calling-Station-Id = "a0-88-b4-17-73-a4"
>>>>    NAS-Port = 1
>>>>    NAS-IP-Address = 172.31.255.20
>>>>    NAS-Identifier = "dial2504-wlc-test"
>>>>    Airespace-Wlan-Id = 4
>>>>    User-Password = “supersecretpassword"
>>>>    Service-Type = Call-Check
>>>>    Framed-MTU = 1300
>>>>    NAS-Port-Type = Wireless-802.11
>>>>    Tunnel-Type:0 = VLAN
>>>>    Tunnel-Medium-Type:0 = IEEE-802
>>>>    Tunnel-Private-Group-Id:0 = "500"
>>>> server packetfence {
>>>> # Executing section authorize from file
>>>> /usr/local/pf/raddb/sites-enabled/packetfence
>>>> +group authorize {
>>>> [suffix] No '@' in User-Name = "a0:88:b4:17:73:a4", looking up realm
>>>> NULL
>>>> [suffix] No such realm "NULL"
>>>> ++[suffix] = noop
>>>> ++[preprocess] = ok
>>>> [eap] No EAP-Message, not doing EAP
>>>> ++[eap] = noop
>>>> [files] users: Matched entry DEFAULT at line 1
>>>> ++[files] = ok
>>>> ++[expiration] = noop
>>>> ++[logintime] = noop
>>>> ++update request {
>>>>    expand: %{Packet-Src-IP-Address} -> 172.31.255.20
>>>> ++} # update request = noop
>>>> ++update control {
>>>> ++} # update control = noop
>>>> rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
>>>> rlm_perl: Added pair Service-Type = Call-Check
>>>> rlm_perl: Added pair Tunnel-Medium-Type = IEEE-802
>>>> rlm_perl: Added pair Tunnel-Type = VLAN
>>>> rlm_perl: Added pair Calling-Station-Id = a0-88-b4-17-73-a4
>>>> rlm_perl: Added pair Called-Station-Id = 00-27-0d-4a-77-b0:DUGuest-Test
>>>> rlm_perl: Added pair FreeRADIUS-Client-IP-Address = 172.31.255.20
>>>> rlm_perl: Added pair Airespace-Wlan-Id = 4
>>>> rlm_perl: Added pair User-Name = a0:88:b4:17:73:a4
>>>> rlm_perl: Added pair NAS-Identifier = dial2504-wlc-test
>>>> rlm_perl: Added pair User-Password = p@ck3tf3nc3
>>>> rlm_perl: Added pair NAS-Port = 1
>>>> rlm_perl: Added pair NAS-IP-Address = 172.31.255.20
>>>> rlm_perl: Added pair Tunnel-Private-Group-Id = 500
>>>> rlm_perl: Added pair Framed-MTU = 1300
>>>> rlm_perl: Added pair PacketFence-RPC-Pass =
>>>> rlm_perl: Added pair PacketFence-RPC-Server = 127.0.0.1
>>>> rlm_perl: Added pair PacketFence-RPC-Proto = http
>>>> rlm_perl: Added pair PacketFence-RPC-User =
>>>> rlm_perl: Added pair Auth-Type = Accept
>>>> rlm_perl: Added pair PacketFence-RPC-Port = 9090
>>>> ++[packetfence] = noop
>>>> +} # group authorize = ok
>>>> Found Auth-Type = Accept
>>>> Auth-Type = Accept, accepting the user
>>>> Login OK: [a0:88:b4:17:73:a4] (from client 172.31.255.20 port 1 cli
>>>> a0-88-b4-17-73-a4)
>>>> } # server packetfence
>>>> # Executing section post-auth from file
>>>> /usr/local/pf/raddb/sites-enabled/packetfence
>>>> +group post-auth {
>>>> ++[exec] = noop
>>>> ++? if (!EAP-Type || (EAP-Type != EAP-TTLS  && EAP-Type != PEAP))
>>>> ? Evaluating !(EAP-Type ) -> TRUE
>>>> ?? Skipping (EAP-Type != EAP-TTLS  )
>>>> ?? Skipping (EAP-Type != PEAP)
>>>> ++? if (!EAP-Type || (EAP-Type != EAP-TTLS  && EAP-Type != PEAP)) ->
>>>> TRUE
>>>> ++if (!EAP-Type || (EAP-Type != EAP-TTLS  && EAP-Type != PEAP)) {
>>>> +++update control {
>>>> +++} # update control = noop
>>>> rlm_perl: request from a0:88:b4:17:73:a4 port 1 was accepted but no
>>>> VLAN
>>>> returned. This could be normal. See server logs for details.
>>>> rlm_perl: PacketFence RESULT RESPONSE CODE: 2 (2 means OK)
>>>> rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
>>>> rlm_perl: Added pair Service-Type = Call-Check
>>>> rlm_perl: Added pair Tunnel-Type = VLAN
>>>> rlm_perl: Added pair Tunnel-Medium-Type = IEEE-802
>>>> rlm_perl: Added pair Called-Station-Id = 00-27-0d-4a-77-b0:DUGuest-Test
>>>> rlm_perl: Added pair Calling-Station-Id = a0-88-b4-17-73-a4
>>>> rlm_perl: Added pair Airespace-Wlan-Id = 4
>>>> rlm_perl: Added pair FreeRADIUS-Client-IP-Address = 172.31.255.20
>>>> rlm_perl: Added pair User-Name = a0:88:b4:17:73:a4
>>>> rlm_perl: Added pair User-Password = p@ck3tf3nc3
>>>> rlm_perl: Added pair NAS-Identifier = dial2504-wlc-test
>>>> rlm_perl: Added pair NAS-IP-Address = 172.31.255.20
>>>> rlm_perl: Added pair NAS-Port = 1
>>>> rlm_perl: Added pair Framed-MTU = 1300
>>>> rlm_perl: Added pair Tunnel-Private-Group-Id = 500
>>>> rlm_perl: Added pair Airespace-ACL-Name = PreAuth4WebRedirect
>>>> rlm_perl: Added pair PacketFence-RPC-Pass =
>>>> rlm_perl: Added pair PacketFence-RPC-Server = 127.0.0.1
>>>> rlm_perl: Added pair PacketFence-RPC-User =
>>>> rlm_perl: Added pair PacketFence-RPC-Proto = http
>>>> rlm_perl: Added pair Auth-Type = Accept
>>>> rlm_perl: Added pair PacketFence-RPC-Port = 9090
>>>> +++[packetfence] = ok
>>>> ++} # if (!EAP-Type || (EAP-Type != EAP-TTLS  && EAP-Type != PEAP)) =
>>>> ok
>>>> +} # group post-auth = ok
>>>> Sending Access-Accept of id 67 to 172.31.255.20 port 32768
>>>>    Airespace-ACL-Name = "PreAuth4WebRedirect"
>>>> Finished request 0.
>>>> Going to the next request
>>>> Waking up in 4.9 seconds.
>>>> Cleaning up request 0 ID 67 with timestamp +21
>>>> Ready to process requests.
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> Thanks,
>>>> _______________________________________
>>>> Chris Mielke  |  Lead, ISS Network Systems
>>>> Drake Technology Services (DTS) | Drake University
>>>>
>>>> T  515.271.4640
>>>> E  [email protected]
>>>>
>>>>
>>>>
>>>>
>>>> On 10/23/14, 5:00 PM, "Durand fabrice" <[email protected]> wrote:
>>>>
>>>>> Ok so in a perfect world AAA URL redirect should be something like
>>>>> http://192.168.254.1/cep....
>>>>>
>>>>> Can you run freeradius in debug mode:
>>>>>
>>>>> pkill radiusd
>>>>> radiusd -d /usr/local/pf/raddb -X
>>>>>
>>>>> and paste what is the debug when you try to connect.
>>>>>
>>>>>
>>>>> Regards
>>>>> Fabrice
>>>>>
>>>>> Le 2014-10-23 15:14, Christopher Mielke a écrit :
>>>>>> Here is the output:
>>>>>>
>>>>>> show client detail a088b41773a4
>>>>>> Client MAC Address............................... a0:88:b4:17:73:a4
>>>>>> Client Username ................................. N/A
>>>>>> AP MAC Address................................... 00:27:0d:4a:77:b0
>>>>>> AP Name.......................................... dial1142wap-test
>>>>>> AP radio slot Id................................. 0
>>>>>> Client State..................................... Associated
>>>>>> Client NAC OOB State............................. Access
>>>>>> Wireless LAN Id.................................. 4
>>>>>> Hotspot (802.11u)................................ Not Supported
>>>>>> BSSID............................................ 00:27:0d:4a:77:b3
>>>>>> Connected For ................................... 36 secs
>>>>>> Channel.......................................... 1
>>>>>> IP Address....................................... Unknown
>>>>>> Gateway Address.................................. Unknown
>>>>>> Netmask.......................................... Unknown
>>>>>> IPv6 Address.....................................
>>>>>> fe80::bc0b:5c58:e766:93de
>>>>>> Association Id................................... 1
>>>>>> Authentication Algorithm......................... Open System
>>>>>> Reason Code...................................... 1
>>>>>> Status Code...................................... 0
>>>>>> Session Timeout.................................. 1800
>>>>>> Client CCX version............................... 4
>>>>>> Client E2E version............................... 1
>>>>>> QoS Level........................................ Silver
>>>>>> Avg data Rate.................................... 0
>>>>>> Burst data Rate.................................. 0
>>>>>> Avg Real time data Rate.......................... 0
>>>>>> Burst Real Time data Rate........................ 0
>>>>>> 802.1P Priority Tag.............................. disabled
>>>>>> CTS Security Group Tag........................... Not Applicable
>>>>>> KTS CAC Capability............................... No
>>>>>> WMM Support...................................... Enabled
>>>>>>      APSD ACs.......................................  BK  BE  VI  VO
>>>>>> Power Save....................................... OFF
>>>>>> Current Rate..................................... 54.0
>>>>>> Supported Rates..................................
>>>>>> 12.0,18.0,24.0,36.0,48.0,
>>>>>>        ............................................. 54.0
>>>>>> Mobility State................................... Local
>>>>>> Mobility Move Count.............................. 0
>>>>>> Security Policy Completed........................ Yes
>>>>>> Policy Manager State............................. RUN
>>>>>> Policy Manager Rule Created...................... Yes
>>>>>> AAA Override ACL Name............................ none
>>>>>> AAA Override ACL Applied Status.................. Unavailable
>>>>>> AAA Override Flex ACL Name....................... none
>>>>>> AAA Override Flex ACL Applied Status............. Unavailable
>>>>>> AAA URL redirect................................. none
>>>>>> Audit Session ID.................................
>>>>>> ac1fff1400000016544952a8
>>>>>> AAA Role Type.................................... none
>>>>>> Local Policy Applied............................. none
>>>>>> IPv4 ACL Name.................................... PreAuth4WebRedirect
>>>>>> FlexConnect ACL Applied Status................... Unavailable
>>>>>> IPv4 ACL Applied Status.......................... Yes
>>>>>> IPv6 ACL Name.................................... none
>>>>>> IPv6 ACL Applied Status.......................... Unavailable
>>>>>> Layer2 ACL Name.................................. none
>>>>>> Layer2 ACL Applied Status........................ Unavailable
>>>>>> mDNS Status...................................... Enabled
>>>>>> mDNS Profile Name................................
>>>>>> default-mdns-profile
>>>>>> No. of mDNS Services Advertised.................. 0
>>>>>> Policy Type...................................... N/A
>>>>>> Encryption Cipher................................ None
>>>>>> Protected Management Frame ...................... No
>>>>>> Management Frame Protection...................... No
>>>>>> EAP Type......................................... Unknown
>>>>>> Interface........................................ guest-wl
>>>>>> VLAN............................................. 500
>>>>>> Quarantine VLAN.................................. 0
>>>>>> Access VLAN...................................... 500
>>>>>> Client Capabilities:
>>>>>>          CF Pollable................................ Not implemented
>>>>>>          CF Poll Request............................ Not implemented
>>>>>>          Short Preamble............................. Implemented
>>>>>>          PBCC....................................... Not implemented
>>>>>>          Channel Agility............................ Not implemented
>>>>>>          Listen Interval............................ 90
>>>>>>          Fast BSS Transition........................ Not implemented
>>>>>> Client Wifi Direct Capabilities:
>>>>>>          WFD capable................................ No
>>>>>>          Manged WFD capable......................... No
>>>>>>          Cross Connection Capable................... No
>>>>>>          Support Concurrent Operation............... No
>>>>>> Fast BSS Transition Details:
>>>>>> Client Statistics:
>>>>>>          Number of Bytes Received................... 12120
>>>>>>          Number of Bytes Sent....................... 0
>>>>>>          Total Number of Bytes Sent................. 0
>>>>>>          Total Number of Bytes Recv................. 12120
>>>>>>          Number of Bytes Sent (last 90s)............ 0
>>>>>>          Number of Bytes Recv (last 90s)............ 12120
>>>>>>          Number of Packets Received................. 126
>>>>>>          Number of Packets Sent..................... 0
>>>>>>          Number of Interim-Update Sent.............. 0
>>>>>>          Number of EAP Id Request Msg Timeouts...... 0
>>>>>>          Number of EAP Id Request Msg Failures...... 0
>>>>>>          Number of EAP Request Msg Timeouts......... 0
>>>>>>          Number of EAP Request Msg Failures......... 0
>>>>>>          Number of EAP Key Msg Timeouts............. 0
>>>>>>          Number of EAP Key Msg Failures............. 0
>>>>>>          Number of Data Retries..................... 0
>>>>>>          Number of RTS Retries...................... 0
>>>>>>          Number of Duplicate Received Packets....... 0
>>>>>>          Number of Decrypt Failed Packets........... 0
>>>>>>          Number of Mic Failured Packets............. 0
>>>>>>          Number of Mic Missing Packets.............. 0
>>>>>>          Number of RA Packets Dropped............... 0
>>>>>>          Number of Policy Errors.................... 0
>>>>>>          Radio Signal Strength Indicator............ -67 dBm
>>>>>>          Signal to Noise Ratio...................... 25 dB
>>>>>> Client Rate Limiting Statistics:
>>>>>>          Number of Data Packets Recieved............ 0
>>>>>>          Number of Data Rx Packets Dropped.......... 0
>>>>>>          Number of Data Bytes Recieved.............. 0
>>>>>>          Number of Data Rx Bytes Dropped............ 0
>>>>>>          Number of Realtime Packets Recieved........ 0
>>>>>>          Number of Realtime Rx Packets Dropped...... 0
>>>>>>          Number of Realtime Bytes Recieved.......... 0
>>>>>>          Number of Realtime Rx Bytes Dropped........ 0
>>>>>>          Number of Data Packets Sent................ 0
>>>>>>          Number of Data Tx Packets Dropped.......... 0
>>>>>>          Number of Data Bytes Sent.................. 0
>>>>>>          Number of Data Tx Bytes Dropped............ 0
>>>>>>          Number of Realtime Packets Sent............ 0
>>>>>>          Number of Realtime Tx Packets Dropped...... 0
>>>>>>          Number of Realtime Bytes Sent.............. 0
>>>>>>          Number of Realtime Tx Bytes Dropped........ 0
>>>>>> Nearby AP Statistics:
>>>>>>          dial1142wap-test(slot 0)
>>>>>>            antenna0: 36 secs ago.................... -64 dBm
>>>>>>            antenna1: 36 secs ago.................... -66 dBm
>>>>>>          dial1142wap-test(slot 1)
>>>>>>            antenna0: 112 secs ago................... -77 dBm
>>>>>>            antenna1: 112 secs ago................... -77 dBm
>>>>>> DNS Server details:
>>>>>>          DNS server IP ............................. 0.0.0.0
>>>>>>          DNS server IP ............................. 0.0.0.0
>>>>>> Assisted Roaming Prediction List details:
>>>>>>
>>>>>>     Client Dhcp Required:     True
>>>>>> Allowed (URL)IP Addresses
>>>>>> -------------------------
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>> Thanks,
>>>>>> _______________________________________
>>>>>> Chris Mielke  |  Lead, ISS Network Systems
>>>>>> Drake Technology Services (DTS) | Drake University
>>>>>>     
>>>>>> T  515.271.4640
>>>>>> E  [email protected]
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>> On 10/23/14, 1:57 PM, "Fabrice DURAND" <[email protected]> wrote:
>>>>>>
>>>>>>> Strange it doesn´t detect that it´s a wlc redirection.
>>>>>>> Can you paste a sh client @mac (wlc) ?
>>>>>>>
>>>>>>> Regards
>>>>>>> Fabrice
>>>>>>>
>>>>>>> Le 2014-10-23 14:35, Christopher Mielke a écrit :
>>>>>>>> I didn’t try to ping because of the ACL, but I was able to telnet
>>>>>>>> to
>>>>>>>> the
>>>>>>>> server on port 80. When I open a browser it tries to redirect to
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> “https://pf.drake.edu/captive-portal?destination_url=http://192.168.
>>>>>>>> 25
>>>>>>>> 4
>>>>>>>> .1
>>>>>>>> 0/
>>>>>>>> &”, but then it times out.
>>>>>>>>
>>>>>>>> Thanks,
>>>>>>>> _______________________________________
>>>>>>>> Chris Mielke  |  Lead, ISS Network Systems
>>>>>>>> Drake Technology Services (DTS) | Drake University
>>>>>>>>      
>>>>>>>> T  515.271.4640
>>>>>>>> E  [email protected]
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> On 10/23/14, 12:39 PM, "Fabrice DURAND" <[email protected]> wrote:
>>>>>>>>
>>>>>>>>> Yes this is correct but are you able to ping the portal ip
>>>>>>>>> address ?
>>>>>>>>> (Also change the acl to allow icmp)
>>>>>>>>>
>>>>>>>>> Fabrice
>>>>>>>>>
>>>>>>>>> Le 2014-10-23 12:36, Christopher Mielke a écrit :
>>>>>>>>>> Sorry it took so long to respond. I had to rebuild my test
>>>>>>>>>> environment.
>>>>>>>>>> I
>>>>>>>>>> am able to connect to the SSID and on the wlc I can see the
>>>>>>>>>> “PreAuth”
>>>>>>>>>> access-list is being applied. However, when I open a web browser
>>>>>>>>>> I
>>>>>>>>>> do
>>>>>>>>>> not
>>>>>>>>>> get to the captive portal. I am pointing to production DNS right
>>>>>>>>>> now.
>>>>>>>>>> Is
>>>>>>>>>> that correct?
>>>>>>>>>>
>>>>>>>>>> Thanks,
>>>>>>>>>> _______________________________________
>>>>>>>>>> Chris Mielke  |  Lead, ISS Network Systems
>>>>>>>>>> Drake Technology Services (DTS) | Drake University
>>>>>>>>>>       
>>>>>>>>>> T  515.271.4640
>>>>>>>>>> E  [email protected]
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> On 10/15/14, 12:23 PM, "Fabrice DURAND" <[email protected]>
>>>>>>>>>> wrote:
>>>>>>>>>>
>>>>>>>>>>> Hello Christopher,
>>>>>>>>>>>
>>>>>>>>>>> it depend of your network configuration, but you can use an
>>>>>>>>>>> alias
>>>>>>>>>>> (eth0:1) as the ip address of the captive portal.
>>>>>>>>>>>
>>>>>>>>>>> But let´s start with a simple config, in packetfence create a
>>>>>>>>>>> management
>>>>>>>>>>> interface, registration interface and a isolation interface.
>>>>>>>>>>>
>>>>>>>>>>> The registration interface must be able to talk with the wlc and
>>>>>>>>>>> the
>>>>>>>>>>> devices connected on and don´t forget to disable dhcp on the reg
>>>>>>>>>>> interface.
>>>>>>>>>>> So on the wlc side configure an ACL (Pre-Auth-For-WebRedirect)
>>>>>>>>>>> that
>>>>>>>>>>> forward the traffic to the ip address of the registration
>>>>>>>>>>> interface
>>>>>>>>>>> and
>>>>>>>>>>> configure another ACL (Authorize_any) to allow any any and
>>>>>>>>>>> configure
>>>>>>>>>>> the
>>>>>>>>>>> WLC to be the dhcp server for the client.
>>>>>>>>>>>
>>>>>>>>>>> Then try to connect on the ssid and check the status of the
>>>>>>>>>>> client
>>>>>>>>>>> in
>>>>>>>>>>> the WLC, if all is ok you will be able to see that the ACL
>>>>>>>>>>> applied
>>>>>>>>>>> to
>>>>>>>>>>> the client is the Pre-Auth-For-WebRedirect.
>>>>>>>>>>>
>>>>>>>>>>> Let me know if it´s ok.
>>>>>>>>>>>
>>>>>>>>>>> Regards
>>>>>>>>>>> Fabrice
>>>>>>>>>>>
>>>>>>>>>>> Le 2014-10-14 17:49, Christopher Mielke a écrit :
>>>>>>>>>>>> I am completely new to PacketFence and trying to set up WebAuth
>>>>>>>>>>>> for
>>>>>>>>>>>> a
>>>>>>>>>>>> guest SSID using a Cisco WLC running 7.6.130.0. I have
>>>>>>>>>>>> installed
>>>>>>>>>>>> PacketFence ZEN 4.4.1 and have it running. I am trying to
>>>>>>>>>>>> follow
>>>>>>>>>>>> the
>>>>>>>>>>>> instructions for ³Wireless LAN Controller (WLC) Web Auth² from
>>>>>>>>>>>> the
>>>>>>>>>>>> network
>>>>>>>>>>>> configuration guide, but I¹m confused about the captive portal
>>>>>>>>>>>> configuration. In the guide it says the captive portal is using
>>>>>>>>>>>> IP
>>>>>>>>>>>> address
>>>>>>>>>>>> 172.16.0.250 and the administration (I presume management)
>>>>>>>>>>>> interface
>>>>>>>>>>>> uses
>>>>>>>>>>>> IP address 172.16.0.249. How do I set up a captive portal IP
>>>>>>>>>>>> address
>>>>>>>>>>>> in
>>>>>>>>>>>> the same subnet as the management IP address? I apparently
>>>>>>>>>>>> cannot
>>>>>>>>>>>> use
>>>>>>>>>>>> the
>>>>>>>>>>>> management IP for the captive portal because iptables blocks
>>>>>>>>>>>> HTTP(S)
>>>>>>>>>>>> traffic to that IP address because it is in the
>>>>>>>>>>>> ³input-management-if²
>>>>>>>>>>>> chain.
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> Thanks,
>>>>>>>>>>>> Chris
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> ----------------------------------------------------------------
>>>>>>>>>>>> --
>>>>>>>>>>>> -
>>>>>>>>>>>> --
>>>>>>>>>>>> --
>>>>>>>>>>>> --
>>>>>>>>>>>> -----
>>>>>>>>>>>> Comprehensive Server Monitoring with Site24x7.
>>>>>>>>>>>> Monitor 10 servers for $9/Month.
>>>>>>>>>>>> Get alerted through email, SMS, voice calls or mobile push
>>>>>>>>>>>> notifications.
>>>>>>>>>>>> Take corrective actions from your mobile device.
>>>>>>>>>>>> http://p.sf.net/sfu/Zoho
>>>>>>>>>>>> _______________________________________________
>>>>>>>>>>>> PacketFence-users mailing list
>>>>>>>>>>>> [email protected]
>>>>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>>>>>>> -- 
>>>>>>>>>>> Fabrice Durand
>>>>>>>>>>> [email protected] ::  +1.514.447.4918 (x135) ::  www.inverse.ca
>>>>>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and
>>>>>>>>>>> PacketFence
>>>>>>>>>>> (http://packetfence.org)
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> -----------------------------------------------------------------
>>>>>>>>>>> --
>>>>>>>>>>> -
>>>>>>>>>>> --
>>>>>>>>>>> --
>>>>>>>>>>> --
>>>>>>>>>>> ----
>>>>>>>>>>> Comprehensive Server Monitoring with Site24x7.
>>>>>>>>>>> Monitor 10 servers for $9/Month.
>>>>>>>>>>> Get alerted through email, SMS, voice calls or mobile push
>>>>>>>>>>> notifications.
>>>>>>>>>>> Take corrective actions from your mobile device.
>>>>>>>>>>> http://p.sf.net/sfu/Zoho
>>>>>>>>>>> _______________________________________________
>>>>>>>>>>> PacketFence-users mailing list
>>>>>>>>>>> [email protected]
>>>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>>>>>> ------------------------------------------------------------------
>>>>>>>>>> --
>>>>>>>>>> -
>>>>>>>>>> --
>>>>>>>>>> --
>>>>>>>>>> -----
>>>>>>>>>> _______________________________________________
>>>>>>>>>> PacketFence-users mailing list
>>>>>>>>>> [email protected]
>>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>>>>> -- 
>>>>>>>>> Fabrice Durand
>>>>>>>>> [email protected] ::  +1.514.447.4918 (x135) ::  www.inverse.ca
>>>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and
>>>>>>>>> PacketFence
>>>>>>>>> (http://packetfence.org)
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> -------------------------------------------------------------------
>>>>>>>>> --
>>>>>>>>> -
>>>>>>>>> --
>>>>>>>>> --
>>>>>>>>> ----
>>>>>>>>> _______________________________________________
>>>>>>>>> PacketFence-users mailing list
>>>>>>>>> [email protected]
>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>>>> --------------------------------------------------------------------
>>>>>>>> --
>>>>>>>> -
>>>>>>>> --
>>>>>>>> -----
>>>>>>>> _______________________________________________
>>>>>>>> PacketFence-users mailing list
>>>>>>>> [email protected]
>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>>> -- 
>>>>>>> Fabrice Durand
>>>>>>> [email protected] ::  +1.514.447.4918 (x135) ::  www.inverse.ca
>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and
>>>>>>> PacketFence
>>>>>>> (http://packetfence.org)
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> ---------------------------------------------------------------------
>>>>>>> --
>>>>>>> -
>>>>>>> --
>>>>>>> ----
>>>>>>> _______________________________________________
>>>>>>> PacketFence-users mailing list
>>>>>>> [email protected]
>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>> ----------------------------------------------------------------------
>>>>>> --
>>>>>> -
>>>>>> -----
>>>>>> _______________________________________________
>>>>>> PacketFence-users mailing list
>>>>>> [email protected]
>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>
>>>>> -----------------------------------------------------------------------
>>>>> --
>>>>> -
>>>>> ----
>>>>> _______________________________________________
>>>>> PacketFence-users mailing list
>>>>> [email protected]
>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>> -------------------------------------------------------------------------
>>> -----
>>> _______________________________________________
>>> PacketFence-users mailing list
>>> [email protected]
>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>
>> -- 
>> Fabrice Durand
>> [email protected] ::  +1.514.447.4918 (x135) ::  www.inverse.ca
>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence
>> (http://packetfence.org)
>>
>>
>> --------------------------------------------------------------------------
>> ----
>> _______________________________________________
>> PacketFence-users mailing list
>> [email protected]
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
> ------------------------------------------------------------------------------
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users


-- 
Fabrice Durand
[email protected] ::  +1.514.447.4918 (x135) ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org)


------------------------------------------------------------------------------
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to