Hi.
I am using PF 5.0.0 (although I have had the same issue on 4.7.0 as well)
cat /proc/versionLinux version 2.6.32-504.12.2.el6.x86_64
([email protected]) (gcc version 4.4.7 20120313 (Red Hat
4.4.7-11) (GCC) ) #1 SMP Wed Mar 11 22:03:14 UTC 2015
cat /etc/redhat-releaseCentOS release 6.6 (Final)
I have three interfaces but eth0 is not managed by PF (as it's connected to a
private subnet). I am using PF in inline mode. When I connect a client to an
AP, I see the following in the pfdhcplistener logs, but the client is unable to
acquire an IP address.
Apr 22 19:05:24 pfdhcplistener(10757) WARN: pfdhcplistener for eth2 finished -
this is bad. Are you sure the interface you are trying to run the listener on
is configured in packetfence to do so? (main::)Apr 22 19:05:24
pfdhcplistener(10757) INFO: stopping pfdhcplistener for interface eth2
(main::END)Apr 22 19:05:59 pfdhcplistener(11063) INFO: pfdhcplistener_eth1
starting and writing 11066 to /usr/local/pf/var/run/pfdhcplistener_eth1.pid
(pf::services::util::createpid)Apr 22 19:05:59 pfdhcplistener(11063) WARN: DHCP
detector on an inline interface (main::)Apr 22 19:05:59 pfdhcplistener(11063)
INFO: Instantiate a new iptables modification method. pf::ipset
(pf::inline::get_technique)Apr 22 19:05:59 pfdhcplistener(11063) WARN: Unable
to open VLAN proc description for eth1: No such file or directory
(pf::util::get_vlan_from_int)Apr 22 19:05:59 pfdhcplistener(11063) INFO: DHCP
detector on eth1 enabled (main::)Apr 22 19:06:00 pfdhcplistener(11069) INFO:
pfdhcplistener_eth2 starting and writing 11072 to
/usr/local/pf/var/run/pfdhcplistener_eth2.pid
(pf::services::util::createpid)Apr 22 19:06:00 pfdhcplistener(11069) WARN:
Unable to open VLAN proc description for eth2: No such file or directory
(pf::util::get_vlan_from_int)Apr 22 19:06:00 pfdhcplistener(11069) INFO: DHCP
detector on eth2 enabled (main::)
Apr 22 19:06:44 pfdhcplistener(11063) INFO: DHCPREQUEST from 60:03:08:a5:84:3a
(10.252.7.120) with lease of 7776000 seconds (main::parse_dhcp_request)Apr 22
19:06:44 pfdhcplistener(11063) INFO: 60:03:08:a5:84:3a requested an IP. DHCP
Fingerprint: OS::202 (Mac OS X Lion). Modified node with last_dhcp = 2015-04-22
19:06:44,computername = Blocks-MBP,dhcp_fingerprint = 1,3,6,15,119,95,252,44,46
(main::listen_dhcp)
Here's my packetfence.log
Apr 22 19:05:28 pfcmd.pl(10934) INFO: Daemon memcached took 0.004 seconds to
start. (pf::services::manager::launchService)Apr 22 19:05:28 pfcmd.pl(10934)
INFO: generating /usr/local/pf/var/conf/ssl-certificates.conf
(pf::services::manager::httpd::generateConfig)Apr 22 19:05:28 pfcmd.pl(10934)
INFO: generating /usr/local/pf/var/conf/captive-portal-common.conf
(pf::services::manager::httpd::generateConfig)Apr 22 19:05:36 pfcmd.pl(10934)
INFO: Daemon httpd.admin took 7.498 seconds to start.
(pf::services::manager::launchService)Apr 22 19:05:46 pfcmd.pl(10934) INFO:
pf::services::manager, /usr/local/pf/lib/pf/services/manager.pm, 171
(pf::services::manager::dhcpd::generateConfig)Apr 22 19:05:46 pfcmd.pl(10934)
INFO: Daemon dhcpd took 0.025 seconds to start.
(pf::services::manager::launchService)Apr 22 19:05:47 pfcmd.pl(10934) INFO:
Daemon httpd.aaa took 1.547 seconds to start.
(pf::services::manager::launchService)Apr 22 19:05:52 pfcmd.pl(10934) INFO:
Daemon httpd.portal took 2.954 seconds to start.
(pf::services::manager::launchService)Apr 22 19:05:56 pfcmd.pl(10934) INFO:
Daemon httpd.webservices took 1.538 seconds to start.
(pf::services::manager::launchService)Apr 22 19:05:57 pfcmd.pl(10934) INFO:
Instantiate a new iptables modification method. pf::ipset
(pf::inline::get_technique)Apr 22 19:05:57 pfcmd.pl(10934) INFO: saving
existing iptables to /usr/local/pf/var/iptables.bak
(pf::iptables::iptables_save)Apr 22 19:05:58 pfcmd.pl(10934) WARN: We are using
IPSET (pf::ipset::iptables_generate)Apr 22 19:05:58 pfcmd.pl(10934) INFO:
flushing iptables (pf::ipset::iptables_flush_mangle)Apr 22 19:05:58
pfcmd.pl(10934) INFO: Adding DNS DNAT rules for unregistered and isolated
inline clients. (pf::iptables::generate_inline_rules)Apr 22 19:05:58
pfcmd.pl(10934) INFO: Adding NAT Masquarade statement (PAT)
(pf::iptables::generate_inline_rules)Apr 22 19:05:58 pfcmd.pl(10934) INFO:
Addind ROUTED statement (pf::iptables::generate_inline_rules)Apr 22 19:05:58
pfcmd.pl(10934) INFO: building firewall to accept registered users through
inline interface (pf::iptables::generate_inline_rules)Apr 22 19:05:58
pfcmd.pl(10934) INFO: restoring iptables from
/usr/local/pf/var/conf/iptables.conf (pf::iptables::iptables_restore)Apr 22
19:05:58 pfcmd.pl(10934) INFO: Daemon pfdhcplistener_eth1 took 0.004 seconds to
start. (pf::services::manager::launchService)Apr 22 19:05:59 pfcmd.pl(10934)
INFO: Daemon pfdhcplistener_eth2 took 0.004 seconds to start.
(pf::services::manager::launchService)Apr 22 19:06:00 pfcmd.pl(10934) INFO:
Daemon pfdns took 0.004 seconds to start.
(pf::services::manager::launchService)Apr 22 19:06:03 pfcmd.pl(10934) INFO:
Daemon pfmon took 1.513 seconds to start.
(pf::services::manager::launchService)Apr 22 19:06:03 pfcmd.pl(10934) INFO:
generating /usr/local/pf/var/conf/snmptrapd.conf
(pf::services::manager::snmptrapd::generateConfig)Apr 22 19:06:03
pfcmd.pl(10934) INFO: Daemon snmptrapd took 0.035 seconds to start.
(pf::services::manager::launchService)Apr 22 19:06:05 pfsetvlan(11098) INFO:
pfsetvlan starting and writing 11102 to /usr/local/pf/var/run/pfsetvlan.pid
(pf::services::util::createpid)Apr 22 19:06:05 pfsetvlan(11098) INFO: Process
started (main::)Apr 22 19:06:05 pfcmd.pl(10934) INFO: Daemon pfsetvlan took
1.434 seconds to start. (pf::services::manager::launchService)Apr 22 19:06:05
pfcmd.pl(10934) INFO: Daemon radiusd took 0.312 seconds to start.
(pf::services::manager::launchService)
This is sudoers information on 'pf'pf ALL=NOPASSWD: /sbin/iptables,
/usr/sbin/ipset, /sbin/ip, /sbin/vconfig, /sbin/route, /sbin/service,
/usr/bin/tee, /usr/local/pf/sbin/pfdhcplistener, /bin/kill, /usr/sbin/dhcpd,
/usr/sbin/radiusd, /usr/sbin/snort, /usr/bin/suricata,
/usr/sbin/conntrackDefaults:pf !requiretty
Here's the output for iptables mangle
Here's the output for iptables -t mangle (I am logged in as root, when I run
this command) iptables -t mangle -L -nvChain PREROUTING (policy ACCEPT 1167
packets, 449K bytes) pkts bytes target prot opt in out source
destination 344 49648 prerouting-int-inline-if all -- eth1 *
0.0.0.0/0 0.0.0.0/0Chain INPUT (policy ACCEPT 581 packets, 391K
bytes) pkts bytes target prot opt in out source
destinationChain FORWARD (policy ACCEPT 0 packets, 0 bytes) pkts bytes target
prot opt in out source destinationChain OUTPUT (policy
ACCEPT 769 packets, 380K bytes) pkts bytes target prot opt in out
source destinationChain POSTROUTING (policy ACCEPT 769 packets,
380K bytes) pkts bytes target prot opt in out source
destinationChain prerouting-int-inline-if (1 references) pkts bytes target
prot opt in out source destination 344 49648 MARK
all -- * * 0.0.0.0/0 0.0.0.0/0 MARK set 0x3
0 0 MARK all -- * * 0.0.0.0/0 0.0.0.0/0
match-set pfsession_Unreg_172.31.30.0 src,src MARK set 0x3 0 0 MARK
all -- * * 0.0.0.0/0 0.0.0.0/0
match-set pfsession_Reg_172.31.30.0 src,src MARK set 0x1 0 0 MARK
all -- * * 0.0.0.0/0 0.0.0.0/0 match-set
pfsession_Isol_172.31.30.0 src,src MARK set 0x2
Here's my pf.conf and networks.conf
cat
/usr/local/pf/conf/networks.conf[172.31.30.0]dns=8.8.8.8dhcp_start=172.31.30.10gateway=172.31.30.10domain-name=inlinel2.mydomain.comnat_enabled=enablednamed=enableddhcp_max_lease_time=86400fake_mac_enabled=disableddhcpd=enableddhcp_end=172.31.30.246type=inlinel2netmask=255.255.255.0dhcp_default_lease_time=86400
cat /usr/local/pf/conf/pf.conf[general]## general.domain## Domain name of
PacketFence system.domain=mydomain.com## general.hostname## Hostname of
PacketFence system. This is concatenated with the domain in Apache rewriting
rules and therefore must be resolvable by clients.hostname=guest
[trapping]## trapping.range## Comma-delimited list of address ranges/CIDR
blocks that Snort/Suricata will monitor/detect/trap on. Gateway, network, and#
broadcast addresses are ignored.range=10.0.0.0/8
[alerting]## alerting.emailaddr## Email address to which notifications of rogue
DHCP servers, violations with an action of "email", or any other#
PacketFence-related message goes [email protected]
[database]## database.pass## Password for the mysql database used by
PacketFence.pass=PASSWORD## database.db## Name of the mysql database used by
PacketFence.db=pf
[interface
eth1]enforcement=inlinel2ip=172.31.30.11type=internalvip=172.31.30.10mask=255.255.255.0
[interface eth2]ip=172.30.10.200type=managementmask=255.255.255.0
I also have keepalived installed for the vrrp VIP. Here's my keepalived.conf
cat /etc/keepalived/keepalived.conf! Configuration File for
keepalivedglobal_defs { notification_email { [email protected] }
notification_email_from [email protected] smtp_server 127.0.0.1
smtp_connect_timeout 30 router_id machine01}
vrrp_instance VI_3 { state MASTER interface eth1
smtp_alert virtual_router_id 12 priority 101 advert_int 1
authentication { auth_type PASS auth_pass
PASSWORD # use 8 chars & something better } virtual_ipaddress {
172.31.30.10 dev eth1 }}
------------------------------------------------------------------------------
BPM Camp - Free Virtual Workshop May 6th at 10am PDT/1PM EDT
Develop your own process in accordance with the BPMN 2 standard
Learn Process modeling best practices with Bonita BPM through live exercises
http://www.bonitasoft.com/be-part-of-it/events/bpm-camp-virtual- event?utm_
source=Sourceforge_BPM_Camp_5_6_15&utm_medium=email&utm_campaign=VA_SF
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users