I am using 6.1, but Ive been using a custom perl script to update from RADIUS 
accounting since 5.0 so it hasn't changed.
So that means that, from what you can experience, it is broken ? I'll have a 
deeper look at it because we do have some clients with which it is working fine.

Im on 5.0.  Maybe it was the short lease times for the registration/isolation 
network?
Since PacketFence v.5, DB entries for iplog are handled differently. I'm not 
sure I understand what kind of "a lot of entries" you were getting.

Cheers!
dw.

--
Derek Wuelfrath
[email protected] :: +1.514.447.4918 (x110) :: +1.866.353.6153 (x110)
Inverse inc. (www.inverse.ca) :: Leaders behind SOGo (www.sogo.nu) and 
PacketFence (www.packetfence.org)

On May 19, 2015 at 10:48:06, Tim DeNike ([email protected]) wrote:

I am using 6.1, but Ive been using a custom perl script to update from RADIUS 
accounting since 5.0 so it hasn't changed.

Im using the UDP reflector for L3 DHCP messages now.  This wouldn't have worked 
when I was using DHCP Relay before.

Im on 5.0.  Maybe it was the short lease times for the registration/isolation 
network?


On Tue, May 19, 2015 at 10:00 AM, Derek Wuelfrath <[email protected]> wrote:
Hello Tim,

First of all, thanks for reporting!

Problem:  Palo Alto timeout expects minutes, not seconds (At least on 6.1, 
can't say for sure, so the timeout is set WAY higher than it should be.
Resolution:  $timeout = ( $timeout / 60); in PaloAlto.pm
Were you using Palo Alto before 6.1 ? I’d change it but I don’t want it to 
break previous versions. I’ll have a look at their “Changelog”.

Problem:  SSO (And update_iplog in general from pfdhcplistener) use the clients 
REQUESTED lease time for SSO updates.  For an iPhone, I see 7776000.  This 
isn't what the DHCP server said to use, so its inaccurate.
Solution:  Move the call to firewallsso from the parse_dhcp_request sub to 
parse_dhcp_ack sub.
You are effecively right. We should consider the ACK in that case. The problem 
that I see would be when PacketFence is configured to receive a copy of the 
DHCP traffic in L3 environment… in thoses cases, ACK is sent unicast to the 
requesting client which means that PacketFence wouldn’t receive a copy of it...

Also. I actually disabled update_iplog in parse_dhcp_request, and for DHCPACK 
CIADDR in parse_dhcp_ack because it seems to generate a TON of extra iplog 
entries every time devices rebind.  Ive never seen one with a lease time 
defined, so it seems redundant. 
Which version of PacketFence are you running ? Starting with v5, we modified 
iplog so that there’s no new entry beeing created and we are “updating” 
existing ones.


Cheers!
dw.

-- 
Derek Wuelfrath
[email protected] :: +1.514.447.4918 (x110) :: +1.866.353.6153 (x110)
Inverse inc. (www.inverse.ca) :: Leaders behind SOGo (www.sogo.nu) and 
PacketFence (www.packetfence.org)

On May 15, 2015 at 12:53:45, Tim DeNike ([email protected]) wrote:

Problem:  Palo Alto timeout expects minutes, not seconds (At least on 6.1, 
can't say for sure, so the timeout is set WAY higher than it should be.
Resolution:  $timeout = ( $timeout / 60); in PaloAlto.pm

Problem:  SSO (And update_iplog in general from pfdhcplistener) use the clients 
REQUESTED lease time for SSO updates.  For an iPhone, I see 7776000.  This 
isn't what the DHCP server said to use, so its inaccurate.
Solution:  Move the call to firewallsso from the parse_dhcp_request sub to 
parse_dhcp_ack sub.


Also. I actually disabled update_iplog in parse_dhcp_request, and for DHCPACK 
CIADDR in parse_dhcp_ack because it seems to generate a TON of extra iplog 
entries every time devices rebind.  Ive never seen one with a lease time 
defined, so it seems redundant. 


------------------------------------------------------------------------------
One dashboard for servers and applications across Physical-Virtual-Cloud
Widest out-of-the-box monitoring support with 50+ applications
Performance metrics, stats and reports that give you Actionable Insights
Deep dive visibility with transaction tracing using APM Insight.
http://ad.doubleclick.net/ddm/clk/290420510;117567292;y_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

------------------------------------------------------------------------------
One dashboard for servers and applications across Physical-Virtual-Cloud 
Widest out-of-the-box monitoring support with 50+ applications
Performance metrics, stats and reports that give you Actionable Insights
Deep dive visibility with transaction tracing using APM Insight.
http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to