Thank you for your quick response!
I'm using the latest version of PF (5.1.0), I'll provide here the
configuration files:
And That's what I thought Too: there is radius no communication between the
server and the switch, but still i don't know how to fix that!

Switch configuration (cisco 2960):

!
username admin privilege 15 secret 5 $1$OhO3$Ab2iIMl8Bsou6feNobkvK.
!
!
aaa new-model
!
!
aaa group server radius packetfence
 server 192.168.0.1 auth-port 1812 acct-port 1813
!
aaa authentication login default local
aaa authentication dot1x default group packetfence
aaa authorization network default group packetfence
!
!
aaa server radius dynamic-author
 client 192.168.0.1 server-key testing123
 port 3799
!
aaa session-id common
system mtu routing 1500
!
!
!
!
!
dot1x system-auth-control
!
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
!

interface FastEthernet0/1
 switchport mode trunk

!
!
interface FastEthernet0/12
!
interface FastEthernet0/13
 description NAC_controlled
 switchport mode access
 switchport port-security maximum 2
 switchport port-security maximum 1 vlan access
 switchport port-security
 authentication order mab dot1x
 authentication priority mab dot1x
 authentication port-control auto
 authentication periodic
 authentication timer restart 10800
 authentication timer reauthenticate 10800
 mab
 mls qos trust cos
 no snmp trap link-status
 dot1x pae authenticator
 dot1x timeout quiet-period 2
 dot1x timeout tx-period 3
 spanning-tree portfast
 spanning-tree bpdufilter enable
 spanning-tree bpduguard enable
 spanning-tree guard loop
!
!
!

interface FastEthernet0/14
 description NAC_controlled
 switchport mode access
 switchport port-security maximum 2
 switchport port-security maximum 1 vlan access
 switchport port-security
 authentication order mab
 authentication port-control auto
 mab
 mls qos trust cos
 spanning-tree portfast
 spanning-tree bpdufilter enable
 spanning-tree bpduguard enable
 spanning-tree guard loop
!
!
!
interface Vlan1
 ip address 192.168.0.254 255.255.255.0
 ip helper-address 192.168.0.1
!
interface Vlan2
 ip address 192.168.2.254 255.255.255.0
 ip helper-address 192.168.0.1
!
interface Vlan3
 ip address 192.168.3.254 255.255.255.0
 ip helper-address 192.168.0.1
!
interface Vlan10
 ip address 192.168.1.254 255.255.255.0
ip helper-address 192.168.0.1
!
ip http server
ip http secure-server
snmp-server community ciscoWrite RW
snmp-server community ciscoRead RO
radius-server host 192.168.0.1 auth-port 1812 acct-port 1813 timeout 2
key testing123
radius-server key testing123
radius-server vsa send authentication
!
line con 0
 password root
line vty 5 15
!
end
!

========================================================================================

Switches.conf looks like that:

[default]
description=Switches Default Values
vlans=1,2,3,4,5
normalVlan=1
registrationVlan=2
isolationVlan=3
macDetectionVlan=4
voiceVlan=5
inlineVlan=6
inlineTrigger=
normalRole=normal
registrationRole=registration
isolationRole=isolation
macDetectionRole=macDetection
voiceRole=voice
inlineRole=inline
VoIPEnabled=no
VlanMap=Y
RoleMap=Y
mode=testing
macSearchesMaxNb=30
macSearchesSleepInterval=2
uplink=dynamic

SNMPVersion=1
SNMPCommunityRead=public
SNMPCommunityWrite=private

SNMPVersionTrap=1
SNMPCommunityTrap=public
radiusSecret=testing123

[192.168.0.1]
description=Cisco 2960
type=Cisco::Catalyst_2960
mode=production
deauthMethod=RADIUS
AccessListMap=N
VoIPEnabled=N
defaultRole=normal
defaultVlan=10
radiusSecret=testing123
SNMPCommunityRead=ciscoRead
SNMPCommunityWrite=ciscoWrite
SNMPVersion=2c

================================================================
pf.config :

[general]
domain=fssm.local
hostname=pf.fssm.local

[database]
pass=root

[omapi]
key_base64=Zop2OvYAwVao7hTz+kBx/w==

[interface eth0.2]
enforcement=vlan
ip=192.168.2.1
type=internal
mask=255.255.255.0

[interface eth0.3]
enforcement=vlan
ip=192.168.3.1
type=internal
mask=255.255.255.0

[interface eth0]
ip=192.168.0.1
type=management,high-availability
mask=255.255.255.0

===========================================================
And radius.conf in /raddb/radius/radius.conf :
prefix = /usr
exec_prefix = /usr
sysconfdir = /etc
localstatedir = /usr/local/pf/var
sbindir = /usr/sbin
logdir = /usr/local/pf/logs
raddbdir = /usr/local/pf/var/radiusd
radacctdir = /usr/local/pf/logs/radacct

name = radiusd

confdir = ${raddbdir}
run_dir = ${localstatedir}/run

db_dir = ${raddbdir}

libdir = /usr/lib/freeradius
pidfile = ${run_dir}/${name}.pid

rpc_user   = ''
rpc_pass   = ''
rpc_port   = 7070
rpc_host   = 127.0.0.1
rpc_proto  = http


user = pf
group = pf

max_request_time = 10
cleanup_delay = 5
max_requests = 20000

listen {
        type = auth
        ipaddr = 192.168.0.1
        port = 0
virtual_server = packetfence
}

listen {
        ipaddr = 192.168.0.1
        port = 0
        type = acct
virtual_server = packetfence
}

hostname_lookups = no
allow_core_dumps = no

regular_expressions     = yes
extended_expressions    = yes

log {
        destination = files
        file = ${logdir}/radius.log
        syslog_facility = daemon
        stripped_names = no
        auth = yes
        auth_badpass = no
        auth_goodpass = no
}

checkrad = ${sbindir}/checkrad

security {
        max_attributes = 200
        reject_delay = 1
        status_server = yes
        # On Centos, even if the openssl lib has been patched, freeradius
refuse to start. Make sure you update openssl.
        allow_vulnerable_openssl = yes
}

proxy_requests  = yes
$INCLUDE proxy.conf
$INCLUDE clients.conf

thread pool {
        start_servers = 5
        max_servers = 64
        min_spare_servers = 3
        max_spare_servers = 10
        max_requests_per_server = 0
}

modules {
        $INCLUDE ${confdir}/modules/
        $INCLUDE eap.conf
        $INCLUDE sql.conf
}

instantiate {
        exec
        expr
        expiration
        logintime
        sql
        raw
}

$INCLUDE policy.conf
$INCLUDE sites-enabled/
------------------------------------------------------------------------------
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to