Can you paste your switches.conf ?

fabrice


Le 2015-07-31 22:30, Polar Geek a écrit :

Fabrice,

As I stated in the original message the Controller is set in the switch configuration it just appears to be ignoring that setting and is attempting to connect to the AP directly still

Jul 30 02:29:26 httpd.webservices(2088) INFO: [50:3c:c4:71:25:c3] DesAssociating mac on switch (10.10.10.120) (pf::api::desAssociate)

Jul 30 02:29:26 httpd.webservices(2088) ERROR: ERROR: Can not connect to controller 10.10.10.120 using SSH (pf::Switch::HP::MSM::_deauthenticateMacWithSSH)

Or are you saying that the error message in itself contains an error and is attempting to connect to the controller as specified but the log still shows the AP ip?

Paul

*From:*Durand fabrice [mailto:[email protected]]
*Sent:* July 31, 2015 8:22 PM
*To:* [email protected]
*Subject:* Re: [PacketFence-users] HP MSM DeAuthentication issue

Hi Paul,

Ok you have a controller , so use it as the controller ip in switch configuration
And try:
su - pf
ssh admin@controller_ip

Regards
Fabrice

Le 2015-07-31 22:14, Polar Geek a écrit :

    Fabrice,

    Sorry missed your reply until now.

    At any rate the connection to the AP is refused.

    ssh: connect to host 10.10.10.120 port 22: Connection refused

    I don’t think connecting to the AP directly will ever work in
    controlled mode. Per the manual

    In controlled mode, access to the CLI is possible only before the
    control channel to the

    controller is established, which can occur in the following scenarios:

    􀂄Network failures prevent a control channel from being created.

    􀂄After an AP is restarted, prior to establishment of the control
    channel (during the brief

    controller discovery process).

    When the AP is in controlled mode, a reduced number of CLI
    commands are available. The

    most notable command is *switch operational mode*, which enables
    you to switch the AP to

    autonomous mode. The *config *context is not available.

    So the setup really needs to honor the controller IP setting and
    send the commands there, which is does not appear to be doing.

    Thanks,

    Paul

    *From:*Fabrice DURAND [mailto:[email protected]]
    *Sent:* July 30, 2015 6:20 AM
    *To:* [email protected]
    <mailto:[email protected]>
    *Subject:* Re: [PacketFence-users] HP MSM DeAuthentication issue

    Hello Paul,

    let's do a:
    su - pf
    ssh [email protected] <mailto:[email protected]>
    and accept the key then retry.

    Regards
    Fabrice

    Le 2015-07-30 05:19, Polar Geek a écrit :

        Hello again,

        Thanks for all the help so far. I’m happily nearly completely
        functional with my initial testing of PF 5.3.1 but I’ve got a
        couple remaining issues.

        My wireless infrastructure is an HP MSM760 mobility control
        with 55 MSM460 access points. Currently I have added the
        controller and the AP on my desk to the system for testing.
        The configuration mostly works except for one issue. When I
        connect a new device to the SSID is have configured for
        mac-authentication, I am successfully connected to the captive
        portal. I can then authorize the system and PF appears to be
        making the necessary changes for network access. The problem
        is that disassociation never occurs because the server is
        ignoring the Controller IP Address set in the switch config
and is instead attempting to connect to the AP directly, which will not work as direct SSH connections to the Aps are
        not available when the APs are in controlled mode. If I
        manually disconnect/reconnect or restart the device the system
        works as expected. As you can see from the logs below the PF
        server is attempting to contact 10.10..10.120 but should be
        contacting 10.10.10.2

        What I believe to be the relevant logs and config file
        excerpts are below.

        Any ideas what I’m missing here?

        Thanks,

        Paul

        ****Initial Connection****

        Jul 30 02:29:24 httpd.portal(3485) INFO: [LCHS-DC00
        EmployeeDevReg] Found a match
        (CN=StaffRegistration,OU=Staff,OU=LutherUsers,DC=luthercollege,DC=edu)
        (pf::Authentication::Source::LDAPSource::match_in_subclass)

        Jul 30 02:29:24 httpd.portal(3485) INFO: Matched rule
        (EmployeeDevReg) in source LCHS-DC00, returning actions.
        (pf::Authentication::Source::match)

        Jul 30 02:29:24 httpd.portal(3485) INFO: Just finished seting
        the node up
        
(captiveportal::PacketFence::Controller::Authenticate::postAuthentication)

        Jul 30 02:29:24 httpd.portal(3485) INFO: Passed by the
        provisioning
        
(captiveportal::PacketFence::Controller::Authenticate::postAuthentication)

        Jul 30 02:29:24 httpd.portal(3485) INFO: person
        staffregistration modified to StaffRegistration
        (pf::person::person_modify)

        Jul 30 02:29:25 httpd.portal(3485) INFO: [50:3c:c4:71:25:c3]
        re-evaluating access (manage_register called)
        (pf::enforcement::reevaluate_access)

        Jul 30 02:29:25 httpd.portal(3485) INFO: [50:3c:c4:71:25:c3]
        is currentlog connected at (10.10.10.120) ifIndex 0 in VLAN 50
        (pf::enforcement::_should_we_reassign_vlan)

        Jul 30 02:29:25 httpd.portal(3485) INFO: [50:3c:c4:71:25:c3]
        Can't find provisioner (pf::vlan::getNormalVlan)

        Jul 30 02:29:25 httpd.portal(3485) INFO: [50:3c:c4:71:25:c3]
        Can't find scan engine (pf::vlan::getNormalVlan)

        Jul 30 02:29:25 httpd.portal(3485) INFO: [50:3c:c4:71:25:c3]
        Connection type is WIRELESS_MAC_AUTH. Getting role from
        node_info (pf::vlan::getNormalVlan)

        Jul 30 02:29:25 httpd.portal(3485) INFO: [50:3c:c4:71:25:c3]
        Username was defined "503cc47125c3" - returning user based
        role 'EmployeeRegistration' (pf::vlan::getNormalVlan)

        Jul 30 02:29:25 httpd.portal(3485) INFO: [50:3c:c4:71:25:c3]
        PID: "staffregistration", Status: reg Returned VLAN: 5, Role:
        EmployeeRegistration (pf::vlan::fetchVlanForNode)

        Jul 30 02:29:25 httpd.portal(3485) INFO: [50:3c:c4:71:25:c3]
        VLAN reassignment required (current VLAN = 50 but should be in
        VLAN 5) (pf::enforcement::_should_we_reassign_vlan)

        Jul 30 02:29:25 httpd.portal(3485) INFO: [50:3c:c4:71:25:c3]
        switch port is (10.10.10.120) ifIndex unknown connection type:
        WiFi MAC Auth (pf::enforcement::_vlan_reevaluation)

        Jul 30 02:29:25 httpd.webservices(2088) INFO: Memory
        configuration is not valid anymore for key config::Switch in
        local cached_hash (pfconfig::cached::is_valid)

        Jul 30 02:29:25 httpd.portal(3699) INFO: Matched IP
        '10.10.50.20' to MAC address '50:3c:c4:71:25:c3' using OMAPI
        (pf::iplog::ip2mac)

        Jul 30 02:29:25 httpd.portal(3485) INFO: Matched IP
        '10.10.50.20' to MAC address '50:3c:c4:71:25:c3' using OMAPI
        (pf::iplog::ip2mac)

        Jul 30 02:29:25 httpd.portal(3699) INFO: Matched IP
        '10.10.50.20' to MAC address '50:3c:c4:71:25:c3' using OMAPI
        (pf::iplog::ip2mac)

        Jul 30 02:29:25 httpd.portal(3485) INFO: Matched IP
        '10.10.50.20' to MAC address '50:3c:c4:71:25:c3' using OMAPI
        (pf::iplog::ip2mac)

        Jul 30 02:29:26 httpd.webservices(2088) INFO:
        [50:3c:c4:71:25:c3] DesAssociating mac on switch
        (10.10.10.120) (pf::api::desAssociate)

        Jul 30 02:29:26 httpd.webservices(2088) ERROR: ERROR: Can not
        connect to controller 10.10.10.120 using SSH
        (pf::Switch::HP::MSM::_deauthenticateMacWithSSH)

        ****Reconnection****

        Jul 30 02:30:28 httpd.aaa(2065) INFO: [50:3c:c4:71:25:c3]
        handling radius autz request: from switch_ip =>
        (10.10.10.120), connection_type =>
        Wireless-802.11-NoEAP,switch_mac => (2c:44:fd:3f:e2:90), mac
        => [50:3c:c4:71:25:c3], port => 0, username => "503cc47125c3"
        (pf::radius::authorize)

        Jul 30 02:30:28 httpd.aaa(2065) INFO: [50:3c:c4:71:25:c3]
        Can't find provisioner (pf::vlan::getNormalVlan)

        Jul 30 02:30:28 httpd.aaa(2065) INFO: [50:3c:c4:71:25:c3]
        Can't find scan engine (pf::vlan::getNormalVlan)

        Jul 30 02:30:28 httpd.aaa(2065) INFO: [50:3c:c4:71:25:c3]
        Connection type is WIRELESS_MAC_AUTH. Getting role from
        node_info (pf::vlan::getNormalVlan)

        Jul 30 02:30:28 httpd.aaa(2065) INFO: [50:3c:c4:71:25:c3]
        Username was defined "503cc47125c3" - returning user based
        role 'EmployeeRegistration' (pf::vlan::getNormalVlan)

        Jul 30 02:30:28 httpd.aaa(2065) INFO: [50:3c:c4:71:25:c3] PID:
        "staffregistration", Status: reg Returned VLAN: 5, Role:
        EmployeeRegistration (pf::vlan::fetchVlanForNode)

        Jul 30 02:30:28 httpd.aaa(2065) INFO: [50:3c:c4:71:25:c3]
(10.10.10.120) Returning ACCEPT with VLAN 5 and role (pf::Switch::returnRadiusAccessAccept)

        ****Switch.conf****

        [10.10.10.2]

        RoleMap=N

        deauthMethod=HTTPS

        AccessListMap=N

        description=MSM Controller

        type=HP::Controller_MSM710

        VoIPEnabled=N

        radiusSecret=*******

        EmployeeVlan=5

        Dorm StudentVlan=2

        macDetectionVlan=4000

        Day StudentVlan=2

        isolationVlan=51

        EmployeeRegistrationVlan=5

        NetAdminVlan=1

        registrationVlan=50

        voiceVlan=99

        cliUser=admin

        cliPwd=*******

        cliTransport=SSH

        cliEnablePwd=*******

        mode=production

        SNMPCommunityRead=readwrite

        SNMPCommunityWrite=readwrite

        SNMPVersionTrap=3

        SNMPVersion=3

        SNMPCommunityTrap=readwrite

        [10.10.10.120]

        RoleMap=N

        controllerIp=10.10.10.2

        deauthMethod=RADIUS

        AccessListMap=N

        description=BasementTemp

        type=HP::MSM

        VoIPEnabled=N

        radiusSecret=******

        mode=production

        EmployeeVlan=5

        macDetectionVlan=4000

        Day StudentVlan=2

        isolationVlan=51

        registrationVlan=50

        voiceVlan=99

        Dorm StudentVlan=2

        EmployeeRegistrationVlan=5

        NetAdminVlan=1

        cliUser=admin

        cliPwd=*******

        cliEnablePwd=*******

        cliTransport=SSH

        wsPwd=*******

        wsTransport=HTTPS

        wsUser=admin





        
------------------------------------------------------------------------------





        _______________________________________________

        PacketFence-users mailing list

        [email protected]  
<mailto:[email protected]>

        https://lists.sourceforge.net/lists/listinfo/packetfence-users





--
    Fabrice Durand

    [email protected]  <mailto:[email protected]>  ::  +1.514.447.4918 (x135) 
::www.inverse.ca  <http://www.inverse.ca>

    Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org)




    
------------------------------------------------------------------------------




    _______________________________________________

    PacketFence-users mailing list

    [email protected]  
<mailto:[email protected]>

    https://lists.sourceforge.net/lists/listinfo/packetfence-users



------------------------------------------------------------------------------


_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

------------------------------------------------------------------------------
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to