Hello Paul,

use HP::Controller_MSM710 type for each AP , HP::MSM is only for standalone Access Point without controller.

Regards
Fabrice


Le 2015-07-31 23:10, Polar Geek a écrit :

Fabrice,

here it is in its entirety. Although the only relevant entries should be for 10.10.10.2 and 10.10.10.120 and have no changes made to their setup since the original email.

#

# Copyright (C) 2005-2015 Inverse inc.

#

# See the enclosed file COPYING for license information (GPL).

# If you did not receive this file, see

# http://www.fsf.org/licensing/licenses/gpl.html

[default]

description=Switches Default Values

vlans=1,2,3,4,5

normalVlan=1

registrationVlan=2

isolationVlan=3

macDetectionVlan=4

voiceVlan=5

inlineVlan=6

inlineTrigger=

normalRole=normal

registrationRole=registration

isolationRole=isolation

macDetectionRole=macDetection

voiceRole=voice

inlineRole=inline

VoIPEnabled=no

VlanMap=Y

RoleMap=Y

mode=testing

macSearchesMaxNb=30

macSearchesSleepInterval=2

uplink=dynamic

#

# Command Line Interface

#

# cliTransport could be: Telnet, SSH or Serial

cliTransport=Telnet

cliUser=

cliPwd=

cliEnablePwd=

#

# SNMP section

#

# PacketFence -> Switch

SNMPVersion=1

SNMPCommunityRead=public

SNMPCommunityWrite=private

#SNMPEngineID = 0000000000000

#SNMPUserNameRead = readUser

#SNMPAuthProtocolRead = MD5

#SNMPAuthPasswordRead = authpwdread

#SNMPPrivProtocolRead = DES

#SNMPPrivPasswordRead = privpwdread

#SNMPUserNameWrite = writeUser

#SNMPPrivPasswordRead = privpwdread

#SNMPUserNameWrite = writeUser

#SNMPAuthProtocolWrite = MD5

#SNMPAuthPasswordWrite = authpwdwrite

#SNMPPrivProtocolWrite = DES

#SNMPPrivPasswordWrite = privpwdwrite

# Switch -> PacketFence

SNMPVersionTrap=1

SNMPCommunityTrap=public

#SNMPAuthProtocolTrap = MD5

#SNMPAuthPasswordTrap = authpwdread

#SNMPPrivProtocolTrap = DES

#SNMPPrivPasswordTrap = privpwdread

#

# Web Services Interface

#

# wsTransport could be: http or https

wsTransport=http

wsUser=

wsPwd=

#

# RADIUS NAS Client config

#

# RADIUS shared secret with switch

radiusSecret=

[10.10.10.2]

RoleMap=N

deauthMethod=HTTPS

AccessListMap=N

description=MSM Controller

type=HP::Controller_MSM710

VoIPEnabled=N

radiusSecret=Luther@456

EmployeeVlan=5

Dorm StudentVlan=2

macDetectionVlan=4000

Day StudentVlan=2

isolationVlan=51

EmployeeRegistrationVlan=5

NetAdminVlan=1

registrationVlan=50

voiceVlan=99

cliUser=admin

cliPwd=luthernet4

cliTransport=SSH

cliEnablePwd=luthernet4

mode=production

SNMPCommunityRead=readwrite

SNMPCommunityWrite=readwrite

SNMPVersionTrap=3

SNMPCommunityWrite=readwrite

SNMPVersionTrap=3

SNMPVersion=3

SNMPCommunityTrap=readwrite

[10.10.10.8]

RoleMap=N

EmployeeVlan=5

mode=production

SNMPCommunityWrite=public

cliUser=manager

deauthMethod=Telnet

AccessListMap=N

description=OldGreenRoom

type=HP::Procurve_2500

Dorm StudentVlan=2

macDetectionVlan=4000

cliPwd=luthernet4

Day StudentVlan=2

VoIPEnabled=N

isolationVlan=51

uplink_dynamic=0

SNMPAuthPasswordWrite=luthernet4

SNMPPrivPasswordWrite=luthernet4

cliEnablePwd=luthernet4

uplink=1,2

registrationVlan=50

voiceVlan=99

radiusSecret=Luther@456

NetAdminVlan=1

EmployeeRegistrationVlan=5

guestVlan=51

[10.10.10.15]

RoleMap=N

cliUser=manager

deauthMethod=Telnet

AccessListMap=N

description=New48

type=HP::Procurve_2500

macDetectionVlan=4000

cliPwd=luthernet4

VoIPEnabled=N

isolationVlan=51

uplink_dynamic=0

SNMPAuthPasswordWrite=luthernet4

SNMPPrivPasswordWrite=luthernet4

cliEnablePwd=luthernet4

uplink=1,2,3

registrationVlan=50

voiceVlan=99

mode=production

SNMPCommunityWrite=public

EmployeeVlan=5

Dorm StudentVlan=2

Day StudentVlan=2

radiusSecret=Luther@456

NetAdminVlan=1

EmployeeRegistrationVlan=5

guestVlan=51

[10.10.10.120]

RoleMap=N

controllerIp=10.10.10.2

deauthMethod=RADIUS

AccessListMap=N

description=BasementTemp

type=HP::MSM

VoIPEnabled=N

radiusSecret=Luther@456

mode=production

EmployeeVlan=5

macDetectionVlan=4000

Day StudentVlan=2

isolationVlan=51

registrationVlan=50

voiceVlan=99

Dorm StudentVlan=2

EmployeeRegistrationVlan=5

NetAdminVlan=1

Paul Taylor

IT Support
Luther College High School

*From:*Durand fabrice [mailto:fdur...@inverse.ca]
*Sent:* July 31, 2015 8:50 PM
*To:* packetfence-users@lists.sourceforge.net
*Subject:* Re: [PacketFence-users] HP MSM DeAuthentication issue

Can you paste your switches.conf ?

fabrice

Le 2015-07-31 22:30, Polar Geek a écrit :

    Fabrice,

    As I stated in the original message the Controller is set in the
    switch configuration it just appears to be ignoring that setting
    and is attempting to connect to the AP directly still

    Jul 30 02:29:26 httpd.webservices(2088) INFO: [50:3c:c4:71:25:c3]
    DesAssociating mac on switch (10.10.10.120) (pf::api::desAssociate)

    Jul 30 02:29:26 httpd.webservices(2088) ERROR: ERROR: Can not
    connect to controller 10.10.10.120 using SSH
    (pf::Switch::HP::MSM::_deauthenticateMacWithSSH)

    Or are you saying that the error message in itself contains an
    error and is attempting to connect to the controller as specified
    but the log still shows the AP ip?

    Paul

    *From:*Durand fabrice [mailto:fdur...@inverse.ca]
    *Sent:* July 31, 2015 8:22 PM
    *To:* packetfence-users@lists.sourceforge.net
    <mailto:packetfence-users@lists.sourceforge.net>
    *Subject:* Re: [PacketFence-users] HP MSM DeAuthentication issue

    Hi Paul,

    Ok you have a controller , so use it as the controller ip in
    switch configuration
    And try:
    su - pf
    ssh admin@controller_ip

    Regards
    Fabrice


    Le 2015-07-31 22:14, Polar Geek a écrit :

        Fabrice,

        Sorry missed your reply until now.

        At any rate the connection to the AP is refused.

        ssh: connect to host 10.10.10.120 port 22: Connection refused

        I don’t think connecting to the AP directly will ever work in
        controlled mode. Per the manual

        In controlled mode, access to the CLI is possible only before
        the control channel to the

        controller is established, which can occur in the following
        scenarios:

        􀂄Network failures prevent a control channel from being created.

        􀂄After an AP is restarted, prior to establishment of the
        control channel (during the brief

        controller discovery process).

        When the AP is in controlled mode, a reduced number of CLI
        commands are available. The

        most notable command is *switch operational mode*, which
        enables you to switch the AP to

        autonomous mode. The *config *context is not available.

        So the setup really needs to honor the controller IP setting
        and send the commands there, which is does not appear to be doing.

        Thanks,

        Paul

        *From:*Fabrice DURAND [mailto:fdur...@inverse.ca]
        *Sent:* July 30, 2015 6:20 AM
        *To:* packetfence-users@lists.sourceforge.net
        <mailto:packetfence-users@lists.sourceforge.net>
        *Subject:* Re: [PacketFence-users] HP MSM DeAuthentication issue

        Hello Paul,

        let's do a:
        su - pf
        ssh admin@10.10.10.120 <mailto:admin@10.10.10.120>
        and accept the key then retry.

        Regards
        Fabrice

        Le 2015-07-30 05:19, Polar Geek a écrit :

            Hello again,

            Thanks for all the help so far. I’m happily nearly
            completely functional with my initial testing of PF 5.3.1
            but I’ve got a couple remaining issues.

            My wireless infrastructure is an HP MSM760 mobility
            control with 55 MSM460 access points. Currently I have
            added the controller and the AP on my desk to the system
            for testing. The configuration mostly works except for one
            issue. When I connect a new device to the SSID is have
            configured for mac-authentication, I am successfully
            connected to the captive portal. I can then authorize the
            system and PF appears to be making the necessary changes
            for network access. The problem is that disassociation
            never occurs because the server is ignoring the Controller
            IP Address set in the switch config and is instead
            attempting to connect to the AP directly,  which will not
            work as direct SSH connections to the Aps are not
            available when the APs are in controlled mode. If I
            manually disconnect/reconnect or restart the device the
            system works as expected. As you can see from the logs
            below the PF server is attempting to contact 10.10..10.120
            but should be contacting 10.10.10.2

            What I believe to be the relevant logs and config file
            excerpts are below.

            Any ideas what I’m missing here?

            Thanks,

            Paul

            ****Initial Connection****

            Jul 30 02:29:24 httpd.portal(3485) INFO: [LCHS-DC00
            EmployeeDevReg] Found a match
            
(CN=StaffRegistration,OU=Staff,OU=LutherUsers,DC=luthercollege,DC=edu)
            (pf::Authentication::Source::LDAPSource::match_in_subclass)

            Jul 30 02:29:24 httpd.portal(3485) INFO: Matched rule
            (EmployeeDevReg) in source LCHS-DC00, returning actions.
            (pf::Authentication::Source::match)

            Jul 30 02:29:24 httpd.portal(3485) INFO: Just finished
            seting the node up
            
(captiveportal::PacketFence::Controller::Authenticate::postAuthentication)

            Jul 30 02:29:24 httpd.portal(3485) INFO: Passed by the
            provisioning
            
(captiveportal::PacketFence::Controller::Authenticate::postAuthentication)

            Jul 30 02:29:24 httpd.portal(3485) INFO: person
            staffregistration modified to StaffRegistration
            (pf::person::person_modify)

            Jul 30 02:29:25 httpd.portal(3485) INFO:
            [50:3c:c4:71:25:c3] re-evaluating access (manage_register
            called) (pf::enforcement::reevaluate_access)

            Jul 30 02:29:25 httpd.portal(3485) INFO:
            [50:3c:c4:71:25:c3] is currentlog connected at
            (10.10.10.120) ifIndex 0 in VLAN 50
            (pf::enforcement::_should_we_reassign_vlan)

            Jul 30 02:29:25 httpd.portal(3485) INFO:
            [50:3c:c4:71:25:c3] Can't find provisioner
            (pf::vlan::getNormalVlan)

            Jul 30 02:29:25 httpd.portal(3485) INFO:
            [50:3c:c4:71:25:c3] Can't find scan engine
            (pf::vlan::getNormalVlan)

            Jul 30 02:29:25 httpd.portal(3485) INFO:
            [50:3c:c4:71:25:c3] Connection type is WIRELESS_MAC_AUTH.
            Getting role from node_info (pf::vlan::getNormalVlan)

            Jul 30 02:29:25 httpd.portal(3485) INFO:
            [50:3c:c4:71:25:c3] Username was defined "503cc47125c3" -
            returning user based role 'EmployeeRegistration'
            (pf::vlan::getNormalVlan)

            Jul 30 02:29:25 httpd.portal(3485) INFO:
            [50:3c:c4:71:25:c3] PID: "staffregistration", Status: reg
            Returned VLAN: 5, Role: EmployeeRegistration
            (pf::vlan::fetchVlanForNode)

            Jul 30 02:29:25 httpd.portal(3485) INFO:
            [50:3c:c4:71:25:c3] VLAN reassignment required (current
            VLAN = 50 but should be in VLAN 5)
            (pf::enforcement::_should_we_reassign_vlan)

            Jul 30 02:29:25 httpd.portal(3485) INFO:
            [50:3c:c4:71:25:c3] switch port is (10.10.10.120) ifIndex
            unknown connection type: WiFi MAC Auth
            (pf::enforcement::_vlan_reevaluation)

            Jul 30 02:29:25 httpd.webservices(2088) INFO: Memory
            configuration is not valid anymore for key config::Switch
            in local cached_hash (pfconfig::cached::is_valid)

            Jul 30 02:29:25 httpd.portal(3699) INFO: Matched IP
            '10.10.50.20' to MAC address '50:3c:c4:71:25:c3' using
            OMAPI (pf::iplog::ip2mac)

            Jul 30 02:29:25 httpd.portal(3485) INFO: Matched IP
            '10.10.50.20' to MAC address '50:3c:c4:71:25:c3' using
            OMAPI (pf::iplog::ip2mac)

            Jul 30 02:29:25 httpd.portal(3699) INFO: Matched IP
            '10.10.50.20' to MAC address '50:3c:c4:71:25:c3' using
            OMAPI (pf::iplog::ip2mac)

            Jul 30 02:29:25 httpd.portal(3485) INFO: Matched IP
            '10.10.50.20' to MAC address '50:3c:c4:71:25:c3' using
            OMAPI (pf::iplog::ip2mac)

            Jul 30 02:29:26 httpd.webservices(2088) INFO:
            [50:3c:c4:71:25:c3] DesAssociating mac on switch
            (10.10.10.120) (pf::api::desAssociate)

            Jul 30 02:29:26 httpd.webservices(2088) ERROR: ERROR: Can
            not connect to controller 10.10.10.120 using SSH
            (pf::Switch::HP::MSM::_deauthenticateMacWithSSH)

            ****Reconnection****

            Jul 30 02:30:28 httpd.aaa(2065) INFO: [50:3c:c4:71:25:c3]
            handling radius autz request: from switch_ip =>
            (10.10.10.120), connection_type =>
            Wireless-802.11-NoEAP,switch_mac => (2c:44:fd:3f:e2:90),
            mac => [50:3c:c4:71:25:c3], port => 0, username =>
            "503cc47125c3" (pf::radius::authorize)

            Jul 30 02:30:28 httpd.aaa(2065) INFO: [50:3c:c4:71:25:c3]
            Can't find provisioner (pf::vlan::getNormalVlan)

            Jul 30 02:30:28 httpd.aaa(2065) INFO: [50:3c:c4:71:25:c3]
            Can't find scan engine (pf::vlan::getNormalVlan)

            Jul 30 02:30:28 httpd.aaa(2065) INFO: [50:3c:c4:71:25:c3]
            Connection type is WIRELESS_MAC_AUTH. Getting role from
            node_info (pf::vlan::getNormalVlan)

            Jul 30 02:30:28 httpd.aaa(2065) INFO: [50:3c:c4:71:25:c3]
            Username was defined "503cc47125c3" - returning user based
            role 'EmployeeRegistration' (pf::vlan::getNormalVlan)

            Jul 30 02:30:28 httpd.aaa(2065) INFO: [50:3c:c4:71:25:c3]
            PID: "staffregistration", Status: reg Returned VLAN: 5,
            Role: EmployeeRegistration (pf::vlan::fetchVlanForNode)

            Jul 30 02:30:28 httpd.aaa(2065) INFO: [50:3c:c4:71:25:c3]
(10.10.10.120) Returning ACCEPT with VLAN 5 and role (pf::Switch::returnRadiusAccessAccept)

            ****Switch.conf****

            [10.10.10.2]

            RoleMap=N

            deauthMethod=HTTPS

            AccessListMap=N

            description=MSM Controller

            type=HP::Controller_MSM710

            VoIPEnabled=N

            radiusSecret=*******

            EmployeeVlan=5

            Dorm StudentVlan=2

            macDetectionVlan=4000

            Day StudentVlan=2

            isolationVlan=51

            EmployeeRegistrationVlan=5

            NetAdminVlan=1

            registrationVlan=50

            voiceVlan=99

            cliUser=admin

            cliPwd=*******

            cliTransport=SSH

            cliEnablePwd=*******

            mode=production

            SNMPCommunityRead=readwrite

            SNMPCommunityWrite=readwrite

            SNMPVersionTrap=3

            SNMPVersion=3

            SNMPCommunityTrap=readwrite

            [10.10.10.120]

            RoleMap=N

            controllerIp=10.10.10.2

            deauthMethod=RADIUS

            AccessListMap=N

            description=BasementTemp

            type=HP::MSM

            VoIPEnabled=N

            radiusSecret=******

            mode=production

            EmployeeVlan=5

            macDetectionVlan=4000

            Day StudentVlan=2

            isolationVlan=51

            registrationVlan=50

            voiceVlan=99

            Dorm StudentVlan=2

            EmployeeRegistrationVlan=5

            NetAdminVlan=1

            cliUser=admin

            cliPwd=*******

            cliEnablePwd=*******

            cliTransport=SSH

            wsPwd=*******

            wsTransport=HTTPS

            wsUser=admin






            
------------------------------------------------------------------------------






            _______________________________________________

            PacketFence-users mailing list

            PacketFence-users@lists.sourceforge.net  
<mailto:PacketFence-users@lists.sourceforge.net>

            https://lists.sourceforge.net/lists/listinfo/packetfence-users






--
        Fabrice Durand

        fdur...@inverse.ca  <mailto:fdur...@inverse.ca>  ::  +1.514.447.4918 (x135) 
::www.inverse.ca  <http://www.inverse.ca>

        Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and 
PacketFence (http://packetfence.org)





        
------------------------------------------------------------------------------





        _______________________________________________

        PacketFence-users mailing list

        PacketFence-users@lists.sourceforge.net  
<mailto:PacketFence-users@lists.sourceforge.net>

        https://lists.sourceforge.net/lists/listinfo/packetfence-users




    
------------------------------------------------------------------------------




    _______________________________________________

    PacketFence-users mailing list

    PacketFence-users@lists.sourceforge.net  
<mailto:PacketFence-users@lists.sourceforge.net>

    https://lists.sourceforge.net/lists/listinfo/packetfence-users



------------------------------------------------------------------------------


_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

------------------------------------------------------------------------------
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to