Hi Jake,
That packet seems to be unrelated to disconnection.
The OID is that of the system location.
Can you run a tcpdump when you try to deauth a connection and see if there is
anything send to port 3799 from the PF server?
That would be a RADIUS disconnect request.
Regards,
--
Louis Munro
lmu...@inverse.ca :: www.inverse.ca
+1.514.447.4918 x125 :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
(www.packetfence.org)
On Sep 23, 2015, at 16:07 , Sallee, Jake <jake.sal...@umhb.edu> wrote:
> Louis! Hows it goin' buddy!
>
> Here is a pcap of the exchange between the aruba vcontroller and the PF
> server.
>
> I have more, but I didn't want to flood the list with superfluous data.
>
> ============================
> Frame 12: 95 bytes on wire (760 bits), 95 bytes captured (760 bits) on
> interface 0
> Interface id: 0
> WTAP_ENCAP: 1
> Arrival Time: Sep 23, 2015 14:51:58.385507208 CDT
> [Time shift for this packet: 0.000000000 seconds]
> Epoch Time: 1443037918.385507208 seconds
> [Time delta from previous captured frame: 2.001426505 seconds]
> [Time delta from previous displayed frame: 2.001426505 seconds]
> [Time since reference or first frame: 210.240917362 seconds]
> Frame Number: 12
> Frame Length: 95 bytes (760 bits)
> Capture Length: 95 bytes (760 bits)
> [Frame is marked: False]
> [Frame is ignored: False]
> [Protocols in frame: eth:ip:udp:snmp]
> Ethernet II, Src: Dell_3c:49:eb (90:b1:1c:3c:49:eb), Dst: Cisco_92:58:bf
> (6c:20:56:92:58:bf)
> Destination: Cisco_92:58:bf (6c:20:56:92:58:bf)
> Address: Cisco_92:58:bf (6c:20:56:92:58:bf)
> .... ..0. .... .... .... .... = LG bit: Globally unique address
> (factory default)
> .... ...0 .... .... .... .... = IG bit: Individual address (unicast)
> Source: Dell_3c:49:eb (90:b1:1c:3c:49:eb)
> Address: Dell_3c:49:eb (90:b1:1c:3c:49:eb)
> .... ..0. .... .... .... .... = LG bit: Globally unique address
> (factory default)
> .... ...0 .... .... .... .... = IG bit: Individual address (unicast)
> Type: IP (0x0800)
> Internet Protocol Version 4, Src: 10.2.1.75 (10.2.1.75), Dst: 10.11.40.252
> (10.11.40.252)
> Version: 4
> Header length: 20 bytes
> Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00:
> Not-ECT (Not ECN-Capable Transport))
> 0000 00.. = Differentiated Services Codepoint: Default (0x00)
> .... ..00 = Explicit Congestion Notification: Not-ECT (Not ECN-Capable
> Transport) (0x00)
> Total Length: 81
> Identification: 0x0000 (0)
> Flags: 0x02 (Don't Fragment)
> 0... .... = Reserved bit: Not set
> .1.. .... = Don't fragment: Set
> ..0. .... = More fragments: Not set
> Fragment offset: 0
> Time to live: 64
> Protocol: UDP (17)
> Header checksum: 0xfc48 [correct]
> [Good: True]
> [Bad: False]
> Source: 10.2.1.75 (10.2.1.75)
> Destination: 10.11.40.252 (10.11.40.252)
> User Datagram Protocol, Src Port: 58541 (58541), Dst Port: snmp (161)
> Source port: 58541 (58541)
> Destination port: snmp (161)
> Length: 61
> Checksum: 0x3ea2 [validation disabled]
> [Good Checksum: False]
> [Bad Checksum: False]
> Simple Network Management Protocol
> version: v2c (1)
> community: [REDACTED]
> data: get-request (0)
> get-request
> request-id: 1606903620
> error-status: noError (0)
> error-index: 0
> variable-bindings: 1 item
> 1.3.6.1.2.1.1.6.0: Value (Null)
> Object Name: 1.3.6.1.2.1.1.6.0 (iso.3.6.1.2.1.1.6.0)
> Value (Null)
> ============================
>
> I did restart the PF services yesterday, still no luck.
>
> We have not made any customizations except the single line I mentioned
> earlier to enable wired mac auth, and that was made well after the upgrade to
> 5.3.1.
>
> Theoretically, we should be working with a very stock version of PF.
>
> Jake Sallee
> Godfather of Bandwidth
> System Engineer
> University of Mary Hardin-Baylor
> WWW.UMHB.EDU
>
> 900 College St.
> Belton, Texas
> 76513
>
> Fone: 254-295-4658
> Phax: 254-295-4221
> ________________________________
> From: Louis Munro [lmu...@inverse.ca]
> Sent: Wednesday, September 23, 2015 9:00 AM
> To: packetfence-users@lists.sourceforge.net
> Subject: Re: [PacketFence-users] PF sending out SNMP De-Auth when set to
> RADIUS
>
> Hi Jake,
> Yes, the Aruba are supposed to be compatible with both wired and wireless
> RADIUS auth.
> Official support for that should be in the next PF release actually.
>
> Are you sure the SNMP sent to the controller is for deauth?
> Can you tell us what OID is in the request?
>
> Also, if your system has been upgraded, are you sure the Aruba module you are
> using is the latest version?
> If you carried and old version through and upgrade (perhaps because it was
> customized) you may be seeing the old behaviour.
> The module is in lib/pf/Switches/Aruba.pm.
>
> Compare that (and lib/pf/Switches/Aruba/Controller_200.pm) to the latest
> official versions at
> https://github.com/inverse-inc/packetfence/blob/packetfence-5.3.1/lib/pf/Switch/Aruba.pm
>
>
> Regards,
> --
> Louis Munro
> lmu...@inverse.ca<mailto:lmu...@inverse.ca> ::
> www.inverse.ca<http://www.inverse.ca>
> +1.514.447.4918 x125 :: +1 (866) 353-6153 x125
> Inverse inc. :: Leaders behind SOGo (www.sogo.nu<http://www.sogo.nu>) and
> PacketFence (www.packetfence.org<http://www.packetfence.org>)
>
> On Sep 22, 2015, at 11:06 , Sallee, Jake
> <jake.sal...@umhb.edu<mailto:jake.sal...@umhb.edu>> wrote:
>
> Hello all!
>
> Weird one here.
>
> First things first:
>
> PF v5.3.1, with an Aruba 205H AP.
>
> The manufacturer ensures us that the devices are compatible with wired and
> wireless MAC auth so we have made a small adjustment to the module to return
> mac auth = true. Other than that, everything is stock.
>
> In the switch config the ap is set to RADIUS de-auth, but a packet cap shows
> PF sending SNMP and NOT RADIUS CoA.
>
> I have done a pfcmd configreload but no joy.
>
> This box is in production so I would really like to avoid bouncing all the
> services if I can.
>
> Anyone have any ideas?
>
> Jake Sallee
> Godfather of Bandwidth
> System Engineer
> University of Mary Hardin-Baylor
> WWW.UMHB.EDU<http://WWW.UMHB.EDU>
>
> 900 College St.
> Belton, Texas
> 76513
>
> Fone: 254-295-4658
> Phax: 254-295-4221
>
> ------------------------------------------------------------------------------
> _______________________________________________
> PacketFence-users mailing list
> PacketFence-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
>
> ------------------------------------------------------------------------------
> Monitor Your Dynamic Infrastructure at Any Scale With Datadog!
> Get real-time metrics from all of your servers, apps and tools
> in one place.
> SourceForge users - Click here to start your Free Trial of Datadog now!
> http://pubads.g.doubleclick.net/gampad/clk?id=241902991&iu=/4140
> _______________________________________________
> PacketFence-users mailing list
> PacketFence-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
------------------------------------------------------------------------------
Monitor Your Dynamic Infrastructure at Any Scale With Datadog!
Get real-time metrics from all of your servers, apps and tools
in one place.
SourceForge users - Click here to start your Free Trial of Datadog now!
http://pubads.g.doubleclick.net/gampad/clk?id=241902991&iu=/4140
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users