Could somebody help me?
2015-09-22 0:17 GMT+03:00 Kristaps Dambergs <[email protected]>: > Hi, > > > > I am trying to implement PF ZEN using 801.1x + MAC. When i connect laptop > to port (Registration VLAN) no IP address is received, no access to outh > portal. I can't even ping switch from pf server. I added my config below. > > > Hoping for some help. > > > > Thanks > > > > PF Logs: > > > > [root@PacketFence-ZEN-5-3 ~]# tail -f /usr/local/pf/logs/packetfence.log > > Sep 19 09:09:27 pfcmd.pl(1615) INFO: Daemon carbon-relay took 1.537 > seconds to start. (pf::services::manager::launchService) > > Sep 19 09:09:27 pfcmd.pl(1615) INFO: Daemon collectd took 0.196 seconds > to start. (pf::services::manager::launchService) > > Sep 19 09:09:27 pfcmd.pl(1615) INFO: pf::services::manager, > /usr/local/pf/lib/pf/services/manager.pm, 178 > (pf::services::manager::dhcpd::generateConfig) > > Sep 19 09:09:27 pfcmd.pl(1615) INFO: Memory configuration is not valid > anymore for key interfaces::listen_ints in local cached_hash > (pfconfig::cached::is_valid) > > Sep 19 09:09:27 pfcmd.pl(1615) WARN: requesting member ips for an > undefined interface... (pf::cluster::members_ips) > > Sep 19 09:09:27 pfcmd.pl(1615) WARN: requesting member ips for an > undefined interface... (pf::cluster::members_ips) > > Sep 19 09:09:27 pfcmd.pl(1615) WARN: requesting member ips for an > undefined interface... (pf::cluster::members_ips) > > Sep 19 09:09:27 pfcmd.pl(1615) WARN: requesting member ips for an > undefined interface... (pf::cluster::members_ips) > > Sep 19 09:09:27 pfcmd.pl(1615) INFO: Daemon dhcpd took 0.241 seconds to > start. (pf::services::manager::launchService) > > Sep 19 09:10:07 pfcmd.pl(1615) INFO: Daemon httpd.aaa took 40.085 seconds > to start. (pf::services::manager::launchService) > > Sep 19 09:11:22 pfcmd.pl(1615) INFO: Daemon httpd.graphite took 36.280 > seconds to start. (pf::services::manager::launchService) > > > > > > [root@PacketFence-ZEN-5-3 ~]# tail -f /usr/local/pf/logs/snmptrapd.log > > NET-SNMP version 5.5 > > 2015-09-19 08:44:42 NET-SNMP version 5.5 Stopped. > > Stopping snmptrapd > > > > NET-SNMP version 5.5 > > 2015-09-19 09:05:12 NET-SNMP version 5.5 Stopped. > > Stopping snmptrapd > > > > NET-SNMP version 5.5 > > NET-SNMP version 5.5 > > > > [root@PacketFence-ZEN-5-3 ~]# tail -f /usr/local/pf/logs/snmptrapd.log > > NET-SNMP version 5.5 > > 2015-09-19 08:44:42 NET-SNMP version 5.5 Stopped. > > Stopping snmptrapd > > > > NET-SNMP version 5.5 > > 2015-09-19 09:05:12 NET-SNMP version 5.5 Stopped. > > Stopping snmptrapd > > > > NET-SNMP version 5.5 > > NET-SNMP version 5.5 > > > > > > [root@PacketFence-ZEN-5-3 ~]# sudo vi /usr/local/pf/conf/switches.conf > > RoleMap=Y > > mode=testing > > macSearchesMaxNb=30 > > macSearchesSleepInterval=2 > > uplink=dynamic > > # > > # Command Line Interface > > # > > # cliTransport could be: Telnet, SSH or Serial > > cliTransport=Telnet > > cliUser= > > cliPwd= > > cliEnablePwd= > > # > > # SNMP section > > # > > # PacketFence -> Switch > > SNMPVersion=1 > > SNMPCommunityRead=public > > SNMPCommunityWrite=private > > #SNMPEngineID = 0000000000000 > > #SNMPUserNameRead = readUser > > #SNMPAuthProtocolRead = MD5 > > #SNMPAuthPasswordRead = authpwdread > > #SNMPPrivProtocolRead = DES > > #SNMPPrivPasswordRead = privpwdread > > #SNMPUserNameWrite = writeUser > > #SNMPAuthProtocolWrite = MD5 > > #SNMPAuthPasswordWrite = authpwdwrite > > #SNMPPrivProtocolWrite = DES > > #SNMPPrivPasswordWrite = privpwdwrite > > # Switch -> PacketFence > > SNMPVersionTrap=1 > > SNMPCommunityTrap=public > > #SNMPAuthProtocolTrap = MD5 > > #SNMPAuthPasswordTrap = authpwdread > > #SNMPPrivProtocolTrap = DES > > #SNMPPrivPasswordTrap = privpwdread > > # > > # Web Services Interface > > # > > # wsTransport could be: http or https > > wsTransport=http > > wsUser= > > wsPwd= > > # > > # RADIUS NAS Client config > > # > > # RADIUS shared secret with switch > > radiusSecret= > > > > [192.168.0.3] > > mode=production > > deauthMethod=RADIUS > > AccessListMap=N > > description=2610 > > SNMPVersionTrap=1 > > type=HP::Procurve_2600 > > VoIPEnabled=N > > radiusSecret="PASSWD" > > uplink_dynamic=0 > > uplink=23,24 > > > > > > My procurve 2610 config: > > > > Running configuration: > > > > ; J9086A Configuration Editor; Created on release #R.11.60 > > > > hostname "ProCurveSwitch" > > time timezone 180 > > no telnet-server > > interface 23 > > name "pfserver" > > exit > > trunk 23 Trk1 Trunk > > timesync sntp > > vlan 1 > > name "Default" > > untagged 1-2,4-22,24-28,Trk1 > > ip address 192.168.0.3 255.255.255.0 > > no untagged 3 > > exit > > vlan 2 > > name "Registration" > > untagged 3 > > ip address 192.168.2.1 255.255.255.0 > > tagged Trk1 > > exit > > vlan 3 > > name "Isolation" > > ip address 192.168.3.1 255.255.255.0 > > tagged Trk1 > > exit > > vlan 10 > > name "Normal" > > ip address 192.168.1.1 255.255.255.0 > > tagged Trk1 > > exit > > radius-server host 192.168.0.10 key Parole321 > > aaa server-group radius "packetfence" host 192.168.0.10 > > aaa authentication port-access eap-radius server-group "packetfence" > > aaa authentication mac-based chap-radius server-group "packetfence" > > port-security 1 learn-mode port-access action send-alarm > > port-security 2 learn-mode port-access action send-alarm > > port-security 3 learn-mode port-access action send-alarm > > port-security 4 learn-mode port-access action send-alarm > > port-security 5 learn-mode port-access action send-alarm > > port-security 6 learn-mode port-access action send-alarm > > port-security 7 learn-mode port-access action send-alarm > > port-security 8 learn-mode port-access action send-alarm > > port-security 9 learn-mode port-access action send-alarm > > port-security 10 learn-mode port-access action send-alarm > > port-security 11 learn-mode port-access action send-alarm > > port-security 12 learn-mode port-access action send-alarm > > port-security 13 learn-mode port-access action send-alarm > > port-security 14 learn-mode port-access action send-alarm > > port-security 15 learn-mode port-access action send-alarm > > port-security 16 learn-mode port-access action send-alarm > > port-security 17 learn-mode port-access action send-alarm > > port-security 18 learn-mode port-access action send-alarm > > port-security 19 learn-mode port-access action send-alarm > > port-security 20 learn-mode port-access action send-alarm > > port-security 21 learn-mode port-access action send-alarm > > port-security 22 learn-mode port-access action send-alarm > > snmp-server host 192.168.0.10 community "public" informs trap-level > Not-INFO > > no snmp-server enable traps link-change 1-22 > > sntp unicast > > sntp server 129.6.15.30 > > aaa port-access authenticator 1-22 > > aaa port-access authenticator 1 client-limit 1 > > aaa port-access authenticator 2 client-limit 1 > > aaa port-access authenticator 3 client-limit 1 > > aaa port-access authenticator 4 client-limit 1 > > aaa port-access authenticator 5 client-limit 1 > > aaa port-access authenticator 6 client-limit 1 > > aaa port-access authenticator 7 client-limit 1 > > aaa port-access authenticator 8 client-limit 1 > > aaa port-access authenticator 9 client-limit 1 > > aaa port-access authenticator 10 client-limit 1 > > aaa port-access authenticator 11 client-limit 1 > > aaa port-access authenticator 12 client-limit 1 > > aaa port-access authenticator 13 client-limit 1 > > aaa port-access authenticator 14 client-limit 1 > > aaa port-access authenticator 15 client-limit 1 > > aaa port-access authenticator 16 client-limit 1 > > aaa port-access authenticator 17 client-limit 1 > > aaa port-access authenticator 18 client-limit 1 > > aaa port-access authenticator 19 client-limit 1 > > aaa port-access authenticator 20 client-limit 1 > > aaa port-access authenticator 21 client-limit 1 > > aaa port-access authenticator 22 client-limit 1 > > aaa port-access authenticator active > > aaa port-access mac-based 1-22 > > aaa port-access mac-based 1 addr-moves > > aaa port-access mac-based 1 reauth-period 14400 > > aaa port-access mac-based 2 addr-moves > > aaa port-access mac-based 2 reauth-period 14400 > > aaa port-access mac-based 3 addr-moves > > aaa port-access mac-based 3 reauth-period 14400 > > aaa port-access mac-based 4 addr-moves > > aaa port-access mac-based 4 reauth-period 14400 > > aaa port-access mac-based 5 addr-moves > > aaa port-access mac-based 5 reauth-period 14400 > > aaa port-access mac-based 6 addr-moves > > aaa port-access mac-based 6 reauth-period 14400 > > aaa port-access mac-based 7 addr-moves > > aaa port-access mac-based 7 reauth-period 14400 > > aaa port-access mac-based 8 addr-moves > > aaa port-access mac-based 8 reauth-period 14400 > > aaa port-access mac-based 9 addr-moves > > aaa port-access mac-based 9 reauth-period 14400 > > aaa port-access mac-based 10 addr-moves > > aaa port-access mac-based 10 reauth-period 14400 > > aaa port-access mac-based 11 addr-moves > > aaa port-access mac-based 11 reauth-period 14400 > > aaa port-access mac-based 12 addr-moves > > aaa port-access mac-based 12 reauth-period 14400 > > aaa port-access mac-based 13 addr-moves > > aaa port-access mac-based 13 reauth-period 14400 > > aaa port-access mac-based 14 addr-moves > > aaa port-access mac-based 14 reauth-period 14400 > > aaa port-access mac-based 15 addr-moves > > aaa port-access mac-based 15 reauth-period 14400 > > aaa port-access mac-based 16 addr-moves > > aaa port-access mac-based 16 reauth-period 14400 > > aaa port-access mac-based 17 addr-moves > > aaa port-access mac-based 17 reauth-period 14400 > > aaa port-access mac-based 18 addr-moves > > aaa port-access mac-based 18 reauth-period 14400 > > aaa port-access mac-based 19 addr-moves > > aaa port-access mac-based 19 reauth-period 14400 > > aaa port-access mac-based 20 addr-moves > > aaa port-access mac-based 20 reauth-period 14400 > > aaa port-access mac-based 21 addr-moves > > aaa port-access mac-based 21 reauth-period 14400 > > aaa port-access mac-based 22 addr-moves > > aaa port-access mac-based 22 reauth-period 14400 > > aaa port-access 1 controlled-direction in > > aaa port-access 2 controlled-direction in > > aaa port-access 3 controlled-direction in > > aaa port-access 4 controlled-direction in > > aaa port-access 5 controlled-direction in > > aaa port-access 6 controlled-direction in > > aaa port-access 7 controlled-direction in > > aaa port-access 8 controlled-direction in > > aaa port-access 9 controlled-direction in > > aaa port-access 10 controlled-direction in > > aaa port-access 11 controlled-direction in > > aaa port-access 12 controlled-direction in > > aaa port-access 13 controlled-direction in > > aaa port-access 14 controlled-direction in > > aaa port-access 15 controlled-direction in > > aaa port-access 16 controlled-direction in > > aaa port-access 17 controlled-direction in > > aaa port-access 18 controlled-direction in > > aaa port-access 19 controlled-direction in > > aaa port-access 20 controlled-direction in > > aaa port-access 21 controlled-direction in > > aaa port-access 22 controlled-direction in > > spanning-tree Trk1 priority 4 > > ip ssh > > password manager > > password operator >
------------------------------------------------------------------------------
_______________________________________________ PacketFence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
