hai gays.
any idea?
On Thu, Jan 14, 2016 at 1:29 PM, jabang konate <[email protected]>
wrote:
> hai fabrice, i know the log for radius accounting. the log accounting is
> in database tables radacct. but if i try query,
> select * from radacct where username='ldapuser';
> Empty set (0.00 sec)
> theres no record for that user.
>
> On Thu, Jan 14, 2016 at 1:21 PM, jabang konate <[email protected]>
> wrote:
>
>> thanks fabrice for your guidence.
>> its works.
>> i remove radius source and change to ldap server.
>> may i ask next question,? if im login using source ldap server, will
>> radius accounting record bandwidth for that user? if yes, where can i see
>> that log user accounting. ?
>>
>> because next case i want to make violation based bandwidth and user
>> cannot login after several day.
>>
>> sorry for my bad english. please give some advice.
>>
>>
>> On Tue, Jan 12, 2016 at 1:29 AM, Fabrice DURAND <[email protected]>
>> wrote:
>>
>>> Hello Jabang,
>>>
>>> can you explain me what you want to configure because when i see the log
>>> and the configuration your setup is not correct.
>>>
>>>
>>> First what you have to check is the password attribute in your ldap
>>> server, is it in clear text or in NTHASH format ?
>>> Next you ldap configuration is correct but not on the packetfence side,
>>> in the auth source you have to configure an ldap source and remove your
>>> radius source.
>>>
>>> And finally do you have a trace of the radius request ?
>>> (/usr/sbin/radiusd -d /usr/local/pf/raddb/ -n auth -X).
>>>
>>> Regards
>>> Fabrice
>>>
>>>
>>> Le 2016-01-11 10:03, jabang konate a écrit :
>>> > thanks fabrice for fast response.
>>> > yeah i know, but i already config freeradius to lookup ldap server.
>>> > here my config on /us/local/pf/raddb/modules/ldap.
>>> >
>>> > ldap openldap{
>>> > server = "ldap.iss.edu <http://ldap.iss.edu>"
>>> > identity = "cn=aplikasiRadius.iss.edu
>>> > <http://aplikasiRadius.iss.edu>,ou=managemen,dc=iss,dc=edu"
>>> > password = radiusitb167
>>> > basedn = "ou=people,dc=iss,dc=edu"
>>> > filter = "(uid=%u)"
>>> > #base_filter = "(objectclass=radiusprofile)"
>>> > ldap_connections_number = 5
>>> > timeout = 4
>>> > timelimit = 3
>>> > net_timeout = 1
>>> > }
>>> >
>>> >
>>> > file /usr/local/pf/conf/raddb
>>> > authorize {
>>> > suffix
>>> > ntdomain
>>> > %%multi_domain%%
>>> > eap {
>>> > ok = return
>>> > }
>>> > openldap
>>> > files
>>> > }
>>> > im following administrator guide packetfence at page 38.
>>> >
>>> > authentication i want to config looks like this.
>>> > - freeradius must lookup to openldap if user login
>>> >
>>> >
>>> >
>>> >
>>> > On Mon, Jan 11, 2016 at 6:41 PM, Fabrice Durand <[email protected]
>>> > <mailto:[email protected]>> wrote:
>>> >
>>> >
>>> > Hello Jabang,
>>> >
>>> > You authenticate against localhostradius and not against a ldap3]
>>>
>>> > Calling
>>> > match with empty/invalid rule class. Defaulting to 'authentication'
>>> > (pf::authentication::match)
>>> > Jan 11 01:27:25 httpd.portal(2441) INFO: [mac:c4:42:02:03:e1:03]
>>> > Matched
>>> > rule (staff) in source localhostradius, returning actions.
>>> > (pf::Authentication::Source::match)
>>> > Jan 11 01:27:25 httpd.portal(2441) INFO: [mac:c4:42:02:03:e1:03]
>>> > Instantiate profile default
>>> > (pf::Portal::ProfileFactory::_from_profile)
>>> > Jan 11 01:27:25 httpd.portal(2441) INFO: [mac:c4:42:02:03:e1:03]
>>> > re-evaluating access (manage_register called)
>>> > (pf::enforcement::reevaluate_access)
>>> > Jan 11 01:27:25 httpd.portal(2441) INFO: [mac:c4:42:02:03:e1:03] is
>>> > currentlog connected at (172.16.9.228) ifIndex 0 in VLAN 700
>>> > (pf::enforcement::_should_we_reassign_vlan)
>>> > Jan 11 01:27:25 httpd.portal(2441) INFO: [mac:c4:42:02:03:e1:03]
>>> > Instantiate profile default
>>> > (pf::Portal::ProfileFactory::_from_profile)
>>> > Jan 11 01:27:25 httpd.portal(2441) INFO: [mac:c4:42:02:03:e1:03]
>>> > Connection
>>> > type is WIRELESS_MAC_AUTH. Getting role from node_info
>>> > (pf::vlan::getNormalVlan)
>>> > Jan 11 01:27:25 httpd.portal(2441) INFO: [mac:c4:42:02:03:e1:03]
>>> > Username
>>> > was defined "c4420203e103" - returning role 'staff'
>>> > (pf::vlan::getNormalVlan)
>>> > Jan 11 01:27:25 httpd.portal(2441) WARN: [mac:c4:42:02:03:e1:03] No
>>> > parameter staffVlan found in conf/switches.conf for the switch
>>> > 172.16.9.228
>>> > (pf::Switch::getVlanByName)
>>> > Jan 11 01:27:25 httpd.portal(2441) INFO: [mac:c4:42:02:03:e1:03]
>>> PID:
>>> > "sasa", Status: reg Returned VLAN: (undefined), Role: staff
>>> > (pf::vlan::fetchVlanForNode)
>>> > Jan 11 01:27:25 httpd.portal(2441) INFO: [mac:c4:42:02:03:e1:03]
>>> > switch
>>> > port is (172.16.9.228) ifIndex unknown connection type: WiFi MAC
>>> Auth
>>> > (pf::enforcement::_vlan_reevaluation)
>>> > Jan 11 01:27:25 httpd.portal(3235) INFO: [mac:c4:42:02:03:e1:03]
>>> > Instantiate profile default
>>> > (pf::Portal::ProfileFactory::_from_profile)
>>> > Jan 11 01:27:25 httpd.portal(3235) INFO: [mac:c4:42:02:03:e1:03]
>>> > Instantiate profile default
>>> > (pf::Portal::ProfileFactory::_from_profile)
>>> > Jan 11 01:27:26 httpd.webservices(2189) INFO:
>>> [mac:c4:42:02:03:e1:03]
>>> > [c4:42:02:03:e1:03] DesAssociating mac on switch (172.16.9.228)
>>> > (pf::api::desAssociate)
>>> > Jan 11 01:27:26 httpd.webservices(2189) INFO:
>>> [mac:c4:42:02:03:e1:03]
>>> > deauthenticating (pf::Switch::radiusDisconnect)
>>> > Jan 11 01:27:26 httpd.aaa(2143) INFO: [mac:c4:42:02:03:e1:03]
>>> handling
>>> > radius autz request: from switch_ip => (172.16.9.228),
>>> > connection_type =>
>>> > Wireless-802.11-NoEAP,switch_mac => (38:ff:36:42:23:08), mac =>
>>> > [c4:42:02:03:e1:03], port => 0, username => "c4420203e103", ssid
>>> > => captive
>>> > (pf::radius::authorize)
>>> > Jan 11 01:27:26 httpd.aaa(2143) INFO: [mac:c4:42:02:03:e1:03]
>>> > Instantiate
>>> > profile default (pf::Portal::ProfileFactory::_from_profile)
>>> > Jan 11 01:27:26 httpd.aaa(2143) INFO: [mac:c4:42:02:03:e1:03]
>>> > Connection
>>> > type is WIRELESS_MAC_AUTH. Getting role from node_info
>>> > (pf::vlan::getNormalVlan)
>>> > Jan 11 01:27:26 httpd.aaa(2143) INFO: [mac:c4:42:02:03:e1:03]
>>> > Username was
>>> > defined "c4420203e103" - returning role 'staff'
>>> > (pf::vlan::getNormalVlan)
>>> > Jan 11 01:27:26 httpd.aaa(2143) WARN: [mac:c4:42:02:03:e1:03] No
>>> > parameter
>>> > staffVlan found in conf/switches.conf for the switch 172.16.9.228
>>> > (pf::Switch::getVlanByName)
>>> > Jan 11 01:27:26 httpd.aaa(2143) INFO: [mac:c4:42:02:03:e1:03] PID:
>>> > "sasa",
>>> > Status: reg Returned VLAN: (undefined), Role: staff
>>> > (pf::vlan::fetchVlanForNode)
>>> > Jan 11 01:27:26 httpd.aaa(2143) INFO: [mac:c4:42:02:03:e1:03]
>>> > (172.16.9.228) Returning ACCEPT with VLAN and role
>>> > (pf::Switch::returnRadiusAccessAccept)
>>> >
>>> >
>>> > please give me some advice. i stucked .
>>> > i just want is to make packetfence auth based openldap user through
>>> > freeradius, because later i want try limit quota.
>>> > <
>>> https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail
>>> >
>>> > This
>>> > email has been sent from a virus-free computer protected by Avast.
>>> > www.avast.com <http://www.avast.com>
>>> > <
>>> https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail
>>> >
>>> > <#DDB4FAA8-2DD7-40BB-A1B8-4E2AA1F9FDF2>
>>> >
>>> >
>>>
>>>
>>> --
>>> Fabrice Durand
>>> [email protected] :: +1.514.447.4918 (x135) :: www.inverse.ca
>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and
>>> PacketFence (http://packetfence.org)
>>>
>>>
>>
>> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail>
>> This
>> email has been sent from a virus-free computer protected by Avast.
>> www.avast.com
>> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail>
>> <#1351612486_-1334612653_-1810761378_DDB4FAA8-2DD7-40BB-A1B8-4E2AA1F9FDF2>
>>
>
>
------------------------------------------------------------------------------
Site24x7 APM Insight: Get Deep Visibility into Application Performance
APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month
Monitor end-to-end web transactions and take corrective actions now
Troubleshoot faster and improve end-user experience. Signup Now!
http://pubads.g.doubleclick.net/gampad/clk?id=267308311&iu=/4140
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users