Hello Fabrice,

oh yeah .. it's working now with Ethernet LAN :-)
I have logout & login and to see user/computer authentication logs flowing.

how about wireless EAP? I tried with the following scripts but it seems
doesn't work.

[machine]
filter = node_info
attribute = machine_account
operator = defined
value = default
#
[ssidsecure]
filter = connection_type
operator = is
value = Wireless-802.11-EAP
#
[4:ssidsecure&machineauth]
scope = AutoRegister
role = machines
#
[5:ssidsecure&machineauth]
scope = NodeInfoForAutoReg
role = machines
#
[6:ssidsecure&!machine]
scope = RegisteredRole
role = refuse

Regards,
Reeyon


On Thu, Feb 11, 2016 at 10:18 AM, Reeyon Lim <[email protected]> wrote:

> Hello Fabrice,
>
> Thank you for the script, appreciate that :-)
>
> However, no matter how I try, the supplicant will always goes to user
> authentication first instead of computer authentication. In order to
> autoreg the computer, I did the following steps:
>
> 1. first my windows 7 take user authentication, although radius accepted,
> but pf present registration vlan
> 2. Then, manually force my win7 supplicant to "computer authentication" in
> 802.1x setting, and reconnect the port and pf starts to autoreg the machine
> 3. Lastly, revert back the 802.1x setting to "user or computer
> authentication", reconnect the port, pf autoreg without issue
>
> so if I unreg the node manually, I have to redo step 2 & 3 to autoreg the
> node.
> Thank you.
>
> Regards,
> Reeyon
>
>
> On Fri, Feb 5, 2016 at 11:56 PM, Fabrice DURAND <[email protected]>
> wrote:
>
>> Hello Reeyon,
>>
>> you can do something like that:
>>
>> First create a role machine and a role refuse.
>> In the switch config assign the role machine to a production vlan and
>> refuse to the vlan id -1.
>>
>> Next add to the vlan filter this:
>>
>> [EthernetEAP]
>> filter = connection_type
>> operator = is
>> value = Ethernet-EAP
>>
>> [machineauth]
>> filter = user_name
>> operator = regex
>> value = ^host\/
>>
>> [machine]
>> filter = node_info
>> attribute = machine_account
>> operator = defined
>> value = default
>>
>> #### Machine Auth Autoregister ####
>>
>> [1:EthernetEAP&machineauth]
>> scope = AutoRegister
>> role = machine
>>
>> [2:EthernetEAP&machineauth]
>> scope = NodeInfoForAutoReg
>> role = machine
>>
>> #### Refuse User Auth without machine Auth ####
>>
>> [3:EthernetEAP&!machine]
>> scope = RegisteredRole
>> role = refuse
>>
>> So if the first authentication is machine then packetfence will
>> autoregister it, next if the device do user auth then it will compute
>> the role in the authentication source you defined (Portal profile with
>> filter connection_type EthernetEAP and source AD User and AD Machine).
>> If the device try to authenticate directly without previously did
>> machine auth then it will be refuse.
>>
>> Btw if you want to forward the device to the registration vlan instead
>> of refusing it then replace the rule 3 with that:
>>
>> [3:EthernetEAP&!machine]
>> scope = RegisteredRole
>> role = registration
>> action = deregister_node
>> action_param = $mac
>>
>>
>> Regards
>> Fabrice
>>
>> Le 2016-02-04 22:17, Reeyon Lim a écrit :
>> > In addition, if any of the authorized user bring their personal device
>> > such as mobile/IPAD/tablet/laptops, because since they already have
>> > 802.1x AD account in the company, so that  they can easily setup
>> > 802.1x settings themselves and access granted.
>> >
>> > Endpoint profiling/classification will have more flexibility and ease
>> > configuration.
>> > Something similar to this:
>> > PF detects any BYOD that aren't authorized, put them into registration.
>> >
>> > I have no idea how to deal with this objective, by using traditional
>> > 802.1x or WMI or Violation?
>> >
>> > I would prefer Violation, because it can operate dynamically by the
>> > design i guess. for example: PF detect domain computers, put them
>> > normal vlan, otherwise put them in Registration vlan.
>> > So how can I achieve this goal?
>> >
>> > Thank you.
>> >
>> > Regards,
>> > Reeyon
>> >
>> >
>> >
>> > On Thu, Feb 4, 2016 at 10:16 AM, Reeyon Lim <[email protected]
>> > <mailto:[email protected]>> wrote:
>> >
>> >     Hello Fabrice,
>> >
>> >     From the windows supplicant, by default "user and computer
>> >     authentication" was chosen in 802.1x settings.
>> >
>> >     Does PF provides other better solution for 802.1x authentication
>> >     for BYOD?
>> >
>> >     Regards,
>> >     Reeyon
>> >
>> >     On Wed, Feb 3, 2016 at 11:55 PM, Fabrice DURAND
>> >     <[email protected] <mailto:[email protected]>> wrote:
>> >
>> >         You talked about netbios name, not dns name.
>> >
>> >         In PacketFence, freeradius validate the machine name
>> >         (host/FMCART310-15.domain.com
>> >         <http://FMCART310-15.domain.com>) and in PacketFence side we
>> >         have to create
>> >         another authentication source with the user attribute
>> >         servicePrincipalName.
>> >
>> >         Check in your AD for a machine account (Adsiedit.msc) in the
>> >         attribute
>> >         servicePrincipalName and you will see the complete dns name of
>> >         the machine.
>> >
>> >         So the only limit is 64 characteres of the dns name.
>> >
>> >         Regards
>> >         Fabrice
>> >
>> >         Le 2016-02-03 10:16, Tedder, Eric a écrit :
>> >         > Fabrice,
>> >         >
>> >         > I am not certain how you get it to work after 15 characters,
>> >         but everything I read and have experienced with AD and
>> >         hostnames being longer than 14/15 characters is that they
>> >         don't authenticate because AD will truncate them.
>> >         >
>> >         > https://support.microsoft.com/en-us/kb/909264
>> >         > https://technet.microsoft.com/en-us/library/cc731383.aspx
>> >         >
>> >
>> https://supportforums.cisco.com/discussion/12299256/ise-admin-server-16-character-hostname
>> >         >
>> >         >
>> >         >
>> >         > -----Original Message-----
>> >         > From: Fabrice DURAND [mailto:[email protected]
>> >         <mailto:[email protected]>]
>> >         > Sent: Wednesday, February 03, 2016 9:17 AM
>> >         > To: [email protected]
>> >         <mailto:[email protected]>
>> >         > Subject: Re: [PacketFence-users] machine authentication
>> >         >
>> >         > There is no limit of 14 characters, i have machine auth with
>> >         more than
>> >         > 30 characters and there is no issue.
>> >         >
>> >         > Also did you checked that the client do machine auth ?
>> >         (windows supplicant)
>> >         >
>> >         > Regards
>> >         > Fabrice
>> >         >
>> >         > Le 2016-02-03 08:52, Tedder, Eric a écrit :
>> >         >> The one limitation that I have found with computer
>> >         authentication with
>> >         >> packet fence and Active directory is that the computer name
>> >         cannot
>> >         >> exceed 14 characters or it breaks.
>> >         >>
>> >         >>
>> >         >>
>> >         >> *From:*Reeyon Lim [mailto:[email protected]
>> >         <mailto:[email protected]>]
>> >         >> *Sent:* Tuesday, February 02, 2016 9:39 PM
>> >         >> *To:* [email protected]
>> >         <mailto:[email protected]>
>> >         >> *Subject:* Re: [PacketFence-users] machine authentication
>> >         >>
>> >         >>
>> >         >>
>> >         >> Hello Fabrice,
>> >         >>
>> >         >>
>> >         >>
>> >         >> Now i restarted the config from scratch.
>> >         >>
>> >         >>
>> >         >>
>> >         >> 0.  wipe out existing parameters in vlan_filters.conf
>> >         >>
>> >         >> 1.  Created AD-computer source, according to the
>> >         Administration Guide.
>> >         >>
>> >         >> 2.  Map this source to 802.1x portal profile.
>> >         >>
>> >         >> 3.  run raddebug -f /usr/local/pf/var/run/radiusd.sock -t
>> 3600
>> >         >>
>> >         >> 4.  I can't see any "host/xxxxxx" in debug, but I see
>> >         "domain\username"
>> >         >>
>> >         >>
>> >         >>
>> >         >> So I guess the computer is authenticating user credentials
>> >         instead of
>> >         >> machine auth.
>> >         >>
>> >         >>
>> >         >>
>> >         >> Anything that I've missed out?
>> >         >>
>> >         >>
>> >         >>
>> >         >>
>> >         >>
>> >         >> Regards,
>> >         >>
>> >         >> Reeyon
>> >         >>
>> >         >>
>> >         >>
>> >         >> On Tue, Feb 2, 2016 at 10:53 PM, Fabrice DURAND
>> >         <[email protected] <mailto:[email protected]>
>> >         >> <mailto:[email protected] <mailto:[email protected]>>>
>> wrote:
>> >         >>
>> >         >> Hello Reeyon,
>> >         >>
>> >         >> Le 2016-02-02 02:12, Reeyon Lim a écrit :
>> >         >>> Hello Everyone,
>> >         >>>
>> >         >>> Sorry for my multiples questions recently.
>> >         >> No problem , the mailling list is for that.
>> >         >>> I have been setting up a 802.1x authentication for the
>> >         lab, but i
>> >         >>> need to do more secure of 802.1x authentication where I
>> found
>> >         >>> machine authentication in the Administration guide.
>> >         >>>
>> >         >>> Tried to follow every steps in the guide, but failed to
>> >         make it work.
>> >         >>> I do not find any logs in packetfence.log like
>> >         "host/xxxxxx", and pf
>> >         >>> just push the domain PC to RegistrationRole without
>> >         authentication.
>> >         >> Check first in the radius.log or run radius in debug mode
>> >         to see why
>> >         >> machine auth failed (raddebug -f
>> >         /usr/local/pf/var/run/radiusd.sock -t
>> >         >> 3000).
>> >         >> When you will be able to successfully authenticate machine in
>> >         >> freeradius then you will be able to see in packetfence.log
>> >         username
>> >         >> like host/xxxxxx
>> >         >>> I have 2 source lists: ad-user, and ad-computers These two
>> >         lists
>> >         >>> mapped to 802.1x portal profile.
>> >         >>>
>> >         >>> The objective here is to block any non-domain of BYOD to
>> >         be able to
>> >         >>> access the network, except domain machines and users.
>> >         >>>
>> >         >> Next you will have to deal with vlan filter to test if
>> >         machine auth
>> >         >> passed before user auth.
>> >         >>> Please help!
>> >         >>> Thank you.
>> >         >>>
>> >         >>> Regards,
>> >         >>> Reeyon
>> >         >>>
>> >         >>>
>> >         >> Regards
>> >         >> Fabrice
>> >         >>
>> >         >>>
>> >         >>
>> >
>>  ----------------------------------------------------------------------
>> >         >> --------
>> >         >>> Site24x7 APM Insight: Get Deep Visibility into Application
>> >         >>> Performance APM + Mobile APM + RUM: Monitor 3 App
>> >         instances at just
>> >         >>> $35/Month Monitor end-to-end web transactions and take
>> >         corrective
>> >         >>> actions now Troubleshoot faster and improve end-user
>> >         experience. Signup Now!
>> >         >>>
>> >
>> http://pubads.g.doubleclick.net/gampad/clk?id=267308311&iu=/4140
>> >         >>>
>> >         >>>
>> >         >>> _______________________________________________
>> >         >>> PacketFence-users mailing list
>> >         >>> [email protected]
>> >         <mailto:[email protected]>
>> >         >> <mailto:[email protected]
>> >         <mailto:[email protected]>>
>> >         >>>
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>> >         >>
>> >         >> --
>> >         >> Fabrice Durand
>> >         >> [email protected] <mailto:[email protected]>
>> >         <mailto:[email protected] <mailto:[email protected]>> ::
>> >         +1.514.447.4918 <tel:%2B1.514.447.4918>
>> >         >> <tel:%2B1.514.447.4918> (x135) ::  www.inverse.ca
>> >         <http://www.inverse.ca>
>> >         >> <http://www.inverse.ca> Inverse inc. :: Leaders behind SOGo
>> >         >> (http://www.sogo.nu) and PacketFence (http://packetfence.org
>> )
>> >         >>
>> >         >>
>> >         >>
>> >
>>  ----------------------------------------------------------------------
>> >         >> --------
>> >         >> Site24x7 APM Insight: Get Deep Visibility into Application
>> >         Performance
>> >         >> APM + Mobile APM + RUM: Monitor 3 App instances at just
>> >         $35/Month
>> >         >> Monitor end-to-end web transactions and take corrective
>> >         actions now
>> >         >> Troubleshoot faster and improve end-user experience. Signup
>> >         Now!
>> >         >>
>> >
>> http://pubads.g.doubleclick.net/gampad/clk?id=267308311&iu=/4140
>> >         >> _______________________________________________
>> >         >> PacketFence-users mailing list
>> >         >> [email protected]
>> >         <mailto:[email protected]>
>> >         >> <mailto:[email protected]
>> >         <mailto:[email protected]>>
>> >         >>
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>> >         >>
>> >         >>
>> >         >>
>> >         >>
>> >         >>
>> >         >>
>> >
>>  ----------------------------------------------------------------------
>> >         >> --------
>> >         >> Site24x7 APM Insight: Get Deep Visibility into Application
>> >         Performance
>> >         >> APM + Mobile APM + RUM: Monitor 3 App instances at just
>> >         $35/Month
>> >         >> Monitor end-to-end web transactions and take corrective
>> >         actions now
>> >         >> Troubleshoot faster and improve end-user experience. Signup
>> >         Now!
>> >         >>
>> >
>> http://pubads.g.doubleclick.net/gampad/clk?id=267308311&iu=/4140
>> >         >>
>> >         >>
>> >         >> _______________________________________________
>> >         >> PacketFence-users mailing list
>> >         >> [email protected]
>> >         <mailto:[email protected]>
>> >         >>
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>> >         >
>> >         > --
>> >         > Fabrice Durand
>> >         > [email protected] <mailto:[email protected]> ::
>> >         +1.514.447.4918 <tel:%2B1.514.447.4918> (x135) ::
>> >         www.inverse.ca <http://www.inverse.ca> Inverse inc. :: Leaders
>> >         behind SOGo (http://www.sogo.nu) and PacketFence
>> >         (http://packetfence.org)
>> >         >
>> >         >
>> >         >
>> >
>>  
>> ------------------------------------------------------------------------------
>> >         > Site24x7 APM Insight: Get Deep Visibility into Application
>> >         Performance
>> >         > APM + Mobile APM + RUM: Monitor 3 App instances at just
>> >         $35/Month
>> >         > Monitor end-to-end web transactions and take corrective
>> >         actions now
>> >         > Troubleshoot faster and improve end-user experience. Signup
>> Now!
>> >         >
>> http://pubads.g.doubleclick.net/gampad/clk?id=267308311&iu=/4140
>> >         > _______________________________________________
>> >         > PacketFence-users mailing list
>> >         > [email protected]
>> >         <mailto:[email protected]>
>> >         >
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>> >
>> >
>> >         --
>> >         Fabrice Durand
>> >         [email protected] <mailto:[email protected]> ::
>> >         +1.514.447.4918 <tel:%2B1.514.447.4918> (x135) ::
>> >         www.inverse.ca <http://www.inverse.ca>
>> >         Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and
>> >         PacketFence (http://packetfence.org)
>> >
>> >
>> >
>>  
>> ------------------------------------------------------------------------------
>> >         Site24x7 APM Insight: Get Deep Visibility into Application
>> >         Performance
>> >         APM + Mobile APM + RUM: Monitor 3 App instances at just
>> $35/Month
>> >         Monitor end-to-end web transactions and take corrective
>> >         actions now
>> >         Troubleshoot faster and improve end-user experience. Signup Now!
>> >
>> http://pubads.g.doubleclick.net/gampad/clk?id=267308311&iu=/4140
>> >         _______________________________________________
>> >         PacketFence-users mailing list
>> >         [email protected]
>> >         <mailto:[email protected]>
>> >         https://lists.sourceforge.net/lists/listinfo/packetfence-users
>> >
>> >
>> >
>> >
>> >
>> >
>> ------------------------------------------------------------------------------
>> > Site24x7 APM Insight: Get Deep Visibility into Application Performance
>> > APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month
>> > Monitor end-to-end web transactions and take corrective actions now
>> > Troubleshoot faster and improve end-user experience. Signup Now!
>> > http://pubads.g.doubleclick.net/gampad/clk?id=272487151&iu=/4140
>> >
>> >
>> > _______________________________________________
>> > PacketFence-users mailing list
>> > [email protected]
>> > https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>
>>
>> --
>> Fabrice Durand
>> [email protected] ::  +1.514.447.4918 (x135) ::  www.inverse.ca
>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence
>> (http://packetfence.org)
>>
>>
>>
>> ------------------------------------------------------------------------------
>> Site24x7 APM Insight: Get Deep Visibility into Application Performance
>> APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month
>> Monitor end-to-end web transactions and take corrective actions now
>> Troubleshoot faster and improve end-user experience. Signup Now!
>> http://pubads.g.doubleclick.net/gampad/clk?id=272487151&iu=/4140
>> _______________________________________________
>> PacketFence-users mailing list
>> [email protected]
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>
>>
>
------------------------------------------------------------------------------
Site24x7 APM Insight: Get Deep Visibility into Application Performance
APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month
Monitor end-to-end web transactions and take corrective actions now
Troubleshoot faster and improve end-user experience. Signup Now!
http://pubads.g.doubleclick.net/gampad/clk?id=272487151&iu=/4140
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to