Hello Louis, You are great! That debug mode helped me. Really dumb mistake, it was a radius passhrase mismatch.
Now the switchport went to Registration vlan, but I don't know understand why. I defined a Portal profile with the following conditions: 1. switch - switchIp Source: A defined ADauthentication (is user in a group) Provisioners: accept It is set that any of the conditions are met. In the switchconfig, there is: Role mapping by vlan ID, and I set up registration, isolation and a production vlan. How do I know why is that port set to the registration vlan? I don't understand the decision logic of packet fence. I've read the admin guide a few times, but I just don't get the point. I really understood it with your words :) Gábor Barócsi Network and System Engineer From: Louis Munro [mailto:lmu...@inverse.ca] Sent: 2016. február 24. 20:29 To: packetfence-users@lists.sourceforge.net Subject: Re: [PacketFence-users] freeradius issue with 802.1x On Feb 24, 2016, at 10:47 , BARÓCSI Gábor <gabor.baro...@qualysoft.com> wrote: Hello, Please help me with an issue. I've just installed packetfence and integrated to a windows AD domain. I can do AD queries. I use a cisco sg300 switch which sends the EAP requests to packetfence. I see with tcpdump that requests are coming to packetfence, but there is no response to the switch. RADIUS, Access Request (1), id: 0x8b length: 137 Please post the actual tcpdump output. Run it like this: # tcpdump -iany -nnl port 1812 Then, and at the same time if possible, run FreeRADIUS in debug mode: pkill radiusd; radiusd -d /usr/local/pf/raddb -n auth -Xx I tried to do a query with this actual command (I don't have a user like that): radtest dd9999 Abcd1234 localhost:18120 12 testing123 Sending Access-Request of id 189 to 127.0.0.1 port 18120 User-Name = "dd9999" User-Password = "Abcd1234" NAS-IP-Address = 127.0.1.1 NAS-Port = 12 Message-Authenticator = 0x00000000000000000000000000000000 rad_recv: Access-Accept packet from host 127.0.0.1 port 18120, id=189, length=20 That does not prove much of anything. Your switch is not sending packets to that host and port anyway. Anything that I can check? The problem is that the switch is not getting an EAP Radius-Access-Chellange response message and the VLAN can not be set. Also please confirm if I understand it correct: switch uses 802.1x auth wih freeradius, packetfence is checking the AD, and if user or machine is in the AD it is setting the correct VLAN. Maybe some other checks are also made like firewall is on, etc. PacketFence will check whatever authorization sources you have configured based on the portal profile that matches the connection. It will then apply the rules that you have defined and select a role based on those. The role will correspond to a VLAN based on the configuration of the switch in PacketFence. You did configure the switch in PacketFence, right (in the GUI)? If the switch is not in the PacketFence configuration, FreeRADIUS will drop any packets coming from it. Regards, -- Louis Munro lmu...@inverse.ca :: www.inverse.ca +1.514.447.4918 x125 :: +1 (866) 353-6153 x125 Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence (www.packetfence.org) ------------------------------------------------------------------------------ Site24x7 APM Insight: Get Deep Visibility into Application Performance APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month Monitor end-to-end web transactions and take corrective actions now Troubleshoot faster and improve end-user experience. Signup Now! http://pubads.g.doubleclick.net/gampad/clk?id=272487151&iu=/4140 _______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users