Hi Antoine I have not the option for the first command on my switch (cisco 2960
12.2 (44)).But for the vlan policy I got this : ot1x Info for
FastEthernet0/3-----------------------------------PAE =
AUTHENTICATORPortControl = AUTOControlDirection =
BothHostMode = MULTI_HOSTViolation Mode =
PROTECTReAuthentication = EnabledQuietPeriod =
60ServerTimeout = 30SuppTimeout = 30ReAuthPeriod
= 3600 (Locally configured)ReAuthMax = 2MaxReq
= 2TxPeriod = 30RateLimitPeriod = 0
Dot1x Authenticator Client List-------------------------------Domain
= DATASupplicant = 0040.d067.d0b1 Auth SM State
= AUTHENTICATED Auth BEND SM State = IDLEPort Status =
AUTHORIZEDReAuthPeriod = 3600ReAuthAction =
ReauthenticateTimeToNextReauth = 2801Authentication Method =
Dot1xAuthorized By = Authentication ServerVlan Policy
= 100show spanning-tree vlan 100 gives this :
VLAN0100 Spanning tree enabled protocol ieee Root ID Priority 32868
Address ec44.7687.f080 This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority 32868 (priority 32768 sys-id-ext 100)
Address ec44.7687.f080 Hello Time 2 sec Max Age 20 sec
Forward Delay 15 sec Aging Time 300
Interface Role Sts Cost Prio.Nbr Type------------------- ----
--- --------- -------- --------------------------------Fa0/1 Desg
FWD 19 128.1 P2pFa0/3 Desg FWD 19 128.3
P2pAnd the radius debug for the client gives this : ++[ntdomain] =
noop++[preprocess] = ok[eap] EAP packet type response id 10 length 43[eap]
Continuing tunnel setup.++[eap] = ok+} # group authorize = okFound Auth-Type =
EAP# Executing group from file
/usr/local/pf/raddb//sites-enabled/packetfence+group authenticate {[eap]
Request found, released from the list[eap] EAP/peap[eap] processing type
peap[peap] processing EAP-TLS[peap] eaptls_verify returned 7 [peap] Done
initial handshake[peap] eaptls_process returned 7 [peap] EAPTLS_OK[peap]
Session established. Decoding tunneled attributes.[peap] Peap state send tlv
success[peap] Received EAP-TLV response.[peap] Success[peap] Using saved
attributes from the original Access-Accept Tunnel-Medium-Type:0 = IEEE-802
Tunnel-Type:0 = VLAN Tunnel-Private-Group-Id:0 = "100" User-Name =
"Anisha.kindo"[eap] Freeing handler++[eap] = ok+} # group authenticate =
okLogin OK: [Anisha.kindo] (from client 192.168.1.5 port 50003 cli
00:40:d0:67:d0:b1)} # server packetfence# Executing section post-auth from file
/usr/local/pf/raddb//sites-enabled/packetfence+group post-auth {++[exec] =
noop++? if (!EAP-Type || (EAP-Type != EAP-TTLS && EAP-Type != PEAP))?
Evaluating !(EAP-Type ) -> FALSE?? Evaluating (EAP-Type != EAP-TTLS ) ->
TRUE?? Evaluating (EAP-Type != PEAP) -> FALSE++? if (!EAP-Type || (EAP-Type !=
EAP-TTLS && EAP-Type != PEAP)) -> FALSE+} # group post-auth = noopSending
Access-Accept of id 34 to 192.168.1.5 port 1645 Tunnel-Medium-Type:0 = IEEE-802
Tunnel-Type:0 = VLAN Tunnel-Private-Group-Id:0 = "100" User-Name =
"Anisha.kindo" MS-MPPE-Recv-Key =
0x582295297696bc0dd0d4a396c512387285a5e54f58922e3454ae625363e8f1dd
MS-MPPE-Send-Key =
0x34b6a3dd8221574be698bcc88ecbf658c5ccea150dafd5657618d84ec3c1e629 EAP-Message
= 0x030a0004 Message-Authenticator = 0x00000000000000000000000000000000Finished
request 32.Going to the next requestWaking up in 4.6 seconds.Cleaning up
request 31 ID 33 with timestamp +590Waking up in 0.3 seconds.Cleaning up
request 32 ID 34 with timestamp +597Ready to process requests.
Really don't know from where came the problem.ThanksRegards Amidou
Le Mercredi 27 avril 2016 22h38, Antoine Amacher <[email protected]> a
écrit :
Hello Amidou,
You should look toward your switch, is your registration VLAN properly applied
to the port and spanned?
What is the result of "show authentication session interface XX" where XX
stands for the interface where your client is connected.
You should see "Vlan Policy: YOUR_REGISTRATION_VLAN".
Also look for "show spanning-tree vlan YOUR_REGISTRATION_VLAN"
You should see your interface where your device is plugged.
Thank you
On 04/26/2016 03:08 PM, TOURE Amidou Florian wrote:
Hi,I have a problem running with my packetfence. Now I have configure it to
work with a cisco 2960 swicth and the server is running on a wmware worksation
machine.When packetfence put the device on the registration vlan the client
doesn't get an IP address and a static ip address on this same client doesn't
permit to ping packetfence server or to ping the switch. eth0 interface seems
to be running. The output of radius debug shows this [suffix] No '@' in
User-Name = "Administrateur", skipping NULL due to config. ++[suffix] = noop
[ntdomain] No '\' in User-Name = "Administrateur", looking up realm NULL
[ntdomain] No such realm "NULL" ++[ntdomain] = noop ++[preprocess] = ok [eap]
EAP packet type response id 10 length 43 [eap] Continuing tunnel setup. ++[eap]
= ok +} # group authorize = ok Found Auth-Type = EAP # Executing group from
file /usr/local/pf/raddb//sites-enabled/packetfence +group authenticate { [eap]
Request found, released from the list [eap] EAP/peap [eap] processing type peap
[peap] processing EAP-TLS [peap] eaptls_verify returned 7 [peap] Done initial
handshake [peap] eaptls_process returned 7 [peap] EAPTLS_OK [peap] Session
established. Decoding tunneled attributes. [peap] Peap state send tlv success
[peap] Received EAP-TLV response. [peap] Success [peap] Using saved attributes
from the original Access-Accept Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Type:0
= VLAN Tunnel-Private-Group-Id:0 = "100" User-Name = "Administrateur" [eap]
Freeing handler ++[eap] = ok +} # group authenticate = ok Login OK:
[Administrateur] (from client 192.168.1.5 port 50003 cli 00:40:d0:67:d0:b1) } #
server packetfence # Executing section post-auth from file
/usr/local/pf/raddb//sites-enabled/packetfence +group post-auth { ++[exec] =
noop ++? if (!EAP-Type || (EAP-Type != EAP-TTLS && EAP-Type != PEAP)) ?
Evaluating !(EAP-Type ) -> FALSE ?? Evaluating (EAP-Type != EAP-TTLS ) -> TRUE
?? Evaluating (EAP-Type != PEAP) -> FALSE ++? if (!EAP-Type || (EAP-Type !=
EAP-TTLS && EAP-Type != PEAP)) -> FALSE +} # group post-auth = noop Sending
Access-Accept of id 42 to 192.168.1.5 port 1645 Tunnel-Medium-Type:0 =
IEEE-802 Tunnel-Type:0 = VLAN Tunnel-Private-Group-Id:0 = "100" User-Name =
"Administrateur" MS-MPPE-Recv-Key =
0xf68acbdf500d49b410cdfc7e55f80616b05cc4b2ef2ca466d212317af86838ff
MS-MPPE-Send-Key =
0x127d4a339e47839cd271f86f062913e861408355d02e43364597daba13d2108e EAP-Message
= 0x030a0004 Message-Authenticator = 0x00000000000000000000000000000000
Finished request 16. Going to the next request Waking up in 4.9 seconds.
Cleaning up request 15 ID 41 with timestamp +45 Cleaning up request 16 ID 42
with timestamp +49 Ready to process requests. Now the output of
packetfence.log and pfdhcplistener.log
Apr 26 11:49:51 httpd.aaa(50960) INFO: [mac:00:40:d0:67:d0:b1] is of status
unreg; belongs into registration VLAN (pf::role::getRegistrationRole) Apr 26
11:49:51 httpd.aaa(50960) INFO: [mac:00:40:d0:67:d0:b1] (192.168.1.5) Added
VLAN 100 to the returned RADIUS reply (pf::Switch::returnRadiusAccessAccept)
Apr 26 11:49:51 httpd.aaa(50960) INFO: [mac:00:40:d0:67:d0:b1] (192.168.1.5)
Returning ACCEPT with VLAN 100 (pf::Switch::returnRadiusAccessAccept) Apr 26
11:49:51 httpd.aaa(50960) INFO: [mac:00:40:d0:67:d0:b1] (192.168.1.5) No access
lists defined for this role registration
(pf::Switch::Cisco::Catalyst_2960::returnRadiusAccessAccept)
Apr 26 11:16:26 pfdhcplistener(51054) WARN: Unable to open VLAN proc
description for eth0: No such file or directory (pf::util::get_vlan_from_int)
Apr 26 11:16:26 pfdhcplistener(51054) INFO: DHCP detector on eth0 enabled
(main::) Apr 26 11:16:26 pfdhcplistener(51054) INFO: Reload configuration on
eth0 with status 0 (main::reload_config)
Why a static IP on the host can't reach the server or can ping the switch?All
the firewalls have been stopped. Can I have a help? thanks
------------------------------------------------------------------------------
Find and fix application performance issues faster with Applications Manager
Applications Manager provides deep performance insights into multiple tiers of
your business applications. It resolves application problems quickly and
reduces your MTTR. Get your free trial!
https://ad.doubleclick.net/ddm/clk/302982198;130105516;z
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
--
Antoine Amacher
[email protected] :: +1.514.447.4918 *130 :: www.inverse.ca
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
(www.packetfence.org)
------------------------------------------------------------------------------
Find and fix application performance issues faster with Applications Manager
Applications Manager provides deep performance insights into multiple tiers of
your business applications. It resolves application problems quickly and
reduces your MTTR. Get your free trial!
https://ad.doubleclick.net/ddm/clk/302982198;130105516;z
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
------------------------------------------------------------------------------
Find and fix application performance issues faster with Applications Manager
Applications Manager provides deep performance insights into multiple tiers of
your business applications. It resolves application problems quickly and
reduces your MTTR. Get your free trial!
https://ad.doubleclick.net/ddm/clk/302982198;130105516;z
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users