Pierrick,

I had in mind that you wanted to use out-of-band not Inline.

So you should not take it into account my comment about the second trunk.

Thank you

On 05/26/2016 10:51 AM, PROST pierrick wrote:

Fabrice and Antoine thanks for your help, we appreciate.

If I resume your mails, it will be something like that :

Wireless AP                                 Packet Fence

XXXXXXX XXXX

+--------------------+ +-----------------+ +-----------+ XXXXXXXXXX XXX XX

| | | | | | X XX

| | | | no routed network | | XXXXXXXX XX

| | | <-----+-----> | (dedicated subnet)| | XX XXXXXXX

| multiple SSID | | | | | | X internet X

| one per VLAN +-------Trunk+---------eth1| | |eth0---------fw-eth| FW +---+X X

| | + | | | | | X XX

| | VLAN mngt | | | | | | X XXXXX

| each SSID is | VLAN employee | | <-----+------> | routed VLAN | | XXXXXX X X

| OPEN without | VLAN guest | | | traffic | | XXX XXX X

| authentication | VLAN Eduroam | | | | | XXXXXX XXX XXXX

| | | +-----------------+ +-----------+

| |                        |

| |                        +-->routing each

+--------------------+ |   VLAN with next_hop => FW eth

|

                                       |

+--> PacketFence internal DHCP server

|    One DHCP per VLAN

|    with gateway => packetfence

|

|

+--> PacketFence Inline Level 2 for each VLAN

with dedicated portal

Fabrice, you write that our AP need to be compliant with web auth and 802.1x, but actually we use open SSID AND portal authentication on our POC (inline PF with two interfaces and NAT), it should works such or POC with multiple portal (one per VLAN) no ? We will not doing Vlan assignment.

Second (and easier) option, using NAT for each VLAN /SSID , not routing ?

Regards

Pierrick Prost

CNRS Rhones Alpes

France

*De :*Fabrice Durand [mailto:[email protected]]
*Envoyé :* jeudi 26 mai 2016 15:52
*À :* [email protected]
*Objet :* Re: [PacketFence-users] PKfence help for validate architecture (VLAN trunk, no Vlan assignement, No NAT)

Hello Pierrick,

yes it should be possible, in fact it will be inline network per vlan and you will have to play with ip route2 on the packetfence server.

Something like that:

vim /etc/iproute2/rt_tables

```
#
# reserved values
#
255     local
254     main
253     default
0       unspec
#
# local
#
#1      inr.ruhep
1       ISP2
```


ip route add 0.0.0.0/0 via 143.26.62.12 table ISP2
ou
ip route add 0.0.0.0/0 dev eth1 table 100


ip rule add iif eth0 lookup ISP2



Also it look like the AP is able to do web auth and 802.1x.

Regards
Fabrice

Le 2016-05-26 06:21, PROST pierrick a écrit :

    Hi everyone,

    We finished our test of packet fence .. this NAC is juste awesome
    good job ! (I came from aruba Clearpass …)

    We need your help to validate a POC. Is it possible to implement
    the following architecture on packet fence ? We have a lot of
    Linksys LAPAC 1750 who support VLAN TRUNK and SSID/ VLAN
    assignation …and there are not compatible with openwrt.

                                                       10 Gbt/s backbone

          WIFI AP <------------------------>

    +--------------------+ +------------------------+
                    +-------------------+

    | |                          | |                          |
    |                      XXXXXXX XXXX

    | |                          |      Packet Fence
    |                          | |             XXXXXXXXXX     XXX  XX

    | |      Trunk  eth1         | |                          |
    |             X                   XX

    |   multiple SSID    | |                        |
    |                   |      XXXXXXXX                  XX

    |   one per VLAN +--------------------------+ |        TRUNK
    eth0        |                   | XX                       XXXXXXX

| | | | | FW | X internet X

    | |      VLAN mngt           | +--------------------------+
    +------+X                            X

| | VLAN employee | | | | X XX

| | VLAN guest | | VLAN mngt | | X XXXXX

    | |      VLAN Eduroam        |                        |      VLAN
    employee     |                   | XXXXXX       X          X

    | |                          | |        VLAN guest        |
    |            XXX     XXX        X

    | |                          | |        VLAN Eduroam      |
    |               XXXXXX  XXX XXXX

| | | | | |

    +--------------------+ +------------------------+
    +-------------------+

    Regards

    Pierrick Prost

    CNRS Rhones Alpes

    France




    
------------------------------------------------------------------------------

    Mobile security can be enabling, not merely restricting. Employees who

    bring their own devices (BYOD) to work are irked by the imposition of MDM

    restrictions. Mobile Device Manager Plus allows you to control only the

    apps on BYO-devices by containerizing them, leaving personal data untouched!

    https://ad.doubleclick.net/ddm/clk/304595813;131938128;j




    _______________________________________________

    PacketFence-users mailing list

    [email protected]
    <mailto:[email protected]>

    https://lists.sourceforge.net/lists/listinfo/packetfence-users



--
Fabrice Durand
[email protected] <mailto:[email protected]>  ::  +1.514.447.4918 (x135) 
::www.inverse.ca <http://www.inverse.ca>
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org)


------------------------------------------------------------------------------
Mobile security can be enabling, not merely restricting. Employees who
bring their own devices (BYOD) to work are irked by the imposition of MDM
restrictions. Mobile Device Manager Plus allows you to control only the
apps on BYO-devices by containerizing them, leaving personal data untouched!
https://ad.doubleclick.net/ddm/clk/304595813;131938128;j


_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

--
Antoine Amacher
[email protected]  ::  +1.514.447.4918 *130  ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence 
(www.packetfence.org)

------------------------------------------------------------------------------
Mobile security can be enabling, not merely restricting. Employees who
bring their own devices (BYOD) to work are irked by the imposition of MDM
restrictions. Mobile Device Manager Plus allows you to control only the
apps on BYO-devices by containerizing them, leaving personal data untouched!
https://ad.doubleclick.net/ddm/clk/304595813;131938128;j
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to