Hi Antoine,
Ok thanks. We will not use « out of band » there will too much overload of work
for us. Thanks for your help, I’ll try this architecture today.
Have a good day.
Pierrick
De : Antoine Amacher [mailto:[email protected]]
Envoyé : jeudi 26 mai 2016 17:44
À : [email protected]
Objet : Re: [PacketFence-users] PKfence help for validate architecture (VLAN
trunk, no Vlan assignement, No NAT)
Pierrick,
I had in mind that you wanted to use out-of-band not Inline.
So you should not take it into account my comment about the second trunk.
Thank you
On 05/26/2016 10:51 AM, PROST pierrick wrote:
Fabrice and Antoine thanks for your help, we appreciate.
If I resume your mails, it will be something like that :
Wireless AP Packet Fence
XXXXXXX XXXX
+--------------------+ +-----------------+
+-----------+ XXXXXXXXXX XXX XX
| | | |
| | X XX
| | | | no routed
network | | XXXXXXXX XX
| | | <-----+-----> | (dedicated
subnet)| | XX XXXXXXX
| multiple SSID | | | |
| | X internet X
| one per VLAN +-------Trunk+---------eth1| |
|eth0---------fw-eth| FW +---+X X
| | + | | |
| | X XX
| | VLAN mngt | | | |
| | X XXXXX
| each SSID is | VLAN employee | | <-----+------> | routed
VLAN | | XXXXXX X X
| OPEN without | VLAN guest | | |
traffic | | XXX XXX X
| authentication | VLAN Eduroam | | |
| | XXXXXX XXX XXXX
| | | +-----------------+
+-----------+
| | |
| | +-->routing each
+--------------------+ | VLAN with next_hop => FW eth
|
|
+--> PacketFence internal DHCP
server
| One DHCP per VLAN
| with gateway => packetfence
|
|
+--> PacketFence Inline Level 2
for each VLAN
with dedicated portal
Fabrice, you write that our AP need to be compliant with web auth and 802.1x,
but actually we use open SSID AND portal authentication on our POC (inline PF
with two interfaces and NAT), it should works such or POC with multiple portal
(one per VLAN) no ? We will not doing Vlan assignment.
Second (and easier) option, using NAT for each VLAN /SSID , not routing ?
Regards
Pierrick Prost
CNRS Rhones Alpes
France
De : Fabrice Durand [mailto:[email protected]]
Envoyé : jeudi 26 mai 2016 15:52
À :
[email protected]<mailto:[email protected]>
Objet : Re: [PacketFence-users] PKfence help for validate architecture (VLAN
trunk, no Vlan assignement, No NAT)
Hello Pierrick,
yes it should be possible, in fact it will be inline network per vlan and you
will have to play with ip route2 on the packetfence server.
Something like that:
vim /etc/iproute2/rt_tables
```
#
# reserved values
#
255 local
254 main
253 default
0 unspec
#
# local
#
#1 inr.ruhep
1 ISP2
```
ip route add 0.0.0.0/0 via 143.26.62.12 table ISP2
ou
ip route add 0.0.0.0/0 dev eth1 table 100
ip rule add iif eth0 lookup ISP2
Also it look like the AP is able to do web auth and 802.1x.
Regards
Fabrice
Le 2016-05-26 06:21, PROST pierrick a écrit :
Hi everyone,
We finished our test of packet fence .. this NAC is juste awesome good job ! (I
came from aruba Clearpass …)
We need your help to validate a POC. Is it possible to implement the following
architecture on packet fence ? We have a lot of Linksys LAPAC 1750 who support
VLAN TRUNK and SSID/ VLAN assignation …and there are not compatible with
openwrt.
10 Gbt/s backbone
WIFI AP
<------------------------>
+--------------------+ +------------------------+
+-------------------+
| | | |
| | XXXXXXX XXXX
| | | Packet Fence |
| | XXXXXXXXXX XXX XX
| | Trunk eth1 | |
| | X XX
| multiple SSID | | |
| | XXXXXXXX XX
| one per VLAN +--------------------------+ |
TRUNK eth0 | | XX XXXXXXX
| | | |
| FW | X internet X
| | VLAN mngt |
+--------------------------+ +------+X
X
| | VLAN employee | |
| | X XX
| | VLAN guest | |
VLAN mngt | | X XXXXX
| | VLAN Eduroam | |
VLAN employee | | XXXXXX X X
| | | |
VLAN guest | | XXX XXX X
| | | |
VLAN Eduroam | | XXXXXX XXX XXXX
| | | |
| |
+--------------------+ +------------------------+
+-------------------+
Regards
Pierrick Prost
CNRS Rhones Alpes
France
------------------------------------------------------------------------------
Mobile security can be enabling, not merely restricting. Employees who
bring their own devices (BYOD) to work are irked by the imposition of MDM
restrictions. Mobile Device Manager Plus allows you to control only the
apps on BYO-devices by containerizing them, leaving personal data untouched!
https://ad.doubleclick.net/ddm/clk/304595813;131938128;j
_______________________________________________
PacketFence-users mailing list
[email protected]<mailto:[email protected]>
https://lists.sourceforge.net/lists/listinfo/packetfence-users
--
Fabrice Durand
[email protected]<mailto:[email protected]> :: +1.514.447.4918 (x135) ::
www.inverse.ca<http://www.inverse.ca>
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence
(http://packetfence.org)
------------------------------------------------------------------------------
Mobile security can be enabling, not merely restricting. Employees who
bring their own devices (BYOD) to work are irked by the imposition of MDM
restrictions. Mobile Device Manager Plus allows you to control only the
apps on BYO-devices by containerizing them, leaving personal data untouched!
https://ad.doubleclick.net/ddm/clk/304595813;131938128;j
_______________________________________________
PacketFence-users mailing list
[email protected]<mailto:[email protected]>
https://lists.sourceforge.net/lists/listinfo/packetfence-users
--
Antoine Amacher
[email protected]<mailto:[email protected]> :: +1.514.447.4918 *130 ::
www.inverse.ca<http://www.inverse.ca>
Inverse inc. :: Leaders behind SOGo (www.sogo.nu<http://www.sogo.nu>) and
PacketFence (www.packetfence.org<http://www.packetfence.org>)
------------------------------------------------------------------------------
What NetFlow Analyzer can do for you? Monitors network bandwidth and traffic
patterns at an interface-level. Reveals which users, apps, and protocols are
consuming the most bandwidth. Provides multi-vendor support for NetFlow,
J-Flow, sFlow and other flows. Make informed decisions using capacity
planning reports. https://ad.doubleclick.net/ddm/clk/305295220;132659582;e
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users