Jaap, For the benefit of anyone else trying use 15.05/15.05.1 with PF, I will post this back to the list, as I think the previous example you reference may be missing some bits as it was a lab scenario / PoC.
https://sourceforge.net/p/packetfence/mailman/message/34895965/ http://permalink.gmane.org/gmane.comp.networking.packetfence.user/12571 To my knowledge this works with any supported OpenWRT box. If we were just starting today, we would probably recommend a Marvell Viper (Linksys EA4500) platform due to the low cost, dual-core 1.2G cpu, gigabit, with great 802.11n 3x3 power amps. (just no 802.11ac). https://www.amazon.com/Linksys-App-Enabled-Dual-Band-Wireless-N-Refurbished/dp/B00HU7C7Q6 We use Planet PoE POE-161 gigabit injectors to allow for single wire connections, which work with these too. The idea here is that the low cost of hardware allows you to invest in some support hours from the PF team to get the rest working. We have hostpad-common and wpad on our boxes, you can see below they are part of the repository. In this case we are using a newer 15.05.1 trunk build that works around the newer C7s flash chip but the 15.05 configuration/hostapd is identical. We replaced the /lib/netifd/hostapd.sh with the attached file, the rest is just configuration. You can see registration of your device via Radius in the logs; Executing "wifi" and looking at "logread" can help. I have included those outputs (with minor obfuscation) and the relevant network and wireless configuration we are using. You can see where I just logged in and executed the "wifi" command at Fri Jun 10 13:34:26 which may be helpful in diagnosing radius configuration issues on your PF management server. Some of the regular client interactions can be seen prior to that. Be sure to change your IPv6 ula_prefix if you copy/paste and modify network configurations, this was one thing that broke our group of APs initially. In our configuration, we want the full benefit of DAE extensions, which with OpenWRT can only be applied to either 5G or 2.4G band (but not both simultaneously). In the AP below we are using the 2.4G band. So we are not using radio0; it is disabled, even though it is configured. Our VLANs are 84-87 (Registration, Isolation, Normal, Management) all riding on the WAN trunk. You can add IPs to the 'config interface' sections for any of the VLANs to test connectivity to/from your PF server and/or Normal network gateway to make sure your devices are talking on all the VLANs to all the important interfaces. That should help with the OpenWRT bits. We added firewall rules to allow access to the management interface, and left the local LAN ports configured to allow local access if we ever needed it. The rest is all on the PF side and getting your network setup. Now that you have saved a bundle on the AP hardware and OpenWRT platform, you can probably justify some PS hours from the packetfence team to get the rest going. cheers, Ian BusyBox v1.23.2 (2016-04-15 10:17:28 EDT) built-in shell (ash) _______ ________ __ | |.-----.-----.-----.| | | |.----.| |_ | - || _ | -__| || | | || _|| _| |_______|| __|_____|__|__||________||__| |____| |__| W I R E L E S S F R E E D O M ----------------------------------------------------- CHAOS CALMER (Chaos Calmer, r49261) ----------------------------------------------------- * 1 1/2 oz Gin Shake with a glassful * 1/4 oz Triple Sec of broken ice and pour * 3/4 oz Lime Juice unstrained into a goblet. * 1 1/2 oz Orange Juice * 1 tsp. Grenadine Syrup ----------------------------------------------------- root@Lobby:~# opkg list-installed | grep wpad wpad - 2015-03-25-1 root@Lobby:~# opkg list-installed | grep hostap hostapd-common - 2015-03-25-1 root@Lobby:~# root@Lobby:~# cat /etc/config/hostapd.vlan * wlan0.# root@Lobby:~# wifi root@Lobby:~# logread Fri Jun 10 13:15:52 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:16:02 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:16:05 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:17:20 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan86 which has no address Fri Jun 10 13:18:23 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan86 which has no address Fri Jun 10 13:19:30 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:22:14 2016 daemon.info hostapd: wlan1: STA 78:f8:82:b9:1c:cf RADIUS: stopped accounting session 572A6782-000017D1 Fri Jun 10 13:22:14 2016 daemon.info hostapd: wlan1: STA 78:f8:82:b9:1c:cf IEEE 802.11: disassociated due to inactivity Fri Jun 10 13:22:15 2016 daemon.info hostapd: wlan1: STA 78:f8:82:b9:1c:cf IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Fri Jun 10 13:23:31 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06 RADIUS: VLAN ID 84 Fri Jun 10 13:23:31 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06 IEEE 802.11: authenticated Fri Jun 10 13:23:31 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06 IEEE 802.11: associated (aid 1) Fri Jun 10 13:23:31 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06 RADIUS: starting accounting session 572A6782-000017D2 Fri Jun 10 13:23:33 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:23:35 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:24:04 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06 IEEE 802.11: disassociated Fri Jun 10 13:24:04 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06 RADIUS: stopped accounting session 572A6782-000017D2 Fri Jun 10 13:24:05 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Fri Jun 10 13:24:37 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:24:41 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:24:50 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:24:50 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:24:51 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:24:54 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:25:58 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:26:47 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:26:47 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:26:47 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:26:48 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:26:57 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:26:57 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:27:00 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:27:01 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:27:01 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:27:59 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:27:59 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:28:23 2016 daemon.info hostapd: wlan1: STA c0:ee:fb:32:17:ef RADIUS: VLAN ID 84 Fri Jun 10 13:28:23 2016 daemon.info hostapd: wlan1: STA c0:ee:fb:32:17:ef IEEE 802.11: authenticated Fri Jun 10 13:28:23 2016 daemon.info hostapd: wlan1: STA c0:ee:fb:32:17:ef IEEE 802.11: associated (aid 1) Fri Jun 10 13:28:23 2016 daemon.info hostapd: wlan1: STA c0:ee:fb:32:17:ef RADIUS: starting accounting session 572A6782-000017D3 Fri Jun 10 13:28:23 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:28:25 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:28:30 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:29:38 2016 daemon.info hostapd: wlan1: STA 60:f1:89:9a:59:e5 RADIUS: VLAN ID 84 Fri Jun 10 13:29:38 2016 daemon.info hostapd: wlan1: STA 60:f1:89:9a:59:e5 IEEE 802.11: authenticated Fri Jun 10 13:29:38 2016 daemon.info hostapd: wlan1: STA 60:f1:89:9a:59:e5 IEEE 802.11: associated (aid 2) Fri Jun 10 13:29:38 2016 daemon.info hostapd: wlan1: STA 60:f1:89:9a:59:e5 RADIUS: starting accounting session 572A6782-000017D4 Fri Jun 10 13:29:38 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:29:39 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:29:53 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:30:39 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06 RADIUS: VLAN ID 84 Fri Jun 10 13:30:39 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06 IEEE 802.11: authenticated Fri Jun 10 13:30:39 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06 IEEE 802.11: associated (aid 3) Fri Jun 10 13:30:39 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06 RADIUS: starting accounting session 572A6782-000017D5 Fri Jun 10 13:30:40 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:30:40 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:30:42 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:30:43 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:31:09 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:31:13 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:31:13 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:31:17 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:31:17 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:31:24 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:31:24 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:31:27 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:31:43 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06 IEEE 802.11: disassociated Fri Jun 10 13:31:43 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06 RADIUS: stopped accounting session 572A6782-000017D5 Fri Jun 10 13:31:44 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Fri Jun 10 13:32:21 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:32:21 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:32:30 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:32:30 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:32:34 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:32:54 2016 daemon.info hostapd: wlan1: STA 90:67:1c:81:d6:02 RADIUS: VLAN ID 84 Fri Jun 10 13:32:54 2016 daemon.info hostapd: wlan1: STA 90:67:1c:81:d6:02 IEEE 802.11: authenticated Fri Jun 10 13:32:54 2016 daemon.info hostapd: wlan1: STA 90:67:1c:81:d6:02 IEEE 802.11: associated (aid 3) Fri Jun 10 13:32:54 2016 daemon.info hostapd: wlan1: STA 90:67:1c:81:d6:02 RADIUS: starting accounting session 572A6782-000017D6 Fri Jun 10 13:32:55 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:32:55 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:32:55 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:32:56 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:33:07 2016 daemon.info hostapd: wlan1: STA 6c:40:08:56:65:b2 RADIUS: VLAN ID 84 Fri Jun 10 13:33:07 2016 daemon.info hostapd: wlan1: STA 6c:40:08:56:65:b2 IEEE 802.11: authenticated Fri Jun 10 13:33:07 2016 daemon.info hostapd: wlan1: STA 6c:40:08:56:65:b2 IEEE 802.11: associated (aid 4) Fri Jun 10 13:33:07 2016 daemon.info hostapd: wlan1: STA 6c:40:08:56:65:b2 RADIUS: starting accounting session 572A6782-000017D7 Fri Jun 10 13:33:07 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b RADIUS: VLAN ID 84 Fri Jun 10 13:33:07 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b IEEE 802.11: authenticated Fri Jun 10 13:33:07 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b IEEE 802.11: associated (aid 5) Fri Jun 10 13:33:07 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b RADIUS: starting accounting session 572A6782-000017D8 Fri Jun 10 13:33:07 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:33:08 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:33:08 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:33:09 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:33:09 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:33:18 2016 daemon.info hostapd: wlan1: STA 6c:40:08:56:65:b2 IEEE 802.11: disassociated Fri Jun 10 13:33:18 2016 daemon.info hostapd: wlan1: STA 6c:40:08:56:65:b2 RADIUS: stopped accounting session 572A6782-000017D7 Fri Jun 10 13:33:19 2016 daemon.info hostapd: wlan1: STA 6c:40:08:56:65:b2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Fri Jun 10 13:33:46 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:33:46 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:34:24 2016 authpriv.info dropbear[6966]: Child connection from 10.3.1.15:40306 Fri Jun 10 13:34:26 2016 authpriv.info dropbear[6966]: Exit before auth: Exited normally Fri Jun 10 13:34:26 2016 authpriv.info dropbear[6967]: Child connection from 10.3.1.15:40308 Fri Jun 10 13:34:28 2016 authpriv.notice dropbear[6967]: Pubkey auth succeeded for 'root' with key md5 5f:7d:b7:cc:89:bd:67:16:6f:bf:14:04:3b:30:ca:c8 from 10.3.1.15:40308 Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b IEEE 802.11: disassociated Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b RADIUS: stopped accounting session 572A6782-000017D8 Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b IEEE 802.11: disassociated Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b IEEE 802.11: disassociated Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b IEEE 802.11: disassociated Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b IEEE 802.11: disassociated Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b IEEE 802.11: disassociated Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b IEEE 802.11: disassociated Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b IEEE 802.11: disassociated Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b IEEE 802.11: disassociated Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b IEEE 802.11: disassociated Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b IEEE 802.11: disassociated Fri Jun 10 13:34:39 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Fri Jun 10 13:34:40 2016 daemon.info hostapd: wlan1: STA c0:ee:fb:32:17:ef RADIUS: stopped accounting session 572A6782-000017D3 Fri Jun 10 13:34:40 2016 daemon.info hostapd: wlan1: STA c0:ee:fb:32:17:ef IEEE 802.11: disassociated due to inactivity Fri Jun 10 13:34:41 2016 daemon.info hostapd: wlan1: STA c0:ee:fb:32:17:ef IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Fri Jun 10 13:34:43 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b RADIUS: VLAN ID 84 Fri Jun 10 13:34:43 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b IEEE 802.11: authenticated Fri Jun 10 13:34:43 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b IEEE 802.11: associated (aid 1) Fri Jun 10 13:34:43 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b RADIUS: starting accounting session 572A6782-000017D9 Fri Jun 10 13:34:43 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:34:55 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:34:55 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:35:10 2016 daemon.info hostapd: wlan1: STA 60:f1:89:9a:59:e5 RADIUS: stopped accounting session 572A6782-000017D4 Fri Jun 10 13:35:10 2016 daemon.info hostapd: wlan1: STA 60:f1:89:9a:59:e5 IEEE 802.11: disassociated due to inactivity Fri Jun 10 13:35:11 2016 daemon.info hostapd: wlan1: STA 60:f1:89:9a:59:e5 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Fri Jun 10 13:35:40 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:37:04 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:37:04 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:37:31 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:38:22 2016 daemon.info hostapd: wlan1: STA 90:67:1c:81:d6:02 RADIUS: stopped accounting session 572A6782-000017D6 Fri Jun 10 13:38:22 2016 daemon.info hostapd: wlan1: STA 90:67:1c:81:d6:02 IEEE 802.11: disassociated due to inactivity Fri Jun 10 13:38:23 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:38:23 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:38:23 2016 daemon.info hostapd: wlan1: STA 90:67:1c:81:d6:02 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE) Fri Jun 10 13:39:47 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b RADIUS: stopped accounting session 572A6782-000017D9 Fri Jun 10 13:39:47 2016 kern.info kernel: [3165424.750000] br-vlan84: port 2(wlan0.84) entered disabled state Fri Jun 10 13:39:47 2016 kern.info kernel: [3165424.750000] device wlan0.84 left promiscuous mode Fri Jun 10 13:39:47 2016 kern.info kernel: [3165424.760000] br-vlan84: port 2(wlan0.84) entered disabled state Fri Jun 10 13:39:47 2016 kern.info kernel: [3165424.790000] br-vlan86: port 2(wlan0.86) entered disabled state Fri Jun 10 13:39:47 2016 kern.info kernel: [3165424.790000] device wlan0.86 left promiscuous mode Fri Jun 10 13:39:47 2016 kern.info kernel: [3165424.800000] br-vlan86: port 2(wlan0.86) entered disabled state Fri Jun 10 13:39:48 2016 daemon.notice netifd: radio0 (7008): command failed: Operation not supported (-122) Fri Jun 10 13:39:48 2016 daemon.notice netifd: radio1 (7053): Configuration file: /var/run/hostapd-phy1.conf Fri Jun 10 13:39:48 2016 kern.info kernel: [3165425.480000] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready Fri Jun 10 13:39:48 2016 daemon.notice netifd: radio1 (7053): wlan1: interface state UNINITIALIZED->COUNTRY_UPDATE Fri Jun 10 13:39:48 2016 daemon.notice netifd: radio1 (7053): wlan1: interface state COUNTRY_UPDATE->HT_SCAN Fri Jun 10 13:39:49 2016 daemon.notice netifd: radio1 (7053): 20/40 MHz operation not permitted on channel pri=11 sec=7 based on overlapping BSSes Fri Jun 10 13:39:49 2016 daemon.info hostapd: wlan1: RADIUS Authentication server 10.3.1.2:1812 Fri Jun 10 13:39:49 2016 daemon.info hostapd: wlan1: RADIUS Accounting server 10.3.1.2:1813 Fri Jun 10 13:39:49 2016 daemon.notice netifd: radio1 (7053): Using interface wlan1 with hwaddr ec:08:6b:47:59:51 and ssid "Public_WiFi" Fri Jun 10 13:39:49 2016 daemon.notice netifd: radio1 (7053): wlan1: RADIUS Authentication server 10.3.1.2:1812 Fri Jun 10 13:39:49 2016 daemon.notice netifd: radio1 (7053): wlan1: RADIUS Accounting server 10.3.1.2:1813 Fri Jun 10 13:39:49 2016 daemon.notice netifd: radio1 (7053): wlan1: interface state HT_SCAN->ENABLED Fri Jun 10 13:39:49 2016 daemon.notice netifd: radio1 (7053): wlan1: AP-ENABLED Fri Jun 10 13:39:49 2016 kern.info kernel: [3165426.420000] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready Fri Jun 10 13:39:50 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address Fri Jun 10 13:39:50 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet received on br-vlan84 which has no address root@Lobby:~# cat /etc/config/wireless config wifi-device 'radio0' option type 'mac80211' option channel '36' option hwmode '11a' option path 'pci0000:01/0000:01:00.0' option htmode 'VHT80' option txpower '17' option country 'CA' config wifi-iface option device 'radio0' option mode 'ap' option vlan_file '/etc/config/hostapd.vlan' option vlan_tagged_interface 'eth0' option vlan_bridge 'br-vlan' option vlan_naming '0' option dynamic_vlan '2' option auth_port '1812' option auth_server '10.3.1.2' option auth_secret 'y0urs3cret' option acct_port '1813' option acct_server '10.3.1.2' option acct_secret 'y0urs3cret' option dae_port '3799' option dae_client '10.3.1.2' option dae_secret 'y0urs3cret' option nasid 'Lobby' option encryption 'none' option ssid 'Public_WiFi' option disabled '1' config wifi-device 'radio1' option type 'mac80211' option channel '11' option hwmode '11g' option path 'platform/qca955x_wmac' option txpower '24' option country 'CA' option htmode 'HT40' config wifi-iface option device 'radio1' option mode 'ap' option encryption 'none' option vlan_file '/etc/config/hostapd.vlan' option vlan_tagged_interface 'eth0' option vlan_bridge 'br-vlan' option vlan_naming '0' option dynamic_vlan '2' option auth_port '1812' option auth_server '10.3.1.2' option auth_secret 'y0urs3cret' option acct_port '1813' option acct_server '10.3.1.2' option acct_secret 'y0urs3cret' option dae_port '3799' option dae_client '10.3.1.2' option dae_secret 'y0urs3cret' option nasid 'Lobby' option ssid 'Public_WiFi' root@Lobby:~# cat /etc/config/network config interface 'loopback' option ifname 'lo' option proto 'static' option ipaddr '127.0.0.1' option netmask '255.0.0.0' config globals 'globals' option ula_prefix 'fd3f:3aa8:9907::/48' config interface 'lan' option ifname 'eth1' option force_link '1' option type 'bridge' option proto 'static' option ipaddr '192.168.1.1' option netmask '255.255.255.0' config interface 'wan' option ifname 'eth0.87' option force_link '1' option proto 'static' option ipaddr '10.3.1.7' option netmask '255.255.255.0' option gateway '10.3.1.1' option dns '8.8.191.81 8.8.191.82' config interface 'vlan84' option type 'bridge' option force_link '1' option ifname 'eth0.84' config interface 'vlan85' option force_link '1' option type 'bridge' option ifname 'eth0.85' config interface 'vlan86' option type 'bridge' option force_link '1' option ifname 'eth0.86' config switch option name 'switch0' option reset '1' option enable_vlan '1' config switch_vlan option device 'switch0' option vlan '1' option ports '0 2 3 4 5' config switch_vlan option device 'switch0' option vlan '84' option ports '1t 6t' config switch_vlan option device 'switch0' option vlan '85' option ports '1t 6t' config switch_vlan option device 'switch0' option vlan '86' option ports '1t 6t' config switch_vlan option device 'switch0' option vlan '87' option ports '1t 6t' root@Lobby:~# On Fri, Jun 10, 2016 at 4:31 AM, Jaap Gordijn <[email protected]> wrote: > Another thing: > > The packetfence indicatie that you have to install wpad. > > However, wpad seems not to be in the repo of openwrt CC anymore. > > Did you use wpad? > > > > -- Jaap > > > > *Van:* Ian MacDonald > *Verzonden:* vrijdag 10 juni 2016 04:10 > *Aan:* jg log <[email protected]> > *Onderwerp:* Re: [PacketFence-users] [RESOLVED] PacketFence 5.7.0 w/ > Hostapd on OpenWRT 15.05 Chaos Calmer > > > > Sure, > > > > I assume you mean the hostapd part; See attached. > > > > Let me know if you need any of the other bits. > > > > cheers, > Ian > > > > On Thu, Jun 9, 2016 at 7:35 PM, jg log <[email protected]> wrote: > > Hi, > > I read your post regarding PF and hostapd. > Is it possible that I can have your working config. > I have difficulties get things working? > > Thanks in advance. > > Best, > > Jaap Gordijn > > > > > > -- > > Ian MacDonald > <416-907-1065%20x302> >
hostapd-15.05_pf_imac.sh
Description: Bourne shell script
------------------------------------------------------------------------------ What NetFlow Analyzer can do for you? Monitors network bandwidth and traffic patterns at an interface-level. Reveals which users, apps, and protocols are consuming the most bandwidth. Provides multi-vendor support for NetFlow, J-Flow, sFlow and other flows. Make informed decisions using capacity planning reports. https://ad.doubleclick.net/ddm/clk/305295220;132659582;e
_______________________________________________ PacketFence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
