Hi Antoine,
Thanks for your prompt response.
VLAN 260 is my Registration VLAN, and the VLAN 162 is my production VLAN (DHCP
provided by my DC).
Removing "role mapping by switch role" from the Switch configuration on PF made
the trick, the PC is assigned an IP from the registration VLAN DHCP and opens
the browser for authentication.
Once my AD credentials are entered, the PF shows this on the browser:
Enabling network access.
Then shows: Unable to detect network connectivity. Try restarting your browser
or opening a new tab to see if your access has been successfully granted
Here is the packetfence.log for this matter:
Jun 17 11:21:25 httpd.portal(3147) INFO: [mac:unknown] Instantiate profile
default (pf::Portal::ProfileFactory::_from_profile)Jun 17 11:21:25
httpd.portal(3147) INFO: [mac:28:d2:44:08:2c:68] Instantiate profile default
(pf::Portal::ProfileFactory::_from_profile)Jun 17 11:21:25 httpd.portal(3147)
INFO: [mac:28:d2:44:08:2c:68] Instantiate profile default
(pf::Portal::ProfileFactory::_from_profile)Jun 17 11:21:25 httpd.portal(3147)
INFO: [mac:28:d2:44:08:2c:68] Releasing device
(captiveportal::PacketFence::DynamicRouting::Module::Root::release)Jun 17
11:21:25 httpd.portal(3147) INFO: [mac:28:d2:44:08:2c:68] Instantiate a new
iptables modification method. pf::ipset (pf::inline::get_technique)Jun 17
11:21:25 httpd.portal(3147) INFO: [mac:28:d2:44:08:2c:68] Instantiate profile
default (pf::Portal::ProfileFactory::_from_profile)Jun 17 11:21:25
httpd.portal(3147) INFO: [mac:28:d2:44:08:2c:68] re-evaluating access
(manage_register called) (pf::enforcement::reevaluate_access)Jun 17 11:21:25
httpd.portal(3147) INFO: [mac:28:d2:44:08:2c:68] is currentlog connected at
(192.168.1.14) ifIndex 12 registration
(pf::enforcement::_should_we_reassign_vlan)Jun 17 11:21:25 httpd.portal(3147)
INFO: [mac:28:d2:44:08:2c:68] Instantiate profile default
(pf::Portal::ProfileFactory::_from_profile)Jun 17 11:21:25 httpd.portal(3147)
INFO: [mac:28:d2:44:08:2c:68] Connection type is WIRED_MAC_AUTH. Getting role
from node_info (pf::role::getRegisteredRole)Jun 17 11:21:25 httpd.portal(3147)
INFO: [mac:28:d2:44:08:2c:68] Username was defined "28d244082c68" - returning
role 'NL_Employees' (pf::role::getRegisteredRole)Jun 17 11:21:25
httpd.portal(3147) INFO: [mac:28:d2:44:08:2c:68] PID: "testuser1", Status: reg
Returned VLAN: (undefined), Role: NL_Employees (pf::role::fetchRoleForNode)Jun
17 11:21:25 httpd.portal(3147) INFO: [mac:28:d2:44:08:2c:68] VLAN reassignment
required (current VLAN = 260 but should be in VLAN 162)
(pf::enforcement::_should_we_reassign_vlan)Jun 17 11:21:25 httpd.portal(3147)
INFO: [mac:28:d2:44:08:2c:68] switch port is (192.168.1.14) ifIndex 12
connection type: Wired MAC Auth (pf::enforcement::_vlan_reevaluation)Jun 17
11:21:27 httpd.portal(3268) INFO: [mac:28:d2:44:08:2c:68] Instantiate a new
iptables modification method. pf::ipset (pf::inline::get_technique)Jun 17
11:21:28 httpd.portal(3142) INFO: [mac:28:d2:44:08:2c:68] Instantiate a new
iptables modification method. pf::ipset (pf::inline::get_technique)Jun 17
11:21:29 httpd.portal(3268) INFO: [mac:28:d2:44:08:2c:68] Instantiate a new
iptables modification method. pf::ipset (pf::inline::get_technique)Jun 17
11:21:29 httpd.portal(3326) INFO: [mac:28:d2:44:08:2c:68] Dealing with a
endpoint / browser with captive-portal detection capabilities while having a
self-signed SSL certificate. Using HTTP instead of HTTPS
(pf::web::dispatcher::handler)Jun 17 11:21:29 httpd.portal(3326) INFO:
[mac:28:d2:44:08:2c:68] Instantiate a new iptables modification method.
pf::ipset (pf::inline::get_technique)Jun 17 11:21:30 httpd.portal(3268) INFO:
[mac:28:d2:44:08:2c:68] Dealing with a endpoint / browser with captive-portal
detection capabilities while having a self-signed SSL certificate. Using HTTP
instead of HTTPS (pf::web::dispatcher::handler)Jun 17 11:21:30
httpd.portal(3268) INFO: [mac:28:d2:44:08:2c:68] Instantiate a new iptables
modification method. pf::ipset (pf::inline::get_technique)Jun 17 11:21:38
httpd.portal(3326) INFO: [mac:28:d2:44:08:2c:68] Instantiate a new iptables
modification method. pf::ipset (pf::inline::get_technique)Jun 17 11:21:48
httpd.portal(3147) INFO: [mac:28:d2:44:08:2c:68] Instantiate a new iptables
modification method. pf::ipset (pf::inline::get_technique)Jun 17 11:21:58
httpd.portal(3140) INFO: [mac:28:d2:44:08:2c:68] Instantiate a new iptables
modification method. pf::ipset (pf::inline::get_technique)Jun 17 11:21:59
httpd.portal(3144) INFO: [mac:28:d2:44:08:2c:68] Dealing with a endpoint /
browser with captive-portal detection capabilities while having a self-signed
SSL certificate. Using HTTP instead of HTTPS (pf::web::dispatcher::handler)Jun
17 11:21:59 httpd.portal(3144) INFO: [mac:28:d2:44:08:2c:68] Instantiate a new
iptables modification method. pf::ipset (pf::inline::get_technique)Jun 17
11:22:00 httpd.portal(3142) INFO: [mac:28:d2:44:08:2c:68] Dealing with a
endpoint / browser with captive-portal detection capabilities while having a
self-signed SSL certificate. Using HTTP instead of HTTPS
(pf::web::dispatcher::handler)Jun 17 11:22:00 httpd.portal(3142) INFO:
[mac:28:d2:44:08:2c:68] Instantiate a new iptables modification method.
pf::ipset (pf::inline::get_technique).
If the Ethernet cable from the PC is unplugged and then plug back in or if its
NIC is desabled/Enabled in Windows, then the PC is granted access to my
produection VLAN (162).
Is this the expected behavior? if not, could you please help me out with this?
Thank you!
To: [email protected]
From: [email protected]
Date: Fri, 17 Jun 2016 10:20:23 -0400
Subject: Re: [PacketFence-users] Cisco Catalyst 3550 - Registration VLAN
Hello Vianney,
First check out your switch configuration(tab roles) at the moment
you have switch by role and switch by VLAN selected, you should
remove "role mapping by switch role".
PacketFence seems to answer to the switch RADIUS request properly.
Is VLAN 260 your production VLAN, if yes it spanned to this port?
Remember that PacketFence IS NOT a DHCP server on your production
VLAN, we assume that you have your own server for that.
Thank you
On 06/17/2016 09:38 AM, Vianney Amador
wrote:
Hi guys,
I am pretty much new to this world of Packagefence, I am
testing this using a Cisco Catalyst 3550 with the latest IOS
available.
I created my registration, isolation and normal VLANs on
both the PF server interface and Switch.
I added this switch on PF using the parameters specified
on the official documentation, also set up the switch using
the 3550 (802.1x with MAB)
configuration.
Created a source for
Active Directory authentication.
I setup one of the ports on the switch with the
parameters for the registration VLAN, the PC (Windows 10)
automatically acquired an IP address from this subnet, so
when I opened the browser forced me to authenticate, so I
put it my AD credentials and got authenticated.
When I connect the same PC on a port setup as specified
on the official documentation, the PC WILL NOT get an IP
address:
switchport mode access
dot1x mac-auth-bypass
dot1x pae authenticator
dot1x port-control auto
dot1x violation-mode protect
dot1x timeout quiet-period 2
dot1x timeout reauth-period 7200
dot1x timeout tx-period 3
dot1x reauthentication
Here is the log from the packetfense.log:
Jun 17 09:50:05 httpd.aaa(2249) INFO:
[mac:28:d2:44:08:2c:68] handling radius autz request: from
switch_ip => (192.168.1.14), connection_type =>
WIRED_MAC_AUTH,switch_mac => (00:11:92:b1:81:86), mac
=> [28:d2:44:08:2c:68], port => 6, username =>
"28d244082c68" (pf::radius::authorize)
Jun 17 09:50:05 httpd.aaa(2249) INFO:
[mac:28:d2:44:08:2c:68] is of status unreg; belongs into
registration VLAN (pf::role::getRegistrationRole)
Jun 17 09:50:05 httpd.aaa(2249) INFO:
[mac:28:d2:44:08:2c:68] (192.168.1.14) Added VLAN 260 to
the returned RADIUS Access-Accept
(pf::Switch::returnRadiusAccessAccept)
Jun 17 09:50:05 httpd.aaa(2249) INFO:
[mac:28:d2:44:08:2c:68] (192.168.1.14) Added role
registration to the returned RADIUS Access-Accept
(pf::Switch::returnRadiusAccessAccept)
Jun 17 09:50:20 httpd.aaa(2249) INFO:
[mac:28:d2:44:08:2c:68] handling radius autz request: from
switch_ip => (192.168.1.14), connection_type =>
WIRED_MAC_AUTH,switch_mac => (00:11:92:b1:81:86), mac
=> [28:d2:44:08:2c:68], port => 6, username =>
"28d244082c68" (pf::radius::authorize)
Jun 17 09:50:20 httpd.aaa(2249) INFO:
[mac:28:d2:44:08:2c:68] is of status unreg; belongs into
registration VLAN (pf::role::getRegistrationRole)
Jun 17 09:50:20 httpd.aaa(2249) INFO:
[mac:28:d2:44:08:2c:68] (192.168.1.14) Added VLAN 260 to
the returned RADIUS Access-Accept
(pf::Switch::returnRadiusAccessAccept)
Jun 17 09:50:20 httpd.aaa(2249) INFO:
[mac:28:d2:44:08:2c:68] (192.168.1.14) Added role
registration to the returned RADIUS Access-Accept
(pf::Switch::returnRadiusAccessAccept)
Jun 17 09:50:29 httpd.aaa(2249) INFO:
[mac:28:d2:44:08:2c:68] handling radius autz request: from
switch_ip => (192.168.1.14), connection_type =>
WIRED_MAC_AUTH,switch_mac => (00:11:92:b1:81:86), mac
=> [28:d2:44:08:2c:68], port => 6, username =>
"28d244082c68" (pf::radius::authorize)
Jun 17 09:50:29 httpd.aaa(2249) INFO:
[mac:28:d2:44:08:2c:68] is of status unreg; belongs into
registration VLAN (pf::role::getRegistrationRole)
Jun 17 09:50:29 httpd.aaa(2249) INFO:
[mac:28:d2:44:08:2c:68] (192.168.1.14) Added VLAN 260 to
the returned RADIUS Access-Accept
(pf::Switch::returnRadiusAccessAccept)
Jun 17 09:50:29 httpd.aaa(2249) INFO:
[mac:28:d2:44:08:2c:68] (192.168.1.14) Added role
registration to the returned RADIUS Access-Accept
(pf::Switch::returnRadiusAccessAccept)
Any thoughts?
Please advise,
Vianney
------------------------------------------------------------------------------
What NetFlow Analyzer can do for you? Monitors network bandwidth and traffic
patterns at an interface-level. Reveals which users, apps, and protocols are
consuming the most bandwidth. Provides multi-vendor support for NetFlow,
J-Flow, sFlow and other flows. Make informed decisions using capacity planning
reports. http://sdm.link/zohomanageengine
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
--
Antoine Amacher
[email protected] :: +1.514.447.4918 *130 :: www.inverse.ca
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
(www.packetfence.org)
------------------------------------------------------------------------------
What NetFlow Analyzer can do for you? Monitors network bandwidth and traffic
patterns at an interface-level. Reveals which users, apps, and protocols are
consuming the most bandwidth. Provides multi-vendor support for NetFlow,
J-Flow, sFlow and other flows. Make informed decisions using capacity planning
reports. http://sdm.link/zohomanageengine
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
------------------------------------------------------------------------------
What NetFlow Analyzer can do for you? Monitors network bandwidth and traffic
patterns at an interface-level. Reveals which users, apps, and protocols are
consuming the most bandwidth. Provides multi-vendor support for NetFlow,
J-Flow, sFlow and other flows. Make informed decisions using capacity planning
reports. http://sdm.link/zohomanageengine
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users