Vianney,
Did you configure your IP helpers?
Try looking at the following section
https://packetfence.org/doc/PacketFence_Administration_Guide.html#_production_dhcp_access
(12.9.1 particularly) that should do the trick for your issue.
Thanks
On 06/17/2016 11:31 AM, Vianney Amador wrote:
Hi Antoine,
Thanks for your prompt response.
VLAN 260 is my Registration VLAN, and the VLAN 162 is my production
VLAN (DHCP provided by my DC).
Removing "role mapping by switch role" from the Switch configuration
on PF made the trick, the PC is assigned an IP from the registration
VLAN DHCP and opens the browser for authentication.
Once my AD credentials are entered, the PF shows this on the browser:
Enabling network access.
Then shows: Unable to detect network connectivity. Try restarting
your browser or opening a new tab to see if your access has been
successfully granted
Here is the packetfence.log for this matter:
Jun 17 11:21:25 httpd.portal(3147) INFO: [mac:unknown] Instantiate
profile default (pf::Portal::ProfileFactory::_from_profile)
Jun 17 11:21:25 httpd.portal(3147) INFO: [mac:28:d2:44:08:2c:68]
Instantiate profile default (pf::Portal::ProfileFactory::_from_profile)
Jun 17 11:21:25 httpd.portal(3147) INFO: [mac:28:d2:44:08:2c:68]
Instantiate profile default (pf::Portal::ProfileFactory::_from_profile)
Jun 17 11:21:25 httpd.portal(3147) INFO: [mac:28:d2:44:08:2c:68]
Releasing device
(captiveportal::PacketFence::DynamicRouting::Module::Root::release)
Jun 17 11:21:25 httpd.portal(3147) INFO: [mac:28:d2:44:08:2c:68]
Instantiate a new iptables modification method. pf::ipset
(pf::inline::get_technique)
Jun 17 11:21:25 httpd.portal(3147) INFO: [mac:28:d2:44:08:2c:68]
Instantiate profile default (pf::Portal::ProfileFactory::_from_profile)
Jun 17 11:21:25 httpd.portal(3147) INFO: [mac:28:d2:44:08:2c:68]
re-evaluating access (manage_register called)
(pf::enforcement::reevaluate_access)
Jun 17 11:21:25 httpd.portal(3147) INFO: [mac:28:d2:44:08:2c:68] is
currentlog connected at (192.168.1.14) ifIndex 12 registration
(pf::enforcement::_should_we_reassign_vlan)
Jun 17 11:21:25 httpd.portal(3147) INFO: [mac:28:d2:44:08:2c:68]
Instantiate profile default (pf::Portal::ProfileFactory::_from_profile)
Jun 17 11:21:25 httpd.portal(3147) INFO: [mac:28:d2:44:08:2c:68]
Connection type is WIRED_MAC_AUTH. Getting role from node_info
(pf::role::getRegisteredRole)
Jun 17 11:21:25 httpd.portal(3147) INFO: [mac:28:d2:44:08:2c:68]
Username was defined "28d244082c68" - returning role 'NL_Employees'
(pf::role::getRegisteredRole)
Jun 17 11:21:25 httpd.portal(3147) INFO: [mac:28:d2:44:08:2c:68] PID:
"testuser1", Status: reg Returned VLAN: (undefined), Role:
NL_Employees (pf::role::fetchRoleForNode)
Jun 17 11:21:25 httpd.portal(3147) INFO: [mac:28:d2:44:08:2c:68] VLAN
reassignment required (current VLAN = 260 but should be in VLAN 162)
(pf::enforcement::_should_we_reassign_vlan)
Jun 17 11:21:25 httpd.portal(3147) INFO: [mac:28:d2:44:08:2c:68]
switch port is (192.168.1.14) ifIndex 12 connection type: Wired MAC
Auth (pf::enforcement::_vlan_reevaluation)
Jun 17 11:21:27 httpd.portal(3268) INFO: [mac:28:d2:44:08:2c:68]
Instantiate a new iptables modification method. pf::ipset
(pf::inline::get_technique)
Jun 17 11:21:28 httpd.portal(3142) INFO: [mac:28:d2:44:08:2c:68]
Instantiate a new iptables modification method. pf::ipset
(pf::inline::get_technique)
Jun 17 11:21:29 httpd.portal(3268) INFO: [mac:28:d2:44:08:2c:68]
Instantiate a new iptables modification method. pf::ipset
(pf::inline::get_technique)
Jun 17 11:21:29 httpd.portal(3326) INFO: [mac:28:d2:44:08:2c:68]
Dealing with a endpoint / browser with captive-portal detection
capabilities while having a self-signed SSL certificate. Using HTTP
instead of HTTPS (pf::web::dispatcher::handler)
Jun 17 11:21:29 httpd.portal(3326) INFO: [mac:28:d2:44:08:2c:68]
Instantiate a new iptables modification method. pf::ipset
(pf::inline::get_technique)
Jun 17 11:21:30 httpd.portal(3268) INFO: [mac:28:d2:44:08:2c:68]
Dealing with a endpoint / browser with captive-portal detection
capabilities while having a self-signed SSL certificate. Using HTTP
instead of HTTPS (pf::web::dispatcher::handler)
Jun 17 11:21:30 httpd.portal(3268) INFO: [mac:28:d2:44:08:2c:68]
Instantiate a new iptables modification method. pf::ipset
(pf::inline::get_technique)
Jun 17 11:21:38 httpd.portal(3326) INFO: [mac:28:d2:44:08:2c:68]
Instantiate a new iptables modification method. pf::ipset
(pf::inline::get_technique)
Jun 17 11:21:48 httpd.portal(3147) INFO: [mac:28:d2:44:08:2c:68]
Instantiate a new iptables modification method. pf::ipset
(pf::inline::get_technique)
Jun 17 11:21:58 httpd.portal(3140) INFO: [mac:28:d2:44:08:2c:68]
Instantiate a new iptables modification method. pf::ipset
(pf::inline::get_technique)
Jun 17 11:21:59 httpd.portal(3144) INFO: [mac:28:d2:44:08:2c:68]
Dealing with a endpoint / browser with captive-portal detection
capabilities while having a self-signed SSL certificate. Using HTTP
instead of HTTPS (pf::web::dispatcher::handler)
Jun 17 11:21:59 httpd.portal(3144) INFO: [mac:28:d2:44:08:2c:68]
Instantiate a new iptables modification method. pf::ipset
(pf::inline::get_technique)
Jun 17 11:22:00 httpd.portal(3142) INFO: [mac:28:d2:44:08:2c:68]
Dealing with a endpoint / browser with captive-portal detection
capabilities while having a self-signed SSL certificate. Using HTTP
instead of HTTPS (pf::web::dispatcher::handler)
Jun 17 11:22:00 httpd.portal(3142) INFO: [mac:28:d2:44:08:2c:68]
Instantiate a new iptables modification method. pf::ipset
(pf::inline::get_technique).
If the Ethernet cable from the PC is unplugged and then plug back in
or if its NIC is desabled/Enabled in Windows, then the PC is granted
access to my produection VLAN (162).
Is this the expected behavior? if not, could you please help me out
with this?
Thank you!
------------------------------------------------------------------------
To: [email protected]
From: [email protected]
Date: Fri, 17 Jun 2016 10:20:23 -0400
Subject: Re: [PacketFence-users] Cisco Catalyst 3550 - Registration VLAN
Hello Vianney,
First check out your switch configuration(tab roles) at the moment you
have switch by role and switch by VLAN selected, you should remove
"role mapping by switch role".
PacketFence seems to answer to the switch RADIUS request properly.
Is VLAN 260 your production VLAN, if yes it spanned to this port?
Remember that PacketFence IS NOT a DHCP server on your production
VLAN, we assume that you have your own server for that.
Thank you
On 06/17/2016 09:38 AM, Vianney Amador wrote:
Hi guys,
I am pretty much new to this world of Packagefence, I am testing
this using a Cisco Catalyst 3550 with the latest IOS available.
I created my registration, isolation and normal VLANs on both the
PF server interface and Switch.
I added this switch on PF using the parameters specified on the
official documentation, also set up the switch using the 3550
(802.1x with MAB) configuration.
Created a source for Active Directory authentication.
I setup one of the ports on the switch with the parameters for the
registration VLAN, the PC (Windows 10) automatically acquired an
IP address from this subnet, so when I opened the browser forced
me to authenticate, so I put it my AD credentials and got
authenticated.
When I connect the same PC on a port setup as specified on the
official documentation, the PC WILL NOT get an IP address:
switchport mode access
dot1x mac-auth-bypass
dot1x pae authenticator
dot1x port-control auto
dot1x violation-mode protect
dot1x timeout quiet-period 2
dot1x timeout reauth-period 7200
dot1x timeout tx-period 3
dot1x reauthentication
Here is the log from the packetfense.log:
Jun 17 09:50:05 httpd.aaa(2249) INFO: [mac:28:d2:44:08:2c:68]
handling radius autz request: from switch_ip => (192.168.1.14),
connection_type => WIRED_MAC_AUTH,switch_mac =>
(00:11:92:b1:81:86), mac => [28:d2:44:08:2c:68], port => 6,
username => "28d244082c68" (pf::radius::authorize)
Jun 17 09:50:05 httpd.aaa(2249) INFO: [mac:28:d2:44:08:2c:68] is
of status unreg; belongs into registration VLAN
(pf::role::getRegistrationRole)
Jun 17 09:50:05 httpd.aaa(2249) INFO: [mac:28:d2:44:08:2c:68]
(192.168.1.14) Added VLAN 260 to the returned RADIUS Access-Accept
(pf::Switch::returnRadiusAccessAccept)
Jun 17 09:50:05 httpd.aaa(2249) INFO: [mac:28:d2:44:08:2c:68]
(192.168.1.14) Added role registration to the returned RADIUS
Access-Accept (pf::Switch::returnRadiusAccessAccept)
Jun 17 09:50:20 httpd.aaa(2249) INFO: [mac:28:d2:44:08:2c:68]
handling radius autz request: from switch_ip => (192.168.1.14),
connection_type => WIRED_MAC_AUTH,switch_mac =>
(00:11:92:b1:81:86), mac => [28:d2:44:08:2c:68], port => 6,
username => "28d244082c68" (pf::radius::authorize)
Jun 17 09:50:20 httpd.aaa(2249) INFO: [mac:28:d2:44:08:2c:68] is
of status unreg; belongs into registration VLAN
(pf::role::getRegistrationRole)
Jun 17 09:50:20 httpd.aaa(2249) INFO: [mac:28:d2:44:08:2c:68]
(192.168.1.14) Added VLAN 260 to the returned RADIUS Access-Accept
(pf::Switch::returnRadiusAccessAccept)
Jun 17 09:50:20 httpd.aaa(2249) INFO: [mac:28:d2:44:08:2c:68]
(192.168.1.14) Added role registration to the returned RADIUS
Access-Accept (pf::Switch::returnRadiusAccessAccept)
Jun 17 09:50:29 httpd.aaa(2249) INFO: [mac:28:d2:44:08:2c:68]
handling radius autz request: from switch_ip => (192.168.1.14),
connection_type => WIRED_MAC_AUTH,switch_mac =>
(00:11:92:b1:81:86), mac => [28:d2:44:08:2c:68], port => 6,
username => "28d244082c68" (pf::radius::authorize)
Jun 17 09:50:29 httpd.aaa(2249) INFO: [mac:28:d2:44:08:2c:68] is
of status unreg; belongs into registration VLAN
(pf::role::getRegistrationRole)
Jun 17 09:50:29 httpd.aaa(2249) INFO: [mac:28:d2:44:08:2c:68]
(192.168.1.14) Added VLAN 260 to the returned RADIUS Access-Accept
(pf::Switch::returnRadiusAccessAccept)
Jun 17 09:50:29 httpd.aaa(2249) INFO: [mac:28:d2:44:08:2c:68]
(192.168.1.14) Added role registration to the returned RADIUS
Access-Accept (pf::Switch::returnRadiusAccessAccept)
Any thoughts?
Please advise,
Vianney
------------------------------------------------------------------------------
What NetFlow Analyzer can do for you? Monitors network bandwidth and traffic
patterns at an interface-level. Reveals which users, apps, and protocols are
consuming the most bandwidth. Provides multi-vendor support for NetFlow,
J-Flow, sFlow and other flows. Make informed decisions using capacity
planning
reports.http://sdm.link/zohomanageengine
_______________________________________________
PacketFence-users mailing list
[email protected]
<mailto:[email protected]>
https://lists.sourceforge.net/lists/listinfo/packetfence-users
--
Antoine Amacher
[email protected] <mailto:[email protected]> :: +1.514.447.4918 *130
::www.inverse.ca <http://www.inverse.ca>
Inverse inc. :: Leaders behind SOGo (www.sogo.nu <http://www.sogo.nu>) and
PacketFence (www.packetfence.org <http://www.packetfence.org>)
------------------------------------------------------------------------------
What NetFlow Analyzer can do for you? Monitors network bandwidth and
traffic patterns at an interface-level. Reveals which users, apps, and
protocols are consuming the most bandwidth. Provides multi-vendor
support for NetFlow, J-Flow, sFlow and other flows. Make informed
decisions using capacity planning reports.
http://sdm.link/zohomanageengine
_______________________________________________ PacketFence-users
mailing list [email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
------------------------------------------------------------------------------
What NetFlow Analyzer can do for you? Monitors network bandwidth and traffic
patterns at an interface-level. Reveals which users, apps, and protocols are
consuming the most bandwidth. Provides multi-vendor support for NetFlow,
J-Flow, sFlow and other flows. Make informed decisions using capacity planning
reports. http://sdm.link/zohomanageengine
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
--
Antoine Amacher
[email protected] :: +1.514.447.4918 *130 :: www.inverse.ca
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
(www.packetfence.org)
------------------------------------------------------------------------------
What NetFlow Analyzer can do for you? Monitors network bandwidth and traffic
patterns at an interface-level. Reveals which users, apps, and protocols are
consuming the most bandwidth. Provides multi-vendor support for NetFlow,
J-Flow, sFlow and other flows. Make informed decisions using capacity planning
reports. http://sdm.link/zohomanageengine
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users