Hello,

Le 2016-12-06 à 22:45, [email protected] a écrit :
Thanks Fabrice.

I configured per instruction (see below) but had no better luck. Any further thoughts?

 1. I created a new admin role via: /admin/configuration#config/adminroles
 2. set the action to "Switches CLI - Write"
 3. Saved the new role
 4. Created a new source (internal radius) via:
    admin/configuration#config/authentication

Hum not sure it will work like that, let's create instead a user in packetfence (user tab) assign a password and assign the access level to the one you created before.

 1. Added a new set the ip to 127.0.0.1 and port 18120
 2. set secret to packet
 3. added rule
 4. set class to administration
 5. add action to access level and selected the radius role i created
    in step 1-3
 6. created another source (same as 4-9) with ip set to management
    interface and port 1812
 7. verified that cliAccess=Y
 8. restart all services

radtest on localhost fails auth with:

radtest -t mschap -x test2 packet localhost:18120 12 testing123
Sent Access-Request Id 107 from 0.0.0.0:58720 to 127.0.0.1:18120 length 131
    User-Name = "test2"
    MS-CHAP-Password = "packet"
    NAS-IP-Address = 192.168.14.60
    NAS-Port = 12
    Message-Authenticator = 0x00
    Cleartext-Password = "packet"
    MS-CHAP-Challenge = 0xd9fdad2e36fdd618
MS-CHAP-Response = 0x00010000000000000000000000000000000000000000000000007678409312f6c2d67f0671bf77b643cf60d6e7cc5583e533
Received Access-Reject Id 107 from 127.0.0.1:18120 to 0.0.0.0:0 length 20
(0) -: Expected Access-Accept got Access-Reject

packetfence.log

Dec 06 22:34:04 httpd.aaa(3965) WARN: [mac:[undef]] CLI Access is not permit on this switch 192.168.14.60 (pf::radius::switch_access)


radtest on management interface times/retry out

radtest on management interface times/retry out from remote client.





On 12/06/2016 07:25 PM, Durand fabrice wrote:

Hello,

can you check in packetfence.log to see what wrong ?

Also here what you have to do:

in configuration -> Admin access, create a new admin access with Switch CLI - Write

In Configuration source -> A internal source -> assign an administration rule and set access level (the admin access you created before).

Then enable cli access on the switch.(cliAccess=Y)


Now when PacketFence will receive a radius request for cli access, it will test the username and password on the internal source and if it succeeded and if it match the rule then the access will be allowed.


Regards

Fabrice



Le 2016-12-06 à 12:13, [email protected] a écrit :
When I attempt to test FreeRadius with a test user in /usr/local/pf/raddb/users I get a failure that states "CLI Access is not permit on this switch". I have "cliAccess=Y" in switches.conf. Is there somewhere else I need to enable CLI access?

Thanks



packetfence.log:
Dec 06 12:04:36 httpd.aaa(24559) WARN: [mac:[undef]] CLI Access is not permit 
on this switch 192.168.14.60 (pf::radius::switch_access)

This occurs as a repsonse to:

radtest -t mschap -x test2 packet localhost:18120 12 testing123

radtest responds with:

Sent Access-Request Id 224 from 0.0.0.0:50101 to 127.0.0.1:18120 length 131
     User-Name = "test2"
     MS-CHAP-Password = "packet"
     NAS-IP-Address = 192.168.14.60
     NAS-Port = 12
     Message-Authenticator = 0x00
     Cleartext-Password = "packet"
     MS-CHAP-Challenge = 0x7d970590bf9b3c20
     MS-CHAP-Response = 
0x00010000000000000000000000000000000000000000000000001d61ecc9a3fc6222a13bccde625540a3048270707271bf1c
Received Access-Reject Id 224 from 127.0.0.1:18120 to 0.0.0.0:0 length 20
(0) -: Expected Access-Accept got Access-Reject

I have the following entry in |/usr/local/pf/raddb/users

|||
test2   Cleartext-Password := "packet"


------------------------------------------------------------------------------
Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel Parallel Studio XE.
Training and support from Colfax.
Order your platform today.http://sdm.link/xeonphi


_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users



------------------------------------------------------------------------------
Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel Parallel Studio XE.
Training and support from Colfax.
Order your platform today.http://sdm.link/xeonphi


_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users




------------------------------------------------------------------------------
Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel Parallel Studio XE.
Training and support from Colfax.
Order your platform today.http://sdm.link/xeonphi


_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

------------------------------------------------------------------------------
Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel Parallel Studio XE.
Training and support from Colfax.
Order your platform today.http://sdm.link/xeonphi
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to