Thank you for your efforts, Derek.

I applied your fix (I opened that file with a text editor and changed
just that line, is that enough?), I reenabled that option, as you told
me to do so, and tested that situation again (connect to the first
network, authenticate through the captive portal, then disconnect and
connect to the second network).

The first time, it worked as expected. The captive portal of the
second network was shown: login and password fields.

But then, once authenticated on the second network, I did it the way
back (I disconnected from the second network and connected to the
first network), my cell phone notified me to login. When I clicked the
notification and the browser opened, the captive portal of the first
network showed me not the login and password fields, but a message
like "Your network should be enabled within a minute or two. If it is
not reboot your computer". And enabled my device. I believe the
captive portal should present the login and password fields again.

Then, I checked the Nodes tab on PacketFence, and my device ended up
with an IP address from the first network, but a role from the second,
similar to what happened before.

I tested changing networks many times. It seems like now PacketFence
does not behave the same way all the time: sometimes it shows me the
login form, sometimes it says my network should be enabled within a
minute or two (and then access to the network is granted), sometimes
my cell phone does not even notify me about authentication and access
is granted immediately.

We don't believe that our users are going to really do something like
that (e.g. connect to the Patients Wi-Fi, authenticate as a valid
patient, then connect to the Corporative Wi-Fi and get access granted
automatically, although not being a valid employee). But realizing
that was possible made us concerned about security, so we ended up
using two different servers to manage two Wi-Fi networks, but we would
like to use just PacketFence, if that problem gets solved.

I'm going to try Jake's suggestion, but I did not understand it
completely. Maybe I would need a howto. As I said, I already setup
Network filters on the Portal Profiles configuration screen. Shouldn't
that be sufficient?

Thank you again!


2017-01-16 15:52 GMT-02:00 Derek Wuelfrath <dwuelfr...@inverse.ca>:
>
> Antonio,
>
> So I tested the flow described and discovered a code issue when it comes to 
> the IP reevaluation workflow.
> I opened an issue (https://github.com/inverse-inc/packetfence/issues/1963) 
> and fixed it with the commit id 
> (https://github.com/inverse-inc/packetfence/commit/73ab8151017d49e1006f5f8bc37bbf401a69cb1f)
>
> Please try to apply that fix to your setup, reenable the “Reauthenticate 
> node” configuration parameter under Configuration > Inline and let me know if 
> that works.
>
> Cheers!
> -dw.
>
> --
> Derek Wuelfrath
> de...@inverse.ca
> Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence 
> (www.packetfence.org)
>
> On Jan 13, 2017, at 17:01, viny <vinyanali...@gmail.com> wrote:
>
> In principle, in the hospital where I work, what we wanted was to use
> PacketFence to manage both of our wireless networks, as I reported
> here: https://sourceforge.net/p/packetfence/mailman/message/35511813/
>
> Unless you configure PacketFence otherwise [...]
>
>
> We would like to configure PacketFence so that it automatically
> unregisters any node that leaves a first network and enters a second
> one, showing that node the second network's captive portal so it must
> register again to use the second network. But we don't know how to
> achieve that. Do you have any idea on how to do it?
>
> If you could shed some light on that problem, we would be very
> thankful. We could shutdown pfSense and use only PacketFence.
>
> Let me explain our setup.
>
> In our first experiment with PacketFence, we have set up its interfaces
> this way:
>
> - eth0: Management
> - eth0 VLAN ID 500: Inline Layer 2, IP address 10.100.32.1/20
> - eth0 VLAN ID 600: Inline Layer 2, IP address 10.100.64.1/20
>
> And we have set up Ubiquiti APs to serve two wireless networks:
>
> (1) SSID Corporative Wi-Fi: VLAN ID 500
> (2) SSID Patients Wi-Fi: VLAN ID 600
>
> Following the Administration Guide, in PacketFence:
>
> - We have created two user roles: (1) Employee and (2) Patient
> - We have added two authentication sources: (1) Active Directory with a
> rule so that Role = Employee and (2) external HTTP API with a rule so
> that Role = Patient
> - We have created two portal profiles: (1) Employee, with a filter
> Network = 10.100.32.0/20 and Source = Active Directory and (2) Patient
> with a filter Network = 10.100.64.0/20 and Source = external HTTP API
>
> So, what happens? (let me retype the relevant portion of my first
> email)
>
> We have noticed that if we connect to the Corporative Wi-Fi and
>
> authenticate through the captive portal, then disconnect and connect
> to the Patients Wi-Fi, its captive portal is not shown and access to
> that second network is granted. In the end, the device is shown on the
> Nodes table with an IP Address from the Patients network, but Role =
> Corporative.
>
>
> Enabling the option Reauthenticate node (Should have to reauthenticate
>
> the node if vlan change) in Configuration > Main > Inline did not
> help.
>
>
> Is there any way we could enforce reauthentication if the user exits
>
> one network and enters another?
>
> Thank you in advance!
>
>
> Antonio
>
>

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to