Hello Sadiq,
when i say nac in advanced section i mean on the controler , not on
packetfence.
Also enable External Portal Enforcement.
Regards
Fabrice
Le 2017-01-25 à 09:38, Sadiq Hussein a écrit :
> Dear Fabrice
> You have ask to do the following, see my response below
>
> Pre-Auth-For-WebRedirect is an trigger to force the device to reach to
> captive portal so change it to be close than we define in the doc
> (https://packetfence.org
> doc/PacketFence_Network_Devices_Configuration_Guide.html#_wireless_lan_controller_wlc_web_auth).
>
> As per documentation i have created ACL similar to the one on the
> documentation but with my IP (screen shot attached)
> Also on Web Admin I have added Cisco WLC Network > Switches option
> configured as per the documentation.
>
> Next NAC state to enabled (Advanced section).
> I used Web Admin GUI the Configuration > Advanced option i am not
> sure we options to configure ( attacehd screen shot, need to help on this)
>
> Enable web authentication in the switch config (pf switch config where
> you define the switch type).
> I did this using Web admin GUI configuration>network>switches where i
> added the Cisco WLC. Did do it right (Also screen shot)
>
> Still am not able to reach the Captive portal
>
> Below a part is log of Packetfence.log
>
> fconfig::cached::is_valid)
> Jan 25 09:19:13 httpd.aaa(8610) INFO: [mac:f0:27:65:ea:8e:c7] Memory
> configuration is not valid anymore for key resource::stats_levels in
> local cached_hash (pfconfig::cached::is_valid)
> Jan 25 09:19:13 httpd.aaa(8610) INFO: [mac:f0:27:65:ea:8e:c7] Memory
> configuration is not valid anymore for key resource::stats_levels in
> local cached_hash (pfconfig::cached::is_valid)
> Jan 25 09:19:13 httpd.aaa(8610) INFO: [mac:f0:27:65:ea:8e:c7] Memory
> configuration is not valid anymore for key resource::stats_levels in
> local cached_hash (pfconfig::cached::is_valid)
> Jan 25 09:19:13 httpd.aaa(8610) INFO: [mac:f0:27:65:ea:8e:c7] Memory
> configuration is not valid anymore for key resource::stats_levels in
> local cached_hash (pfconfig::cached::is_valid)
> Jan 25 09:19:13 httpd.aaa(8610) INFO: [mac:f0:27:65:ea:8e:c7]
> (10.11.69.253) Added VLAN 2 to the returned RADIUS Access-Accept
> (pf::Switch::returnRadiusAccessAccept)
> Jan 25 09:19:13 httpd.aaa(8610) INFO: [mac:f0:27:65:ea:8e:c7]
> (10.11.69.253) Added role Pre-Auth-For-WebRedirect to the returned
> RADIUS Access-Accept (pf::Switch::returnRadiusAccessAccept)
> Jan 25 09:19:13 httpd.aaa(8610) INFO: [mac:f0:27:65:ea:8e:c7] External
> portal enforcement either not supported '1' or not configured 'N' on
> network equipment '10.11.69.253' (pf::Switch::externalPortalEnforcement)
> Jan 25 09:19:13 httpd.aaa(8610) INFO: [mac:f0:27:65:ea:8e:c7] Memory
> configuration is not valid anymore for key resource::stats_levels in
> local cached_hash (pfconfig::cached::is_valid)
> Jan 25 09:19:14 httpd.aaa(8610) INFO: [mac:f0:27:65:ea:8e:c7] Memory
> configuration is not valid anymore for key resource::stats_levels in
> local cached_hash (pfconfig::cached::is_valid)
> Jan 25 09:21:38 httpd.aaa(8610) INFO: [mac:f0:27:65:ea:8e:c7] Memory
> configuration is not valid anymore for key resource::stats_levels in
> local cached_hash
>
>
> Thanks
>
> Regards
> Sadiq
>
>
>
>
> On Wed, Jan 25, 2017 at 3:27 PM, Durand fabrice <[email protected]
> <mailto:[email protected]>> wrote:
>
> Hello Sadik,
>
> so 3 mistakes in your setup.
>
> Pre-Auth-For-WebRedirect is an trigger to force the device to
> reach to captive portal so change it to be close than we define in
> the doc
>
> (https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_wireless_lan_controller_wlc_web_auth
>
> <https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_wireless_lan_controller_wlc_web_auth>).
>
> Next NAC state to enabled (Advanced section).
>
> Enable web authentication in the switch config (pf switch config
> where you define the switch type).
>
> Regards
>
> Fabrice
>
>
> Le 2017-01-25 à 04:16, Sadiq Hussein a écrit :
>> Dear Antoine,
>>
>> Thank your for your response.
>>
>> Q1 on interface, in my case where i just want captive portal for
>> authentication of guest users,- how many interfaces should have
>> or configure.?
>>
>> At the moment I have only management interface with Listening
>> Daemon as portal
>>
>> Also i have followed your instruction on the email but I could
>> not not connect to SSID|(Traning) nor redirected to captive portal
>>
>> This how i have configure the packet-fence
>>
>> >The interface are
>> I have management IP 10.68.24.15
>> with listening Daemon - portal
>>
>> Captive portal IP is 10.68.24.15
>>
>> On portal Profile Menu am using default with sources Null and
>> Sponsor
>>
>> On Switches i have Added the Cisco WLC Controller IP
>> > on roles I have added configuration as instructed on Network
>> documentation
>> Role by web Auth URL added captive portal IP (10.68.24.15)
>> Role by Switch Role (attached screen shot)
>> > The i configured the Radius secret passphrase(the same was
>> used in Cisco WLC)
>>
>> > On roles and Source I did not change anything
>> is there anything to do in case of my setup?
>>
>> Also I am cannot on web admin GUI guest Self -registration menu
>>
>>
>> I have attached some screen shot to show the setting i entered on
>> both packetfence and WLC Cisco.
>>
>> Also below is text if radius audit entry on laptop that did not
>> connected
>>
>> ser-Name = "d8:fc:93:d7:98:12"
>> User-Password = "X\2565j+\221\r\343X\020\2374\005j\363\353"
>> NAS-IP-Address = 10.11.69.253
>> NAS-Port = 1
>> Service-Type = Call-Check
>> Framed-MTU = 1300
>> Called-Station-Id = "bc:f1:f2:cf:a5:40:TRAINING"
>> Calling-Station-Id = "d8:fc:93:d7:98:12"
>> NAS-Identifier = "WFPWLAN_CTLR"
>> NAS-Port-Type = Wireless-802.11
>> Tunnel-Type:0 = VLAN
>> Tunnel-Medium-Type:0 = IEEE-802
>> Tunnel-Private-Group-Id:0 = "9"
>> Event-Timestamp = "Jan 25 2017 10:13:21 EAT"
>> Airespace-Wlan-Id = 1
>> Stripped-User-Name = "d8:fc:93:d7:98:12"
>> Realm = "null"
>> FreeRADIUS-Client-IP-Address = 10.11.69.253
>> Called-Station-SSID = "TRAINING"
>> SQL-User-Name = "d8:fc:93:d7:98:12"
>> RADIUS Reply Airespace-ACL-Name = "Pre-Auth-For-WebRedirect"
>> PacketFence-Authorization-Status = "allow"
>>
>> Thanks
>>
>> Regards
>> Sadiq
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>> On Tue, Jan 24, 2017 at 7:01 PM, Antoine Amacher
>> <[email protected] <mailto:[email protected]>> wrote:
>>
>> Hello,
>>
>> /Question 1 - for captive configuration do i need to enable
>> enforcement and vlan, and if so which option do i choose/
>>
>> The captive portal will be available no matter which
>> enforcement you chose, VLAN, Inline or WebAuth.
>>
>> /Q1 who many interface are suppose to created and they be on
>> same network/
>>
>> Please clarify.
>>
>> /Q Can captive portal be on the same network as management IP
>> and if so i do i configure that./
>>
>> Using WebAuth for instance, you need to enable portal on the
>> management interface. Configuration -> Network -> Interfaces
>> and Network -> click on your interface, Additionnal listening
>> daemon(s) -> Portal
>>
>> /Q4 What configuration should have on WLC /
>>
>>
>> https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_cisco_2
>>
>> <https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_cisco_2>
>>
>> if using WebAuth:
>>
>>
>> https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_wireless_lan_controller_wlc_web_auth
>>
>> <https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_wireless_lan_controller_wlc_web_auth>
>>
>> /Q 4 What configuration should have to guest authenticated
>> through sponsor email or local user/
>>
>>
>> https://packetfence.org/doc/PacketFence_Administration_Guide.html#_guests_management
>>
>> <https://packetfence.org/doc/PacketFence_Administration_Guide.html#_guests_management>
>>
>> Thanks
>>
>>
>> On 01/24/2017 10:36 AM, Sadiq Hussein wrote:
>>> Dear Colleague
>>>
>>> I am new in PacketFence 6.4 i want use with Cisco WLC 5500
>>> to manage guest user through captive portal.
>>>
>>> I hve go through the Admin and Network documentation to try
>>> and configure PacketFence but nothing seem to work.
>>>
>>> Question 1 - for captive configuration do i need to enable
>>> enforcement and vlan, and if so which option do i choose
>>>
>>> Q1 who many interface are suppose to created and they be on
>>> same network
>>>
>>> Q Can captive portal be on the same network as management IP
>>> and if so i do i configure that.
>>>
>>> Q4 What configuration should have on WLC
>>>
>>> Q 4 What configuration should have to guest authenticated
>>> through sponsor email or local user
>>>
>>> Please assist
>>>
>>> Regards
>>> Sadiq Hussein
>>>
>>>
>>>
>>> ------------------------------------------------------------------------------
>>> Check out the vibrant tech community on one of the world's most
>>> engaging tech sites, SlashDot.org! http://sdm.link/slashdot
>>>
>>> _______________________________________________
>>> PacketFence-users mailing list
>>> [email protected]
>>> <mailto:[email protected]>
>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>> <https://lists.sourceforge.net/lists/listinfo/packetfence-users>
>>
>> --
>> Antoine Amacher
>> [email protected] <mailto:[email protected]> :: www.inverse.ca
>> <http://www.inverse.ca>
>> +1.514.447.4918 x130 <tel:%28514%29%20447-4918> :: +1 (866)
>> 353-6153 x130 <tel:%28866%29%20353-6153>
>> Inverse inc. :: Leaders behind SOGo (www.sogo.nu
>> <http://www.sogo.nu>) and PacketFence (www.packetfence.org
>> <http://www.packetfence.org>)
>>
>>
>> ------------------------------------------------------------------------------
>> Check out the vibrant tech community on one of the world's
>> most engaging tech sites, SlashDot.org!
>> http://sdm.link/slashdot
>> _______________________________________________
>> PacketFence-users mailing list
>> [email protected]
>> <mailto:[email protected]>
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>> <https://lists.sourceforge.net/lists/listinfo/packetfence-users>
>>
>>
>> ------------------------------------------------------------------------------
>> Check out the vibrant tech community on one of the world's most
>> engaging tech sites, SlashDot.org! http://sdm.link/slashdot
>>
>> _______________________________________________
>> PacketFence-users mailing list
>> [email protected]
>> <mailto:[email protected]>
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>> <https://lists.sourceforge.net/lists/listinfo/packetfence-users>
>
> ------------------------------------------------------------------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, SlashDot.org! http://sdm.link/slashdot
> _______________________________________________ PacketFence-users
> mailing list [email protected]
> <mailto:[email protected]>
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
> <https://lists.sourceforge.net/lists/listinfo/packetfence-users>
>
> ------------------------------------------------------------------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, SlashDot.org! http://sdm.link/slashdot
>
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
--
Fabrice Durand
[email protected] :: +1.514.447.4918 (x135) :: www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence
(http://packetfence.org)
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users