It shows up fine for me using the linuxserver/UniFi docker container (running 
5.6.22 on CentOS 7.3). Weird it disappeared for you. They did just release 
5.6.26 two days ago though. I haven’t upgraded to the latest yet. Perhaps they 
changed something. 

Sent from mobile phone

> On Dec 13, 2017, at 10:08, E.P. via PacketFence-users 
> <[email protected]> wrote:
> 
> Hm…
> This is interesting. I’m building the whole packetfence solution for a large 
> WiFi network distributed through 20 sites and built on Ubiquiti Unifi. What 
> was your previous controller version, Fabrice ? I’m also on 5.6.22 now
>  
> Eugene
>  
> From: Fabrice Durand via PacketFence-users 
> [mailto:[email protected]] 
> Sent: Wednesday, December 13, 2017 7:51 AM
> To: [email protected]
> Cc: Fabrice Durand
> Subject: Re: [PacketFence-users] Ubiquiti UniFi AP Captive Portal
>  
> Hello Guys,
> 
> just upgraded my controller and oh surprise dynamic vlan assignment disappear 
> ....
> 
> 
> Regards
> Fabrice
> 
> 
> Le 2017-12-13 à 02:40, Timothy Mullican via PacketFence-users a écrit :
> Geert,
> First in order to use 802.1x (and MAC-based auth for the open network) with 
> the UniFi you must apply the patch at:
> https://patch-diff.githubusercontent.com/raw/inverse-inc/packetfence/pull/2735.diff
>  
> You can run the following commands to accomplish this:
> # sudo wget -P /usr/local/pf/ 
> https://patch-diff.githubusercontent.com/raw/inverse-inc/packetfence/pull/2735.diff
> # cd /usr/local/pf
> # sudo patch -p1 < 2735.diff
>  
> Also have a look at:
> https://community.ubnt.com/t5/UniFi-Wireless/Packetfence-7-1-Out-of-Band-Dynamic-VLAN-with-Unifi/td-p/1990175
> https://community.ubnt.com/t5/UniFi-Wireless/Feature-request-disable-pmksa-caching/m-p/2112479
>  
> You might need to restart your PacketFence box here (or at least the 
> services), since it won't respond to new RADIUS requests from the UniFi 
> without the patch.
>  
> Next go to 
> https://github.com/inverse-inc/packetfence/blob/ae18f50b4879cc2d4132490fcee33f2fbe53b36f/docs/PacketFence_Network_Devices_Configuration_Guide.asciidoc#ubiquiti-1
>  and read through the VLAN enforcement "Secure SSID" section. On the UniFi 
> controller you have to create a file called "config.properties" in the 
> current site (e.g., /usr/lib/unifi/data/sites/default/config.properties or 
> C:\Users\<username>\Ubiquiti Unifi\data\sites\default\config.properties) and 
> insert the appropriate "config.system_cfg.[number (start with 1 and increment 
> each line)]=aaa.[profile id].auth_cache=disabled" to disable pmksa caching 
> ONLY for the 802.1x SSIDs, otherwise RADIUS deauth won't work. Once you do 
> that you need to force re-provision the UniFi AP by clicking on it (from the 
> controller web ui), selecting config->Manage Device, and click Provision.
>  
> On the PacketFence web UI, make sure the interface connected to your UniFi 
> controller/AP has the RADIUS daemon enabled (click on the interface under 
> Configuration->Network Configuration->Interfaces and click the text box next 
> to "Additional listening daemons").
>  
> Next, make sure you trunk the port going to the Ubiquiti controller/AP 
> allowing the necessary registration and guest VLANs. This shouldn't be an 
> issue as long as you don't use native VLAN tagging on your switches.
>  
> This is how I have the UniFi setup in my PacketFence instance:
>  
> https://i.imgsafe.org/0c/0cff2c7f19.png
> https://i.imgsafe.org/0c/0cff2dfd99.png
>  
> UniFi Controller IP: 192.168.20.7
> UniFi AP: 192.168.20.6
>  
> From how I read the new draft documentation, you need to create a new switch 
> entry for every access point with it's IP address. Set the type as "Unifi 
> Controller" for each and enter enter the IP address of the UniFi controller 
> towards the bottom. Make sure to set the deauthentication method to HTTPS and 
> specify the username and password for the UniFi controller on the "Web 
> Services" tab. I do not have a separate entry for both the controller and AP 
> on the switches page, just a single entry for each AP. Review the above photo 
> links if you have any questions.
>  
> You can refer to the image links earlier in the thread to see how I set my 
> UniFi controller up. The only issue I'm having is with the open network. 
> MAC-based authentication is used and I can see PacketFence RADIUS returning 
> the correct VLANs, but the UniFi AP is throwing errors about the VLAN not 
> existing. It's weird since 802.1x secure SSID works correctly with the VLANs 
> and both the secure and open SSID are on the same AP. Hopefully Fabrice or 
> someone else can help shed some light.
>  
> Please let me know if you have any other questions or need help with 
> anything. I'm still trying to get my demo environment setup correctly myself!
>  
> Thanks!
>  
>  
> On Wednesday, December 13, 2017, 12:49:33 AM CST, Geert Heremans 
> <[email protected]> wrote:
>  
>  
> Hi Timothy,
>  
> I'm also running unifi at my school and I'm trying to implement PF. Could you 
> help me with the following questions:
> In the switches menu I've added the unifi controller IP and assigned the 
> Unifi Profile that's available in PF. This seem correct.
> I've also added the AP's IP-addresses to the switches. Do I need to assign 
> the Unifi profile here as well?
>  
>  
> Radius assigned VLAN's are only possible on 802.1x configured WIFI-networks 
> I'm afraid. 
>  
> If I'm correct I need to setup 2 WIFI-SSID's to get PF to work:
> One open SSID where users can register their device on the captive portal page
> One 802.1X protected SSID with Radius assigned VLAN's and mac-address 
> authentication. When the user has registered his or her device they now can 
> connect to this protected SSID.
> Best regards,
> Geert
>  
> 2017-12-12 23:53 GMT+01:00 Timothy Mullican via PacketFence-users 
> <[email protected]>:
> Fabrice,
> I am running UniFi controller version 5.6.22 and UniFi AP-AC-Pro firmware 
> 3.9.3.7537, both of which should be the latest. It appears that the Radius 
> assigned VLAN option only shows up as an option in the UniFi controller when 
> you choose WPA Enterprise. You can see screenshots of my setup below:
>  
> https://i.imgsafe.org/05/ 05bb81f5b4.png
> https://i.imgsafe.org/05/ 05bbd86ab4.png
> https://i.imgsafe.org/05/ 05bbb5eafe.png
> https://i.imgsafe.org/05/ 05bbc22129.png
>  
> The running config from the UniFi AP is also available at:
>  
> https://pastebin.com/Zz0cRLSM
>  
> Thanks!
> On ‎Tuesday‎, ‎December‎ ‎12‎, ‎2017‎ ‎10‎:‎13‎:‎36‎ ‎AM‎ ‎CST, Fabrice 
> Durand via PacketFence-users <packetfence-users@lists. sourceforge.net> wrote:
>  
>  
> You probably have to update the controller version.
> 
>  
> 
>  
> Le 2017-12-12 à 10:30, Timothy Mullican via PacketFence-users a écrit :
> Fabrice,
> On the UniFi controller the “Use dynamic VLAN assignment” option only shows 
> up on SSIDs using 802.1x. Is there any way to also use dynamic vlan 
> assignment on open SSIDs? For open networks it only lets me specify a static 
> VLAN to use. 
>  
> Thanks!
> 
> Sent from mobile phone
> 
> On Dec 12, 2017, at 07:41, Fabrice Durand via PacketFence-users 
> <packetfence-users@lists. sourceforge.net> wrote:
> 
> Hello Timothy,
> 
> you must enable that:
> 
> https://raw.githubusercontent. com/inverse-inc/packetfence/ 
> ae18f50b4879cc2d4132490fcee33f 2fbe53b36f/docs/images/unifi- radius.png
> 
> Regards
> 
> Fabrice
> 
>  
> Le 2017-12-12 à 01:37, Timothy Mullican via PacketFence-users a écrit :
> Hello all,
> I am trying to setup a proof of concept using an Ubiquiti UniFi UAP-PRO with 
> the following setup:
>  
> Cisco 3560-E L3 Switch
> UniFi UAP-PRO
> UniFi Controller running on CentOS 7.3 (docker) on ESXi
> PacketFence running on CentOS 7.3 on ESXi
>  
> The Cisco switch has the following VLANs:
> VLAN 2 - registration
> VLAN 3 - isolation 
> VLAN 4 - guest
> VLAN 10 - enterprise
> VLAN 20 - wireless
> VLAN 100 - out of band management
>  
> I have created two SSIDs on the UniFi AP, a secure 802.1x SSID and an open 
> SSID. I was able to apply the patch available at https://github.com/inverse- 
> inc/packetfence/pull/2735 to enable 802.1x for the secure network and this is 
> working correctly. However, for the open guest SSID, I am trying to do a 
> captive portal with dynamic vlan assignment. The user would initially be 
> placed in the registration vlan (2) and then moved to another vlan based on 
> their user role (vlan 4 or 10). Both the UniFi controller VM and the UniFi AP 
> are in VLAN 20. On the UniFi controller, dynamic VLAN assignment appears to 
> only be an option under 802.1x networks, otherwise you must choose a static 
> VLAN. I saw the external captive portal setup for the UniFi under the 
> PacketFence Network Devices documentation, but I don’t believe this supports 
> dynamic VLAN assignment. Does anyone know of any way to do dynamic VLAN 
> assignment on an open wireless network with the UniFi AP, or have any 
> suggestions?
>  
> Thanks!
> 
> 
> ------------------------------ ------------------------------ 
> ------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
> 
> 
> ______________________________ _________________
> PacketFence-users mailing list
> PacketFence-users@lists. sourceforge.net
> https://lists.sourceforge.net/ lists/listinfo/packetfence- users
>  
> -- 
> Fabrice Durand
> [email protected] ::  +1.514.447.4918 (x135) ::  www.inverse.ca
> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
> (http://packetfence.org) 
> ------------------------------ ------------------------------ 
> ------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
> ______________________________ _________________
> PacketFence-users mailing list
> PacketFence-users@lists. sourceforge.net
> https://lists.sourceforge.net/ lists/listinfo/packetfence- users
>  
> 
> 
> ------------------------------ ------------------------------ 
> ------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
> 
> 
> ______________________________ _________________
> PacketFence-users mailing list
> PacketFence-users@lists. sourceforge.net
> https://lists.sourceforge.net/ lists/listinfo/packetfence- users
>  
> -- 
> Fabrice Durand
> [email protected] ::  +1.514.447.4918 (x135) ::  www.inverse.ca
> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
> (http://packetfence.org) 
> ------------------------------ ------------------------------ 
> ------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
> ______________________________ _________________
> PacketFence-users mailing list
> PacketFence-users@lists. sourceforge.net
> https://lists.sourceforge.net/ lists/listinfo/packetfence- users
> 
> ------------------------------ ------------------------------ 
> ------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
> ______________________________ _________________
> PacketFence-users mailing list
> PacketFence-users@lists. sourceforge.net
> https://lists.sourceforge.net/ lists/listinfo/packetfence- users
> 
>  
> 
> 
> 
> ------------------------------------------------------------------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
> 
> 
> 
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
> 
> 
> -- 
> Fabrice Durand
> [email protected] ::  +1.514.447.4918 (x135) ::  www.inverse.ca
> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
> (http://packetfence.org) 
> ------------------------------------------------------------------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to