Can you try pfcmd configreload hard and restart radius. (pfcmd service radiusd restart)

Le 2017-12-28 à 19:20, E.P. a écrit :

I should have made my previous email shorter because my main question fell into cracks.

Why do I have an error with the shared secret? Quoting it here again:

When I test this with a real network device, Unifi WAP for example, I don’t go anywhere.

I see that NAD is added, here’s an entry from radius.log

/Dec 28 07:42:46 PacketFence-ZEN auth[16806]: Adding client 172.19.254.2/32 with shared secret "123456"/

When I try to authenticate from an endpoint to a specific SSID I see this error in radius-acct.log

/Dec 28 07:38:58 PacketFence-ZEN acct[16780]: Dropping packet without response because of error: Received Accounting-Request packet from client 172.19.254.2 with invalid Request Authenticator!  (Shared secret is incorrect.)/

I added this WAP under “Policies and access control” in Switches section using the shared secret as shown above and following the admin guide. What am I doing wrong ?

Here’s how the switches.conf file looks like after I added this WAP:

/[root@PacketFence-ZEN conf]# cat ./switches.conf/

/[172.19.254.2]/

/VoIPCDPDetect=N/

/VoIPDHCPDetect=N/

/deauthMethod=RADIUS/

/description=Test-WAP/

/VoIPLLDPDetect=N/

/radiusSecret=123456/

/VlanMap=N/

Eugene

*From:*Durand fabrice via PacketFence-users [mailto:[email protected]]
*Sent:* Thursday, December 28, 2017 3:30 PM
*To:* [email protected]
*Cc:* Durand fabrice
*Subject:* Re: [PacketFence-users] Need an advice and maybe assistance with FreeRADIUS

Hello Eugene,

in fact for 802.1x you need to use eapol_test instead of radtest. (http://deployingradius.com/scripts/eapol_test/)

Also use the port 1812 instead of 18120.

Regards

Fabrice

Le 2017-12-28 à 03:07, E.P. via PacketFence-users a écrit :

    Guys,

    I still hope someone with more experience with PF give me a hand
    with this trivial issue (if it is an issue)

    I’m on my way to test PF with baby steps and just created a user
    under Users section in PF GUI.

    Then I test it using a simple command like this and it seems to
    work using the local identity store.

    /[//root@PacketFence-ZEN bin]# ./pftest authentication test1 123456/

    /Testing authentication for "test1"/

    //

    /Authenticating against local/

    /Authentication SUCCEEDED against local (Authentication successful.)/

    /Matched against local for 'authentication' rules/

    /set_access_level : User Manager/

    /set_unreg_date : 0000-00-00 00:00:00/

    /Matched against local for 'administration' rules/

    /set_access_level : User Manager/

    /set_unreg_date : 0000-00-00 00:00:00/

    Then I’m following the admin guide and want to test this user
    authentication using radtest command as in

    /[root@PacketFence-ZEN bin]# radtest test1 123456 localhost:18120
    12 testing123/

    /Sent Access-Request Id 136 from 0.0.0.0:45055 to 127.0.0.1:18120
    length 75/

    /User-Name = "test1"/

    /User-Password = "123456"/

    /NAS-IP-Address = 172.16.0.222/

    /NAS-Port = 12/

    /Message-Authenticator = 0x00/

    /Cleartext-Password = "123456"/

    /Received Access-Reject Id 136 from 127.0.0.1:18120 to 0.0.0.0:0
    length 20/

    (0)/-: Expected Access-Accept got Access-Reject/

    Why am I rejected here ? Am I not supposed to use this test1 user
    to test RADIUS with the proxy module ?

    And finally, when I test this with a real network device, Unifi
    WAP for example, I don’t go anywhere.

    I see that NAD is added, here’s an entry from radius.log

    /Dec 28 07:42:46 PacketFence-ZEN auth[16806]: Adding client
    172.19.254.2/32 with shared secret "123456"/

    When I try to authenticate for an endpoint to a specific SSID I
    see this error in radius-acct.log

    /Dec 28 07:38:58 PacketFence-ZEN acct[16780]: Dropping packet
    without response because of error: Received Accounting-Request
    packet from client 172.19.254.2 with invalid Request
    Authenticator!  (Shared secret is incorrect.)/

    I added this WAP under “Policies and access control” in Switches
    section using the shared secret as shown above and following the
    admin guide. What am I doing wrong ?

    Here’s how the switches.conf file looks like after I added this WAP:

    /[root@PacketFence-ZEN conf]# cat ./switches.conf/

    /[172.19.254.2]/

    /VoIPCDPDetect=N/

    /VoIPDHCPDetect=N/

    /deauthMethod=RADIUS/

    /description=Test-WAP/

    /VoIPLLDPDetect=N/

    /radiusSecret=123456/

    /VlanMap=N/

    Just to confirm, I’m not doing any inline mode, nor guest or web
    authentication, just pure WPA-Enterprise with RADIUS internal
    users identity store.

    Eugene




    
------------------------------------------------------------------------------

    Check out the vibrant tech community on one of the world's most

    engaging tech sites, Slashdot.org!http://sdm.link/slashdot




    _______________________________________________

    PacketFence-users mailing list

    [email protected]
    <mailto:[email protected]>

    https://lists.sourceforge.net/lists/listinfo/packetfence-users


------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to