Hey,
I configured interface 15 manually to use only vlan 2 (registry), and I was
assigned registry address addressing (192.168.2.0/24)
Following config switch:
interface Gi1/0/15
switchport access vlan 2
dot1x port-control force-authorized
exit
Following logs packetfence:
Jan 3 12:14:41 packetfence pfqueue: pfqueue(24777) INFO:
[mac:84:7b:eb:e3:84:42] oldip (172.16.0.10) and newip (192.168.2.10) are
different for 84:7b:eb:e3:84:42 - closing ip4log entry
(pf::api::update_ip4log)
console#show mac address-table vlan 2
Aging time is 300 Sec
Vlan Mac Address Type Port
-------- --------------------- ----------- ---------------------
2 0800.2735.FCC4 Dynamic Gi1/0/11* - Packetfence*
2 847B.EBE3.8442 Dynamic Gi1/0/15* - Test machine*
You may notice that now the mac address of packetfence is in vlan 2.
Have you already configured dell switch switches?
Any idea??
2018-01-03 10:59 GMT-03:00 Fabrice Durand <[email protected]>:
> Hum strange.
>
> What you can try is to define an interface in the vlan 2 (manually on an
> switch port) and plug your test machine in it. (you must receive an ip from
> PacketFence).
>
> If you receive an ip from the 172.16.0.0/24 then it mean that you have a
> switch configuration issue. (any layer 3 interfaces defined in the vlan 2
> ?).
>
> Also what i can see is that there is no mac in the vlan 2 and the vlan 3
> for the interface 11.
>
> You should have something like that too:
>
> 2 08:00:27:35:fc:c4 Dynamic Gi1/0/11
> * - PacketFence Reg *
> 3 08:00:27:35:fc:c4 Dynamic Gi1/0/11* - PacketFence Isol*
>
> Regards
> Fabrice
>
>
> Le 2018-01-02 à 13:55, André Scrivener a écrit :
>
> Opss, Fabrice!
>
> I forgot an information, the MAC addresses on the switch.
>
> By the logs, it is in VLAN 2, the correct vlan.
>
> Right now I do not understand, because it does not assign the correct
> address
>
>
> console#show mac address-table
>
> Aging time is 300 Sec
>
> Vlan Mac Address Type Port
> -------- --------------------- ----------- ---------------------
> 1 0800.2700.58E2 Dynamic Gi1/0/11 *- Windows Server
> 2008*
> 1 0800.2735.FCC4 Dynamic Gi1/0/11* - PacketFence*
> 1 1418.77EA.F0A3 Management Vl1 * - Switch Dell*
> 1 641C.XXXXXXXXX Dynamic Gi1/0/11 *- My physical pc*
> 2 847B.EBE3.8442 Dynamic Gi1/0/13 *- My test machine*
>
> Total MAC Addresses in use: 5
>
> console#show mac address-table interface Gi1/0/13
>
> Aging time is 300 Sec
>
> Vlan Mac Address Type Port
> -------- --------------------- ----------- ---------------------
> 2 847B.EBE3.8442 Dynamic Gi1/0/13* - My test machine*
>
>
> console#
>
>
> 2018-01-02 15:22 GMT-03:00 André Scrivener <[email protected]>:
>
>> Hello Fabrice,
>>
>> I simplified the environment, I'm using only 1 interface!
>>
>>
>> enp0s3: Management - DHCP FROM WINDOWS SERVER
>> enp0s3 VLAN 2: Registration - DHCP ENABLE
>> enp0s3 VLAN 3: Isolation - DHCP ENABLE
>> enp0s3 VLAN 10: Normal - NO DHCP
>>
>> IP Address Switch Managed: 172.16.0.50
>> Interface 11: My physical machine, and virtual machine (virtualbox) where
>> is the PacketFence (interface mode bridge)
>> Interface 23: My client test Windows 8 (interface mode bridge)
>>
>>
>> Problem continue, in the logs it returns to vlan correct, but does not
>> assign to the computer, it stubborn in assigning the network
>> 172.16.0.0/24 (Management Network).
>>
>>
>> root@packetfence ~]# tailf /usr/local/pf/logs/packetfence.log
>> Jan 2 14:03:10 packetfence packetfence_httpd.aaa: httpd.aaa(30935) INFO:
>> [mac:84:7b:eb:e3:84:42] handling radius autz request: from switch_ip =>
>> (172.16.0.50), connection_type => WIRED_MAC_AUTH,switch_mac =>
>> (14:18:77:ea:f0:a2), mac => [84:7b:eb:e3:84:42], port => 13, username =>
>> "847BEBE38442" (pf::radius::authorize)
>> Jan 2 14:03:10 packetfence packetfence_httpd.aaa: httpd.aaa(30935) INFO:
>> [mac:84:7b:eb:e3:84:42] Instantiate profile default
>> (pf::Connection::ProfileFactory::_from_profile)
>> Jan 2 14:03:10 packetfence packetfence_httpd.aaa: httpd.aaa(30935) INFO:
>> [mac:84:7b:eb:e3:84:42] is of status unreg; belongs into registration VLAN
>> (pf::role::getRegistrationRole)
>> Jan 2 14:03:10 packetfence packetfence_httpd.aaa: httpd.aaa(30935) INFO:
>> [mac:84:7b:eb:e3:84:42] (172.16.0.50) Added VLAN 2 to the returned RADIUS
>> Access-Accept (pf::Switch::returnRadiusAccessAccept)
>>
>>
>>
>> [root@packetfence ~]# tailf /usr/local/pf/logs/radius.log
>> Jan 2 14:03:10 packetfence auth[31813]: Need 1 more connections to reach
>> min connections (3)
>> Jan 2 14:03:10 packetfence auth[31813]: rlm_rest (rest): Opening
>> additional connection (15), 1 of 62 pending slots used
>> Jan 2 14:03:10 packetfence auth[31813]: Need 7 more connections to reach
>> 10 spares
>> Jan 2 14:03:10 packetfence auth[31813]: rlm_sql (sql): Opening
>> additional connection (18), 1 of 61 pending slots used
>> Jan 2 14:03:10 packetfence auth[31813]: [mac:84:7b:eb:e3:84:42] Accepted
>> user: and returned VLAN 2
>> Jan 2 14:03:10 packetfence auth[31813]: (32) Login OK: [847BEBE38442]
>> (from client 172.16.0.50 port 13 cli 84:7b:eb:e3:84:42)
>>
>>
>>
>>
>> Follow network settings:
>>
>> [root@packetfence ~]# ifconfig
>> enp0s3: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
>> inet 172.16.0.2 netmask 255.255.255.0 broadcast 172.16.0.255
>> inet6 fe80::a00:27ff:fe35:fcc4 prefixlen 64 scopeid 0x20<link>
>> ether 08:00:27:35:fc:c4 txqueuelen 1000 (Ethernet)
>> RX packets 560936 bytes 711890423 (678.9 MiB)
>> RX errors 0 dropped 0 overruns 0 frame 0
>> TX packets 153523 bytes 23163746 (22.0 MiB)
>> TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
>>
>> enp0s3.2: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
>> inet 192.168.2.2 netmask 255.255.255.0 broadcast 192.168.2.255
>> inet6 fe80::a00:27ff:fe35:fcc4 prefixlen 64 scopeid 0x20<link>
>> ether 08:00:27:35:fc:c4 txqueuelen 1000 (Ethernet)
>> RX packets 0 bytes 0 (0.0 B)
>> RX errors 0 dropped 0 overruns 0 frame 0
>> TX packets 10 bytes 732 (732.0 B)
>> TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
>>
>> enp0s3.3: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
>> inet 192.168.3.2 netmask 255.255.255.0 broadcast 192.168.3.255
>> inet6 fe80::a00:27ff:fe35:fcc4 prefixlen 64 scopeid 0x20<link>
>> ether 08:00:27:35:fc:c4 txqueuelen 1000 (Ethernet)
>> RX packets 0 bytes 0 (0.0 B)
>> RX errors 0 dropped 0 overruns 0 frame 0
>> TX packets 10 bytes 732 (732.0 B)
>> TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
>>
>> enp0s3.10: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
>> inet 192.168.1.1 netmask 255.255.255.0 broadcast 192.168.1.255
>> inet6 fe80::a00:27ff:fe35:fcc4 prefixlen 64 scopeid 0x20<link>
>> ether 08:00:27:35:fc:c4 txqueuelen 1000 (Ethernet)
>> RX packets 0 bytes 0 (0.0 B)
>> RX errors 0 dropped 0 overruns 0 frame 0
>> TX packets 10 bytes 732 (732.0 B)
>> TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
>>
>> lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
>> inet 127.0.0.1 netmask 255.0.0.0
>> inet6 ::1 prefixlen 128 scopeid 0x10<host>
>> loop txqueuelen 1 (Loopback Local)
>> RX packets 1162494 bytes 167041449 (159.3 MiB)
>> RX errors 0 dropped 0 overruns 0 frame 0
>> TX packets 1162494 bytes 167041449 (159.3 MiB)
>> TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
>>
>> [root@packetfence ~]#
>>
>>
>>
>> [root@packetfence ~]# cat /usr/local/pf/conf/networks.conf
>> [192.168.3.0]
>> dns=192.168.3.2
>> dhcp_start=192.168.3.10
>> gateway=192.168.3.2
>> domain-name=vlan-isolation.scrivener.com.br
>> nat_enabled=disabled
>> named=enabled
>> dhcp_max_lease_time=30
>> fake_mac_enabled=disabled
>> dhcpd=enabled
>> dhcp_end=192.168.3.246
>> type=vlan-isolation
>> netmask=255.255.255.0
>> dhcp_default_lease_time=30
>>
>> [192.168.2.0]
>> dns=192.168.2.2
>> dhcp_start=192.168.2.10
>> gateway=192.168.2.2
>> domain-name=vlan-registration.scrivener.com.br
>> nat_enabled=disabled
>> named=enabled
>> dhcp_max_lease_time=30
>> fake_mac_enabled=disabled
>> dhcpd=enabled
>> dhcp_end=192.168.2.246
>> type=vlan-registration
>> netmask=255.255.255.0
>> dhcp_default_lease_time=30
>> [root@packetfence ~]#
>>
>>
>>
>> [root@packetfence ~]# cat /usr/local/pf/conf/switches.conf
>> [172.16.0.50]
>> mode=production
>> defaultVlan=10
>> deauthMethod=RADIUS
>> description=SWITCH DELL - 172.16.0.50
>> type=Dell::N1500
>> radiusSecret=useStrongerSecret
>> SNMPVersion=2c
>>
>> #
>> # Copyright (C) 2005-2017 Inverse inc.
>> #
>> # See the enclosed file COPYING for license information (GPL).
>> # If you did not receive this file, see
>> # http://www.fsf.org/licensing/licenses/gpl.html
>> [192.168.0.1]
>> description=Test Switch
>> type=Cisco::Catalyst_2900XL
>> mode=production
>> uplink=23,24
>>
>> #SNMPVersion = 3
>> #SNMPEngineID = 0000000000000
>> #SNMPUserNameRead = readUser
>> #SNMPAuthProtocolRead = MD5
>> #SNMPAuthPasswordRead = authpwdread
>> #SNMPPrivProtocolRead = DES
>> #SNMPPrivPasswordRead = privpwdread
>> #SNMPUserNameWrite = writeUser
>> #SNMPAuthProtocolWrite = MD5
>> #SNMPAuthPasswordWrite = authpwdwrite
>> #SNMPPrivProtocolWrite = DES
>> #SNMPPrivPasswordWrite = privpwdwrite
>> #SNMPVersionTrap = 3
>> #SNMPUserNameTrap = readUser
>> #SNMPAuthProtocolTrap = MD5
>> #SNMPAuthPasswordTrap = authpwdread
>> #SNMPPrivProtocolTrap = DES
>> #SNMPPrivPasswordTrap = privpwdread
>> [192.168.1.0/24]
>> description=Test Range Switch
>> type=Cisco::Catalyst_2900XL
>> mode=production
>> uplink=23,24
>> [root@packetfence ~]#
>>
>>
>> Follow switch configuration:
>>
>> Following the configuration of the manual, the model of my switch is DELL
>> n1548. (https://packetfence.org/doc/PacketFence_Network_Devices_Con
>> figuration_Guide.html#_dell)
>>
>>
>> console#show running-config
>>
>> !Current Configuration:
>> !System Description "Dell Networking N1548, 6.2.6.6, Linux 3.6.5"
>> !System Software Version 6.2.6.6
>> !
>> configure
>> vlan 2-5,10,100
>> exit
>> vlan 2
>> name "Registration"
>> exit
>> vlan 3
>> name "Isolation"
>> exit
>> vlan 4
>> name "Mac detection"
>> exit
>> vlan 5
>> name "Guest"
>> exit
>> vlan 100
>> name "VoIP"
>> exit
>> stack
>> member 1 3 ! N1548
>> exit
>> interface vlan 1
>> ip address 172.16.0.50 255.255.255.0
>> exit
>> authentication enable
>> dot1x system-auth-control
>> aaa authentication dot1x default radius
>> aaa authorization network default radius
>> dot1x dynamic-vlan enable
>> voice vlan
>> aaa server radius dynamic-author
>> client 172.16.0.2 server-key "useStrongerSecret"
>> exit
>> radius-server host auth 172.16.0.2
>> name "PacketFence"
>> usage 802.1x
>> key "useStrongerSecret"
>> exit
>> !
>> interface Gi1/0/11
>> switchport mode trunk
>> switchport trunk allowed vlan 1-5,100
>> dot1x port-control force-authorized
>> exit
>> !
>> interface Gi1/0/13
>> switchport voice detect auto
>> switchport mode general
>> switchport access vlan 10
>> dot1x port-control mac-based
>> dot1x reauthentication
>> dot1x mac-auth-bypass
>> authentication order mab
>> authentication priority mab
>> lldp transmit-tlv sys-desc sys-cap
>> lldp transmit-mgmt
>> lldp notification
>> lldp med confignotification
>> voice vlan 100
>> exit
>> snmp-server engineid local 800002a203141877eaf0a0
>> snmp-server community "private" rw
>> snmp-server community "public" ro
>> exit
>>
>> console#
>>
>>
>>
>>
>> I still do not understand where the error is. Any idea
>>
>>
>> 2017-12-29 11:15 GMT-03:00 Fabrice Durand via PacketFence-users <
>> [email protected]>:
>>
>>> Hello André,
>>>
>>> First you need to check on the switch side if the mac address of the
>>> device is in the vlan 300.
>>>
>>> Next a registration vlan is a vlan managed by PacketFence, so you need
>>> to enable dhcp on the vlan 300 and 600.
>>> Another thing i can see is that the interface enp0s8.300 (vlan 300) use
>>> the network 172.17.0.0/24 and it should be 172.16.0.0/24 ?! (but enp0s8
>>> use this network).
>>>
>>> So i my opinion, you probably mess up the vlan/interface config.
>>>
>>> If enp0s8 interface is really on the vlan 300 then enp0s8.300 is useless
>>> and you probably have to use the vlan 301 as the registration network.
>>>
>>> Last things, be sure that enp0s8 is plugged on a trunk port and be sure
>>> that you define all the vlans in your switch configuration.
>>>
>>> Regards
>>> Fabrice
>>>
>>>
>>>
>>>
>>> Le 2017-12-29 à 08:50, André Scrivener via PacketFence-users a écrit :
>>>
>>> I'm configuring pf as vlan enforcement, but I'm having a problem, where
>>> vlans with their respective IPs are not being assigned. In the logs it
>>> returns the correct vlans, but does not apply to the station.
>>>
>>>
>>> *Dec 29 11:36:54 packtfence packetfence_httpd.aaa: httpd.aaa(5185) INFO:
>>> [mac:64:1c:67:82:7d:f2] handling radius autz request: from switch_ip =>
>>> (172.16.0.50), connection_type => WIRED_MAC_AUTH,switch_mac =>
>>> (14:18:77:ea:f0:a2), mac => [64:1c:67:82:7d:f2], port => 41, username =>
>>> "641C67827DF2" (pf::radius::authorize)*
>>> *Dec 29 11:36:54 packtfence packetfence_httpd.aaa: httpd.aaa(5185) INFO:
>>> [mac:64:1c:67:82:7d:f2] Instantiate profile default
>>> (pf::Connection::ProfileFactory::_from_profile)*
>>> *Dec 29 11:36:54 packtfence packetfence_httpd.aaa: httpd.aaa(5185) INFO:
>>> [mac:64:1c:67:82:7d:f2] is of status unreg; belongs into registration VLAN
>>> (pf::role::getRegistrationRole)*
>>> *Dec 29 11:36:54 packtfence packetfence_httpd.aaa: httpd.aaa(5185) INFO:
>>> [mac:64:1c:67:82:7d:f2] (172.16.0.50) Added VLAN 300 to the returned RADIUS
>>> Access-Accept (pf::Switch::returnRadiusAccessAccept)*
>>>
>>>
>>> *Dec 29 11:36:54 packtfence auth[7662]: Need 1 more connections to reach
>>> min connections (3)*
>>> *Dec 29 11:36:54 packtfence auth[7662]: rlm_rest (rest): Opening
>>> additional connection (23), 1 of 62 pending slots used*
>>> *Dec 29 11:36:54 packtfence auth[7662]: Need 1 more connections to reach
>>> min connections (3)*
>>> *Dec 29 11:36:54 packtfence auth[7662]: rlm_sql (sql): Opening
>>> additional connection (25), 1 of 62 pending slots used*
>>> *Dec 29 11:36:54 packtfence auth[7662]: [mac:64:1c:67:82:7d:f2] Accepted
>>> user: and returned VLAN 300*
>>> *Dec 29 11:36:54 packtfence auth[7662]: (44) Login OK: [641C67827DF2]
>>> (from client 172.16.0.50 port 41 cli 64:1c:67:82:7d:f2)*
>>>
>>>
>>> In the logs it returns to vlan correct, but does not assign to the
>>> computer, it stubborn in assigning the network 172.16.0.0/24.
>>>
>>> I did not configure DHCP in packetfence, when packetfence returns a vlan
>>> it is for it to get dhcp from my infrastructure. (So I imagine.)
>>>
>>> Follows some of my settings, it's okay to expose information since it's
>>> a lab.
>>>
>>>
>>> [root@packtfence ~]# ifconfig
>>> SCRIVENER-b: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
>>> inet 169.254.0.2 netmask 255.255.255.252 broadcast 169.254.0.3
>>> inet6 fe80::c8b5:5bff:febe:b1cc prefixlen 64 scopeid 0x20<link>
>>> ether ca:b5:5b:be:b1:cc txqueuelen 1000 (Ethernet)
>>> RX packets 8 bytes 648 (648.0 B)
>>> RX errors 0 dropped 0 overruns 0 frame 0
>>> TX packets 8 bytes 648 (648.0 B)
>>> TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
>>>
>>> enp0s3: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500
>>> ether 08:00:27:a3:36:2a txqueuelen 1000 (Ethernet)
>>> RX packets 5668 bytes 8119227 (7.7 MiB)
>>> RX errors 0 dropped 0 overruns 0 frame 0
>>> TX packets 1260 bytes 80253 (78.3 KiB)
>>> TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
>>>
>>> enp0s8: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
>>> inet 172.16.0.2 netmask 255.255.255.0 broadcast 172.16.0.255
>>> inet6 fe80::a00:27ff:fef4:37f8 prefixlen 64 scopeid 0x20<link>
>>> ether 08:00:27:f4:37:f8 txqueuelen 1000 (Ethernet)
>>> RX packets 20960 bytes 4119093 (3.9 MiB)
>>> RX errors 0 dropped 0 overruns 0 frame 0
>>> TX packets 12227 bytes 21064744 (20.0 MiB)
>>> TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
>>>
>>> enp0s8.300: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
>>> inet 172.17.0.2 netmask 255.255.255.0 broadcast 172.17.0.255
>>> inet6 fe80::a00:27ff:fef4:37f8 prefixlen 64 scopeid 0x20<link>
>>> ether 08:00:27:f4:37:f8 txqueuelen 1000 (Ethernet)
>>> RX packets 10 bytes 628 (628.0 B)
>>> RX errors 0 dropped 0 overruns 0 frame 0
>>> TX packets 14 bytes 900 (900.0 B)
>>> TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
>>>
>>> enp0s8.301: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
>>> inet 172.19.0.2 netmask 255.255.255.0 broadcast 172.19.0.255
>>> inet6 fe80::a00:27ff:fef4:37f8 prefixlen 64 scopeid 0x20<link>
>>> ether 08:00:27:f4:37:f8 txqueuelen 1000 (Ethernet)
>>> RX packets 10 bytes 628 (628.0 B)
>>> RX errors 0 dropped 0 overruns 0 frame 0
>>> TX packets 14 bytes 900 (900.0 B)
>>> TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
>>>
>>> enp0s8.600: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
>>> inet 172.18.0.2 netmask 255.255.255.0 broadcast 172.18.0.255
>>> inet6 fe80::a00:27ff:fef4:37f8 prefixlen 64 scopeid 0x20<link>
>>> ether 08:00:27:f4:37:f8 txqueuelen 1000 (Ethernet)
>>> RX packets 10 bytes 628 (628.0 B)
>>> RX errors 0 dropped 0 overruns 0 frame 0
>>> TX packets 14 bytes 900 (900.0 B)
>>> TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
>>>
>>> lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
>>> inet 127.0.0.1 netmask 255.0.0.0
>>> inet6 ::1 prefixlen 128 scopeid 0x10<host>
>>> loop txqueuelen 1 (Loopback Local)
>>> RX packets 1567747 bytes 224694729 (214.2 MiB)
>>> RX errors 0 dropped 0 overruns 0 frame 0
>>> TX packets 1567747 bytes 224694729 (214.2 MiB)
>>> TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
>>>
>>>
>>>
>>>
>>> [root@packtfence ~]# cat /usr/local/pf/conf/networks.conf
>>> [172.17.0.0]
>>> dns=172.17.0.2
>>> dhcp_start=172.17.0.10
>>> gateway=172.17.0.2
>>> domain-name=vlan-registration.scrivener.com.br
>>> nat_enabled=disabled
>>> named=enabled
>>> dhcp_max_lease_time=30
>>> fake_mac_enabled=disabled
>>> dhcpd=disabled
>>> dhcp_end=172.17.0.246
>>> type=vlan-registration
>>> netmask=255.255.255.0
>>> dhcp_default_lease_time=30
>>>
>>> [172.18.0.0]
>>> dns=172.18.0.2
>>> dhcp_start=172.18.0.10
>>> gateway=172.18.0.2
>>> domain-name=vlan-isolation.scrivener.com.br
>>> nat_enabled=disabled
>>> named=enabled
>>> dhcp_max_lease_time=30
>>> fake_mac_enabled=disabled
>>> dhcpd=disabled
>>> dhcp_end=172.18.0.246
>>> type=vlan-isolation
>>> netmask=255.255.255.0
>>> dhcp_default_lease_time=30
>>>
>>>
>>>
>>>
>>>
>>> [root@packtfence ~]# cat /usr/local/pf/conf/switches.conf
>>> #
>>> # Copyright (C) 2005-2017 Inverse inc.
>>> #
>>> # See the enclosed file COPYING for license information (GPL).
>>> # If you did not receive this file, see
>>> # http://www.fsf.org/licensing/licenses/gpl.html
>>> [default]
>>> type=Dell::N1500
>>> registrationVlan=300
>>> isolationVlan=600
>>> uplink=5
>>> cliUser=[secret]
>>> cliPwd=[secret]
>>> cliEnablePwd=[secret]
>>> #
>>> # SNMP section
>>> #
>>> # PacketFence -> Switch
>>> SNMPVersion=2c
>>> #
>>> # RADIUS NAS Client config
>>> #
>>> # RADIUS shared secret with switch
>>> radiusSecret=teste123
>>> CORPORATIVOVlan=301
>>> uplink_dynamic=0
>>>
>>> [172.16.0.50]
>>> mode=production
>>> description=172.16.0.50
>>> ExternalPortalEnforcement=Y
>>> deauthMethod=Telnet
>>> cliAccess=Y
>>> defaultVlan=301
>>>
>>>
>>>
>>> Any can help? Please! My Christmas present and New Year's Eve.
>>>
>>>
>>>
>>>
>>> Att,
>>> Andre Scrivener
>>>
>>>
>>> ------------------------------------------------------------------------------
>>> Check out the vibrant tech community on one of the world's most
>>> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
>>>
>>>
>>>
>>> _______________________________________________
>>> PacketFence-users mailing
>>> [email protected]https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>
>>>
>>> --
>>> Fabrice [email protected] :: +1.514.447.4918 (x135) ::
>>> www.inverse.ca
>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence
>>> (http://packetfence.org)
>>>
>>>
>>> ------------------------------------------------------------
>>> ------------------
>>> Check out the vibrant tech community on one of the world's most
>>> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
>>> _______________________________________________
>>> PacketFence-users mailing list
>>> [email protected]
>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>
>>>
>>
>>
>> --
>> Att
>> *Andre*
>>
>
>
>
> --
> Att
> *Andre*
>
>
> --
> Fabrice [email protected] :: +1.514.447.4918 (x135) :: www.inverse.ca
> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence
> (http://packetfence.org)
>
>
--
Att
*Andre Scrivener*
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users