Can you post your entire switch config (scrubbed of sensitive info) and your 
/usr/local/pf/conf/switches.conf file?

Thanks,
Tim

Sent from mobile phone

> On Jan 4, 2018, at 07:19, André Scrivener <[email protected]> wrote:
> 
> Timonthy, 
> 
> After I changed to radius, I no longer look these error logs. Thank you!
> 
> 
> But... the problem assign ip address vlan register...to be continued!
> 
> I'm thinking it's some problem between the switch and packetfence.   :(
> 
> I am very excited for this solution, but I stop at this problem.
> 
> I will still update the firmware of the switch!!
> 
> 
>      
> 
> 2018-01-03 19:24 GMT-03:00 Timothy Mullican <[email protected]>:
>> André,
>> 
>> The message “Until CoA is implemented we will bounce the port on VLAN 
>> re-assignment traps for MAC-Auth 
>> (pf::Switch::handleReAssignVlanTrapForWiredMacAuth)” is thrown because your 
>> deauthentication method for the Switch (in PacketFence) is set to SNMP (see 
>> handleReAssignVlanTrapForWiredMacAuth in /usr/local/pf/lib/pf/Switch.pm and 
>> /usr/local/pf/lib/pf/Switch/Dell/N1500.pm).
>> 
>> Try changing your de-authentication method on the switch (under 
>> Configuration) in PacketFence to RADIUS and specify the secret key. Please 
>> let me know if this doesn’t work. 
>> 
>> Thanks,
>> Tim 
>> 
>> Sent from mobile phone
>> 
>>> On Jan 3, 2018, at 14:59, André Scrivener via PacketFence-users 
>>> <[email protected]> wrote:
>>> 
>>> Fabrice,
>>> 
>>> I used the configuration sent, still gave an error.
>>> 
>>> I saw some new logs:
>>> 
>>> Jan  3 18:41:44 packetfence pfqueue: pfqueue(25669) WARN: 
>>> [mac:84:7b:eb:e3:84:42] Until CoA is implemented we will bounce the port on 
>>> VLAN re-assignment traps for MAC-Auth 
>>> (pf::Switch::handleReAssignVlanTrapForWiredMacAuth)
>>> 
>>> You know, do you explain what it would be?
>>> 
>>> Soon I will update the firmware of the switch, to see if it resolves.
>>> 
>>> Is it also not a bug in the packetfence version? Did you hear from anyone 
>>> else with this problem?
>>> 
>>> Greetings!
>>> 
>>> 
>>> 
>>> 2018-01-03 17:24 GMT-03:00 Fabrice Durand <[email protected]>:
>>>> Hello André,
>>>> 
>>>> yes i did that a long time ago:
>>>> 
>>>> https://github.com/inverse-inc/packetfence/commit/9d47649dd8d133b233d313d2c80e94421c38caaa#diff-53248f7bb6c533be6a5b55ec361b3238
>>>> 
>>>> Also the note i took:
>>>> 
>>>> 1 Enter global configuration mode and define the RADIUS server.
>>>> 
>>>> console#configure
>>>> console(config)#radius-server host auth 10.34.200.30
>>>> console(Config-auth-radius)#name PacketFence
>>>> console(Config-auth-radius)#usage 802.1x
>>>> console(Config-auth-radius)#key s3cr3t
>>>> console(Config-auth-radius)#exit
>>>> console(Config)#aaa server radius dynamic-author
>>>> console(config-radius-da)#client 10.34.200.30 server-key s3cr3t
>>>> console(config-radius-da)#auth-type all
>>>> console(config-radius-da)#exit
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 2 Enable authentication and globally enable 802.1x client authentication 
>>>> via RADIUS:
>>>> 
>>>> console(config)#authentication enable
>>>> console(config)#aaa authentication dot1x default radius
>>>> console(config)#aaa authorization network default radius
>>>> console(config)#dot1x system-auth-control
>>>> 
>>>> (Optional)
>>>> console(Config)#dot1x dynamic-vlan enable
>>>> 
>>>> 3 On the interface, enable MAC based authentication mode, enable MAB, and 
>>>> set the order of authentication to 802.1X followed by MAC authentication. 
>>>> Also enable periodic re-authentication.
>>>> 
>>>> console(config)#interface te1/0/4
>>>> console(config-if-Te1/0/4)#dot1x port-control mac-based
>>>> console(config-if-Te1/0/4)#dot1x mac-auth-bypass
>>>> console(config-if-Te1/0/4)#authentication order dot1x mab
>>>> console(config-if-Te1/0/4)#dot1x reauthentication
>>>> console(config-if-Te1/0/4)#exit
>>>> 
>>>> authentication order mab
>>>> authentication priority mab
>>>> 
>>>> 
>>>> 
>>>>> Le 2018-01-03 à 09:18, André Scrivener a écrit :
>>>>> Hey,
>>>>> 
>>>>> I configured interface 15 manually to use only vlan 2 (registry), and I 
>>>>> was assigned registry address addressing (192.168.2.0/24)
>>>>> 
>>>>> Following config switch:
>>>>> 
>>>>> interface Gi1/0/15
>>>>> switchport access vlan 2
>>>>> dot1x port-control force-authorized
>>>>> exit   
>>>>> 
>>>>> 
>>>>> Following logs packetfence:
>>>>> 
>>>>> Jan  3 12:14:41 packetfence pfqueue: pfqueue(24777) INFO: 
>>>>> [mac:84:7b:eb:e3:84:42] oldip (172.16.0.10) and newip (192.168.2.10) are 
>>>>> different for 84:7b:eb:e3:84:42 - closing ip4log entry 
>>>>> (pf::api::update_ip4log)
>>>>> 
>>>>> 
>>>>> 
>>>>> console#show mac address-table  vlan 2
>>>>> 
>>>>> Aging time is 300 Sec
>>>>> 
>>>>> Vlan     Mac Address           Type        Port
>>>>> -------- --------------------- ----------- ---------------------
>>>>> 2        0800.2735.FCC4        Dynamic     Gi1/0/11 - Packetfence
>>>>> 2        847B.EBE3.8442        Dynamic     Gi1/0/15 - Test machine
>>>>> 
>>>>> 
>>>>> You may notice that now the mac address of packetfence is in vlan 2.
>>>>> 
>>>>> Have you already configured dell switch switches?
>>>>> 
>>>>> Any idea??
>>>>> 
>>>>> 
>>>>> 2018-01-03 10:59 GMT-03:00 Fabrice Durand <[email protected]>:
>>>>>> Hum strange.
>>>>>> 
>>>>>> What you can try is to define an interface in the vlan 2 (manually on an 
>>>>>> switch port) and plug your test machine in it. (you must receive an ip 
>>>>>> from PacketFence).
>>>>>> If you receive an ip from the 172.16.0.0/24 then it mean that you have a 
>>>>>> switch configuration issue. (any layer 3 interfaces defined in the vlan 
>>>>>> 2 ?).
>>>>>> 
>>>>>> Also what i can see is that there is no mac in the vlan 2 and the vlan 3 
>>>>>> for the interface 11.
>>>>>> 
>>>>>> You should have something like that too:
>>>>>> 
>>>>>> 2 08:00:27:35:fc:c4 Dynamic     Gi1/0/11 - PacketFence Reg
>>>>>> 
>>>>>> 3 08:00:27:35:fc:c4 Dynamic     Gi1/0/11 - PacketFence Isol
>>>>>> 
>>>>>> Regards
>>>>>> Fabrice
>>>>>> 
>>>>>> 
>>>>>>> Le 2018-01-02 à 13:55, André Scrivener a écrit :
>>>>>>> Opss, Fabrice!
>>>>>>> 
>>>>>>> I forgot an information, the MAC addresses on the switch.
>>>>>>> 
>>>>>>> By the logs, it is in VLAN 2, the correct vlan.
>>>>>>> 
>>>>>>> Right now I do not understand, because it does not assign the correct 
>>>>>>> address
>>>>>>> 
>>>>>>> 
>>>>>>> console#show mac address-table           
>>>>>>> 
>>>>>>> Aging time is 300 Sec
>>>>>>> 
>>>>>>> Vlan     Mac Address           Type        Port
>>>>>>> -------- --------------------- ----------- ---------------------
>>>>>>> 1        0800.2700.58E2        Dynamic     Gi1/0/11 - Windows Server 
>>>>>>> 2008
>>>>>>> 1        0800.2735.FCC4        Dynamic     Gi1/0/11 - PacketFence
>>>>>>> 1        1418.77EA.F0A3        Management  Vl1      - Switch Dell
>>>>>>> 1        641C.XXXXXXXXX        Dynamic     Gi1/0/11 - My physical pc
>>>>>>> 2        847B.EBE3.8442        Dynamic     Gi1/0/13 - My test machine
>>>>>>> 
>>>>>>> Total MAC Addresses in use: 5
>>>>>>> 
>>>>>>> console#show mac address-table interface Gi1/0/13
>>>>>>> 
>>>>>>> Aging time is 300 Sec
>>>>>>> 
>>>>>>> Vlan     Mac Address           Type        Port
>>>>>>> -------- --------------------- ----------- ---------------------
>>>>>>> 2        847B.EBE3.8442        Dynamic     Gi1/0/13 - My test machine
>>>>>>> 
>>>>>>> 
>>>>>>> console#
>>>>>>> 
>>>>>>> 
>>>>>>> 2018-01-02 15:22 GMT-03:00 André Scrivener <[email protected]>:
>>>>>>>> Hello Fabrice, 
>>>>>>>> 
>>>>>>>> I simplified the environment, I'm using only 1 interface!
>>>>>>>> 
>>>>>>>> 
>>>>>>>> enp0s3:             Management - DHCP FROM WINDOWS SERVER
>>>>>>>> enp0s3 VLAN 2: Registration  - DHCP ENABLE
>>>>>>>> enp0s3 VLAN 3: Isolation       - DHCP ENABLE
>>>>>>>> enp0s3 VLAN 10: Normal       - NO DHCP
>>>>>>>> 
>>>>>>>> IP Address Switch Managed: 172.16.0.50
>>>>>>>> Interface 11: My physical machine, and virtual machine (virtualbox) 
>>>>>>>> where is the PacketFence  (interface mode bridge)
>>>>>>>> Interface 23: My client test Windows 8 (interface mode bridge)
>>>>>>>> 
>>>>>>>> 
>>>>>>>> Problem continue, in the logs it returns to vlan correct, but does not 
>>>>>>>> assign to the computer, it stubborn in assigning the network 
>>>>>>>> 172.16.0.0/24 (Management Network).
>>>>>>>> 
>>>>>>>> 
>>>>>>>> root@packetfence ~]# tailf  /usr/local/pf/logs/packetfence.log
>>>>>>>> Jan  2 14:03:10 packetfence packetfence_httpd.aaa: httpd.aaa(30935) 
>>>>>>>> INFO: [mac:84:7b:eb:e3:84:42] handling radius autz request: from 
>>>>>>>> switch_ip => (172.16.0.50), connection_type => 
>>>>>>>> WIRED_MAC_AUTH,switch_mac => (14:18:77:ea:f0:a2), mac => 
>>>>>>>> [84:7b:eb:e3:84:42], port => 13, username => "847BEBE38442" 
>>>>>>>> (pf::radius::authorize)
>>>>>>>> Jan  2 14:03:10 packetfence packetfence_httpd.aaa: httpd.aaa(30935) 
>>>>>>>> INFO: [mac:84:7b:eb:e3:84:42] Instantiate                              
>>>>>>>>        profile default (pf::Connection::ProfileFactory::_from_profile)
>>>>>>>> Jan  2 14:03:10 packetfence packetfence_httpd.aaa: httpd.aaa(30935) 
>>>>>>>> INFO: [mac:84:7b:eb:e3:84:42] is of status unreg; belongs into 
>>>>>>>> registration VLAN (pf::role::getRegistrationRole)
>>>>>>>> Jan  2 14:03:10 packetfence packetfence_httpd.aaa: httpd.aaa(30935) 
>>>>>>>> INFO: [mac:84:7b:eb:e3:84:42] (172.16.0.50) Added VLAN 2 to the 
>>>>>>>> returned RADIUS Access-Accept (pf::Switch::returnRadiusAccessAccept)
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> [root@packetfence ~]# tailf  /usr/local/pf/logs/radius.log 
>>>>>>>> Jan  2 14:03:10 packetfence auth[31813]: Need 1 more connections to 
>>>>>>>> reach min connections (3)
>>>>>>>> Jan  2 14:03:10 packetfence auth[31813]: rlm_rest (rest): Opening 
>>>>>>>> additional connection (15), 1 of 62 pending slots used
>>>>>>>> Jan  2 14:03:10 packetfence auth[31813]: Need 7 more connections to 
>>>>>>>> reach 10 spares
>>>>>>>> Jan  2 14:03:10 packetfence auth[31813]: rlm_sql (sql): Opening 
>>>>>>>> additional connection (18), 1 of 61 pending slots used
>>>>>>>> Jan  2 14:03:10 packetfence auth[31813]: [mac:84:7b:eb:e3:84:42] 
>>>>>>>> Accepted user:  and returned VLAN 2
>>>>>>>> Jan  2 14:03:10 packetfence auth[31813]: (32) Login OK: [847BEBE38442] 
>>>>>>>> (from client 172.16.0.50 port 13 cli 84:7b:eb:e3:84:42)
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> Follow network settings:
>>>>>>>> 
>>>>>>>> [root@packetfence ~]# ifconfig 
>>>>>>>> enp0s3: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
>>>>>>>>         inet 172.16.0.2  netmask 255.255.255.0  broadcast 172.16.0.255
>>>>>>>>         inet6 fe80::a00:27ff:fe35:fcc4  prefixlen 64  scopeid 
>>>>>>>> 0x20<link>
>>>>>>>>         ether 08:00:27:35:fc:c4  txqueuelen 1000  (Ethernet)
>>>>>>>>         RX packets 560936  bytes 711890423 (678.9 MiB)
>>>>>>>>         RX errors 0  dropped 0  overruns 0  frame 0
>>>>>>>>         TX packets 153523  bytes 23163746 (22.0 MiB)
>>>>>>>>         TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>>>>>>>> 
>>>>>>>> enp0s3.2: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
>>>>>>>>         inet 192.168.2.2  netmask 255.255.255.0  broadcast 
>>>>>>>> 192.168.2.255
>>>>>>>>         inet6 fe80::a00:27ff:fe35:fcc4  prefixlen 64  scopeid 
>>>>>>>> 0x20<link>
>>>>>>>>         ether 08:00:27:35:fc:c4  txqueuelen 1000  (Ethernet)
>>>>>>>>         RX packets 0  bytes 0 (0.0 B)
>>>>>>>>         RX errors 0  dropped 0  overruns 0  frame 0
>>>>>>>>         TX packets 10  bytes 732 (732.0 B)
>>>>>>>>         TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>>>>>>>> 
>>>>>>>> enp0s3.3: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
>>>>>>>>         inet 192.168.3.2  netmask 255.255.255.0  broadcast 
>>>>>>>> 192.168.3.255
>>>>>>>>         inet6 fe80::a00:27ff:fe35:fcc4  prefixlen 64  scopeid 
>>>>>>>> 0x20<link>
>>>>>>>>         ether 08:00:27:35:fc:c4  txqueuelen 1000  (Ethernet)
>>>>>>>>         RX packets 0  bytes 0 (0.0 B)
>>>>>>>>         RX errors 0  dropped 0  overruns 0  frame 0
>>>>>>>>         TX packets 10  bytes 732 (732.0 B)
>>>>>>>>         TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>>>>>>>> 
>>>>>>>> enp0s3.10: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
>>>>>>>>         inet 192.168.1.1  netmask 255.255.255.0  broadcast 
>>>>>>>> 192.168.1.255
>>>>>>>>         inet6 fe80::a00:27ff:fe35:fcc4  prefixlen 64  scopeid 
>>>>>>>> 0x20<link>
>>>>>>>>         ether 08:00:27:35:fc:c4  txqueuelen 1000  (Ethernet)
>>>>>>>>         RX packets 0  bytes 0 (0.0 B)
>>>>>>>>         RX errors 0  dropped 0  overruns 0  frame 0
>>>>>>>>         TX packets 10  bytes 732 (732.0 B)
>>>>>>>>         TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>>>>>>>> 
>>>>>>>> lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
>>>>>>>>         inet 127.0.0.1  netmask 255.0.0.0
>>>>>>>>         inet6 ::1  prefixlen 128  scopeid 0x10<host>
>>>>>>>>         loop  txqueuelen 1  (Loopback Local)
>>>>>>>>         RX packets 1162494  bytes 167041449 (159.3 MiB)
>>>>>>>>         RX errors 0  dropped 0  overruns 0  frame 0
>>>>>>>>         TX packets 1162494  bytes 167041449 (159.3 MiB)
>>>>>>>>         TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>>>>>>>> 
>>>>>>>> [root@packetfence ~]# 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> [root@packetfence ~]# cat /usr/local/pf/conf/networks.conf
>>>>>>>> [192.168.3.0]
>>>>>>>> dns=192.168.3.2
>>>>>>>> dhcp_start=192.168.3.10
>>>>>>>> gateway=192.168.3.2
>>>>>>>> domain-name=vlan-isolation.scrivener.com.br
>>>>>>>> nat_enabled=disabled
>>>>>>>> named=enabled
>>>>>>>> dhcp_max_lease_time=30
>>>>>>>> fake_mac_enabled=disabled
>>>>>>>> dhcpd=enabled
>>>>>>>> dhcp_end=192.168.3.246
>>>>>>>> type=vlan-isolation
>>>>>>>> netmask=255.255.255.0
>>>>>>>> dhcp_default_lease_time=30
>>>>>>>> 
>>>>>>>> [192.168.2.0]
>>>>>>>> dns=192.168.2.2
>>>>>>>> dhcp_start=192.168.2.10
>>>>>>>> gateway=192.168.2.2
>>>>>>>> domain-name=vlan-registration.scrivener.com.br
>>>>>>>> nat_enabled=disabled
>>>>>>>> named=enabled
>>>>>>>> dhcp_max_lease_time=30
>>>>>>>> fake_mac_enabled=disabled
>>>>>>>> dhcpd=enabled
>>>>>>>> dhcp_end=192.168.2.246
>>>>>>>> type=vlan-registration
>>>>>>>> netmask=255.255.255.0
>>>>>>>> dhcp_default_lease_time=30
>>>>>>>> [root@packetfence ~]# 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> [root@packetfence ~]# cat /usr/local/pf/conf/switches.conf
>>>>>>>> [172.16.0.50]
>>>>>>>> mode=production
>>>>>>>> defaultVlan=10
>>>>>>>> deauthMethod=RADIUS
>>>>>>>> description=SWITCH DELL - 172.16.0.50
>>>>>>>> type=Dell::N1500
>>>>>>>> radiusSecret=useStrongerSecret
>>>>>>>> SNMPVersion=2c
>>>>>>>> 
>>>>>>>> #
>>>>>>>> # Copyright (C) 2005-2017 Inverse inc.
>>>>>>>> #
>>>>>>>> # See the enclosed file COPYING for license information (GPL).
>>>>>>>> # If you did not receive this file, see
>>>>>>>> # http://www.fsf.org/licensing/licenses/gpl.html
>>>>>>>> [192.168.0.1]
>>>>>>>> description=Test Switch
>>>>>>>> type=Cisco::Catalyst_2900XL
>>>>>>>> mode=production
>>>>>>>> uplink=23,24
>>>>>>>> 
>>>>>>>> #SNMPVersion = 3
>>>>>>>> #SNMPEngineID = 0000000000000
>>>>>>>> #SNMPUserNameRead = readUser
>>>>>>>> #SNMPAuthProtocolRead = MD5
>>>>>>>> #SNMPAuthPasswordRead = authpwdread
>>>>>>>> #SNMPPrivProtocolRead = DES 
>>>>>>>> #SNMPPrivPasswordRead = privpwdread
>>>>>>>> #SNMPUserNameWrite = writeUser
>>>>>>>> #SNMPAuthProtocolWrite = MD5
>>>>>>>> #SNMPAuthPasswordWrite = authpwdwrite
>>>>>>>> #SNMPPrivProtocolWrite = DES 
>>>>>>>> #SNMPPrivPasswordWrite = privpwdwrite
>>>>>>>> #SNMPVersionTrap = 3
>>>>>>>> #SNMPUserNameTrap = readUser
>>>>>>>> #SNMPAuthProtocolTrap = MD5
>>>>>>>> #SNMPAuthPasswordTrap = authpwdread
>>>>>>>> #SNMPPrivProtocolTrap = DES
>>>>>>>> #SNMPPrivPasswordTrap = privpwdread
>>>>>>>> [192.168.1.0/24]
>>>>>>>> description=Test Range Switch
>>>>>>>> type=Cisco::Catalyst_2900XL
>>>>>>>> mode=production
>>>>>>>> uplink=23,24
>>>>>>>> [root@packetfence ~]# 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> Follow switch configuration: 
>>>>>>>> 
>>>>>>>> Following the configuration of the manual, the model of my switch is 
>>>>>>>> DELL n1548. 
>>>>>>>> (https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_dell)
>>>>>>>> 
>>>>>>>> 
>>>>>>>> console#show running-config 
>>>>>>>> 
>>>>>>>> !Current Configuration:
>>>>>>>> !System Description "Dell Networking N1548, 6.2.6.6, Linux 3.6.5"
>>>>>>>> !System Software Version 6.2.6.6
>>>>>>>> !
>>>>>>>> configure
>>>>>>>> vlan 2-5,10,100
>>>>>>>> exit
>>>>>>>> vlan 2
>>>>>>>> name "Registration"
>>>>>>>> exit
>>>>>>>> vlan 3
>>>>>>>> name "Isolation"
>>>>>>>> exit
>>>>>>>> vlan 4
>>>>>>>> name "Mac detection"
>>>>>>>> exit
>>>>>>>> vlan 5
>>>>>>>> name "Guest"
>>>>>>>> exit
>>>>>>>> vlan 100
>>>>>>>> name "VoIP"
>>>>>>>> exit
>>>>>>>> stack             
>>>>>>>> member 1 3    ! N1548
>>>>>>>> exit              
>>>>>>>> interface vlan 1  
>>>>>>>> ip address 172.16.0.50 255.255.255.0
>>>>>>>> exit              
>>>>>>>> authentication enable
>>>>>>>> dot1x system-auth-control
>>>>>>>> aaa authentication dot1x default radius
>>>>>>>> aaa authorization network default radius
>>>>>>>> dot1x dynamic-vlan enable
>>>>>>>> voice vlan        
>>>>>>>> aaa server radius dynamic-author
>>>>>>>> client 172.16.0.2 server-key "useStrongerSecret"
>>>>>>>> exit              
>>>>>>>> radius-server host auth 172.16.0.2
>>>>>>>> name "PacketFence"
>>>>>>>> usage 802.1x      
>>>>>>>> key "useStrongerSecret"
>>>>>>>> exit              
>>>>>>>> !                 
>>>>>>>> interface Gi1/0/11
>>>>>>>> switchport mode trunk
>>>>>>>> switchport trunk allowed vlan 1-5,100
>>>>>>>> dot1x port-control force-authorized
>>>>>>>> exit              
>>>>>>>> !                 
>>>>>>>> interface Gi1/0/13
>>>>>>>> switchport voice detect auto
>>>>>>>> switchport mode general
>>>>>>>> switchport access vlan 10
>>>>>>>> dot1x port-control mac-based
>>>>>>>> dot1x reauthentication
>>>>>>>> dot1x mac-auth-bypass
>>>>>>>> authentication order mab
>>>>>>>> authentication priority mab
>>>>>>>> lldp transmit-tlv sys-desc sys-cap
>>>>>>>> lldp transmit-mgmt
>>>>>>>> lldp notification 
>>>>>>>> lldp med confignotification
>>>>>>>> voice vlan 100    
>>>>>>>> exit              
>>>>>>>> snmp-server engineid local 800002a203141877eaf0a0
>>>>>>>> snmp-server community "private" rw
>>>>>>>> snmp-server community "public" ro
>>>>>>>> exit              
>>>>>>>> 
>>>>>>>> console#
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> I still do not understand where the error is. Any idea
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 2017-12-29 11:15 GMT-03:00 Fabrice Durand via PacketFence-users 
>>>>>>>> <[email protected]>:
>>>>>>>>> Hello André,
>>>>>>>>> 
>>>>>>>>> First you need to check on the switch side if the mac address of the 
>>>>>>>>> device is in the vlan 300.
>>>>>>>>> 
>>>>>>>>> Next a registration vlan is a vlan managed by PacketFence, so you 
>>>>>>>>> need to enable dhcp on the vlan 300 and 600.
>>>>>>>>> Another thing i can see is that the interface enp0s8.300 (vlan 300) 
>>>>>>>>> use the network 172.17.0.0/24 and it should be 172.16.0.0/24 ?! (but 
>>>>>>>>> enp0s8 use this network).
>>>>>>>>> 
>>>>>>>>> So i my opinion, you probably mess up the vlan/interface config.
>>>>>>>>> 
>>>>>>>>> If enp0s8 interface is really on the vlan 300 then enp0s8.300 is 
>>>>>>>>> useless and you probably have to use the vlan 301 as the registration 
>>>>>>>>> network.
>>>>>>>>> 
>>>>>>>>> Last things, be sure that enp0s8 is plugged on a trunk port and be 
>>>>>>>>> sure that you define all the vlans in your switch configuration.
>>>>>>>>> 
>>>>>>>>> Regards
>>>>>>>>> Fabrice
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> Le 2017-12-29 à 08:50, André Scrivener via PacketFence-users a écrit :
>>>>>>>>>> I'm configuring pf as vlan enforcement, but I'm having a problem, 
>>>>>>>>>> where vlans with their respective IPs are not being assigned. In the 
>>>>>>>>>> logs it returns the correct vlans, but does not apply to the station.
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> Dec 29 11:36:54 packtfence packetfence_httpd.aaa: httpd.aaa(5185) 
>>>>>>>>>> INFO: [mac:64:1c:67:82:7d:f2] handling radius autz request: from 
>>>>>>>>>> switch_ip => (172.16.0.50), connection_type => 
>>>>>>>>>> WIRED_MAC_AUTH,switch_mac => (14:18:77:ea:f0:a2), mac => 
>>>>>>>>>> [64:1c:67:82:7d:f2], port => 41, username => "641C67827DF2" 
>>>>>>>>>> (pf::radius::authorize)
>>>>>>>>>> Dec 29 11:36:54 packtfence packetfence_httpd.aaa: httpd.aaa(5185) 
>>>>>>>>>> INFO: [mac:64:1c:67:82:7d:f2] Instantiate profile default 
>>>>>>>>>> (pf::Connection::ProfileFactory::_from_profile)
>>>>>>>>>> Dec 29 11:36:54 packtfence packetfence_httpd.aaa: httpd.aaa(5185) 
>>>>>>>>>> INFO: [mac:64:1c:67:82:7d:f2] is of status unreg; belongs into 
>>>>>>>>>> registration VLAN (pf::role::getRegistrationRole)
>>>>>>>>>> Dec 29 11:36:54 packtfence packetfence_httpd.aaa: httpd.aaa(5185) 
>>>>>>>>>> INFO: [mac:64:1c:67:82:7d:f2] (172.16.0.50) Added VLAN 300 to the 
>>>>>>>>>> returned RADIUS Access-Accept (pf::Switch::returnRadiusAccessAccept)
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> Dec 29 11:36:54 packtfence auth[7662]:                               
>>>>>>>>>>                             Need 1 more connections to reach min 
>>>>>>>>>> connections (3)
>>>>>>>>>> Dec 29 11:36:54 packtfence auth[7662]:                               
>>>>>>>>>>                             rlm_rest (rest): Opening additional 
>>>>>>>>>> connection (23), 1 of 62 pending slots used
>>>>>>>>>> Dec 29 11:36:54 packtfence auth[7662]:                               
>>>>>>>>>>                             Need 1 more connections to reach min 
>>>>>>>>>> connections (3)
>>>>>>>>>> Dec 29 11:36:54 packtfence auth[7662]:                               
>>>>>>>>>>                             rlm_sql (sql): Opening additional 
>>>>>>>>>> connection (25), 1 of 62 pending slots used
>>>>>>>>>> Dec 29 11:36:54 packtfence auth[7662]:                               
>>>>>>>>>>                             [mac:64:1c:67:82:7d:f2] Accepted user:  
>>>>>>>>>> and returned VLAN 300
>>>>>>>>>> Dec 29 11:36:54 packtfence auth[7662]:                               
>>>>>>>>>>                             (44) Login OK: [641C67827DF2] (from 
>>>>>>>>>> client 172.16.0.50 port 41 cli 64:1c:67:82:7d:f2)
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> In the logs it returns to vlan correct, but does not assign to the 
>>>>>>>>>> computer, it stubborn in assigning the network 172.16.0.0/24.
>>>>>>>>>> 
>>>>>>>>>> I did not configure DHCP in packetfence, when packetfence returns a 
>>>>>>>>>> vlan it is for it to get dhcp from my infrastructure. (So I imagine.)
>>>>>>>>>> 
>>>>>>>>>> Follows some of my settings, it's okay to expose information since 
>>>>>>>>>> it's a lab.
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> [root@packtfence ~]# ifconfig 
>>>>>>>>>> SCRIVENER-b: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
>>>>>>>>>>         inet 169.254.0.2  netmask 255.255.255.252  broadcast 
>>>>>>>>>> 169.254.0.3
>>>>>>>>>>         inet6 fe80::c8b5:5bff:febe:b1cc  prefixlen 64  scopeid 
>>>>>>>>>> 0x20<link>
>>>>>>>>>>         ether ca:b5:5b:be:b1:cc  txqueuelen 1000  (Ethernet)
>>>>>>>>>>         RX packets 8  bytes 648 (648.0 B)
>>>>>>>>>>         RX errors 0  dropped 0  overruns 0  frame 0
>>>>>>>>>>         TX packets 8  bytes 648 (648.0 B)
>>>>>>>>>>         TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>>>>>>>>>> 
>>>>>>>>>> enp0s3: flags=4099<UP,BROADCAST,MULTICAST>  mtu 1500
>>>>>>>>>>         ether 08:00:27:a3:36:2a  txqueuelen 1000  (Ethernet)
>>>>>>>>>>         RX packets 5668  bytes 8119227 (7.7 MiB)
>>>>>>>>>>         RX errors 0  dropped 0  overruns 0  frame 0
>>>>>>>>>>         TX packets 1260  bytes 80253 (78.3 KiB)
>>>>>>>>>>         TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>>>>>>>>>> 
>>>>>>>>>> enp0s8: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
>>>>>>>>>>         inet 172.16.0.2  netmask 255.255.255.0  broadcast 
>>>>>>>>>> 172.16.0.255
>>>>>>>>>>         inet6 fe80::a00:27ff:fef4:37f8  prefixlen 64  scopeid 
>>>>>>>>>> 0x20<link>
>>>>>>>>>>         ether 08:00:27:f4:37:f8  txqueuelen 1000  (Ethernet)
>>>>>>>>>>         RX packets 20960  bytes 4119093 (3.9 MiB)
>>>>>>>>>>         RX errors 0  dropped 0  overruns 0  frame 0
>>>>>>>>>>         TX packets 12227  bytes 21064744 (20.0 MiB)
>>>>>>>>>>         TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>>>>>>>>>> 
>>>>>>>>>> enp0s8.300: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
>>>>>>>>>>         inet 172.17.0.2  netmask 255.255.255.0  broadcast 
>>>>>>>>>> 172.17.0.255
>>>>>>>>>>         inet6 fe80::a00:27ff:fef4:37f8  prefixlen 64  scopeid 
>>>>>>>>>> 0x20<link>
>>>>>>>>>>         ether 08:00:27:f4:37:f8  txqueuelen 1000  (Ethernet)
>>>>>>>>>>         RX packets 10  bytes 628 (628.0 B)
>>>>>>>>>>         RX errors 0  dropped 0  overruns 0  frame 0
>>>>>>>>>>         TX packets 14  bytes 900 (900.0 B)
>>>>>>>>>>         TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>>>>>>>>>> 
>>>>>>>>>> enp0s8.301: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
>>>>>>>>>>         inet 172.19.0.2  netmask 255.255.255.0  broadcast 
>>>>>>>>>> 172.19.0.255
>>>>>>>>>>         inet6 fe80::a00:27ff:fef4:37f8  prefixlen 64  scopeid 
>>>>>>>>>> 0x20<link>
>>>>>>>>>>         ether 08:00:27:f4:37:f8  txqueuelen 1000  (Ethernet)
>>>>>>>>>>         RX packets 10  bytes 628 (628.0 B)
>>>>>>>>>>         RX errors 0  dropped 0  overruns 0  frame 0
>>>>>>>>>>         TX packets 14  bytes 900 (900.0 B)
>>>>>>>>>>         TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>>>>>>>>>> 
>>>>>>>>>> enp0s8.600: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
>>>>>>>>>>         inet 172.18.0.2  netmask 255.255.255.0  broadcast 
>>>>>>>>>> 172.18.0.255
>>>>>>>>>>         inet6 fe80::a00:27ff:fef4:37f8  prefixlen 64  scopeid 
>>>>>>>>>> 0x20<link>
>>>>>>>>>>         ether 08:00:27:f4:37:f8  txqueuelen 1000  (Ethernet)
>>>>>>>>>>         RX packets 10  bytes 628 (628.0 B)
>>>>>>>>>>         RX errors 0  dropped 0  overruns 0  frame 0
>>>>>>>>>>         TX packets 14  bytes 900 (900.0 B)
>>>>>>>>>>         TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>>>>>>>>>> 
>>>>>>>>>> lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
>>>>>>>>>>         inet 127.0.0.1  netmask 255.0.0.0
>>>>>>>>>>         inet6 ::1  prefixlen 128  scopeid 0x10<host>
>>>>>>>>>>         loop  txqueuelen 1  (Loopback Local)
>>>>>>>>>>         RX packets 1567747  bytes 224694729 (214.2 MiB)
>>>>>>>>>>         RX errors 0  dropped 0  overruns 0  frame 0
>>>>>>>>>>         TX packets 1567747  bytes 224694729 (214.2 MiB)
>>>>>>>>>>         TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> [root@packtfence ~]# cat /usr/local/pf/conf/networks.conf
>>>>>>>>>> [172.17.0.0]
>>>>>>>>>> dns=172.17.0.2
>>>>>>>>>> dhcp_start=172.17.0.10
>>>>>>>>>> gateway=172.17.0.2
>>>>>>>>>> domain-name=vlan-registration.scrivener.com.br
>>>>>>>>>> nat_enabled=disabled
>>>>>>>>>> named=enabled
>>>>>>>>>> dhcp_max_lease_time=30
>>>>>>>>>> fake_mac_enabled=disabled
>>>>>>>>>> dhcpd=disabled
>>>>>>>>>> dhcp_end=172.17.0.246
>>>>>>>>>> type=vlan-registration
>>>>>>>>>> netmask=255.255.255.0
>>>>>>>>>> dhcp_default_lease_time=30
>>>>>>>>>> 
>>>>>>>>>> [172.18.0.0]
>>>>>>>>>> dns=172.18.0.2
>>>>>>>>>> dhcp_start=172.18.0.10
>>>>>>>>>> gateway=172.18.0.2
>>>>>>>>>> domain-name=vlan-isolation.scrivener.com.br
>>>>>>>>>> nat_enabled=disabled
>>>>>>>>>> named=enabled
>>>>>>>>>> dhcp_max_lease_time=30
>>>>>>>>>> fake_mac_enabled=disabled
>>>>>>>>>> dhcpd=disabled
>>>>>>>>>> dhcp_end=172.18.0.246
>>>>>>>>>> type=vlan-isolation
>>>>>>>>>> netmask=255.255.255.0
>>>>>>>>>> dhcp_default_lease_time=30
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> [root@packtfence ~]# cat /usr/local/pf/conf/switches.conf
>>>>>>>>>> #
>>>>>>>>>> # Copyright (C) 2005-2017 Inverse inc.
>>>>>>>>>> #
>>>>>>>>>> # See the enclosed file COPYING for license information (GPL).
>>>>>>>>>> # If you did not receive this file, see
>>>>>>>>>> # http://www.fsf.org/licensing/licenses/gpl.html
>>>>>>>>>> [default]
>>>>>>>>>> type=Dell::N1500
>>>>>>>>>> registrationVlan=300
>>>>>>>>>> isolationVlan=600
>>>>>>>>>> uplink=5
>>>>>>>>>> cliUser=[secret]
>>>>>>>>>> cliPwd=[secret]
>>>>>>>>>> cliEnablePwd=[secret]
>>>>>>>>>> #
>>>>>>>>>> # SNMP section
>>>>>>>>>> #
>>>>>>>>>> # PacketFence -> Switch
>>>>>>>>>> SNMPVersion=2c
>>>>>>>>>> #
>>>>>>>>>> # RADIUS NAS Client config
>>>>>>>>>> #
>>>>>>>>>> # RADIUS shared secret with switch
>>>>>>>>>> radiusSecret=teste123
>>>>>>>>>> CORPORATIVOVlan=301
>>>>>>>>>> uplink_dynamic=0
>>>>>>>>>> 
>>>>>>>>>> [172.16.0.50]
>>>>>>>>>> mode=production
>>>>>>>>>> description=172.16.0.50
>>>>>>>>>> ExternalPortalEnforcement=Y
>>>>>>>>>> deauthMethod=Telnet
>>>>>>>>>> cliAccess=Y
>>>>>>>>>> defaultVlan=301
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> Any can help? Please! My Christmas present and New Year's Eve.
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> Att,
>>>>>>>>>> Andre Scrivener
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> ------------------------------------------------------------------------------
>>>>>>>>>> Check out the vibrant tech community on one of the world's most
>>>>>>>>>> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> _______________________________________________
>>>>>>>>>> PacketFence-users mailing list
>>>>>>>>>> [email protected]
>>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>>>>> 
>>>>>>>>> -- 
>>>>>>>>> Fabrice Durand
>>>>>>>>> [email protected] ::  +1.514.447.4918 (x135) ::  www.inverse.ca
>>>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and 
>>>>>>>>> PacketFence (http://packetfence.org) 
>>>>>>>>> 
>>>>>>>>> ------------------------------------------------------------------------------
>>>>>>>>> Check out the vibrant tech community on one of the world's most
>>>>>>>>> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
>>>>>>>>> _______________________________________________
>>>>>>>>> PacketFence-users mailing list
>>>>>>>>> [email protected]
>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> -- 
>>>>>>>> Att
>>>>>>>> Andre
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>> -- 
>>>>>>> Att
>>>>>>> Andre
>>>>>> 
>>>>>> -- 
>>>>>> Fabrice Durand
>>>>>> [email protected] ::  +1.514.447.4918 (x135) ::  www.inverse.ca
>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
>>>>>> (http://packetfence.org) 
>>>>> 
>>>>> 
>>>>> 
>>>>> -- 
>>>>> Att
>>>>> Andre Scrivener
>>>> 
>>>> -- 
>>>> Fabrice Durand
>>>> [email protected] ::  +1.514.447.4918 (x135) ::  www.inverse.ca
>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
>>>> (http://packetfence.org) 
>>> 
>>> 
>>> 
>>> -- 
>>> Att,
>>> Andre Scrivener
>>> ------------------------------------------------------------------------------
>>> Check out the vibrant tech community on one of the world's most
>>> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
>>> _______________________________________________
>>> PacketFence-users mailing list
>>> [email protected]
>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
> 
> 
> 
> -- 
> Att
> Andre 
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to