So it mean that there is no rule that match it.tech username in your AD source.

Try pftest authentication it.tech bob and see if the AD source return a role and an unregdate.

Fabrice



Le 2018-01-29 à 20:39, E.P. a écrit :

Well, that’s my problem, Fabrice,

I’ve already checked that log, nothing in there ;)

RADIUS Request

        

User-Name = "it.tech" NAS-IP-Address = 172.19.254.2 NAS-Port = 0 Framed-MTU = 1400 State = 0xe7795756e6bf4d151b0bfaeaef977462 Called-Station-Id = "24:a4:3c:5e:c1:11:staff-secured" Calling-Station-Id = "3c:2e:ff:3b:c7:ca" NAS-Identifier = "24a43c507608" NAS-Port-Type = Wireless-802.11 Event-Timestamp = "Jan 30 2018 01:36:24 UTC" Connect-Info = "CONNECT 0Mbps 802.11b" EAP-Message = 0x02c600061a03 FreeRADIUS-Proxied-To = 127.0.0.1 EAP-Type = MSCHAPv2 Stripped-User-Name = "it.tech" Realm = "default" Called-Station-SSID = "staff-secured" PacketFence-Domain = "optionsad" User-Password = "******" SQL-User-Name = "it.tech"

RADIUS Reply

        

EAP-Message = 0x03c60004 Message-Authenticator = 0x00000000000000000000000000000000 Stripped-User-Name = "it.tech"

*From:*Durand fabrice via PacketFence-users [mailto:[email protected]]
*Sent:* Monday, January 29, 2018 5:18 PM
*To:* [email protected]
*Cc:* Durand fabrice
*Subject:* Re: [PacketFence-users] VLAN assigment by RADIUS

Hello Eugene,

check in the radius audit log, you will see the radius answer.

Regards

Fabrice

Le 2018-01-29 à 19:41, E.P. via PacketFence-users a écrit :

    Guys,

    How can I see if a specific VLAN ID that I assigned to the switch
    (or rather WAP) in “Role by VLAN ID” setting.

    I have it as follows (extract from switches.conf file)

    StaffRole=10

    StaffVlan=10

    Should I take into account not a very good marriage of Ubiquiti
    Unifi and FreeRADIUS when it comes to VLAN ID assignment?

    I see in the RADIUS debugs that VLAN is indeed assigned to the
    user session (see below) but what is its ID ?

    (88) attr_filter.packetfence_post_auth: EXPAND %{User-Name}
    (88) attr_filter.packetfence_post_auth:    --> it.tech
    (88) attr_filter.packetfence_post_auth: Matched entry DEFAULT at
    line 10
    (88)     [attr_filter.packetfence_post_auth] = updated
    (88) linelog: EXPAND messages.%{%{reply:Packet-Type}:-default}
    (88) linelog:    --> messages.Access-Accept
    (88) linelog: EXPAND [mac:%{Calling-Station-Id}] Accepted user:
    %{reply:User-Name} and *returned VLAN*%{reply:Tunnel-Private-Group-ID}
    (88) linelog:    --> [mac:3c:2e:ff:3b:c7:ca] Accepted user:  and
    *returned VLAN*
    (88)     [linelog] = ok
    (88)   } # post-auth = updated
    (88) Login OK: [it.tech] (from client 172.19.254.2 port 0 cli
    3c:2e:ff:3b:c7:ca)
    (88) Sent Access-Accept Id 46 from 172.16.0.222:1812
    <http://172.16.0.222:1812> to 172.19.254.2:32784
    <http://172.19.254.2:32784> length 0

    Eugene




    
------------------------------------------------------------------------------

    Check out the vibrant tech community on one of the world's most

    engaging tech sites, Slashdot.org!http://sdm.link/slashdot




    _______________________________________________

    PacketFence-users mailing list

    [email protected]
    <mailto:[email protected]>

    https://lists.sourceforge.net/lists/listinfo/packetfence-users


------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to