10.10.0.10 is my management interface for PF. and portal daemon is added in the 
list of listening daemons on this interface. Role by VLAN ID: registration VLAN 
ID is 3, and Guest VLAN ID is 3. So VLAN is not changed after authorization. 
Role by Switch Role: registration is set to pf_registration (same name of 
access list is set on switch, see below) Role by Web Auth URL: registration is 
set to http://10.10.0.10/Cisco::Catalyst_2960 In connection profile under 
Filters I set Connection Type = WIRED_MAC_AUTH. In Authentication Sources i 
used null and set Authentication Rule with name catchall and actions Role = 
guest, Access duration = 12 hours This is my switch configuration: aaa 
new-model aaa group server radius packetfence server 10.10.0.10 auth-port 1812 
acct-port 1813 aaa authentication login default local aaa authentication dot1x 
default group packetfence aaa authorization network default group packetfence 
aaa server radius dynamic-author client 10.10.0.10 server-key 7 
00000000000000000 port 3799 aaa session-id common dot1x system-auth-control 
interface GigabitEthernet1/0/1 switchport mode access authentication order 
dot1x mab authentication priority dot1x mab authentication port-control auto 
authentication periodic authentication timer reauthenticate 10800 
authentication timer restart 10800 mab no snmp trap link-status dot1x pae 
authenticator dot1x timeout quiet-period 2 dot1x timeout tx-period 3 
spanning-tree portfast ip default-gateway 10.20.0.1 ip http server ip http 
secure-server ip access-list extended pf_registration deny   ip any host 
10.10.0.10 permit tcp any any eq www permit tcp any any eq 443 snmp-server 
community public RO snmp-server community mysnmp RO snmp-server community 
mywrite RW radius-server host 10.10.0.10 auth-port 1812 acct-port 1813 key 7 
00000000000000000 no radius-server vsa send accounting no radius-server vsa 
send authentication ---- On Mon, 01 Oct 2018 13:23:26 +0200 Kalcho via 
PacketFence-users <[email protected]> wrote ---- Hello, I 
am currently testing packetfence for my company, just to see if it will suit 
our needs. What basically we need is 802.1X authentication for AD users and Web 
Portal Authentication via MAB for guests. I have used this guide 
https://packetfence.org/doc/PacketFence_Installation_Guide.html to setup PoC. 
Basically I installed PF on CentOS7, disabled firewall and Selinux and followed 
guide step by step. I have done every step like it is said in the guide, and 
now 802.1X works well. But when I after that on the same switch interface use 
mab for authentication by instructions from the chapter  "6. Enabling the 
Captive Portal" redirection is done well, but the url for the captive portal 
which is in my case http://X.X.X.X/Cisco::Catalyst_2960 with prepended 
sid1eef66?redirect=http://www.msftconnecttest.com/redirect Time Out. For this 
test I use PacketFence on CentOS7 server, which is hosted on Hyper-V VM NAS: 
Cisco 2960-S switch  (Model: WS-C2960S-24TS-L, SW Version: 15.2(2a)E1) 
Supplicant: Windows 10 Workstation I have configured one management interface 
on the packetfence on the address X.X.X.X and on the same interface I have 
added additional listening daemon portal per instructions. Packetfence 
management interface is in say VLAN 1, and switch management interface is in 
VLAN 2. I have done everything like in guide, but I am unable to detect what is 
error. Maybe I am missing something. If you need more info feel free to 
request. _______________________________________________ PacketFence-users 
mailing list [email protected] 
https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to