Hello Oscar,

what happen if you configure a switch port in the vlan 3 and you plug a device in, does it receive an ip address ?

Regards

Fabrice


Le 18-10-24 à 05 h 58, Oscar Nogales via PacketFence-users a écrit :
Hi !

anyone with this switch model that has a working 802.1x+MAB with packetfence ?

I have a 5 floor building with this model and I need to make it work.

Thanks.

--
Oscar Nogales
Especialista en Comunicaciones y Seguridad


El mié., 17 oct. 2018 a las 17:25, Oscar Nogales (<[email protected] <mailto:[email protected]>>) escribió:

    Hi everyone,

    I'm working on a NAC deployment with Packetfence in offline mode.
    I have working the 802.1x authentication, but I want to do the MAC
    address authentication failover in case no 802.1x agent is
    connected to the switch.

    All my switches are HPE V1910-48G Switch with Software Version
    Release 1519P03 (last version on HP website).

    Apparently all is working: the switch send to the packetfence the
    mac address as username and password, the radius authenticates it
    correctly and send back the response with the correct attributes:
    Tunnel-Type = VLAN
    Tunnel-Private-Group-Id = "3"
    Tunnel-Medium-Type = IEEE-802

    The switch register on its log that the user is authenticated and
    the vlan is 3. But the pc has no connection, doesn't get any IP by
    DHCP (there is dhcp on vlan 3) or if I configure a static ip
    address, I cannot reach any other IP on the vlan (is like if the
    switch blocks my packets).

    This is the configuration of the HP Switch:

    #

     port-security enable

    #

     dot1x timer tx-period 10

     dot1x timer supp-timeout 10

     dot1x authentication-method eap

    #

    #

     mac-authentication domain macauth.local

     mac-authentication user-name-format mac-address with-hyphen

    #

    domain macauth.local

    authentication default radius-scheme radiusnac

    authentication lan-access radius-scheme radiusnac

    authorization lan-access radius-scheme radiusnac

    access-limit disable

    state active

    idle-cut disable

    self-service-url disable

    #

    domain mydomain

     authentication lan-access radius-scheme radiusnac

     authorization lan-access radius-scheme radiusnac

     access-limit disable

     state active

     idle-cut disable

     self-service-url disable

    #

    radius scheme radiusnac

     primary authentication 10.0.10.220

     key authentication cipher
    $c$3$ZFDWjqDlNi7UGtNNLnrRiL+w/7MTioLgW3p0Ds1617Xc

     security-policy-server 10.0.10.220

     user-name-format keep-original

     nas-ip 172.18.1.19

    #

    #

    interface GigabitEthernet1/0/16

     port link-type hybrid

     port hybrid vlan 1 3 117 untagged

     port hybrid pvid vlan 117

     mac-vlan enable

     stp edged-port enable

     mac-authentication max-user 2

     mac-authentication host-mode multi-vlan

     port-security port-mode userlogin-secure-or-mac

     dot1x re-authenticate

     dot1x guest-vlan 117

     undo dot1x handshake

     undo dot1x multicast-trigger

    #

    snmp-agent community read myreadcommunity

    snmp-agent community write mywritecommunity mib-view All

    snmp-agent target-host trap address udp-domain 10.0.10.220 params
    securityname NAC v2c

    #


    And this is the configuration on packetfence:


    [172.18.1.19]

    description=sw19_test

    group=RoverMotta-HP

    deauthMethod=SNMP

    GR_NAC_Rmotta_vlan20Vlan=20

    GR_NAC_Rmotta_vlan3Vlan=3

    type=H3C::S5120

    cliPwd=supersecurepass

    cliUser=admin

    cliEnablePwd=megasecurepass

    useCoA=N


    [group RoverMotta-HP]

    description=1910

    SNMPCommunityRead=myreadcommunity

    SNMPCommunityWrite=mywritecommunity

    isolationVlan=118

    radiusSecret=RadiusPassword

    SNMPVersion=2c

    registrationVlan=117

    defaultVlan=3


    And I show you the logs that shows that the MAB is working:


    [radius.log]

    Oct 17 15:54:00 censvnac auth[12460]: [mac:f0:de:f1:3c:7b:c3]
    Accepted user: and returned VLAN 3

    Oct 17 15:54:00 censvnac auth[12460]: (854) Login OK:
    [[email protected]] (from client 172.18.1.19 port
    16842869 cli f0:de:f1:3c:7b:c3)


    [packetfence.log]

    Oct 17 15:54:00 censvnac packetfence_httpd.aaa: httpd.aaa(11262)
    INFO: [mac:f0:de:f1:3c:7b:c3] handling radius autz request: from
    switch_ip => (172.18.1.19), connection_type =>
    WIRED_MAC_AUTH,switch_mac => (Unknown), mac =>
    [f0:de:f1:3c:7b:c3], port => 16, username =>
    "[email protected]" (pf::radius::authorize)

    Oct 17 15:54:00 censvnac packetfence_httpd.aaa: httpd.aaa(11262)
    INFO: [mac:f0:de:f1:3c:7b:c3] Instantiate profile 802.1x
    (pf::Connection::ProfileFactory::_from_profile)

    Oct 17 15:54:00 censvnac packetfence_httpd.aaa: httpd.aaa(11262)
    INFO: [mac:f0:de:f1:3c:7b:c3] Connection type is WIRED_MAC_AUTH.
    Getting role from node_info (pf::role::getRegisteredRole)

    Oct 17 15:54:00 censvnac packetfence_httpd.aaa: httpd.aaa(11262)
    INFO: [mac:f0:de:f1:3c:7b:c3] Username was defined
    "[email protected]" - returning role
    'GR_NAC_Rmotta_vlan3' (pf::role::getRegisteredRole)

    Oct 17 15:54:00 censvnac packetfence_httpd.aaa: httpd.aaa(11262)
    INFO: [mac:f0:de:f1:3c:7b:c3] PID: "default", Status: reg Returned
    VLAN: (undefined), Role: GR_NAC_Rmotta_vlan3
    (pf::role::fetchRoleForNode)

    Oct 17 15:54:00 censvnac packetfence_httpd.aaa: httpd.aaa(11262)
    INFO: [mac:f0:de:f1:3c:7b:c3] (172.18.1.19) Added VLAN 3 to the
    returned RADIUS Access-Accept (pf::Switch::returnRadiusAccessAccept)

    Oct 17 15:54:00 censvnac packetfence_httpd.aaa: httpd.aaa(11262)
    INFO: [mac:f0:de:f1:3c:7b:c3] violation 1300003 force-closed for
    f0:de:f1:3c:7b:c3 (pf::violation::violation_force_close)

    Oct 17 15:54:00 censvnac packetfence_httpd.aaa: httpd.aaa(11262)
    INFO: [mac:f0:de:f1:3c:7b:c3] Instantiate profile 802.1x
    (pf::Connection::ProfileFactory::_from_profile)

    Oct 17 15:54:09 censvnac pfqueue: pfqueue(29881) WARN:
    [mac:34:e6:ad:81:f7:a4] Unable to perform a Fingerbank lookup for
    device with MAC address '34:e6:ad:81:f7:a4' (pf::fingerbank::process)


    [tcpdump on packetfence with the radius response]
    Frame 6: 77 bytes on wire (616 bits), 77 bytes captured (616 bits)
    Ethernet II, Src: Vmware_1d:6e:98 (00:0c:29:1d:6e:98), Dst:
    Tecnomen_11:08:e6 (00:e0:20:11:08:e6)
    Internet Protocol Version 4, Src: 10.0.10.220, Dst: 172.18.1.19
    User Datagram Protocol, Src Port: 1812, Dst Port: 2413
        Source Port: 1812
        Destination Port: 2413
        Length: 43
        Checksum: 0xc23d [unverified]
        [Checksum Status: Unverified]
        [Stream index: 0]
    RADIUS Protocol
        Code: Access-Accept (2)
        Packet identifier: 0x0 (0)
        Length: 35
        Authenticator: ef9458c3f62b4a81321c148d229cfa24
        [This is a response to a request in frame 1]
        [Time from request: 0.232739000 seconds]
        Attribute Value Pairs
            AVP: t=Tunnel-Type(64) l=6 Tag=0x00 val=VLAN(13)
            AVP: t=Tunnel-Private-Group-Id(81) l=3 val=3
            AVP: t=Tunnel-Medium-Type(65) l=6 Tag=0x00 val=IEEE-802(6)

    [HP 1920 syslog]
    Apr 26 16:01:27:374
    
2000PORTSECInformationPORTSEC_MACAUTH_LOGIN_SUCC-IfName=GigabitEthernet1/0/16-MACAddr=F0:DE:F1:3C:7B:C3-VlanId=3-UserName=f0-de-f1-3c-7b-c3-UserNameFormat=MAC
    address; The user passed MAC address authentication and got online
    successfully.

    Apr 26 16:01:25:903 2000MSTPInformationMSTP_FORWARDINGInstance 0's
    port GigabitEthernet1/0/16 has been set to forwarding state.

    Has anybody a working configuration with HP1920 switch and
    802.1x + mac authentication ? With the above information provided
    has any of you any clue about what is going on ?

    Thanks in advance. I will continue doing test and I'll update If I
    have any news.

    Regards.

    --
    Oscar Nogales
    Especialista en Comunicaciones y Seguridad



_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to