Le 19-01-22 à 02 h 53, David Brustad via PacketFence-users a écrit :
Hello Guys,

PF Zen 8.3
Cisco WLC
Cisco Router Production DHCP

I'm having trouble using the SelectRole portal module.

VLANS look like:

192.168.1.x
192.168.2.x
192.168.3.x
192.168.4.x
192.168.5.x
and so on.

PF admin IP is 192.168.1.200
Registration Interface is 192.168.10.10
Isolation interface is 192.168.11.10

So what I would like to provide is a portal where after the user registers their laptop or phone, they can hit the network logoff page, and jump back on the portal to log back in on another vlan using the SelectRole module.

So far, registration and isolation work fine, and I can see the SelectRole module and select the role, and I get dropped into the VLAN selected. The issue is, I lose the ability to hit the IP of the administration page (192.168.1.200) from any of the other vlans if I put a packetfence interface in that vlan.

It's normal.

Let's say eth0 is 192.168.1.200 eth1 is one of the vlan 192.168.1.x.

So when your device try to reach 192.168.1.200 it will use his default gateway (192.168.1.1) and the gateway will route the packet to pf admin.

But since you have an interface in this vlan (eth1) then the system will try to use this interface to reply.

But it's deny by the kernel ....

To permit this case you can try to add that in systcl.conf:
net.ipv4.conf.all.rp_filter = 2

net.ipv4.conf.default.rp_filter = 2

and run sysctl -p



On my network I was hoping to use the method of "interface in each vlan" with dhcp-listener flagged to get the DHCP traffic for those corresponding vlans. As soon as I drop an interface though in vlan 2 (192.168.2.10) and flagged dhcp-listener, 192.168.1.200 stops responding to pings from vlan 2, but 192.168.2.10 becomes pingable from within vlan 2.

You can do that but don't set the ip address on this interface because it will add a local route. (dhcp-listener will just capture the traffic on the interface).

The better approach is to keep the logoff page on the admin ip (add daemon portal on this interface) and add dhcp-listener interface without any ip.

The other solution if it's possible is to add the dhcp-forwarder on your dhcp server to send the dhcp traffic to packetfence and get rid of the dhcp-listener interfaces.

Regards

Fabrice



If I assign a portal to 192.168.2.10 it then is available within vlan 2, but how am I able to keep DNS clean when the fqdn of the portal page changes within each different vlan? As it is now, it will actually work, but when I land in vlan 2 the portal page is 192.168.2.10/status <http://192.168.2.10/status>, vlan 3 192.168.3.10/status <http://192.168.3.10/status> and so on.

To verify this behavior I have a laptop sitting in vlan 2 (192.168.2.15) pinging 192.168.1.200 and I can toggle the pings on and off with the enable / disable toggle for the interface entry for 192.168.2.10

I guess the question is SelectRole compatible with dhcp-listener interfaces, or must it work only with ip-helpers?

It was my understanding I should define a network interface for each of the vlans packetfence should touch in some way, is that correct?

Has anyone else achieved this setup where you extensively use the portal for users to bounce between vlans, and if so what am I missing to wrap it all together?

Many thanks for any tips, and thanks again for the amazing software.
David


_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to