Hey people,

I am stuck and cannot find anything that really helps me solve my issue(s).

What do i want to achieve?:

The main goal is to set up packetfence to use certificates for 
802.1X-authentication and if the device is not 802.1x-compatible, a perl script 
checking against an smaba/openldap should be done.
Only machines should be checked -> is it a company-machine it should get access 
and if not -> reject

Further i want to use pf primarily as a RADIUS-Server with the twist of an 
wmi-compliance-check pre-authentication.

So it should check if it is a company machine and if so it should check if all 
given software is up to date.

What issues do i have?:

Problem with the 802.1x auth:

When i check for certificates (added the certificates into 
/usr/loacal/pf/raddb/certs -> changed the eap.conf file to use this certs and 
also changed the cert_issuer) basically i took over all configuration that is 
running perfectly on my freeradius-server.

When i try to authenticate i always get back :


(309) Mon Feb 18 12:25:16 2019: Debug:   EAP-Message = 0x0114000a0d8000000000

(309) Mon Feb 18 12:25:16 2019: Debug:   Message-Authenticator = 
0x00000000000000000000000000000000

(309) Mon Feb 18 12:25:16 2019: Debug:   State = 
0xd7bd26dbc5a92bd65f9a05990fef7086


in the end i dont get any vlan and it puts my device into vlan 0 altough the 
log shows eap was successful


Problem with mac-auth:

When i try to check against openldap/samba for a mac-address, i get the 
following output:

...
eap: No EAP-Message, not doing EAP
(8) Mon Feb 25 08:40:10 2019: Debug:     [eap] = noop
(8) Mon Feb 25 08:40:10 2019: Debug:     if ( !EAP-Message ) {
(8) Mon Feb 25 08:40:10 2019: Debug:     if ( !EAP-Message )  -> TRUE
(8) Mon Feb 25 08:40:10 2019: Debug:     if ( !EAP-Message )  {
(8) Mon Feb 25 08:40:10 2019: Debug: ldap-mac-check:   
$RAD_REQUEST{'User-Name'} = &request:User-Name -> '001c251cb1b0'
( <----perl script running here----->)
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: &request:NAS-Port-Type = 
$RAD_REQUEST{'NAS-Port-Type'} -> 'Ethernet'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: &request:CHAP-Password = 
$RAD_REQUEST{'CHAP-Password'} -> '0x15531d18d409f3601c3d9bb639379d1f47'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: &request:Service-Type = 
$RAD_REQUEST{'Service-Type'} -> 'Call-Check'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: &request:Called-Station-Id 
= $RAD_REQUEST{'Called-Station-Id'} -> 'b4:39:d6:29:15:ed'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: 
&request:Message-Authenticator = $RAD_REQUEST{'Message-Authenticator'} -> 
'0x2e20da122377932d156bc3ff8bddda09'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: &request:CHAP-Challenge = 
$RAD_REQUEST{'CHAP-Challenge'} -> '0xb84c6a53ce9b979fd964262f0c946c6c'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: &request:Connect-Info = 
$RAD_REQUEST{'Connect-Info'} -> 'CONNECT Ethernet 100Mbps Full duplex'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: &request:Realm = 
$RAD_REQUEST{'Realm'} -> 'null'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: &request:NAS-IP-Address = 
$RAD_REQUEST{'NAS-IP-Address'} -> '192.168.1.100'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: &request:NAS-Port-Id = 
$RAD_REQUEST{'NAS-Port-Id'} -> '19'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: &request:SQL-User-Name = 
$RAD_REQUEST{'SQL-User-Name'} -> '001c251cb1b0'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: 
&request:Calling-Station-Id = $RAD_REQUEST{'Calling-Station-Id'} -> 
'00:1c:25:1c:b1:b0'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: 
&request:FreeRADIUS-Client-IP-Address = 
$RAD_REQUEST{'FreeRADIUS-Client-IP-Address'} -> '192.168.1.100'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: &request:Framed-Protocol = 
$RAD_REQUEST{'Framed-Protocol'} -> 'PPP'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: &request:User-Name = 
$RAD_REQUEST{'User-Name'} -> '001c251cb1b0'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: &request:NAS-Identifier = 
$RAD_REQUEST{'NAS-Identifier'} -> 'ProCurve Switch 2610-24'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: &request:Event-Timestamp = 
$RAD_REQUEST{'Event-Timestamp'} -> 'Feb 25 2019 08:40:10 UTC'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: 
&request:Stripped-User-Name = $RAD_REQUEST{'Stripped-User-Name'} -> 
'001c251cb1b0'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: &request:NAS-Port = 
$RAD_REQUEST{'NAS-Port'} -> '19'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: &request:Framed-MTU = 
$RAD_REQUEST{'Framed-MTU'} -> '1466'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: &control:Load-Balance-Key 
= $RAD_CHECK{'Load-Balance-Key'} -> '00-1c-25-1c-b1-b0 001c251cb1b0'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: 
&control:PacketFence-RPC-Server = $RAD_CHECK{'PacketFence-RPC-Server'} -> 
'127.0.0.1'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: 
&control:PacketFence-Tenant-Id = $RAD_CHECK{'PacketFence-Tenant-Id'} -> '1'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: 
&control:PacketFence-RPC-User = $RAD_CHECK{'PacketFence-RPC-User'} -> ''
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: 
&control:PacketFence-Request-Time = $RAD_CHECK{'PacketFence-Request-Time'} -> 
'0'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: 
&control:PacketFence-RPC-Pass = $RAD_CHECK{'PacketFence-RPC-Pass'} -> ''''
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: &control:Tmp-Integer-0 = 
$RAD_CHECK{'Tmp-Integer-0'} -> '1551084010'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: 
&control:PacketFence-RPC-Proto = $RAD_CHECK{'PacketFence-RPC-Proto'} -> 'http'
(8) Mon Feb 25 08:40:11 2019: Debug: ldap-mac-check: 
&control:PacketFence-RPC-Port = $RAD_CHECK{'PacketFence-RPC-Port'} -> '7070'
(8) Mon Feb 25 08:40:11 2019: Debug:       [ldap-mac-check] = ok
(8) Mon Feb 25 08:40:11 2019: Debug:       if (!ok) {
(8) Mon Feb 25 08:40:11 2019: Debug:       if (!ok)  -> FALSE
(8) Mon Feb 25 08:40:11 2019: Debug:       else {
(8) Mon Feb 25 08:40:11 2019: Debug:         update {
(8) Mon Feb 25 08:40:11 2019: Debug:         } # update = noop
(8) Mon Feb 25 08:40:11 2019: Debug:       } # else = noop
(8) Mon Feb 25 08:40:11 2019: Debug:     } # if ( !EAP-Message )  = ok
(8) Mon Feb 25 08:40:11 2019: Debug:     policy packetfence-eap-mac-policy {
(8) Mon Feb 25 08:40:11 2019: Debug:       if ( &EAP-Type ) {
(8) Mon Feb 25 08:40:11 2019: Debug:       if ( &EAP-Type )  -> FALSE
(8) Mon Feb 25 08:40:11 2019: Debug:       [noop] = noop
(8) Mon Feb 25 08:40:11 2019: Debug:     } # policy packetfence-eap-mac-policy 
= noop
(8) Mon Feb 25 08:40:11 2019: WARNING: pap: 
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
(8) Mon Feb 25 08:40:11 2019: WARNING: pap: !!! Ignoring control:User-Password. 
 Update your        !!!
(8) Mon Feb 25 08:40:11 2019: WARNING: pap: !!! configuration so that the 
"known good" clear text !!!
(8) Mon Feb 25 08:40:11 2019: WARNING: pap: !!! password is in 
Cleartext-Password and NOT in        !!!
(8) Mon Feb 25 08:40:11 2019: WARNING: pap: !!! User-Password.                  
                    !!!
(8) Mon Feb 25 08:40:11 2019: WARNING: pap: 
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
(8) Mon Feb 25 08:40:11 2019: WARNING: pap: Auth-Type already set.  Not setting 
to PAP
(8) Mon Feb 25 08:40:11 2019: Debug:     [pap] = noop
(8) Mon Feb 25 08:40:11 2019: Debug:   } # authorize = updated
(8) Mon Feb 25 08:40:11 2019: Debug: Found Auth-Type = Accept
(8) Mon Feb 25 08:40:11 2019: Debug: Auth-Type = Accept, accepting the user
(8) Mon Feb 25 08:40:11 2019: Debug: # Executing section post-auth from file 
/usr/local/pf/raddb/sites-enabled/packetfence
(8) Mon Feb 25 08:40:11 2019: Debug:   post-auth {
(8) Mon Feb 25 08:40:11 2019: Debug:     update {
(8) Mon Feb 25 08:40:11 2019: Debug:       EXPAND %{Packet-Src-IP-Address}
(8) Mon Feb 25 08:40:11 2019: Debug:          --> 192.168.1.100
(8) Mon Feb 25 08:40:11 2019: Debug:     } # update = noop
(8) Mon Feb 25 08:40:11 2019: Debug:     policy packetfence-set-tenant-id {
(8) Mon Feb 25 08:40:11 2019: Debug:       if ( 
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(8) Mon Feb 25 08:40:11 2019: Debug:       EXPAND 
%{%{control:PacketFence-Tenant-Id}:-0}
(8) Mon Feb 25 08:40:11 2019: Debug:          --> 1
(8) Mon Feb 25 08:40:11 2019: Debug:       if ( 
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> FALSE
(8) Mon Feb 25 08:40:11 2019: Debug:       if ( &control:PacketFence-Tenant-Id 
== 0 ) {
(8) Mon Feb 25 08:40:11 2019: Debug:       if ( &control:PacketFence-Tenant-Id 
== 0 )  -> FALSE
(8) Mon Feb 25 08:40:11 2019: Debug:     } # policy packetfence-set-tenant-id = 
noop
(8) Mon Feb 25 08:40:11 2019: Debug:     if 
("%{%{control:PacketFence-Proxied-From}:-False}" == "True") {
(8) Mon Feb 25 08:40:11 2019: Debug:     EXPAND 
%{%{control:PacketFence-Proxied-From}:-False}
(8) Mon Feb 25 08:40:11 2019: Debug:        --> False
(8) Mon Feb 25 08:40:11 2019: Debug:     if 
("%{%{control:PacketFence-Proxied-From}:-False}" == "True")  -> FALSE
(8) Mon Feb 25 08:40:11 2019: Debug:     if (! EAP-Type || (EAP-Type != TTLS  
&& EAP-Type != PEAP) ) {
(8) Mon Feb 25 08:40:11 2019: Debug:     if (! EAP-Type || (EAP-Type != TTLS  
&& EAP-Type != PEAP) )  -> TRUE
(8) Mon Feb 25 08:40:11 2019: Debug:     if (! EAP-Type || (EAP-Type != TTLS  
&& EAP-Type != PEAP) )  {
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Expanding URI components
(8) Mon Feb 25 08:40:11 2019: Debug: rest: EXPAND http://127.0.0.1:7070
(8) Mon Feb 25 08:40:11 2019: Debug: rest:    --> http://127.0.0.1:7070
(8) Mon Feb 25 08:40:11 2019: Debug: rest: EXPAND //radius/rest/authorize
(8) Mon Feb 25 08:40:11 2019: Debug: rest:    --> //radius/rest/authorize
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Sending HTTP POST to 
"http://127.0.0.1:7070//radius/rest/authorize";
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Encoding attribute "User-Name"
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Encoding attribute "CHAP-Password"
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Encoding attribute "NAS-IP-Address"
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Encoding attribute "NAS-Port"
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Encoding attribute "Service-Type"
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Encoding attribute "Framed-Protocol"
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Encoding attribute "Framed-MTU"
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Encoding attribute 
"Called-Station-Id"
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Encoding attribute 
"Calling-Station-Id"
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Encoding attribute "NAS-Identifier"
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Encoding attribute "CHAP-Challenge"
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Encoding attribute "NAS-Port-Type"
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Encoding attribute "Event-Timestamp"
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Encoding attribute "Connect-Info"
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Encoding attribute 
"Message-Authenticator"
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Encoding attribute "NAS-Port-Id"
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Encoding attribute 
"Stripped-User-Name"
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Returning 1012 bytes of JSON data 
(buffer full or chunk exceeded)
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Encoding attribute 
"Stripped-User-Name"
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Encoding attribute "Realm"
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Encoding attribute "SQL-User-Name"
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Encoding attribute 
"FreeRADIUS-Client-IP-Address"
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Processing response header
(8) Mon Feb 25 08:40:11 2019: Debug: rest:   Status : 100 (Continue)
(8) Mon Feb 25 08:40:11 2019: Debug: rest: Continuing...
(8) Mon Feb 25 08:40:12 2019: Debug: rest: Processing response header
(8) Mon Feb 25 08:40:12 2019: Debug: rest:   Status : 200 (OK)
(8) Mon Feb 25 08:40:12 2019: Debug: rest:   Type   : json (application/json)
(8) Mon Feb 25 08:40:12 2019: Debug: rest: Parsing attribute 
"control:PacketFence-Eap-Type"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: EXPAND 0
(8) Mon Feb 25 08:40:12 2019: Debug: rest:    --> 0
(8) Mon Feb 25 08:40:12 2019: Debug: rest: PacketFence-Eap-Type := "0"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: Parsing attribute 
"control:PacketFence-AutoReg"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: EXPAND 1
(8) Mon Feb 25 08:40:12 2019: Debug: rest:    --> 1
(8) Mon Feb 25 08:40:12 2019: Debug: rest: PacketFence-AutoReg := "1"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: Parsing attribute 
"control:PacketFence-Authorization-Status"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: EXPAND allow
(8) Mon Feb 25 08:40:12 2019: Debug: rest:    --> allow
(8) Mon Feb 25 08:40:12 2019: Debug: rest: PacketFence-Authorization-Status := 
"allow"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: Parsing attribute 
"control:PacketFence-Computer-Name"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: PacketFence-Computer-Name := ""
(8) Mon Feb 25 08:40:12 2019: Debug: rest: Parsing attribute 
"control:PacketFence-Mac"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: EXPAND 00:1c:25:1c:b1:b0
(8) Mon Feb 25 08:40:12 2019: Debug: rest:    --> 00:1c:25:1c:b1:b0
(8) Mon Feb 25 08:40:12 2019: Debug: rest: PacketFence-Mac := 
"00:1c:25:1c:b1:b0"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: Parsing attribute 
"control:PacketFence-Switch-Ip-Address"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: EXPAND 192.168.1.100
(8) Mon Feb 25 08:40:12 2019: Debug: rest:    --> 192.168.1.100
(8) Mon Feb 25 08:40:12 2019: Debug: rest: PacketFence-Switch-Ip-Address := 
"192.168.1.100"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: Parsing attribute 
"control:PacketFence-Request-Time"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: EXPAND 1551084012
(8) Mon Feb 25 08:40:12 2019: Debug: rest:    --> 1551084012
(8) Mon Feb 25 08:40:12 2019: Debug: rest: PacketFence-Request-Time := 
1551084012
(8) Mon Feb 25 08:40:12 2019: Debug: rest: Parsing attribute 
"control:PacketFence-IfIndex"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: EXPAND 19
(8) Mon Feb 25 08:40:12 2019: Debug: rest:    --> 19
(8) Mon Feb 25 08:40:12 2019: Debug: rest: PacketFence-IfIndex := "19"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: Parsing attribute 
"control:PacketFence-UserName"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: EXPAND 001c251cb1b0
(8) Mon Feb 25 08:40:12 2019: Debug: rest:    --> 001c251cb1b0
(8) Mon Feb 25 08:40:12 2019: Debug: rest: PacketFence-UserName := 
"001c251cb1b0"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: Parsing attribute 
"control:PacketFence-IsPhone"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: PacketFence-IsPhone := ""
(8) Mon Feb 25 08:40:12 2019: Debug: rest: Parsing attribute 
"control:PacketFence-Connection-Type"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: EXPAND Ethernet-NoEAP
(8) Mon Feb 25 08:40:12 2019: Debug: rest:    --> Ethernet-NoEAP
(8) Mon Feb 25 08:40:12 2019: Debug: rest: PacketFence-Connection-Type := 
"Ethernet-NoEAP"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: Parsing attribute 
"control:PacketFence-Switch-Id"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: EXPAND 182.168.1.100
(8) Mon Feb 25 08:40:12 2019: Debug: rest:    --> 192.168.1.100
(8) Mon Feb 25 08:40:12 2019: Debug: rest: PacketFence-Switch-Id := 
"192.168.1.100"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: Parsing attribute 
"control:PacketFence-Switch-Mac"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: EXPAND b4:39:d6:29:15:ed
(8) Mon Feb 25 08:40:12 2019: Debug: rest:    --> b4:39:d6:29:15:ed
(8) Mon Feb 25 08:40:12 2019: Debug: rest: PacketFence-Switch-Mac := 
"b4:39:d6:29:15:ed"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: Parsing attribute 
"control:PacketFence-Status"
(8) Mon Feb 25 08:40:12 2019: Debug: rest: EXPAND reg
(8) Mon Feb 25 08:40:12 2019: Debug: rest:    --> reg
(8) Mon Feb 25 08:40:12 2019: Debug: rest: PacketFence-Status := "reg"
(8) Mon Feb 25 08:40:12 2019: Debug:       [rest] = updated
(8) Mon Feb 25 08:40:12 2019: Debug:       update {
(8) Mon Feb 25 08:40:12 2019: Debug:       } # update = noop
(8) Mon Feb 25 08:40:12 2019: Debug:       if 
(&control:PacketFence-Authorization-Status == "deny") {
(8) Mon Feb 25 08:40:12 2019: Debug:       if 
(&control:PacketFence-Authorization-Status == "deny")  -> FALSE
(8) Mon Feb 25 08:40:12 2019: Debug:       else {
(8) Mon Feb 25 08:40:12 2019: Debug:         policy 
packetfence-audit-log-accept {
(8) Mon Feb 25 08:40:12 2019: Debug:           if (&User-Name && (&User-Name == 
"dummy")) {
(8) Mon Feb 25 08:40:12 2019: Debug:           if (&User-Name && (&User-Name == 
"dummy"))  -> FALSE
(8) Mon Feb 25 08:40:12 2019: Debug:           else {
(8) Mon Feb 25 08:40:12 2019: Debug:             policy request-timing {
(8) Mon Feb 25 08:40:12 2019: Debug:               if 
(control:PacketFence-Request-Time != 0) {
(8) Mon Feb 25 08:40:12 2019: Debug:               if 
(control:PacketFence-Request-Time != 0)  -> TRUE
(8) Mon Feb 25 08:40:12 2019: Debug:               if 
(control:PacketFence-Request-Time != 0)  {
(8) Mon Feb 25 08:40:12 2019: Debug:                 update control {
(8) Mon Feb 25 08:40:12 2019: Debug:                   EXPAND %{expr: 
%{control:PacketFence-Request-Time} - %{control:Tmp-Integer-0}}
(8) Mon Feb 25 08:40:12 2019: Debug:                      --> 2
(8) Mon Feb 25 08:40:12 2019: Debug:                 } # update control = noop
(8) Mon Feb 25 08:40:12 2019: Debug:               } # if 
(control:PacketFence-Request-Time != 0)  = noop
(8) Mon Feb 25 08:40:12 2019: Debug:             } # policy request-timing = 
noop
(8) Mon Feb 25 08:40:12 2019: Debug: sql: EXPAND type.accept.query
(8) Mon Feb 25 08:40:12 2019: Debug: sql:    --> type.accept.query
(8) Mon Feb 25 08:40:12 2019: Debug: sql: Using query template 'query'
(8) Mon Feb 25 08:40:12 2019: Debug: sql: EXPAND %{User-Name}
(8) Mon Feb 25 08:40:12 2019: Debug: sql:    --> 001c251cb1b0
(8) Mon Feb 25 08:40:12 2019: Debug: sql: SQL-User-Name set to '001c251cb1b0'
(8) Mon Feb 25 08:40:12 2019: Debug: sql: SQL query returned: success
(8) Mon Feb 25 08:40:12 2019: Debug: sql: 1 record(s) updated
(8) Mon Feb 25 08:40:12 2019: Debug:             [sql] = ok
(8) Mon Feb 25 08:40:12 2019: Debug:           } # else = ok
(8) Mon Feb 25 08:40:12 2019: Debug:         } # policy 
packetfence-audit-log-accept = ok
(8) Mon Feb 25 08:40:12 2019: Debug:       } # else = ok
(8) Mon Feb 25 08:40:12 2019: Debug:     } # if (! EAP-Type || (EAP-Type != 
TTLS  && EAP-Type != PEAP) )  = updated
(8) Mon Feb 25 08:40:12 2019: Debug: attr_filter.packetfence_post_auth: EXPAND 
%{User-Name}
(8) Mon Feb 25 08:40:12 2019: Debug: attr_filter.packetfence_post_auth:    --> 
001c251cb1b0
(8) Mon Feb 25 08:40:12 2019: Debug: attr_filter.packetfence_post_auth: Matched 
entry DEFAULT at line 10
(8) Mon Feb 25 08:40:12 2019: Debug:     [attr_filter.packetfence_post_auth] = 
updated
(8) Mon Feb 25 08:40:12 2019: Debug: linelog: EXPAND 
messages.%{%{reply:Packet-Type}:-default}
(8) Mon Feb 25 08:40:12 2019: Debug: linelog:    --> messages.Access-Accept
(8) Mon Feb 25 08:40:12 2019: Debug: linelog: EXPAND 
[mac:%{Calling-Station-Id}] Accepted user: %{reply:User-Name} and returned VLAN 
%{reply:Tunnel-Private-Group-ID}
(8) Mon Feb 25 08:40:12 2019: Debug: linelog:    --> [mac:00:1c:25:1c:b1:b0] 
Accepted user:  and returned VLAN
(8) Mon Feb 25 08:40:12 2019: Debug:     [linelog] = ok
(8) Mon Feb 25 08:40:12 2019: Debug:   } # post-auth = updated
(8) Mon Feb 25 08:40:12 2019: Debug: Sent Access-Accept Id 177 from 
192.168.1.10:1812 to 192.168.1.100:1024 length 0
(8) Mon Feb 25 08:40:12 2019: Debug: Finished request

The main issue here is that i dont get access to any vlan -> in the gui it 
always show my device in vlan 0

i hope someone can help me

best regards

silvester schattauer


_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to