Hello Tony, you can do that with inline network but there is a limitation.
When a device is in the inline network then it mean that the locationlog changed to inline and after that there is no way to disconnect the device from the equipment because PacketFence think that it's inline.
What you will need to have is a sort of inline l2 network but not really managed by packetfence (like iptables rules) but still have the dhcp enabled on this network.
It's doable but you need to play with the iptables rules and have a dhcp enabled on the pf server for theses vlan.
Regards Fabrice Le 19-03-05 à 22 h 09, Tony W via PacketFence-users a écrit :
Hi there, After having played around with PF and read heaps of implementation samples, I have put together this list and have some questions. I do not plan to use the portal or registration pages with PF as all authentication is via 802.1x - so here we go... 1. Use a wireless controller with a registration SSID (Registration VLAN). 2. Have clients (Visitors) connect to the SSID and use 802.1x authentication. DHCP provided by PF 3. On success, put client in a different VLAN, predetermined by the credentials provided. 4. Each VLAN has a dedicated server that the client shall be able to connect to. DHCP provided by PF 5. Each server needs Internet access as does the client that has been put in the VLAN. 6. All Internet bound traffic shall go out via the Management interface. 7. Management interface is connected to a firewall with Masquerade (NAT). 8. It shall be possible to terminate the session from outside or by client choice. (Go back to registration VLAN) 9. The servers that the clients connect to, interact with external equipment and that interaction can trigger a "disconnect" from the VLAN. 10. Disconnection may be triggered by client disassociation from access point or by externally controlled disconnect. 11. Only one client will ever be in any VLAN at any one time. Fabrice has kindly given some pointers previously. Based on his suggestions and documentation I have the following suggestion: I have created 10 VLAN's with 1 being for registration, using 802.1x via a wireless controller and a public SSID. The other 9 VLAN's are set to in-line layer 2, each with their own distinct IP range (192.168.xx.0/24) The interface, on which the 10 VLAN's are configured, is used to listen for radius traffic and access my switches from the CLI of PF (No VLAN, set to "other") Each VLAN has DHCP enabled (It works, devices get DHCP assigned IP addresses) Management interface is set to 172.16.xx.yy with a gateway IP of 172.16.xx.254 and is plugged into a firewall to the Internet (Internet access OK). Wireless Lan Controller is a Ruckus ZD1200 (Will later be a Cisco 5508) What is missing is: How to make the 9 servers (One in each VLAN) connect to the Internet permanently but still be assigned IP addresses from the PF DHCP server? Preferably, I should be able to set up a static IP address for each server in each VLAN - Documentation says this can be done by manually configuring DHCP. Is there a way to set these up and "manually" register them permanently? Using an ACL or something similar. How to allow clients access to the Internet, once assigned to any of the 9 VLAN's? The client shall still be assigned the appropriate IP address by DHCP. As there will only ever be 1 client in a VLAN at any one time, its MAC address could be used to open up access, however, it needs to have PF assign IP addresses. Finally, on receiving a "disconnect" signal from the external equipment, the client shall be disconnected from the VLAN and preferably disassociated from the WLC. Is it even possible to tell the WLC to disassociate a client via PF, maybe through the API. I know this is a very specific implementation but PF seems to have all that would be needed to do this. Tony _______________________________________________ PacketFence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
-- Fabrice Durand [email protected] :: +1.514.447.4918 (x135) :: www.inverse.ca Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence (http://packetfence.org) _______________________________________________ PacketFence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
