Hello everyone:

I am testing this solution and I have gone crazy with its potential, but I
still can't close the configuration I need.

Your help please!!!

I explain, I have followed information and official manuals.

https://packetfence.org/doc/PacketFence_Installation_Guide.html
https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_ruckus_smartzone

ISSUE:
The wireless network maintains WPA2 access and the user and password are
known to the workers.

OBJECTIVE:
Access to the wireless network through a captive portal with active
directory credentials.

INFRASTRUCTURE:
- Subnet Server x.y.z.0/24
- Subnet Emploee: a.b.c.0/24
- SmartZone 100 Ruckus Wireless Controller (x.y.z.150).
- ADDS with Windows 2012 R2 (x.y.z.50)
- Packetfence-ZEN in vmware (x.y.z.48).

STEPS
- INITIAL SETUP:
1.- Mechanism chosen: RADIUS enforcement (only).
2.- 01 Network interface:
     Type: Management.
     Additional Demon: RADIUS
3.- Database (all by default).
4.- General Options:
    Domain: PYME
    Hostname: PacketFence
    DHCP: x.y.z.61,  x.y.z.62 (my DHCP servers)
5.- to 7.- (Default).

PACKETFENCE CONFIGURATION:
1.- Role: Role_Employee
2.- Active Directory Domain:
    Identifier: MiPYME
    WorkGroup: PYME
    DNS name (FQDN): PYME.local
    Server Name: Packetfence
    AD Server:  x.y.z.50
    DNS Server:  x.y.z.50
    User: PYME.local\packetfence
3.- Realm DEAFULT:
    Realm: DEFAULT
    Domain: PYME
    Realm Options: strip
    Authorize from PacketFence: Check
4.- Authentication Sources:
     Name: AD01
     Host:  x.y.z.50
     Base DN: DC = PYME, DC = local
     Scope: Subtree
     Username Attribute: sAMAccountName
     Bind DN: CN = packetfence, OU = DelegatedAdmins, DC = PYME, DC = local
     Password: 12345678
     Rule: Rule_Employee
     Role: Role_ Employee
     Unregistration date
5.- Network Devices:
     IP:  x.y.z.150
     Description: SZRuckus
    Type: Ruckus SamrtZone Wireless Controllers
    Mode: Production
    Deauthentication Method: RADIUS
    Use CoA: Check
    CLI Access Enabled: Check
    External Portal Enforcement: Check
    Secret Passphrase: 12345678
    Web Service Password: 12345678
6.-
https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_ruckus_smartzone

However, when I apply the test (with the jperez user) from the WLC it is
not authenticated

This is the event log of radius service:
[root@PacketFence ~]# tail -f /usr/local/pf/logs/radius.log
Sep 25 17:35:46 PacketFence auth[20051]: (39) Invalid user: [jperez] (from
client x.y.z.150/32 port 1)
Sep 25 17:35:46 PacketFence auth[20051]: [mac:] Rejected user: jperez
Sep 25 17:35:46 PacketFence auth[20051]: (39) Login incorrect: [jperez]
(from client  x.y.z .150/32 port 1)
Sep 25 17:36:14 PacketFence auth[20051]: Need 1 more connections to reach
min connections (3)
Sep 25 17:36:14 PacketFence auth[20051]: rlm_sql (sql): Opening additional
connection (4), 1 of 62 pending slots used
Sep 25 17:36:14 PacketFence auth[20051]: Need 1 more connections to reach
min connections (3)
Sep 25 17:36:14 PacketFence auth[20051]: rlm_rest (rest): Opening
additional connection (2), 1 of 62 pending slots used
Sep 25 17:36:14 PacketFence auth[20051]: (41) Invalid user: [jperez] (from
client  x.y.z.150/32 port 1)
Sep 25 17:36:14 PacketFence auth[20051]: [mac:] Rejected user: jperez
Sep 25 17:36:14 PacketFence auth[20051]: (41) Login incorrect: [jperez]
(from client  x.y.z.150/32 port 1)
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to