Good afternoon everyone,

I'm working on a replacement PacketFence installation to replace our VERY, VERY 
old PacketFence 3.5.0. In doing so, we're looking to increase our security from 
MAC Based Security to EAP and NEAP.

We have a manufacture homogeneous environment in which we use only 
Avaya/Nortel/Extreme switches of the 3500, 4800, 5500, 5600 and 5900 Series 
switches. I've been able to get the 4800s and 5900s working using both EAP and 
NEAP. However, I'm having a terrible time getting NEAP to work on the 5600s and 
5500s

Below is a working NEAP and EAP connection on an ERS4800 complete with RADIUS 
printouts and logs from the server.

*** 4850 ***
*** NEAP ***
httpd.aaa(52738) INFO: [mac:a8:20:66:29:95:85] handling radius autz request: 
from switch_ip => (172.16.75.48), connection_type => Ethernet-NoEAP,switch_mac 
=> (SWITCH), mac => [a8:20:66:29:95:85], port => 29, username => 
"a8:20:66:29:95:85" (pf::radius::authorize)
httpd.aaa(52738) WARN: [mac:a8:20:66:29:95:85] Switch type 
'pf::Switch::Avaya::ERS5000_6x' does not support Cdp 
(pf::SwitchSupports::__ANON__)
httpd.aaa(52738) INFO: [mac:a8:20:66:29:95:85] Could not find any IP phones 
through discovery protocols for ifIndex 29 (pf::Switch::getPhonesDPAtIfIndex)
httpd.aaa(52738) INFO: [mac:a8:20:66:29:95:85] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
httpd.aaa(52738) WARN: [mac:a8:20:66:29:95:85] Switch type 
'pf::Switch::Avaya::ERS5000_6x' does not support MABFloatingDevices 
(pf::SwitchSupports::__ANON__)
httpd.aaa(52738) INFO: [mac:a8:20:66:29:95:85] Found authentication source(s) : 
'UNBDOMAIN' for realm 'null' (pf::config::util::filter_authentication_sources)
httpd.aaa(52738) INFO: [mac:a8:20:66:29:95:85] Connection type is MAC-AUTH. 
Getting role from Authorization source (pf::role::getRegisteredRole)
httpd.aaa(52738) INFO: [mac:a8:20:66:29:95:85] Username was defined 
"a8:20:66:29:95:85" - returning role 'BuildingNet' (pf::role::getRegisteredRole)
httpd.aaa(52738) INFO: [mac:a8:20:66:29:95:85] PID: "g018r", Status: reg 
Returned VLAN: (undefined), Role: BuildingNet (pf::role::fetchRoleForNode)
httpd.aaa(52738) INFO: [mac:a8:20:66:29:95:85] (172.16.75.48) Added VLAN 75 to 
the returned RADIUS Access-Accept (pf::Switch::returnRadiusAccessAccept)
httpd.aaa(52738) INFO: [mac:a8:20:66:29:95:85] Match rule 1:all&vlan_75 
(pf::access_filter::radius::test)

RADIUS Request
      User-Name = "a8:20:66:29:95:85"
      User-Password = "******"
      NAS-IP-Address = 172.16.75.48
      NAS-Port = 29
      Service-Type = Login-User
      Called-Station-Id = "SWITCH"
      Calling-Station-Id = "a8:20:66:29:95:85"
      NAS-Port-Type = Ethernet
      Event-Timestamp = "Feb 18 2020 14:53:11 AST"
      NAS-Port-Id = "0/29"
      Stripped-User-Name = "a8:20:66:29:95:85"
      Realm = "null"
      FreeRADIUS-Client-IP-Address = 172.16.75.48
      PacketFence-KeyBalanced = "27976f2388778312dd4908cee7499d95"
      PacketFence-Radius-Ip = "10.5.13.25"
      Attr-26.562.180 = 0x00000000
      SQL-User-Name = "a8:20:66:29:95:85"

RADIUS Reply
      Reply-Message = "Request processed by PacketFence"
      Tunnel-Medium-Type = IEEE-802
      Tunnel-Private-Group-Id = "75"
      Egress-VLANID = 838860875
      Tunnel-Type = VLAN

*** EAP ***
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] handling radius autz request: 
from switch_ip => (172.16.75.48), connection_type => Ethernet-EAP,switch_mac => 
(SWITCH), mac => [24:b6:fd:fc:39:ed], port => 23, username => 
"host/FR-ITS-28381.ad.unb.ca" (pf::radius::authorize)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] is doing machine auth with 
account 'host/FR-ITS-28381.ad.unb.ca'. (pf::radius::authorize)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] Instantiate profile 
DomainMachines (pf::Connection::ProfileFactory::_from_profile)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] Found authentication source(s) : 
'UNBDOMAIN-Machines' for realm 'ad.unb.ca' 
(pf::config::util::filter_authentication_sources)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] Using sources UNBDOMAIN-Machines 
for matching (pf::authentication::match2)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] Matched rule (Everyone) in 
source UNBDOMAIN-Machines, returning actions. 
(pf::Authentication::Source::match_rule)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] Matched rule (Everyone) in 
source UNBDOMAIN-Machines, returning actions. 
(pf::Authentication::Source::match)
httpd.aaa(52738) WARN: [mac:24:b6:fd:fc:39:ed] Switch type 
'pf::Switch::Avaya::ERS5000_6x' does not support MABFloatingDevices 
(pf::SwitchSupports::__ANON__)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] Found authentication source(s) : 
'UNBDOMAIN-Machines' for realm 'ad.unb.ca' 
(pf::config::util::filter_authentication_sources)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] Role has already been computed 
and we don't want to recompute it. Getting role from node_info 
(pf::role::getRegisteredRole)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] Username was defined 
"host/FR-ITS-28381.ad.unb.ca" - returning role 'BuildingNet' 
(pf::role::getRegisteredRole)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] PID: 
"host/FR-ITS-28381.ad.unb.ca", Status: reg Returned VLAN: (undefined), Role: 
BuildingNet (pf::role::fetchRoleForNode)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] (172.16.75.48) Added VLAN 75 to 
the returned RADIUS Access-Accept (pf::Switch::returnRadiusAccessAccept)
pfqueue(104870)  INFO: [mac:unknown] Already did a person lookup for 
host/FR-ITS-28381.ad.unb.ca (pf::lookup::person::lookup_person)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] Match rule 1:all&vlan_75 
(pf::access_filter::radius::test)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] security_event 1300003 
force-closed for 24:b6:fd:fc:39:ed 
(pf::security_event::security_event_force_close)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] Instantiate profile 
DomainMachines (pf::Connection::ProfileFactory::_from_profile)

RADIUS Request
      User-Name = "host/FR-ITS-28381.ad.unb.ca"
      NAS-IP-Address = 172.16.75.48
      NAS-Port = 23
      Service-Type = Framed-User
      Framed-MTU = 1490
      State = 0x25920796249b1d65694ece287ebe464c
      Called-Station-Id = "SWITCH"
      Calling-Station-Id = "24b6fdfc39ed"
      NAS-Port-Type = Ethernet
      Event-Timestamp = "Feb 18 2020 14:17:28 AST"
      EAP-Message = 0x020900061a03
      NAS-Port-Id = "0/23"
      FreeRADIUS-Proxied-To = 127.0.0.1
      EAP-Type = MSCHAPv2
      Realm = "ad.unb.ca"
      PacketFence-Domain = "UNBDOMAIN"
      PacketFence-KeyBalanced = "911d2640025aa742fc8890e3c5a50b6e"
      PacketFence-Radius-Ip = "10.5.13.25"
      PacketFence-NTLMv2-Only = ""
      Attr-26.562.180 = 0x00000000
      Attr-26.562.183 = 0x00000000
      User-Password = "******"
      SQL-User-Name = "host/FR-ITS-28381.ad.unb.ca"

RADIUS Reply
      MS-MPPE-Encryption-Policy = Encryption-Required
      MS-MPPE-Encryption-Types = 4
      MS-MPPE-Send-Key = 0x504e36e78a213b69bb8a1c570a21ee13
      MS-MPPE-Recv-Key = 0x1202abbe75113721a5e78f6620d117cd
      EAP-Message = 0x03090004
      Message-Authenticator = 0x00000000000000000000000000000000
      User-Name = "host/FR-ITS-28381.ad.unb.ca"
      Reply-Message = "Request processed by PacketFence"
      Tunnel-Medium-Type = IEEE-802
      Tunnel-Private-Group-Id = "75"
      Egress-VLANID = 838860875
      Tunnel-Type = VLAN

The 4850's configuration for EAP is as follows:
      eapol multihost allow-non-eap-enable
      eapol multihost radius-non-eap-enable
      eapol multihost use-radius-assigned-vlan
      eapol multihost non-eap-use-radius-assigned-vlan
      eapol multihost eap-packet-mode unicast
      eapol multihost multivlan enable
      eapol multihost non-eap-reauthentication-enable
      interface Ethernet ALL
      eapol multihost port 1-47 enable eap-mac-max 3 non-eap-mac-max 3 
radius-non-eap-enable use-radius-assigned-vlan non-eap-use-radius-a
      ssigned-vlan eap-packet-mode unicast mac-max 3
      exit
      interface Ethernet ALL
      eapol port 1-47 status auto re-authentication enable 
re-authentication-period 3300
      exit

      eapol multihost voip-vlan 1 enable vid 2075
      ! eapol enable

*** 5650 ***
*** NEAP ***
httpd.aaa(52738) WARN: [mac:a8:20:66:29:95:85] Switch type 
'pf::Switch::Avaya::ERS5000_6x' does not support VPN 
(pf::SwitchSupports::__ANON__)
httpd.aaa(52738) WARN: [mac:a8:20:66:29:95:85] CLI Access is not permit on this 
switch 172.16.75.56 (pf::radius::switch_access)

RADIUS Request
      User-Name = "a82066299585"
      User-Password = "******"
      NAS-IP-Address = 172.16.75.56
      NAS-Port = 19
      Service-Type = Login-User
      NAS-Port-Type = Ethernet
      Event-Timestamp = "Feb 19 2020 14:57:39 AST"
      Stripped-User-Name = "a82066299585"
      Realm = "null"
      FreeRADIUS-Client-IP-Address = 172.16.75.56
      PacketFence-KeyBalanced = "e8ef48faa82ab19678f69f55f5f8a242"
      PacketFence-Radius-Ip = "10.5.13.25"
      Attr-26.562.180 = 0x00000000
      Module-Failure-Message = "rest: Server returned:"
      Module-Failure-Message = "rest: 
{\"control:PacketFence-Authorization-Status\":\"allow\",\"Reply-Message\":\"CLI 
or VPN Access is not allowed by PacketFence on this switch\"}"
      SQL-User-Name = "a82066299585"
RADIUS Reply
      NIL

*** EAP ***
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] handling radius autz request: 
from switch_ip => (172.16.75.56), connection_type => Ethernet-EAP,switch_mac => 
(Unknown), mac => [24:b6:fd:fc:39:ed], port => 27, username => 
"host/FR-ITS-28381.ad.unb.ca" (pf::radius::authorize)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] is doing machine auth with 
account 'host/FR-ITS-28381.ad.unb.ca'. (pf::radius::authorize)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] Instantiate profile 
DomainMachines (pf::Connection::ProfileFactory::_from_profile)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] Found authentication source(s) : 
'UNBDOMAIN-Machines' for realm 'ad.unb.ca' 
(pf::config::util::filter_authentication_sources)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] Using sources UNBDOMAIN-Machines 
for matching (pf::authentication::match2)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] Matched rule (Everyone) in 
source UNBDOMAIN-Machines, returning actions. 
(pf::Authentication::Source::match_rule)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] Matched rule (Everyone) in 
source UNBDOMAIN-Machines, returning actions. 
(pf::Authentication::Source::match)
httpd.aaa(52738) WARN: [mac:24:b6:fd:fc:39:ed] Switch type 
'pf::Switch::Avaya::ERS5000_6x' does not support MABFloatingDevices 
(pf::SwitchSupports::__ANON__)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] Found authentication source(s) : 
'UNBDOMAIN-Machines' for realm 'ad.unb.ca' 
(pf::config::util::filter_authentication_sources)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] Role has already been computed 
and we don't want to recompute it. Getting role from node_info 
(pf::role::getRegisteredRole)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] Username was defined 
"host/FR-ITS-28381.ad.unb.ca" - returning role 'BuildingNet' 
(pf::role::getRegisteredRole)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] PID: 
"host/FR-ITS-28381.ad.unb.ca", Status: reg Returned VLAN: (undefined), Role: 
BuildingNet (pf::role::fetchRoleForNode)
pfqueue(104870) INFO: [mac:unknown] Already did a person lookup for 
host/FR-ITS-28381.ad.unb.ca (pf::lookup::person::lookup_person)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] (172.16.75.56) Added VLAN 75 to 
the returned RADIUS Access-Accept (pf::Switch::returnRadiusAccessAccept)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] Match rule 1:all&vlan_75 
(pf::access_filter::radius::test)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] security_event 1300003 
force-closed for 24:b6:fd:fc:39:ed 
(pf::security_event::security_event_force_close)
httpd.aaa(52738) INFO: [mac:24:b6:fd:fc:39:ed] Instantiate profile 
DomainMachines (pf::Connection::ProfileFactory::_from_profile)

RADIUS Request
      User-Name = "host/FR-ITS-28381.ad.unb.ca"
      NAS-IP-Address = 172.16.75.56
      NAS-Port = 27
      Service-Type = Framed-User
      Framed-MTU = 1490
      State = 0x0f6e5adf0e674092fcd27d9f3dcc219d
      Calling-Station-Id = "24:b6:fd:fc:39:ed"
      NAS-Port-Type = Ethernet
      Event-Timestamp = "Feb 19 2020 15:00:15 AST"
      EAP-Message = 0x020900061a03
      FreeRADIUS-Proxied-To = 127.0.0.1
      EAP-Type = MSCHAPv2
      Realm = "ad.unb.ca"
      PacketFence-Domain = "UNBDOMAIN"
      PacketFence-KeyBalanced = "911d2640025aa742fc8890e3c5a50b6e"
      PacketFence-Radius-Ip = "10.5.13.25"
      PacketFence-NTLMv2-Only = ""
      Attr-26.562.180 = 0x00000000
      User-Password = "******"
      SQL-User-Name = "host/FR-ITS-28381.ad.unb.ca"
RADIUS Reply
      MS-MPPE-Encryption-Policy = Encryption-Required
      MS-MPPE-Encryption-Types = 4
      MS-MPPE-Send-Key = 0xf22767034318ab508c8f1147408aecfd
      MS-MPPE-Recv-Key = 0x6101d7aca23e0af2f49dd04a85e1aecd
      EAP-Message = 0x03090004
      Message-Authenticator = 0x00000000000000000000000000000000
      User-Name = "host/FR-ITS-28381.ad.unb.ca"
      Reply-Message = "Request processed by PacketFence"
      Tunnel-Medium-Type = IEEE-802
      Tunnel-Private-Group-Id = "75"
      Egress-VLANID = 838860875
      Tunnel-Type = VLAN

The 5698's configuration for EAP is as follows:
      eapol multihost allow-non-eap-enable
      eapol multihost radius-non-eap-enable
      eapol multihost use-radius-assigned-vlan
      eapol multihost non-eap-use-radius-assigned-vlan
      eapol multihost eap-packet-mode unicast
      eapol multihost multivlan enable
      eapol multihost non-eap-reauthentication-enable
      interface Ethernet ALL
      eapol multihost port 1-47 enable eap-mac-max 3 non-eap-mac-max 3 
radius-non-eap-enable use-radius-assigned-vlan non-eap-use-radius-a
      ssigned-vlan eap-packet-mode unicast mac-max 3
      eapol multihost port 48-98 mac-max 2
      exit
      interface Ethernet ALL
      eapol port 1-47 status auto re-authentication enable 
re-authentication-period 3300
      exit

      eapol multihost voip-vlan 1 enable vid 2075
      ! eapol enable

If I had to guess, the 5600 series switches are either not sending the 
Calling-Station-ID, which it should be for both EAP and NEAP. Anyone have any 
guesses where to go from here? Anyone have any ideas? A working installation 
that uses both NEAP and EAP on Avaya/Nortel/Extreme 5500 and 5600 series 
switches?

To make matters more interesting, I have a working switch that used the Avaya 
IDE for both NEAP and EAP, and it works great. Copying the configuration from 
one to the other does not work.

Any information would be helpful.

Cheers,

CHRIS CRAWFORD
Network Analyst * Information Technology Services
T 506 453-4695 C 506 260-8795
[University of New Brunswick]
[Facebook]/uofnb<https://www.facebook.com/uofnb> [Twitter] 
@unb<https://twitter.com/UNB> [Instagram] 
@discoverunb<https://instagram.com/discoverunb/> UNB.ca<http://www.unb.ca/>
Confidentiality Note: This email and the information contained in it is 
confidential, may be privileged and is intended for the exclusive use of the 
addressee(s). Any other person is strictly prohibited from using, disclosing, 
distributing or reproducing it. If you have received this communication in 
error, please reply by email to the sender and delete or destroy all copies of 
this message.


_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to