Hi, I'm new to Packetfence but been using 802.1x with NPS / Freeradius for a 
long time. Packetfence wide features and nice GUI caught my eye but got stuck 
right away...

In short, Authenication towards AD works fine and Acceptance is Passed. BUT 
roles are not.
That said The connection policy is set to Ethernet-EAP and noEAP and AD as 
source with auto register devices. The device being used get's registered with 
a "none" role which is then also "applied" to the user meaning no VLAN or ACL 
is passed to the Switch. Would I change the device role the user authenticated 
would get that role to.

Packetfence log says:
Feb 25 03:05:33 RADIUS-1 packetfence_httpd.aaa: httpd.aaa(45170) INFO: 
[mac:c4:65:16:9e:b4:e6] handling radius autz request: from switch_ip => 
(10.0.20.2), connection_type => Ethernet-NoEAP,switch_mac => 
(38:21:c7:4e:d1:22), mac => [c4:65:16:9e:b4:e6], port => 12, username => 
"vemab\dkdata" (pf::radius::authorize)
Feb 25 03:05:33 RADIUS-1 packetfence_httpd.aaa: httpd.aaa(45170) INFO: 
[mac:c4:65:16:9e:b4:e6] Instantiate profile LAN 
(pf::Connection::ProfileFactory::_from_profile)
Feb 25 03:05:33 RADIUS-1 packetfence_httpd.aaa: httpd.aaa(45170) INFO: 
[mac:c4:65:16:9e:b4:e6] Found authentication source(s) : 'VEMAB_AD' for realm 
'default' (pf::config::util::filter_authentication_sources)
Feb 25 03:05:33 RADIUS-1 packetfence_httpd.aaa: httpd.aaa(45170) WARN: 
[mac:c4:65:16:9e:b4:e6] No category computed for autoreg 
(pf::role::getNodeInfoForAutoReg)
Feb 25 03:05:33 RADIUS-1 packetfence_httpd.aaa: httpd.aaa(45170) WARN: 
[mac:c4:65:16:9e:b4:e6] Switch type 'pf::Switch::Aruba::2930M' does not support 
MABFloatingDevices (pf::SwitchSupports::__ANON__)
Feb 25 03:05:33 RADIUS-1 packetfence_httpd.aaa: httpd.aaa(45170) INFO: 
[mac:c4:65:16:9e:b4:e6] Found authentication source(s) : 'VEMAB_AD' for realm 
'default' (pf::config::util::filter_authentication_sources)
Feb 25 03:05:33 RADIUS-1 packetfence_httpd.aaa: httpd.aaa(45170) INFO: 
[mac:c4:65:16:9e:b4:e6] Connection type is MAC-AUTH. Getting role from 
node_info (pf::role::getRegisteredRole)
Feb 25 03:05:33 RADIUS-1 packetfence_httpd.aaa: httpd.aaa(45170) WARN: 
[mac:c4:65:16:9e:b4:e6] Use of uninitialized value $role in concatenation (.) 
or string at /usr/local/pf/lib/pf/role.pm line 483.
(pf::role::getRegisteredRole)
Feb 25 03:05:33 RADIUS-1 packetfence_httpd.aaa: httpd.aaa(45170) INFO: 
[mac:c4:65:16:9e:b4:e6] Username was NOT defined or unable to match a role - 
returning node based role '' (pf::role::getRegisteredRole)
Feb 25 03:05:33 RADIUS-1 packetfence_httpd.aaa: httpd.aaa(45170) INFO: 
[mac:c4:65:16:9e:b4:e6] PID: "default", Status: reg Returned VLAN: (undefined), 
Role: (undefined) (pf::role::fetchRoleForNode)
Feb 25 03:05:33 RADIUS-1 packetfence_httpd.aaa: httpd.aaa(45170) WARN: 
[mac:c4:65:16:9e:b4:e6] Use of uninitialized value $vlanName in hash element at 
/usr/local/pf/lib/pf/Switch.pm line 608.
(pf::Switch::getVlanByName)
Feb 25 03:05:33 RADIUS-1 packetfence_httpd.aaa: httpd.aaa(45170) WARN: 
[mac:c4:65:16:9e:b4:e6] Use of uninitialized value $vlanName in concatenation 
(.) or string at /usr/local/pf/lib/pf/Switch.pm line 611.
(pf::Switch::getVlanByName)


Sum: Username was NOT defined or unable to match a role

Radius LOG:
Feb 25 03:05:33 RADIUS-1 auth[46782]: rlm_rest (rest): Opening additional 
connection (6), 1 of 61 pending slots used
Feb 25 03:05:33 RADIUS-1 auth[46782]: [mac:c4:65:16:9e:b4:e6] Accepted user:  
and returned VLAN
Feb 25 03:05:33 RADIUS-1 auth[46782]: (40) Login OK: [vemab\dkdata] (from 
client 10.0.20.2/32 port 12 cli c4:65:16:9e:b4:e6)

Sum: no vlan passed

While pftest says:
Testing authentication for "dkdata"

Authenticating against 'local' in context 'admin'
  Authentication FAILED against local (Invalid login or password)
  Did not match against local for 'authentication' rules
  Did not match against local for 'administration' rules

Authenticating against 'local' in context 'portal'
  Authentication FAILED against local (Invalid login or password)
  Did not match against local for 'authentication' rules
  Did not match against local for 'administration' rules

Authenticating against 'file1' in context 'admin'
  Authentication FAILED against file1 (Invalid login or password)
  Did not match against file1 for 'authentication' rules
  Did not match against file1 for 'administration' rules

Authenticating against 'file1' in context 'portal'
  Authentication FAILED against file1 (Invalid login or password)
  Did not match against file1 for 'authentication' rules
  Did not match against file1 for 'administration' rules

Authenticating against 'sms' in context 'admin'
  Authentication FAILED against sms (Invalid login or password)
  Matched against sms for 'authentication' rule catchall
    set_role : guest
    set_access_duration : 1D
  Did not match against sms for 'administration' rules

Authenticating against 'sms' in context 'portal'
  Authentication FAILED against sms (Invalid login or password)
  Matched against sms for 'authentication' rule catchall
    set_role : guest
    set_access_duration : 1D
  Did not match against sms for 'administration' rules

Authenticating against 'email' in context 'admin'
  Authentication SUCCEEDED against email ()
  Matched against email for 'authentication' rule catchall
    set_role : guest
    set_access_duration : 1D
  Did not match against email for 'administration' rules

Authenticating against 'email' in context 'portal'
  Authentication SUCCEEDED against email ()
  Matched against email for 'authentication' rule catchall
    set_role : guest
    set_access_duration : 1D
  Did not match against email for 'administration' rules

Authenticating against 'sponsor' in context 'admin'
  Authentication SUCCEEDED against sponsor ()
  Matched against sponsor for 'authentication' rule catchall
    set_role : guest
    set_access_duration : 1D
  Did not match against sponsor for 'administration' rules

Authenticating against 'sponsor' in context 'portal'
  Authentication SUCCEEDED against sponsor ()
  Matched against sponsor for 'authentication' rule catchall
    set_role : guest
    set_access_duration : 1D
  Did not match against sponsor for 'administration' rules

Authenticating against 'null' in context 'admin'
  Authentication SUCCEEDED against null ()
  Matched against null for 'authentication' rule catchall
    set_role : guest
    set_access_duration : 1D
  Did not match against null for 'administration' rules

Authenticating against 'null' in context 'portal'
  Authentication SUCCEEDED against null ()
  Matched against null for 'authentication' rule catchall
    set_role : guest
    set_access_duration : 1D
  Did not match against null for 'administration' rules

Authenticating against 'VEMAB_AD' in context 'admin'
  Authentication SUCCEEDED against VEMAB_AD (Authentication successful.)
  Matched against VEMAB_AD for 'authentication' rule ADMIN
    set_role : MGMT
    set_access_duration : 3h
  Did not match against VEMAB_AD for 'administration' rules

Authenticating against 'VEMAB_AD' in context 'portal'
  Authentication SUCCEEDED against VEMAB_AD (Authentication successful.)
  Matched against VEMAB_AD for 'authentication' rule ADMIN
    set_role : MGMT
    set_access_duration : 3h
  Did not match against VEMAB_AD for 'administration' rules

In other words should return role MGMT which is vlan 10 according to the test, 
I put lots of hours yesterday on this probably very simple error... Switch 
config is this:

[10.0.20.2]
description=CORE-1
type=Aruba::2930M
USERVlan=30
radiusSecret=*********
MGMTVlan=10
deauthMethod=RADIUS
MGMT_ISOLATIONVlan=11
guestVlan=31
defaultVlan=30

What am I missing ?

BR,
Anton.

_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to