Thanks for the information.

Could you show me the conf/authentication.conf and conf/profiles.conf ?

Thanks,

Ludovic Zammit
lzam...@inverse.ca <mailto:lzam...@inverse.ca> ::  +1.514.447.4918 (x145) ::  
www.inverse.ca <http://www.inverse.ca/>
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu <http://www.sogo.nu/>) 
and PacketFence (http://packetfence.org <http://packetfence.org/>) 




> On Mar 11, 2020, at 6:07 AM, C. Sudec (Admin) <s...@htlwrn.ac.at> wrote:
> 
> Hi again!
> 
> Here is the realm.conf:
> [1 DEFAULT]
> admin_strip_username=enabled
> radius_strip_username=enabled
> portal_strip_username=enabled
> radius_acct=
> eduroam_radius_acct_proxy_type=load-balance
> eduroam_radius_auth_proxy_type=keyed-balance
> eduroam_radius_acct=
> eduroam_radius_auth_compute_in_pf=enabled
> radius_auth=
> permit_custom_attributes=disabled
> radius_auth_compute_in_pf=enabled
> radius_acct_proxy_type=load-balance
> radius_auth_proxy_type=keyed-balance
> domain=HTL
> eduroam_radius_auth=
> 
> [1 NULL]
> admin_strip_username=enabled
> radius_strip_username=enabled
> portal_strip_username=enabled
> eduroam_radius_auth_compute_in_pf=enabled
> eduroam_radius_acct=
> eduroam_radius_auth_proxy_type=keyed-balance
> radius_acct=
> eduroam_radius_acct_proxy_type=load-balance
> eduroam_radius_auth=
> radius_auth_proxy_type=keyed-balance
> domain=HTL
> radius_acct_proxy_type=load-balance
> radius_auth_compute_in_pf=enabled
> permit_custom_attributes=disabled
> radius_auth=
> 
> Thanks for lokong into it!
> 
> greets
> Chris
> ________________________________________
> Von: Ludovic Zammit [lzam...@inverse.ca]
> Gesendet: Dienstag, 10. März 2020 19:43
> An: C. Sudec (Admin)
> Cc: packetfence-users@lists.sourceforge.net
> Betreff: Re: [PacketFence-users] Aruba AP and VLAN Mapping - Addition
> 
> Post the result of that command:
> 
> cat /usr/local/pf/conf/realm.conf
> 
> Thanks,
> 
> Ludovic Zammit
> lzam...@inverse.ca<mailto:lzam...@inverse.ca> ::  +1.514.447.4918 (x145) ::  
> www.inverse.ca<http://www.inverse.ca>
> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
> (http://packetfence.org)
> 
> 
> 
> 
> On Mar 10, 2020, at 12:19 PM, Christian Sudec 
> <c.su...@htlwrn.ac.at<mailto:c.su...@htlwrn.ac.at>> wrote:
> 
> Hi again!
> 
> I ran 'pftest authentication Testy Testpwd' and these are the results:
> 
> Authenticating against 'HTL_AD' in context 'admin'
>  Authentication SUCCEEDED against HTL_AD (Authentication successful.)
>  Matched against HTL_AD for 'authentication' rule Teachers
>    set_role : Teacher
>    set_access_duration : 1D
>  Did not match against HTL_AD for 'administration' rules
> 
> Authenticating against 'HTL_AD' in context 'portal'
>  Authentication SUCCEEDED against HTL_AD (Authentication successful.)
>  Matched against HTL_AD for 'authentication' rule Teachers
>    set_role : Teacher
>    set_access_duration : 1D
>  Did not match against HTL_AD for 'administration' rules
> 
> So I get the preferred role, but as stated in the logs and in 'Auditing' I 
> didn't get it...
> ???
> 
> regards
> Chris
> 
> On 10.03.2020 16:09, Ludovic Zammit wrote:
> Ok, so if you are doing 802.1x then most of the time you do auto-registration 
> where you don’t display the captive portal.
> 
> In that case, your access would be computed on the fly. Do that and remove 
> device info:
> 
> grep MAC_ADDRESS /usr/local/pf/logs/packetfence.log
> 
> My guess is that you don’t match or get the VLAN for the proper role. Check 
> for the auto register option on the connection profile.
> 
> Thanks,
> Ludovic Zammit
> lzam...@inverse.ca<mailto:lzam...@inverse.ca>  <mailto:lzam...@inverse.ca>  
> ::  +1.514.447.4918 (x145) ::www.inverse.ca<http://www.inverse.ca>
> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
> (http://packetfence.org)
> 
> 
> 
> 
> On Mar 10, 2020, at 11:04 AM, Christian Sudec 
> <c.su...@htlwrn.ac.at<mailto:c.su...@htlwrn.ac.at> 
> <mailto:c.su...@htlwrn.ac.at>> wrote:
> 
> Hello Ludovic!
> 
> 
> On 10.03.2020 14:42, Ludovic Zammit wrote:
> Hello Christian,
> 
> Are you doing VLAN enforcement or Role enforcement ?
> We're doing only 'RADIUS Enforcement' as this is the requirement for 802.1x 
> (both
> wireless and wired).
> 
> On Aruba you have to do one of them, not both at the same time.
> What do you mean? When doing 802.1x packetfence uses the the username and 
> password
> with its authentication rules to determine the role (eg. teacher/pupil), 
> which is used in the
> switch-profile with "Role mapping by VLAN ID" to provide the correct VLAN 
> (772/773).
> 
> How are you redirected on the captive portal ? By a radius request ?
> There ist no captive portal, because no guests are allowed.
> 
> Once you get authenticated PF sends a radius disconnect message to the AP to 
> kick your Mac address out for the client to reconnect immediately and get the 
> production vlan/role
> That's my question: there is no Tunnel-Private-Group-ID and no disconnect 
> message. How and where do
> I set/debug these?
> 
> Check the logs/packetfence.log for your Mac address the activity and see if 
> you can find any error.
> Nothing useful (at least for me) in there:
> Mar 10 12:10:22 ippf auth[1659]: (14606)   Login OK: [Testy] (from client 
> 10.71.100.63/32 port 0 cli bc:d1:d3:31:13:78 via TLS tunnel)
> Mar 10 12:10:22 ippf auth[1659]: [mac:bc:d1:d3:31:13:78] Accepted user: Testy 
> and returned VLAN
> Mar 10 12:10:22 ippf auth[1659]: (14607) Login OK: [Testy] (from client 
> 10.71.100.63/32 port 0 cli bc:d1:d3:31:13:78)
> 
> As you can see: returned VLAN - but I don't get one...
> 
> kind regards
> 
> Thanks,
> Ludovic Zammit
> lzam...@inverse.ca<mailto:lzam...@inverse.ca> <mailto:lzam...@inverse.ca>  
> <mailto:lzam...@inverse.ca>  ::  +1.514.447.4918 (x145) 
> ::www.inverse.ca<http://www.inverse.ca> <http://www.inverse.ca>
> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
> (http://packetfence.org)
> 
> 
> 
> 
> On Mar 10, 2020, at 8:00 AM, Christian Sudec via PacketFence-users 
> <packetfence-users@lists.sourceforge.net<mailto:packetfence-users@lists.sourceforge.net>
>  <mailto:packetfence-users@lists.sourceforge.net> 
> <mailto:packetfence-users@lists.sourceforge.net>> wrote:
> 
> Hi everybody!
> 
> First the current situation so far:
> 
> We installed a test-network, where the packetfence-server is reachable with 
> an ip 10.5.1.4 (type management)
> and set 'RADIUS enforcement' as chosen method.
> 
> Next we installed a Mikrotik-Switch (POE) with 4 VLANS (771-774) and attached 
> an Aruba-AP to a trunk port
> with the mentioned VLANs. The default VLAN is 771 and the AP gets an IP and 
> can connect to the pf-server.
> 
> Now we created an authentication-source to our AD and created a 
> switch-template for the AP. There are two
> roles based on AD-group-membership: teachers (VID 772) and pupils (VID 773) - 
> set in the switch profile under
> 'Role mapping by VLAN ID'.
> 
> As far as it was possible, we set up the AP according to the packetfence 
> device configuration guide, because
> the guide refers to ArubaOS 5.x, but we are already at 8.6.0.2.
> 
> Now we are stuck: everybody can login with an ad-username (and pasword), but 
> the user doesn't get
> transferred to the correct vlan and stays in the default. In 'Auditing' I can 
> see at 'Node Information' the
> Role N/A and there is no Tunnel-Private-Group-ID in the RADIUS Reply.
> 
> Can somebody enlighten me on what to check or what to set / how to debug?
> 
> kind regards
> Chris
> 
> 
> _______________________________________________
> PacketFence-users mailing list
> PacketFence-users@lists.sourceforge.net<mailto:PacketFence-users@lists.sourceforge.net>
>  <mailto:PacketFence-users@lists.sourceforge.net> 
> <mailto:PacketFence-users@lists.sourceforge.net>
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
> 
> 
> 
> 
> 

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users
  • [PacketFence-users] Ar... Christian Sudec via PacketFence-users
    • Re: [PacketFence-... Ludovic Zammit via PacketFence-users
      • Re: [PacketFe... Christian Sudec via PacketFence-users
        • Re: [Pack... Ludovic Zammit via PacketFence-users
          • Re: [... Christian Sudec via PacketFence-users
            • ... Ludovic Zammit via PacketFence-users
              • ... Ludovic Zammit via PacketFence-users
                • ... Christian Sudec via PacketFence-users
                • ... Ludovic Zammit via PacketFence-users
                • ... Christian Sudec via PacketFence-users
            • ... Fetakungen Virtual Adventurer via PacketFence-users
            • ... Gregor Fajdiga via PacketFence-users
          • Re: [... Christian Sudec via PacketFence-users
            • ... Zacharry Williams via PacketFence-users
              • ... Christian Sudec via PacketFence-users

Reply via email to