I did. I set the switch type to the new template and rebooted both PF and the switch to be sure… After reboot PF showed the type as the new template. It was after the reboot that I took the screenshots. Just changing the switch back to the default Extreme template and the VLAN is populated – when using the ‘private-id’ attribute.
Thanks, Bill From: Ludovic Zammit <lzam...@inverse.ca> Sent: Tuesday, May 12, 2020 8:12 AM To: Bill Handler <bhand...@pcsknox.com> Cc: packetfence-users@lists.sourceforge.net Subject: Re: [PacketFence-users] Role mapped to Tagged VLANs Hello Bill, Out of curiosity, did you select and apply that template that you created to your switch ? Thanks, Ludovic Zammit lzam...@inverse.ca<mailto:lzam...@inverse.ca> :: +1.514.447.4918 (x145) :: www.inverse.ca<http://www.inverse.ca> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence (http://packetfence.org) On May 11, 2020, at 4:24 PM, Bill Handler <bhand...@pcsknox.com<mailto:bhand...@pcsknox.com>> wrote: Ludovic, Made a custom template, but it does not seem to be passing the RADIUS Attribute… This is the Template I’ve created: <image005.jpg> The Extreme-Netlogin-Extended-Vlan attribute does not seem to be being passed to the switch… within the Auditing window for the end-system I see: <image006.png> For the canned Extreme Template RADIUS shows: <image007.png> I changed the VLAN within the config to ‘Data’ to ensure it was being read… The radiusd.log shows: [root@pf428 logs]# cat -t 50 radius.log | grep VLAN cat: 50: No such file or directory May 11 04:40:29 pf428 auth[3321]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN 200 May 11 05:40:28 pf428 auth[3321]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN 200 May 11 06:40:27 pf428 auth[3321]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN 200 May 11 06:46:27 pf428 auth[3321]: [mac:a0:d3:c1:12:b6:a2] Accepted user: host/TRAINING-SD03.pcsknox.com<http://training-sd03.pcsknox.com/> and returned VLAN 200 May 11 07:40:26 pf428 auth[3321]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN 200 May 11 08:40:25 pf428 auth[3321]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN 200 May 11 09:40:24 pf428 auth[3321]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN 200 May 11 10:40:23 pf428 auth[3321]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN 200 May 11 11:40:22 pf428 auth[3321]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN 200 May 11 12:40:21 pf428 auth[3321]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN 200 May 11 13:40:19 pf428 auth[3321]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN 200 May 11 14:40:18 pf428 auth[3321]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN 200 May 11 15:40:17 pf428 auth[3321]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN 200 May 11 15:47:26 pf428 auth[3321]: [mac:78:45:c4:1d:7b:e9] Accepted user: and returned VLAN May 11 15:47:27 pf428 auth[3321]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN May 11 15:48:27 pf428 auth[3321]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN May 11 15:53:24 pf428 auth[3357]: [mac:78:45:c4:1d:7b:e9] Accepted user: and returned VLAN May 11 15:53:26 pf428 auth[3357]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN May 11 15:54:27 pf428 auth[3357]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN May 11 16:01:04 pf428 auth[3357]: [mac:78:45:c4:1d:7b:e9] Accepted user: and returned VLAN May 11 16:01:04 pf428 auth[3357]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN May 11 16:02:05 pf428 auth[3357]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN May 11 16:03:05 pf428 auth[3357]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN May 11 16:07:52 pf428 auth[3357]: [mac:78:45:c4:1d:7b:e9] Accepted user: and returned VLAN May 11 16:07:52 pf428 auth[3357]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN May 11 16:08:52 pf428 auth[3357]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN May 11 16:09:37 pf428 auth[3357]: [mac:78:45:c4:1d:7b:e9] Accepted user: and returned VLAN Data May 11 16:09:38 pf428 auth[3357]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN Data May 11 16:10:38 pf428 auth[3357]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN Data May 11 16:16:33 pf428 auth[3357]: [mac:78:45:c4:1d:7b:e9] Accepted user: and returned VLAN Data May 11 16:16:33 pf428 auth[3357]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN Data May 11 16:17:33 pf428 auth[3357]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN Data May 11 16:18:34 pf428 auth[3357]: [mac:78:45:c4:1d:7b:e9] Accepted user: host/pf-test.pcsknox.com<http://pf-test.pcsknox.com/>and returned VLAN Data The end-system is being authenticated, but when using the Extreme Attribute, it is not returning anything from RADIUS, and leaves the VLAN blank in the log… Any help is appreciated Thanks, Bill From: Ludovic Zammit <lzam...@inverse.ca<mailto:lzam...@inverse.ca>> Sent: Thursday, May 7, 2020 8:34 AM To: Bill Handler <bhand...@pcsknox.com<mailto:bhand...@pcsknox.com>> Cc: packetfence-users@lists.sourceforge.net<mailto:packetfence-users@lists.sourceforge.net> Subject: Re: [PacketFence-users] Role mapped to Tagged VLANs Hello Bill, If you are using PacketFence v10 we have implemented switch templates. It’s under Configuration > Integration > Switch Templates You can check out how the Cisco::Switch is done with the voice scope: <image003.png> Or the HP::Switch : <image004.png> If you don’t have PacketFence v10, you would need to create you own switch module in perl. Thanks, Ludovic Zammit lzam...@inverse.ca<mailto:lzam...@inverse.ca> :: +1.514.447.4918 (x145) :: www.inverse.ca<http://www.inverse.ca/> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu<http://www.sogo.nu/>) and PacketFence (http://packetfence.org<http://packetfence.org/>) On May 7, 2020, at 5:31 AM, Bill Handler <bhand...@pcsknox.com<mailto:bhand...@pcsknox.com>> wrote: Understood, what I was meaning is how do we add the VSAs to PacketFence to enhance/expand the functionality? Or set custom attributes for the certain vendors’ equipment? Thanks, Bill Sent from my iPad On May 6, 2020, at 9:33 PM, Ludovic Zammit <lzam...@inverse.ca<mailto:lzam...@inverse.ca>> wrote: Each vendor have specific ones. It’s the way they support voice, check their radius attributes documentation. Thanks, On May 6, 2020, at 7:51 PM, Bill Handler <bhand...@pcsknox.com<mailto:bhand...@pcsknox.com>> wrote: Ludovic, How do we add vendor-specific VSAs? Thanks, Bill Sent from my iPad On May 6, 2020, at 8:09 AM, Ludovic Zammit <lzam...@inverse.ca<mailto:lzam...@inverse.ca>> wrote: Hello Bill, You would have to rely on the Radius VOIP capabilities of those network equipment. PacketFence supports VOIP on HP/ Aruba switches. On the Aruba AP you would have to process the VOIP as a normal VLAN. You can try to check the VOIP flag under a mac address and connect it on a HP/ Aruba switch. You would need to have your voice VLAN marked as a voice clan under your switch. As per Extreme switch, we don’t support voice VSA. Thanks, Ludovic Zammit lzam...@inverse.ca<mailto:lzam...@inverse.ca> :: +1.514.447.4918 (x145) :: www.inverse.ca<http://www.inverse.ca/> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu<http://www.sogo.nu/>) and PacketFence (http://packetfence.org<http://packetfence.org/>) On May 6, 2020, at 8:00 AM, Bill Handler <bhand...@pcsknox.com<mailto:bhand...@pcsknox.com>> wrote: Extreme Networks and HP/Aruba switches/APs with a variety of VoIP phones - yealink Avaya polycom etc Sent from my iPhone On May 6, 2020, at 6:53 AM, Ludovic Zammit <lzam...@inverse.ca<mailto:lzam...@inverse.ca>> wrote: Hello Bill, Which kind of equipment are you using ? Thanks, Ludovic Zammit lzam...@inverse.ca<mailto:lzam...@inverse.ca> :: +1.514.447.4918 (x145) :: www.inverse.ca<http://www.inverse.ca/> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu<http://www.sogo.nu/>) and PacketFence (http://packetfence.org<http://packetfence.org/>) On May 5, 2020, at 6:02 PM, Bill Handler via PacketFence-users <packetfence-users@lists.sourceforge.net<mailto:packetfence-users@lists.sourceforge.net>> wrote: Team, Is there a way to push a tagged VLAN to the switch when a device authenticates? For example a VoIP phone, or AP. We’ve tested with a phone with a PC on the passthrough port. The PC authenticates fine on the correct VLAN, but we don’t know how to configure PF to send the phone VLAN as tagged to the switch. Thanks, Bill _______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net<mailto:PacketFence-users@lists.sourceforge.net> https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users