Hi Ludovic/All,

Kindly see the status of trying to access the captive portal;

[image: image.png]

On Mon, 16 Nov 2020 at 09:42, Ezeh Victor <vickeyzed...@gmail.com> wrote:

> Hi Ludovic,
>
> Kind reminder.
>
> On Sun, Nov 15, 2020, 16:51 Ezeh Victor <vickeyzed...@gmail.com> wrote:
>
>> Hi Ludovic,
>>
>> Please I am still expecting your reply.
>>
>> On Fri, Nov 13, 2020, 19:27 Ezeh Victor <vickeyzed...@gmail.com> wrote:
>>
>>> Kindly find below;
>>>
>>> # Copyright (C) Inverse inc.
>>> #
>>> #
>>> #
>>> # See the enclosed file COPYING for license information (GPL).
>>> # If you did not receive this file, see
>>> # http://www.fsf.org/licensing/licenses/gpl.html
>>> [default]
>>> type=Cisco::WLC_2500
>>> VoIPDHCPDetect=N
>>> coaPort=3799
>>> uplink_dynamic=0
>>> deauthMethod=RADIUS
>>> always_trigger=1
>>>
>>> [172.20.130.252]
>>> description=WLC
>>> RoleMap=Y
>>> VlanMap=N
>>> registrationUrl=http://172.20.130.50/Cisco::WLC
>>> UrlMap=Y
>>> isolationRole=Isolation
>>> defaultRole=Authorize_Any
>>> registrationRole=Pre-Auth-For-WebRedirect
>>> radiusSecret=D4n-n3t0ps
>>> inlineRole=Inline
>>>
>>> # Copyright (C) Inverse inc.
>>> #
>>> #
>>> #
>>> # See the enclosed file COPYING for license information (GPL).
>>> # If you did not receive this file, see
>>> # http://www.fsf.org/licensing/licenses/gpl.html
>>> [192.168.0.1]
>>> description=Test Switch
>>> type=Cisco::Catalyst_2960
>>> mode=production
>>> uplink=23,24
>>> VoIPLLDPDetect=N
>>>
>>> #SNMPVersion = 3
>>> #SNMPEngineID = 0000000000000
>>> #SNMPUserNameRead = readUser
>>> #SNMPAuthProtocolRead = MD5
>>> #SNMPAuthPasswordRead = authpwdread
>>> #SNMPPrivProtocolRead = DES
>>> #SNMPPrivPasswordRead = privpwdread
>>> #SNMPUserNameWrite = writeUser
>>> #SNMPAuthProtocolWrite = MD5
>>> #SNMPAuthPasswordWrite = authpwdwrite
>>> #SNMPPrivProtocolWrite = DES
>>> #SNMPPrivPasswordWrite = privpwdwrite
>>> #SNMPVersionTrap = 3
>>> #SNMPUserNameTrap = readUser
>>> #SNMPAuthProtocolTrap = MD5
>>> #SNMPAuthPasswordTrap = authpwdread
>>> #SNMPPrivProtocolTrap = DES
>>> #SNMPPrivPasswordTrap = privpwdread
>>> [192.168.1.0/24]
>>> description=Test Range WLC
>>> type=Cisco::WLC
>>> mode=production
>>> uplink_dynamic=0
>>> VoIPLLDPDetect=N
>>>
>>> On Fri, 13 Nov 2020 at 19:22, Ludovic Zammit <lzam...@inverse.ca> wrote:
>>>
>>>> Send me your conf/switches.conf
>>>>
>>>> Thanks,
>>>>
>>>> On Nov 13, 2020, at 1:20 PM, Ezeh Victor <vickeyzed...@gmail.com>
>>>> wrote:
>>>>
>>>> 
>>>> Hi Ludovic,
>>>>
>>>> Thank you for your timely assistance.
>>>>
>>>> Kindly below some of the logs observed;
>>>> <image.png>
>>>>
>>>>
>>>> <image.png>
>>>>
>>>>
>>>> On Fri, 13 Nov 2020 at 18:48, Ludovic Zammit <lzam...@inverse.ca>
>>>> wrote:
>>>>
>>>>> Glad you are progressing.
>>>>>
>>>>> In web auth, the client IP address is sent out to PF management
>>>>> interface inside a HTTP request.
>>>>>
>>>>> So if you don’t see the portal, there is a good chance that IP won’t
>>>>> populate.
>>>>>
>>>>> Check in the logs/httpd.portal.access you should see the request I’m
>>>>> talking about above.
>>>>>
>>>>> Thanks,
>>>>>
>>>>>
>>>>> Ludovic zammitlzam...@inverse.ca ::  +1.514.447.4918 (x145) ::  
>>>>> www.inverse.ca
>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
>>>>> (http://packetfence.org)
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> On Nov 13, 2020, at 10:44 AM, Ezeh Victor <vickeyzed...@gmail.com>
>>>>> wrote:
>>>>>
>>>>> Hi Ludovic,
>>>>>
>>>>> Thank you soo much for the last mail.
>>>>>
>>>>> I have made some progress and the device can now connect and receive
>>>>> IP information. The directive on FlexConnect ACL I think did the trick.
>>>>> Also, it is seen as an online node.
>>>>>
>>>>> The challenge now is the captive portal does not pop up as the device
>>>>> remains in unregistered mode and is assigned a vlan 0 as against the guest
>>>>> vlan 300
>>>>> <image.png>
>>>>>
>>>>> <image.png>
>>>>>
>>>>> How do I ensure that the captive portal comes up after connection?
>>>>>
>>>>> On Thu, 12 Nov 2020 at 14:50, Ludovic Zammit <lzam...@inverse.ca>
>>>>> wrote:
>>>>>
>>>>>> Hello Victor,
>>>>>>
>>>>>> Here’s few steps that you can validate before moving forward.
>>>>>>
>>>>>> SSID config:
>>>>>>
>>>>>> - AAA override checked, RADIUS NAC (or ISE) enabled
>>>>>> - Interface set to the correct guest vlan
>>>>>> - Since you are using flex connect, make sure your vlan / ACL are
>>>>>> created on the flex connect config
>>>>>>
>>>>>> PacketFence:
>>>>>>
>>>>>> - receive the radius request on each connection
>>>>>> - reply the portal URL + the ACL name for the captive portal
>>>>>> - enable the external portal on the switch
>>>>>> - getting the portal deamon listening to the management interface
>>>>>>
>>>>>> Do you have an IP address when you connect?
>>>>>>
>>>>>> You can do advanced debuting with the SSH Cisco CLI like:
>>>>>>
>>>>>> debug client mac aa:bb:cc:dd:ee:ff
>>>>>>
>>>>>> Look at the logs, they will tell you why you client can’t connect
>>>>>> successfully.
>>>>>>
>>>>>> Thanks,
>>>>>>
>>>>>>
>>>>>> Ludovic zammitlzam...@inverse.ca ::  +1.514.447.4918 (x145) ::  
>>>>>> www.inverse.ca
>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
>>>>>> (http://packetfence.org)
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>> On Nov 12, 2020, at 3:02 AM, Ezeh Victor <vickeyzed...@gmail.com>
>>>>>> wrote:
>>>>>>
>>>>>> Hi,
>>>>>>
>>>>>> Thanks for all your responses but I have gone through the provided
>>>>>> links prior to making this request.
>>>>>>
>>>>>> A little bit of additional detail;
>>>>>>
>>>>>>    - My SSID is Open and is a flex connect SSID to enable users to
>>>>>>    pick IP addresses from local DHCP servers
>>>>>>    - I have my access-lists in place
>>>>>>    - I have configured the controller on packet fence following the
>>>>>>    documentation
>>>>>>    - I have enabled the captive portal on the management interface
>>>>>>    - I have enabled self preregistration
>>>>>>
>>>>>> My challenges however are;
>>>>>>
>>>>>>    - I cannot connect to the SSID. I keep getting an authentication
>>>>>>    error.
>>>>>>    - The captive portal does not show up
>>>>>>    - I cannot see the controller node online as it is recorded as
>>>>>>    offline on packetfence
>>>>>>
>>>>>>
>>>>>> I would appreciate a clear step on what to do based off of successful
>>>>>> implementations already done.
>>>>>>
>>>>>> The documentation has helped but I have not been successful.
>>>>>>
>>>>>> On Wed, 11 Nov 2020 at 20:14, Ludovic Zammit <lzam...@inverse.ca>
>>>>>> wrote:
>>>>>>
>>>>>>> Hello,
>>>>>>>
>>>>>>>
>>>>>>> https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_cisco_2
>>>>>>>
>>>>>>> Thanks,
>>>>>>>
>>>>>>>
>>>>>>> Ludovic zammitlzam...@inverse.ca ::  +1.514.447.4918 (x145) ::  
>>>>>>> www.inverse.ca
>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and 
>>>>>>> PacketFence (http://packetfence.org)
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> On Nov 10, 2020, at 8:24 AM, Ezeh Victor via PacketFence-users <
>>>>>>> packetfence-users@lists.sourceforge.net> wrote:
>>>>>>>
>>>>>>> Hi,
>>>>>>>
>>>>>>> Please I need assistance with figuring how I can integrate
>>>>>>> PacketFence with Cisco WLC.
>>>>>>>
>>>>>>> Any assistance will be appreciated.
>>>>>>>
>>>>>>> Regards.
>>>>>>> _______________________________________________
>>>>>>> PacketFence-users mailing list
>>>>>>> PacketFence-users@lists.sourceforge.net
>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>
>>>>>
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to