Hello Victor,

it looks that you defined https://172.20.130.50:1443/... as the registrationUrl.

And in the switch config you need to enable "External Portal Enforcement".

Also do you have the portal daemon enabled on the management interface ? (https://mgmt:1443/admin/alt#/configuration/interfaces)

Can you paste a screenshot of the radius audit log (radius tab) when you connect on the ssid ?

Regards

Fabrice


Le 20-11-16 à 17 h 56, Ezeh Victor via PacketFence-users a écrit :
Hi

Please can someone assist me. This project has come to a halt.

I do not seem to be getting something right. The captive portal does not come up after connecting to the guest SSID.

I would really appreciate a response as soon as possible.

Best regards

On Mon, Nov 16, 2020, 11:23 Ezeh Victor <vickeyzed...@gmail.com <mailto:vickeyzed...@gmail.com>> wrote:

    Hi Ludovic/All,

    Kindly see the status of trying to access the captive portal;

    image.png

    On Mon, 16 Nov 2020 at 09:42, Ezeh Victor <vickeyzed...@gmail.com
    <mailto:vickeyzed...@gmail.com>> wrote:

        Hi Ludovic,

        Kind reminder.

        On Sun, Nov 15, 2020, 16:51 Ezeh Victor
        <vickeyzed...@gmail.com <mailto:vickeyzed...@gmail.com>> wrote:

            Hi Ludovic,

            Please I am still expecting your reply.

            On Fri, Nov 13, 2020, 19:27 Ezeh Victor
            <vickeyzed...@gmail.com <mailto:vickeyzed...@gmail.com>>
            wrote:

                Kindly find below;

                # Copyright (C) Inverse inc.
                #
                #
                #
                # See the enclosed file COPYING for license
                information (GPL).
                # If you did not receive this file, see
                # http://www.fsf.org/licensing/licenses/gpl.html
                [default]
                type=Cisco::WLC_2500
                VoIPDHCPDetect=N
                coaPort=3799
                uplink_dynamic=0
                deauthMethod=RADIUS
                always_trigger=1

                [172.20.130.252]
                description=WLC
                RoleMap=Y
                VlanMap=N
                registrationUrl=http://172.20.130.50/Cisco::WLC
                UrlMap=Y
                isolationRole=Isolation
                defaultRole=Authorize_Any
                registrationRole=Pre-Auth-For-WebRedirect
                radiusSecret=D4n-n3t0ps
                inlineRole=Inline

                # Copyright (C) Inverse inc.
                #
                #
                #
                # See the enclosed file COPYING for license
                information (GPL).
                # If you did not receive this file, see
                # http://www.fsf.org/licensing/licenses/gpl.html
                [192.168.0.1]
                description=Test Switch
                type=Cisco::Catalyst_2960
                mode=production
                uplink=23,24
                VoIPLLDPDetect=N

                #SNMPVersion = 3
                #SNMPEngineID = 0000000000000
                #SNMPUserNameRead = readUser
                #SNMPAuthProtocolRead = MD5
                #SNMPAuthPasswordRead = authpwdread
                #SNMPPrivProtocolRead = DES
                #SNMPPrivPasswordRead = privpwdread
                #SNMPUserNameWrite = writeUser
                #SNMPAuthProtocolWrite = MD5
                #SNMPAuthPasswordWrite = authpwdwrite
                #SNMPPrivProtocolWrite = DES
                #SNMPPrivPasswordWrite = privpwdwrite
                #SNMPVersionTrap = 3
                #SNMPUserNameTrap = readUser
                #SNMPAuthProtocolTrap = MD5
                #SNMPAuthPasswordTrap = authpwdread
                #SNMPPrivProtocolTrap = DES
                #SNMPPrivPasswordTrap = privpwdread
                [192.168.1.0/24 <http://192.168.1.0/24>]
                description=Test Range WLC
                type=Cisco::WLC
                mode=production
                uplink_dynamic=0
                VoIPLLDPDetect=N

                On Fri, 13 Nov 2020 at 19:22, Ludovic Zammit
                <lzam...@inverse.ca <mailto:lzam...@inverse.ca>> wrote:

                    Send me your conf/switches.conf

                    Thanks,

                    On Nov 13, 2020, at 1:20 PM, Ezeh Victor
                    <vickeyzed...@gmail.com
                    <mailto:vickeyzed...@gmail.com>> wrote:

                    
                    Hi Ludovic,

                    Thank you for your timely assistance.

                    Kindly below some of the logs observed;
                    <image.png>


                    <image.png>


                    On Fri, 13 Nov 2020 at 18:48, Ludovic Zammit
                    <lzam...@inverse.ca <mailto:lzam...@inverse.ca>>
                    wrote:

                        Glad you are progressing.

                        In web auth, the client IP address is sent
                        out to PF management interface inside a HTTP
                        request.

                        So if you don’t see the portal, there is a
                        good chance that IP won’t populate.

                        Check in the logs/httpd.portal.access you
                        should see the request I’m talking about above.

                        Thanks,

                        Ludovic Zammit
                        lzam...@inverse.ca  <mailto:lzam...@inverse.ca>  ::  
+1.514.447.4918 (x145) ::www.inverse.ca  <http://www.inverse.ca>
                        Inverse inc. :: Leaders behind SOGo 
(http://www.sogo.nu) and PacketFence (http://packetfence.org)





                        On Nov 13, 2020, at 10:44 AM, Ezeh Victor
                        <vickeyzed...@gmail.com
                        <mailto:vickeyzed...@gmail.com>> wrote:

                        Hi Ludovic,

                        Thank you soo much for the last mail.

                        I have made some progress and the device can
                        now connect and receive IP information. The
                        directive on FlexConnect ACL I think did the
                        trick. Also, it is seen as an online node.

                        The challenge now is the captive portal does
                        not pop up as the device remains in
                        unregistered mode and is assigned a vlan 0
                        as against the guest vlan 300
                        <image.png>

                        <image.png>

                        How do I ensure that the captive portal
                        comes up after connection?

                        On Thu, 12 Nov 2020 at 14:50, Ludovic Zammit
                        <lzam...@inverse.ca
                        <mailto:lzam...@inverse.ca>> wrote:

                            Hello Victor,

                            Here’s few steps that you can validate
                            before moving forward.

                            SSID config:

                            - AAA override checked, RADIUS NAC (or
                            ISE) enabled
                            - Interface set to the correct guest vlan
                            - Since you are using flex connect, make
                            sure your vlan / ACL are created on the
                            flex connect config

                            PacketFence:

                            - receive the radius request on each
                            connection
                            - reply the portal URL + the ACL name
                            for the captive portal
                            - enable the external portal on the switch
                            - getting the portal deamon listening to
                            the management interface

                            Do you have an IP address when you connect?

                            You can do advanced debuting with the
                            SSH Cisco CLI like:

                            debug client mac aa:bb:cc:dd:ee:ff

                            Look at the logs, they will tell you why
                            you client can’t connect successfully.

                            Thanks,

                            Ludovic Zammit
                            lzam...@inverse.ca  <mailto:lzam...@inverse.ca>  ::  
+1.514.447.4918 (x145) ::www.inverse.ca  <http://www.inverse.ca/>
                            Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu  
<http://www.sogo.nu/>) and PacketFence (http://packetfence.org  
<http://packetfence.org/>)





                            On Nov 12, 2020, at 3:02 AM, Ezeh
                            Victor <vickeyzed...@gmail.com
                            <mailto:vickeyzed...@gmail.com>> wrote:

                            Hi,

                            Thanks for all your responses but I
                            have gone through the provided links
                            prior to making this request.

                            A little bit of additional detail;

                              * My SSID is Open and is a flex
                                connect SSID to enable users to
                                pick IP addresses from local DHCP
                                servers
                              * I have my access-lists in place
                              * I have configured the controller on
                                packet fence following the
                                documentation
                              * I have enabled the captive portal
                                on the management interface
                              * I have enabled self preregistration

                            My challenges however are;

                              * I cannot connect to the SSID. I
                                keep getting an authentication error.
                              * The captive portal does not show up
                              * I cannot see the controller node
                                online as it is recorded as offline
                                on packetfence


                            I would appreciate a clear step on what
                            to do based off of successful
                            implementations already done.

                            The documentation has helped but I have
                            not been successful.

                            On Wed, 11 Nov 2020 at 20:14, Ludovic
                            Zammit <lzam...@inverse.ca
                            <mailto:lzam...@inverse.ca>> wrote:

                                Hello,

                                
https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_cisco_2

                                Thanks,

                                Ludovic Zammit
                                lzam...@inverse.ca  <mailto:lzam...@inverse.ca>  ::  
+1.514.447.4918 (x145) ::www.inverse.ca  <http://www.inverse.ca/>
                                Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu  
<http://www.sogo.nu/>) and PacketFence (http://packetfence.org  
<http://packetfence.org/>)





                                On Nov 10, 2020, at 8:24 AM, Ezeh
                                Victor via PacketFence-users
                                <packetfence-users@lists.sourceforge.net
                                
<mailto:packetfence-users@lists.sourceforge.net>>
                                wrote:

                                Hi,

                                Please I need assistance with
                                figuring how I can integrate
                                PacketFence with Cisco WLC.

                                Any assistance will be appreciated.

                                Regards.
                                _______________________________________________
                                PacketFence-users mailing list
                                PacketFence-users@lists.sourceforge.net
                                <mailto:PacketFence-users@lists.sourceforge.net>
                                
https://lists.sourceforge.net/lists/listinfo/packetfence-users





_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to