Hi Durand, I have done as directed.
Also, find below a screenshot of Radius Audit Logs [image: image.png] On Tue, 17 Nov 2020 at 04:07, Durand fabrice via PacketFence-users < packetfence-users@lists.sourceforge.net> wrote: > Hello Victor, > > it looks that you defined https://172.20.130.50:1443/... as the > registrationUrl. > > And in the switch config you need to enable "External Portal Enforcement". > > Also do you have the portal daemon enabled on the management interface ? ( > https://mgmt:1443/admin/alt#/configuration/interfaces) > > Can you paste a screenshot of the radius audit log (radius tab) when you > connect on the ssid ? > > Regards > > Fabrice > > > Le 20-11-16 à 17 h 56, Ezeh Victor via PacketFence-users a écrit : > > Hi > > Please can someone assist me. This project has come to a halt. > > I do not seem to be getting something right. The captive portal does not > come up after connecting to the guest SSID. > > I would really appreciate a response as soon as possible. > > Best regards > > On Mon, Nov 16, 2020, 11:23 Ezeh Victor <vickeyzed...@gmail.com> wrote: > >> Hi Ludovic/All, >> >> Kindly see the status of trying to access the captive portal; >> >> [image: image.png] >> >> On Mon, 16 Nov 2020 at 09:42, Ezeh Victor <vickeyzed...@gmail.com> wrote: >> >>> Hi Ludovic, >>> >>> Kind reminder. >>> >>> On Sun, Nov 15, 2020, 16:51 Ezeh Victor <vickeyzed...@gmail.com> wrote: >>> >>>> Hi Ludovic, >>>> >>>> Please I am still expecting your reply. >>>> >>>> On Fri, Nov 13, 2020, 19:27 Ezeh Victor <vickeyzed...@gmail.com> wrote: >>>> >>>>> Kindly find below; >>>>> >>>>> # Copyright (C) Inverse inc. >>>>> # >>>>> # >>>>> # >>>>> # See the enclosed file COPYING for license information (GPL). >>>>> # If you did not receive this file, see >>>>> # http://www.fsf.org/licensing/licenses/gpl.html >>>>> [default] >>>>> type=Cisco::WLC_2500 >>>>> VoIPDHCPDetect=N >>>>> coaPort=3799 >>>>> uplink_dynamic=0 >>>>> deauthMethod=RADIUS >>>>> always_trigger=1 >>>>> >>>>> [172.20.130.252] >>>>> description=WLC >>>>> RoleMap=Y >>>>> VlanMap=N >>>>> registrationUrl=http://172.20.130.50/Cisco::WLC >>>>> UrlMap=Y >>>>> isolationRole=Isolation >>>>> defaultRole=Authorize_Any >>>>> registrationRole=Pre-Auth-For-WebRedirect >>>>> radiusSecret=D4n-n3t0ps >>>>> inlineRole=Inline >>>>> >>>>> # Copyright (C) Inverse inc. >>>>> # >>>>> # >>>>> # >>>>> # See the enclosed file COPYING for license information (GPL). >>>>> # If you did not receive this file, see >>>>> # http://www.fsf.org/licensing/licenses/gpl.html >>>>> [192.168.0.1] >>>>> description=Test Switch >>>>> type=Cisco::Catalyst_2960 >>>>> mode=production >>>>> uplink=23,24 >>>>> VoIPLLDPDetect=N >>>>> >>>>> #SNMPVersion = 3 >>>>> #SNMPEngineID = 0000000000000 >>>>> #SNMPUserNameRead = readUser >>>>> #SNMPAuthProtocolRead = MD5 >>>>> #SNMPAuthPasswordRead = authpwdread >>>>> #SNMPPrivProtocolRead = DES >>>>> #SNMPPrivPasswordRead = privpwdread >>>>> #SNMPUserNameWrite = writeUser >>>>> #SNMPAuthProtocolWrite = MD5 >>>>> #SNMPAuthPasswordWrite = authpwdwrite >>>>> #SNMPPrivProtocolWrite = DES >>>>> #SNMPPrivPasswordWrite = privpwdwrite >>>>> #SNMPVersionTrap = 3 >>>>> #SNMPUserNameTrap = readUser >>>>> #SNMPAuthProtocolTrap = MD5 >>>>> #SNMPAuthPasswordTrap = authpwdread >>>>> #SNMPPrivProtocolTrap = DES >>>>> #SNMPPrivPasswordTrap = privpwdread >>>>> [192.168.1.0/24] >>>>> description=Test Range WLC >>>>> type=Cisco::WLC >>>>> mode=production >>>>> uplink_dynamic=0 >>>>> VoIPLLDPDetect=N >>>>> >>>>> On Fri, 13 Nov 2020 at 19:22, Ludovic Zammit <lzam...@inverse.ca> >>>>> wrote: >>>>> >>>>>> Send me your conf/switches.conf >>>>>> >>>>>> Thanks, >>>>>> >>>>>> On Nov 13, 2020, at 1:20 PM, Ezeh Victor <vickeyzed...@gmail.com> >>>>>> wrote: >>>>>> >>>>>> >>>>>> Hi Ludovic, >>>>>> >>>>>> Thank you for your timely assistance. >>>>>> >>>>>> Kindly below some of the logs observed; >>>>>> <image.png> >>>>>> >>>>>> >>>>>> <image.png> >>>>>> >>>>>> >>>>>> On Fri, 13 Nov 2020 at 18:48, Ludovic Zammit <lzam...@inverse.ca> >>>>>> wrote: >>>>>> >>>>>>> Glad you are progressing. >>>>>>> >>>>>>> In web auth, the client IP address is sent out to PF management >>>>>>> interface inside a HTTP request. >>>>>>> >>>>>>> So if you don’t see the portal, there is a good chance that IP won’t >>>>>>> populate. >>>>>>> >>>>>>> Check in the logs/httpd.portal.access you should see the request I’m >>>>>>> talking about above. >>>>>>> >>>>>>> Thanks, >>>>>>> >>>>>>> Ludovic zammitlzam...@inverse.ca :: +1.514.447.4918 (x145) :: >>>>>>> www.inverse.ca >>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and >>>>>>> PacketFence (http://packetfence.org) >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> On Nov 13, 2020, at 10:44 AM, Ezeh Victor <vickeyzed...@gmail.com> >>>>>>> wrote: >>>>>>> >>>>>>> Hi Ludovic, >>>>>>> >>>>>>> Thank you soo much for the last mail. >>>>>>> >>>>>>> I have made some progress and the device can now connect and receive >>>>>>> IP information. The directive on FlexConnect ACL I think did the trick. >>>>>>> Also, it is seen as an online node. >>>>>>> >>>>>>> The challenge now is the captive portal does not pop up as the >>>>>>> device remains in unregistered mode and is assigned a vlan 0 as against >>>>>>> the >>>>>>> guest vlan 300 >>>>>>> <image.png> >>>>>>> >>>>>>> <image.png> >>>>>>> >>>>>>> How do I ensure that the captive portal comes up after connection? >>>>>>> >>>>>>> On Thu, 12 Nov 2020 at 14:50, Ludovic Zammit <lzam...@inverse.ca> >>>>>>> wrote: >>>>>>> >>>>>>>> Hello Victor, >>>>>>>> >>>>>>>> Here’s few steps that you can validate before moving forward. >>>>>>>> >>>>>>>> SSID config: >>>>>>>> >>>>>>>> - AAA override checked, RADIUS NAC (or ISE) enabled >>>>>>>> - Interface set to the correct guest vlan >>>>>>>> - Since you are using flex connect, make sure your vlan / ACL are >>>>>>>> created on the flex connect config >>>>>>>> >>>>>>>> PacketFence: >>>>>>>> >>>>>>>> - receive the radius request on each connection >>>>>>>> - reply the portal URL + the ACL name for the captive portal >>>>>>>> - enable the external portal on the switch >>>>>>>> - getting the portal deamon listening to the management interface >>>>>>>> >>>>>>>> Do you have an IP address when you connect? >>>>>>>> >>>>>>>> You can do advanced debuting with the SSH Cisco CLI like: >>>>>>>> >>>>>>>> debug client mac aa:bb:cc:dd:ee:ff >>>>>>>> >>>>>>>> Look at the logs, they will tell you why you client can’t connect >>>>>>>> successfully. >>>>>>>> >>>>>>>> Thanks, >>>>>>>> >>>>>>>> Ludovic zammitlzam...@inverse.ca :: +1.514.447.4918 (x145) :: >>>>>>>> www.inverse.ca >>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and >>>>>>>> PacketFence (http://packetfence.org) >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> On Nov 12, 2020, at 3:02 AM, Ezeh Victor <vickeyzed...@gmail.com> >>>>>>>> wrote: >>>>>>>> >>>>>>>> Hi, >>>>>>>> >>>>>>>> Thanks for all your responses but I have gone through the provided >>>>>>>> links prior to making this request. >>>>>>>> >>>>>>>> A little bit of additional detail; >>>>>>>> >>>>>>>> - My SSID is Open and is a flex connect SSID to enable users to >>>>>>>> pick IP addresses from local DHCP servers >>>>>>>> - I have my access-lists in place >>>>>>>> - I have configured the controller on packet fence following >>>>>>>> the documentation >>>>>>>> - I have enabled the captive portal on the management interface >>>>>>>> - I have enabled self preregistration >>>>>>>> >>>>>>>> My challenges however are; >>>>>>>> >>>>>>>> - I cannot connect to the SSID. I keep getting an >>>>>>>> authentication error. >>>>>>>> - The captive portal does not show up >>>>>>>> - I cannot see the controller node online as it is recorded as >>>>>>>> offline on packetfence >>>>>>>> >>>>>>>> >>>>>>>> I would appreciate a clear step on what to do based off of >>>>>>>> successful implementations already done. >>>>>>>> >>>>>>>> The documentation has helped but I have not been successful. >>>>>>>> >>>>>>>> On Wed, 11 Nov 2020 at 20:14, Ludovic Zammit <lzam...@inverse.ca> >>>>>>>> wrote: >>>>>>>> >>>>>>>>> Hello, >>>>>>>>> >>>>>>>>> >>>>>>>>> https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_cisco_2 >>>>>>>>> >>>>>>>>> Thanks, >>>>>>>>> >>>>>>>>> Ludovic zammitlzam...@inverse.ca :: +1.514.447.4918 (x145) :: >>>>>>>>> www.inverse.ca >>>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and >>>>>>>>> PacketFence (http://packetfence.org) >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> On Nov 10, 2020, at 8:24 AM, Ezeh Victor via PacketFence-users < >>>>>>>>> packetfence-users@lists.sourceforge.net> wrote: >>>>>>>>> >>>>>>>>> Hi, >>>>>>>>> >>>>>>>>> Please I need assistance with figuring how I can integrate >>>>>>>>> PacketFence with Cisco WLC. >>>>>>>>> >>>>>>>>> Any assistance will be appreciated. >>>>>>>>> >>>>>>>>> Regards. >>>>>>>>> _______________________________________________ >>>>>>>>> PacketFence-users mailing list >>>>>>>>> PacketFence-users@lists.sourceforge.net >>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>> >>>>>>> > > _______________________________________________ > PacketFence-users mailing > listPacketFence-users@lists.sourceforge.nethttps://lists.sourceforge.net/lists/listinfo/packetfence-users > > _______________________________________________ > PacketFence-users mailing list > PacketFence-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/packetfence-users >
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users