Can you reach the captive portal on the management interface of PF from you guest network ?
Thanks, Ludovic Zammit lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 (x145) :: www.inverse.ca <http://www.inverse.ca/> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu <http://www.sogo.nu/>) and PacketFence (http://packetfence.org <http://packetfence.org/>) > On Dec 1, 2020, at 1:10 PM, Ezeh Victor <vickeyzed...@gmail.com> wrote: > > Hi Ludovic, > > I removed the access list from the VLAN. > > On Tue, Dec 1, 2020, 19:08 Ludovic Zammit <lzam...@inverse.ca > <mailto:lzam...@inverse.ca>> wrote: > > > Did you remove that? If not, remove it. > > Thanks, > > Ludovic Zammit > lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 (x145) :: > www.inverse.ca <http://www.inverse.ca/> > Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu > <http://www.sogo.nu/>) and PacketFence (http://packetfence.org > <http://packetfence.org/>) > > > > >> On Dec 1, 2020, at 12:35 PM, Ezeh Victor <vickeyzed...@gmail.com >> <mailto:vickeyzed...@gmail.com>> wrote: >> >> Hi Ludovic, >> >> Kindly find attached the logs. >> >> On Tue, 1 Dec 2020 at 17:24, Ludovic Zammit <lzam...@inverse.ca >> <mailto:lzam...@inverse.ca>> wrote: >> In that case, on that version the ACL just need to be there on the >> controller as you did create it. >> >> The ACL is assigned dynamically to your device and not the SSID. >> >> Try to debug with that command using SSH on the controller: >> >> (Cisco Controller) >debug client ? >> >> <MAC addr1> Enter MAC address >> >> Command: debug client aa:bb:cc:dd:ee:ff >> >> Send me the output please. >> >> Thanks, >> >> Ludovic Zammit >> lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 (x145) :: >> www.inverse.ca <http://www.inverse.ca/> >> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >> <http://packetfence.org/>) >> >> >> >> >>> On Dec 1, 2020, at 10:15 AM, Ezeh Victor <vickeyzed...@gmail.com >>> <mailto:vickeyzed...@gmail.com>> wrote: >>> >>> Also, when I tried applying it to the WLAN in the Flexconnect group below >>> is the error I received >>> >>> <image.png> >>> >>> On Tue, 1 Dec 2020 at 15:44, Ezeh Victor <vickeyzed...@gmail.com >>> <mailto:vickeyzed...@gmail.com>> wrote: >>> Hi Ludovic, >>> >>> Thanks for the response and the correction. >>> >>> Kindly note that the WLAN is in flex connect mode and from initial >>> correspondence, I created a flex connect ACL. >>> >>> I cannot assign a flex connect ACL to a WLAN directly. >>> >>> However, I created an ACL on the controller and applied it to the WLAN >>> directly as seen below; >>> >>> <image.png> >>> >>> >>> <image.png> >>> >>> This did not also work and I am not getting automatic re-direction as I >>> previously got. >>> <image.png> >>> >>> <image.png> >>> >>> On Tue, 1 Dec 2020 at 14:17, Ludovic Zammit <lzam...@inverse.ca >>> <mailto:lzam...@inverse.ca>> wrote: >>> Hello Victor, >>> >>> Your Web auth reg ACL is not good, the TCP should match the PF management >>> IP address. >>> >>> When you add the ACL on the flexconnect, you need to add them under the >>> WLAN and not the VLAN itself. >>> >>> Thanks, >>> >>> Ludovic Zammit >>> lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 (x145) >>> :: www.inverse.ca <http://www.inverse.ca/> >>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >>> <http://packetfence.org/>) >>> >>> >>> >>> >>>> On Dec 1, 2020, at 3:36 AM, Ezeh Victor <vickeyzed...@gmail.com >>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>> >>>> Hi Ludovic, >>>> >>>> Kindly find the response below; >>>> >>>> >>>> - Do you have the portal listening on 172.20.130.50? >>>> <image.png> >>>> >>>> >>>> >>>> >>>> - Could you show me the radius reply regarding that wireless connection? >>>> <image.png> >>>> >>>> >>>> >>>> - Do you have the External portal checked on your switch module? >>>> <image.png> >>>> >>>> >>>> >>>> >>>> - Do you have access to the portal from your guest network? >>>> >>>> A user connected to the Guest SSID - I do not understand why this is >>>> happening because the gateway can reach the PacketFence management IP >>>> <image.png> >>>> >>>> Core device reachability to PacketFence from GUEST SSID Gateway >>>> <image.png> >>>> >>>> PacketFence reachability to GUEST Gateway >>>> <image.png> >>>> >>>> PacketFence reachability to a client connected to the GUEST SSID - This is >>>> also surprising since the server can reach the Guest gateway >>>> <image.png> >>>> >>>> The route to the GUEST network from PacketFence >>>> <image.png> >>>> >>>> >>>> >>>> >>>> - Does your ACL Pre-Auth-For-WebRedirect is correctly configured on the >>>> controller? >>>> <image.png> >>>> >>>> Tried the following combinations below; >>>> <image.png> >>>> >>>> <image.png> >>>> >>>> <image.png> >>>> >>>> But it keeps showing a blank page with via this link: >>>> http://172.20.130.50/Cisco::WLC/sid774610 >>>> <http://172.20.130.50/Cisco::WLC/sid774610>? >>>> >>>> On Mon, 30 Nov 2020 at 20:32, Ludovic Zammit <lzam...@inverse.ca >>>> <mailto:lzam...@inverse.ca>> wrote: >>>> Alright, few things to checkout: >>>> >>>> - Do you have the portal listening on 172.20.130.50? >>>> - Could you show me the radius reply regarding that wireless connection ? >>>> - Do you have the External portal checked on your switch module? >>>> - Do you have access to the portal from your guest network ? >>>> - Does your ACL Pre-Auth-For-WebRedirect is correctly configured on the >>>> controller? >>>> >>>> Thanks, >>>> >>>> Ludovic Zammit >>>> lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 (x145) >>>> :: www.inverse.ca <http://www.inverse.ca/> >>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >>>> <http://packetfence.org/>) >>>> >>>> >>>> >>>> >>>>> On Nov 30, 2020, at 9:00 AM, Ezeh Victor <vickeyzed...@gmail.com >>>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>>> >>>>> Hi Ludovic, >>>>> >>>>> Thank you for your email. >>>>> >>>>> Kindly find below issue experienced. >>>>> >>>>> When I connect to the SSID Guest-Test, the processes below are what takes >>>>> place; >>>>> The computer opens a browser and tries to visit >>>>> http://www.msftconnecttest.com/redirect >>>>> <http://www.msftconnecttest.com/redirect> then >>>>> http://172.20.130.50/Cisco::WLC/sidff17da >>>>> <http://172.20.130.50/Cisco::WLC/sidff17da>? >>>>> It then ends http://172.20.130.50/access?lang= >>>>> <http://172.20.130.50/access?lang=> with no display. >>>>> When I now try to change the SSID back to the normal staff SSID, it then >>>>> continues to >>>>> http://172.20.130.50/captive-portal?destination_url=http://172.20.130.50/Cisco::WLC/sidff17da?& >>>>> >>>>> <http://172.20.130.50/captive-portal?destination_url=http://172.20.130.50/Cisco::WLC/sidff17da?&> >>>>> and displays the captive portal which obviously returns with an error >>>>> that no network access is detected. >>>>> Kindly advise, what am I missing? >>>>> >>>>> >>>>> On Thu, 26 Nov 2020 at 15:59, Ezeh Victor <vickeyzed...@gmail.com >>>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>>> Hi Durand, >>>>> >>>>> I also made some observations today; >>>>> >>>>> When I connect to the SSID Guest-Test, the processes below are what takes >>>>> place; >>>>> The computer opens a browser and tries to visit >>>>> http://www.msftconnecttest.com/redirect >>>>> <http://www.msftconnecttest.com/redirect> then >>>>> http://172.20.130.50/Cisco::WLC/sidff17da >>>>> <http://172.20.130.50/Cisco::WLC/sidff17da>? >>>>> It then ends http://172.20.130.50/access?lang= >>>>> <http://172.20.130.50/access?lang=> with no display. >>>>> >>>>> When I now try to change the SSID back to the normal staff SSID, it then >>>>> continues to >>>>> http://172.20.130.50/captive-portal?destination_url=http://172.20.130.50/Cisco::WLC/sidff17da?& >>>>> >>>>> <http://172.20.130.50/captive-portal?destination_url=http://172.20.130.50/Cisco::WLC/sidff17da?&> >>>>> and displays the captive portal which obviously returns with an error >>>>> that no network access is detected. >>>>> >>>>> Kindly advise, what am I missing? >>>>> >>>>> >>>>> On Thu, 26 Nov 2020 at 09:26, Ezeh Victor <vickeyzed...@gmail.com >>>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>>> Dear Durand, >>>>> >>>>> Kindly find below; >>>>> >>>>> Access-list changed >>>>> <image.png> >>>>> >>>>> Pings to Packet fence from a wire device >>>>> <image.png> >>>>> >>>>> <image.png> >>>>> >>>>> Pings from Packet Fence and route table >>>>> >>>>> <image.png> >>>>> >>>>> After connecting to the Guest SSID, I got a re-direction but the captive >>>>> portal did not show up; >>>>> >>>>> <image.png> >>>>> >>>>> It seems I have an issue with the captive portal. >>>>> >>>>> Kindly assist. >>>>> >>>>> On Thu, 26 Nov 2020 at 02:33, Durand fabrice <fdur...@inverse.ca >>>>> <mailto:fdur...@inverse.ca>> wrote: >>>>> If i understand correctly, your vlan 300 is the guest vlan where the user >>>>> device is, right ? >>>>> >>>>> And if i understand correctly the ACL, you permit the source >>>>> 172.20.130.50 to reach 172.26.80.0/25 <http://172.26.80.0/25> but it >>>>> should be the inverse ! (your ACL is in IN direction) >>>>> >>>>> So put a wire device in the vlan 300 and try to ping 172.20.130.50 , if >>>>> it doesn't work then remove your acl and retry. >>>>> >>>>> Also from the packetfence server are you able to ping 172.26.80.1 ? >>>>> >>>>> What is the result of : ip route get 172.26.80.1 >>>>> >>>>> is it returning the source interface where the portal is ? >>>>> >>>>> Regards >>>>> >>>>> Fabrice >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> Le 20-11-25 à 05 h 31, Ezeh Victor a écrit : >>>>>> Hi Durand, >>>>>> >>>>>> Kindly find below screenshots; >>>>>> >>>>>> <image.png> >>>>>> <image.png> >>>>>> <image.png> >>>>>> <image.png> >>>>>> <image.png> >>>>>> <image.png> >>>>>> >>>>>> <image.png> >>>>>> <image.png> >>>>>> >>>>>> >>>>>> On Wed, 25 Nov 2020 at 03:01, Durand fabrice <fdur...@inverse.ca >>>>>> <mailto:fdur...@inverse.ca>> wrote: >>>>>> First you need to try with a acl with permit any any and try to go on >>>>>> the portal url. >>>>>> >>>>>> If it doesn't show the portal then it mean that there is a network issue >>>>>> between the vlan where the device is and the ip of the captive portal. >>>>>> >>>>>> What you can try also is to put a wired device in this guest vlan and >>>>>> try to go on https://172.20.130.50/captive-portal >>>>>> <https://172.20.130.50/captive-portal> >>>>>> Regards >>>>>> >>>>>> Fabrice >>>>>> >>>>>> >>>>>> >>>>>> Le 20-11-24 à 05 h 57, Ezeh Victor a écrit : >>>>>>> Hi Durand, >>>>>>> >>>>>>> This is the result of trying to access the captive portal; >>>>>>> >>>>>>> <image.png> >>>>>>> >>>>>>> Is that the right URL? >>>>>>> >>>>>>> I would appreciate your response. >>>>>>> >>>>>>> Best Regards >>>>>>> >>>>>>> On Tue, 24 Nov 2020 at 10:01, Ezeh Victor <vickeyzed...@gmail.com >>>>>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>>>>> Hi Durand, >>>>>>> >>>>>>> Any feedback on my previous response? >>>>>>> >>>>>>> Find screenshot again >>>>>>> <image.png> >>>>>>> >>>>>>> On Mon, 23 Nov 2020 at 12:57, Ezeh Victor <vickeyzed...@gmail.com >>>>>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>>>>> Hi Durand, >>>>>>> >>>>>>> I have done as directed. >>>>>>> >>>>>>> >>>>>>> Also, find below a screenshot of Radius Audit Logs >>>>>>> >>>>>>> <image.png> >>>>>>> >>>>>>> >>>>>>> >>>>>>> On Tue, 17 Nov 2020 at 04:07, Durand fabrice via PacketFence-users >>>>>>> <packetfence-users@lists.sourceforge.net >>>>>>> <mailto:packetfence-users@lists.sourceforge.net>> wrote: >>>>>>> Hello Victor, >>>>>>> >>>>>>> it looks that you defined https://172.20.130.50:1443/ >>>>>>> <https://172.20.130.50:1443/>... as the registrationUrl. >>>>>>> >>>>>>> And in the switch config you need to enable "External Portal >>>>>>> Enforcement". >>>>>>> >>>>>>> Also do you have the portal daemon enabled on the management interface >>>>>>> ? (https://mgmt:1443/admin/alt#/configuration/interfaces >>>>>>> <https://mgmt:1443/admin/alt#/configuration/interfaces>) >>>>>>> >>>>>>> Can you paste a screenshot of the radius audit log (radius tab) when >>>>>>> you connect on the ssid ? >>>>>>> >>>>>>> Regards >>>>>>> >>>>>>> Fabrice >>>>>>> >>>>>>> >>>>>>> >>>>>>> Le 20-11-16 à 17 h 56, Ezeh Victor via PacketFence-users a écrit : >>>>>>>> Hi >>>>>>>> >>>>>>>> Please can someone assist me. This project has come to a halt. >>>>>>>> >>>>>>>> I do not seem to be getting something right. The captive portal does >>>>>>>> not come up after connecting to the guest SSID. >>>>>>>> >>>>>>>> I would really appreciate a response as soon as possible. >>>>>>>> >>>>>>>> Best regards >>>>>>>> >>>>>>>> On Mon, Nov 16, 2020, 11:23 Ezeh Victor <vickeyzed...@gmail.com >>>>>>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>>>>>> Hi Ludovic/All, >>>>>>>> >>>>>>>> Kindly see the status of trying to access the captive portal; >>>>>>>> >>>>>>>> <image.png> >>>>>>>> >>>>>>>> On Mon, 16 Nov 2020 at 09:42, Ezeh Victor <vickeyzed...@gmail.com >>>>>>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>>>>>> Hi Ludovic, >>>>>>>> >>>>>>>> Kind reminder. >>>>>>>> >>>>>>>> On Sun, Nov 15, 2020, 16:51 Ezeh Victor <vickeyzed...@gmail.com >>>>>>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>>>>>> Hi Ludovic, >>>>>>>> >>>>>>>> Please I am still expecting your reply. >>>>>>>> >>>>>>>> On Fri, Nov 13, 2020, 19:27 Ezeh Victor <vickeyzed...@gmail.com >>>>>>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>>>>>> Kindly find below; >>>>>>>> >>>>>>>> # Copyright (C) Inverse inc. >>>>>>>> # >>>>>>>> # >>>>>>>> # >>>>>>>> # See the enclosed file COPYING for license information (GPL). >>>>>>>> # If you did not receive this file, see >>>>>>>> # http://www.fsf.org/licensing/licenses/gpl.html >>>>>>>> <http://www.fsf.org/licensing/licenses/gpl.html> >>>>>>>> [default] >>>>>>>> type=Cisco::WLC_2500 >>>>>>>> VoIPDHCPDetect=N >>>>>>>> coaPort=3799 >>>>>>>> uplink_dynamic=0 >>>>>>>> deauthMethod=RADIUS >>>>>>>> always_trigger=1 >>>>>>>> >>>>>>>> [172.20.130.252] >>>>>>>> description=WLC >>>>>>>> RoleMap=Y >>>>>>>> VlanMap=N >>>>>>>> registrationUrl=http://172.20.130.50/Cisco::WLC >>>>>>>> <http://172.20.130.50/Cisco::WLC> >>>>>>>> UrlMap=Y >>>>>>>> isolationRole=Isolation >>>>>>>> defaultRole=Authorize_Any >>>>>>>> registrationRole=Pre-Auth-For-WebRedirect >>>>>>>> radiusSecret=D4n-n3t0ps >>>>>>>> inlineRole=Inline >>>>>>>> >>>>>>>> # Copyright (C) Inverse inc. >>>>>>>> # >>>>>>>> # >>>>>>>> # >>>>>>>> # See the enclosed file COPYING for license information (GPL). >>>>>>>> # If you did not receive this file, see >>>>>>>> # http://www.fsf.org/licensing/licenses/gpl.html >>>>>>>> <http://www.fsf.org/licensing/licenses/gpl.html> >>>>>>>> [192.168.0.1] >>>>>>>> description=Test Switch >>>>>>>> type=Cisco::Catalyst_2960 >>>>>>>> mode=production >>>>>>>> uplink=23,24 >>>>>>>> VoIPLLDPDetect=N >>>>>>>> >>>>>>>> #SNMPVersion = 3 >>>>>>>> #SNMPEngineID = 0000000000000 >>>>>>>> #SNMPUserNameRead = readUser >>>>>>>> #SNMPAuthProtocolRead = MD5 >>>>>>>> #SNMPAuthPasswordRead = authpwdread >>>>>>>> #SNMPPrivProtocolRead = DES >>>>>>>> #SNMPPrivPasswordRead = privpwdread >>>>>>>> #SNMPUserNameWrite = writeUser >>>>>>>> #SNMPAuthProtocolWrite = MD5 >>>>>>>> #SNMPAuthPasswordWrite = authpwdwrite >>>>>>>> #SNMPPrivProtocolWrite = DES >>>>>>>> #SNMPPrivPasswordWrite = privpwdwrite >>>>>>>> #SNMPVersionTrap = 3 >>>>>>>> #SNMPUserNameTrap = readUser >>>>>>>> #SNMPAuthProtocolTrap = MD5 >>>>>>>> #SNMPAuthPasswordTrap = authpwdread >>>>>>>> #SNMPPrivProtocolTrap = DES >>>>>>>> #SNMPPrivPasswordTrap = privpwdread >>>>>>>> [192.168.1.0/24 <http://192.168.1.0/24>] >>>>>>>> description=Test Range WLC >>>>>>>> type=Cisco::WLC >>>>>>>> mode=production >>>>>>>> uplink_dynamic=0 >>>>>>>> VoIPLLDPDetect=N >>>>>>>> >>>>>>>> On Fri, 13 Nov 2020 at 19:22, Ludovic Zammit <lzam...@inverse.ca >>>>>>>> <mailto:lzam...@inverse.ca>> wrote: >>>>>>>> Send me your conf/switches.conf >>>>>>>> >>>>>>>> Thanks, >>>>>>>> >>>>>>>>> On Nov 13, 2020, at 1:20 PM, Ezeh Victor <vickeyzed...@gmail.com >>>>>>>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>>>>>>> >>>>>>>>> >>>>>>>>> Hi Ludovic, >>>>>>>>> >>>>>>>>> Thank you for your timely assistance. >>>>>>>>> >>>>>>>>> Kindly below some of the logs observed; >>>>>>>>> <image.png> >>>>>>>>> >>>>>>>>> >>>>>>>>> <image.png> >>>>>>>>> >>>>>>>>> >>>>>>>>> On Fri, 13 Nov 2020 at 18:48, Ludovic Zammit <lzam...@inverse.ca >>>>>>>>> <mailto:lzam...@inverse.ca>> wrote: >>>>>>>>> Glad you are progressing. >>>>>>>>> >>>>>>>>> In web auth, the client IP address is sent out to PF management >>>>>>>>> interface inside a HTTP request. >>>>>>>>> >>>>>>>>> So if you don’t see the portal, there is a good chance that IP won’t >>>>>>>>> populate. >>>>>>>>> >>>>>>>>> Check in the logs/httpd.portal.access you should see the request I’m >>>>>>>>> talking about above. >>>>>>>>> >>>>>>>>> Thanks, >>>>>>>>> Ludovic Zammit >>>>>>>>> lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 >>>>>>>>> (x145) :: www.inverse.ca <http://www.inverse.ca/> >>>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>>>>>>>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >>>>>>>>> <http://packetfence.org/>) >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>>> On Nov 13, 2020, at 10:44 AM, Ezeh Victor <vickeyzed...@gmail.com >>>>>>>>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>>>>>>>> >>>>>>>>>> Hi Ludovic, >>>>>>>>>> >>>>>>>>>> Thank you soo much for the last mail. >>>>>>>>>> >>>>>>>>>> I have made some progress and the device can now connect and receive >>>>>>>>>> IP information. The directive on FlexConnect ACL I think did the >>>>>>>>>> trick. Also, it is seen as an online node. >>>>>>>>>> >>>>>>>>>> The challenge now is the captive portal does not pop up as the >>>>>>>>>> device remains in unregistered mode and is assigned a vlan 0 as >>>>>>>>>> against the guest vlan 300 >>>>>>>>>> <image.png> >>>>>>>>>> >>>>>>>>>> <image.png> >>>>>>>>>> >>>>>>>>>> How do I ensure that the captive portal comes up after connection? >>>>>>>>>> >>>>>>>>>> On Thu, 12 Nov 2020 at 14:50, Ludovic Zammit <lzam...@inverse.ca >>>>>>>>>> <mailto:lzam...@inverse.ca>> wrote: >>>>>>>>>> Hello Victor, >>>>>>>>>> >>>>>>>>>> Here’s few steps that you can validate before moving forward. >>>>>>>>>> >>>>>>>>>> SSID config: >>>>>>>>>> >>>>>>>>>> - AAA override checked, RADIUS NAC (or ISE) enabled >>>>>>>>>> - Interface set to the correct guest vlan >>>>>>>>>> - Since you are using flex connect, make sure your vlan / ACL are >>>>>>>>>> created on the flex connect config >>>>>>>>>> >>>>>>>>>> PacketFence: >>>>>>>>>> >>>>>>>>>> - receive the radius request on each connection >>>>>>>>>> - reply the portal URL + the ACL name for the captive portal >>>>>>>>>> - enable the external portal on the switch >>>>>>>>>> - getting the portal deamon listening to the management interface >>>>>>>>>> >>>>>>>>>> Do you have an IP address when you connect? >>>>>>>>>> >>>>>>>>>> You can do advanced debuting with the SSH Cisco CLI like: >>>>>>>>>> >>>>>>>>>> debug client mac aa:bb:cc:dd:ee:ff >>>>>>>>>> >>>>>>>>>> Look at the logs, they will tell you why you client can’t connect >>>>>>>>>> successfully. >>>>>>>>>> >>>>>>>>>> Thanks, >>>>>>>>>> Ludovic Zammit >>>>>>>>>> lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 >>>>>>>>>> (x145) :: www.inverse.ca <http://www.inverse.ca/> >>>>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>>>>>>>>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >>>>>>>>>> <http://packetfence.org/>) >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>>> On Nov 12, 2020, at 3:02 AM, Ezeh Victor <vickeyzed...@gmail.com >>>>>>>>>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>>>>>>>>> >>>>>>>>>>> Hi, >>>>>>>>>>> >>>>>>>>>>> Thanks for all your responses but I have gone through the provided >>>>>>>>>>> links prior to making this request. >>>>>>>>>>> >>>>>>>>>>> A little bit of additional detail; >>>>>>>>>>> My SSID is Open and is a flex connect SSID to enable users to pick >>>>>>>>>>> IP addresses from local DHCP servers >>>>>>>>>>> I have my access-lists in place >>>>>>>>>>> I have configured the controller on packet fence following the >>>>>>>>>>> documentation >>>>>>>>>>> I have enabled the captive portal on the management interface >>>>>>>>>>> I have enabled self preregistration >>>>>>>>>>> My challenges however are; >>>>>>>>>>> I cannot connect to the SSID. I keep getting an authentication >>>>>>>>>>> error. >>>>>>>>>>> The captive portal does not show up >>>>>>>>>>> I cannot see the controller node online as it is recorded as >>>>>>>>>>> offline on packetfence >>>>>>>>>>> >>>>>>>>>>> I would appreciate a clear step on what to do based off of >>>>>>>>>>> successful implementations already done. >>>>>>>>>>> >>>>>>>>>>> The documentation has helped but I have not been successful. >>>>>>>>>>> >>>>>>>>>>> On Wed, 11 Nov 2020 at 20:14, Ludovic Zammit <lzam...@inverse.ca >>>>>>>>>>> <mailto:lzam...@inverse.ca>> wrote: >>>>>>>>>>> Hello, >>>>>>>>>>> >>>>>>>>>>> https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_cisco_2 >>>>>>>>>>> >>>>>>>>>>> <https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_cisco_2> >>>>>>>>>>> >>>>>>>>>>> Thanks, >>>>>>>>>>> Ludovic Zammit >>>>>>>>>>> lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 >>>>>>>>>>> (x145) :: www.inverse.ca <http://www.inverse.ca/> >>>>>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>>>>>>>>>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >>>>>>>>>>> <http://packetfence.org/>) >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>>> On Nov 10, 2020, at 8:24 AM, Ezeh Victor via PacketFence-users >>>>>>>>>>>> <packetfence-users@lists.sourceforge.net >>>>>>>>>>>> <mailto:packetfence-users@lists.sourceforge.net>> wrote: >>>>>>>>>>>> >>>>>>>>>>>> Hi, >>>>>>>>>>>> >>>>>>>>>>>> Please I need assistance with figuring how I can integrate >>>>>>>>>>>> PacketFence with Cisco WLC. >>>>>>>>>>>> >>>>>>>>>>>> Any assistance will be appreciated. >>>>>>>>>>>> >>>>>>>>>>>> Regards. >>>>>>>>>>>> _______________________________________________ >>>>>>>>>>>> PacketFence-users mailing list >>>>>>>>>>>> PacketFence-users@lists.sourceforge.net >>>>>>>>>>>> <mailto:PacketFence-users@lists.sourceforge.net> >>>>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>>>>>>> <https://lists.sourceforge.net/lists/listinfo/packetfence-users> >>>>>>>>>>> >>>>>>>>>> >>>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> _______________________________________________ >>>>>>>> PacketFence-users mailing list >>>>>>>> PacketFence-users@lists.sourceforge.net >>>>>>>> <mailto:PacketFence-users@lists.sourceforge.net> >>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>>> <https://lists.sourceforge.net/lists/listinfo/packetfence-users> >>>>>>> _______________________________________________ >>>>>>> PacketFence-users mailing list >>>>>>> PacketFence-users@lists.sourceforge.net >>>>>>> <mailto:PacketFence-users@lists.sourceforge.net> >>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>> <https://lists.sourceforge.net/lists/listinfo/packetfence-users> >>>> >>> >> >> <putty.log> > > <image.png><image.png>
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users