Hi Ludovic,

Kindly find the result of the command run
[image: image.png]

[image: image.png]

Note that the workstation used to connect to the guest network no longer
receives IP configuration. I do not know why this is the case, but I think
that is the reason for no packets in the .pcap file.

On Wed, 2 Dec 2020 at 13:56, Ludovic Zammit <[email protected]> wrote:

> PS: yum install -y tcpdump
>
>
> Ludovic [email protected] ::  +1.514.447.4918 (x145) ::  www.inverse.ca
> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
> (http://packetfence.org)
>
>
>
>
>
> On Dec 2, 2020, at 7:53 AM, Ludovic Zammit via PacketFence-users <
> [email protected]> wrote:
>
> Sorry it’s lowercase i for interface:
>
> tcpdump -i eth0 port 443 or port 80 -w webauth.pcap
>
> Thanks,
>
>
> Ludovic [email protected] ::  +1.514.447.4918 (x145) ::  www.inverse.ca
> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
> (http://packetfence.org)
>
>
>
>
>
> On Dec 2, 2020, at 3:02 AM, Ezeh Victor <[email protected]> wrote:
>
> Hi Ludovic,
>
> Kindly find errors from the server below
> <image.png>
> <image.png>
>
> On Tue, 1 Dec 2020 at 20:42, Ludovic Zammit <[email protected]> wrote:
>
>> What happen if you start a capture on the packetfence server like this:
>>
>> tcpdump -I eth0 port 443 or port 80 -w webauth.pcap
>>
>> On the client you do:
>>
>> http://172.20.130.5/captive-portal
>>
>> Show/send me the capture
>>
>> Thanks,
>>
>>
>> Ludovic [email protected] ::  +1.514.447.4918 (x145) ::  
>> www.inverse.ca
>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
>> (http://packetfence.org)
>>
>>
>>
>>
>>
>> On Dec 1, 2020, at 2:38 PM, Ezeh Victor <[email protected]> wrote:
>>
>> I can reach it if I ping sourcing from the guest network gateway on the
>> router. But when I ping from a host, I cannot reach it.
>>
>> On Tue, Dec 1, 2020, 20:22 Ludovic Zammit <[email protected]> wrote:
>>
>>> Can you reach the captive portal on the management interface of PF from
>>> you guest network ?
>>>
>>> Thanks,
>>>
>>>
>>> Ludovic [email protected] ::  +1.514.447.4918 (x145) ::  
>>> www.inverse.ca
>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
>>> (http://packetfence.org)
>>>
>>>
>>>
>>>
>>>
>>> On Dec 1, 2020, at 1:10 PM, Ezeh Victor <[email protected]> wrote:
>>>
>>> Hi Ludovic,
>>>
>>> I removed the access list from the VLAN.
>>>
>>> On Tue, Dec 1, 2020, 19:08 Ludovic Zammit <[email protected]> wrote:
>>>
>>>> [image: image.png]
>>>>
>>>> Did you remove that? If not, remove it.
>>>>
>>>> Thanks,
>>>>
>>>>
>>>> Ludovic [email protected] ::  +1.514.447.4918 (x145) ::  
>>>> www.inverse.ca
>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
>>>> (http://packetfence.org)
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> On Dec 1, 2020, at 12:35 PM, Ezeh Victor <[email protected]>
>>>> wrote:
>>>>
>>>> Hi Ludovic,
>>>>
>>>> Kindly find attached the logs.
>>>>
>>>> On Tue, 1 Dec 2020 at 17:24, Ludovic Zammit <[email protected]> wrote:
>>>>
>>>>> In that case, on that version the ACL just need to be there on the
>>>>> controller as you did create it.
>>>>>
>>>>> The ACL is assigned dynamically to your device and not the SSID.
>>>>>
>>>>> Try to debug with that command using SSH on the controller:
>>>>>
>>>>> (Cisco Controller) >debug client ?
>>>>>
>>>>> <MAC addr1>    Enter MAC address
>>>>>
>>>>> Command: debug client aa:bb:cc:dd:ee:ff
>>>>>
>>>>> Send me the output please.
>>>>>
>>>>> Thanks,
>>>>>
>>>>>
>>>>> Ludovic [email protected] ::  +1.514.447.4918 (x145) ::  
>>>>> www.inverse.ca
>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
>>>>> (http://packetfence.org)
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> On Dec 1, 2020, at 10:15 AM, Ezeh Victor <[email protected]>
>>>>> wrote:
>>>>>
>>>>> Also, when I tried applying it to the WLAN in the Flexconnect group
>>>>> below is the error I received
>>>>>
>>>>> <image.png>
>>>>>
>>>>> On Tue, 1 Dec 2020 at 15:44, Ezeh Victor <[email protected]>
>>>>> wrote:
>>>>>
>>>>>> Hi Ludovic,
>>>>>>
>>>>>> Thanks for the response and the correction.
>>>>>>
>>>>>> Kindly note that the WLAN is in flex connect mode and from initial
>>>>>> correspondence, I created a flex connect ACL.
>>>>>>
>>>>>> I cannot assign a flex connect ACL to a WLAN directly.
>>>>>>
>>>>>> However, I created an ACL on the controller and applied it to the
>>>>>> WLAN directly as seen below;
>>>>>>
>>>>>> <image.png>
>>>>>>
>>>>>>
>>>>>> <image.png>
>>>>>>
>>>>>> This did not also work and I am not getting automatic re-direction as
>>>>>> I previously got.
>>>>>> <image.png>
>>>>>>
>>>>>> <image.png>
>>>>>>
>>>>>> On Tue, 1 Dec 2020 at 14:17, Ludovic Zammit <[email protected]>
>>>>>> wrote:
>>>>>>
>>>>>>> Hello Victor,
>>>>>>>
>>>>>>> Your Web auth reg ACL is not good, the TCP should match the PF
>>>>>>> management IP address.
>>>>>>>
>>>>>>> When you add the ACL on the flexconnect, you need to add them under
>>>>>>> the WLAN and not the VLAN itself.
>>>>>>>
>>>>>>> Thanks,
>>>>>>>
>>>>>>>
>>>>>>> Ludovic [email protected] ::  +1.514.447.4918 (x145) ::  
>>>>>>> www.inverse.ca
>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and 
>>>>>>> PacketFence (http://packetfence.org)
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> On Dec 1, 2020, at 3:36 AM, Ezeh Victor <[email protected]>
>>>>>>> wrote:
>>>>>>>
>>>>>>> Hi Ludovic,
>>>>>>>
>>>>>>> Kindly find the response below;
>>>>>>>
>>>>>>>
>>>>>>> - Do you have the portal listening on 172.20.130.50?
>>>>>>> <image.png>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> - Could you show me the radius reply regarding that wireless
>>>>>>> connection?
>>>>>>> <image.png>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> - Do you have the External portal checked on your switch module?
>>>>>>> <image.png>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> - Do you have access to the portal from your guest network?
>>>>>>>
>>>>>>> *A user connected to the Guest SSID - * I do not understand why
>>>>>>> this is happening because the gateway can reach the PacketFence 
>>>>>>> management
>>>>>>> IP
>>>>>>> <image.png>
>>>>>>>
>>>>>>> *Core device reachability to PacketFence from GUEST SSID Gateway*
>>>>>>> <image.png>
>>>>>>>
>>>>>>> *PacketFence reachability to GUEST Gateway*
>>>>>>> <image.png>
>>>>>>>
>>>>>>> *PacketFence reachability to a client connected to the GUEST SSID - 
>>>>>>> *This
>>>>>>> is also surprising since the server can reach the Guest gateway
>>>>>>> <image.png>
>>>>>>>
>>>>>>> *The route to the GUEST network from PacketFence*
>>>>>>> <image.png>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> - Does your ACL Pre-Auth-For-WebRedirect is correctly configured on
>>>>>>> the controller?
>>>>>>> <image.png>
>>>>>>>
>>>>>>> *Tried the following combinations below;*
>>>>>>> <image.png>
>>>>>>>
>>>>>>> <image.png>
>>>>>>>
>>>>>>> <image.png>
>>>>>>>
>>>>>>> But it keeps showing a blank page with via this link: 
>>>>>>> *http://172.20.130.50/Cisco::WLC/sid774610
>>>>>>> <http://172.20.130.50/Cisco::WLC/sid774610>?*
>>>>>>>
>>>>>>> On Mon, 30 Nov 2020 at 20:32, Ludovic Zammit <[email protected]>
>>>>>>> wrote:
>>>>>>>
>>>>>>>> Alright, few things to checkout:
>>>>>>>>
>>>>>>>> - Do you have the portal listening on 172.20.130.50?
>>>>>>>> - Could you show me the radius reply regarding that wireless
>>>>>>>> connection ?
>>>>>>>> - Do you have the External portal checked on your switch module?
>>>>>>>> - Do you have access to the portal from your guest network ?
>>>>>>>> - Does your ACL Pre-Auth-For-WebRedirect is correctly configured on
>>>>>>>> the controller?
>>>>>>>>
>>>>>>>> Thanks,
>>>>>>>>
>>>>>>>>
>>>>>>>> Ludovic [email protected] ::  +1.514.447.4918 (x145) ::  
>>>>>>>> www.inverse.ca
>>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and 
>>>>>>>> PacketFence (http://packetfence.org)
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> On Nov 30, 2020, at 9:00 AM, Ezeh Victor <[email protected]>
>>>>>>>> wrote:
>>>>>>>>
>>>>>>>>   Hi Ludovic,
>>>>>>>>
>>>>>>>> Thank you for your email.
>>>>>>>>
>>>>>>>> Kindly find below issue experienced.
>>>>>>>>
>>>>>>>> When I connect to the SSID Guest-Test, the processes below are what
>>>>>>>> takes place;
>>>>>>>>
>>>>>>>>    - The computer opens a browser and tries to visit 
>>>>>>>> *http://www.msftconnecttest.com/redirect
>>>>>>>>    <http://www.msftconnecttest.com/redirect>* then 
>>>>>>>> *http://172.20.130.50/Cisco::WLC/sidff17da
>>>>>>>>    <http://172.20.130.50/Cisco::WLC/sidff17da>?*
>>>>>>>>    - It then ends *http://172.20.130.50/access?lang=
>>>>>>>>    <http://172.20.130.50/access?lang=> * with no display.
>>>>>>>>
>>>>>>>>
>>>>>>>>    - When I now try to change the SSID back to the normal staff
>>>>>>>>    SSID, it then continues to 
>>>>>>>> *http://172.20.130.50/captive-portal?destination_url=http://172.20.130.50/Cisco::WLC/sidff17da?&;
>>>>>>>>    
>>>>>>>> <http://172.20.130.50/captive-portal?destination_url=http://172.20.130.50/Cisco::WLC/sidff17da?&;>
>>>>>>>>  *and
>>>>>>>>    displays the captive portal which obviously returns with an error 
>>>>>>>> that no
>>>>>>>>    network access is detected.
>>>>>>>>
>>>>>>>> Kindly advise, what am I missing?
>>>>>>>>
>>>>>>>>
>>>>>>>> On Thu, 26 Nov 2020 at 15:59, Ezeh Victor <[email protected]>
>>>>>>>> wrote:
>>>>>>>>
>>>>>>>>> Hi Durand,
>>>>>>>>>
>>>>>>>>> I also made some observations today;
>>>>>>>>>
>>>>>>>>> When I connect to the SSID Guest-Test, the processes below are
>>>>>>>>> what takes place;
>>>>>>>>> The computer opens a browser and tries to visit 
>>>>>>>>> *http://www.msftconnecttest.com/redirect
>>>>>>>>> <http://www.msftconnecttest.com/redirect>* then 
>>>>>>>>> *http://172.20.130.50/Cisco::WLC/sidff17da
>>>>>>>>> <http://172.20.130.50/Cisco::WLC/sidff17da>?*
>>>>>>>>> It then ends *http://172.20.130.50/access?lang=
>>>>>>>>> <http://172.20.130.50/access?lang=> * with no display.
>>>>>>>>>
>>>>>>>>> When I now try to change the SSID back to the normal staff SSID,
>>>>>>>>> it then continues to 
>>>>>>>>> *http://172.20.130.50/captive-portal?destination_url=http://172.20.130.50/Cisco::WLC/sidff17da?&;
>>>>>>>>> <http://172.20.130.50/captive-portal?destination_url=http://172.20.130.50/Cisco::WLC/sidff17da?&;>
>>>>>>>>>  *and
>>>>>>>>> displays the captive portal which obviously returns with an error 
>>>>>>>>> that no
>>>>>>>>> network access is detected.
>>>>>>>>>
>>>>>>>>> Kindly advise, what am I missing?
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> On Thu, 26 Nov 2020 at 09:26, Ezeh Victor <[email protected]>
>>>>>>>>> wrote:
>>>>>>>>>
>>>>>>>>>> Dear Durand,
>>>>>>>>>>
>>>>>>>>>> Kindly find below;
>>>>>>>>>>
>>>>>>>>>> Access-list changed
>>>>>>>>>> <image.png>
>>>>>>>>>>
>>>>>>>>>> Pings to Packet fence from a wire device
>>>>>>>>>> <image.png>
>>>>>>>>>>
>>>>>>>>>> <image.png>
>>>>>>>>>>
>>>>>>>>>> Pings from Packet Fence and route table
>>>>>>>>>>
>>>>>>>>>> <image.png>
>>>>>>>>>>
>>>>>>>>>> After connecting to the Guest SSID, I got a re-direction but the
>>>>>>>>>> captive portal did not show up;
>>>>>>>>>>
>>>>>>>>>> <image.png>
>>>>>>>>>>
>>>>>>>>>> It seems I have an issue with the captive portal.
>>>>>>>>>>
>>>>>>>>>> Kindly assist.
>>>>>>>>>>
>>>>>>>>>> On Thu, 26 Nov 2020 at 02:33, Durand fabrice <[email protected]>
>>>>>>>>>> wrote:
>>>>>>>>>>
>>>>>>>>>>> If i understand correctly, your vlan 300 is the guest vlan where
>>>>>>>>>>> the user device is, right ?
>>>>>>>>>>>
>>>>>>>>>>> And if i understand correctly the ACL, you permit the source
>>>>>>>>>>> 172.20.130.50 to reach 172.26.80.0/25 but it should be the
>>>>>>>>>>> inverse ! (your ACL is in IN direction)
>>>>>>>>>>>
>>>>>>>>>>> So put a wire device in the vlan 300 and try to ping
>>>>>>>>>>> 172.20.130.50 , if it doesn't work then remove your acl and retry.
>>>>>>>>>>>
>>>>>>>>>>> Also from the packetfence server are you able to ping
>>>>>>>>>>> 172.26.80.1 ?
>>>>>>>>>>>
>>>>>>>>>>> What is the result of : ip route get 172.26.80.1
>>>>>>>>>>>
>>>>>>>>>>> is it returning the source interface where the portal is ?
>>>>>>>>>>>
>>>>>>>>>>> Regards
>>>>>>>>>>>
>>>>>>>>>>> Fabrice
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> Le 20-11-25 à 05 h 31, Ezeh Victor a écrit :
>>>>>>>>>>>
>>>>>>>>>>> Hi Durand,
>>>>>>>>>>>
>>>>>>>>>>> Kindly find below screenshots;
>>>>>>>>>>>
>>>>>>>>>>> <image.png>
>>>>>>>>>>> <image.png>
>>>>>>>>>>> <image.png>
>>>>>>>>>>> <image.png>
>>>>>>>>>>> <image.png>
>>>>>>>>>>> <image.png>
>>>>>>>>>>>
>>>>>>>>>>> <image.png>
>>>>>>>>>>> <image.png>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> On Wed, 25 Nov 2020 at 03:01, Durand fabrice <[email protected]>
>>>>>>>>>>> wrote:
>>>>>>>>>>>
>>>>>>>>>>>> First you need to try with a acl with permit any any and try to
>>>>>>>>>>>> go on the portal url.
>>>>>>>>>>>>
>>>>>>>>>>>> If it doesn't show the portal then it mean that there is a
>>>>>>>>>>>> network issue between the vlan where the device is and the ip of 
>>>>>>>>>>>> the
>>>>>>>>>>>> captive portal.
>>>>>>>>>>>>
>>>>>>>>>>>> What you can try also is to put a wired device in this guest
>>>>>>>>>>>> vlan and try to go on https://172.20.130.50/captive-portal
>>>>>>>>>>>>
>>>>>>>>>>>> Regards
>>>>>>>>>>>>
>>>>>>>>>>>> Fabrice
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> Le 20-11-24 à 05 h 57, Ezeh Victor a écrit :
>>>>>>>>>>>>
>>>>>>>>>>>> Hi Durand,
>>>>>>>>>>>>
>>>>>>>>>>>> This is the result of trying to access the captive portal;
>>>>>>>>>>>>
>>>>>>>>>>>> <image.png>
>>>>>>>>>>>>
>>>>>>>>>>>> Is that the right URL?
>>>>>>>>>>>>
>>>>>>>>>>>> I would appreciate your response.
>>>>>>>>>>>>
>>>>>>>>>>>> Best Regards
>>>>>>>>>>>>
>>>>>>>>>>>> On Tue, 24 Nov 2020 at 10:01, Ezeh Victor <
>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>
>>>>>>>>>>>>> Hi Durand,
>>>>>>>>>>>>>
>>>>>>>>>>>>> Any feedback on my previous response?
>>>>>>>>>>>>>
>>>>>>>>>>>>> Find screenshot again
>>>>>>>>>>>>> <image.png>
>>>>>>>>>>>>>
>>>>>>>>>>>>> On Mon, 23 Nov 2020 at 12:57, Ezeh Victor <
>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>
>>>>>>>>>>>>>> Hi Durand,
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> I have done as directed.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Also, find below a screenshot of Radius Audit Logs
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> <image.png>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> On Tue, 17 Nov 2020 at 04:07, Durand fabrice via
>>>>>>>>>>>>>> PacketFence-users <[email protected]>
>>>>>>>>>>>>>> wrote:
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Hello Victor,
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> it looks that you defined https://172.20.130.50:1443/... as
>>>>>>>>>>>>>>> the registrationUrl.
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> And in the switch config you need to enable "External Portal
>>>>>>>>>>>>>>> Enforcement".
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Also do you have the portal daemon enabled on the management
>>>>>>>>>>>>>>> interface ? (
>>>>>>>>>>>>>>> https://mgmt:1443/admin/alt#/configuration/interfaces)
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Can you paste a screenshot of the radius audit log (radius
>>>>>>>>>>>>>>> tab) when you connect on the ssid ?
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Regards
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Fabrice
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Le 20-11-16 à 17 h 56, Ezeh Victor via PacketFence-users a
>>>>>>>>>>>>>>> écrit :
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Hi
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Please can someone assist me. This project has come to a
>>>>>>>>>>>>>>> halt.
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> I do not seem to be getting something right. The captive
>>>>>>>>>>>>>>> portal does not come up after connecting to the guest SSID.
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> I would really appreciate a response as soon as possible.
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Best regards
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> On Mon, Nov 16, 2020, 11:23 Ezeh Victor <
>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> Hi Ludovic/All,
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> Kindly see the status of trying to access the captive
>>>>>>>>>>>>>>>> portal;
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> <image.png>
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> On Mon, 16 Nov 2020 at 09:42, Ezeh Victor <
>>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> Hi Ludovic,
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> Kind reminder.
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> On Sun, Nov 15, 2020, 16:51 Ezeh Victor <
>>>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> Hi Ludovic,
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> Please I am still expecting your reply.
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> On Fri, Nov 13, 2020, 19:27 Ezeh Victor <
>>>>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> Kindly find below;
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> # Copyright (C) Inverse inc.
>>>>>>>>>>>>>>>>>>> #
>>>>>>>>>>>>>>>>>>> #
>>>>>>>>>>>>>>>>>>> #
>>>>>>>>>>>>>>>>>>> # See the enclosed file COPYING for license information
>>>>>>>>>>>>>>>>>>> (GPL).
>>>>>>>>>>>>>>>>>>> # If you did not receive this file, see
>>>>>>>>>>>>>>>>>>> # http://www.fsf.org/licensing/licenses/gpl.html
>>>>>>>>>>>>>>>>>>> [default]
>>>>>>>>>>>>>>>>>>> type=Cisco::WLC_2500
>>>>>>>>>>>>>>>>>>> VoIPDHCPDetect=N
>>>>>>>>>>>>>>>>>>> coaPort=3799
>>>>>>>>>>>>>>>>>>> uplink_dynamic=0
>>>>>>>>>>>>>>>>>>> deauthMethod=RADIUS
>>>>>>>>>>>>>>>>>>> always_trigger=1
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> [172.20.130.252]
>>>>>>>>>>>>>>>>>>> description=WLC
>>>>>>>>>>>>>>>>>>> RoleMap=Y
>>>>>>>>>>>>>>>>>>> VlanMap=N
>>>>>>>>>>>>>>>>>>> registrationUrl=http://172.20.130.50/Cisco::WLC
>>>>>>>>>>>>>>>>>>> UrlMap=Y
>>>>>>>>>>>>>>>>>>> isolationRole=Isolation
>>>>>>>>>>>>>>>>>>> defaultRole=Authorize_Any
>>>>>>>>>>>>>>>>>>> registrationRole=Pre-Auth-For-WebRedirect
>>>>>>>>>>>>>>>>>>> radiusSecret=D4n-n3t0ps
>>>>>>>>>>>>>>>>>>> inlineRole=Inline
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> # Copyright (C) Inverse inc.
>>>>>>>>>>>>>>>>>>> #
>>>>>>>>>>>>>>>>>>> #
>>>>>>>>>>>>>>>>>>> #
>>>>>>>>>>>>>>>>>>> # See the enclosed file COPYING for license information
>>>>>>>>>>>>>>>>>>> (GPL).
>>>>>>>>>>>>>>>>>>> # If you did not receive this file, see
>>>>>>>>>>>>>>>>>>> # http://www.fsf.org/licensing/licenses/gpl.html
>>>>>>>>>>>>>>>>>>> [192.168.0.1]
>>>>>>>>>>>>>>>>>>> description=Test Switch
>>>>>>>>>>>>>>>>>>> type=Cisco::Catalyst_2960
>>>>>>>>>>>>>>>>>>> mode=production
>>>>>>>>>>>>>>>>>>> uplink=23,24
>>>>>>>>>>>>>>>>>>> VoIPLLDPDetect=N
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> #SNMPVersion = 3
>>>>>>>>>>>>>>>>>>> #SNMPEngineID = 0000000000000
>>>>>>>>>>>>>>>>>>> #SNMPUserNameRead = readUser
>>>>>>>>>>>>>>>>>>> #SNMPAuthProtocolRead = MD5
>>>>>>>>>>>>>>>>>>> #SNMPAuthPasswordRead = authpwdread
>>>>>>>>>>>>>>>>>>> #SNMPPrivProtocolRead = DES
>>>>>>>>>>>>>>>>>>> #SNMPPrivPasswordRead = privpwdread
>>>>>>>>>>>>>>>>>>> #SNMPUserNameWrite = writeUser
>>>>>>>>>>>>>>>>>>> #SNMPAuthProtocolWrite = MD5
>>>>>>>>>>>>>>>>>>> #SNMPAuthPasswordWrite = authpwdwrite
>>>>>>>>>>>>>>>>>>> #SNMPPrivProtocolWrite = DES
>>>>>>>>>>>>>>>>>>> #SNMPPrivPasswordWrite = privpwdwrite
>>>>>>>>>>>>>>>>>>> #SNMPVersionTrap = 3
>>>>>>>>>>>>>>>>>>> #SNMPUserNameTrap = readUser
>>>>>>>>>>>>>>>>>>> #SNMPAuthProtocolTrap = MD5
>>>>>>>>>>>>>>>>>>> #SNMPAuthPasswordTrap = authpwdread
>>>>>>>>>>>>>>>>>>> #SNMPPrivProtocolTrap = DES
>>>>>>>>>>>>>>>>>>> #SNMPPrivPasswordTrap = privpwdread
>>>>>>>>>>>>>>>>>>> [192.168.1.0/24]
>>>>>>>>>>>>>>>>>>> description=Test Range WLC
>>>>>>>>>>>>>>>>>>> type=Cisco::WLC
>>>>>>>>>>>>>>>>>>> mode=production
>>>>>>>>>>>>>>>>>>> uplink_dynamic=0
>>>>>>>>>>>>>>>>>>> VoIPLLDPDetect=N
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> On Fri, 13 Nov 2020 at 19:22, Ludovic Zammit <
>>>>>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> Send me your conf/switches.conf
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> Thanks,
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> On Nov 13, 2020, at 1:20 PM, Ezeh Victor <
>>>>>>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> Hi Ludovic,
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> Thank you for your timely assistance.
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> Kindly below some of the logs observed;
>>>>>>>>>>>>>>>>>>>> <image.png>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> <image.png>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> On Fri, 13 Nov 2020 at 18:48, Ludovic Zammit <
>>>>>>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Glad you are progressing.
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> In web auth, the client IP address is sent out to PF
>>>>>>>>>>>>>>>>>>>>> management interface inside a HTTP request.
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> So if you don’t see the portal, there is a good chance
>>>>>>>>>>>>>>>>>>>>> that IP won’t populate.
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Check in the logs/httpd.portal.access you should see
>>>>>>>>>>>>>>>>>>>>> the request I’m talking about above.
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Thanks,
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Ludovic [email protected] ::  +1.514.447.4918 
>>>>>>>>>>>>>>>>>>>>> (x145) ::  www.inverse.ca
>>>>>>>>>>>>>>>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) 
>>>>>>>>>>>>>>>>>>>>> and PacketFence (http://packetfence.org)
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> On Nov 13, 2020, at 10:44 AM, Ezeh Victor <
>>>>>>>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Hi Ludovic,
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Thank you soo much for the last mail.
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> I have made some progress and the device can now
>>>>>>>>>>>>>>>>>>>>> connect and receive IP information. The directive on 
>>>>>>>>>>>>>>>>>>>>> FlexConnect ACL I
>>>>>>>>>>>>>>>>>>>>> think did the trick. Also, it is seen as an online node.
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> The challenge now is the captive portal does not pop
>>>>>>>>>>>>>>>>>>>>> up as the device remains in unregistered mode and is 
>>>>>>>>>>>>>>>>>>>>> assigned a vlan 0 as
>>>>>>>>>>>>>>>>>>>>> against the guest vlan 300
>>>>>>>>>>>>>>>>>>>>> <image.png>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> <image.png>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> How do I ensure that the captive portal comes up after
>>>>>>>>>>>>>>>>>>>>> connection?
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> On Thu, 12 Nov 2020 at 14:50, Ludovic Zammit <
>>>>>>>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Hello Victor,
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Here’s few steps that you can validate before moving
>>>>>>>>>>>>>>>>>>>>>> forward.
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> SSID config:
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> - AAA override checked, RADIUS NAC (or ISE) enabled
>>>>>>>>>>>>>>>>>>>>>> - Interface set to the correct guest vlan
>>>>>>>>>>>>>>>>>>>>>> - Since you are using flex connect, make sure your
>>>>>>>>>>>>>>>>>>>>>> vlan / ACL are created on the flex connect config
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> PacketFence:
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> - receive the radius request on each connection
>>>>>>>>>>>>>>>>>>>>>> - reply the portal URL + the ACL name for the captive
>>>>>>>>>>>>>>>>>>>>>> portal
>>>>>>>>>>>>>>>>>>>>>> - enable the external portal on the switch
>>>>>>>>>>>>>>>>>>>>>> - getting the portal deamon listening to the
>>>>>>>>>>>>>>>>>>>>>> management interface
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Do you have an IP address when you connect?
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> You can do advanced debuting with the SSH Cisco CLI
>>>>>>>>>>>>>>>>>>>>>> like:
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> debug client mac aa:bb:cc:dd:ee:ff
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Look at the logs, they will tell you why you client
>>>>>>>>>>>>>>>>>>>>>> can’t connect successfully.
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Thanks,
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Ludovic [email protected] ::  +1.514.447.4918 
>>>>>>>>>>>>>>>>>>>>>> (x145) ::  www.inverse.ca
>>>>>>>>>>>>>>>>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) 
>>>>>>>>>>>>>>>>>>>>>> and PacketFence (http://packetfence.org)
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> On Nov 12, 2020, at 3:02 AM, Ezeh Victor <
>>>>>>>>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Hi,
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Thanks for all your responses but I have gone through
>>>>>>>>>>>>>>>>>>>>>> the provided links prior to making this request.
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> A little bit of additional detail;
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>    - My SSID is Open and is a flex connect SSID to
>>>>>>>>>>>>>>>>>>>>>>    enable users to pick IP addresses from local DHCP 
>>>>>>>>>>>>>>>>>>>>>> servers
>>>>>>>>>>>>>>>>>>>>>>    - I have my access-lists in place
>>>>>>>>>>>>>>>>>>>>>>    - I have configured the controller on packet
>>>>>>>>>>>>>>>>>>>>>>    fence following the documentation
>>>>>>>>>>>>>>>>>>>>>>    - I have enabled the captive portal on the
>>>>>>>>>>>>>>>>>>>>>>    management interface
>>>>>>>>>>>>>>>>>>>>>>    - I have enabled self preregistration
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> My challenges however are;
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>    - I cannot connect to the SSID. I keep getting an
>>>>>>>>>>>>>>>>>>>>>>    authentication error.
>>>>>>>>>>>>>>>>>>>>>>    - The captive portal does not show up
>>>>>>>>>>>>>>>>>>>>>>    - I cannot see the controller node online as it
>>>>>>>>>>>>>>>>>>>>>>    is recorded as offline on packetfence
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> I would appreciate a clear step on what to do based
>>>>>>>>>>>>>>>>>>>>>> off of successful implementations already done.
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> The documentation has helped but I have not been
>>>>>>>>>>>>>>>>>>>>>> successful.
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> On Wed, 11 Nov 2020 at 20:14, Ludovic Zammit <
>>>>>>>>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Hello,
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_cisco_2
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Thanks,
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Ludovic [email protected] ::  +1.514.447.4918 
>>>>>>>>>>>>>>>>>>>>>>> (x145) ::  www.inverse.ca
>>>>>>>>>>>>>>>>>>>>>>> Inverse inc. :: Leaders behind SOGo 
>>>>>>>>>>>>>>>>>>>>>>> (http://www.sogo.nu) and PacketFence 
>>>>>>>>>>>>>>>>>>>>>>> (http://packetfence.org)
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> On Nov 10, 2020, at 8:24 AM, Ezeh Victor via
>>>>>>>>>>>>>>>>>>>>>>> PacketFence-users <
>>>>>>>>>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Hi,
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Please I need assistance with figuring how I can
>>>>>>>>>>>>>>>>>>>>>>> integrate PacketFence with Cisco WLC.
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Any assistance will be appreciated.
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Regards.
>>>>>>>>>>>>>>>>>>>>>>> _______________________________________________
>>>>>>>>>>>>>>>>>>>>>>> PacketFence-users mailing list
>>>>>>>>>>>>>>>>>>>>>>> [email protected]
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> _______________________________________________
>>>>>>>>>>>>>>> PacketFence-users mailing 
>>>>>>>>>>>>>>> [email protected]https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> _______________________________________________
>>>>>>>>>>>>>>> PacketFence-users mailing list
>>>>>>>>>>>>>>> [email protected]
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>
>>>>>>>
>>>>> <putty.log>
>>>>
>>>>
>>>> <image.png><image.png>
>>>
>>>
>>>
>>
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
>
>
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to