Hello ! 

I got the exact same issue ! Do you have a command to reload PacketFence 
iptable configuration ? 

Regards, 

Adrian. 


De: "packetfence-users" <packetfence-users@lists.sourceforge.net> 
À: "Geert Heremans" <heremans.ge...@gmail.com>, "packetfence-users" 
<packetfence-users@lists.sourceforge.net> 
Cc: "Durand fabrice" <fdur...@inverse.ca> 
Envoyé: Mercredi 7 Octobre 2020 15:30:09 
Objet: Re: [PacketFence-users] Cannot join domain using GUI - net ads join 
works 



Ok so it looks that you iptables config is not able to load. 

It's probably related to NETFLOW kernel module. 

You have 2 choices, the first one: 

edit /usr/local/pf/conf/iptables.conf and remove the line "-I FORWARD -j 
NETFLOW" 

or do a yum update , if there is a new kernel then reboot the server then do 
yum reinstall dkms-ipt-netflow 




Then once done check again iptables -L -n -v , if it's more verbose then retry 
to join to the domain, it should work. 




Regards 

Fabrice 


Le 20-10-07 à 09 h 23, Geert Heremans a écrit : 



Hello Fabrice 

of course. Anything that helps. 

The output of the iptables -L -n -v command you'll find below: 


BQ_BEGIN

BQ_BEGIN

Chain INPUT (policy ACCEPT 1891K packets, 332M bytes) 



BQ_BEGIN

pkts bytes target prot opt in out source destination 

BQ_END

BQ_BEGIN



BQ_END

BQ_BEGIN

Chain FORWARD (policy ACCEPT 13 packets, 1053 bytes) 

BQ_END

BQ_BEGIN

pkts bytes target prot opt in out source destination 

BQ_END

BQ_BEGIN



BQ_END

BQ_BEGIN

Chain OUTPUT (policy ACCEPT 1887K packets, 340M bytes) 

BQ_END

BQ_BEGIN

pkts bytes target prot opt in out source destination 

BQ_END

BQ_END



Below the contents of the iptables.conf file. Also attached to this email 

# Copyright (C) Inverse inc. 
# iptables template 
# This file is manipulated on PacketFence's startup before being given to 
iptables 
*filter 

### INPUT ### 
:INPUT DROP [0:0] 
# accept loopback stuff 
-A INPUT --in-interface lo --jump ACCEPT 
# accept anything related 
-A INPUT --match state --state ESTABLISHED,RELATED --jump ACCEPT 
# Accept Ping (easier troubleshooting) 
-A INPUT --protocol icmp --icmp-type echo-request --jump ACCEPT 

:input-management-if - [0:0] 
# SSH 
-A input-management-if --match state --state NEW --match tcp --protocol tcp 
--dport 22 --jump ACCEPT 
# HTTP and HTTPS for the portal 
-A input-management-if --protocol tcp --match tcp --dport 80 --jump ACCEPT 
-A input-management-if --protocol tcp --match tcp --dport 443 --jump ACCEPT 
# Web Admin 
-A input-management-if --protocol tcp --match tcp --dport %%web_admin_port%% 
--jump ACCEPT 
# Webservices 
-A input-management-if --protocol tcp --match tcp --dport %%webservices_port%% 
--jump ACCEPT 
# AAA 
-A input-management-if --protocol tcp --match tcp --dport %%aaa_port%% --jump 
ACCEPT 
# Unified API 
-A input-management-if --protocol tcp --match tcp --dport %%unifiedapi_port%% 
--jump ACCEPT 
# httpd.portal modstatus 
-A input-management-if --protocol tcp --match tcp --dport 
%%httpd_portal_modstatus%% --jump ACCEPT 
# httpd.collector 
-A input-management-if --protocol tcp --match tcp --dport 
%%httpd_collector_port%% --jump ACCEPT 
# haproxy stats (uncomment if activating the haproxy dashboard) - 1025 for 
haproxy-portal, 1026 for haproxy-db 
#-A input-management-if --protocol tcp --match tcp --dport 1025 --jump ACCEPT 
#-A input-management-if --protocol tcp --match tcp --dport 1026 --jump ACCEPT 
# Netdata 
-A input-management-if --protocol tcp --match tcp --dport 19999 --jump ACCEPT 

# RADIUS 
-A input-management-if --protocol tcp --match tcp --dport 1812 --jump ACCEPT 
-A input-management-if --protocol udp --match udp --dport 1812 --jump ACCEPT 
-A input-management-if --protocol tcp --match tcp --dport 1813 --jump ACCEPT 
-A input-management-if --protocol udp --match udp --dport 1813 --jump ACCEPT 
-A input-management-if --protocol tcp --match tcp --dport 1815 --jump ACCEPT 
-A input-management-if --protocol udp --match udp --dport 1815 --jump ACCEPT 
-A input-management-if --protocol tcp --match tcp --dport 2083 --jump ACCEPT 
# RADIUS (eduroam virtual-server) 
%%eduroam_radius_virtualserver%% 
# SNMP Traps 
-A input-management-if --protocol udp --match udp --dport 162 --jump ACCEPT 
# DHCP (for IP Helpers to mgmt to track users' IP in production VLANs) 
-A input-management-if --protocol udp --match udp --dport 67 --jump ACCEPT 
-A input-management-if --protocol tcp --match tcp --dport 67 --jump ACCEPT 
# OpenVAS Administration Interface 
-A input-management-if --protocol tcp --match tcp --dport 9392 --jump ACCEPT 
# Nessus Administration Interface 
-A input-management-if --protocol tcp --match tcp --dport 8834 --jump ACCEPT 
# PacketFence-PKI 
# -A input-management-if --protocol tcp --match tcp --dport 9393 --jump ACCEPT 
# -A input-management-if --protocol tcp --match tcp --dport 9292 --jump ACCEPT 

# Fingerbank collector (replication, Netflow, API, sFlow) 
-A input-management-if --protocol udp --match udp --dport 1192 --jump ACCEPT 
-A input-management-if --protocol udp --match udp --dport 2055 --jump ACCEPT 
-A input-management-if --protocol tcp --match tcp --dport 4723 --jump ACCEPT 
-A input-management-if --protocol udp --match udp --dport 6343 --jump ACCEPT 

# VRRP 
-A input-management-if -d [ http://224.0.0.0/8 | 224.0.0.0/8 ] -j ACCEPT 
-A input-management-if -p vrrp -j ACCEPT 
# Mysql 
-A input-management-if --protocol tcp --match tcp --dport 3306 --jump ACCEPT 

# Syslog 
-A input-management-if --protocol udp --match udp --dport 514 --jump ACCEPT 

:input-portal-if - [0:0] 
-A input-portal-if --protocol tcp --match tcp --dport 80 --jump ACCEPT 
-A input-portal-if --protocol tcp --match tcp --dport 443 --jump ACCEPT 

:input-radius-if - [0:0] 
-A input-radius-if --protocol tcp --match tcp --dport 1812 --jump ACCEPT 
-A input-radius-if --protocol udp --match udp --dport 1812 --jump ACCEPT 
-A input-radius-if --protocol tcp --match tcp --dport 1813 --jump ACCEPT 
-A input-radius-if --protocol udp --match udp --dport 1813 --jump ACCEPT 
-A input-radius-if --protocol tcp --match tcp --dport 1815 --jump ACCEPT 
-A input-radius-if --protocol udp --match udp --dport 1815 --jump ACCEPT 
-A input-radius-if --protocol tcp --match tcp --dport 2083 --jump ACCEPT 
%%eduroam_radius_listening%% 

:input-dns-if - [0:0] 
-A input-dns-if --protocol tcp --match tcp --dport 53 --jump ACCEPT 
-A input-dns-if --protocol udp --match udp --dport 53 --jump ACCEPT 

:input-dhcp-if - [0:0] 
-A input-dhcp-if --protocol udp --match udp --dport 67 --jump ACCEPT 
-A input-dhcp-if --protocol tcp --match tcp --dport 67 --jump ACCEPT 


:input-internal-vlan-if - [0:0] 
# DNS 
-A input-internal-vlan-if --protocol tcp --match tcp --dport 53 --jump ACCEPT 
-A input-internal-vlan-if --protocol udp --match udp --dport 53 --jump ACCEPT 
# HTTP (captive-portal) 
-A input-internal-vlan-if --protocol tcp --match tcp --dport 80 --jump ACCEPT 
-A input-internal-vlan-if --protocol tcp --match tcp --dport 443 --jump ACCEPT 
-A input-internal-vlan-if --protocol tcp --match tcp --dport 647 --jump ACCEPT 
# HTTP (parking portal) 
-A input-internal-vlan-if --protocol tcp --match tcp --dport 5252 --jump ACCEPT 
%%input_inter_vlan_if%% 


:input-internal-isol_vlan-if - [0:0] 
# DNS 
-A input-internal-isol_vlan-if --protocol tcp --match tcp --dport 53 --jump 
ACCEPT 
-A input-internal-isol_vlan-if --protocol udp --match udp --dport 53 --jump 
ACCEPT 
# DHCP 
-A input-internal-isol_vlan-if --protocol udp --match udp --dport 67 --jump 
ACCEPT 
-A input-internal-isol_vlan-if --protocol tcp --match tcp --dport 67 --jump 
ACCEPT 
# HTTP (captive-portal) 
-A input-internal-isol_vlan-if --protocol tcp --match tcp --dport 80 --jump 
ACCEPT 
-A input-internal-isol_vlan-if --protocol tcp --match tcp --dport 443 --jump 
ACCEPT 
-A input-internal-isol_vlan-if --protocol tcp --match tcp --dport 647 --jump 
ACCEPT 
# HTTP (parking portal) 
-A input-internal-isol_vlan-if --protocol tcp --match tcp --dport 5252 --jump 
ACCEPT 
%%input_inter_isol_vlan_if%% 

:input-internal-inline-if - [0:0] 
# DNS 
-A input-internal-inline-if --protocol tcp --match tcp --dport 53 --jump ACCEPT 
-A input-internal-inline-if --protocol udp --match udp --dport 53 --jump ACCEPT 
# HTTP (captive-portal) 
# prevent registered users from reaching it 
# TODO: Must work in dispatcher and Catalyst to redirect registered client out 
of the portal 
#-A input-internal-inline-if --protocol tcp --match tcp --dport 80 --match mark 
--mark 0x1 --jump DROP 
#-A input-internal-inline-if --protocol tcp --match tcp --dport 443 --match 
mark --mark 0x1 --jump DROP 
# allow everyone else behind inline interface (not registered, isolated, etc.) 
-A input-internal-inline-if --protocol tcp --match tcp --dport 80 --jump ACCEPT 
-A input-internal-inline-if --protocol tcp --match tcp --dport 443 --jump 
ACCEPT 
-A input-internal-inline-if --protocol tcp --match tcp --dport 647 --jump 
ACCEPT 
%%input_inter_inline_rules%% 

:input-highavailability-if - [0:0] 
#SSH 
-A input-highavailability-if --match state --state NEW --match tcp --protocol 
tcp --dport 22 --jump ACCEPT 
#Galera autofix 
-A input-highavailability-if --protocol udp --match udp --dport 4253 --jump 
ACCEPT 
#Galera cluster 
-A input-highavailability-if --protocol tcp --match tcp --dport 4444 --jump 
ACCEPT 
-A input-highavailability-if --protocol tcp --match tcp --dport 4567 --jump 
ACCEPT 
-A input-highavailability-if --protocol tcp --match tcp --dport 4568 --jump 
ACCEPT 
#PacketFence MariaDB Quorum server 
-A input-highavailability-if --protocol tcp --match tcp --dport 7890 --jump 
ACCEPT 
-A input-highavailability-if --protocol tcp --match tcp --dport 7891 --jump 
ACCEPT 
# Corosync 
-A input-highavailability-if --protocol udp --match udp --dport 5405 --jump 
ACCEPT 
-A input-highavailability-if --protocol udp --match udp --dport 5407 --jump 
ACCEPT 
#DRBD 
-A input-highavailability-if --protocol tcp --match tcp --dport 7788 --jump 
ACCEPT 
# Heartbeat 
-A input-highavailability-if --protocol udp --match udp --dport 694 --jump 
ACCEPT 
#PCS 
-A input-highavailability-if --protocol tcp --match tcp --dport 2224 --jump 
ACCEPT 
-A input-highavailability-if --protocol tcp --match tcp --dport 3121 --jump 
ACCEPT 
-A input-highavailability-if --protocol tcp --match tcp --dport 21064 --jump 
ACCEPT 

# These will redirect to the proper chains based on conf/pf.conf's 
configuration 
%%filter_if_src_to_chain%% 

### FORWARD ### 
:FORWARD DROP [0:0] 
-I FORWARD -j NETFLOW 

:forward-internal-vlan-if - [0:0] 
%%filter_forward_vlan%% 

:forward-internal-isolvlan-if - [0:0] 
%%filter_forward_isol_vlan%% 

:forward-internal-inline-if - [0:0] 
%%filter_forward_inline%% 

%%filter_forward%% 

%%filter_forward_domain%% 

:OUTPUT ACCEPT [0:0] 

COMMIT 

*mangle 
:PREROUTING ACCEPT [0:0] 
:prerouting-int-inline-if - [0:0] 
%%mangle_prerouting_inline%% 
:INPUT ACCEPT [0:0] 
:FORWARD ACCEPT [0:0] 
:OUTPUT ACCEPT [0:0] 
:POSTROUTING ACCEPT [0:0] 
:postrouting-int-inline-if - [0:0] 
%%mangle_postrouting_inline%% 
# These will redirect to the proper chains based on conf/pf.conf's 
configuration 
%%mangle_if_src_to_chain%% 
COMMIT 

*nat 
:PREROUTING ACCEPT [0:0] 
:prerouting-int-inline-if - [0:0] 
:postrouting-inline-routed - [0:0] 
:postrouting-int-inline-if - [0:0] 
:prerouting-int-vlan-if - [0:0] 

%%nat_prerouting_inline%% 
%%nat_prerouting_vlan%% 

:OUTPUT ACCEPT [0:0] 
# These will redirect to the proper chains based on conf/pf.conf's 
configuration 
%%nat_if_src_to_chain%% 


:POSTROUTING ACCEPT [0:0] 

%%nat_postrouting_inline%% 

# 
# Chain to enable routing instead of NAT 
# 
%%routed_postrouting_inline%% 

# 
# NAT out (PAT actually) 
# 
# If you want to do your own thing regarding NAT like for example: 
# - allowing through instead of doing NAT (make sure you have the proper return 
route) 
# - traffic out on some interface other than management 
# - overloading on multiple IP addresses 
# Comment the next two lines and do it here on the POSTROUTING chain. 
# Make sure to adjust the FORWARD rules also to allow traffic back-in. 
%%nat_postrouting_vlan%% 

# 
# Routing for the hidden domain network 
# 
%%domain_postrouting%% 
COMMIT 

Op wo 7 okt. 2020 om 15:17 schreef Fabrice Durand via PacketFence-users < [ 
mailto:packetfence-users@lists.sourceforge.net | 
packetfence-users@lists.sourceforge.net ] >: 

BQ_BEGIN



Hello Geert, 




can you provide the file /usr/local/pf/var/conf/iptables.conf and the output of 
iptables -L -n -v 




Regards 

Fabrice 


Le 20-10-07 à 08 h 11, Geert Heremans via PacketFence-users a écrit : 

BQ_BEGIN

Thank you Maile and others 

Really appreciate it. 

Putting the management network on the same as the DC din't work. 

Would it help if I joined the server using the net ads command end bypass the 
Join Domain function in PF? 

Best regards 
Geert 

Op wo 7 okt. 2020 om 10:32 schreef Maile Halatuituia < [ 
mailto:maile.halatuit...@tcc.to | maile.halatuit...@tcc.to ] >: 

BQ_BEGIN



Hi Geert 

I did have the same issue as yours but mine got fixed when I put my management 
interface on the same network where my Doman Controller is. 

To be more clearer, my Domain IP is 10.0.1.x/24 and my PF Management Interface 
is 10.0.1.y/24. After I made that changed , everything works just fine. Hope it 
will help you. 

Maile. 




From: Geert Heremans via PacketFence-users < [ 
mailto:packetfence-users@lists.sourceforge.net | 
packetfence-users@lists.sourceforge.net ] > 
Sent: Wednesday, 7 October 2020 9:59 AM 
To: [ mailto:packetfence-users@lists.sourceforge.net | 
packetfence-users@lists.sourceforge.net ] 
Cc: Geert Heremans < [ mailto:heremans.ge...@gmail.com | 
heremans.ge...@gmail.com ] > 
Subject: [PacketFence-users] Cannot join domain using GUI - net ads join works 





Hello everyone 





I'm trying to get my PF10 server to join my domain. The PF hostname is hades 
and my domain is [ http://sintcordula.be/ | sintcordula.be ] . 





Trying to join from the gui false because no DC is found. 





However when I try to join the server using the shell it works. The computer 
account is created in the domain. 





Failed to join domain: failed to find DC for domain SINTCORDULA - {Operation 
Failed} The requested operation was unsuccessful. 





net ads join -s /etc/samba/scis2.conf -U XXXX 
Using short domain name -- SINTCORDULA 
Joined 'HADES' to dns domain ' [ http://sintcordula.be/ | SINTCORDULA.BE ] ' 
No DNS domain configured for hades. Unable to perform DNS Update. 
DNS update failed: NT_STATUS_INVALID_PARAMETER 





Can anyone point me into the right direction for debugging? 





Best Regards 


Geert 








Confidentiality Notice: 

This email (including any attachment) is intended for internal use only. Any 
unauthorized use, dissemination or copying of the content is prohibited. If you 
are not the intended recipient and have received this e-mail in error, please 
notify the sender by email and delete this email and any attachment. 


Confidentiality Notice: 

This email (including any attachment) is intended for internal use only. Any 
unauthorized use, dissemination or copying of the content is prohibited. If you 
are not the intended recipient and have received this e-mail in error, please 
notify the sender by email and delete this email and any attachment. 

BQ_END



_______________________________________________
PacketFence-users mailing list [ mailto:PacketFence-users@lists.sourceforge.net 
| PacketFence-users@lists.sourceforge.net ] [ 
https://lists.sourceforge.net/lists/listinfo/packetfence-users | 
https://lists.sourceforge.net/lists/listinfo/packetfence-users ] 

BQ_END

-- 
Fabrice Durand [ mailto:fdur...@inverse.ca | fdur...@inverse.ca ] ::  
+1.514.447.4918 (x135) :: [ http://www.inverse.ca/ | www.inverse.ca ] Inverse 
inc. :: Leaders behind SOGo ( [ http://www.sogo.nu/ | http://www.sogo.nu ] ) 
and PacketFence ( [ http://packetfence.org/ | http://packetfence.org ] ) 
_______________________________________________ 
PacketFence-users mailing list 
[ mailto:PacketFence-users@lists.sourceforge.net | 
PacketFence-users@lists.sourceforge.net ] 
[ https://lists.sourceforge.net/lists/listinfo/packetfence-users | 
https://lists.sourceforge.net/lists/listinfo/packetfence-users ] 

BQ_END


BQ_END

-- 
Fabrice Durand [ mailto:fdur...@inverse.ca | fdur...@inverse.ca ] ::  
+1.514.447.4918 (x135) :: [ http://www.inverse.ca/ | www.inverse.ca ] Inverse 
inc. :: Leaders behind SOGo ( [ http://www.sogo.nu/ | http://www.sogo.nu ] ) 
and PacketFence ( [ http://packetfence.org/ | http://packetfence.org ] ) 


_______________________________________________ 
PacketFence-users mailing list 
PacketFence-users@lists.sourceforge.net 
https://lists.sourceforge.net/lists/listinfo/packetfence-users 
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to