Hello Adrian, systemctl restart packetfence-iptables
Thanks, Ludovic Zammit lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 (x145) :: www.inverse.ca <http://www.inverse.ca/> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu <http://www.sogo.nu/>) and PacketFence (http://packetfence.org <http://packetfence.org/>) > On Feb 1, 2021, at 10:31 AM, Adrian Dessaigne via PacketFence-users > <packetfence-users@lists.sourceforge.net> wrote: > > Hello ! > > I got the exact same issue ! Do you have a command to reload PacketFence > iptable configuration ? > > Regards, > > Adrian. > > De: "packetfence-users" <packetfence-users@lists.sourceforge.net> > À: "Geert Heremans" <heremans.ge...@gmail.com>, "packetfence-users" > <packetfence-users@lists.sourceforge.net> > Cc: "Durand fabrice" <fdur...@inverse.ca> > Envoyé: Mercredi 7 Octobre 2020 15:30:09 > Objet: Re: [PacketFence-users] Cannot join domain using GUI - net ads join > works > > Ok so it looks that you iptables config is not able to load. > > It's probably related to NETFLOW kernel module. > > You have 2 choices, the first one: > > edit /usr/local/pf/conf/iptables.conf and remove the line "-I FORWARD -j > NETFLOW" > > or do a yum update , if there is a new kernel then reboot the server then do > yum reinstall dkms-ipt-netflow > > > > Then once done check again iptables -L -n -v , if it's more verbose then > retry to join to the domain, it should work. > > > > Regards > > Fabrice > > > > Le 20-10-07 à 09 h 23, Geert Heremans a écrit : > Hello Fabrice > > of course. Anything that helps. > > The output of the iptables -L -n -v command you'll find below: > > Chain INPUT (policy ACCEPT 1891K packets, 332M bytes) > pkts bytes target prot opt in out source > destination > > Chain FORWARD (policy ACCEPT 13 packets, 1053 bytes) > pkts bytes target prot opt in out source > destination > > Chain OUTPUT (policy ACCEPT 1887K packets, 340M bytes) > pkts bytes target prot opt in out source > destination > > > Below the contents of the iptables.conf file. Also attached to this email > > # Copyright (C) Inverse inc. > # iptables template > # This file is manipulated on PacketFence's startup before being given to > iptables > *filter > > ### INPUT ### > :INPUT DROP [0:0] > # accept loopback stuff > -A INPUT --in-interface lo --jump ACCEPT > # accept anything related > -A INPUT --match state --state ESTABLISHED,RELATED --jump ACCEPT > # Accept Ping (easier troubleshooting) > -A INPUT --protocol icmp --icmp-type echo-request --jump ACCEPT > > :input-management-if - [0:0] > # SSH > -A input-management-if --match state --state NEW --match tcp --protocol tcp > --dport 22 --jump ACCEPT > # HTTP and HTTPS for the portal > -A input-management-if --protocol tcp --match tcp --dport 80 --jump ACCEPT > -A input-management-if --protocol tcp --match tcp --dport 443 --jump ACCEPT > # Web Admin > -A input-management-if --protocol tcp --match tcp --dport %%web_admin_port%% > --jump ACCEPT > # Webservices > -A input-management-if --protocol tcp --match tcp --dport > %%webservices_port%% --jump ACCEPT > # AAA > -A input-management-if --protocol tcp --match tcp --dport %%aaa_port%% --jump > ACCEPT > # Unified API > -A input-management-if --protocol tcp --match tcp --dport %%unifiedapi_port%% > --jump ACCEPT > # httpd.portal modstatus > -A input-management-if --protocol tcp --match tcp --dport > %%httpd_portal_modstatus%% --jump ACCEPT > # httpd.collector > -A input-management-if --protocol tcp --match tcp --dport > %%httpd_collector_port%% --jump ACCEPT > # haproxy stats (uncomment if activating the haproxy dashboard) - 1025 for > haproxy-portal, 1026 for haproxy-db > #-A input-management-if --protocol tcp --match tcp --dport 1025 --jump ACCEPT > #-A input-management-if --protocol tcp --match tcp --dport 1026 --jump ACCEPT > # Netdata > -A input-management-if --protocol tcp --match tcp --dport 19999 --jump ACCEPT > > # RADIUS > -A input-management-if --protocol tcp --match tcp --dport 1812 --jump ACCEPT > -A input-management-if --protocol udp --match udp --dport 1812 --jump ACCEPT > -A input-management-if --protocol tcp --match tcp --dport 1813 --jump ACCEPT > -A input-management-if --protocol udp --match udp --dport 1813 --jump ACCEPT > -A input-management-if --protocol tcp --match tcp --dport 1815 --jump ACCEPT > -A input-management-if --protocol udp --match udp --dport 1815 --jump ACCEPT > -A input-management-if --protocol tcp --match tcp --dport 2083 --jump ACCEPT > # RADIUS (eduroam virtual-server) > %%eduroam_radius_virtualserver%% > # SNMP Traps > -A input-management-if --protocol udp --match udp --dport 162 --jump ACCEPT > # DHCP (for IP Helpers to mgmt to track users' IP in production VLANs) > -A input-management-if --protocol udp --match udp --dport 67 --jump ACCEPT > -A input-management-if --protocol tcp --match tcp --dport 67 --jump ACCEPT > # OpenVAS Administration Interface > -A input-management-if --protocol tcp --match tcp --dport 9392 --jump ACCEPT > # Nessus Administration Interface > -A input-management-if --protocol tcp --match tcp --dport 8834 --jump ACCEPT > # PacketFence-PKI > # -A input-management-if --protocol tcp --match tcp --dport 9393 --jump ACCEPT > # -A input-management-if --protocol tcp --match tcp --dport 9292 --jump ACCEPT > > # Fingerbank collector (replication, Netflow, API, sFlow) > -A input-management-if --protocol udp --match udp --dport 1192 --jump ACCEPT > -A input-management-if --protocol udp --match udp --dport 2055 --jump ACCEPT > -A input-management-if --protocol tcp --match tcp --dport 4723 --jump ACCEPT > -A input-management-if --protocol udp --match udp --dport 6343 --jump ACCEPT > > # VRRP > -A input-management-if -d 224.0.0.0/8 <http://224.0.0.0/8> -j ACCEPT > -A input-management-if -p vrrp -j ACCEPT > # Mysql > -A input-management-if --protocol tcp --match tcp --dport 3306 --jump ACCEPT > > # Syslog > -A input-management-if --protocol udp --match udp --dport 514 --jump ACCEPT > > :input-portal-if - [0:0] > -A input-portal-if --protocol tcp --match tcp --dport 80 --jump ACCEPT > -A input-portal-if --protocol tcp --match tcp --dport 443 --jump ACCEPT > > :input-radius-if - [0:0] > -A input-radius-if --protocol tcp --match tcp --dport 1812 --jump ACCEPT > -A input-radius-if --protocol udp --match udp --dport 1812 --jump ACCEPT > -A input-radius-if --protocol tcp --match tcp --dport 1813 --jump ACCEPT > -A input-radius-if --protocol udp --match udp --dport 1813 --jump ACCEPT > -A input-radius-if --protocol tcp --match tcp --dport 1815 --jump ACCEPT > -A input-radius-if --protocol udp --match udp --dport 1815 --jump ACCEPT > -A input-radius-if --protocol tcp --match tcp --dport 2083 --jump ACCEPT > %%eduroam_radius_listening%% > > :input-dns-if - [0:0] > -A input-dns-if --protocol tcp --match tcp --dport 53 --jump ACCEPT > -A input-dns-if --protocol udp --match udp --dport 53 --jump ACCEPT > > :input-dhcp-if - [0:0] > -A input-dhcp-if --protocol udp --match udp --dport 67 --jump ACCEPT > -A input-dhcp-if --protocol tcp --match tcp --dport 67 --jump ACCEPT > > > :input-internal-vlan-if - [0:0] > # DNS > -A input-internal-vlan-if --protocol tcp --match tcp --dport 53 --jump ACCEPT > -A input-internal-vlan-if --protocol udp --match udp --dport 53 --jump ACCEPT > # HTTP (captive-portal) > -A input-internal-vlan-if --protocol tcp --match tcp --dport 80 --jump ACCEPT > -A input-internal-vlan-if --protocol tcp --match tcp --dport 443 --jump ACCEPT > -A input-internal-vlan-if --protocol tcp --match tcp --dport 647 --jump ACCEPT > # HTTP (parking portal) > -A input-internal-vlan-if --protocol tcp --match tcp --dport 5252 --jump > ACCEPT > %%input_inter_vlan_if%% > > > :input-internal-isol_vlan-if - [0:0] > # DNS > -A input-internal-isol_vlan-if --protocol tcp --match tcp --dport 53 --jump > ACCEPT > -A input-internal-isol_vlan-if --protocol udp --match udp --dport 53 --jump > ACCEPT > # DHCP > -A input-internal-isol_vlan-if --protocol udp --match udp --dport 67 --jump > ACCEPT > -A input-internal-isol_vlan-if --protocol tcp --match tcp --dport 67 --jump > ACCEPT > # HTTP (captive-portal) > -A input-internal-isol_vlan-if --protocol tcp --match tcp --dport 80 --jump > ACCEPT > -A input-internal-isol_vlan-if --protocol tcp --match tcp --dport 443 --jump > ACCEPT > -A input-internal-isol_vlan-if --protocol tcp --match tcp --dport 647 --jump > ACCEPT > # HTTP (parking portal) > -A input-internal-isol_vlan-if --protocol tcp --match tcp --dport 5252 --jump > ACCEPT > %%input_inter_isol_vlan_if%% > > :input-internal-inline-if - [0:0] > # DNS > -A input-internal-inline-if --protocol tcp --match tcp --dport 53 --jump > ACCEPT > -A input-internal-inline-if --protocol udp --match udp --dport 53 --jump > ACCEPT > # HTTP (captive-portal) > # prevent registered users from reaching it > # TODO: Must work in dispatcher and Catalyst to redirect registered client > out of the portal > #-A input-internal-inline-if --protocol tcp --match tcp --dport 80 --match > mark --mark 0x1 --jump DROP > #-A input-internal-inline-if --protocol tcp --match tcp --dport 443 --match > mark --mark 0x1 --jump DROP > # allow everyone else behind inline interface (not registered, isolated, etc.) > -A input-internal-inline-if --protocol tcp --match tcp --dport 80 --jump > ACCEPT > -A input-internal-inline-if --protocol tcp --match tcp --dport 443 --jump > ACCEPT > -A input-internal-inline-if --protocol tcp --match tcp --dport 647 --jump > ACCEPT > %%input_inter_inline_rules%% > > :input-highavailability-if - [0:0] > #SSH > -A input-highavailability-if --match state --state NEW --match tcp --protocol > tcp --dport 22 --jump ACCEPT > #Galera autofix > -A input-highavailability-if --protocol udp --match udp --dport 4253 --jump > ACCEPT > #Galera cluster > -A input-highavailability-if --protocol tcp --match tcp --dport 4444 --jump > ACCEPT > -A input-highavailability-if --protocol tcp --match tcp --dport 4567 --jump > ACCEPT > -A input-highavailability-if --protocol tcp --match tcp --dport 4568 --jump > ACCEPT > #PacketFence MariaDB Quorum server > -A input-highavailability-if --protocol tcp --match tcp --dport 7890 --jump > ACCEPT > -A input-highavailability-if --protocol tcp --match tcp --dport 7891 --jump > ACCEPT > # Corosync > -A input-highavailability-if --protocol udp --match udp --dport 5405 --jump > ACCEPT > -A input-highavailability-if --protocol udp --match udp --dport 5407 --jump > ACCEPT > #DRBD > -A input-highavailability-if --protocol tcp --match tcp --dport 7788 --jump > ACCEPT > # Heartbeat > -A input-highavailability-if --protocol udp --match udp --dport 694 --jump > ACCEPT > #PCS > -A input-highavailability-if --protocol tcp --match tcp --dport 2224 --jump > ACCEPT > -A input-highavailability-if --protocol tcp --match tcp --dport 3121 --jump > ACCEPT > -A input-highavailability-if --protocol tcp --match tcp --dport 21064 --jump > ACCEPT > > # These will redirect to the proper chains based on conf/pf.conf's > configuration > %%filter_if_src_to_chain%% > > ### FORWARD ### > :FORWARD DROP [0:0] > -I FORWARD -j NETFLOW > > :forward-internal-vlan-if - [0:0] > %%filter_forward_vlan%% > > :forward-internal-isolvlan-if - [0:0] > %%filter_forward_isol_vlan%% > > :forward-internal-inline-if - [0:0] > %%filter_forward_inline%% > > %%filter_forward%% > > %%filter_forward_domain%% > > :OUTPUT ACCEPT [0:0] > > COMMIT > > *mangle > :PREROUTING ACCEPT [0:0] > :prerouting-int-inline-if - [0:0] > %%mangle_prerouting_inline%% > :INPUT ACCEPT [0:0] > :FORWARD ACCEPT [0:0] > :OUTPUT ACCEPT [0:0] > :POSTROUTING ACCEPT [0:0] > :postrouting-int-inline-if - [0:0] > %%mangle_postrouting_inline%% > # These will redirect to the proper chains based on conf/pf.conf's > configuration > %%mangle_if_src_to_chain%% > COMMIT > > *nat > :PREROUTING ACCEPT [0:0] > :prerouting-int-inline-if - [0:0] > :postrouting-inline-routed - [0:0] > :postrouting-int-inline-if - [0:0] > :prerouting-int-vlan-if - [0:0] > > %%nat_prerouting_inline%% > %%nat_prerouting_vlan%% > > :OUTPUT ACCEPT [0:0] > # These will redirect to the proper chains based on conf/pf.conf's > configuration > %%nat_if_src_to_chain%% > > > :POSTROUTING ACCEPT [0:0] > > %%nat_postrouting_inline%% > > # > # Chain to enable routing instead of NAT > # > %%routed_postrouting_inline%% > > # > # NAT out (PAT actually) > # > # If you want to do your own thing regarding NAT like for example: > # - allowing through instead of doing NAT (make sure you have the proper > return route) > # - traffic out on some interface other than management > # - overloading on multiple IP addresses > # Comment the next two lines and do it here on the POSTROUTING chain. > # Make sure to adjust the FORWARD rules also to allow traffic back-in. > %%nat_postrouting_vlan%% > > # > # Routing for the hidden domain network > # > %%domain_postrouting%% > COMMIT > > Op wo 7 okt. 2020 om 15:17 schreef Fabrice Durand via PacketFence-users > <packetfence-users@lists.sourceforge.net > <mailto:packetfence-users@lists.sourceforge.net>>: > Hello Geert, > > > > can you provide the file /usr/local/pf/var/conf/iptables.conf and the output > of iptables -L -n -v > > > > Regards > > Fabrice > > > > Le 20-10-07 à 08 h 11, Geert Heremans via PacketFence-users a écrit : > Thank you Maile and others > > Really appreciate it. > > Putting the management network on the same as the DC din't work. > > Would it help if I joined the server using the net ads command end bypass the > Join Domain function in PF? > > Best regards > Geert > > Op wo 7 okt. 2020 om 10:32 schreef Maile Halatuituia > <maile.halatuit...@tcc.to <mailto:maile.halatuit...@tcc.to>>: > Hi Geert > > I did have the same issue as yours but mine got fixed when I put my > management interface on the same network where my Doman Controller is. > > To be more clearer, my Domain IP is 10.0.1.x/24 and my PF Management > Interface is 10.0.1.y/24. After I made that changed , everything works just > fine. Hope it will help you. > > Maile. > > > From: Geert Heremans via PacketFence-users > <packetfence-users@lists.sourceforge.net > <mailto:packetfence-users@lists.sourceforge.net>> > Sent: Wednesday, 7 October 2020 9:59 AM > To: packetfence-users@lists.sourceforge.net > <mailto:packetfence-users@lists.sourceforge.net> > Cc: Geert Heremans <heremans.ge...@gmail.com > <mailto:heremans.ge...@gmail.com>> > Subject: [PacketFence-users] Cannot join domain using GUI - net ads join works > > > Hello everyone > > > I'm trying to get my PF10 server to join my domain. The PF hostname is hades > and my domain is sintcordula.be <http://sintcordula.be/>. > > > Trying to join from the gui false because no DC is found. > > > However when I try to join the server using the shell it works. The computer > account is created in the domain. > > > Failed to join domain: failed to find DC for domain SINTCORDULA - {Operation > Failed} The requested operation was unsuccessful. > > > net ads join -s /etc/samba/scis2.conf -U XXXX > Using short domain name -- SINTCORDULA > Joined 'HADES' to dns domain 'SINTCORDULA.BE <http://sintcordula.be/>' > No DNS domain configured for hades. Unable to perform DNS Update. > DNS update failed: NT_STATUS_INVALID_PARAMETER > > > Can anyone point me into the right direction for debugging? > > > Best Regards > > Geert > > > > Confidentiality Notice: > > This email (including any attachment) is intended for internal use only. Any > unauthorized use, dissemination or copying of the content is prohibited. If > you are not the intended recipient and have received this e-mail in error, > please notify the sender by email and delete this email and any attachment. > > Confidentiality Notice: > > This email (including any attachment) is intended for internal use only. Any > unauthorized use, dissemination or copying of the content is prohibited. If > you are not the intended recipient and have received this e-mail in error, > please notify the sender by email and delete this email and any attachment. > > > > > _______________________________________________ > PacketFence-users mailing list > PacketFence-users@lists.sourceforge.net > <mailto:PacketFence-users@lists.sourceforge.net> > https://lists.sourceforge.net/lists/listinfo/packetfence-users > <https://lists.sourceforge.net/lists/listinfo/packetfence-users> > -- > Fabrice Durand > fdur...@inverse.ca <mailto:fdur...@inverse.ca> :: +1.514.447.4918 (x135) :: > www.inverse.ca <http://www.inverse.ca/> > Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu > <http://www.sogo.nu/>) and PacketFence (http://packetfence.org > <http://packetfence.org/>) > _______________________________________________ > PacketFence-users mailing list > PacketFence-users@lists.sourceforge.net > <mailto:PacketFence-users@lists.sourceforge.net> > https://lists.sourceforge.net/lists/listinfo/packetfence-users > <https://lists.sourceforge.net/lists/listinfo/packetfence-users> > -- > Fabrice Durand > fdur...@inverse.ca <mailto:fdur...@inverse.ca> :: +1.514.447.4918 (x135) :: > www.inverse.ca <http://www.inverse.ca/> > Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu > <http://www.sogo.nu/>) and PacketFence (http://packetfence.org > <http://packetfence.org/>) > > > _______________________________________________ > PacketFence-users mailing list > PacketFence-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/packetfence-users > _______________________________________________ > PacketFence-users mailing list > PacketFence-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users