Hello Robert,

it's more a vlan filter that you have to do.

[RejectUnauthorizedRoleMAB]
run_actions=enabled
status=enabled
top_op=and
description=RejectUnauthorizedRoleMAB
scopes=RegisteredRole
role=REJECT
condition=connection_type == "Ethernet-NoEAP" && !((node_info.category == "gaming" || node_info.category == "guest"))

Regards

Fabrice


Le 21-02-09 à 17 h 00, Robert McNutt via PacketFence-users a écrit :
Still struggling with this logic which I think should be simple.

We're trying to setup a radius filter to only allow MAB for devices with a specific role... for example IP phones and Printers. We have an issue where Macintoshes and Some PC's just default to MAB and they get access to their trusted VLAN. This seem to defeat the purpose of NAC but it seems like there should be a way to only allow 802.1X for some devices and only MAB for others.

Has anyone else run into this or have any ideas to not fall back to MAB for some devices?
Robert McNutt


On Thu, Apr 23, 2020 at 7:55 AM Ludovic Zammit <[email protected] <mailto:[email protected]>> wrote:

    Hello Robert,

    A fix has been done yesterday regarding the connection type:

    
https://github.com/inverse-inc/packetfence/commit/176c6d6df606cff86a83c9cf93a571c44dd52da0

    Apply the maintenance branche and check if it fixes it.

    /usr/local/pf/addons/pf-maint.pl <http://pf-maint.pl>

    Thanks,

    Ludovic Zammit
    [email protected]  <mailto:[email protected]>  ::  +1.514.447.4918 (x145) 
::www.inverse.ca  <http://www.inverse.ca>
    Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org)





    On Apr 22, 2020, at 3:58 PM, Robert McNutt via PacketFence-users
    <[email protected]
    <mailto:[email protected]>> wrote:

    I'm trying to set a radius filter to block mac auth for any
    devices assigned to roles that should only auth via PEAP or
    EAP-TLS...

    For example, if a port has a phone and computer plugged in, the
    phone will do mac auth but the computer should never get a radius
    accept for mac auth... whats happening by default is if a
    computer fails dot1x auth it then falls back to mac auth and PF
    accepts it because the node was registered... this is what I'm
    trying to prevent...

    I set up a radius filter as such:

    connection_type == "Ethernet-NoEAP" && (node_info.category ==
    "CORP-LAN" || node_info.category == "ADMIN-LAN")

    It never matches... But if I change the logic to be NOT
    Ethernet-EAP, everything matches, EAP and not EAP... it seems as
    if the connection_type isn't actually being read by the filter
    parsing... Am I missing something?


    Robert McNutt
    _______________________________________________
    PacketFence-users mailing list
    [email protected]
    <mailto:[email protected]>
    https://lists.sourceforge.net/lists/listinfo/packetfence-users



_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to