Ok, but I don't want the guests to be able to register and access the network, 
I just don't want them to access anything, I just want them to be in vlan2. I 
don't know these guests in advance, it could be someone outside the company who 
plugs their computer into a switch for example. I want them to enter vlan2, 
isolated.

Thank you very much for all your answers.



________________________________
De : Ludovic Zammit <lzam...@inverse.ca>
Envoyé : vendredi, 9 avril 2021 14:47
À : Heusler Marie-Cécile
Cc : packetfence-users@lists.sourceforge.net
Objet : Re: VLAN for rejected machine

The sources are displayed on the captive portal with the registration VLAN.

No registration VLAN, no captive portal, no guest registration.

If you want your guests to get connected on the network, you will need to 
import all the Mac address in PacketFence using a CSV import under Node. Yes 
they will use Mac authentication.

Thanks,

Ludovic Zammit
lzam...@inverse.ca<mailto:lzam...@inverse.ca> ::  +1.514.447.4918 (x145) ::  
www.inverse.ca<https://www.inverse.ca/>
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu<http://www.sogo.nu/>) 
and PacketFence (http://packetfence.org<http://packetfence.org/>)







On Apr 9, 2021, at 8:43 AM, Heusler Marie-Cécile 
<marie-cecile.heus...@divtec.ch<mailto:marie-cecile.heus...@divtec.ch>> wrote:


Thank you very much for these explanations.

As I understand, I still need to create an authentication source for guests 
using mac authentication, they are not automatically put in the registration 
VLAN if they are not authenticated with 802.1X


________________________________
De : Ludovic Zammit <lzam...@inverse.ca<mailto:lzam...@inverse.ca>>
Envoyé : vendredi, 9 avril 2021 14:34
À : Heusler Marie-Cécile
Cc : 
packetfence-users@lists.sourceforge.net<mailto:packetfence-users@lists.sourceforge.net>
Objet : Re: VLAN for rejected machine

Ok, let me show a basic workflow for Wireless and it work almost the same for 
wired authentication:

Here is the diagram showing the interaction between PacketFence, the endpoint, 
the AP and the WLAN controller:

<Mail Attachment.png>


  1.  User initiates association to WLAN AP and transmits MAC address.  If user 
accesses network via a registered device in PacketFence go to 8
  2.  The WLAN controller transmits MAC address via RADIUS to the PacketFence 
server to authenticate/authorize that MAC address on the AP
  3.  PacketFence server conducts address audit in its database.  If it does 
not recognize the MAC address go to 4. If it does go to 8.
  4.  PacketFence server directs WLAN controller via RADIUS (RFC2868 
attributes) to put the device in an "unauthenticated role“ (set of ACLs that 
would limit/redirect the user to the PacketFence captive portal for 
registration, or we can also use a registration VLAN in which PacketFence does 
DNS blackholing and is the DHCP server)
  5.  The user's device issues a DHCP/DNS request to PacketFence (which is a 
DHCP/DNS server on this VLAN or for this role) which sends the IP and DNS 
information.  At this point, ACLs are limiting/redirecting the user to the 
PacketFence's captive portal for authentication.  PacketFence fingerprints the 
device (user-agent attributes, DHCP information & MAC address patterns) to 
which it can take various actions including:  keep device on registration 
portal, direct to alternate captive portal, auto-register the device, 
auto-block the device, etc.    If the device remains on the registration portal 
the user registers by providing the information (username/password, cell phone 
number, etc.).  At this time PacketFence could also require the device to go 
through a posture assessment (using Nessus, OpenVAS, etc.)
  6.  If authentication is required (username/password) through a login form, 
those credentials are validated via the Directory server (or any other 
authentication sources - like LDAP, SQL, RADIUS, SMS, Facebook, Google+, etc.) 
which provides user attributes to PacketFence which creates user+device policy 
profile in its database.
  7.  PacketFence performs a Change of Authorization (RFC3576) on the 
controller and the user must be re-authenticated/reauthorized, so we go back to 
1
  8.  PacketFence server directs WLAN controller via RADIUS to put the device 
in an "authenticated role“, or in the "normal” VLAN

Then in a normal deployment you would have one secured SSID with 802.1x EAP 
PEAP and one open captive portal SSID using MAC authentication.

The secure SSID is to authenticate corporate device like domain join computer, 
users that own AD credentials. It require a configuration on the devices to 
instruct them to push or ask a username password or even a computer account.

The open SSID is to authenticate guest users on a captive portal using Mac 
authentication. You can use the VLAN enforcement to redirect then into a VLAN 
(Registration) that PacketFence manages 100% (most cases not routed, DHCP, DNS 
and gateway) or you can use the Web Authentication method if the equipment 
supports it. On that Guest portal, you can authenticate the guest with many 
different source of authentication, the most used are the Email registration 
and the SMS registration. You could mixte them up like Guest type (SMS + Email) 
+ Login type (AD).

You can’t mixte up the method of authentication on wireless.

Secure SSID = WPA2 Enterprise 802.1x EAP PEAP (or EAP TLS) without captive 
portal (Auto-registration)
Open SSID = Open no encryption RADIUS Mac authentication with a captive portal

On the wired, you can have 802.1x then Mac authentication configured on a 
switch port. The Mac authentication configured that way will engage most likely 
30 seconds after if the computer does not push a 802.1x identity. In that case 
that where you authenticate you guest wired. You should redirect them into the 
PF registration VLAN to show them the captive portal. In some cases, you want 
to have your Mac authentication users to be drop directly into a production 
VLAN without doing anything to give them directly access on the network for a 
roll out for example.

I hope it makes it clearer.

Thanks,

Ludovic Zammit
lzam...@inverse.ca<mailto:lzam...@inverse.ca> ::  +1.514.447.4918 (x145) ::  
www.inverse.ca<https://www.inverse.ca/>
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu<http://www.sogo.nu/>) 
and PacketFence (http://packetfence.org<http://packetfence.org/>)







On Apr 9, 2021, at 8:17 AM, Heusler Marie-Cécile 
<marie-cecile.heus...@divtec.ch<mailto:marie-cecile.heus...@divtec.ch>> wrote:


But which source should the non-domain items use?
vlan id2 is assigned to the registration role on the switch


<pastedImage.png>
<pastedImage.png>
<pastedImage.png>
<pastedImage.png>
<pastedImage.png>[cid:b24c089c-56cd-4b89-b7b9-d877d4e1f20e]











________________________________
De : Ludovic Zammit <lzam...@inverse.ca<mailto:lzam...@inverse.ca>>
Envoyé : vendredi, 9 avril 2021 13:53
À : Heusler Marie-Cécile
Cc : 
packetfence-users@lists.sourceforge.net<mailto:packetfence-users@lists.sourceforge.net>
Objet : Re: VLAN for rejected machine

Hello,

Show me the conf/authentication.conf

You are defiantly registering that device with source where the rule is not 
well configured.

On each rule, you need to return a Access Duration / Unregistration date and a 
Role.

The Role need to be configured with the VLAN ID on the switch config.

Thanks,

Ludovic Zammit
lzam...@inverse.ca<mailto:lzam...@inverse.ca> ::  +1.514.447.4918 (x145) ::  
www.inverse.ca<https://www.inverse.ca/>
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu<http://www.sogo.nu/>) 
and PacketFence (http://packetfence.org<http://packetfence.org/>)







On Apr 9, 2021, at 12:22 AM, Heusler Marie-Cécile 
<marie-cecile.heus...@divtec.ch<mailto:marie-cecile.heus...@divtec.ch>> wrote:

Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) INFO: 
[mac:2c:44:fd:65:ab:27] handling radius autz request: from switch_ip => 
(192.168.137.200), connection_type => Ethernet-NoEAP,switch_mac => 
(00:16:b9:0b:37:0d), mac => [2c:44:fd:65:ab:27], port => 19, username => 
"2c44fd65ab27" (pf::radius::authorize)
Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) INFO: 
[mac:2c:44:fd:65:ab:27] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) INFO: 
[mac:2c:44:fd:65:ab:27] Match rule Email-on-role (pf::access_filter::test)
Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) INFO: 
[mac:2c:44:fd:65:ab:27] Found authentication source(s) : 
'local,file1,MonDomaine' for realm 'null' 
(pf::config::util::filter_authentication_sources)
Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) WARN: 
[mac:2c:44:fd:65:ab:27] No category computed for autoreg 
(pf::role::getNodeInfoForAutoReg)
Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) WARN: 
[mac:2c:44:fd:65:ab:27] No role specified or found for pid 2c44fd65ab27 (MAC 
2c:44:fd:65:ab:27); assume maximum number of registered nodes is reached 
(pf::node::is_max_reg_nodes_reached)
Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) ERROR: 
[mac:2c:44:fd:65:ab:27] no role computed by any sources - registration of 
2c:44:fd:65:ab:27 to 2c44fd65ab27 failed 
(pf::registration::setup_node_for_registration)
Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) ERROR: 
[mac:2c:44:fd:65:ab:27] auto-registration of node failed no role computed by 
any sources (pf::radius::authorize)
Apr 9 06:21:21 TPI-PF1 packetfence_httpd.webservices: httpd.webservices(1907) 
WARN: [mac:2c:44:fd:65:ab:27] Unable to pull accounting history for device 
2c:44:fd:65:ab:27. The history set doesn't exist yet. 
(pf::accounting_events_history::latest_mac_history)


________________________________
De : Ludovic Zammit <lzam...@inverse.ca<mailto:lzam...@inverse.ca>>
Envoyé : jeudi, 8 avril 2021 18:32
À : Heusler Marie-Cécile
Cc : 
packetfence-users@lists.sourceforge.net<mailto:packetfence-users@lists.sourceforge.net>
Objet : Re: VLAN for rejected machine

Unregister your device and give the output of:

grep 2c:44:fd:65:ab:27 /usr/local/pf/logs/packetfence.log

Thanks,

Ludovic Zammit
lzam...@inverse.ca<mailto:lzam...@inverse.ca> ::  +1.514.447.4918 (x145) ::  
www.inverse.ca<https://www.inverse.ca/>
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu<http://www.sogo.nu/>) 
and PacketFence (http://packetfence.org<http://packetfence.org/>)







On Apr 8, 2021, at 12:03 PM, Heusler Marie-Cécile 
<marie-cecile.heus...@divtec.ch<mailto:marie-cecile.heus...@divtec.ch>> wrote:


So it's weird, because here are my logs when I connect an off-domain machine :

Apr 8 18:02:06 TPI-PF1 auth[1993]: [mac:2c:44:fd:65:ab:27] Rejected user: 
2c44fd65ab27
Apr 8 18:02:06 TPI-PF1 auth[1993]: (3098) Rejected in post-auth: [2c44fd65ab27] 
(from client 192.168.137.200/32 port 19 cli 2c:44:fd:65:ab:27)
Apr 8 18:02:06 TPI-PF1 auth[1993]: (3098) Incorrect login: [2c44fd65ab27] (from 
client 192.168.137.200/32 port 19 cli 2c:44:fd:65:ab:27)
Apr 8 18:02:06 TPI-PF1 auth[1993]: [mac:2c:44:fd:65:ab:27] Rejected user: 
2c44fd65ab27
Apr 8 18:02:06 TPI-PF1 auth[1993]: (3098) Rejected in post-auth: [2c44fd65ab27] 
(from client 192.168.137.200/32 port 19 cli 2c:44:fd:65:ab:27)
Apr 8 18:02:06 TPI-PF1 auth[1993]: (3098) Incorrect login: [2c44fd65ab27] (from 
client 192.168.137.200/32 port 19 cli 2c:44:fd:65:ab:27)

And I get the message 'no role computed by any source


However, if I create a 'null' source and create a profile with the filter 
"ethernet no-eap" and my null source, it works.



________________________________
De : Ludovic Zammit <lzam...@inverse.ca<mailto:lzam...@inverse.ca>>
Envoyé : jeudi, 8 avril 2021 17:56
À : Heusler Marie-Cécile
Cc : 
packetfence-users@lists.sourceforge.net<mailto:packetfence-users@lists.sourceforge.net>
Objet : Re: VLAN for rejected machine

No, it’s a default behavior, they will be put in VLAN 2 if they are 
unregistered.

Thanks,

Ludovic Zammit
lzam...@inverse.ca<mailto:lzam...@inverse.ca> ::  +1.514.447.4918 (x145) ::  
www.inverse.ca<https://www.inverse.ca/>
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu<http://www.sogo.nu/>) 
and PacketFence (http://packetfence.org<http://packetfence.org/>)







On Apr 8, 2021, at 10:25 AM, Heusler Marie-Cécile 
<marie-cecile.heus...@divtec.ch<mailto:marie-cecile.heus...@divtec.ch>> wrote:

That's what I did, but do I have to create a specific source for that, and a 
profile ?
________________________________
De : Ludovic Zammit <lzam...@inverse.ca<mailto:lzam...@inverse.ca>>
Envoyé : jeudi, 8 avril 2021 16:11:59
À : Heusler Marie-Cécile
Cc : 
packetfence-users@lists.sourceforge.net<mailto:packetfence-users@lists.sourceforge.net>
Objet : Re: VLAN for rejected machine

Ok so put VLAN 2 as the registration VLAN in your switch configuration under 
Configuration > Policies and Access Control > Switches > Switch IP > Roles > 
Registration -> 2

Thanks,

Ludovic Zammit
lzam...@inverse.ca<mailto:lzam...@inverse.ca> ::  +1.514.447.4918 (x145) ::  
www.inverse.ca<https://www.inverse.ca/>
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu<http://www.sogo.nu/>) 
and PacketFence (http://packetfence.org<http://packetfence.org/>)







On Apr 8, 2021, at 9:48 AM, Heusler Marie-Cécile 
<marie-cecile.heus...@divtec.ch<mailto:marie-cecile.heus...@divtec.ch>> wrote:

Not really. I just want that devices who don't match with my AD source go to 
the VLAN2 and can do nothing.


________________________________

De : Ludovic Zammit <lzam...@inverse.ca<mailto:lzam...@inverse.ca>>
Envoyé : jeudi, 8 avril 2021 15:29
À : Heusler Marie-Cécile
Cc : 
packetfence-users@lists.sourceforge.net<mailto:packetfence-users@lists.sourceforge.net>
Objet : Re: VLAN for rejected machine

Is this the registration VLAN ?

Thanks,

Ludovic Zammit
lzam...@inverse.ca<mailto:lzam...@inverse.ca> ::  +1.514.447.4918 (x145) ::  
www.inverse.ca<https://www.inverse.ca/>
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu<http://www.sogo.nu/>) 
and PacketFence (http://packetfence.org<http://packetfence.org/>)







On Apr 8, 2021, at 8:12 AM, Heusler Marie-Cécile 
<marie-cecile.heus...@divtec.ch<mailto:marie-cecile.heus...@divtec.ch>> wrote:

For the time being, VLAN2 simply serves as an isolation VLAN. The workstations 
should not access anything from this VLAN.


________________________________
De : Ludovic Zammit <lzam...@inverse.ca<mailto:lzam...@inverse.ca>>
Envoyé : jeudi, 8 avril 2021 13:33
À : Heusler Marie-Cécile
Cc : 
packetfence-users@lists.sourceforge.net<mailto:packetfence-users@lists.sourceforge.net>
Objet : Re: VLAN for rejected machine

What’s the VLAN 2 and his purpose?

Thanks,

Ludovic Zammit
lzam...@inverse.ca<mailto:lzam...@inverse.ca> ::  +1.514.447.4918 (x145) ::  
www.inverse.ca<https://www.inverse.ca/>
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu<http://www.sogo.nu/>) 
and PacketFence (http://packetfence.org<http://packetfence.org/>)







On Apr 8, 2021, at 1:38 AM, Heusler Marie-Cécile 
<marie-cecile.heus...@divtec.ch<mailto:marie-cecile.heus...@divtec.ch>> wrote:


The devices are, for example, laptops that are not part of the domain. I want 
them to enter VLAN2, but I don't know them in advance.

Where do I specify that I want them to be in VLAN2, without their login failing 
with my AD source?

What I've tried to do so far is to create a second Authorization source, and a 
new profile that uses that source. I don't know if this is correct.


<pastedImage.png>


<pastedImage.png>



Thanks

________________________________
De : Ludovic Zammit <lzam...@inverse.ca<mailto:lzam...@inverse.ca>>
Envoyé : mercredi, 7 avril 2021 13:53:40
À : Heusler Marie-Cécile
Cc : 
packetfence-users@lists.sourceforge.net<mailto:packetfence-users@lists.sourceforge.net>
Objet : Re: VLAN for rejected machine

With Mac authentication, you will need to pre-import your Mac address if you 
know them, create a VLAN filter that automatically a MAC OUI for example or you 
redirect the on the captive portal to give them an option to register 
themselves.

In your case, if you don’t know them, you return a VLAN 2 (don’t forget to 
return VLAN 2 in the registration role in the switch configuration) and they 
will never get a role and registered. They will end up having access on VLAN 2.

What are those devices ?

Thanks,

Ludovic Zammit
lzam...@inverse.ca<mailto:lzam...@inverse.ca> ::  +1.514.447.4918 (x145) ::  
www.inverse.ca<https://www.inverse.ca/>
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu<http://www.sogo.nu/>) 
and PacketFence (http://packetfence.org<http://packetfence.org/>)







On Apr 7, 2021, at 1:25 AM, Heusler Marie-Cécile 
<marie-cecile.heus...@divtec.ch<mailto:marie-cecile.heus...@divtec.ch>> wrote:


Ok, I enabled mac authentication, but now here are my radius logs once I 
connect the node to the switch:


Apr 7 07:19:51 TPI-PF1 auth[1944]: Adding client 192.168.137.200/32
Apr 7 07:19:51 TPI-PF1 auth[1944]: [mac:98:e7:f4:14:44:f0] Accepted user: and 
returned VLAN
Apr 7 07:19:51 TPI-PF1 auth[1944]: (3879) Login OK: [98e7f41444f0] (from client 
192.168.137.200/32 port 19 cli 98:e7:f4:14:44:f0)

Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: 
[mac:98:e7:f4:14:44:f0] handling radius autz request: from switch_ip => 
(192.168.137.200), connection_type => Ethernet-NoEAP,switch_mac => 
(00:16:b9:0b:37:0d), mac => [98:e7:f4:14:44:f0], port => 19, username => 
"98e7f41444f0" (pf::radius::authorize)
Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: 
[mac:98:e7:f4:14:44:f0] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: 
[mac:98:e7:f4:14:44:f0] Match rule Email-on-role (pf::access_filter::test)
Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: 
[mac:98:e7:f4:14:44:f0] Found authentication source(s) : 
'local,file1,MonDomaine' for realm 'null' 
(pf::config::util::filter_authentication_sources)
Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) WARN: 
[mac:98:e7:f4:14:44:f0] No category computed for autoreg 
(pf::role::getNodeInfoForAutoReg)
Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: 
[mac:98:e7:f4:14:44:f0] Match rule Email-on-role (pf::access_filter::test)
Apr 7 07:19:51 TPI-PF1 packetfence_httpd.webservices: httpd.webservices(1790) 
WARN: [mac:98:e7:f4:14:44:f0] Unable to pull accounting history for device 
98:e7:f4:14:44:f0. The history set doesn't exist yet. 
(pf::accounting_events_history::latest_mac_history)
Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: 
[mac:98:e7:f4:14:44:f0] Found authentication source(s) : 
'local,file1,MonDomaine' for realm 'null' 
(pf::config::util::filter_authentication_sources)
Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: 
[mac:98:e7:f4:14:44:f0] Connection type is MAC-AUTH. Getting role from 
node_info (pf::role::getRegisteredRole)
Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) WARN: 
[mac:98:e7:f4:14:44:f0] Use of uninitialized value $role in concatenation (.) 
or string at /usr/local/pf/lib/pf/role.pm line 489.
(pf::role::getRegisteredRole)
Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: 
[mac:98:e7:f4:14:44:f0] Username was NOT defined or unable to match a role - 
returning node based role '' (pf::role::getRegisteredRole)



I tried to create a new connection profile, but the result is the same.

Any ideas?

Thanks


________________________________
De : Ludovic Zammit <lzam...@inverse.ca<mailto:lzam...@inverse.ca>>
Envoyé : mardi, 6 avril 2021 19:48
À : Heusler Marie-Cécile
Cc : 
packetfence-users@lists.sourceforge.net<mailto:packetfence-users@lists.sourceforge.net>
Objet : Re: VLAN for rejected machine

You can’t because if those not joined machines connect over 802.1x they will 
fail and stay there.

What you want to do is 802.1x + Mac authentication bypass (MAB) on the switch 
port.

A none corporate machine should do MAB and land on the captive portal and 
authenticate. If you want to skip that part, you can put VLAN ID 2 in the 
registration role on the switch so everyone that do Mac authentication would be 
redirected on VLAN 2.

Thanks,

Ludovic Zammit
lzam...@inverse.ca<mailto:lzam...@inverse.ca> ::  +1.514.447.4918 (x145) ::  
www.inverse.ca<https://www.inverse.ca/>
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu<http://www.sogo.nu/>) 
and PacketFence (http://packetfence.org<http://packetfence.org/>)







On Apr 6, 2021, at 1:33 PM, Heusler Marie-Cécile 
<marie-cecile.heus...@divtec.ch<mailto:marie-cecile.heus...@divtec.ch>> wrote:

Hello

I have an authentication source that gives the role VLAN1 to the corporate 
machines.


<pastedImage.png>

<pastedImage.png>


Now I want to give to the non-corporate machines the role VLAN2. However, I 
can't assign a role to a node that can't login to the source.


Adding client 10.104.92.130/32
Apr 6 19:11:06 packetfence auth[19459]: (195) chrooted_mschap_machine: ERROR: 
Program returned code (1) and output 'Logon failure (0xc000006d)'
Apr 6 19:11:06 packetfence auth[19459]: (195) Login incorrect 
(chrooted_mschap_machine: Program returned code (1) and output 'Logon failure 
(0xc000006d)'): [host/client.tpi.local] (from client 10.104.92.130/32 port 21 
cli 2c:44:fd:65:ab:27 via TLS tunnel)
Apr 6 19:11:06 packetfence auth[19459]: [mac:2c:44:fd:65:ab:27] Rejected user: 
host/client.tpi.local
Apr 6 19:11:06 packetfence auth[19459]: (196) Login incorrect (eap_peap: The 
users session was previously rejected: returning reject (again.)): 
[host/client.tpi.local] (from client 10.104.92.130/32 port 21 cli 
2c:44:fd:65:ab:27)


A client that are not in the domain will have a login incorrect. But how can I 
say that every client out of the domain will move to the VLAN2 role ?


Thank you for your reply.

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to