Send your conf/profiles.conf Thanks,
Ludovic Zammit lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 (x145) :: www.inverse.ca <https://www.inverse.ca/> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu <http://www.sogo.nu/>) and PacketFence (http://packetfence.org <http://packetfence.org/>) > On Apr 9, 2021, at 9:41 AM, Heusler Marie-Cécile > <marie-cecile.heus...@divtec.ch> wrote: > > Ok but as you have seen here, here are the logs I have. The node does not get > the registration role : > > > > > > >>>>> Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) INFO: >>>>> [mac:2c:44:fd:65:ab:27] handling radius autz request: from switch_ip => >>>>> (192.168.137.200), connection_type => Ethernet-NoEAP,switch_mac => >>>>> (00:16:b9:0b:37:0d), mac => [2c:44:fd:65:ab:27], port => 19, username => >>>>> "2c44fd65ab27" (pf::radius::authorize) >>>>> Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) INFO: >>>>> [mac:2c:44:fd:65:ab:27] Instantiate profile default >>>>> (pf::Connection::ProfileFactory::_from_profile) >>>>> Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) INFO: >>>>> [mac:2c:44:fd:65:ab:27] Match rule Email-on-role (pf::access_filter::test) >>>>> Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) INFO: >>>>> [mac:2c:44:fd:65:ab:27] Found authentication source(s) : >>>>> 'local,file1,MonDomaine' for realm 'null' >>>>> (pf::config::util::filter_authentication_sources) >>>>> Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) WARN: >>>>> [mac:2c:44:fd:65:ab:27] No category computed for autoreg >>>>> (pf::role::getNodeInfoForAutoReg) >>>>> Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) WARN: >>>>> [mac:2c:44:fd:65:ab:27] No role specified or found for pid 2c44fd65ab27 >>>>> (MAC 2c:44:fd:65:ab:27); assume maximum number of registered nodes is >>>>> reached (pf::node::is_max_reg_nodes_reached) >>>>> Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) ERROR: >>>>> [mac:2c:44:fd:65:ab:27] no role computed by any sources - registration of >>>>> 2c:44:fd:65:ab:27 to 2c44fd65ab27 failed >>>>> (pf::registration::setup_node_for_registration) >>>>> Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) ERROR: >>>>> [mac:2c:44:fd:65:ab:27] auto-registration of node failed no role computed >>>>> by any sources (pf::radius::authorize) >>>>> Apr 9 06:21:21 TPI-PF1 packetfence_httpd.webservices: >>>>> httpd.webservices(1907) WARN: [mac:2c:44:fd:65:ab:27] Unable to pull >>>>> accounting history for device 2c:44:fd:65:ab:27. The history set doesn't >>>>> exist yet. (pf::accounting_events_history::latest_mac_history) > > > > > > > > > > De : Ludovic Zammit <lzam...@inverse.ca <mailto:lzam...@inverse.ca>> > Envoyé : vendredi, 9 avril 2021 15:39 > À : Heusler Marie-Cécile > Cc : packetfence-users@lists.sourceforge.net > <mailto:packetfence-users@lists.sourceforge.net> > Objet : Re: VLAN for rejected machine > > Set the VLAN 2 for the registration and it would do what you want. > > > Thanks, > > Ludovic Zammit > lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 (x145) :: > www.inverse.ca <https://www.inverse.ca/> > Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu > <http://www.sogo.nu/>) and PacketFence (http://packetfence.org > <http://packetfence.org/>) > > > > > > > >> On Apr 9, 2021, at 8:50 AM, Heusler Marie-Cécile >> <marie-cecile.heus...@divtec.ch <mailto:marie-cecile.heus...@divtec.ch>> >> wrote: >> >> Ok, but I don't want the guests to be able to register and access the >> network, I just don't want them to access anything, I just want them to be >> in vlan2. I don't know these guests in advance, it could be someone outside >> the company who plugs their computer into a switch for example. I want them >> to enter vlan2, isolated. >> >> Thank you very much for all your answers. >> >> >> >> De : Ludovic Zammit <lzam...@inverse.ca <mailto:lzam...@inverse.ca>> >> Envoyé : vendredi, 9 avril 2021 14:47 >> À : Heusler Marie-Cécile >> Cc : packetfence-users@lists.sourceforge.net >> <mailto:packetfence-users@lists.sourceforge.net> >> Objet : Re: VLAN for rejected machine >> >> The sources are displayed on the captive portal with the registration VLAN. >> >> No registration VLAN, no captive portal, no guest registration. >> >> If you want your guests to get connected on the network, you will need to >> import all the Mac address in PacketFence using a CSV import under Node. Yes >> they will use Mac authentication. >> >> Thanks, >> >> Ludovic Zammit >> lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 (x145) :: >> www.inverse.ca <https://www.inverse.ca/> >> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >> <http://packetfence.org/>) >> >> >> >> >> >> >> >>> On Apr 9, 2021, at 8:43 AM, Heusler Marie-Cécile >>> <marie-cecile.heus...@divtec.ch <mailto:marie-cecile.heus...@divtec.ch>> >>> wrote: >>> >>> >>> Thank you very much for these explanations. >>> >>> As I understand, I still need to create an authentication source for guests >>> using mac authentication, they are not automatically put in the >>> registration VLAN if they are not authenticated with 802.1X >>> >>> >>> De : Ludovic Zammit <lzam...@inverse.ca <mailto:lzam...@inverse.ca>> >>> Envoyé : vendredi, 9 avril 2021 14:34 >>> À : Heusler Marie-Cécile >>> Cc : packetfence-users@lists.sourceforge.net >>> <mailto:packetfence-users@lists.sourceforge.net> >>> Objet : Re: VLAN for rejected machine >>> >>> Ok, let me show a basic workflow for Wireless and it work almost the same >>> for wired authentication: >>> >>> Here is the diagram showing the interaction between PacketFence, the >>> endpoint, the AP and the WLAN controller: >>> >>> <Mail Attachment.png> >>> >>> User initiates association to WLAN AP and transmits MAC address. If user >>> accesses network via a registered device in PacketFence go to 8 >>> The WLAN controller transmits MAC address via RADIUS to the PacketFence >>> server to authenticate/authorize that MAC address on the AP >>> PacketFence server conducts address audit in its database. If it does not >>> recognize the MAC address go to 4. If it does go to 8. >>> PacketFence server directs WLAN controller via RADIUS (RFC2868 attributes) >>> to put the device in an "unauthenticated role“ (set of ACLs that would >>> limit/redirect the user to the PacketFence captive portal for registration, >>> or we can also use a registration VLAN in which PacketFence does DNS >>> blackholing and is the DHCP server) >>> The user's device issues a DHCP/DNS request to PacketFence (which is a >>> DHCP/DNS server on this VLAN or for this role) which sends the IP and DNS >>> information. At this point, ACLs are limiting/redirecting the user to the >>> PacketFence's captive portal for authentication. PacketFence fingerprints >>> the device (user-agent attributes, DHCP information & MAC address patterns) >>> to which it can take various actions including: keep device on >>> registration portal, direct to alternate captive portal, auto-register the >>> device, auto-block the device, etc. If the device remains on the >>> registration portal the user registers by providing the information >>> (username/password, cell phone number, etc.). At this time PacketFence >>> could also require the device to go through a posture assessment (using >>> Nessus, OpenVAS, etc.) >>> If authentication is required (username/password) through a login form, >>> those credentials are validated via the Directory server (or any other >>> authentication sources - like LDAP, SQL, RADIUS, SMS, Facebook, Google+, >>> etc.) which provides user attributes to PacketFence which creates >>> user+device policy profile in its database. >>> PacketFence performs a Change of Authorization (RFC3576) on the controller >>> and the user must be re-authenticated/reauthorized, so we go back to 1 >>> PacketFence server directs WLAN controller via RADIUS to put the device in >>> an "authenticated role“, or in the "normal” VLAN >>> >>> Then in a normal deployment you would have one secured SSID with 802.1x EAP >>> PEAP and one open captive portal SSID using MAC authentication. >>> >>> The secure SSID is to authenticate corporate device like domain join >>> computer, users that own AD credentials. It require a configuration on the >>> devices to instruct them to push or ask a username password or even a >>> computer account. >>> >>> The open SSID is to authenticate guest users on a captive portal using Mac >>> authentication. You can use the VLAN enforcement to redirect then into a >>> VLAN (Registration) that PacketFence manages 100% (most cases not routed, >>> DHCP, DNS and gateway) or you can use the Web Authentication method if the >>> equipment supports it. On that Guest portal, you can authenticate the guest >>> with many different source of authentication, the most used are the Email >>> registration and the SMS registration. You could mixte them up like Guest >>> type (SMS + Email) + Login type (AD). >>> >>> You can’t mixte up the method of authentication on wireless. >>> >>> Secure SSID = WPA2 Enterprise 802.1x EAP PEAP (or EAP TLS) without captive >>> portal (Auto-registration) >>> Open SSID = Open no encryption RADIUS Mac authentication with a captive >>> portal >>> >>> On the wired, you can have 802.1x then Mac authentication configured on a >>> switch port. The Mac authentication configured that way will engage most >>> likely 30 seconds after if the computer does not push a 802.1x identity. In >>> that case that where you authenticate you guest wired. You should redirect >>> them into the PF registration VLAN to show them the captive portal. In some >>> cases, you want to have your Mac authentication users to be drop directly >>> into a production VLAN without doing anything to give them directly access >>> on the network for a roll out for example. >>> >>> I hope it makes it clearer. >>> >>> Thanks, >>> >>> Ludovic Zammit >>> lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 (x145) >>> :: www.inverse.ca <https://www.inverse.ca/> >>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >>> <http://packetfence.org/>) >>> >>> >>> >>> >>> >>> >>> >>>> On Apr 9, 2021, at 8:17 AM, Heusler Marie-Cécile >>>> <marie-cecile.heus...@divtec.ch <mailto:marie-cecile.heus...@divtec.ch>> >>>> wrote: >>>> >>>> >>>> But which source should the non-domain items use? >>>> vlan id2 is assigned to the registration role on the switch >>>> >>>> >>>> <pastedImage.png> >>>> <pastedImage.png> >>>> <pastedImage.png> >>>> <pastedImage.png> >>>> <pastedImage.png> >>>> >>>> >>>> >>>> >>>> >>>> >>>> >>>> >>>> >>>> >>>> >>>> De : Ludovic Zammit <lzam...@inverse.ca <mailto:lzam...@inverse.ca>> >>>> Envoyé : vendredi, 9 avril 2021 13:53 >>>> À : Heusler Marie-Cécile >>>> Cc : packetfence-users@lists.sourceforge.net >>>> <mailto:packetfence-users@lists.sourceforge.net> >>>> Objet : Re: VLAN for rejected machine >>>> >>>> Hello, >>>> >>>> Show me the conf/authentication.conf >>>> >>>> You are defiantly registering that device with source where the rule is >>>> not well configured. >>>> >>>> On each rule, you need to return a Access Duration / Unregistration date >>>> and a Role. >>>> >>>> The Role need to be configured with the VLAN ID on the switch config. >>>> >>>> Thanks, >>>> >>>> Ludovic Zammit >>>> lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 (x145) >>>> :: www.inverse.ca <https://www.inverse.ca/> >>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >>>> <http://packetfence.org/>) >>>> >>>> >>>> >>>> >>>> >>>> >>>> >>>>> On Apr 9, 2021, at 12:22 AM, Heusler Marie-Cécile >>>>> <marie-cecile.heus...@divtec.ch <mailto:marie-cecile.heus...@divtec.ch>> >>>>> wrote: >>>>> >>>>> Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) INFO: >>>>> [mac:2c:44:fd:65:ab:27] handling radius autz request: from switch_ip => >>>>> (192.168.137.200), connection_type => Ethernet-NoEAP,switch_mac => >>>>> (00:16:b9:0b:37:0d), mac => [2c:44:fd:65:ab:27], port => 19, username => >>>>> "2c44fd65ab27" (pf::radius::authorize) >>>>> Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) INFO: >>>>> [mac:2c:44:fd:65:ab:27] Instantiate profile default >>>>> (pf::Connection::ProfileFactory::_from_profile) >>>>> Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) INFO: >>>>> [mac:2c:44:fd:65:ab:27] Match rule Email-on-role (pf::access_filter::test) >>>>> Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) INFO: >>>>> [mac:2c:44:fd:65:ab:27] Found authentication source(s) : >>>>> 'local,file1,MonDomaine' for realm 'null' >>>>> (pf::config::util::filter_authentication_sources) >>>>> Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) WARN: >>>>> [mac:2c:44:fd:65:ab:27] No category computed for autoreg >>>>> (pf::role::getNodeInfoForAutoReg) >>>>> Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) WARN: >>>>> [mac:2c:44:fd:65:ab:27] No role specified or found for pid 2c44fd65ab27 >>>>> (MAC 2c:44:fd:65:ab:27); assume maximum number of registered nodes is >>>>> reached (pf::node::is_max_reg_nodes_reached) >>>>> Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) ERROR: >>>>> [mac:2c:44:fd:65:ab:27] no role computed by any sources - registration of >>>>> 2c:44:fd:65:ab:27 to 2c44fd65ab27 failed >>>>> (pf::registration::setup_node_for_registration) >>>>> Apr 9 06:21:21 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1235) ERROR: >>>>> [mac:2c:44:fd:65:ab:27] auto-registration of node failed no role computed >>>>> by any sources (pf::radius::authorize) >>>>> Apr 9 06:21:21 TPI-PF1 packetfence_httpd.webservices: >>>>> httpd.webservices(1907) WARN: [mac:2c:44:fd:65:ab:27] Unable to pull >>>>> accounting history for device 2c:44:fd:65:ab:27. The history set doesn't >>>>> exist yet. (pf::accounting_events_history::latest_mac_history) >>>>> >>>>> >>>>> De : Ludovic Zammit <lzam...@inverse.ca <mailto:lzam...@inverse.ca>> >>>>> Envoyé : jeudi, 8 avril 2021 18:32 >>>>> À : Heusler Marie-Cécile >>>>> Cc : packetfence-users@lists.sourceforge.net >>>>> <mailto:packetfence-users@lists.sourceforge.net> >>>>> Objet : Re: VLAN for rejected machine >>>>> >>>>> Unregister your device and give the output of: >>>>> >>>>> grep 2c:44:fd:65:ab:27 /usr/local/pf/logs/packetfence.log >>>>> >>>>> Thanks, >>>>> >>>>> Ludovic Zammit >>>>> lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 (x145) >>>>> :: www.inverse.ca <https://www.inverse.ca/> >>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>>>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >>>>> <http://packetfence.org/>) >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>>> On Apr 8, 2021, at 12:03 PM, Heusler Marie-Cécile >>>>>> <marie-cecile.heus...@divtec.ch <mailto:marie-cecile.heus...@divtec.ch>> >>>>>> wrote: >>>>>> >>>>>> So it's weird, because here are my logs when I connect an off-domain >>>>>> machine : >>>>>> >>>>>> Apr 8 18:02:06 TPI-PF1 auth[1993]: [mac:2c:44:fd:65:ab:27] Rejected >>>>>> user: 2c44fd65ab27 >>>>>> Apr 8 18:02:06 TPI-PF1 auth[1993]: (3098) Rejected in post-auth: >>>>>> [2c44fd65ab27] (from client 192.168.137.200/32 port 19 cli >>>>>> 2c:44:fd:65:ab:27) >>>>>> Apr 8 18:02:06 TPI-PF1 auth[1993]: (3098) Incorrect login: >>>>>> [2c44fd65ab27] (from client 192.168.137.200/32 port 19 cli >>>>>> 2c:44:fd:65:ab:27) >>>>>> Apr 8 18:02:06 TPI-PF1 auth[1993]: [mac:2c:44:fd:65:ab:27] Rejected >>>>>> user: 2c44fd65ab27 >>>>>> Apr 8 18:02:06 TPI-PF1 auth[1993]: (3098) Rejected in post-auth: >>>>>> [2c44fd65ab27] (from client 192.168.137.200/32 port 19 cli >>>>>> 2c:44:fd:65:ab:27) >>>>>> Apr 8 18:02:06 TPI-PF1 auth[1993]: (3098) Incorrect login: >>>>>> [2c44fd65ab27] (from client 192.168.137.200/32 port 19 cli >>>>>> 2c:44:fd:65:ab:27) >>>>>> >>>>>> And I get the message 'no role computed by any source >>>>>> >>>>>> >>>>>> However, if I create a 'null' source and create a profile with the >>>>>> filter "ethernet no-eap" and my null source, it works. >>>>>> >>>>>> >>>>>> >>>>>> De : Ludovic Zammit <lzam...@inverse.ca <mailto:lzam...@inverse.ca>> >>>>>> Envoyé : jeudi, 8 avril 2021 17:56 >>>>>> À : Heusler Marie-Cécile >>>>>> Cc : packetfence-users@lists.sourceforge.net >>>>>> <mailto:packetfence-users@lists.sourceforge.net> >>>>>> Objet : Re: VLAN for rejected machine >>>>>> >>>>>> No, it’s a default behavior, they will be put in VLAN 2 if they are >>>>>> unregistered. >>>>>> >>>>>> Thanks, >>>>>> >>>>>> Ludovic Zammit >>>>>> lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 >>>>>> (x145) :: www.inverse.ca <https://www.inverse.ca/> >>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>>>>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >>>>>> <http://packetfence.org/>) >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>>> On Apr 8, 2021, at 10:25 AM, Heusler Marie-Cécile >>>>>>> <marie-cecile.heus...@divtec.ch >>>>>>> <mailto:marie-cecile.heus...@divtec.ch>> wrote: >>>>>>> >>>>>>> That's what I did, but do I have to create a specific source for that, >>>>>>> and a profile ? >>>>>>> De : Ludovic Zammit <lzam...@inverse.ca <mailto:lzam...@inverse.ca>> >>>>>>> Envoyé : jeudi, 8 avril 2021 16:11:59 >>>>>>> À : Heusler Marie-Cécile >>>>>>> Cc : packetfence-users@lists.sourceforge.net >>>>>>> <mailto:packetfence-users@lists.sourceforge.net> >>>>>>> Objet : Re: VLAN for rejected machine >>>>>>> >>>>>>> Ok so put VLAN 2 as the registration VLAN in your switch configuration >>>>>>> under Configuration > Policies and Access Control > Switches > Switch >>>>>>> IP > Roles > Registration -> 2 >>>>>>> >>>>>>> Thanks, >>>>>>> >>>>>>> Ludovic Zammit >>>>>>> lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 >>>>>>> (x145) :: www.inverse.ca <https://www.inverse.ca/> >>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>>>>>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >>>>>>> <http://packetfence.org/>) >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>>> On Apr 8, 2021, at 9:48 AM, Heusler Marie-Cécile >>>>>>>> <marie-cecile.heus...@divtec.ch >>>>>>>> <mailto:marie-cecile.heus...@divtec.ch>> wrote: >>>>>>>> >>>>>>>> Not really. I just want that devices who don't match with my AD source >>>>>>>> go to the VLAN2 and can do nothing. >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> De : Ludovic Zammit <lzam...@inverse.ca <mailto:lzam...@inverse.ca>> >>>>>>>> Envoyé : jeudi, 8 avril 2021 15:29 >>>>>>>> À : Heusler Marie-Cécile >>>>>>>> Cc : packetfence-users@lists.sourceforge.net >>>>>>>> <mailto:packetfence-users@lists.sourceforge.net> >>>>>>>> Objet : Re: VLAN for rejected machine >>>>>>>> >>>>>>>> Is this the registration VLAN ? >>>>>>>> >>>>>>>> Thanks, >>>>>>>> >>>>>>>> Ludovic Zammit >>>>>>>> lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 >>>>>>>> (x145) :: www.inverse.ca <https://www.inverse.ca/> >>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>>>>>>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >>>>>>>> <http://packetfence.org/>) >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>>> On Apr 8, 2021, at 8:12 AM, Heusler Marie-Cécile >>>>>>>>> <marie-cecile.heus...@divtec.ch >>>>>>>>> <mailto:marie-cecile.heus...@divtec.ch>> wrote: >>>>>>>>> >>>>>>>>> For the time being, VLAN2 simply serves as an isolation VLAN. The >>>>>>>>> workstations should not access anything from this VLAN. >>>>>>>>> >>>>>>>>> >>>>>>>>> De : Ludovic Zammit <lzam...@inverse.ca <mailto:lzam...@inverse.ca>> >>>>>>>>> Envoyé : jeudi, 8 avril 2021 13:33 >>>>>>>>> À : Heusler Marie-Cécile >>>>>>>>> Cc : packetfence-users@lists.sourceforge.net >>>>>>>>> <mailto:packetfence-users@lists.sourceforge.net> >>>>>>>>> Objet : Re: VLAN for rejected machine >>>>>>>>> >>>>>>>>> What’s the VLAN 2 and his purpose? >>>>>>>>> >>>>>>>>> Thanks, >>>>>>>>> >>>>>>>>> Ludovic Zammit >>>>>>>>> lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 >>>>>>>>> (x145) :: www.inverse.ca <https://www.inverse.ca/> >>>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>>>>>>>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >>>>>>>>> <http://packetfence.org/>) >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>>> On Apr 8, 2021, at 1:38 AM, Heusler Marie-Cécile >>>>>>>>>> <marie-cecile.heus...@divtec.ch >>>>>>>>>> <mailto:marie-cecile.heus...@divtec.ch>> wrote: >>>>>>>>>> >>>>>>>>>> The devices are, for example, laptops that are not part of the >>>>>>>>>> domain. I want them to enter VLAN2, but I don't know them in advance. >>>>>>>>>> >>>>>>>>>> Where do I specify that I want them to be in VLAN2, without their >>>>>>>>>> login failing with my AD source? >>>>>>>>>> >>>>>>>>>> What I've tried to do so far is to create a second Authorization >>>>>>>>>> source, and a new profile that uses that source. I don't know if >>>>>>>>>> this is correct. >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> <pastedImage.png> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> <pastedImage.png> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> Thanks >>>>>>>>>> De : Ludovic Zammit <lzam...@inverse.ca <mailto:lzam...@inverse.ca>> >>>>>>>>>> Envoyé : mercredi, 7 avril 2021 13:53:40 >>>>>>>>>> À : Heusler Marie-Cécile >>>>>>>>>> Cc : packetfence-users@lists.sourceforge.net >>>>>>>>>> <mailto:packetfence-users@lists.sourceforge.net> >>>>>>>>>> Objet : Re: VLAN for rejected machine >>>>>>>>>> >>>>>>>>>> With Mac authentication, you will need to pre-import your Mac >>>>>>>>>> address if you know them, create a VLAN filter that automatically a >>>>>>>>>> MAC OUI for example or you redirect the on the captive portal to >>>>>>>>>> give them an option to register themselves. >>>>>>>>>> >>>>>>>>>> In your case, if you don’t know them, you return a VLAN 2 (don’t >>>>>>>>>> forget to return VLAN 2 in the registration role in the switch >>>>>>>>>> configuration) and they will never get a role and registered. They >>>>>>>>>> will end up having access on VLAN 2. >>>>>>>>>> >>>>>>>>>> What are those devices ? >>>>>>>>>> >>>>>>>>>> Thanks, >>>>>>>>>> >>>>>>>>>> Ludovic Zammit >>>>>>>>>> lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 >>>>>>>>>> (x145) :: www.inverse.ca <https://www.inverse.ca/> >>>>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>>>>>>>>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >>>>>>>>>> <http://packetfence.org/>) >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>>> On Apr 7, 2021, at 1:25 AM, Heusler Marie-Cécile >>>>>>>>>>> <marie-cecile.heus...@divtec.ch >>>>>>>>>>> <mailto:marie-cecile.heus...@divtec.ch>> wrote: >>>>>>>>>>> >>>>>>>>>>> Ok, I enabled mac authentication, but now here are my radius logs >>>>>>>>>>> once I connect the node to the switch: >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> Apr 7 07:19:51 TPI-PF1 auth[1944]: Adding client 192.168.137.200/32 >>>>>>>>>>> Apr 7 07:19:51 TPI-PF1 auth[1944]: [mac:98:e7:f4:14:44:f0] Accepted >>>>>>>>>>> user: and returned VLAN >>>>>>>>>>> Apr 7 07:19:51 TPI-PF1 auth[1944]: (3879) Login OK: [98e7f41444f0] >>>>>>>>>>> (from client 192.168.137.200/32 port 19 cli 98:e7:f4:14:44:f0) >>>>>>>>>>> >>>>>>>>>>> Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: >>>>>>>>>>> [mac:98:e7:f4:14:44:f0] handling radius autz request: from >>>>>>>>>>> switch_ip => (192.168.137.200), connection_type => >>>>>>>>>>> Ethernet-NoEAP,switch_mac => (00:16:b9:0b:37:0d), mac => >>>>>>>>>>> [98:e7:f4:14:44:f0], port => 19, username => "98e7f41444f0" >>>>>>>>>>> (pf::radius::authorize) >>>>>>>>>>> Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: >>>>>>>>>>> [mac:98:e7:f4:14:44:f0] Instantiate profile default >>>>>>>>>>> (pf::Connection::ProfileFactory::_from_profile) >>>>>>>>>>> Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: >>>>>>>>>>> [mac:98:e7:f4:14:44:f0] Match rule Email-on-role >>>>>>>>>>> (pf::access_filter::test) >>>>>>>>>>> Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: >>>>>>>>>>> [mac:98:e7:f4:14:44:f0] Found authentication source(s) : >>>>>>>>>>> 'local,file1,MonDomaine' for realm 'null' >>>>>>>>>>> (pf::config::util::filter_authentication_sources) >>>>>>>>>>> Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) WARN: >>>>>>>>>>> [mac:98:e7:f4:14:44:f0] No category computed for autoreg >>>>>>>>>>> (pf::role::getNodeInfoForAutoReg) >>>>>>>>>>> Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: >>>>>>>>>>> [mac:98:e7:f4:14:44:f0] Match rule Email-on-role >>>>>>>>>>> (pf::access_filter::test) >>>>>>>>>>> Apr 7 07:19:51 TPI-PF1 packetfence_httpd.webservices: >>>>>>>>>>> httpd.webservices(1790) WARN: [mac:98:e7:f4:14:44:f0] Unable to >>>>>>>>>>> pull accounting history for device 98:e7:f4:14:44:f0. The history >>>>>>>>>>> set doesn't exist yet. >>>>>>>>>>> (pf::accounting_events_history::latest_mac_history) >>>>>>>>>>> Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: >>>>>>>>>>> [mac:98:e7:f4:14:44:f0] Found authentication source(s) : >>>>>>>>>>> 'local,file1,MonDomaine' for realm 'null' >>>>>>>>>>> (pf::config::util::filter_authentication_sources) >>>>>>>>>>> Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: >>>>>>>>>>> [mac:98:e7:f4:14:44:f0] Connection type is MAC-AUTH. Getting role >>>>>>>>>>> from node_info (pf::role::getRegisteredRole) >>>>>>>>>>> Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) WARN: >>>>>>>>>>> [mac:98:e7:f4:14:44:f0] Use of uninitialized value $role in >>>>>>>>>>> concatenation (.) or string at /usr/local/pf/lib/pf/role.pm line >>>>>>>>>>> 489. >>>>>>>>>>> (pf::role::getRegisteredRole) >>>>>>>>>>> Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: >>>>>>>>>>> [mac:98:e7:f4:14:44:f0] Username was NOT defined or unable to match >>>>>>>>>>> a role - returning node based role '' (pf::role::getRegisteredRole) >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> I tried to create a new connection profile, but the result is the >>>>>>>>>>> same. >>>>>>>>>>> >>>>>>>>>>> Any ideas? >>>>>>>>>>> >>>>>>>>>>> Thanks >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> De : Ludovic Zammit <lzam...@inverse.ca <mailto:lzam...@inverse.ca>> >>>>>>>>>>> Envoyé : mardi, 6 avril 2021 19:48 >>>>>>>>>>> À : Heusler Marie-Cécile >>>>>>>>>>> Cc : packetfence-users@lists.sourceforge.net >>>>>>>>>>> <mailto:packetfence-users@lists.sourceforge.net> >>>>>>>>>>> Objet : Re: VLAN for rejected machine >>>>>>>>>>> >>>>>>>>>>> You can’t because if those not joined machines connect over 802.1x >>>>>>>>>>> they will fail and stay there. >>>>>>>>>>> >>>>>>>>>>> What you want to do is 802.1x + Mac authentication bypass (MAB) on >>>>>>>>>>> the switch port. >>>>>>>>>>> >>>>>>>>>>> A none corporate machine should do MAB and land on the captive >>>>>>>>>>> portal and authenticate. If you want to skip that part, you can put >>>>>>>>>>> VLAN ID 2 in the registration role on the switch so everyone that >>>>>>>>>>> do Mac authentication would be redirected on VLAN 2. >>>>>>>>>>> >>>>>>>>>>> Thanks, >>>>>>>>>>> >>>>>>>>>>> Ludovic Zammit >>>>>>>>>>> lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 >>>>>>>>>>> (x145) :: www.inverse.ca <https://www.inverse.ca/> >>>>>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>>>>>>>>>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >>>>>>>>>>> <http://packetfence.org/>) >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>>> On Apr 6, 2021, at 1:33 PM, Heusler Marie-Cécile >>>>>>>>>>>> <marie-cecile.heus...@divtec.ch >>>>>>>>>>>> <mailto:marie-cecile.heus...@divtec.ch>> wrote: >>>>>>>>>>>> >>>>>>>>>>>> Hello >>>>>>>>>>>> >>>>>>>>>>>> I have an authentication source that gives the role VLAN1 to the >>>>>>>>>>>> corporate machines. >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> <pastedImage.png> >>>>>>>>>>>> >>>>>>>>>>>> <pastedImage.png> >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> Now I want to give to the non-corporate machines the role VLAN2. >>>>>>>>>>>> However, I can't assign a role to a node that can't login to the >>>>>>>>>>>> source. >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> Adding client 10.104.92.130/32 >>>>>>>>>>>> Apr 6 19:11:06 packetfence auth[19459]: (195) >>>>>>>>>>>> chrooted_mschap_machine: ERROR: Program returned code (1) and >>>>>>>>>>>> output 'Logon failure (0xc000006d)' >>>>>>>>>>>> Apr 6 19:11:06 packetfence auth[19459]: (195) Login incorrect >>>>>>>>>>>> (chrooted_mschap_machine: Program returned code (1) and output >>>>>>>>>>>> 'Logon failure (0xc000006d)'): [host/client.tpi.local] (from >>>>>>>>>>>> client 10.104.92.130/32 port 21 cli 2c:44:fd:65:ab:27 via TLS >>>>>>>>>>>> tunnel) >>>>>>>>>>>> Apr 6 19:11:06 packetfence auth[19459]: [mac:2c:44:fd:65:ab:27] >>>>>>>>>>>> Rejected user: host/client.tpi.local >>>>>>>>>>>> Apr 6 19:11:06 packetfence auth[19459]: (196) Login incorrect >>>>>>>>>>>> (eap_peap: The users session was previously rejected: returning >>>>>>>>>>>> reject (again.)): [host/client.tpi.local] (from client >>>>>>>>>>>> 10.104.92.130/32 port 21 cli 2c:44:fd:65:ab:27) >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> A client that are not in the domain will have a login incorrect. >>>>>>>>>>>> But how can I say that every client out of the domain will move to >>>>>>>>>>>> the VLAN2 role ? >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> Thank you for your reply. > > <PastedGraphic-9.tiff>
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users