Hello Ludovic, this issue regards just the wired access as those devices are unable to use our guest-wifi (which is currently not packetfence based). The customer who provided those devices is very restrictive about the usage outside of their own company network which is why the devices need a VPN connection in order to access any kind of websites -> captive-portal detection does not work correctly on those machines (but this is another topic)
Yes, I think I figured out the correct switchport config for the usage of both internal corporate clients and partner company clients. My goal was to streamline the switchport configs so that most of our switchports would be configured equally and every port provides the same capabilities. I went with putting MAB-auth first and then following with dot1x-auth. This way, those partner devices get processed right away and don’t get to present their certificate. The only downside of this is, that I get two reject events before the accept for my own corporate clients because I disallowed the authentication via MAB for those. Is there a better solution for this (maybe I could ignore MAB request for a specific kind of node-group?) We are currently using EAP-TTLS for our own clients, the partner devices use EAP-TLS. In theory, this would be possible but I doubt that I would get my hands on a certificate from this company, as I said they are very restrictive and I don’t think they would provide something like this for us. I think I will stick to the “authentication order” solution for now, at least for those special clients, but maybe there really is a way to just serve dot1x auth for selected clients without sending a reject first. Thank you! Greetings Heiko [cid:2018_Signatur_ASAP_Engineering_607ba42f-d9c6-4abe-af16-b2b0953d2657.png] [cid:MK_FB_Podcast_20210201_70f02930-dafd-4abf-9139-c2414fbba13c.png]<https://asap.podigee.io/> ASAP Engineering GmbH Sachsstraße 1A | 85080 Gaimersheim Tel. +49 (8458) 3389 0<tel:+49%20(8458)%203389%200> | Fax. +49 (8458) 3389 399<fax:+49%20(8458)%203389%20399> heiko.matth...@asap.de<mailto:heiko.matth...@asap.de> | www.asap.de<http://www.asap.de> Geschäftsführer: Michael Neisen, Robert Werner, Christian Schweiger | Sitz der Gesellschaft: Gaimersheim | Amtsgericht: Ingolstadt HRB 5408 Datenschutz: Ausführliche Informationen zum Umgang mit Ihren personenbezogenen Daten bei ASAP erhalten Sie auf unserer Website unter Datenschutz.<http://www.asap.de/datenschutz/> Von: Zammit, Ludovic <luza...@akamai.com> Gesendet: Dienstag, 7. September 2021 14:40 An: packetfence-users@lists.sourceforge.net Cc: Matthies, Heiko <heiko.matth...@asap.de> Betreff: Re: [PacketFence-users] Best Practice for devices from partner companies Hello Heiko, Few questions: Are you currently using EAP TLS for you ? Is it wired or wireless access ? I will assume it’s wired but I prefer to ask. If it’s wired, you actually choose the method of authentication on the switch port configuration. Even if they have 802.1x configuration at the NIC level it would do Mac authentication if you tell it to. If you are not already using EAP TLS for your network, you could create a new EAP TLS profile that server a certificate from a Root CA that they already trust. Example: EAP PEAP = Your RADIUS certificate EAP TLS = CompanyA RADIUS certificate Thanks, Ludovic Zammit Product Support Engineer Principal [https://www.akamai.com/us/en/multimedia/images/custom/2019/logo-no-tag-93x45.png] Cell: +1.613.670.8432 Akamai Technologies - Inverse 145 Broadway Cambridge, MA 02142 Connect with Us: [https://www.akamai.com/us/en/multimedia/images/custom/community.jpg]<https://community.akamai.com/>[https://www.akamai.com/us/en/multimedia/images/custom/rss.png]<http://blogs.akamai.com/>[https://www.akamai.com/us/en/multimedia/images/custom/twitter.png]<https://twitter.com/akamai>[https://www.akamai.com/us/en/multimedia/images/custom/fb.png]<http://www.facebook.com/AkamaiTechnologies>[https://www.akamai.com/us/en/multimedia/images/custom/in.png]<http://www.linkedin.com/company/akamai-technologies>[https://www.akamai.com/us/en/multimedia/images/custom/youtube.png]<http://www.youtube.com/user/akamaitechnologies?feature=results_main> On Sep 6, 2021, at 8:38 AM, Matthies, Heiko via PacketFence-users <packetfence-users@lists.sourceforge.net<mailto:packetfence-users@lists.sourceforge.net>> wrote: Hello, I'm looking for a way to integrate devices from partner companies into our network. I planned to provide a extra VLAN at every site which allows nothing but basic internet access without a captive portal. They normally use certificate based authentication via EAP-TLS which leads me to my problem: - By default, Windows is configured to ignore certificate handshakes with RADIUS servers it does not trust. As the devices were provisioned by third party companies there is no way that their configiuration would trust my self signed RADIUS certificates - I tried working around this issue by providing MAB authentication but the devices seem to notice that their preferred authentication method (dot1x) fails and just try it again after some cooldown time -> this behavior leads to reoccuring disconnects from the network (I've already set the reauthenticate timer to 23 hours so the reauthentication would not accur during business times) What is the best way to handle this kind of device? The notebooks sadly don't support captive portal (because they require a VPN tunnel before any kind of web traffic is allowed) which is why they can't use our Guest-Wifi. If you need any more information, feel free to ask. Thank you! Greetings Heiko ASAP Engineering GmbH?Sachsstra?e?1A?|?85080?Gaimersheim Tel. +49 (8458) 3389 0?|?Fax. +49 (8458) 3389 399 heiko.matth...@asap.de<mailto:heiko.matth...@asap.de>?|?https://urldefense.com/v3/__http://www.asap.de__;!!GjvTz_vk!BInHwjOp8FNh_IY9rHWQT33HfPG3j0iqBkKU_tIgjvK4t78nppH1UQvBvcOXsDsz$<https://urldefense.com/v3/__http:/www.asap.de__;!!GjvTz_vk!BInHwjOp8FNh_IY9rHWQT33HfPG3j0iqBkKU_tIgjvK4t78nppH1UQvBvcOXsDsz$> Gesch?ftsf?hrer: Michael Neisen,?Robert Werner,?Christian Schweiger?| Sitz der Gesellschaft:?Gaimersheim | Amtsgericht:?Ingolstadt HRB 5408 Datenschutz: Ausf?hrliche Informationen zum Umgang mit Ihren personenbezogenen Daten bei ASAP erhalten Sie auf unserer Website unter www.asap.de<http://www.asap.de>\datenschutz. _______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net<mailto:PacketFence-users@lists.sourceforge.net> https://urldefense.com/v3/__https://lists.sourceforge.net/lists/listinfo/packetfence-users__;!!GjvTz_vk!BInHwjOp8FNh_IY9rHWQT33HfPG3j0iqBkKU_tIgjvK4t78nppH1UQvBvWhhGwRR$<https://urldefense.com/v3/__https:/lists.sourceforge.net/lists/listinfo/packetfence-users__;!!GjvTz_vk!BInHwjOp8FNh_IY9rHWQT33HfPG3j0iqBkKU_tIgjvK4t78nppH1UQvBvWhhGwRR$>
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users