Hello Simon,

if you change this line
https://github.com/inverse-inc/packetfence/blob/devel/conf/template_switches.conf.defaults#L94
from

acceptRole=Filter-Id = $role
to
acceptRole=Filter-Id = ${role}.in

and do a /usr/local/pf/bin/pfcmd configreload hard

does it work ?

Regards
Fabrice


Le ven. 21 janv. 2022 à 12:56, Simon Sutcliffe <simon.sutcli...@rhdhv.com>
a écrit :

> Hi Fabrice,
>
> We have been using the default cisco switch template as non of our
> production switches have templates.
>
> We have 3650 and 2960 in the lab.
>
> Kind Regards
>
> Simon
>
> Sent from my Galaxy
>
>
> -------- Original message --------
> From: Fabrice Durand <oeufd...@gmail.com>
> Date: 21/01/2022 16:54 (GMT+00:00)
> To: Simon Sutcliffe <simon.sutcli...@rhdhv.com>
> Cc: packetfence-users@lists.sourceforge.net, Raghuram Kuricheti <
> raghuram.kurich...@rhdhv.com>
> Subject: Re: Challenge with sending filter-ID to Cisco switch
>
> This message was sent from a *public domain email service* such as Gmail,
> Yahoo!, AOL, etc. Please be cautious.
>
> Hello Simon,
>
> what switch module are you using in PacketFence ?
>
> It´s implemented here:
>
> https://github.com/inverse-inc/packetfence/blob/devel/lib/pf/Switch/Cisco/Catalyst_2960.pm#L580
>
> Regards
> Fabrice
>
>
> Le ven. 21 janv. 2022 à 02:43, Simon Sutcliffe <simon.sutcli...@rhdhv.com>
> a écrit :
>
>> Dear Team
>>
>>
>>
>> Over the last few weeks we have been engaged with trying to understand a
>> problem we were facing.  The problem was with sending a Filter-ID
>>
>>
>>
>> [image: Graphical user interface, text, application, chat or text message
>> Description automatically generated]
>>
>>
>>
>>
>>
>> On the switch we had created a extended access list of the same name
>>
>> ip access-list extended Pre-Auth-For-Registration
>>
>> 10 permit ip 10.207.129.0 0.0.0.255 10.202.1.0 0.0.0.255
>>
>> 20 permit ip 10.207.129.0 0.0.0.255 10.202.5.0 0.0.0.255
>>
>> 30 deny   ip 10.207.129.0 0.0.0.255 10.0.0.0 0.255.255.255
>>
>> 40 permit ip any any
>>
>>
>>
>> And during the MAB connection the radius response within the auditing
>> section clearly showed that PF was sending the attribute along with the
>> VLAN we wanted the client to be placed in.
>>
>> RADIUS Reply
>>
>> REST-HTTP-Status-Code = 200
>>
>> Filter-Id = "Pre-Auth-For-Registration"
>>
>> Tunnel-Medium-Type = IEEE-802
>>
>> Tunnel-Private-Group-Id = "7"
>>
>> Tunnel-Type = VLAN
>>
>> In the logging on the Cisco Switch you saw the Filter-ID was asl
>> received. However on two Cisco Switches (3650 and 2960) we tested the VLAN
>> was correctly actioned but the Filter-ID was ignored.
>>
>> The problem was identified as
>>
>>
>> *The ACL Filter-ID is not including the direction*
>>
>>
>>
>> The solution to solve the case was to add an additional command in the
>> switch config.
>>
>>
>>
>> #radius-server attribute 11 default direction inbound
>>
>>
>>
>> This forced the inbound Filter-ID to be assigned to the inbound ACL
>> handle.
>>
>> After this the ACL could be clearly seen within the session and was
>> actioned by the switch
>>
>>
>>
>> bsns-3750-5#show authentication sessions interface g1/0/1
>>
>>
>>
>>             Interface:  GigabitEthernet1/0/1
>>
>>           MAC Address:  0050.5699.4ea1
>>
>>            IP Address:  192.168.2.200
>>
>>             User-Name:  cisco
>>
>>                Status:  Authz Success
>>
>>                Domain:  DATA
>>
>>       Security Policy:  Should Secure
>>
>>       Security Status:  Unsecure
>>
>>        Oper host mode:  multi-auth
>>
>>      Oper control dir:  both
>>
>>         Authorized By:  Authentication Server
>>
>>           Vlan Policy:  7
>>
>>             *Filter-Id:  Pre-Auth-For-Registration*
>>
>>       Session timeout:  N/A
>>
>>          Idle timeout:  N/A
>>
>>     Common Session ID:  C0A800010000059E47B77481
>>
>>       Acct Session ID:  0x00000733
>>
>>                Handle:  0x5E00059F
>>
>>
>>
>> There is also this note in the Cisco documentation
>>
>> The Filter-Id attribute can be used to specify an inbound or outbound ACL
>> that is already configured on the switch. The attribute contains the ACL
>> number followed by *.in* for ingress filtering or *.out* for egress
>> filtering. If the RADIUS server does not allow the *.in* or *.out *syntax,
>> the access list is applied to the outbound ACL by default. Because of
>> limited support of Cisco IOS access lists on the switch, the Filter-Id
>> attribute is supported only for IP ACLs numbered 1 to 199 and 1300 to 2699
>> (IP standard and IP extended ACLs).
>>
>> @Fabrice Durand <oeufd...@gmail.com> This could be a point for your
>> developers and documentation team to make a note to see if this can be
>> solved with some direction information from PF.  If not you have this
>> information if another customer is facing the same challenge.
>>
>> Hope this was helpful and I appreciate your support on the other issues
>> we are facing.
>>
>> Kind Regards
>>
>>
>>
>> Simon
>>
>>
>>
>>
>>
>>
>>
>> Royal HaskoningDHV - Internal Use Only
>> This email and any attachments are intended solely for the use of the
>> addressee(s); disclosure or copying by others than the intended person(s)
>> is strictly prohibited. If you have received this email in error, please
>> treat this email as confidential, notify the sender and delete all copies
>> of the email immediately
>>
> This email and any attachments are intended solely for the use of the
> addressee(s); disclosure or copying by others than the intended person(s)
> is strictly prohibited. If you have received this email in error, please
> treat this email as confidential, notify the sender and delete all copies
> of the email immediately
>
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to