Another configuration file with references to the billing server Splynx:

[root@wifi raddb]# cat mods-config/perl/multi_domain_constants.pm
package multi_domain_constants;

our $VAR1 = {
          '1' => {
                   'ConfigRealm' => {
                                      'local' => {
                                                   'radius_strip_username' => 
'disabled',
                                                   'eap' => 'default',
                                                   'admin_strip_username' => 
'disabled',
                                                   'portal_strip_username' => 
'disabled'
                                                 },
                                      'default' => {
                                                     'radius_acct_proxy_type' 
=> 'load-balance',
                                                     
'radius_auth_compute_in_pf' => 'disabled',
                                                     
'eduroam_radius_auth_proxy_type' => 'keyed-balance',
                                                     'radius_auth_proxy_type' 
=> 'keyed-balance',
                                                     'portal_strip_username' => 
'disabled',
                                                     'admin_strip_username' => 
'disabled',
                                                     'radius_auth' => '',
                                                     'radius_strip_username' => 
'disabled',
                                                     'eap' => 'default',
                                                     'eduroam_radius_acct' => 
'',
                                                     
'eduroam_radius_acct_proxy_type' => 'load-balance',
                                                     'permit_custom_attributes' 
=> 'disabled',
                                                     
'eduroam_radius_auth_compute_in_pf' => 'enabled',
                                                     'eduroam_radius_auth' => 
'',
                                                     'radius_acct' => ''
                                                   },
                                      'null' => {
                                                  'eap' => 'default',
                                                  'radius_strip_username' => 
'disabled',
                                                  'admin_strip_username' => 
'disabled',
                                                  'portal_strip_username' => 
'disabled'
                                                },
                                      'fispy.mx' => {
                                                      'eduroam_radius_acct' => 
'',
                                                      'eap' => 'default',
                                                      'radius_strip_username' 
=> 'enabled',
                                                      'admin_strip_username' => 
'enabled',
                                                      'radius_auth' => 'Splynx',
                                                      'portal_strip_username' 
=> 'enabled',
                                                      
'eduroam_radius_auth_proxy_type' => 'keyed-balance',
                                                      'radius_auth_proxy_type' 
=> 'keyed-balance',
                                                      'radius_acct_proxy_type' 
=> 'load-balance',
                                                      
'radius_auth_compute_in_pf' => 'enabled',
                                                      'eduroam_radius_auth' => 
'',
                                                      'radius_acct' => 'Splynx',
                                                      
'eduroam_radius_auth_compute_in_pf' => 'enabled',
                                                      
'eduroam_radius_acct_proxy_type' => 'load-balance',
                                                      
'permit_custom_attributes' => 'disabled'
                                                    }
                                    },
                   'ConfigDomain' => {},
                   'ConfigOrderedRealm' => [
                                             'default',
                                             'local',
                                             'null',
                                             'fispy.mx'
                                           ]
                 },
          '0' => {
                   'ConfigDomain' => {},
                   'ConfigRealm' => {},
                   'ConfigOrderedRealm' => []
                 }
        };
our $DATA = $VAR1;
1;
[root@wifi raddb]# 



> On Feb 9, 2022, at 5:19 PM, Jorge Nolla <jno...@gmail.com> wrote:
> 
> Hi Team,
> 
> Still can’t get accounting to proxy to the billing server. I don’t see the 
> configuration on the proxy.conf so I imagine is pulling from this file.
> 
> 
> [root@wifi raddb]# cat proxy.conf.inc
> # This file is generated from a template at 
> /usr/local/pf/conf/radiusd/proxy.conf.inc
> # Any changes made to this file will be lost on restart
> 
> # Eduroam integration is not configured
> 
> realm default {
> 
> }
> realm local {
> 
> }
> realm null {
> 
> }
> realm fispy.mx <http://fispy.mx/> {
> 
> auth_pool = auth_pool_fispy.mx <http://auth_pool_fispy.mx/>
> acct_pool = acct_pool_fispy.mx <http://acct_pool_fispy.mx/>
> }
> home_server_pool auth_pool_fispy.mx <http://auth_pool_fispy.mx/> {
> type = keyed-balance
> home_server = Splynx
> }
> 
> home_server_pool acct_pool_fispy.mx <http://acct_pool_fispy.mx/> {
> type = load-balance
> home_server = Splynx
> }
> 
> 
> realm eduroam.default {
> 
> }
> 
> realm eduroam.local {
> 
> }
> 
> realm eduroam.null {
> 
> }
> 
> realm eduroam.fispy.mx <http://eduroam.fispy.mx/> {
> 
> }
> 
> 
> 
> 
> home_server Splynx {
> ipaddr = 10.0.254.100
> port = 1812
> secret = @Put@Madr3
> type = auth+acct
> status_check = status-server
> }
> 
> 
> 
> # pfacct configuration
> 
> realm pfacct {
>     acct_pool = pfacct_pool
>     nostrip
> }
> 
> home_server_pool pfacct_pool {
>     home_server = pfacct_local
> }
> 
> home_server pfacct_local {
>     type = acct
>     ipaddr = 127.0.0.1
>     port = 1813
>     secret = 'ZDQ3YzUzMjkxM2M1NjBhM2IyMTJjNWE0'
>     src_ipaddr = 10.0.255.99
> }
> 
>> On Feb 8, 2022, at 11:51 AM, Jorge Nolla <jno...@gmail.com 
>> <mailto:jno...@gmail.com>> wrote:
>> 
>> Fabrice,
>> 
>> For some reason I cannot get accounting forwarding to the Billing/Radius 
>> Server. This server has the plans for the customers.
>> 
>> <Screen Shot 2022-02-08 at 11.48.23 AM.png>
>> 
>> 
>> <Screen Shot 2022-02-08 at 11.50.20 AM.png>
>> 
>> 
>> <Screen Shot 2022-02-08 at 11.48.01 AM.png>
>> 
>> 
>> <Screen Shot 2022-02-08 at 11.51.33 AM.png>
>> 
>>> On Feb 8, 2022, at 11:39 AM, Jorge Nolla <jno...@gmail.com 
>>> <mailto:jno...@gmail.com>> wrote:
>>> 
>>> Hi Fabrice,
>>> 
>>> It worked. I had to change to HTTPS and DNS for the cert on the server to 
>>> work. We also changed the method to GET. Will try POST, not sure if this 
>>> will make a difference.
>>> 
>>>  my $html_form = qq[
>>>       <form name="weblogin_form" data-autosubmit="1000" method="GET" 
>>> action="https://portal.fispy.mx:8443/login 
>>> <https://portal.fispy.mx:8443/login>">
>>>        <input type="hidden" name="username" value="$mac">
>>>        <input type="hidden" name="password" value="$mac">
>>>       </form>
>>>       <script src="/content/autosubmit.js" type="text/javascript"></script>
>>> 
>>> Here is the a sample of the radius info on PF. Top entry is with new 
>>> configuration MAC address as username. Bottom one is the old configuration, 
>>> where we were submitting the url request manually. 
>>> 
>>> <Screen Shot 2022-02-08 at 11.34.52 AM.png>
>>> 
>>> 
>>>> On Feb 8, 2022, at 9:30 AM, Fabrice Durand <oeufd...@gmail.com 
>>>> <mailto:oeufd...@gmail.com>> wrote:
>>>> 
>>>> Yes, that's it. 
>>>> 
>>>> Le mar. 8 févr. 2022 à 11:23, Jorge Nolla <jno...@gmail.com 
>>>> <mailto:jno...@gmail.com>> a écrit :
>>>> Fabrice,
>>>> 
>>>> The document you had provided didn’t layout the configuration steps. I 
>>>> think this might be the correct document for the configuration you are 
>>>> referring. If you have a chance take a look and let me know.
>>>> 
>>>> https://support.huawei.com/enterprise/mx/knowledge/EKB1100055064 
>>>> <https://support.huawei.com/enterprise/mx/knowledge/EKB1100055064>
>>>> 
>>>> 
>>>> 
>>>>> On Feb 8, 2022, at 9:14 AM, Fabrice Durand <oeufd...@gmail.com 
>>>>> <mailto:oeufd...@gmail.com>> wrote:
>>>>> 
>>>>> You can try that instead:
>>>>> 
>>>>>         my $html_form = qq[
>>>>>         <form name="weblogin_form" data-autosubmit="1000" method="POST" 
>>>>> action="http://$controller_ip:8443/login 
>>>>> <http://$controller_ip:8443/login>">
>>>>>             <input type="hidden" name="username" value="$mac">
>>>>>             <input type="hidden" name="password" value="$mac">
>>>>>         </form>
>>>>>         <script src="/content/autosubmit.js" 
>>>>> type="text/javascript"></script>
>>>>>     ];
>>>>> 
>>>>> It will pass the mac address of the device in the radius request as 
>>>>> username and password instead of the real username and password who has 
>>>>> been authenticated previously on the portal.
>>>>> Then you just need to configure the registration role in the switch 
>>>>> configuration to be -1 (packetfence side) and if the device is unreg then 
>>>>> the request will be rejected.
>>>>> 
>>>>> 
>>>>> Le mar. 8 févr. 2022 à 11:04, Jorge Nolla <jno...@gmail.com 
>>>>> <mailto:jno...@gmail.com>> a écrit :
>>>>> Hi Fabrice,
>>>>> 
>>>>> Let me check what the difference is in configuration on the AC side, I’ll 
>>>>> report within the hour. Any clues as to why the parameters are not being 
>>>>> passed?
>>>>> 
>>>>> 
>>>>>> On Feb 8, 2022, at 8:55 AM, Fabrice Durand <oeufd...@gmail.com 
>>>>>> <mailto:oeufd...@gmail.com>> wrote:
>>>>>> 
>>>>>> Hello Jorge,
>>>>>> 
>>>>>> i really think that it´s not the correct way to support the web auth in 
>>>>>> Huawei.
>>>>>> The only thing you can do with the portal is to authenticate with a 
>>>>>> username and password, there is no way to do anything else 
>>>>>> (sms/email/sponsor/....).
>>>>>> 
>>>>>> Also when you authenticate on the portal , the portal validate your 
>>>>>> username and password and with the workflow you have it will 
>>>>>> authenticate twice (portal and radius) and it doesn´t make sense.
>>>>>> 
>>>>>> So if you want to keep this way then you will need a simple html page 
>>>>>> with a username and password field that post on 
>>>>>> https://portal.fispy.mx:8443/login <https://portal.fispy.mx:8443/login> 
>>>>>> then configure packetfence to authenticate the username and password 
>>>>>> from radius.
>>>>>> 
>>>>>> The other way who looks really better is to use that: 
>>>>>> (https://support.huawei.com/enterprise/en/doc/EDOC1100008282/4d5793da/understanding-nac#dc_cfg_nac_2006u_1_2
>>>>>>  
>>>>>> <https://support.huawei.com/enterprise/en/doc/EDOC1100008282/4d5793da/understanding-nac#dc_cfg_nac_2006u_1_2>)
>>>>>> 
>>>>>> <download.png>
>>>>>>  
>>>>>> As i said , it´s exactly how it works with the cisco wlc and it will 
>>>>>> support all authentication mechanisms available on the portal.
>>>>>> 
>>>>>> Regards
>>>>>> Fabrice
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> Le lun. 7 févr. 2022 à 20:25, Jorge Nolla <jno...@gmail.com 
>>>>>> <mailto:jno...@gmail.com>> a écrit :
>>>>>> 
>>>>>> Radius request from the AC once it receives the correct values. This is 
>>>>>> sent back to Radius which in this case is PF
>>>>>> 
>>>>>> User-Name = “5blz”  <<< VALUE NEEDED IN URL as username
>>>>>> User-Password = "******”   <<< VALUE NEEDED IN URL as password
>>>>>> NAS-IP-Address = 10.7.255.2
>>>>>> NAS-Port = 900
>>>>>> Service-Type = Framed-User
>>>>>> Framed-Protocol = PPP
>>>>>> Framed-IP-Address = 10.9.91.31
>>>>>> Called-Station-Id = "c0:f6:c2:a5:c4:d0:FISPY-WiFi"
>>>>>> Calling-Station-Id = "f0:2f:4b:14:67:d9"
>>>>>> NAS-Identifier = "AirEngine9700-M1"
>>>>>> NAS-Port-Type = Wireless-802.11
>>>>>> Acct-Session-Id = "AirEngi00000000000900d5d66c0600187"
>>>>>> Event-Timestamp = "Feb  7 2022 18:05:13 MST"
>>>>>> NAS-Port-Id = "slot=0;subslot=0;port=0;vlanid=900"
>>>>>> Huawei-Loopback-Address = "C0F6-C2A5-C4D0"
>>>>>> Huawei-User-Mac = "\000\000\000\003"
>>>>>> Stripped-User-Name = "5blz"
>>>>>> Realm = "null"
>>>>>> FreeRADIUS-Client-IP-Address = 10.7.255.2
>>>>>> Called-Station-SSID = "FISPY-WiFi"
>>>>>> PacketFence-KeyBalanced = "aa86741e358fa86079a91aaf4dc581f9"
>>>>>> PacketFence-Radius-Ip = "10.0.255.99"
>>>>>> SQL-User-Name = "5blz"
>>>>>> 
>>>>>>> On Feb 7, 2022, at 3:58 PM, Jorge Nolla <jno...@gmail.com 
>>>>>>> <mailto:jno...@gmail.com>> wrote:
>>>>>>> 
>>>>>>> Hi Fabrice,
>>>>>>> 
>>>>>>> I did hardcode as follow:
>>>>>>> 
>>>>>>> <form name="weblogin_form" data-autosubmit="1000" method="GET" 
>>>>>>> action="https://portal.fispy.mx:8443/login?username=bob&password=bob 
>>>>>>> <https://portal.fispy.mx:8443/login?username=bob&password=bob>" 
>>>>>>> style="display:none">
>>>>>>> 
>>>>>>> But the redirect which the client is getting, is only this part, not 
>>>>>>> sure why:
>>>>>>> 
>>>>>>> https://portal.fispy.mx:8443/login? 
>>>>>>> <https://portal.fispy.mx:8443/login?>
>>>>>>> 
>>>>>>> 
>>>>>>> Here is the flow of the External Portal Authentication as per Huawei. 
>>>>>>> Portal Server - Notify the STA of the login URL
>>>>>>> STA - Send the username and password in HTTP GET POST. When this is 
>>>>>>> configured to use ISE as per the guide, the ISE server sends the 
>>>>>>> redirect to the STA as per the format. 
>>>>>>> https://portal.fispy.mx:8443/login?username=($username)&password=($password)
>>>>>>>  
>>>>>>> <https://portal.fispy.mx:8443/login?username=($username)&password=($password)>
>>>>>>> 
>>>>>>> 
>>>>>>> <PastedGraphic-1.tiff>
>>>>>>> 
>>>>>>>> On Feb 7, 2022, at 2:51 PM, Fabrice Durand <oeufd...@gmail.com 
>>>>>>>> <mailto:oeufd...@gmail.com>> wrote:
>>>>>>>> 
>>>>>>>> Did you try to hardcode that in the code and see if it works ?
>>>>>>>> 
>>>>>>>> Also i don´t understand the goal of passing the username and password 
>>>>>>>> , is there any extra check after that ? What happen if the user 
>>>>>>>> register by sms/email ?
>>>>>>>> 
>>>>>>>> And i just found that:
>>>>>>>> https://support.huawei.com/enterprise/en/doc/EDOC1100008282/4d5793da/understanding-nac#dc_cfg_nac_2006u_1_1
>>>>>>>>  
>>>>>>>> <https://support.huawei.com/enterprise/en/doc/EDOC1100008282/4d5793da/understanding-nac#dc_cfg_nac_2006u_1_1>
>>>>>>>> Is it something that can be configured on the Hawei ? If yes then it 
>>>>>>>> will mimic the way the Cisco WLC works.
>>>>>>>> 
>>>>>>>> Regards
>>>>>>>> Fabrice
>>>>>>>> 
>>>>>>>> 
>>>>>>>> Le lun. 7 févr. 2022 à 16:01, Jorge Nolla <jno...@gmail.com 
>>>>>>>> <mailto:jno...@gmail.com>> a écrit :
>>>>>>>> Hi Fabrice,
>>>>>>>> 
>>>>>>>> This line needs to be HTTPS for it to work
>>>>>>>> <form name="weblogin_form" data-autosubmit="1000" method="GET" 
>>>>>>>> action="http://$controller_ip:8443/login?username=bob&password=bob 
>>>>>>>> <http://$controller_ip:8443/login?username=bob&password=bob>" 
>>>>>>>> style="display:none”>
>>>>>>>> 
>>>>>>>> This needs to be the username and password which is being entered by 
>>>>>>>> the user in the PF portal, which is the Radius username and password
>>>>>>>> username=bob&password=bob
>>>>>>>> 
>>>>>>>> 
>>>>>>>>> On Feb 7, 2022, at 12:03 PM, Fabrice Durand <oeufd...@gmail.com 
>>>>>>>>> <mailto:oeufd...@gmail.com>> wrote:
>>>>>>>>> 
>>>>>>>>> I just pushed a fix.
>>>>>>>>> 
>>>>>>>>> cd /usr/local/pf
>>>>>>>>> curl 
>>>>>>>>> https://github.com/inverse-inc/packetfence/commit/7628afddf46e0226667560dc33df192f9c4cf420.diff
>>>>>>>>>  
>>>>>>>>> <https://github.com/inverse-inc/packetfence/commit/7628afddf46e0226667560dc33df192f9c4cf420.diff>
>>>>>>>>>  | patch -p1
>>>>>>>>> and restart
>>>>>>>>> 
>>>>>>>>> Le lun. 7 févr. 2022 à 13:46, Jorge Nolla <jno...@gmail.com 
>>>>>>>>> <mailto:jno...@gmail.com>> a écrit :
>>>>>>>>> Here are the log outputs for /usr/local/pf/logs/packetfence.log
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> Feb  7 11:03:04 wifi packetfence_httpd.portal[61371]: 
>>>>>>>>> httpd.portal(61371) INFO: [mac:[undef]] URI '/Huawei' is detected as 
>>>>>>>>> an external captive portal URI (pf::web::externalportal::handle)
>>>>>>>>> Feb  7 11:03:04 wifi packetfence_httpd.portal[61371]: 
>>>>>>>>> httpd.portal(61371) ERROR: [mac:[undef]] Cannot load perl module for 
>>>>>>>>> switch type 'pf::Switch::Huawei'. Either switch type is unknown or 
>>>>>>>>> switch type perl module have compilation errors. See the following 
>>>>>>>>> message for details:  (pf::web::externalportal::handle)
>>>>>>>>> Feb  7 11:03:06 wifi packetfence_httpd.portal[61370]: 
>>>>>>>>> httpd.portal(61370) INFO: [mac:[undef]] URI '/Huawei' is detected as 
>>>>>>>>> an external captive portal URI (pf::web::externalportal::handle)
>>>>>>>>> Feb  7 11:03:06 wifi packetfence_httpd.portal[61370]: 
>>>>>>>>> httpd.portal(61370) ERROR: [mac:[undef]] Cannot load perl module for 
>>>>>>>>> switch type 'pf::Switch::Huawei'. Either switch type is unknown or 
>>>>>>>>> switch type perl module have compilation errors. See the following 
>>>>>>>>> message for details:  (pf::web::externalportal::handle)
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>>> On Feb 7, 2022, at 10:50 AM, Jorge Nolla <jno...@gmail.com 
>>>>>>>>>> <mailto:jno...@gmail.com>> wrote:
>>>>>>>>>> 
>>>>>>>>>> Here is the output for HAProxy
>>>>>>>>>> 
>>>>>>>>>> Feb 7 10:48:54 wifi haproxy[2285]: 10.9.215.39:63814 
>>>>>>>>>> <http://10.9.215.39:63814/> [07/Feb/2022:10:48:54.074] 
>>>>>>>>>> portal-https-10.0.255.99~ 10.0.255.99-backend/127.0.0.1 
>>>>>>>>>> <http://127.0.0.1/> 0/0/0/13/13 501 413 - - ---- 2/1/0/0/0 0/0 
>>>>>>>>>> {wifi.fispy.mx <http://wifi.fispy.mx/>} "GET 
>>>>>>>>>> /Huawei?ac-ip=10.7.255.2&userip=10.9.215.39&ssid=FISPY-WiFi&ap-mac=f02f4b1467d9
>>>>>>>>>>  HTTP/1.1”
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>>> On Feb 7, 2022, at 10:06 AM, Jorge Nolla <jno...@gmail.com 
>>>>>>>>>>> <mailto:jno...@gmail.com>> wrote:
>>>>>>>>>>> 
>>>>>>>>>>> Hi Fabrice,
>>>>>>>>>>> 
>>>>>>>>>>> From the Pf portal after the patch is applied.
>>>>>>>>>>> 
>>>>>>>>>>> type: 'Huawei' is not a valid value The chosen type (Huawei) is not 
>>>>>>>>>>> supported.
>>>>>>>>>>> 
>>>>>>>>>>>> On Feb 6, 2022, at 6:49 PM, Jorge Nolla <jno...@gmail.com 
>>>>>>>>>>>> <mailto:jno...@gmail.com>> wrote:
>>>>>>>>>>>> 
>>>>>>>>>>>> 
>>>>>>>>>>>> This is the only option on the config.
>>>>>>>>>>>> 
>>>>>>>>>>>> <Screen Shot 2022-02-06 at 6.48.16 PM.png>
>>>>>>>>>>>> 
>>>>>>>>>>>> 
>>>>>>>>>>>>> On Feb 6, 2022, at 6:41 PM, Jorge Nolla <jno...@gmail.com 
>>>>>>>>>>>>> <mailto:jno...@gmail.com>> wrote:
>>>>>>>>>>>>> 
>>>>>>>>>>>>> Hi Fabrice,
>>>>>>>>>>>>> 
>>>>>>>>>>>>> Getting an error page from PF
>>>>>>>>>>>>> 
>>>>>>>>>>>>> Not Implemented
>>>>>>>>>>>>> GET no supported for current URL.
>>>>>>>>>>>>> 
>>>>>>>>>>>>> How is the switch supposed to be defined in PF?
>>>>>>>>>>>>> 
>>>>>>>>>>>>> 
>>>>>>>>>>>>> 
>>>>>>>>>>>>>> On Feb 6, 2022, at 5:55 PM, Fabrice Durand <oeufd...@gmail.com 
>>>>>>>>>>>>>> <mailto:oeufd...@gmail.com>> wrote:
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> I am just not sure what to set for username and password, if you 
>>>>>>>>>>>>>> do sms auth then there is no password.
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> Also in the url it looks that it miss the mac address of the 
>>>>>>>>>>>>>> device , can you try to add  device-mac and see if the device 
>>>>>>>>>>>>>> mac is in the url ?
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> Here the first draft:
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> https://github.com/inverse-inc/packetfence/compare/feature/Huawei_web_auth.diff
>>>>>>>>>>>>>>  
>>>>>>>>>>>>>> <https://github.com/inverse-inc/packetfence/compare/feature/Huawei_web_auth.diff>
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> cd /usr/local/pf/
>>>>>>>>>>>>>> curl 
>>>>>>>>>>>>>> https://github.com/inverse-inc/packetfence/compare/feature/Huawei_web_auth.diff
>>>>>>>>>>>>>>  
>>>>>>>>>>>>>> <https://github.com/inverse-inc/packetfence/compare/feature/Huawei_web_auth.diff>
>>>>>>>>>>>>>>  | patch -p1
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> then restart packetfence.
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> On the controller:
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> url-template name PacketFence
>>>>>>>>>>>>>>  url https://wifi.fispy.mx/ 
>>>>>>>>>>>>>> <https://wifi.fispy.mx/captive-portal>Hawei
>>>>>>>>>>>>>>  url-parameter device-ip device-mac ac-ip user-ipaddress userip 
>>>>>>>>>>>>>> ssid ssid user-mac ap-mac
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> So when the device will be forwarded to the portal it should be 
>>>>>>>>>>>>>> able to recognise the mac address and the ip of the device (in 
>>>>>>>>>>>>>> the bottom).
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> Register on the portal and you should be forwarded to 
>>>>>>>>>>>>>> http://$controller_ip:8443/login?username=bob&password=bob 
>>>>>>>>>>>>>> <http://$controller_ip:8443/login?username=bob&password=bob>
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> Let me know how it behave.
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> Regards
>>>>>>>>>>>>>> Fabrice
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>  
>>>>>>>>>>>>>> Le dim. 6 févr. 2022 à 18:58, Jorge Nolla <jno...@gmail.com 
>>>>>>>>>>>>>> <mailto:jno...@gmail.com>> a écrit :
>>>>>>>>>>>>>> Hi Fabrice
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> This is the GET the AC is expecting:
>>>>>>>>>>>>>> https://portal.fispy.mx:8443/login?username=($username)&password=($password)
>>>>>>>>>>>>>>  
>>>>>>>>>>>>>> <https://portal.fispy.mx:8443/login?username=($username)&password=($password)>
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> If successful it will return as per image below. If it fails the 
>>>>>>>>>>>>>> AC will redirect back to the Portal
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> <WebAuthentication.png>
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> Here is the configuration:
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> url-template name PacketFence
>>>>>>>>>>>>>>  url https://wifi.fispy.mx/captive-portal 
>>>>>>>>>>>>>> <https://wifi.fispy.mx/captive-portal>
>>>>>>>>>>>>>>  url-parameter login-url destination_url 
>>>>>>>>>>>>>> https://portal.fispy.mx:8443/login?username=($username)&password=($password)
>>>>>>>>>>>>>>  
>>>>>>>>>>>>>> <https://portal.fispy.mx:8443/login?username=($username)&password=($password)>
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> HA Proxy output
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> Feb 6 16:44:26 wifi haproxy[2427]: 10.9.70.173:52266 
>>>>>>>>>>>>>> <http://10.9.70.173:52266/> [06/Feb/2022:16:44:26.153] 
>>>>>>>>>>>>>> portal-https-10.0.255.99~ 10.0.255.99-backend/127.0.0.1 
>>>>>>>>>>>>>> <http://127.0.0.1/> 0/0/0/202/202 200 9003 - - ---- 2/1/0/0/0 
>>>>>>>>>>>>>> 0/0 {wifi.fispy.mx <http://wifi.fispy.mx/>} "GET 
>>>>>>>>>>>>>> /captive-portal?destination_url=https://portal.fispy.mx:8443/login?username=($username)&password=($password)
>>>>>>>>>>>>>>  
>>>>>>>>>>>>>> <https://portal.fispy.mx:8443/login?username=($username)&password=($password)>
>>>>>>>>>>>>>>  HTTP/1.1"
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> Only problem is that PacketFence is not updating the dynamic 
>>>>>>>>>>>>>> values with username and password for it to work
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> AC = Access Controller. This manages the APs’ as they are 
>>>>>>>>>>>>>> operating in Fit/Lightweight mode.
>>>>>>>>>>>>>> AP = Access Points. These are the actual radios.
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> Best Regards,
>>>>>>>>>>>>>> Jorge
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> On Feb 6, 2022, at 4:40 PM, Fabrice Durand <oeufd...@gmail.com 
>>>>>>>>>>>>>>> <mailto:oeufd...@gmail.com>> wrote:
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> Hello Jorge,
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> i have what i need at least to be able to support the web-auth.
>>>>>>>>>>>>>>> The only thing i am not sure is at the end of the registration 
>>>>>>>>>>>>>>> process what we are supposed to do.
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> I will create a branch on github in order for you to test. (it 
>>>>>>>>>>>>>>> will be an update of the Huawei switch module).
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> For information, what is the ac-ip ac-mac versus ap-ip ap-mac ?
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> Regards
>>>>>>>>>>>>>>> Fabrice
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> Le dim. 6 févr. 2022 à 18:30, Jorge Nolla <jno...@gmail.com 
>>>>>>>>>>>>>>> <mailto:jno...@gmail.com>> a écrit :
>>>>>>>>>>>>>>> If I try to manually send the redirect in the browser here is 
>>>>>>>>>>>>>>> what HA proxy records. This is a simple copy and paste in the 
>>>>>>>>>>>>>>> browser and the output:
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> https://wifi.fispy.mx/captive-portal 
>>>>>>>>>>>>>>> <https://wifi.fispy.mx/captive-portal>?destination_url=https://portal.fispy.mx:8443/login?username=539z&password=0uf3
>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>> <https://portal.fispy.mx:8443/login?username=539z&password=0uf3>
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> 4875 - - ---- 2/1/0/0/0 0/0 {wifi.fispy.mx 
>>>>>>>>>>>>>>> <http://wifi.fispy.mx/>} "GET 
>>>>>>>>>>>>>>> /captive-portal?destination_url=https://portal.fispy.mx:8443/login?username=539z&password=0uf3
>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>> <https://portal.fispy.mx:8443/login?username=539z&password=0uf3>
>>>>>>>>>>>>>>>  HTTP/1.1"
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> It doesn’t let it go through as it seems that is trying to 
>>>>>>>>>>>>>>> validate network connectivity 
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>> On Feb 6, 2022, at 4:07 PM, Jorge Nolla <jno...@gmail.com 
>>>>>>>>>>>>>>>> <mailto:jno...@gmail.com>> wrote:
>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>> Seems weird how the format of the URL is recorded/sent 
>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>> Here is a normal redirect, the url is formatted correctly,
>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>> Feb 6 16:03:41 wifi haproxy[2427]: 10.99.1.20:63577 
>>>>>>>>>>>>>>>> <http://10.99.1.20:63577/> [06/Feb/2022:16:03:41.232] 
>>>>>>>>>>>>>>>> portal-https-10.0.255.99~ 10.0.255.99-backend/127.0.0.1 
>>>>>>>>>>>>>>>> <http://127.0.0.1/> 0/0/1/233/234 200 4910 - - ---- 2/1/0/0/0 
>>>>>>>>>>>>>>>> 0/0 {wifi.fispy.mx <http://wifi.fispy.mx/>} "GET 
>>>>>>>>>>>>>>>> /captive-portal?destination_url=https://www.fispy.mx/ 
>>>>>>>>>>>>>>>> <https://www.fispy.mx/> HTTP/1.1"
>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>  I’m not sure why the value sent by the AP has all the % and 
>>>>>>>>>>>>>>>> weird symbols 
>>>>>>>>>>>>>>>> destination%5Furl=https%3A%2F%2Fportal%2Efispy%2Emx%3A8443%2Flogin
>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>> <https://wifi.fispy.mx/captive-portal?switch_url=https://portal.fispy.mx:8443/login>
>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> On Feb 6, 2022, at 4:00 PM, Jorge Nolla <jno...@gmail.com 
>>>>>>>>>>>>>>>>> <mailto:jno...@gmail.com>> wrote:
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> Hi Fabrice,
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> Here are the options that can be added:
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> [AirEngine9700-M1-url-template-PacketFence]url-parameter ?
>>>>>>>>>>>>>>>>>   ap-group-name   AP group name
>>>>>>>>>>>>>>>>>   ap-ip           AP IP address
>>>>>>>>>>>>>>>>>   ap-location     AP location
>>>>>>>>>>>>>>>>>   ap-mac          AP MAC address
>>>>>>>>>>>>>>>>>   ap-name         AP name
>>>>>>>>>>>>>>>>>   device-ip       Device IP address
>>>>>>>>>>>>>>>>>   device-mac      Device MAC address
>>>>>>>>>>>>>>>>>   login-url       Device's login URL provided to the external 
>>>>>>>>>>>>>>>>> portal server
>>>>>>>>>>>>>>>>>   mac-address     Mac address
>>>>>>>>>>>>>>>>>   redirect-url    The url in user original http packet
>>>>>>>>>>>>>>>>>   set             Set
>>>>>>>>>>>>>>>>>   ssid            SSID
>>>>>>>>>>>>>>>>>   sysname         Device name
>>>>>>>>>>>>>>>>>   user-ipaddress  User IP address
>>>>>>>>>>>>>>>>>   user-mac        User MAC address
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> url-template name PacketFence
>>>>>>>>>>>>>>>>>  url https://wifi.fispy.mx/captive-portal 
>>>>>>>>>>>>>>>>> <https://wifi.fispy.mx/captive-portal>
>>>>>>>>>>>>>>>>>  url-parameter device-ip ac-ip user-ipaddress userip ssid 
>>>>>>>>>>>>>>>>> ssid user-mac ap-mac
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> 200 9003 - - ---- 2/1/0/0/0 0/0 {wifi.fispy.mx 
>>>>>>>>>>>>>>>>> <http://wifi.fispy.mx/>} "GET 
>>>>>>>>>>>>>>>>> /captive-portal?ac%2Dip=10%2E7%2E255%2E2&userip=10%2E9%2E70%2E173&ssid=FISPY%2DWiFi&ap%2Dmac=f02f4b1467d9
>>>>>>>>>>>>>>>>>  HTTP/1.1"
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> If we do not specify the URL on this configuration, where 
>>>>>>>>>>>>>>>>> would PacketFence get the value for the AC Web Authentication 
>>>>>>>>>>>>>>>>> call?
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> https://portal.fispy.mx:8443/login?username=($username)&password=($password)
>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>> <https://portal.fispy.mx:8443/login?username=($username)&password=($password)>
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> Best Regards,
>>>>>>>>>>>>>>>>> Jorge
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> On Feb 5, 2022, at 8:23 PM, Fabrice Durand 
>>>>>>>>>>>>>>>>>> <oeufd...@gmail.com <mailto:oeufd...@gmail.com>> wrote:
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> Hello Jorge,
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> what we need is the user mac and the ap information.
>>>>>>>>>>>>>>>>>> I found that 
>>>>>>>>>>>>>>>>>> https://support.huawei.com/enterprise/en/doc/EDOC1100008283/659354b1/display-url-template
>>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>>> <https://support.huawei.com/enterprise/en/doc/EDOC1100008283/659354b1/display-url-template>
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> Is it possible to add extra parameters like user-mac ssid 
>>>>>>>>>>>>>>>>>> ap-ip ap-mac ?
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> And if yes can you provide me the url generated by the 
>>>>>>>>>>>>>>>>>> controller when it redirect ?  (haproxy-portal log)
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> Regards
>>>>>>>>>>>>>>>>>> Fabrice
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> Le sam. 5 févr. 2022 à 20:42, Jorge Nolla <jno...@gmail.com 
>>>>>>>>>>>>>>>>>> <mailto:jno...@gmail.com>> a écrit :
>>>>>>>>>>>>>>>>>> Hi Team,
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> Any input on this? We really would like to get this to work.
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> Thank you!
>>>>>>>>>>>>>>>>>> Jorge
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>> On Feb 2, 2022, at 7:48 PM, Jorge Nolla <jno...@gmail.com 
>>>>>>>>>>>>>>>>>>> <mailto:jno...@gmail.com>> wrote:
>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>> Hi Fabrice,
>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>> This is the sequence:
>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>> Feb  2 14:51:32 wifi haproxy[2427]: 10.9.79.52:61132 
>>>>>>>>>>>>>>>>>>> <http://10.9.79.52:61132/> [02/Feb/2022:14:51:32.663] 
>>>>>>>>>>>>>>>>>>> portal-http-10.0.255.99 10.0.255.99-backend/127.0.0.1 
>>>>>>>>>>>>>>>>>>> <http://127.0.0.1/> 0/0/0/201/201 200 7146 - - ---- 
>>>>>>>>>>>>>>>>>>> 3/1/0/0/0 0/0 {wifi.fispy.mx <http://wifi.fispy.mx/>} "GET 
>>>>>>>>>>>>>>>>>>> /access?lang= HTTP/1.1"
>>>>>>>>>>>>>>>>>>> Feb  2 14:51:37 wifi haproxy[2427]: 10.9.79.52:61133 
>>>>>>>>>>>>>>>>>>> <http://10.9.79.52:61133/> [02/Feb/2022:14:51:37.905] 
>>>>>>>>>>>>>>>>>>> portal-http-10.0.255.99 static/127.0.0.1 
>>>>>>>>>>>>>>>>>>> <http://127.0.0.1/> 0/0/0/2/2 200 228 - - ---- 4/2/0/0/0 
>>>>>>>>>>>>>>>>>>> 0/0 {10.0.255.99} "GET 
>>>>>>>>>>>>>>>>>>> /common/network-access-detection.gif?r=1643838705224 
>>>>>>>>>>>>>>>>>>> HTTP/1.1"
>>>>>>>>>>>>>>>>>>> Feb  2 14:51:44 wifi haproxy[2427]: 10.9.79.52:61130 
>>>>>>>>>>>>>>>>>>> <http://10.9.79.52:61130/> [02/Feb/2022:14:51:43.927] 
>>>>>>>>>>>>>>>>>>> portal-https-10.0.255.99~ 10.0.255.99-backend/127.0.0.1 
>>>>>>>>>>>>>>>>>>> <http://127.0.0.1/> 0/0/0/122/122 302 1018 - - ---- 
>>>>>>>>>>>>>>>>>>> 4/1/0/0/0 0/0 {wifi.fispy.mx <http://wifi.fispy.mx/>} "GET 
>>>>>>>>>>>>>>>>>>> /captive-portal?switch%5Furl=https%3A%2F%2Fportal%2Efispy%2Emx%3A8443%2Flogin
>>>>>>>>>>>>>>>>>>>  HTTP/1.1"
>>>>>>>>>>>>>>>>>>> Feb  2 14:51:44 wifi haproxy[2427]: 10.9.79.52:61132 
>>>>>>>>>>>>>>>>>>> <http://10.9.79.52:61132/> [02/Feb/2022:14:51:44.060] 
>>>>>>>>>>>>>>>>>>> portal-http-10.0.255.99 10.0.255.99-backend/127.0.0.1 
>>>>>>>>>>>>>>>>>>> <http://127.0.0.1/> 0/0/0/129/129 200 7146 - - ---- 
>>>>>>>>>>>>>>>>>>> 4/2/0/0/0 0/0 {wifi.fispy.mx <http://wifi.fispy.mx/>} "GET 
>>>>>>>>>>>>>>>>>>> /access?lang= HTTP/1.1"
>>>>>>>>>>>>>>>>>>> Feb  2 14:51:49 wifi haproxy[2427]: 10.9.79.52:61133 
>>>>>>>>>>>>>>>>>>> <http://10.9.79.52:61133/> [02/Feb/2022:14:51:49.219] 
>>>>>>>>>>>>>>>>>>> portal-http-10.0.255.99 static/127.0.0.1 
>>>>>>>>>>>>>>>>>>> <http://127.0.0.1/> 0/0/0/1/1 200 228 - - ---- 4/2/0/0/0 
>>>>>>>>>>>>>>>>>>> 0/0 {10.0.255.99} "GET 
>>>>>>>>>>>>>>>>>>> /common/network-access-detection.gif?r=1643838716546 
>>>>>>>>>>>>>>>>>>> HTTP/1.1"
>>>>>>>>>>>>>>>>>>> Feb  2 14:51:55 wifi haproxy[2427]: 10.9.79.52:61130 
>>>>>>>>>>>>>>>>>>> <http://10.9.79.52:61130/> [02/Feb/2022:14:51:55.287] 
>>>>>>>>>>>>>>>>>>> portal-https-10.0.255.99~ 10.0.255.99-backend/127.0.0.1 
>>>>>>>>>>>>>>>>>>> <http://127.0.0.1/> 0/0/0/136/136 302 1018 - - ---- 
>>>>>>>>>>>>>>>>>>> 4/1/0/0/0 0/0 {wifi.fispy.mx <http://wifi.fispy.mx/>} "GET 
>>>>>>>>>>>>>>>>>>> /captive-portal?switch%5Furl=https%3A%2F%2Fportal%2Efispy%2Emx%3A8443%2Flogin
>>>>>>>>>>>>>>>>>>>  HTTP/1.1”
>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> On Feb 2, 2022, at 7:12 PM, Fabrice Durand 
>>>>>>>>>>>>>>>>>>>> <oeufd...@gmail.com <mailto:oeufd...@gmail.com>> wrote:
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> Hello Jorge,
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> i will have a look closer.
>>>>>>>>>>>>>>>>>>>> But i have a question, when the device is forwarded to the 
>>>>>>>>>>>>>>>>>>>> captive portal, (just before 
>>>>>>>>>>>>>>>>>>>> https://wifi.fispy.mx/captive-portal?switch%5Furl=https%3A%2F%2Fportal%2Efispy%2Emx%3A8443%2Flogin
>>>>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>>>>> <https://wifi.fispy.mx/captive-portal?switch_url=https://portal.fispy.mx:8443/login>)
>>>>>>>>>>>>>>>>>>>>  , what is the url ?
>>>>>>>>>>>>>>>>>>>> You should be able to see it in the haproxy-portal.log 
>>>>>>>>>>>>>>>>>>>> file.
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> Regards
>>>>>>>>>>>>>>>>>>>> Fabrice
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> Le mer. 2 févr. 2022 à 10:18, Jorge Nolla 
>>>>>>>>>>>>>>>>>>>> <jno...@gmail.com <mailto:jno...@gmail.com>> a écrit :
>>>>>>>>>>>>>>>>>>>> Hi Fabrice,
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> We almost have the configuration working, but are not sure 
>>>>>>>>>>>>>>>>>>>> how to get the redirect to the client to work correctly. 
>>>>>>>>>>>>>>>>>>>> Attached is the documentation for Cisco ISE which we used 
>>>>>>>>>>>>>>>>>>>> for PacketFence as well.
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> Portal.fispy.mx <http://portal.fispy.mx/> is the Huawei AC.
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> This is the format the client should get from PacketFence. 
>>>>>>>>>>>>>>>>>>>> This is the only piece we are missing for this to work.
>>>>>>>>>>>>>>>>>>>> https://portal.fispy.mx:8443/login?username=($username)&password=($password)
>>>>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>>>>> <https://portal.fispy.mx:8443/login?username=($username)&password=($password)>
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> If we manually click on the link above, then the flow of 
>>>>>>>>>>>>>>>>>>>> traffic works correctly CLIENT > AC > RADIUS 
>>>>>>>>>>>>>>>>>>>> (PacketFence), and authentication works. The problem is 
>>>>>>>>>>>>>>>>>>>> that when the user logs in to the portal the redirect is 
>>>>>>>>>>>>>>>>>>>> broken. The parameter for the redirect that PacketFence is 
>>>>>>>>>>>>>>>>>>>> serving, comes from a configuration parameter within the 
>>>>>>>>>>>>>>>>>>>> AC. This configuration works fine for Cisco ISE, but the 
>>>>>>>>>>>>>>>>>>>> URL format is not working for PacketFence.
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> When we configure the redirect this is what the client is 
>>>>>>>>>>>>>>>>>>>> getting from PacketFence
>>>>>>>>>>>>>>>>>>>> https://wifi.fispy.mx/captive-portal?switch%5Furl=https%3A%2F%2Fportal%2Efispy%2Emx%3A8443%2Flogin
>>>>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>>>>> <https://wifi.fispy.mx/captive-portal?switch%5Furl=https%3A%2F%2Fportal%2Efispy%2Emx%3A8443%2Flogin>
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> url-template name PacketFence
>>>>>>>>>>>>>>>>>>>>  url https://wifi.fispy.mx/captive-portal 
>>>>>>>>>>>>>>>>>>>> <https://wifi.fispy.mx/captive-portal>
>>>>>>>>>>>>>>>>>>>>  url-parameter login-url switch_url 
>>>>>>>>>>>>>>>>>>>> https://portal.fispy.mx:8443/login 
>>>>>>>>>>>>>>>>>>>> <https://portal.fispy.mx:8443/login>  <<< THIS IS THE 
>>>>>>>>>>>>>>>>>>>> PARAMETER FOR THE REDIRECT TO PACKETFENCE
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> AC CONFIG
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> authentication-profile name PacketFence
>>>>>>>>>>>>>>>>>>>>  portal-access-profile PacketFence
>>>>>>>>>>>>>>>>>>>>  free-rule-template default_free_rule
>>>>>>>>>>>>>>>>>>>>  authentication-scheme PacketFence
>>>>>>>>>>>>>>>>>>>>  accounting-scheme PacketFence
>>>>>>>>>>>>>>>>>>>>  radius-server PacketFence
>>>>>>>>>>>>>>>>>>>>  force-push url https://www.fispy.mx 
>>>>>>>>>>>>>>>>>>>> <https://www.fispy.mx/>
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> radius-server template PacketFence
>>>>>>>>>>>>>>>>>>>>  radius-server shared-key cipher 
>>>>>>>>>>>>>>>>>>>> %^%#*)l=:1.X-Yd$\<~orEF@]<}NMejv3)E^\6;7:NUY%^%#
>>>>>>>>>>>>>>>>>>>>  radius-server authentication 10.0.255.99 1812 source 
>>>>>>>>>>>>>>>>>>>> ip-address 10.7.255.2 weight 90
>>>>>>>>>>>>>>>>>>>>  radius-server accounting 10.0.255.99 1813 source 
>>>>>>>>>>>>>>>>>>>> ip-address 10.7.255.2 weight 80
>>>>>>>>>>>>>>>>>>>>  undo radius-server user-name domain-included
>>>>>>>>>>>>>>>>>>>>  calling-station-id mac-format unformatted
>>>>>>>>>>>>>>>>>>>>  called-station-id wlan-user-format ac-mac
>>>>>>>>>>>>>>>>>>>>  radius-server attribute translate
>>>>>>>>>>>>>>>>>>>>  radius-attribute disable HW-NAS-Startup-Time-Stamp send
>>>>>>>>>>>>>>>>>>>>  radius-attribute disable HW-IP-Host-Address send
>>>>>>>>>>>>>>>>>>>>  radius-attribute disable HW-Connect-ID send
>>>>>>>>>>>>>>>>>>>>  radius-attribute disable HW-Version send
>>>>>>>>>>>>>>>>>>>>  radius-attribute disable HW-Product-ID send
>>>>>>>>>>>>>>>>>>>>  radius-attribute disable HW-Domain-Name send
>>>>>>>>>>>>>>>>>>>>  radius-attribute disable HW-User-Extend-Info send
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> url-template name PacketFence
>>>>>>>>>>>>>>>>>>>>  url https://wifi.fispy.mx/captive-portal 
>>>>>>>>>>>>>>>>>>>> <https://wifi.fispy.mx/captive-portal>
>>>>>>>>>>>>>>>>>>>>  url-parameter login-url switch_url 
>>>>>>>>>>>>>>>>>>>> https://portal.fispy.mx:8443/login 
>>>>>>>>>>>>>>>>>>>> <https://portal.fispy.mx:8443/login>  <<< THIS IS THE 
>>>>>>>>>>>>>>>>>>>> PARAMETER FOR THE REDIRECT TO PACKETFENCE
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> web-auth-server PacketFence
>>>>>>>>>>>>>>>>>>>>  server-ip 10.0.255.99
>>>>>>>>>>>>>>>>>>>>  port 443
>>>>>>>>>>>>>>>>>>>>  url-template PacketFence
>>>>>>>>>>>>>>>>>>>>  protocol http
>>>>>>>>>>>>>>>>>>>>  http get-method enable
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> portal-access-profile name PacketFence
>>>>>>>>>>>>>>>>>>>>  web-auth-server PacketFence direct
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> authentication-scheme PacketFence
>>>>>>>>>>>>>>>>>>>>   authentication-mode radius
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> wlan
>>>>>>>>>>>>>>>>>>>>  security-profile name FISPY-WiFi
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>  vap-profile name FISPY-WiFi
>>>>>>>>>>>>>>>>>>>>   service-vlan vlan-id 900
>>>>>>>>>>>>>>>>>>>>   permit-vlan vlan-id 900
>>>>>>>>>>>>>>>>>>>>   ssid-profile FISPY-WiFi
>>>>>>>>>>>>>>>>>>>>   security-profile FISPY-WiFi
>>>>>>>>>>>>>>>>>>>>   authentication-profile PacketFence
>>>>>>>>>>>>>>>>>>>>   sta-network-detect disable
>>>>>>>>>>>>>>>>>>>>   service-experience-analysis enable
>>>>>>>>>>>>>>>>>>>>   mdns-snooping enable
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> ###CISCO ISE CONFIG TO COMPARE###
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> url-template name CISCO-ISE
>>>>>>>>>>>>>>>>>>>>  url 
>>>>>>>>>>>>>>>>>>>> https://captive.fispy.mx:8443/portal/PortalSetup.action#portal=7cf5ac1d-5dbf-4b36-aeee-b9590fd24c02
>>>>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>>>>> <https://captive.fispy.mx:8443/portal/PortalSetup.action#portal=7cf5ac1d-5dbf-4b36-aeee-b9590fd24c02>
>>>>>>>>>>>>>>>>>>>>  parameter start-mark #
>>>>>>>>>>>>>>>>>>>>  url-parameter login-url switch_url 
>>>>>>>>>>>>>>>>>>>> https://portal.fispy.mx:8443/login 
>>>>>>>>>>>>>>>>>>>> <https://portal.fispy.mx:8443/login>
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> ####################################
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>> On Feb 2, 2022, at 6:17 AM, Fabrice Durand 
>>>>>>>>>>>>>>>>>>>>> <oeufd...@gmail.com <mailto:oeufd...@gmail.com>> wrote:
>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>> Hello Jorge,
>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>> do you have any Huawei documentation to implement that ?
>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>> Regards
>>>>>>>>>>>>>>>>>>>>> Fabrice
>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>> Le mer. 26 janv. 2022 à 15:59, Jorge Nolla via 
>>>>>>>>>>>>>>>>>>>>> PacketFence-users 
>>>>>>>>>>>>>>>>>>>>> <packetfence-users@lists.sourceforge.net 
>>>>>>>>>>>>>>>>>>>>> <mailto:packetfence-users@lists.sourceforge.net>> a écrit 
>>>>>>>>>>>>>>>>>>>>> :
>>>>>>>>>>>>>>>>>>>>> Hi Team,
>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>> We were wondering if anyone has had any success in 
>>>>>>>>>>>>>>>>>>>>> configuring Web Auth for the Huawei AC? It’s somewhat 
>>>>>>>>>>>>>>>>>>>>> critical for us to get this going.
>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>> Thank you!
>>>>>>>>>>>>>>>>>>>>> Jorge
>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>> _______________________________________________
>>>>>>>>>>>>>>>>>>>>> PacketFence-users mailing list  
>>>>>>>>>>>>>>>>>>>>> PacketFence-users@lists.sourceforge.net 
>>>>>>>>>>>>>>>>>>>>> <mailto:PacketFence-users@lists.sourceforge.net>
>>>>>>>>>>>>>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>>>>>> <https://lists.sourceforge.net/lists/listinfo/packetfence-users>
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> 
>>>>>>>>>>>>> 
>>>>>>>>>>>> 
>>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>> 
>>>>>>>> 
>>>>>>> 
>>>>>> 
>>>>> 
>>>> 
>>> 
>> 
> 

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to