Fabrice,

PF is sending the accounting data to the billing server. The problem is the 
info does not match:

PF: 10.0.255.99
Billing server (Splynx): 10.0.254.100



2022-02-10 11:39:32.968605 (12417) Accounting-Request Id 80 
any:10.0.255.99:54246 -> 10.0.254.100:1813 +165.413
        

        User-Name = "f0:2f:4b:14:67:d9”         << this needs to be the 
username entered in the portal and not the MAC of the device of this to work. 
How can we modify this?
        NAS-IP-Address = 10.7.255.2
        NAS-Port = 900
        Service-Type = Framed-User
        Framed-Protocol = PPP
        Framed-IP-Address = 10.9.120.192
        Called-Station-Id = "c0:f6:c2:a5:c4:d0:FISPY-WiFi"
        Calling-Station-Id = "f0:2f:4b:14:67:d9"
        NAS-Identifier = "AirEngine9700-M1"
        Proxy-State = 0x313734
        NAS-Port-Type = Wireless-802.11
        Acct-Status-Type = Stop
        Acct-Delay-Time = 0
        Acct-Input-Octets = 432779
        Acct-Output-Octets = 22133343
        Acct-Session-Id = "AirEngi000000000009001d099206001ed"
        Acct-Authentic = RADIUS
        Acct-Session-Time = 299
        Acct-Input-Packets = 2643
        Acct-Output-Packets = 16634
        Acct-Terminate-Cause = Session-Timeout
        Acct-Input-Gigawords = 0
        Acct-Output-Gigawords = 0
        Event-Timestamp = "Feb 10 2022 11:39:32 MST"
        NAS-Port-Id = "slot=0;subslot=0;port=0;vlanid=900"
        Huawei-Connect-ID = 393709
        Huawei-IPHost-Addr = "10.9.120.192 f0:2f:4b:14:67:d9"
        Huawei-Loopback-Address = "C0F6-C2A5-C4D0"
        Huawei-User-Mac = "\000\000\000\003"
        Attr-26.29464.32 = 
0x3165623139616265663234666132396334383731346130343334323334323936
        Authenticator-Field = 0xb28b0b1cdf553d1c27a431568347fc4b




> On Feb 9, 2022, at 6:12 PM, Jorge Nolla <jno...@gmail.com> wrote:
> 
> Hi Fabrice,
> 
> This is the output when It receives an accounting message from the controller:
> 
> 
> ^C[root@wifi jnolla]# radsniff -i any -f "port 1813" -x
> Logging all events
> Sniffing on (any)
> 2022-02-09 18:10:33.642001 (1) Accounting-Request Id 147 any:10.7.255.2:62395 
> -> 10.0.255.99:1813 +0.000
>         User-Name = "62:ca:49:92:a0:3d"
>         NAS-IP-Address = 10.7.255.2
>         NAS-Port = 900
>         Service-Type = Framed-User
>         Framed-Protocol = PPP
>         Framed-IP-Address = 10.9.239.159
>         Called-Station-Id = "C0-F6-C2-A5-C4-D0:FISPY-WiFi"
>         Calling-Station-Id = "62ca-4992-a03d"
>         NAS-Identifier = "AirEngine9700-M1"
>         NAS-Port-Type = Wireless-802.11
>         Acct-Status-Type = Interim-Update
>         Acct-Delay-Time = 0
>         Acct-Input-Octets = 131762920
>         Acct-Output-Octets = 194531281
>         Acct-Session-Id = "AirEngi0000000000090083f40606001b4"
>         Acct-Authentic = RADIUS
>         Acct-Session-Time = 33887
>         Acct-Input-Packets = 211695
>         Acct-Output-Packets = 221103
>         Acct-Input-Gigawords = 0
>         Acct-Output-Gigawords = 0
>         Event-Timestamp = "Feb  9 2022 18:10:32 MST"
>         NAS-Port-Id = "slot=0;subslot=0;port=0;vlanid=900"
>         Huawei-Loopback-Address = "C0F6-C2A5-C4D0"
>         Huawei-User-Mac = "\000\000\000\003"
>         Authenticator-Field = 0x86cc68cf43a59904f7d3c0e36e910008
> 2022-02-09 18:10:33.661871 (2) Accounting-Response Id 147 
> any:10.7.255.2:62395 <- 10.0.255.99:1813 +0.019 +0.019
>         Reply-Message = "Accounting ok"
>         Authenticator-Field = 0xdfccea5174f4312f6e0784825583dbdf
> 2022-02-09 18:10:38.861871 (1) Cleaning up request packet ID 147
> 2022-02-09 18:10:49.323597 (3) Accounting-Request Id 148 any:10.7.255.2:62395 
> -> 10.0.255.99:1813 +15.681
>         User-Name = "62:ca:49:92:a0:3d"
>         NAS-IP-Address = 10.7.255.2
>         NAS-Port = 900
>         Service-Type = Framed-User
>         Framed-Protocol = PPP
>         Framed-IP-Address = 10.9.239.159
>         Called-Station-Id = "C0-F6-C2-A5-C4-D0:FISPY-WiFi"
>         Calling-Station-Id = "62ca-4992-a03d"
>         NAS-Identifier = "AirEngine9700-M1"
>         NAS-Port-Type = Wireless-802.11
>         Acct-Status-Type = Interim-Update
>         Acct-Delay-Time = 0
>         Acct-Input-Octets = 131775665
>         Acct-Output-Octets = 194533397
>         Acct-Session-Id = "AirEngi0000000000090083f40606001b4"
>         Acct-Authentic = RADIUS
>         Acct-Session-Time = 33902
>         Acct-Input-Packets = 211773
>         Acct-Output-Packets = 221123
>         Acct-Input-Gigawords = 0
>         Acct-Output-Gigawords = 0
>         Event-Timestamp = "Feb  9 2022 18:10:48 MST"
>         NAS-Port-Id = "slot=0;subslot=0;port=0;vlanid=900"
>         Huawei-Loopback-Address = "C0F6-C2A5-C4D0"
>         Huawei-User-Mac = "\000\000\000\003"
>         Authenticator-Field = 0x3fbec8864dcb325273ce4ba1da28e690
> 2022-02-09 18:10:49.342798 (4) Accounting-Response Id 148 
> any:10.7.255.2:62395 <- 10.0.255.99:1813 +15.700 +0.019
>         Reply-Message = "Accounting ok"
>         Authenticator-Field = 0x15b54405e404decb5b3db3f58cc8d2cb
> 2022-02-09 18:10:54.542798 (3) Cleaning up request packet ID 148
> 
> 
> 
> 
>> On Feb 9, 2022, at 6:04 PM, Fabrice Durand <oeufd...@gmail.com 
>> <mailto:oeufd...@gmail.com>> wrote:
>> 
>> You have to restart pfacct and radiusd-acct.
>> 
>> And check the accounting packet, not sure you have the realm in the username 
>> attribute.
>> 
>> raddebug -f /usr/local/pf/var/run/radiusd-acct.sock -t 300
>> or 
>> radsniff -i any -f "port 1813" -x
>> 
>> Regards
>> Fabrice
>> 
>> Le mer. 9 févr. 2022 à 19:57, Jorge Nolla <jno...@gmail.com 
>> <mailto:jno...@gmail.com>> a écrit :
>> I noticed pfacct running and made the change, still no luck.
>> 
>> <Screen Shot 2022-02-09 at 5.56.32 PM.png>
>> 
>>> On Feb 9, 2022, at 5:55 PM, Fabrice Durand <oeufd...@gmail.com 
>>> <mailto:oeufd...@gmail.com>> wrote:
>>> 
>>> Hello Jorge,
>>> you have to enable radius-acct service.
>>> 
>>> It´s radius-acct who is able to proxy the request to another server, not 
>>> pfacct (btw you can keep it enabled).
>>> 
>>> Regards
>>> Fabrice
>>> 
>>> 
>>> Le mer. 9 févr. 2022 à 19:21, Jorge Nolla <jno...@gmail.com 
>>> <mailto:jno...@gmail.com>> a écrit :
>>> 
>>> Another configuration file with references to the billing server Splynx:
>>> 
>>> [root@wifi raddb]# cat mods-config/perl/multi_domain_constants.pm 
>>> <http://multi_domain_constants.pm/>
>>> package multi_domain_constants;
>>> 
>>> our $VAR1 = {
>>>           '1' => {
>>>                    'ConfigRealm' => {
>>>                                       'local' => {
>>>                                                    'radius_strip_username' 
>>> => 'disabled',
>>>                                                    'eap' => 'default',
>>>                                                    'admin_strip_username' 
>>> => 'disabled',
>>>                                                    'portal_strip_username' 
>>> => 'disabled'
>>>                                                  },
>>>                                       'default' => {
>>>                                                      
>>> 'radius_acct_proxy_type' => 'load-balance',
>>>                                                      
>>> 'radius_auth_compute_in_pf' => 'disabled',
>>>                                                      
>>> 'eduroam_radius_auth_proxy_type' => 'keyed-balance',
>>>                                                      
>>> 'radius_auth_proxy_type' => 'keyed-balance',
>>>                                                      
>>> 'portal_strip_username' => 'disabled',
>>>                                                      'admin_strip_username' 
>>> => 'disabled',
>>>                                                      'radius_auth' => '',
>>>                                                      
>>> 'radius_strip_username' => 'disabled',
>>>                                                      'eap' => 'default',
>>>                                                      'eduroam_radius_acct' 
>>> => '',
>>>                                                      
>>> 'eduroam_radius_acct_proxy_type' => 'load-balance',
>>>                                                      
>>> 'permit_custom_attributes' => 'disabled',
>>>                                                      
>>> 'eduroam_radius_auth_compute_in_pf' => 'enabled',
>>>                                                      'eduroam_radius_auth' 
>>> => '',
>>>                                                      'radius_acct' => ''
>>>                                                    },
>>>                                       'null' => {
>>>                                                   'eap' => 'default',
>>>                                                   'radius_strip_username' 
>>> => 'disabled',
>>>                                                   'admin_strip_username' => 
>>> 'disabled',
>>>                                                   'portal_strip_username' 
>>> => 'disabled'
>>>                                                 },
>>>                                       'fispy.mx <http://fispy.mx/>' => {
>>>                                                       'eduroam_radius_acct' 
>>> => '',
>>>                                                       'eap' => 'default',
>>>                                                       
>>> 'radius_strip_username' => 'enabled',
>>>                                                       
>>> 'admin_strip_username' => 'enabled',
>>>                                                       'radius_auth' => 
>>> 'Splynx',
>>>                                                       
>>> 'portal_strip_username' => 'enabled',
>>>                                                       
>>> 'eduroam_radius_auth_proxy_type' => 'keyed-balance',
>>>                                                       
>>> 'radius_auth_proxy_type' => 'keyed-balance',
>>>                                                       
>>> 'radius_acct_proxy_type' => 'load-balance',
>>>                                                       
>>> 'radius_auth_compute_in_pf' => 'enabled',
>>>                                                       'eduroam_radius_auth' 
>>> => '',
>>>                                                       'radius_acct' => 
>>> 'Splynx',
>>>                                                       
>>> 'eduroam_radius_auth_compute_in_pf' => 'enabled',
>>>                                                       
>>> 'eduroam_radius_acct_proxy_type' => 'load-balance',
>>>                                                       
>>> 'permit_custom_attributes' => 'disabled'
>>>                                                     }
>>>                                     },
>>>                    'ConfigDomain' => {},
>>>                    'ConfigOrderedRealm' => [
>>>                                              'default',
>>>                                              'local',
>>>                                              'null',
>>>                                              'fispy.mx <http://fispy.mx/>'
>>>                                            ]
>>>                  },
>>>           '0' => {
>>>                    'ConfigDomain' => {},
>>>                    'ConfigRealm' => {},
>>>                    'ConfigOrderedRealm' => []
>>>                  }
>>>         };
>>> our $DATA = $VAR1;
>>> 1;
>>> [root@wifi raddb]# 
>>> 
>>> 
>>> 
>>>> On Feb 9, 2022, at 5:19 PM, Jorge Nolla <jno...@gmail.com 
>>>> <mailto:jno...@gmail.com>> wrote:
>>>> 
>>>> Hi Team,
>>>> 
>>>> Still can’t get accounting to proxy to the billing server. I don’t see the 
>>>> configuration on the proxy.conf so I imagine is pulling from this file.
>>>> 
>>>> 
>>>> [root@wifi raddb]# cat proxy.conf.inc
>>>> # This file is generated from a template at 
>>>> /usr/local/pf/conf/radiusd/proxy.conf.inc
>>>> # Any changes made to this file will be lost on restart
>>>> 
>>>> # Eduroam integration is not configured
>>>> 
>>>> realm default {
>>>> 
>>>> }
>>>> realm local {
>>>> 
>>>> }
>>>> realm null {
>>>> 
>>>> }
>>>> realm fispy.mx <http://fispy.mx/> {
>>>> 
>>>> auth_pool = auth_pool_fispy.mx <http://auth_pool_fispy.mx/>
>>>> acct_pool = acct_pool_fispy.mx <http://acct_pool_fispy.mx/>
>>>> }
>>>> home_server_pool auth_pool_fispy.mx <http://auth_pool_fispy.mx/> {
>>>> type = keyed-balance
>>>> home_server = Splynx
>>>> }
>>>> 
>>>> home_server_pool acct_pool_fispy.mx <http://acct_pool_fispy.mx/> {
>>>> type = load-balance
>>>> home_server = Splynx
>>>> }
>>>> 
>>>> 
>>>> realm eduroam.default {
>>>> 
>>>> }
>>>> 
>>>> realm eduroam.local {
>>>> 
>>>> }
>>>> 
>>>> realm eduroam.null {
>>>> 
>>>> }
>>>> 
>>>> realm eduroam.fispy.mx <http://eduroam.fispy.mx/> {
>>>> 
>>>> }
>>>> 
>>>> 
>>>> 
>>>> 
>>>> home_server Splynx {
>>>> ipaddr = 10.0.254.100
>>>> port = 1812
>>>> secret = @Put@Madr3
>>>> type = auth+acct
>>>> status_check = status-server
>>>> }
>>>> 
>>>> 
>>>> 
>>>> # pfacct configuration
>>>> 
>>>> realm pfacct {
>>>>     acct_pool = pfacct_pool
>>>>     nostrip
>>>> }
>>>> 
>>>> home_server_pool pfacct_pool {
>>>>     home_server = pfacct_local
>>>> }
>>>> 
>>>> home_server pfacct_local {
>>>>     type = acct
>>>>     ipaddr = 127.0.0.1
>>>>     port = 1813
>>>>     secret = 'ZDQ3YzUzMjkxM2M1NjBhM2IyMTJjNWE0'
>>>>     src_ipaddr = 10.0.255.99
>>>> }
>>>> 
>>>>> On Feb 8, 2022, at 11:51 AM, Jorge Nolla <jno...@gmail.com 
>>>>> <mailto:jno...@gmail.com>> wrote:
>>>>> 
>>>>> Fabrice,
>>>>> 
>>>>> For some reason I cannot get accounting forwarding to the Billing/Radius 
>>>>> Server. This server has the plans for the customers.
>>>>> 
>>>>> <Screen Shot 2022-02-08 at 11.48.23 AM.png>
>>>>> 
>>>>> 
>>>>> <Screen Shot 2022-02-08 at 11.50.20 AM.png>
>>>>> 
>>>>> 
>>>>> <Screen Shot 2022-02-08 at 11.48.01 AM.png>
>>>>> 
>>>>> 
>>>>> <Screen Shot 2022-02-08 at 11.51.33 AM.png>
>>>>> 
>>>>>> On Feb 8, 2022, at 11:39 AM, Jorge Nolla <jno...@gmail.com 
>>>>>> <mailto:jno...@gmail.com>> wrote:
>>>>>> 
>>>>>> Hi Fabrice,
>>>>>> 
>>>>>> It worked. I had to change to HTTPS and DNS for the cert on the server 
>>>>>> to work. We also changed the method to GET. Will try POST, not sure if 
>>>>>> this will make a difference.
>>>>>> 
>>>>>>  my $html_form = qq[
>>>>>>       <form name="weblogin_form" data-autosubmit="1000" method="GET" 
>>>>>> action="https://portal.fispy.mx:8443/login 
>>>>>> <https://portal.fispy.mx:8443/login>">
>>>>>>        <input type="hidden" name="username" value="$mac">
>>>>>>        <input type="hidden" name="password" value="$mac">
>>>>>>       </form>
>>>>>>       <script src="/content/autosubmit.js" 
>>>>>> type="text/javascript"></script>
>>>>>> 
>>>>>> Here is the a sample of the radius info on PF. Top entry is with new 
>>>>>> configuration MAC address as username. Bottom one is the old 
>>>>>> configuration, where we were submitting the url request manually. 
>>>>>> 
>>>>>> <Screen Shot 2022-02-08 at 11.34.52 AM.png>
>>>>>> 
>>>>>> 
>>>>>>> On Feb 8, 2022, at 9:30 AM, Fabrice Durand <oeufd...@gmail.com 
>>>>>>> <mailto:oeufd...@gmail.com>> wrote:
>>>>>>> 
>>>>>>> Yes, that's it. 
>>>>>>> 
>>>>>>> Le mar. 8 févr. 2022 à 11:23, Jorge Nolla <jno...@gmail.com 
>>>>>>> <mailto:jno...@gmail.com>> a écrit :
>>>>>>> Fabrice,
>>>>>>> 
>>>>>>> The document you had provided didn’t layout the configuration steps. I 
>>>>>>> think this might be the correct document for the configuration you are 
>>>>>>> referring. If you have a chance take a look and let me know.
>>>>>>> 
>>>>>>> https://support.huawei.com/enterprise/mx/knowledge/EKB1100055064 
>>>>>>> <https://support.huawei.com/enterprise/mx/knowledge/EKB1100055064>
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>>> On Feb 8, 2022, at 9:14 AM, Fabrice Durand <oeufd...@gmail.com 
>>>>>>>> <mailto:oeufd...@gmail.com>> wrote:
>>>>>>>> 
>>>>>>>> You can try that instead:
>>>>>>>> 
>>>>>>>>         my $html_form = qq[
>>>>>>>>         <form name="weblogin_form" data-autosubmit="1000" 
>>>>>>>> method="POST" action="http://$controller_ip:8443/login 
>>>>>>>> <http://$controller_ip:8443/login>">
>>>>>>>>             <input type="hidden" name="username" value="$mac">
>>>>>>>>             <input type="hidden" name="password" value="$mac">
>>>>>>>>         </form>
>>>>>>>>         <script src="/content/autosubmit.js" 
>>>>>>>> type="text/javascript"></script>
>>>>>>>>     ];
>>>>>>>> 
>>>>>>>> It will pass the mac address of the device in the radius request as 
>>>>>>>> username and password instead of the real username and password who 
>>>>>>>> has been authenticated previously on the portal.
>>>>>>>> Then you just need to configure the registration role in the switch 
>>>>>>>> configuration to be -1 (packetfence side) and if the device is unreg 
>>>>>>>> then the request will be rejected.
>>>>>>>> 
>>>>>>>> 
>>>>>>>> Le mar. 8 févr. 2022 à 11:04, Jorge Nolla <jno...@gmail.com 
>>>>>>>> <mailto:jno...@gmail.com>> a écrit :
>>>>>>>> Hi Fabrice,
>>>>>>>> 
>>>>>>>> Let me check what the difference is in configuration on the AC side, 
>>>>>>>> I’ll report within the hour. Any clues as to why the parameters are 
>>>>>>>> not being passed?
>>>>>>>> 
>>>>>>>> 
>>>>>>>>> On Feb 8, 2022, at 8:55 AM, Fabrice Durand <oeufd...@gmail.com 
>>>>>>>>> <mailto:oeufd...@gmail.com>> wrote:
>>>>>>>>> 
>>>>>>>>> Hello Jorge,
>>>>>>>>> 
>>>>>>>>> i really think that it´s not the correct way to support the web auth 
>>>>>>>>> in Huawei.
>>>>>>>>> The only thing you can do with the portal is to authenticate with a 
>>>>>>>>> username and password, there is no way to do anything else 
>>>>>>>>> (sms/email/sponsor/....).
>>>>>>>>> 
>>>>>>>>> Also when you authenticate on the portal , the portal validate your 
>>>>>>>>> username and password and with the workflow you have it will 
>>>>>>>>> authenticate twice (portal and radius) and it doesn´t make sense.
>>>>>>>>> 
>>>>>>>>> So if you want to keep this way then you will need a simple html page 
>>>>>>>>> with a username and password field that post on 
>>>>>>>>> https://portal.fispy.mx:8443/login 
>>>>>>>>> <https://portal.fispy.mx:8443/login> then configure packetfence to 
>>>>>>>>> authenticate the username and password from radius.
>>>>>>>>> 
>>>>>>>>> The other way who looks really better is to use that: 
>>>>>>>>> (https://support.huawei.com/enterprise/en/doc/EDOC1100008282/4d5793da/understanding-nac#dc_cfg_nac_2006u_1_2
>>>>>>>>>  
>>>>>>>>> <https://support.huawei.com/enterprise/en/doc/EDOC1100008282/4d5793da/understanding-nac#dc_cfg_nac_2006u_1_2>)
>>>>>>>>> 
>>>>>>>>> <download.png>
>>>>>>>>>  
>>>>>>>>> As i said , it´s exactly how it works with the cisco wlc and it will 
>>>>>>>>> support all authentication mechanisms available on the portal.
>>>>>>>>> 
>>>>>>>>> Regards
>>>>>>>>> Fabrice
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> Le lun. 7 févr. 2022 à 20:25, Jorge Nolla <jno...@gmail.com 
>>>>>>>>> <mailto:jno...@gmail.com>> a écrit :
>>>>>>>>> 
>>>>>>>>> Radius request from the AC once it receives the correct values. This 
>>>>>>>>> is sent back to Radius which in this case is PF
>>>>>>>>> 
>>>>>>>>> User-Name = “5blz”  <<< VALUE NEEDED IN URL as username
>>>>>>>>> User-Password = "******”   <<< VALUE NEEDED IN URL as password
>>>>>>>>> NAS-IP-Address = 10.7.255.2
>>>>>>>>> NAS-Port = 900
>>>>>>>>> Service-Type = Framed-User
>>>>>>>>> Framed-Protocol = PPP
>>>>>>>>> Framed-IP-Address = 10.9.91.31
>>>>>>>>> Called-Station-Id = "c0:f6:c2:a5:c4:d0:FISPY-WiFi"
>>>>>>>>> Calling-Station-Id = "f0:2f:4b:14:67:d9"
>>>>>>>>> NAS-Identifier = "AirEngine9700-M1"
>>>>>>>>> NAS-Port-Type = Wireless-802.11
>>>>>>>>> Acct-Session-Id = "AirEngi00000000000900d5d66c0600187"
>>>>>>>>> Event-Timestamp = "Feb  7 2022 18:05:13 MST"
>>>>>>>>> NAS-Port-Id = "slot=0;subslot=0;port=0;vlanid=900"
>>>>>>>>> Huawei-Loopback-Address = "C0F6-C2A5-C4D0"
>>>>>>>>> Huawei-User-Mac = "\000\000\000\003"
>>>>>>>>> Stripped-User-Name = "5blz"
>>>>>>>>> Realm = "null"
>>>>>>>>> FreeRADIUS-Client-IP-Address = 10.7.255.2
>>>>>>>>> Called-Station-SSID = "FISPY-WiFi"
>>>>>>>>> PacketFence-KeyBalanced = "aa86741e358fa86079a91aaf4dc581f9"
>>>>>>>>> PacketFence-Radius-Ip = "10.0.255.99"
>>>>>>>>> SQL-User-Name = "5blz"
>>>>>>>>> 
>>>>>>>>>> On Feb 7, 2022, at 3:58 PM, Jorge Nolla <jno...@gmail.com 
>>>>>>>>>> <mailto:jno...@gmail.com>> wrote:
>>>>>>>>>> 
>>>>>>>>>> Hi Fabrice,
>>>>>>>>>> 
>>>>>>>>>> I did hardcode as follow:
>>>>>>>>>> 
>>>>>>>>>> <form name="weblogin_form" data-autosubmit="1000" method="GET" 
>>>>>>>>>> action="https://portal.fispy.mx:8443/login?username=bob&password=bob 
>>>>>>>>>> <https://portal.fispy.mx:8443/login?username=bob&password=bob>" 
>>>>>>>>>> style="display:none">
>>>>>>>>>> 
>>>>>>>>>> But the redirect which the client is getting, is only this part, not 
>>>>>>>>>> sure why:
>>>>>>>>>> 
>>>>>>>>>> https://portal.fispy.mx:8443/login? 
>>>>>>>>>> <https://portal.fispy.mx:8443/login?>
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> Here is the flow of the External Portal Authentication as per 
>>>>>>>>>> Huawei. 
>>>>>>>>>> Portal Server - Notify the STA of the login URL
>>>>>>>>>> STA - Send the username and password in HTTP GET POST. When this is 
>>>>>>>>>> configured to use ISE as per the guide, the ISE server sends the 
>>>>>>>>>> redirect to the STA as per the format. 
>>>>>>>>>> https://portal.fispy.mx:8443/login?username=($username)&password=($password)
>>>>>>>>>>  
>>>>>>>>>> <https://portal.fispy.mx:8443/login?username=($username)&password=($password)>
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> <PastedGraphic-1.tiff>
>>>>>>>>>> 
>>>>>>>>>>> On Feb 7, 2022, at 2:51 PM, Fabrice Durand <oeufd...@gmail.com 
>>>>>>>>>>> <mailto:oeufd...@gmail.com>> wrote:
>>>>>>>>>>> 
>>>>>>>>>>> Did you try to hardcode that in the code and see if it works ?
>>>>>>>>>>> 
>>>>>>>>>>> Also i don´t understand the goal of passing the username and 
>>>>>>>>>>> password , is there any extra check after that ? What happen if the 
>>>>>>>>>>> user register by sms/email ?
>>>>>>>>>>> 
>>>>>>>>>>> And i just found that:
>>>>>>>>>>> https://support.huawei.com/enterprise/en/doc/EDOC1100008282/4d5793da/understanding-nac#dc_cfg_nac_2006u_1_1
>>>>>>>>>>>  
>>>>>>>>>>> <https://support.huawei.com/enterprise/en/doc/EDOC1100008282/4d5793da/understanding-nac#dc_cfg_nac_2006u_1_1>
>>>>>>>>>>> Is it something that can be configured on the Hawei ? If yes then 
>>>>>>>>>>> it will mimic the way the Cisco WLC works.
>>>>>>>>>>> 
>>>>>>>>>>> Regards
>>>>>>>>>>> Fabrice
>>>>>>>>>>> 
>>>>>>>>>>> 
>>>>>>>>>>> Le lun. 7 févr. 2022 à 16:01, Jorge Nolla <jno...@gmail.com 
>>>>>>>>>>> <mailto:jno...@gmail.com>> a écrit :
>>>>>>>>>>> Hi Fabrice,
>>>>>>>>>>> 
>>>>>>>>>>> This line needs to be HTTPS for it to work
>>>>>>>>>>> <form name="weblogin_form" data-autosubmit="1000" method="GET" 
>>>>>>>>>>> action="http://$controller_ip:8443/login?username=bob&password=bob 
>>>>>>>>>>> <http://$controller_ip:8443/login?username=bob&password=bob>" 
>>>>>>>>>>> style="display:none”>
>>>>>>>>>>> 
>>>>>>>>>>> This needs to be the username and password which is being entered 
>>>>>>>>>>> by the user in the PF portal, which is the Radius username and 
>>>>>>>>>>> password
>>>>>>>>>>> username=bob&password=bob
>>>>>>>>>>> 
>>>>>>>>>>> 
>>>>>>>>>>>> On Feb 7, 2022, at 12:03 PM, Fabrice Durand <oeufd...@gmail.com 
>>>>>>>>>>>> <mailto:oeufd...@gmail.com>> wrote:
>>>>>>>>>>>> 
>>>>>>>>>>>> I just pushed a fix.
>>>>>>>>>>>> 
>>>>>>>>>>>> cd /usr/local/pf
>>>>>>>>>>>> curl 
>>>>>>>>>>>> https://github.com/inverse-inc/packetfence/commit/7628afddf46e0226667560dc33df192f9c4cf420.diff
>>>>>>>>>>>>  
>>>>>>>>>>>> <https://github.com/inverse-inc/packetfence/commit/7628afddf46e0226667560dc33df192f9c4cf420.diff>
>>>>>>>>>>>>  | patch -p1
>>>>>>>>>>>> and restart
>>>>>>>>>>>> 
>>>>>>>>>>>> Le lun. 7 févr. 2022 à 13:46, Jorge Nolla <jno...@gmail.com 
>>>>>>>>>>>> <mailto:jno...@gmail.com>> a écrit :
>>>>>>>>>>>> Here are the log outputs for /usr/local/pf/logs/packetfence.log
>>>>>>>>>>>> 
>>>>>>>>>>>> 
>>>>>>>>>>>> Feb  7 11:03:04 wifi packetfence_httpd.portal[61371]: 
>>>>>>>>>>>> httpd.portal(61371) INFO: [mac:[undef]] URI '/Huawei' is detected 
>>>>>>>>>>>> as an external captive portal URI (pf::web::externalportal::handle)
>>>>>>>>>>>> Feb  7 11:03:04 wifi packetfence_httpd.portal[61371]: 
>>>>>>>>>>>> httpd.portal(61371) ERROR: [mac:[undef]] Cannot load perl module 
>>>>>>>>>>>> for switch type 'pf::Switch::Huawei'. Either switch type is 
>>>>>>>>>>>> unknown or switch type perl module have compilation errors. See 
>>>>>>>>>>>> the following message for details:  
>>>>>>>>>>>> (pf::web::externalportal::handle)
>>>>>>>>>>>> Feb  7 11:03:06 wifi packetfence_httpd.portal[61370]: 
>>>>>>>>>>>> httpd.portal(61370) INFO: [mac:[undef]] URI '/Huawei' is detected 
>>>>>>>>>>>> as an external captive portal URI (pf::web::externalportal::handle)
>>>>>>>>>>>> Feb  7 11:03:06 wifi packetfence_httpd.portal[61370]: 
>>>>>>>>>>>> httpd.portal(61370) ERROR: [mac:[undef]] Cannot load perl module 
>>>>>>>>>>>> for switch type 'pf::Switch::Huawei'. Either switch type is 
>>>>>>>>>>>> unknown or switch type perl module have compilation errors. See 
>>>>>>>>>>>> the following message for details:  
>>>>>>>>>>>> (pf::web::externalportal::handle)
>>>>>>>>>>>> 
>>>>>>>>>>>> 
>>>>>>>>>>>> 
>>>>>>>>>>>>> On Feb 7, 2022, at 10:50 AM, Jorge Nolla <jno...@gmail.com 
>>>>>>>>>>>>> <mailto:jno...@gmail.com>> wrote:
>>>>>>>>>>>>> 
>>>>>>>>>>>>> Here is the output for HAProxy
>>>>>>>>>>>>> 
>>>>>>>>>>>>> Feb 7 10:48:54 wifi haproxy[2285]: 10.9.215.39:63814 
>>>>>>>>>>>>> <http://10.9.215.39:63814/> [07/Feb/2022:10:48:54.074] 
>>>>>>>>>>>>> portal-https-10.0.255.99~ 10.0.255.99-backend/127.0.0.1 
>>>>>>>>>>>>> <http://127.0.0.1/> 0/0/0/13/13 501 413 - - ---- 2/1/0/0/0 0/0 
>>>>>>>>>>>>> {wifi.fispy.mx <http://wifi.fispy.mx/>} "GET 
>>>>>>>>>>>>> /Huawei?ac-ip=10.7.255.2&userip=10.9.215.39&ssid=FISPY-WiFi&ap-mac=f02f4b1467d9
>>>>>>>>>>>>>  HTTP/1.1”
>>>>>>>>>>>>> 
>>>>>>>>>>>>> 
>>>>>>>>>>>>> 
>>>>>>>>>>>>>> On Feb 7, 2022, at 10:06 AM, Jorge Nolla <jno...@gmail.com 
>>>>>>>>>>>>>> <mailto:jno...@gmail.com>> wrote:
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> Hi Fabrice,
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> From the Pf portal after the patch is applied.
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> type: 'Huawei' is not a valid value The chosen type (Huawei) is 
>>>>>>>>>>>>>> not supported.
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> On Feb 6, 2022, at 6:49 PM, Jorge Nolla <jno...@gmail.com 
>>>>>>>>>>>>>>> <mailto:jno...@gmail.com>> wrote:
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> This is the only option on the config.
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> <Screen Shot 2022-02-06 at 6.48.16 PM.png>
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>> On Feb 6, 2022, at 6:41 PM, Jorge Nolla <jno...@gmail.com 
>>>>>>>>>>>>>>>> <mailto:jno...@gmail.com>> wrote:
>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>> Hi Fabrice,
>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>> Getting an error page from PF
>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>> Not Implemented
>>>>>>>>>>>>>>>> GET no supported for current URL.
>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>> How is the switch supposed to be defined in PF?
>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> On Feb 6, 2022, at 5:55 PM, Fabrice Durand 
>>>>>>>>>>>>>>>>> <oeufd...@gmail.com <mailto:oeufd...@gmail.com>> wrote:
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> I am just not sure what to set for username and password, if 
>>>>>>>>>>>>>>>>> you do sms auth then there is no password.
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> Also in the url it looks that it miss the mac address of the 
>>>>>>>>>>>>>>>>> device , can you try to add  device-mac and see if the device 
>>>>>>>>>>>>>>>>> mac is in the url ?
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> Here the first draft:
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> https://github.com/inverse-inc/packetfence/compare/feature/Huawei_web_auth.diff
>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>> <https://github.com/inverse-inc/packetfence/compare/feature/Huawei_web_auth.diff>
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> cd /usr/local/pf/
>>>>>>>>>>>>>>>>> curl 
>>>>>>>>>>>>>>>>> https://github.com/inverse-inc/packetfence/compare/feature/Huawei_web_auth.diff
>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>> <https://github.com/inverse-inc/packetfence/compare/feature/Huawei_web_auth.diff>
>>>>>>>>>>>>>>>>>  | patch -p1
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> then restart packetfence.
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> On the controller:
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> url-template name PacketFence
>>>>>>>>>>>>>>>>>  url https://wifi.fispy.mx/ 
>>>>>>>>>>>>>>>>> <https://wifi.fispy.mx/captive-portal>Hawei
>>>>>>>>>>>>>>>>>  url-parameter device-ip device-mac ac-ip user-ipaddress 
>>>>>>>>>>>>>>>>> userip ssid ssid user-mac ap-mac
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> So when the device will be forwarded to the portal it should 
>>>>>>>>>>>>>>>>> be able to recognise the mac address and the ip of the device 
>>>>>>>>>>>>>>>>> (in the bottom).
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> Register on the portal and you should be forwarded to 
>>>>>>>>>>>>>>>>> http://$controller_ip:8443/login?username=bob&password=bob 
>>>>>>>>>>>>>>>>> <http://$controller_ip:8443/login?username=bob&password=bob>
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> Let me know how it behave.
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> Regards
>>>>>>>>>>>>>>>>> Fabrice
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>> Le dim. 6 févr. 2022 à 18:58, Jorge Nolla <jno...@gmail.com 
>>>>>>>>>>>>>>>>> <mailto:jno...@gmail.com>> a écrit :
>>>>>>>>>>>>>>>>> Hi Fabrice
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> This is the GET the AC is expecting:
>>>>>>>>>>>>>>>>> https://portal.fispy.mx:8443/login?username=($username)&password=($password)
>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>> <https://portal.fispy.mx:8443/login?username=($username)&password=($password)>
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> If successful it will return as per image below. If it fails 
>>>>>>>>>>>>>>>>> the AC will redirect back to the Portal
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> <WebAuthentication.png>
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> Here is the configuration:
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> url-template name PacketFence
>>>>>>>>>>>>>>>>>  url https://wifi.fispy.mx/captive-portal 
>>>>>>>>>>>>>>>>> <https://wifi.fispy.mx/captive-portal>
>>>>>>>>>>>>>>>>>  url-parameter login-url destination_url 
>>>>>>>>>>>>>>>>> https://portal.fispy.mx:8443/login?username=($username)&password=($password)
>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>> <https://portal.fispy.mx:8443/login?username=($username)&password=($password)>
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> HA Proxy output
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> Feb 6 16:44:26 wifi haproxy[2427]: 10.9.70.173:52266 
>>>>>>>>>>>>>>>>> <http://10.9.70.173:52266/> [06/Feb/2022:16:44:26.153] 
>>>>>>>>>>>>>>>>> portal-https-10.0.255.99~ 10.0.255.99-backend/127.0.0.1 
>>>>>>>>>>>>>>>>> <http://127.0.0.1/> 0/0/0/202/202 200 9003 - - ---- 2/1/0/0/0 
>>>>>>>>>>>>>>>>> 0/0 {wifi.fispy.mx <http://wifi.fispy.mx/>} "GET 
>>>>>>>>>>>>>>>>> /captive-portal?destination_url=https://portal.fispy.mx:8443/login?username=($username)&password=($password)
>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>> <https://portal.fispy.mx:8443/login?username=($username)&password=($password)>
>>>>>>>>>>>>>>>>>  HTTP/1.1"
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> Only problem is that PacketFence is not updating the dynamic 
>>>>>>>>>>>>>>>>> values with username and password for it to work
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> AC = Access Controller. This manages the APs’ as they are 
>>>>>>>>>>>>>>>>> operating in Fit/Lightweight mode.
>>>>>>>>>>>>>>>>> AP = Access Points. These are the actual radios.
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> Best Regards,
>>>>>>>>>>>>>>>>> Jorge
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> On Feb 6, 2022, at 4:40 PM, Fabrice Durand 
>>>>>>>>>>>>>>>>>> <oeufd...@gmail.com <mailto:oeufd...@gmail.com>> wrote:
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> Hello Jorge,
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> i have what i need at least to be able to support the 
>>>>>>>>>>>>>>>>>> web-auth.
>>>>>>>>>>>>>>>>>> The only thing i am not sure is at the end of the 
>>>>>>>>>>>>>>>>>> registration process what we are supposed to do.
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> I will create a branch on github in order for you to test. 
>>>>>>>>>>>>>>>>>> (it will be an update of the Huawei switch module).
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> For information, what is the ac-ip ac-mac versus ap-ip 
>>>>>>>>>>>>>>>>>> ap-mac ?
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> Regards
>>>>>>>>>>>>>>>>>> Fabrice
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> Le dim. 6 févr. 2022 à 18:30, Jorge Nolla <jno...@gmail.com 
>>>>>>>>>>>>>>>>>> <mailto:jno...@gmail.com>> a écrit :
>>>>>>>>>>>>>>>>>> If I try to manually send the redirect in the browser here 
>>>>>>>>>>>>>>>>>> is what HA proxy records. This is a simple copy and paste in 
>>>>>>>>>>>>>>>>>> the browser and the output:
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> https://wifi.fispy.mx/captive-portal 
>>>>>>>>>>>>>>>>>> <https://wifi.fispy.mx/captive-portal>?destination_url=https://portal.fispy.mx:8443/login?username=539z&password=0uf3
>>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>>> <https://portal.fispy.mx:8443/login?username=539z&password=0uf3>
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> 4875 - - ---- 2/1/0/0/0 0/0 {wifi.fispy.mx 
>>>>>>>>>>>>>>>>>> <http://wifi.fispy.mx/>} "GET 
>>>>>>>>>>>>>>>>>> /captive-portal?destination_url=https://portal.fispy.mx:8443/login?username=539z&password=0uf3
>>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>>> <https://portal.fispy.mx:8443/login?username=539z&password=0uf3>
>>>>>>>>>>>>>>>>>>  HTTP/1.1"
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> It doesn’t let it go through as it seems that is trying to 
>>>>>>>>>>>>>>>>>> validate network connectivity 
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>> On Feb 6, 2022, at 4:07 PM, Jorge Nolla <jno...@gmail.com 
>>>>>>>>>>>>>>>>>>> <mailto:jno...@gmail.com>> wrote:
>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>> Seems weird how the format of the URL is recorded/sent 
>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>> Here is a normal redirect, the url is formatted correctly,
>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>> Feb 6 16:03:41 wifi haproxy[2427]: 10.99.1.20:63577 
>>>>>>>>>>>>>>>>>>> <http://10.99.1.20:63577/> [06/Feb/2022:16:03:41.232] 
>>>>>>>>>>>>>>>>>>> portal-https-10.0.255.99~ 10.0.255.99-backend/127.0.0.1 
>>>>>>>>>>>>>>>>>>> <http://127.0.0.1/> 0/0/1/233/234 200 4910 - - ---- 
>>>>>>>>>>>>>>>>>>> 2/1/0/0/0 0/0 {wifi.fispy.mx <http://wifi.fispy.mx/>} "GET 
>>>>>>>>>>>>>>>>>>> /captive-portal?destination_url=https://www.fispy.mx/ 
>>>>>>>>>>>>>>>>>>> <https://www.fispy.mx/> HTTP/1.1"
>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>  I’m not sure why the value sent by the AP has all the % 
>>>>>>>>>>>>>>>>>>> and weird symbols 
>>>>>>>>>>>>>>>>>>> destination%5Furl=https%3A%2F%2Fportal%2Efispy%2Emx%3A8443%2Flogin
>>>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>>>> <https://wifi.fispy.mx/captive-portal?switch_url=https://portal.fispy.mx:8443/login>
>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> On Feb 6, 2022, at 4:00 PM, Jorge Nolla <jno...@gmail.com 
>>>>>>>>>>>>>>>>>>>> <mailto:jno...@gmail.com>> wrote:
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> Hi Fabrice,
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> Here are the options that can be added:
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> [AirEngine9700-M1-url-template-PacketFence]url-parameter ?
>>>>>>>>>>>>>>>>>>>>   ap-group-name   AP group name
>>>>>>>>>>>>>>>>>>>>   ap-ip           AP IP address
>>>>>>>>>>>>>>>>>>>>   ap-location     AP location
>>>>>>>>>>>>>>>>>>>>   ap-mac          AP MAC address
>>>>>>>>>>>>>>>>>>>>   ap-name         AP name
>>>>>>>>>>>>>>>>>>>>   device-ip       Device IP address
>>>>>>>>>>>>>>>>>>>>   device-mac      Device MAC address
>>>>>>>>>>>>>>>>>>>>   login-url       Device's login URL provided to the 
>>>>>>>>>>>>>>>>>>>> external portal server
>>>>>>>>>>>>>>>>>>>>   mac-address     Mac address
>>>>>>>>>>>>>>>>>>>>   redirect-url    The url in user original http packet
>>>>>>>>>>>>>>>>>>>>   set             Set
>>>>>>>>>>>>>>>>>>>>   ssid            SSID
>>>>>>>>>>>>>>>>>>>>   sysname         Device name
>>>>>>>>>>>>>>>>>>>>   user-ipaddress  User IP address
>>>>>>>>>>>>>>>>>>>>   user-mac        User MAC address
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> url-template name PacketFence
>>>>>>>>>>>>>>>>>>>>  url https://wifi.fispy.mx/captive-portal 
>>>>>>>>>>>>>>>>>>>> <https://wifi.fispy.mx/captive-portal>
>>>>>>>>>>>>>>>>>>>>  url-parameter device-ip ac-ip user-ipaddress userip ssid 
>>>>>>>>>>>>>>>>>>>> ssid user-mac ap-mac
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> 200 9003 - - ---- 2/1/0/0/0 0/0 {wifi.fispy.mx 
>>>>>>>>>>>>>>>>>>>> <http://wifi.fispy.mx/>} "GET 
>>>>>>>>>>>>>>>>>>>> /captive-portal?ac%2Dip=10%2E7%2E255%2E2&userip=10%2E9%2E70%2E173&ssid=FISPY%2DWiFi&ap%2Dmac=f02f4b1467d9
>>>>>>>>>>>>>>>>>>>>  HTTP/1.1"
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> If we do not specify the URL on this configuration, where 
>>>>>>>>>>>>>>>>>>>> would PacketFence get the value for the AC Web 
>>>>>>>>>>>>>>>>>>>> Authentication call?
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> https://portal.fispy.mx:8443/login?username=($username)&password=($password)
>>>>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>>>>> <https://portal.fispy.mx:8443/login?username=($username)&password=($password)>
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> Best Regards,
>>>>>>>>>>>>>>>>>>>> Jorge
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>> On Feb 5, 2022, at 8:23 PM, Fabrice Durand 
>>>>>>>>>>>>>>>>>>>>> <oeufd...@gmail.com <mailto:oeufd...@gmail.com>> wrote:
>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>> Hello Jorge,
>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>> what we need is the user mac and the ap information.
>>>>>>>>>>>>>>>>>>>>> I found that 
>>>>>>>>>>>>>>>>>>>>> https://support.huawei.com/enterprise/en/doc/EDOC1100008283/659354b1/display-url-template
>>>>>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>>>>>> <https://support.huawei.com/enterprise/en/doc/EDOC1100008283/659354b1/display-url-template>
>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>> Is it possible to add extra parameters like user-mac ssid 
>>>>>>>>>>>>>>>>>>>>> ap-ip ap-mac ?
>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>> And if yes can you provide me the url generated by the 
>>>>>>>>>>>>>>>>>>>>> controller when it redirect ?  (haproxy-portal log)
>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>> Regards
>>>>>>>>>>>>>>>>>>>>> Fabrice
>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>> Le sam. 5 févr. 2022 à 20:42, Jorge Nolla 
>>>>>>>>>>>>>>>>>>>>> <jno...@gmail.com <mailto:jno...@gmail.com>> a écrit :
>>>>>>>>>>>>>>>>>>>>> Hi Team,
>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>> Any input on this? We really would like to get this to 
>>>>>>>>>>>>>>>>>>>>> work.
>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>> Thank you!
>>>>>>>>>>>>>>>>>>>>> Jorge
>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>> On Feb 2, 2022, at 7:48 PM, Jorge Nolla 
>>>>>>>>>>>>>>>>>>>>>> <jno...@gmail.com <mailto:jno...@gmail.com>> wrote:
>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>> Hi Fabrice,
>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>> This is the sequence:
>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>> Feb  2 14:51:32 wifi haproxy[2427]: 10.9.79.52:61132 
>>>>>>>>>>>>>>>>>>>>>> <http://10.9.79.52:61132/> [02/Feb/2022:14:51:32.663] 
>>>>>>>>>>>>>>>>>>>>>> portal-http-10.0.255.99 10.0.255.99-backend/127.0.0.1 
>>>>>>>>>>>>>>>>>>>>>> <http://127.0.0.1/> 0/0/0/201/201 200 7146 - - ---- 
>>>>>>>>>>>>>>>>>>>>>> 3/1/0/0/0 0/0 {wifi.fispy.mx <http://wifi.fispy.mx/>} 
>>>>>>>>>>>>>>>>>>>>>> "GET /access?lang= HTTP/1.1"
>>>>>>>>>>>>>>>>>>>>>> Feb  2 14:51:37 wifi haproxy[2427]: 10.9.79.52:61133 
>>>>>>>>>>>>>>>>>>>>>> <http://10.9.79.52:61133/> [02/Feb/2022:14:51:37.905] 
>>>>>>>>>>>>>>>>>>>>>> portal-http-10.0.255.99 static/127.0.0.1 
>>>>>>>>>>>>>>>>>>>>>> <http://127.0.0.1/> 0/0/0/2/2 200 228 - - ---- 4/2/0/0/0 
>>>>>>>>>>>>>>>>>>>>>> 0/0 {10.0.255.99} "GET 
>>>>>>>>>>>>>>>>>>>>>> /common/network-access-detection.gif?r=1643838705224 
>>>>>>>>>>>>>>>>>>>>>> HTTP/1.1"
>>>>>>>>>>>>>>>>>>>>>> Feb  2 14:51:44 wifi haproxy[2427]: 10.9.79.52:61130 
>>>>>>>>>>>>>>>>>>>>>> <http://10.9.79.52:61130/> [02/Feb/2022:14:51:43.927] 
>>>>>>>>>>>>>>>>>>>>>> portal-https-10.0.255.99~ 10.0.255.99-backend/127.0.0.1 
>>>>>>>>>>>>>>>>>>>>>> <http://127.0.0.1/> 0/0/0/122/122 302 1018 - - ---- 
>>>>>>>>>>>>>>>>>>>>>> 4/1/0/0/0 0/0 {wifi.fispy.mx <http://wifi.fispy.mx/>} 
>>>>>>>>>>>>>>>>>>>>>> "GET 
>>>>>>>>>>>>>>>>>>>>>> /captive-portal?switch%5Furl=https%3A%2F%2Fportal%2Efispy%2Emx%3A8443%2Flogin
>>>>>>>>>>>>>>>>>>>>>>  HTTP/1.1"
>>>>>>>>>>>>>>>>>>>>>> Feb  2 14:51:44 wifi haproxy[2427]: 10.9.79.52:61132 
>>>>>>>>>>>>>>>>>>>>>> <http://10.9.79.52:61132/> [02/Feb/2022:14:51:44.060] 
>>>>>>>>>>>>>>>>>>>>>> portal-http-10.0.255.99 10.0.255.99-backend/127.0.0.1 
>>>>>>>>>>>>>>>>>>>>>> <http://127.0.0.1/> 0/0/0/129/129 200 7146 - - ---- 
>>>>>>>>>>>>>>>>>>>>>> 4/2/0/0/0 0/0 {wifi.fispy.mx <http://wifi.fispy.mx/>} 
>>>>>>>>>>>>>>>>>>>>>> "GET /access?lang= HTTP/1.1"
>>>>>>>>>>>>>>>>>>>>>> Feb  2 14:51:49 wifi haproxy[2427]: 10.9.79.52:61133 
>>>>>>>>>>>>>>>>>>>>>> <http://10.9.79.52:61133/> [02/Feb/2022:14:51:49.219] 
>>>>>>>>>>>>>>>>>>>>>> portal-http-10.0.255.99 static/127.0.0.1 
>>>>>>>>>>>>>>>>>>>>>> <http://127.0.0.1/> 0/0/0/1/1 200 228 - - ---- 4/2/0/0/0 
>>>>>>>>>>>>>>>>>>>>>> 0/0 {10.0.255.99} "GET 
>>>>>>>>>>>>>>>>>>>>>> /common/network-access-detection.gif?r=1643838716546 
>>>>>>>>>>>>>>>>>>>>>> HTTP/1.1"
>>>>>>>>>>>>>>>>>>>>>> Feb  2 14:51:55 wifi haproxy[2427]: 10.9.79.52:61130 
>>>>>>>>>>>>>>>>>>>>>> <http://10.9.79.52:61130/> [02/Feb/2022:14:51:55.287] 
>>>>>>>>>>>>>>>>>>>>>> portal-https-10.0.255.99~ 10.0.255.99-backend/127.0.0.1 
>>>>>>>>>>>>>>>>>>>>>> <http://127.0.0.1/> 0/0/0/136/136 302 1018 - - ---- 
>>>>>>>>>>>>>>>>>>>>>> 4/1/0/0/0 0/0 {wifi.fispy.mx <http://wifi.fispy.mx/>} 
>>>>>>>>>>>>>>>>>>>>>> "GET 
>>>>>>>>>>>>>>>>>>>>>> /captive-portal?switch%5Furl=https%3A%2F%2Fportal%2Efispy%2Emx%3A8443%2Flogin
>>>>>>>>>>>>>>>>>>>>>>  HTTP/1.1”
>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> On Feb 2, 2022, at 7:12 PM, Fabrice Durand 
>>>>>>>>>>>>>>>>>>>>>>> <oeufd...@gmail.com <mailto:oeufd...@gmail.com>> wrote:
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> Hello Jorge,
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> i will have a look closer.
>>>>>>>>>>>>>>>>>>>>>>> But i have a question, when the device is forwarded to 
>>>>>>>>>>>>>>>>>>>>>>> the captive portal, (just before 
>>>>>>>>>>>>>>>>>>>>>>> https://wifi.fispy.mx/captive-portal?switch%5Furl=https%3A%2F%2Fportal%2Efispy%2Emx%3A8443%2Flogin
>>>>>>>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>>>>>>>> <https://wifi.fispy.mx/captive-portal?switch_url=https://portal.fispy.mx:8443/login>)
>>>>>>>>>>>>>>>>>>>>>>>  , what is the url ?
>>>>>>>>>>>>>>>>>>>>>>> You should be able to see it in the haproxy-portal.log 
>>>>>>>>>>>>>>>>>>>>>>> file.
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> Regards
>>>>>>>>>>>>>>>>>>>>>>> Fabrice
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> Le mer. 2 févr. 2022 à 10:18, Jorge Nolla 
>>>>>>>>>>>>>>>>>>>>>>> <jno...@gmail.com <mailto:jno...@gmail.com>> a écrit :
>>>>>>>>>>>>>>>>>>>>>>> Hi Fabrice,
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> We almost have the configuration working, but are not 
>>>>>>>>>>>>>>>>>>>>>>> sure how to get the redirect to the client to work 
>>>>>>>>>>>>>>>>>>>>>>> correctly. Attached is the documentation for Cisco ISE 
>>>>>>>>>>>>>>>>>>>>>>> which we used for PacketFence as well.
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> Portal.fispy.mx <http://portal.fispy.mx/> is the Huawei 
>>>>>>>>>>>>>>>>>>>>>>> AC.
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> This is the format the client should get from 
>>>>>>>>>>>>>>>>>>>>>>> PacketFence. This is the only piece we are missing for 
>>>>>>>>>>>>>>>>>>>>>>> this to work.
>>>>>>>>>>>>>>>>>>>>>>> https://portal.fispy.mx:8443/login?username=($username)&password=($password)
>>>>>>>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>>>>>>>> <https://portal.fispy.mx:8443/login?username=($username)&password=($password)>
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> If we manually click on the link above, then the flow 
>>>>>>>>>>>>>>>>>>>>>>> of traffic works correctly CLIENT > AC > RADIUS 
>>>>>>>>>>>>>>>>>>>>>>> (PacketFence), and authentication works. The problem is 
>>>>>>>>>>>>>>>>>>>>>>> that when the user logs in to the portal the redirect 
>>>>>>>>>>>>>>>>>>>>>>> is broken. The parameter for the redirect that 
>>>>>>>>>>>>>>>>>>>>>>> PacketFence is serving, comes from a configuration 
>>>>>>>>>>>>>>>>>>>>>>> parameter within the AC. This configuration works fine 
>>>>>>>>>>>>>>>>>>>>>>> for Cisco ISE, but the URL format is not working for 
>>>>>>>>>>>>>>>>>>>>>>> PacketFence.
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> When we configure the redirect this is what the client 
>>>>>>>>>>>>>>>>>>>>>>> is getting from PacketFence
>>>>>>>>>>>>>>>>>>>>>>> https://wifi.fispy.mx/captive-portal?switch%5Furl=https%3A%2F%2Fportal%2Efispy%2Emx%3A8443%2Flogin
>>>>>>>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>>>>>>>> <https://wifi.fispy.mx/captive-portal?switch%5Furl=https%3A%2F%2Fportal%2Efispy%2Emx%3A8443%2Flogin>
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> url-template name PacketFence
>>>>>>>>>>>>>>>>>>>>>>>  url https://wifi.fispy.mx/captive-portal 
>>>>>>>>>>>>>>>>>>>>>>> <https://wifi.fispy.mx/captive-portal>
>>>>>>>>>>>>>>>>>>>>>>>  url-parameter login-url switch_url 
>>>>>>>>>>>>>>>>>>>>>>> https://portal.fispy.mx:8443/login 
>>>>>>>>>>>>>>>>>>>>>>> <https://portal.fispy.mx:8443/login>  <<< THIS IS THE 
>>>>>>>>>>>>>>>>>>>>>>> PARAMETER FOR THE REDIRECT TO PACKETFENCE
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> AC CONFIG
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> authentication-profile name PacketFence
>>>>>>>>>>>>>>>>>>>>>>>  portal-access-profile PacketFence
>>>>>>>>>>>>>>>>>>>>>>>  free-rule-template default_free_rule
>>>>>>>>>>>>>>>>>>>>>>>  authentication-scheme PacketFence
>>>>>>>>>>>>>>>>>>>>>>>  accounting-scheme PacketFence
>>>>>>>>>>>>>>>>>>>>>>>  radius-server PacketFence
>>>>>>>>>>>>>>>>>>>>>>>  force-push url https://www.fispy.mx 
>>>>>>>>>>>>>>>>>>>>>>> <https://www.fispy.mx/>
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> radius-server template PacketFence
>>>>>>>>>>>>>>>>>>>>>>>  radius-server shared-key cipher 
>>>>>>>>>>>>>>>>>>>>>>> %^%#*)l=:1.X-Yd$\<~orEF@]<}NMejv3)E^\6;7:NUY%^%#
>>>>>>>>>>>>>>>>>>>>>>>  radius-server authentication 10.0.255.99 1812 source 
>>>>>>>>>>>>>>>>>>>>>>> ip-address 10.7.255.2 weight 90
>>>>>>>>>>>>>>>>>>>>>>>  radius-server accounting 10.0.255.99 1813 source 
>>>>>>>>>>>>>>>>>>>>>>> ip-address 10.7.255.2 weight 80
>>>>>>>>>>>>>>>>>>>>>>>  undo radius-server user-name domain-included
>>>>>>>>>>>>>>>>>>>>>>>  calling-station-id mac-format unformatted
>>>>>>>>>>>>>>>>>>>>>>>  called-station-id wlan-user-format ac-mac
>>>>>>>>>>>>>>>>>>>>>>>  radius-server attribute translate
>>>>>>>>>>>>>>>>>>>>>>>  radius-attribute disable HW-NAS-Startup-Time-Stamp send
>>>>>>>>>>>>>>>>>>>>>>>  radius-attribute disable HW-IP-Host-Address send
>>>>>>>>>>>>>>>>>>>>>>>  radius-attribute disable HW-Connect-ID send
>>>>>>>>>>>>>>>>>>>>>>>  radius-attribute disable HW-Version send
>>>>>>>>>>>>>>>>>>>>>>>  radius-attribute disable HW-Product-ID send
>>>>>>>>>>>>>>>>>>>>>>>  radius-attribute disable HW-Domain-Name send
>>>>>>>>>>>>>>>>>>>>>>>  radius-attribute disable HW-User-Extend-Info send
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> url-template name PacketFence
>>>>>>>>>>>>>>>>>>>>>>>  url https://wifi.fispy.mx/captive-portal 
>>>>>>>>>>>>>>>>>>>>>>> <https://wifi.fispy.mx/captive-portal>
>>>>>>>>>>>>>>>>>>>>>>>  url-parameter login-url switch_url 
>>>>>>>>>>>>>>>>>>>>>>> https://portal.fispy.mx:8443/login 
>>>>>>>>>>>>>>>>>>>>>>> <https://portal.fispy.mx:8443/login>  <<< THIS IS THE 
>>>>>>>>>>>>>>>>>>>>>>> PARAMETER FOR THE REDIRECT TO PACKETFENCE
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> web-auth-server PacketFence
>>>>>>>>>>>>>>>>>>>>>>>  server-ip 10.0.255.99
>>>>>>>>>>>>>>>>>>>>>>>  port 443
>>>>>>>>>>>>>>>>>>>>>>>  url-template PacketFence
>>>>>>>>>>>>>>>>>>>>>>>  protocol http
>>>>>>>>>>>>>>>>>>>>>>>  http get-method enable
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> portal-access-profile name PacketFence
>>>>>>>>>>>>>>>>>>>>>>>  web-auth-server PacketFence direct
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> authentication-scheme PacketFence
>>>>>>>>>>>>>>>>>>>>>>>   authentication-mode radius
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> wlan
>>>>>>>>>>>>>>>>>>>>>>>  security-profile name FISPY-WiFi
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>>  vap-profile name FISPY-WiFi
>>>>>>>>>>>>>>>>>>>>>>>   service-vlan vlan-id 900
>>>>>>>>>>>>>>>>>>>>>>>   permit-vlan vlan-id 900
>>>>>>>>>>>>>>>>>>>>>>>   ssid-profile FISPY-WiFi
>>>>>>>>>>>>>>>>>>>>>>>   security-profile FISPY-WiFi
>>>>>>>>>>>>>>>>>>>>>>>   authentication-profile PacketFence
>>>>>>>>>>>>>>>>>>>>>>>   sta-network-detect disable
>>>>>>>>>>>>>>>>>>>>>>>   service-experience-analysis enable
>>>>>>>>>>>>>>>>>>>>>>>   mdns-snooping enable
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> ###CISCO ISE CONFIG TO COMPARE###
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> url-template name CISCO-ISE
>>>>>>>>>>>>>>>>>>>>>>>  url 
>>>>>>>>>>>>>>>>>>>>>>> https://captive.fispy.mx:8443/portal/PortalSetup.action#portal=7cf5ac1d-5dbf-4b36-aeee-b9590fd24c02
>>>>>>>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>>>>>>>> <https://captive.fispy.mx:8443/portal/PortalSetup.action#portal=7cf5ac1d-5dbf-4b36-aeee-b9590fd24c02>
>>>>>>>>>>>>>>>>>>>>>>>  parameter start-mark #
>>>>>>>>>>>>>>>>>>>>>>>  url-parameter login-url switch_url 
>>>>>>>>>>>>>>>>>>>>>>> https://portal.fispy.mx:8443/login 
>>>>>>>>>>>>>>>>>>>>>>> <https://portal.fispy.mx:8443/login>
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> ####################################
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>>> On Feb 2, 2022, at 6:17 AM, Fabrice Durand 
>>>>>>>>>>>>>>>>>>>>>>>> <oeufd...@gmail.com <mailto:oeufd...@gmail.com>> wrote:
>>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>>> Hello Jorge,
>>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>>> do you have any Huawei documentation to implement that 
>>>>>>>>>>>>>>>>>>>>>>>> ?
>>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>>> Regards
>>>>>>>>>>>>>>>>>>>>>>>> Fabrice
>>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>>> Le mer. 26 janv. 2022 à 15:59, Jorge Nolla via 
>>>>>>>>>>>>>>>>>>>>>>>> PacketFence-users 
>>>>>>>>>>>>>>>>>>>>>>>> <packetfence-users@lists.sourceforge.net 
>>>>>>>>>>>>>>>>>>>>>>>> <mailto:packetfence-users@lists.sourceforge.net>> a 
>>>>>>>>>>>>>>>>>>>>>>>> écrit :
>>>>>>>>>>>>>>>>>>>>>>>> Hi Team,
>>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>>> We were wondering if anyone has had any success in 
>>>>>>>>>>>>>>>>>>>>>>>> configuring Web Auth for the Huawei AC? It’s somewhat 
>>>>>>>>>>>>>>>>>>>>>>>> critical for us to get this going.
>>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>>> Thank you!
>>>>>>>>>>>>>>>>>>>>>>>> Jorge
>>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>>> _______________________________________________
>>>>>>>>>>>>>>>>>>>>>>>> PacketFence-users mailing list  
>>>>>>>>>>>>>>>>>>>>>>>> PacketFence-users@lists.sourceforge.net 
>>>>>>>>>>>>>>>>>>>>>>>> <mailto:PacketFence-users@lists.sourceforge.net>
>>>>>>>>>>>>>>>>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>>>>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>>>>>>>>> <https://lists.sourceforge.net/lists/listinfo/packetfence-users>
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> 
>>>>>>>>>>>>> 
>>>>>>>>>>>> 
>>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>> 
>>>>>>>> 
>>>>>>> 
>>>>>> 
>>>>> 
>>>> 
>>> 
>> 
> 

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to