Thank you for responding. >From switches.conf file
[192.168.125.60] SNMPCommunityRead=public100 description=SW-3560 SNMPVersionTrap=2c cliPwd=USA2022!@ group=default SNMPCommunityTrap=public100 registrationVlan=120 SNMPCommunityWrite=public100 defaultVlan=1 deauthMethod=RADIUS type=Cisco::Catalyst_3560 isolationVlan=121 radiusSecret=pf1234 SNMPVersion=2c cliEnablePwd=USA2022!@ uplink=7,10 cliUser=admin cliTransport=SSH cliAccess=Y mode=registration Show Run on my Cisco 3560-C Switch SW-3560#show run Building configuration... Current configuration : 4902 bytes ! ! Last configuration change at 21:21:01 UTC Sat Jan 14 2006 by admin ! version 15.2 no service pad service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname SW-3560 ! boot-start-marker boot-end-marker ! enable password USA2022!@ ! username admin privilege 15 secret 5 $1$ZynS$4msELl0UFKCVIIlXSyIQx1 username test privilege 15 password 0 test123 aaa new-model ! ! aaa group server radius packetfence server 192.168.125.91 ! aaa authentication login default local aaa authentication dot1x default group packetfence aaa authorization console aaa authorization exec default group packetfence local aaa authorization network default group packetfence ! ! ! ! ! aaa server radius dynamic-author client 192.168.125.91 server-key PF@1234 port 3799 ! aaa session-id common system mtu routing 1500 ! ! ! ! ! ! ! authentication mac-move permit ! ! crypto pki trustpoint TP-self-signed-3031636736 enrollment selfsigned subject-name cn=IOS-Self-Signed-Certificate-3031636736 revocation-check none rsakeypair TP-self-signed-3031636736 ! ! crypto pki certificate chain TP-self-signed-3031636736 certificate self-signed 01 3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030 31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274 69666963 6174652D 33303331 36333637 3336301E 170D3036 30313032 30303031 31325A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649 4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 30333136 33363733 3630819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281 8100BD94 500CE969 FA7F1CF1 A7CE0FCD 7A57BB27 44C5E61A A237DC1F 9094F156 245F72AB 04C4F022 19429AB2 BD89E2A8 0B6DE2FB BFD4A836 08DDC2EA 33B77221 8F8D04C4 C1269726 806A88F6 05AF825C 73FBB19C B037F598 F884F726 A4F673D9 77975FF1 08FDB6F0 2D50B628 7E098B6E 96B00AA0 7D2FF4F5 2F6AC4FF 3DD7E415 58CD0203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603 551D2304 18301680 145C6D51 B641B343 56D3DB10 F123E2E4 2A1B3B15 E1301D06 03551D0E 04160414 5C6D51B6 41B34356 D3DB10F1 23E2E42A 1B3B15E1 300D0609 2A864886 F70D0101 05050003 818100AC CD1A39BE 224D16FB 4D111C70 A3C9815A DB72CE58 2DEAA8E2 D7758F24 2EA816A9 57E41C47 6CEB4F81 C7682E2D B70EC7AB C9A1B4C9 5129A3AA 6BC283BE A3D858C9 47FFB0EE D55A478F EE478A5E D1222F25 F7DC2FC4 C80670F3 C875E4F9 2C0298EA D03ED1BF 2ED0E4E9 78E566A9 418FA09C EFEDE770 A65B9E3E 62329828 CFB9B2 quit dot1x system-auth-control spanning-tree mode pvst spanning-tree extend system-id ! ! ! ! vlan internal allocation policy ascending ! ! ! ! ! ! ! ! ! ! ! interface FastEthernet0/1 ! interface FastEthernet0/2 switchport mode access authentication order dot1x mab authentication priority dot1x mab authentication port-control auto authentication periodic authentication timer reauthenticate 7200 authentication timer restart 10800 authentication violation replace mab no snmp trap link-status dot1x pae authenticator dot1x timeout quiet-period 2 dot1x timeout tx-period 3 ! interface FastEthernet0/3 switchport mode access switchport port-security maximum 1 vlan access switchport port-security violation restrict switchport port-security mac-address 0200.0001.0003 switchport port-security authentication port-control auto authentication periodic authentication timer reauthenticate 7200 authentication timer restart 10800 authentication violation replace mab no snmp trap link-status dot1x pae authenticator dot1x timeout tx-period 5 ! interface FastEthernet0/4 ! interface FastEthernet0/5 switchport access vlan 120 switchport mode access ! interface FastEthernet0/6 ! interface FastEthernet0/7 ! interface FastEthernet0/8 ! interface FastEthernet0/9 ! interface FastEthernet0/10 switchport trunk encapsulation dot1q switchport mode trunk ! interface FastEthernet0/11 ! interface FastEthernet0/12 ! interface GigabitEthernet0/1 ! interface GigabitEthernet0/2 ! interface Vlan1 ip address 192.168.125.60 255.255.255.0 ! interface Vlan120 ip address 192.168.120.1 255.255.255.0 ip helper-address 192.168.120.2 ! interface Vlan121 ip address 192.168.121.1 255.255.255.0 ip helper-address 192.168.121.2 ! interface Vlan122 ip address 192.168.122.1 255.255.255.0 ! interface Vlan123 ip address 192.168.123.1 255.255.255.0 ! ip default-gateway 192.168.125.1 ip forward-protocol nd ip http server ip http secure-server ! ! ! ip sla enable reaction-alerts snmp-server community public RO snmp-server community public100 RW snmp-server enable traps port-security snmp-server enable traps port-security trap-rate 1 snmp-server host 192.168.125.91 version 2c public100 port-security ! ! radius server 192.168.125.91 address ipv4 192.168.125.91 auth-port 1812 acct-port 1813 automate-tester username admin ignore-acct-port key pf1234 ! ! line con 0 line vty 5 15 ! ! end SW-3560# Thank you! Damian From: Fabrice Durand <oeufd...@gmail.com> Sent: Tuesday, September 13, 2022 10:38 AM To: packetfence-users@lists.sourceforge.net Cc: Damian Mendoza <dam...@xvrsoftware.com> Subject: Re: [PacketFence-users] Latest PacketFence and Cisco 3560 switch - ran into issue connecting to network after Authentication Hello Damien, it looks to be a deauth issue. Can you paste the switches.conf (just the switch section you are testing with) and the show run on the switch itself ? Regards Fabrice Le mar. 13 sept. 2022 à 13:35, Damian Mendoza via PacketFence-users <packetfence-users@lists.sourceforge.net<mailto:packetfence-users@lists.sourceforge.net>> a écrit : I added a Cisco switch 3560-C to new installation of Packetfence latest version, but it still shows unregistered node although packetfence authenticate it by radius server as shown in logs. On the Windows 10 PC browser I login and username and password accepted" - Browser shows attempting to connect to the network: Error displayed: "Unable to detect network connectivity - IP address shows stuck in registration vlan. - Try restarting your web browser or opening a new tab to see if your access has been successfully enabled" Any hints or ideas I can try? Thanks, Damian _______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net<mailto:PacketFence-users@lists.sourceforge.net> https://lists.sourceforge.net/lists/listinfo/packetfence-users<https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Flists.sourceforge.net%2Flists%2Flistinfo%2Fpacketfence-users&data=05%7C01%7Cdamian%40xvrsoftware.com%7C2c86c946cf394db7a32108da95aebf61%7Ce1263642e975473f9396009ee306171b%7C0%7C0%7C637986875020917468%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000%7C%7C%7C&sdata=r6tNJe365Ili0TKxVOrgezED0katVTcH6DT6uW83cQs%3D&reserved=0>
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users