Hello -

I've followed packetfence since 2015 but we never fully adopted its feature
sets due to various reasons. Our original interest was for Captive Portals
- but at the time it felt like overkill and we did not want in-band switch
port management to deploy a simple 'coffee shop' portal.

Times have changed and personally I thought Captive Portals would have died
off in requests by now but they are more prevalent now than ever with BYOD
and user-initiated on-boarding.

Since COVID we have shifted into various vertical markets and are finding
the need to consolidate our deployments into a more scalable
resource/deployment for various installs in these markets. Our requirements
-

   - Portal Page and User management - whether manually onboarded/import
   and/or through user initiated portal pages.
   - MAC bypass - manually bypass portals for authorized MAC identified
   hosts. If there is a user onboarding for this as well through already AUTH
   credentials that is a plus.
   - 802.1X auth for dynamically assigned VLANs (w/ and w/o MAC filtering)
   over wireless only - mix of vendors Unifi, Peplink, Cisco, Meraki, etc.
   Common thread is that all are managed through a controller - no
   autonomous APs.

We currently employ Mikrotik hotspots and Peplink InControl portals -
depending on the installation router. User accounts are added via script,
API, ssh, etc manually not by a user request/portal interaction. All
dynamic VLAN assignments/RADIUS attributes (radchecks, radreply,
radgroupreply,etc) are handled in freeRADIUS based on user credentials -
typically only a couple VLAN options, most of these installs have no more
than 5 total VLANs.

I've spun up a VM of 12.2, the maturation is impressive but documentation
for our actual deployment needs to migrate from freeRADIUS stand-alone DB
is non-existent - at least from my searching in the last week. I understand
the concepts (I believe), my big question is using just 'local to
Packetfence install' freeRADIUS possible as AUTH? We do not deploy
anything Windows based - we are a UNIX/Open-Source/In-house DEV company. So
AD is not an option, we do have some LDAP/freeRADIUS servers running for
internal use (linux) but don't want to expose that cluster to end user
accounts. I feel that the current version will suit our needs to do what we
want for the most part and give us a unified platform; but can't really
seem to find any documentation to move forward on testing.

Specific to "Authentication Source RADIUS' - docs seem to skim over this as
an option or its possible I need to be looking elsewhere? Any direction is
appreciated - I've been testing with UniFi (which I know Ubiquiti has its
own issues), I see it's a recent integration as well. I can see request
come in but always rejected auth in wrong eap/mshcap (even though I've
removed them as auth options). I also see my Internal RADIUS source
constantly in 'wrong shared secret' ( client localhost).

I'm going to migrate to a Cisco test lab to verify its not a tunnel, remote
resource issue and keep everything in the same subnet (nodes/nas).

Thank you for any assistance -

Cory White

Senior Network Engineer
904-735-1600
c...@xpodigital.com
www.xpodigital.com
[image: facebook] <https://www.facebook.com/xpodigital>
[image: twitter] <https://www.twitter.com/xpodigital>
[image: linkedin] <https://www.linkedin.com/company/xpodigita>
[image: instagram] <https://www.instagram.com/xpodigital/>
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to