I seem to have run into another issue on MAC based Authentication - 802.1x w/ Dynamic tested and working on Cisco and Unifi. When I try to migrate our 'IoT Wireless' I am unable to get PF to MAC Auth onto the SSID. I have a MAC user/pw locally in PF but I don't think it ever hits/tries to look for it. Devices just spin trying to connect to the SSID. Audit shows device success and registered but only returns status 200 and no attributes and self-assigned IP - never actually get connected. There is nothing in the packetfence/radiu slogs other than 'Device OK'. I've tried different combinations of switches/nodes/nas and Connection Profiles with 'local' source hardset, etc to no avail. If I simply change the SSID RADIUS back to our freeRADIUS instance everything works as expected.
Thanks in advance for any direction, Cory White Sr. Network Engineer 904.735.1600 c...@xpodigital.com On Tue, May 30, 2023 at 9:37 AM Cory White <c...@xpodigital.com> wrote: > Fabrice - > > Much appreciated - after back tracking into the docs it was obvious I was > trying to make something more complicated than needed! Once I rolled back > what I 'thought' was needed, I was able to successfully test Cisco and > Unifi Dynamic VLAN (802.1x) assignments against local DB. I started > testing/deploying Captive Portal and WebAuth with success as well. I plan > to start playing with the portal modules/customizations after, hopefully, > being successful in the iPSK (Dynamic PSK) deployment on Cisco > infrastructure.....all in all everything is on track to turn up an instance > and deploy into production networks with some more vetting. > > Thank you for your quick reply.... > > Cory White > Sr. Network Engineer > 904.735.1600 > c...@xpodigital.com > > > On Fri, May 26, 2023 at 3:58 PM Fabrice Durand <oeufd...@gmail.com> wrote: > >> Hello Cory, >> >> Yes, of course you can use PacketFence local authentication without any >> Windows AD integration. >> There are multiple ways but the simplest is to use the local PacketFence >> database to authenticate the users. >> It's also possible to interact with a LDAP server to do the 802.1x >> authentication and PacketFence also provides an internal PKI to do eap-tls >> auth. >> >> For the "Authentication Source RADIUS", it depends how you use it, if >> it's on the portal then it will do PAP authentication, but you can also use >> the RADIUS source in the REALM section to proxy the request to another >> server. >> >> Btw i don't see any blocking point for you to use PacketFence, but i >> recommend starting with something simple (like mac-auth + portal then >> 802.1x after). >> >> Regards >> Fabrice >> >> >> >> Le ven. 26 mai 2023 à 15:13, Cory White via PacketFence-users < >> packetfence-users@lists.sourceforge.net> a écrit : >> >>> Hello - >>> >>> I've followed packetfence since 2015 but we never fully adopted its >>> feature sets due to various reasons. Our original interest was for Captive >>> Portals - but at the time it felt like overkill and we did not want in-band >>> switch port management to deploy a simple 'coffee shop' portal. >>> >>> Times have changed and personally I thought Captive Portals would have >>> died off in requests by now but they are more prevalent now than ever with >>> BYOD and user-initiated on-boarding. >>> >>> Since COVID we have shifted into various vertical markets and are >>> finding the need to consolidate our deployments into a more scalable >>> resource/deployment for various installs in these markets. Our requirements >>> - >>> >>> - Portal Page and User management - whether manually >>> onboarded/import and/or through user initiated portal pages. >>> - MAC bypass - manually bypass portals for authorized MAC identified >>> hosts. If there is a user onboarding for this as well through already >>> AUTH >>> credentials that is a plus. >>> - 802.1X auth for dynamically assigned VLANs (w/ and w/o MAC >>> filtering) over wireless only - mix of vendors Unifi, Peplink, Cisco, >>> Meraki, etc. Common thread is that all are managed through a controller - >>> no autonomous APs. >>> >>> We currently employ Mikrotik hotspots and Peplink InControl portals - >>> depending on the installation router. User accounts are added via script, >>> API, ssh, etc manually not by a user request/portal interaction. All >>> dynamic VLAN assignments/RADIUS attributes (radchecks, radreply, >>> radgroupreply,etc) are handled in freeRADIUS based on user credentials - >>> typically only a couple VLAN options, most of these installs have no more >>> than 5 total VLANs. >>> >>> I've spun up a VM of 12.2, the maturation is impressive but >>> documentation for our actual deployment needs to migrate from freeRADIUS >>> stand-alone DB is non-existent - at least from my searching in the last >>> week. I understand the concepts (I believe), my big question is using just >>> 'local to Packetfence install' freeRADIUS possible as AUTH? We do not >>> deploy anything Windows based - we are a UNIX/Open-Source/In-house DEV >>> company. So AD is not an option, we do have some LDAP/freeRADIUS servers >>> running for internal use (linux) but don't want to expose that cluster to >>> end user accounts. I feel that the current version will suit our needs to >>> do what we want for the most part and give us a unified platform; but can't >>> really seem to find any documentation to move forward on testing. >>> >>> Specific to "Authentication Source RADIUS' - docs seem to skim over this >>> as an option or its possible I need to be looking elsewhere? Any direction >>> is appreciated - I've been testing with UniFi (which I know Ubiquiti has >>> its own issues), I see it's a recent integration as well. I can see request >>> come in but always rejected auth in wrong eap/mshcap (even though I've >>> removed them as auth options). I also see my Internal RADIUS source >>> constantly in 'wrong shared secret' ( client localhost). >>> >>> I'm going to migrate to a Cisco test lab to verify its not a tunnel, >>> remote resource issue and keep everything in the same subnet (nodes/nas). >>> >>> Thank you for any assistance - >>> >>> Cory White >>> >>> Senior Network Engineer >>> 904-735-1600 >>> c...@xpodigital.com >>> www.xpodigital.com >>> [image: facebook] <https://www.facebook.com/xpodigital> >>> [image: twitter] <https://www.twitter.com/xpodigital> >>> [image: linkedin] <https://www.linkedin.com/company/xpodigita> >>> [image: instagram] <https://www.instagram.com/xpodigital/> >>> _______________________________________________ >>> PacketFence-users mailing list >>> PacketFence-users@lists.sourceforge.net >>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>> >>
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users