Hello Enrique, No, at the moment I am not matching SSID or anything like that. However, I just enabled radius service on the trunk interface where PF talks to unifi AP and controller. Now when I try connecting a client to the open wifi I see the following in the logs.
Jul 19 11:26:14 controller auth[7653]: Ignoring request to auth address * port 1812 bound to server packetfence from unknown client 10.2.0.6 port 35316 proto udp Jul 19 11:26:17 controller auth[7653]: Ignoring request to auth address * port 1812 bound to server packetfence from unknown client 10.2.0.6 port 35316 proto udp Jul 19 11:26:23 controller auth[7653]: Ignoring request to auth address * port 1812 bound to server packetfence from unknown client 10.2.0.6 port 35316 proto udp However, this unknown client is 10.2.0.6 is my Unifi AP added by Mac Address. Do I need to remove it and add it via the controller using IP? Warm regards, Rexford A. Nyarko. On Fri, Jul 19, 2024 at 6:12 AM Enrique Gross via PacketFence-users < packetfence-users@lists.sourceforge.net> wrote: > And in your connection profile are you matching like SSID? > > El jue, 18 jul 2024 a las 15:57, Rexford Nyarko (<rexfordn...@gmail.com>) > escribió: > >> Hello Enrique, >> >> Yes, they are all reachable one to the other, AP, Unifi controller and >> PF. This is quite weird for me considering the Web auth works fine without >> problems. >> The radius server is using PF's IP. apart from setting the radius >> password on the switch in PF and the Unifi controller is there anything >> else I need to do for radius config? >> >> Warm regards, >> Rexford A. Nyarko. >> >> >> On Thu, Jul 18, 2024 at 6:03 PM Enrique Gross <egr...@jcc-advance.com.ar> >> wrote: >> >>> Hi Rexford >>> >>> Try to troubleshoot connection between APs and Radius server IP (PF >>> management address). Can you ICMP that ip address? the radius server you >>> configured on the radius profile on Unifi controller, and applied to SSID. >>> >>> El jue, 18 jul 2024 a las 14:48, Rexford Nyarko (<rexfordn...@gmail.com>) >>> escribió: >>> >>>> Hello Enrique, >>>> >>>> Thanks again for getting back to me. >>>> Yes I have mapped the VLAN ID on the switch config for the AP. But >>>> still, the client devices are unable to get an IP. so they just disconnect >>>> once you try to connect. >>>> >>>> I have also checked the logs, there isn't anything happening when I try >>>> to connect a client to the open SSID. I can't figure out what I am missing. >>>> >>>> Warm regards, >>>> Rexford A. Nyarko. >>>> >>>> >>>> On Thu, Jul 18, 2024 at 4:07 PM Enrique Gross via PacketFence-users < >>>> packetfence-users@lists.sourceforge.net> wrote: >>>> >>>>> Hi Rexford >>>>> >>>>> You don't need to put registration VLAN as default/untagged, >>>>> registration vlan goes with tag. >>>>> >>>>> Have you mapped roles and VLAN ID on the switch config, on the PF side? >>>>> >>>>> Looking at packetfence.log, will help you to know what is happening >>>>> with the user/device when connecting to AP. >>>>> >>>>> Enrique >>>>> >>>>> El jue, 18 jul 2024 a las 11:10, Rexford Nyarko (< >>>>> rexfordn...@gmail.com>) escribió: >>>>> >>>>>> Hello Enrique, >>>>>> Thank you for your response. >>>>>> Yes I have AP the AP connected via Trunk. However the same still >>>>>> happens, clients are not able to connect to the Open network in order to >>>>>> access the registration portal. >>>>>> Do I need to make the registration VLAN 20 the default /untagged >>>>>> VLAN on the trunk ports? In that case, the AP can directly communicate >>>>>> with >>>>>> PF on the default network. Thanks in advance. >>>>>> >>>>>> Warm regards, >>>>>> Rexford A. Nyarko. >>>>>> >>>>>> >>>>>> On Wed, Jul 17, 2024 at 8:14 AM Enrique Gross via PacketFence-users < >>>>>> packetfence-users@lists.sourceforge.net> wrote: >>>>>> >>>>>>> Hi Rexford >>>>>>> >>>>>>> Hope you are doing well >>>>>>> >>>>>>> When configuring SSID on the Unifi side with Radius, it is ok that >>>>>>> you can not set VLAN 20 as registration. On the PF side, it's in the >>>>>>> roles >>>>>>> (Role mapping by VLAN ID) when configuring APs that you will set up your >>>>>>> VLAN for registration, prod or other vlan. So, as long registration >>>>>>> vlan, >>>>>>> prod, etc vlans are vlan trunk to AP, that's fine. >>>>>>> >>>>>>> So, an unreg user will be evaluated upon connection, as the >>>>>>> condition is unreg it will be placed on registration vlan that is >>>>>>> defined >>>>>>> on your Switch roles. >>>>>>> >>>>>>> Sorry for my bad english, hope it helps. >>>>>>> >>>>>>> Enrique. >>>>>>> >>>>>>> >>>>>>> >>>>>>> El lun, 15 jul 2024 a las 5:22, Rexford Nyarko via PacketFence-users >>>>>>> (<packetfence-users@lists.sourceforge.net>) escribió: >>>>>>> >>>>>>>> Hello All, >>>>>>>> >>>>>>>> First, my user environment consists mostly of Linux, windows users >>>>>>>> and occasionally Mac. Network hardware consists of Cisco 2960 switches >>>>>>>> for >>>>>>>> LAN and Unifi AP AC Pro for wireless connectivity. I need to have an >>>>>>>> authentication setup such that users log in with their LDAP >>>>>>>> credentials and >>>>>>>> users are assigned VLANS based on their *memberOf* LDAP attribute. >>>>>>>> >>>>>>>> Here's what I have done so far, >>>>>>>> 1. Installed PF 13.2 with two interfaces, 1 separate for management >>>>>>>> and another trunk with all VLAN interfaces added. >>>>>>>> 2. Configured LDAP Authentication source >>>>>>>> 3. Configured a connection Profile using the LDAP auth source. >>>>>>>> 4. Added Unifi APs individually to PF via MAC Address. (Initially, >>>>>>>> I tried adding the controller IP method but that didn't work with some >>>>>>>> weird errors about not being able to instantiate Switch) >>>>>>>> 5. Configured Unifi Controller and Wifi with guest profile and >>>>>>>> external Captive portal pointing to PF as instructed in the >>>>>>>> documentation. >>>>>>>> 6. Enabled the captive portal and respective services on the trunk >>>>>>>> interface. >>>>>>>> All to this point everything works great. As soon as a user >>>>>>>> connects to the open SSID they get redirected to the captive portal on >>>>>>>> PF >>>>>>>> and authenticate successfully with LDAP. This works great no problem. I >>>>>>>> intend to keep that and later change the auth source for guest Portal. >>>>>>>> >>>>>>>> Now I am trying to do vlan assignment. I followed the PF >>>>>>>> documentation for Ubiquity to set up the controller with the Raduis >>>>>>>> profile >>>>>>>> SSID and all. However, things are not working as expected. I am a bit >>>>>>>> confused here. >>>>>>>> 1. I have created interfaces, registration VLAN - 20 and Isolation >>>>>>>> VLAN - 30 on the trunk interface. >>>>>>>> 2. I also have added 3 other production VLANs where I manage DNS >>>>>>>> and DHCP >>>>>>>> 3. the open SSID on unifi controller cannot be set to the >>>>>>>> Registration VLAN 20 when Radius is enabled. So there is no way to >>>>>>>> communicate with PF via the Registration VLAN hence users cannot get >>>>>>>> IPs >>>>>>>> from PF on the open SSID and therefore cannot log in. >>>>>>>> I need advice on how to get this working. Do I have to make the >>>>>>>> registration VLAN the native or default vlan on the trunk and >>>>>>>> configure the >>>>>>>> guest captive portal on a different vlan which i can assign in the >>>>>>>> unifi >>>>>>>> controller? >>>>>>>> >>>>>>>> Also, I have a problem where DNS queries on each vlan/subnet points >>>>>>>> to the PF interface outside that subnet. eg pf.example.com - >>>>>>>> 192.168.0.1/24 on registration vlan, and PF on captive portal vlan >>>>>>>> 40 the IP is 192.168.1.1/24 but DNS query from captive portal >>>>>>>> interface gives registration vlan IP of PF. >>>>>>>> I would prefer that queries from each vlan would provide the >>>>>>>> respective PF interface on that vlan, >>>>>>>> Any help is appreciated. >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> Warm regards, >>>>>>>> Rexford. >>>>>>>> _______________________________________________ >>>>>>>> PacketFence-users mailing list >>>>>>>> PacketFence-users@lists.sourceforge.net >>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>>> >>>>>>> >>>>>>> >>>>>>> -- >>>>>>> >>>>>>> [image: Imágenes integradas 1] >>>>>>> _______________________________________________ >>>>>>> PacketFence-users mailing list >>>>>>> PacketFence-users@lists.sourceforge.net >>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>> >>>>>> >>>>> >>>>> -- >>>>> >>>>> [image: Imágenes integradas 1] >>>>> _______________________________________________ >>>>> PacketFence-users mailing list >>>>> PacketFence-users@lists.sourceforge.net >>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>> >>>> >>> >>> -- >>> >>> [image: Imágenes integradas 1] >>> >> > > -- > > [image: Imágenes integradas 1] > _______________________________________________ > PacketFence-users mailing list > PacketFence-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/packetfence-users >
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users