Hey folks,
we're currently implementing certificate based authentication on our mobile
devices. While the authentication works fine, I wonder if there is a way to
resolve the corresponding AD-User from the CommonName or E-Mail field of the
certificate. I know that I can setup my realm to
Hi Peter,
we've had this issue too, we've ended up disabling the "Use Connector" radio
button on the corresponding switch/switch group. This does seem to work around
the issue, while snmp connection still works fine.
Mit freundlichen Grüßen
i.A. Heiko Matthies
IT
_MODULE_FAIL, ('Reply-Message' => "Network device does
not support this mode of operation")]; }
If I read this correctly, the FortiAP sends CLI-Access as connection type but
as it seems, this is not supported in radius.pm. Is this a bug?
Kind Regards,
Heiko Matthies
Von: Ma
08
Datenschutz: Ausführliche Informationen zum Umgang mit Ihren personenbezogenen
Daten bei ASAP erhalten Sie auf unserer Website unter
www.asap.de\datenschutz.Von: Matthies, Heiko via PacketFence-users
Gesendet: Donnerstag, 1. Dezember 2022 17:42
An: packetfence-users@lists.sourceforge.net
Cc:
Greetings,
we are currently testing out packetfence captive-portal auth in connection with
FortiGate and FortiAPs. I followed the instructions from the following mailing
list post:
Hello Nicolas,
another information which maybe useful to you. After I logged into the GUI and
tried to rejoin my domain, the same issue (timeout) occurs. I think the system
tries to reinsert the ruleset from the v12 iptables.conf and bricks the system
doing so.
Kind Regards,
Heiko Matthies
Hello Nicolas,
I compared the current iptables.conf with the iptables.conf.example and found
only one difference:
#-A input-management-if --protocol tcp --match tcp --dport 1025 --jump ACCEPT
This line is uncommented in production as we used the haproxy dashboard in the
past. I don't think this
Hello Nicolas,
I suppose, Michael will provide the needed logs and information for you. As we
have still not upgraded our main packetfence instance, I could reproduce the
issue if needed. Just hit me up, if you need further information about this
issue.
Kind regards,
Heiko Matthies
Hello Guys,
i'm trying to implement machine- and user authentication on Windows 10 Clients
via MS-CHAPv2 using Packetfence v11.1. While the user authentication works like
a charm, I'm having trouble setting up the machine authentication. I got the
following log information from the radius
Hi Jake,
this is to be expected as packetfence overrides the content of the
captive-portal folder with each update (as far as I know). The only thing saved
are the customizations made in the Web-UI (customization under the connection
profile). Our current workaround is to save the css/image
Hello,
I wanted to upgrade my Packetfence 11.1 instance to 12.0 using the recommended
steps from the upgrade-guide:
31.3. Full upgrade (for PacketFence versions 11.1.0 and later)
Run following script to perform a full upgrade:
/usr/local/pf/addons/upgrade/do-upgrade.sh
This procedure worked
Greetings,
I'm currently trying to implement a captive portal authentication for my wired
clients on a Dell N2048P in my test lab. I followed the instructions provided
by the packetfence documentation
Hello,
I'm currently trying to set the RADIUS session-timeout on my switch using the
corresponding filters in PacketFence. Setting a static value works like a
charm, but I didn't found the matching variable yet. My goal is to use the
value returned from the authentication source (e.g. my EAP
, Sep 21, 2021 at 5:22 AM Matthies, Heiko via PacketFence-users
mailto:packetfence-users@lists.sourceforge.net>>
wrote:
Hello,
I'm currently trying out the captive portal module from packetfence and having
difficulties with the OIDC Authentication. I believe I set up the OIDC
Hello,
I'm currently trying out the captive portal module from packetfence and having
difficulties with the OIDC Authentication. I believe I set up the OIDC
authentication source correctly as I get redirected back from the Microsoft
page. After that, the following error message occurs:
Hello,
I'm currently trying out the captive portal module from packetfence and having
difficulties with the OIDC Authentication. I believe I set up the OIDC
authentication source correctly as I get redirected back from the Microsoft
page. After that, the following error message occurs:
OAuth2
eature=results_main>
On Sep 6, 2021, at 8:38 AM, Matthies, Heiko via PacketFence-users
mailto:packetfence-users@lists.sourceforge.net>>
wrote:
Hello,
I'm looking for a way to integrate devices from partner companies into our
network. I planned to provide a extra VLAN at every s
Hello,
I'm looking for a way to integrate devices from partner companies into our
network. I planned to provide a extra VLAN at every site which allows nothing
but basic internet access without a captive portal.
They normally use certificate based authentication via EAP-TLS which leads me
to
Hello Nicolas,
thank you. I could indeed see snmp-traffic to my switch which was getting no
response. The only difference between the production switch and my lab device
is the firmware and the number of ports.
LAB-Switch: Cisco C1000-8P-2G-L - Firmware 15.2(7)E3
Production-Switch: Cisco
Greetings,
I’m currently integrating PacketFence into our company network. Last week I
created a cluster consisting of 3 nodes (one node per Site).
While my test device works at every switch I connect it to, every new device
gets rejected with the following radius.log message:
Jun 14
20 matches
Mail list logo