Any comment or help regarding the issue (in last mail) from anyone
Regards,
--Chinmay
From: "Chinmay Mahata" chinmay_mah...@rediffmail.com
Sent: Wed, 16 Dec 2015 16:51:43
To: "packetfence-users " packetfence-users@lists.sourceforge.net
Subject: [PacketFence-users] Inline
Hi Dan,
For your issues of duplicate nodes, you are seeing them because multiple
locationlog entries are opened for the same device
You can confirm it easily by executing the following query in your
database :
mysql > select count(*) from node where voip='';
If the count is higher than 0
Hi Anton,
can you try something like that:
[regnetwork]
filter = ssid
operator = is
value = ess_pf_MacAuth
[unregnode:regnetwork]
scope = NormalVlan
role = registration
action = deregister_node
action_param = mac = $mac
Regards
Fabrice
Le 2015-12-17 04:16, Anton Dreyer a écrit :
> Hi
Hi Fabrice
Thanks for taking the time to answer. The idea of simply unregistering everyone
connecting to the openssid is ingenious.
I have spent a good couple of hours on this, but I am just not making any
progress. The below info is from a meru controller with an open ssid and mac
auth. I
Thank you Julien for all your help. Worked perfectly.
-
Hi Dan,
For your issues of duplicate nodes, you are seeing them because multiple
locationlog entries are opened for the same device
You can confirm it easily by executing the
Hi Frank
you can use pftest to test your rules like that:
/pftest authentication test test
Also check my comment bellow.
Le 2015-12-17 15:55, Frank J. Veenstra a écrit :
>
> Hello,
>
>
>
> We have configured Packetfence with Radius authentication to an Active
> Directory domain. The user is
Hello,
We have configured Packetfence with Radius authentication to an Active
Directory domain. The user is passed the authentication proces, but Dynamic
VLAN assignment based on group membership in AD doesn't work. Device is not
putting in a VLAN defined by the conditions in our rule. (When
Yeah, we do the same thing with Chained Auth where we do local first (a
username/ pass provided to the conference) and then secondly we do SMS
verification so we collect all your necessary info and a legit SMS to text a
code to. Working well.
Thanks,
~Maciej
From: Fabrice DURAND
Thanks for the response Fabrice,
I’ll put this out there for anyone doing Aruba with PF…. The captiveportal ACL
needs to be changed for HTTPS to dst-nat “IP of Packetfence” instead of
pointing to port 8081. That lets the HTTPS not terminate on Aruba and pass
through to PF.
I removed all the
Hello Fabrice,
Thanks for your comments and your fast reply!
We will try your feedback when we are back at the company.
Kind regards,
Frank
-Oorspronkelijk bericht-
Van: Fabrice DURAND [mailto:fdur...@inverse.ca]
Verzonden: donderdag 17 december 2015 22:31
Aan:
10 matches
Mail list logo