Hello Cousin,
the error message is not related to your issue.
do you have more log from packetfence.log file and from
httpd.portal.access when you connect your device to the ssid ?
Thanks
Fabrice
Le 18-12-06 à 11 h 20, Caique Araujo via PacketFence-users a écrit :
Brother,
I am
Hello Anton,
can you share the packetfence.log file, the answer will be in.
Regards
Fabrice
Le 18-12-06 à 15 h 03, Anton Castelli via PacketFence-users a écrit :
I'm pretty new to Packetfence. I have a demo server set up and
working. It authenticates 802.1x clients against our Active
I'm pretty new to Packetfence. I have a demo server set up and working. It
authenticates 802.1x clients against our Active Directory, can assign them a
role based on their LDAP group, and can assign them a VLAN based on their role.
Non-802.1x devices that fall back to MAB can also authenticate
Hi Nicolas Quiniou-Briand,
I can give this a try. But do I need to change anything? Or leave as
default? My guess would be as below:
[machine]
filter = node_info
attribute = machine_account
operator = defined
*value = Trusted-Machine*
[EthernetEAP]
filter = connection_type
operator = is
value =
Hi Nicolas
I don't know where the description line came from, but I have changed the
description for partner 2.
No change in behaviour.
Do I need to restart any part of packetfence to activate the change?
Thanks
Ian
>-Original Message-
>From: Nicolas Quiniou-Briand via
Brother,
I am deploying the Packetfence networking team with version 8.2. The type
of configuration is web-auth ...
What happens is that we have a physical topology, with the following ICs:
Packetfence Server, WiSM System (AP Controller) and FortiGate Firewall.
Firewall is the DHCP server for
On 2018-12-06 3:46 p.m., Ian Alder wrote:
[partner1 admin role]
[..]
description=partner1 admin role
[partner2 admin role]
[..] > description=partner1 admin role
Not sure it's your issue but the description are the same.
--
Nicolas Quiniou-Briand
n...@inverse.ca :: +1.514.447.4918 *140
Hi Nicolas
The file is:-
[Node Manager]
actions=NODES_READ,NODES_CREATE,NODES_UPDATE,NODES_DELETE
description=Nodes management
[User Manager]
Ian,
Please give me the content of /usr/local/pf/conf/adminroles.conf for:
-partner1 admin role
-partner2 admin role
--
Nicolas Quiniou-Briand
n...@inverse.ca :: +1.514.447.4918 *140 :: https://inverse.ca
Inverse inc. :: Leaders behind SOGo (https://sogo.nu), PacketFence
Hello Nicolas
Many thanks for the reply.
The actions for partner1 are:
Role=partner1
Access-level=partner1 admin role
Access-duration=5 days
Set tenant id = 1
The actions for partner2 are:
Role=partner2
Access-level=partner2 admin role
Access-duration=5 days
Set tenant id = 2
Also, I have
Hello Nishant,
If they support the Radius dynamic VLAN assignment, SNMP and Radius CoA (Change
of Authorization) it should be good.
For the Cisco we can trust more an iOS version than the models itself. If you
are running 15.2 or greater it will be fine.
We actually worked on the FortiSwitch
Hello Ian,
Thanks for the report.
I will try to reproduce this issue on 8.2.1.
Which are the access level for your users partner1 and partner2 ? You
can see this information in the "Actions" tab for each user.
--
Nicolas Quiniou-Briand
n...@inverse.ca :: +1.514.447.4918 *140 ::
Hello Wifi
On 2018-12-06 9:39 a.m., Wifi Guy via PacketFence-users wrote:
Excuse my ignorance but I dont understand the context of this? Im not
sure what VLAN filter does?
See
https://packetfence.org/doc/PacketFence_Installation_Guide.html#_vlan_filter_definition
VLAN filters will be
All of them should be fine.
-Original Message-
From: Nishant Sharma via PacketFence-users
Sent: Thursday, December 6, 2018 9:27 AM
To: packetfence-users@lists.sourceforge.net
Cc: Nishant Sharma
Subject: [PacketFence-users] Choosing Switches for Packetfence
Hi,
I am assigned to
Thank you.
-Original Message-
From: Nicolas Quiniou-Briand via PacketFence-users
Sent: Tuesday, December 4, 2018 10:03 PM
To: packetfence-users@lists.sourceforge.net
Cc: Nicolas Quiniou-Briand
Subject: Re: [PacketFence-users] Inline enforcement and unauthenticated user's
access
Hello
Hi Nicolas,
Excuse my ignorance but I dont understand the context of this? Im not sure
what VLAN filter does?
machine]
filter = node_info
attribute = machine_account
operator = defined
value = default
[EthernetEAP]
filter = connection_type
operator = is
value = Ethernet-EAP
Refuse User
Why fingerbank_Upstream.db file size is 1.5G on packetfence-7.3.0, and 64M
on packetfence-7.3.0,I found out because of this db file the CPU of the
server is usually 100% when authenticated. What should I do to solve this
problem on packetfence-7.3.0,
Hi Fabrice
Is the vlan.conf the only way? Currently I’m not using VLAN but returning
filter ID?
On Wed, 5 Dec 2018 at 14:33, Fabrice Durand via PacketFence-users <
packetfence-users@lists.sourceforge.net> wrote:
> Hello Wifi,
> Le 18-12-03 à 09 h 18, Wifi Guy via PacketFence-users a écrit :
>
>
Hi,
I am assigned to upgrade LAN infrastructure at an office. Brain of the
network is going to be Packetfence.
I want to make sure that investment is made in the right hardware well
supported with Packetfence. The models proposed by switch vendors are
not listed on
19 matches
Mail list logo