Hello, has anyone had success with setting up Meraki Wifi using MAC based Auth and Identity PSK with RADIUS?
I have wired mac based auth working fine with meraki switches. Also my logs are show the wireless clients connect and authenticate, its just windows 10 client reports back “Can’t Connecto to this network” Jul 31 16:28:45 STB01NAC01 httpd.aaa-docker-wrapper[2793]: httpd.aaa(7) WARN: [mac:10:6f:d9:a1:52:a1] Unable to extract audit-session-id for module pf::Switch::Meraki::MS220_8. SSID-based VLAN assignments won't work. Make sure you enable Vendor Specific Attributes (VSA) on the AP if you want them to work. (pf::Switch::getCiscoAvPairAttribute) Jul 31 16:28:45 STB01NAC01 httpd.aaa-docker-wrapper[2793]: httpd.aaa(7) INFO: [mac:10:6f:d9:a1:52:a1] handling radius autz request: from switch_ip => (10.109.19.251), connection_type => Wireless-802.11-NoEAP,switch_mac => (e4:55:a8:12:b8:3c), mac => [10:6f:d9:a1:52:a1], port => 0, username => "106fd9a152a1", ssid => RAD-TEST (pf::radius::authorize) Jul 31 16:28:45 STB01NAC01 httpd.aaa-docker-wrapper[2793]: httpd.aaa(7) INFO: [mac:10:6f:d9:a1:52:a1] Instantiate profile default (pf::Connection::ProfileFactory::_from_profile) Jul 31 16:28:45 STB01NAC01 httpd.aaa-docker-wrapper[2793]: httpd.aaa(7) INFO: [mac:10:6f:d9:a1:52:a1] Found authentication source(s) : 'local,file1' for realm 'null' (pf::config::util::filter_authentication_sources) Jul 31 16:28:45 STB01NAC01 httpd.aaa-docker-wrapper[2793]: httpd.aaa(7) INFO: [mac:10:6f:d9:a1:52:a1] Connection type is MAC-AUTH. Getting role from node_info (pf::role::getRegisteredRole) Jul 31 16:28:45 STB01NAC01 httpd.aaa-docker-wrapper[2793]: httpd.aaa(7) INFO: [mac:10:6f:d9:a1:52:a1] Username was defined "106fd9a152a1" - returning role 'Corp-Wifi' (pf::role::getRegisteredRole) Jul 31 16:28:45 STB01NAC01 httpd.aaa-docker-wrapper[2793]: httpd.aaa(7) INFO: [mac:10:6f:d9:a1:52:a1] PID: "ryan.bergen", Status: reg Returned VLAN: (undefined), Role: Corp-Wifi (pf::role::fetchRoleForNode) Jul 31 16:28:45 STB01NAC01 httpd.aaa-docker-wrapper[2793]: httpd.aaa(7) INFO: [mac:10:6f:d9:a1:52:a1] (10.109.19.251) Added VLAN 512 to the returned RADIUS Access-Accept (pf::Switch::returnRadiusAccessAccept) Jul 31 16:28:45 STB01NAC01 httpd.aaa-docker-wrapper[2793]: httpd.aaa(7) INFO: [mac:10:6f:d9:a1:52:a1] (10.109.19.251) Added role 512 to the returned RADIUS Access-Accept (pf::Switch::returnRadiusAccessAccept) Meraki SSID is “RAD-TEST” and in Meraki I have it configured the following: Security: Identity PSK with RADIUS WPA encryption: WPA2 only Splash page: none (direct access) Radius Servers: [packetfence IP] port 1812, with Secret Radius Accounting server: [packetfence IP] port 1813, with Secret Radius testing: enabled Radius CoA Support: enabled Radius attribute: Filter-Id IP Assignment: Bridge w/ Radius override vlan tag Vlan tagging: disabled Packetfence Configuration: Switch: Type: Meraki MS220_8 Mode: Production Deauth method: RADIUS Roles: VLAN ID Radius: Secret matching above Meraki SSID Configuration Node: Manually added node, athorized it, associated to user User: input PSK entry Anything Im missing to get this working? We have it working with our legacy custom built free-radius/mysql setup. Client is requred a manual mac entry, with role and is authenticated using a generic PSK , MAC is looked up, then put on the proper VLAN mapped. Thanks
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users