Okay.  I thought this through and here's a better demonstration for the 6500 
catalyst problems.

I have a new port setup on gi3/48.  I've configured a default port config on 
the switch as follows:

interface GigabitEthernet3/48
 switchport
 switchport access vlan 10
 switchport mode access
 switchport voice vlan 20
 switchport port-security
 switchport port-security maximum 2
 switchport port-security violation restrict
 switchport port-security mac-address sticky
 switchport port-security mac-address 0200.0100.0096
 switchport port-security mac-address 0200.0100.0348
end

...where vlan 10 = data (normal) network, and vlan 20 = voice network.

I then proceed to connect a brand new cisco 9971 voip phone into this port. 
(c40a.cbe0.0000)

switch log shows:

%ILPOWER-7-DETECT: Interface Gi3/48: Power Device detected: Cisco/IEEE PD
%PORT_SECURITY-SP-2-PSECURE_VIOLATION: Security violation occurred, caused by 
MAC address c40a.cbe0.0000 on port GigabitEthernet3/48.
%PORT_SECURITY-SPSTBY-2-PSECURE_VIOLATION: Security violation occurred, caused 
by MAC address c40a.cbe0.0000 on port GigabitEthernet3/48.

Packetfence.log shows:

Apr 18 19:18:27 pfsetvlan(4) INFO: nb of items in queue: 1; nb of threads 
running: 0 (main::startTrapHandlers)
Apr 18 19:18:28 pfsetvlan(4) INFO: secureMacAddrViolation trap received on 
[internal_ip] ifIndex 96 for c4:0a:cb:e0:00:00 (main::handleTrap)
Apr 18 19:18:28 pfsetvlan(4) INFO: node c4:0a:cb:e0:00:00 does not yet exist in 
PF database. Adding it now (main::node_update_PF)
Apr 18 19:18:28 pfsetvlan(4) INFO: authorizing VoIP c4:0a:cb:e0:00:00 (old 
entry 02:00:01:00:00:96) at new location [switch_ip] ifIndex 96 VLAN 20 
(main::handleTrap)
Apr 18 19:18:28 pfsetvlan(4) WARN: SNMP error tyring to remove or add secure 
rows to ifIndex 96 in port-security table. This could be normal. Error message: 
Received inconsistentValue(12) error-status at error-index 1 
(pf::SNMP::Cisco::Catalyst_6500::authorizeMAC)
Apr 18 19:18:28 pfsetvlan(4) INFO: finished (main::cleanupAfterThread)


and looking at the running config again:

interface GigabitEthernet3/48
 switchport
 switchport access vlan 10
 switchport mode access
 switchport voice vlan 20
 switchport port-security
 switchport port-security maximum 2
 switchport port-security violation restrict
 switchport port-security mac-address sticky
 switchport port-security mac-address 0200.0100.0096
 switchport port-security mac-address 0200.0100.0348
end

no net change -- but from the logs, we know and see that the MAC is added to PF 
db, and that the phone is detected as VOIP device.  However, snmp was trying to 
remove/add the config, and could not.


To move past this to demonstrate the second issue i've found, i'm going to 
manually add the phone mac address into the switch. I will demonstrate the 
scenario where the phone is already existent in the environment and where an 
end-user may plug a device into the integrated Ethernet port on these cisco 
phones.

switch# sh run int gi3/48

interface GigabitEthernet3/48
 switchport
 switchport access vlan 10
 switchport mode access
 switchport voice vlan 20
 switchport port-security
 switchport port-security maximum 2
 switchport port-security violation restrict
 switchport port-security mac-address sticky
 switchport port-security mac-address 0200.0100.0096
 switchport port-security mac-address c40a.cbe0.0000 vlan voice
end

So here i've removed one of the placeholder mac addresses and manually added 
the phone mac address into the switch.   (c40a.cbe0.0000 is the cisco phone)

I then proceed to plug in a laptop that is already recognized/registered with 
packetfence (but in a different port) into the integrated ethernet port on the 
phone:

switch# sh log
%PORT_SECURITY-SP-2-PSECURE_VIOLATION: Security violation occurred, caused by 
MAC address 6800.99f8.009b on port GigabitEthernet3/48.
%PORT_SECURITY-SPSTBY-2-PSECURE_VIOLATION: Security violation occurred, caused 
by MAC address 6800.99f8.009b on port GigabitEthernet3/48.
%SYS-5-CONFIG_I: Configured from [packetfence_ip] by snmp


packetfence.log shows:

Apr 18 19:29:58 pfsetvlan(8) INFO: nb of items in queue: 1; nb of threads 
running: 0 (main::startTrapHandlers)
Apr 18 19:29:58 pfsetvlan(8) INFO: secureMacAddrViolation trap received on 
[switch_ip] ifIndex 96 for 68:00:99:f8:00:9b (main::handleTrap)
Apr 18 19:29:58 pfsetvlan(8) INFO: Will try to check on this node's previous 
switch if secured entry needs to be removed. Old Switch IP: [switch_ip] 
(main::do_port_security)
Apr 18 19:29:58 pfsetvlan(8) INFO: MAC not found on node's previous switch 
secure table or switch inaccessible. (main::do_port_security)
Apr 18 19:29:58 pfsetvlan(8) INFO: [NOT CUSTOM] MAC: 68:00:99:f8:00:9b, PID: 
admin, Status: reg. Returned VLAN: 50 (pf::vlan::fetchVlanForNode)
Apr 18 19:29:58 pfsetvlan(8) INFO: authorizing 68:00:99:f8:00:9b at new 
location [switch_ip] ifIndex 96 (main::handleTrap)
Apr 18 19:29:58 pfsetvlan(8) WARN: SNMP error tyring to remove or add secure 
rows to ifIndex 96 in port-security table. This could be normal. Error message: 
Received inconsistentValue(12) error-status at error-index 1 
(pf::SNMP::Cisco::Catalyst_6500::authorizeMAC)
Apr 18 19:29:58 pfsetvlan(8) INFO: finished (main::cleanupAfterThread)


switch# sh run int gi3/48
interface GigabitEthernet3/48
 switchport
 switchport access vlan 10
 switchport mode access
 switchport voice vlan 20
 switchport port-security
 switchport port-security maximum 2
 switchport port-security violation restrict
 switchport port-security mac-address sticky
 switchport port-security mac-address c40a.cbe0.0000 vlan voice
 switchport port-security mac-address 0200.0100.0096
end

If any more info is required, let me know.



-----Original Message-----
From: Francois Gaudreault [mailto:fgaudrea...@inverse.ca]
Sent: Thursday, March 15, 2012 8:07 AM
To: packetfence-users@lists.sourceforge.net
Subject: Re: [Packetfence-users] Packetfence v3.2 and Cisco 6500 port-security 
problem - VLAN ACCESS

Hi Thomas,

As stated in the 6500 module documentation, we did not test it using VoIP.

=head1 STATUS

Supports port-security.
VoIP not tested.
...

Can you try setting a mac address on the voice vlan as well :
switchport port-security maximum 1 vlan voice switchport port-security 
mac-address 0200.010x.xxxx vlan voice

This is something we can look at if you want to sponsor the development.

On 12-03-14 1:09 AM, Thomas Tsai wrote:
> I'm currently setting up Packetfence v3.2 in conjunction with a Cisco 6509 
> running 12.2(33)SXI7. Two issues so far that I've run into.
>
> 1) Although the v3.2 admin guide (and network config guide) states that the 
> correct switchport config on a 6500 should look something like:
>
> switchport access vlan xxx
> switchport mode access
> switchport voice vlan xxx
> switchport port-security maximum 2
> switchport port-security maximum 1 vlan access switchport 
> port-security switchport port-security violation restrict switchport 
> port-security mac-address 0200.0001.0096 spanning-tree portfast
>
> . the "switchport port-security maximum 1 vlan access" command is not 
> supported on the 6509.  In fact, from an open Cisco support case, as well as 
> Cisco documentation online, the only time that "vlan access" would work is if 
> the switch port is configured as a trunk port.  That can easily be done by 
> me, however, it seems like there is no other posting that would make me 
> believe this would work for packetfence.  Any suggestions?
>
> 2) Secondly, when I ignore this issue and simply set the maximum to 1 without 
> the "vlan access" line (assuming that, I'll only have a phone connected into 
> a switchport),  I can connect a computer device and things seem to work 
> appropriately, however if I connect a VOIP device, such as a Cisco 7975 IP 
> Phone,  I get the following error in the packetfence.log:
>
> Mar 13 21:46:52 pfsetvlan(19) WARN: SNMP error tyring to remove or add 
> secure rows to ifIndex 96 in port-security table. This could be 
> normal. Error message: Received inconsistentValue(12) error-status at 
> error-index 1 (pf::SNMP::Cisco::Catalyst_6500::authorizeMAC)
>
> And nothing seems to happen, which makes me think this isn't going to work.  
> Looking at past articles,  I only see one other instance of this happening to 
> a person using a 2960, which needed to just upgrade his IOS version to a 
> newer one.
>
> I am totally opened to upgrading to v15 IOS, or another train altogether, as 
> long as I know what to upgrade to.  Does anyone have any suggestions or any 
> experience getting packetfence to work correctly with a Cisco Catalyst 6500 
> series switch?
>
>
>
>
> **********************************************
> Email Disclaimer:
>
> This email, including attachments, may contain proprietary, 
> confidential or privileged information. If you are not the intended 
> recipient, please (i) do not use, disclose, save or retransmit this 
> message or any attachments, (ii) alert the sender by reply email and
> (iii) destroy or delete this message and any attachments.
> Delivery of this email to a person other than the intended
> recipient(s) shall not constitute a waiver of privilege or 
> confidentiality.
>
> CP Investments, member FINRA and SIPC, serves as placement agent for 
> investment products advised by Canyon Capital Advisors LLC. This email 
> is not intended to be an offer to sell or a solicitation of an offer 
> to buy any security in any jurisdiction. We review and retain 
> electronic communications traveling through our network.
>
> **********************************************
>
> ----------------------------------------------------------------------
> -------- Virtualization&  Cloud Management Using Capacity Planning 
> Cloud computing makes use of virtualization - but cloud computing also 
> focuses on allowing computing to be delivered as a service.
> http://www.accelacomm.com/jaw/sfnl/114/51521223/
> _______________________________________________
> Packetfence-users mailing list
> Packetfence-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>


--
Francois Gaudreault, ing. jr
fgaudrea...@inverse.ca  ::  +1.514.447.4918 (x130) ::  www.inverse.ca Inverse 
inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
(www.packetfence.org)

------------------------------------------------------------------------------
This SF email is sponsosred by:
Try Windows Azure free for 90 days Click Here http://p.sf.net/sfu/sfd2d-msazure 
_______________________________________________
Packetfence-users mailing list
Packetfence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

------------------------------------------------------------------------------
For Developers, A Lot Can Happen In A Second.
Boundary is the first to Know...and Tell You.
Monitor Your Applications in Ultra-Fine Resolution. Try it FREE!
http://p.sf.net/sfu/Boundary-d2dvs2
_______________________________________________
Packetfence-users mailing list
Packetfence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to