Hi all,

How to upgrade packetfence 5.2 to packetfence 5.3 in centos?

Thank you,

------
Regards,

Kishore Thapa
System Administrator,
The Village,
United Distribution Nepal Pvt.Ltd.,
Trade Tower Thapathali


-----Original Message-----
From: packetfence-users-requ...@lists.sourceforge.net
[mailto:packetfence-users-requ...@lists.sourceforge.net] 
Sent: Thursday, July 23, 2015 12:44 AM
To: packetfence-users@lists.sourceforge.net
Subject: PacketFence-users Digest, Vol 87, Issue 56

Send PacketFence-users mailing list submissions to
        packetfence-users@lists.sourceforge.net

To subscribe or unsubscribe via the World Wide Web, visit
        https://lists.sourceforge.net/lists/listinfo/packetfence-users
or, via email, send a message with subject or body 'help' to
        packetfence-users-requ...@lists.sourceforge.net

You can reach the person managing the list at
        packetfence-users-ow...@lists.sourceforge.net

When replying, please edit your Subject line so it is more specific
than "Re: Contents of PacketFence-users digest..."


Today's Topics:

   1. ProCurve 2530 error (Polar Geek)
   2. Re: Packetfence-ZEN-5-1 bandwidth violation (Louis Munro)
   3. ANN: PacketFence 5.3.0 (Louis Munro)


----------------------------------------------------------------------

Message: 1
Date: Wed, 22 Jul 2015 12:14:00 -0600
From: "Polar Geek" <polarg...@gmail.com>
Subject: [PacketFence-users] ProCurve 2530 error
To: <packetfence-users@lists.sourceforge.net>
Message-ID: <008d01d0c4aa$3079fdd0$916df970$@gmail.com>
Content-Type: text/plain; charset="us-ascii"

Hello all,

 

Having a problem getting my 2530's working properly with PacketFence 5.3.0
on CentOS 6.6. 

 

Currently the switches are sending the Mac Address violation traps and the
server is receiving them. The server states that it is authorizing the MAC
Address. (Doesn't Actually happen) It then successfully sets the VLAN of the
port to the registration VLAN.

 

So my problem is that because it doesn't overwrite the the Mac Address in
the security table, the connection doesn't progress. The log shows no errors
that I can find. 

 

Jul 22 11:27:04 pfsetvlan(2) INFO: nb of items in queue: 1; nb of threads
running: 0 (main::startTrapHandlers)

Jul 22 11:27:04 pfsetvlan(2) INFO: secureMacAddrViolation trap received on
10.10.10.8 ifIndex 9 for f0:de:f1:e1:d0:f9 (main::handleTrap)

Jul 22 11:27:04 pfsetvlan(2) INFO: Will try to check on this node's previous
switch if secured entry needs to be removed. Old Switch IP: 10.10.10.8
(main::do_port_security)

Jul 22 11:27:04 pfsetvlan(2) INFO: MAC not found on node's previous switch
secure table or switch inaccessible. (main::do_port_security)

Jul 22 11:27:06 pfsetvlan(2) INFO: [f0:de:f1:e1:d0:f9] is of status unreg;
belongs into registration VLAN (pf::vlan::getRegistrationVlan)

Jul 22 11:27:06 pfsetvlan(2) INFO: authorizing f0:de:f1:e1:d0:f9 (old entry
00:10:02:00:30:04) at new location 10.10.10.8 ifIndex 9 (main::handleTrap)

Jul 22 11:27:06 pfsetvlan(2) INFO: setting VLAN at 10.10.10.8 ifIndex 9 from
4000 to 50 (pf::Switch::setVlan)

Jul 22 11:27:06 pfsetvlan(2) INFO: finished (main::cleanupAfterThread)

 

 

I know from working with the switch CLI directly that you can't just specify
a new Mac Address. It generates the output below.

 

GREENRMSWT24(config)# port-security 7 mac-address f0def1e1d0f9

Too many addresses for port 7.

 

I suspect this is the issue with packetfence unless it is using a different
command to change the mac address. 

 

Any thoughts or suggestions?

Thanks

 

Paul Taylor

IT Support
Luther College High School



 

 

 

-------------- next part --------------
An HTML attachment was scrubbed...

------------------------------

Message: 2
Date: Wed, 22 Jul 2015 14:16:46 -0400
From: Louis Munro <lmu...@inverse.ca>
Subject: Re: [PacketFence-users] Packetfence-ZEN-5-1 bandwidth
        violation
To: packetfence-users@lists.sourceforge.net
Message-ID: <d77ea5d5-ee18-4b7a-871d-91977ce82...@inverse.ca>
Content-Type: text/plain; charset="windows-1252"

It may not be your config that?s wrong. 
It may be that the switch is not sending accounting data to PacketFence. 

Have you configured RADIUS accounting on the 2960? 

Regards,
--
Louis Munro
lmu...@inverse.ca  ::  www.inverse.ca 
+1.514.447.4918 x125  :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
(www.packetfence.org)

On Jul 22, 2015, at 1:11 , Hubert Kupper <kup...@uni-landau.de> wrote:

> Hello,
> 
> I have running Packetfence-ZEN-5-1 fine. I created a test bandwidth 
> violation of 2MB/Day but nothing happens when a client uses more than 
> 2MB traffic. The web interface shows "there is not enough data to create 
> the graph" and violation.log shows only DHCP violations.
> 
> I added the following line to the Cisco 2960G in switches.conf:
> 
> deauthMethod=RADIUS
> 
> In violations.conf:
> 
> [1100013]
> desc=Bandwidth Limit test (2MB/day)
> template=bandwidth_limit
> #hk090715 trigger=Accounting::BandwidthExpired
> trigger=Accounting::TOT2MBD
> window=dynamic
> enabled=Y
> actions=trap,log
> priority=1
> auto_enable=N
> whitelisted_categories=
> vlan=isolation
> 
> 
> So what is wrong with my config?
> 
> Best regards,
> Hubert
> 
>
----------------------------------------------------------------------------
--
> _______________________________________________
> PacketFence-users mailing list
> PacketFence-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/packetfence-users

-------------- next part --------------
An HTML attachment was scrubbed...

------------------------------

Message: 3
Date: Wed, 22 Jul 2015 14:58:47 -0400
From: Louis Munro <lmu...@inverse.ca>
Subject: [PacketFence-users] ANN: PacketFence 5.3.0
To: packetfence-users@lists.sourceforge.net,
        packetfence-annou...@lists.sourceforge.net,
        packetfence-de...@lists.sourceforge.net
Message-ID: <3bce48ee-1211-43f1-95a1-5bb5c9c00...@inverse.ca>
Content-Type: text/plain; charset="windows-1252"

ANNOUNCING: PacketFence 5.3.0

The Inverse team is pleased to announce the immediate availability of
PacketFence 5.3.0. This is a major release with new features, enhancements
and important bug fixes. This release is considered ready for production use
and upgrading from previous versions is strongly advised.

What is PacketFence ?

PacketFence is a fully supported, trusted, Free and Open Source Network
Access Control (NAC) solution. Boasting an impressive feature set,
PacketFence can be used to effectively secure small to very large
heterogeneous networks.

Among the features provided by PacketFence, there are:

        ? powerful BYOD (Bring Your Own Device) capabilities
        ? state-of-the art devices fingerprinting with Fingerbank
        ? multiple enforcement methods including Role-Based Access Control
(RBAC) and hotspot-style
        ? compliance checks for endpoints present on your network
        ? integration with various vulnerability scanners, intrusion
detection solutions, security agents and firewalls
        ? bandwidth accounting for all devices

A complete overview of the solution is available from the official website:
http://www.packetfence.org/about/overview.html

Changes Since Previous Release

New Features

        ? Support for Single Sign-On integration with the iboss platform
        ? Support for web authentication for NATed clients
        ? Support for MAC Authentication and 802.1x for Alcatel-Lucent
switches
        ? Support for the IBM StackSwitch G8052 switch

Enhancements

        ? New Powershell scripts to allow unregistering nodes for disabled
accounts on Active Directory
        ? Force a JSON response if the Accept header is set to
'application/json'
        ? Fingerbank processing in pfdhcplistener is now asyncronous using
the webservices
        ? Integration of pfconfig commands in bin/pfcmd
        ? Added web form registration to Ruckus Controllers
        ? Improved database maintenance script to prevent prolonged locking
of tables
        ? Active/Active mode will now send gratuitous ARPs to update routers
when changing master node

Bug Fixes

        ? Fixed multiple XSS vulnerabilities in the administration GUI
        ? Fixed incorrect RADIUS realm detection when using windows computer
authentication
        ? Fixed an issue with pfdns returning the wrong IP when using
active/active mode
        ? Fixed an issue on Debian and Ubuntu where the GUI could not change
some field values
        ? Fixed incorrect graphite document root on Ubuntu
        ? Fixed SMS bug where the list of carriers could be accidentally
deleted

See https://github.com/inverse-inc/packetfence/commits/packetfence-5.3.0 for
the complete change log.

See the UPGRADE file for notes about upgrading:
https://github.com/inverse-inc/packetfence/tree/packetfence-5.3.0/UPGRADE.as
ciidoc

Getting PacketFence

PacketFence is free software and is distributed under the GNU GPL. As such,
you are free to download and try it by either getting the new release or by
getting the sources: http://www.packetfence.org/development/sourcecode.html

Documentation about the installation and configuration of PacketFence is
also available: http://www.packetfence.org/documentation/

How Can I Help ?

PacketFence is a collaborative effort in order to create the best Free and
Open Source NAC solution. There are multiple ways you can contribute to the
project:

        ? Documentation reviews, enhancements and translations
        ? Feature requests or by sharing your ideas
        ? Participate in the discussion on mailing lists
(http://www.packetfence.org/support/community.html)
        ? Patches for bugs or enhancements
        ? Provide new translations of remediation pages

Getting Support

For any questions, do not hesitate to contact us by writing to
supp...@inverse.ca

You can also fill our online form (http://www.inverse.ca/#contact) and a
representative from Inverse will contact you.

Inverse offers professional services to organizations willing to secure
their wired and wireless networks with the PacketFence solution.


--
Louis Munro
lmu...@inverse.ca  ::  www.inverse.ca 
+1.514.447.4918 x125  :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
(www.packetfence.org)

-------------- next part --------------
An HTML attachment was scrubbed...

------------------------------

----------------------------------------------------------------------------
--


------------------------------

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


End of PacketFence-users Digest, Vol 87, Issue 56
*************************************************


------------------------------------------------------------------------------
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to