Hello,

Reading the configuration i see you point atleast twice with radius to
localhost/switchip 192.168.1.5, where it seems 192.168.1.1 is your PF
server.

ON FE0/3 you have a different configuration(radius) then FE0/2(snmp),
does it work in the 3rd port? Radius is the way to go, atleast with the
HP switches i use.

Also, do you see logs coming in the log
(/usr/local/pf/logs/packetfence.log) that might be a good place to
start/continue your journey.

Bebbet

On 20-2-2016 14:59, TOURE Amidou Florian wrote:
> Hi all,
> I have configure a 2950 switch to work with packetfence.But when i plug
> a computer on the fasethernet 0/2 interface of this switch the user is
> unable to connect.But the ping between the switch and packetfence server
> runs well
> PC doesn't get an IP adress.
> this is my switch configuration: 
> And the file attached to this mail is my dhcp configuration on my
> Packetfence server ;
> Is some one can help me please?
> Thank you
> 
> Building configuration...
> 
> Current configuration : 3126 bytes
> !
> version 12.1
> no service pad
> service timestamps debug uptime
> service timestamps log uptime
> service password-encryption
> !
> hostname Switch2950
> !
> aaa new-model
> aaa group server radius packetfence
>  server 192.168.1.1 auth-port 1812 acct-port 1813
>  server 192.168.1.5 auth-port 1812 acct-port 1813
> !
> aaa authentication login default local
> aaa authentication dot1x default group packetfence
> aaa authorization network default group packetfence
> enable secret 5 $1$P1U9$bArtlh12QVQT.haxsXcuu0
> enable password 7 14141B180F0B
> !
> username admin secret 5 $1$SN4M$rc6dLFgb1CPGQ.OG4v/xa.
> ip subnet-zero
> !
> !
> spanning-tree mode pvst
> no spanning-tree optimize bpdu transmission
> spanning-tree extend system-id
> dot1x system-auth-control
> !
> !
> !
> !
> interface FastEthernet0/1
>  switchport trunk native vlan 10
>  switchport trunk allowed vlan 10,20,30,40,60,100
>  switchport mode trunk
> !
> interface FastEthernet0/2
>  switchport access vlan 40
>  switchport mode access
>  switchport port-security
>  switchport port-security violation restrict
>  switchport port-security mac-address sticky
>  snmp trap mac-notification added
> !
> interface FastEthernet0/3
>  switchport access vlan 40
>  switchport mode access
>  dot1x port-control auto
>  dot1x host-mode multi-host
>  dot1x reauthentication
>  spanning-tree portfast
> !
> interface FastEthernet0/4
> !
> interface FastEthernet0/5
> !
> interface FastEthernet0/6
> !
> interface FastEthernet0/7
> !
> interface FastEthernet0/8
> !
> interface FastEthernet0/9
> !
> interface FastEthernet0/10
> !
> interface FastEthernet0/11
> !
> interface FastEthernet0/12
> !
> interface FastEthernet0/13
> !
> interface FastEthernet0/14
> !
> interface FastEthernet0/15
> !
> interface FastEthernet0/16
> !
> interface FastEthernet0/17
> !
> interface FastEthernet0/18
> !
> interface FastEthernet0/19
> !
> interface FastEthernet0/20
> !
> interface FastEthernet0/21
> !
> interface FastEthernet0/22
> !
> interface FastEthernet0/23
> !
> interface FastEthernet0/24
> !
> interface Vlan1
>  no ip address
>  no ip route-cache
>  shutdown
> !
> interface Vlan10
>  ip address 192.168.1.5 255.255.255.0
>  ip helper-address 192.168.10.1
>  no ip route-cache
> !
> interface Vlan20
>  ip address 192.168.20.1 255.255.255.0
>  no ip route-cache
>  shutdown
> !
> interface Vlan30
>  ip address 192.168.30.1 255.255.255.0
>  no ip route-cache
>  shutdown
> !
> interface Vlan40
>  ip address 192.168.40.1 255.255.255.0
>  no ip route-cache
>  shutdown
> !
> interface Vlan60
>  ip address 192.168.60.1 255.255.255.0
>  no ip route-cache
>  shutdown
> !
> ip http server
> snmp-server community public RO
> snmp-server community private RW
> snmp-server enable traps snmp linkdown linkup
> snmp-server enable traps port-security
> snmp-server enable traps port-security trap-rate 1
> snmp-server host 192.168.1.1 version 2c pubblic  port-security
> snmp-server host 192.168.1.1 version 2c public  MAC-Notification        
>                                                                        
>                        snmp
> radius-server host 192.168.1.5 auth-port 1812 acct-port 1813 time      
>                                                                        
>                         out 2 key 7 044F03030820414B
> radius-server retransmit 3
> radius-server vsa send authentication
> !
> line con 0
> line vty 0 4
>  password 7 045802150C2E4F471A1A0A
> line vty 5 15
>  password 7 045802150C2E4F471A1A0A
> !
> mac-address-table notification interval 0
> mac-address-table notification
> mac-address-table aging-time 3600
> !
> end
> 
> 
> 
> ------------------------------------------------------------------------------
> Site24x7 APM Insight: Get Deep Visibility into Application Performance
> APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month
> Monitor end-to-end web transactions and take corrective actions now
> Troubleshoot faster and improve end-user experience. Signup Now!
> http://pubads.g.doubleclick.net/gampad/clk?id=272487151&iu=/4140
> 
> 
> 
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
> 


------------------------------------------------------------------------------
Site24x7 APM Insight: Get Deep Visibility into Application Performance
APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month
Monitor end-to-end web transactions and take corrective actions now
Troubleshoot faster and improve end-user experience. Signup Now!
http://pubads.g.doubleclick.net/gampad/clk?id=272487151&iu=/4140
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to