Hello, Reading the configuration i see you point atleast twice with radius to localhost/switchip 192.168.1.5, where it seems 192.168.1.1 is your PF server.
ON FE0/3 you have a different configuration(radius) then FE0/2(snmp), does it work in the 3rd port? Radius is the way to go, atleast with the HP switches i use. Also, do you see logs coming in the log (/usr/local/pf/logs/packetfence.log) that might be a good place to start/continue your journey. Bebbet On 20-2-2016 14:59, TOURE Amidou Florian wrote: > Hi all, > I have configure a 2950 switch to work with packetfence.But when i plug > a computer on the fasethernet 0/2 interface of this switch the user is > unable to connect.But the ping between the switch and packetfence server > runs well > PC doesn't get an IP adress. > this is my switch configuration: > And the file attached to this mail is my dhcp configuration on my > Packetfence server ; > Is some one can help me please? > Thank you > > Building configuration... > > Current configuration : 3126 bytes > ! > version 12.1 > no service pad > service timestamps debug uptime > service timestamps log uptime > service password-encryption > ! > hostname Switch2950 > ! > aaa new-model > aaa group server radius packetfence > server 192.168.1.1 auth-port 1812 acct-port 1813 > server 192.168.1.5 auth-port 1812 acct-port 1813 > ! > aaa authentication login default local > aaa authentication dot1x default group packetfence > aaa authorization network default group packetfence > enable secret 5 $1$P1U9$bArtlh12QVQT.haxsXcuu0 > enable password 7 14141B180F0B > ! > username admin secret 5 $1$SN4M$rc6dLFgb1CPGQ.OG4v/xa. > ip subnet-zero > ! > ! > spanning-tree mode pvst > no spanning-tree optimize bpdu transmission > spanning-tree extend system-id > dot1x system-auth-control > ! > ! > ! > ! > interface FastEthernet0/1 > switchport trunk native vlan 10 > switchport trunk allowed vlan 10,20,30,40,60,100 > switchport mode trunk > ! > interface FastEthernet0/2 > switchport access vlan 40 > switchport mode access > switchport port-security > switchport port-security violation restrict > switchport port-security mac-address sticky > snmp trap mac-notification added > ! > interface FastEthernet0/3 > switchport access vlan 40 > switchport mode access > dot1x port-control auto > dot1x host-mode multi-host > dot1x reauthentication > spanning-tree portfast > ! > interface FastEthernet0/4 > ! > interface FastEthernet0/5 > ! > interface FastEthernet0/6 > ! > interface FastEthernet0/7 > ! > interface FastEthernet0/8 > ! > interface FastEthernet0/9 > ! > interface FastEthernet0/10 > ! > interface FastEthernet0/11 > ! > interface FastEthernet0/12 > ! > interface FastEthernet0/13 > ! > interface FastEthernet0/14 > ! > interface FastEthernet0/15 > ! > interface FastEthernet0/16 > ! > interface FastEthernet0/17 > ! > interface FastEthernet0/18 > ! > interface FastEthernet0/19 > ! > interface FastEthernet0/20 > ! > interface FastEthernet0/21 > ! > interface FastEthernet0/22 > ! > interface FastEthernet0/23 > ! > interface FastEthernet0/24 > ! > interface Vlan1 > no ip address > no ip route-cache > shutdown > ! > interface Vlan10 > ip address 192.168.1.5 255.255.255.0 > ip helper-address 192.168.10.1 > no ip route-cache > ! > interface Vlan20 > ip address 192.168.20.1 255.255.255.0 > no ip route-cache > shutdown > ! > interface Vlan30 > ip address 192.168.30.1 255.255.255.0 > no ip route-cache > shutdown > ! > interface Vlan40 > ip address 192.168.40.1 255.255.255.0 > no ip route-cache > shutdown > ! > interface Vlan60 > ip address 192.168.60.1 255.255.255.0 > no ip route-cache > shutdown > ! > ip http server > snmp-server community public RO > snmp-server community private RW > snmp-server enable traps snmp linkdown linkup > snmp-server enable traps port-security > snmp-server enable traps port-security trap-rate 1 > snmp-server host 192.168.1.1 version 2c pubblic port-security > snmp-server host 192.168.1.1 version 2c public MAC-Notification > > snmp > radius-server host 192.168.1.5 auth-port 1812 acct-port 1813 time > > out 2 key 7 044F03030820414B > radius-server retransmit 3 > radius-server vsa send authentication > ! > line con 0 > line vty 0 4 > password 7 045802150C2E4F471A1A0A > line vty 5 15 > password 7 045802150C2E4F471A1A0A > ! > mac-address-table notification interval 0 > mac-address-table notification > mac-address-table aging-time 3600 > ! > end > > > > ------------------------------------------------------------------------------ > Site24x7 APM Insight: Get Deep Visibility into Application Performance > APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month > Monitor end-to-end web transactions and take corrective actions now > Troubleshoot faster and improve end-user experience. Signup Now! > http://pubads.g.doubleclick.net/gampad/clk?id=272487151&iu=/4140 > > > > _______________________________________________ > PacketFence-users mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/packetfence-users > ------------------------------------------------------------------------------ Site24x7 APM Insight: Get Deep Visibility into Application Performance APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month Monitor end-to-end web transactions and take corrective actions now Troubleshoot faster and improve end-user experience. Signup Now! http://pubads.g.doubleclick.net/gampad/clk?id=272487151&iu=/4140 _______________________________________________ PacketFence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
