Jaap,

For the benefit of anyone else trying use 15.05/15.05.1 with PF,  I will
post this back to the list, as I think the previous example you reference
may be missing some bits as it was a lab scenario / PoC.

https://sourceforge.net/p/packetfence/mailman/message/34895965/
http://permalink.gmane.org/gmane.comp.networking.packetfence.user/12571

To my knowledge this works with any supported OpenWRT box.  If we were just
starting today, we would probably recommend a Marvell Viper (Linksys
EA4500) platform due to the low cost, dual-core 1.2G cpu, gigabit, with
great 802.11n 3x3 power amps.  (just no 802.11ac).
https://www.amazon.com/Linksys-App-Enabled-Dual-Band-Wireless-N-Refurbished/dp/B00HU7C7Q6
  We use Planet PoE POE-161 gigabit injectors to allow for single wire
connections, which work with these too.

The idea here is that the low cost of hardware allows you to invest in some
support hours from the PF team to get the rest working.

We have hostpad-common and wpad on our boxes, you can see below they are
part of the repository.  In this case we are using a newer 15.05.1 trunk
build that works around the newer C7s flash chip but the 15.05
configuration/hostapd is identical.

We replaced the /lib/netifd/hostapd.sh with the attached file, the rest is
just configuration.

You can see registration of your device via Radius in the logs;  Executing
"wifi" and looking at "logread" can help. I have included those outputs
(with minor obfuscation) and the relevant network and wireless configuration we
are using. You can see where I just logged in and executed the "wifi"
command at Fri Jun 10 13:34:26  which may be helpful in diagnosing radius
configuration issues on your PF management server.   Some of the regular
client interactions can be seen prior to that.

Be sure to change your IPv6 ula_prefix if you copy/paste and modify network
configurations, this was one thing that broke our group of APs initially.

In our configuration, we want the full benefit of DAE extensions, which
with OpenWRT can only be applied to either 5G or 2.4G band (but not both
simultaneously).  In the AP below we are using the 2.4G band.  So we are
not using radio0; it is disabled, even though it is configured.

Our VLANs are 84-87 (Registration, Isolation, Normal, Management) all
riding on the WAN trunk.  You can add IPs to the 'config interface'
sections for any of the VLANs to test connectivity to/from your PF server
and/or Normal network gateway to make sure your devices are talking on all
the VLANs to all the important interfaces.

That should help with the OpenWRT bits. We added firewall rules to allow
access to the management interface, and left the local LAN ports configured
to allow local access if we ever needed it.

The rest is all on the PF side and getting your network setup.  Now that
you have saved a bundle on the AP hardware and OpenWRT platform, you can
probably justify some PS hours from the packetfence team to get the rest
going.

cheers,
Ian


BusyBox v1.23.2 (2016-04-15 10:17:28 EDT) built-in shell (ash)

  _______                     ________        __
 |       |.-----.-----.-----.|  |  |  |.----.|  |_
 |   -   ||  _  |  -__|     ||  |  |  ||   _||   _|
 |_______||   __|_____|__|__||________||__|  |____|
          |__| W I R E L E S S   F R E E D O M
 -----------------------------------------------------
 CHAOS CALMER (Chaos Calmer, r49261)
 -----------------------------------------------------
  * 1 1/2 oz Gin            Shake with a glassful
  * 1/4 oz Triple Sec       of broken ice and pour
  * 3/4 oz Lime Juice       unstrained into a goblet.
  * 1 1/2 oz Orange Juice
  * 1 tsp. Grenadine Syrup
 -----------------------------------------------------
root@Lobby:~# opkg list-installed | grep wpad
wpad - 2015-03-25-1
root@Lobby:~# opkg list-installed | grep hostap
hostapd-common - 2015-03-25-1
root@Lobby:~#
root@Lobby:~# cat /etc/config/hostapd.vlan
*           wlan0.#
root@Lobby:~# wifi
root@Lobby:~# logread
Fri Jun 10 13:15:52 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:16:02 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:16:05 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:17:20 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan86 which has no address
Fri Jun 10 13:18:23 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan86 which has no address
Fri Jun 10 13:19:30 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:22:14 2016 daemon.info hostapd: wlan1: STA 78:f8:82:b9:1c:cf
RADIUS: stopped accounting session 572A6782-000017D1
Fri Jun 10 13:22:14 2016 daemon.info hostapd: wlan1: STA 78:f8:82:b9:1c:cf
IEEE 802.11: disassociated due to inactivity
Fri Jun 10 13:22:15 2016 daemon.info hostapd: wlan1: STA 78:f8:82:b9:1c:cf
IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Jun 10 13:23:31 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06
RADIUS: VLAN ID 84
Fri Jun 10 13:23:31 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06
IEEE 802.11: authenticated
Fri Jun 10 13:23:31 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06
IEEE 802.11: associated (aid 1)
Fri Jun 10 13:23:31 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06
RADIUS: starting accounting session 572A6782-000017D2
Fri Jun 10 13:23:33 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:23:35 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:24:04 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06
IEEE 802.11: disassociated
Fri Jun 10 13:24:04 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06
RADIUS: stopped accounting session 572A6782-000017D2
Fri Jun 10 13:24:05 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06
IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Jun 10 13:24:37 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:24:41 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:24:50 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:24:50 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:24:51 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:24:54 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:25:58 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:26:47 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:26:47 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:26:47 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:26:48 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:26:57 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:26:57 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:27:00 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:27:01 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:27:01 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:27:59 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:27:59 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:28:23 2016 daemon.info hostapd: wlan1: STA c0:ee:fb:32:17:ef
RADIUS: VLAN ID 84
Fri Jun 10 13:28:23 2016 daemon.info hostapd: wlan1: STA c0:ee:fb:32:17:ef
IEEE 802.11: authenticated
Fri Jun 10 13:28:23 2016 daemon.info hostapd: wlan1: STA c0:ee:fb:32:17:ef
IEEE 802.11: associated (aid 1)
Fri Jun 10 13:28:23 2016 daemon.info hostapd: wlan1: STA c0:ee:fb:32:17:ef
RADIUS: starting accounting session 572A6782-000017D3
Fri Jun 10 13:28:23 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:28:25 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:28:30 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:29:38 2016 daemon.info hostapd: wlan1: STA 60:f1:89:9a:59:e5
RADIUS: VLAN ID 84
Fri Jun 10 13:29:38 2016 daemon.info hostapd: wlan1: STA 60:f1:89:9a:59:e5
IEEE 802.11: authenticated
Fri Jun 10 13:29:38 2016 daemon.info hostapd: wlan1: STA 60:f1:89:9a:59:e5
IEEE 802.11: associated (aid 2)
Fri Jun 10 13:29:38 2016 daemon.info hostapd: wlan1: STA 60:f1:89:9a:59:e5
RADIUS: starting accounting session 572A6782-000017D4
Fri Jun 10 13:29:38 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:29:39 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:29:53 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:30:39 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06
RADIUS: VLAN ID 84
Fri Jun 10 13:30:39 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06
IEEE 802.11: authenticated
Fri Jun 10 13:30:39 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06
IEEE 802.11: associated (aid 3)
Fri Jun 10 13:30:39 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06
RADIUS: starting accounting session 572A6782-000017D5
Fri Jun 10 13:30:40 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:30:40 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:30:42 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:30:43 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:31:09 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:31:13 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:31:13 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:31:17 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:31:17 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:31:24 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:31:24 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:31:27 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:31:43 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06
IEEE 802.11: disassociated
Fri Jun 10 13:31:43 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06
RADIUS: stopped accounting session 572A6782-000017D5
Fri Jun 10 13:31:44 2016 daemon.info hostapd: wlan1: STA 58:7f:57:67:95:06
IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Jun 10 13:32:21 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:32:21 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:32:30 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:32:30 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:32:34 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:32:54 2016 daemon.info hostapd: wlan1: STA 90:67:1c:81:d6:02
RADIUS: VLAN ID 84
Fri Jun 10 13:32:54 2016 daemon.info hostapd: wlan1: STA 90:67:1c:81:d6:02
IEEE 802.11: authenticated
Fri Jun 10 13:32:54 2016 daemon.info hostapd: wlan1: STA 90:67:1c:81:d6:02
IEEE 802.11: associated (aid 3)
Fri Jun 10 13:32:54 2016 daemon.info hostapd: wlan1: STA 90:67:1c:81:d6:02
RADIUS: starting accounting session 572A6782-000017D6
Fri Jun 10 13:32:55 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:32:55 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:32:55 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:32:56 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:33:07 2016 daemon.info hostapd: wlan1: STA 6c:40:08:56:65:b2
RADIUS: VLAN ID 84
Fri Jun 10 13:33:07 2016 daemon.info hostapd: wlan1: STA 6c:40:08:56:65:b2
IEEE 802.11: authenticated
Fri Jun 10 13:33:07 2016 daemon.info hostapd: wlan1: STA 6c:40:08:56:65:b2
IEEE 802.11: associated (aid 4)
Fri Jun 10 13:33:07 2016 daemon.info hostapd: wlan1: STA 6c:40:08:56:65:b2
RADIUS: starting accounting session 572A6782-000017D7
Fri Jun 10 13:33:07 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b
RADIUS: VLAN ID 84
Fri Jun 10 13:33:07 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b
IEEE 802.11: authenticated
Fri Jun 10 13:33:07 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b
IEEE 802.11: associated (aid 5)
Fri Jun 10 13:33:07 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b
RADIUS: starting accounting session 572A6782-000017D8
Fri Jun 10 13:33:07 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:33:08 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:33:08 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:33:09 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:33:09 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:33:18 2016 daemon.info hostapd: wlan1: STA 6c:40:08:56:65:b2
IEEE 802.11: disassociated
Fri Jun 10 13:33:18 2016 daemon.info hostapd: wlan1: STA 6c:40:08:56:65:b2
RADIUS: stopped accounting session 572A6782-000017D7
Fri Jun 10 13:33:19 2016 daemon.info hostapd: wlan1: STA 6c:40:08:56:65:b2
IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Jun 10 13:33:46 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:33:46 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:34:24 2016 authpriv.info dropbear[6966]: Child connection
from 10.3.1.15:40306
Fri Jun 10 13:34:26 2016 authpriv.info dropbear[6966]: Exit before auth:
Exited normally
Fri Jun 10 13:34:26 2016 authpriv.info dropbear[6967]: Child connection
from 10.3.1.15:40308
Fri Jun 10 13:34:28 2016 authpriv.notice dropbear[6967]: Pubkey auth
succeeded for 'root' with key md5
5f:7d:b7:cc:89:bd:67:16:6f:bf:14:04:3b:30:ca:c8 from 10.3.1.15:40308
Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b
IEEE 802.11: disassociated
Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b
RADIUS: stopped accounting session 572A6782-000017D8
Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b
IEEE 802.11: disassociated
Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b
IEEE 802.11: disassociated
Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b
IEEE 802.11: disassociated
Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b
IEEE 802.11: disassociated
Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b
IEEE 802.11: disassociated
Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b
IEEE 802.11: disassociated
Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b
IEEE 802.11: disassociated
Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b
IEEE 802.11: disassociated
Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b
IEEE 802.11: disassociated
Fri Jun 10 13:34:38 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b
IEEE 802.11: disassociated
Fri Jun 10 13:34:39 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b
IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Jun 10 13:34:40 2016 daemon.info hostapd: wlan1: STA c0:ee:fb:32:17:ef
RADIUS: stopped accounting session 572A6782-000017D3
Fri Jun 10 13:34:40 2016 daemon.info hostapd: wlan1: STA c0:ee:fb:32:17:ef
IEEE 802.11: disassociated due to inactivity
Fri Jun 10 13:34:41 2016 daemon.info hostapd: wlan1: STA c0:ee:fb:32:17:ef
IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Jun 10 13:34:43 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b
RADIUS: VLAN ID 84
Fri Jun 10 13:34:43 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b
IEEE 802.11: authenticated
Fri Jun 10 13:34:43 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b
IEEE 802.11: associated (aid 1)
Fri Jun 10 13:34:43 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b
RADIUS: starting accounting session 572A6782-000017D9
Fri Jun 10 13:34:43 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:34:55 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:34:55 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:35:10 2016 daemon.info hostapd: wlan1: STA 60:f1:89:9a:59:e5
RADIUS: stopped accounting session 572A6782-000017D4
Fri Jun 10 13:35:10 2016 daemon.info hostapd: wlan1: STA 60:f1:89:9a:59:e5
IEEE 802.11: disassociated due to inactivity
Fri Jun 10 13:35:11 2016 daemon.info hostapd: wlan1: STA 60:f1:89:9a:59:e5
IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Jun 10 13:35:40 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:37:04 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:37:04 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:37:31 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:38:22 2016 daemon.info hostapd: wlan1: STA 90:67:1c:81:d6:02
RADIUS: stopped accounting session 572A6782-000017D6
Fri Jun 10 13:38:22 2016 daemon.info hostapd: wlan1: STA 90:67:1c:81:d6:02
IEEE 802.11: disassociated due to inactivity
Fri Jun 10 13:38:23 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:38:23 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:38:23 2016 daemon.info hostapd: wlan1: STA 90:67:1c:81:d6:02
IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Jun 10 13:39:47 2016 daemon.info hostapd: wlan1: STA 84:38:38:b4:10:8b
RADIUS: stopped accounting session 572A6782-000017D9
Fri Jun 10 13:39:47 2016 kern.info kernel: [3165424.750000] br-vlan84: port
2(wlan0.84) entered disabled state
Fri Jun 10 13:39:47 2016 kern.info kernel: [3165424.750000] device wlan0.84
left promiscuous mode
Fri Jun 10 13:39:47 2016 kern.info kernel: [3165424.760000] br-vlan84: port
2(wlan0.84) entered disabled state
Fri Jun 10 13:39:47 2016 kern.info kernel: [3165424.790000] br-vlan86: port
2(wlan0.86) entered disabled state
Fri Jun 10 13:39:47 2016 kern.info kernel: [3165424.790000] device wlan0.86
left promiscuous mode
Fri Jun 10 13:39:47 2016 kern.info kernel: [3165424.800000] br-vlan86: port
2(wlan0.86) entered disabled state
Fri Jun 10 13:39:48 2016 daemon.notice netifd: radio0 (7008): command
failed: Operation not supported (-122)
Fri Jun 10 13:39:48 2016 daemon.notice netifd: radio1 (7053): Configuration
file: /var/run/hostapd-phy1.conf
Fri Jun 10 13:39:48 2016 kern.info kernel: [3165425.480000] IPv6:
ADDRCONF(NETDEV_UP): wlan1: link is not ready
Fri Jun 10 13:39:48 2016 daemon.notice netifd: radio1 (7053): wlan1:
interface state UNINITIALIZED->COUNTRY_UPDATE
Fri Jun 10 13:39:48 2016 daemon.notice netifd: radio1 (7053): wlan1:
interface state COUNTRY_UPDATE->HT_SCAN
Fri Jun 10 13:39:49 2016 daemon.notice netifd: radio1 (7053): 20/40 MHz
operation not permitted on channel pri=11 sec=7 based on overlapping BSSes
Fri Jun 10 13:39:49 2016 daemon.info hostapd: wlan1: RADIUS Authentication
server 10.3.1.2:1812
Fri Jun 10 13:39:49 2016 daemon.info hostapd: wlan1: RADIUS Accounting
server 10.3.1.2:1813
Fri Jun 10 13:39:49 2016 daemon.notice netifd: radio1 (7053): Using
interface wlan1 with hwaddr ec:08:6b:47:59:51 and ssid "Public_WiFi"
Fri Jun 10 13:39:49 2016 daemon.notice netifd: radio1 (7053): wlan1: RADIUS
Authentication server 10.3.1.2:1812
Fri Jun 10 13:39:49 2016 daemon.notice netifd: radio1 (7053): wlan1: RADIUS
Accounting server 10.3.1.2:1813
Fri Jun 10 13:39:49 2016 daemon.notice netifd: radio1 (7053): wlan1:
interface state HT_SCAN->ENABLED
Fri Jun 10 13:39:49 2016 daemon.notice netifd: radio1 (7053): wlan1:
AP-ENABLED
Fri Jun 10 13:39:49 2016 kern.info kernel: [3165426.420000] IPv6:
ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
Fri Jun 10 13:39:50 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
Fri Jun 10 13:39:50 2016 daemon.warn dnsmasq-dhcp[1264]: DHCP packet
received on br-vlan84 which has no address
root@Lobby:~# cat /etc/config/wireless

config wifi-device 'radio0'
option type 'mac80211'
option channel '36'
option hwmode '11a'
option path 'pci0000:01/0000:01:00.0'
option htmode 'VHT80'
option txpower '17'
option country 'CA'

config wifi-iface
option device 'radio0'
option mode 'ap'
option vlan_file '/etc/config/hostapd.vlan'
option vlan_tagged_interface 'eth0'
option vlan_bridge 'br-vlan'
option vlan_naming '0'
option dynamic_vlan '2'
option auth_port '1812'
option auth_server '10.3.1.2'
option auth_secret 'y0urs3cret'
option acct_port '1813'
option acct_server '10.3.1.2'
option acct_secret 'y0urs3cret'
option dae_port '3799'
option dae_client '10.3.1.2'
option dae_secret 'y0urs3cret'
option nasid 'Lobby'
option encryption 'none'
option ssid 'Public_WiFi'
option disabled '1'

config wifi-device 'radio1'
option type 'mac80211'
option channel '11'
option hwmode '11g'
option path 'platform/qca955x_wmac'
option txpower '24'
option country 'CA'
option htmode 'HT40'

config wifi-iface
option device 'radio1'
option mode 'ap'
option encryption 'none'
option vlan_file '/etc/config/hostapd.vlan'
option vlan_tagged_interface 'eth0'
option vlan_bridge 'br-vlan'
option vlan_naming '0'
option dynamic_vlan '2'
option auth_port '1812'
option auth_server '10.3.1.2'
option auth_secret 'y0urs3cret'
option acct_port '1813'
option acct_server '10.3.1.2'
option acct_secret 'y0urs3cret'
option dae_port '3799'
option dae_client '10.3.1.2'
option dae_secret 'y0urs3cret'
option nasid 'Lobby'
option ssid 'Public_WiFi'

root@Lobby:~# cat /etc/config/network

config interface 'loopback'
option ifname 'lo'
option proto 'static'
option ipaddr '127.0.0.1'
option netmask '255.0.0.0'

config globals 'globals'
option ula_prefix 'fd3f:3aa8:9907::/48'

config interface 'lan'
option ifname 'eth1'
option force_link '1'
option type 'bridge'
option proto 'static'
option ipaddr '192.168.1.1'
option netmask '255.255.255.0'

config interface 'wan'
option ifname 'eth0.87'
option force_link '1'
option proto 'static'
option ipaddr '10.3.1.7'
option netmask '255.255.255.0'
option gateway '10.3.1.1'
option dns '8.8.191.81 8.8.191.82'

config interface 'vlan84'
        option type 'bridge'
option force_link '1'
        option ifname 'eth0.84'

config interface 'vlan85'
option force_link '1'
        option type 'bridge'
        option ifname 'eth0.85'

config interface 'vlan86'
        option type 'bridge'
option force_link '1'
        option ifname 'eth0.86'

config switch
option name 'switch0'
option reset '1'
option enable_vlan '1'

config switch_vlan
option device 'switch0'
option vlan '1'
option ports '0 2 3 4 5'

config switch_vlan
        option device 'switch0'
        option vlan '84'
        option ports '1t 6t'

config switch_vlan
        option device 'switch0'
        option vlan '85'
        option ports '1t 6t'

config switch_vlan
        option device 'switch0'
        option vlan '86'
        option ports '1t 6t'

config switch_vlan
        option device 'switch0'
        option vlan '87'
        option ports '1t 6t'
root@Lobby:~#


On Fri, Jun 10, 2016 at 4:31 AM, Jaap Gordijn <[email protected]> wrote:

> Another thing:
>
> The packetfence indicatie that you have to install wpad.
>
> However, wpad seems not to be in the repo of openwrt CC anymore.
>
> Did you use wpad?
>
>
>
> -- Jaap
>
>
>
> *Van:* Ian MacDonald
> *Verzonden:* vrijdag 10 juni 2016 04:10
> *Aan:* jg log <[email protected]>
> *Onderwerp:* Re: [PacketFence-users] [RESOLVED] PacketFence 5.7.0 w/
> Hostapd on OpenWRT 15.05 Chaos Calmer
>
>
>
> Sure,
>
>
>
> I assume you mean the hostapd part;  See attached.
>
>
>
> Let me know if you need any of the other bits.
>
>
>
> cheers,
> Ian
>
>
>
> On Thu, Jun 9, 2016 at 7:35 PM, jg log <[email protected]> wrote:
>
> Hi,
>
> I read your post regarding PF and hostapd.
> Is it possible that I can have your working config.
> I have difficulties get things working?
>
> Thanks in advance.
>
> Best,
>
> Jaap Gordijn
>
>
>
>
>
> --
>
> Ian MacDonald
> <416-907-1065%20x302>
>

Attachment: hostapd-15.05_pf_imac.sh
Description: Bourne shell script

------------------------------------------------------------------------------
What NetFlow Analyzer can do for you? Monitors network bandwidth and traffic
patterns at an interface-level. Reveals which users, apps, and protocols are 
consuming the most bandwidth. Provides multi-vendor support for NetFlow, 
J-Flow, sFlow and other flows. Make informed decisions using capacity 
planning reports. https://ad.doubleclick.net/ddm/clk/305295220;132659582;e
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to