Quick question, on which type of switch are you trying to achieve that ?
Le 2016-12-07 à 21:54, [email protected] a écrit :
> Thanks Fabrice. Using the newly created user with the new access
> level I get the same results as before with same log entries.
>
> On 12/07/2016 08:04 PM, Durand fabrice wrote:
>>
>> Hello,
>>
>>
>> Le 2016-12-06 à 22:45, [email protected] a écrit :
>>> Thanks Fabrice.
>>>
>>> I configured per instruction (see below) but had no better luck.
>>> Any further thoughts?
>>>
>>> 1. I created a new admin role via:
>>> /admin/configuration#config/adminroles
>>> 2. set the action to "Switches CLI - Write"
>>> 3. Saved the new role
>>> 4. Created a new source (internal radius) via:
>>> admin/configuration#config/authentication
>>>
>> Hum not sure it will work like that, let's create instead a user in
>> packetfence (user tab) assign a password and assign the access level
>> to the one you created before.
>>>
>>> 1. Added a new set the ip to 127.0.0.1 and port 18120
>>> 2. set secret to packet
>>> 3. added rule
>>> 4. set class to administration
>>> 5. add action to access level and selected the radius role i
>>> created in step 1-3
>>> 6. created another source (same as 4-9) with ip set to management
>>> interface and port 1812
>>> 7. verified that cliAccess=Y
>>> 8. restart all services
>>>
>>> radtest on localhost fails auth with:
>>>
>>> radtest -t mschap -x test2 packet localhost:18120 12 testing123
>>> Sent Access-Request Id 107 from 0.0.0.0:58720 to 127.0.0.1:18120
>>> length 131
>>> User-Name = "test2"
>>> MS-CHAP-Password = "packet"
>>> NAS-IP-Address = 192.168.14.60
>>> NAS-Port = 12
>>> Message-Authenticator = 0x00
>>> Cleartext-Password = "packet"
>>> MS-CHAP-Challenge = 0xd9fdad2e36fdd618
>>> MS-CHAP-Response =
>>> 0x00010000000000000000000000000000000000000000000000007678409312f6c2d67f0671bf77b643cf60d6e7cc5583e533
>>> Received Access-Reject Id 107 from 127.0.0.1:18120 to 0.0.0.0:0
>>> length 20
>>> (0) -: Expected Access-Accept got Access-Reject
>>>
>>> packetfence.log
>>>
>>> Dec 06 22:34:04 httpd.aaa(3965) WARN: [mac:[undef]] CLI Access is
>>> not permit on this switch 192.168.14.60 (pf::radius::switch_access)
>>>
>>>
>>> radtest on management interface times/retry out
>>>
>>> radtest on management interface times/retry out from remote client.
>>>
>>>
>>>
>>>
>>>
>>> On 12/06/2016 07:25 PM, Durand fabrice wrote:
>>>>
>>>> Hello,
>>>>
>>>> can you check in packetfence.log to see what wrong ?
>>>>
>>>> Also here what you have to do:
>>>>
>>>> in configuration -> Admin access, create a new admin access with
>>>> Switch CLI - Write
>>>>
>>>> In Configuration source -> A internal source -> assign an
>>>> administration rule and set access level (the admin access you
>>>> created before).
>>>>
>>>> Then enable cli access on the switch.(cliAccess=Y)
>>>>
>>>>
>>>> Now when PacketFence will receive a radius request for cli access,
>>>> it will test the username and password on the internal source and
>>>> if it succeeded and if it match the rule then the access will be
>>>> allowed.
>>>>
>>>>
>>>> Regards
>>>>
>>>> Fabrice
>>>>
>>>>
>>>>
>>>> Le 2016-12-06 à 12:13, [email protected] a écrit :
>>>>> When I attempt to test FreeRadius with a test user in
>>>>> /usr/local/pf/raddb/users I get a failure that states "CLI Access
>>>>> is not permit on this switch". I have "cliAccess=Y" in
>>>>> switches.conf. Is there somewhere else I need to enable CLI access?
>>>>>
>>>>> Thanks
>>>>>
>>>>>
>>>>>
>>>>> packetfence.log:
>>>>> Dec 06 12:04:36 httpd.aaa(24559) WARN: [mac:[undef]] CLI Access is not
>>>>> permit on this switch 192.168.14.60 (pf::radius::switch_access)
>>>>>
>>>>> This occurs as a repsonse to:
>>>>>
>>>>> radtest -t mschap -x test2 packet localhost:18120 12 testing123
>>>>>
>>>>> radtest responds with:
>>>>>
>>>>> Sent Access-Request Id 224 from 0.0.0.0:50101 to 127.0.0.1:18120 length
>>>>> 131
>>>>> User-Name = "test2"
>>>>> MS-CHAP-Password = "packet"
>>>>> NAS-IP-Address = 192.168.14.60
>>>>> NAS-Port = 12
>>>>> Message-Authenticator = 0x00
>>>>> Cleartext-Password = "packet"
>>>>> MS-CHAP-Challenge = 0x7d970590bf9b3c20
>>>>> MS-CHAP-Response =
>>>>> 0x00010000000000000000000000000000000000000000000000001d61ecc9a3fc6222a13bccde625540a3048270707271bf1c
>>>>> Received Access-Reject Id 224 from 127.0.0.1:18120 to 0.0.0.0:0 length 20
>>>>> (0) -: Expected Access-Accept got Access-Reject
>>>>>
>>>>> I have the following entry in |/usr/local/pf/raddb/users
>>>>>
>>>>> |||
>>>>> test2 Cleartext-Password := "packet"
>>>>>
>>>>>
>>>>> ------------------------------------------------------------------------------
>>>>> Developer Access Program for Intel Xeon Phi Processors
>>>>> Access to Intel Xeon Phi processor-based developer platforms.
>>>>> With one year of Intel Parallel Studio XE.
>>>>> Training and support from Colfax.
>>>>> Order your platform today.http://sdm.link/xeonphi
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> PacketFence-users mailing list
>>>>> [email protected]
>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>
>>>>
>>>>
>>>> ------------------------------------------------------------------------------
>>>> Developer Access Program for Intel Xeon Phi Processors
>>>> Access to Intel Xeon Phi processor-based developer platforms.
>>>> With one year of Intel Parallel Studio XE.
>>>> Training and support from Colfax.
>>>> Order your platform today.http://sdm.link/xeonphi
>>>>
>>>>
>>>> _______________________________________________
>>>> PacketFence-users mailing list
>>>> [email protected]
>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>
>>>
>>>
>>>
>>> ------------------------------------------------------------------------------
>>> Developer Access Program for Intel Xeon Phi Processors
>>> Access to Intel Xeon Phi processor-based developer platforms.
>>> With one year of Intel Parallel Studio XE.
>>> Training and support from Colfax.
>>> Order your platform today.http://sdm.link/xeonphi
>>>
>>>
>>> _______________________________________________
>>> PacketFence-users mailing list
>>> [email protected]
>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>
>>
>>
>> ------------------------------------------------------------------------------
>> Developer Access Program for Intel Xeon Phi Processors
>> Access to Intel Xeon Phi processor-based developer platforms.
>> With one year of Intel Parallel Studio XE.
>> Training and support from Colfax.
>> Order your platform today.http://sdm.link/xeonphi
>>
>>
>> _______________________________________________
>> PacketFence-users mailing list
>> [email protected]
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
>
>
>
> ------------------------------------------------------------------------------
> Developer Access Program for Intel Xeon Phi Processors
> Access to Intel Xeon Phi processor-based developer platforms.
> With one year of Intel Parallel Studio XE.
> Training and support from Colfax.
> Order your platform today.http://sdm.link/xeonphi
>
>
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
--
Fabrice Durand
[email protected] :: +1.514.447.4918 (x135) :: www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence
(http://packetfence.org)
------------------------------------------------------------------------------
Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel Parallel Studio XE.
Training and support from Colfax.
Order your platform today.http://sdm.link/xeonphi
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users