Hello All -
Been awhile since I posted for version 4 testing and inline deployment. We
did deploy PF sparingly in production environment but have yet to go
'all-in' as a permanent replacement. Roughly couple hundred users - we're
looking for multiple thousands to test now.
Its been sometime and I'm revisiting PF with 6.4 release - I am having some
sticking points where I see communication between our WLC and PF, can
associate to SSID and see Pre-Auth ACL applied but never get presented with
a portal - "Unable to contact server under iOS". Preview of default does
not display and shows a 'too many redirects error'.
We're testing with dual NIC as eth0 is management interface and eth1 being
portal/vlan specific to SSID - is this possible or do I need to use one
trunked eth0 and add VLAN identifiers/deamon assignments accordingly?
We're running Cisco 5520 server WLC on latest 8.3 code so there are some
differences from documentation examples but straight forward. We 'think'
WebAuth is the way we want to test/deploy leaving essentially the WLC do
all the work on our backbone, leaving PF just portal for to assign Auth
ACLs. Is this possible over multiple NICs and VLANs? Or is this a more
inline thought process where management, portal and SSID/VLAN need to
reside on one LAN to accomplish?
Basically if we want to scale past one network for captive portal (multiple
guest VLANs) do we need to go with O-o-B VLAN enforcement and still use
WLC/server backbone for everything else ILO WebAuth?
Cory White
Xponet
P: 904.735.1600
E: [email protected]
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users