Thanks for the speedy response Fabrice....
In my role tab for the switch I have Role by VLAN ID ticked and Role by
Switch Role ticked (was on by default)
The ACL and Web Auth Roles are not ticked.
Regards
Philip
On 1 February 2017 at 18:33, Fabrice Durand <[email protected]> wrote:
> Hello Philip,
>
> it's probably your acl the issue.
>
> remove in the switch config (pf side -> config -> switch -> role tab and
> in role bu role) registration
> Regards
> Fabrice
>
> Le 2017-02-01 à 13:29, Philip Damian-Grint a écrit :
>
> Hello mailing list,
>
> I have installed a fresh Packetfence 6.4.0-1 on Centos 7.3.1611 for testing
>
> Test switch is a Cisco 2960 running 15.0(1)SE3
>
> PF is configured for registration vlan 820
>
> When I manually configure a port on the test switch to vlan 820 I can
> access the portal from PF
>
> I configured the switchport for MAB from Packetfence and Cisco
> documentation
>
> With aaa and radius debug enabled, I can see radius authentication
> starting, the port being set to vlan 820, then immediately failing
> authorization and starting again. This loops forever until the port is
> shut, or until I register the mac address in the PF Administration console,
> at which point a production VLAN is allocated as expected.
>
> While the looping is going on, the Registration VLAN never stays
> configured on the port long enough for the workstation to get an IP and
> reach the guest portal
>
> When radiusd -X is run, an access-accept message is sent, and the process
> loops every time the switch loops.
>
> otherwise, I can never get the guest portal, and the logs fill up
> incredibly quickly just from one port.
>
> Does anyone have any suggestions? I primarily suspect my switch config is
> faulty or missing some key element...
>
> SWITCH CONFIG:
>
> aaa new-model
>
> aaa group server radius pf
> server name SVVNMS03
> ip radius source-interface Vlan100
>
> aaa authentication dot1x default group pf
> aaa authorization network default group pf
>
> aaa server radius dynamic-author
> client 10.216.9.72 server-key 7 XXXXXXXXXXXXXXXXXXXXXXXX
> port 3799
>
> interface FastEthernet0/2
> description MAB-NO-VOIP
> switchport mode access
> logging event link-status
> authentication order mab
> authentication priority mab
> authentication port-control auto
> authentication periodic
> authentication timer restart 10800
> authentication timer reauthenticate 10800
> mab
> no snmp trap link-status
> dot1x pae authenticator
> dot1x timeout quiet-period 2
> dot1x timeout tx-period 3
> spanning-tree portfast
> spanning-tree bpduguard enable
>
> radius-server retransmit 1
> radius-server timeout 2
> radius-server vsa send authentication
>
> radius server SVVNMS03
> address ipv4 10.216.9.72 auth-port 1812 acct-port 1813
> timeout 2
> retransmit 1
> key 7 XXXXXXXXXXXXXXXXXXXXXXXX
> =====================================
>
> SWITCH DEBUG:
>
> Feb 1 18:05:39.072 GMT: AAA/BIND(0000004B): Bind i/f
> Feb 1 18:05:39.072 GMT: AAA/ACCT/HC(0000004B): Register Dot1X/5400003F 64
> bit counter support not configured
> Feb 1 18:05:39.072 GMT: AAA/ACCT/HC(0000004B): Update Dot1X/5400003F
> Feb 1 18:05:39.072 GMT: AAA/ACCT/HC(0000004B): no HC Dot1X/5400003F
> Feb 1 18:05:39.072 GMT: AAA/ACCT/EVENT/(0000004B): CALL START
> Feb 1 18:05:39.072 GMT: Getting session id for NET(0000004B) : db=39078C4
> Feb 1 18:05:39.072 GMT: AAA/ACCT(00000000): add node, session 65
> Feb 1 18:05:39.072 GMT: AAA/ACCT/NET(0000004B): add, count 1
> Feb 1 18:05:39.072 GMT: Getting session id for NET(0000004B) : db=39078C4
> Feb 1 18:05:39.400 GMT: %AUTHMGR-5-START: Starting 'mab' for client
> (40a8.f0a9.e051) on Interface Fa0/2 AuditSessionID 0AD800A70000003E00125D6B
> Feb 1 18:05:39.400 GMT: AAA/AUTHEN/8021X (0000004B): Pick method list
> 'default'
> Feb 1 18:05:39.400 GMT: RADIUS/ENCODE(0000004B):Orig. component type =
> Dot1X
> Feb 1 18:05:39.400 GMT: RADIUS/ENCODE(0000004B): Unsupported AAA
> attribute hwidb
> Feb 1 18:05:39.400 GMT: RADIUS/ENCODE(0000004B): Unsupported AAA
> attribute auth-profile
> Feb 1 18:05:39.400 GMT: RADIUS(0000004B): Config NAS IP: 10.216.0.167
> Feb 1 18:05:39.400 GMT: RADIUS(0000004B): Config NAS IPv6: ::
> Feb 1 18:05:39.400 GMT: Getting session id for DOT1X(0000004B) :
> db=39078C4
> Feb 1 18:05:39.400 GMT: RADIUS/ENCODE(0000004B): acct_session_id: 65
> Feb 1 18:05:39.400 GMT: RADIUS(0000004B): sending
> Feb 1 18:05:39.400 GMT: RADIUS(0000004B): Send Access-Request to
> 10.216.9.72:1812 id 1645/60, len 237
> Feb 1 18:05:39.400 GMT: RADIUS: authenticator B4 28 20 EC F8 7C B8 2A -
> 47 C0 78 E6 3B 63 CB E1
> Feb 1 18:05:39.400 GMT: RADIUS: User-Name [1] 14
> "40a8f0a9e051"
> Feb 1 18:05:39.400 GMT: RADIUS: User-Password [2] 18 *
> Feb 1 18:05:39.400 GMT: RADIUS: Service-Type [6] 6 Call
> Check [10]
> Feb 1 18:05:39.400 GMT: RADIUS: Vendor, Cisco [26] 31
> Feb 1 18:05:39.400 GMT: RADIUS: Cisco AVpair [1] 25
> "service-type=Call Check"
> Feb 1 18:05:39.400 GMT: RADIUS: Framed-MTU [12] 6
> 1500
> Feb 1 18:05:39.400 GMT: RADIUS: Called-Station-Id [30] 19
> "30-37-A6-7E-82-82"
> Feb 1 18:05:39.400 GMT: RADIUS: Calling-Station-Id [31] 19
> "40-A8-F0-A9-E0-51"
> Feb 1 18:05:39.408 GMT: RADIUS: Message-Authenticato[80] 18
> Feb 1 18:05:39.408 GMT: RADIUS: 59 05 27 15 EB D2 EF 21 00 97 C8 79 9B
> 29 2E DE [ Y'!y).]
> Feb 1 18:05:39.408 GMT: RADIUS: EAP-Key-Name [102] 2 *
> Feb 1 18:05:39.408 GMT: RADIUS: Vendor, Cisco [26] 49
> Feb 1 18:05:39.408 GMT: RADIUS: Cisco AVpair [1] 43
> "audit-session-id=0AD800A70000003E00125D6B"
> Feb 1 18:05:39.408 GMT: RADIUS: NAS-Port-Type [61] 6
> Ethernet [15]
> Feb 1 18:05:39.408 GMT: RADIUS: NAS-Port [5] 6
> 50002
> Feb 1 18:05:39.408 GMT: RADIUS: NAS-Port-Id [87] 17
> "FastEthernet0/2"
> Feb 1 18:05:39.408 GMT: RADIUS: NAS-IP-Address [4] 6
> 10.216.0.167
> Feb 1 18:05:39.408 GMT: RADIUS(0000004B): Sending a IPv4 Radius Packet
> Feb 1 18:05:39.408 GMT: RADIUS(0000004B): Started 2 sec timeout
> Feb 1 18:05:39.433 GMT: RADIUS: Received from id 1645/60 10.216.9.72:1812,
> Access-Accept, len 67
> Feb 1 18:05:39.433 GMT: RADIUS: authenticator 20 58 F8 39 9F 12 BD A9 -
> E1 E5 BE 66 EE 73 CE F9
> Feb 1 18:05:39.433 GMT: RADIUS: Tunnel-Type [64] 6
> 00:VLAN [13]
> Feb 1 18:05:39.433 GMT: RADIUS: Tunnel-Private-Group[81] 5 "820"
> Feb 1 18:05:39.433 GMT: RADIUS: Filter-Id [11] 17
> Feb 1 18:05:39.433 GMT: RADIUS: 72 65 67 69 73 74 72 61 74 69 6F 6E 2E
> 69 6E [ registration.in]
> Feb 1 18:05:39.433 GMT: RADIUS: Tunnel-Medium-Type [65] 6
> 00:ALL_802 [6]
> Feb 1 18:05:39.433 GMT: RADIUS: Vendor, Unknown [26] 13
> Feb 1 18:05:39.433 GMT: RADIUS: Session-Timeout [27] 7
> Feb 1 18:05:39.433 GMT: RADIUS: 61 6C 6C 6F 77 [ allow]
> Feb 1 18:05:39.433 GMT: RADIUS(0000004B): Received from id 1645/60
> Feb 1 18:05:39.433 GMT: %MAB-5-SUCCESS: Authentication successful for
> client (40a8.f0a9.e051) on Interface Fa0/2 AuditSessionID
> 0AD800A70000003E00125D6B
> Feb 1 18:05:39.433 GMT: %AUTHMGR-7-RESULT: Authentication result
> 'success' from 'mab' for client (40a8.f0a9.e051) on Interface Fa0/2
> AuditSessionID 0AD800A70000003E00125D6B
> Feb 1 18:05:39.433 GMT: %AUTHMGR-5-VLANASSIGN: VLAN 820 assigned to
> Interface Fa0/2 AuditSessionID 0AD800A70000003E00125D6B
> Feb 1 18:05:39.467 GMT: %AUTHMGR-5-FAIL: Authorization failed for client
> (40a8.f0a9.e051) on Interface Fa0/2 AuditSessionID 0AD800A70000003E00125D6B
> Feb 1 18:05:39.467 GMT: AUTH-SYNC (Fa0/2) Syncing update for context
> (40a8.f0a9.e051)
> Feb 1 18:05:39.509 GMT: AUTH-SYNC (Fa0/2) Syncing delete for context
> (40a8.f0a9.e051)
> Feb 1 18:05:39.509 GMT: AAA/ACCT/HC(0000004B): Update Dot1X/5400003F
> Feb 1 18:05:39.509 GMT: AAA/ACCT/HC(0000004B): no HC Dot1X/5400003F
> Feb 1 18:05:39.509 GMT: AAA/ACCT/HC(0000004B): Update Dot1X/5400003F
> Feb 1 18:05:39.509 GMT: AAA/ACCT/HC(0000004B): no HC Dot1X/5400003F
> Feb 1 18:05:39.517 GMT: AAA/ACCT/EVENT/(0000004B): CALL STOP
> Feb 1 18:05:39.517 GMT: AAA/ACCT/CALL STOP(0000004B): Sending stop
> requests
> Feb 1 18:05:39.517 GMT: AAA/ACCT(0000004B): Send all stops
> Feb 1 18:05:39.517 GMT: AAA/ACCT/NET(0000004B): STOP
> Feb 1 18:05:39.517 GMT: AAA/ACCT/NET(0000004B): Method list not found
> Feb 1 18:05:39.517 GMT: AAA/ACCT(0000004B): del node, session 65
> Feb 1 18:05:39.517 GMT: AAA/ACCT/NET(0000004B): free_rec, count 0
> Feb 1 18:05:39.517 GMT: /AAA/ACCTNET(0000004B) reccnt 0, csr TRUE, osr 0
> Feb 1 18:05:39.517 GMT: AAA/ACCT/NET(0000004B): Last rec in db, intf not
> enqueued
> Feb 1 18:05:39.718 GMT: AAA/BIND(0000004C): Bind i/f
> ***this continues to loop as above
>
> ======================================
>
> RADIUSD DEBUG
>
> Listening on auth address 127.0.0.1 port 1812 bound to server packetfence
> Listening on auth address 10.216.9.72 port 1812 bound to server packetfence
> Listening on command file /usr/local/pf/var/run/radiusd.sock
> Listening on proxy address * port 39363
> Ready to process requests
> (0) Received Access-Request Id 35 from 10.216.0.167:1645 to
> 10.216.9.72:1812 length 237
> (0) User-Name = "40a8f0a9e051"
> (0) User-Password = "40a8f0a9e051"
> (0) Service-Type = Call-Check
> (0) Cisco-AVPair = "service-type=Call Check"
> (0) Framed-MTU = 1500
> (0) Called-Station-Id = "30-37-A6-7E-82-82"
> (0) Calling-Station-Id = "40-A8-F0-A9-E0-51"
> (0) Message-Authenticator = 0x2f390957e15d061946d59dd43a49016c
> (0) Cisco-AVPair = "audit-session-id=0AD800A700000023000A2070"
> (0) NAS-Port-Type = Ethernet
> (0) NAS-Port = 50002
> (0) NAS-Port-Id = "FastEthernet0/2"
> (0) NAS-IP-Address = 10.216.0.167
> (0) # Executing section authorize from file raddb//sites-enabled/
> packetfence
> (0) authorize {
> (0) update {
> (0) EXPAND %{Packet-Src-IP-Address}
> (0) --> 10.216.0.167
> (0) &request:FreeRADIUS-Client-IP-Address := 10.216.0.167
> (0) &control:PacketFence-RPC-Server = 127.0.0.1
> (0) &control:PacketFence-RPC-Port = 7070
> (0) &control:PacketFence-RPC-User =
> (0) &control:PacketFence-RPC-Pass =
> (0) &control:PacketFence-RPC-Proto = http
> (0) EXPAND %l
> (0) --> 1485971799
> (0) &control:Tmp-Integer-0 := 1485971799
> (0) &control:PacketFence-Request-Time := 0
> (0) } # update = noop
> (0) policy rewrite_calling_station_id {
> (0) if (&Calling-Station-Id && (&Calling-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{
> 2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
> {
> (0) if (&Calling-Station-Id && (&Calling-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{
> 2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
> -> TRUE
> (0) if (&Calling-Station-Id && (&Calling-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{
> 2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
> {
> (0) update request {
> (0) EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
> (0) --> 40:a8:f0:a9:e0:51
> (0) &Calling-Station-Id := 40:a8:f0:a9:e0:51
> (0) } # update request = noop
> (0) [updated] = updated
> (0) } # if (&Calling-Station-Id && (&Calling-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{
> 2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
> = updated
> (0) ... skipping else: Preceding "if" was taken
> (0) } # policy rewrite_calling_station_id = updated
> (0) policy rewrite_called_station_id {
> (0) if ((&Called-Station-Id) && (&Called-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{
> 2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
> {
> (0) if ((&Called-Station-Id) && (&Called-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{
> 2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
> -> TRUE
> (0) if ((&Called-Station-Id) && (&Called-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{
> 2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
> {
> (0) update request {
> (0) &Called-Station-Id !* ANY
> (0) EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
> (0) --> 30:37:a6:7e:82:82
> (0) &Called-Station-Id := 30:37:a6:7e:82:82
> (0) } # update request = noop
> (0) if ("%{8}") {
> (0) EXPAND %{8}
> (0) -->
> (0) if ("%{8}") -> FALSE
> (0) elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~
> /^ssid=(.*)$/i) {
> (0) elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~
> /^ssid=(.*)$/i) -> FALSE
> (0) elsif (Aruba-Essid-Name) {
> (0) elsif (Aruba-Essid-Name) -> FALSE
> (0) elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~
> /^ssid=(.*)$/i) {
> (0) EXPAND %{Cisco-AVPair}
> (0) --> service-type=Call Check
> (0) elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~
> /^ssid=(.*)$/i) -> FALSE
> (0) [updated] = updated
> (0) } # if ((&Called-Station-Id) && (&Called-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{
> 2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
> = updated
> (0) ... skipping else: Preceding "if" was taken
> (0) } # policy rewrite_called_station_id = updated
> (0) policy filter_username {
> (0) if (&User-Name) {
> (0) if (&User-Name) -> TRUE
> (0) if (&User-Name) {
> (0) if (&User-Name =~ / /) {
> (0) if (&User-Name =~ / /) -> FALSE
> (0) if (&User-Name =~ /@[^@]*@/ ) {
> (0) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
> (0) if (&User-Name =~ /\.\./ ) {
> (0) if (&User-Name =~ /\.\./ ) -> FALSE
> (0) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
> (0) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))
> -> FALSE
> (0) if (&User-Name =~ /\.$/) {
> (0) if (&User-Name =~ /\.$/) -> FALSE
> (0) if (&User-Name =~ /@\./) {
> (0) if (&User-Name =~ /@\./) -> FALSE
> (0) } # if (&User-Name) = updated
> (0) } # policy filter_username = updated
> (0) policy filter_password {
> (0) if (&User-Password && (&User-Password !=
> "%{string:User-Password}")) {
> (0) EXPAND %{string:User-Password}
> (0) --> 40a8f0a9e051
> (0) if (&User-Password && (&User-Password !=
> "%{string:User-Password}")) -> FALSE
> (0) } # policy filter_password = updated
> (0) [preprocess] = ok
> (0) suffix: Checking for suffix after "@"
> (0) suffix: No '@' in User-Name = "40a8f0a9e051", skipping NULL due to
> config.
> (0) [suffix] = noop
> (0) ntdomain: Checking for prefix before "\"
> (0) ntdomain: No '\' in User-Name = "40a8f0a9e051", looking up realm NULL
> (0) ntdomain: Found realm "null"
> (0) ntdomain: Adding Stripped-User-Name = "40a8f0a9e051"
> (0) ntdomain: Adding Realm = "null"
> (0) ntdomain: Authentication realm is LOCAL
> (0) [ntdomain] = ok
> (0) eap: No EAP-Message, not doing EAP
> (0) [eap] = noop
> (0) if ( !EAP-Message ) {
> (0) if ( !EAP-Message ) -> TRUE
> (0) if ( !EAP-Message ) {
> (0) update {
> (0) &control:Auth-Type := Accept
> (0) } # update = noop
> (0) } # if ( !EAP-Message ) = noop
> (0) policy packetfence-eap-mac-policy {
> (0) if ( &EAP-Type ) {
> (0) if ( &EAP-Type ) -> FALSE
> (0) [noop] = noop
> (0) } # policy packetfence-eap-mac-policy = noop
> (0) pap: WARNING: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
> !!!!!!!!!!!!!!!!!!!!!!!!!!!!!
> (0) pap: WARNING: !!! Ignoring control:User-Password. Update your
> !!!
> (0) pap: WARNING: !!! configuration so that the "known good" clear text !!!
> (0) pap: WARNING: !!! password is in Cleartext-Password and NOT in
> !!!
> (0) pap: WARNING: !!! User-Password.
> !!!
> (0) pap: WARNING: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
> !!!!!!!!!!!!!!!!!!!!!!!!!!!!!
> (0) pap: WARNING: Auth-Type already set. Not setting to PAP
> (0) [pap] = noop
> (0) } # authorize = updated
> (0) Found Auth-Type = Accept
> (0) Auth-Type = Accept, accepting the user
> (0) # Executing section post-auth from file raddb//sites-enabled/
> packetfence
> (0) post-auth {
> (0) update {
> (0) EXPAND %{Packet-Src-IP-Address}
> (0) --> 10.216.0.167
> (0) &request:FreeRADIUS-Client-IP-Address := 10.216.0.167
> (0) &control:PacketFence-RPC-Server = 127.0.0.1
> (0) &control:PacketFence-RPC-Port = 7070
> (0) &control:PacketFence-RPC-User =
> (0) &control:PacketFence-RPC-Pass =
> (0) &control:PacketFence-RPC-Proto = http
> (0) } # update = noop
> (0) if (! EAP-Type || (EAP-Type != TTLS && EAP-Type != PEAP) ) {
> (0) if (! EAP-Type || (EAP-Type != TTLS && EAP-Type != PEAP) ) ->
> TRUE
> (0) if (! EAP-Type || (EAP-Type != TTLS && EAP-Type != PEAP) ) {
> rlm_rest (rest): Reserved connection (0)
> (0) rest: Expanding URI components
> (0) rest: EXPAND http://127.0.0.1:7070
> (0) rest: --> http://127.0.0.1:7070
> (0) rest: EXPAND //radius/rest/authorize
> (0) rest: --> //radius/rest/authorize
> (0) rest: Sending HTTP POST to "http://127.0.0.1:7070//
> radius/rest/authorize"
> (0) rest: Encoding attribute "User-Name"
> (0) rest: Encoding attribute "User-Password"
> (0) rest: Encoding attribute "NAS-IP-Address"
> (0) rest: Encoding attribute "NAS-Port"
> (0) rest: Encoding attribute "Service-Type"
> (0) rest: Encoding attribute "Framed-MTU"
> (0) rest: Encoding attribute "Called-Station-Id"
> (0) rest: Encoding attribute "Calling-Station-Id"
> (0) rest: Encoding attribute "NAS-Port-Type"
> (0) rest: Encoding attribute "Event-Timestamp"
> (0) rest: Encoding attribute "Message-Authenticator"
> (0) rest: Encoding attribute "NAS-Port-Id"
> (0) rest: Encoding attribute "Cisco-AVPair"
> (0) rest: Encoding attribute "Stripped-User-Name"
> (0) rest: Encoding attribute "Realm"
> (0) rest: Encoding attribute "FreeRADIUS-Client-IP-Address"
> (0) rest: Processing response header
> (0) rest: Status : 200 (OK)
> (0) rest: Type : json (application/json)
> (0) rest: Parsing attribute "control:PacketFence-Role"
> (0) rest: EXPAND registration
> (0) rest: --> registration
> (0) rest: PacketFence-Role := "registration"
> (0) rest: Parsing attribute "control:PacketFence-Eap-Type"
> (0) rest: EXPAND 0
> (0) rest: --> 0
> (0) rest: PacketFence-Eap-Type := "0"
> (0) rest: Parsing attribute "Tunnel-Type"
> (0) rest: EXPAND 13
> (0) rest: --> 13
> (0) rest: Tunnel-Type := VLAN
> (0) rest: Parsing attribute "control:PacketFence-AutoReg"
> (0) rest: EXPAND 0
> (0) rest: --> 0
> (0) rest: PacketFence-AutoReg := "0"
> (0) rest: Parsing attribute "Tunnel-Private-Group-ID"
> (0) rest: EXPAND 820
> (0) rest: --> 820
> (0) rest: Tunnel-Private-Group-Id := "820"
> (0) rest: Parsing attribute "control:PacketFence-Request-Time"
> (0) rest: EXPAND 1485971799
> (0) rest: --> 1485971799
> (0) rest: PacketFence-Request-Time := 1485971799
> (0) rest: Parsing attribute "control:PacketFence-Switch-Ip-Address"
> (0) rest: EXPAND 10.216.0.167
> (0) rest: --> 10.216.0.167
> (0) rest: PacketFence-Switch-Ip-Address := "10.216.0.167"
> (0) rest: Parsing attribute "control:PacketFence-UserName"
> (0) rest: EXPAND 40a8f0a9e051
> (0) rest: --> 40a8f0a9e051
> (0) rest: PacketFence-UserName := "40a8f0a9e051"
> (0) rest: Parsing attribute "control:PacketFence-IsPhone"
> (0) rest: PacketFence-IsPhone := ""
> (0) rest: Parsing attribute "control:PacketFence-Switch-Mac"
> (0) rest: EXPAND 30:37:a6:7e:82:82
> (0) rest: --> 30:37:a6:7e:82:82
> (0) rest: PacketFence-Switch-Mac := "30:37:a6:7e:82:82"
> (0) rest: Parsing attribute "control:PacketFence-Switch-Id"
> (0) rest: EXPAND 10.216.0.167
> (0) rest: --> 10.216.0.167
> (0) rest: PacketFence-Switch-Id := "10.216.0.167"
> (0) rest: Parsing attribute "Filter-Id"
> (0) rest: EXPAND registration.in
> (0) rest: --> registration.in
> (0) rest: Filter-Id := "registration.in"
> (0) rest: Parsing attribute "Tunnel-Medium-Type"
> (0) rest: EXPAND 6
> (0) rest: --> 6
> (0) rest: Tunnel-Medium-Type := IEEE-802
> (0) rest: Parsing attribute "control:PacketFence-Computer-Name"
> (0) rest: EXPAND RXHD03099
> (0) rest: --> RXHD03099
> (0) rest: PacketFence-Computer-Name := "RXHD03099"
> (0) rest: Parsing attribute "Cisco-AVPair"
> (0) rest: WARNING: Zero length value array, skipping...
> (0) rest: Parsing attribute "control:PacketFence-Mac"
> (0) rest: EXPAND 40:a8:f0:a9:e0:51
> (0) rest: --> 40:a8:f0:a9:e0:51
> (0) rest: PacketFence-Mac := "40:a8:f0:a9:e0:51"
> (0) rest: Parsing attribute "control:PacketFence-IfIndex"
> (0) rest: EXPAND 10002
> (0) rest: --> 10002
> (0) rest: PacketFence-IfIndex := "10002"
> (0) rest: Parsing attribute "reply:PacketFence-Authorization-Status"
> (0) rest: EXPAND allow
> (0) rest: --> allow
> (0) rest: PacketFence-Authorization-Status := "allow"
> (0) rest: Parsing attribute "control:PacketFence-Connection-Type"
> (0) rest: EXPAND WIRED_MAC_AUTH
> (0) rest: --> WIRED_MAC_AUTH
> (0) rest: PacketFence-Connection-Type := "WIRED_MAC_AUTH"
> (0) rest: Parsing attribute "control:PacketFence-Status"
> (0) rest: EXPAND unreg
> (0) rest: --> unreg
> (0) rest: PacketFence-Status := "unreg"
> rlm_rest (rest): Released connection (0)
> rlm_rest (rest): Need 5 more connections to reach 10 spares
> rlm_rest (rest): Opening additional connection (5), 1 of 59 pending slots
> used
> rlm_rest (rest): Connecting to "http://127.0.0.1:7070/"
> (0) [rest] = updated
> (0) if (&reply:PacketFence-Authorization-Status == "deny") {
> (0) if (&reply:PacketFence-Authorization-Status == "deny") -> FALSE
> (0) else {
> (0) policy packetfence-audit-log-accept {
> (0) if (&User-Name != "dummy") {
> (0) if (&User-Name != "dummy") -> TRUE
> (0) if (&User-Name != "dummy") {
> (0) policy request-timing {
> (0) if (control:PacketFence-Request-Time != 0) {
> (0) if (control:PacketFence-Request-Time != 0) -> TRUE
> (0) if (control:PacketFence-Request-Time != 0) {
> (0) update control {
> (0) EXPAND %{expr: %{control:PacketFence-Request-Time}
> - %{control:Tmp-Integer-0}}
> (0) --> 0
> (0) &PacketFence-Request-Time := 0
> (0) } # update control = noop
> (0) } # if (control:PacketFence-Request-Time != 0) = noop
> (0) } # policy request-timing = noop
> (0) sql: EXPAND type.accept.query
> (0) sql: --> type.accept.query
> (0) sql: Using query template 'query'
> rlm_sql (sql): Reserved connection (1)
> (0) sql: EXPAND %{User-Name}
> (0) sql: --> 40a8f0a9e051
> (0) sql: SQL-User-Name set to '40a8f0a9e051'
> (0) sql: EXPAND INSERT INTO radius_audit_log ( mac, ip,
> computer_name, user_name, stripped_user_name, realm,
> event_type, switch_id, switch_mac,
> switch_ip_address, radius_source_ip_address,
> called_station_id, calling_station_id, nas_port_type,
> ssid, nas_port_id, ifindex, nas_port,
> connection_type, nas_ip_address, nas_identifier,
> auth_status, reason, auth_type, eap_type,
> role, node_status, profile, source, auto_reg,
> is_phone, pf_domain, uuid, radius_request,
> radius_reply, request_time) VALUES (
> '%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}',
> '%{%{control:PacketFence-Computer-Name}:-N/A}',
> '%{request:User-Name}', '%{request:Stripped-User-Name}',
> '%{request:Realm}', 'Radius-Access-Request',
> '%{%{control:PacketFence-Switch-Id}:-N/A}',
> '%{%{control:PacketFence-Switch-Mac}:-N/A}',
> '%{%{control:PacketFence-Switch-Ip-Address}:-N/A}',
> '%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}',
> '%{request:Calling-Station-Id}',
> '%{request:NAS-Port-Type}', '%{request:Called-Station-SSID}',
> '%{request:NAS-Port-Id}',
> '%{%{control:PacketFence-IfIndex}:-N/A}',
> '%{request:NAS-Port}', '%{%{control:PacketFence-
> Connection-Type}:-N/A}', '%{request:NAS-IP-Address}',
> '%{request:NAS-Identifier}', 'Accept',
> '%{request:Module-Failure-Message}', '%{control:Auth-Type}',
> '%{request:EAP-Type}', '%{%{control:PacketFence-Role}:-N/A}',
> '%{%{control:PacketFence-Status}:-N/A}', '%{%{control:PacketFence-
> Profile}:-N/A}', '%{%{control:PacketFence-Source}:-N/A}',
> '%{%{control:PacketFence-AutoReg}:-N/A}', '%{%{control:PacketFence-
> IsPhone}:-N/A}', '%{request:PacketFence-Domain}', '',
> '%{pairs:&request:[*]}','%{pairs:&reply:[*]}', '%{control:PacketFence-
> Request-Time}')
> (0) sql: --> INSERT INTO radius_audit_log ( mac, ip,
> computer_name, user_name, stripped_user_name, realm,
> event_type, switch_id, switch_mac,
> switch_ip_address, radius_source_ip_address,
> called_station_id, calling_station_id, nas_port_type,
> ssid, nas_port_id, ifindex, nas_port,
> connection_type, nas_ip_address, nas_identifier,
> auth_status, reason, auth_type, eap_type,
> role, node_status, profile, source, auto_reg,
> is_phone, pf_domain, uuid, radius_request,
> radius_reply, request_time) VALUES (
> '40:a8:f0:a9:e0:51', '', 'RXHD03099', '40a8f0a9e051',
> '40a8f0a9e051', 'null', 'Radius-Access-Request',
> '10.216.0.167', '30:37:a6:7e:82:82', '10.216.0.167',
> '10.216.0.167', '30:37:a6:7e:82:82', '40:a8:f0:a9:e0:51',
> 'Ethernet', '', 'FastEthernet0/2', '10002', '50002',
> 'WIRED_MAC_AUTH', '10.216.0.167', '',
> 'Accept', '', 'Accept', '', 'registration',
> 'unreg', 'N/A', 'N/A', '0', 'N/A', '', '',
> 'User-Name =3D =2240a8f0a9e051=22=2C User-Password =3D
> =2240a8f0a9e051=22=2C NAS-IP-Address =3D 10.216.0.167=2C NAS-Port =3D
> 50002=2C Service-Type =3D Call-Check=2C Framed-MTU =3D 1500=2C
> Called-Station-Id =3D =2230:37:a6:7e:82:82=22=2C Calling-Station-Id =3D
> =2240:a8:f0:a9:e0:51=22=2C NAS-Port-Type =3D Ethernet=2C Event-Timestamp
> =3D =22Feb 1 2017 17:56:39 GMT=22=2C Message-Authenticator =3D
> 0x2f390957e15d061946d59dd43a49016c=2C NAS-Port-Id =3D
> =22FastEthernet0/2=22=2C Cisco-AVPair =3D =22service-type=3DCall
> Check=22=2C Cisco-AVPair =3D =22audit-session-id=
> 3D0AD800A700000023000A2070=22=2C Stripped-User-Name =3D
> =2240a8f0a9e051=22=2C Realm =3D =22null=22=2C FreeRADIUS-Client-IP-Address
> =3D 10.216.0.167=2C SQL-User-Name =3D =2240a8f0a9e051=22','Tunnel-Type
> =3D VLAN=2C Tunnel-Private-Group-Id =3D =22820=22=2C Filter-Id =3D =
> 22registration.in=22=2C Tunnel-Medium-Type =3D IEEE-802=2C
> PacketFence-Authorization-Status =3D =22allow=22', '0')
> (0) sql: Executing query: INSERT INTO radius_audit_log (
> mac, ip, computer_name, user_name, stripped_user_name,
> realm, event_type, switch_id, switch_mac,
> switch_ip_address, radius_source_ip_address,
> called_station_id, calling_station_id, nas_port_type,
> ssid, nas_port_id, ifindex, nas_port,
> connection_type, nas_ip_address, nas_identifier,
> auth_status, reason, auth_type, eap_type,
> role, node_status, profile, source, auto_reg,
> is_phone, pf_domain, uuid, radius_request,
> radius_reply, request_time) VALUES (
> '40:a8:f0:a9:e0:51', '', 'RXHD03099', '40a8f0a9e051',
> '40a8f0a9e051', 'null', 'Radius-Access-Request',
> '10.216.0.167', '30:37:a6:7e:82:82', '10.216.0.167',
> '10.216.0.167', '30:37:a6:7e:82:82', '40:a8:f0:a9:e0:51',
> 'Ethernet', '', 'FastEthernet0/2', '10002', '50002',
> 'WIRED_MAC_AUTH', '10.216.0.167', '',
> 'Accept', '', 'Accept', '', 'registration',
> 'unreg', 'N/A', 'N/A', '0', 'N/A', '', '',
> 'User-Name =3D =2240a8f0a9e051=22=2C User-Password =3D
> =2240a8f0a9e051=22=2C NAS-IP-Address =3D 10.216.0.167=2C NAS-Port =3D
> 50002=2C Service-Type =3D Call-Check=2C Framed-MTU =3D 1500=2C
> Called-Station-Id =3D =2230:37:a6:7e:82:82=22=2C Calling-Station-Id =3D
> =2240:a8:f0:a9:e0:51=22=2C NAS-Port-Type =3D Ethernet=2C Event-Timestamp
> =3D =22Feb 1 2017 17:56:39 GMT=22=2C Message-Authenticator =3D
> 0x2f390957e15d061946d59dd43a49016c=2C NAS-Port-Id =3D
> =22FastEthernet0/2=22=2C Cisco-AVPair =3D =22service-type=3DCall
> Check=22=2C Cisco-AVPair =3D =22audit-session-id=
> 3D0AD800A700000023000A2070=22=2C Stripped-User-Name =3D
> =2240a8f0a9e051=22=2C Realm =3D =22null=22=2C FreeRADIUS-Client-IP-Address
> =3D 10.216.0.167=2C SQL-User-Name =3D =2240a8f0a9e051=22','Tunnel-Type
> =3D VLAN=2C Tunnel-Private-Group-Id =3D =22820=22=2C Filter-Id =3D =
> 22registration.in=22=2C Tunnel-Medium-Type =3D IEEE-802=2C
> PacketFence-Authorization-Status =3D =22allow=22', '0')
> (0) sql: SQL query returned: success
> (0) sql: 1 record(s) updated
> rlm_sql (sql): Released connection (1)
> rlm_sql (sql): Need 4 more connections to reach 10 spares
> rlm_sql (sql): Opening additional connection (6), 1 of 58 pending slots
> used
> rlm_sql_mysql: Starting connect to MySQL server
> rlm_sql_mysql: Connected to database 'pf' on Localhost via UNIX socket,
> server version 5.5.52-MariaDB, protocol version 10
> (0) [sql] = ok
> (0) } # if (&User-Name != "dummy") = ok
> (0) } # policy packetfence-audit-log-accept = ok
> (0) } # else = ok
> (0) } # if (! EAP-Type || (EAP-Type != TTLS && EAP-Type != PEAP) ) =
> updated
> (0) attr_filter.packetfence_post_auth: EXPAND %{User-Name}
> (0) attr_filter.packetfence_post_auth: --> 40a8f0a9e051
> (0) attr_filter.packetfence_post_auth: Matched entry DEFAULT at line 10
> (0) [attr_filter.packetfence_post_auth] = updated
> (0) linelog: EXPAND messages.%{%{reply:Packet-Type}:-default}
> (0) linelog: --> messages.Access-Accept
> (0) linelog: EXPAND %t : [mac:%{Calling-Station-Id}] Accepted user:
> %{reply:User-Name} and returned VLAN %{reply:Tunnel-Private-Group-ID}
> (0) linelog: --> Wed Feb 1 17:56:39 2017 : [mac:40:a8:f0:a9:e0:51]
> Accepted user: and returned VLAN 820
> (0) linelog: EXPAND /usr/local/pf/logs/radius.log
> (0) linelog: --> /usr/local/pf/logs/radius.log
> (0) [linelog] = ok
> (0) } # post-auth = updated
> (0) Login OK: [40a8f0a9e051] (from client 10.216.0.167 port 50002 cli
> 40:a8:f0:a9:e0:51)
> (0) Sent Access-Accept Id 35 from 10.216.9.72:1812 to 10.216.0.167:1645
> length 0
> (0) Tunnel-Type = VLAN
> (0) Tunnel-Private-Group-Id = "820"
> (0) Filter-Id = "registration.in"
> (0) Tunnel-Medium-Type = IEEE-802
> (0) PacketFence-Authorization-Status = "allow"
> (0) Finished request
> Waking up in 4.9 seconds.
>
> ***This continues to loop as above
>
>
>
>
>
>
>
> ------------------------------------------------------------------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, SlashDot.org! http://sdm.link/slashdot
>
>
>
> _______________________________________________
> PacketFence-users mailing
> [email protected]https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
>
> --
> Fabrice [email protected] :: +1.514.447.4918 <(514)%20447-4918>
> (x135) :: www.inverse.ca
> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence
> (http://packetfence.org)
>
>
> ------------------------------------------------------------
> ------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, SlashDot.org! http://sdm.link/slashdot
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
>
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users