Untick Role by Switch Role and it should work.


Le 2017-02-01 à 13:43, Philip Damian-Grint a écrit :
> Thanks for the speedy response Fabrice....
>
> In my role tab for the switch I have Role by VLAN ID ticked and Role
> by Switch Role ticked (was on by default)
> The ACL and Web Auth Roles are not ticked.
>
> Regards
> Philip
>
> On 1 February 2017 at 18:33, Fabrice Durand <[email protected]
> <mailto:[email protected]>> wrote:
>
>     Hello Philip,
>
>     it's probably your acl the issue.
>
>     remove in the switch config (pf side -> config -> switch -> role
>     tab and in role bu role) registration
>
>     Regards
>     Fabrice
>
>     Le 2017-02-01 à 13:29, Philip Damian-Grint a écrit :
>>     Hello mailing list,
>>
>>     I have installed a fresh Packetfence 6.4.0-1 on Centos 7.3.1611
>>     for testing
>>
>>     Test switch is a Cisco 2960 running 15.0(1)SE3
>>
>>     PF is configured for registration vlan 820
>>
>>     When I manually configure a port on the test switch to vlan 820 I
>>     can access the portal from PF
>>
>>     I configured the switchport for MAB from Packetfence and Cisco
>>     documentation
>>
>>     With aaa and radius debug enabled, I can see radius
>>     authentication starting, the port being set to vlan 820, then
>>     immediately failing authorization and starting again. This loops
>>     forever until the port is shut, or until I register the mac
>>     address in the PF Administration console, at which point a
>>     production  VLAN is allocated as expected.
>>
>>     While the looping is going on, the Registration VLAN never stays
>>     configured on the port long enough for the workstation to get an
>>     IP and reach the guest portal
>>
>>     When radiusd -X is run, an access-accept message is sent, and the
>>     process loops every time the switch loops.
>>
>>     otherwise, I can never get the guest portal, and the logs fill up
>>     incredibly quickly just from one port.
>>
>>     Does anyone have any suggestions? I primarily suspect my switch
>>     config is faulty or missing some key element...
>>
>>     SWITCH CONFIG:
>>
>>     aaa new-model
>>
>>     aaa group server radius pf
>>      server name SVVNMS03
>>      ip radius source-interface Vlan100
>>
>>     aaa authentication dot1x default group pf
>>     aaa authorization network default group pf
>>
>>     aaa server radius dynamic-author
>>      client 10.216.9.72 server-key 7 XXXXXXXXXXXXXXXXXXXXXXXX
>>      port 3799
>>
>>     interface FastEthernet0/2
>>      description MAB-NO-VOIP
>>      switchport mode access
>>      logging event link-status
>>      authentication order mab
>>      authentication priority mab
>>      authentication port-control auto
>>      authentication periodic
>>      authentication timer restart 10800
>>      authentication timer reauthenticate 10800
>>      mab
>>      no snmp trap link-status
>>      dot1x pae authenticator
>>      dot1x timeout quiet-period 2
>>      dot1x timeout tx-period 3
>>      spanning-tree portfast
>>      spanning-tree bpduguard enable
>>
>>     radius-server retransmit 1
>>     radius-server timeout 2
>>     radius-server vsa send authentication
>>
>>     radius server SVVNMS03
>>      address ipv4 10.216.9.72 auth-port 1812 acct-port 1813
>>      timeout 2
>>      retransmit 1
>>      key 7 XXXXXXXXXXXXXXXXXXXXXXXX
>>     =====================================
>>
>>     SWITCH DEBUG:
>>
>>     Feb  1 18:05:39.072 GMT: AAA/BIND(0000004B): Bind i/f 
>>     Feb  1 18:05:39.072 GMT: AAA/ACCT/HC(0000004B): Register
>>     Dot1X/5400003F 64 bit counter support not configured
>>     Feb  1 18:05:39.072 GMT: AAA/ACCT/HC(0000004B): Update
>>     Dot1X/5400003F
>>     Feb  1 18:05:39.072 GMT: AAA/ACCT/HC(0000004B): no HC Dot1X/5400003F
>>     Feb  1 18:05:39.072 GMT: AAA/ACCT/EVENT/(0000004B): CALL START
>>     Feb  1 18:05:39.072 GMT: Getting session id for NET(0000004B) :
>>     db=39078C4
>>     Feb  1 18:05:39.072 GMT: AAA/ACCT(00000000): add node, session 65
>>     Feb  1 18:05:39.072 GMT: AAA/ACCT/NET(0000004B): add, count 1
>>     Feb  1 18:05:39.072 GMT: Getting session id for NET(0000004B) :
>>     db=39078C4
>>     Feb  1 18:05:39.400 GMT: %AUTHMGR-5-START: Starting 'mab' for
>>     client (40a8.f0a9.e051) on Interface Fa0/2 AuditSessionID
>>     0AD800A70000003E00125D6B
>>     Feb  1 18:05:39.400 GMT: AAA/AUTHEN/8021X (0000004B): Pick method
>>     list 'default'
>>     Feb  1 18:05:39.400 GMT: RADIUS/ENCODE(0000004B):Orig. component
>>     type = Dot1X
>>     Feb  1 18:05:39.400 GMT: RADIUS/ENCODE(0000004B): Unsupported AAA
>>     attribute hwidb
>>     Feb  1 18:05:39.400 GMT: RADIUS/ENCODE(0000004B): Unsupported AAA
>>     attribute auth-profile
>>     Feb  1 18:05:39.400 GMT: RADIUS(0000004B): Config NAS IP:
>>     10.216.0.167
>>     Feb  1 18:05:39.400 GMT: RADIUS(0000004B): Config NAS IPv6: ::
>>     Feb  1 18:05:39.400 GMT: Getting session id for DOT1X(0000004B) :
>>     db=39078C4
>>     Feb  1 18:05:39.400 GMT: RADIUS/ENCODE(0000004B): acct_session_id: 65
>>     Feb  1 18:05:39.400 GMT: RADIUS(0000004B): sending
>>     Feb  1 18:05:39.400 GMT: RADIUS(0000004B): Send Access-Request to
>>     10.216.9.72:1812 <http://10.216.9.72:1812> id 1645/60, len 237
>>     Feb  1 18:05:39.400 GMT: RADIUS:  authenticator B4 28 20 EC F8 7C
>>     B8 2A - 47 C0 78 E6 3B 63 CB E1
>>     Feb  1 18:05:39.400 GMT: RADIUS:  User-Name           [1]   14 
>>     "40a8f0a9e051"
>>     Feb  1 18:05:39.400 GMT: RADIUS:  User-Password       [2]   18  *
>>     Feb  1 18:05:39.400 GMT: RADIUS:  Service-Type        [6]   6  
>>     Call Check                [10]
>>     Feb  1 18:05:39.400 GMT: RADIUS:  Vendor, Cisco       [26]  31 
>>     Feb  1 18:05:39.400 GMT: RADIUS:   Cisco AVpair       [1]   25 
>>     "service-type=Call Check"
>>     Feb  1 18:05:39.400 GMT: RADIUS:  Framed-MTU          [12]  6  
>>     1500                     
>>     Feb  1 18:05:39.400 GMT: RADIUS:  Called-Station-Id   [30]  19 
>>     "30-37-A6-7E-82-82"
>>     Feb  1 18:05:39.400 GMT: RADIUS:  Calling-Station-Id  [31]  19 
>>     "40-A8-F0-A9-E0-51"
>>     Feb  1 18:05:39.408 GMT: RADIUS:  Message-Authenticato[80]  18 
>>     Feb  1 18:05:39.408 GMT: RADIUS:   59 05 27 15 EB D2 EF 21 00 97
>>     C8 79 9B 29 2E DE            [ Y'!y).]
>>     Feb  1 18:05:39.408 GMT: RADIUS:  EAP-Key-Name        [102] 2   *
>>     Feb  1 18:05:39.408 GMT: RADIUS:  Vendor, Cisco       [26]  49 
>>     Feb  1 18:05:39.408 GMT: RADIUS:   Cisco AVpair       [1]   43 
>>     "audit-session-id=0AD800A70000003E00125D6B"
>>     Feb  1 18:05:39.408 GMT: RADIUS:  NAS-Port-Type       [61]  6  
>>     Ethernet                  [15]
>>     Feb  1 18:05:39.408 GMT: RADIUS:  NAS-Port            [5]   6  
>>     50002                    
>>     Feb  1 18:05:39.408 GMT: RADIUS:  NAS-Port-Id         [87]  17 
>>     "FastEthernet0/2"
>>     Feb  1 18:05:39.408 GMT: RADIUS:  NAS-IP-Address      [4]   6  
>>     10.216.0.167             
>>     Feb  1 18:05:39.408 GMT: RADIUS(0000004B): Sending a IPv4 Radius
>>     Packet
>>     Feb  1 18:05:39.408 GMT: RADIUS(0000004B): Started 2 sec timeout
>>     Feb  1 18:05:39.433 GMT: RADIUS: Received from id 1645/60
>>     10.216.9.72:1812 <http://10.216.9.72:1812>, Access-Accept, len 67
>>     Feb  1 18:05:39.433 GMT: RADIUS:  authenticator 20 58 F8 39 9F 12
>>     BD A9 - E1 E5 BE 66 EE 73 CE F9
>>     Feb  1 18:05:39.433 GMT: RADIUS:  Tunnel-Type         [64]  6  
>>     00:VLAN                   [13]
>>     Feb  1 18:05:39.433 GMT: RADIUS:  Tunnel-Private-Group[81]  5   "820"
>>     Feb  1 18:05:39.433 GMT: RADIUS:  Filter-Id           [11]  17 
>>     Feb  1 18:05:39.433 GMT: RADIUS:   72 65 67 69 73 74 72 61 74 69
>>     6F 6E 2E 69 6E   [ registration.in <http://registration.in>]
>>     Feb  1 18:05:39.433 GMT: RADIUS:  Tunnel-Medium-Type  [65]  6  
>>     00:ALL_802                [6]
>>     Feb  1 18:05:39.433 GMT: RADIUS:  Vendor, Unknown     [26]  13 
>>     Feb  1 18:05:39.433 GMT: RADIUS:  Session-Timeout     [27]  7  
>>     Feb  1 18:05:39.433 GMT: RADIUS:   61 6C 6C 6F 77             [
>>     allow]
>>     Feb  1 18:05:39.433 GMT: RADIUS(0000004B): Received from id 1645/60
>>     Feb  1 18:05:39.433 GMT: %MAB-5-SUCCESS: Authentication
>>     successful for client (40a8.f0a9.e051) on Interface Fa0/2
>>     AuditSessionID 0AD800A70000003E00125D6B
>>     Feb  1 18:05:39.433 GMT: %AUTHMGR-7-RESULT: Authentication result
>>     'success' from 'mab' for client (40a8.f0a9.e051) on Interface
>>     Fa0/2 AuditSessionID 0AD800A70000003E00125D6B
>>     Feb  1 18:05:39.433 GMT: %AUTHMGR-5-VLANASSIGN: VLAN 820 assigned
>>     to Interface Fa0/2 AuditSessionID 0AD800A70000003E00125D6B
>>     Feb  1 18:05:39.467 GMT: %AUTHMGR-5-FAIL: Authorization failed
>>     for client (40a8.f0a9.e051) on Interface Fa0/2 AuditSessionID
>>     0AD800A70000003E00125D6B
>>     Feb  1 18:05:39.467 GMT: AUTH-SYNC (Fa0/2) Syncing update for
>>     context (40a8.f0a9.e051)
>>     Feb  1 18:05:39.509 GMT: AUTH-SYNC (Fa0/2) Syncing delete for
>>     context (40a8.f0a9.e051)
>>     Feb  1 18:05:39.509 GMT: AAA/ACCT/HC(0000004B): Update
>>     Dot1X/5400003F
>>     Feb  1 18:05:39.509 GMT: AAA/ACCT/HC(0000004B): no HC Dot1X/5400003F
>>     Feb  1 18:05:39.509 GMT: AAA/ACCT/HC(0000004B): Update
>>     Dot1X/5400003F
>>     Feb  1 18:05:39.509 GMT: AAA/ACCT/HC(0000004B): no HC Dot1X/5400003F
>>     Feb  1 18:05:39.517 GMT: AAA/ACCT/EVENT/(0000004B): CALL STOP
>>     Feb  1 18:05:39.517 GMT: AAA/ACCT/CALL STOP(0000004B): Sending
>>     stop requests
>>     Feb  1 18:05:39.517 GMT: AAA/ACCT(0000004B): Send all stops
>>     Feb  1 18:05:39.517 GMT: AAA/ACCT/NET(0000004B): STOP
>>     Feb  1 18:05:39.517 GMT: AAA/ACCT/NET(0000004B): Method list not
>>     found
>>     Feb  1 18:05:39.517 GMT: AAA/ACCT(0000004B): del node, session 65
>>     Feb  1 18:05:39.517 GMT: AAA/ACCT/NET(0000004B): free_rec, count 0
>>     Feb  1 18:05:39.517 GMT: /AAA/ACCTNET(0000004B) reccnt 0, csr
>>     TRUE, osr 0
>>     Feb  1 18:05:39.517 GMT: AAA/ACCT/NET(0000004B): Last rec in db,
>>     intf not enqueued
>>     Feb  1 18:05:39.718 GMT: AAA/BIND(0000004C): Bind i/f 
>>     ***this continues to loop as above
>>
>>     ======================================
>>
>>     RADIUSD DEBUG
>>
>>     Listening on auth address 127.0.0.1 port 1812 bound to server
>>     packetfence
>>     Listening on auth address 10.216.9.72 port 1812 bound to server
>>     packetfence
>>     Listening on command file /usr/local/pf/var/run/radiusd.sock
>>     Listening on proxy address * port 39363
>>     Ready to process requests
>>     (0) Received Access-Request Id 35 from 10.216.0.167:1645
>>     <http://10.216.0.167:1645> to 10.216.9.72:1812
>>     <http://10.216.9.72:1812> length 237
>>     (0)   User-Name = "40a8f0a9e051"
>>     (0)   User-Password = "40a8f0a9e051"
>>     (0)   Service-Type = Call-Check
>>     (0)   Cisco-AVPair = "service-type=Call Check"
>>     (0)   Framed-MTU = 1500
>>     (0)   Called-Station-Id = "30-37-A6-7E-82-82"
>>     (0)   Calling-Station-Id = "40-A8-F0-A9-E0-51"
>>     (0)   Message-Authenticator = 0x2f390957e15d061946d59dd43a49016c
>>     (0)   Cisco-AVPair = "audit-session-id=0AD800A700000023000A2070"
>>     (0)   NAS-Port-Type = Ethernet
>>     (0)   NAS-Port = 50002
>>     (0)   NAS-Port-Id = "FastEthernet0/2"
>>     (0)   NAS-IP-Address = 10.216.0.167
>>     (0) # Executing section authorize from file
>>     raddb//sites-enabled/packetfence
>>     (0)   authorize {
>>     (0)     update {
>>     (0)       EXPAND %{Packet-Src-IP-Address}
>>     (0)          --> 10.216.0.167
>>     (0)       &request:FreeRADIUS-Client-IP-Address := 10.216.0.167
>>     (0)       &control:PacketFence-RPC-Server = 127.0.0.1
>>     (0)       &control:PacketFence-RPC-Port = 7070
>>     (0)       &control:PacketFence-RPC-User =
>>     (0)       &control:PacketFence-RPC-Pass =
>>     (0)       &control:PacketFence-RPC-Proto = http
>>     (0)       EXPAND %l
>>     (0)          --> 1485971799
>>     (0)       &control:Tmp-Integer-0 := 1485971799
>>     (0)       &control:PacketFence-Request-Time := 0
>>     (0)     } # update = noop
>>     (0)     policy rewrite_calling_station_id {
>>     (0)       if (&Calling-Station-Id && (&Calling-Station-Id =~
>>     
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
>>     {
>>     (0)       if (&Calling-Station-Id && (&Calling-Station-Id =~
>>     
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
>>  
>>     -> TRUE
>>     (0)       if (&Calling-Station-Id && (&Calling-Station-Id =~
>>     
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
>>  
>>     {
>>     (0)         update request {
>>     (0)           EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
>>     (0)              --> 40:a8:f0:a9:e0:51
>>     (0)           &Calling-Station-Id := 40:a8:f0:a9:e0:51
>>     (0)         } # update request = noop
>>     (0)         [updated] = updated
>>     (0)       } # if (&Calling-Station-Id && (&Calling-Station-Id =~
>>     
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
>>  
>>     = updated
>>     (0)       ... skipping else: Preceding "if" was taken
>>     (0)     } # policy rewrite_calling_station_id = updated
>>     (0)     policy rewrite_called_station_id {
>>     (0)       if ((&Called-Station-Id) && (&Called-Station-Id =~
>>     
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
>>     {
>>     (0)       if ((&Called-Station-Id) && (&Called-Station-Id =~
>>     
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
>>  
>>     -> TRUE
>>     (0)       if ((&Called-Station-Id) && (&Called-Station-Id =~
>>     
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
>>  
>>     {
>>     (0)         update request {
>>     (0)           &Called-Station-Id !* ANY
>>     (0)           EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
>>     (0)              --> 30:37:a6:7e:82:82
>>     (0)           &Called-Station-Id := 30:37:a6:7e:82:82
>>     (0)         } # update request = noop
>>     (0)         if ("%{8}") {
>>     (0)         EXPAND %{8}
>>     (0)            -->
>>     (0)         if ("%{8}")  -> FALSE
>>     (0)         elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~
>>     /^ssid=(.*)$/i) {
>>     (0)         elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~
>>     /^ssid=(.*)$/i)  -> FALSE
>>     (0)         elsif (Aruba-Essid-Name) {
>>     (0)         elsif (Aruba-Essid-Name)  -> FALSE
>>     (0)         elsif ( (Cisco-AVPair)  && "%{Cisco-AVPair}" =~
>>     /^ssid=(.*)$/i) {
>>     (0)         EXPAND %{Cisco-AVPair}
>>     (0)            --> service-type=Call Check
>>     (0)         elsif ( (Cisco-AVPair)  && "%{Cisco-AVPair}" =~
>>     /^ssid=(.*)$/i)  -> FALSE
>>     (0)         [updated] = updated
>>     (0)       } # if ((&Called-Station-Id) && (&Called-Station-Id =~
>>     
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
>>  
>>     = updated
>>     (0)       ... skipping else: Preceding "if" was taken
>>     (0)     } # policy rewrite_called_station_id = updated
>>     (0)     policy filter_username {
>>     (0)       if (&User-Name) {
>>     (0)       if (&User-Name)  -> TRUE
>>     (0)       if (&User-Name)  {
>>     (0)         if (&User-Name =~ / /) {
>>     (0)         if (&User-Name =~ / /)  -> FALSE
>>     (0)         if (&User-Name =~ /@[^@]*@/ ) {
>>     (0)         if (&User-Name =~ /@[^@]*@/ )  -> FALSE
>>     (0)         if (&User-Name =~ /\.\./ ) {
>>     (0)         if (&User-Name =~ /\.\./ )  -> FALSE
>>     (0)         if ((&User-Name =~ /@/) && (&User-Name !~
>>     /@(.+)\.(.+)$/))  {
>>     (0)         if ((&User-Name =~ /@/) && (&User-Name !~
>>     /@(.+)\.(.+)$/))   -> FALSE
>>     (0)         if (&User-Name =~ /\.$/)  {
>>     (0)         if (&User-Name =~ /\.$/)   -> FALSE
>>     (0)         if (&User-Name =~ /@\./)  {
>>     (0)         if (&User-Name =~ /@\./)   -> FALSE
>>     (0)       } # if (&User-Name)  = updated
>>     (0)     } # policy filter_username = updated
>>     (0)     policy filter_password {
>>     (0)       if (&User-Password &&    (&User-Password !=
>>     "%{string:User-Password}")) {
>>     (0)       EXPAND %{string:User-Password}
>>     (0)          --> 40a8f0a9e051
>>     (0)       if (&User-Password &&    (&User-Password !=
>>     "%{string:User-Password}"))  -> FALSE
>>     (0)     } # policy filter_password = updated
>>     (0)     [preprocess] = ok
>>     (0) suffix: Checking for suffix after "@"
>>     (0) suffix: No '@' in User-Name = "40a8f0a9e051", skipping NULL
>>     due to config.
>>     (0)     [suffix] = noop
>>     (0) ntdomain: Checking for prefix before "\"
>>     (0) ntdomain: No '\' in User-Name = "40a8f0a9e051", looking up
>>     realm NULL
>>     (0) ntdomain: Found realm "null"
>>     (0) ntdomain: Adding Stripped-User-Name = "40a8f0a9e051"
>>     (0) ntdomain: Adding Realm = "null"
>>     (0) ntdomain: Authentication realm is LOCAL
>>     (0)     [ntdomain] = ok
>>     (0) eap: No EAP-Message, not doing EAP
>>     (0)     [eap] = noop
>>     (0)     if ( !EAP-Message ) {
>>     (0)     if ( !EAP-Message )  -> TRUE
>>     (0)     if ( !EAP-Message )  {
>>     (0)       update {
>>     (0)         &control:Auth-Type := Accept
>>     (0)       } # update = noop
>>     (0)     } # if ( !EAP-Message )  = noop
>>     (0)     policy packetfence-eap-mac-policy {
>>     (0)       if ( &EAP-Type ) {
>>     (0)       if ( &EAP-Type )  -> FALSE
>>     (0)       [noop] = noop
>>     (0)     } # policy packetfence-eap-mac-policy = noop
>>     (0) pap: WARNING:
>>     !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
>>     (0) pap: WARNING: !!! Ignoring control:User-Password.  Update
>>     your        !!!
>>     (0) pap: WARNING: !!! configuration so that the "known good"
>>     clear text !!!
>>     (0) pap: WARNING: !!! password is in Cleartext-Password and NOT
>>     in        !!!
>>     (0) pap: WARNING: !!!
>>     User-Password.                                      !!!
>>     (0) pap: WARNING:
>>     !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
>>     (0) pap: WARNING: Auth-Type already set.  Not setting to PAP
>>     (0)     [pap] = noop
>>     (0)   } # authorize = updated
>>     (0) Found Auth-Type = Accept
>>     (0) Auth-Type = Accept, accepting the user
>>     (0) # Executing section post-auth from file
>>     raddb//sites-enabled/packetfence
>>     (0)   post-auth {
>>     (0)     update {
>>     (0)       EXPAND %{Packet-Src-IP-Address}
>>     (0)          --> 10.216.0.167
>>     (0)       &request:FreeRADIUS-Client-IP-Address := 10.216.0.167
>>     (0)       &control:PacketFence-RPC-Server = 127.0.0.1
>>     (0)       &control:PacketFence-RPC-Port = 7070
>>     (0)       &control:PacketFence-RPC-User =
>>     (0)       &control:PacketFence-RPC-Pass =
>>     (0)       &control:PacketFence-RPC-Proto = http
>>     (0)     } # update = noop
>>     (0)     if (! EAP-Type || (EAP-Type != TTLS  && EAP-Type != PEAP) ) {
>>     (0)     if (! EAP-Type || (EAP-Type != TTLS  && EAP-Type != PEAP)
>>     )  -> TRUE
>>     (0)     if (! EAP-Type || (EAP-Type != TTLS  && EAP-Type != PEAP)
>>     )  {
>>     rlm_rest (rest): Reserved connection (0)
>>     (0) rest: Expanding URI components
>>     (0) rest: EXPAND http://127.0.0.1:7070
>>     (0) rest:    --> http://127.0.0.1:7070
>>     (0) rest: EXPAND //radius/rest/authorize
>>     (0) rest:    --> //radius/rest/authorize
>>     (0) rest: Sending HTTP POST to
>>     "http://127.0.0.1:7070//radius/rest/authorize
>>     <http://127.0.0.1:7070//radius/rest/authorize>"
>>     (0) rest: Encoding attribute "User-Name"
>>     (0) rest: Encoding attribute "User-Password"
>>     (0) rest: Encoding attribute "NAS-IP-Address"
>>     (0) rest: Encoding attribute "NAS-Port"
>>     (0) rest: Encoding attribute "Service-Type"
>>     (0) rest: Encoding attribute "Framed-MTU"
>>     (0) rest: Encoding attribute "Called-Station-Id"
>>     (0) rest: Encoding attribute "Calling-Station-Id"
>>     (0) rest: Encoding attribute "NAS-Port-Type"
>>     (0) rest: Encoding attribute "Event-Timestamp"
>>     (0) rest: Encoding attribute "Message-Authenticator"
>>     (0) rest: Encoding attribute "NAS-Port-Id"
>>     (0) rest: Encoding attribute "Cisco-AVPair"
>>     (0) rest: Encoding attribute "Stripped-User-Name"
>>     (0) rest: Encoding attribute "Realm"
>>     (0) rest: Encoding attribute "FreeRADIUS-Client-IP-Address"
>>     (0) rest: Processing response header
>>     (0) rest:   Status : 200 (OK)
>>     (0) rest:   Type   : json (application/json)
>>     (0) rest: Parsing attribute "control:PacketFence-Role"
>>     (0) rest: EXPAND registration
>>     (0) rest:    --> registration
>>     (0) rest: PacketFence-Role := "registration"
>>     (0) rest: Parsing attribute "control:PacketFence-Eap-Type"
>>     (0) rest: EXPAND 0
>>     (0) rest:    --> 0
>>     (0) rest: PacketFence-Eap-Type := "0"
>>     (0) rest: Parsing attribute "Tunnel-Type"
>>     (0) rest: EXPAND 13
>>     (0) rest:    --> 13
>>     (0) rest: Tunnel-Type := VLAN
>>     (0) rest: Parsing attribute "control:PacketFence-AutoReg"
>>     (0) rest: EXPAND 0
>>     (0) rest:    --> 0
>>     (0) rest: PacketFence-AutoReg := "0"
>>     (0) rest: Parsing attribute "Tunnel-Private-Group-ID"
>>     (0) rest: EXPAND 820
>>     (0) rest:    --> 820
>>     (0) rest: Tunnel-Private-Group-Id := "820"
>>     (0) rest: Parsing attribute "control:PacketFence-Request-Time"
>>     (0) rest: EXPAND 1485971799
>>     (0) rest:    --> 1485971799
>>     (0) rest: PacketFence-Request-Time := 1485971799
>>     (0) rest: Parsing attribute "control:PacketFence-Switch-Ip-Address"
>>     (0) rest: EXPAND 10.216.0.167
>>     (0) rest:    --> 10.216.0.167
>>     (0) rest: PacketFence-Switch-Ip-Address := "10.216.0.167"
>>     (0) rest: Parsing attribute "control:PacketFence-UserName"
>>     (0) rest: EXPAND 40a8f0a9e051
>>     (0) rest:    --> 40a8f0a9e051
>>     (0) rest: PacketFence-UserName := "40a8f0a9e051"
>>     (0) rest: Parsing attribute "control:PacketFence-IsPhone"
>>     (0) rest: PacketFence-IsPhone := ""
>>     (0) rest: Parsing attribute "control:PacketFence-Switch-Mac"
>>     (0) rest: EXPAND 30:37:a6:7e:82:82
>>     (0) rest:    --> 30:37:a6:7e:82:82
>>     (0) rest: PacketFence-Switch-Mac := "30:37:a6:7e:82:82"
>>     (0) rest: Parsing attribute "control:PacketFence-Switch-Id"
>>     (0) rest: EXPAND 10.216.0.167
>>     (0) rest:    --> 10.216.0.167
>>     (0) rest: PacketFence-Switch-Id := "10.216.0.167"
>>     (0) rest: Parsing attribute "Filter-Id"
>>     (0) rest: EXPAND registration.in <http://registration.in>
>>     (0) rest:    --> registration.in <http://registration.in>
>>     (0) rest: Filter-Id := "registration.in <http://registration.in>"
>>     (0) rest: Parsing attribute "Tunnel-Medium-Type"
>>     (0) rest: EXPAND 6
>>     (0) rest:    --> 6
>>     (0) rest: Tunnel-Medium-Type := IEEE-802
>>     (0) rest: Parsing attribute "control:PacketFence-Computer-Name"
>>     (0) rest: EXPAND RXHD03099
>>     (0) rest:    --> RXHD03099
>>     (0) rest: PacketFence-Computer-Name := "RXHD03099"
>>     (0) rest: Parsing attribute "Cisco-AVPair"
>>     (0) rest: WARNING: Zero length value array, skipping...
>>     (0) rest: Parsing attribute "control:PacketFence-Mac"
>>     (0) rest: EXPAND 40:a8:f0:a9:e0:51
>>     (0) rest:    --> 40:a8:f0:a9:e0:51
>>     (0) rest: PacketFence-Mac := "40:a8:f0:a9:e0:51"
>>     (0) rest: Parsing attribute "control:PacketFence-IfIndex"
>>     (0) rest: EXPAND 10002
>>     (0) rest:    --> 10002
>>     (0) rest: PacketFence-IfIndex := "10002"
>>     (0) rest: Parsing attribute "reply:PacketFence-Authorization-Status"
>>     (0) rest: EXPAND allow
>>     (0) rest:    --> allow
>>     (0) rest: PacketFence-Authorization-Status := "allow"
>>     (0) rest: Parsing attribute "control:PacketFence-Connection-Type"
>>     (0) rest: EXPAND WIRED_MAC_AUTH
>>     (0) rest:    --> WIRED_MAC_AUTH
>>     (0) rest: PacketFence-Connection-Type := "WIRED_MAC_AUTH"
>>     (0) rest: Parsing attribute "control:PacketFence-Status"
>>     (0) rest: EXPAND unreg
>>     (0) rest:    --> unreg
>>     (0) rest: PacketFence-Status := "unreg"
>>     rlm_rest (rest): Released connection (0)
>>     rlm_rest (rest): Need 5 more connections to reach 10 spares
>>     rlm_rest (rest): Opening additional connection (5), 1 of 59
>>     pending slots used
>>     rlm_rest (rest): Connecting to "http://127.0.0.1:7070/";
>>     (0)       [rest] = updated
>>     (0)       if (&reply:PacketFence-Authorization-Status == "deny") {
>>     (0)       if (&reply:PacketFence-Authorization-Status == "deny") 
>>     -> FALSE
>>     (0)       else {
>>     (0)         policy packetfence-audit-log-accept {
>>     (0)           if (&User-Name != "dummy") {
>>     (0)           if (&User-Name != "dummy")  -> TRUE
>>     (0)           if (&User-Name != "dummy")  {
>>     (0)             policy request-timing {
>>     (0)               if (control:PacketFence-Request-Time != 0) {
>>     (0)               if (control:PacketFence-Request-Time != 0)  -> TRUE
>>     (0)               if (control:PacketFence-Request-Time != 0)  {
>>     (0)                 update control {
>>     (0)                   EXPAND %{expr:
>>     %{control:PacketFence-Request-Time} - %{control:Tmp-Integer-0}}
>>     (0)                      --> 0
>>     (0)                   &PacketFence-Request-Time := 0
>>     (0)                 } # update control = noop
>>     (0)               } # if (control:PacketFence-Request-Time != 0) 
>>     = noop
>>     (0)             } # policy request-timing = noop
>>     (0) sql: EXPAND type.accept.query
>>     (0) sql:    --> type.accept.query
>>     (0) sql: Using query template 'query'
>>     rlm_sql (sql): Reserved connection (1)
>>     (0) sql: EXPAND %{User-Name}
>>     (0) sql:    --> 40a8f0a9e051
>>     (0) sql: SQL-User-Name set to '40a8f0a9e051'
>>     (0) sql: EXPAND INSERT INTO radius_audit_log               ( mac,
>>     ip, computer_name, user_name,                stripped_user_name, 
>>     realm, event_type,                switch_id, switch_mac,
>>     switch_ip_address,                radius_source_ip_address,
>>     called_station_id, calling_station_id,               
>>     nas_port_type, ssid, nas_port_id,                ifindex,
>>     nas_port, connection_type,                nas_ip_address,
>>     nas_identifier, auth_status,                reason, auth_type,
>>     eap_type,                role, node_status,
>>     profile,                source, auto_reg,
>>     is_phone,                pf_domain, uuid,
>>     radius_request,                radius_reply,
>>     request_time)              VALUES               (
>>     '%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}',
>>     '%{%{control:PacketFence-Computer-Name}:-N/A}',
>>     '%{request:User-Name}',               
>>     '%{request:Stripped-User-Name}', '%{request:Realm}',
>>     'Radius-Access-Request',               
>>     '%{%{control:PacketFence-Switch-Id}:-N/A}',
>>     '%{%{control:PacketFence-Switch-Mac}:-N/A}',
>>     '%{%{control:PacketFence-Switch-Ip-Address}:-N/A}',               
>>     '%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}',
>>     '%{request:Calling-Station-Id}',               
>>     '%{request:NAS-Port-Type}', '%{request:Called-Station-SSID}',
>>     '%{request:NAS-Port-Id}',               
>>     '%{%{control:PacketFence-IfIndex}:-N/A}', '%{request:NAS-Port}',
>>     '%{%{control:PacketFence-Connection-Type}:-N/A}',               
>>     '%{request:NAS-IP-Address}', '%{request:NAS-Identifier}',
>>     'Accept',                '%{request:Module-Failure-Message}',
>>     '%{control:Auth-Type}', '%{request:EAP-Type}',               
>>     '%{%{control:PacketFence-Role}:-N/A}',
>>     '%{%{control:PacketFence-Status}:-N/A}',
>>     '%{%{control:PacketFence-Profile}:-N/A}',               
>>     '%{%{control:PacketFence-Source}:-N/A}',
>>     '%{%{control:PacketFence-AutoReg}:-N/A}',
>>     '%{%{control:PacketFence-IsPhone}:-N/A}',               
>>     '%{request:PacketFence-Domain}', '',
>>     '%{pairs:&request:[*]}','%{pairs:&reply:[*]}',
>>     '%{control:PacketFence-Request-Time}')
>>     (0) sql:    --> INSERT INTO radius_audit_log               ( mac,
>>     ip, computer_name, user_name,                stripped_user_name, 
>>     realm, event_type,                switch_id, switch_mac,
>>     switch_ip_address,                radius_source_ip_address,
>>     called_station_id, calling_station_id,               
>>     nas_port_type, ssid, nas_port_id,                ifindex,
>>     nas_port, connection_type,                nas_ip_address,
>>     nas_identifier, auth_status,                reason, auth_type,
>>     eap_type,                role, node_status,
>>     profile,                source, auto_reg,
>>     is_phone,                pf_domain, uuid,
>>     radius_request,                radius_reply,
>>     request_time)              VALUES               (
>>     '40:a8:f0:a9:e0:51', '', 'RXHD03099',
>>     '40a8f0a9e051',                '40a8f0a9e051', 'null',
>>     'Radius-Access-Request',                '10.216.0.167',
>>     '30:37:a6:7e:82:82', '10.216.0.167',               
>>     '10.216.0.167', '30:37:a6:7e:82:82',
>>     '40:a8:f0:a9:e0:51',                'Ethernet', '',
>>     'FastEthernet0/2',                '10002', '50002',
>>     'WIRED_MAC_AUTH',                '10.216.0.167', '',
>>     'Accept',                '', 'Accept', '',               
>>     'registration', 'unreg', 'N/A',                'N/A', '0',
>>     'N/A',                '', '', 'User-Name =3D
>>     =2240a8f0a9e051=22=2C User-Password =3D =2240a8f0a9e051=22=2C
>>     NAS-IP-Address =3D 10.216.0.167=2C NAS-Port =3D 50002=2C
>>     Service-Type =3D Call-Check=2C Framed-MTU =3D 1500=2C
>>     Called-Station-Id =3D =2230:37:a6:7e:82:82=22=2C
>>     Calling-Station-Id =3D =2240:a8:f0:a9:e0:51=22=2C NAS-Port-Type
>>     =3D Ethernet=2C Event-Timestamp =3D =22Feb  1 2017 17:56:39
>>     GMT=22=2C Message-Authenticator =3D
>>     0x2f390957e15d061946d59dd43a49016c=2C NAS-Port-Id =3D
>>     =22FastEthernet0/2=22=2C Cisco-AVPair =3D =22service-type=3DCall
>>     Check=22=2C Cisco-AVPair =3D
>>     =22audit-session-id=3D0AD800A700000023000A2070=22=2C
>>     Stripped-User-Name =3D =2240a8f0a9e051=22=2C Realm =3D
>>     =22null=22=2C FreeRADIUS-Client-IP-Address =3D 10.216.0.167=2C
>>     SQL-User-Name =3D =2240a8f0a9e051=22','Tunnel-Type =3D VLAN=2C
>>     Tunnel-Private-Group-Id =3D =22820=22=2C Filter-Id =3D
>>     =22registration.in <http://22registration.in>=22=2C
>>     Tunnel-Medium-Type =3D IEEE-802=2C
>>     PacketFence-Authorization-Status =3D =22allow=22', '0')
>>     (0) sql: Executing query: INSERT INTO
>>     radius_audit_log               ( mac, ip, computer_name,
>>     user_name,                stripped_user_name,  realm,
>>     event_type,                switch_id, switch_mac,
>>     switch_ip_address,                radius_source_ip_address,
>>     called_station_id, calling_station_id,               
>>     nas_port_type, ssid, nas_port_id,                ifindex,
>>     nas_port, connection_type,                nas_ip_address,
>>     nas_identifier, auth_status,                reason, auth_type,
>>     eap_type,                role, node_status,
>>     profile,                source, auto_reg,
>>     is_phone,                pf_domain, uuid,
>>     radius_request,                radius_reply,
>>     request_time)              VALUES               (
>>     '40:a8:f0:a9:e0:51', '', 'RXHD03099',
>>     '40a8f0a9e051',                '40a8f0a9e051', 'null',
>>     'Radius-Access-Request',                '10.216.0.167',
>>     '30:37:a6:7e:82:82', '10.216.0.167',               
>>     '10.216.0.167', '30:37:a6:7e:82:82',
>>     '40:a8:f0:a9:e0:51',                'Ethernet', '',
>>     'FastEthernet0/2',                '10002', '50002',
>>     'WIRED_MAC_AUTH',                '10.216.0.167', '',
>>     'Accept',                '', 'Accept', '',               
>>     'registration', 'unreg', 'N/A',                'N/A', '0',
>>     'N/A',                '', '', 'User-Name =3D
>>     =2240a8f0a9e051=22=2C User-Password =3D =2240a8f0a9e051=22=2C
>>     NAS-IP-Address =3D 10.216.0.167=2C NAS-Port =3D 50002=2C
>>     Service-Type =3D Call-Check=2C Framed-MTU =3D 1500=2C
>>     Called-Station-Id =3D =2230:37:a6:7e:82:82=22=2C
>>     Calling-Station-Id =3D =2240:a8:f0:a9:e0:51=22=2C NAS-Port-Type
>>     =3D Ethernet=2C Event-Timestamp =3D =22Feb  1 2017 17:56:39
>>     GMT=22=2C Message-Authenticator =3D
>>     0x2f390957e15d061946d59dd43a49016c=2C NAS-Port-Id =3D
>>     =22FastEthernet0/2=22=2C Cisco-AVPair =3D =22service-type=3DCall
>>     Check=22=2C Cisco-AVPair =3D
>>     =22audit-session-id=3D0AD800A700000023000A2070=22=2C
>>     Stripped-User-Name =3D =2240a8f0a9e051=22=2C Realm =3D
>>     =22null=22=2C FreeRADIUS-Client-IP-Address =3D 10.216.0.167=2C
>>     SQL-User-Name =3D =2240a8f0a9e051=22','Tunnel-Type =3D VLAN=2C
>>     Tunnel-Private-Group-Id =3D =22820=22=2C Filter-Id =3D
>>     =22registration.in <http://22registration.in>=22=2C
>>     Tunnel-Medium-Type =3D IEEE-802=2C
>>     PacketFence-Authorization-Status =3D =22allow=22', '0')
>>     (0) sql: SQL query returned: success
>>     (0) sql: 1 record(s) updated
>>     rlm_sql (sql): Released connection (1)
>>     rlm_sql (sql): Need 4 more connections to reach 10 spares
>>     rlm_sql (sql): Opening additional connection (6), 1 of 58 pending
>>     slots used
>>     rlm_sql_mysql: Starting connect to MySQL server
>>     rlm_sql_mysql: Connected to database 'pf' on Localhost via UNIX
>>     socket, server version 5.5.52-MariaDB, protocol version 10
>>     (0)             [sql] = ok
>>     (0)           } # if (&User-Name != "dummy")  = ok
>>     (0)         } # policy packetfence-audit-log-accept = ok
>>     (0)       } # else = ok
>>     (0)     } # if (! EAP-Type || (EAP-Type != TTLS  && EAP-Type !=
>>     PEAP) )  = updated
>>     (0) attr_filter.packetfence_post_auth: EXPAND %{User-Name}
>>     (0) attr_filter.packetfence_post_auth:    --> 40a8f0a9e051
>>     (0) attr_filter.packetfence_post_auth: Matched entry DEFAULT at
>>     line 10
>>     (0)     [attr_filter.packetfence_post_auth] = updated
>>     (0) linelog: EXPAND messages.%{%{reply:Packet-Type}:-default}
>>     (0) linelog:    --> messages.Access-Accept
>>     (0) linelog: EXPAND %t : [mac:%{Calling-Station-Id}] Accepted
>>     user: %{reply:User-Name} and returned VLAN
>>     %{reply:Tunnel-Private-Group-ID}
>>     (0) linelog:    --> Wed Feb  1 17:56:39 2017 :
>>     [mac:40:a8:f0:a9:e0:51] Accepted user:  and returned VLAN 820
>>     (0) linelog: EXPAND /usr/local/pf/logs/radius.log
>>     (0) linelog:    --> /usr/local/pf/logs/radius.log
>>     (0)     [linelog] = ok
>>     (0)   } # post-auth = updated
>>     (0) Login OK: [40a8f0a9e051] (from client 10.216.0.167 port 50002
>>     cli 40:a8:f0:a9:e0:51)
>>     (0) Sent Access-Accept Id 35 from 10.216.9.72:1812
>>     <http://10.216.9.72:1812> to 10.216.0.167:1645
>>     <http://10.216.0.167:1645> length 0
>>     (0)   Tunnel-Type = VLAN
>>     (0)   Tunnel-Private-Group-Id = "820"
>>     (0)   Filter-Id = "registration.in <http://registration.in>"
>>     (0)   Tunnel-Medium-Type = IEEE-802
>>     (0)   PacketFence-Authorization-Status = "allow"
>>     (0) Finished request
>>     Waking up in 4.9 seconds.
>>
>>     ***This continues to loop as above
>>
>>
>>
>>
>>
>>
>>
>>     
>> ------------------------------------------------------------------------------
>>     Check out the vibrant tech community on one of the world's most
>>     engaging tech sites, SlashDot.org! http://sdm.link/slashdot
>>
>>     _______________________________________________
>>     PacketFence-users mailing list
>>     [email protected]
>>     <mailto:[email protected]>
>>     https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>     <https://lists.sourceforge.net/lists/listinfo/packetfence-users>
>
>     -- 
>     Fabrice Durand
>     [email protected] <mailto:[email protected]> ::  +1.514.447.4918 
> <tel:%28514%29%20447-4918> (x135) ::  www.inverse.ca <http://www.inverse.ca>
>     Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
> (http://packetfence.org) 
>
>     
> ------------------------------------------------------------------------------
>     Check out the vibrant tech community on one of the world's most
>     engaging tech sites, SlashDot.org! http://sdm.link/slashdot
>     _______________________________________________ PacketFence-users
>     mailing list [email protected]
>     <mailto:[email protected]>
>     https://lists.sourceforge.net/lists/listinfo/packetfence-users
>     <https://lists.sourceforge.net/lists/listinfo/packetfence-users> 
>
> ------------------------------------------------------------------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, SlashDot.org! http://sdm.link/slashdot
>
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
-- 
Fabrice Durand
[email protected] ::  +1.514.447.4918 (x135) ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org) 
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to