Thank you Fabrice. it worked straight away!

On 1 February 2017 at 18:46, Fabrice Durand <[email protected]> wrote:

> Untick Role by Switch Role and it should work.
>
>
>
> Le 2017-02-01 à 13:43, Philip Damian-Grint a écrit :
>
> Thanks for the speedy response Fabrice....
>
> In my role tab for the switch I have Role by VLAN ID ticked and Role by
> Switch Role ticked (was on by default)
> The ACL and Web Auth Roles are not ticked.
>
> Regards
> Philip
>
> On 1 February 2017 at 18:33, Fabrice Durand <[email protected]> wrote:
>
>> Hello Philip,
>>
>> it's probably your acl the issue.
>>
>> remove in the switch config (pf side -> config -> switch -> role tab and
>> in role bu role) registration
>> Regards
>> Fabrice
>>
>> Le 2017-02-01 à 13:29, Philip Damian-Grint a écrit :
>>
>> Hello mailing list,
>>
>> I have installed a fresh Packetfence 6.4.0-1 on Centos 7.3.1611 for
>> testing
>>
>> Test switch is a Cisco 2960 running 15.0(1)SE3
>>
>> PF is configured for registration vlan 820
>>
>> When I manually configure a port on the test switch to vlan 820 I can
>> access the portal from PF
>>
>> I configured the switchport for MAB from Packetfence and Cisco
>> documentation
>>
>> With aaa and radius debug enabled, I can see radius authentication
>> starting, the port being set to vlan 820, then immediately failing
>> authorization and starting again. This loops forever until the port is
>> shut, or until I register the mac address in the PF Administration console,
>> at which point a production  VLAN is allocated as expected.
>>
>> While the looping is going on, the Registration VLAN never stays
>> configured on the port long enough for the workstation to get an IP and
>> reach the guest portal
>>
>> When radiusd -X is run, an access-accept message is sent, and the process
>> loops every time the switch loops.
>>
>> otherwise, I can never get the guest portal, and the logs fill up
>> incredibly quickly just from one port.
>>
>> Does anyone have any suggestions? I primarily suspect my switch config is
>> faulty or missing some key element...
>>
>> SWITCH CONFIG:
>>
>> aaa new-model
>>
>> aaa group server radius pf
>>  server name SVVNMS03
>>  ip radius source-interface Vlan100
>>
>> aaa authentication dot1x default group pf
>> aaa authorization network default group pf
>>
>> aaa server radius dynamic-author
>>  client 10.216.9.72 server-key 7 XXXXXXXXXXXXXXXXXXXXXXXX
>>  port 3799
>>
>> interface FastEthernet0/2
>>  description MAB-NO-VOIP
>>  switchport mode access
>>  logging event link-status
>>  authentication order mab
>>  authentication priority mab
>>  authentication port-control auto
>>  authentication periodic
>>  authentication timer restart 10800
>>  authentication timer reauthenticate 10800
>>  mab
>>  no snmp trap link-status
>>  dot1x pae authenticator
>>  dot1x timeout quiet-period 2
>>  dot1x timeout tx-period 3
>>  spanning-tree portfast
>>  spanning-tree bpduguard enable
>>
>> radius-server retransmit 1
>> radius-server timeout 2
>> radius-server vsa send authentication
>>
>> radius server SVVNMS03
>>  address ipv4 10.216.9.72 auth-port 1812 acct-port 1813
>>  timeout 2
>>  retransmit 1
>>  key 7 XXXXXXXXXXXXXXXXXXXXXXXX
>> =====================================
>>
>> SWITCH DEBUG:
>>
>> Feb  1 18:05:39.072 GMT: AAA/BIND(0000004B): Bind i/f
>> Feb  1 18:05:39.072 GMT: AAA/ACCT/HC(0000004B): Register Dot1X/5400003F
>> 64 bit counter support not configured
>> Feb  1 18:05:39.072 GMT: AAA/ACCT/HC(0000004B): Update Dot1X/5400003F
>> Feb  1 18:05:39.072 GMT: AAA/ACCT/HC(0000004B): no HC Dot1X/5400003F
>> Feb  1 18:05:39.072 GMT: AAA/ACCT/EVENT/(0000004B): CALL START
>> Feb  1 18:05:39.072 GMT: Getting session id for NET(0000004B) : db=39078C4
>> Feb  1 18:05:39.072 GMT: AAA/ACCT(00000000): add node, session 65
>> Feb  1 18:05:39.072 GMT: AAA/ACCT/NET(0000004B): add, count 1
>> Feb  1 18:05:39.072 GMT: Getting session id for NET(0000004B) : db=39078C4
>> Feb  1 18:05:39.400 GMT: %AUTHMGR-5-START: Starting 'mab' for client
>> (40a8.f0a9.e051) on Interface Fa0/2 AuditSessionID 0AD800A70000003E00125D6B
>> Feb  1 18:05:39.400 GMT: AAA/AUTHEN/8021X (0000004B): Pick method list
>> 'default'
>> Feb  1 18:05:39.400 GMT: RADIUS/ENCODE(0000004B):Orig. component type =
>> Dot1X
>> Feb  1 18:05:39.400 GMT: RADIUS/ENCODE(0000004B): Unsupported AAA
>> attribute hwidb
>> Feb  1 18:05:39.400 GMT: RADIUS/ENCODE(0000004B): Unsupported AAA
>> attribute auth-profile
>> Feb  1 18:05:39.400 GMT: RADIUS(0000004B): Config NAS IP: 10.216.0.167
>> Feb  1 18:05:39.400 GMT: RADIUS(0000004B): Config NAS IPv6: ::
>> Feb  1 18:05:39.400 GMT: Getting session id for DOT1X(0000004B) :
>> db=39078C4
>> Feb  1 18:05:39.400 GMT: RADIUS/ENCODE(0000004B): acct_session_id: 65
>> Feb  1 18:05:39.400 GMT: RADIUS(0000004B): sending
>> Feb  1 18:05:39.400 GMT: RADIUS(0000004B): Send Access-Request to
>> 10.216.9.72:1812 id 1645/60, len 237
>> Feb  1 18:05:39.400 GMT: RADIUS:  authenticator B4 28 20 EC F8 7C B8 2A -
>> 47 C0 78 E6 3B 63 CB E1
>> Feb  1 18:05:39.400 GMT: RADIUS:  User-Name           [1]   14
>> "40a8f0a9e051"
>> Feb  1 18:05:39.400 GMT: RADIUS:  User-Password       [2]   18  *
>> Feb  1 18:05:39.400 GMT: RADIUS:  Service-Type        [6]   6   Call
>> Check                [10]
>> Feb  1 18:05:39.400 GMT: RADIUS:  Vendor, Cisco       [26]  31
>> Feb  1 18:05:39.400 GMT: RADIUS:   Cisco AVpair       [1]   25
>> "service-type=Call Check"
>> Feb  1 18:05:39.400 GMT: RADIUS:  Framed-MTU          [12]  6
>> 1500
>> Feb  1 18:05:39.400 GMT: RADIUS:  Called-Station-Id   [30]  19
>> "30-37-A6-7E-82-82"
>> Feb  1 18:05:39.400 GMT: RADIUS:  Calling-Station-Id  [31]  19
>> "40-A8-F0-A9-E0-51"
>> Feb  1 18:05:39.408 GMT: RADIUS:  Message-Authenticato[80]  18
>> Feb  1 18:05:39.408 GMT: RADIUS:   59 05 27 15 EB D2 EF 21 00 97 C8 79 9B
>> 29 2E DE            [ Y'!y).]
>> Feb  1 18:05:39.408 GMT: RADIUS:  EAP-Key-Name        [102] 2   *
>> Feb  1 18:05:39.408 GMT: RADIUS:  Vendor, Cisco       [26]  49
>> Feb  1 18:05:39.408 GMT: RADIUS:   Cisco AVpair       [1]   43
>> "audit-session-id=0AD800A70000003E00125D6B"
>> Feb  1 18:05:39.408 GMT: RADIUS:  NAS-Port-Type       [61]  6
>> Ethernet                  [15]
>> Feb  1 18:05:39.408 GMT: RADIUS:  NAS-Port            [5]   6
>> 50002
>> Feb  1 18:05:39.408 GMT: RADIUS:  NAS-Port-Id         [87]  17
>> "FastEthernet0/2"
>> Feb  1 18:05:39.408 GMT: RADIUS:  NAS-IP-Address      [4]   6
>> 10.216.0.167
>> Feb  1 18:05:39.408 GMT: RADIUS(0000004B): Sending a IPv4 Radius Packet
>> Feb  1 18:05:39.408 GMT: RADIUS(0000004B): Started 2 sec timeout
>> Feb  1 18:05:39.433 GMT: RADIUS: Received from id 1645/60
>> 10.216.9.72:1812, Access-Accept, len 67
>> Feb  1 18:05:39.433 GMT: RADIUS:  authenticator 20 58 F8 39 9F 12 BD A9 -
>> E1 E5 BE 66 EE 73 CE F9
>> Feb  1 18:05:39.433 GMT: RADIUS:  Tunnel-Type         [64]  6
>> 00:VLAN                   [13]
>> Feb  1 18:05:39.433 GMT: RADIUS:  Tunnel-Private-Group[81]  5   "820"
>> Feb  1 18:05:39.433 GMT: RADIUS:  Filter-Id           [11]  17
>> Feb  1 18:05:39.433 GMT: RADIUS:   72 65 67 69 73 74 72 61 74 69 6F 6E 2E
>> 69 6E   [ registration.in]
>> Feb  1 18:05:39.433 GMT: RADIUS:  Tunnel-Medium-Type  [65]  6
>> 00:ALL_802                [6]
>> Feb  1 18:05:39.433 GMT: RADIUS:  Vendor, Unknown     [26]  13
>> Feb  1 18:05:39.433 GMT: RADIUS:  Session-Timeout     [27]  7
>> Feb  1 18:05:39.433 GMT: RADIUS:   61 6C 6C 6F 77             [ allow]
>> Feb  1 18:05:39.433 GMT: RADIUS(0000004B): Received from id 1645/60
>> Feb  1 18:05:39.433 GMT: %MAB-5-SUCCESS: Authentication successful for
>> client (40a8.f0a9.e051) on Interface Fa0/2 AuditSessionID
>> 0AD800A70000003E00125D6B
>> Feb  1 18:05:39.433 GMT: %AUTHMGR-7-RESULT: Authentication result
>> 'success' from 'mab' for client (40a8.f0a9.e051) on Interface Fa0/2
>> AuditSessionID 0AD800A70000003E00125D6B
>> Feb  1 18:05:39.433 GMT: %AUTHMGR-5-VLANASSIGN: VLAN 820 assigned to
>> Interface Fa0/2 AuditSessionID 0AD800A70000003E00125D6B
>> Feb  1 18:05:39.467 GMT: %AUTHMGR-5-FAIL: Authorization failed for client
>> (40a8.f0a9.e051) on Interface Fa0/2 AuditSessionID 0AD800A70000003E00125D6B
>> Feb  1 18:05:39.467 GMT: AUTH-SYNC (Fa0/2) Syncing update for context
>> (40a8.f0a9.e051)
>> Feb  1 18:05:39.509 GMT: AUTH-SYNC (Fa0/2) Syncing delete for context
>> (40a8.f0a9.e051)
>> Feb  1 18:05:39.509 GMT: AAA/ACCT/HC(0000004B): Update Dot1X/5400003F
>> Feb  1 18:05:39.509 GMT: AAA/ACCT/HC(0000004B): no HC Dot1X/5400003F
>> Feb  1 18:05:39.509 GMT: AAA/ACCT/HC(0000004B): Update Dot1X/5400003F
>> Feb  1 18:05:39.509 GMT: AAA/ACCT/HC(0000004B): no HC Dot1X/5400003F
>> Feb  1 18:05:39.517 GMT: AAA/ACCT/EVENT/(0000004B): CALL STOP
>> Feb  1 18:05:39.517 GMT: AAA/ACCT/CALL STOP(0000004B): Sending stop
>> requests
>> Feb  1 18:05:39.517 GMT: AAA/ACCT(0000004B): Send all stops
>> Feb  1 18:05:39.517 GMT: AAA/ACCT/NET(0000004B): STOP
>> Feb  1 18:05:39.517 GMT: AAA/ACCT/NET(0000004B): Method list not found
>> Feb  1 18:05:39.517 GMT: AAA/ACCT(0000004B): del node, session 65
>> Feb  1 18:05:39.517 GMT: AAA/ACCT/NET(0000004B): free_rec, count 0
>> Feb  1 18:05:39.517 GMT: /AAA/ACCTNET(0000004B) reccnt 0, csr TRUE, osr 0
>> Feb  1 18:05:39.517 GMT: AAA/ACCT/NET(0000004B): Last rec in db, intf not
>> enqueued
>> Feb  1 18:05:39.718 GMT: AAA/BIND(0000004C): Bind i/f
>> ***this continues to loop as above
>>
>> ======================================
>>
>> RADIUSD DEBUG
>>
>> Listening on auth address 127.0.0.1 port 1812 bound to server packetfence
>> Listening on auth address 10.216.9.72 port 1812 bound to server
>> packetfence
>> Listening on command file /usr/local/pf/var/run/radiusd.sock
>> Listening on proxy address * port 39363
>> Ready to process requests
>> (0) Received Access-Request Id 35 from 10.216.0.167:1645 to
>> 10.216.9.72:1812 length 237
>> (0)   User-Name = "40a8f0a9e051"
>> (0)   User-Password = "40a8f0a9e051"
>> (0)   Service-Type = Call-Check
>> (0)   Cisco-AVPair = "service-type=Call Check"
>> (0)   Framed-MTU = 1500
>> (0)   Called-Station-Id = "30-37-A6-7E-82-82"
>> (0)   Calling-Station-Id = "40-A8-F0-A9-E0-51"
>> (0)   Message-Authenticator = 0x2f390957e15d061946d59dd43a49016c
>> (0)   Cisco-AVPair = "audit-session-id=0AD800A700000023000A2070"
>> (0)   NAS-Port-Type = Ethernet
>> (0)   NAS-Port = 50002
>> (0)   NAS-Port-Id = "FastEthernet0/2"
>> (0)   NAS-IP-Address = 10.216.0.167
>> (0) # Executing section authorize from file raddb//sites-enabled/packetfen
>> ce
>> (0)   authorize {
>> (0)     update {
>> (0)       EXPAND %{Packet-Src-IP-Address}
>> (0)          --> 10.216.0.167
>> (0)       &request:FreeRADIUS-Client-IP-Address := 10.216.0.167
>> (0)       &control:PacketFence-RPC-Server = 127.0.0.1
>> (0)       &control:PacketFence-RPC-Port = 7070
>> (0)       &control:PacketFence-RPC-User =
>> (0)       &control:PacketFence-RPC-Pass =
>> (0)       &control:PacketFence-RPC-Proto = http
>> (0)       EXPAND %l
>> (0)          --> 1485971799
>> (0)       &control:Tmp-Integer-0 := 1485971799
>> (0)       &control:PacketFence-Request-Time := 0
>> (0)     } # update = noop
>> (0)     policy rewrite_calling_station_id {
>> (0)       if (&Calling-Station-Id && (&Calling-Station-Id =~
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2}
>> )[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
>> {
>> (0)       if (&Calling-Station-Id && (&Calling-Station-Id =~
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2}
>> )[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
>> -> TRUE
>> (0)       if (&Calling-Station-Id && (&Calling-Station-Id =~
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2}
>> )[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
>> {
>> (0)         update request {
>> (0)           EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
>> (0)              --> 40:a8:f0:a9:e0:51
>> (0)           &Calling-Station-Id := 40:a8:f0:a9:e0:51
>> (0)         } # update request = noop
>> (0)         [updated] = updated
>> (0)       } # if (&Calling-Station-Id && (&Calling-Station-Id =~
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2}
>> )[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
>> = updated
>> (0)       ... skipping else: Preceding "if" was taken
>> (0)     } # policy rewrite_calling_station_id = updated
>> (0)     policy rewrite_called_station_id {
>> (0)       if ((&Called-Station-Id) && (&Called-Station-Id =~
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2}
>> )[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
>> {
>> (0)       if ((&Called-Station-Id) && (&Called-Station-Id =~
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2}
>> )[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
>> -> TRUE
>> (0)       if ((&Called-Station-Id) && (&Called-Station-Id =~
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2}
>> )[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
>> {
>> (0)         update request {
>> (0)           &Called-Station-Id !* ANY
>> (0)           EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
>> (0)              --> 30:37:a6:7e:82:82
>> (0)           &Called-Station-Id := 30:37:a6:7e:82:82
>> (0)         } # update request = noop
>> (0)         if ("%{8}") {
>> (0)         EXPAND %{8}
>> (0)            -->
>> (0)         if ("%{8}")  -> FALSE
>> (0)         elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~
>> /^ssid=(.*)$/i) {
>> (0)         elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~
>> /^ssid=(.*)$/i)  -> FALSE
>> (0)         elsif (Aruba-Essid-Name) {
>> (0)         elsif (Aruba-Essid-Name)  -> FALSE
>> (0)         elsif ( (Cisco-AVPair)  && "%{Cisco-AVPair}" =~
>> /^ssid=(.*)$/i) {
>> (0)         EXPAND %{Cisco-AVPair}
>> (0)            --> service-type=Call Check
>> (0)         elsif ( (Cisco-AVPair)  && "%{Cisco-AVPair}" =~
>> /^ssid=(.*)$/i)  -> FALSE
>> (0)         [updated] = updated
>> (0)       } # if ((&Called-Station-Id) && (&Called-Station-Id =~
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2}
>> )[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
>> = updated
>> (0)       ... skipping else: Preceding "if" was taken
>> (0)     } # policy rewrite_called_station_id = updated
>> (0)     policy filter_username {
>> (0)       if (&User-Name) {
>> (0)       if (&User-Name)  -> TRUE
>> (0)       if (&User-Name)  {
>> (0)         if (&User-Name =~ / /) {
>> (0)         if (&User-Name =~ / /)  -> FALSE
>> (0)         if (&User-Name =~ /@[^@]*@/ ) {
>> (0)         if (&User-Name =~ /@[^@]*@/ )  -> FALSE
>> (0)         if (&User-Name =~ /\.\./ ) {
>> (0)         if (&User-Name =~ /\.\./ )  -> FALSE
>> (0)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))  {
>> (0)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))
>> -> FALSE
>> (0)         if (&User-Name =~ /\.$/)  {
>> (0)         if (&User-Name =~ /\.$/)   -> FALSE
>> (0)         if (&User-Name =~ /@\./)  {
>> (0)         if (&User-Name =~ /@\./)   -> FALSE
>> (0)       } # if (&User-Name)  = updated
>> (0)     } # policy filter_username = updated
>> (0)     policy filter_password {
>> (0)       if (&User-Password &&    (&User-Password !=
>> "%{string:User-Password}")) {
>> (0)       EXPAND %{string:User-Password}
>> (0)          --> 40a8f0a9e051
>> (0)       if (&User-Password &&    (&User-Password !=
>> "%{string:User-Password}"))  -> FALSE
>> (0)     } # policy filter_password = updated
>> (0)     [preprocess] = ok
>> (0) suffix: Checking for suffix after "@"
>> (0) suffix: No '@' in User-Name = "40a8f0a9e051", skipping NULL due to
>> config.
>> (0)     [suffix] = noop
>> (0) ntdomain: Checking for prefix before "\"
>> (0) ntdomain: No '\' in User-Name = "40a8f0a9e051", looking up realm NULL
>> (0) ntdomain: Found realm "null"
>> (0) ntdomain: Adding Stripped-User-Name = "40a8f0a9e051"
>> (0) ntdomain: Adding Realm = "null"
>> (0) ntdomain: Authentication realm is LOCAL
>> (0)     [ntdomain] = ok
>> (0) eap: No EAP-Message, not doing EAP
>> (0)     [eap] = noop
>> (0)     if ( !EAP-Message ) {
>> (0)     if ( !EAP-Message )  -> TRUE
>> (0)     if ( !EAP-Message )  {
>> (0)       update {
>> (0)         &control:Auth-Type := Accept
>> (0)       } # update = noop
>> (0)     } # if ( !EAP-Message )  = noop
>> (0)     policy packetfence-eap-mac-policy {
>> (0)       if ( &EAP-Type ) {
>> (0)       if ( &EAP-Type )  -> FALSE
>> (0)       [noop] = noop
>> (0)     } # policy packetfence-eap-mac-policy = noop
>> (0) pap: WARNING: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
>> !!!!!!!!!!!!!!!!!!!!!!!!!!!!!
>> (0) pap: WARNING: !!! Ignoring control:User-Password.  Update your
>> !!!
>> (0) pap: WARNING: !!! configuration so that the "known good" clear text
>> !!!
>> (0) pap: WARNING: !!! password is in Cleartext-Password and NOT in
>> !!!
>> (0) pap: WARNING: !!! User-Password.
>> !!!
>> (0) pap: WARNING: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
>> !!!!!!!!!!!!!!!!!!!!!!!!!!!!!
>> (0) pap: WARNING: Auth-Type already set.  Not setting to PAP
>> (0)     [pap] = noop
>> (0)   } # authorize = updated
>> (0) Found Auth-Type = Accept
>> (0) Auth-Type = Accept, accepting the user
>> (0) # Executing section post-auth from file raddb//sites-enabled/packetfen
>> ce
>> (0)   post-auth {
>> (0)     update {
>> (0)       EXPAND %{Packet-Src-IP-Address}
>> (0)          --> 10.216.0.167
>> (0)       &request:FreeRADIUS-Client-IP-Address := 10.216.0.167
>> (0)       &control:PacketFence-RPC-Server = 127.0.0.1
>> (0)       &control:PacketFence-RPC-Port = 7070
>> (0)       &control:PacketFence-RPC-User =
>> (0)       &control:PacketFence-RPC-Pass =
>> (0)       &control:PacketFence-RPC-Proto = http
>> (0)     } # update = noop
>> (0)     if (! EAP-Type || (EAP-Type != TTLS  && EAP-Type != PEAP) ) {
>> (0)     if (! EAP-Type || (EAP-Type != TTLS  && EAP-Type != PEAP) )  ->
>> TRUE
>> (0)     if (! EAP-Type || (EAP-Type != TTLS  && EAP-Type != PEAP) )  {
>> rlm_rest (rest): Reserved connection (0)
>> (0) rest: Expanding URI components
>> (0) rest: EXPAND http://127.0.0.1:7070
>> (0) rest:    --> http://127.0.0.1:7070
>> (0) rest: EXPAND //radius/rest/authorize
>> (0) rest:    --> //radius/rest/authorize
>> (0) rest: Sending HTTP POST to "
>> <http://127.0.0.1:7070//radius/rest/authorize>http://127.0.0.1:7070//
>> radius/rest/authorize"
>> (0) rest: Encoding attribute "User-Name"
>> (0) rest: Encoding attribute "User-Password"
>> (0) rest: Encoding attribute "NAS-IP-Address"
>> (0) rest: Encoding attribute "NAS-Port"
>> (0) rest: Encoding attribute "Service-Type"
>> (0) rest: Encoding attribute "Framed-MTU"
>> (0) rest: Encoding attribute "Called-Station-Id"
>> (0) rest: Encoding attribute "Calling-Station-Id"
>> (0) rest: Encoding attribute "NAS-Port-Type"
>> (0) rest: Encoding attribute "Event-Timestamp"
>> (0) rest: Encoding attribute "Message-Authenticator"
>> (0) rest: Encoding attribute "NAS-Port-Id"
>> (0) rest: Encoding attribute "Cisco-AVPair"
>> (0) rest: Encoding attribute "Stripped-User-Name"
>> (0) rest: Encoding attribute "Realm"
>> (0) rest: Encoding attribute "FreeRADIUS-Client-IP-Address"
>> (0) rest: Processing response header
>> (0) rest:   Status : 200 (OK)
>> (0) rest:   Type   : json (application/json)
>> (0) rest: Parsing attribute "control:PacketFence-Role"
>> (0) rest: EXPAND registration
>> (0) rest:    --> registration
>> (0) rest: PacketFence-Role := "registration"
>> (0) rest: Parsing attribute "control:PacketFence-Eap-Type"
>> (0) rest: EXPAND 0
>> (0) rest:    --> 0
>> (0) rest: PacketFence-Eap-Type := "0"
>> (0) rest: Parsing attribute "Tunnel-Type"
>> (0) rest: EXPAND 13
>> (0) rest:    --> 13
>> (0) rest: Tunnel-Type := VLAN
>> (0) rest: Parsing attribute "control:PacketFence-AutoReg"
>> (0) rest: EXPAND 0
>> (0) rest:    --> 0
>> (0) rest: PacketFence-AutoReg := "0"
>> (0) rest: Parsing attribute "Tunnel-Private-Group-ID"
>> (0) rest: EXPAND 820
>> (0) rest:    --> 820
>> (0) rest: Tunnel-Private-Group-Id := "820"
>> (0) rest: Parsing attribute "control:PacketFence-Request-Time"
>> (0) rest: EXPAND 1485971799
>> (0) rest:    --> 1485971799
>> (0) rest: PacketFence-Request-Time := 1485971799
>> (0) rest: Parsing attribute "control:PacketFence-Switch-Ip-Address"
>> (0) rest: EXPAND 10.216.0.167
>> (0) rest:    --> 10.216.0.167
>> (0) rest: PacketFence-Switch-Ip-Address := "10.216.0.167"
>> (0) rest: Parsing attribute "control:PacketFence-UserName"
>> (0) rest: EXPAND 40a8f0a9e051
>> (0) rest:    --> 40a8f0a9e051
>> (0) rest: PacketFence-UserName := "40a8f0a9e051"
>> (0) rest: Parsing attribute "control:PacketFence-IsPhone"
>> (0) rest: PacketFence-IsPhone := ""
>> (0) rest: Parsing attribute "control:PacketFence-Switch-Mac"
>> (0) rest: EXPAND 30:37:a6:7e:82:82
>> (0) rest:    --> 30:37:a6:7e:82:82
>> (0) rest: PacketFence-Switch-Mac := "30:37:a6:7e:82:82"
>> (0) rest: Parsing attribute "control:PacketFence-Switch-Id"
>> (0) rest: EXPAND 10.216.0.167
>> (0) rest:    --> 10.216.0.167
>> (0) rest: PacketFence-Switch-Id := "10.216.0.167"
>> (0) rest: Parsing attribute "Filter-Id"
>> (0) rest: EXPAND registration.in
>> (0) rest:    --> registration.in
>> (0) rest: Filter-Id := "registration.in"
>> (0) rest: Parsing attribute "Tunnel-Medium-Type"
>> (0) rest: EXPAND 6
>> (0) rest:    --> 6
>> (0) rest: Tunnel-Medium-Type := IEEE-802
>> (0) rest: Parsing attribute "control:PacketFence-Computer-Name"
>> (0) rest: EXPAND RXHD03099
>> (0) rest:    --> RXHD03099
>> (0) rest: PacketFence-Computer-Name := "RXHD03099"
>> (0) rest: Parsing attribute "Cisco-AVPair"
>> (0) rest: WARNING: Zero length value array, skipping...
>> (0) rest: Parsing attribute "control:PacketFence-Mac"
>> (0) rest: EXPAND 40:a8:f0:a9:e0:51
>> (0) rest:    --> 40:a8:f0:a9:e0:51
>> (0) rest: PacketFence-Mac := "40:a8:f0:a9:e0:51"
>> (0) rest: Parsing attribute "control:PacketFence-IfIndex"
>> (0) rest: EXPAND 10002
>> (0) rest:    --> 10002
>> (0) rest: PacketFence-IfIndex := "10002"
>> (0) rest: Parsing attribute "reply:PacketFence-Authorization-Status"
>> (0) rest: EXPAND allow
>> (0) rest:    --> allow
>> (0) rest: PacketFence-Authorization-Status := "allow"
>> (0) rest: Parsing attribute "control:PacketFence-Connection-Type"
>> (0) rest: EXPAND WIRED_MAC_AUTH
>> (0) rest:    --> WIRED_MAC_AUTH
>> (0) rest: PacketFence-Connection-Type := "WIRED_MAC_AUTH"
>> (0) rest: Parsing attribute "control:PacketFence-Status"
>> (0) rest: EXPAND unreg
>> (0) rest:    --> unreg
>> (0) rest: PacketFence-Status := "unreg"
>> rlm_rest (rest): Released connection (0)
>> rlm_rest (rest): Need 5 more connections to reach 10 spares
>> rlm_rest (rest): Opening additional connection (5), 1 of 59 pending slots
>> used
>> rlm_rest (rest): Connecting to " <http://127.0.0.1:7070/>
>> http://127.0.0.1:7070/";
>> (0)       [rest] = updated
>> (0)       if (&reply:PacketFence-Authorization-Status == "deny") {
>> (0)       if (&reply:PacketFence-Authorization-Status == "deny")  ->
>> FALSE
>> (0)       else {
>> (0)         policy packetfence-audit-log-accept {
>> (0)           if (&User-Name != "dummy") {
>> (0)           if (&User-Name != "dummy")  -> TRUE
>> (0)           if (&User-Name != "dummy")  {
>> (0)             policy request-timing {
>> (0)               if (control:PacketFence-Request-Time != 0) {
>> (0)               if (control:PacketFence-Request-Time != 0)  -> TRUE
>> (0)               if (control:PacketFence-Request-Time != 0)  {
>> (0)                 update control {
>> (0)                   EXPAND %{expr: %{control:PacketFence-Request-Time}
>> - %{control:Tmp-Integer-0}}
>> (0)                      --> 0
>> (0)                   &PacketFence-Request-Time := 0
>> (0)                 } # update control = noop
>> (0)               } # if (control:PacketFence-Request-Time != 0)  = noop
>> (0)             } # policy request-timing = noop
>> (0) sql: EXPAND type.accept.query
>> (0) sql:    --> type.accept.query
>> (0) sql: Using query template 'query'
>> rlm_sql (sql): Reserved connection (1)
>> (0) sql: EXPAND %{User-Name}
>> (0) sql:    --> 40a8f0a9e051
>> (0) sql: SQL-User-Name set to '40a8f0a9e051'
>> (0) sql: EXPAND INSERT INTO radius_audit_log               ( mac, ip,
>> computer_name, user_name,                stripped_user_name,  realm,
>> event_type,                switch_id, switch_mac,
>> switch_ip_address,                radius_source_ip_address,
>> called_station_id, calling_station_id,                nas_port_type,
>> ssid, nas_port_id,                ifindex, nas_port,
>> connection_type,                nas_ip_address, nas_identifier,
>> auth_status,                reason, auth_type, eap_type,
>> role, node_status, profile,                source, auto_reg,
>> is_phone,                pf_domain, uuid, radius_request,
>> radius_reply, request_time)              VALUES               (
>> '%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}',
>> '%{%{control:PacketFence-Computer-Name}:-N/A}',
>> '%{request:User-Name}',                '%{request:Stripped-User-Name}',
>> '%{request:Realm}', 'Radius-Access-Request',
>> '%{%{control:PacketFence-Switch-Id}:-N/A}',
>> '%{%{control:PacketFence-Switch-Mac}:-N/A}',
>> '%{%{control:PacketFence-Switch-Ip-Address}:-N/A}',
>> '%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}',
>> '%{request:Calling-Station-Id}',
>> '%{request:NAS-Port-Type}', '%{request:Called-Station-SSID}',
>> '%{request:NAS-Port-Id}',                
>> '%{%{control:PacketFence-IfIndex}:-N/A}',
>> '%{request:NAS-Port}', '%{%{control:PacketFence-Conne
>> ction-Type}:-N/A}',                '%{request:NAS-IP-Address}',
>> '%{request:NAS-Identifier}', 'Accept',
>> '%{request:Module-Failure-Message}', '%{control:Auth-Type}',
>> '%{request:EAP-Type}',                '%{%{control:PacketFence-Role}:-N/A}',
>> '%{%{control:PacketFence-Status}:-N/A}', 
>> '%{%{control:PacketFence-Profile}:-N/A}',
>> '%{%{control:PacketFence-Source}:-N/A}', 
>> '%{%{control:PacketFence-AutoReg}:-N/A}',
>> '%{%{control:PacketFence-IsPhone}:-N/A}',
>> '%{request:PacketFence-Domain}', '', 
>> '%{pairs:&request:[*]}','%{pairs:&reply:[*]}',
>> '%{control:PacketFence-Request-Time}')
>> (0) sql:    --> INSERT INTO radius_audit_log               ( mac, ip,
>> computer_name, user_name,                stripped_user_name,  realm,
>> event_type,                switch_id, switch_mac,
>> switch_ip_address,                radius_source_ip_address,
>> called_station_id, calling_station_id,                nas_port_type,
>> ssid, nas_port_id,                ifindex, nas_port,
>> connection_type,                nas_ip_address, nas_identifier,
>> auth_status,                reason, auth_type, eap_type,
>> role, node_status, profile,                source, auto_reg,
>> is_phone,                pf_domain, uuid, radius_request,
>> radius_reply, request_time)              VALUES               (
>> '40:a8:f0:a9:e0:51', '', 'RXHD03099', '40a8f0a9e051',
>> '40a8f0a9e051', 'null', 'Radius-Access-Request',
>> '10.216.0.167', '30:37:a6:7e:82:82', '10.216.0.167',
>> '10.216.0.167', '30:37:a6:7e:82:82', '40:a8:f0:a9:e0:51',
>> 'Ethernet', '', 'FastEthernet0/2',                '10002', '50002',
>> 'WIRED_MAC_AUTH',                '10.216.0.167', '',
>> 'Accept',                '', 'Accept', '',                'registration',
>> 'unreg', 'N/A',                'N/A', '0', 'N/A',                '', '',
>> 'User-Name =3D =2240a8f0a9e051=22=2C User-Password =3D
>> =2240a8f0a9e051=22=2C NAS-IP-Address =3D 10.216.0.167=2C NAS-Port =3D
>> 50002=2C Service-Type =3D Call-Check=2C Framed-MTU =3D 1500=2C
>> Called-Station-Id =3D =2230:37:a6:7e:82:82=22=2C Calling-Station-Id =3D
>> =2240:a8:f0:a9:e0:51=22=2C NAS-Port-Type =3D Ethernet=2C Event-Timestamp
>> =3D =22Feb  1 2017 17:56:39 GMT=22=2C Message-Authenticator =3D
>> 0x2f390957e15d061946d59dd43a49016c=2C NAS-Port-Id =3D
>> =22FastEthernet0/2=22=2C Cisco-AVPair =3D =22service-type=3DCall
>> Check=22=2C Cisco-AVPair =3D 
>> =22audit-session-id=3D0AD800A700000023000A2070=22=2C
>> Stripped-User-Name =3D =2240a8f0a9e051=22=2C Realm =3D =22null=22=2C
>> FreeRADIUS-Client-IP-Address =3D 10.216.0.167=2C SQL-User-Name =3D
>> =2240a8f0a9e051=22','Tunnel-Type =3D VLAN=2C Tunnel-Private-Group-Id =3D
>> =22820=22=2C Filter-Id =3D =22registration.in=22=2C Tunnel-Medium-Type
>> =3D IEEE-802=2C PacketFence-Authorization-Status =3D =22allow=22', '0')
>> (0) sql: Executing query: INSERT INTO radius_audit_log               (
>> mac, ip, computer_name, user_name,                stripped_user_name,
>> realm, event_type,                switch_id, switch_mac,
>> switch_ip_address,                radius_source_ip_address,
>> called_station_id, calling_station_id,                nas_port_type,
>> ssid, nas_port_id,                ifindex, nas_port,
>> connection_type,                nas_ip_address, nas_identifier,
>> auth_status,                reason, auth_type, eap_type,
>> role, node_status, profile,                source, auto_reg,
>> is_phone,                pf_domain, uuid, radius_request,
>> radius_reply, request_time)              VALUES               (
>> '40:a8:f0:a9:e0:51', '', 'RXHD03099', '40a8f0a9e051',
>> '40a8f0a9e051', 'null', 'Radius-Access-Request',
>> '10.216.0.167', '30:37:a6:7e:82:82', '10.216.0.167',
>> '10.216.0.167', '30:37:a6:7e:82:82', '40:a8:f0:a9:e0:51',
>> 'Ethernet', '', 'FastEthernet0/2',                '10002', '50002',
>> 'WIRED_MAC_AUTH',                '10.216.0.167', '',
>> 'Accept',                '', 'Accept', '',                'registration',
>> 'unreg', 'N/A',                'N/A', '0', 'N/A',                '', '',
>> 'User-Name =3D =2240a8f0a9e051=22=2C User-Password =3D
>> =2240a8f0a9e051=22=2C NAS-IP-Address =3D 10.216.0.167=2C NAS-Port =3D
>> 50002=2C Service-Type =3D Call-Check=2C Framed-MTU =3D 1500=2C
>> Called-Station-Id =3D =2230:37:a6:7e:82:82=22=2C Calling-Station-Id =3D
>> =2240:a8:f0:a9:e0:51=22=2C NAS-Port-Type =3D Ethernet=2C Event-Timestamp
>> =3D =22Feb  1 2017 17:56:39 GMT=22=2C Message-Authenticator =3D
>> 0x2f390957e15d061946d59dd43a49016c=2C NAS-Port-Id =3D
>> =22FastEthernet0/2=22=2C Cisco-AVPair =3D =22service-type=3DCall
>> Check=22=2C Cisco-AVPair =3D 
>> =22audit-session-id=3D0AD800A700000023000A2070=22=2C
>> Stripped-User-Name =3D =2240a8f0a9e051=22=2C Realm =3D =22null=22=2C
>> FreeRADIUS-Client-IP-Address =3D 10.216.0.167=2C SQL-User-Name =3D
>> =2240a8f0a9e051=22','Tunnel-Type =3D VLAN=2C Tunnel-Private-Group-Id =3D
>> =22820=22=2C Filter-Id =3D =22registration.in=22=2C Tunnel-Medium-Type
>> =3D IEEE-802=2C PacketFence-Authorization-Status =3D =22allow=22', '0')
>> (0) sql: SQL query returned: success
>> (0) sql: 1 record(s) updated
>> rlm_sql (sql): Released connection (1)
>> rlm_sql (sql): Need 4 more connections to reach 10 spares
>> rlm_sql (sql): Opening additional connection (6), 1 of 58 pending slots
>> used
>> rlm_sql_mysql: Starting connect to MySQL server
>> rlm_sql_mysql: Connected to database 'pf' on Localhost via UNIX socket,
>> server version 5.5.52-MariaDB, protocol version 10
>> (0)             [sql] = ok
>> (0)           } # if (&User-Name != "dummy")  = ok
>> (0)         } # policy packetfence-audit-log-accept = ok
>> (0)       } # else = ok
>> (0)     } # if (! EAP-Type || (EAP-Type != TTLS  && EAP-Type != PEAP) )
>> = updated
>> (0) attr_filter.packetfence_post_auth: EXPAND %{User-Name}
>> (0) attr_filter.packetfence_post_auth:    --> 40a8f0a9e051
>> (0) attr_filter.packetfence_post_auth: Matched entry DEFAULT at line 10
>> (0)     [attr_filter.packetfence_post_auth] = updated
>> (0) linelog: EXPAND messages.%{%{reply:Packet-Type}:-default}
>> (0) linelog:    --> messages.Access-Accept
>> (0) linelog: EXPAND %t : [mac:%{Calling-Station-Id}] Accepted user:
>> %{reply:User-Name} and returned VLAN %{reply:Tunnel-Private-Group-ID}
>> (0) linelog:    --> Wed Feb  1 17:56:39 2017 : [mac:40:a8:f0:a9:e0:51]
>> Accepted user:  and returned VLAN 820
>> (0) linelog: EXPAND /usr/local/pf/logs/radius.log
>> (0) linelog:    --> /usr/local/pf/logs/radius.log
>> (0)     [linelog] = ok
>> (0)   } # post-auth = updated
>> (0) Login OK: [40a8f0a9e051] (from client 10.216.0.167 port 50002 cli
>> 40:a8:f0:a9:e0:51)
>> (0) Sent Access-Accept Id 35 from 10.216.9.72:1812 to 10.216.0.167:1645
>> length 0
>> (0)   Tunnel-Type = VLAN
>> (0)   Tunnel-Private-Group-Id = "820"
>> (0)   Filter-Id = "registration.in"
>> (0)   Tunnel-Medium-Type = IEEE-802
>> (0)   PacketFence-Authorization-Status = "allow"
>> (0) Finished request
>> Waking up in 4.9 seconds.
>>
>> ***This continues to loop as above
>>
>>
>>
>>
>>
>>
>>
>> ------------------------------------------------------------------------------
>> Check out the vibrant tech community on one of the world's most
>> engaging tech sites, SlashDot.org! http://sdm.link/slashdot
>>
>> _______________________________________________
>> PacketFence-users mailing 
>> [email protected]https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>
>> --
>> Fabrice [email protected] ::  +1.514.447.4918 <%28514%29%20447-4918> 
>> (x135) ::  www.inverse.ca
>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
>> (http://packetfence.org)
>>
>> ------------------------------------------------------------------------------
>> Check out the vibrant tech community on one of the world's most engaging
>> tech sites, SlashDot.org! http://sdm.link/slashdot
>> _______________________________________________ PacketFence-users
>> mailing list [email protected]
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
> ------------------------------------------------------------------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, SlashDot.org! http://sdm.link/slashdot
>
> _______________________________________________
> PacketFence-users mailing 
> [email protected]https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
> --
> Fabrice [email protected] ::  +1.514.447.4918 <(514)%20447-4918> 
> (x135) ::  www.inverse.ca
> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
> (http://packetfence.org)
>
>
> ------------------------------------------------------------
> ------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, SlashDot.org! http://sdm.link/slashdot
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
>
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to