Hello Cory,
you don't have to define the URL on the WLC, this is set by the radius
attribute.
Just follow the doc and don't forget to set NAC state to Radius NAC.
Regards
Fabrice
Le 2017-02-03 à 14:45, Cory White a écrit :
Thank You Fabrice -
I attempted the changes and wired has same behavior - I'll play with
some options there.
The wireless WebAuth same behavior but after tailing I see what
appears to be a loop - I see as I try to connect I get the below, then
after log stops I get unable to connect on the device (iOS).
Feb 03 14:36:07 httpd.aaa(1702) INFO: [mac:bc:9f:ef:56:b0:fc] Memory
configuration is not valid anymore for key config::Switch in local
cached_hash (pfconfig::cached::is_valid)
Feb 03 14:36:07 httpd.aaa(1702) INFO: [mac:bc:9f:ef:56:b0:fc] handling
radius autz request: from switch_ip => (10.218.0.2), connection_type
=> Wireless-802.11-NoEAP,switch_mac => (a4:18:75:42:af:20), mac =>
[bc:9f:ef:56:b0:fc], port => 1, username => "bc9fef56b0fc", ssid =>
PF90 (pf::radius::authorize)
Feb 03 14:36:07 httpd.aaa(1702) INFO: [mac:bc:9f:ef:56:b0:fc]
Instantiate profile default (pf::Portal::ProfileFactory::_from_profile)
Feb 03 14:36:07 httpd.aaa(1702) INFO: [mac:bc:9f:ef:56:b0:fc] is of
status unreg; belongs into registration VLAN
(pf::role::getRegistrationRole)
Feb 03 14:36:07 httpd.aaa(1702) INFO: [mac:bc:9f:ef:56:b0:fc]
(10.218.0.2) Added role Pre_Auth to the returned RADIUS Access-Accept
(pf::Switch::returnRadiusAccessAccept)
Feb 03 14:36:07 httpd.aaa(1702) INFO: [mac:bc:9f:ef:56:b0:fc] Adding
web authentication redirection to reply using role: 'Pre_Auth' and
URL: 'http://10.218.100.100/Cisco::WLC/sid44a116'
(pf::Switch::Cisco::WLC::returnRadiusAccessAccept)
Feb 03 14:36:07 httpd.aaa(1702) INFO: [mac:bc:9f:ef:56:b0:fc] handling
radius autz request: from switch_ip => (10.218.0.2), connection_type
=> Wireless-802.11-NoEAP,switch_mac => (a4:18:75:42:af:20), mac =>
[bc:9f:ef:56:b0:fc], port => 1, username => "bc9fef56b0fc", ssid =>
PF90 (pf::radius::authorize)
Feb 03 14:36:07 httpd.aaa(1702) INFO: [mac:bc:9f:ef:56:b0:fc]
Instantiate profile default (pf::Portal::ProfileFactory::_from_profile)
Feb 03 14:36:07 httpd.aaa(1702) INFO: [mac:bc:9f:ef:56:b0:fc] is of
status unreg; belongs into registration VLAN
(pf::role::getRegistrationRole)
Feb 03 14:36:07 httpd.aaa(1702) INFO: [mac:bc:9f:ef:56:b0:fc]
(10.218.0.2) Added role Pre_Auth to the returned RADIUS Access-Accept
(pf::Switch::returnRadiusAccessAccept)
Feb 03 14:36:07 httpd.aaa(1702) INFO: [mac:bc:9f:ef:56:b0:fc] Adding
web authentication redirection to reply using role: 'Pre_Auth' and
URL: 'http://10.218.100.100/Cisco::WLC/sid720a4e'
(pf::Switch::Cisco::WLC::returnRadiusAccessAccept)
Also I'm assuming the actual WLC Security-> WebAuth -> redirect needs
to be set to external with the same URL
"http://10.218.100.100/Cisco::WLC" since its not in the documentation.
I've tested the Pre-Auth locally on internal portal and works as
expected so its interaction between the 2 that I'm missing?
Cory White
Xponet
P: 904.735.1600
E: [email protected] <mailto:[email protected]>
On Fri, Feb 3, 2017 at 8:39 AM, Fabrice Durand <[email protected]
<mailto:[email protected]>> wrote:
Hello Cory,
Le 2017-02-02 à 22:39, Cory White a écrit :
Small update - exported ZEN package into our VM environment -
have Out-fo-Band working on a test 2960G. Get reg, redirect then
see Radius config switch port and access - GREAT!.
questions
1. I noticed if client device is on a configured port not on REG
(Vl2) by default. The Radius configures back to Vl2 but it takes
a release renew on the client device to get the PF VL2 IP from pf
and start the auth process - is this by design?
Maybe you can try "authentication open" on the switch port config.
Also do you know that you can do exactly the same thing (web auth)
on the wire side too !
2. I am having trouble with WebAuth portion on wireless side - I
can see log in packetfence.log without actually ever getting
connected to the SSID?
Feb 02 22:19:47 httpd.aaa(1702) INFO: [mac:bc:9f:ef:56:b0:fc]
handling radius autz request: from switch_ip => (10.218.0.2),
connection_type => Wireless-802.11-NoEAP,switch_mac =>
(a4:18:75:42:af:20), mac => [bc:9f:ef:56:b0:fc], port => 1,
username => "bc9fef56b0fc", ssid => PF90 (pf::radius::authorize)
Feb 02 22:19:47 httpd.aaa(1702) INFO: [mac:bc:9f:ef:56:b0:fc]
Instantiate profile default
(pf::Portal::ProfileFactory::_from_profile)
Feb 02 22:19:47 httpd.aaa(1702) INFO: [mac:bc:9f:ef:56:b0:fc] is
of status unreg; belongs into registration VLAN
(pf::role::getRegistrationRole)
Feb 02 22:19:47 httpd.aaa(1702) INFO: [mac:bc:9f:ef:56:b0:fc]
(10.218.0.2) Added role Pre_Auth to the returned RADIUS
Access-Accept (pf::Switch::returnRadiusAccessAccept)
Feb 02 22:19:47 httpd.aaa(1702) INFO: [mac:bc:9f:ef:56:b0:fc]
Adding web authentication redirection to reply using role:
'Pre_Auth' and URL: 'http://10.218.100.100/sid93100c
<http://10.218.100.100/sid93100c>'
(pf::Switch::Cisco::WLC::returnRadiusAccessAccept)
Change the registration url to that :
registrationUrl=http://10.218.100.100/Cisco::WLC
<http://10.218.100.100/Cisco::WLC>
The log stops and I get the unable to connect dialog on my device
(never actual associate to SSID) - no logs are leading me
anywhere else unless I'm looking at the wrong ones. I used
WEbAuth Device Config Guide to no avail and am a bit stuck. My
switches.conf is below as well - 10.218.0.2 is WLC,
10.218.100.100 - pf admin gui
[10.218.0.2]
mode=production
SNMPCommunityRead=harley
SNMPCommunityWrite=harleyrw
defaultVlan=10
deauthMethod=RADIUS
description=WLC
type=Cisco::WLC_5500
radiusSecret=packetfence
SNMPVersion=2c
ExternalPortalEnforcement=Y
defaultRole=Authorized
registrationRole=Pre_Auth
registrationUrl=http://10.218.100.100/ <http://10.218.100.100/>
controllerIp=10.218.0.2
UrlMap=Y
VlanMap=N
controllerPort=3799
[10.218.100.4]
mode=production
SNMPCommunityRead=harley
description=100.4
cliAccess=Y
SNMPCommunityWrite=harley
defaultVlan=10
deauthMethod=RADIUS
type=Cisco::Catalyst_2960G
radiusSecret=packetfence
SNMPVersion=2c
controllerPort=3799
RoleMap=N
~
Cory White
Xponet
P: 904.735.1600 <tel:%28904%29%20735-1600>
E: [email protected] <mailto:[email protected]>
On Wed, Feb 1, 2017 at 10:10 AM, Cory White <[email protected]
<mailto:[email protected]>> wrote:
Hello All -
Been awhile since I posted for version 4 testing and inline
deployment. We did deploy PF sparingly in production
environment but have yet to go 'all-in' as a permanent
replacement. Roughly couple hundred users - we're looking for
multiple thousands to test now.
Its been sometime and I'm revisiting PF with 6.4 release - I
am having some sticking points where I see communication
between our WLC and PF, can associate to SSID and see
Pre-Auth ACL applied but never get presented with a portal -
"Unable to contact server under iOS". Preview of default does
not display and shows a 'too many redirects error'.
We're testing with dual NIC as eth0 is management interface
and eth1 being portal/vlan specific to SSID - is this
possible or do I need to use one trunked eth0 and add VLAN
identifiers/deamon assignments accordingly?
We're running Cisco 5520 server WLC on latest 8.3 code so
there are some differences from documentation examples but
straight forward. We 'think' WebAuth is the way we want to
test/deploy leaving essentially the WLC do all the work on
our backbone, leaving PF just portal for to assign Auth ACLs.
Is this possible over multiple NICs and VLANs? Or is this a
more inline thought process where management, portal and
SSID/VLAN need to reside on one LAN to accomplish?
Basically if we want to scale past one network for captive
portal (multiple guest VLANs) do we need to go with O-o-B
VLAN enforcement and still use WLC/server backbone for
everything else ILO WebAuth?
Cory White
Xponet
P: 904.735.1600 <tel:%28904%29%20735-1600>
E: [email protected] <mailto:[email protected]>
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org!http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
[email protected]
<mailto:[email protected]>
https://lists.sourceforge.net/lists/listinfo/packetfence-users
<https://lists.sourceforge.net/lists/listinfo/packetfence-users>
RegardsFabrice
--
Fabrice Durand
[email protected] <mailto:[email protected]> ::+1.514.447.4918
<tel:%28514%29%20447-4918> (x135) ::www.inverse.ca <http://www.inverse.ca>
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence
(http://packetfence.org)
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________ PacketFence-users
mailing list [email protected]
<mailto:[email protected]>
https://lists.sourceforge.net/lists/listinfo/packetfence-users
<https://lists.sourceforge.net/lists/listinfo/packetfence-users>
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users