Hi, Have you tried adding RADIUS as an additional daemon listening on the management interface?
Regards, Murilo Em ter, 19 de fev de 2019 04:11, Tony W via PacketFence-users < packetfence-users@lists.sourceforge.net> escreveu: > Hi Fabrice, > > Thank you for your help so far. > > My interface naming is all good, however, I am still having a small > issue understanding correctly. > > You indicate that I should make the management interface the one with > Internet access. > The management interface is also used to talk to my Ruckus controller. > > According to the documentation, I can only have 1 management interface. > > Example of what I am trying to do: > > Ruckus 802.1x Auth eth0 <--> PF eth1 - No Internet access > Registration (VLAN 10) eth0.10 --> PF eth1 - No Internet access > User inline (VLAN 11) eth0.11 --> PF eth1 - Internet Access > User inline (VLAN12) eth0.12 --> PF eth1 - Internet Access > User inline (VLAN13) eth0.13 --> PF eth1 - Internet Access > --- > eth1 = - Management - Public IP address > > The Ruckus controller will do the 802.1x auth and radius in PF will > give the correct VLAN to Ruckus on successful auth and the visitor > will end up in the assigned VLAN. > > I can not get my head around getting the Ruckus controller to talk to > the management interface when that is assigned to eth1. > Something is missing in my understanding. I guess I am thinking > traditional NAT/Firewall with 2 interfaces. > I prefer management VLAN to be un-tagged and on eth0, not on eth1. > Internet access should be on eth1. > I have 2 more interfaces so I could let the Ruckus (And other > equipment) use one of those (eth2 and eth3) > > Sorry to be asking this again.... > > Tony > > > On Tue, 19 Feb 2019 at 01:20, Fabrice Durand via PacketFence-users > <packetfence-users@lists.sourceforge.net> wrote: > > > > Hello Tony, > > > > Le 19-02-17 à 23 h 22, Tony W via PacketFence-users a écrit : > > > Hi Fabrice, > > > > > > Thank you for that. > > > > > > So for PF, set 1 external interface (WAN) with Internet access (Inline) > > No a management one with internet access > > > Then set at least 1 internal interface (LAN) with VLAN's, say 10 for > SSID, > > > 11, 12, 13, 14....for the users to be allocated to once authenticated. > > 11,12,13,14 as inline > > > > > > I do not need (Or want) Internet access on VLAN 10, only DHCP for the > > > client devices. > > So 10 is a registration interface. > > > When the client device successfully authenticates, the client traffic > > > will go to the > > > selected/allocated VLAN (11, 12, 13 or ....) and be given new IP > > > addresses by DHCP. > > It's what an inline interface do. > > > It is no big deal regarding people being on the initial VLAN 10 as not > > > many will be there at any one time. > > The registration interface on the vlan 10 will have short lease time, by > > default we set it to 30s. > > > > > > Just a quick question specific to CentOS 7.6 and PF. > > > > > > CentOS 7.x issues interface names like em1, em2, p2p1, p2p2 etc., > > > instead of the old style eth0, eth1... > > > > > > Will PF still work OK, if I change this to the old style (See link > below)? > > > > > > > https://sites.google.com/site/syscookbook/rhel/rhel-network-interface-rename-rhel7 > > Yes it will work. > > > > > > I feel more comfortable using the old interface naming convention and > > > the above procedure works well:-) > > > > > Regards > > > > Fabrice > > > > > > > > > > > > > > > > > > > > > > On Mon, 18 Feb 2019 at 12:09, Durand fabrice via PacketFence-users > > > <packetfence-users@lists.sourceforge.net> wrote: > > >> Hello Tony, > > >> > > >> you can set the vlan as inline in PacketFence. > > >> > > >> What i would do in this case is the following: > > >> > > >> - Create on pf all the VLAN's an inline interface, per example > eth1.10, > > >> eth1.11, eth1.12 .... (the vlan's you return when authenticated) > > >> > > >> - Set these vlan's id on the switch config (PacketFence side). > > >> > > >> That's it. > > >> > > >> The only issue you will have is when you unreg a device then it will > > >> stay on the inline vlan but hit the portal on the inline interface. > > >> > > >> If the device reconnect then it will go on the reg vlan. > > >> > > >> Regards > > >> > > >> Fabrice > > >> > > >> > > >> > > >> Le 19-02-17 à 19 h 35, Tony W via PacketFence-users a écrit : > > >>> Hi there, > > >>> > > >>> Trying to work out how to get PF to work as NAT/Firewall to the > > >>> internet whilst doing Radius and VLAN enforcement. > > >>> > > >>> Is this possible? Reading the documentation, it appears that the > > >>> current version will work in hybrid mode > > >>> (A combination of both) but seems to be for "flat" networks on > > >>> switches that can not be managed. > > >>> > > >>> I run a wireless network controller, where visitors connect to an > SSID > > >>> (Assigned to a specific VLAN). This VLAN has no > > >>> Internet access. > > >>> Authentication is 802.1x. Once authenticated, visitor is directed to > > >>> one of a number of predetermined VLAN's by PF. > > >>> Each of the VLAN's shall have Internet access through the same PF > box. > > >>> PF tells Ruckus to put the visitor in the > > >>> assigned VLAn. DHCP is used on the initial connection and each of the > > >>> VLAN's shall have their own DHCP scope. > > >>> > > >>> I have done this before using FreeRadius with DaloRadius and a Ruckus > > >>> controller, configured manually on CentOS 7.3 > > >>> with Firewall/NAT. That solution is lacking some of the nice extra > > >>> stuff integrated in PF. > > >>> > > >>> Whilst not expecting someone to give me the whole solution, I am > > >>> looking for some pointers and confirmation that > > >>> PF is suitable for what I want to do. > > >>> > > >>> Thanks in advance > > >>> > > >>> Tony > > >>> > > >>> > > >>> _______________________________________________ > > >>> PacketFence-users mailing list > > >>> PacketFence-users@lists.sourceforge.net > > >>> https://lists.sourceforge.net/lists/listinfo/packetfence-users > > >> > > >> _______________________________________________ > > >> PacketFence-users mailing list > > >> PacketFence-users@lists.sourceforge.net > > >> https://lists.sourceforge.net/lists/listinfo/packetfence-users > > > > > > _______________________________________________ > > > PacketFence-users mailing list > > > PacketFence-users@lists.sourceforge.net > > > https://lists.sourceforge.net/lists/listinfo/packetfence-users > > > > -- > > Fabrice Durand > > fdur...@inverse.ca :: +1.514.447.4918 (x135) :: www.inverse.ca > > Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and > PacketFence (http://packetfence.org) > > > > > > > > _______________________________________________ > > PacketFence-users mailing list > > PacketFence-users@lists.sourceforge.net > > https://lists.sourceforge.net/lists/listinfo/packetfence-users > > > _______________________________________________ > PacketFence-users mailing list > PacketFence-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/packetfence-users >
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users