Yes, it's why we created an Aruba Instant Access module because it has
been reported only on this kind of equipment.
Btw on a Aruba controller i never noticed this issue.
Le 19-05-16 à 21 h 46, Louis Scaringella a écrit :
Thanks! Do you happen to know about the CoA problem with the main Aruba switch
module and the sessid causing an issue?
Thank you,
Louis Scaringella
Security Systems Engineer
Yellow Dog Networks
785-342-7903
On May 16, 2019, at 8:11 PM, Durand fabrice via PacketFence-users
<packetfence-users@lists.sourceforge.net> wrote:
hello Louis,
i fixed the issue with the aruba instant access, just need to run
/usr/local/pf/addons/pf-main.pl , restart packetfence and use the aruba instant
access module.
Regards
Fabrice
Le 19-05-16 à 02 h 30, Louis Scaringella via PacketFence-users a écrit :
Found my answer finally from an old post in the mailing list:
[PacketFence-users] reply:Unable to disconnect a device during initial logon
From: <1136723602@qq...> - 2017-10-15 07:09:14
Attachments: 2dfff...@6737594b.8f09e359.jpg Message as HTML
Hi all,
Since we've solved our problem by ourselves, here I post it in case someone
else meet the same issue.
For question 1, for "Unable to perform RADIUS Disconnect-Request. Disconnect-NAK
received with Error-Cause: Session-Context-Not-Found" issue, as we are sure our
issue was caused by the wrong acct-session-id pf got when sending radius-disconnect
request, we modified the /usr/local/pf/lib/pf/Switch/Aruba.pm, comment out line 491,
exclude the acct-session-id from radius disconnect request when disconnecting a device,
and it works well now.
That was it. The Aruba controller expects no sessid in it’s CoA request so this
was what I had pointed out earlier, but modifying the Perl module for “Aruba
Networks” or Aruba.pm fixes the issue.
Is there anyway this might be fixed in future versions? Also, i’m still
noticing the error in the Aruba Instant module when the CoA is performed. The
module itself errors out according to the Packetfence.log.
Louis Scaringella
Security Systems Engineer
Yellow Dog Networks, Inc
785-342-7903
On May 15, 2019, at 11:55 PM, Louis Scaringella
<lscaringe...@yellowdognetworks.com> wrote:
Here is a document from Aruba explaining the reason or this:
https://community.arubanetworks.com/t5/Controller-Based-WLANs/Possible-reasons-for-controller-sending-a-Disconnect-NAK/ta-p/272242
""Jun 20 17:49:56 :520001: <DBUG> |authmgr| [rc_rfc3576.c:683] IP:0.0.0.0,
Name:d0:25:98:b3:5b:6b sessid=<>, sta_id=d0:25:98:b3:5b:6b, reqcode=40, rspcode=42, nack=1,
error_cause=missing session"
• Further debugging this on the Controller and Server end, it was found the
format in 'calling-station-id' attribute was inccorect.
• 'Calling-sation-id' in the radius packet sent from the Controller was of the format
'd02598b35b6b', wherease 'Calling-station-id' from Server in "Disconnect-Req"
was in format 'd0:25:98:b3:5b:6b’.”
This is exactly what I am seeing and why the CoA is failing. This would need
adjusted in the .pm files I suppose, but I am not well versed in Perl to do
this myself. Anyway we can create a module specifically for Aruba 6.5+ that
would work with Instant and Controllers?
Louis Scaringella
Security Systems Engineer
Yellow Dog Networks, Inc
785-342-7903
On May 15, 2019, at 6:19 PM, Louis Scaringella via PacketFence-users
<packetfence-users@lists.sourceforge.net> wrote:
That makes sense as to why PacketFence wouldn’t be seeing it. I don’t have that
issue in my lab just yet because everything is on one VLAN and subnet so the
actual user request is in the same VLAN as Packetfence so PacketFence sees the
MAC of the user each time it tries to connect.
In a prod environment like yours, I can definitely see this being an issue. I
wonder what Windows 10 is doing when the computer comes back to the network if
the lease is still valid. It should still be sending something to DHCP to make
sure the lease is still valid no? I think only if the machine reboots or is
woken from sleep would this happen, but behavior could vary I suppose.
Louis Scaringella
Security Systems Engineer
Yellow Dog Networks, Inc
785-342-7903
On May 15, 2019, at 11:39 AM, Thomas, Gregory A via PacketFence-users
<packetfence-users@lists.sourceforge.net> wrote:
I have been having this problem all school year.
I have a single server run in a complete inline mode.
The problem for me seems to be Windows 10. When a student takes their computer
off of the packetfence network and then back on. Windows 10 seems to keep the
old IP address. It may be the valid address that it would grab, but since it
did not do a DHCP pull, it is not in the database.
I have been sending out DHCP release/renew instructions and it has not failed
to connect yet. This is only happening with Windows 10, no other OS or devices.
Hope this helps but not add to the confusion.
Gregory A. Thomas
Student Life Support Specialist
University of Wisconsin-Parkside
thom...@uwp.edu
262.595.2432
-----Original Message-----
From: Fabrice Durand via PacketFence-users
<packetfence-users@lists.sourceforge.net>
Sent: Wednesday, May 15, 2019 10:55 AM
To: packetfence-users@lists.sourceforge.net
Cc: Fabrice Durand <fdur...@inverse.ca>
Subject: Re: [PacketFence-users] Captive Portal-Computer not found in database
What you can try, even if it's an aruba controller is to use the Aruba Instant
access module instead(we did it because the CoA changed on this
equipment)
curl
https://patch-diff.githubusercontent.com/raw/inverse-inc/packetfence/pull/4211.diff
| patch -p1
Also is it a Aruba COntroller in cluster ?
Regards
Fabrice
Le 19-05-15 à 11 h 11, Louis Scaringella via PacketFence-users a écrit :
Hi Fabrice,
I ran the /usr/local/pf/addons/pf-maint.pl script and it performed some updates
and I rebooted the Packetfence server.
I can tell you that when I either manually disconnect on the laptop and
reconnect or disconnect my session from the controller and the client connects
again, the role is correct on the controller and I am able to get access. This
would be after the MAC address/device is “registered” already.
So it does appear that something with the CoA process after the AUP is accepted
is the problem. What appears to be happening is that the session on the Aruba
controller that PacketFence is trying to disconnect doesn’t exist. This shows
both in Packetfence and in Aruba debugs. Not sure what’s happening there, but
the MAC address does match and this controller literally only has this one
session on it because it is our lab and testing environment.
CoA should be working fine, the RADIUS key is correct and rfc 3576 is setup on
the controller to use the Packetfence server for the CoA server. I’ll verify
this again, but I don’t think the communication is the problem because of the
“invalid session” type error i’m seeing in the logs and on the Controller. The
CoA is getting to the controller and processed, so something with the session
isn’t right.
Any ideas?
Louis Scaringella
Security Systems Engineer
Yellow Dog Networks, Inc
785-342-7903
On May 14, 2019, at 8:32 PM, Louis Scaringella via PacketFence-users
<packetfence-users@lists.sourceforge.net> wrote:
It’s an actual Controller and not instant. I will check tomorrow and post the
information. COA should be good to go, but I’ll include what I have setup.
Thank so much for helping!
Thank you,
Louis Scaringella
Security Systems Engineer
Yellow Dog Networks
785-342-7903
On May 14, 2019, at 8:17 PM, Durand fabrice via PacketFence-users
<packetfence-users@lists.sourceforge.net> wrote:
Hello Louis,
sorry for the late reply.
As i remember the documentation about the nat source was to do web
authentication and not vlan enforcement.
Just before going to far, can you run /usr/local/pf/addons/pf-maint.pl to have
the latest bug fixes.
So right now the CoA looks that it's not working correctly, did you enable rfc
3574 on the Aruba side with the same shared secret than you set in radius
authentication ?
Last thing if it's an Aruba instant access then you will need to apply this
patch:
cd /usr/local/pf
curl
https://patch-diff.githubusercontent.com/raw/inverse-inc/packetfence
/pull/4211.diff | patch -p1
and restart packetfence and choose "Aruba Instant Access" as the switch model.
Regards
Fabrice
Le 19-05-14 à 12 h 20, Louis Scaringella via PacketFence-users a écrit :
I’m very confused because also seeing this in Packetfence logs. Looks like it
is authenticating then dissociating right away.
May 14 16:17:12 PacketFence-ZEN packetfence_httpd.portal:
httpd.portal(3367) INFO: [mac:00:24:d6:5b:30:bc] User default has
authenticated on the portal. (Class::MOP::Class:::after) May 14
16:17:12 PacketFence-ZEN packetfence_httpd.portal:
httpd.portal(3367) INFO: [mac:00:24:d6:5b:30:bc] No provisioner
found for 00:24:d6:5b:30:bc. Continuing.
(captiveportal::PacketFence::DynamicRouting::Module::Provisioning::
execute_child) May 14 16:17:12 PacketFence-ZEN
packetfence_httpd.portal: httpd.portal(3367) INFO:
[mac:00:24:d6:5b:30:bc] User default has authenticated on the
portal. (Class::MOP::Class:::after) May 14 16:17:12 PacketFence-ZEN
packetfence_httpd.portal: httpd.portal(3367) INFO:
[mac:00:24:d6:5b:30:bc] User default has authenticated on the
portal. (Class::MOP::Class:::after) May 14 16:17:12 PacketFence-ZEN
packetfence_httpd.portal: httpd.portal(3367) INFO:
[mac:00:24:d6:5b:30:bc] User default has authenticated on the
portal. (Class::MOP::Class:::after) May 14 16:17:12 PacketFence-ZEN
packetfence_httpd.portal: httpd.portal(3367) INFO:
[mac:00:24:d6:5b:30:bc] User default has authenticated on the
portal. (Class::MOP::Class:::after) May 14 16:17:12 PacketFence-ZEN
packetfence_httpd.portal: httpd.portal(3367) INFO:
[mac:00:24:d6:5b:30:bc] User default has authenticated on the
portal. (Class::MOP::Class:::after) May 14 16:17:12 PacketFence-ZEN
packetfence_httpd.portal: httpd.portal(3367) INFO:
[mac:00:24:d6:5b:30:bc] User default has authenticated on the
portal. (Class::MOP::Class:::after) May 14 16:17:12 PacketFence-ZEN
packetfence_httpd.portal: httpd.portal(3367) INFO:
[mac:00:24:d6:5b:30:bc] violation 1300003 force-closed for
00:24:d6:5b:30:bc (pf::violation::violation_force_close)
May 14 16:17:12 PacketFence-ZEN packetfence_httpd.portal:
httpd.portal(3367) INFO: [mac:00:24:d6:5b:30:bc] Instantiate
profile Aruba-Guest (pf::Connection::ProfileFactory::_from_profile)
May 14 16:17:12 PacketFence-ZEN packetfence_httpd.portal: httpd.portal(3367)
WARN: [mac:00:24:d6:5b:30:bc] Use of uninitialized value in concatenation (.)
or string at
/usr/local/pf/lib/captiveportal/PacketFence/DynamicRouting/Module/Root.pm line
89.
May 14 16:17:12 PacketFence-ZEN packetfence_httpd.portal:
httpd.portal(3366) WARN: [mac:unknown] locale from the URL is not
supported (pf::Portal::Session::getLanguages)
May 14 16:17:12 PacketFence-ZEN packetfence_httpd.portal:
httpd.portal(3366) WARN: [mac:00:24:d6:5b:30:bc] locale from the
URL is not supported (pf::Portal::Session::getLanguages)
May 14 16:17:12 PacketFence-ZEN packetfence_httpd.portal:
httpd.portal(3366) INFO: [mac:00:24:d6:5b:30:bc] Instantiate
profile Aruba-Guest (pf::Connection::ProfileFactory::_from_profile)
May 14 16:17:12 PacketFence-ZEN packetfence_httpd.portal:
httpd.portal(3366) WARN: [mac:00:24:d6:5b:30:bc] locale from the
URL is not supported
(captiveportal::PacketFence::Controller::Root::getLanguages)
May 14 16:17:12 PacketFence-ZEN packetfence_httpd.portal: httpd.portal(3366)
WARN: [mac:00:24:d6:5b:30:bc] Use of uninitialized value
$pf::web::constants::URL_NETWORK_LOGOFF in string eq at
/usr/local/pf/lib/captiveportal/PacketFence/DynamicRouting/Application.pm line
303.
May 14 16:17:12 PacketFence-ZEN packetfence_httpd.portal:
httpd.portal(3366) INFO: [mac:00:24:d6:5b:30:bc] Replacing
destination URL https://packetfence.lab.ydn.co/?cmd since it points
to the captive portal
(captiveportal::PacketFence::DynamicRouting::Application::process_d
estination_url) May 14 16:17:12 PacketFence-ZEN
packetfence_httpd.portal: httpd.portal(3366) INFO:
[mac:00:24:d6:5b:30:bc] Releasing device
(captiveportal::PacketFence::DynamicRouting::Module::Root::release)
May 14 16:17:12 PacketFence-ZEN packetfence_httpd.portal:
httpd.portal(3366) INFO: [mac:00:24:d6:5b:30:bc] User default has
authenticated on the portal. (Class::MOP::Class:::after) May 14
16:17:12 PacketFence-ZEN packetfence_httpd.portal:
httpd.portal(3366) WARN: [mac:00:24:d6:5b:30:bc] locale from the
URL is not supported (pf::Portal::Session::getLanguages)
May 14 16:17:12 PacketFence-ZEN packetfence_httpd.portal:
httpd.portal(3366) INFO: [mac:00:24:d6:5b:30:bc] re-evaluating
access (manage_register called)
(pf::enforcement::reevaluate_access)
May 14 16:17:12 PacketFence-ZEN packetfence_httpd.portal:
httpd.portal(3366) INFO: [mac:00:24:d6:5b:30:bc] VLAN reassignment
is forced. (pf::enforcement::_should_we_reassign_vlan)
May 14 16:17:12 PacketFence-ZEN packetfence_httpd.portal:
httpd.portal(3366) INFO: [mac:00:24:d6:5b:30:bc] switch port is
(198.18.255.67) ifIndex unknown connection type: WiFi MAC Auth
(pf::enforcement::_vlan_reevaluation)
May 14 16:17:13 PacketFence-ZEN pfqueue: pfqueue(4506) INFO:
[mac:00:24:d6:5b:30:bc] [00:24:d6:5b:30:bc] DesAssociating mac on
switch (198.18.255.67) (pf::api::desAssociate) May 14 16:17:13
PacketFence-ZEN pfqueue: pfqueue(4506) INFO:
[mac:00:24:d6:5b:30:bc] deauthenticating 00:24:d6:5b:30:bc
(pf::Switch::Aruba::radiusDisconnect)
May 14 16:17:13 PacketFence-ZEN pfqueue: pfqueue(4506) INFO:
[mac:00:24:d6:5b:30:bc] controllerIp is set, we will use controller
198.18.255.67 to perform deauth
(pf::Switch::Aruba::radiusDisconnect)
May 14 16:17:13 PacketFence-ZEN pfqueue: pfqueue(4506) INFO:
[mac:00:24:d6:5b:30:bc] [198.18.255.67] Returning ACCEPT with role:
PFence-Guest-PostAuth (pf::Switch::Aruba::try {...} ) May 14
16:17:13 PacketFence-ZEN pfqueue: pfqueue(4506) WARN:
[mac:00:24:d6:5b:30:bc] Unable to perform RADIUS
Disconnect-Request. CoA-NAK received with Error-Cause:
Session-Context-Not-Found. (pf::Switch::Aruba::radiusDisconnect)
May 14 16:18:11 PacketFence-ZEN pfqueue: pfqueue(4539) INFO:
[mac:00:24:d6:5b:30:bc] [00:24:d6:5b:30:bc] DesAssociating mac on
switch (198.18.255.67) (pf::api::desAssociate) May 14 16:18:11
PacketFence-ZEN pfqueue: pfqueue(4539) INFO:
[mac:00:24:d6:5b:30:bc] deauthenticating 00:24:d6:5b:30:bc
(pf::Switch::Aruba::radiusDisconnect)
May 14 16:18:11 PacketFence-ZEN pfqueue: pfqueue(4539) INFO:
[mac:00:24:d6:5b:30:bc] controllerIp is set, we will use controller
198.18.255.67 to perform deauth
(pf::Switch::Aruba::radiusDisconnect)
May 14 16:18:11 PacketFence-ZEN pfqueue: pfqueue(4539) WARN:
[mac:00:24:d6:5b:30:bc] Unable to perform RADIUS
Disconnect-Request. Disconnect-NAK received with Error-Cause:
Session-Context-Not-Found. (pf::Switch::Aruba::radiusDisconnect)
May 14 16:18:18 PacketFence-ZEN pfqueue: pfqueue(4544) INFO:
[mac:00:24:d6:5b:30:bc] [00:24:d6:5b:30:bc] DesAssociating mac on
switch (198.18.255.67) (pf::api::desAssociate) May 14 16:18:18
PacketFence-ZEN pfqueue: pfqueue(4544) INFO:
[mac:00:24:d6:5b:30:bc] deauthenticating 00:24:d6:5b:30:bc
(pf::Switch::Aruba::radiusDisconnect)
May 14 16:18:18 PacketFence-ZEN pfqueue: pfqueue(4544) INFO:
[mac:00:24:d6:5b:30:bc] controllerIp is set, we will use controller
198.18.255.67 to perform deauth
(pf::Switch::Aruba::radiusDisconnect)
May 14 16:18:18 PacketFence-ZEN pfqueue: pfqueue(4544) WARN:
[mac:00:24:d6:5b:30:bc] Unable to perform RADIUS
Disconnect-Request. Disconnect-NAK received with Error-Cause:
Session-Context-Not-Found. (pf::Switch::Aruba::radiusDisconnect)
May 14 16:18:47 PacketFence-ZEN pfipset[2353]:
t=2019-05-14T16:18:47+0000 lvl=info msg="No Inline Network bypass
ipsets reload" pid=2353
Louis Scaringella
Security Systems Engineer
Yellow Dog Networks, Inc
785-342-7903
On May 14, 2019, at 11:06 AM, Louis Scaringella
<lscaringe...@yellowdognetworks.com> wrote:
Captive portal AUP page is now displayed, I hit accept, and it says “You
network access is currently being enabled…..”, however the new role isn’t sent
to the controller.
But getting this error now:
[root@PacketFence-ZEN DynamicRouting]# cat
/usr/local/pf/logs/httpd.portal.error
May 14 15:40:36 PacketFence-ZEN httpd_portal_err: Use of uninitialized value
$pf::web::constants::URL_NETWORK_LOGOFF in string eq at
/usr/local/pf/lib/captiveportal/PacketFence/DynamicRouting/Application.pm line
303.
May 14 15:40:37 PacketFence-ZEN httpd_portal_err: Use of uninitialized value
$pf::web::constants::URL_NETWORK_LOGOFF in string eq at
/usr/local/pf/lib/captiveportal/PacketFence/DynamicRouting/Application.pm line
303.
May 14 15:40:37 PacketFence-ZEN httpd_portal_err: Use of uninitialized value in
concatenation (.) or string at
/usr/local/pf/lib/captiveportal/PacketFence/DynamicRouting/Module/Root.pm line
89.
May 14 15:40:37 PacketFence-ZEN httpd_portal_err: Use of uninitialized value
$pf::web::constants::URL_NETWORK_LOGOFF in string eq at
/usr/local/pf/lib/captiveportal/PacketFence/DynamicRouting/Application.pm line
303.
May 14 15:47:50 PacketFence-ZEN httpd_portal_err: [Tue May 14
15:47:50.715478 2019] [mpm_prefork:emerg] [pid 1105]
(4)Interrupted system call: AH00144: couldn't grab the accept
mutex May 14 15:47:50 PacketFence-ZEN httpd_portal_err: [Tue May 14
15:47:50.715607 2019] [mpm_prefork:notice] [pid 2613] AH00170: caught SIGWINCH,
shutting down gracefully May 14 15:47:50 PacketFence-ZEN httpd_portal_err: [Tue
May 14 15:47:50.716441 2019] [mpm_prefork:emerg] [pid 32293] (4)Interrupted
system call: AH00144: couldn't grab the accept mutex May 14 15:47:51
PacketFence-ZEN httpd_portal_err: [Tue May 14 15:47:51.715809 2019]
[core:alert] [pid 2613] AH00050: Child 1105 returned a Fatal error... Apache is
exiting!
May 14 15:49:32 PacketFence-ZEN httpd_portal_err: AH00558: httpd:
Could not reliably determine the server's fully qualified domain
name, using fe80::20c:29ff:fec8:a1a8. Set the 'ServerName' directive globally
to suppress this message May 14 15:49:33 PacketFence-ZEN httpd_portal_err: [Tue
May 14 15:49:33.024951 2019] [mpm_prefork:notice] [pid 2623] AH00163:
Apache/2.4.6 (CentOS) mod_apreq2-20090110/2.8.0 mod_perl/2.0.9 Perl/v5.16.3
configured -- resuming normal operations May 14 15:49:33 PacketFence-ZEN
httpd_portal_err: [Tue May 14 15:49:33.025023 2019] [core:notice] [pid 2623]
AH00094: Command line: '/usr/sbin/httpd -f
/usr/local/pf/var/conf/httpd.conf.d/httpd.portal -D FOREGROUND -D rhel'
May 14 15:50:48 PacketFence-ZEN httpd_portal_err: Use of uninitialized value
$pf::web::constants::URL_NETWORK_LOGOFF in string eq at
/usr/local/pf/lib/captiveportal/PacketFence/DynamicRouting/Application.pm line
303.
May 14 15:50:50 PacketFence-ZEN httpd_portal_err: Use of uninitialized value
$pf::web::constants::URL_NETWORK_LOGOFF in string eq at
/usr/local/pf/lib/captiveportal/PacketFence/DynamicRouting/Application.pm line
303.
May 14 15:56:43 PacketFence-ZEN httpd_portal_err: Use of uninitialized value
$pf::web::constants::URL_NETWORK_LOGOFF in string eq at
/usr/local/pf/lib/captiveportal/PacketFence/DynamicRouting/Application.pm line
303.
Any ideas?
Louis Scaringella
Security Systems Engineer
Yellow Dog Networks, Inc
785-342-7903
On May 13, 2019, at 10:04 PM, Louis Scaringella
<lscaringe...@yellowdognetworks.com> wrote:
New information,
I realized that based on the documentation and/or network devices guide, it
said to configure source NAT on the controller for when destined to Packetfence
using 443 and that is why I am seeing the controller IP only. Makes sense that
the controller’s MAC address wasn’t seen as a “node” in the database.
After disabling source NAT, I now see the default AUP page showing up. Not sure
why this (source NAT) was a configuration step in the guide, but I haven’t had
to do this with Clearpass before with the controller. Maybe behavior has
changed since the documentation was compiled.
More testing to follow.
Louis Scaringella
On May 13, 2019, at 9:49 PM, Louis Scaringella
<lscaringe...@yellowdognetworks.com> wrote:
Hello,
I’m relatively new to PacketFence, but not NAC in general. I’m having some
difficulty getting PacketFence to work in my lab environment with the Captive
Portal correctly.
I have a single interface that i’ve setup for management, RADIUS, and the
portal. I have an Aruba wireless controller that works well with Aruba
Clearpass in the same manner so this config is very well tested already
although I understand there may be differences.
In my lab, the laptop I am testing with and the wireless controller are in the
same VLAN and subnet which is 198.18.255.0/24. So DHCP relays shouldn’t really
play a part here because PacketFence should be seeing the exact MAC address in
requests or in the DHCP messages themselves since its the same VLAN.
----------------
**So, what happens is when I connect, I do get redirected to the portal but see
the below message:
An error occured
Your computer was not found in the PacketFence database. Please reboot to solve
this issue.
If you have questions about this page, contact your local support staff for
assistance. Please provide the following information:
IP 198.18.255.67
MAC 0
IP 198.18.255.67 is my Aruba wireless controller. In the logs, it sees the MAC
address just fine of this. I’m wondering if this is normal or should I see the
endpoint IP here which is 198.18.255.113 in this case. Lots of other posts show
this being a DHCP relay/iP helper problem with PacketFence not seeing this
information, but this is all one flat VLAN so it should.
Any ideas here? I can provide any additional information you’d like. I greatly
appreciate any assistance.
Here is the snippet from a log entry in packetfence.log
May 14 02:36:54 PacketFence-ZEN pfqueue: pfqueue(3748) INFO:
[mac:00:24:d6:5b:30:bc] controllerIp is set, we will use
controller 198.18.255.67 to perform deauth
(pf::Switch::Aruba::radiusDisconnect)
May 14 02:36:54 PacketFence-ZEN pfqueue: pfqueue(3748) WARN:
[mac:00:24:d6:5b:30:bc] Unable to perform RADIUS
Disconnect-Request. Disconnect-NAK received with Error-Cause:
Session-Context-Not-Found. (pf::Switch::Aruba::radiusDisconnect)
May 14 02:37:11 PacketFence-ZEN packetfence_httpd.aaa:
httpd.aaa(2573) INFO: [mac:00:24:d6:5b:30:bc] handling radius
autz request: from switch_ip => (198.18.255.67), connection_type
=> Wireless-802.11-NoEAP,switch_mac => (00:0b:86:de:65:00), mac
=> [00:24:d6:5b:30:bc], port => 0, username =>
"00-24-d6-5b-30-bc", ssid => PacketFence-Guest
(pf::radius::authorize) May 14 02:37:11 PacketFence-ZEN pfqueue:
pfqueue(2970) WARN: [mac:00:24:d6:5b:30:bc] Unable to match MAC
address to IP '198.18.250.10' (pf::ip4log::ip2mac) May 14
02:37:11 PacketFence-ZEN pfqueue: pfqueue(2970) INFO:
[mac:00:24:d6:5b:30:bc] oldip (198.18.200.11) and newip
(198.18.250.10) are different for 00:24:d6:5b:30:bc - closing
ip4log entry (pf::api::update_ip4log) May 14 02:37:11
PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2573) INFO:
[mac:00:24:d6:5b:30:bc] Instantiate profile Aruba-Guest
(pf::Connection::ProfileFactory::_from_profile)
May 14 02:37:11 PacketFence-ZEN packetfence_httpd.aaa:
httpd.aaa(2573) INFO: [mac:00:24:d6:5b:30:bc] is of status
unreg; belongs into registration VLAN
(pf::role::getRegistrationRole) May 14 02:37:11 PacketFence-ZEN
packetfence_httpd.aaa: httpd.aaa(2573) INFO:
[mac:00:24:d6:5b:30:bc] (198.18.255.67) Added VLAN 1255 to the
returned RADIUS Access-Accept
(pf::Switch::returnRadiusAccessAccept)
May 14 02:37:11 PacketFence-ZEN packetfence_httpd.aaa:
httpd.aaa(2573) INFO: [mac:00:24:d6:5b:30:bc] (198.18.255.67)
Added role PFence-Guest-PreAuth to the returned RADIUS
Access-Accept (pf::Switch::returnRadiusAccessAccept)
May 14 02:37:14 PacketFence-ZEN pfqueue: pfqueue(2970) INFO:
[mac:unknown] Device Windows OS is a Windows OS
(pf::fingerbank::__ANON__) May 14 02:38:28 PacketFence-ZEN
pfipset[2359]: t=2019-05-14T02:38:28+0000 lvl=info msg="No
Inline Network bypass ipsets reload" pid=2359 May 14 02:39:16
PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2573) INFO:
[mac:00:24:d6:5b:30:bc] handling radius autz request: from
switch_ip => (198.18.255.67), connection_type =>
Wireless-802.11-NoEAP,switch_mac => (00:0b:86:de:65:00), mac =>
[00:24:d6:5b:30:bc], port => 0, username => "00-24-d6-5b-30-bc",
ssid => PacketFence-Guest (pf::radius::authorize) May 14
02:39:17 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2573)
INFO: [mac:00:24:d6:5b:30:bc] Instantiate profile Aruba-Guest
(pf::Connection::ProfileFactory::_from_profile)
May 14 02:39:17 PacketFence-ZEN packetfence_httpd.aaa:
httpd.aaa(2573) INFO: [mac:00:24:d6:5b:30:bc] is of status
unreg; belongs into registration VLAN
(pf::role::getRegistrationRole) May 14 02:39:17 PacketFence-ZEN
packetfence_httpd.aaa: httpd.aaa(2573) INFO:
[mac:00:24:d6:5b:30:bc] (198.18.255.67) Added VLAN 1255 to the
returned RADIUS Access-Accept
(pf::Switch::returnRadiusAccessAccept)
May 14 02:39:17 PacketFence-ZEN packetfence_httpd.aaa:
httpd.aaa(2573) INFO: [mac:00:24:d6:5b:30:bc] (198.18.255.67)
Added role PFence-Guest-PreAuth to the returned RADIUS
Access-Accept (pf::Switch::returnRadiusAccessAccept)
May 14 02:39:20 PacketFence-ZEN pfqueue: pfqueue(2970) WARN:
[mac:00:24:d6:5b:30:bc] Unable to match MAC address to IP
'198.18.255.113' (pf::ip4log::ip2mac) May 14 02:39:20
PacketFence-ZEN pfqueue: pfqueue(2970) INFO:
[mac:00:24:d6:5b:30:bc] oldip (198.18.250.10) and newip
(198.18.255.113) are different for 00:24:d6:5b:30:bc - closing
ip4log entry (pf::api::update_ip4log) May 14 02:39:48
PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2573) INFO:
[mac:00:24:d6:5b:30:bc] handling radius autz request: from
switch_ip => (198.18.255.67), connection_type =>
Wireless-802.11-NoEAP,switch_mac => (00:0b:86:de:65:00), mac =>
[00:24:d6:5b:30:bc], port => 0, username => "00-24-d6-5b-30-bc",
ssid => PacketFence-Guest (pf::radius::authorize) May 14
02:39:48 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2573)
INFO: [mac:00:24:d6:5b:30:bc] Instantiate profile Aruba-Guest
(pf::Connection::ProfileFactory::_from_profile)
May 14 02:39:48 PacketFence-ZEN packetfence_httpd.aaa:
httpd.aaa(2573) INFO: [mac:00:24:d6:5b:30:bc] is of status
unreg; belongs into registration VLAN
(pf::role::getRegistrationRole) May 14 02:39:48 PacketFence-ZEN
packetfence_httpd.aaa: httpd.aaa(2573) INFO:
[mac:00:24:d6:5b:30:bc] (198.18.255.67) Added VLAN 1255 to the
returned RADIUS Access-Accept
(pf::Switch::returnRadiusAccessAccept)
May 14 02:39:48 PacketFence-ZEN packetfence_httpd.aaa:
httpd.aaa(2573) INFO: [mac:00:24:d6:5b:30:bc] (198.18.255.67)
Added role PFence-Guest-PreAuth to the returned RADIUS
Access-Accept (pf::Switch::returnRadiusAccessAccept)
May 14 02:40:09 PacketFence-ZEN packetfence_httpd.portal:
httpd.portal(3341) INFO: [mac:unknown] Instantiate profile
Aruba-Guest (pf::Connection::ProfileFactory::_from_profile)
May 14 02:40:09 PacketFence-ZEN packetfence_httpd.portal:
httpd.portal(3341) WARN: [mac:unknown] Unable to match MAC
address to IP '198.18.255.67' (pf::ip4log::ip2mac) May 14
02:40:09 PacketFence-ZEN packetfence_httpd.portal:
httpd.portal(3341) WARN: [mac:0] Unable to match MAC address to
IP '198.18.255.67' (pf::ip4log::ip2mac) May 14 02:40:09
PacketFence-ZEN packetfence_httpd.portal: httpd.portal(3341)
INFO: [mac:0] Instantiate profile default
(pf::Connection::ProfileFactory::_from_profile)
May 14 02:40:09 PacketFence-ZEN packetfence_httpd.portal:
httpd.portal(3341) ERROR: [mac:0] Error while communicating with
the Fingerbank collector. 404 Not Found
(pf::fingerbank::endpoint_attributes)
May 14 02:40:09 PacketFence-ZEN packetfence_httpd.portal: httpd.portal(3341)
WARN: [mac:0] Use of uninitialized value in string ne at
/usr/local/pf/lib/captiveportal/PacketFence/DynamicRouting/Application.pm line
137.
(captiveportal::PacketFence::DynamicRouting::Application::proces
s_fingerbank) May 14 02:40:09 PacketFence-ZEN
packetfence_httpd.portal: httpd.portal(3341) ERROR: [mac:0]
Error while communicating with the Fingerbank collector. 404 Not
Found (pf::fingerbank::update_collector_endpoint_data)
May 14 02:40:09 PacketFence-ZEN pfqueue: pfqueue(2969) ERROR:
[mac:unknown] Error while communicating with the Fingerbank
collector. 404 Not Found (pf::fingerbank::endpoint_attributes)
May 14 02:40:09 PacketFence-ZEN pfqueue: pfqueue(2969) ERROR:
[mac:unknown] Unable to fetch query arguments for Fingerbank
query. Aborting. (pf::fingerbank::process) May 14 02:40:09
PacketFence-ZEN packetfence_httpd.portal: httpd.portal(3340)
WARN: [mac:unknown] Unable to match MAC address to IP
'198.18.255.67' (pf::ip4log::ip2mac) May 14 02:40:10
PacketFence-ZEN packetfence_httpd.portal: httpd.portal(3340)
WARN: [mac:0] Unable to match MAC address to IP '198.18.255.67'
(pf::ip4log::ip2mac) May 14 02:40:10 PacketFence-ZEN
packetfence_httpd.portal: httpd.portal(3340) INFO: [mac:0]
Instantiate profile default
(pf::Connection::ProfileFactory::_from_profile)
May 14 02:40:10 PacketFence-ZEN packetfence_httpd.portal:
httpd.portal(3340) ERROR: [mac:0] Error while communicating with
the Fingerbank collector. 404 Not Found
(pf::fingerbank::endpoint_attributes)
May 14 02:40:10 PacketFence-ZEN packetfence_httpd.portal: httpd.portal(3340)
WARN: [mac:0] Use of uninitialized value in string ne at
/usr/local/pf/lib/captiveportal/PacketFence/DynamicRouting/Application.pm line
137.
(captiveportal::PacketFence::DynamicRouting::Application::proces
s_fingerbank) May 14 02:40:10 PacketFence-ZEN
packetfence_httpd.portal: httpd.portal(3340) ERROR: [mac:0]
Error while communicating with the Fingerbank collector. 404 Not
Found (pf::fingerbank::update_collector_endpoint_data)
May 14 02:40:10 PacketFence-ZEN pfqueue: pfqueue(2966) ERROR:
[mac:unknown] Error while communicating with the Fingerbank
collector. 404 Not Found (pf::fingerbank::endpoint_attributes)
May 14 02:40:10 PacketFence-ZEN pfqueue: pfqueue(2966) ERROR:
[mac:unknown] Unable to fetch query arguments for Fingerbank
query. Aborting. (pf::fingerbank::process) May 14 02:43:28
PacketFence-ZEN pfipset[2359]: t=2019-05-14T02:43:28+0000
lvl=info msg="No Inline Network bypass ipsets reload" pid=2359
[root@PacketFence-ZEN ~]# [root@PacketFence-ZEN ~]#
198.18.255.67-controller
198.18.255.113-laptop
Louis Scaringella
Security Systems Engineer
Yellow Dog Networks, Inc
785-342-7903
The information transmitted, including any attachments, is intended only for
the person or entity to which it is addressed and may contain confidential
and/or privileged material. Any review, retransmission, dissemination or other
use of, or taking of any action in reliance upon, this information by persons
or entities other than the intended recipient is prohibited, and all liability
arising therefrom is disclaimed. If you received this in error, please contact
the sender and delete the material from any computer.
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users
The information transmitted, including any attachments, is intended only for
the person or entity to which it is addressed and may contain confidential
and/or privileged material. Any review, retransmission, dissemination or other
use of, or taking of any action in reliance upon, this information by persons
or entities other than the intended recipient is prohibited, and all liability
arising therefrom is disclaimed. If you received this in error, please contact
the sender and delete the material from any computer.
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users
The information transmitted, including any attachments, is intended only for
the person or entity to which it is addressed and may contain confidential
and/or privileged material. Any review, retransmission, dissemination or other
use of, or taking of any action in reliance upon, this information by persons
or entities other than the intended recipient is prohibited, and all liability
arising therefrom is disclaimed. If you received this in error, please contact
the sender and delete the material from any computer.
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users
--
Fabrice Durand
fdur...@inverse.ca :: +1.514.447.4918 (x135) :: www.inverse.ca Inverse inc.
:: Leaders behind SOGo (http://www.sogo.nu) and PacketFence
(http://packetfence.org)
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users
The information transmitted, including any attachments, is intended only for
the person or entity to which it is addressed and may contain confidential
and/or privileged material. Any review, retransmission, dissemination or other
use of, or taking of any action in reliance upon, this information by persons
or entities other than the intended recipient is prohibited, and all liability
arising therefrom is disclaimed. If you received this in error, please contact
the sender and delete the material from any computer.
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users
The information transmitted, including any attachments, is intended only for
the person or entity to which it is addressed and may contain confidential
and/or privileged material. Any review, retransmission, dissemination or other
use of, or taking of any action in reliance upon, this information by persons
or entities other than the intended recipient is prohibited, and all liability
arising therefrom is disclaimed. If you received this in error, please contact
the sender and delete the material from any computer.
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users
The information transmitted, including any attachments, is intended only for
the person or entity to which it is addressed and may contain confidential
and/or privileged material. Any review, retransmission, dissemination or other
use of, or taking of any action in reliance upon, this information by persons
or entities other than the intended recipient is prohibited, and all liability
arising therefrom is disclaimed. If you received this in error, please contact
the sender and delete the material from any computer.
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users