Hello Stuart,

yes it's possible but when you plug in the port 2 is it the port 50 who appear in the log ?

Regards

Fabrice


Le 19-05-21 à 11 h 42, Stuart Gendron a écrit :
Logs below:

May 21 11:39:50 youi-packetfence-p1 auth[25948]: rlm_sql (sql): Closing connection (106): Hit idle_timeout, was idle for 431977 seconds May 21 11:39:50 youi-packetfence-p1 auth[25948]: rlm_sql (sql): Closing connection (108): Hit idle_timeout, was idle for 431977 seconds May 21 11:39:50 youi-packetfence-p1 auth[25948]: rlm_sql (sql): Closing connection (107): Hit idle_timeout, was idle for 431977 seconds May 21 11:39:50 youi-packetfence-p1 auth[25948]: rlm_sql (sql): Closing connection (105): Hit idle_timeout, was idle for 431977 seconds May 21 11:39:50 youi-packetfence-p1 auth[25948]: rlm_sql (sql): Opening additional connection (109), 1 of 64 pending slots used May 21 11:39:50 youi-packetfence-p1 auth[25948]: Need 2 more connections to reach min connections (3) May 21 11:39:50 youi-packetfence-p1 auth[25948]: rlm_sql (sql): Opening additional connection (110), 1 of 63 pending slots used May 21 11:39:50 youi-packetfence-p1 auth[25948]: rlm_rest (rest): Closing connection (98): Hit idle_timeout, was idle for 431989 seconds May 21 11:39:50 youi-packetfence-p1 auth[25948]: rlm_rest (rest): Closing connection (97): Hit idle_timeout, was idle for 431977 seconds May 21 11:39:50 youi-packetfence-p1 auth[25948]: rlm_rest (rest): Closing connection (99): Hit idle_timeout, was idle for 431977 seconds May 21 11:39:50 youi-packetfence-p1 auth[25948]: rlm_rest (rest): Opening additional connection (100), 1 of 64 pending slots used May 21 11:39:51 youi-packetfence-p1 auth[25948]: Need 2 more connections to reach min connections (3) May 21 11:39:51 youi-packetfence-p1 auth[25948]: rlm_rest (rest): Opening additional connection (101), 1 of 63 pending slots used May 21 11:39:51 youi-packetfence-p1 auth[25948]: Need 1 more connections to reach min connections (3) May 21 11:39:51 youi-packetfence-p1 auth[25948]: rlm_sql (sql): Opening additional connection (111), 1 of 62 pending slots used May 21 11:39:51 youi-packetfence-p1 auth[25948]: [mac:0c:4d:e9:b9:23:ac] Rejected user: 0c4de9b923ac May 21 11:39:51 youi-packetfence-p1 auth[25948]: (41096) Rejected in post-auth: [0c4de9b923ac] (from client 10.100.64.67 port 49 cli 0c:4d:e9:b9:23:ac) May 21 11:39:51 youi-packetfence-p1 auth[25948]: (41096) Login incorrect: [0c4de9b923ac] (from client 10.100.64.67 port 49 cli 0c:4d:e9:b9:23:ac) May 21 11:40:02 youi-packetfence-p1 auth[25948]: Need 7 more connections to reach 10 spares May 21 11:40:02 youi-packetfence-p1 auth[25948]: rlm_sql (sql): Opening additional connection (112), 1 of 61 pending slots used May 21 11:40:02 youi-packetfence-p1 auth[25948]: Need 1 more connections to reach min connections (3) May 21 11:40:02 youi-packetfence-p1 auth[25948]: rlm_rest (rest): Opening additional connection (102), 1 of 62 pending slots used May 21 11:40:02 youi-packetfence-p1 auth[25948]: (41106) Login OK: [testradius] (from client 10.100.64.67 port 49 cli 0c:4d:e9:b9:23:ac via TLS tunnel) May 21 11:40:02 youi-packetfence-p1 auth[25948]: [mac:0c:4d:e9:b9:23:ac] Accepted user: testradius and returned VLAN 88 May 21 11:40:02 youi-packetfence-p1 auth[25948]: (41107) Login OK: [testradius] (from client 10.100.64.67 port 49 cli 0c:4d:e9:b9:23:ac)

Looks like it's also sending port 49.

Is there somewhere to make a modification where I can say $Port = $Port - 48 or something?

On Thu, May 16, 2019 at 9:27 PM Durand fabrice <fdur...@inverse.ca <mailto:fdur...@inverse.ca>> wrote:

    Hello Stuart,

    it looks that the port is set to 49 in the radius request:

    May 16 11:40:01 youi-packetfence-p1 packetfence_httpd.aaa:
    httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] handling radius autz
    request: from switch_ip => (10.100.64.67), connection_type =>
    Ethernet-NoEAP,switch_mac => (88:f0:77:d9:b2:48), mac =>
    [78:7b:8a:d3:ae:74], port => 49, username => "787b8ad3ae74"
    (pf::radius::authorize)

    Are you able to check in the radius auditing what is the radius
    request (with all the attributes) and paste it to me ?

    Regards

    Fabrice


    Le 19-05-16 à 11 h 41, Stuart Gendron a écrit :
    Logs below:

    [root@youi-packetfence-p1 ~]# tail -f
    /usr/local/pf/logs/packetfence.log| grep 78:7b:8a:d3:ae:74
    May 16 11:40:01 youi-packetfence-p1 packetfence_httpd.aaa:
    httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] handling radius
    autz request: from switch_ip => (10.100.64.67), connection_type
    => Ethernet-NoEAP,switch_mac => (88:f0:77:d9:b2:48), mac =>
    [78:7b:8a:d3:ae:74], port => 49, username => "787b8ad3ae74"
    (pf::radius::authorize)
    May 16 11:40:01 youi-packetfence-p1 packetfence_httpd.aaa:
    httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] Instantiate profile
    default (pf::Connection::ProfileFactory::_from_profile)
    May 16 11:40:01 youi-packetfence-p1 packetfence_httpd.aaa:
    httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] Match rule
    mac_lan:unknown&pf_wired_mac_auth (pf::access_filter::test)
    May 16 11:40:01 youi-packetfence-p1 packetfence_httpd.aaa:
    httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] vlan filter match ;
    belongs into REJECT VLAN (pf::role::getRegistrationRole)
    May 16 11:40:01 youi-packetfence-p1 packetfence_httpd.aaa:
    httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] According to rules
    in fetchRoleForNode this node must be kicked out. Returning
    USERLOCK (pf::Switch::handleRadiusDeny)
    May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa:
    httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] handling radius
    autz request: from switch_ip => (10.100.64.67), connection_type
    => Ethernet-EAP,switch_mac => (88:f0:77:d9:b2:48), mac =>
    [78:7b:8a:d3:ae:74], port => 49, username => "testradius"
    (pf::radius::authorize)
    May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa:
    httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] Instantiate profile
    802.1x (pf::Connection::ProfileFactory::_from_profile)
    May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa:
    httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] Found
    authentication source(s) : 'YOUI-DC-P1' for realm 'null'
    (pf::config::util::filter_authentication_sources)
    May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa:
    httpd.aaa(6346) WARN: [mac:78:7b:8a:d3:ae:74] Calling match with
    empty/invalid rule class. Defaulting to 'authentication'
    (pf::authentication::match2)
    May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa:
    httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] Using sources
    YOUI-DC-P1 for matching (pf::authentication::match2)
    May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa:
    httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] LDAP testing
    connection (pf::LDAP::expire_if)
    May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa:
    httpd.aaa(6346) ERROR: [mac:78:7b:8a:d3:ae:74] Error binding:
    'Connection reset by peer' (pf::LDAP::log_error_msg)
    May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa:
    httpd.aaa(6346) WARN: [mac:78:7b:8a:d3:ae:74] LDAP connection
    expired (pf::LDAP::expire_if)
    May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa:
    httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] Matched rule
    (youi_tv_employees) in source YOUI-DC-P1, returning actions.
    (pf::Authentication::Source::match_rule)
    May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa:
    httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] Matched rule
    (youi_tv_employees) in source YOUI-DC-P1, returning actions.
    (pf::Authentication::Source::match)
    May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa:
    httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] Role has already
    been computed and we don't want to recompute it. Getting role
    from node_info (pf::role::getRegisteredRole)
    May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa:
    httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] Username was
    defined "testradius" - returning role 'default'
    (pf::role::getRegisteredRole)
    May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa:
    httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] PID: "testradius",
    Status: reg Returned VLAN: (undefined), Role: default
    (pf::role::fetchRoleForNode)
    May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa:
    httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] (10.100.64.67)
    Added VLAN 88 to the returned RADIUS Access-Accept
    (pf::Switch::returnRadiusAccessAccept)
    May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa:
    httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] violation 1300003
    force-closed for 78:7b:8a:d3:ae:74
    (pf::violation::violation_force_close)
    May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa:
    httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] Instantiate profile
    802.1x (pf::Connection::ProfileFactory::_from_profile)
    May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa:
    httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] Updating
    locationlog from accounting request
    (pf::api::handle_accounting_metadata)
    May 16 11:40:14 youi-packetfence-p1 pfqueue: pfqueue(18291) WARN:
    [mac:78:7b:8a:d3:ae:74] Unable to match MAC address to IP
    '10.100.90.109' (pf::ip4log::ip2mac)

    On Tue, May 14, 2019 at 9:18 PM Durand fabrice via
    PacketFence-users <packetfence-users@lists.sourceforge.net
    <mailto:packetfence-users@lists.sourceforge.net>> wrote:

        Hello Stuart,

        can you paste the log when you plug in the switch port ?

        tail -f /usr/local/pf/logs/packetfence.log| grep
        00:11:22:33:44:55

        with the real mac address of course.

        Regards

        Fabrice


        Le 19-05-14 à 10 h 43, Stuart Gendron via PacketFence-users a
        écrit :

        Hey there,

        Was wondering if anyone else has their ports showing up
        wrong for Cisco SG300 switches?

        This is when plugged into port 1 on a 48 port switch:

        Screen Shot 2019-05-14 at 10.42.07 AM.png

        If there's a way to fix it that'd be really appreciated :-)


--
                *Stuart Gendron*
        IT Support Specialist

        *You.i Labs*
        307 Legget Drive, Kanata, ON, K2K 3C8
        
<https://maps.google.com/?q=307+Legget+Drive,+Kanata,+ON,%C2%A0K2K+3C8&entry=gmail&source=g>
        t (613) 228-9107 x258 | c (613) 697-6853



        _______________________________________________
        PacketFence-users mailing list
        PacketFence-users@lists.sourceforge.net  
<mailto:PacketFence-users@lists.sourceforge.net>
        https://lists.sourceforge.net/lists/listinfo/packetfence-users
        _______________________________________________
        PacketFence-users mailing list
        PacketFence-users@lists.sourceforge.net
        <mailto:PacketFence-users@lists.sourceforge.net>
        https://lists.sourceforge.net/lists/listinfo/packetfence-users



--
        *Stuart Gendron*
    IT Support Specialist

    *You.i Labs*
    307 Legget Drive, Kanata, ON, K2K 3C8
    
<https://maps.google.com/?q=307+Legget+Drive,+Kanata,+ON,%C2%A0K2K+3C8&entry=gmail&source=g>
    t (613) 228-9107 x258 | c (613) 697-6853



--

        *Stuart Gendron*
IT Support Specialist

*You.i Labs*
307 Legget Drive, Kanata, ON, K2K 3C8 <https://maps.google.com/?q=307+Legget+Drive,+Kanata,+ON,%C2%A0K2K+3C8&entry=gmail&source=g>
t (613) 228-9107 x258 | c (613) 697-6853

--
Fabrice Durand
fdur...@inverse.ca ::  +1.514.447.4918 (x135) ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org)

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to