Hi Fabrice,

I’ll definitely try this method. For now I want to understand the logic of an 
endpoint authentication and authorization via RADIUS/801.x as there’s something 
that works different from how I expected (or rather doesn’t work)

Here’s a story. A user successfully authenticates against AD and I see this 
event in radius.log

 

Jul  4 06:34:25 PacketFence-ZEN auth[11338]: [mac:c4:9d:ed:8c:11:03] Accepted 
user: OPTIONS\it.tech and returned VLAN 2

Jul  4 06:34:25 PacketFence-ZEN auth[11338]: (177) Login OK: [OPTIONS\it.tech] 
(from client 172.19.254.2 port 0 cli c4:9d:ed:8

c:11:03)

 

This VLAN 2 is set in registration under Roles in the switch. Ok, may be this 
is how it supposed to work before the endpoint is registered as opposed to the 
VLAN 10 which should be assigned upon device registration.

But can anyone explain me why the endpoint receives an IP address from the 
local DHCP server. This DHCP server listens on the sub-interface for this VLAN 
10. 

So what I see is that an endpoint receives an IP address but it can’t reach an 
IP address of its default gateway.

Ok once again, I don’t have any problem to manually register this endpoint and 
assign a specific role.

Having it done the endpoint gets online only after I reconnect it on the 
endpoint itself or via the wireless controller.

 

This behavior is observed on Windows 10 and it took quite a long time (about a 
minute) to authenticate and get an IP address without getting online.

But it doesn’t work at all for Mac OS and mobile devices (Apple iPads and 
Android tabs), namely, same registration VLAN 2 is assigned as per radius.log 
but an endpoint can’t receive an IP address via DHCP.

 

If it is OS specific behavior and I can’t do anything about it then it’s OK 
again but I want to make it work smooth and fast.

The target role for all endpoints that should be allowed to connect via this 
specific SSID is Staff and I’m assigning this role in the authentication rule 
for a specific authentication source.

The result of the test authentication for a user confirm it:

 

./pftest authentication it.tech XXXXXXXX

 

Authenticating against 'OPTIONS-AD-SOURCE' in context 'admin'

  Authentication SUCCEEDED against OPTIONS-AD-SOURCE (Authentication 
successful.)

  Matched against OPTIONS-AD-SOURCE for 'authentication' rules

    set_unreg_date : 2019-12-31 11:53:24

    set_role : Staff

 

What’s the point of assigning this role by a rule if in reality an endpoint 
doesn’t get assigned the required VLAN ID upon successful authentication 
against a specific SSID ?

Should I forget about VLAN 10 that is assigned to Staff role and only assign 
VLAN 10 to registration ?

 

Eugene

 

From: Durand fabrice via PacketFence-users 
<packetfence-users@lists.sourceforge.net> 
Sent: Wednesday, July 03, 2019 5:52 PM
To: packetfence-users@lists.sourceforge.net
Cc: Durand fabrice <fdur...@inverse.ca>
Subject: Re: [PacketFence-users] Manual device registration to allow it to the 
network

 

Hello Eugene,

it's something really easy to do.

First in the switch config assign -1 to the registration role (it will reject 
the device that is not reg) and assign the correct vlan id for the other roles.

Next create a connection profile with a filter that match the ssid and don't 
assign any sources.

And at the end register the device you want and assign a role manually.

That's it.

Regards

Fabrice

 

Le 19-07-03 à 14 h 44, E.P. via PacketFence-users a écrit :

Now I’m getting confused after trying to understand RADIUS enforcement.

Reading the document that says:

 

Using RADIUS enforcement, everytime a device connects to the network, a 
matching production VLAN will be assigned, depending on the rules in 
Configuration→Policies and Access Control→Authentication Sources

 

The only place (or rather configuration component) to assign VLAN is in Roles 
under the switch (or switch group) where I add VLAN ID in “Role mapping by VLAN 
ID”. Am I correct ?

 

So, for example, I have Staff role with VLAN 10 added to it in the switch 
group. 

Then upon a user successful authentication and a condition matching in the 
authentication rule the action is assigned, namely unregistration date and role 
assignment. 

 

It all works and the endpoint gets connected but its status shows as 
unregistered and role unassigned under Nodes section in PacketFence Web UI. But 
as it seems to me an endpoint gets connected because VLAN ID assignment is 
pushed from the Wireless system controller for a specific SSID. If I remove it 
and assign this duty to RADIUS then it doesn’t work.

An endpoint can’t connect because it doesn’t receive an IP address because the 
AP doesn’t put it to the required VLAN

 

Eugene

 

From: E.P.  <mailto:ype...@gmail.com> <ype...@gmail.com> 
Sent: Wednesday, July 03, 2019 10:11 AM
To: packetfence-users@lists.sourceforge.net 
<mailto:packetfence-users@lists.sourceforge.net> 
Cc: 'Nicolas Quiniou-Briand'  <mailto:n...@inverse.ca> <n...@inverse.ca>
Subject: RE: [PacketFence-users] Manual device registration to allow it to the 
network

 

Hi Nicolas,

Yes, I of course mean dot1x 😉

My RADIUS authorization part is limited at this point, RADIUS doesn't assign 
the VLAN to the endpoint session.

Should I interpret your advice as I have to implement authorization via RADIUS 
and only then an unregistered/unassigned endpoint won't have access until the 
manual assignment ?

 

Eugene

 

-----Original Message-----
From: Nicolas Quiniou-Briand via PacketFence-users 
<packetfence-users@lists.sourceforge.net> 
Sent: Wednesday, July 3, 2019 12:13 AM
To: packetfence-users@lists.sourceforge.net 
<mailto:packetfence-users@lists.sourceforge.net> 
Cc: Nicolas Quiniou-Briand <n...@inverse.ca <mailto:n...@inverse.ca> >
Subject: Re: [PacketFence-users] Manual device registration to allow it to the 
network

 

Hello Eugene,

 

On 2019-07-03 8:10 a.m., E.P. via PacketFence-users wrote:

> Does it seem doable ?

 

Yes. When you say (via WPA2-Enterprise/RADIUS), you mean with 802.1X ?

 

> I compared two endpoints, one of them is registered with a role and 

> the other one is unregistered without a role and both have normal 

> access once they successfully authenticated

 

When you add a node to PF by hand, device will be automatically registered with 
the role you assigned. Consequently, RADIUS authorization step will not occur 
when device is plugged on the network, only authentication.

--

Nicolas Quiniou-Briand

 <mailto:n...@inverse.ca> n...@inverse.ca  ::  +1.514.447.4918 *140  ::   
<https://inverse.ca> https://inverse.ca Inverse inc. :: Leaders behind SOGo ( 
<https://sogo.nu> https://sogo.nu), PacketFence

( <https://packetfence.org> https://packetfence.org) and Fingerbank ( 
<http://fingerbank.org> http://fingerbank.org)

 

 

_______________________________________________

PacketFence-users mailing list

 <mailto:PacketFence-users@lists.sourceforge.net> 
PacketFence-users@lists.sourceforge.net

 <https://lists.sourceforge.net/lists/listinfo/packetfence-users> 
https://lists.sourceforge.net/lists/listinfo/packetfence-users






_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net 
<mailto:PacketFence-users@lists.sourceforge.net> 
https://lists.sourceforge.net/lists/listinfo/packetfence-users

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to