Did you configure the Windows box for 802.1x? Jake Sallee Godfather of Bandwidth System Engineer and Security Specialist University of Mary Hardin-Baylor WWW.UMHB.EDU
900 College St. Belton, Texas 76513 Fone: 254-295-4658 Phax: 254-295-4221 ________________________________________ From: Kevin MacNeil via PacketFence-users <packetfence-users@lists.sourceforge.net> Sent: Wednesday, April 15, 2020 4:41 PM To: packetfence-users@lists.sourceforge.net Cc: Kevin MacNeil Subject: [PacketFence-users] POC Radius auth with Juniper switches EXTERNAL Exercise Caution I am working on a proof of concept for Packetfence for our production Juniper environment of ~200 switches. I have EX4200's in my test lab and have used the Juniper example https://urldefense.proofpoint.com/v2/url?u=https-3A__packetfence.org_doc_PacketFence-5FNetwork-5FDevices-5FConfiguration-5FGuide.html-23-5Fjuniper&d=DwIGaQ&c=61yQaCoNVjQr1ah003i6yA&r=hv6FWbB_1Tauwq1un9h_XR4pflYMFHr0Ag1rvcLKIQA&m=GglvSsG0w5UxfuXgspmD-WjDFPqio39urpw0ErinIpQ&s=b7Ci3enf4ej78jZJcGp4bVoOON36-eWwYBYG_TCgHIk&e= in the network device configuration guide. Otherwise I have followed the installation guide. I was able to join to my local AD domain, which I then added to the default and null realms. I configured a new internal AD authentication source and the connection test works as expected. I added the catchall rule per the instructions. I created a new 802.1x connection profile as well per the instructions. I created a new switch group using the Juniper::EX type. However after configuring my Windows 10 test box I am getting the following error, "Network device does not support this mode of operation." FWIW I have tried both the 12.3 and 15.1 versions of JUNOS with the same result. I'm guessing this is an easy problem but I'm not sure what is wrong. Any and all help appreciated. Request Time 0 RADIUS Request User-Name = "test\\kevin" NAS-IP-Address = 192.168.98.3 NAS-Port = 75 State = 0x4cc4fae04dcce0c184a03c0a51cb6cd7 Called-Station-Id = "00:23:9c:00:0c:c0" Calling-Station-Id = "08:00:27:0a:b3:58" NAS-Identifier = "labsw3" NAS-Port-Type = Ethernet Acct-Session-Id = "8O2.1x81ab013900042681" Event-Timestamp = "Apr 15 2020 17:04:26 EDT" EAP-Message = 0x020800061a03 NAS-Port-Id = "ge-0/0/9.0" FreeRADIUS-Proxied-To = 127.0.0.1 EAP-Type = MSCHAPv2 Stripped-User-Name = "kevin" Realm = "default" PacketFence-Domain = "TEST" PacketFence-KeyBalanced = "4f50863fad315484ff895de9b971f63b" PacketFence-Radius-Ip = "192.168.13.41" PacketFence-NTLMv2-Only = "" Module-Failure-Message = "rest: Server returned:" Module-Failure-Message = "rest: {\"control:PacketFence-Authorization-Status\":\"allow\",\"control:PacketFence-Switch-Id\":\"192.168.98.3\",\"control:PacketFence-Switch-Ip-Address\":\"192.168.98.3\",\"control:PacketFence-UserName\":\"test\\\\kevin\",\"control:PacketFence-Request-Time\":1586984666,\"control:PacketFence-Connection-Type\":\"Ethernet-EAP\",\"control:PacketFence-IfIndex\":75,\"control:PacketFence-Mac\":\"08:00:27:0a:b3:58\",\"Reply-Message\":\"Network device does not support this mode of operation\",\"control:PacketFence-Eap-Type\":26,\"control:PacketFence-Switch-Mac\":\"00:23:9c:00:0c:c0\"}" User-Password = "******" SQL-User-Name = "test\\\\kevin" RADIUS Reply EAP-Message = 0x03080004 Message-Authenticator = 0x00000000000000000000000000000000 User-Name = "test\\kevin" interfaces { interface-range access-ports { member-range ge-0/0/2 to ge-0/0/23; unit 0 { family ethernet-switching { port-mode access; } } } } protocols { dot1x { authenticator { authentication-profile-name packetfence; interface { access-ports { supplicant multiple; mac-radius; } } } } } access { radius-server { 192.168.13.41 { port 1812; secret "secret"; } } profile packetfence { authentication-order radius; radius { authentication-server 192.168.13.41; accounting-server 192.168.13.41; } accounting { order radius; accounting-stop-on-failure; accounting-stop-on-access-deny; } } } ethernet-switching-options { secure-access-port { interface access-ports { mac-limit 2 action drop; } } } snmp { name "labsw3"; description juniper; location EX; contact "kevin@test.local"; client-list list0 { 192.168.13.41/32; } community public { authorization read-only; client-list-name list0; } community private { authorization read-write; client-list-name list0; } } _______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.sourceforge.net_lists_listinfo_packetfence-2Dusers&d=DwIGaQ&c=61yQaCoNVjQr1ah003i6yA&r=hv6FWbB_1Tauwq1un9h_XR4pflYMFHr0Ag1rvcLKIQA&m=GglvSsG0w5UxfuXgspmD-WjDFPqio39urpw0ErinIpQ&s=r_Iy3WDTeBvPpnpTq3o9KqYhr-WzLZSOidJjSzNDkWs&e= _______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users