Hello Michael,
you can try with the hostapd switch module, this one use tunnel-password
(https://github.com/inverse-inc/packetfence/blob/devel/lib/pf/Switch/Hostapd.pm#L189)
If it works then it will be easy to adapt the meraki switch module.
Regards
Fabrice
Le 20-11-17 à 11 h 53, Michael Brown via PacketFence-users a écrit :
Hey Guys,
Just checking in one more time on this one. Any ideas?
Thanks,
Mike
On Thursday, November 12, 2020, 11:38:23 AM EST, Michael Brown
<[email protected]> wrote:
Based off the auditing log below it looks like PacketFence sends the
PSK back to the Meraki access point as Cisco-AVPair. Is there anyway
to change PacketFence to send the PSK as tunnel-password instead of
Cisco-AVPair?
RADIUS Request
RADIUS Request
User-Name = "00e04c19dddd"
User-Password = "******"
NAS-IP-Address = 172.20.10.20
Called-Station-Id = "68:3a:1e:85:cc:cc:WIFI-BYOD"
Calling-Station-Id = "00:e0:4c:19:dd:dd"
NAS-Port-Type = Wireless-802.11
Event-Timestamp = "Nov 12 2020 09:58:47 EST"
Connect-Info = "CONNECT 11Mbps 802.11b"
Message-Authenticator = 0x2458d1c2852dfb55ec85d8484624cccc
Meraki-Network-Name = "Network"
Meraki-Ap-Name = "AP-01"
Stripped-User-Name = "00e04c19dddd"
Realm = "null"
FreeRADIUS-Client-IP-Address = 172.20.10.20
Called-Station-SSID = "WIFI-BYOD"
PacketFence-KeyBalanced = "8e4b512c5636628cd16b291bf294eeee"
PacketFence-Radius-Ip = "172.20.100.2"
SQL-User-Name = "00e04c19dddd"
RADIUS Reply
Tunnel-Type = VLAN
Tunnel-Private-Group-Id = "118"
Tunnel-Medium-Type = IEEE-802
Cisco-AVPair = "psk=otahreeddttreeee"
Cisco-AVPair = "psk-mode=ascii"
On Wednesday, November 11, 2020, 01:26:30 PM EST, Michael Brown
<[email protected]> wrote:
Checking in on this.
I put a message up on Meraki and it looks like the problem is the
RADIUS Access-Accept message is not returning the Tunnel-Password with
the user's dpsk. It is only returning the VLAN ID. Is there
something missing in my config to make that happen?
Thanks.
On Tuesday, October 20, 2020, 12:07:27 PM EDT, Michael Brown
<[email protected]> wrote:
Hi Guys,
Has anyone been able to get DPSK working with Meraki access points?
The provisioner portion is working where the user joins a network,
signs in to the portal and then once they are signed in they are
presented with the name of the network that uses DPSK and their DPSK
password.The problem is when I try to join the DPSK network with the
provided DPSK I receive can't connect to this network (Windows 10 device).
We have one PacketFence server set up out of band.
Here are my profiles:
PROVIDES DPSK
[Auth-Wireless]
locale=
sources=BYOD-Wireless-User-Authentication
advanced_filter=
provisioners=DPSK
filter=ssid:Auth
DPSK NETWORK PROFILE
[BYOD-Wireless]
locale=
advanced_filter=
filter=ssid:WIFI-BYOD
dpsk=enabled
autoregister=enabled
default_psk_key=testing12345678!
unreg_on_acct_stop=disabled
filter_match_style=all
HERE IS THE AUTH SOURCE FOR Auth-Wireless PROFILE:
[BYOD-Wireless-User-Authentication]
cache_match=0
read_timeout=10
realms=null,domain.com
basedn=DC=domain,DC=local
monitor=1
password=password
shuffle=0
searchattributes=
set_access_durations_action=
scope=sub
email_attribute=mail
usernameattribute=sAMAccountName
connection_timeout=1
binddn=CN=Admin\,
PacketFence,OU=IT,Accounts,OU=Domain_Users,DC=domain,DC=local
encryption=none
description=BYOD Wireless User Authentication
port=389
host=dc.domain.com
write_timeout=5
type=AD
[BYOD-Wireless-User-Authentication rule Network-Administrators]
action0=set_role=WIFI-IT-STAFF-DISTRICT
condition0=memberOf,equals,CN=Network Administrators,OU=Domain
Groups,DC=domain,DC=local
status=enabled
match=all
class=authentication
action1=set_access_duration=1h
description=Active Directory - Network Administrators Group
[BYOD-Wireless-User-Authentication rule Faculty-All]
action0=set_role=WIFI-STAFF-GUESTS
condition0=memberOf,equals,CN=Faculty - All,OU=Domain
Groups,DC=domain,DC=local
status=enabled
match=all
class=authentication
action1=set_access_duration=1h
description=Active Directory - Faculty All
HERE IS THE MERAKI SSID CONFIG FOR THE DPSK NETWORK:
Association requirements: Identity PSK with RADIUS
WPA encryption mode: WPA2
Splash page: None
Readius server set to PacketFence management
Radius testing: disabled
Radius CoA: disabled
Client IP assignment: Bridge mode
VLAN tagging: Don't use
Radius override: Radius response can override VLAN tag
HERE IS WHAT THE PF LOG SAYS WHEN I TRY TO JOIN:
Oct 17 22:18:07 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(2131) WARN:
[mac:a8:1e:84:a6:ca:7d] Unable to extract audit-session-id for module
pf::Switch::Meraki::MR_v2. SSID-based VLAN assignments won't work.
Make sure you enable Vendor Specific Attributes (VSA) on the AP if you
want them to work. (pf::Switch::getCiscoAvPairAttribute)
Oct 17 22:18:07 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(2131) INFO:
[mac:00:e0:4c:19:dd:56] handling radius autz request: from switch_ip
=> (172.20.110.19), connection_type =>
Wireless-802.11-NoEAP,switch_mac => (e2:cb:ac:91:85:df), mac =>
[00:e0:4c:19:dd:56], port => 0, username => "00e04c19dd56", ssid =>
WIFI-BYOD (pf::radius::authorize)
Oct 17 22:18:07 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(2131) INFO:
[mac:00:e0:4c:19:dd:56] Instantiate profile BYOD-Wireless
(pf::Connection::ProfileFactory::_from_profile)
Oct 17 22:18:07 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(2131) INFO:
[mac:00:e0:4c:19:dd:56] Found authentication source(s) :
'local,file1,Faculty-All,Wifi-Sponsors,District-Wireless-User-Authentication,Guest-Wireless-User-Authentication,BYOD-Wireless-User-Authentication'
for realm 'null' (pf::config::util::filter_authentication_sources)
Oct 17 22:18:07 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(2131) WARN:
[mac:00:e0:4c:19:dd:56] No category computed for autoreg
(pf::role::getNodeInfoForAutoReg)
Oct 17 22:18:07 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(2131) INFO:
[mac:00:e0:4c:19:dd:56] Found authentication source(s) :
'local,file1,Faculty-All,Wifi-Sponsors,District-Wireless-User-Authentication,Guest-Wireless-User-Authentication,BYOD-Wireless-User-Authentication'
for realm 'null' (pf::config::util::filter_authentication_sources)
Oct 17 22:18:07 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(2131) INFO:
[mac:00:e0:4c:19:dd:56] Connection type is MAC-AUTH. Getting role from
node_info (pf::role::getRegisteredRole)
Oct 17 22:18:07 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(2131) INFO:
[mac:00:e0:4c:19:dd:56] Username was defined "00e04c19dd56" -
returning role 'WIFI-IT-STAFF-DISTRICT' (pf::role::getRegisteredRole)
Oct 17 22:18:07 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(2131) INFO:
[mac:00:e0:4c:19:dd:56] PID: "user", Status: reg Returned VLAN:
(undefined), Role: WIFI-IT-STAFF-DISTRICT (pf::role::fetchRoleForNode)
Oct 17 22:18:07 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(2131) INFO:
[mac:00:e0:4c:19:dd:56] (172.20.110.19) Added VLAN 118 to the returned
RADIUS Access-Accept (pf::Switch::returnRadiusAccessAccept)
Oct 17 22:18:07 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(2131) INFO:
[mac:00:e0:4c:19:dd:56] security_event 1300003 force-closed for
00:e0:4c:19:dd:56 (pf::security_event::security_event_force_close)
HERE IS WHAT THE RADIUS LOG SAYS:
Oct 17 22:18:07 srv-pf-02 auth[2992]: [mac:00:e0:4c:19:dd:56] Accepted
user:and returned VLAN 118
Oct 17 22:18:07 srv-pf-02 auth[2992]: (12467) Login OK: [00e04c19dd56]
(from client 172.20.110.19/32 port 0 cli 00:e0:4c:19:dd:56)
Thanks for your help.
Mike
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users