Hi Fabrice,

We have been using the default cisco switch template as non of our production 
switches have templates.

We have 3650 and 2960 in the lab.

Kind Regards

Simon

Sent from my Galaxy


-------- Original message --------
From: Fabrice Durand <oeufd...@gmail.com>
Date: 21/01/2022 16:54 (GMT+00:00)
To: Simon Sutcliffe <simon.sutcli...@rhdhv.com>
Cc: packetfence-users@lists.sourceforge.net, Raghuram Kuricheti 
<raghuram.kurich...@rhdhv.com>
Subject: Re: Challenge with sending filter-ID to Cisco switch


This message was sent from a public domain email service such as Gmail, Yahoo!, 
AOL, etc. Please be cautious.


Hello Simon,

what switch module are you using in PacketFence ?

It´s implemented here:
https://github.com/inverse-inc/packetfence/blob/devel/lib/pf/Switch/Cisco/Catalyst_2960.pm#L580

Regards
Fabrice


Le ven. 21 janv. 2022 à 02:43, Simon Sutcliffe 
<simon.sutcli...@rhdhv.com<mailto:simon.sutcli...@rhdhv.com>> a écrit :

Dear Team



Over the last few weeks we have been engaged with trying to understand a 
problem we were facing.  The problem was with sending a Filter-ID



[Graphical user interface, text, application, chat or text message  Description 
automatically generated]




On the switch we had created a extended access list of the same name

ip access-list extended Pre-Auth-For-Registration
10 permit ip 10.207.129.0 0.0.0.255 10.202.1.0 0.0.0.255
20 permit ip 10.207.129.0 0.0.0.255 10.202.5.0 0.0.0.255
30 deny   ip 10.207.129.0 0.0.0.255 10.0.0.0 0.255.255.255
40 permit ip any any



And during the MAB connection the radius response within the auditing section 
clearly showed that PF was sending the attribute along with the VLAN we wanted 
the client to be placed in.

RADIUS Reply

REST-HTTP-Status-Code = 200

Filter-Id = "Pre-Auth-For-Registration"

Tunnel-Medium-Type = IEEE-802

Tunnel-Private-Group-Id = "7"

Tunnel-Type = VLAN

In the logging on the Cisco Switch you saw the Filter-ID was asl received. 
However on two Cisco Switches (3650 and 2960) we tested the VLAN was correctly 
actioned but the Filter-ID was ignored.

The problem was identified as

The ACL Filter-ID is not including the direction



The solution to solve the case was to add an additional command in the switch 
config.



#radius-server attribute 11 default direction inbound



This forced the inbound Filter-ID to be assigned to the inbound ACL handle.

After this the ACL could be clearly seen within the session and was actioned by 
the switch



bsns-3750-5#show authentication sessions interface g1/0/1



            Interface:  GigabitEthernet1/0/1

          MAC Address:  0050.5699.4ea1

           IP Address:  192.168.2.200

            User-Name:  cisco

               Status:  Authz Success

               Domain:  DATA

      Security Policy:  Should Secure

      Security Status:  Unsecure

       Oper host mode:  multi-auth

     Oper control dir:  both

        Authorized By:  Authentication Server

          Vlan Policy:  7

            Filter-Id:  Pre-Auth-For-Registration

      Session timeout:  N/A

         Idle timeout:  N/A

    Common Session ID:  C0A800010000059E47B77481

      Acct Session ID:  0x00000733

               Handle:  0x5E00059F



There is also this note in the Cisco documentation

The Filter-Id attribute can be used to specify an inbound or outbound ACL that 
is already configured on the switch. The attribute contains the ACL number 
followed by .in for ingress filtering or .out for egress filtering. If the 
RADIUS server does not allow the .in or .out syntax, the access list is applied 
to the outbound ACL by default. Because of limited support of Cisco IOS access 
lists on the switch, the Filter-Id attribute is supported only for IP ACLs 
numbered 1 to 199 and 1300 to 2699 (IP standard and IP extended ACLs).

@Fabrice Durand<mailto:oeufd...@gmail.com> This could be a point for your 
developers and documentation team to make a note to see if this can be solved 
with some direction information from PF.  If not you have this information if 
another customer is facing the same challenge.

Hope this was helpful and I appreciate your support on the other issues we are 
facing.

Kind Regards



Simon






Royal HaskoningDHV - Internal Use Only

This email and any attachments are intended solely for the use of the 
addressee(s); disclosure or copying by others than the intended person(s) is 
strictly prohibited. If you have received this email in error, please treat 
this email as confidential, notify the sender and delete all copies of the 
email immediately
This email and any attachments are intended solely for the use of the 
addressee(s); disclosure or copying by others than the intended person(s) is 
strictly prohibited. If you have received this email in error, please treat 
this email as confidential, notify the sender and delete all copies of the 
email immediately
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to