I just pushed a fix. cd /usr/local/pf curl https://github.com/inverse-inc/packetfence/commit/7628afddf46e0226667560dc33df192f9c4cf420.diff | patch -p1 and restart
Le lun. 7 févr. 2022 à 13:46, Jorge Nolla <jno...@gmail.com> a écrit : > Here are the log outputs for /usr/local/pf/logs/packetfence.log > > > Feb 7 11:03:04 wifi packetfence_httpd.portal[61371]: httpd.portal(61371) > INFO: [mac:[undef]] URI '/Huawei' is detected as an external captive portal > URI (pf::web::externalportal::handle) > Feb 7 11:03:04 wifi packetfence_httpd.portal[61371]: httpd.portal(61371) > ERROR: [mac:[undef]] Cannot load perl module for switch type > 'pf::Switch::Huawei'. Either switch type is unknown or switch type perl > module have compilation errors. See the following message for details: > (pf::web::externalportal::handle) > Feb 7 11:03:06 wifi packetfence_httpd.portal[61370]: httpd.portal(61370) > INFO: [mac:[undef]] URI '/Huawei' is detected as an external captive portal > URI (pf::web::externalportal::handle) > Feb 7 11:03:06 wifi packetfence_httpd.portal[61370]: httpd.portal(61370) > ERROR: [mac:[undef]] Cannot load perl module for switch type > 'pf::Switch::Huawei'. Either switch type is unknown or switch type perl > module have compilation errors. See the following message for details: > (pf::web::externalportal::handle) > > > > On Feb 7, 2022, at 10:50 AM, Jorge Nolla <jno...@gmail.com> wrote: > > Here is the output for HAProxy > > Feb 7 10:48:54 wifi haproxy[2285]: 10.9.215.39:63814 > [07/Feb/2022:10:48:54.074] portal-https-10.0.255.99~ 10.0.255.99-backend/ > 127.0.0.1 0/0/0/13/13 501 413 - - ---- 2/1/0/0/0 0/0 {wifi.fispy.mx} "GET > /Huawei?ac-ip=10.7.255.2&userip=10.9.215.39&ssid=FISPY-WiFi&ap-mac=f02f4b1467d9 > HTTP/1.1” > > > > On Feb 7, 2022, at 10:06 AM, Jorge Nolla <jno...@gmail.com> wrote: > > Hi Fabrice, > > From the Pf portal after the patch is applied. > > type: 'Huawei' is not a valid value The chosen type (Huawei) is not > supported. > > On Feb 6, 2022, at 6:49 PM, Jorge Nolla <jno...@gmail.com> wrote: > > > This is the only option on the config. > > <Screen Shot 2022-02-06 at 6.48.16 PM.png> > > > On Feb 6, 2022, at 6:41 PM, Jorge Nolla <jno...@gmail.com> wrote: > > Hi Fabrice, > > Getting an error page from PF > > Not Implemented > GET no supported for current URL. > > How is the switch supposed to be defined in PF? > > > > On Feb 6, 2022, at 5:55 PM, Fabrice Durand <oeufd...@gmail.com> wrote: > > I am just not sure what to set for username and password, if you do sms > auth then there is no password. > > Also in the url it looks that it miss the mac address of the device , can > you try to add device-mac and see if the device mac is in the url ? > > Here the first draft: > > > https://github.com/inverse-inc/packetfence/compare/feature/Huawei_web_auth.diff > > cd /usr/local/pf/ > curl > https://github.com/inverse-inc/packetfence/compare/feature/Huawei_web_auth.diff > | patch -p1 > > then restart packetfence. > > On the controller: > > url-template name PacketFence > url https://wifi.fispy.mx/ <https://wifi.fispy.mx/captive-portal>Hawei > url-parameter device-ip device-mac ac-ip user-ipaddress userip ssid ssid > user-mac ap-mac > > So when the device will be forwarded to the portal it should be able to > recognise the mac address and the ip of the device (in the bottom). > > Register on the portal and you should be forwarded to > http://$controller_ip:8443/login?username=bob&password=bob > > Let me know how it behave. > > Regards > Fabrice > > > > > Le dim. 6 févr. 2022 à 18:58, Jorge Nolla <jno...@gmail.com> a écrit : > >> Hi Fabrice >> >> This is the GET the AC is expecting: >> >> https://portal.fispy.mx:8443/login?username=($username)&password=($password) >> >> If successful it will return as per image below. If it fails the AC will >> redirect back to the Portal >> >> <WebAuthentication.png> >> >> >> Here is the configuration: >> >> url-template name PacketFence >> url https://wifi.fispy.mx/captive-portal >> url-parameter login-url destination_url >> https://portal.fispy.mx:8443/login?username=($username)&password=($password) >> >> >> HA Proxy output >> >> Feb 6 16:44:26 wifi haproxy[2427]: 10.9.70.173:52266 >> [06/Feb/2022:16:44:26.153] portal-https-10.0.255.99~ 10.0.255.99-backend/ >> 127.0.0.1 0/0/0/202/202 200 9003 - - ---- 2/1/0/0/0 0/0 {wifi.fispy.mx} >> "GET /captive-portal?destination_url= >> https://portal.fispy.mx:8443/login?username=($username)&password=($password) >> HTTP/1.1" >> >> Only problem is that PacketFence is not updating the dynamic values with >> username and password for it to work >> >> AC = Access Controller. This manages the APs’ as they are operating in >> Fit/Lightweight mode. >> AP = Access Points. These are the actual radios. >> >> Best Regards, >> Jorge >> >> >> On Feb 6, 2022, at 4:40 PM, Fabrice Durand <oeufd...@gmail.com> wrote: >> >> Hello Jorge, >> >> i have what i need at least to be able to support the web-auth. >> The only thing i am not sure is at the end of the registration process >> what we are supposed to do. >> >> I will create a branch on github in order for you to test. (it will be an >> update of the Huawei switch module). >> >> For information, what is the ac-ip ac-mac versus ap-ip ap-mac ? >> >> Regards >> Fabrice >> >> >> Le dim. 6 févr. 2022 à 18:30, Jorge Nolla <jno...@gmail.com> a écrit : >> >>> If I try to manually send the redirect in the browser here is what HA >>> proxy records. This is a simple copy and paste in the browser and the >>> output: >>> >>> https://wifi.fispy.mx/captive-portal?destination_url= >>> https://portal.fispy.mx:8443/login?username=539z&password=0uf3 >>> >>> 4875 - - ---- 2/1/0/0/0 0/0 {wifi.fispy.mx} "GET >>> /captive-portal?destination_url= >>> https://portal.fispy.mx:8443/login?username=539z&password=0uf3 HTTP/1.1" >>> >>> >>> It doesn’t let it go through as it seems that is trying to validate >>> network connectivity >>> >>> >>> On Feb 6, 2022, at 4:07 PM, Jorge Nolla <jno...@gmail.com> wrote: >>> >>> Seems weird how the format of the URL is recorded/sent >>> >>> >>> Here is a normal redirect, the url is formatted correctly, >>> >>> >>> Feb 6 16:03:41 wifi haproxy[2427]: 10.99.1.20:63577 >>> [06/Feb/2022:16:03:41.232] portal-https-10.0.255.99~ 10.0.255.99-backend/ >>> 127.0.0.1 0/0/1/233/234 200 4910 - - ---- 2/1/0/0/0 0/0 {wifi.fispy.mx} >>> "GET /captive-portal?destination_url=https://www.fispy.mx/ HTTP/1.1" >>> >>> I’m not sure why the value sent by the AP has all the % and weird >>> symbols >>> destination%5Furl=https%3A%2F%2Fportal%2Efispy%2Emx%3A8443%2Flogin >>> <https://wifi.fispy.mx/captive-portal?switch_url=https://portal.fispy.mx:8443/login> >>> >>> >>> On Feb 6, 2022, at 4:00 PM, Jorge Nolla <jno...@gmail.com> wrote: >>> >>> Hi Fabrice, >>> >>> Here are the options that can be added: >>> >>> [AirEngine9700-M1-url-template-PacketFence]url-parameter ? >>> ap-group-name AP group name >>> ap-ip AP IP address >>> ap-location AP location >>> ap-mac AP MAC address >>> ap-name AP name >>> device-ip Device IP address >>> device-mac Device MAC address >>> login-url Device's login URL provided to the external portal >>> server >>> mac-address Mac address >>> redirect-url The url in user original http packet >>> set Set >>> ssid SSID >>> sysname Device name >>> user-ipaddress User IP address >>> user-mac User MAC address >>> >>> >>> url-template name PacketFence >>> url https://wifi.fispy.mx/captive-portal >>> url-parameter device-ip ac-ip user-ipaddress userip ssid ssid user-mac >>> ap-mac >>> >>> >>> 200 9003 - - ---- 2/1/0/0/0 0/0 {wifi.fispy.mx} "GET >>> /captive-portal?ac%2Dip=10%2E7%2E255%2E2&userip=10%2E9%2E70%2E173&ssid=FISPY%2DWiFi&ap%2Dmac=f02f4b1467d9 >>> HTTP/1.1" >>> >>> >>> If we do not specify the URL on this configuration, where would >>> PacketFence get the value for the AC Web Authentication call? >>> >>> >>> https://portal.fispy.mx:8443/login?username=($username)&password=($password) >>> >>> Best Regards, >>> Jorge >>> >>> On Feb 5, 2022, at 8:23 PM, Fabrice Durand <oeufd...@gmail.com> wrote: >>> >>> Hello Jorge, >>> >>> what we need is the user mac and the ap information. >>> I found that >>> https://support.huawei.com/enterprise/en/doc/EDOC1100008283/659354b1/display-url-template >>> >>> Is it possible to add extra parameters like user-mac ssid ap-ip ap-mac ? >>> >>> And if yes can you provide me the url generated by the controller when >>> it redirect ? (haproxy-portal log) >>> >>> Regards >>> Fabrice >>> >>> >>> >>> Le sam. 5 févr. 2022 à 20:42, Jorge Nolla <jno...@gmail.com> a écrit : >>> >>>> Hi Team, >>>> >>>> Any input on this? We really would like to get this to work. >>>> >>>> Thank you! >>>> Jorge >>>> >>>> On Feb 2, 2022, at 7:48 PM, Jorge Nolla <jno...@gmail.com> wrote: >>>> >>>> Hi Fabrice, >>>> >>>> This is the sequence: >>>> >>>> Feb 2 14:51:32 wifi haproxy[2427]: 10.9.79.52:61132 >>>> [02/Feb/2022:14:51:32.663] portal-http-10.0.255.99 10.0.255.99-backend/ >>>> 127.0.0.1 0/0/0/201/201 200 7146 - - ---- 3/1/0/0/0 0/0 {wifi.fispy.mx} >>>> "GET /access?lang= HTTP/1.1" >>>> Feb 2 14:51:37 wifi haproxy[2427]: 10.9.79.52:61133 >>>> [02/Feb/2022:14:51:37.905] portal-http-10.0.255.99 static/127.0.0.1 >>>> 0/0/0/2/2 200 228 - - ---- 4/2/0/0/0 0/0 {10.0.255.99} "GET >>>> /common/network-access-detection.gif?r=1643838705224 HTTP/1.1" >>>> Feb 2 14:51:44 wifi haproxy[2427]: 10.9.79.52:61130 >>>> [02/Feb/2022:14:51:43.927] portal-https-10.0.255.99~ 10.0.255.99-backend/ >>>> 127.0.0.1 0/0/0/122/122 302 1018 - - ---- 4/1/0/0/0 0/0 {wifi.fispy.mx} >>>> "GET >>>> /captive-portal?switch%5Furl=https%3A%2F%2Fportal%2Efispy%2Emx%3A8443%2Flogin >>>> HTTP/1.1" >>>> Feb 2 14:51:44 wifi haproxy[2427]: 10.9.79.52:61132 >>>> [02/Feb/2022:14:51:44.060] portal-http-10.0.255.99 10.0.255.99-backend/ >>>> 127.0.0.1 0/0/0/129/129 200 7146 - - ---- 4/2/0/0/0 0/0 {wifi.fispy.mx} >>>> "GET /access?lang= HTTP/1.1" >>>> Feb 2 14:51:49 wifi haproxy[2427]: 10.9.79.52:61133 >>>> [02/Feb/2022:14:51:49.219] portal-http-10.0.255.99 static/127.0.0.1 >>>> 0/0/0/1/1 200 228 - - ---- 4/2/0/0/0 0/0 {10.0.255.99} "GET >>>> /common/network-access-detection.gif?r=1643838716546 HTTP/1.1" >>>> Feb 2 14:51:55 wifi haproxy[2427]: 10.9.79.52:61130 >>>> [02/Feb/2022:14:51:55.287] portal-https-10.0.255.99~ 10.0.255.99-backend/ >>>> 127.0.0.1 0/0/0/136/136 302 1018 - - ---- 4/1/0/0/0 0/0 {wifi.fispy.mx} >>>> "GET >>>> /captive-portal?switch%5Furl=https%3A%2F%2Fportal%2Efispy%2Emx%3A8443%2Flogin >>>> HTTP/1.1” >>>> >>>> >>>> >>>> On Feb 2, 2022, at 7:12 PM, Fabrice Durand <oeufd...@gmail.com> wrote: >>>> >>>> Hello Jorge, >>>> >>>> i will have a look closer. >>>> But i have a question, when the device is forwarded to the captive >>>> portal, (just before >>>> https://wifi.fispy.mx/captive-portal?switch%5Furl=https%3A%2F%2Fportal%2Efispy%2Emx%3A8443%2Flogin >>>> <https://wifi.fispy.mx/captive-portal?switch_url=https://portal.fispy.mx:8443/login>) >>>> , what is the url ? >>>> You should be able to see it in the haproxy-portal.log file. >>>> >>>> Regards >>>> Fabrice >>>> >>>> Le mer. 2 févr. 2022 à 10:18, Jorge Nolla <jno...@gmail.com> a écrit : >>>> >>>>> Hi Fabrice, >>>>> >>>>> >>>>> We almost have the configuration working, but are not sure how to get >>>>> the redirect to the client to work correctly. Attached is the >>>>> documentation >>>>> for Cisco ISE which we used for PacketFence as well. >>>>> >>>>> Portal.fispy.mx <http://portal.fispy.mx/> is the Huawei AC. >>>>> >>>>> This is the format the client should get from PacketFence. This is the >>>>> only piece we are missing for this to work. >>>>> >>>>> https://portal.fispy.mx:8443/login?username=($username)&password=($password) >>>>> >>>>> >>>>> If we manually click on the link above, then the flow of traffic works >>>>> correctly CLIENT > AC > RADIUS (PacketFence), and authentication works. >>>>> The >>>>> problem is that when the user logs in to the portal the redirect is >>>>> broken. >>>>> The parameter for the redirect that PacketFence is serving, comes from a >>>>> configuration parameter within the AC. This configuration works fine for >>>>> Cisco ISE, but the URL format is not working for PacketFence. >>>>> >>>>> >>>>> When we configure the redirect this is what the client is getting from >>>>> PacketFence >>>>> >>>>> https://wifi.fispy.mx/captive-portal?switch%5Furl=https%3A%2F%2Fportal%2Efispy%2Emx%3A8443%2Flogin >>>>> >>>>> >>>>> url-template name PacketFence >>>>> url https://wifi.fispy.mx/captive-portal >>>>> url-parameter login-url switch_url https://portal.fispy.mx:8443/login >>>>> <<< THIS IS THE PARAMETER FOR THE REDIRECT TO PACKETFENCE >>>>> >>>>> >>>>> >>>>> AC CONFIG >>>>> >>>>> authentication-profile name PacketFence >>>>> portal-access-profile PacketFence >>>>> free-rule-template default_free_rule >>>>> authentication-scheme PacketFence >>>>> accounting-scheme PacketFence >>>>> radius-server PacketFence >>>>> force-push url https://www.fispy.mx >>>>> >>>>> radius-server template PacketFence >>>>> radius-server shared-key cipher %^%#*)l=:1.X-Yd$\<~orEF@ >>>>> ]<}NMejv3)E^\6;7:NUY%^%# >>>>> radius-server authentication 10.0.255.99 1812 source ip-address >>>>> 10.7.255.2 weight 90 >>>>> radius-server accounting 10.0.255.99 1813 source ip-address >>>>> 10.7.255.2 weight 80 >>>>> undo radius-server user-name domain-included >>>>> calling-station-id mac-format unformatted >>>>> called-station-id wlan-user-format ac-mac >>>>> radius-server attribute translate >>>>> radius-attribute disable HW-NAS-Startup-Time-Stamp send >>>>> radius-attribute disable HW-IP-Host-Address send >>>>> radius-attribute disable HW-Connect-ID send >>>>> radius-attribute disable HW-Version send >>>>> radius-attribute disable HW-Product-ID send >>>>> radius-attribute disable HW-Domain-Name send >>>>> radius-attribute disable HW-User-Extend-Info send >>>>> >>>>> url-template name PacketFence >>>>> url https://wifi.fispy.mx/captive-portal >>>>> url-parameter login-url switch_url https://portal.fispy.mx:8443/login >>>>> <<< THIS IS THE PARAMETER FOR THE REDIRECT TO PACKETFENCE >>>>> >>>>> web-auth-server PacketFence >>>>> server-ip 10.0.255.99 >>>>> port 443 >>>>> url-template PacketFence >>>>> protocol http >>>>> http get-method enable >>>>> >>>>> portal-access-profile name PacketFence >>>>> web-auth-server PacketFence direct >>>>> >>>>> >>>>> authentication-scheme PacketFence >>>>> authentication-mode radius >>>>> >>>>> wlan >>>>> security-profile name FISPY-WiFi >>>>> >>>>> vap-profile name FISPY-WiFi >>>>> service-vlan vlan-id 900 >>>>> permit-vlan vlan-id 900 >>>>> ssid-profile FISPY-WiFi >>>>> security-profile FISPY-WiFi >>>>> authentication-profile PacketFence >>>>> sta-network-detect disable >>>>> service-experience-analysis enable >>>>> mdns-snooping enable >>>>> >>>>> >>>>> >>>>> >>>>> ###CISCO ISE CONFIG TO COMPARE### >>>>> >>>>> url-template name CISCO-ISE >>>>> url >>>>> https://captive.fispy.mx:8443/portal/PortalSetup.action#portal=7cf5ac1d-5dbf-4b36-aeee-b9590fd24c02 >>>>> parameter start-mark # >>>>> url-parameter login-url switch_url https://portal.fispy.mx:8443/login >>>>> >>>>> #################################### >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> On Feb 2, 2022, at 6:17 AM, Fabrice Durand <oeufd...@gmail.com> wrote: >>>>> >>>>> Hello Jorge, >>>>> >>>>> do you have any Huawei documentation to implement that ? >>>>> >>>>> Regards >>>>> Fabrice >>>>> >>>>> >>>>> Le mer. 26 janv. 2022 à 15:59, Jorge Nolla via PacketFence-users < >>>>> packetfence-users@lists.sourceforge.net> a écrit : >>>>> >>>>>> Hi Team, >>>>>> >>>>>> We were wondering if anyone has had any success in configuring Web >>>>>> Auth for the Huawei AC? It’s somewhat critical for us to get this going. >>>>>> >>>>>> Thank you! >>>>>> Jorge >>>>>> >>>>>> _______________________________________________ >>>>>> PacketFence-users mailing list >>>>> >>>>> PacketFence-users@lists.sourceforge.net >>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>> >>>>> >>>>> >>>>> >>>>> >>>> >>>> >>> >>> >>> >> > > > > >
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users