what kind of authentication source you use to authenticate ?

Le ven. 11 févr. 2022 à 16:05, Jorge Nolla <jno...@gmail.com> a écrit :

> Hi Fabrice,
>
> I did try $username, but it returns the DEFAULT username and not the
> actual username which was used to register the device with in the portal.
>
>
> On Feb 11, 2022, at 2:02 PM, Fabrice Durand <oeufd...@gmail.com> wrote:
>
> Hello Jorge,
>
> you can try that:
>
> https://github.com/inverse-inc/packetfence/commit/e99698c955d596b6d04ef52c64a7aadc21f34e47
> Regards
> Fabrice
>
>
> Le ven. 11 févr. 2022 à 12:04, Jorge Nolla <jno...@gmail.com> a écrit :
>
>> Hi Fabrice,
>>
>> This is the last step for us to get this working, any thoughts?
>>
>> Thank you!
>> Jorge
>>
>> On Feb 10, 2022, at 6:05 PM, Jorge Nolla <jno...@gmail.com> wrote:
>>
>> Fabrice,
>>
>> With this configuration it seems PF is not doing any accounting, probably
>> because it is expecting the username to be the Mac.
>>
>>
>> On Feb 10, 2022, at 4:57 PM, Jorge Nolla <jno...@gmail.com> wrote:
>>
>> Fabrice,
>>
>> Looking at the reply of the Billing server to packet fence, it did not
>> accept the username and password. If we hardcode the username and password
>> instead of the $Mac then it works:
>>
>>
>>  my $html_form = qq[
>>       <form name="weblogin_form" data-autosubmit="1000" method="GET"
>> action="https://portal.fispy.mx:8443/login";>
>>        <input type="hidden" name="username" value="5blz”> username
>> entered in the web portal we need to dynamically pass this value <<<
>>        <input type="hidden" name="password" value="21pu”> password
>> entered in the web portal we need to dynamically pass this value <<<
>>       </form>
>>       <script src="/content/autosubmit.js"
>> type="text/javascript"></script>
>>
>>
>> RADIUS Request
>> User-Name = "5blz"
>> User-Password = "******"
>> NAS-IP-Address = 10.7.255.2
>> NAS-Port = 900
>> Service-Type = Framed-User
>> Framed-Protocol = PPP
>> Framed-IP-Address = 10.9.129.39
>> Called-Station-Id = "c0:f6:c2:a5:c4:d0:FISPY-WiFi"
>> Calling-Station-Id = "f0:2f:4b:14:67:d9"
>> NAS-Identifier = "AirEngine9700-M1"
>> NAS-Port-Type = Wireless-802.11
>> Acct-Session-Id = "AirEngi0000000000090012ad34060020d"
>> Event-Timestamp = "Feb 10 2022 16:49:02 MST"
>> NAS-Port-Id = "slot=0;subslot=0;port=0;vlanid=900"
>> Huawei-Connect-ID = 393741
>> Huawei-Startup-Stamp = 1643301831
>> Huawei-IPHost-Addr = "10.9.129.39 f0:2f:4b:14:67:d9"
>> Huawei-Loopback-Address = "C0F6-C2A5-C4D0"
>> Huawei-User-Mac = "\000\000\000\003"
>> Huawei-Version = "Huawei AirEngine9700-M1"
>> Huawei-Product-ID = "AC"
>> Stripped-User-Name = "5blz"
>> Realm = "null"
>> Realm = "null"
>> FreeRADIUS-Client-IP-Address = 10.7.255.2
>> Called-Station-SSID = "FISPY-WiFi"
>> PacketFence-KeyBalanced = "aa86741e358fa86079a91aaf4dc581f9"
>> PacketFence-Radius-Ip = "10.0.255.99"
>> SQL-User-Name = "5blz"
>>
>>
>> RADIUS Reply
>> Acct-Interim-Interval = 60
>> REST-HTTP-Status-Code = 200
>>
>>
>>
>>
>> On Feb 10, 2022, at 3:51 PM, Jorge Nolla <jno...@gmail.com> wrote:
>>
>> I’m no radius expert so I do apologize. I do see the request being
>> accepted by the billing server with the MAC as username. Not sure how what
>> gets translated, as there are no records of that Mac address configured on
>> the billing server.
>>
>>
>> 2022-02-10 15:44:22.487982 (109) Access-Request Id 170 any:
>> 10.0.255.99:47364 -> 10.0.254.100:1812 +122.837
>> User-Name = "f0:2f:4b:14:67:d9"
>> User-Password =
>> "O\031\222\341p͑\256O\376N\260*CY\035\360\337\370\373x\313\036\004\267}&>\006g\3220"
>> NAS-IP-Address = 10.7.255.2
>> NAS-Port = 900
>> Service-Type = Framed-User
>> Framed-Protocol = PPP
>> Framed-IP-Address = 10.9.215.255
>> Called-Station-Id = "c0:f6:c2:a5:c4:d0:FISPY-WiFi"
>> Calling-Station-Id = "f0:2f:4b:14:67:d9"
>> NAS-Identifier = "AirEngine9700-M1"
>> Proxy-State = 0x3937
>> NAS-Port-Type = Wireless-802.11
>> Acct-Session-Id = "AirEngi000000000009008e8f160600201"
>> Event-Timestamp = "Feb 10 2022 15:44:22 MST"
>> Message-Authenticator = 0x3f20f75cc25e65a3f6d4a928de8644fe
>> NAS-Port-Id = "slot=0;subslot=0;port=0;vlanid=900"
>> Huawei-Connect-ID = 393729
>> Huawei-Startup-Stamp = 1643301831
>> Huawei-IPHost-Addr = "10.9.215.255 f0:2f:4b:14:67:d9"
>> Huawei-Loopback-Address = "C0F6-C2A5-C4D0"
>> Huawei-User-Mac = "\000\000\000\003"
>> Huawei-Version = "Huawei AirEngine9700-M1"
>> Huawei-Product-ID = "AC"
>> Attr-26.29464.33 = 0x31302e302e3235352e3939
>> Attr-26.29464.32 =
>> 0x3165623139616265663234666132396334383731346130343334323334323936
>> Authenticator-Field = 0x337490bc1555238aad909eb52234a42e
>> 2022-02-10 15:44:22.504685 (110) Access-Accept Id 170 any:
>> 10.0.255.99:47364 <- 10.0.254.100:1812 +122.854 +0.016
>> Framed-IP-Address = 10.250.68.42
>> Session-Timeout = 299
>> Proxy-State = 0x3937
>> Authenticator-Field = 0xd5a830666d0bc44b13654de6c615f3a0
>>
>>
>>
>>
>> On Feb 10, 2022, at 2:45 PM, Jorge Nolla <jno...@gmail.com> wrote:
>>
>> Here is the start of the accounting. Still the billing server is looking
>> for the username which was used to login, not the MAC.
>>
>> 2022-02-10 14:40:59.155697 (5169) Accounting-Request Id 59 any:
>> 10.0.255.99:48071 -> 10.0.254.100:1813 +68.397
>> User-Name = "f0:2f:4b:14:67:d9"
>> NAS-IP-Address = 10.7.255.2
>> NAS-Port = 900
>> Service-Type = Framed-User
>> Framed-Protocol = PPP
>> Framed-IP-Address = 10.9.149.208
>> Called-Station-Id = "c0:f6:c2:a5:c4:d0:FISPY-WiFi"
>> Calling-Station-Id = "f0:2f:4b:14:67:d9"
>> NAS-Identifier = "AirEngine9700-M1"
>> Proxy-State = 0x313939
>> NAS-Port-Type = Wireless-802.11
>> Acct-Status-Type = Start
>> Acct-Delay-Time = 0
>> Acct-Session-Id = "AirEngi000000000009008391da06001f8"
>> Acct-Authentic = RADIUS
>> Event-Timestamp = "Feb 10 2022 14:40:58 MST"
>> NAS-Port-Id = "slot=0;subslot=0;port=0;vlanid=900"
>> Huawei-Connect-ID = 393720
>> Huawei-IPHost-Addr = "10.9.149.208 f0:2f:4b:14:67:d9"
>> Huawei-Loopback-Address = "C0F6-C2A5-C4D0"
>> Huawei-User-Mac = "\000\000\000\003"
>> Attr-26.29464.32 =
>> 0x3165623139616265663234666132396334383731346130343334323334323936
>> Authenticator-Field = 0x72352a9f7ff652f7e6a7c20a62ee551b
>>
>> On Feb 10, 2022, at 11:44 AM, Jorge Nolla <jno...@gmail.com> wrote:
>>
>> Fabrice,
>>
>> PF is sending the accounting data to the billing server. The problem is
>> the info does not match:
>>
>> PF: 10.0.255.99
>> Billing server (Splynx): 10.0.254.100
>>
>>
>>
>> 2022-02-10 11:39:32.968605 (12417) Accounting-Request Id 80 any:
>> 10.0.255.99:54246 -> 10.0.254.100:1813 +165.413
>>
>> User-Name = "f0:2f:4b:14:67:d9” << this needs to be the username entered
>> in the portal and not the MAC of the device of this to work. How can we
>> modify this?
>> NAS-IP-Address = 10.7.255.2
>> NAS-Port = 900
>> Service-Type = Framed-User
>> Framed-Protocol = PPP
>> Framed-IP-Address = 10.9.120.192
>> Called-Station-Id = "c0:f6:c2:a5:c4:d0:FISPY-WiFi"
>> Calling-Station-Id = "f0:2f:4b:14:67:d9"
>> NAS-Identifier = "AirEngine9700-M1"
>> Proxy-State = 0x313734
>> NAS-Port-Type = Wireless-802.11
>> Acct-Status-Type = Stop
>> Acct-Delay-Time = 0
>> Acct-Input-Octets = 432779
>> Acct-Output-Octets = 22133343
>> Acct-Session-Id = "AirEngi000000000009001d099206001ed"
>> Acct-Authentic = RADIUS
>> Acct-Session-Time = 299
>> Acct-Input-Packets = 2643
>> Acct-Output-Packets = 16634
>> Acct-Terminate-Cause = Session-Timeout
>> Acct-Input-Gigawords = 0
>> Acct-Output-Gigawords = 0
>> Event-Timestamp = "Feb 10 2022 11:39:32 MST"
>> NAS-Port-Id = "slot=0;subslot=0;port=0;vlanid=900"
>> Huawei-Connect-ID = 393709
>> Huawei-IPHost-Addr = "10.9.120.192 f0:2f:4b:14:67:d9"
>> Huawei-Loopback-Address = "C0F6-C2A5-C4D0"
>> Huawei-User-Mac = "\000\000\000\003"
>> Attr-26.29464.32 =
>> 0x3165623139616265663234666132396334383731346130343334323334323936
>> Authenticator-Field = 0xb28b0b1cdf553d1c27a431568347fc4b
>>
>>
>>
>>
>> On Feb 9, 2022, at 6:12 PM, Jorge Nolla <jno...@gmail.com> wrote:
>>
>> Hi Fabrice,
>>
>> This is the output when It receives an accounting message from the
>> controller:
>>
>>
>> ^C[root@wifi jnolla]# radsniff -i any -f "port 1813" -x
>> Logging all events
>> Sniffing on (any)
>> 2022-02-09 18:10:33.642001 (1) Accounting-Request Id 147 any:
>> 10.7.255.2:62395 -> 10.0.255.99:1813 +0.000
>>         User-Name = "62:ca:49:92:a0:3d"
>>         NAS-IP-Address = 10.7.255.2
>>         NAS-Port = 900
>>         Service-Type = Framed-User
>>         Framed-Protocol = PPP
>>         Framed-IP-Address = 10.9.239.159
>>         Called-Station-Id = "C0-F6-C2-A5-C4-D0:FISPY-WiFi"
>>         Calling-Station-Id = "62ca-4992-a03d"
>>         NAS-Identifier = "AirEngine9700-M1"
>>         NAS-Port-Type = Wireless-802.11
>>         Acct-Status-Type = Interim-Update
>>         Acct-Delay-Time = 0
>>         Acct-Input-Octets = 131762920
>>         Acct-Output-Octets = 194531281
>>         Acct-Session-Id = "AirEngi0000000000090083f40606001b4"
>>         Acct-Authentic = RADIUS
>>         Acct-Session-Time = 33887
>>         Acct-Input-Packets = 211695
>>         Acct-Output-Packets = 221103
>>         Acct-Input-Gigawords = 0
>>         Acct-Output-Gigawords = 0
>>         Event-Timestamp = "Feb  9 2022 18:10:32 MST"
>>         NAS-Port-Id = "slot=0;subslot=0;port=0;vlanid=900"
>>         Huawei-Loopback-Address = "C0F6-C2A5-C4D0"
>>         Huawei-User-Mac = "\000\000\000\003"
>>         Authenticator-Field = 0x86cc68cf43a59904f7d3c0e36e910008
>> 2022-02-09 18:10:33.661871 (2) Accounting-Response Id 147 any:
>> 10.7.255.2:62395 <- 10.0.255.99:1813 +0.019 +0.019
>>         Reply-Message = "Accounting ok"
>>         Authenticator-Field = 0xdfccea5174f4312f6e0784825583dbdf
>> 2022-02-09 18:10:38.861871 (1) Cleaning up request packet ID 147
>> 2022-02-09 18:10:49.323597 (3) Accounting-Request Id 148 any:
>> 10.7.255.2:62395 -> 10.0.255.99:1813 +15.681
>>         User-Name = "62:ca:49:92:a0:3d"
>>         NAS-IP-Address = 10.7.255.2
>>         NAS-Port = 900
>>         Service-Type = Framed-User
>>         Framed-Protocol = PPP
>>         Framed-IP-Address = 10.9.239.159
>>         Called-Station-Id = "C0-F6-C2-A5-C4-D0:FISPY-WiFi"
>>         Calling-Station-Id = "62ca-4992-a03d"
>>         NAS-Identifier = "AirEngine9700-M1"
>>         NAS-Port-Type = Wireless-802.11
>>         Acct-Status-Type = Interim-Update
>>         Acct-Delay-Time = 0
>>         Acct-Input-Octets = 131775665
>>         Acct-Output-Octets = 194533397
>>         Acct-Session-Id = "AirEngi0000000000090083f40606001b4"
>>         Acct-Authentic = RADIUS
>>         Acct-Session-Time = 33902
>>         Acct-Input-Packets = 211773
>>         Acct-Output-Packets = 221123
>>         Acct-Input-Gigawords = 0
>>         Acct-Output-Gigawords = 0
>>         Event-Timestamp = "Feb  9 2022 18:10:48 MST"
>>         NAS-Port-Id = "slot=0;subslot=0;port=0;vlanid=900"
>>         Huawei-Loopback-Address = "C0F6-C2A5-C4D0"
>>         Huawei-User-Mac = "\000\000\000\003"
>>         Authenticator-Field = 0x3fbec8864dcb325273ce4ba1da28e690
>> 2022-02-09 18:10:49.342798 (4) Accounting-Response Id 148 any:
>> 10.7.255.2:62395 <- 10.0.255.99:1813 +15.700 +0.019
>>         Reply-Message = "Accounting ok"
>>         Authenticator-Field = 0x15b54405e404decb5b3db3f58cc8d2cb
>> 2022-02-09 18:10:54.542798 (3) Cleaning up request packet ID 148
>>
>>
>>
>>
>> On Feb 9, 2022, at 6:04 PM, Fabrice Durand <oeufd...@gmail.com> wrote:
>>
>> You have to restart pfacct and radiusd-acct.
>>
>> And check the accounting packet, not sure you have the realm in the
>> username attribute.
>>
>> raddebug -f /usr/local/pf/var/run/radiusd-acct.sock -t 300
>> or
>> radsniff -i any -f "port 1813" -x
>>
>> Regards
>> Fabrice
>>
>> Le mer. 9 févr. 2022 à 19:57, Jorge Nolla <jno...@gmail.com> a écrit :
>>
>>> I noticed pfacct running and made the change, still no luck.
>>>
>>> <Screen Shot 2022-02-09 at 5.56.32 PM.png>
>>>
>>> On Feb 9, 2022, at 5:55 PM, Fabrice Durand <oeufd...@gmail.com> wrote:
>>>
>>> Hello Jorge,
>>> you have to enable radius-acct service.
>>>
>>> It´s radius-acct who is able to proxy the request to another server, not
>>> pfacct (btw you can keep it enabled).
>>>
>>> Regards
>>> Fabrice
>>>
>>>
>>> Le mer. 9 févr. 2022 à 19:21, Jorge Nolla <jno...@gmail.com> a écrit :
>>>
>>>>
>>>> Another configuration file with references to the billing server Splynx:
>>>>
>>>> [root@wifi raddb]# cat mods-config/perl/multi_domain_constants.pm
>>>> package multi_domain_constants;
>>>>
>>>> our $VAR1 = {
>>>>           '1' => {
>>>>                    'ConfigRealm' => {
>>>>                                       'local' => {
>>>>
>>>>  'radius_strip_username' => 'disabled',
>>>>                                                    'eap' => 'default',
>>>>
>>>>  'admin_strip_username' => 'disabled',
>>>>
>>>>  'portal_strip_username' => 'disabled'
>>>>                                                  },
>>>>                                       'default' => {
>>>>
>>>>  'radius_acct_proxy_type' => 'load-balance',
>>>>
>>>>  'radius_auth_compute_in_pf' => 'disabled',
>>>>
>>>>  'eduroam_radius_auth_proxy_type' => 'keyed-balance',
>>>>
>>>>  'radius_auth_proxy_type' => 'keyed-balance',
>>>>
>>>>  'portal_strip_username' => 'disabled',
>>>>
>>>>  'admin_strip_username' => 'disabled',
>>>>                                                      'radius_auth' =>
>>>> '',
>>>>
>>>>  'radius_strip_username' => 'disabled',
>>>>                                                      'eap' => 'default',
>>>>
>>>>  'eduroam_radius_acct' => '',
>>>>
>>>>  'eduroam_radius_acct_proxy_type' => 'load-balance',
>>>>
>>>>  'permit_custom_attributes' => 'disabled',
>>>>
>>>>  'eduroam_radius_auth_compute_in_pf' => 'enabled',
>>>>
>>>>  'eduroam_radius_auth' => '',
>>>>                                                      'radius_acct' => ''
>>>>                                                    },
>>>>                                       'null' => {
>>>>                                                   'eap' => 'default',
>>>>
>>>> 'radius_strip_username' => 'disabled',
>>>>
>>>> 'admin_strip_username' => 'disabled',
>>>>
>>>> 'portal_strip_username' => 'disabled'
>>>>                                                 },
>>>>                                       'fispy.mx' => {
>>>>
>>>> 'eduroam_radius_acct' => '',
>>>>                                                       'eap' =>
>>>> 'default',
>>>>
>>>> 'radius_strip_username' => 'enabled',
>>>>
>>>> 'admin_strip_username' => 'enabled',
>>>>                                                       'radius_auth' =>
>>>> 'Splynx',
>>>>
>>>> 'portal_strip_username' => 'enabled',
>>>>
>>>> 'eduroam_radius_auth_proxy_type' => 'keyed-balance',
>>>>
>>>> 'radius_auth_proxy_type' => 'keyed-balance',
>>>>
>>>> 'radius_acct_proxy_type' => 'load-balance',
>>>>
>>>> 'radius_auth_compute_in_pf' => 'enabled',
>>>>
>>>> 'eduroam_radius_auth' => '',
>>>>                                                       'radius_acct' =>
>>>> 'Splynx',
>>>>
>>>> 'eduroam_radius_auth_compute_in_pf' => 'enabled',
>>>>
>>>> 'eduroam_radius_acct_proxy_type' => 'load-balance',
>>>>
>>>> 'permit_custom_attributes' => 'disabled'
>>>>                                                     }
>>>>                                     },
>>>>                    'ConfigDomain' => {},
>>>>                    'ConfigOrderedRealm' => [
>>>>                                              'default',
>>>>                                              'local',
>>>>                                              'null',
>>>>                                              'fispy.mx'
>>>>                                            ]
>>>>                  },
>>>>           '0' => {
>>>>                    'ConfigDomain' => {},
>>>>                    'ConfigRealm' => {},
>>>>                    'ConfigOrderedRealm' => []
>>>>                  }
>>>>         };
>>>> our $DATA = $VAR1;
>>>> 1;
>>>> [root@wifi raddb]#
>>>>
>>>>
>>>>
>>>> On Feb 9, 2022, at 5:19 PM, Jorge Nolla <jno...@gmail.com> wrote:
>>>>
>>>> Hi Team,
>>>>
>>>> Still can’t get accounting to proxy to the billing server. I don’t see
>>>> the configuration on the proxy.conf so I imagine is pulling from this file.
>>>>
>>>>
>>>> [root@wifi raddb]# cat proxy.conf.inc
>>>> # This file is generated from a template at
>>>> /usr/local/pf/conf/radiusd/proxy.conf.inc
>>>> # Any changes made to this file will be lost on restart
>>>>
>>>> # Eduroam integration is not configured
>>>>
>>>> realm default {
>>>>
>>>> }
>>>> realm local {
>>>>
>>>> }
>>>> realm null {
>>>>
>>>> }
>>>> realm fispy.mx {
>>>>
>>>> auth_pool = auth_pool_fispy.mx
>>>> acct_pool = acct_pool_fispy.mx
>>>> }
>>>> home_server_pool auth_pool_fispy.mx {
>>>> type = keyed-balance
>>>> home_server = Splynx
>>>> }
>>>>
>>>> home_server_pool acct_pool_fispy.mx {
>>>> type = load-balance
>>>> home_server = Splynx
>>>> }
>>>>
>>>>
>>>> realm eduroam.default {
>>>>
>>>> }
>>>>
>>>> realm eduroam.local {
>>>>
>>>> }
>>>>
>>>> realm eduroam.null {
>>>>
>>>> }
>>>>
>>>> realm eduroam.fispy.mx {
>>>>
>>>> }
>>>>
>>>>
>>>>
>>>>
>>>> home_server Splynx {
>>>> ipaddr = 10.0.254.100
>>>> port = 1812
>>>> secret = @Put@Madr3
>>>> type = auth+acct
>>>> status_check = status-server
>>>> }
>>>>
>>>>
>>>>
>>>> # pfacct configuration
>>>>
>>>> realm pfacct {
>>>>     acct_pool = pfacct_pool
>>>>     nostrip
>>>> }
>>>>
>>>> home_server_pool pfacct_pool {
>>>>     home_server = pfacct_local
>>>> }
>>>>
>>>> home_server pfacct_local {
>>>>     type = acct
>>>>     ipaddr = 127.0.0.1
>>>>     port = 1813
>>>>     secret = 'ZDQ3YzUzMjkxM2M1NjBhM2IyMTJjNWE0'
>>>>     src_ipaddr = 10.0.255.99
>>>> }
>>>>
>>>> On Feb 8, 2022, at 11:51 AM, Jorge Nolla <jno...@gmail.com> wrote:
>>>>
>>>> Fabrice,
>>>>
>>>> For some reason I cannot get accounting forwarding to the
>>>> Billing/Radius Server. This server has the plans for the customers.
>>>>
>>>> <Screen Shot 2022-02-08 at 11.48.23 AM.png>
>>>>
>>>>
>>>> <Screen Shot 2022-02-08 at 11.50.20 AM.png>
>>>>
>>>>
>>>> <Screen Shot 2022-02-08 at 11.48.01 AM.png>
>>>>
>>>>
>>>> <Screen Shot 2022-02-08 at 11.51.33 AM.png>
>>>>
>>>> On Feb 8, 2022, at 11:39 AM, Jorge Nolla <jno...@gmail.com> wrote:
>>>>
>>>> Hi Fabrice,
>>>>
>>>> It worked. I had to change to HTTPS and DNS for the cert on the server
>>>> to work. We also changed the method to GET. Will try POST, not sure if this
>>>> will make a difference.
>>>>
>>>>  my $html_form = qq[
>>>>       <form name="weblogin_form" data-autosubmit="1000" method="GET"
>>>> action="https://portal.fispy.mx:8443/login";>
>>>>        <input type="hidden" name="username" value="$mac">
>>>>        <input type="hidden" name="password" value="$mac">
>>>>       </form>
>>>>       <script src="/content/autosubmit.js"
>>>> type="text/javascript"></script>
>>>>
>>>> Here is the a sample of the radius info on PF. Top entry is with new
>>>> configuration MAC address as username. Bottom one is the old configuration,
>>>> where we were submitting the url request manually.
>>>>
>>>> <Screen Shot 2022-02-08 at 11.34.52 AM.png>
>>>>
>>>>
>>>> On Feb 8, 2022, at 9:30 AM, Fabrice Durand <oeufd...@gmail.com> wrote:
>>>>
>>>> Yes, that's it.
>>>>
>>>> Le mar. 8 févr. 2022 à 11:23, Jorge Nolla <jno...@gmail.com> a écrit :
>>>>
>>>>> Fabrice,
>>>>>
>>>>> The document you had provided didn’t layout the configuration steps. I
>>>>> think this might be the correct document for the configuration you are
>>>>> referring. If you have a chance take a look and let me know.
>>>>>
>>>>> https://support.huawei.com/enterprise/mx/knowledge/EKB1100055064
>>>>>
>>>>>
>>>>>
>>>>> On Feb 8, 2022, at 9:14 AM, Fabrice Durand <oeufd...@gmail.com> wrote:
>>>>>
>>>>> You can try that instead:
>>>>>
>>>>>         my $html_form = qq[
>>>>>         <form name="weblogin_form" data-autosubmit="1000"
>>>>> method="POST" action="http://$controller_ip:8443/login";>
>>>>>             <input type="hidden" name="username" value="$mac">
>>>>>             <input type="hidden" name="password" value="$mac">
>>>>>         </form>
>>>>>         <script src="/content/autosubmit.js"
>>>>> type="text/javascript"></script>
>>>>>     ];
>>>>>
>>>>> It will pass the mac address of the device in the radius request as
>>>>> username and password instead of the real username and password who has
>>>>> been authenticated previously on the portal.
>>>>> Then you just need to configure the registration role in the switch
>>>>> configuration to be -1 (packetfence side) and if the device is unreg then
>>>>> the request will be rejected.
>>>>>
>>>>>
>>>>> Le mar. 8 févr. 2022 à 11:04, Jorge Nolla <jno...@gmail.com> a écrit :
>>>>>
>>>>>> Hi Fabrice,
>>>>>>
>>>>>> Let me check what the difference is in configuration on the AC side,
>>>>>> I’ll report within the hour. Any clues as to why the parameters are not
>>>>>> being passed?
>>>>>>
>>>>>>
>>>>>> On Feb 8, 2022, at 8:55 AM, Fabrice Durand <oeufd...@gmail.com>
>>>>>> wrote:
>>>>>>
>>>>>> Hello Jorge,
>>>>>>
>>>>>> i really think that it´s not the correct way to support the web auth
>>>>>> in Huawei.
>>>>>> The only thing you can do with the portal is to authenticate with a
>>>>>> username and password, there is no way to do anything else
>>>>>> (sms/email/sponsor/....).
>>>>>>
>>>>>> Also when you authenticate on the portal , the portal validate your
>>>>>> username and password and with the workflow you have it will authenticate
>>>>>> twice (portal and radius) and it doesn´t make sense.
>>>>>>
>>>>>> So if you want to keep this way then you will need a simple html page
>>>>>> with a username and password field that post on
>>>>>> https://portal.fispy.mx:8443/login then configure packetfence to
>>>>>> authenticate the username and password from radius.
>>>>>>
>>>>>> The other way who looks really better is to use that: (
>>>>>> https://support.huawei.com/enterprise/en/doc/EDOC1100008282/4d5793da/understanding-nac#dc_cfg_nac_2006u_1_2
>>>>>> )
>>>>>>
>>>>>> <download.png>
>>>>>>
>>>>>> As i said , it´s exactly how it works with the cisco wlc and it will
>>>>>> support all authentication mechanisms available on the portal.
>>>>>>
>>>>>> Regards
>>>>>> Fabrice
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>> Le lun. 7 févr. 2022 à 20:25, Jorge Nolla <jno...@gmail.com> a
>>>>>> écrit :
>>>>>>
>>>>>>>
>>>>>>> Radius request from the AC once it receives the correct values. This
>>>>>>> is sent back to Radius which in this case is PF
>>>>>>>
>>>>>>> User-Name = “5blz” *<<< VALUE NEEDED IN URL as username*
>>>>>>> User-Password = "******” *<<< VALUE NEEDED IN URL as password*
>>>>>>> NAS-IP-Address = 10.7.255.2 NAS-Port = 900 Service-Type = Framed-User
>>>>>>> Framed-Protocol = PPP Framed-IP-Address = 10.9.91.31 Called-Station-Id =
>>>>>>> "c0:f6:c2:a5:c4:d0:FISPY-WiFi" Calling-Station-Id = "f0:2f:4b:14:67:d9"
>>>>>>> NAS-Identifier = "AirEngine9700-M1" NAS-Port-Type = Wireless-802.11
>>>>>>> Acct-Session-Id = "AirEngi00000000000900d5d66c0600187" Event-Timestamp =
>>>>>>> "Feb 7 2022 18:05:13 MST" NAS-Port-Id =
>>>>>>> "slot=0;subslot=0;port=0;vlanid=900" Huawei-Loopback-Address =
>>>>>>> "C0F6-C2A5-C4D0" Huawei-User-Mac = "\000\000\000\003" 
>>>>>>> Stripped-User-Name =
>>>>>>> "5blz" Realm = "null" FreeRADIUS-Client-IP-Address = 10.7.255.2
>>>>>>> Called-Station-SSID = "FISPY-WiFi" PacketFence-KeyBalanced =
>>>>>>> "aa86741e358fa86079a91aaf4dc581f9" PacketFence-Radius-Ip = "10.0.255.99"
>>>>>>> SQL-User-Name = "5blz"
>>>>>>>
>>>>>>> On Feb 7, 2022, at 3:58 PM, Jorge Nolla <jno...@gmail.com> wrote:
>>>>>>>
>>>>>>> Hi Fabrice,
>>>>>>>
>>>>>>> I did hardcode as follow:
>>>>>>>
>>>>>>> <form name="weblogin_form" data-autosubmit="1000" method="GET"
>>>>>>> action="https://portal.fispy.mx:8443/login?username=bob&password=bob";
>>>>>>> style="display:none">
>>>>>>>
>>>>>>> But the redirect which the client is getting, is only this part, not
>>>>>>> sure why:
>>>>>>>
>>>>>>> https://portal.fispy.mx:8443/login?
>>>>>>>
>>>>>>>
>>>>>>> Here is the flow of the External Portal Authentication as per
>>>>>>> Huawei.
>>>>>>> Portal Server - Notify the STA of the login URL
>>>>>>> STA - Send the username and password in HTTP GET POST. When this is
>>>>>>> configured to use ISE as per the guide, the ISE server sends the 
>>>>>>> redirect
>>>>>>> to the STA as per the format.
>>>>>>> https://portal.fispy.mx:8443/login?username=($username)&password=($password)
>>>>>>>
>>>>>>>
>>>>>>> <PastedGraphic-1.tiff>
>>>>>>>
>>>>>>> On Feb 7, 2022, at 2:51 PM, Fabrice Durand <oeufd...@gmail.com>
>>>>>>> wrote:
>>>>>>>
>>>>>>> Did you try to hardcode that in the code and see if it works ?
>>>>>>>
>>>>>>> Also i don´t understand the goal of passing the username and
>>>>>>> password , is there any extra check after that ? What happen if the user
>>>>>>> register by sms/email ?
>>>>>>>
>>>>>>> And i just found that:
>>>>>>>
>>>>>>> https://support.huawei.com/enterprise/en/doc/EDOC1100008282/4d5793da/understanding-nac#dc_cfg_nac_2006u_1_1
>>>>>>> Is it something that can be configured on the Hawei ? If yes then it
>>>>>>> will mimic the way the Cisco WLC works.
>>>>>>>
>>>>>>> Regards
>>>>>>> Fabrice
>>>>>>>
>>>>>>>
>>>>>>> Le lun. 7 févr. 2022 à 16:01, Jorge Nolla <jno...@gmail.com> a
>>>>>>> écrit :
>>>>>>>
>>>>>>>> Hi Fabrice,
>>>>>>>>
>>>>>>>> This line needs to be HTTPS for it to work
>>>>>>>> <form name="weblogin_form" data-autosubmit="1000" method="GET"
>>>>>>>> action="http://$controller_ip:8443/login?username=bob&password=bob";
>>>>>>>> style="display:none”>
>>>>>>>>
>>>>>>>> This needs to be the username and password which is being entered
>>>>>>>> by the user in the PF portal, which is the Radius username and password
>>>>>>>> username=bob&password=bob
>>>>>>>>
>>>>>>>>
>>>>>>>> On Feb 7, 2022, at 12:03 PM, Fabrice Durand <oeufd...@gmail.com>
>>>>>>>> wrote:
>>>>>>>>
>>>>>>>> I just pushed a fix.
>>>>>>>>
>>>>>>>> cd /usr/local/pf
>>>>>>>> curl
>>>>>>>> https://github.com/inverse-inc/packetfence/commit/7628afddf46e0226667560dc33df192f9c4cf420.diff
>>>>>>>> | patch -p1
>>>>>>>> and restart
>>>>>>>>
>>>>>>>> Le lun. 7 févr. 2022 à 13:46, Jorge Nolla <jno...@gmail.com> a
>>>>>>>> écrit :
>>>>>>>>
>>>>>>>>> Here are the log outputs for /usr/local/pf/logs/packetfence.log
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Feb  7 11:03:04 wifi packetfence_httpd.portal[61371]:
>>>>>>>>> httpd.portal(61371) INFO: [mac:[undef]] URI '/Huawei' is detected as 
>>>>>>>>> an
>>>>>>>>> external captive portal URI (pf::web::externalportal::handle)
>>>>>>>>> Feb  7 11:03:04 wifi packetfence_httpd.portal[61371]:
>>>>>>>>> httpd.portal(61371) ERROR: [mac:[undef]] Cannot load perl module for 
>>>>>>>>> switch
>>>>>>>>> type 'pf::Switch::Huawei'. Either switch type is unknown or switch 
>>>>>>>>> type
>>>>>>>>> perl module have compilation errors. See the following message for 
>>>>>>>>> details:
>>>>>>>>>  (pf::web::externalportal::handle)
>>>>>>>>> Feb  7 11:03:06 wifi packetfence_httpd.portal[61370]:
>>>>>>>>> httpd.portal(61370) INFO: [mac:[undef]] URI '/Huawei' is detected as 
>>>>>>>>> an
>>>>>>>>> external captive portal URI (pf::web::externalportal::handle)
>>>>>>>>> Feb  7 11:03:06 wifi packetfence_httpd.portal[61370]:
>>>>>>>>> httpd.portal(61370) ERROR: [mac:[undef]] Cannot load perl module for 
>>>>>>>>> switch
>>>>>>>>> type 'pf::Switch::Huawei'. Either switch type is unknown or switch 
>>>>>>>>> type
>>>>>>>>> perl module have compilation errors. See the following message for 
>>>>>>>>> details:
>>>>>>>>>  (pf::web::externalportal::handle)
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> On Feb 7, 2022, at 10:50 AM, Jorge Nolla <jno...@gmail.com> wrote:
>>>>>>>>>
>>>>>>>>> Here is the output for HAProxy
>>>>>>>>>
>>>>>>>>> Feb 7 10:48:54 wifi haproxy[2285]: 10.9.215.39:63814
>>>>>>>>> [07/Feb/2022:10:48:54.074] portal-https-10.0.255.99~ 
>>>>>>>>> 10.0.255.99-backend/
>>>>>>>>> 127.0.0.1 0/0/0/13/13 501 413 - - ---- 2/1/0/0/0 0/0 {
>>>>>>>>> wifi.fispy.mx} "GET
>>>>>>>>> /Huawei?ac-ip=10.7.255.2&userip=10.9.215.39&ssid=FISPY-WiFi&ap-mac=f02f4b1467d9
>>>>>>>>> HTTP/1.1”
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> On Feb 7, 2022, at 10:06 AM, Jorge Nolla <jno...@gmail.com> wrote:
>>>>>>>>>
>>>>>>>>> Hi Fabrice,
>>>>>>>>>
>>>>>>>>> From the Pf portal after the patch is applied.
>>>>>>>>>
>>>>>>>>> type: 'Huawei' is not a valid value The chosen type (Huawei) is
>>>>>>>>> not supported.
>>>>>>>>>
>>>>>>>>> On Feb 6, 2022, at 6:49 PM, Jorge Nolla <jno...@gmail.com> wrote:
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> This is the only option on the config.
>>>>>>>>>
>>>>>>>>> <Screen Shot 2022-02-06 at 6.48.16 PM.png>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> On Feb 6, 2022, at 6:41 PM, Jorge Nolla <jno...@gmail.com> wrote:
>>>>>>>>>
>>>>>>>>> Hi Fabrice,
>>>>>>>>>
>>>>>>>>> Getting an error page from PF
>>>>>>>>>
>>>>>>>>> Not Implemented
>>>>>>>>> GET no supported for current URL.
>>>>>>>>>
>>>>>>>>> How is the switch supposed to be defined in PF?
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> On Feb 6, 2022, at 5:55 PM, Fabrice Durand <oeufd...@gmail.com>
>>>>>>>>> wrote:
>>>>>>>>>
>>>>>>>>> I am just not sure what to set for username and password, if you
>>>>>>>>> do sms auth then there is no password.
>>>>>>>>>
>>>>>>>>> Also in the url it looks that it miss the mac address of the
>>>>>>>>> device , can you try to add  device-mac and see if the device mac is 
>>>>>>>>> in the
>>>>>>>>> url ?
>>>>>>>>>
>>>>>>>>> Here the first draft:
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> https://github.com/inverse-inc/packetfence/compare/feature/Huawei_web_auth.diff
>>>>>>>>>
>>>>>>>>> cd /usr/local/pf/
>>>>>>>>> curl
>>>>>>>>> https://github.com/inverse-inc/packetfence/compare/feature/Huawei_web_auth.diff
>>>>>>>>> | patch -p1
>>>>>>>>>
>>>>>>>>> then restart packetfence.
>>>>>>>>>
>>>>>>>>> On the controller:
>>>>>>>>>
>>>>>>>>> url-template name PacketFence
>>>>>>>>>  url https://wifi.fispy.mx/ <https://wifi.fispy.mx/captive-portal>
>>>>>>>>> Hawei
>>>>>>>>>  url-parameter device-ip device-mac ac-ip user-ipaddress userip
>>>>>>>>> ssid ssid user-mac ap-mac
>>>>>>>>>
>>>>>>>>> So when the device will be forwarded to the portal it should be
>>>>>>>>> able to recognise the mac address and the ip of the device (in the 
>>>>>>>>> bottom).
>>>>>>>>>
>>>>>>>>> Register on the portal and you should be forwarded to
>>>>>>>>> http://$controller_ip:8443/login?username=bob&password=bob
>>>>>>>>>
>>>>>>>>> Let me know how it behave.
>>>>>>>>>
>>>>>>>>> Regards
>>>>>>>>> Fabrice
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Le dim. 6 févr. 2022 à 18:58, Jorge Nolla <jno...@gmail.com> a
>>>>>>>>> écrit :
>>>>>>>>>
>>>>>>>>>> Hi Fabrice
>>>>>>>>>>
>>>>>>>>>> This is the GET the AC is expecting:
>>>>>>>>>>
>>>>>>>>>> https://portal.fispy.mx:8443/login?username=($username)&password=($password)
>>>>>>>>>>
>>>>>>>>>> If successful it will return as per image below. If it fails the
>>>>>>>>>> AC will redirect back to the Portal
>>>>>>>>>>
>>>>>>>>>> <WebAuthentication.png>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> Here is the configuration:
>>>>>>>>>>
>>>>>>>>>> url-template name PacketFence
>>>>>>>>>>  url https://wifi.fispy.mx/captive-portal
>>>>>>>>>>  url-parameter login-url destination_url
>>>>>>>>>> https://portal.fispy.mx:8443/login?username=($username)&password=($password)
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> HA Proxy output
>>>>>>>>>>
>>>>>>>>>> Feb 6 16:44:26 wifi haproxy[2427]: 10.9.70.173:52266
>>>>>>>>>> [06/Feb/2022:16:44:26.153] portal-https-10.0.255.99~ 
>>>>>>>>>> 10.0.255.99-backend/
>>>>>>>>>> 127.0.0.1 0/0/0/202/202 200 9003 - - ---- 2/1/0/0/0 0/0 {
>>>>>>>>>> wifi.fispy.mx} "GET /captive-portal?destination_url=
>>>>>>>>>> https://portal.fispy.mx:8443/login?username=($username)&password=($password)
>>>>>>>>>> HTTP/1.1"
>>>>>>>>>>
>>>>>>>>>> Only problem is that PacketFence is not updating the dynamic
>>>>>>>>>> values with username and password for it to work
>>>>>>>>>>
>>>>>>>>>> AC = Access Controller. This manages the APs’ as they are
>>>>>>>>>> operating in Fit/Lightweight mode.
>>>>>>>>>> AP = Access Points. These are the actual radios.
>>>>>>>>>>
>>>>>>>>>> Best Regards,
>>>>>>>>>> Jorge
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> On Feb 6, 2022, at 4:40 PM, Fabrice Durand <oeufd...@gmail.com>
>>>>>>>>>> wrote:
>>>>>>>>>>
>>>>>>>>>> Hello Jorge,
>>>>>>>>>>
>>>>>>>>>> i have what i need at least to be able to support the web-auth.
>>>>>>>>>> The only thing i am not sure is at the end of the registration
>>>>>>>>>> process what we are supposed to do.
>>>>>>>>>>
>>>>>>>>>> I will create a branch on github in order for you to test. (it
>>>>>>>>>> will be an update of the Huawei switch module).
>>>>>>>>>>
>>>>>>>>>> For information, what is the ac-ip ac-mac versus ap-ip ap-mac ?
>>>>>>>>>>
>>>>>>>>>> Regards
>>>>>>>>>> Fabrice
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> Le dim. 6 févr. 2022 à 18:30, Jorge Nolla <jno...@gmail.com> a
>>>>>>>>>> écrit :
>>>>>>>>>>
>>>>>>>>>>> If I try to manually send the redirect in the browser here is
>>>>>>>>>>> what HA proxy records. This is a simple copy and paste in the 
>>>>>>>>>>> browser and
>>>>>>>>>>> the output:
>>>>>>>>>>>
>>>>>>>>>>> https://wifi.fispy.mx/captive-portal?destination_url=
>>>>>>>>>>> https://portal.fispy.mx:8443/login?username=539z&password=0uf3
>>>>>>>>>>>
>>>>>>>>>>> 4875 - - ---- 2/1/0/0/0 0/0 {wifi.fispy.mx} "GET
>>>>>>>>>>> /captive-portal?destination_url=
>>>>>>>>>>> https://portal.fispy.mx:8443/login?username=539z&password=0uf3
>>>>>>>>>>> HTTP/1.1"
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> It doesn’t let it go through as it seems that is trying to
>>>>>>>>>>> validate network connectivity
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> On Feb 6, 2022, at 4:07 PM, Jorge Nolla <jno...@gmail.com>
>>>>>>>>>>> wrote:
>>>>>>>>>>>
>>>>>>>>>>> Seems weird how the format of the URL is recorded/sent
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> Here is a normal redirect, the url is formatted correctly,
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> Feb 6 16:03:41 wifi haproxy[2427]: 10.99.1.20:63577
>>>>>>>>>>> [06/Feb/2022:16:03:41.232] portal-https-10.0.255.99~ 
>>>>>>>>>>> 10.0.255.99-backend/
>>>>>>>>>>> 127.0.0.1 0/0/1/233/234 200 4910 - - ---- 2/1/0/0/0 0/0 {
>>>>>>>>>>> wifi.fispy.mx} "GET /captive-portal?destination_url=
>>>>>>>>>>> https://www.fispy.mx/ HTTP/1.1"
>>>>>>>>>>>
>>>>>>>>>>>  I’m not sure why the value sent by the AP has all the % and
>>>>>>>>>>> weird symbols
>>>>>>>>>>> destination%5Furl=https%3A%2F%2Fportal%2Efispy%2Emx%3A8443%2Flogin
>>>>>>>>>>> <https://wifi.fispy.mx/captive-portal?switch_url=https://portal.fispy.mx:8443/login>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> On Feb 6, 2022, at 4:00 PM, Jorge Nolla <jno...@gmail.com>
>>>>>>>>>>> wrote:
>>>>>>>>>>>
>>>>>>>>>>> Hi Fabrice,
>>>>>>>>>>>
>>>>>>>>>>> Here are the options that can be added:
>>>>>>>>>>>
>>>>>>>>>>> [AirEngine9700-M1-url-template-PacketFence]url-parameter ?
>>>>>>>>>>>   ap-group-name   AP group name
>>>>>>>>>>>   ap-ip           AP IP address
>>>>>>>>>>>   ap-location     AP location
>>>>>>>>>>>   ap-mac          AP MAC address
>>>>>>>>>>>   ap-name         AP name
>>>>>>>>>>>   device-ip       Device IP address
>>>>>>>>>>>   device-mac      Device MAC address
>>>>>>>>>>>   login-url       Device's login URL provided to the external
>>>>>>>>>>> portal server
>>>>>>>>>>>   mac-address     Mac address
>>>>>>>>>>>   redirect-url    The url in user original http packet
>>>>>>>>>>>   set             Set
>>>>>>>>>>>   ssid            SSID
>>>>>>>>>>>   sysname         Device name
>>>>>>>>>>>   user-ipaddress  User IP address
>>>>>>>>>>>   user-mac        User MAC address
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> url-template name PacketFence
>>>>>>>>>>>  url https://wifi.fispy.mx/captive-portal
>>>>>>>>>>>  url-parameter device-ip ac-ip user-ipaddress userip ssid ssid
>>>>>>>>>>> user-mac ap-mac
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> 200 9003 - - ---- 2/1/0/0/0 0/0 {wifi.fispy.mx} "GET
>>>>>>>>>>> /captive-portal?ac%2Dip=10%2E7%2E255%2E2&userip=10%2E9%2E70%2E173&ssid=FISPY%2DWiFi&ap%2Dmac=f02f4b1467d9
>>>>>>>>>>> HTTP/1.1"
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> If we do not specify the URL on this configuration, where would
>>>>>>>>>>> PacketFence get the value for the AC Web Authentication call?
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> https://portal.fispy.mx:8443/login?username=($username)&password=($password)
>>>>>>>>>>>
>>>>>>>>>>> Best Regards,
>>>>>>>>>>> Jorge
>>>>>>>>>>>
>>>>>>>>>>> On Feb 5, 2022, at 8:23 PM, Fabrice Durand <oeufd...@gmail.com>
>>>>>>>>>>> wrote:
>>>>>>>>>>>
>>>>>>>>>>> Hello Jorge,
>>>>>>>>>>>
>>>>>>>>>>> what we need is the user mac and the ap information.
>>>>>>>>>>> I found that
>>>>>>>>>>> https://support.huawei.com/enterprise/en/doc/EDOC1100008283/659354b1/display-url-template
>>>>>>>>>>>
>>>>>>>>>>> Is it possible to add extra parameters like user-mac ssid ap-ip
>>>>>>>>>>> ap-mac ?
>>>>>>>>>>>
>>>>>>>>>>> And if yes can you provide me the url generated by the
>>>>>>>>>>> controller when it redirect ?  (haproxy-portal log)
>>>>>>>>>>>
>>>>>>>>>>> Regards
>>>>>>>>>>> Fabrice
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> Le sam. 5 févr. 2022 à 20:42, Jorge Nolla <jno...@gmail.com> a
>>>>>>>>>>> écrit :
>>>>>>>>>>>
>>>>>>>>>>>> Hi Team,
>>>>>>>>>>>>
>>>>>>>>>>>> Any input on this? We really would like to get this to work.
>>>>>>>>>>>>
>>>>>>>>>>>> Thank you!
>>>>>>>>>>>> Jorge
>>>>>>>>>>>>
>>>>>>>>>>>> On Feb 2, 2022, at 7:48 PM, Jorge Nolla <jno...@gmail.com>
>>>>>>>>>>>> wrote:
>>>>>>>>>>>>
>>>>>>>>>>>> Hi Fabrice,
>>>>>>>>>>>>
>>>>>>>>>>>> This is the sequence:
>>>>>>>>>>>>
>>>>>>>>>>>> Feb  2 14:51:32 wifi haproxy[2427]: 10.9.79.52:61132
>>>>>>>>>>>> [02/Feb/2022:14:51:32.663] portal-http-10.0.255.99 
>>>>>>>>>>>> 10.0.255.99-backend/
>>>>>>>>>>>> 127.0.0.1 0/0/0/201/201 200 7146 - - ---- 3/1/0/0/0 0/0 {
>>>>>>>>>>>> wifi.fispy.mx} "GET /access?lang= HTTP/1.1"
>>>>>>>>>>>> Feb  2 14:51:37 wifi haproxy[2427]: 10.9.79.52:61133
>>>>>>>>>>>> [02/Feb/2022:14:51:37.905] portal-http-10.0.255.99 static/
>>>>>>>>>>>> 127.0.0.1 0/0/0/2/2 200 228 - - ---- 4/2/0/0/0 0/0
>>>>>>>>>>>> {10.0.255.99} "GET 
>>>>>>>>>>>> /common/network-access-detection.gif?r=1643838705224
>>>>>>>>>>>> HTTP/1.1"
>>>>>>>>>>>> Feb  2 14:51:44 wifi haproxy[2427]: 10.9.79.52:61130
>>>>>>>>>>>> [02/Feb/2022:14:51:43.927] portal-https-10.0.255.99~ 
>>>>>>>>>>>> 10.0.255.99-backend/
>>>>>>>>>>>> 127.0.0.1 0/0/0/122/122 302 1018 - - ---- 4/1/0/0/0 0/0 {
>>>>>>>>>>>> wifi.fispy.mx} "GET
>>>>>>>>>>>> /captive-portal?switch%5Furl=https%3A%2F%2Fportal%2Efispy%2Emx%3A8443%2Flogin
>>>>>>>>>>>> HTTP/1.1"
>>>>>>>>>>>> Feb  2 14:51:44 wifi haproxy[2427]: 10.9.79.52:61132
>>>>>>>>>>>> [02/Feb/2022:14:51:44.060] portal-http-10.0.255.99 
>>>>>>>>>>>> 10.0.255.99-backend/
>>>>>>>>>>>> 127.0.0.1 0/0/0/129/129 200 7146 - - ---- 4/2/0/0/0 0/0 {
>>>>>>>>>>>> wifi.fispy.mx} "GET /access?lang= HTTP/1.1"
>>>>>>>>>>>> Feb  2 14:51:49 wifi haproxy[2427]: 10.9.79.52:61133
>>>>>>>>>>>> [02/Feb/2022:14:51:49.219] portal-http-10.0.255.99 static/
>>>>>>>>>>>> 127.0.0.1 0/0/0/1/1 200 228 - - ---- 4/2/0/0/0 0/0
>>>>>>>>>>>> {10.0.255.99} "GET 
>>>>>>>>>>>> /common/network-access-detection.gif?r=1643838716546
>>>>>>>>>>>> HTTP/1.1"
>>>>>>>>>>>> Feb  2 14:51:55 wifi haproxy[2427]: 10.9.79.52:61130
>>>>>>>>>>>> [02/Feb/2022:14:51:55.287] portal-https-10.0.255.99~ 
>>>>>>>>>>>> 10.0.255.99-backend/
>>>>>>>>>>>> 127.0.0.1 0/0/0/136/136 302 1018 - - ---- 4/1/0/0/0 0/0 {
>>>>>>>>>>>> wifi.fispy.mx} "GET
>>>>>>>>>>>> /captive-portal?switch%5Furl=https%3A%2F%2Fportal%2Efispy%2Emx%3A8443%2Flogin
>>>>>>>>>>>> HTTP/1.1”
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> On Feb 2, 2022, at 7:12 PM, Fabrice Durand <oeufd...@gmail.com>
>>>>>>>>>>>> wrote:
>>>>>>>>>>>>
>>>>>>>>>>>> Hello Jorge,
>>>>>>>>>>>>
>>>>>>>>>>>> i will have a look closer.
>>>>>>>>>>>> But i have a question, when the device is forwarded to the
>>>>>>>>>>>> captive portal, (just before
>>>>>>>>>>>> https://wifi.fispy.mx/captive-portal?switch%5Furl=https%3A%2F%2Fportal%2Efispy%2Emx%3A8443%2Flogin
>>>>>>>>>>>> <https://wifi.fispy.mx/captive-portal?switch_url=https://portal.fispy.mx:8443/login>)
>>>>>>>>>>>> , what is the url ?
>>>>>>>>>>>> You should be able to see it in the haproxy-portal.log file.
>>>>>>>>>>>>
>>>>>>>>>>>> Regards
>>>>>>>>>>>> Fabrice
>>>>>>>>>>>>
>>>>>>>>>>>> Le mer. 2 févr. 2022 à 10:18, Jorge Nolla <jno...@gmail.com> a
>>>>>>>>>>>> écrit :
>>>>>>>>>>>>
>>>>>>>>>>>>> Hi Fabrice,
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>> We almost have the configuration working, but are not sure how
>>>>>>>>>>>>> to get the redirect to the client to work correctly. Attached is 
>>>>>>>>>>>>> the
>>>>>>>>>>>>> documentation for Cisco ISE which we used for PacketFence as well.
>>>>>>>>>>>>>
>>>>>>>>>>>>> Portal.fispy.mx <http://portal.fispy.mx/> is the Huawei AC.
>>>>>>>>>>>>>
>>>>>>>>>>>>> This is the format the client should get from
>>>>>>>>>>>>> PacketFence. This is the only piece we are missing for this to 
>>>>>>>>>>>>> work.
>>>>>>>>>>>>>
>>>>>>>>>>>>> https://portal.fispy.mx:8443/login?username=($username)&password=($password)
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>> If we manually click on the link above, then the flow of
>>>>>>>>>>>>> traffic works correctly CLIENT > AC > RADIUS (PacketFence), and
>>>>>>>>>>>>> authentication works. The problem is that when the user logs in 
>>>>>>>>>>>>> to the
>>>>>>>>>>>>> portal the redirect is broken. The parameter for the redirect that
>>>>>>>>>>>>> PacketFence is serving, comes from a configuration parameter 
>>>>>>>>>>>>> within the AC.
>>>>>>>>>>>>> This configuration works fine for Cisco ISE, but the URL format 
>>>>>>>>>>>>> is not
>>>>>>>>>>>>> working for PacketFence.
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>> When we configure the redirect this is what the client is
>>>>>>>>>>>>> getting from PacketFence
>>>>>>>>>>>>>
>>>>>>>>>>>>> https://wifi.fispy.mx/captive-portal?switch%5Furl=https%3A%2F%2Fportal%2Efispy%2Emx%3A8443%2Flogin
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>> url-template name PacketFence
>>>>>>>>>>>>>  url https://wifi.fispy.mx/captive-portal
>>>>>>>>>>>>>  url-parameter login-url switch_url
>>>>>>>>>>>>> https://portal.fispy.mx:8443/login  <<< THIS IS THE PARAMETER
>>>>>>>>>>>>> FOR THE REDIRECT TO PACKETFENCE
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>> AC CONFIG
>>>>>>>>>>>>>
>>>>>>>>>>>>> authentication-profile name PacketFence
>>>>>>>>>>>>>  portal-access-profile PacketFence
>>>>>>>>>>>>>  free-rule-template default_free_rule
>>>>>>>>>>>>>  authentication-scheme PacketFence
>>>>>>>>>>>>>  accounting-scheme PacketFence
>>>>>>>>>>>>>  radius-server PacketFence
>>>>>>>>>>>>>  force-push url https://www.fispy.mx
>>>>>>>>>>>>>
>>>>>>>>>>>>> radius-server template PacketFence
>>>>>>>>>>>>>  radius-server shared-key cipher %^%#*)l=:1.X-Yd$\<~orEF@
>>>>>>>>>>>>> ]<}NMejv3)E^\6;7:NUY%^%#
>>>>>>>>>>>>>  radius-server authentication 10.0.255.99 1812 source
>>>>>>>>>>>>> ip-address 10.7.255.2 weight 90
>>>>>>>>>>>>>  radius-server accounting 10.0.255.99 1813 source ip-address
>>>>>>>>>>>>> 10.7.255.2 weight 80
>>>>>>>>>>>>>  undo radius-server user-name domain-included
>>>>>>>>>>>>>  calling-station-id mac-format unformatted
>>>>>>>>>>>>>  called-station-id wlan-user-format ac-mac
>>>>>>>>>>>>>  radius-server attribute translate
>>>>>>>>>>>>>  radius-attribute disable HW-NAS-Startup-Time-Stamp send
>>>>>>>>>>>>>  radius-attribute disable HW-IP-Host-Address send
>>>>>>>>>>>>>  radius-attribute disable HW-Connect-ID send
>>>>>>>>>>>>>  radius-attribute disable HW-Version send
>>>>>>>>>>>>>  radius-attribute disable HW-Product-ID send
>>>>>>>>>>>>>  radius-attribute disable HW-Domain-Name send
>>>>>>>>>>>>>  radius-attribute disable HW-User-Extend-Info send
>>>>>>>>>>>>>
>>>>>>>>>>>>> url-template name PacketFence
>>>>>>>>>>>>>  url https://wifi.fispy.mx/captive-portal
>>>>>>>>>>>>>  url-parameter login-url switch_url
>>>>>>>>>>>>> https://portal.fispy.mx:8443/login  <<< THIS IS THE PARAMETER
>>>>>>>>>>>>> FOR THE REDIRECT TO PACKETFENCE
>>>>>>>>>>>>>
>>>>>>>>>>>>> web-auth-server PacketFence
>>>>>>>>>>>>>  server-ip 10.0.255.99
>>>>>>>>>>>>>  port 443
>>>>>>>>>>>>>  url-template PacketFence
>>>>>>>>>>>>>  protocol http
>>>>>>>>>>>>>  http get-method enable
>>>>>>>>>>>>>
>>>>>>>>>>>>> portal-access-profile name PacketFence
>>>>>>>>>>>>>  web-auth-server PacketFence direct
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>> authentication-scheme PacketFence
>>>>>>>>>>>>>   authentication-mode radius
>>>>>>>>>>>>>
>>>>>>>>>>>>> wlan
>>>>>>>>>>>>>  security-profile name FISPY-WiFi
>>>>>>>>>>>>>
>>>>>>>>>>>>>  vap-profile name FISPY-WiFi
>>>>>>>>>>>>>   service-vlan vlan-id 900
>>>>>>>>>>>>>   permit-vlan vlan-id 900
>>>>>>>>>>>>>   ssid-profile FISPY-WiFi
>>>>>>>>>>>>>   security-profile FISPY-WiFi
>>>>>>>>>>>>>   authentication-profile PacketFence
>>>>>>>>>>>>>   sta-network-detect disable
>>>>>>>>>>>>>   service-experience-analysis enable
>>>>>>>>>>>>>   mdns-snooping enable
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>> ###CISCO ISE CONFIG TO COMPARE###
>>>>>>>>>>>>>
>>>>>>>>>>>>> url-template name CISCO-ISE
>>>>>>>>>>>>>  url
>>>>>>>>>>>>> https://captive.fispy.mx:8443/portal/PortalSetup.action#portal=7cf5ac1d-5dbf-4b36-aeee-b9590fd24c02
>>>>>>>>>>>>>  parameter start-mark #
>>>>>>>>>>>>>  url-parameter login-url switch_url
>>>>>>>>>>>>> https://portal.fispy.mx:8443/login
>>>>>>>>>>>>>
>>>>>>>>>>>>> ####################################
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>> On Feb 2, 2022, at 6:17 AM, Fabrice Durand <oeufd...@gmail.com>
>>>>>>>>>>>>> wrote:
>>>>>>>>>>>>>
>>>>>>>>>>>>> Hello Jorge,
>>>>>>>>>>>>>
>>>>>>>>>>>>> do you have any Huawei documentation to implement that ?
>>>>>>>>>>>>>
>>>>>>>>>>>>> Regards
>>>>>>>>>>>>> Fabrice
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>> Le mer. 26 janv. 2022 à 15:59, Jorge Nolla via
>>>>>>>>>>>>> PacketFence-users <packetfence-users@lists.sourceforge.net> a
>>>>>>>>>>>>> écrit :
>>>>>>>>>>>>>
>>>>>>>>>>>>>> Hi Team,
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> We were wondering if anyone has had any success in
>>>>>>>>>>>>>> configuring Web Auth for the Huawei AC? It’s somewhat critical 
>>>>>>>>>>>>>> for us to
>>>>>>>>>>>>>> get this going.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Thank you!
>>>>>>>>>>>>>> Jorge
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> _______________________________________________
>>>>>>>>>>>>>> PacketFence-users mailing list
>>>>>>>>>>>>>
>>>>>>>>>>>>> PacketFence-users@lists.sourceforge.net
>>>>>>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>
>>>>>
>>>>
>>>>
>>>>
>>>>
>>>
>>
>>
>>
>>
>>
>>
>>
>
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to