Greetings, I'm currently trying to implement a captive portal authentication for my wired clients on a Dell N2048P in my test lab. I followed the instructions provided by the packetfence documentation (https://www.packetfence.org/doc/PacketFence_Installation_Guide.html#_enabling_the_captive_portal) but the client does not receive an ip address. PacketFence accepts the authentication request and returns the following RADiUS Reply: REST-HTTP-Status-Code = 200 REST-HTTP-Status-Code = 200 Cisco-AVPair = "url-redirect-acl=registration" Cisco-AVPair = "url-redirect=http://10.22.11.250/captive-portal/sidc01cbc" Tunnel-Private-Group-Id = "66" Reply-Message = "Request processed by PacketFence" Session-Timeout = 60 Tunnel-Medium-Type = IEEE-802 Tunnel-Type = VLAN Termination-Action = RADIUS-Request
My switch configuration looks like this: no ip http server ip access-list registration 1000 deny ip any 10.22.11.250 0.0.0.0 1010 permit tcp any any eq http 1020 permit tcp any any eq 443 exit aaa authentication login "defaultList" local aaa accounting dot1x default start-stop radius aaa accounting update newinfo periodic 10 aaa authorization exec "dfltExecAuthList" radius local authentication enable dot1x system-auth-control aaa authentication dot1x default radius aaa authorization network default radius switchport voice vlan aaa server radius dynamic-author client 10.22.11.250 server-key 7 "*****" auth-type any exit radius server auth 10.22.11.250 name "IN" key 7 "*****" exit radius server acct 10.22.11.250 name "IN" key 7 "*****" exit interface Gi1/0/1 spanning-tree portfast switchport mode general authentication host-mode multi-domain authentication event fail action authorize vlan 66 authentication periodic authentication timer reauthenticate 82800 authentication timer restart 3600 dot1x timeout supp-timeout 5 dot1x timeout tx-period 5 mab auth-type pap authentication order mab lldp tlv-select system-description system-capabilities management-address lldp notification lldp med confignotification switchport voice vlan 12 exit I'm a bit confused about the "deny ip any 10.22.11.250" Rule in my access-list but its written like this in the official documentation. My best guess is that the switch does not recognize the client as authenticated and therefore blocks any traffic going in and out. I've already experimented with the "authentication allow-unauth dhcp" command but this does not seem to help. Any hints into the right direction would be appreciated. Kind Regards Heiko Matthies [cid:2018_Signatur_ASAP_Engineering_607ba42f-d9c6-4abe-af16-b2b0953d2657.png] [cid:MK_FB_Podcast_20210201_70f02930-dafd-4abf-9139-c2414fbba13c.png]<https://asap.podigee.io/> ASAP Engineering GmbH Sachsstra?e 1A | 85080 Gaimersheim Tel. +49 8458 3389 252<tel:+49%208458%203389%20252> | Fax. +49 (8458) 3389 399<fax:+49%20(8458)%203389%20399> | Mobil. +49 (173) 6729650<tel:+49%20(173)%206729650> heiko.matth...@asap.de<mailto:heiko.matth...@asap.de> | www.asap.de<http://www.asap.de> Gesch?ftsf?hrer: Michael Neisen, Robert Werner, Christian Schweiger | Sitz der Gesellschaft: Gaimersheim | Amtsgericht: Ingolstadt HRB 5408 Datenschutz: Ausf?hrliche Informationen zum Umgang mit Ihren personenbezogenen Daten bei ASAP erhalten Sie auf unserer Website unter Datenschutz.<http://www.asap.de/datenschutz/>
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users