Hi Rexford

Good Monday.

" Added VLAN 20 to the returned RADIUS Access-Accept"

You can use tcpdump on the AP side to check if AP is receiving RADIUS
Access-Accept

Enrique

El sáb, 20 jul 2024 a las 17:26, Rexford Nyarko (<rexfordn...@gmail.com>)
escribió:

> Hello All,
>
> @Enrique Gross <egr...@jcc-advance.com.ar>
> 1. I have two interfaces on my PF box. one is management (connected to a
> management DMZ) and the second interface is Trunk with all VLANs, that is
> the interface through which PF is connected to the Unifi APs and
> controller. I enabled the radius on this interface and started getting the
> error in my previous mail.
>
> 2. No my connection profile only checks for connection types for wireless
> clients.
>
>
> Due to the radius error ignoring requests from my APs, I decided to remove
> the AP added by MAC and this time add it by IP.  Doing this eliminated that
> error. I now see auth requests reaching PF from AP and the open network,
> which is good. However from the logs, it seems PF returns the
> unauthenticated client info to the AP with the registration VLAN but
> somehow the client doesn't seem to get to the Registration portal. I am not
> sure if Unifi is placing the client in the right VLAN. Below are the logs.
>
> Jul 20 20:01:09 controller httpd.aaa-docker-wrapper[3778]: httpd.aaa(7)
>> INFO: [mac:b6:da:e2:07:07:84] handling radius autz request: from switch_ip
>> => (10.2.0.6), connection_type => Wireless-802.11-NoEAP, switch_mac =>
>> (74:83:c2:84:e2:29), mac => [b6:da:e2:07:07:84], port => 0, username =>
>> "b6:da:e2:07:07:84", ssid => testing_vlan (pf::radius::authorize)
>> Jul 20 20:01:09 controller httpd.aaa-docker-wrapper[3778]: httpd.aaa(7)
>> INFO: [mac:b6:da:e2:07:07:84] Instantiate profile
>> VlanEnforcement-Registration (pf::Connection::ProfileFactory::_from_profile)
>> Jul 20 20:01:09 controller httpd.aaa-docker-wrapper[3778]: httpd.aaa(7)
>> INFO: [mac:b6:da:e2:07:07:84] is of status unreg; belongs into registration
>> VLAN (pf::role::getRegistrationRole)
>> Jul 20 20:01:09 controller httpd.aaa-docker-wrapper[3778]: httpd.aaa(7)
>> INFO: [mac:b6:da:e2:07:07:84] (10.2.0.6) Added VLAN 20 to the returned
>> RADIUS Access-Accept (pf::Switch::returnRadiusAccessAccept)
>> Jul 20 20:01:09 controller auth[139176]: (6582) Login OK:
>> [b6:da:e2:07:07:84] (from client 10.2.0.6/32 port 0 cli
>> b6:da:e2:07:07:84)
>
>
> Is there a way I could check what's happening on the Unifi controller or
> AP stack?
>
>
> Warm regards,
> Rexford A. Nyarko.
>
>
> On Sat, Jul 20, 2024 at 8:46 AM Enrique Gross via PacketFence-users <
> packetfence-users@lists.sourceforge.net> wrote:
>
>> Hi Rexford, sorry I don't understand where you enabled Radius.
>>
>> Its ok to add APs by IP address on the pf side.
>>
>> I was asking about connection profile to check if its matching a
>> condition for devices connecting to your open ssid.
>>
>>
>> El vie, 19 de jul de 2024, 08:52, Rexford Nyarko via PacketFence-users <
>> packetfence-users@lists.sourceforge.net> escribió:
>>
>>> Hello Enrique,
>>> No, at the moment I am not matching SSID or anything like that.
>>> However, I just enabled radius service on the trunk interface where PF
>>> talks to unifi AP and controller. Now when I try connecting a client to the
>>> open wifi I see the following in the logs.
>>>
>>> Jul 19 11:26:14 controller auth[7653]: Ignoring request to auth address
>>> * port 1812 bound to server packetfence from unknown client 10.2.0.6 port
>>> 35316 proto udp
>>> Jul 19 11:26:17 controller auth[7653]: Ignoring request to auth address
>>> * port 1812 bound to server packetfence from unknown client 10.2.0.6 port
>>> 35316 proto udp
>>> Jul 19 11:26:23 controller auth[7653]: Ignoring request to auth address
>>> * port 1812 bound to server packetfence from unknown client 10.2.0.6 port
>>> 35316 proto udp
>>>
>>> However, this unknown client is 10.2.0.6 is my Unifi AP added by Mac
>>> Address.
>>> Do I need to remove it and add it via the controller using IP?
>>>
>>>
>>> Warm regards,
>>> Rexford A. Nyarko.
>>>
>>>
>>> On Fri, Jul 19, 2024 at 6:12 AM Enrique Gross via PacketFence-users <
>>> packetfence-users@lists.sourceforge.net> wrote:
>>>
>>>> And in your connection profile are you matching like SSID?
>>>>
>>>> El jue, 18 jul 2024 a las 15:57, Rexford Nyarko (<rexfordn...@gmail.com>)
>>>> escribió:
>>>>
>>>>> Hello Enrique,
>>>>>
>>>>> Yes, they are all reachable one to the other, AP, Unifi controller and
>>>>> PF. This is quite weird for me considering the Web auth works fine without
>>>>> problems.
>>>>> The radius server is using PF's IP. apart from setting the radius
>>>>> password on the switch in PF and the Unifi controller is there anything
>>>>> else I need to do for radius config?
>>>>>
>>>>> Warm regards,
>>>>> Rexford A. Nyarko.
>>>>>
>>>>>
>>>>> On Thu, Jul 18, 2024 at 6:03 PM Enrique Gross <
>>>>> egr...@jcc-advance.com.ar> wrote:
>>>>>
>>>>>> Hi Rexford
>>>>>>
>>>>>> Try to troubleshoot connection between APs and Radius server IP (PF
>>>>>> management address). Can you ICMP that ip address? the radius server you
>>>>>> configured on the radius profile on Unifi controller, and applied to 
>>>>>> SSID.
>>>>>>
>>>>>> El jue, 18 jul 2024 a las 14:48, Rexford Nyarko (<
>>>>>> rexfordn...@gmail.com>) escribió:
>>>>>>
>>>>>>> Hello Enrique,
>>>>>>>
>>>>>>> Thanks again for getting back to me.
>>>>>>> Yes I have mapped the VLAN ID on the switch config for the AP.  But
>>>>>>> still, the client devices are unable to get an IP. so they just 
>>>>>>> disconnect
>>>>>>> once you try to connect.
>>>>>>>
>>>>>>> I have also checked the logs, there isn't anything happening when I
>>>>>>> try to connect a client to the open SSID. I can't figure out what I am
>>>>>>> missing.
>>>>>>>
>>>>>>> Warm regards,
>>>>>>> Rexford A. Nyarko.
>>>>>>>
>>>>>>>
>>>>>>> On Thu, Jul 18, 2024 at 4:07 PM Enrique Gross via PacketFence-users <
>>>>>>> packetfence-users@lists.sourceforge.net> wrote:
>>>>>>>
>>>>>>>> Hi Rexford
>>>>>>>>
>>>>>>>> You don't need to put registration VLAN as default/untagged,
>>>>>>>> registration vlan goes with tag.
>>>>>>>>
>>>>>>>> Have you mapped roles and VLAN ID on the switch config, on the PF
>>>>>>>> side?
>>>>>>>>
>>>>>>>> Looking at packetfence.log, will help you to know what is happening
>>>>>>>> with the user/device when connecting to AP.
>>>>>>>>
>>>>>>>> Enrique
>>>>>>>>
>>>>>>>> El jue, 18 jul 2024 a las 11:10, Rexford Nyarko (<
>>>>>>>> rexfordn...@gmail.com>) escribió:
>>>>>>>>
>>>>>>>>> Hello Enrique,
>>>>>>>>> Thank you for your response.
>>>>>>>>> Yes I have AP the AP connected via Trunk. However the same still
>>>>>>>>> happens, clients are not able to connect to the Open network in order 
>>>>>>>>> to
>>>>>>>>> access the registration portal.
>>>>>>>>>  Do I need to make the registration VLAN 20 the default /untagged
>>>>>>>>> VLAN on the trunk ports? In that case, the AP can directly 
>>>>>>>>> communicate with
>>>>>>>>> PF on the default network. Thanks in advance.
>>>>>>>>>
>>>>>>>>> Warm regards,
>>>>>>>>> Rexford A. Nyarko.
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> On Wed, Jul 17, 2024 at 8:14 AM Enrique Gross via
>>>>>>>>> PacketFence-users <packetfence-users@lists.sourceforge.net> wrote:
>>>>>>>>>
>>>>>>>>>> Hi Rexford
>>>>>>>>>>
>>>>>>>>>> Hope you are doing well
>>>>>>>>>>
>>>>>>>>>> When configuring SSID on the Unifi side with Radius, it is ok
>>>>>>>>>> that you can not set VLAN 20 as registration. On the PF side, it's 
>>>>>>>>>> in the
>>>>>>>>>> roles (Role mapping by VLAN ID) when configuring APs that you will 
>>>>>>>>>> set up
>>>>>>>>>> your VLAN for registration, prod or other vlan.  So, as long 
>>>>>>>>>> registration
>>>>>>>>>> vlan, prod, etc vlans are vlan trunk to AP, that's fine.
>>>>>>>>>>
>>>>>>>>>> So, an unreg user will be evaluated upon connection, as the
>>>>>>>>>> condition is unreg it will be placed on registration vlan that is 
>>>>>>>>>> defined
>>>>>>>>>> on your Switch roles.
>>>>>>>>>>
>>>>>>>>>> Sorry for my bad english, hope it helps.
>>>>>>>>>>
>>>>>>>>>> Enrique.
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> El lun, 15 jul 2024 a las 5:22, Rexford Nyarko via
>>>>>>>>>> PacketFence-users (<packetfence-users@lists.sourceforge.net>)
>>>>>>>>>> escribió:
>>>>>>>>>>
>>>>>>>>>>> Hello All,
>>>>>>>>>>>
>>>>>>>>>>> First,  my user environment consists mostly of Linux, windows
>>>>>>>>>>> users and occasionally Mac. Network hardware consists of Cisco 2960
>>>>>>>>>>> switches for LAN and Unifi AP AC Pro for wireless connectivity.  I 
>>>>>>>>>>> need to
>>>>>>>>>>> have an authentication setup such that users log in with their LDAP
>>>>>>>>>>> credentials and users are assigned VLANS based on their
>>>>>>>>>>> *memberOf* LDAP attribute.
>>>>>>>>>>>
>>>>>>>>>>> Here's what I have done so far,
>>>>>>>>>>> 1. Installed PF 13.2 with two interfaces, 1 separate for
>>>>>>>>>>> management and another trunk with all VLAN interfaces added.
>>>>>>>>>>> 2. Configured LDAP Authentication source
>>>>>>>>>>> 3. Configured a connection Profile using the LDAP auth source.
>>>>>>>>>>> 4. Added Unifi APs individually to PF via MAC Address.
>>>>>>>>>>> (Initially, I tried adding the controller IP method but that didn't 
>>>>>>>>>>> work
>>>>>>>>>>> with some weird errors about not being able to instantiate Switch)
>>>>>>>>>>> 5. Configured Unifi Controller and Wifi with guest profile and
>>>>>>>>>>> external Captive portal pointing to PF as instructed in the 
>>>>>>>>>>> documentation.
>>>>>>>>>>>  6. Enabled the captive portal and respective services on the
>>>>>>>>>>> trunk interface.
>>>>>>>>>>> All to this point everything works great. As soon as a user
>>>>>>>>>>> connects to the open SSID they get redirected to the captive portal 
>>>>>>>>>>> on PF
>>>>>>>>>>> and authenticate successfully with LDAP. This works great no 
>>>>>>>>>>> problem. I
>>>>>>>>>>> intend to keep that and later change the auth source for guest 
>>>>>>>>>>> Portal.
>>>>>>>>>>>
>>>>>>>>>>> Now I am trying to do vlan assignment. I followed the PF
>>>>>>>>>>> documentation for Ubiquity to set up the controller with the Raduis 
>>>>>>>>>>> profile
>>>>>>>>>>> SSID and all. However, things are not working as expected. I am a 
>>>>>>>>>>> bit
>>>>>>>>>>> confused here.
>>>>>>>>>>> 1. I have created interfaces, registration VLAN - 20  and
>>>>>>>>>>> Isolation VLAN - 30 on the trunk interface.
>>>>>>>>>>> 2. I also have added 3 other production VLANs where I manage DNS
>>>>>>>>>>> and DHCP
>>>>>>>>>>> 3. the open SSID on unifi controller cannot be set to the
>>>>>>>>>>> Registration VLAN 20 when Radius is enabled. So there is no way to
>>>>>>>>>>> communicate with PF via the Registration VLAN hence users cannot 
>>>>>>>>>>> get IPs
>>>>>>>>>>> from PF on the open SSID and therefore cannot log in.
>>>>>>>>>>> I need advice on how to get this working. Do I have to make the
>>>>>>>>>>> registration VLAN the native or default vlan on the trunk and 
>>>>>>>>>>> configure the
>>>>>>>>>>> guest captive portal on a different vlan which i can assign in the 
>>>>>>>>>>> unifi
>>>>>>>>>>> controller?
>>>>>>>>>>>
>>>>>>>>>>> Also, I have a problem where DNS queries on each vlan/subnet
>>>>>>>>>>> points to the PF interface outside that subnet. eg
>>>>>>>>>>> pf.example.com - 192.168.0.1/24 on registration vlan, and PF on
>>>>>>>>>>> captive portal vlan 40 the IP is 192.168.1.1/24 but DNS query
>>>>>>>>>>> from captive portal interface gives registration vlan IP of PF.
>>>>>>>>>>> I would prefer that queries from each vlan would provide the
>>>>>>>>>>> respective PF interface on that vlan,
>>>>>>>>>>> Any help is appreciated.
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> Warm regards,
>>>>>>>>>>> Rexford.
>>>>>>>>>>> _______________________________________________
>>>>>>>>>>> PacketFence-users mailing list
>>>>>>>>>>> PacketFence-users@lists.sourceforge.net
>>>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> --
>>>>>>>>>>
>>>>>>>>>> [image: Imágenes integradas 1]
>>>>>>>>>> _______________________________________________
>>>>>>>>>> PacketFence-users mailing list
>>>>>>>>>> PacketFence-users@lists.sourceforge.net
>>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>
>>>>>>>> --
>>>>>>>>
>>>>>>>> [image: Imágenes integradas 1]
>>>>>>>> _______________________________________________
>>>>>>>> PacketFence-users mailing list
>>>>>>>> PacketFence-users@lists.sourceforge.net
>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>>>>
>>>>>>>
>>>>>>
>>>>>> --
>>>>>>
>>>>>> [image: Imágenes integradas 1]
>>>>>>
>>>>>
>>>>
>>>> --
>>>>
>>>> [image: Imágenes integradas 1]
>>>> _______________________________________________
>>>> PacketFence-users mailing list
>>>> PacketFence-users@lists.sourceforge.net
>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>
>>> _______________________________________________
>>> PacketFence-users mailing list
>>> PacketFence-users@lists.sourceforge.net
>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>
>> _______________________________________________
>> PacketFence-users mailing list
>> PacketFence-users@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>
>

-- 

[image: Imágenes integradas 1]
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to