Hello,
I’m currently working on a PacketFence setup and having trouble with the
dynamic VLAN assignment. Authentication is functioning correctly
(verified via logs), and the switch confirms that 802.1X authentication
is successful. However, VLAN assignment is not working as expected.
Here’s a summary of my setup and the steps I’ve taken:
• I have added the switch and enabled Role Mapping by VLAN ID,
assigning the correct VLAN ID.
• I created an Authentication Source with Authentication Rules
using the memberof condition and the full DN of the LDAP group. This has
been tested with and without any conditions, with the same result.
• The issue persists where no VLAN is assigned after successful
authentication.
Logs
Below are some logs that may help diagnose the issue:
*packetfence.log*
2024-09-16T15:57:44.791790+02:00 packetfence-14
httpd.aaa-docker-wrapper[3036]: httpd.aaa(7) INFO:
[mac:00:e0:4c:68:08:27] Instantiate profile 8021x
(pf::Connection::ProfileFactory::_from_profile)
2024-09-16T15:57:44.809341+02:00 packetfence-14
httpd.aaa-docker-wrapper[3036]: httpd.aaa(7) INFO:
[mac:00:e0:4c:68:08:27] Found authentication source(s) : '' for realm
'null' (pf::config::util::filter_authentication_sources)
2024-09-16T15:57:44.809463+02:00 packetfence-14
httpd.aaa-docker-wrapper[3036]: httpd.aaa(7) INFO:
[mac:00:e0:4c:68:08:27] No rules matches or no category defined for the
node, set it as unreg. (pf::role::getNodeInfoForAutoReg)
2024-09-16T15:57:44.809463+02:00 packetfence-14
httpd.aaa-docker-wrapper[3036]: httpd.aaa(7) WARN:
[mac:00:e0:4c:68:08:27] No category computed for autoreg
(pf::role::getNodeInfoForAutoReg)
2024-09-16T15:57:44.814522+02:00 packetfence-14
httpd.aaa-docker-wrapper[3036]: httpd.aaa(7) INFO:
[mac:00:e0:4c:68:08:27] Username was NOT defined or unable to match a
role - returning node based role '' (pf::role::getRegisteredRole)
2024-09-16T15:57:44.814864+02:00 packetfence-14
httpd.aaa-docker-wrapper[3036]: httpd.aaa(7) WARN:
[mac:00:e0:4c:68:08:27] No parameter Vlan found in conf/switches.conf
for the switch 192.168.188.212 (pf::Switch::getVlanByName)
*radius.log*
2024-09-16T15:57:44.258471+02:00 packetfence-14 auth[91590]: Adding
client 192.168.188.212/32
2024-09-16T15:57:44.827353+02:00 packetfence-14 auth[91590]: (42) Login
OK: [test01] (from client 192.168.188.212/32 port 50004 cli
00:e0:4c:68:08:27 via TLS tunnel)
2024-09-16T15:57:44.837698+02:00 packetfence-14 auth[91590]: (43) Login
OK: [test01] (from client 192.168.188.212/32 port 50004 cli
00:e0:4c:68:08:27)
What I’ve Tried:
• Confirmed that the authentication source is correctly
configured, using an LDAP group with the full DN in the rule.
• Verified that the switch is properly configured for 802.1X and
dynamic VLAN assignment.
• Examined the PacketFence configuration for role mapping and
VLAN settings, but the VLAN remains undefined after authentication.
Environment:
• PacketFence version: 14
• Switch model and firmware:
vios_l2-ADVENTERPRISEK9-M),
Experimental Version 15.2(20200924:215240
C3560 Software (C3560-IPBASE-M),
Version 12.2(35)SE5
• Authentication source: ActiveDirecty
• OS of PacketFence server: Debian 12
Any help or direction on how to resolve this VLAN assignment issue would
be appreciated! Has anyone encountered something similar?
Thanks in advance.
Best regards,
[Your Name]
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users