As a follow-up, the deauth issue is resolved. The resolution required a
patch.
https://github.com/inverse-inc/packetfence/issues/5203 - My post
https://github.com/inverse-inc/packetfence/issues/5074 - A related issue
I'll open a separate email chain regarding the SSH issue.
*Nicholas P. Pier*
Some updates...
Packetfence version is 9.3.
packetfence-9.3.0-20200113144930.108928498.0007.el7.x86_64
So for Radius DeAuth/CoA I get the following errors with different
templates in packetfence.log:
Juniper EX2200v15:
Mar 13 20:27:32 packetfence packetfence: INFO pfperl-api(2998):
Module may have not been built at all. I'd open an issue ticket just to get
it on the list. Might have been something either overlooked, or that
someone tested and it didn't work. Either way you'll get an answer faster.
On Fri, Mar 13, 2020 at 1:53 PM Nicholas Pier <09np...@gmail.com> wrote:
>
Hello,
Does anyone know a cli, log or other troubleshooting resource for
packetfence's internal SSH client?
- Port 22 is open between the server and the switch.
- From the server, I can SSH into the switch with the same credentials
I've provided packetfence in the UI.
- I've also
Not a problem. No change Friday has me a little board this week. As for
the restart port fewture it works. I use it all the time. Not sure what
snmp version your using but I'm using v3 and haven't had an issue. It may
be a mib that's not loaded.
I have some old ex's laying around somewhere. If I
Hey Zacharry,
Thanks for making time for the back and forth.
I've used all templates (EX, EX2200, EX2200 v15, EX2300) and a mix of auth
methods with each. I've tried to be pretty thorough without luck. If
someone who's using Juniper switches chimes in and tells me a combo that's
working it would
I'm seeing conflicting information there. The switch lets me configure an
alternate CoA port. It's clearly an option in the CLI.
However, the official documentation doesn't list the EX4200s as supporting
changes to authorization. They're an end of support device. So, it could
just be that the
I wonder if it's like the Aruba 2930s where it supports half of 3576 (COA)
only. For device type are you using EX series? Or one of the others? You
may have to change the device type and play with it a bit
On Fri, Mar 13, 2020, 10:40 AM Nicholas Pier <09np...@gmail.com> wrote:
> I'm seeing
Lol whoops! I was working on a couple firewalls and totally mixed up my
rfcs! 3576 is the one I meant.
On Fri, Mar 13, 2020, 8:49 AM Nicholas Pier <09np...@gmail.com> wrote:
> **accidentally sent too soon***
>
>
>
Ah that's the problem. If I use /Aruba or anything else I get the Not
Implemented. Get to /Aruba is not supported.
On Thu, Mar 12, 2020, 5:53 PM Durand fabrice via PacketFence-users <
packetfence-users@lists.sourceforge.net> wrote:
> In this case, is it a webauth setup ? (
>
Hi Zachary,
How does OSPF help in the scenario? Is that the right RFC?
To answer your question, the OSPF VPN feature is not supported until later
hardware (according to the following link).
*Nicholas P. Pier*
Network Architect
CCNP R, PCNSE, VCIX6-DCV, VCIX6-NV, RHCE, CEHv10
On Fri, Mar 13,
Do those switches support rfc 4576?
On Thu, Mar 12, 2020, 5:42 PM Nicholas Pier via PacketFence-users <
packetfence-users@lists.sourceforge.net> wrote:
> Hello,
>
> The Juniper switches are properly placing nodes on vlans based on roles if
> there's an up/down port event. The problem is that, I
**accidentally sent too soon***
https://www.juniper.net/documentation/en_US/junos/topics/reference/standards/ospf.html
Click on "Platform and Release Support" for details.
*Nicholas P. Pier*
Network Architect
CCNP R, PCNSE, VCIX6-DCV, VCIX6-NV, RHCE, CEHv10
On Fri, Mar 13, 2020 at 11:48 AM
Look at the screenshot of my settings, maybe somebody helps me. We need
registrate users to our portal with google authentication. All client id
and client secret we have and put to the Google Sources in Packetfense, but
our redirect to central page of sites and Node or User did not register and
14 matches
Mail list logo