Hello,
the Aruba 6300 Series can 820.1x and Mac Authentication bypass the same way
like the 5400 Series.
So based on packetfence features and the Switch capabilities the 6300 can
replace the 5400 without any disadvantages.
We are currently not using 6300 with packetfence but a customer
Well done!This way the port is open and untagged/tagged vlans are configured. Now the wifi controller or ap has to authenticate the wifi client with 802.1x and use coa to move the client to the correct vlan. You are on the track ;) If someone disconnects the AP the port will switch back to user
Let me know if you some more input. I can provide screenshots and other stuff, that's not a problem :)Am 23.03.2023 08:48 schrieb "Mudrich, J." :
Hello Michael,
THANK YOU! That sounds promising. Now I just have to understand. :D
I’ll get back to you if I have further questions.
Kind
Hello Johannes Mudrich
Perhaps this idea is what you are looking for
to secure our APs we do the following:
1. MAC authentication for our APs
2. Create Radius Filter Engine that matches your AP/requirements and
Modify the Reply:
Answers:
Reply:Egress-VLAN-Name -
Hello,
I did not change anything in iptables.conf.
We have a VMware environment so I can restore the "old" VM every time. Please
find the do-upgrade.sh output below:
Here are the last lines of the output, than the system is not available via
network anymore:
Setting packetfence.target as the
Hello,
I am not in the office today. I can provide all of these logs in ~8 hours. Even
a remote support to collect all required logs is fine for me.
Best regards
Michael Weber
From: Quiniou-Briand, Nicolas
Sent: Monday, October 24, 2022 8:47:25 AM
To:
Dear Mr. Matthies,
thank you very much. We had the same issue on PF 11.2 and were not able to
upgrade to 12.0. This workaround saved a lot of time, really thank you!
Best Regards
Michael
Von: Matthies, Heiko via PacketFence-users
Gesendet: Freitag, 21. Oktober 2022 15:35
An:
Hello all,
is there a way to pass the MAC address of the client to the captive portal?
I think something about: https://packetfence/signup?mac=aabbccddeeff
I would like to use the redirect to a external website and pass the mac to the
portal with something like:
Hello packetfence community,
I implemented 802.1x auth (Ethernet-EAP) against a Windows AD. Both, machine an
user accounts, are working. Great so far!
After that I implement MAC-Based auth for printers. Switch config is fine as I
see a request in logs:
Jun 24 07:56:45 nac01