[PacketFence-users] greenbone-openvas integration no more possible?

2023-04-18 Thread sgiops sgiops via PacketFence-users
Hello The PF documentation is still reporting that openvas is supported and the communication between PF end openvas still happens using the omp protocol. However greenbone use now a new communication protocol (gmp) so i suppose that is no more possible to integrate openvas with PF. Is that right?

[PacketFence-users] table auth_log empty

2023-04-14 Thread sgiops sgiops via PacketFence-users
Hello, I've found that the table "auth_log" in PF database is *empty* so I can't produce reports for dot1x authentications. There is something that should be enabled in order to have authentication events logged in this table? Thanks Mirko ___ PacketF

[PacketFence-users] Reports not working

2023-04-13 Thread sgiops sgiops via PacketFence-users
Hello, I was trying the PF reports functionality but what I obtain is simply "no result" to display. In particular i was trying the Authentication->All report, but I have the same result for all the other reports. It's critical to have an authentication report in order to have the possibility to a

[PacketFence-users] Changing message for authentication failed/succeeded on a NAS

2023-03-29 Thread sgiops sgiops via PacketFence-users
Hello, When I access the CLI oa switch managed by packefence i obtain the following message: "Switch enable access granted by PacketFence" When the login is unsuccessful i obtain "Authentication failed on PacketFence" Is there the possibility to change the default Reply Messages? Regards Mir

Re: [PacketFence-users] Blank Captive Portal

2023-03-24 Thread sgiops sgiops via PacketFence-users
Hello Andrew, Do you have DACL configured for your device? Maybe these are not supported for the device type you choosen. Mirko Il giorno gio 23 mar 2023 alle ore 19:12 Lierman, Andrew via PacketFence-users ha scritto: > I switched to the latest version of PacketFence (12.2.0) from 10.3.0 and

Re: [PacketFence-users] 802.1x machine authentication under Linux

2023-03-21 Thread sgiops sgiops via PacketFence-users
Hello Francis, wpa_supplicant can be used to authenticate the machine once the ethernet interface goes up. Ubuntu seems to already have some script inside the /etc/network/ifup.d. I never managed to do that but i think it's possible. The following link can provide you some idea https://wiki.gent

[PacketFence-users] Unable to load a new Radius Certificate generated by an external certification authority

2023-03-21 Thread sgiops sgiops via PacketFence-users
Hello! In order to put in a production environment the PF server, we generated a new certificate for the radius service. This certificate has been generated using the MS certification authority coming with the domain controllers to have the CA already trusted on all the domain computers. I generat

Re: [PacketFence-users] secure AP Uplink Ports

2023-03-21 Thread sgiops sgiops via PacketFence-users
Hello Johannes, Maybe you are describing the "port-security" functionality (this is usually a feature provided by the switch OS). Or you can use mac address based authentication by manually registering the node (AP). Regards Mirko Il giorno mar 21 mar 2023 alle ore 15:19 Mudrich, J. via PacketF

[PacketFence-users] Another Problem with DACL and Authentication

2023-03-20 Thread sgiops sgiops via PacketFence-users
Hello everyone, i'm trying to configure DACL witch packetfence and a Cisco Switch. The user performs the authentication on the switch and acquires the correct role from PF, but immediately after the successful authentication in the Radius Audit Logs i see the rows reported in the attached image. T

Re: [PacketFence-users] [SOLVED] DACL not applied to the switch interface

2023-03-20 Thread sgiops sgiops via PacketFence-users
a" >> >> >> >> Il giorno gio 16 mar 2023 alle ore 14:56 Fabrice Durand via >> PacketFence-users ha scritto: >> >>> Hello Mirko, >>> >>> what switch module are you using in PacketFence for this switch ? >>> Can you try th

Re: [PacketFence-users] DACL not applied to the switch interface

2023-03-16 Thread sgiops sgiops via PacketFence-users
16 mar 2023 alle ore 14:56 Fabrice Durand via PacketFence-users ha scritto: > Hello Mirko, > > what switch module are you using in PacketFence for this switch ? > Can you try the Catalyst_2960 ? > > Regards > Fabrice > > > Le jeu. 16 mars 2023 à 09:02, sgio

Re: [PacketFence-users] DACL not applied to the switch interface

2023-03-16 Thread sgiops sgiops via PacketFence-users
> >> what switch module are you using in PacketFence for this switch ? >> Can you try the Catalyst_2960 ? >> >> Regards >> Fabrice >> >> >> Le jeu. 16 mars 2023 à 09:02, sgiops sgiops via PacketFence-users < >> packetfence-users@lists.so

[PacketFence-users] DACL not applied to the switch interface

2023-03-16 Thread sgiops sgiops via PacketFence-users
Hi all, i'm experiencing problems with DACL in my testing environment. I defined the access list in Configuration -> Switches -> "my switch" -> Role mapping by Access List. The test access list mapped to the role is: deny tcp any 192.168.5.0 255.255.255.0 permit ip any any The authentication and

Re: [PacketFence-users] DACL not applied to the switch interface

2023-03-16 Thread sgiops sgiops via PacketFence-users
Just upgraded to 12.2 (i was on 12.1) but when i try to save teh switch role configuration i obtain the following error messages: "Unable to validate" "AccessListMapping.0.accesslist: ACLs not supported for switch" Any hint? Mirko Il giorno gio 16 mar 2023 alle ore 09:27 sgiops sgiops ha scr

Re: [PacketFence-users] change HTTPs cert; chain invalid

2023-03-16 Thread sgiops sgiops via PacketFence-users
Hello, i'm having a similar problem but we are trying to change the radius certificate. We generated the Packetfence certificate by the Microsoft domain certification authority in order to have the CA certificate already trusted on our domain workstations. We exported the CA certificate and the Pa

[PacketFence-users] Restrict CLI access to a specific switch group

2022-07-13 Thread sgiops sgiops via PacketFence-users
Hi All, I'm using PacketFence to authenticate the CLI login to my switches, now i would like to restrict the CLI access of some users to a specific switch group. What i'm trying to achieve is: 1) Admin users have to access to all the switches 2) DepartmentX Net-Admins have to access only the Depa