Unregister your device and give the output of: grep 2c:44:fd:65:ab:27 /usr/local/pf/logs/packetfence.log
Thanks, Ludovic Zammit [email protected] <mailto:[email protected]> :: +1.514.447.4918 (x145) :: www.inverse.ca <https://www.inverse.ca/> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu <http://www.sogo.nu/>) and PacketFence (http://packetfence.org <http://packetfence.org/>) > On Apr 8, 2021, at 12:03 PM, Heusler Marie-Cécile > <[email protected]> wrote: > > So it's weird, because here are my logs when I connect an off-domain machine : > > Apr 8 18:02:06 TPI-PF1 auth[1993]: [mac:2c:44:fd:65:ab:27] Rejected user: > 2c44fd65ab27 > Apr 8 18:02:06 TPI-PF1 auth[1993]: (3098) Rejected in post-auth: > [2c44fd65ab27] (from client 192.168.137.200/32 port 19 cli 2c:44:fd:65:ab:27) > Apr 8 18:02:06 TPI-PF1 auth[1993]: (3098) Incorrect login: [2c44fd65ab27] > (from client 192.168.137.200/32 port 19 cli 2c:44:fd:65:ab:27) > Apr 8 18:02:06 TPI-PF1 auth[1993]: [mac:2c:44:fd:65:ab:27] Rejected user: > 2c44fd65ab27 > Apr 8 18:02:06 TPI-PF1 auth[1993]: (3098) Rejected in post-auth: > [2c44fd65ab27] (from client 192.168.137.200/32 port 19 cli 2c:44:fd:65:ab:27) > Apr 8 18:02:06 TPI-PF1 auth[1993]: (3098) Incorrect login: [2c44fd65ab27] > (from client 192.168.137.200/32 port 19 cli 2c:44:fd:65:ab:27) > > And I get the message 'no role computed by any source > > > However, if I create a 'null' source and create a profile with the filter > "ethernet no-eap" and my null source, it works. > > > > De : Ludovic Zammit <[email protected]> > Envoyé : jeudi, 8 avril 2021 17:56 > À : Heusler Marie-Cécile > Cc : [email protected] > Objet : Re: VLAN for rejected machine > > No, it’s a default behavior, they will be put in VLAN 2 if they are > unregistered. > > Thanks, > > Ludovic Zammit > [email protected] <mailto:[email protected]> :: +1.514.447.4918 (x145) :: > www.inverse.ca <https://www.inverse.ca/> > Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu > <http://www.sogo.nu/>) and PacketFence (http://packetfence.org > <http://packetfence.org/>) > > > > > > > >> On Apr 8, 2021, at 10:25 AM, Heusler Marie-Cécile >> <[email protected] <mailto:[email protected]>> >> wrote: >> >> That's what I did, but do I have to create a specific source for that, and a >> profile ? >> De : Ludovic Zammit <[email protected] <mailto:[email protected]>> >> Envoyé : jeudi, 8 avril 2021 16:11:59 >> À : Heusler Marie-Cécile >> Cc : [email protected] >> <mailto:[email protected]> >> Objet : Re: VLAN for rejected machine >> >> Ok so put VLAN 2 as the registration VLAN in your switch configuration under >> Configuration > Policies and Access Control > Switches > Switch IP > Roles > >> Registration -> 2 >> >> Thanks, >> >> Ludovic Zammit >> [email protected] <mailto:[email protected]> :: +1.514.447.4918 (x145) :: >> www.inverse.ca <https://www.inverse.ca/> >> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >> <http://packetfence.org/>) >> >> >> >> >> >> >> >>> On Apr 8, 2021, at 9:48 AM, Heusler Marie-Cécile >>> <[email protected] <mailto:[email protected]>> >>> wrote: >>> >>> Not really. I just want that devices who don't match with my AD source go >>> to the VLAN2 and can do nothing. >>> >>> >>> >>> De : Ludovic Zammit <[email protected] <mailto:[email protected]>> >>> Envoyé : jeudi, 8 avril 2021 15:29 >>> À : Heusler Marie-Cécile >>> Cc : [email protected] >>> <mailto:[email protected]> >>> Objet : Re: VLAN for rejected machine >>> >>> Is this the registration VLAN ? >>> >>> Thanks, >>> >>> Ludovic Zammit >>> [email protected] <mailto:[email protected]> :: +1.514.447.4918 (x145) >>> :: www.inverse.ca <https://www.inverse.ca/> >>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >>> <http://packetfence.org/>) >>> >>> >>> >>> >>> >>> >>> >>>> On Apr 8, 2021, at 8:12 AM, Heusler Marie-Cécile >>>> <[email protected] <mailto:[email protected]>> >>>> wrote: >>>> >>>> For the time being, VLAN2 simply serves as an isolation VLAN. The >>>> workstations should not access anything from this VLAN. >>>> >>>> >>>> De : Ludovic Zammit <[email protected] <mailto:[email protected]>> >>>> Envoyé : jeudi, 8 avril 2021 13:33 >>>> À : Heusler Marie-Cécile >>>> Cc : [email protected] >>>> <mailto:[email protected]> >>>> Objet : Re: VLAN for rejected machine >>>> >>>> What’s the VLAN 2 and his purpose? >>>> >>>> Thanks, >>>> >>>> Ludovic Zammit >>>> [email protected] <mailto:[email protected]> :: +1.514.447.4918 (x145) >>>> :: www.inverse.ca <https://www.inverse.ca/> >>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >>>> <http://packetfence.org/>) >>>> >>>> >>>> >>>> >>>> >>>> >>>> >>>>> On Apr 8, 2021, at 1:38 AM, Heusler Marie-Cécile >>>>> <[email protected] <mailto:[email protected]>> >>>>> wrote: >>>>> >>>>> The devices are, for example, laptops that are not part of the domain. I >>>>> want them to enter VLAN2, but I don't know them in advance. >>>>> >>>>> Where do I specify that I want them to be in VLAN2, without their login >>>>> failing with my AD source? >>>>> >>>>> What I've tried to do so far is to create a second Authorization source, >>>>> and a new profile that uses that source. I don't know if this is correct. >>>>> >>>>> >>>>> <pastedImage.png> >>>>> >>>>> >>>>> <pastedImage.png> >>>>> >>>>> >>>>> >>>>> Thanks >>>>> De : Ludovic Zammit <[email protected] <mailto:[email protected]>> >>>>> Envoyé : mercredi, 7 avril 2021 13:53:40 >>>>> À : Heusler Marie-Cécile >>>>> Cc : [email protected] >>>>> <mailto:[email protected]> >>>>> Objet : Re: VLAN for rejected machine >>>>> >>>>> With Mac authentication, you will need to pre-import your Mac address if >>>>> you know them, create a VLAN filter that automatically a MAC OUI for >>>>> example or you redirect the on the captive portal to give them an option >>>>> to register themselves. >>>>> >>>>> In your case, if you don’t know them, you return a VLAN 2 (don’t forget >>>>> to return VLAN 2 in the registration role in the switch configuration) >>>>> and they will never get a role and registered. They will end up having >>>>> access on VLAN 2. >>>>> >>>>> What are those devices ? >>>>> >>>>> Thanks, >>>>> >>>>> Ludovic Zammit >>>>> [email protected] <mailto:[email protected]> :: +1.514.447.4918 (x145) >>>>> :: www.inverse.ca <https://www.inverse.ca/> >>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>>>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >>>>> <http://packetfence.org/>) >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>>> On Apr 7, 2021, at 1:25 AM, Heusler Marie-Cécile >>>>>> <[email protected] <mailto:[email protected]>> >>>>>> wrote: >>>>>> >>>>>> Ok, I enabled mac authentication, but now here are my radius logs once I >>>>>> connect the node to the switch: >>>>>> >>>>>> >>>>>> Apr 7 07:19:51 TPI-PF1 auth[1944]: Adding client 192.168.137.200/32 >>>>>> Apr 7 07:19:51 TPI-PF1 auth[1944]: [mac:98:e7:f4:14:44:f0] Accepted >>>>>> user: and returned VLAN >>>>>> Apr 7 07:19:51 TPI-PF1 auth[1944]: (3879) Login OK: [98e7f41444f0] (from >>>>>> client 192.168.137.200/32 port 19 cli 98:e7:f4:14:44:f0) >>>>>> >>>>>> Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: >>>>>> [mac:98:e7:f4:14:44:f0] handling radius autz request: from switch_ip => >>>>>> (192.168.137.200), connection_type => Ethernet-NoEAP,switch_mac => >>>>>> (00:16:b9:0b:37:0d), mac => [98:e7:f4:14:44:f0], port => 19, username => >>>>>> "98e7f41444f0" (pf::radius::authorize) >>>>>> Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: >>>>>> [mac:98:e7:f4:14:44:f0] Instantiate profile default >>>>>> (pf::Connection::ProfileFactory::_from_profile) >>>>>> Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: >>>>>> [mac:98:e7:f4:14:44:f0] Match rule Email-on-role >>>>>> (pf::access_filter::test) >>>>>> Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: >>>>>> [mac:98:e7:f4:14:44:f0] Found authentication source(s) : >>>>>> 'local,file1,MonDomaine' for realm 'null' >>>>>> (pf::config::util::filter_authentication_sources) >>>>>> Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) WARN: >>>>>> [mac:98:e7:f4:14:44:f0] No category computed for autoreg >>>>>> (pf::role::getNodeInfoForAutoReg) >>>>>> Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: >>>>>> [mac:98:e7:f4:14:44:f0] Match rule Email-on-role >>>>>> (pf::access_filter::test) >>>>>> Apr 7 07:19:51 TPI-PF1 packetfence_httpd.webservices: >>>>>> httpd.webservices(1790) WARN: [mac:98:e7:f4:14:44:f0] Unable to pull >>>>>> accounting history for device 98:e7:f4:14:44:f0. The history set doesn't >>>>>> exist yet. (pf::accounting_events_history::latest_mac_history) >>>>>> Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: >>>>>> [mac:98:e7:f4:14:44:f0] Found authentication source(s) : >>>>>> 'local,file1,MonDomaine' for realm 'null' >>>>>> (pf::config::util::filter_authentication_sources) >>>>>> Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: >>>>>> [mac:98:e7:f4:14:44:f0] Connection type is MAC-AUTH. Getting role from >>>>>> node_info (pf::role::getRegisteredRole) >>>>>> Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) WARN: >>>>>> [mac:98:e7:f4:14:44:f0] Use of uninitialized value $role in >>>>>> concatenation (.) or string at /usr/local/pf/lib/pf/role.pm line 489. >>>>>> (pf::role::getRegisteredRole) >>>>>> Apr 7 07:19:51 TPI-PF1 packetfence_httpd.aaa: httpd.aaa(1218) INFO: >>>>>> [mac:98:e7:f4:14:44:f0] Username was NOT defined or unable to match a >>>>>> role - returning node based role '' (pf::role::getRegisteredRole) >>>>>> >>>>>> >>>>>> >>>>>> I tried to create a new connection profile, but the result is the same. >>>>>> >>>>>> Any ideas? >>>>>> >>>>>> Thanks >>>>>> >>>>>> >>>>>> De : Ludovic Zammit <[email protected] <mailto:[email protected]>> >>>>>> Envoyé : mardi, 6 avril 2021 19:48 >>>>>> À : Heusler Marie-Cécile >>>>>> Cc : [email protected] >>>>>> <mailto:[email protected]> >>>>>> Objet : Re: VLAN for rejected machine >>>>>> >>>>>> You can’t because if those not joined machines connect over 802.1x they >>>>>> will fail and stay there. >>>>>> >>>>>> What you want to do is 802.1x + Mac authentication bypass (MAB) on the >>>>>> switch port. >>>>>> >>>>>> A none corporate machine should do MAB and land on the captive portal >>>>>> and authenticate. If you want to skip that part, you can put VLAN ID 2 >>>>>> in the registration role on the switch so everyone that do Mac >>>>>> authentication would be redirected on VLAN 2. >>>>>> >>>>>> Thanks, >>>>>> >>>>>> Ludovic Zammit >>>>>> [email protected] <mailto:[email protected]> :: +1.514.447.4918 >>>>>> (x145) :: www.inverse.ca <https://www.inverse.ca/> >>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>>>>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >>>>>> <http://packetfence.org/>) >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>>> On Apr 6, 2021, at 1:33 PM, Heusler Marie-Cécile >>>>>>> <[email protected] >>>>>>> <mailto:[email protected]>> wrote: >>>>>>> >>>>>>> Hello >>>>>>> >>>>>>> I have an authentication source that gives the role VLAN1 to the >>>>>>> corporate machines. >>>>>>> >>>>>>> >>>>>>> <pastedImage.png> >>>>>>> >>>>>>> <pastedImage.png> >>>>>>> >>>>>>> >>>>>>> Now I want to give to the non-corporate machines the role VLAN2. >>>>>>> However, I can't assign a role to a node that can't login to the source. >>>>>>> >>>>>>> >>>>>>> Adding client 10.104.92.130/32 >>>>>>> Apr 6 19:11:06 packetfence auth[19459]: (195) chrooted_mschap_machine: >>>>>>> ERROR: Program returned code (1) and output 'Logon failure (0xc000006d)' >>>>>>> Apr 6 19:11:06 packetfence auth[19459]: (195) Login incorrect >>>>>>> (chrooted_mschap_machine: Program returned code (1) and output 'Logon >>>>>>> failure (0xc000006d)'): [host/client.tpi.local] (from client >>>>>>> 10.104.92.130/32 port 21 cli 2c:44:fd:65:ab:27 via TLS tunnel) >>>>>>> Apr 6 19:11:06 packetfence auth[19459]: [mac:2c:44:fd:65:ab:27] >>>>>>> Rejected user: host/client.tpi.local >>>>>>> Apr 6 19:11:06 packetfence auth[19459]: (196) Login incorrect >>>>>>> (eap_peap: The users session was previously rejected: returning reject >>>>>>> (again.)): [host/client.tpi.local] (from client 10.104.92.130/32 port >>>>>>> 21 cli 2c:44:fd:65:ab:27) >>>>>>> >>>>>>> >>>>>>> A client that are not in the domain will have a login incorrect. But >>>>>>> how can I say that every client out of the domain will move to the >>>>>>> VLAN2 role ? >>>>>>> >>>>>>> >>>>>>> Thank you for your reply.
_______________________________________________ PacketFence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
