Hi,

 

Did you setup up authentication rules in your authentication sources?

Did you setup portal modules and assign it to connection profiles?

Did you setup role by switch role in switches settings?

 

Tomasz Karczewski

Administrator Sieci

 



 

[email protected]

http://www.man.olsztyn.pl      http://www.uwm.edu.pl

tel. (89) 523 45 55  fax. (89) 523 43 47

 

Ośrodek Eksploatacji i Zarządzania

Miejską Siecią Komputerową OLMAN w Olsztynie

Uniwersytet Warmińsko-Mazurski w Olsztynie

 

From: P.Thirunavukkarasu via PacketFence-users 
<[email protected]> 
Sent: Wednesday, December 22, 2021 1:26 PM
To: [email protected]
Cc: P.Thirunavukkarasu <[email protected]>
Subject: [*Suspicious Email*] [PacketFence-users] Aruba VC and RADIUS 
Configuration in Packetfence with Google Secure LDAP and MS AAD

 

Hi Team,

Greetings

Configured the Roles, Realms, Authentication Sources (Google Secure LDAP and MS 
Azure AD for Education) in the PF. (Google Secure LDAP connection verified 
successfully)

We are using Aruba IAPs in our campus as clusters. 

Is it possible to add the Aruba Virtual Controller (VC) in the Network Devices 
group?

I can see the Aruba Switches and WLC in the Switches, not the VC. 

In the Network Configuration added the interfaces for the Registration, 
Isolation and the others for RADIUS.

In the EAP Profile I changed the default profile from PEAP to TTLS. 

My requirement is implementation of 802.1x authentication and accounting of 
wi-fi users against the Google Secure LDAP and the MS AAD associated with their 
realms. 

How to configure the RADIUS to authenticate the users with their associated 
realms in PF?

vlans are already configured in the core switch (Aruba 6300M). This vlans 
should be assigned to the users dynamically after authentication...

Regards,

Thirunavukkarasu

 

 

 

 

_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to