Hi Everyone,
I am trying to get iPSK working with PacketFence/FreeRadius radius.
It looks like everything is working on the PacketFence side of things. Here are the logs from PacketFence:
PACKETFENCE LOG:
Oct 17 22:18:07 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(2131) INFO: [mac:00:e0:4c:19:dd:dd] Connection type is MAC-AUTH. Getting role from node_info (pf::role::getRegisteredRole)
Oct 17 22:18:07 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(2131) INFO: [mac:00:e0:4c:19:dd:dd] Username was defined "00e04c19dd56" - returning role 'WIFI-IT-STAFF-DISTRICT' (pf::role::getRegisteredRole)
Oct 17 22:18:07 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(2131) INFO: [mac:00:e0:4c:19:dd:dd] PID: "user", Status: reg Returned VLAN: (undefined), Role: WIFI-IT-STAFF-DISTRICT (pf::role::fetchRoleForNode)
Oct 17 22:18:07 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(2131) INFO: [mac:00:e0:4c:19:dd:dd] (172.20.110.19) Added VLAN 118 to the returned RADIUS Access-Accept (pf::Switch::returnRadiusAccessAccept)
Oct 17 22:18:07 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(2131) INFO: [mac:00:e0:4c:19:dd:dd] security_event 1300003 force-closed for 00:e0:4c:19:dd:dd (pf::security_event::security_event_force_close)
RADIUS LOG:
Oct 17 22:18:07 srv-pf-02 auth[2992]: [mac:00:e0:4c:19:dd:dd] Accepted user: and returned VLAN 118
Oct 17 22:18:07 srv-pf-02 auth[2992]: (12467) Login OK: [00e04c19dd56] (from client 172.20.10.19/32 port 0 cli 00:e0:4c:19:dd:dd)
Radius is authenticating correctly and returning vlan 118 which is correct but on the Windows machine I am trying to join from I get "Can't connect to this network"
Here are my SSID settings:
Association requirements: Identity PSK with RADIUS
WPA encryption mode: WPA2
Splash page: None
Readius server set to PacketFence management
Radius testing: disabled
Radius CoA: disabled
Client IP assignment: Bridge mode
VLAN tagging: Don't use
Radius override: Radius response can override VLAN tag
Here is the Meraki log for the client:
AP-01 WIFI-BYOD IT-VM-TEST-02 802.11 disassociation client has left AP
AP-01 WIFI-BYOD IT-VM-TEST-02 WPA deauthentication radio: 1, vap: 0, client_mac: 00:E0:4C:19:DD:DD « hide
client_ip 0.0.0.0
aid 1114159115
AP-01 WIFI-BYOD IT-VM-TEST-02 RADIUS authentication resp: reject
AP-01 WIFI-BYOD IT-VM-TEST-02 802.11 association channel: 153, rssi: 26
Thanks.