<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: PacketFence and Summit switches in ExtremeWireless (WiNG)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-wing/packetfence-and-summit-switches/m-p/22109#M1699</link>
    <description>Sorry, I'm not familiar with the way that packet fence operates, however, if it's not routable, then there most likely wouldn't be a way to get a WOL packet to that device unless it's on the same VLAN.</description>
    <pubDate>Sat, 09 Aug 2014 02:04:00 GMT</pubDate>
    <dc:creator>TylerMarcotte</dc:creator>
    <dc:date>2014-08-09T02:04:00Z</dc:date>
    <item>
      <title>PacketFence and Summit switches</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/packetfence-and-summit-switches/m-p/22102#M1692</link>
      <description>Sorry for the amount of detail, but we are trying to setup PacketFence with our Summit switches and I think everything looks fine on the PacketFence side, but I keep getting the following on the test switch:&lt;BR /&gt;
&lt;BR /&gt;
07/30/2014  13:47:39.42 &lt;I&gt; Slot-1: Authentication failed for  Network Login MAC user 3C970EADB66B Mac 3C:97:0E:AD:B6:6B port 5:13&lt;BR /&gt;
&lt;BR /&gt;
    07/30/2014  13:47:39.42 &lt;AAA.RADIUS.NOSERVRESP&gt; Slot-1: No response from server  172.22.0.3 trying local.&lt;BR /&gt;
&lt;BR /&gt;
    07/30/2014  13:47:39.42 &lt;AAA.RADIUS.NOSERVERRESP&gt; Slot-1: No servers responding&lt;BR /&gt;
&lt;BR /&gt;
    07/30/2014  13:47:36.42 &lt;AAA.RADIUS.RESENDPKT&gt; Slot-1: Resend request to  Authentication Server address 172.22.0.3 current request count is 2&lt;BR /&gt;
&lt;BR /&gt;
    07/30/2014  13:47:33.41 &lt;AAA.RADIUS.RESENDPKT&gt; Slot-1: Resend request to  Authentication Server address 172.22.0.3 current request count is 1&lt;BR /&gt;
&lt;BR /&gt;
What steps can I perform on the switch to verify connectivity?  I can ping/trace to the PacketFence server from the switch.&lt;BR /&gt;
&lt;BR /&gt;
  We have PacketFence installed on a server (172.22.0.3).  We have three  interfaces defined in PacketFence: Management (172.22.0.3/23), Isolation  (12.22.2.3/23), and Registration (172.22.38.3/23).  Those interfaces are  plugged into our core Extreme Networks Summit switch into matching VLANs:  “Internal_Appliances” (172.22.0.1/23), “MAC_Isolation” (172.22.2.1/23), and  “MAC_Registration” (172.22.38.1/23).      &lt;BR /&gt;
&lt;BR /&gt;
 That switch is then uplinked to our  desktop switch, where we have created a “MAC_Isolation” (172.22.2.2/23),  “MAC_Registration” (172.22.38.2/23), MAC_Temp (no IP), and “Desktops”  (172.22.34.2/23).  We want the ports to eventually end up in the  “Desktops” VLAN after authorization.&lt;BR /&gt;
&lt;BR /&gt;
                      The steps below were performed on the Extreme switch to which the desktops are  connected, using Port 5:13 as our test.&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    create  vlan MAC_Registration&lt;BR /&gt;
&lt;BR /&gt;
    config  vlan "MAC_Registration" tag 369&lt;BR /&gt;
&lt;BR /&gt;
    create  vlan MAC_Temp&lt;BR /&gt;
&lt;BR /&gt;
    enable  snmp access&lt;BR /&gt;
&lt;BR /&gt;
    configure  snmp add trapreceiver 172.22.0.3 community public vr VR-DEFAULT&lt;BR /&gt;
&lt;BR /&gt;
    configure  vlan MAC_Registration add ports 5:13 untagged&lt;BR /&gt;
&lt;BR /&gt;
    configure  ports 5:13 vlan MAC_Registration lock-learning&lt;BR /&gt;
&lt;BR /&gt;
    disable  snmp traps port-up-down ports 5:13&lt;BR /&gt;
&lt;BR /&gt;
    configure  radius netlogin primary server 172.22.0.3 1812 client-ip 172.22.32.2 vr  VR-Default&lt;BR /&gt;
&lt;BR /&gt;
    configure  radius netlogin primary shared-secret (password)&lt;BR /&gt;
&lt;BR /&gt;
    enable  radius netlogin&lt;BR /&gt;
&lt;BR /&gt;
    configure  netlogin vlan MAC_Temp&lt;BR /&gt;
&lt;BR /&gt;
    enable  netlogin mac&lt;BR /&gt;
&lt;BR /&gt;
    configure  netlogin dynamic-vlan enable&lt;BR /&gt;
&lt;BR /&gt;
    configure  netlogin dynamic-vlan uplink-ports 4:45&lt;BR /&gt;
&lt;BR /&gt;
    configure  netlogin mac authentication database-order radius&lt;BR /&gt;
&lt;BR /&gt;
    enable  netlogin ports 5:13 mac&lt;BR /&gt;
&lt;BR /&gt;
    configure  netlogin ports 5:13 mode port-based-vlans&lt;BR /&gt;
&lt;BR /&gt;
    configure  netlogin ports 5:13 no-restart&lt;BR /&gt;
&lt;BR /&gt;
       The results of “show netlogin” and “show radius” on the switch returns the  following:    &lt;BR /&gt;
&lt;BR /&gt;
Slot-1  Stack.4 # show netlogin&lt;BR /&gt;
&lt;BR /&gt;
NetLogin  Authentication Mode : web-based DISABLED;  802.1x DISABLED;   mac-based ENABLED    &lt;BR /&gt;
&lt;BR /&gt;
NetLogin  VLAN                 : "MAC_Temp"&lt;BR /&gt;
&lt;BR /&gt;
    NetLogin  move-fail-action    : Deny&lt;BR /&gt;
&lt;BR /&gt;
    NetLogin  Client Aging Time   : 5 minutes&lt;BR /&gt;
&lt;BR /&gt;
    Dynamic  VLAN Creation        : Enabled&lt;BR /&gt;
&lt;BR /&gt;
    Dynamic  VLAN Uplink Ports    : 4:45&lt;BR /&gt;
&lt;BR /&gt;
    &lt;BR /&gt;
&lt;BR /&gt;
    ------------------------------------------------&lt;BR /&gt;
&lt;BR /&gt;
             Web-based Mode Global Configuration&lt;BR /&gt;
&lt;BR /&gt;
    ------------------------------------------------&lt;BR /&gt;
&lt;BR /&gt;
    Base-URL                  : network-access.com&lt;BR /&gt;
&lt;BR /&gt;
    Default-Redirect-Page     : ENABLED; &lt;A href="http://www.extremenetworks.com" target="_blank" rel="nofollow noreferrer noopener"&gt;http://www.extremenetworks.com&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    Logout-privilege          : YES&lt;BR /&gt;
&lt;BR /&gt;
    Netlogin  Session-Refresh : ENABLED; 3 minute(s) 0 second(s)&lt;BR /&gt;
&lt;BR /&gt;
    Refresh  failures allowed : 0&lt;BR /&gt;
&lt;BR /&gt;
    Reauthenticate  on refresh: Disabled&lt;BR /&gt;
&lt;BR /&gt;
    Authentication  Database  : Radius, Local-User database&lt;BR /&gt;
&lt;BR /&gt;
    Proxy  Ports               : 80(http),443(https)&lt;BR /&gt;
&lt;BR /&gt;
    ------------------------------------------------&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    ------------------------------------------------&lt;BR /&gt;
&lt;BR /&gt;
             802.1x Mode Global Configuration&lt;BR /&gt;
&lt;BR /&gt;
    ------------------------------------------------&lt;BR /&gt;
&lt;BR /&gt;
    Quiet  Period                     : 60&lt;BR /&gt;
&lt;BR /&gt;
    Supplicant  Response Timeout     : 30&lt;BR /&gt;
&lt;BR /&gt;
    Re-authentication  period        : 3600&lt;BR /&gt;
&lt;BR /&gt;
    Max  Re-authentications          : 3&lt;BR /&gt;
&lt;BR /&gt;
    RADIUS  server timeout           : 30&lt;BR /&gt;
&lt;BR /&gt;
    EAPOL  MPDU version to transmit  : v1&lt;BR /&gt;
&lt;BR /&gt;
    Authentication  Database         : Radius&lt;BR /&gt;
&lt;BR /&gt;
    ------------------------------------------------&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    ------------------------------------------------&lt;BR /&gt;
&lt;BR /&gt;
               MAC Mode Global Configuration&lt;BR /&gt;
&lt;BR /&gt;
    ------------------------------------------------&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MAC  Address/Mask      Password  (encrypted)             Port(s)&lt;BR /&gt;
&lt;BR /&gt;
    --------------------   ------------------------------  ------------------------&lt;BR /&gt;
&lt;BR /&gt;
    Default                &lt;NOT configured=""&gt;                 any&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    Re-authentication  period        : 0 (Re-authentication  disabled)&lt;BR /&gt;
&lt;BR /&gt;
    Authentication  Database         : Radius&lt;BR /&gt;
&lt;BR /&gt;
    ------------------------------------------------&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    Port:  5:13,  Vlan: MAC_Registration,  State: Enabled,  Authentication:  mac-based&lt;BR /&gt;
&lt;BR /&gt;
    Guest  Vlan &lt;NOT configured=""&gt;: Disabled&lt;BR /&gt;
&lt;BR /&gt;
    Authentication  Failure Vlan &lt;NOT configured=""&gt;: Disabled&lt;BR /&gt;
&lt;BR /&gt;
    Authentication  Service-Unavailable Vlan &lt;NOT configured=""&gt;: Disabled&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MAC                 IP address       Authenticated      Type    ReAuth-Timer   User&lt;BR /&gt;
&lt;BR /&gt;
    3c:97:0e??b6:6b   0.0.0.0           No                 MAC     0&lt;BR /&gt;
&lt;BR /&gt;
    -----------------------------------------------&lt;BR /&gt;
&lt;BR /&gt;
    (B)  - Client entry Blackholed in FDB&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    Number  of Clients Authenticated  : 0&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    Slot-1  Stack.5 # show radius&lt;BR /&gt;
&lt;BR /&gt;
    Switch  Management Radius: disabled&lt;BR /&gt;
&lt;BR /&gt;
    Switch  Management Radius server connect time out: 3 seconds&lt;BR /&gt;
&lt;BR /&gt;
    Switch  Management Radius Accounting: disabled&lt;BR /&gt;
&lt;BR /&gt;
    Switch  Management Radius Accounting server connect time out: 3 seconds&lt;BR /&gt;
&lt;BR /&gt;
    Netlogin  Radius: enabled&lt;BR /&gt;
&lt;BR /&gt;
    Netlogin  Radius server connect time out: 3 seconds&lt;BR /&gt;
&lt;BR /&gt;
    Netlogin  Radius Accounting: disabled&lt;BR /&gt;
&lt;BR /&gt;
    Netlogin  Radius Accounting server connect time out: 3 seconds&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    Primary  Netlogin Radius server:&lt;BR /&gt;
&lt;BR /&gt;
         Server name   :&lt;BR /&gt;
&lt;BR /&gt;
         IP address    :  172.22.0.3&lt;BR /&gt;
&lt;BR /&gt;
         Server IP Port:  1812&lt;BR /&gt;
&lt;BR /&gt;
         Client address:  172.22.38.2 (VR-Default)&lt;BR /&gt;
&lt;BR /&gt;
         Shared secret :  2\q;sJ;@F=8Bjn&lt;BR /&gt;
&lt;BR /&gt;
    Access  Requests   :   13752           Access  Accepts    :  0&lt;BR /&gt;
&lt;BR /&gt;
    Access  Rejects    :   0                Access Challenges :  0&lt;BR /&gt;
&lt;BR /&gt;
    Access  Retransmits:   9168            Client  timeouts   :  4584&lt;BR /&gt;
&lt;BR /&gt;
    Bad  authenticators:   0                Unknown types     :  0&lt;BR /&gt;
&lt;BR /&gt;
    Round  Trip Time   :  0&lt;BR /&gt;
&lt;BR /&gt;
 &lt;BR /&gt;
&lt;BR /&gt;&lt;/NOT&gt;&lt;/NOT&gt;&lt;/NOT&gt;&lt;/NOT&gt;&lt;/AAA.RADIUS.RESENDPKT&gt;&lt;/AAA.RADIUS.RESENDPKT&gt;&lt;/AAA.RADIUS.NOSERVERRESP&gt;&lt;/AAA.RADIUS.NOSERVRESP&gt;&lt;/I&gt;</description>
      <pubDate>Thu, 31 Jul 2014 18:37:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/packetfence-and-summit-switches/m-p/22102#M1692</guid>
      <dc:creator>Stephen_Stormon</dc:creator>
      <dc:date>2014-07-31T18:37:00Z</dc:date>
    </item>
    <item>
      <title>RE: PacketFence and Summit switches</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/packetfence-and-summit-switches/m-p/22103#M1693</link>
      <description>Stephen,&lt;BR /&gt;
&lt;BR /&gt;
I would start by running packet capture on the interface of the PacketFence and seeing if you get a RADIUS request there from the switch. If you are not getting a request, then there is a problem network connectivity and you should try 'ping vr "VR-Default" 172.22.0.3 from 172.22.38.2'&lt;BR /&gt;
&lt;BR /&gt;
If you are getting RADIUS requests on the Packetfence interface then most likely the packetfence server isn't set up properly to accept the RADIUS requests. I haven't used Packetfence myself, but I would check the area where you configure RADIUS clients and ensure the shared secret is correct and that the correct Switch IP is added.&lt;BR /&gt;
&lt;BR /&gt;
Tyler</description>
      <pubDate>Thu, 31 Jul 2014 20:29:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/packetfence-and-summit-switches/m-p/22103#M1693</guid>
      <dc:creator>TylerMarcotte</dc:creator>
      <dc:date>2014-07-31T20:29:00Z</dc:date>
    </item>
    <item>
      <title>RE: PacketFence and Summit switches</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/packetfence-and-summit-switches/m-p/22104#M1694</link>
      <description>I jumped right into the ping step and the command that you gave me failed.  On the switch with the 172.22.38.2 VLAN there is also a VLAN that is 172.22.0.2/23 and pinging from that worked.  &lt;BR /&gt;
&lt;BR /&gt;
How can I further troubleshoot why the communication is failing from the 172.22.38.2 address?&lt;BR /&gt;
&lt;BR /&gt;
Slot-1 Stack.4 # ping vr "VR-Default" 172.22.0.3 from 172.22.38.2&lt;BR /&gt;
Ping(ICMP) 172.22.0.3: 4 packets, 8 data bytes, interval 1 second(s).&lt;BR /&gt;
&lt;BR /&gt;
--- 172.22.0.3 ping statistics ---&lt;BR /&gt;
4 packets transmitted, 0 packets received, 100% loss&lt;BR /&gt;
round-trip min/avg/max = 0/0/0 ms&lt;BR /&gt;
&lt;BR /&gt;
Slot-1 Stack.5 # ping vr "VR-Default" 172.22.0.3 from 172.22.0.2&lt;BR /&gt;
Ping(ICMP) 172.22.0.3: 4 packets, 8 data bytes, interval 1 second(s).&lt;BR /&gt;
16 bytes from 172.22.0.3: icmp_seq=0 ttl=64 time=1.985 ms&lt;BR /&gt;
16 bytes from 172.22.0.3: icmp_seq=1 ttl=64 time=1.832 ms&lt;BR /&gt;
16 bytes from 172.22.0.3: icmp_seq=2 ttl=64 time=1.894 ms&lt;BR /&gt;
16 bytes from 172.22.0.3: icmp_seq=3 ttl=64 time=14 ms&lt;BR /&gt;
&lt;BR /&gt;
--- 172.22.0.3 ping statistics ---&lt;BR /&gt;
4 packets transmitted, 4 packets received, 0% loss&lt;BR /&gt;
round-trip min/avg/max = 1/5/14 ms&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 31 Jul 2014 21:50:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/packetfence-and-summit-switches/m-p/22104#M1694</guid>
      <dc:creator>Stephen_Stormon</dc:creator>
      <dc:date>2014-07-31T21:50:00Z</dc:date>
    </item>
    <item>
      <title>RE: PacketFence and Summit switches</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/packetfence-and-summit-switches/m-p/22105#M1695</link>
      <description>My initial guess would be there there is no route between the two addresses and therefore they cannot communicate. You can try the traceroute command to find out where the communication stops. Wherever it stops is most likely where the route is missing. One option that you can try would be to change your RADIUS client settings so that the RADIUS request comes from the directly connected interface. This would look like this:&lt;BR /&gt;
&lt;BR /&gt;
configure radius netlogin primary server 172.22.0.3 1812 client-ip 172.22.0.2 vr VR-Default&lt;BR /&gt;
&lt;BR /&gt;
That would make the RADIUS request come from the 0.2 address instead of the 38.2 address.</description>
      <pubDate>Thu, 31 Jul 2014 21:55:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/packetfence-and-summit-switches/m-p/22105#M1695</guid>
      <dc:creator>TylerMarcotte</dc:creator>
      <dc:date>2014-07-31T21:55:00Z</dc:date>
    </item>
    <item>
      <title>RE: PacketFence and Summit switches</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/packetfence-and-summit-switches/m-p/22106#M1696</link>
      <description>We got this working finally, but now we realized that this method won't allow us to Wake On LAN unless someone has another solution.&lt;BR /&gt;
&lt;BR /&gt;
Basically, devices are put int the "MAC_Temp" VLAN when powered off which appears to be a L2 VLAN that we can't forward anything to.  Does anyone have any solutions on how to work around that?&lt;BR /&gt;
&lt;BR /&gt;
Also, it looks like 802.1x instead of mac based authentication might allow WOL to work?&lt;BR /&gt;</description>
      <pubDate>Sat, 09 Aug 2014 00:02:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/packetfence-and-summit-switches/m-p/22106#M1696</guid>
      <dc:creator>Stephen_Stormon</dc:creator>
      <dc:date>2014-08-09T00:02:00Z</dc:date>
    </item>
    <item>
      <title>RE: PacketFence and Summit switches</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/packetfence-and-summit-switches/m-p/22107#M1697</link>
      <description>Try using 'configure netlogin ports  allow egress-traffic all_cast'. This will allow all traffic to egress a port while in the unauthenticated state.</description>
      <pubDate>Sat, 09 Aug 2014 01:31:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/packetfence-and-summit-switches/m-p/22107#M1697</guid>
      <dc:creator>TylerMarcotte</dc:creator>
      <dc:date>2014-08-09T01:31:00Z</dc:date>
    </item>
    <item>
      <title>RE: PacketFence and Summit switches</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/packetfence-and-summit-switches/m-p/22108#M1698</link>
      <description>That allows traffic out of the port, but it doesn't help with routing the WOL packet to the device on the port.&lt;BR /&gt;</description>
      <pubDate>Sat, 09 Aug 2014 01:35:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/packetfence-and-summit-switches/m-p/22108#M1698</guid>
      <dc:creator>Stephen_Stormon</dc:creator>
      <dc:date>2014-08-09T01:35:00Z</dc:date>
    </item>
    <item>
      <title>RE: PacketFence and Summit switches</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/packetfence-and-summit-switches/m-p/22109#M1699</link>
      <description>Sorry, I'm not familiar with the way that packet fence operates, however, if it's not routable, then there most likely wouldn't be a way to get a WOL packet to that device unless it's on the same VLAN.</description>
      <pubDate>Sat, 09 Aug 2014 02:04:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/packetfence-and-summit-switches/m-p/22109#M1699</guid>
      <dc:creator>TylerMarcotte</dc:creator>
      <dc:date>2014-08-09T02:04:00Z</dc:date>
    </item>
  </channel>
</rss>

