jwlc 0.0.38 → 0.0.39
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/jwlc.rb +16 -16
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: ef1698e5ee4a96d4e0149746391ddff367f2fdd4
|
4
|
+
data.tar.gz: 53aaa1f904e5507d42e22548f39fe16d50039a0d
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 6cf8be41574f983b2201ed0f990810217c3c941d85e4bfca4b88434352575ff08b720aebb05d5f003536278efc3513b7537adff66b9d990b24d63f4b79ea88a4
|
7
|
+
data.tar.gz: 218e333b9970eba2f8bc82bb11606d082fcccd1a18ac1d0d70e4ac24dd803eab6b8d7b149ba59798fdf1acb912d4cea98a907fcd5bb76ba9c93c9199a782848e
|
data/lib/jwlc.rb
CHANGED
@@ -1,8 +1,8 @@
|
|
1
1
|
require 'jwlc'
|
2
2
|
|
3
3
|
class Auth
|
4
|
-
#
|
5
|
-
#
|
4
|
+
# Authenticate a Guest user to a Juniper Networks Wireless LAN controller implemented as a Ruby method. All this does is send the RADIUS CoA packet
|
5
|
+
# to authenticate the user. You need to create a web portal to authencate the user (if required) prior to passing this RADIUS CoA message to the WLC.
|
6
6
|
#
|
7
7
|
# Example Login:
|
8
8
|
# >> Auth.login('10.0.0.100','web-portal-Guest','xx:xx:xx:xx:xx:xx','Guest',' ','testing123', 8)
|
@@ -27,25 +27,25 @@ class Auth
|
|
27
27
|
# 4) Radius Shared secret (String)
|
28
28
|
#
|
29
29
|
#
|
30
|
-
#
|
31
|
-
#
|
32
|
-
#
|
30
|
+
# In order for this method to correctly function the WLC needs to be appropriatly configured with a
|
31
|
+
# suitable RADIUS DAC entry for the server (that originates this CoA request and a user needs to be
|
32
|
+
# in an unauthenticated state on the WLC.
|
33
33
|
#
|
34
|
-
#
|
35
|
-
#
|
34
|
+
# On the WLC configure the following entries for your Guest SSID once configured to ensure the server
|
35
|
+
# inititing this method is permitted to send RADIUS CoA.
|
36
36
|
#
|
37
37
|
#
|
38
|
-
#
|
39
|
-
#
|
40
|
-
#
|
41
|
-
#
|
42
|
-
#
|
38
|
+
# set service-profile Guest ssid-name Guest
|
39
|
+
# set service-profile Guest ssid-type clear
|
40
|
+
# set service-profile Guest auth-fallthru web-portal
|
41
|
+
# set service-profile Guest web-portal-form http://10.0.0.99:8080/guestportal <- Note, you need to create this portal :)
|
42
|
+
# set service-profile Guest web-portal-acl portalacl
|
43
43
|
#
|
44
|
-
#
|
45
|
-
#
|
44
|
+
# set radius dac ruby-dac-server address 10.0.0.99 key testing123
|
45
|
+
# set authorization dynamic ssid Guest ruby-dac-server
|
46
46
|
#
|
47
|
-
#
|
48
|
-
#
|
47
|
+
# You are required to have the freeradius dictionary files located in /usr/share/freeradius.
|
48
|
+
# Freeradius doesn't need to be operational, just the dictionary files are used.
|
49
49
|
#
|
50
50
|
|
51
51
|
def self.login(var1, var2, var3, var4, var5, var6)
|