jwlc 0.0.38 → 0.0.39
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/jwlc.rb +16 -16
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: ef1698e5ee4a96d4e0149746391ddff367f2fdd4
|
4
|
+
data.tar.gz: 53aaa1f904e5507d42e22548f39fe16d50039a0d
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 6cf8be41574f983b2201ed0f990810217c3c941d85e4bfca4b88434352575ff08b720aebb05d5f003536278efc3513b7537adff66b9d990b24d63f4b79ea88a4
|
7
|
+
data.tar.gz: 218e333b9970eba2f8bc82bb11606d082fcccd1a18ac1d0d70e4ac24dd803eab6b8d7b149ba59798fdf1acb912d4cea98a907fcd5bb76ba9c93c9199a782848e
|
data/lib/jwlc.rb
CHANGED
@@ -1,8 +1,8 @@
|
|
1
1
|
require 'jwlc'
|
2
2
|
|
3
3
|
class Auth
|
4
|
-
#
|
5
|
-
#
|
4
|
+
# Authenticate a Guest user to a Juniper Networks Wireless LAN controller implemented as a Ruby method. All this does is send the RADIUS CoA packet
|
5
|
+
# to authenticate the user. You need to create a web portal to authencate the user (if required) prior to passing this RADIUS CoA message to the WLC.
|
6
6
|
#
|
7
7
|
# Example Login:
|
8
8
|
# >> Auth.login('10.0.0.100','web-portal-Guest','xx:xx:xx:xx:xx:xx','Guest',' ','testing123', 8)
|
@@ -27,25 +27,25 @@ class Auth
|
|
27
27
|
# 4) Radius Shared secret (String)
|
28
28
|
#
|
29
29
|
#
|
30
|
-
#
|
31
|
-
#
|
32
|
-
#
|
30
|
+
# In order for this method to correctly function the WLC needs to be appropriatly configured with a
|
31
|
+
# suitable RADIUS DAC entry for the server (that originates this CoA request and a user needs to be
|
32
|
+
# in an unauthenticated state on the WLC.
|
33
33
|
#
|
34
|
-
#
|
35
|
-
#
|
34
|
+
# On the WLC configure the following entries for your Guest SSID once configured to ensure the server
|
35
|
+
# inititing this method is permitted to send RADIUS CoA.
|
36
36
|
#
|
37
37
|
#
|
38
|
-
#
|
39
|
-
#
|
40
|
-
#
|
41
|
-
#
|
42
|
-
#
|
38
|
+
# set service-profile Guest ssid-name Guest
|
39
|
+
# set service-profile Guest ssid-type clear
|
40
|
+
# set service-profile Guest auth-fallthru web-portal
|
41
|
+
# set service-profile Guest web-portal-form http://10.0.0.99:8080/guestportal <- Note, you need to create this portal :)
|
42
|
+
# set service-profile Guest web-portal-acl portalacl
|
43
43
|
#
|
44
|
-
#
|
45
|
-
#
|
44
|
+
# set radius dac ruby-dac-server address 10.0.0.99 key testing123
|
45
|
+
# set authorization dynamic ssid Guest ruby-dac-server
|
46
46
|
#
|
47
|
-
#
|
48
|
-
#
|
47
|
+
# You are required to have the freeradius dictionary files located in /usr/share/freeradius.
|
48
|
+
# Freeradius doesn't need to be operational, just the dictionary files are used.
|
49
49
|
#
|
50
50
|
|
51
51
|
def self.login(var1, var2, var3, var4, var5, var6)
|