Developers guide

Chapter 7
Copyright © 2008-2013 Inverse inc.
Optional components 60
Note
You may also want to set other attributes such as auto_enable, grace, etc.
When done with the violation, visit the Web Administration under Configuration Compliance
Statement of Health and (edit the filter named Default, or) use the Add a filter button to create a filter
named antivirus. Click on antivirus in the filter list, and select Trigger violation in the action drop-down.
Enter the vid of the violation you created above in the input box that appears.
Next, click on Add a condition, and select Anti-virus, is, and disabled in the drop-down boxes that appear.
Click on the Save filters button. Finally, reload the violations either by restarting PacketFence or using
the pfcmd reload violations command.
The last step is to create a new remediation template called noantivirus.php on the filesystem in the
html/captive-portal/violations folder. Edit it to include the text you want to display to the users.
Apple Wireless Profile Provisioning
Apple devices such as iPhones, iPads, and iPods support wireless profile importation using a special
XML file format (mobileconfig). In fact, installing such file on your phone will automatically configure the
wireless settings for a given SSID. This feature is often used when the SSID is hidden, and you want to
easy the configuration steps on the phone (because it is painful to configure manually). In PacketFence,
we are going further, we generate the profile according to the administrator desire, and we pre-populate
the file with the user’s credentials (without the password). The user simply need to install its generated
file, and he will be able to use the new SSID.
Configure the feature
In order to activate this feature, you simply need to add 3 options to your pf.conf.
provisioning.autoconfig Enable or disable the feature
provisioning.ssid This is the SSID you want the user to connect
to upon registration
provisioning.category Activate this feature to a specific category or
any.
Here is an example: We have an hidden WPA2-Enterprise SSID named HiddenSecure, and we want to
provision this wireless profile to everybody registering with an iPhone, iPad, or iPod. The configuration
in pf.conf would look like:
[provisioning]
autoconfig=enabled
ssid=HiddenSecure
category=any