hi,
you must ensure you 'sign out' of the AD before you clone as otherwise
both objects are the same...and, as you have found, doing something
with the cloen breaks the first server. or just dont bind to the AD before
cloning.
to fix, you need to ensure that both machines have their own
Did you also change the MAC address for the network adapter in the VMWare
settings? Otherwise VMWare believes (and possibly your network too) the two
machines are the same.
After changing the MAC address, reconfigure your network settings on the clone
and reboot. Delete the trust (computer)
Hi again.
I'm confused now. I've recompiled, renamed all old folder under
/usr/local and done a complete reinstall.
I've pared it all down and simply put
switch %{control:Tmp-String-0} {
case {
update control {
Tmp-String-0 := new value
}
}
}
In the default VS.
I still get
/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d -
/var/log/freeradius/radacct/192.168.59.202/auth-detail-20131011
[auth_log]
/var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands
to /var/log/freeradius/radacct/192.168.59.202/auth-detail-20131011
[auth_log
I have a Free Radius Server (2.1.10-5 packaged with CentOS 6) that is
configured to handle radius authentication eaps ttls in a tunnel
(Motorola/Cambium Canopy Product). I want to be able to authenticate
plain text requests from other devices that do not support eaps. Can
Free Radius handle
Gilbert T. Gutierrez, Jr. wrote:
I have a Free Radius Server (2.1.10-5 packaged with CentOS 6) that is
configured to handle radius authentication eaps ttls in a tunnel
(Motorola/Cambium Canopy Product). I want to be able to authenticate
plain text requests from other devices that do not
authorize from file
/etc/freeradius/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
[auth_log] expand:
/var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d -
/var/log/freeradius/radacct/192.168.59.202/auth-detail-20131011
[auth_log]
/var/log
Hi all!
I have a problem with users using the anonymous identity field during
connecting.
It turned out that for privacy reasons it is hidden outside of the
tunnel. I found that by setting use_tunneling_reply to yes i can
transfer the inner username outside of the tunnel, and the correct
(not
So what you're saying is that even though the users are using anonymous outerid
and want anonymity you want to release their id to the site they are at?
--
Sent from my Android device with K-9 Mail. Please excuse my brevity.-
List info/subscribe/unsubscribe? See
9 matches
Mail list logo