Greetings again list,
Hoping I can get some advice/critique for an ongoing PF installation
on a Debian system. Basic adaptation has now been done but I have run
into a wall at the SMTP level. Scanning the traffic w/tcpdump, it
seems that all SNMP traffic is being kicked out with an 'SNMP Security
access violation'. The snmptrapd.log reports 'Warning: Unknown token:
authCommunity' and extensive searching seems to indicate that there is
some difficulty with recent versions of the net-snmp package. I can't,
however, tell whether the reports are current or not. The system is
running net-snmp version 5.4.3 ... Does anyone have any insight into
this ? I've been trying for days to activate SNMP activity (I *think*
I've tried all possible configuration combinations) but haven't been
able to get it working.
Further, PF, whose DHCP server once passed a basic (that is, already
registered) IP to a client has seemingly stopped working. It's likely
related to the above logjam, but I can't be certain.
We are using an HP Procurve 2600 switch in a test setup.
According, any/all advice, info, insight, criticism would be
appreciated. I've attached all relevant config files and logs.
Thanks to all in advance.
Chris
# This file is generated from a template at
/usr/local/pf/conf/templates/dhcpd_vlan.conf
# Any changes made to this file will be lost on restart
authoritative;
ddns-update-style none;
ignore client-updates;
subnet 192.168.1.0 netmask 255.255.255.0 {
option routers 192.168.1.1;
option subnet-mask 255.255.255.0;
option domain-name "pf.xyz.fr";
option domain-name-servers 192.168.1.1;
range 192.168.1.10 192.168.1.200;
default-lease-time 300;
max-lease-time 600;
}
subnet 192.168.2.0 netmask 255.255.255.0 {
option routers 192.168.2.1;
option subnet-mask 255.255.255.0;
option domain-name "pf_registration.xyz.fr";
option domain-name-servers 192.168.2.1;
range 192.168.2.10 192.168.2.200;
default-lease-time 300;
max-lease-time 600;
}
subnet 192.168.3.0 netmask 255.255.255.0 {
option routers 192.168.3.1;
option subnet-mask 255.255.255.0;
option domain-name "pf_isolation.xyz.fr";
option domain-name-servers 192.168.3.1;
range 192.168.3.10 192.168.3.200;
default-lease-time 300;
max-lease-time 600;
}
subnet 192.168.4.0 netmask 255.255.255.0 {
option routers 192.168.4.1;
option subnet-mask 255.255.255.0;
option domain-name "pf_registration.xyz.fr";
option domain-name-servers 192.168.4.1;
range 192.168.4.10 192.168.4.200;
default-lease-time 300;
max-lease-time 600;
}
subnet 192.168.5.0 netmask 255.255.255.0 {
option routers 192.168.5.1;
option subnet-mask 255.255.255.0;
option domain-name "pf_guests.xyz.fr";
option domain-name-servers 192.168.5.1;
range 192.168.5.10 192.168.5.200;
default-lease-time 300;
max-lease-time 600;
}
# This file is generated from a template at
/usr/local/pf/conf/templates/httpd.conf
# Any changes made to this file will be lost on restart
## cg - from Gentoo docs
ServerRoot /usr/local/pf
HostnameLookups off
User pf
Group pf
ServerAdmin r...@pf.xyz.fr
ServerTokens Prod
ServerSignature Off
UseCanonicalName Off
Timeout 50
KeepAlive On
MaxKeepAliveRequests 100
KeepAliveTimeout 10
MinSpareServers 50
MaxSpareServers 100
StartServers 50
MaxClients 256
MaxRequestsPerChild 0
ServerName pf.xyz.fr
Listen 0.0.0.0:80
Listen 0.0.0.0:443
Listen 0.0.0.0:1443
PidFile /usr/local/pf/var/httpd.pid
LogFormat "%{User-agent}i" agent
LogFormat "%h %l %u %t \"%r\" %>s %b" common
LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\""
combined
AddDefaultCharset ISO-8859-1
AddCharset ISO-8859-1 .iso8859-1 .latin1
AddHandler cgi-script .cgi
TypesConfig /etc/mime.types
AddType .gif image/gif binary
AddType .jpg image/jpg binary
Options Indexes
DirectoryIndex index.html index.cgi index.php
<IfModule !mod_auth_basic.c>
## cg
LoadModule auth_basic_module /usr/lib/apache2/modules/mod_auth_basic.so
</IfModule>
<IfModule !mod_authn_file.c>
## cg
LoadModule authn_file_module /usr/lib/apache2/modules/mod_authn_file.so
</IfModule>
<IfModule !mod_authz_user.c>
## cg
LoadModule authz_user_module /usr/lib/apache2/modules/mod_authz_user.so
</IfModule>
<IfModule !mod_authz_groupfile.c>
## cg
Loadmodule authz_groupfile_module
/usr/lib/apache2/modules/mod_authz_groupfile.so
</IfModule>
<IfModule !mod_rewrite.c>
## cg
LoadModule rewrite_module /usr/lib/apache2/modules/mod_rewrite.so
</IfModule>
<IfModule !mod_cgi.c>
## cg
LoadModule cgi_module /usr/lib/apache2/modules/mod_cgi.so
</IfModule>
<IfModule !mod_mime.c>
## cg
LoadModule mime_module /usr/lib/apache2/modules/mod_mime.so
</IfModule>
<IfModule !mod_dir.c>
## cg
LoadModule dir_module /usr/lib/apache2/modules/mod_dir.so
</IfModule>
<IfModule !mod_alias.c>
## cg
LoadModule alias_module /usr/lib/apache2/modules/mod_alias.so
</IfModule>
<IfModule !mod_log_config.c>
## cg
LoadModule log_config_module /usr/lib/apache2/modules/mod_log_config.so
</IfModule>
<IfModule !mod_ssl.c>
## cg
LoadModule ssl_module /usr/lib/apache2/modules/mod_ssl.so
</IfModule>
<IfModule !mod_setenvif.c>
## cg
LoadModule setenvif_module /usr/lib/apache2/modules/mod_setenvif.so
</IfModule>
<IfModule !mod_proxy.c>
## cg
LoadModule proxy_module /usr/lib/apache2/modules/mod_proxy.so
</IfModule>
<IfModule !proxy_http.c>
## cg
LoadModule proxy_http_module /usr/lib/apache2/modules/mod_proxy_http.so
</IfModule>
<IfModule !mod_authz_host.c>
## cg
LoadModule authz_host_module /usr/lib/apache2/modules/mod_authz_host.so
</IfModule>
<IfModule !mod_headers.c>
## cg
LoadModule headers_module /usr/lib/apache2/modules/mod_headers.so
</IfModule>
<IfModule !sapi_apache2.c>
## cg
LoadModule php5_module /usr/lib/apache2/modules/libphp5.so
##LoadModule php4_module modules/libphp4.so
</IfModule>
AddType application/x-httpd-php .php
#<Files *.php>
# SetOutputFilter PHP
# SetInputFilter PHP
# LimitRequestBody 524288
#</Files>
## cg - from Debian apache2 - php5.conf
##<IfModule mod_php5.c>
## <FilesMatch "\.ph(p3?|tml)$">
## SetHandler application/x-httpd-php
## </FilesMatch>
## <FilesMatch "\.phps$">
## SetHandler application/x-httpd-php-source
## </FilesMatch>
## # To re-enable php in user directories comment the following lines
## # (from <IfModule ...> to </IfModule>.) Do NOT set it to On as it
## # prevents .htaccess files from disabling it.
## <IfModule mod_userdir.c>
## <Directory /home/*/public_html>
## php_admin_value engine Off
## </Directory>
## </IfModule>
##</IfModule>
ProxyRequests Off
<Proxy *>
Order deny,allow
Allow from all
</Proxy>
RewriteLock /usr/local/pf/var/apache_rewrite_lock
#NameVirtualHost *:80
SSLPassPhraseDialog builtin
SSLSessionCache dbm:/usr/local/pf/var/ssl_scache
SSLSessionCacheTimeout 300
SSLMutex file:/usr/local/pf/var/ssl_mutex
SSLRandomSeed startup builtin
SSLRandomSeed connect builtin
SSLCipherSuite ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL
<Files ~ "\.(cgi|shtml|phtml|php3?)$">
SSLOptions +StdEnvVars
</Files>
SetEnvIf User-Agent ".*MSIE.*" \
nokeepalive ssl-unclean-shutdown \
downgrade-1.0 force-response-1.0
<VirtualHost *:80>
DocumentRoot /usr/local/pf/html/user
ServerName pf.xyz.fr:80
Alias /favicon.ico /usr/local/pf/html/common/favicon.ico
Alias /common/ /usr/local/pf/html/common/
ScriptAlias /cgi-bin/ "/usr/local/pf/cgi-bin/"
CustomLog /usr/local/pf/logs/access_log combined
ErrorLog /usr/local/pf/logs/error_log
<DirectoryMatch "/usr/local/pf(/cgi-bin|/html/user)">
Order deny,allow
Deny from all
allow from 192.168.1.0/24 192.168.2.0/24 192.168.3.0/24 192.168.4.0/24
192.168.5.0/24 192.168.3.0/24 192.168.4.0/24 192.168.2.0/24 127.0.0.1
</DirectoryMatch>
RewriteEngine On
#RewriteLogLevel 3
#RewriteLog /usr/local/pf/logs/rewrite_log
#activate if you don't want requests to update servers
#to end up going to the PacketFence system
#RewriteRule ^/msdownload/update.+$ - [F,L]
#RewriteRule ^/wpad.dat$ - [F,L]
#RewriteRule ^/ReportingWebService/ReportingWebService.asmx$ - [F,L]
#RewriteRule ^/v6/windowsupdate.+$ - [F,L]
#RewriteRule ^/v7/windowsupdate.+$ - [F,L]
#RewriteRule ^/remupd/cidsync.upd$ - [F,L]
#RewriteRule ^/NTInst/i386/cidsync.upd$ - [F,L]
# return 403 to Windows Proxy Autodetection (avoid server load)
RewriteRule ^/wpad.dat$ - [F,L]
# Some UserAgents we don't want to mess with (avoid server load)
RewriteCond %{HTTP_USER_AGENT} ^Microsoft-CryptoAPI.* [OR]
RewriteCond %{HTTP_USER_AGENT} ^WinHttp-Autoproxy-Service.* [OR]
# Microsoft Windows Vista / 7 Network Connectivity Status Indicator (NCSI)
RewriteCond %{HTTP_USER_AGENT} "^Microsoft NCSI$" [OR]
RewriteCond %{HTTP_USER_AGENT} ^Windows-Update-Agent.*
RewriteRule ^.*$ - [L,forbidden]
RewriteCond %{REQUEST_URI} !^/favicon.ico
RewriteCond %{REQUEST_URI}
!^/msdownload/update/v3/static/trustedr/en/authrootseq.txt$
RewriteCond %{REQUEST_URI} !^/cgi-bin/redir.cgi
RewriteCond %{REQUEST_URI} !^/cgi-bin/release.cgi
RewriteCond %{REQUEST_URI} !^/cgi-bin/register.cgi
RewriteCond %{REQUEST_URI} !^/cgi-bin/enabler.cgi
RewriteCond %{REQUEST_URI} !^/common
RewriteCond %{REQUEST_URI} !^/content
RewriteCond %{REQUEST_URI} !^/3rdparty
RewriteCond %{REQUEST_URI} !^/status
RewriteCond %{REQUEST_URI} !^/proxies
# Now using temporary redirects instead of permanent (fixes #757)
RewriteRule ^.*$
https://pf.xyz.fr/cgi-bin/redir.cgi?destination_url=http://%{HTTP_HOST}%{REQUEST_URI}
[L,R=302]
ProxyPassReverse /msdownload/update/v3/static/trustedr/en/authrootseq.txt
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt
ProxyPass /msdownload/update/v3/static/trustedr/en/authrootseq.txt
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt
</VirtualHost>
<VirtualHost *:443>
DocumentRoot "/usr/local/pf/html/user"
ServerName pf.xyz.fr:443
Alias /favicon.ico /usr/local/pf/html/common/favicon.ico
Alias /common/ /usr/local/pf/html/common/
#Alias /cgi-bin/register-skip.cgi /usr/local/pf/cgi-bin/register.cgi
ScriptAlias /cgi-bin/ "/usr/local/pf/cgi-bin/"
CustomLog /usr/local/pf/logs/access_log combined
ErrorLog /usr/local/pf/logs/error_log
<DirectoryMatch "/usr/local/pf(/cgi-bin|/html/user)">
SSLOptions +StdEnvVars
Options ExecCGI
Order deny,allow
Deny from all
allow from 192.168.1.0/24 192.168.2.0/24 192.168.3.0/24 192.168.4.0/24
192.168.5.0/24 192.168.3.0/24 192.168.4.0/24 192.168.2.0/24 127.0.0.1
</DirectoryMatch>
SSLEngine on
SSLCertificateFile /usr/local/pf/conf/ssl/server.crt
SSLCertificateKeyFile /usr/local/pf/conf/ssl/server.key
Redirect /status https://pf.xyz.fr/cgi-bin/register.cgi?mode=status
RewriteEngine On
#RewriteLogLevel 3
#RewriteLog /usr/local/pf/logs/rewrite_log
# return 403 to Windows Proxy Autodetection (avoid server load)
RewriteRule ^/wpad.dat$ - [F,L]
# Some UserAgents we don't want to mess with (avoid server load)
RewriteCond %{HTTP_USER_AGENT} ^Microsoft-CryptoAPI.* [OR]
RewriteCond %{HTTP_USER_AGENT} ^WinHttp-Autoproxy-Service.* [OR]
# Microsoft Windows Vista / 7 Network Connectivity Status Indicator (NCSI)
RewriteCond %{HTTP_USER_AGENT} "^Microsoft NCSI$" [OR]
RewriteCond %{HTTP_USER_AGENT} ^Windows-Update-Agent.*
RewriteRule ^.*$ - [L,forbidden]
RewriteCond %{REQUEST_URI} !^/favicon.ico
RewriteCond %{REQUEST_URI} !^/cgi-bin/redir.cgi
RewriteCond %{REQUEST_URI} !^/cgi-bin/release.cgi
RewriteCond %{REQUEST_URI} !^/cgi-bin/register.+\.cgi
RewriteCond %{REQUEST_URI} !^/cgi-bin/register.cgi
RewriteCond %{REQUEST_URI} !^/cgi-bin/enabler.cgi
RewriteCond %{REQUEST_URI} !^/common
RewriteCond %{REQUEST_URI} !^/content
RewriteCond %{REQUEST_URI} !^/3rdparty
RewriteCond %{REQUEST_URI} !^/status
RewriteCond %{REQUEST_URI} !^/proxies
# Now using temporary redirects instead of permanent (fixes #757)
RewriteRule ^.*$
https://pf.xyz.fr/cgi-bin/redir.cgi?destination_url=https://%{HTTP_HOST}%{REQUEST_URI}
[L,R=302]
ProxyPassReverse /proxies/tools/stinger.exe
http://download.nai.com/products/mcafee-avert/stng260.exe
ProxyPass /proxies/tools/stinger.exe
http://download.nai.com/products/mcafee-avert/stng260.exe
<Location /content>
Options Indexes FollowSymLinks ExecCGI
php_value session.save_path "/usr/local/pf/var/session"
#(E_ALL & ~E_NOTICE) = 2047-8
php_value error_reporting 2039
</Location>
</VirtualHost>
<VirtualHost *:1443>
DocumentRoot "/usr/local/pf/html/admin"
ServerName pf.xyz.fr:1443
Alias /favicon.ico /usr/local/pf/html/common/favicon.ico
Alias /common/ /usr/local/pf/html/common/
Alias /cgi-bin/pfcmd.cgi /usr/local/pf/bin/pfcmd
Alias /cgi-bin/pdp.cgi /usr/local/pf/cgi-bin/pdp.cgi
Alias /docs/ /usr/local/pf/docs/
Alias /content/ /usr/local/pf/html/user/content/
CustomLog /usr/local/pf/logs/admin_access_log combined
ErrorLog /usr/local/pf/logs/admin_error_log
SSLEngine on
SSLCertificateFile /usr/local/pf/conf/ssl/server.crt
SSLCertificateKeyFile /usr/local/pf/conf/ssl/server.key
<Location /cgi-bin/pfcmd.cgi>
SetHandler cgi-script
Options Indexes FollowSymLinks ExecCGI
</Location>
<Location /cgi-bin/pdp.cgi>
SetHandler cgi-script
Options Indexes FollowSymLinks ExecCGI
</Location>
<LocationMatch /cgi-bin/(pfcmd|pdp).cgi>
AuthUserFile /usr/local/pf/conf/admin.conf
AuthGroupFile /dev/null
AuthName "PacketFence Authentication"
AuthType Basic
require valid-user
</LocationMatch>
<Location ~ />
Options Indexes FollowSymLinks ExecCGI
#AllowOverride None
#php_value register_globals "On"
php_value register_long_arrays "On"
php_value session.save_path "/usr/local/pf/var/session"
php_value memory_limit "64M"
#(E_ALL & ~E_NOTICE) = 2047-8
php_value error_reporting 2039
## cg
##php_value extension gd.so
</Location>
</VirtualHost>
# This file is generated from a template at
/usr/local/pf/conf/templates/named_vlan.conf
# Any changes made to this file will be lost on restart
options {
directory "/usr/local/pf/conf/named";
pid-file "/usr/local/pf/var/named.pid";
statistics-file "/usr/local/pf/logs/named_stats.txt";
};
key pf {
algorithm "hmac-md5";
secret "KTMl5kgxj9WERwjWbkNBz9xYZcCkoPd13VXsEwKtFcg8mD78AMJknNAdArXG";
};
controls {
inet 127.0.0.1 allow { pf; } keys { pf; };
};
acl pf {
127.0.0.1;
};
view "registration" {
match-clients { 192.168.2.0/24; };
zone "." IN {
type master;
file "named-registration.ca";
allow-update { none; };
};
};
view "isolation" {
match-clients { 192.168.3.0/24; 192.168.4.0/24; };
zone "." IN {
type master;
file "named-isolation.ca";
allow-update { none; };
};
};
; This file is generated from a template at
/usr/local/pf/conf/templates/named-isolation.ca
; Any changes made to this file will be lost on restart
$TTL 3600
. IN SOA pf. pf.pf.xyz.fr (
2009020901 ; serial
10800 ; refresh
3600 ; retry
604800 ; expire
86400 ; default_ttl
)
IN NS pf.
*. IN A 192.168.3.1
IN MX 5 pf.
1.3.168.192.in-addr.arpa. IN PTR pf
; This file is generated from a template at
/usr/local/pf/conf/templates/named-registration.ca
; Any changes made to this file will be lost on restart
$TTL 3600
. IN SOA pf. pf.pf.xyz.fr (
2009020901 ; serial
10800 ; refresh
3600 ; retry
604800 ; expire
86400 ; default_ttl
)
IN NS pf.
*. IN A 192.168.2.1
IN MX 5 pf.
1.2.168.192.in-addr.arpa. IN PTR pf
#
## cg - this file originally empty
#
## regular vlan eth0.101 ip=192.168.1.1
[192.168.1.0]
netmask=255.255.255.0
gateway=192.168.1.1
pf_gateway=192.168.1.254
domain-name=pf.xyz.fr
dns=192.168.1.1
dhcp_start=192.168.1.10
dhcp_end=192.168.1.200
dhcp_default_lease_time=300
dhcp_max_lease_time=600
type=regular
named=enabled
dhcpd=enabled
## registration vlan eth0.102 ip=192.168.2.1
[192.168.2.0]
netmask=255.255.255.0
gateway=192.168.2.1
pf_gateway=192.168.2.254
domain-name=pf_registration.xyz.fr
dns=192.168.2.1
dhcp_start=192.168.2.10
dhcp_end=192.168.2.200
dhcp_default_lease_time=300
dhcp_max_lease_time=600
type=registration
named=enabled
dhcpd=enabled
## isolation vlan eth0.103 ip=192.168.3.1
[192.168.3.0]
gateway=192.168.3.1
pf_gateway=192.168.3.254
netmask=255.255.255.0
domain-name=pf_isolation.xyz.fr
dns=192.168.3.1
dhcp_start=192.168.3.10
dhcp_end=192.168.3.200
dhcp_default_lease_time=300
dhcp_max_lease_time=600
type=isolation
named=enabled
dhcpd=enabled
## mac detection vlan eth0.104 ip=192.168.4.1
[192.168.4.0]
gateway=192.168.4.1
pf_gateway=192.168.4.254
netmask=255.255.255.0
domain-name=pf_registration.xyz.fr
## cg - not certain that these should be included in the Mac detection vlan
dns=192.168.4.1
dhcp_start=192.168.4.10
dhcp_end=192.168.4.200
dhcp_default_lease_time=300
dhcp_max_lease_time=600
## end doubtful section
##type='MAC detection'
##type=detection
type=isolation
##named=disabled
##dhcpd=disabled
named=enabled
dhcpd=enabled
##dns=
##dhcp_start=
##dhcp_end=
##dhcp_default_lease_time=
##dhcp_max_lease_time=
## guest vlan eth0.105 ip=192.168.5.1
[192.168.5.0]
gateway=192.168.5.1
pf_gateway=192.168.5.254
netmask=255.255.255.0
domain-name=pf_guests.xyz.fr
dns=192.168.5.1
dhcp_start=192.168.5.10
dhcp_end=192.168.5.200
dhcp_default_lease_time=300
dhcp_max_lease_time=600
## end doubtful section
##type='MAC detection'
##type=detection
type=regular
##named=disabled
##dhcpd=disabled
named=enabled
dhcpd=enabled
[general]
domain=xyz.fr
hostname=pf
dnsservers=192.168.1.1,192.168.2.1,192.168.3.1,192.168.4.1,192.168.5.1
##dnsservers=127.0.0.1
dhcpservers=192.168.1.1,192.168.2.1,192.168.3.1,192.168.4.1,192.168.5.1
##dhcpservers=127.0.0.1
[network]
mode=vlan
[trapping]
testing=disabled
range=192.168.1.0/24,192.168.2.0/24,192.168.3.0/24,192.168.4.0/24,192.168.5.0/24
##range=192.168.0.0/16
registration=enabled
detection=disabled
passthrough=proxy
[registration]
range=192.168.1.0/24,192.168.2.0/24,192.168.3.0/24,192.168.4.0/24,192.168.5.0/24
##range=192.168.0.0/16
auth=radius
[vlan]
dhcpd=enabled
named=enabled
[database]
pass=secret_pwd
[interface eth0.101]
ip=192.168.1.1
mask=255.255.255.0
##type=internal,managed,monitor
##type=external,managed,monitor
##type=external,managed
type=internal,managed
gateway=192.168.1.1
authorizedips=
[interface eth0.102]
ip=192.168.2.1
mask=255.255.255.0
type=internal
gateway=192.168.2.1
[interface eth0.103]
ip=192.168.3.1
mask=255.255.255.0
type=internal
gateway=192.168.3.1
[interface eth0.104]
ip=192.168.4.1
mask=255.255.255.0
type=internal
gateway=192.168.4.1
[interface eth0.105]
ip=192.168.5.1
mask=255.255.255.0
type=internal
##type=external
gateway=192.168.5.1
%%userLines%%
%%authLines%%
##--cg - snip
##disableAuthorization yes
##--snip
format1 %V|%#04.4y-%#02.2m-%02.2l|%#02.2h:%#02.2j:%#02.2k|%b|%a|BEGIN
TYPE %w END TYPE BEGIN SUBTYPE %q END SUBTYPE BEGIN VARIABLEBINDINGS %v END
VARIABLEBINDINGS\n
format2 %V|%#04.4y-%#02.2m-%02.2l|%#02.2h:%#02.2j:%#02.2k|%b|%a|BEGIN
TYPE %w END TYPE BEGIN SUBTYPE %q END SUBTYPE BEGIN VARIABLEBINDINGS %v END
VARIABLEBINDINGS\n
#
# Copyright 2006-2008 Inverse inc.
[default]
vlans = 101,102,103,104,105
normalVlan = 101
registrationVlan = 102
isolationVlan = 103
macDetectionVlan = 104
guestVlan = 105
VoIPEnabled = no
mode = production
macSearchesMaxNb = 30
macSearchesSleepInterval = 2
uplink = dynamic
cliTransport = Telnet
SNMPCommunityTrap = public
##SNMPCommunityTrap = rd_pub
SNMPAuthCommunity = public
##SNMPAuthCommunity = wr_pub
# PacketFence -> Switch
SNMPVersion = 1
SNMPCommunityRead = rd_pub
SNMPCommunityWrite = wr_pub
SNMPEngineID = 0000000000000
SNMPUserNameRead = readUser
SNMPAuthProtocolRead = MD5
SNMPAuthPasswordRead = authpwdread
SNMPPrivProtocolRead = DES
SNMPPrivPasswordRead = privpwdread
SNMPUserNameWrite = writeUser
SNMPAuthProtocolWrite = MD5
SNMPAuthPasswordWrite = authpwdwrite
SNMPPrivProtocolWrite = DES
SNMPPrivPasswordWrite = privpwdwrite
# Switch -> PacketFence
SNMPVersionTrap = 1
SNMPUserNameTrap = readUser
SNMPAuthProtocolTrap = MD5
SNMPAuthPasswordTrap = authpwdread
SNMPPrivProtocolTrap = DES
SNMPPrivPasswordTrap = privpwdread
[127.0.0.1]
type = PacketFence
mode = production
uplink = dynamic
[137.194.50.147]
type=HP::Procurve_2600
uplink = 50
mode = production
Sep 09 11:24:50 pfcmd(0) INFO: /usr/sbin/named status
(pf::services::service_ctl)
Sep 09 11:24:50 pfcmd(0) INFO: pidof -x named returned 0
(pf::services::service_ctl)
Sep 09 11:24:50 pfcmd(0) INFO: /usr/sbin/dhcpd status
(pf::services::service_ctl)
Sep 09 11:24:50 pfcmd(0) INFO: pidof -x dhcpd returned 0
(pf::services::service_ctl)
Sep 09 11:24:50 pfcmd(0) INFO: /usr/local/pf/sbin/pfdhcplistener status
(pf::services::service_ctl)
Sep 09 11:24:50 pfcmd(0) INFO: pidof -x pfdhcplistener returned 0
(pf::services::service_ctl)
Sep 09 11:24:50 pfcmd(0) INFO: /usr/local/pf/sbin/pfmon status
(pf::services::service_ctl)
Sep 09 11:24:50 pfcmd(0) INFO: pidof -x pfmon returned 0
(pf::services::service_ctl)
Sep 09 11:24:50 pfcmd(0) INFO: /usr/local/pf/sbin/pfdetect status
(pf::services::service_ctl)
Sep 09 11:24:50 pfcmd(0) INFO: pidof -x pfdetect returned 0
(pf::services::service_ctl)
Sep 09 11:24:50 pfcmd(0) INFO: /usr/local/pf/sbin/pfredirect status
(pf::services::service_ctl)
Sep 09 11:24:50 pfcmd(0) INFO: pidof -x pfredirect returned 0
(pf::services::service_ctl)
Sep 09 11:24:50 pfcmd(0) INFO: /usr/sbin/snort status
(pf::services::service_ctl)
Sep 09 11:24:50 pfcmd(0) INFO: pidof -x snort returned 0
(pf::services::service_ctl)
Sep 09 11:24:50 pfcmd(0) INFO: /usr/sbin/httpd status
(pf::services::service_ctl)
Sep 09 11:24:50 pfcmd(0) INFO: pidof -x apache2 returned 0
(pf::services::service_ctl)
Sep 09 11:24:50 pfcmd(0) INFO: /usr/sbin/snmptrapd status
(pf::services::service_ctl)
Sep 09 11:24:50 pfcmd(0) INFO: pidof -x snmptrapd returned 0
(pf::services::service_ctl)
Sep 09 11:24:50 pfcmd(0) INFO: /usr/local/pf/sbin/pfsetvlan status
(pf::services::service_ctl)
Sep 09 11:24:50 pfcmd(0) INFO: pidof -x pfsetvlan returned 0
(pf::services::service_ctl)
Sep 09 11:24:51 pfcmd(0) INFO: /usr/sbin/named start (pf::services::service_ctl)
Sep 09 11:24:51 pfcmd(0) INFO: Generating configuration file for named
(generate_named_conf) (pf::services::service_ctl)
Sep 09 11:24:51 pfcmd(0) INFO: Starting named with '/usr/sbin/named -u pf -c
/usr/local/pf/conf/named.conf' (pf::services::service_ctl)
Sep 09 11:24:51 pfcmd(0) INFO: /usr/sbin/dhcpd start (pf::services::service_ctl)
Sep 09 11:24:51 pfcmd(0) INFO: Generating configuration file for dhcpd
(generate_dhcpd_conf) (pf::services::service_ctl)
Sep 09 11:24:51 pfcmd(0) INFO: Command `/sbin/route add -net 192.168.2.0
netmask 255.255.255.0 gw 192.168.2.254` succedeed !
(pf::services::manage_Static_Route)
Sep 09 11:24:51 pfcmd(0) INFO: Command `/sbin/route add -net 192.168.3.0
netmask 255.255.255.0 gw 192.168.3.254` succedeed !
(pf::services::manage_Static_Route)
Sep 09 11:24:51 pfcmd(0) INFO: Command `/sbin/route add -net 192.168.4.0
netmask 255.255.255.0 gw 192.168.4.254` succedeed !
(pf::services::manage_Static_Route)
Sep 09 11:24:51 pfcmd(0) INFO: Starting dhcpd with '/usr/sbin/dhcpd -lf
/usr/local/pf/conf/dhcpd/dhcpd.leases -cf /usr/local/pf/conf/dhcpd.conf '
(pf::services::service_ctl)
Sep 09 11:24:51 pfcmd(0) INFO: /usr/local/pf/sbin/pfdhcplistener start
(pf::services::service_ctl)
Sep 09 11:24:51 pfcmd(0) INFO: Starting pfdhcplistener with
'/usr/local/pf/sbin/pfdhcplistener -i eth0.101 -d &' (pf::services::service_ctl)
Sep 09 11:24:51 pfcmd(0) INFO: Starting pfdhcplistener with
'/usr/local/pf/sbin/pfdhcplistener -i eth0.102 -d &' (pf::services::service_ctl)
Sep 09 11:24:51 pfcmd(0) INFO: Starting pfdhcplistener with
'/usr/local/pf/sbin/pfdhcplistener -i eth0.103 -d &' (pf::services::service_ctl)
Sep 09 11:24:51 pfcmd(0) INFO: Starting pfdhcplistener with
'/usr/local/pf/sbin/pfdhcplistener -i eth0.104 -d &' (pf::services::service_ctl)
Sep 09 11:24:51 pfcmd(0) INFO: Starting pfdhcplistener with
'/usr/local/pf/sbin/pfdhcplistener -i eth0.105 -d &' (pf::services::service_ctl)
Sep 09 11:24:51 pfcmd(0) INFO: /usr/local/pf/sbin/pfmon start
(pf::services::service_ctl)
Sep 09 11:24:51 pfcmd(0) INFO: Starting pfmon with '/usr/local/pf/sbin/pfmon -d
&' (pf::services::service_ctl)
Sep 09 11:24:51 pfcmd(0) INFO: /usr/sbin/httpd start (pf::services::service_ctl)
Sep 09 11:24:51 pfcmd(0) INFO: Generating configuration file for httpd
(generate_httpd_conf) (pf::services::service_ctl)
Sep 09 11:24:51 pfcmd(0) INFO: generating /usr/local/pf/conf/httpd.conf
(pf::services::generate_httpd_conf)
Sep 09 11:24:51 pfcmd(0) INFO: Starting httpd with '/usr/sbin/httpd -f
/usr/local/pf/conf/httpd.conf' (pf::services::service_ctl)
Sep 09 11:24:51 pfcmd(0) INFO: /usr/sbin/snmptrapd start
(pf::services::service_ctl)
Sep 09 11:24:51 pfcmd(0) INFO: Generating configuration file for snmptrapd
(generate_snmptrapd_conf) (pf::services::service_ctl)
Sep 09 11:24:52 pfcmd(0) INFO: generating /usr/local/pf/conf/snmptrapd.conf
(pf::services::generate_snmptrapd_conf)
Sep 09 11:24:52 pfcmd(0) INFO: Starting snmptrapd with '/usr/sbin/snmptrapd -n
-c /usr/local/pf/conf/snmptrapd.conf -C -A -Lf /usr/local/pf/logs/snmptrapd.log
-p /usr/local/pf/var/snmptrapd.pid -On' (pf::services::service_ctl)
Sep 09 11:24:52 pfcmd(0) INFO: /usr/local/pf/sbin/pfsetvlan start
(pf::services::service_ctl)
Sep 09 11:24:52 pfcmd(0) INFO: Starting pfsetvlan with
'/usr/local/pf/sbin/pfsetvlan -d &' (pf::services::service_ctl)
Sep 09 11:24:52 pfdhcplistener(0) INFO: pfdhcplistener_eth0.102 starting and
writing 10685 to /usr/local/pf/var/pfdhcplistener_eth0.102.pid
(pf::util::createpid)
Sep 09 11:24:52 pfdhcplistener(0) INFO: DHCP detector on eth0.102 enabled
(main::)
Sep 09 11:24:52 pfdhcplistener(0) INFO: pfdhcplistener_eth0.104 starting and
writing 10686 to /usr/local/pf/var/pfdhcplistener_eth0.104.pid
(pf::util::createpid)
Sep 09 11:24:52 pfdhcplistener(0) INFO: DHCP detector on eth0.104 enabled
(main::)
Sep 09 11:24:52 pfdhcplistener(0) INFO: pfdhcplistener_eth0.101 starting and
writing 10687 to /usr/local/pf/var/pfdhcplistener_eth0.101.pid
(pf::util::createpid)
Sep 09 11:24:52 pfdhcplistener(0) INFO: DHCP detector on eth0.101 enabled
(main::)
Sep 09 11:24:52 pfdhcplistener(0) INFO: pfdhcplistener_eth0.103 starting and
writing 10688 to /usr/local/pf/var/pfdhcplistener_eth0.103.pid
(pf::util::createpid)
Sep 09 11:24:52 pfdhcplistener(0) INFO: DHCP detector on eth0.103 enabled
(main::)
Sep 09 11:24:52 pfdhcplistener(0) INFO: pfdhcplistener_eth0.105 starting and
writing 10689 to /usr/local/pf/var/pfdhcplistener_eth0.105.pid
(pf::util::createpid)
Sep 09 11:24:52 pfdhcplistener(0) INFO: DHCP detector on eth0.105 enabled
(main::)
Sep 09 11:24:52 pfmon(0) INFO: pfmon starting and writing 10690 to
/usr/local/pf/var/pfmon.pid (pf::util::createpid)
Sep 09 11:24:52 pfmon(1) INFO: Starting cleanup thread (main::cleanup)
Sep 09 11:24:52 pfmon(1) INFO: closing open iplogs (just in case)
(main::cleanup)
Sep 09 11:24:52 pfmon(1) INFO: closing open iplogs (pf::iplog::iplog_shutdown)
Sep 09 11:24:52 pfsetvlan(0) INFO: pfsetvlan starting and writing 10692 to
/usr/local/pf/var/pfsetvlan.pid (pf::util::createpid)
Sep 09 11:24:52 pfsetvlan(0) INFO: Process started (main::)
Sep 09 11:33:52 pfmon(1) INFO: running expire check (main::cleanup)
Sep 09 11:33:52 pfmon(1) INFO: checking registered nodes for expiration
(main::cleanup)
Sep 09 11:43:39 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 11:43:39 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 11:43:40 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 11:43:40 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 11:43:41 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 11:43:42 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 11:43:52 pfmon(1) INFO: running expire check (main::cleanup)
Sep 09 11:43:52 pfmon(1) INFO: checking registered nodes for expiration
(main::cleanup)
Sep 09 11:53:52 pfmon(1) INFO: running expire check (main::cleanup)
Sep 09 11:53:52 pfmon(1) INFO: checking registered nodes for expiration
(main::cleanup)
Sep 09 12:03:52 pfmon(1) INFO: running expire check (main::cleanup)
Sep 09 12:03:52 pfmon(1) INFO: checking registered nodes for expiration
(main::cleanup)
Sep 09 12:13:52 pfmon(1) INFO: running expire check (main::cleanup)
Sep 09 12:13:52 pfmon(1) INFO: checking registered nodes for expiration
(main::cleanup)
Sep 09 12:23:52 pfmon(1) INFO: running expire check (main::cleanup)
Sep 09 12:23:52 pfmon(1) INFO: checking registered nodes for expiration
(main::cleanup)
Sep 09 12:33:52 pfmon(1) INFO: running expire check (main::cleanup)
Sep 09 12:33:52 pfmon(1) INFO: checking registered nodes for expiration
(main::cleanup)
Sep 09 12:43:34 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 12:43:35 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 12:43:35 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 12:43:36 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 12:43:37 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 12:43:38 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 12:43:52 pfmon(1) INFO: running expire check (main::cleanup)
Sep 09 12:43:52 pfmon(1) INFO: checking registered nodes for expiration
(main::cleanup)
Sep 09 12:53:52 pfmon(1) INFO: running expire check (main::cleanup)
Sep 09 12:53:52 pfmon(1) INFO: checking registered nodes for expiration
(main::cleanup)
Sep 09 13:03:52 pfmon(1) INFO: running expire check (main::cleanup)
Sep 09 13:03:52 pfmon(1) INFO: checking registered nodes for expiration
(main::cleanup)
Sep 09 13:13:52 pfmon(1) INFO: running expire check (main::cleanup)
Sep 09 13:13:52 pfmon(1) INFO: checking registered nodes for expiration
(main::cleanup)
Sep 09 13:23:52 pfmon(1) INFO: running expire check (main::cleanup)
Sep 09 13:23:52 pfmon(1) INFO: checking registered nodes for expiration
(main::cleanup)
Sep 09 13:33:52 pfmon(1) INFO: running expire check (main::cleanup)
Sep 09 13:33:52 pfmon(1) INFO: checking registered nodes for expiration
(main::cleanup)
Sep 09 13:43:33 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 13:43:34 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 13:43:34 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 13:43:35 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 13:43:36 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 13:43:37 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 13:43:52 pfmon(1) INFO: running expire check (main::cleanup)
Sep 09 13:43:52 pfmon(1) INFO: checking registered nodes for expiration
(main::cleanup)
Sep 09 13:53:52 pfmon(1) INFO: running expire check (main::cleanup)
Sep 09 13:53:52 pfmon(1) INFO: checking registered nodes for expiration
(main::cleanup)
Sep 09 14:03:52 pfmon(1) INFO: running expire check (main::cleanup)
Sep 09 14:03:52 pfmon(1) INFO: checking registered nodes for expiration
(main::cleanup)
Sep 09 14:13:52 pfmon(1) INFO: running expire check (main::cleanup)
Sep 09 14:13:52 pfmon(1) INFO: checking registered nodes for expiration
(main::cleanup)
Sep 09 14:23:52 pfmon(1) INFO: running expire check (main::cleanup)
Sep 09 14:23:52 pfmon(1) INFO: checking registered nodes for expiration
(main::cleanup)
Sep 09 14:33:52 pfmon(1) INFO: running expire check (main::cleanup)
Sep 09 14:33:52 pfmon(1) INFO: checking registered nodes for expiration
(main::cleanup)
Sep 09 14:43:33 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 14:43:34 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 14:43:34 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 14:43:35 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 14:43:36 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 14:43:37 pfsetvlan(0) WARN: ignoring non trap line No access
configuration - dropping trap. (main::)
Sep 09 14:43:52 pfmon(1) INFO: running expire check (main::cleanup)
Sep 09 14:43:52 pfmon(1) INFO: checking registered nodes for expiration
(main::cleanup)
Sep 09 14:53:52 pfmon(1) INFO: running expire check (main::cleanup)
Sep 09 14:53:52 pfmon(1) INFO: checking registered nodes for expiration
(main::cleanup)
Sep 09 15:03:52 pfmon(1) INFO: running expire check (main::cleanup)
Sep 09 15:03:52 pfmon(1) INFO: checking registered nodes for expiration
(main::cleanup)
Sep 09 15:13:52 pfmon(1) INFO: running expire check (main::cleanup)
Sep 09 15:13:52 pfmon(1) INFO: checking registered nodes for expiration
(main::cleanup)
/usr/local/pf/conf/snmptrapd.conf: line 2: Warning: Unknown token:
authCommunity.
NET-SNMP version 5.4.3
No access configuration - dropping trap.
No access configuration - dropping trap.
No access configuration - dropping trap.
No access configuration - dropping trap.
No access configuration - dropping trap.
No access configuration - dropping trap.
No access configuration - dropping trap.
No access configuration - dropping trap.
No access configuration - dropping trap.
No access configuration - dropping trap.
No access configuration - dropping trap.
No access configuration - dropping trap.
No access configuration - dropping trap.
No access configuration - dropping trap.
No access configuration - dropping trap.
No access configuration - dropping trap.
No access configuration - dropping trap.
No access configuration - dropping trap.
No access configuration - dropping trap.
No access configuration - dropping trap.
No access configuration - dropping trap.
No access configuration - dropping trap.
No access configuration - dropping trap.
No access configuration - dropping trap.
------------------------------------------------------------------------------
This SF.net Dev2Dev email is sponsored by:
Show off your parallel programming skills.
Enter the Intel(R) Threading Challenge 2010.
http://p.sf.net/sfu/intel-thread-sfd
_______________________________________________
Packetfence-users mailing list
Packetfence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users