> The entry is triggered by the RADIUS request.

So, how does it work with an open SSID and no encryption?

Jake Sallee
Godfather of Bandwidth
System Engineer
University of Mary Hardin-Baylor
900 College St.
Belton, Texas
76513
Fone: 254-295-4658
Phax: 254-295-4221

From: Francois Gaudreault [mailto:[email protected]]
Sent: Wednesday, June 29, 2011 7:08 AM
To: [email protected]
Subject: Re: [Packetfence-users] No location Log entry

HI Jake,

The entry is triggered by the RADIUS request.  The locationlog entry will 
contain, if we can grab it, the SSID where the user connected to, and the ip of 
the AP/controller from where the RADIUS request came from.

On 11-06-28 7:41 PM, Sallee, Stephen (Jake) wrote:
When a wireless user is redirected to the captive portal for authentication 
what triggers an entry to be made in the location log and when does it get 
triggered?  If I have an open SSID what tells PF where the user is so it can 
make the entry in the log?



Jake Sallee
Godfather of Bandwidth
System Engineer
University of Mary Hardin-Baylor
900 College St.
Belton, Texas
76513
Fone: 254-295-4658
Phax: 254-295-4221






------------------------------------------------------------------------------

All of the data generated in your IT infrastructure is seriously valuable.

Why? It contains a definitive record of application performance, security

threats, fraudulent activity, and more. Splunk takes this data and makes

sense of it. IT sense. And common sense.

http://p.sf.net/sfu/splunk-d2d-c2





_______________________________________________

Packetfence-users mailing list

[email protected]<mailto:[email protected]>

https://lists.sourceforge.net/lists/listinfo/packetfence-users




--

Francois Gaudreault, ing. jr

[email protected]<mailto:[email protected]>  ::  +1.514.447.4918 
(x130) ::  www.inverse.ca<http://www.inverse.ca>

Inverse inc. :: Leaders behind SOGo (www.sogo.nu<http://www.sogo.nu>) and 
PacketFence (www.packetfence.org<http://www.packetfence.org>)
------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security 
threats, fraudulent activity, and more. Splunk takes this data and makes 
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2d-c2
_______________________________________________
Packetfence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to