Hello Everybody

FreeRadius authentication fails, an idea to solve this problem?
Sending Access-Challenge of id 247 to 192.168.1.2 port 1645
        EAP-Message = 
0x010d01781900c32850c9f355add22e039f7a9a4ef96edb0b33767c168aeaf575d8d26494d2e6cd715f6a70fe8377a37018d1f3254b4bae26c5aca97ac653503a27691bd39c5ad21036c878e9b6593470f3d5cedbb58724115df12424f48b386d8eb93cb655c5e57b00010200800767e713904be2daa84d880c4db8b5b304897c45b951a437c6ae21a1d438fa73207fa21274ffbbb5db0b129148499685fe7c755f6584c1203129f4f69fe416782a0d114b07671e39d77560fe67be048207006f8cdd79a787e9b2092e5f0f16e0bdbc67927d4714e89eae11e085e4c95978c7ee50c4160ae219fe180fd41acc57008012fe15fe45bf03be015158de7eb1
        EAP-Message = 
0xe4f2417d4b3a1598e2686e690c987ca1a2bf39c0a75c860098dee44140dbf7549ffbcdce8ec4d1c6ea71f129007325b7bba833332eb4cb0896917c817fde7ad40b7d1597c5e1c98e9870ee8b1059e810120571a65d514e3d26d219b35f5c4b78f5d67591e46c8e16788ff74103c042da71b816030100040e000000
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x490fd9034b02c0804a1bee4268779615
Finished request 281.
Going to the next request
Waking up in 1.6 seconds.
rad_recv: Access-Request packet from host 192.168.1.2 port 1645, id=248, 
length=412
        User-Name = "user"
        Service-Type = Framed-User
        Framed-MTU = 1500
        Called-Station-Id = "00-1C-0E-50-7C-0D"
        Calling-Station-Id = "00-14-C2-0D-50-9D"
        EAP-Message = 
0x020d00d01980000000c616030100861000008200807302318977ccd8430d6e4fa804f934aa0b95f722050d3f6dcae53a69912dba99c07d8604a371c990890f1ce96cb54cdf04985f5145bc11161356a8da849d86f21a30426746bc66f61797472ef01cfd87f21b6db9170074bf1e5f8236f68a31e9906ded90b93a41f953781441e17edd59a675aa0c990383a105054019a08638981403010001011603010030b425131e349e2c557a05f367f6e00019ce7d1ddec2fdfa7b6466f81fefc7b5fb9477c20f17d5923f9bf9d5f887ac7d9b
        Message-Authenticator = 0x98b2f909d84f7f776cd705559c8f0efc
        Cisco-AVPair = "audit-session-id=C0A801020000004B00BDA722"
        NAS-Port-Type = Ethernet
        NAS-Port = 50013
        NAS-Port-Id = "GigabitEthernet0/13"
        State = 0x490fd9034b02c0804a1bee4268779615
        NAS-IP-Address = 192.168.1.2
server packetfence {
+- entering group authorize {...}
[suffix] No '@' in User-Name = "user", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] EAP packet type response id 13 length 208
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
  TLS Length 198
[peap] Length Included
[peap] eaptls_verify returned 11 
[peap] <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange  
[peap]     TLS_accept: SSLv3 read client key exchange A 
[peap] <<< TLS 1.0 ChangeCipherSpec [length 0001]  
[peap] <<< TLS 1.0 Handshake [length 0010], Finished  
[peap]     TLS_accept: SSLv3 read finished A 
[peap] >>> TLS 1.0 ChangeCipherSpec [length 0001]  
[peap]     TLS_accept: SSLv3 write change cipher spec A 
[peap] >>> TLS 1.0 Handshake [length 0010], Finished  
[peap]     TLS_accept: SSLv3 write finished A 
[peap]     TLS_accept: SSLv3 flush data 
[peap]     (other): SSL negotiation finished successfully 
SSL Connection Established 
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
} # server packetfence
Sending Access-Challenge of id 248 to 192.168.1.2 port 1645
        EAP-Message = 
0x010e004119001403010001011603010030008d737c127ae01a3175db6c892d50fc2249020bfc467b12e6c034951a873a4fc67296040a9c24556145e7fe23e13816
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x490fd9034a01c0804a1bee4268779615
Finished request 282.
Going to the next request
Waking up in 1.6 seconds.
rad_recv: Access-Request packet from host 192.168.1.2 port 1645, id=249, 
length=210
        User-Name = "user"
        Service-Type = Framed-User
        Framed-MTU = 1500
        Called-Station-Id = "00-1C-0E-50-7C-0D"
        Calling-Station-Id = "00-14-C2-0D-50-9D"
        EAP-Message = 0x020e00061900
        Message-Authenticator = 0x97ff379b80ddf11aaa87721ada158d61
        Cisco-AVPair = "audit-session-id=C0A801020000004B00BDA722"
        NAS-Port-Type = Ethernet
        NAS-Port = 50013
        NAS-Port-Id = "GigabitEthernet0/13"
        State = 0x490fd9034a01c0804a1bee4268779615
        NAS-IP-Address = 192.168.1.2
server packetfence {
+- entering group authorize {...}
[suffix] No '@' in User-Name = "user", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] EAP packet type response id 14 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake is finished
[peap] eaptls_verify returned 3 
[peap] eaptls_process returned 3 
[peap] EAPTLS_SUCCESS
++[eap] returns handled
} # server packetfence
Sending Access-Challenge of id 249 to 192.168.1.2 port 1645
        EAP-Message = 
0x010f002b1900170301002002db0ad60ae44722c4bbefad9abca4945754650a836b61dea7cb71424402708f
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x490fd9034d00c0804a1bee4268779615
Finished request 283.
Going to the next request
Waking up in 1.6 seconds.
rad_recv: Access-Request packet from host 192.168.1.2 port 1645, id=250, 
length=284
        User-Name = "user"
        Service-Type = Framed-User
        Framed-MTU = 1500
        Called-Station-Id = "00-1C-0E-50-7C-0D"
        Calling-Station-Id = "00-14-C2-0D-50-9D"
        EAP-Message = 
0x020f00501900170301002080bf3609b6ccbc83422efd0eab2976e64773f65e6c17193495fbe0e3fdaa00471703010020f3d5d028399c9231279d366a3c60f4b6020dfa39ab63836e95be6e5a4fdd3546
        Message-Authenticator = 0x946c3a5abeb9e6894c5ef427b112f183
        Cisco-AVPair = "audit-session-id=C0A801020000004B00BDA722"
        NAS-Port-Type = Ethernet
        NAS-Port = 50013
        NAS-Port-Id = "GigabitEthernet0/13"
        State = 0x490fd9034d00c0804a1bee4268779615
        NAS-IP-Address = 192.168.1.2
server packetfence {
+- entering group authorize {...}
[suffix] No '@' in User-Name = "user", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] EAP packet type response id 15 length 80
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Identity - user
[peap] Got tunneled request
        EAP-Message = 0x020f00090175736572
server packetfence {
  PEAP: Got tunneled identity of user
  PEAP: Setting default EAP type for tunneled EAP session.
  PEAP: Setting User-Name to user
Sending tunneled request
        EAP-Message = 0x020f00090175736572
        FreeRADIUS-Proxied-To = 127.0.0.1
        User-Name = "user"
        Service-Type = Framed-User
        Framed-MTU = 1500
        Called-Station-Id = "00-1C-0E-50-7C-0D"
        Calling-Station-Id = "00-14-C2-0D-50-9D"
        Cisco-AVPair = "audit-session-id=C0A801020000004B00BDA722"
        NAS-Port-Type = Ethernet
        NAS-Port = 50013
        NAS-Port-Id = "GigabitEthernet0/13"
        NAS-IP-Address = 192.168.1.2
server packetfence-tunnel {
+- entering group authorize {...}
[suffix] No '@' in User-Name = "user", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 15 length 9
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
[files] users: Matched entry user at line 3
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
++[eap] returns handled
} # server packetfence-tunnel
[peap] Got tunneled reply code 11
        EAP-Message = 
0x0110001e1a01100019104029521a17dd74f217a4f6532040dbd375736572
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x3c412a6a3c5130c8386697566b8db05d
[peap] Got tunneled reply RADIUS code 11
        EAP-Message = 
0x0110001e1a01100019104029521a17dd74f217a4f6532040dbd375736572
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x3c412a6a3c5130c8386697566b8db05d
[peap] Got tunneled Access-Challenge
++[eap] returns handled
} # server packetfence
Sending Access-Challenge of id 250 to 192.168.1.2 port 1645
        EAP-Message = 
0x0110004b190017030100406db65cd2fb548e0bc97d379d641a05d133b841f64708f4f44701f75c95b8aa0f15bb02a06a65e34066cf87b364eb69ddf6c87489ea75978060386c97e0fc20d0
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x490fd9034c1fc0804a1bee4268779615
Finished request 284.
Going to the next request
Waking up in 1.6 seconds.
rad_recv: Access-Request packet from host 192.168.1.2 port 1645, id=251, 
length=332
        User-Name = "user"
        Service-Type = Framed-User
        Framed-MTU = 1500
        Called-Station-Id = "00-1C-0E-50-7C-0D"
        Calling-Station-Id = "00-14-C2-0D-50-9D"
        EAP-Message = 
0x02100080190017030100201f7e37f274aa004ef11c35009a1d7e6bec054e1f64f7688b976e69dfba21c13d1703010050624efb47d454c63198ef7239447dc4a9fe80d21d30d0a344b9a1d23f3ba239afbde3d8678c75dd69316a55e13ce684f34c385328f179a3190576a8bf82feff544d2329ecad7b2e1ee8480b40b67d8974
        Message-Authenticator = 0x06a2cd1f71ab75116e288637fb45909d
        Cisco-AVPair = "audit-session-id=C0A801020000004B00BDA722"
        NAS-Port-Type = Ethernet
        NAS-Port = 50013
        NAS-Port-Id = "GigabitEthernet0/13"
        State = 0x490fd9034c1fc0804a1bee4268779615
        NAS-IP-Address = 192.168.1.2
server packetfence {
+- entering group authorize {...}
[suffix] No '@' in User-Name = "user", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] EAP packet type response id 16 length 128
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] EAP type mschapv2
[peap] Got tunneled request
        EAP-Message = 
0x0210003f1a0210003a31435a69dcb477d9f7684acc0d6f24a4990000000000000000612cd9e43e84abbb7c532e2753139e57d5d86a37a9697b410075736572
server packetfence {
  PEAP: Setting User-Name to user
Sending tunneled request
        EAP-Message = 
0x0210003f1a0210003a31435a69dcb477d9f7684acc0d6f24a4990000000000000000612cd9e43e84abbb7c532e2753139e57d5d86a37a9697b410075736572
        FreeRADIUS-Proxied-To = 127.0.0.1
        User-Name = "user"
        State = 0x3c412a6a3c5130c8386697566b8db05d
        Service-Type = Framed-User
        Framed-MTU = 1500
        Called-Station-Id = "00-1C-0E-50-7C-0D"
        Calling-Station-Id = "00-14-C2-0D-50-9D"
        Cisco-AVPair = "audit-session-id=C0A801020000004B00BDA722"
        NAS-Port-Type = Ethernet
        NAS-Port = 50013
        NAS-Port-Id = "GigabitEthernet0/13"
        NAS-IP-Address = 192.168.1.2
server packetfence-tunnel {
+- entering group authorize {...}
[suffix] No '@' in User-Name = "user", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 16 length 63
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
[files] users: Matched entry user at line 3
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/mschapv2
[eap] processing type mschapv2
[mschapv2] +- entering group MS-CHAP {...}
[mschap] Told to do MS-CHAPv2 for user with NT-Password
[mschap] adding MS-CHAPv2 MPPE keys
++[mschap] returns ok
MSCHAP Success 
++[eap] returns handled
} # server packetfence-tunnel
[peap] Got tunneled reply code 11
        EAP-Message = 
0x011100331a0310002e533d33453636314345333235413230463631363443343233353033414634313646324644323331344235
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x3c412a6a3d5030c8386697566b8db05d
[peap] Got tunneled reply RADIUS code 11
        EAP-Message = 
0x011100331a0310002e533d33453636314345333235413230463631363443343233353033414634313646324644323331344235
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x3c412a6a3d5030c8386697566b8db05d
[peap] Got tunneled Access-Challenge
++[eap] returns handled
} # server packetfence
Sending Access-Challenge of id 251 to 192.168.1.2 port 1645
        EAP-Message = 
0x0111005b190017030100505b822e579e27557458d81afaec848fcdc7b4194264c87409611f58095cf08e8f58ec26a3c9ed28e40f63581ba720c12257d66eae5ab4f89a0291c0e1f9421a4f78a8062e33264a8544f315efcdab0324
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x490fd9034f1ec0804a1bee4268779615
Finished request 285.
Going to the next request
Waking up in 1.5 seconds.
rad_recv: Access-Request packet from host 192.168.1.2 port 1645, id=252, 
length=284
        User-Name = "user"
        Service-Type = Framed-User
        Framed-MTU = 1500
        Called-Station-Id = "00-1C-0E-50-7C-0D"
        Calling-Station-Id = "00-14-C2-0D-50-9D"
        EAP-Message = 
0x0211005019001703010020140e432f0b458f4e8c93fb806d25bf04ed4fb5140058b953785d38387f1214b01703010020509f39e5f01d75b95f2d5615237b7769646f0cc28e286571e511063d3c8642bb
        Message-Authenticator = 0x7ada6354cb85df8f76eb52ed2f4bd819
        Cisco-AVPair = "audit-session-id=C0A801020000004B00BDA722"
        NAS-Port-Type = Ethernet
        NAS-Port = 50013
        NAS-Port-Id = "GigabitEthernet0/13"
        State = 0x490fd9034f1ec0804a1bee4268779615
        NAS-IP-Address = 192.168.1.2
server packetfence {
+- entering group authorize {...}
[suffix] No '@' in User-Name = "user", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] EAP packet type response id 17 length 80
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] EAP type mschapv2
[peap] Got tunneled request
        EAP-Message = 0x021100061a03
server packetfence {
  PEAP: Setting User-Name to user
Sending tunneled request
        EAP-Message = 0x021100061a03
        FreeRADIUS-Proxied-To = 127.0.0.1
        User-Name = "user"
        State = 0x3c412a6a3d5030c8386697566b8db05d
        Service-Type = Framed-User
        Framed-MTU = 1500
        Called-Station-Id = "00-1C-0E-50-7C-0D"
        Calling-Station-Id = "00-14-C2-0D-50-9D"
        Cisco-AVPair = "audit-session-id=C0A801020000004B00BDA722"
        NAS-Port-Type = Ethernet
        NAS-Port = 50013
        NAS-Port-Id = "GigabitEthernet0/13"
        NAS-IP-Address = 192.168.1.2
server packetfence-tunnel {
+- entering group authorize {...}
[suffix] No '@' in User-Name = "user", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 17 length 6
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
[files] users: Matched entry user at line 3
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/mschapv2
[eap] processing type mschapv2
[eap] Freeing handler
++[eap] returns ok
+- entering group post-auth {...}
++[exec] returns noop
rlm_perl: PacketFence DENIED CONNECTION because of SOAP error see syslog for 
details.
rlm_perl: Added pair NAS-Port-Type = Ethernet
rlm_perl: Added pair Service-Type = Framed-User
rlm_perl: Added pair Calling-Station-Id = 00-14-C2-0D-50-9D
rlm_perl: Added pair Called-Station-Id = 00-1C-0E-50-7C-0D
rlm_perl: Added pair State = 0x3c412a6a3d5030c8386697566b8db05d
rlm_perl: Added pair FreeRADIUS-Proxied-To = 127.0.0.1
rlm_perl: Added pair Cisco-AVPair = audit-session-id=C0A801020000004B00BDA722
rlm_perl: Added pair User-Name = user
rlm_perl: Added pair EAP-Message = 0x021100061a03
rlm_perl: Added pair EAP-Type = MS-CHAP-V2
rlm_perl: Added pair NAS-IP-Address = 192.168.1.2
rlm_perl: Added pair NAS-Port = 50013
rlm_perl: Added pair NAS-Port-Id = GigabitEthernet0/13
rlm_perl: Added pair Framed-MTU = 1500
rlm_perl: Added pair User-Name = user
rlm_perl: Added pair EAP-Message = 0x03110004
rlm_perl: Added pair Message-Authenticator = 0x00000000000000000000000000000000
rlm_perl: Added pair Cleartext-Password = user
rlm_perl: Added pair Auth-Type = EAP
++[perl] returns fail
} # server packetfence-tunnel
[peap] Got tunneled reply code 3
        User-Name = "user"
        EAP-Message = 0x03110004
        Message-Authenticator = 0x00000000000000000000000000000000
[peap] Got tunneled reply RADIUS code 3
        User-Name = "user"
        EAP-Message = 0x03110004
        Message-Authenticator = 0x00000000000000000000000000000000
[peap] Tunneled authentication was rejected.
[peap] FAILURE
++[eap] returns handled
} # server packetfence
Sending Access-Challenge of id 252 to 192.168.1.2 port 1645
        EAP-Message = 
0x0112003b190017030100302f0bb931d60e121af6836b0d540e0e94b83c8c8f80ae696794753af7e5d656ccbe32c32f12bbb13c57c6232ad136a8c1
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x490fd9034e1dc0804a1bee4268779615
Finished request 286.
Going to the next request
Waking up in 1.5 seconds.
rad_recv: Access-Request packet from host 192.168.1.2 port 1645, id=253, 
length=300
        User-Name = "user"
        Service-Type = Framed-User
        Framed-MTU = 1500
        Called-Station-Id = "00-1C-0E-50-7C-0D"
        Calling-Station-Id = "00-14-C2-0D-50-9D"
        EAP-Message = 
0x0212006019001703010020ca3e75c8561ca56a5f61a8700592b11554cf0dc4d628c3dc7c770895f81b941b1703010030a12f8e8ba1641db530adb3e86fbb22afacfdcdff834cd36debd0001424839e1c9099c6b6c477c0d8a78db2ed1b6fdf94
        Message-Authenticator = 0x8de395e728ab6238cc80d459f448979d
        Cisco-AVPair = "audit-session-id=C0A801020000004B00BDA722"
        NAS-Port-Type = Ethernet
        NAS-Port = 50013
        NAS-Port-Id = "GigabitEthernet0/13"
        State = 0x490fd9034e1dc0804a1bee4268779615
        NAS-IP-Address = 192.168.1.2
server packetfence {
+- entering group authorize {...}
[suffix] No '@' in User-Name = "user", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] EAP packet type response id 18 length 96
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Received EAP-TLV response.
[peap]  Had sent TLV failure.  User was rejected earlier in this session.
[eap] Handler failed in EAP/peap
[eap] Failed in EAP select
++[eap] returns invalid
Failed to authenticate the user.
} # server packetfence
Using Post-Auth-Type Reject
+- entering group REJECT {...}
[attr_filter.access_reject]     expand: %{User-Name} -> user
 attr_filter: Matched entry DEFAULT at line 11
++[attr_filter.access_reject] returns updated
Delaying reject of request 287 for 1 seconds
Going to the next request
Waking up in 0.9 seconds.
Sending delayed reject for request 287
Sending Access-Reject of id 253 to 192.168.1.2 port 1645
        EAP-Message = 0x04120004
        Message-Authenticator = 0x00000000000000000000000000000000
Waking up in 0.5 seconds.
Cleaning up request 270 ID 236 with timestamp +540
Cleaning up request 271 ID 237 with timestamp +540
Cleaning up request 272 ID 238 with timestamp +540
Cleaning up request 273 ID 239 with timestamp +541
Cleaning up request 274 ID 240 with timestamp +541
Cleaning up request 275 ID 241 with timestamp +541
Cleaning up request 276 ID 242 with timestamp +541
Cleaning up request 277 ID 243 with timestamp +541
Waking up in 1.0 seconds.
Cleaning up request 278 ID 244 with timestamp +541
Waking up in 2.0 seconds.
Cleaning up request 279 ID 245 with timestamp +544
Cleaning up request 280 ID 246 with timestamp +544
Cleaning up request 281 ID 247 with timestamp +544
Cleaning up request 282 ID 248 with timestamp +544
Cleaning up request 283 ID 249 with timestamp +544
Cleaning up request 284 ID 250 with timestamp +544
Cleaning up request 285 ID 251 with timestamp +544
Cleaning up request 286 ID 252 with timestamp +544
Waking up in 1.0 seconds.
Cleaning up request 287 ID 253 with timestamp +544
Ready to process requests.

------------------------------------------------------------------------------
Got Input?   Slashdot Needs You.
Take our quick survey online.  Come on, we don't ask for help often.
Plus, you'll get a chance to win $100 to spend on ThinkGeek.
http://p.sf.net/sfu/slashdot-survey
_______________________________________________
Packetfence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to