I'm still new to this but I set up both port-security and 802.1X because radius is not changing the vlan and the only way to get any recognition from packetfence was to add port security.
Ultimately what we are looking for is two separate network scenarios. One is a network with local users for guest access (we may want active directory at some point but that's not necessary at the moment) Second is a network where only authorized MACs may join -----Original Message----- From: Francois Gaudreault [mailto:[email protected]] Sent: Friday, October 14, 2011 4:11 PM To: [email protected] Subject: Re: [Packetfence-users] Cisco 3750 and SNMPv3 Hi Justin, Can you explain why you have port-security AND 802.1X/MAB enabled on the same port? For which use case? We saw some bugs on Cisco 4500 when trying to do such config. You should use either port-security alone or 802.1X/Mab alone. On 11-10-14 4:06 PM, Justin Bailey wrote: > The same problem occurs with SNMP v2c; it does not add the MAC address unless > the port is down during the MAC authorization/modification. > > Here's the cisco configuration and the trace log with SNMP v3. > > interface FastEthernet1/0/1 > switchport trunk encapsulation dot1q > switchport mode trunk > > interface FastEthernet1/0/31 > switchport access vlan 4 > switchport mode access > switchport port-security maximum 1 vlan access > switchport port-security > switchport port-security violation restrict > switchport port-security mac-address 0200.0000.0031 vlan access > authentication order dot1x mab > authentication priority dot1x mab > authentication port-control auto > authentication periodic > authentication timer restart 10800 > authentication timer reauthenticate 7200 > mab > no snmp trap link-status > dot1x pae authenticator > dot1x timeout quiet-period 2 > dot1x timeout tx-period 3 > end > > dot1x system-auth-control > > aaa new-model > aaa group server radius packetfence server 10.0.10.1 auth-port 1812 > acct-port 1813 aaa authentication login default local aaa > authorization exec default local aaa authentication dot1x default > group packetfence aaa authorization network default group packetfence > > interface Vlan1 > description Management > ip address 10.0.10.10 255.255.255.0 > interface Vlan2 > description Registration > ip address 192.168.2.254 255.255.255.0 interface Vlan3 > description Isolation > ip address 192.168.3.254 255.255.255.0 interface Vlan4 > description Mac detection > no ip address > interface Vlan5 > description Guest > ip address 192.168.5.254 255.255.255.0 interface Vlan10 > description Normal > ip address 192.168.1.254 255.255.255.0 interface Vlan200 > description Inline > ip address 192.168.200.254 255.255.255.0 > > ip sla enable reaction-alerts > snmp-server engineID local someid > snmp-server group readGroup v3 priv > snmp-server group writeGroup v3 priv read v1default write v1default > snmp-server user readUser readGroup v3 auth md5 authpwdread priv des56 > privpwdread snmp-server user writeUser writeGroup v3 auth md5 > authpwdwrite priv des56 privpwdwrite snmp-server enable traps > port-security snmp-server enable traps port-security trap-rate 1 > snmp-server host 10.0.10.1 version 3 priv readUser port-security > > radius-server host 10.0.10.1 auth-port 1812 acct-port 1813 timeout 2 > key mykey radius-server vsa send authentication > > spanning-tree mode pvst > spanning-tree extend system-id > vlan internal allocation policy ascending > > > pfsetvlan(21) DEBUG: opening SNMP v3 read connection to 10.0.10.10 > (pf::SNMP::connectRead) Oct 14 10:37:20 pfsetvlan(21) TRACE: SNMP > get_request for sysLocation: 1.3.6.1.2.1.1.6.0 (pf::SNMP::connectRead) > Oct 14 10:37:20 pfsetvlan(21) TRACE: SNMP get_request for > cpsIfPortSecurityEnable: 1.3.6.1.4.1.9.9.315.1.2.1.1.1.10031 > (pf::SNMP::Cisco::isPortSecurityEnabled) > Oct 14 10:37:20 pfsetvlan(1) INFO: nb of items in queue: 1; nb of > threads running: 0 (main::startTrapHandlers) Oct 14 10:37:20 > pfsetvlan(1) DEBUG: opening SNMP v3 read connection to 10.0.10.10 > (pf::SNMP::connectRead) Oct 14 10:37:20 pfsetvlan(1) TRACE: SNMP > get_request for sysLocation: 1.3.6.1.2.1.1.6.0 (pf::SNMP::connectRead) > Oct 14 10:37:20 pfsetvlan(1) TRACE: SNMP get_request for ifType: > 1.3.6.1.2.1.2.2.1.3.10031 (pf::SNMP::getIfType) Oct 14 10:37:20 > pfsetvlan(1) INFO: secureMacAddrViolation trap received on 10.0.10.10 > ifIndex 10031 for 00:21:70:c2:b0:d9 (main::handleTrap) Oct 14 10:37:20 > pfsetvlan(1) INFO: Will try to check on this node's previous switch if > secured entry needs to be removed. Old Switch IP: 10.0.10.10 > (main::do_port_security) Oct 14 10:37:20 pfsetvlan(1) TRACE: SNMP > get_table for cpsSecureMacAddrRowStatus: 1.3.6.1.4.1.9.9.315.1.2.2.1.4 > (pf::SNMP::Cisco::Catalyst_2950::getSecureMacAddresses) > Oct 14 10:37:20 pfsetvlan(1) TRACE: SNMP get_request for vmVlan: > 1.3.6.1.4.1.9.9.68.1.2.2.1.2.10031 (pf::SNMP::Cisco::getVlan) Oct 14 > 10:37:20 pfsetvlan(1) INFO: MAC not found on node's previous switch > secure table or switch inaccessible. (main::do_port_security) Oct 14 > 10:37:20 pfsetvlan(1) TRACE: SNMP get_table for > cpsSecureMacAddrRowStatus: 1.3.6.1.4.1.9.9.315.1.2.2.1.4 > (pf::SNMP::Cisco::Catalyst_2950::getAllSecureMacAddresses) > Oct 14 10:37:21 pfsetvlan(1) TRACE: SNMP get_request for vmVlan: > 1.3.6.1.4.1.9.9.68.1.2.2.1.2.10031 (pf::SNMP::Cisco::getVlan) Oct 14 > 10:37:21 pfsetvlan(1) DEBUG: VoIP not enabled on switch 10.0.10.10 > (pf::SNMP::isPhoneAtIfIndex) Oct 14 10:37:22 pfsetvlan(1) TRACE: SNMP > get_table for cpsSecureMacAddrRowStatus: 1.3.6.1.4.1.9.9.315.1.2.2.1.4 > (pf::SNMP::Cisco::Catalyst_2950::getSecureMacAddresses) > Oct 14 10:37:22 pfsetvlan(1) TRACE: SNMP get_request for vmVlan: > 1.3.6.1.4.1.9.9.68.1.2.2.1.2.10031 (pf::SNMP::Cisco::getVlan) Oct 14 > 10:37:22 pfsetvlan(1) TRACE: SNMP get_table for > cpsSecureMacAddrRowStatus: 1.3.6.1.4.1.9.9.315.1.2.2.1.4 > (pf::SNMP::Cisco::Catalyst_2950::getSecureMacAddresses) > Oct 14 10:37:22 pfsetvlan(1) TRACE: SNMP get_request for vmVlan: > 1.3.6.1.4.1.9.9.68.1.2.2.1.2.10031 (pf::SNMP::Cisco::getVlan) Oct 14 > 10:37:22 pfsetvlan(1) TRACE: SNMP get_request for vmVoiceVlanId: > 1.3.6.1.4.1.9.9.68.1.5.1.1.1.10031 (pf::SNMP::Cisco::getVoiceVlan) Oct > 14 10:37:22 pfsetvlan(1) DEBUG: VoIP not enabled on switch 10.0.10.10 > (pf::SNMP::isPhoneAtIfIndex) Oct 14 10:37:22 pfsetvlan(1) INFO: MAC: > 00:21:70:c2:b0:d9 is of status unreg; belongs into registration VLAN > (pf::vlan::getRegistrationVlan) Oct 14 10:37:22 pfsetvlan(1) INFO: > authorizing 00:21:70:c2:b0:d9 (old entry 02:00:00:00:00:31) at new > location 10.0.10.10 ifIndex 10031 (main::handleTrap) Oct 14 10:37:22 > pfsetvlan(1) TRACE: SNMP get_request for vmVlan: > 1.3.6.1.4.1.9.9.68.1.2.2.1.2.10031 (pf::SNMP::Cisco::getVlan) Oct 14 > 10:37:22 pfsetvlan(1) DEBUG: opening SNMP v3 write connection to > 10.0.10.10 (pf::SNMP::connectWriteTo) Oct 14 10:37:22 pfsetvlan(1) > TRACE: SNMP get_request for sysLocation: 1.3.6.1.2.1.1.6.0 > (pf::SNMP::connectWriteTo) Oct 14 10:37:22 pfsetvlan(1) TRACE: SNMP > set_request for sysLocation: 1.3.6.1.2.1.1.6.0 to > (pf::SNMP::connectWriteTo) Oct 14 10:37:22 pfsetvlan(1) TRACE: SNMP > get_request for vmVoiceVlanId: 1.3.6.1.4.1.9.9.68.1.5.1.1.1.10031 > (pf::SNMP::Cisco::getVoiceVlan) Oct 14 10:37:22 pfsetvlan(1) TRACE: > SNMP set_request for cpsSecureMacAddrRowStatus > (pf::SNMP::Cisco::Catalyst_2950::authorizeMAC) > Oct 14 10:37:22 pfsetvlan(1) DEBUG: Bouncing port: 10031 > (pf::SNMP::Cisco::Catalyst_2950::authorizeMAC) > Oct 14 10:37:22 pfsetvlan(1) TRACE: SNMP get_request for vmVlan: > 1.3.6.1.4.1.9.9.68.1.2.2.1.2.10031 (pf::SNMP::Cisco::getVlan) Oct 14 > 10:37:22 pfsetvlan(1) TRACE: SNMP get_request for vtpVlanName: > 1.3.6.1.4.1.9.9.46.1.3.1.1.4.1.2 (pf::SNMP::Cisco::isDefinedVlan) Oct > 14 10:37:22 pfsetvlan(1) INFO: setting VLAN at 10.0.10.10 ifIndex > 10031 from 4 to 2 (pf::SNMP::setVlan) Oct 14 10:37:22 pfsetvlan(1) > DEBUG: SNMP get_request for cmnMacAddrRemovedEnable: > 1.3.6.1.4.1.9.9.215.1.2.1.1.2 (pf::SNMP::Cisco::isRemovedTrapsEnabled) > Oct 14 10:37:22 pfsetvlan(1) TRACE: SNMP get_request for > vlanTrunkPortDynamicState: 1.3.6.1.4.1.9.9.46.1.6.1.1.13 > (pf::SNMP::Cisco::isTrunkPort) Oct 14 10:37:22 pfsetvlan(1) TRACE: > SNMP set_request for vmVlan: 1.3.6.1.4.1.9.9.68.1.2.2.1.2 > (pf::SNMP::Cisco::_setVlan) Oct 14 10:37:22 pfsetvlan(1) INFO: > finished (main::cleanupAfterThread) Oct 14 10:37:22 pfsetvlan(1) > DEBUG: closing SNMP v3 read connection to 10.0.10.10 > (pf::SNMP::disconnectRead) Oct 14 10:37:22 pfsetvlan(1) DEBUG: closing > SNMP v3 write connection to 10.0.10.10 (pf::SNMP::disconnectWriteTo) > Oct 14 10:37:42 pfsetvlan(22) DEBUG: opening SNMP v3 read connection > to 10.0.10.10 (pf::SNMP::connectRead) Oct 14 10:37:42 pfsetvlan(22) > TRACE: SNMP get_request for sysLocation: 1.3.6.1.2.1.1.6.0 > (pf::SNMP::connectRead) Oct 14 10:37:42 pfsetvlan(22) TRACE: SNMP > get_request for vmVlan: 1.3.6.1.4.1.9.9.68.1.2.2.1.2.10031 > (pf::SNMP::Cisco::getVlan) Oct 14 10:37:42 pfsetvlan(22) DEBUG: > opening SNMP v3 read connection to 10.0.10.10 (pf::SNMP::connectRead) > Oct 14 10:37:42 pfsetvlan(22) TRACE: SNMP get_request for sysLocation: > 1.3.6.1.2.1.1.6.0 (pf::SNMP::connectRead) Oct 14 10:37:42 > pfsetvlan(22) TRACE: SNMP get_request for cpsIfPortSecurityEnable: > 1.3.6.1.4.1.9.9.315.1.2.1.1.1.10031 > (pf::SNMP::Cisco::isPortSecurityEnabled) > Oct 14 10:37:42 pfsetvlan(3) INFO: nb of items in queue: 1; nb of > threads running: 0 (main::startTrapHandlers) Oct 14 10:37:42 > pfsetvlan(3) DEBUG: opening SNMP v3 read connection to 10.0.10.10 > (pf::SNMP::connectRead) Oct 14 10:37:42 pfsetvlan(3) TRACE: SNMP > get_request for sysLocation: 1.3.6.1.2.1.1.6.0 (pf::SNMP::connectRead) > Oct 14 10:37:42 pfsetvlan(3) TRACE: SNMP get_request for ifType: > 1.3.6.1.2.1.2.2.1.3.10031 (pf::SNMP::getIfType) Oct 14 10:37:42 > pfsetvlan(3) INFO: secureMacAddrViolation trap received on 10.0.10.10 > ifIndex 10031 for 00:21:70:c2:b0:d9 (main::handleTrap) Oct 14 10:37:42 > pfsetvlan(3) INFO: Will try to check on this node's previous switch if > secured entry needs to be removed. Old Switch IP: 10.0.10.10 > (main::do_port_security) Oct 14 10:37:42 pfsetvlan(3) TRACE: SNMP > get_table for cpsSecureMacAddrRowStatus: 1.3.6.1.4.1.9.9.315.1.2.2.1.4 > (pf::SNMP::Cisco::Catalyst_2950::getSecureMacAddresses) > Oct 14 10:37:42 pfsetvlan(3) TRACE: SNMP get_request for vmVlan: > 1.3.6.1.4.1.9.9.68.1.2.2.1.2.10031 (pf::SNMP::Cisco::getVlan) Oct 14 > 10:37:42 pfsetvlan(3) INFO: MAC not found on node's previous switch > secure table or switch inaccessible. (main::do_port_security) Oct 14 > 10:37:42 pfsetvlan(3) TRACE: SNMP get_table for > cpsSecureMacAddrRowStatus: 1.3.6.1.4.1.9.9.315.1.2.2.1.4 > (pf::SNMP::Cisco::Catalyst_2950::getAllSecureMacAddresses) > Oct 14 10:37:43 pfsetvlan(3) TRACE: SNMP get_request for vmVlan: > 1.3.6.1.4.1.9.9.68.1.2.2.1.2.10031 (pf::SNMP::Cisco::getVlan) Oct 14 > 10:37:43 pfsetvlan(3) DEBUG: VoIP not enabled on switch 10.0.10.10 > (pf::SNMP::isPhoneAtIfIndex) Oct 14 10:37:44 pfsetvlan(3) TRACE: SNMP > get_table for cpsSecureMacAddrRowStatus: 1.3.6.1.4.1.9.9.315.1.2.2.1.4 > (pf::SNMP::Cisco::Catalyst_2950::getSecureMacAddresses) > Oct 14 10:37:44 pfsetvlan(3) TRACE: SNMP get_request for vmVlan: > 1.3.6.1.4.1.9.9.68.1.2.2.1.2.10031 (pf::SNMP::Cisco::getVlan) Oct 14 > 10:37:44 pfsetvlan(3) TRACE: SNMP get_table for > cpsSecureMacAddrRowStatus: 1.3.6.1.4.1.9.9.315.1.2.2.1.4 > (pf::SNMP::Cisco::Catalyst_2950::getSecureMacAddresses) > Oct 14 10:37:44 pfsetvlan(3) TRACE: SNMP get_request for vmVlan: > 1.3.6.1.4.1.9.9.68.1.2.2.1.2.10031 (pf::SNMP::Cisco::getVlan) Oct 14 > 10:37:44 pfsetvlan(3) TRACE: SNMP get_request for vmVoiceVlanId: > 1.3.6.1.4.1.9.9.68.1.5.1.1.1.10031 (pf::SNMP::Cisco::getVoiceVlan) Oct > 14 10:37:44 pfsetvlan(3) DEBUG: VoIP not enabled on switch 10.0.10.10 > (pf::SNMP::isPhoneAtIfIndex) Oct 14 10:37:44 pfsetvlan(3) INFO: MAC: > 00:21:70:c2:b0:d9 is of status unreg; belongs into registration VLAN > (pf::vlan::getRegistrationVlan) Oct 14 10:37:44 pfsetvlan(3) INFO: > authorizing 00:21:70:c2:b0:d9 (old entry 02:00:00:00:00:31) at new > location 10.0.10.10 ifIndex 10031 (main::handleTrap) Oct 14 10:37:44 > pfsetvlan(3) TRACE: SNMP get_request for vmVlan: > 1.3.6.1.4.1.9.9.68.1.2.2.1.2.10031 (pf::SNMP::Cisco::getVlan) Oct 14 > 10:37:44 pfsetvlan(3) DEBUG: opening SNMP v3 write connection to > 10.0.10.10 (pf::SNMP::connectWriteTo) Oct 14 10:37:44 pfsetvlan(3) > TRACE: SNMP get_request for sysLocation: 1.3.6.1.2.1.1.6.0 > (pf::SNMP::connectWriteTo) Oct 14 10:37:44 pfsetvlan(3) TRACE: SNMP > set_request for sysLocation: 1.3.6.1.2.1.1.6.0 to > (pf::SNMP::connectWriteTo) Oct 14 10:37:44 pfsetvlan(3) TRACE: SNMP > get_request for vmVoiceVlanId: 1.3.6.1.4.1.9.9.68.1.5.1.1.1.10031 > (pf::SNMP::Cisco::getVoiceVlan) Oct 14 10:37:44 pfsetvlan(3) TRACE: > SNMP set_request for cpsSecureMacAddrRowStatus > (pf::SNMP::Cisco::Catalyst_2950::authorizeMAC) > Oct 14 10:37:44 pfsetvlan(3) TRACE: SNMP get_request for vmVlan: > 1.3.6.1.4.1.9.9.68.1.2.2.1.2.10031 (pf::SNMP::Cisco::getVlan) Oct 14 > 10:37:44 pfsetvlan(3) TRACE: SNMP get_request for vtpVlanName: > 1.3.6.1.4.1.9.9.46.1.3.1.1.4.1.2 (pf::SNMP::Cisco::isDefinedVlan) Oct > 14 10:37:44 pfsetvlan(3) INFO: Should set 10.0.10.10 ifIndex 10031 to > VLAN 2 but it is already in this VLAN -> Do nothing > (pf::SNMP::setVlan) Oct 14 10:37:44 pfsetvlan(3) INFO: finished > (main::cleanupAfterThread) Oct 14 10:37:44 pfsetvlan(3) DEBUG: closing > SNMP v3 read connection to 10.0.10.10 (pf::SNMP::disconnectRead) Oct > 14 10:37:44 pfsetvlan(3) DEBUG: closing SNMP v3 write connection to > 10.0.10.10 (pf::SNMP::disconnectWriteTo) > > -----Original Message----- > From: Francois Gaudreault [mailto:[email protected]] > Sent: Friday, October 14, 2011 1:55 PM > To: [email protected] > Subject: Re: [Packetfence-users] Cisco 3750 and SNMPv3 > > You can send us the config and the trace, it might help. > > Do you have the same problem in V2c? > > On 11-10-14 1:08 PM, Justin Bailey wrote: >> I changed to the 3750 to use 2960 and no luck. The switch shows the >> configured by snmp but the port security MAC does not change. The MAC >> cannot be changed even through the console when the interface is up. I can >> paste the trace logs and cisco global or interface configuration if it will >> help. >> >> >> -----Original Message----- >> From: Francois Gaudreault [mailto:[email protected]] >> Sent: Friday, October 14, 2011 11:50 AM >> To: [email protected] >> Subject: Re: [Packetfence-users] Cisco 3750 and SNMPv3 >> >> This is quite weird. >> >> Can you try to change the : >> use base ('pf::SNMP::Cisco::Catalyst_2950'); >> to >> use base ('pf::SNMP::Cisco::Catalyst_2960'); >> >> >> On 11-10-14 10:49 AM, Justin Bailey wrote: >>> Using a Cisco 3750 Switch and SNMPv3, Packetfence was unable to add the MAC >>> to the port-security list. It did not work in all versions tested, 2.2, >>> 3.0 and the latest snapshot (10/14). It would occasionally be added after >>> unplugging the Ethernet cable and plugging it back in. >>> >>> In order to have the MAC properly added I had to setAdminStatus on the >>> interface to down in the beginning of the authorizeMac function in the >>> Catalyst_2950 module and bring it back up before returning. I do not know >>> if this will have any adverse effects in the other areas but it seems to be >>> functioning properly now with the 3750. >>> The Cisco OS version is 12.2(55)SE3 . >>> If this was not necessary and I have something misconfigured somewhere or >>> if there is any other information that may help please let me know. >>> >>> >>> -------------------------------------------------------------------- >>> - >>> - >>> -------- All the data continuously generated in your IT >>> infrastructure contains a definitive record of customers, >>> application performance, security threats, fraudulent activity and >>> more. Splunk takes this data and makes sense of it. Business sense. IT >>> sense. Common sense. >>> http://p.sf.net/sfu/splunk-d2d-oct >>> _______________________________________________ >>> Packetfence-users mailing list >>> [email protected] >>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>> >> -- >> Francois Gaudreault, ing. jr >> [email protected] :: +1.514.447.4918 (x130) :: www.inverse.ca >> Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence >> (www.packetfence.org) >> >> >> --------------------------------------------------------------------- >> - >> -------- All the data continuously generated in your IT >> infrastructure contains a definitive record of customers, application >> performance, security threats, fraudulent activity and more. Splunk >> takes this data and makes sense of it. Business sense. IT sense. Common >> sense. >> http://p.sf.net/sfu/splunk-d2d-oct >> _______________________________________________ >> Packetfence-users mailing list >> [email protected] >> https://lists.sourceforge.net/lists/listinfo/packetfence-users >> >> --------------------------------------------------------------------- >> - >> -------- All the data continuously generated in your IT >> infrastructure contains a definitive record of customers, application >> performance, security threats, fraudulent activity and more. Splunk >> takes this data and makes sense of it. Business sense. IT sense. Common >> sense. >> http://p.sf.net/sfu/splunk-d2d-oct >> _______________________________________________ >> Packetfence-users mailing list >> [email protected] >> https://lists.sourceforge.net/lists/listinfo/packetfence-users >> > > -- > Francois Gaudreault, ing. jr > [email protected] :: +1.514.447.4918 (x130) :: www.inverse.ca > Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence > (www.packetfence.org) > > > ---------------------------------------------------------------------- > -------- All the data continuously generated in your IT infrastructure > contains a definitive record of customers, application performance, > security threats, fraudulent activity and more. Splunk takes this data > and makes sense of it. Business sense. IT sense. Common sense. > http://p.sf.net/sfu/splunk-d2d-oct > _______________________________________________ > Packetfence-users mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/packetfence-users > > ---------------------------------------------------------------------- > -------- All the data continuously generated in your IT infrastructure > contains a definitive record of customers, application performance, > security threats, fraudulent activity and more. Splunk takes this data > and makes sense of it. Business sense. IT sense. Common sense. > http://p.sf.net/sfu/splunk-d2d-oct > _______________________________________________ > Packetfence-users mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/packetfence-users > -- Francois Gaudreault, ing. jr [email protected] :: +1.514.447.4918 (x130) :: www.inverse.ca Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence (www.packetfence.org) ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2d-oct _______________________________________________ Packetfence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2d-oct _______________________________________________ Packetfence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
