Hi Michael,

The good news is: your code seems fine!

The less good news as extracted from packetfence.log:
> Oct 21 11:55:38 pfcmd_vlan(25435) ERROR: ERROR: Can not connect to access 
> point 10.126.1.144 using SSH (pf::SNMP::Cisco::Aironet::deauthenticateMac)

Grepping for ERROR, WARN is often helpful when troubleshooting pf:
$ egrep "FATAL|ERROR|WARN" logs/packetfence.log

Did you connect to the access point with ssh as user root and as user pf
to add the host's fingerprint to the ssh database? Very important to do
both. In this case, the captive portal run as pf.

Also if you have a lot of APs you might be interested by:

http://www.packetfence.org/support/faqs/article/is-there-a-way-to-avoid-host-key-verification-on-every-ssh-based-network-devices.html

Hopefully it'll be fixed and make your week-end more enjoyable! :)
-- 
Olivier Bilodeau
[email protected]  ::  +1.514.447.4918 *115  ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
(www.packetfence.org)

------------------------------------------------------------------------------
The demand for IT networking professionals continues to grow, and the
demand for specialized networking skills is growing even more rapidly.
Take a complimentary Learning@Cisco Self-Assessment and learn 
about Cisco certifications, training, and career opportunities. 
http://p.sf.net/sfu/cisco-dev2dev
_______________________________________________
Packetfence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to