Hi Michael, The good news is: your code seems fine!
The less good news as extracted from packetfence.log: > Oct 21 11:55:38 pfcmd_vlan(25435) ERROR: ERROR: Can not connect to access > point 10.126.1.144 using SSH (pf::SNMP::Cisco::Aironet::deauthenticateMac) Grepping for ERROR, WARN is often helpful when troubleshooting pf: $ egrep "FATAL|ERROR|WARN" logs/packetfence.log Did you connect to the access point with ssh as user root and as user pf to add the host's fingerprint to the ssh database? Very important to do both. In this case, the captive portal run as pf. Also if you have a lot of APs you might be interested by: http://www.packetfence.org/support/faqs/article/is-there-a-way-to-avoid-host-key-verification-on-every-ssh-based-network-devices.html Hopefully it'll be fixed and make your week-end more enjoyable! :) -- Olivier Bilodeau [email protected] :: +1.514.447.4918 *115 :: www.inverse.ca Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence (www.packetfence.org) ------------------------------------------------------------------------------ The demand for IT networking professionals continues to grow, and the demand for specialized networking skills is growing even more rapidly. Take a complimentary Learning@Cisco Self-Assessment and learn about Cisco certifications, training, and career opportunities. http://p.sf.net/sfu/cisco-dev2dev _______________________________________________ Packetfence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
