Hi,

What is your switch IOS version?  Since a while, we are now considering 
3750s like 2960s.  You need to have a recent firmware tho.

On 12-07-02 6:23 PM, andy nguyen wrote:
> Hi,
> I am running Packetfence ver 3.4.1 for testing. I got problem to
> register a laptop with voiceip enable on the cisco 3750 switch. This
> might be a bug because it workedfine on the previous version of
> packetfence 3.03. Why it's thinking my switch is 2960???
> This is error I got in packetfence.log
>  
>  
> This is configure info on cisco 3750
> Jul 02 15:34:37 pfsetvlan(5) INFO: nb of items in queue: 1; nb of
> threads running: 0 (main::startTrapHandlers)
> Jul 02 15:34:38 pfsetvlan(5) INFO: secureMacAddrViolation trap received
> on 10.1.xx.xx ifIndex 10109 for 00:21:70:xx:xx:xx (main::handleTrap)
> Jul 02 15:34:38 pfsetvlan(5) INFO: Will try to check on this node's
> previous switch if secured entry needs to be removed. Old Switch IP:
> 10.1.52.2 (main::do_port_security)
> Jul 02 15:34:38 pfsetvlan(5) INFO: de-authorizing 00:21:70:xx:xx:xx (new
> entry 02:00:00:01:01:05) at old location 10.1.xx.xx ifIndex 10105
> (main::do_port_security)
> Jul 02 15:34:38 pfsetvlan(5) INFO: MAC: 00:21:70:xx:xx:xx is of status
> unreg; belongs into registration VLAN (pf::vlan::getRegistrationVlan)
> Jul 02 15:34:38 pfsetvlan(5) INFO: authorizing 00:21:70:xx:xx:xx at new
> location 10.1.xx.xx ifIndex 10109 (main::handleTrap)
> **
> *Jul 02 15:34:38 pfsetvlan(5) WARN: SNMP error tyring to remove or add
> secure rows to ifIndex 10109 in port-security table. This could be
> normal. Error message: Received commitFailed(14) error-status at
> error-index 1 (pf::SNMP::Cisco::Catalyst_2960::authorizeMAC*)
> This is the config:
> snmp-server community test RO
> snmp-server community test RW
> snmp-server enable traps port-security
> snmp-server enable traps port-security trap-rate 1
> snmp-server host 10.1.xx.xx version 2c test port-security
>  
> interface GigabitEthernet1/0/9
> switchport access vlan 600
> switchport mode access
> switchport voice vlan 112
> switchport port-security maximum 2
> switchport port-security maximum 1 vlan access
> switchport port-security
> switchport port-security violation restrict
> switchport port-security mac-address 0200.0001.0109
> spanning-tree portfast
>  
> I tried on both version 122-46.SE and 122.58.SE1
>
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
>
>
>
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users


-- 
Francois Gaudreault, ing. jr
[email protected]  ::  +1.514.447.4918 (x130) ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence 
(www.packetfence.org)

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to