Hi, I'm wondering if somebody could point me in the right direction. I have a Centos 6.2 server running PacketFence 3.5 My network consists of a server at 192.168.5.99, my router, main dhcp server, gateway to internet at 192.168.5.1 and a HP2626 switch at 192.168.5.96
When I plug a Windows xp machine into any of the 8 ports I have configured to send a trap to the PacketFence server, the end result is the HP 2626 does not allow the PacketFence server to update that port to move it to vlan 10, my registration vlan. I tried following the admin and network guides the best I could understand, but it seems I either missed a step or two, or this switch just isn't going to cooperate. I certainly appreciate any direction. I've included some data points for you to look over. You will see a Windows xp machine being plugged into port 8 on the 2626. Thank you. Chuck from the log/packetfence.log: Aug 16 22:14:03 pfsetvlan(23) INFO: ignoring unknown trap: 2012-08-16|03:14:00|UDP: [192.168.5.96]:161->[192.168.5.99]|192.168.5.96|BEGIN TYPE 6 END TYPE BEGIN SUBTYPE .5 END SUBTYPE BEGIN VARIABLEBINDINGS .1.3.6.1.4.1.11.2.14.11.1.7.2.1.4.7 = INTEGER: 12|.1.3.6.1.4.1.11.2.14.11.1.7.2.1.5.7 = INTEGER: 2|.1.3.6.1.4.1.11.2.14.11.1.7.2.1.6.7 = INTEGER: 2|.1.3.6.1.4.1.11.2.14.11.1.7.3.0.7 = STRING: "http://192.168.5.96/cgi/fDetail?index=7" END VARIABLEBINDINGS (main::parseTrap) Aug 16 22:14:04 pfsetvlan(13) INFO: nb of items in queue: 1; nb of threads running: 0 (main::startTrapHandlers) Aug 16 22:14:04 pfsetvlan(13) INFO: secureMacAddrViolation trap received on 192.168.5.96 ifIndex 8 for 00:00:39:ff:7a:a6 (main::handleTrap) Aug 16 22:14:04 pfsetvlan(13) INFO: Will try to check on this node's previous switch if secured entry needs to be removed. Old Switch IP: 192.168.5.96 (main::do_port_security) Aug 16 22:14:04 pfsetvlan(13) INFO: MAC not found on node's previous switch secure table or switch inaccessible. (main::do_port_security) Aug 16 22:14:04 pfsetvlan(13) INFO: MAC: 00:00:39:ff:7a:a6 is of status unreg; belongs into registration VLAN (pf::vlan::getRegistrationVlan) Aug 16 22:14:04 pfsetvlan(13) INFO: authorizing 00:00:39:ff:7a:a6 at new location 192.168.5.96 ifIndex 8 (main::handleTrap) Aug 16 22:14:07 pfsetvlan(22) INFO: ignoring unknown trap: 2012-08-16|03:14:04|UDP: [192.168.5.96]:161->[192.168.5.99]|192.168.5.96|BEGIN TYPE 6 END TYPE BEGIN SUBTYPE .2 END SUBTYPE BEGIN VARIABLEBINDINGS .1.3.6.1.2.1.16.9.1.1.2.235 = STRING: W 01/01/90 07:08:45 snmp: SNMP Security access violation from 192.168.5.99 END VARIABLEBINDINGS (main::parseTrap) Aug 16 22:14:08 pfsetvlan(13) ERROR: error creating SNMP v1 write connection to 192.168.5.96: No response from remote host "192.168.5.96" (pf::SNMP::connectWriteTo) Aug 16 22:14:09 pfsetvlan(21) INFO: ignoring unknown trap: 2012-08-16|03:14:06|UDP: [192.168.5.96]:161->[192.168.5.99]|192.168.5.96|BEGIN TYPE 6 END TYPE BEGIN SUBTYPE .2 END SUBTYPE BEGIN VARIABLEBINDINGS .1.3.6.1.2.1.16.9.1.1.2.235 = STRING: W 01/01/90 07:08:47 snmp: SNMP Security access violation from 192.168.5.99 END VARIABLEBINDINGS (main::parseTrap) Aug 16 22:14:11 pfsetvlan(25) INFO: ignoring unknown trap: 2012-08-16|03:14:08|UDP: [192.168.5.96]:161->[192.168.5.99]|192.168.5.96|BEGIN TYPE 6 END TYPE BEGIN SUBTYPE .2 END SUBTYPE BEGIN VARIABLEBINDINGS .1.3.6.1.2.1.16.9.1.1.2.235 = STRING: W 01/01/90 07:08:49 snmp: SNMP Security access violation from 192.168.5.99 END VARIABLEBINDINGS (main::parseTrap) Aug 16 22:14:12 pfsetvlan(13) ERROR: error creating SNMP v1 write connection to 192.168.5.96: No response from remote host "192.168.5.96" (pf::SNMP::connectWriteTo) Aug 16 22:14:12 pfsetvlan(13) INFO: finished (main::cleanupAfterThread) Aug 16 22:14:13 pfsetvlan(23) INFO: ignoring unknown trap: 2012-08-16|03:14:10|UDP: [192.168.5.96]:161->[192.168.5.99]|192.168.5.96|BEGIN TYPE 6 END TYPE BEGIN SUBTYPE .2 END SUBTYPE BEGIN VARIABLEBINDINGS .1.3.6.1.2.1.16.9.1.1.2.235 = STRING: W 01/01/90 07:08:51 snmp: SNMP Security access violation from 192.168.5.99 END VARIABLEBINDINGS (main::parseTrap) tcpdump -i p2p1 host "192.168.5.96" -vvv <snip>.... 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 7436!] { SNMPv1 { GetNextRequest(31) R=1292893674 17.1.4.1.2.6 } } 22:14:04.537090 IP (tos 0x0, ttl 64, id 1239, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1292893674 17.1.4.1.2.7=7 } } 22:14:04.539749 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 3307!] { SNMPv1 { GetNextRequest(31) R=526412745 17.1.4.1.2.7 } } 22:14:04.541066 IP (tos 0x0, ttl 64, id 1240, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=526412745 17.1.4.1.2.8=8 } } 22:14:04.543737 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 9cd6!] { SNMPv1 { GetNextRequest(31) R=620362592 17.1.4.1.2.8 } } 22:14:04.545248 IP (tos 0x0, ttl 64, id 1241, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=620362592 17.1.4.1.2.9=9 } } 22:14:04.547903 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum a350!] { SNMPv1 { GetNextRequest(31) R=136253633 17.1.4.1.2.9 } } 22:14:04.549204 IP (tos 0x0, ttl 64, id 1242, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=136253633 17.1.4.1.2.10=10 } } 22:14:04.551829 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 5f7c!] { SNMPv1 { GetNextRequest(31) R=1324158151 17.1.4.1.2.10 } } 22:14:04.553129 IP (tos 0x0, ttl 64, id 1243, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1324158151 17.1.4.1.2.11=11 } } 22:14:04.555691 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum e2e4!] { SNMPv1 { GetNextRequest(31) R=79680140 17.1.4.1.2.11 } } 22:14:04.556991 IP (tos 0x0, ttl 64, id 1244, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=79680140 17.1.4.1.2.12=12 } } 22:14:04.559586 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 1d1a!] { SNMPv1 { GetNextRequest(31) R=1881943018 17.1.4.1.2.12 } } 22:14:04.560883 IP (tos 0x0, ttl 64, id 1245, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1881943018 17.1.4.1.2.13=13 } } 22:14:04.563574 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 60d8!] { SNMPv1 { GetNextRequest(31) R=1197740020 17.1.4.1.2.13 } } 22:14:04.564875 IP (tos 0x0, ttl 64, id 1246, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1197740020 17.1.4.1.2.14=14 } } 22:14:04.567589 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum b808!] { SNMPv1 { GetNextRequest(31) R=1147779774 17.1.4.1.2.14 } } 22:14:04.568893 IP (tos 0x0, ttl 64, id 1247, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1147779774 17.1.4.1.2.15=15 } } 22:14:04.571597 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 3474!] { SNMPv1 { GetNextRequest(31) R=2052327272 17.1.4.1.2.15 } } 22:14:04.572885 IP (tos 0x0, ttl 64, id 1248, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=2052327272 17.1.4.1.2.16=16 } } 22:14:04.575554 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 5a2!] { SNMPv1 { GetNextRequest(31) R=2106077702 17.1.4.1.2.16 } } 22:14:04.576843 IP (tos 0x0, ttl 64, id 1249, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=2106077702 17.1.4.1.2.17=17 } } 22:14:04.579458 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 5537!] { SNMPv1 { GetNextRequest(31) R=1062477733 17.1.4.1.2.17 } } 22:14:04.580752 IP (tos 0x0, ttl 64, id 1250, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1062477733 17.1.4.1.2.18=18 } } 22:14:04.583366 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 4e6c!] { SNMPv1 { GetNextRequest(31) R=1008871586 17.1.4.1.2.18 } } 22:14:04.584652 IP (tos 0x0, ttl 64, id 1251, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1008871586 17.1.4.1.2.19=19 } } 22:14:04.587447 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 99e0!] { SNMPv1 { GetNextRequest(31) R=730590404 17.1.4.1.2.19 } } 22:14:04.588734 IP (tos 0x0, ttl 64, id 1252, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=730590404 17.1.4.1.2.20=20 } } 22:14:04.591428 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 3495!] { SNMPv1 { GetNextRequest(31) R=100431519 17.1.4.1.2.20 } } 22:14:04.592878 IP (tos 0x0, ttl 64, id 1253, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=100431519 17.1.4.1.2.21=21 } } 22:14:04.595591 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 7d6e!] { SNMPv1 { GetNextRequest(31) R=964688194 17.1.4.1.2.21 } } 22:14:04.597029 IP (tos 0x0, ttl 64, id 1254, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=964688194 17.1.4.1.2.22=22 } } 22:14:04.599668 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 272d!] { SNMPv1 { GetNextRequest(31) R=1220755264 17.1.4.1.2.22 } } 22:14:04.601109 IP (tos 0x0, ttl 64, id 1255, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1220755264 17.1.4.1.2.23=23 } } 22:14:04.603778 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum eb36!] { SNMPv1 { GetNextRequest(31) R=852856868 17.1.4.1.2.23 } } 22:14:04.605224 IP (tos 0x0, ttl 64, id 1256, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=852856868 17.1.4.1.2.24=24 } } 22:14:04.607887 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 10b4!] { SNMPv1 { GetNextRequest(31) R=1513439815 17.1.4.1.2.24 } } 22:14:04.609433 IP (tos 0x0, ttl 64, id 1257, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1513439815 17.1.4.1.2.25=25 } } 22:14:04.612105 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 7c4b!] { SNMPv1 { GetNextRequest(31) R=736887801 17.1.4.1.2.25 } } 22:14:04.613437 IP (tos 0x0, ttl 64, id 1258, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=736887801 17.1.4.1.2.26=26 } } 22:14:04.616058 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum fda7!] { SNMPv1 { GetNextRequest(31) R=1854095109 17.1.4.1.2.26 } } 22:14:04.618399 IP (tos 0x0, ttl 64, id 1259, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1854095109 17.1.4.1.3.1=.0.0 } } 22:14:04.622043 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 76) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 61b2!] { SNMPv1 { GetRequest(33) R=1817632286 17.7.1.4.5.1.1.8 } } 22:14:04.623375 IP (tos 0x0, ttl 64, id 1260, offset 0, flags [none], proto UDP (17), length 77) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(34) R=1817632286 17.7.1.4.5.1.1.8=1 } } 22:14:04.626165 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 78) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 64f7!] { SNMPv1 { GetNextRequest(35) R=1131149997 E:hp.2.14.2.10.4.1.4.1.8 } } 22:14:04.632102 IP (tos 0x0, ttl 64, id 1261, offset 0, flags [none], proto UDP (17), length 92) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(49) R=1131149997 E:hp.2.14.2.10.5.1.3.1.25.0.8.32.252.97.141=00_08_20_fc_61_8d } } 22:14:04.638630 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 72) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 743c!] { SNMPv1 C=private { GetRequest(28) R=597289543 system.sysLocation.0 } } 22:14:04.639991 IP (tos 0x0, ttl 64, id 1262, offset 0, flags [none], proto UDP (17), length 168) 192.168.5.96.snmp > 192.168.5.99.snmptrap: [udp sum ok] { SNMPv1 { Trap(124) E:hp.2.3.7.11.34 192.168.5.96 enterpriseSpecific s=2 195112 16.9.1.1.2.235="W 01/01/90 07:08:45 snmp: SNMP Security access violation from 192.168.5.99" } } 22:14:06.641539 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 72) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 743c!] { SNMPv1 C=private { GetRequest(28) R=597289543 system.sysLocation.0 } } 22:14:06.642944 IP (tos 0x0, ttl 64, id 1263, offset 0, flags [none], proto UDP (17), length 168) 192.168.5.96.snmp > 192.168.5.99.snmptrap: [udp sum ok] { SNMPv1 { Trap(124) E:hp.2.3.7.11.34 192.168.5.96 enterpriseSpecific s=2 195312 16.9.1.1.2.235="W 01/01/90 07:08:47 snmp: SNMP Security access violation from 192.168.5.99" } } 22:14:08.646048 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 73) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 3935!] { SNMPv1 { GetNextRequest(30) R=591947708 17.1.4.1.2 } } 22:14:08.647385 IP (tos 0x0, ttl 64, id 1264, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=591947708 17.1.4.1.2.1=1 } } 22:14:08.650049 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 4447!] { SNMPv1 { GetNextRequest(31) R=603151350 17.1.4.1.2.1 } } 22:14:08.651342 IP (tos 0x0, ttl 64, id 1265, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=603151350 17.1.4.1.2.2=2 } } 22:14:08.654058 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum d776!] { SNMPv1 { GetNextRequest(31) R=1720681770 17.1.4.1.2.2 } } 22:14:08.655344 IP (tos 0x0, ttl 64, id 1266, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1720681770 17.1.4.1.2.3=3 } } 22:14:08.658195 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum c430!] { SNMPv1 { GetNextRequest(31) R=1071758878 17.1.4.1.2.3 } } 22:14:08.659480 IP (tos 0x0, ttl 64, id 1267, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1071758878 17.1.4.1.2.4=4 } } 22:14:08.662163 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 79e9!] { SNMPv1 { GetNextRequest(31) R=752032372 17.1.4.1.2.4 } } 22:14:08.663473 IP (tos 0x0, ttl 64, id 1268, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=752032372 17.1.4.1.2.5=5 } } 22:14:08.666130 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum df51!] { SNMPv1 { GetNextRequest(31) R=1074110681 17.1.4.1.2.5 } } 22:14:08.667470 IP (tos 0x0, ttl 64, id 1269, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1074110681 17.1.4.1.2.6=6 } } 22:14:08.670115 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 9917!] { SNMPv1 { GetNextRequest(31) R=631177338 17.1.4.1.2.6 } } 22:14:08.671654 IP (tos 0x0, ttl 64, id 1270, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=631177338 17.1.4.1.2.7=7 } } 22:14:08.674275 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 937d!] { SNMPv1 { GetNextRequest(31) R=889255346 17.1.4.1.2.7 } } 22:14:08.675589 IP (tos 0x0, ttl 64, id 1271, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=889255346 17.1.4.1.2.8=8 } } 22:14:08.678231 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 60bc!] { SNMPv1 { GetNextRequest(31) R=1693775743 17.1.4.1.2.8 } } 22:14:08.679529 IP (tos 0x0, ttl 64, id 1272, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1693775743 17.1.4.1.2.9=9 } } 22:14:08.682221 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 9bd8!] { SNMPv1 { GetNextRequest(31) R=933554355 17.1.4.1.2.9 } } 22:14:08.683520 IP (tos 0x0, ttl 64, id 1273, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=933554355 17.1.4.1.2.10=10 } } 22:14:08.686172 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 2977!] { SNMPv1 { GetNextRequest(31) R=1781606280 17.1.4.1.2.10 } } 22:14:08.687458 IP (tos 0x0, ttl 64, id 1274, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1781606280 17.1.4.1.2.11=11 } } 22:14:08.690166 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 2f2f!] { SNMPv1 { GetNextRequest(31) R=1612720865 17.1.4.1.2.11 } } 22:14:08.691454 IP (tos 0x0, ttl 64, id 1275, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1612720865 17.1.4.1.2.12=12 } } 22:14:08.694073 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum d2e4!] { SNMPv1 { GetNextRequest(31) R=1270127255 17.1.4.1.2.12 } } 22:14:08.695374 IP (tos 0x0, ttl 64, id 1276, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1270127255 17.1.4.1.2.13=13 } } 22:14:08.698090 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum ab48!] { SNMPv1 { GetNextRequest(31) R=1379580589 17.1.4.1.2.13 } } 22:14:08.699371 IP (tos 0x0, ttl 64, id 1277, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1379580589 17.1.4.1.2.14=14 } } 22:14:08.702117 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 7799!] { SNMPv1 { GetNextRequest(31) R=1882574689 17.1.4.1.2.14 } } 22:14:08.703404 IP (tos 0x0, ttl 64, id 1278, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1882574689 17.1.4.1.2.15=15 } } 22:14:08.706141 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 24fe!] { SNMPv1 { GetNextRequest(31) R=1777674045 17.1.4.1.2.15 } } 22:14:08.707434 IP (tos 0x0, ttl 64, id 1279, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1777674045 17.1.4.1.2.16=16 } } 22:14:08.710109 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum dbbe!] { SNMPv1 { GetNextRequest(31) R=576042780 17.1.4.1.2.16 } } 22:14:08.711390 IP (tos 0x0, ttl 64, id 1280, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=576042780 17.1.4.1.2.17=17 } } 22:14:08.714039 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 3ab8!] { SNMPv1 { GetNextRequest(31) R=1009925446 17.1.4.1.2.17 } } 22:14:08.731245 IP (tos 0x0, ttl 64, id 1281, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1009925446 17.1.4.1.2.18=18 } } 22:14:08.733912 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 72c1!] { SNMPv1 { GetNextRequest(31) R=774115915 17.1.4.1.2.18 } } 22:14:08.735218 IP (tos 0x0, ttl 64, id 1282, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=774115915 17.1.4.1.2.19=19 } } 22:14:08.737876 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum ddc3!] { SNMPv1 { GetNextRequest(31) R=1840604855 17.1.4.1.2.19 } } 22:14:08.739155 IP (tos 0x0, ttl 64, id 1283, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1840604855 17.1.4.1.2.20=20 } } 22:14:08.741788 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum f7ff!] { SNMPv1 { GetNextRequest(31) R=1119319673 17.1.4.1.2.20 } } 22:14:08.743234 IP (tos 0x0, ttl 64, id 1284, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1119319673 17.1.4.1.2.21=21 } } 22:14:08.745884 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 3cd9!] { SNMPv1 { GetNextRequest(31) R=21656077 17.1.4.1.2.21 } } 22:14:08.747328 IP (tos 0x0, ttl 64, id 1285, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=21656077 17.1.4.1.2.22=22 } } 22:14:08.749953 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum ae22!] { SNMPv1 { GetNextRequest(31) R=656333295 17.1.4.1.2.22 } } 22:14:08.751655 IP (tos 0x0, ttl 64, id 1286, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=656333295 17.1.4.1.2.23=23 } } 22:14:08.754328 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum ca61!] { SNMPv1 { GetNextRequest(31) R=149281513 17.1.4.1.2.23 } } 22:14:08.755772 IP (tos 0x0, ttl 64, id 1287, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=149281513 17.1.4.1.2.24=24 } } 22:14:08.758425 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 5a15!] { SNMPv1 { GetNextRequest(31) R=947329700 17.1.4.1.2.24 } } 22:14:08.759752 IP (tos 0x0, ttl 64, id 1288, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=947329700 17.1.4.1.2.25=25 } } 22:14:08.762408 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum f0a!] { SNMPv1 { GetNextRequest(31) R=1781412600 17.1.4.1.2.25 } } 22:14:08.763730 IP (tos 0x0, ttl 64, id 1289, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1781412600 17.1.4.1.2.26=26 } } 22:14:08.766393 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 74) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum a33c!] { SNMPv1 { GetNextRequest(31) R=1833081521 17.1.4.1.2.26 } } 22:14:08.768746 IP (tos 0x0, ttl 64, id 1290, offset 0, flags [none], proto UDP (17), length 75) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(32) R=1833081521 17.1.4.1.3.1=.0.0 } } 22:14:08.772136 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 76) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum dad0!] { SNMPv1 { GetRequest(33) R=2018990335 17.7.1.4.5.1.1.8 } } 22:14:08.773463 IP (tos 0x0, ttl 64, id 1291, offset 0, flags [none], proto UDP (17), length 77) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(34) R=2018990335 17.7.1.4.5.1.1.8=1 } } 22:14:08.776231 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 76) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 8083!] { SNMPv1 { GetRequest(33) R=585303747 17.7.1.4.3.1.1.10 } } 22:14:08.777545 IP (tos 0x0, ttl 64, id 1292, offset 0, flags [none], proto UDP (17), length 88) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(45) R=585303747 17.7.1.4.3.1.1.10="registration" } } 22:14:08.841499 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 133) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum f011!] { SNMPv1 { GetRequest(90) R=2080926564 17.7.1.4.3.1.2.1 17.7.1.4.3.1.2.10 17.7.1.4.3.1.4.1 17.7.1.4.3.1.4.10 } } 22:14:08.851120 IP (tos 0x0, ttl 64, id 1293, offset 0, flags [none], proto UDP (17), length 166) 192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok] { SNMPv1 { GetResponse(122) R=2080926564 17.7.1.4.3.1.2.1=ff_ff_f0_ff_ff_ff_ff_fc 17.7.1.4.3.1.2.10=00_00_00_00_00_00_00_00 17.7.1.4.3.1.4.1=ff_ff_f0_ff_ff_ff_ff_fc 17.7.1.4.3.1.4.10=00_00_00_00_00_00_00_00 } } 22:14:08.855187 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 72) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum caa6!] { SNMPv1 C=private { GetRequest(28) R=1902785056 system.sysLocation.0 } } 22:14:08.856542 IP (tos 0x0, ttl 64, id 1294, offset 0, flags [none], proto UDP (17), length 168) 192.168.5.96.snmp > 192.168.5.99.snmptrap: [udp sum ok] { SNMPv1 { Trap(124) E:hp.2.3.7.11.34 192.168.5.96 enterpriseSpecific s=2 195534 16.9.1.1.2.235="W 01/01/90 07:08:49 snmp: SNMP Security access violation from 192.168.5.99" } } 22:14:10.858288 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 72) 192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum caa6!] { SNMPv1 C=private { GetRequest(28) R=1902785056 system.sysLocation.0 } } 22:14:10.859667 IP (tos 0x0, ttl 64, id 1295, offset 0, flags [none], proto UDP (17), length 168) 192.168.5.96.snmp > 192.168.5.99.snmptrap: [udp sum ok] { SNMPv1 { Trap(124) E:hp.2.3.7.11.34 192.168.5.96 enterpriseSpecific s=2 195734 16.9.1.1.2.235="W 01/01/90 07:08:51 snmp: SNMP Security access violation from 192.168.5.99" } } networks.conf [192.168.10.0] type=vlan-registration netmask=255.255.255.0 gateway=192.168.10.1 next_hop= named=enabled dns=192.168.10.1 domain-name=vlan-registration.lieschhome.org dhcpd=enabled dhcp_start=192.168.10.10 dhcp_end=192.168.10.246 dhcp_default_lease_time=30 dhcp_max_lease_time=30 [192.168.20.0] dns=192.168.20.1 dhcp_start=192.168.20.10 gateway=192.168.20.1 named=enabled dhcp_max_lease_time=30 dhcpd=enabled type=vlan-isolation netmask=255.255.255.0 dhcp_end=192.168.20.246 dhcp_default_lease_time=30 domain-name=vlan-isolation.lieschhome.org switches.conf # # Copyright 2006-2008 Inverse inc. # # See the enclosed file COPYING for license information (GPL). # If you did not receive this file, see # http://www.fsf.org/licensing/licenses/gpl.html [default] vlans=1,2,3,4,5,10,20,80 normalVlan=1 registrationVlan=10 isolationVlan=20 macDetectionVlan=4 guestVlan=5 customVlan1= customVlan2= customVlan3= customVlan4= customVlan5= VoIPEnabled=no voiceVlan= mode=testing macSearchesMaxNb=30 macSearchesSleepInterval=2 uplink=dynamic # # Command Line Interface # # cliTransport could be: Telnet, SSH or Serial cliTransport=Telnet cliUser= cliPwd=<mypassword1here> cliEnablePwd=<mypasswordhere> # # SNMP section # # PacketFence -> Switch SNMPVersion=1 SNMPCommunityRead=public SNMPCommunityWrite=private #SNMPEngineID = 0000000000000 #SNMPUserNameRead = readUser #SNMPAuthProtocolRead = MD5 #SNMPAuthPasswordRead = authpwdread #SNMPPrivProtocolRead = DES #SNMPPrivPasswordRead = privpwdread #SNMPUserNameWrite = writeUser #SNMPAuthProtocolWrite = MD5 #SNMPAuthPasswordWrite = authpwdwrite #SNMPPrivProtocolWrite = DES #SNMPPrivPasswordWrite = privpwdwrite # Switch -> PacketFence SNMPVersionTrap=1 SNMPCommunityTrap=public #SNMPAuthProtocolTrap = MD5 #SNMPAuthPasswordTrap = authpwdread #SNMPPrivProtocolTrap = DES #SNMPPrivPasswordTrap = privpwdread # # Web Services Interface # # wsTransport could be: http or https wsTransport=http wsUser= wsPwd= # # RADIUS NAS Client config # # RADIUS shared secret with switch radiusSecret= # # Roles support # # This controls the ability to assign roles along with VLANs when accepting # a node. This is experimental for now and the format is meant to change. # Format: <category_name1>=<controller_role1>;<category_name2>=<controller_role2>;... roles= [127.0.0.1] type=PacketFence mode=production uplink=dynamic # SNMP Traps v1 are used for internal messages SNMPVersionTrap=1 SNMPCommunityTrap=public [192.168.0.1] type=Cisco::Catalyst_2900XL mode=production uplink=23,24 [192.168.5.98] type=Cisco::Catalyst_2950 mode=production vlans=1,4,5,10,20,80 registrationVlan=10 isolationVlan=20 uplink=23,24 cliEnablePwd=<mypasswordhere> SNMPUserNameTrap= SNMPAuthProtocolTrap= SNMPAuthPasswordTrap= SNMPPrivProtocolTrap= SNMPPrivPasswordTrap= SNMPEngineID= SNMPUserNameRead= SNMPAuthProtocolRead= SNMPAuthPasswordRead= SNMPPrivProtocolRead= SNMPPrivPasswordRead= SNMPUserNameWrite= SNMPAuthProtocolWrite= SNMPAuthPasswordWrite= SNMPPrivProtocolWrite= SNMPPrivPasswordWrite= controllerIp= [192.168.5.97] type=Cisco::Catalyst_2950 mode=production vlans=1,4,5,10,20,80 registrationVlan=10 isolationVlan=20 uplink=23,24 cliEnablePwd=<mypasswordhere> SNMPUserNameTrap= SNMPAuthProtocolTrap= SNMPAuthPasswordTrap= SNMPPrivProtocolTrap= SNMPPrivPasswordTrap= SNMPEngineID= SNMPUserNameRead= SNMPAuthProtocolRead= SNMPAuthPasswordRead= SNMPPrivProtocolRead= SNMPPrivPasswordRead= SNMPUserNameWrite= SNMPAuthProtocolWrite= SNMPAuthPasswordWrite= SNMPPrivProtocolWrite= SNMPPrivPasswordWrite= controllerIp= [192.168.5.96] type=HP::Procurve_2600 mode=production vlans=1,4,5,10,20,80 uplink=23,24 SNMPUserNameTrap= SNMPAuthProtocolTrap= SNMPAuthPasswordTrap= SNMPPrivProtocolTrap= SNMPPrivPasswordTrap= SNMPEngineID= SNMPUserNameRead= SNMPAuthProtocolRead= SNMPAuthPasswordRead= SNMPPrivProtocolRead= SNMPPrivPasswordRead= SNMPUserNameWrite= SNMPAuthProtocolWrite= SNMPAuthPasswordWrite= SNMPPrivProtocolWrite= SNMPPrivPasswordWrite= controllerIp= wsPwd=<mypasswordhere> #SNMPVersion = 3 #SNMPEngineID = 0000000000000 #SNMPUserNameRead = readUser #SNMPAuthProtocolRead = MD5 #SNMPAuthPasswordRead = authpwdread #SNMPPrivProtocolRead = DES #SNMPPrivPasswordRead = privpwdread #SNMPUserNameWrite = writeUser #SNMPAuthProtocolWrite = MD5 #SNMPAuthPasswordWrite = authpwdwrite #SNMPPrivProtocolWrite = DES #SNMPPrivPasswordWrite = privpwdwrite #SNMPVersionTrap = 3 #SNMPUserNameTrap = readUser #SNMPAuthProtocolTrap = MD5 #SNMPAuthPasswordTrap = authpwdread #SNMPPrivProtocolTrap = DES #SNMPPrivPasswordTrap = privpwdread [root@pf conf]# Running configuration: ; J4900A Configuration Editor; Created on release #H.10.83 hostname "HuntHP2626-2" interface 1 no lacp exit interface 2 no lacp exit interface 3 no lacp exit interface 4 no lacp exit interface 5 no lacp exit interface 6 no lacp exit interface 7 no lacp exit interface 8 no lacp exit ip default-gateway 192.168.5.1 snmp-server community "public" Unrestricted snmp-server host 192.168.5.99 "public" Not-INFO vlan 1 name "DEFAULT_VLAN" untagged 1-20,25-26 ip address 192.168.5.96 255.255.255.0 no untagged 21-24 exit vlan 109 name "Guestnet" tagged 26 exit vlan 130 name "GuestNetWire" untagged 21-24 tagged 26 exit vlan 10 name "registration" exit vlan 20 name "isolation" exit port-security 1 learn-mode configured action send-alarm port-security 2 learn-mode configured action send-alarm port-security 3 learn-mode configured action send-alarm port-security 4 learn-mode configured action send-alarm port-security 5 learn-mode configured action send-alarm port-security 6 learn-mode configured action send-alarm port-security 7 learn-mode configured action send-alarm port-security 8 learn-mode configured action send-alarm no snmp-server enable traps link-change 1-8 password manager ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ PacketFence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
