Hi,

I'm wondering if somebody could point me in the right direction. I have 
a Centos 6.2 server running PacketFence 3.5 My network consists of a 
server at 192.168.5.99, my router, main dhcp server, gateway to internet 
at 192.168.5.1 and a HP2626 switch at 192.168.5.96

When I plug a Windows xp machine into any of the 8 ports I have 
configured to send a trap to the PacketFence server, the end result is 
the HP 2626 does not allow the PacketFence server to update that port to 
move it to vlan 10, my registration vlan.   I tried following the admin 
and network guides the best I could understand, but it seems I either 
missed a step or two, or this switch just isn't going to cooperate.

I certainly appreciate any direction.   I've included some data points 
for you to look over.  You will see a Windows xp machine being plugged 
into port 8 on the 2626.


Thank you.

Chuck


from the log/packetfence.log:

Aug 16 22:14:03 pfsetvlan(23) INFO: ignoring unknown trap: 
2012-08-16|03:14:00|UDP: 
[192.168.5.96]:161->[192.168.5.99]|192.168.5.96|BEGIN TYPE 6 END TYPE 
BEGIN SUBTYPE .5 END SUBTYPE BEGIN VARIABLEBINDINGS 
.1.3.6.1.4.1.11.2.14.11.1.7.2.1.4.7 = INTEGER: 
12|.1.3.6.1.4.1.11.2.14.11.1.7.2.1.5.7 = INTEGER: 
2|.1.3.6.1.4.1.11.2.14.11.1.7.2.1.6.7 = INTEGER: 
2|.1.3.6.1.4.1.11.2.14.11.1.7.3.0.7 = STRING: 
"http://192.168.5.96/cgi/fDetail?index=7"; END VARIABLEBINDINGS 
(main::parseTrap)
Aug 16 22:14:04 pfsetvlan(13) INFO: nb of items in queue: 1; nb of 
threads running: 0 (main::startTrapHandlers)
Aug 16 22:14:04 pfsetvlan(13) INFO: secureMacAddrViolation trap received 
on 192.168.5.96 ifIndex 8 for 00:00:39:ff:7a:a6 (main::handleTrap)
Aug 16 22:14:04 pfsetvlan(13) INFO: Will try to check on this node's 
previous switch if secured entry needs to be removed. Old Switch IP: 
192.168.5.96 (main::do_port_security)
Aug 16 22:14:04 pfsetvlan(13) INFO: MAC not found on node's previous 
switch secure table or switch inaccessible. (main::do_port_security)
Aug 16 22:14:04 pfsetvlan(13) INFO: MAC: 00:00:39:ff:7a:a6 is of status 
unreg; belongs into registration VLAN (pf::vlan::getRegistrationVlan)
Aug 16 22:14:04 pfsetvlan(13) INFO: authorizing 00:00:39:ff:7a:a6 at new 
location 192.168.5.96 ifIndex 8 (main::handleTrap)
Aug 16 22:14:07 pfsetvlan(22) INFO: ignoring unknown trap: 
2012-08-16|03:14:04|UDP: 
[192.168.5.96]:161->[192.168.5.99]|192.168.5.96|BEGIN TYPE 6 END TYPE 
BEGIN SUBTYPE .2 END SUBTYPE BEGIN VARIABLEBINDINGS 
.1.3.6.1.2.1.16.9.1.1.2.235 = STRING: W 01/01/90 07:08:45 snmp: SNMP 
Security access violation from 192.168.5.99 END VARIABLEBINDINGS 
(main::parseTrap)
Aug 16 22:14:08 pfsetvlan(13) ERROR: error creating SNMP v1 write 
connection to 192.168.5.96: No response from remote host "192.168.5.96" 
(pf::SNMP::connectWriteTo)
Aug 16 22:14:09 pfsetvlan(21) INFO: ignoring unknown trap: 
2012-08-16|03:14:06|UDP: 
[192.168.5.96]:161->[192.168.5.99]|192.168.5.96|BEGIN TYPE 6 END TYPE 
BEGIN SUBTYPE .2 END SUBTYPE BEGIN VARIABLEBINDINGS 
.1.3.6.1.2.1.16.9.1.1.2.235 = STRING: W 01/01/90 07:08:47 snmp: SNMP 
Security access violation from 192.168.5.99 END VARIABLEBINDINGS 
(main::parseTrap)
Aug 16 22:14:11 pfsetvlan(25) INFO: ignoring unknown trap: 
2012-08-16|03:14:08|UDP: 
[192.168.5.96]:161->[192.168.5.99]|192.168.5.96|BEGIN TYPE 6 END TYPE 
BEGIN SUBTYPE .2 END SUBTYPE BEGIN VARIABLEBINDINGS 
.1.3.6.1.2.1.16.9.1.1.2.235 = STRING: W 01/01/90 07:08:49 snmp: SNMP 
Security access violation from 192.168.5.99 END VARIABLEBINDINGS 
(main::parseTrap)
Aug 16 22:14:12 pfsetvlan(13) ERROR: error creating SNMP v1 write 
connection to 192.168.5.96: No response from remote host "192.168.5.96" 
(pf::SNMP::connectWriteTo)
Aug 16 22:14:12 pfsetvlan(13) INFO: finished (main::cleanupAfterThread)
Aug 16 22:14:13 pfsetvlan(23) INFO: ignoring unknown trap: 
2012-08-16|03:14:10|UDP: 
[192.168.5.96]:161->[192.168.5.99]|192.168.5.96|BEGIN TYPE 6 END TYPE 
BEGIN SUBTYPE .2 END SUBTYPE BEGIN VARIABLEBINDINGS 
.1.3.6.1.2.1.16.9.1.1.2.235 = STRING: W 01/01/90 07:08:51 snmp: SNMP 
Security access violation from 192.168.5.99 END VARIABLEBINDINGS 
(main::parseTrap)


tcpdump -i p2p1 host "192.168.5.96"  -vvv

<snip>....
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 7436!]  { 
SNMPv1 { GetNextRequest(31) R=1292893674  17.1.4.1.2.6 } }
22:14:04.537090 IP (tos 0x0, ttl 64, id 1239, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1292893674  17.1.4.1.2.7=7 } }
22:14:04.539749 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 3307!]  { 
SNMPv1 { GetNextRequest(31) R=526412745  17.1.4.1.2.7 } }
22:14:04.541066 IP (tos 0x0, ttl 64, id 1240, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=526412745  17.1.4.1.2.8=8 } }
22:14:04.543737 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 9cd6!]  { 
SNMPv1 { GetNextRequest(31) R=620362592  17.1.4.1.2.8 } }
22:14:04.545248 IP (tos 0x0, ttl 64, id 1241, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=620362592  17.1.4.1.2.9=9 } }
22:14:04.547903 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum a350!]  { 
SNMPv1 { GetNextRequest(31) R=136253633  17.1.4.1.2.9 } }
22:14:04.549204 IP (tos 0x0, ttl 64, id 1242, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=136253633  17.1.4.1.2.10=10 } }
22:14:04.551829 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 5f7c!]  { 
SNMPv1 { GetNextRequest(31) R=1324158151  17.1.4.1.2.10 } }
22:14:04.553129 IP (tos 0x0, ttl 64, id 1243, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1324158151  17.1.4.1.2.11=11 } }
22:14:04.555691 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum e2e4!]  { 
SNMPv1 { GetNextRequest(31) R=79680140  17.1.4.1.2.11 } }
22:14:04.556991 IP (tos 0x0, ttl 64, id 1244, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=79680140  17.1.4.1.2.12=12 } }
22:14:04.559586 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 1d1a!]  { 
SNMPv1 { GetNextRequest(31) R=1881943018  17.1.4.1.2.12 } }
22:14:04.560883 IP (tos 0x0, ttl 64, id 1245, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1881943018  17.1.4.1.2.13=13 } }
22:14:04.563574 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 60d8!]  { 
SNMPv1 { GetNextRequest(31) R=1197740020  17.1.4.1.2.13 } }
22:14:04.564875 IP (tos 0x0, ttl 64, id 1246, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1197740020  17.1.4.1.2.14=14 } }
22:14:04.567589 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum b808!]  { 
SNMPv1 { GetNextRequest(31) R=1147779774  17.1.4.1.2.14 } }
22:14:04.568893 IP (tos 0x0, ttl 64, id 1247, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1147779774  17.1.4.1.2.15=15 } }
22:14:04.571597 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 3474!]  { 
SNMPv1 { GetNextRequest(31) R=2052327272  17.1.4.1.2.15 } }
22:14:04.572885 IP (tos 0x0, ttl 64, id 1248, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=2052327272  17.1.4.1.2.16=16 } }
22:14:04.575554 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 5a2!] { 
SNMPv1 { GetNextRequest(31) R=2106077702  17.1.4.1.2.16 } }
22:14:04.576843 IP (tos 0x0, ttl 64, id 1249, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=2106077702  17.1.4.1.2.17=17 } }
22:14:04.579458 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 5537!]  { 
SNMPv1 { GetNextRequest(31) R=1062477733  17.1.4.1.2.17 } }
22:14:04.580752 IP (tos 0x0, ttl 64, id 1250, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1062477733  17.1.4.1.2.18=18 } }
22:14:04.583366 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 4e6c!]  { 
SNMPv1 { GetNextRequest(31) R=1008871586  17.1.4.1.2.18 } }
22:14:04.584652 IP (tos 0x0, ttl 64, id 1251, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1008871586  17.1.4.1.2.19=19 } }
22:14:04.587447 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 99e0!]  { 
SNMPv1 { GetNextRequest(31) R=730590404  17.1.4.1.2.19 } }
22:14:04.588734 IP (tos 0x0, ttl 64, id 1252, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=730590404  17.1.4.1.2.20=20 } }
22:14:04.591428 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 3495!]  { 
SNMPv1 { GetNextRequest(31) R=100431519  17.1.4.1.2.20 } }
22:14:04.592878 IP (tos 0x0, ttl 64, id 1253, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=100431519  17.1.4.1.2.21=21 } }
22:14:04.595591 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 7d6e!]  { 
SNMPv1 { GetNextRequest(31) R=964688194  17.1.4.1.2.21 } }
22:14:04.597029 IP (tos 0x0, ttl 64, id 1254, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=964688194  17.1.4.1.2.22=22 } }
22:14:04.599668 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 272d!]  { 
SNMPv1 { GetNextRequest(31) R=1220755264  17.1.4.1.2.22 } }
22:14:04.601109 IP (tos 0x0, ttl 64, id 1255, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1220755264  17.1.4.1.2.23=23 } }
22:14:04.603778 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum eb36!]  { 
SNMPv1 { GetNextRequest(31) R=852856868  17.1.4.1.2.23 } }
22:14:04.605224 IP (tos 0x0, ttl 64, id 1256, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=852856868  17.1.4.1.2.24=24 } }
22:14:04.607887 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 10b4!]  { 
SNMPv1 { GetNextRequest(31) R=1513439815  17.1.4.1.2.24 } }
22:14:04.609433 IP (tos 0x0, ttl 64, id 1257, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1513439815  17.1.4.1.2.25=25 } }
22:14:04.612105 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 7c4b!]  { 
SNMPv1 { GetNextRequest(31) R=736887801  17.1.4.1.2.25 } }
22:14:04.613437 IP (tos 0x0, ttl 64, id 1258, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=736887801  17.1.4.1.2.26=26 } }
22:14:04.616058 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum fda7!]  { 
SNMPv1 { GetNextRequest(31) R=1854095109  17.1.4.1.2.26 } }
22:14:04.618399 IP (tos 0x0, ttl 64, id 1259, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1854095109  17.1.4.1.3.1=.0.0 } }
22:14:04.622043 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 76)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 61b2!]  { 
SNMPv1 { GetRequest(33) R=1817632286  17.7.1.4.5.1.1.8 } }
22:14:04.623375 IP (tos 0x0, ttl 64, id 1260, offset 0, flags [none], 
proto UDP (17), length 77)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(34) R=1817632286  17.7.1.4.5.1.1.8=1 } }
22:14:04.626165 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 78)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 64f7!]  { 
SNMPv1 { GetNextRequest(35) R=1131149997 E:hp.2.14.2.10.4.1.4.1.8 } }
22:14:04.632102 IP (tos 0x0, ttl 64, id 1261, offset 0, flags [none], 
proto UDP (17), length 92)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(49) R=1131149997 
E:hp.2.14.2.10.5.1.3.1.25.0.8.32.252.97.141=00_08_20_fc_61_8d } }
22:14:04.638630 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 72)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 743c!]  { 
SNMPv1 C=private { GetRequest(28) R=597289543 system.sysLocation.0 } }
22:14:04.639991 IP (tos 0x0, ttl 64, id 1262, offset 0, flags [none], 
proto UDP (17), length 168)
     192.168.5.96.snmp > 192.168.5.99.snmptrap: [udp sum ok]  { SNMPv1 { 
Trap(124)  E:hp.2.3.7.11.34 192.168.5.96 enterpriseSpecific s=2 195112 
16.9.1.1.2.235="W 01/01/90 07:08:45 snmp: SNMP Security access violation 
from 192.168.5.99" } }
22:14:06.641539 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 72)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 743c!]  { 
SNMPv1 C=private { GetRequest(28) R=597289543 system.sysLocation.0 } }
22:14:06.642944 IP (tos 0x0, ttl 64, id 1263, offset 0, flags [none], 
proto UDP (17), length 168)
     192.168.5.96.snmp > 192.168.5.99.snmptrap: [udp sum ok]  { SNMPv1 { 
Trap(124)  E:hp.2.3.7.11.34 192.168.5.96 enterpriseSpecific s=2 195312 
16.9.1.1.2.235="W 01/01/90 07:08:47 snmp: SNMP Security access violation 
from 192.168.5.99" } }
22:14:08.646048 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 73)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 3935!]  { 
SNMPv1 { GetNextRequest(30) R=591947708  17.1.4.1.2 } }
22:14:08.647385 IP (tos 0x0, ttl 64, id 1264, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=591947708  17.1.4.1.2.1=1 } }
22:14:08.650049 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 4447!]  { 
SNMPv1 { GetNextRequest(31) R=603151350  17.1.4.1.2.1 } }
22:14:08.651342 IP (tos 0x0, ttl 64, id 1265, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=603151350  17.1.4.1.2.2=2 } }
22:14:08.654058 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum d776!]  { 
SNMPv1 { GetNextRequest(31) R=1720681770  17.1.4.1.2.2 } }
22:14:08.655344 IP (tos 0x0, ttl 64, id 1266, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1720681770  17.1.4.1.2.3=3 } }
22:14:08.658195 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum c430!]  { 
SNMPv1 { GetNextRequest(31) R=1071758878  17.1.4.1.2.3 } }
22:14:08.659480 IP (tos 0x0, ttl 64, id 1267, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1071758878  17.1.4.1.2.4=4 } }
22:14:08.662163 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 79e9!]  { 
SNMPv1 { GetNextRequest(31) R=752032372  17.1.4.1.2.4 } }
22:14:08.663473 IP (tos 0x0, ttl 64, id 1268, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=752032372  17.1.4.1.2.5=5 } }
22:14:08.666130 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum df51!]  { 
SNMPv1 { GetNextRequest(31) R=1074110681  17.1.4.1.2.5 } }
22:14:08.667470 IP (tos 0x0, ttl 64, id 1269, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1074110681  17.1.4.1.2.6=6 } }
22:14:08.670115 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 9917!]  { 
SNMPv1 { GetNextRequest(31) R=631177338  17.1.4.1.2.6 } }
22:14:08.671654 IP (tos 0x0, ttl 64, id 1270, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=631177338  17.1.4.1.2.7=7 } }
22:14:08.674275 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 937d!]  { 
SNMPv1 { GetNextRequest(31) R=889255346  17.1.4.1.2.7 } }
22:14:08.675589 IP (tos 0x0, ttl 64, id 1271, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=889255346  17.1.4.1.2.8=8 } }
22:14:08.678231 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 60bc!]  { 
SNMPv1 { GetNextRequest(31) R=1693775743  17.1.4.1.2.8 } }
22:14:08.679529 IP (tos 0x0, ttl 64, id 1272, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1693775743  17.1.4.1.2.9=9 } }
22:14:08.682221 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 9bd8!]  { 
SNMPv1 { GetNextRequest(31) R=933554355  17.1.4.1.2.9 } }
22:14:08.683520 IP (tos 0x0, ttl 64, id 1273, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=933554355  17.1.4.1.2.10=10 } }
22:14:08.686172 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 2977!]  { 
SNMPv1 { GetNextRequest(31) R=1781606280  17.1.4.1.2.10 } }
22:14:08.687458 IP (tos 0x0, ttl 64, id 1274, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1781606280  17.1.4.1.2.11=11 } }
22:14:08.690166 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 2f2f!]  { 
SNMPv1 { GetNextRequest(31) R=1612720865  17.1.4.1.2.11 } }
22:14:08.691454 IP (tos 0x0, ttl 64, id 1275, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1612720865  17.1.4.1.2.12=12 } }
22:14:08.694073 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum d2e4!]  { 
SNMPv1 { GetNextRequest(31) R=1270127255  17.1.4.1.2.12 } }
22:14:08.695374 IP (tos 0x0, ttl 64, id 1276, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1270127255  17.1.4.1.2.13=13 } }
22:14:08.698090 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum ab48!]  { 
SNMPv1 { GetNextRequest(31) R=1379580589  17.1.4.1.2.13 } }
22:14:08.699371 IP (tos 0x0, ttl 64, id 1277, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1379580589  17.1.4.1.2.14=14 } }
22:14:08.702117 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 7799!]  { 
SNMPv1 { GetNextRequest(31) R=1882574689  17.1.4.1.2.14 } }
22:14:08.703404 IP (tos 0x0, ttl 64, id 1278, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1882574689  17.1.4.1.2.15=15 } }
22:14:08.706141 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 24fe!]  { 
SNMPv1 { GetNextRequest(31) R=1777674045  17.1.4.1.2.15 } }
22:14:08.707434 IP (tos 0x0, ttl 64, id 1279, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1777674045  17.1.4.1.2.16=16 } }
22:14:08.710109 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum dbbe!]  { 
SNMPv1 { GetNextRequest(31) R=576042780  17.1.4.1.2.16 } }
22:14:08.711390 IP (tos 0x0, ttl 64, id 1280, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=576042780  17.1.4.1.2.17=17 } }
22:14:08.714039 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 3ab8!]  { 
SNMPv1 { GetNextRequest(31) R=1009925446  17.1.4.1.2.17 } }
22:14:08.731245 IP (tos 0x0, ttl 64, id 1281, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1009925446  17.1.4.1.2.18=18 } }
22:14:08.733912 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 72c1!]  { 
SNMPv1 { GetNextRequest(31) R=774115915  17.1.4.1.2.18 } }
22:14:08.735218 IP (tos 0x0, ttl 64, id 1282, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=774115915  17.1.4.1.2.19=19 } }
22:14:08.737876 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum ddc3!]  { 
SNMPv1 { GetNextRequest(31) R=1840604855  17.1.4.1.2.19 } }
22:14:08.739155 IP (tos 0x0, ttl 64, id 1283, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1840604855  17.1.4.1.2.20=20 } }
22:14:08.741788 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum f7ff!]  { 
SNMPv1 { GetNextRequest(31) R=1119319673  17.1.4.1.2.20 } }
22:14:08.743234 IP (tos 0x0, ttl 64, id 1284, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1119319673  17.1.4.1.2.21=21 } }
22:14:08.745884 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 3cd9!]  { 
SNMPv1 { GetNextRequest(31) R=21656077  17.1.4.1.2.21 } }
22:14:08.747328 IP (tos 0x0, ttl 64, id 1285, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=21656077  17.1.4.1.2.22=22 } }
22:14:08.749953 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum ae22!]  { 
SNMPv1 { GetNextRequest(31) R=656333295  17.1.4.1.2.22 } }
22:14:08.751655 IP (tos 0x0, ttl 64, id 1286, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=656333295  17.1.4.1.2.23=23 } }
22:14:08.754328 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum ca61!]  { 
SNMPv1 { GetNextRequest(31) R=149281513  17.1.4.1.2.23 } }
22:14:08.755772 IP (tos 0x0, ttl 64, id 1287, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=149281513  17.1.4.1.2.24=24 } }
22:14:08.758425 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 5a15!]  { 
SNMPv1 { GetNextRequest(31) R=947329700  17.1.4.1.2.24 } }
22:14:08.759752 IP (tos 0x0, ttl 64, id 1288, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=947329700  17.1.4.1.2.25=25 } }
22:14:08.762408 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum f0a!] { 
SNMPv1 { GetNextRequest(31) R=1781412600  17.1.4.1.2.25 } }
22:14:08.763730 IP (tos 0x0, ttl 64, id 1289, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1781412600  17.1.4.1.2.26=26 } }
22:14:08.766393 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 74)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum a33c!]  { 
SNMPv1 { GetNextRequest(31) R=1833081521  17.1.4.1.2.26 } }
22:14:08.768746 IP (tos 0x0, ttl 64, id 1290, offset 0, flags [none], 
proto UDP (17), length 75)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(32) R=1833081521  17.1.4.1.3.1=.0.0 } }
22:14:08.772136 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 76)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum dad0!]  { 
SNMPv1 { GetRequest(33) R=2018990335  17.7.1.4.5.1.1.8 } }
22:14:08.773463 IP (tos 0x0, ttl 64, id 1291, offset 0, flags [none], 
proto UDP (17), length 77)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(34) R=2018990335  17.7.1.4.5.1.1.8=1 } }
22:14:08.776231 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 76)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum 8083!]  { 
SNMPv1 { GetRequest(33) R=585303747  17.7.1.4.3.1.1.10 } }
22:14:08.777545 IP (tos 0x0, ttl 64, id 1292, offset 0, flags [none], 
proto UDP (17), length 88)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(45) R=585303747 17.7.1.4.3.1.1.10="registration" } }
22:14:08.841499 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 133)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum f011!]  { 
SNMPv1 { GetRequest(90) R=2080926564  17.7.1.4.3.1.2.1 17.7.1.4.3.1.2.10 
17.7.1.4.3.1.4.1 17.7.1.4.3.1.4.10 } }
22:14:08.851120 IP (tos 0x0, ttl 64, id 1293, offset 0, flags [none], 
proto UDP (17), length 166)
     192.168.5.96.snmp > 192.168.5.99.49667: [udp sum ok]  { SNMPv1 { 
GetResponse(122) R=2080926564 17.7.1.4.3.1.2.1=ff_ff_f0_ff_ff_ff_ff_fc 
17.7.1.4.3.1.2.10=00_00_00_00_00_00_00_00 
17.7.1.4.3.1.4.1=ff_ff_f0_ff_ff_ff_ff_fc 
17.7.1.4.3.1.4.10=00_00_00_00_00_00_00_00 } }
22:14:08.855187 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 72)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum caa6!]  { 
SNMPv1 C=private { GetRequest(28) R=1902785056 system.sysLocation.0 } }
22:14:08.856542 IP (tos 0x0, ttl 64, id 1294, offset 0, flags [none], 
proto UDP (17), length 168)
     192.168.5.96.snmp > 192.168.5.99.snmptrap: [udp sum ok]  { SNMPv1 { 
Trap(124)  E:hp.2.3.7.11.34 192.168.5.96 enterpriseSpecific s=2 195534 
16.9.1.1.2.235="W 01/01/90 07:08:49 snmp: SNMP Security access violation 
from 192.168.5.99" } }
22:14:10.858288 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
UDP (17), length 72)
     192.168.5.99.49667 > 192.168.5.96.snmp: [bad udp cksum caa6!]  { 
SNMPv1 C=private { GetRequest(28) R=1902785056 system.sysLocation.0 } }
22:14:10.859667 IP (tos 0x0, ttl 64, id 1295, offset 0, flags [none], 
proto UDP (17), length 168)
     192.168.5.96.snmp > 192.168.5.99.snmptrap: [udp sum ok]  { SNMPv1 { 
Trap(124)  E:hp.2.3.7.11.34 192.168.5.96 enterpriseSpecific s=2 195734 
16.9.1.1.2.235="W 01/01/90 07:08:51 snmp: SNMP Security access violation 
from 192.168.5.99" } }

  networks.conf
[192.168.10.0]
type=vlan-registration
netmask=255.255.255.0
gateway=192.168.10.1
next_hop=
named=enabled
dns=192.168.10.1
domain-name=vlan-registration.lieschhome.org
dhcpd=enabled
dhcp_start=192.168.10.10
dhcp_end=192.168.10.246
dhcp_default_lease_time=30
dhcp_max_lease_time=30

[192.168.20.0]
dns=192.168.20.1
dhcp_start=192.168.20.10
gateway=192.168.20.1
named=enabled
dhcp_max_lease_time=30
dhcpd=enabled
type=vlan-isolation
netmask=255.255.255.0
dhcp_end=192.168.20.246
dhcp_default_lease_time=30
domain-name=vlan-isolation.lieschhome.org


  switches.conf
#
# Copyright 2006-2008 Inverse inc.
#
# See the enclosed file COPYING for license information (GPL).
# If you did not receive this file, see
# http://www.fsf.org/licensing/licenses/gpl.html
[default]
vlans=1,2,3,4,5,10,20,80
normalVlan=1
registrationVlan=10
isolationVlan=20
macDetectionVlan=4
guestVlan=5
customVlan1=
customVlan2=
customVlan3=
customVlan4=
customVlan5=
VoIPEnabled=no
voiceVlan=
mode=testing
macSearchesMaxNb=30
macSearchesSleepInterval=2
uplink=dynamic
#
# Command Line Interface
#
# cliTransport could be: Telnet, SSH or Serial
cliTransport=Telnet
cliUser=
cliPwd=<mypassword1here>
cliEnablePwd=<mypasswordhere>
#
# SNMP section
#
# PacketFence -> Switch
SNMPVersion=1
SNMPCommunityRead=public
SNMPCommunityWrite=private
#SNMPEngineID = 0000000000000
#SNMPUserNameRead = readUser
#SNMPAuthProtocolRead = MD5
#SNMPAuthPasswordRead = authpwdread
#SNMPPrivProtocolRead = DES
#SNMPPrivPasswordRead = privpwdread
#SNMPUserNameWrite = writeUser
#SNMPAuthProtocolWrite = MD5
#SNMPAuthPasswordWrite = authpwdwrite
#SNMPPrivProtocolWrite = DES
#SNMPPrivPasswordWrite = privpwdwrite
# Switch -> PacketFence
SNMPVersionTrap=1
SNMPCommunityTrap=public
#SNMPAuthProtocolTrap = MD5
#SNMPAuthPasswordTrap = authpwdread
#SNMPPrivProtocolTrap = DES
#SNMPPrivPasswordTrap = privpwdread
#
# Web Services Interface
#
# wsTransport could be: http or https
wsTransport=http
wsUser=
wsPwd=
#
# RADIUS NAS Client config
#
# RADIUS shared secret with switch
radiusSecret=
#
# Roles support
#
# This controls the ability to assign roles along with VLANs when accepting
# a node. This is experimental for now and the format is meant to change.
# Format: 
<category_name1>=<controller_role1>;<category_name2>=<controller_role2>;...
roles=

[127.0.0.1]
type=PacketFence
mode=production
uplink=dynamic
# SNMP Traps v1 are used for internal messages
SNMPVersionTrap=1
SNMPCommunityTrap=public

[192.168.0.1]
type=Cisco::Catalyst_2900XL
mode=production
uplink=23,24

[192.168.5.98]
type=Cisco::Catalyst_2950
mode=production
vlans=1,4,5,10,20,80
registrationVlan=10
isolationVlan=20
uplink=23,24
cliEnablePwd=<mypasswordhere>
SNMPUserNameTrap=
SNMPAuthProtocolTrap=
SNMPAuthPasswordTrap=
SNMPPrivProtocolTrap=
SNMPPrivPasswordTrap=
SNMPEngineID=
SNMPUserNameRead=
SNMPAuthProtocolRead=
SNMPAuthPasswordRead=
SNMPPrivProtocolRead=
SNMPPrivPasswordRead=
SNMPUserNameWrite=
SNMPAuthProtocolWrite=
SNMPAuthPasswordWrite=
SNMPPrivProtocolWrite=
SNMPPrivPasswordWrite=
controllerIp=

[192.168.5.97]
type=Cisco::Catalyst_2950
mode=production
vlans=1,4,5,10,20,80
registrationVlan=10
isolationVlan=20
uplink=23,24
cliEnablePwd=<mypasswordhere>
SNMPUserNameTrap=
SNMPAuthProtocolTrap=
SNMPAuthPasswordTrap=
SNMPPrivProtocolTrap=
SNMPPrivPasswordTrap=
SNMPEngineID=
SNMPUserNameRead=
SNMPAuthProtocolRead=
SNMPAuthPasswordRead=
SNMPPrivProtocolRead=
SNMPPrivPasswordRead=
SNMPUserNameWrite=
SNMPAuthProtocolWrite=
SNMPAuthPasswordWrite=
SNMPPrivProtocolWrite=
SNMPPrivPasswordWrite=
controllerIp=

[192.168.5.96]
type=HP::Procurve_2600
mode=production
vlans=1,4,5,10,20,80
uplink=23,24
SNMPUserNameTrap=
SNMPAuthProtocolTrap=
SNMPAuthPasswordTrap=
SNMPPrivProtocolTrap=
SNMPPrivPasswordTrap=
SNMPEngineID=
SNMPUserNameRead=
SNMPAuthProtocolRead=
SNMPAuthPasswordRead=
SNMPPrivProtocolRead=
SNMPPrivPasswordRead=
SNMPUserNameWrite=
SNMPAuthProtocolWrite=
SNMPAuthPasswordWrite=
SNMPPrivProtocolWrite=
SNMPPrivPasswordWrite=
controllerIp=
wsPwd=<mypasswordhere>
#SNMPVersion = 3
#SNMPEngineID = 0000000000000
#SNMPUserNameRead = readUser
#SNMPAuthProtocolRead = MD5
#SNMPAuthPasswordRead = authpwdread
#SNMPPrivProtocolRead = DES
#SNMPPrivPasswordRead = privpwdread
#SNMPUserNameWrite = writeUser
#SNMPAuthProtocolWrite = MD5
#SNMPAuthPasswordWrite = authpwdwrite
#SNMPPrivProtocolWrite = DES
#SNMPPrivPasswordWrite = privpwdwrite
#SNMPVersionTrap = 3
#SNMPUserNameTrap = readUser
#SNMPAuthProtocolTrap = MD5
#SNMPAuthPasswordTrap = authpwdread
#SNMPPrivProtocolTrap = DES
#SNMPPrivPasswordTrap = privpwdread
[root@pf conf]#


Running configuration:

; J4900A Configuration Editor; Created on release #H.10.83

hostname "HuntHP2626-2"
interface 1
    no lacp
exit
interface 2
    no lacp
exit
interface 3
    no lacp
exit
interface 4
    no lacp
exit
interface 5
    no lacp
exit
interface 6
    no lacp
exit
interface 7
    no lacp
exit
interface 8
    no lacp
exit
ip default-gateway 192.168.5.1
snmp-server community "public" Unrestricted
snmp-server host 192.168.5.99 "public" Not-INFO
vlan 1
    name "DEFAULT_VLAN"
    untagged 1-20,25-26
    ip address 192.168.5.96 255.255.255.0
    no untagged 21-24
    exit
vlan 109
    name "Guestnet"
    tagged 26
    exit
vlan 130
    name "GuestNetWire"
    untagged 21-24
    tagged 26
    exit
vlan 10
    name "registration"
    exit
vlan 20
    name "isolation"
    exit
port-security 1 learn-mode configured action send-alarm
port-security 2 learn-mode configured action send-alarm
port-security 3 learn-mode configured action send-alarm
port-security 4 learn-mode configured action send-alarm
port-security 5 learn-mode configured action send-alarm
port-security 6 learn-mode configured action send-alarm
port-security 7 learn-mode configured action send-alarm
port-security 8 learn-mode configured action send-alarm
no snmp-server enable traps link-change 1-8
password manager




------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to