So I've got 4.0.0 mostly working and was doing some testing.  Attempted to do 
a "Generic" violation on my test box and get a warning on the web gui of an 
error when adding the violation.  So, I go look at the log and I get this:

May 14 13:02:41 httpd.admin(0) INFO: "1300000" found 
(pfappserver::Base::Model::Config::hasId)
May 14 13:02:41 httpd.admin(0) INFO: grace expired on violation 1300000 for 
node 00:24:7e:68:fc:c3 (pf::violation::violation_add)
May 14 13:02:41 httpd.admin(0) WARN: database query failed with: Cannot add or 
update a child row: a foreign key constraint fails (`pf`.`violation`, 
CONSTRAINT `0_61` FOR
EIGN KEY (`vid`) REFERENCES `class` (`vid`) ON DELETE CASCADE ON UPDATE 
CASCADE). (errno: 1452), will try again (pf::db::db_query_execute)
May 14 13:02:41 httpd.admin(0) WARN: database query failed with: Cannot add or 
update a child row: a foreign key constraint fails (`pf`.`violation`, 
CONSTRAINT `0_61` FOR
EIGN KEY (`vid`) REFERENCES `class` (`vid`) ON DELETE CASCADE ON UPDATE 
CASCADE). (errno: 1452), will try again (pf::db::db_query_execute)
May 14 13:02:41 httpd.admin(0) WARN: database query failed with: Cannot add or 
update a child row: a foreign key constraint fails (`pf`.`violation`, 
CONSTRAINT `0_61` FOR
EIGN KEY (`vid`) REFERENCES `class` (`vid`) ON DELETE CASCADE ON UPDATE 
CASCADE). (errno: 1452), will try again (pf::db::db_query_execute)
May 14 13:02:41 httpd.admin(0) ERROR: Database issue: We tried 3 times to serve 
query violation_add_sql called from pf::violation::violation_add and we failed. 
Is the dat
abase running? (pf::db::db_query_execute)

Of course, the database IS running.

I also get a whole blast of these when I restart.  I'm sure the DB is running 
because it's recording devices it discovers via dhcplistener.

Any ideas where I should be looking?  Is this a bug, or is this a config issue 
on my side (I consider the latter more likely :^).

I'm using an Extreme Networks Summit X450e, although I've set it to send 
up/down notifications rather than port protection


pf.conf:
[general]
#
# general.domain
#
# Domain name of PacketFence system.
domain=dptlabs.com
#
# general.hostname
#
# Hostname of PacketFence system.  This is concatenated with the domain in 
Apache rewriting rules and therefore must be resolvable by clients.
hostname=pf-1
#
# general.dnsservers
#
# Comma-delimited list of DNS servers.  Passthroughs are created to allow 
queries to these servers from even "trapped" nodes.
dnsservers=127.0.0.1,172.16.18.249
#
# general.dhcpservers
#
# Comma-delimited list of DHCP servers.  Passthroughs are created to allow DHCP 
transactions from even "trapped" nodes.
dhcpservers=127.0.0.1,172.16.18.254
#
# general.timezone
#
# System's timezone in string format. Supported list:
# http://www.php.net/manual/en/timezones.php
timezone=America/Chicago

[network]
#
# network.rogue_dhcp_detection
#
# Tries to identify Rogue DHCP Servers and triggers the 1100010 violation if 
one is found.
# This feature is only available if the dhcpdetector is activated.
rogue_dhcp_detection=disabled

[registration]
#
# registration.range
#
#
range=192.168.2.0/24

[guests_self_registration]
#
# guests_self_registration.mandatory_fields
#
# Fields required to be filled in the self-registration form. Valid values are:
# firstname, lastname, organization, phone, mobileprovider, email,
# sponsor_email. Basic validation of minimally required values per guest mode
# is provided by default.
mandatory_fields=firstname,lastname,phone,email,sponsor_email
#
# guests_self_registration.guest_pid
#
# What field should we assign to the pid of the guest? Defaults to email.
guest_pid=phone

[guests_admin_registration]
#
# guests_admin_registration.default_access_duration
#
# This is the default access duration value selected in the dropdown on the
# guest management interface.
default_access_duration=5D

[alerting]
#
# alerting.emailaddr
#
# Email address to which notifications of rogue DHCP servers, violations with 
an action of "email", or any other
# PacketFence-related message goes to.
[email protected]

[database]
#
# database.pass
#
# Password for the mysql database used by PacketFence.
pass=XXXXXX

[expire]
#
# expire.node
#
# Time before a node is removed due to inactivity.
# A value of 0D disables expiration.
# example:
# node=90D
node=30D

[vlan]
#
# vlan.trap_limit_action
#
# Action that PacketFence will take if the vlan.trap_limit_threshold is reached.
# Defaults to none. email will send an email every hour if the limit's still 
reached.
# shut will shut the port on the switch and will also send an email even if 
email is not
# specified.
trap_limit_action=shut

[interface em1.99]
ip=192.168.99.254
type=management
mask=255.255.255.0

# enforcement=inline
#[interface em1.10]
#enforcement=vlan
#ip=192.168.10.254
#type=internal
#mask=255.255.255.0
[interface em1]
enforcement=vlan
ip=172.16.25.219
type=internal
mask=255.255.240.0


networks.conf:
[192.168.2.0]
dns=192.168.2.254
dhcp_start=192.168.2.10
gateway=192.168.2.254
named=enabled
dhcp_max_lease_time=30
dhcpd=enabled
type=vlan-registration
netmask=255.255.255.0
dhcp_end=192.168.2.246
dhcp_default_lease_time=30
domain-name=vlan-registration.labnetwork.com

[192.168.3.0]
dns=192.168.3.254
dhcp_start=192.168.3.10
gateway=192.168.3.254
named=enabled
dhcp_max_lease_time=30
dhcpd=enabled
type=vlan-isolation
netmask=255.255.255.0
dhcp_end=192.168.3.246
dhcp_default_lease_time=30
domain-name=vlan-isolation.labnetwork.com



switches.conf
#
# Copyright 2006-2008 Inverse inc.
#
# See the enclosed file COPYING for license information (GPL).
# If you did not receive this file, see
# http://www.fsf.org/licensing/licenses/gpl.html
[default]
vlans=1,2,3,4,5
normalVlan=1
registrationVlan=2
isolationVlan=3
macDetectionVlan=4
voiceVlan=5
inlineVlan=6
inlineTrigger=
normalRole=normal
registrationRole=registration
isolationRole=isolation
macDetectionRole=macDetection
voiceRole=voice
inlineRole=inline
VoIPEnabled=no
mode=testing
macSearchesMaxNb=30
macSearchesSleepInterval=2
uplink=dynamic
#
# Command Line Interface
#
# cliTransport could be: Telnet, SSH or Serial
cliTransport=Telnet
cliUser=
cliPwd=
cliEnablePwd=
#
# SNMP section
#
# PacketFence -> Switch
SNMPVersion=1
SNMPCommunityRead=public
SNMPCommunityWrite=private
#SNMPEngineID = 0000000000000
#SNMPUserNameRead = readUser
#SNMPAuthProtocolRead = MD5
#SNMPAuthPasswordRead = authpwdread
#SNMPPrivProtocolRead = DES
#SNMPPrivPasswordRead = privpwdread
#SNMPUserNameWrite = writeUser
#SNMPAuthProtocolWrite = MD5
#SNMPAuthPasswordWrite = authpwdwrite
#SNMPPrivProtocolWrite = DES
#SNMPPrivPasswordWrite = privpwdwrite
# Switch -> PacketFence
SNMPVersionTrap=1
SNMPCommunityTrap=public
#SNMPAuthProtocolTrap = MD5
#SNMPAuthPasswordTrap = authpwdread
#SNMPPrivProtocolTrap = DES
#SNMPPrivPasswordTrap = privpwdread
#
# Web Services Interface
#
# wsTransport could be: http or https
wsTransport=http
wsUser=
wsPwd=
#
# RADIUS NAS Client config
#
# RADIUS shared secret with switch
radiusSecret=

[192.168.0.1]
type=Cisco::Catalyst_2900XL
mode=production
uplink=23,24

[192.168.99.2]
mode=production
triggerInline=
deauthMethod=HTTP
type=Extreme::Summit_X250e
uplink_dynamic=0
uplink=44,45,46,47
employeeVlan=1
employeeRole=employee
SNMPVersionTrap=2c
SNMPVersion=2c
cliUser=admin
cliPwd=XXXXXXX
cliEnablePwd=XXXXXXX
wsPwd=XXXXXXXX
wsUser=admin
defaultVlan=1
voiceVlan=100
guestVlan=5
infrastructureVlan=99
#SNMPVersion = 3
#SNMPEngineID = 0000000000000
#SNMPUserNameRead = readUser
#SNMPAuthProtocolRead = MD5
#SNMPAuthPasswordRead = authpwdread
#SNMPPrivProtocolRead = DES
#SNMPPrivPasswordRead = privpwdread
#SNMPUserNameWrite = writeUser
#SNMPAuthProtocolWrite = MD5
#SNMPAuthPasswordWrite = authpwdwrite
#SNMPPrivProtocolWrite = DES
#SNMPPrivPasswordWrite = privpwdwrite
#SNMPVersionTrap = 3
#SNMPUserNameTrap = readUser
#SNMPAuthProtocolTrap = MD5
#SNMPAuthPasswordTrap = authpwdread
#SNMPPrivProtocolTrap = DES
#SNMPPrivPasswordTrap = privpwdread


Don
------------------------------------------------------------------------------
AlienVault Unified Security Management (USM) platform delivers complete
security visibility with the essential security capabilities. Easily and
efficiently configure, manage, and operate all of your security controls
from a single console and one unified framework. Download a free trial.
http://p.sf.net/sfu/alienvault_d2d
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to