Hi,

I had sent a reply to Fabrice Durand regarding an error I am receiving in
the PF 4.0 gui.

I am not sure how to reply to the list to stay in the thread so my response
probably appeared out of order.

My question was:

"While in the web interface I click on "Services" and am getting the
following error.

**"Error!* could not parse 255.255.255.0 at
/usr/local/pf/lib/pf/config.pmline 562"
and the service status will not show.

Line 562:

" 562                         $int_obj = new Net::Netmask( $ip, $mask );"

Also:

[not@island pf]# /usr/local/pf/bin/pfcmd service pf status
could not parse  255.255.255.0 at /usr/local/pf/lib/pf/config.pm line 562
could not parse  255.255.255.0 at /usr/local/pf/lib/pf/config.pm line 562
service|shouldBeStarted|pid
named|0|0
dhcpd|0|0
snort|0|0
suricata|0|0
radiusd|1|22566
httpd.webservices|1|22575
httpd.admin|1|1924
httpd.portal|1|0
snmptrapd|1|0
pfdetect|0|0
pfsetvlan|1|24384
pfdhcplistener|1| 22615
pfmon|1|22529

Has anyone seen this?"*

My answer to Fabrice is the contents of pf.conf below:

Thanks!!

[general]
#
# general.domain
#
# Domain name of PacketFence system.
domain=packetfence.nac
#
# general.hostname
#
# Hostname of PacketFence system.  This is concatenated with the domain in
Apache rewriting rules and therefore must be resolvable by clients.
hostname=lunatic
#
# general.dnsservers
#
# Comma-delimited list of DNS servers.  Passthroughs are created to allow
queries to these servers from even "trapped" nodes.
dnsservers=192.168.1.30
#
# general.dhcpservers
#
# Comma-delimited list of DHCP servers.  Passthroughs are created to allow
DHCP transactions from even "trapped" nodes.
dhcpservers=172.16.16.10[trapping]
#
# trapping.detection_engine
#
# Let you choose from our supported IDS: snort or suricata
#
detection_engine=none

[alerting]
#
# alerting.emailaddr
#
# Email address to which notifications of rogue DHCP servers, violations
with an action of "email", or any other
# PacketFence-related message goes to.
[email protected]

[database]
#
# database.pass
#
# Password for the mysql database used by PacketFence.
pass=myBIGsecret!
#
# database.user
#
# Username of the account with access to the mysql database used by
PacketFence.
user=userofpf

[services]
#
# services.dhcpd
#
# Should DHCPd be managed by PacketFence?
dhcpd=disabled
#
# services.named
#
# Should named be managed by PacketFence?
named=disabled

[interface pci2p1]
ip=192.168.1.5
type=management
mask=255.255.255.0

[interface em1]
enforcement=vlan
ip=
type=internal
mask=255.255.255.0

[interface em2]
enforcement=vlan
ip=
type=internal
mask=255.255.255.0
#[interface em1]
#enforcement=vlan
#ip=
#type=internal
#mask=255.255.255.0
#[interface em2]
#enforcement=vlan
#ip=
#type=internal
------------------------------------------------------------------------------
AlienVault Unified Security Management (USM) platform delivers complete
security visibility with the essential security capabilities. Easily and
efficiently configure, manage, and operate all of your security controls
from a single console and one unified framework. Download a free trial.
http://p.sf.net/sfu/alienvault_d2d
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to