Fabrice,

Specifying ip addresses for the interfaces worked for most of the services.

I am still unable to get the following to start:

snmptrapd
httpd.portal

snmptrapd - log shows - couldn't open udp:162 -- errno 13 ("Permission denied")

I am stuck here. I have disabled the fw and selinux is disabled.

httpd.portal - tailing all the log files in the /usr/local/pf/logs
tail -f *logs.

I see the following, none of which jumps out to me as a problem.

==> packetfence.log <==
May 17 13:34:46 httpd.admin(0) INFO: /usr/sbin/httpd start
(pf::services::service_ctl)
May 17 13:34:46 httpd.admin(0) INFO: Generating configuration file for
httpd (generate_httpd.portal_conf) (pf::services::service_ctl)
May 17 13:34:46 httpd.admin(0) INFO: generating
/usr/local/pf/var/conf/ssl-certificates.conf
(pf::services::apache::generate_httpd_conf)
May 17 13:34:46 httpd.admin(0) INFO: generating
/usr/local/pf/var/conf/block-unwanted.conf
(pf::services::apache::generate_httpd_conf)
May 17 13:34:46 httpd.admin(0) INFO: generating
/usr/local/pf/var/conf/captive-portal-common.conf
(pf::services::apache::generate_httpd_conf)
May 17 13:34:46 httpd.admin(0) INFO: generating
/usr/local/pf/var/conf/captive-portal-cleanurls.conf
(pf::services::apache::generate_httpd_conf)
May 17 13:34:46 httpd.admin(0) INFO: generating
/usr/local/pf/var/conf/ocsp-crl.conf
(pf::services::apache::generate_httpd_conf)
May 17 13:34:46 httpd.admin(0) INFO: Starting httpd.portal with
'/usr/sbin/httpd -f /usr/local/pf/conf/httpd.conf.d/httpd.portal
-Drhel' (pf::services::service_ctl)
May 17 13:34:47 httpd.admin(0) INFO: Daemon httpd.portal took 1.716
seconds to start. (pf::services::service_ctl)

==> catalyst.log <==
May 17 13:34:46 httpd.admin(0) INFO: *** Request 1 (0.001/s) [6177]
[Fri May 17 13:34:46 2013] *** (Catalyst::__ANON__)
May 17 13:34:47 httpd.admin(0) INFO: Request took 1.796803s (0.557/s)
.------------------------------------------------------------+-----------.
| Action                                                     | Time      |
+------------------------------------------------------------+-----------+
| /service/auto                                              | 0.005985s |
| /service/object                                            | 0.000324s |
| /service/start                                             | 1.754088s |
| /end                                                       | 0.002600s |
|  -> pfappserver::View::JSON->process                       | 0.001294s |
'------------------------------------------------------------+-----------'

 (Catalyst::finalize)

==> packetfence.log <==
May 17 13:34:50 pfcmd.pl(6482) INFO: Executing pfcmd service pf status
(main::service)
May 17 13:34:50 pfcmd.pl(6482) INFO: /usr/sbin/named status
(pf::services::service_ctl)
May 17 13:34:50 pfcmd.pl(6482) INFO: pidof -x named returned 0
(pf::services::service_ctl)
May 17 13:34:50 pfcmd.pl(6482) INFO: /usr/sbin/dhcpd status
(pf::services::service_ctl)
May 17 13:34:50 pfcmd.pl(6482) INFO: pidof -x dhcpd returned 0
(pf::services::service_ctl)
May 17 13:34:50 pfcmd.pl(6482) INFO: /usr/sbin/snort status
(pf::services::service_ctl)
May 17 13:34:50 pfcmd.pl(6482) INFO: pidof -x snort returned 0
(pf::services::service_ctl)
May 17 13:34:50 pfcmd.pl(6482) INFO: /usr/bin/suricata status
(pf::services::service_ctl)
May 17 13:34:50 pfcmd.pl(6482) INFO: pidof -x suricata returned 0
(pf::services::service_ctl)
May 17 13:34:50 pfcmd.pl(6482) INFO: /usr/sbin/radiusd status
(pf::services::service_ctl)
May 17 13:34:50 pfcmd.pl(6482) INFO: pidof -x radiusd returned 6292
(pf::services::service_ctl)
May 17 13:34:50 pfcmd.pl(6482) INFO: /usr/sbin/httpd status
(pf::services::service_ctl)
May 17 13:34:50 pfcmd.pl(6482) INFO: /usr/sbin/httpd status
(pf::services::service_ctl)
May 17 13:34:50 pfcmd.pl(6482) INFO: /usr/sbin/httpd status
(pf::services::service_ctl)
May 17 13:34:50 pfcmd.pl(6482) INFO: /usr/sbin/snmptrapd status
(pf::services::service_ctl)
May 17 13:34:50 pfcmd.pl(6482) INFO: pidof -x snmptrapd returned 0
(pf::services::service_ctl)
May 17 13:34:50 pfcmd.pl(6482) INFO: /usr/local/pf/sbin/pfdetect
status (pf::services::service_ctl)
May 17 13:34:50 pfcmd.pl(6482) INFO: pidof -x pfdetect returned 0
(pf::services::service_ctl)
May 17 13:34:50 pfcmd.pl(6482) INFO: /usr/local/pf/sbin/pfsetvlan
status (pf::services::service_ctl)
May 17 13:34:50 pfcmd.pl(6482) INFO: pidof -x pfsetvlan returned 2065
(pf::services::service_ctl)
May 17 13:34:50 pfcmd.pl(6482) INFO: /usr/local/pf/sbin/pfdhcplistener
status (pf::services::service_ctl)
May 17 13:34:50 pfcmd.pl(6482) INFO: pfdhcplistener pids pci2p1.4000
=> 6411, em1 => 6412, pci2p1 => 6410, em2 => 6413
(pf::services::service_ctl)
May 17 13:34:50 pfcmd.pl(6482) INFO: /usr/local/pf/sbin/pfmon status
(pf::services::service_ctl)
May 17 13:34:50 pfcmd.pl(6482) INFO: pidof -x pfmon returned 6281
(pf::services::service_ctl)
May 17 13:34:48 httpd.admin(0) INFO: Requesting services status with:
/usr/local/pf/bin/pfcmd service pf status 2>&1
(pfappserver::Model::Services::status)

==> catalyst.log <==
May 17 13:34:48 httpd.admin(0) INFO: *** Request 2 (0.001/s) [6177]
[Fri May 17 13:34:48 2013] *** (Catalyst::__ANON__)
May 17 13:34:50 httpd.admin(0) INFO: Request took 1.909188s (0.524/s)
.------------------------------------------------------------+-----------.
| Action                                                     | Time      |
+------------------------------------------------------------+-----------+
| /service/auto                                              | 0.002348s |
| /service/index                                             | 1.895547s |
|  /service/auto                                             | 0.000465s |
|  /service/object                                           | 0.000199s |
|  /service/status                                           | 1.856789s |
|  /end                                                      | 0.032073s |
|   -> pfappserver::View::HTML->process                      | 0.030889s |
'------------------------------------------------------------+-----------'

 (Catalyst::finalize)


Thank In Advance.

-James
------------------------------------------------------------------------------
AlienVault Unified Security Management (USM) platform delivers complete
security visibility with the essential security capabilities. Easily and
efficiently configure, manage, and operate all of your security controls
from a single console and one unified framework. Download a free trial.
http://p.sf.net/sfu/alienvault_d2d
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to