Hi again,

Hi did another test. I also edited Aironet.pm (Both, Aironet_WDS.pm and 
Aironet.pm are edited with the code you provided) and after restarting 
the services the following error shows in packetfence.log.




Sep 20 16:33:00 pf::WebAPI(3127) ERROR: radius authorize failed with 
error: Undefined subroutine &pf::SNMP::Cisco::Aironet::Dump called at 
/usr/local/pf/lib/pf/SNMP/Cisco/Aironet.pm line 204.
  (PFAPI::radius_authorize)
Sep 20 16:33:06 pfsetvlan(1) INFO: nb of items in queue: 1; nb of 
threads running: 0 (main::startTrapHandlers)
Sep 20 16:33:07 pfsetvlan(1) INFO: doWeActOnThisTrap returns false. Stop 
dot11Deauthentication handling (main::handleTrap)
Sep 20 16:33:07 pfsetvlan(1) INFO: finished (main::cleanupAfterThread)
Sep 20 16:33:08 pf::WebAPI(3128) INFO: handling radius autz request: 
from switch_ip => 192.168.69.244, connection_type => 
Wireless-802.11-NoEAP mac => 04:46:65:5a:f9:d5, port => 383, username => 
0446655af9d5 (pf::radius::authorize)
Sep 20 16:33:09 pf::WebAPI(3128) ERROR: radius authorize failed with 
error: Undefined subroutine &pf::SNMP::Cisco::Aironet::Dump called at 
/usr/local/pf/lib/pf/SNMP/Cisco/Aironet.pm line 204.


Pedro.

Em 20-09-2013 13:55, Derek Wuelfrath escreveu:
> Pedro,
>
> Have you restarted PacketFence after adding the lines, cause I don't see the 
> PACKETFENCE DEBUGGING line in the logs.
>
> Derek
>
> --
> Derek Wuelfrath
> dwuelfrath-tiT8nZ+Z9Bqw5LPnMra/[email protected] :: +1.514.447.4918 
> (x110) :: www.inverse.ca
> Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence 
> (www.packetfence.org)
>
> On 2013-09-20, at 6:02 AM, Pedro Tavares 
> <[email protected]> wrote:
>
>>
>>
>>
>> Hello Derek,
>>
>> Thank you for your help on this.
>>
>> I've done as you instructed and here are the logs (packetfence.log and
>> radiusd -X)
>>
>> Hopefully those are the relevant logs :)
>>
>> Best regards,
>>
>> Pedro
>>
>>
>> ####Packetfence.log
>>
>>
>> Sep 20 09:34:40 pf::WebAPI(8473) INFO: handling radius autz request:
>> from switch_ip => 192.168.69.244, connection_type =>
>> Wireless-802.11-NoEAP mac => 04:46:65:5a:f9:d5, port => 333, username =>
>> 0446655af9d5 (pf::radius::authorize)
>> Sep 20 09:34:40 pf::WebAPI(8473) WARN: Unable to extract SSID for module
>> pf::SNMP::Cisco::Aironet_1250. SSID-based VLAN assignments won't work.
>> Make sure you enable Vendor Specific Attributes (VSA) on the AP if you
>> want them to work. (pf::SNMP::Cisco::Aironet::extractSsid)
>> Sep 20 09:34:41 pf::WebAPI(8473) INFO: highest priority violation for
>> 04:46:65:5a:f9:d5 is 1200001. Target VLAN for violation: registration
>> (11) (pf::vlan::getViolationVlan)
>> Sep 20 09:34:41 pf::WebAPI(8473) WARN: Role-based Network Access Control
>> is not supported on network device type pf::SNMP::Cisco::Aironet_1250.
>> (pf::SNMP::supportsRoleBasedEnforcement)
>> Sep 20 09:34:49 pfdhcplistener(8540) INFO: DHCPOFFER from 10.10.150.1
>> (00:1d:09:f0:64:26) to host 04:46:65:5a:f9:d5 (10.10.150.10)
>> (main::parse_dhcp_offer)
>> Sep 20 09:34:49 pfdhcplistener(8540) INFO: DHCPREQUEST from
>> 04:46:65:5a:f9:d5 (10.10.150.10) (main::parse_dhcp_request)
>> Sep 20 09:34:49 pfdhcplistener(8540) INFO: could not resolve
>> 10.10.150.10 to mac in ARP table (pf::iplog::ip2macinarp)
>> Sep 20 09:34:49 pfdhcplistener(8540) INFO: resolved 10.10.150.10 to mac
>> (04:46:65:5a:f9:d5) in ARP table (pf::iplog::ip2macinarp)
>> Sep 20 09:34:49 pfdhcplistener(8540) INFO: oldip (192.168.70.10) and
>> newip (10.10.150.10) are different for 04:46:65:5a:f9:d5 - closing iplog
>> entry (main::update_iplog)
>> Sep 20 09:34:50 pfdhcplistener(8540) INFO: 04:46:65:5a:f9:d5 requested
>> an IP. DHCP Fingerprint: OS::1112 (Samsung Android). Modified node with
>> last_dhcp = 2013-09-20 09:34:50,computername =
>> android-cfbfb835f3c74cd4,dhcp_fingerprint = 1,33,3,6,15,28,51,58,59
>> (main::listen_dhcp)
>>
>>
>>
>> Radiusd -X -d /usr/local/pf/raddb
>>
>> [root@pfense bin]# radiusd -X -d /usr/local/pf/raddb/
>> FreeRADIUS Version 2.2.0, for host x86_64-unknown-linux-gnu, built on
>> Oct 18 2012 at 13:58:38
>> Copyright (C) 1999-2012 The FreeRADIUS server project and contributors.
>> There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
>> PARTICULAR PURPOSE.
>> You may redistribute copies of FreeRADIUS under the terms of the
>> GNU General Public License v2.
>> Starting - reading configuration files ...
>> including configuration file /usr/local/pf/raddb//radiusd.conf
>> including configuration file /usr/local/pf/raddb//proxy.conf
>> including configuration file /usr/local/pf/raddb//clients.conf
>> including files in directory /usr/local/pf/raddb//modules/
>> including configuration file /usr/local/pf/raddb//modules/always
>> including configuration file /usr/local/pf/raddb//modules/pap
>> including configuration file /usr/local/pf/raddb//modules/unix
>> including configuration file /usr/local/pf/raddb//modules/mschap
>> including configuration file
>> /usr/local/pf/raddb//modules/sqlcounter_expire_on_login
>> including configuration file /usr/local/pf/raddb//modules/realm
>> including configuration file /usr/local/pf/raddb//modules/otp
>> including configuration file /usr/local/pf/raddb//modules/ntlm_auth
>> including configuration file /usr/local/pf/raddb//modules/counter
>> including configuration file /usr/local/pf/raddb//modules/checkval
>> including configuration file /usr/local/pf/raddb//modules/inner-eap
>> including configuration file /usr/local/pf/raddb//modules/soh
>> including configuration file /usr/local/pf/raddb//modules/pam
>> including configuration file /usr/local/pf/raddb//modules/mac2vlan
>> including configuration file /usr/local/pf/raddb//modules/acct_unique
>> including configuration file /usr/local/pf/raddb//modules/expiration
>> including configuration file /usr/local/pf/raddb//modules/smsotp
>> including configuration file /usr/local/pf/raddb//modules/etc_group
>> including configuration file /usr/local/pf/raddb//modules/preprocess
>> including configuration file /usr/local/pf/raddb//modules/perl
>> including configuration file /usr/local/pf/raddb//modules/ippool
>> including configuration file /usr/local/pf/raddb//modules/sql_log
>> including configuration file /usr/local/pf/raddb//modules/wimax
>> including configuration file /usr/local/pf/raddb//modules/chap
>> including configuration file /usr/local/pf/raddb//modules/digest
>> including configuration file /usr/local/pf/raddb//modules/rediswho
>> including configuration file /usr/local/pf/raddb//modules/detail
>> including configuration file /usr/local/pf/raddb//modules/logintime
>> including configuration file /usr/local/pf/raddb//modules/detail.log
>> including configuration file /usr/local/pf/raddb//modules/ldap
>> including configuration file /usr/local/pf/raddb//modules/echo
>> including configuration file /usr/local/pf/raddb//modules/mac2ip
>> including configuration file /usr/local/pf/raddb//modules/attr_rewrite
>> including configuration file /usr/local/pf/raddb//modules/policy
>> including configuration file /usr/local/pf/raddb//modules/radutmp
>> including configuration file /usr/local/pf/raddb//modules/smbpasswd
>> including configuration file /usr/local/pf/raddb//modules/expr
>> including configuration file /usr/local/pf/raddb//modules/attr_filter
>> including configuration file /usr/local/pf/raddb//modules/replicate
>> including configuration file /usr/local/pf/raddb//modules/sradutmp
>> including configuration file /usr/local/pf/raddb//modules/redis
>> including configuration file /usr/local/pf/raddb//modules/linelog
>> including configuration file /usr/local/pf/raddb//modules/detail.example.com
>> including configuration file /usr/local/pf/raddb//modules/passwd
>> including configuration file /usr/local/pf/raddb//modules/dynamic_clients
>> including configuration file /usr/local/pf/raddb//modules/cui
>> including configuration file /usr/local/pf/raddb//modules/files
>> including configuration file /usr/local/pf/raddb//modules/exec
>> including configuration file /usr/local/pf/raddb//modules/opendirectory
>> including configuration file /usr/local/pf/raddb//eap.conf
>> including configuration file /usr/local/pf/raddb//sql.conf
>> including configuration file /usr/local/pf/raddb//sql/mysql/packetfence.conf
>> including configuration file /usr/local/pf/raddb//policy.conf
>> including files in directory /usr/local/pf/raddb//sites-enabled/
>> including configuration file /usr/local/pf/raddb//sites-enabled/default
>> including configuration file /usr/local/pf/raddb//sites-enabled/packetfence
>> including configuration file
>> /usr/local/pf/raddb//sites-enabled/packetfence-soh
>> including configuration file
>> /usr/local/pf/raddb//sites-enabled/control-socket
>> including configuration file
>> /usr/local/pf/raddb//sites-enabled/packetfence-tunnel
>> including configuration file /usr/local/pf/raddb//sites-enabled/inner-tunnel
>> main {
>>          user = "pf"
>>          group = "pf"
>>          allow_core_dumps = no
>> }
>> including dictionary file /usr/local/pf/raddb//dictionary
>> main {
>>          name = "radiusd"
>>          prefix = "/usr"
>>          localstatedir = "/usr/local/pf/var"
>>          sbindir = "/usr/sbin"
>>          logdir = "/usr/local/pf/logs"
>>          run_dir = "/usr/local/pf/var/run"
>>          libdir = "/usr/lib/freeradius"
>>          radacctdir = "/usr/local/pf/logs/radacct"
>>          hostname_lookups = no
>>          max_request_time = 30
>>          cleanup_delay = 5
>>          max_requests = 1024
>>          pidfile = "/usr/local/pf/var/run/radiusd.pid"
>>          checkrad = "/usr/sbin/checkrad"
>>          debug_level = 0
>>          proxy_requests = yes
>>   log {
>>          stripped_names = no
>>          auth = yes
>>          auth_badpass = no
>>          auth_goodpass = no
>>   }
>>   security {
>>          max_attributes = 200
>>          reject_delay = 1
>>          status_server = yes
>>   }
>> }
>> radiusd: #### Loading Realms and Home Servers ####
>>   proxy server {
>>          retry_delay = 5
>>          retry_count = 3
>>          default_fallback = no
>>          dead_time = 120
>>          wake_all_if_all_dead = no
>>   }
>>   home_server localhost {
>>          ipaddr = 127.0.0.1
>>          port = 1812
>>          type = "auth"
>>          secret = "XXXXXXXXX:REMOVED"
>>          response_window = 20
>>          max_outstanding = 65536
>>          require_message_authenticator = yes
>>          zombie_period = 40
>>          status_check = "status-server"
>>          ping_interval = 30
>>          check_interval = 30
>>          num_answers_to_alive = 3
>>          num_pings_to_alive = 3
>>          revive_interval = 120
>>          status_check_timeout = 4
>>    coa {
>>          irt = 2
>>          mrt = 16
>>          mrc = 5
>>          mrd = 30
>>    }
>>   }
>>   home_server_pool my_auth_failover {
>>          type = fail-over
>>          home_server = localhost
>>   }
>>   realm example.com {
>>          auth_pool = my_auth_failover
>>   }
>>   realm LOCAL {
>>   }
>> radiusd: #### Loading Clients ####
>>   client localhost {
>>          ipaddr = 127.0.0.1
>>          require_message_authenticator = no
>>          secret = "XXXXXXXXX:REMOVED"
>>          nastype = "other"
>>   }
>> radiusd: #### Instantiating modules ####
>>   instantiate {
>>   Module: Linked to module rlm_exec
>>   Module: Instantiating module "exec" from file
>> /usr/local/pf/raddb//modules/exec
>>    exec {
>>          wait = no
>>          input_pairs = "request"
>>          shell_escape = yes
>>    }
>>   Module: Linked to module rlm_expr
>>   Module: Instantiating module "expr" from file
>> /usr/local/pf/raddb//modules/expr
>>   Module: Linked to module rlm_expiration
>>   Module: Instantiating module "expiration" from file
>> /usr/local/pf/raddb//modules/expiration
>>    expiration {
>>          reply-message = "Password Has Expired  "
>>    }
>>   Module: Linked to module rlm_logintime
>>   Module: Instantiating module "logintime" from file
>> /usr/local/pf/raddb//modules/logintime
>>    logintime {
>>          reply-message = "You are calling outside your allowed timespan  "
>>          minimum-timeout = 60
>>    }
>>   }
>> radiusd: #### Loading Virtual Servers ####
>> server { # from file /usr/local/pf/raddb//radiusd.conf
>>   modules {
>>    Module: Creating Auth-Type = digest
>>    Module: Creating Post-Auth-Type = REJECT
>>   Module: Checking authenticate {...} for more modules to load
>>   Module: Linked to module rlm_pap
>>   Module: Instantiating module "pap" from file
>> /usr/local/pf/raddb//modules/pap
>>    pap {
>>          encryption_scheme = "auto"
>>          auto_header = no
>>    }
>>   Module: Linked to module rlm_chap
>>   Module: Instantiating module "chap" from file
>> /usr/local/pf/raddb//modules/chap
>>   Module: Linked to module rlm_mschap
>>   Module: Instantiating module "mschap" from file
>> /usr/local/pf/raddb//modules/mschap
>>    mschap {
>>          use_mppe = yes
>>          require_encryption = yes
>>          require_strong = no
>>          with_ntdomain_hack = yes
>>          ntlm_auth = "/usr/bin/ntlm_auth --request-nt-key
>> --username=%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}
>> --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-response:-00}"
>>          allow_retry = yes
>>    }
>>   Module: Linked to module rlm_digest
>>   Module: Instantiating module "digest" from file
>> /usr/local/pf/raddb//modules/digest
>>   Module: Linked to module rlm_unix
>>   Module: Instantiating module "unix" from file
>> /usr/local/pf/raddb//modules/unix
>>    unix {
>>          radwtmp = "/usr/local/pf/logs/radwtmp"
>>    }
>>   Module: Linked to module rlm_eap
>>   Module: Instantiating module "eap" from file /usr/local/pf/raddb//eap.conf
>>    eap {
>>          default_eap_type = "peap"
>>          timer_expire = 60
>>          ignore_unknown_eap_types = no
>>          cisco_accounting_username_bug = no
>>          max_sessions = 2048
>>    }
>>   Module: Linked to sub-module rlm_eap_md5
>>   Module: Instantiating eap-md5
>>   Module: Linked to sub-module rlm_eap_tls
>>   Module: Instantiating eap-tls
>>     tls {
>>          rsa_key_exchange = no
>>          dh_key_exchange = yes
>>          rsa_key_length = 512
>>          dh_key_length = 512
>>          verify_depth = 0
>>          pem_file_type = yes
>>          private_key_file = "/usr/local/pf/conf/ssl/server.key"
>>          certificate_file = "/usr/local/pf/conf/ssl/server.crt"
>>          dh_file = "/usr/local/pf/raddb//certs/dh"
>>          random_file = "/dev/urandom"
>>          fragment_size = 1024
>>          include_length = yes
>>          check_crl = no
>>          cipher_list = "DEFAULT"
>>          make_cert_command = "/usr/local/pf/raddb//certs/bootstrap"
>>      cache {
>>          enable = no
>>          lifetime = 24
>>          max_entries = 255
>>      }
>>      verify {
>>      }
>>      ocsp {
>>          enable = no
>>          override_cert_url = yes
>>          url = "http://127.0.0.1/ocsp/";
>>          use_nonce = yes
>>          timeout = 0
>>          softfail = no
>>      }
>>     }
>>   Module: Linked to sub-module rlm_eap_ttls
>>   Module: Instantiating eap-ttls
>>     ttls {
>>          default_eap_type = "md5"
>>          copy_request_to_tunnel = yes
>>          use_tunneled_reply = yes
>>          virtual_server = "packetfence-tunnel"
>>          include_length = yes
>>     }
>>   Module: Linked to sub-module rlm_eap_peap
>>   Module: Instantiating eap-peap
>>     peap {
>>          default_eap_type = "mschapv2"
>>          copy_request_to_tunnel = yes
>>          use_tunneled_reply = yes
>>          proxy_tunneled_request_as_eap = yes
>>          virtual_server = "packetfence-tunnel"
>>          soh = no
>>     }
>>   Module: Linked to sub-module rlm_eap_mschapv2
>>   Module: Instantiating eap-mschapv2
>>     mschapv2 {
>>          with_ntdomain_hack = no
>>          send_error = no
>>     }
>>   Module: Checking authorize {...} for more modules to load
>>   Module: Linked to module rlm_preprocess
>>   Module: Instantiating module "preprocess" from file
>> /usr/local/pf/raddb//modules/preprocess
>>    preprocess {
>>          huntgroups = "/usr/local/pf/raddb//huntgroups"
>>          hints = "/usr/local/pf/raddb//hints"
>>          with_ascend_hack = no
>>          ascend_channels_per_line = 23
>>          with_ntdomain_hack = no
>>          with_specialix_jetstream_hack = no
>>          with_cisco_vsa_hack = no
>>          with_alvarion_vsa_hack = no
>>    }
>> reading pairlist file /usr/local/pf/raddb//huntgroups
>> reading pairlist file /usr/local/pf/raddb//hints
>>   Module: Linked to module rlm_realm
>>   Module: Instantiating module "suffix" from file
>> /usr/local/pf/raddb//modules/realm
>>    realm suffix {
>>          format = "suffix"
>>          delimiter = "@"
>>          ignore_default = no
>>          ignore_null = no
>>    }
>>   Module: Linked to module rlm_files
>>   Module: Instantiating module "files" from file
>> /usr/local/pf/raddb//modules/files
>>    files {
>>          usersfile = "/usr/local/pf/raddb//users"
>>          acctusersfile = "/usr/local/pf/raddb//acct_users"
>>          preproxy_usersfile = "/usr/local/pf/raddb//preproxy_users"
>>          compat = "no"
>>    }
>> reading pairlist file /usr/local/pf/raddb//users
>> reading pairlist file /usr/local/pf/raddb//acct_users
>> reading pairlist file /usr/local/pf/raddb//preproxy_users
>>   Module: Checking preacct {...} for more modules to load
>>   Module: Linked to module rlm_acct_unique
>>   Module: Instantiating module "acct_unique" from file
>> /usr/local/pf/raddb//modules/acct_unique
>>    acct_unique {
>>          key = "User-Name, Acct-Session-Id, NAS-IP-Address,
>> Client-IP-Address, NAS-Port"
>>    }
>>   Module: Checking accounting {...} for more modules to load
>>   Module: Linked to module rlm_detail
>>   Module: Instantiating module "detail" from file
>> /usr/local/pf/raddb//modules/detail
>>    detail {
>>          detailfile =
>> "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"
>>          header = "%t"
>>          detailperm = 384
>>          dirperm = 493
>>          locking = no
>>          log_packet_header = no
>>    }
>>   Module: Linked to module rlm_radutmp
>>   Module: Instantiating module "radutmp" from file
>> /usr/local/pf/raddb//modules/radutmp
>>    radutmp {
>>          filename = "/usr/local/pf/logs/radutmp"
>>          username = "%{User-Name}"
>>          case_sensitive = yes
>>          check_with_nas = yes
>>          perm = 384
>>          callerid = yes
>>    }
>>   Module: Linked to module rlm_attr_filter
>>   Module: Instantiating module "attr_filter.accounting_response" from
>> file /usr/local/pf/raddb//modules/attr_filter
>>    attr_filter attr_filter.accounting_response {
>>          attrsfile = "/usr/local/pf/raddb//attrs.accounting_response"
>>          key = "%{User-Name}"
>>          relaxed = no
>>    }
>> reading pairlist file /usr/local/pf/raddb//attrs.accounting_response
>>   Module: Checking session {...} for more modules to load
>>   Module: Checking post-proxy {...} for more modules to load
>>   Module: Checking post-auth {...} for more modules to load
>>   Module: Instantiating module "attr_filter.access_reject" from file
>> /usr/local/pf/raddb//modules/attr_filter
>>    attr_filter attr_filter.access_reject {
>>          attrsfile = "/usr/local/pf/raddb//attrs.access_reject"
>>          key = "%{User-Name}"
>>          relaxed = no
>>    }
>> reading pairlist file /usr/local/pf/raddb//attrs.access_reject
>>   } # modules
>> } # server
>> server packetfence { # from file
>> /usr/local/pf/raddb//sites-enabled/packetfence
>>   modules {
>>   Module: Checking authenticate {...} for more modules to load
>>   Module: Checking authorize {...} for more modules to load
>>   Module: Linked to module rlm_perl
>>   Module: Instantiating module "packetfence" from file
>> /usr/local/pf/raddb//modules/perl
>>    perl packetfence {
>>          module = "/usr/local/pf/raddb//packetfence.pm"
>>          func_authorize = "authorize"
>>          func_authenticate = "authenticate"
>>          func_accounting = "accounting"
>>          func_preacct = "preacct"
>>          func_checksimul = "checksimul"
>>          func_detach = "detach"
>>          func_xlat = "xlat"
>>          func_pre_proxy = "pre_proxy"
>>          func_post_proxy = "post_proxy"
>>          func_post_auth = "post_auth"
>>          func_recv_coa = "recv_coa"
>>          func_send_coa = "send_coa"
>>    }
>>   Module: Checking preacct {...} for more modules to load
>>   Module: Checking accounting {...} for more modules to load
>>   Module: Linked to module rlm_sql
>>   Module: Instantiating module "sql" from file /usr/local/pf/raddb//sql.conf
>>    sql {
>>          driver = "rlm_sql_mysql"
>>          server = "localhost"
>>          port = "3306"
>>          login = "pf"
>>          password = "XXXXXXXXX:REMOVED"
>>          radius_db = "pf"
>>          read_groups = yes
>>          sqltrace = no
>>          sqltracefile = "/usr/local/pf/logs/sqltrace.sql"
>>          readclients = yes
>>          deletestalesessions = yes
>>          num_sql_socks = 5
>>          lifetime = 0
>>          max_queries = 0
>>          sql_user_name = "%{User-Name}"
>>          default_user_profile = ""
>>          nas_query = "SELECT id, nasname, shortname, type, secret FROM
>> radius_nas"
>>          authorize_check_query = "SELECT id, username, attribute, value,
>> op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id"
>>          authorize_reply_query = "SELECT id, username, attribute, value,
>> op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id"
>>          authorize_group_check_query = "SELECT id, groupname, attribute,
>> Value, op FROM radgroupcheck  WHERE groupname = '%{Sql-Group}'ORDER BY id"
>>          authorize_group_reply_query = "SELECT id, groupname, attribute,
>> value, op FROM radgroupreply  WHERE groupname = '%{Sql-Group}'ORDER BY id"
>>          accounting_onoff_query = "UPDATE radacct SET acctstoptime='%S',
>> acctsessiontime =  unix_timestamp('%S') - unix_timestamp(acctstarttime),
>> acctterminatecause =  '%{Acct-Terminate-Cause}', acctstopdelay =
>> %{%{Acct-Delay-Time}:-0} WHERE acctstoptime IS NULL AND nasipaddress  =
>>   '%{NAS-IP-Address}' AND acctstarttime  <= '%S'"
>>          accounting_update_query = "CALL acct_update ('%S',
>> '%{Acct-Session-Time}','%{%{Acct-Input-Gigawords}:-0}'  << 32 | '%{%{Ac
>>                          ct-Input-Octets}:-0}',
>> '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Ac
>>   ct-Output-Octets}:-0}','%{Acct-Session-Id}', '%{SQL-User-Name}' ,
>> '%{NAS-IP-Address}', '%{Framed-IP-Address}', '%{Acct-Status-Type}')"
>>          accounting_update_query_alt = "INSERT INTO
>> radacct(acctsessionid,    acctuniqueid,      username,
>> realm,                                     nasipaddress,      nasportid,
>>               nasporttype, acctstarttime,  acctsessiontime,
>> acctauthentic,    connectinfo_start, acctinputoctets, acctoutputoctets,
>> calledstationid,   callingstationid, servicetype, framedprotocol,
>> framedipaddress, acctstartdelay,   xascendsessionsvrkey) VALUES
>> ('%{Acct-Session-Id}',
>> '%{Acct-Unique-Session-Id}','%{SQL-User-Name}','%{Realm}',
>> '%{NAS-IP-Address}', '%{NAS-Port}', '%{NAS-Port-Type}',
>> DATE_SUB('%S',INTERVAL (%{%{Acct-Session-Time}:-0} +
>> %{%{Acct-Delay-Time}:-0}) SECOND),  '%{Acct-Session-Time}',
>> '%{Acct-Authentic}', '',  '%{%{Acct-Input-Gigawords}:-0}' << 32 |
>> '%{%{Acct-Input-Octets}:-0}',   '%{%{Acct-Output-Gigawords}:-0}' << 32 |
>>   '%{%{Acct-Output-Octets}:-0}',
>> REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''),
>> REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':',''),
>> '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', '0',
>> '%{X-Ascend-Session-Svr-Key}')"
>>          accounting_start_query = "CALL acct_start
>> ('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}',
>> '%{SQL-User-Name}',                                      '%{Realm}',
>> '%{NAS-IP-Address}', '%{NAS-Port}','%{NAS-Port-Type}', '%S', NULL, '0',
>> '%{Acct-Authentic}', '%{Connect-Info}',
>>       '', '0', '0',
>> REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''),
>> REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':',''), '',
>> '%{Service-Type}', '%{Framed-Protocol}',
>> '%{Framed-IP-Address}','%{%{Acct-Delay-Time}:-0}', '0',
>> '%{X-Ascend-Session-Svr-Key}', '%{Acct-Status-Type}')"
>>          accounting_start_query_alt = "UPDATE radacct SET acctstarttime
>>      = '%S',              acctstartdelay    = '%{%{Acct-Delay-Time
>>                     }:-0}',              connectinfo_start =
>> '%{Connect-Info}'  WHERE acctsessionid  = '%{Acct-Session-Id}'AND
>> username         = '%{SQL-User-Name}' AND nasipaddress  =
>> '%{NAS-IP-Address}'"
>>          accounting_stop_query = "CALL acct_stop
>> ('%S','%{Acct-Session-Time}','%{%{Acct-Input-Gigawords}:-0}' <<
>>                   32 | '%{%{Acct-Input-Octets}:-0}',
>> '%{%{Acct-Output-Gigawords}:-0}'                          << 32 |
>> '%{%{Acct-Output-Octets}:-0}', '%{Acct-Terminate-Cause}',
>> '%{%{Acct-Delay-Time}:-0}', '%{Connect-Info}', '%{Acct-Session-Id}',
>> '%{SQL-User-Name}', '%{NAS-IP-Address}', '%{Acct-Status-Type}')"
>>          accounting_stop_query_alt = "INSERT INTO radacct(acctsessionid,
>> acctuniqueid, username, realm, nasipaddress, naspor  tid,  nasporttype,
>> acctstarttime, acctstoptime, acctsessiontime, acctauthentic,
>> connectinfo_start, connectinfo_stop, acctinputoctets,
>> acctoutputoctets,calledstationid, callingstationid, acctterminatecause,
>> servicetype, framedprotocol, framedipaddress,       acctstartdelay,
>> acctstopdelay)  VALUES  ('%{Acct-Session-Id}',
>> '%{Acct-Unique-Session-Id}','%{SQL-User-Name}', '%{Realm}',
>> '%{NAS-IP-Address}', '%{NAS-Port}', '%{NAS-Port-Type}', DATE_SUB('%S',
>> INTERVAL (%{%{Acct-Session-Time}:-0} +  %{%{Acct-Delay-Time}:-0})
>> SECOND), '%S', '%{Acct-Session-Time}', '%{Acct-Authentic}', '',
>> '%{Connect-Info}', '%{%{Acct-Input-Gigawords}:-0}' << 32 |
>> '%{%{Acct-Input-Octets}:-0}',  '%{%{Acct-Output-Gigawords}:-0}' << 32 |
>>   '%{%{Acct-Output-Octets}:-0}',
>> REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''),
>> REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':', ''),
>> '%{Acct-Terminate-Cause}',  '%{Service-Type}', '%{Framed-Protocol}',
>> '%{Framed-IP-Address}', '0', '%{%{Acct-Delay-Time}:-0}')"
>>          group_membership_query = "SELECT groupname FROM radusergroup
>> WHERE username = '%{SQL-User-Name}'           ORDER BY priority"
>>          connect_failure_retry_delay = 60
>>          simul_count_query = ""
>>          simul_verify_query = "SELECT radacctid, acctsessionid,
>> username, nasipaddress, nasportid, framedipaddress,  callingstationid,
>> framedprotocol  FROM radacct  WHERE username = '%{SQL-User-Name}' AND
>> acctstoptime IS NULL"
>>          postauth_query = "INSERT INTO radpostauth(username, pass,
>> reply, authdate)  VALUES
>> ('%{User-Name}','%{%{User-Password}:-%{Chap-Password}}','%{reply:Packet-Type}',
>> '%S')"
>>          safe-characters =
>> "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
>>    }
>> rlm_sql (sql): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
>> rlm_sql (sql): Attempting to connect to pf@localhost:3306/pf
>> rlm_sql (sql): starting 0
>> rlm_sql (sql): Attempting to connect rlm_sql_mysql #0
>> rlm_sql_mysql: Starting connect to MySQL server for #0
>> rlm_sql (sql): Connected new DB handle, #0
>> rlm_sql (sql): starting 1
>> rlm_sql (sql): Attempting to connect rlm_sql_mysql #1
>> rlm_sql_mysql: Starting connect to MySQL server for #1
>> rlm_sql (sql): Connected new DB handle, #1
>> rlm_sql (sql): starting 2
>> rlm_sql (sql): Attempting to connect rlm_sql_mysql #2
>> rlm_sql_mysql: Starting connect to MySQL server for #2
>> rlm_sql (sql): Connected new DB handle, #2
>> rlm_sql (sql): starting 3
>> rlm_sql (sql): Attempting to connect rlm_sql_mysql #3
>> rlm_sql_mysql: Starting connect to MySQL server for #3
>> rlm_sql (sql): Connected new DB handle, #3
>> rlm_sql (sql): starting 4
>> rlm_sql (sql): Attempting to connect rlm_sql_mysql #4
>> rlm_sql_mysql: Starting connect to MySQL server for #4
>> rlm_sql (sql): Connected new DB handle, #4
>> rlm_sql (sql): Processing generate_sql_clients
>> rlm_sql (sql) in generate_sql_clients: query is SELECT id, nasname,
>> shortname, type, secret FROM radius_nas
>> rlm_sql (sql): Reserving sql socket id: 4
>> rlm_sql (sql): Read entry
>> nasname=192.168.69.244,shortname=192.168.69.244,secret=XXXXXXXXX:REMOVED
>> rlm_sql (sql): Adding client 192.168.69.244 (192.168.69.244,
>> server=<none>) to clients list
>> rlm_sql (sql): Read entry
>> nasname=192.168.69.246,shortname=192.168.69.246,secret=XXXXXXXXX:REMOVED
>> rlm_sql (sql): Adding client 192.168.69.246 (192.168.69.246,
>> server=<none>) to clients list
>> rlm_sql (sql): Released sql socket id: 4
>>   Module: Checking post-proxy {...} for more modules to load
>>   Module: Checking post-auth {...} for more modules to load
>>   } # modules
>> } # server
>> server soh-server { # from file
>> /usr/local/pf/raddb//sites-enabled/packetfence-soh
>>   modules {
>>   Module: Checking authorize {...} for more modules to load
>>   Module: Instantiating module "packetfence-soh" from file
>> /usr/local/pf/raddb//modules/perl
>>    perl packetfence-soh {
>>          module = "/usr/local/pf/raddb//packetfence-soh.pm"
>>          func_authorize = "authorize"
>>          func_authenticate = "authenticate"
>>          func_accounting = "accounting"
>>          func_preacct = "preacct"
>>          func_checksimul = "checksimul"
>>          func_detach = "detach"
>>          func_xlat = "xlat"
>>          func_pre_proxy = "pre_proxy"
>>          func_post_proxy = "post_proxy"
>>          func_post_auth = "post_auth"
>>          func_recv_coa = "recv_coa"
>>          func_send_coa = "send_coa"
>>    }
>>   } # modules
>> } # server
>> server packetfence-tunnel { # from file
>> /usr/local/pf/raddb//sites-enabled/packetfence-tunnel
>>   modules {
>>   Module: Checking authenticate {...} for more modules to load
>>   Module: Checking authorize {...} for more modules to load
>>   Module: Instantiating module "ntdomain" from file
>> /usr/local/pf/raddb//modules/realm
>>    realm ntdomain {
>>          format = "prefix"
>>          delimiter = "\"
>>          ignore_default = no
>>          ignore_null = no
>>    }
>>   Module: Checking session {...} for more modules to load
>>   Module: Checking post-proxy {...} for more modules to load
>>   Module: Checking post-auth {...} for more modules to load
>>   } # modules
>> } # server
>> server inner-tunnel { # from file
>> /usr/local/pf/raddb//sites-enabled/inner-tunnel
>>   modules {
>>   Module: Checking authenticate {...} for more modules to load
>>   Module: Checking authorize {...} for more modules to load
>>   Module: Checking session {...} for more modules to load
>>   Module: Checking post-proxy {...} for more modules to load
>>   Module: Checking post-auth {...} for more modules to load
>>   } # modules
>> } # server
>> radiusd: #### Opening IP addresses and Ports ####
>> listen {
>>          type = "auth"
>>          virtual_server = "packetfence"
>>          ipaddr = 192.168.69.247
>>          port = 0
>> }
>> listen {
>>          type = "acct"
>>          virtual_server = "packetfence"
>>          ipaddr = 192.168.69.247
>>          port = 0
>> }
>> listen {
>>          type = "control"
>>   listen {
>>          socket = "/usr/local/pf/var/run/radiusd.sock"
>>          mode = "rw"
>>   }
>> }
>> listen {
>>          type = "auth"
>>          ipaddr = 127.0.0.1
>>          port = 18120
>> }
>>   ... adding new socket proxy address * port 56024
>> Listening on authentication address 192.168.69.247 port 1812 as server
>> packetfence
>> Listening on accounting address 192.168.69.247 port 1813 as server
>> packetfence
>> Listening on command file /usr/local/pf/var/run/radiusd.sock
>> Listening on authentication address 127.0.0.1 port 18120 as server
>> inner-tunnel
>> Listening on proxy address 192.168.69.247 port 1814
>> Ready to process requests.
>> rad_recv: Access-Request packet from host 192.168.69.244 port 1645,
>> id=185, length=173
>>          User-Name = "0446655af9d5"
>>          User-Password = "0446655af9d5"
>>          Called-Station-Id = "00-23-5E-B0-38-00"
>>          Calling-Station-Id = "04-46-65-5A-F9-D5"
>>          Cisco-AVPair = "ssid=TWGuest"
>>          Service-Type = Login-User
>>          Cisco-AVPair = "service-type=Login"
>>          NAS-Port-Type = Wireless-802.11
>>          NAS-Port = 333
>>          NAS-Port-Id = "333"
>>          NAS-IP-Address = 192.168.69.244
>>          NAS-Identifier = "wifi02"
>> server packetfence {
>> # Executing section authorize from file
>> /usr/local/pf/raddb//sites-enabled/packetfence
>> +- entering group authorize {...}
>> [suffix] No '@' in User-Name = "0446655af9d5", looking up realm NULL
>> [suffix] No such realm "NULL"
>> ++[suffix] returns noop
>> ++[preprocess] returns ok
>> [eap] No EAP-Message, not doing EAP
>> ++[eap] returns noop
>> [files] users: Matched entry DEFAULT at line 1
>> ++[files] returns ok
>> ++[expiration] returns noop
>> ++[logintime] returns noop
>> rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
>> rlm_perl: Added pair Service-Type = Login-User
>> rlm_perl: Added pair Calling-Station-Id = 04-46-65-5A-F9-D5
>> rlm_perl: Added pair Called-Station-Id = 00-23-5E-B0-38-00
>> rlm_perl: Added pair Cisco-AVPair = ssid=TWGuest
>> rlm_perl: Added pair Cisco-AVPair = service-type=Login
>> rlm_perl: Added pair User-Name = 0446655af9d5
>> rlm_perl: Added pair NAS-Identifier = wifi02
>> rlm_perl: Added pair User-Password = 0446655af9d5
>> rlm_perl: Added pair NAS-IP-Address = 192.168.69.244
>> rlm_perl: Added pair NAS-Port = 333
>> rlm_perl: Added pair NAS-Port-Id = 333
>> rlm_perl: Added pair Auth-Type = Accept
>> ++[packetfence] returns noop
>> Found Auth-Type = Accept
>> Auth-Type = Accept, accepting the user
>> Login OK: [0446655af9d5] (from client 192.168.69.244 port 333 cli
>> 04-46-65-5A-F9-D5)
>> # Executing section post-auth from file
>> /usr/local/pf/raddb//sites-enabled/packetfence
>> +- entering group post-auth {...}
>> ++[exec] returns noop
>> ++? if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25))
>> ? Evaluating !(EAP-Type ) -> TRUE
>> ?? Skipping (EAP-Type != 21 )
>> ?? Skipping (EAP-Type != 25)
>> ++? if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25)) -> TRUE
>> ++- entering if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25)) {...}
>> rlm_perl: Returning vlan 11 to request from 04:46:65:5a:f9:d5 port 333
>> rlm_perl: PacketFence RESULT RESPONSE CODE: 2 (2 means OK)
>> rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
>> rlm_perl: Added pair Service-Type = Login-User
>> rlm_perl: Added pair Called-Station-Id = 00-23-5E-B0-38-00
>> rlm_perl: Added pair Calling-Station-Id = 04-46-65-5A-F9-D5
>> rlm_perl: Added pair Cisco-AVPair = ssid=TWGuest
>> rlm_perl: Added pair Cisco-AVPair = service-type=Login
>> rlm_perl: Added pair User-Name = 0446655af9d5
>> rlm_perl: Added pair NAS-Identifier = wifi02
>> rlm_perl: Added pair User-Password = 0446655af9d5
>> rlm_perl: Added pair NAS-Port = 333
>> rlm_perl: Added pair NAS-IP-Address = 192.168.69.244
>> rlm_perl: Added pair NAS-Port-Id = 333
>> rlm_perl: Added pair Tunnel-Private-Group-ID = 11
>> rlm_perl: Added pair Tunnel-Type = 13
>> rlm_perl: Added pair Tunnel-Medium-Type = 6
>> rlm_perl: Added pair Auth-Type = Accept
>> +++[packetfence] returns ok
>> ++- if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25)) returns ok
>> } # server packetfence
>> Sending Access-Accept of id 185 to 192.168.69.244 port 1645
>>          Tunnel-Private-Group-Id:0 = "11"
>>          Tunnel-Type:0 = VLAN
>>          Tunnel-Medium-Type:0 = IEEE-802
>> Finished request 0.
>> Going to the next request
>> Waking up in 4.9 seconds.
>> rad_recv: Access-Request packet from host 192.168.69.244 port 1645,
>> id=185, length=173
>> Sending duplicate reply to client 192.168.69.244 port 1645 - ID: 185
>> Sending Access-Accept of id 185 to 192.168.69.244 port 1645
>> Waking up in 4.9 seconds.
>> Cleaning up request 0 ID 185 with timestamp +13
>> Ready to process requests.
>>
>>
>>
>> Em 19-09-2013 14:51, Derek Wuelfrath escreveu:
>>> Hello Pedro
>>>
>>> Can you edit the /usr/local/pf/lib/SNMP/Cisco/Aironet_WDS.pm file and
>>> add the following:
>>>
>>> in sub extractSsid, just after the "my $logger … " line (at line 204 if
>>> you use latest version of PacketFence), add the following two lines
>>>
>>> use Data::Dumper;
>>> $logger->info("PACKETFENCE DEBUGGING: " . Dump($radius_request));
>>>
>>> Then, restart PacketFence and retry. Paste the relevant log output.
>>>
>>> Cheers!
>>> dw.
>>>
>>> --
>>> Derek Wuelfrath
>>> dwuelfrath-tiT8nZ+Z9Bqw5LPnMra/[email protected]
>>> <mailto:dwuelfrath-tiT8nZ+Z9Bqw5LPnMra/[email protected]>
>>>  ::
>>> +1.514.447.4918 (x110) :: www.inverse.ca <http://www.inverse.ca/>
>>> Inverse inc. :: Leaders behind SOGo (www.sogo.nu <http://www.sogo.nu/>)
>>> and PacketFence (www.packetfence.org <http://www.packetfence.org/>)
>>>
>>> On 2013-09-17, at 5:33 AM, "Pedro, Tavares"
>>> <pltavares-re5jqeeqqe8avxtiumwx3w-xmd5yjdbdmrexy1tmh2...@public.gmane.org
>>> <mailto:pltavares-re5jqeeqqe8avxtiumwx3w-xmd5yjdbdmrexy1tmh2...@public.gmane.org>>
>>>  wrote:
>>>
>>>> Hello all.
>>>> Regarding this issue, I've been searching for a while and I did found
>>>> others reporting similar issues (same errors in logs) but for some
>>>> reason didn't apply to my case.
>>>> The environment
>>>> PF is in Vlan enforcement mode. Although it's working, I'm aware
>>>> that's not the best configuration. I'm still learning :)
>>>> Native Vlan = 1
>>
>>
>>
>>
>>
>> ------------------------------------------------------------------------------
>> LIMITED TIME SALE - Full Year of Microsoft Training For Just $49.99!
>> 1,500+ hours of tutorials including VisualStudio 2012, Windows 8, SharePoint
>> 2013, SQL 2012, MVC 4, more. BEST VALUE: New Multi-Library Power Pack 
>> includes
>> Mobile, Cloud, Java, and UX Design. Lowest price ever! Ends 9/20/13.
>> http://pubads.g.doubleclick.net/gampad/clk?id=58041151&iu=/4140/ostg.clktrk
>> _______________________________________________
>> PacketFence-users mailing list
>> packetfence-users-5nwgofrqmnerv+lv9mx5uipxlwaov...@public.gmane.org
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
>
> ------------------------------------------------------------------------------
> LIMITED TIME SALE - Full Year of Microsoft Training For Just $49.99!
> 1,500+ hours of tutorials including VisualStudio 2012, Windows 8, SharePoint
> 2013, SQL 2012, MVC 4, more. BEST VALUE: New Multi-Library Power Pack includes
> Mobile, Cloud, Java, and UX Design. Lowest price ever! Ends 9/20/13.
> http://pubads.g.doubleclick.net/gampad/clk?id=58041151&iu=/4140/ostg.clktrk
>



------------------------------------------------------------------------------
LIMITED TIME SALE - Full Year of Microsoft Training For Just $49.99!
1,500+ hours of tutorials including VisualStudio 2012, Windows 8, SharePoint
2013, SQL 2012, MVC 4, more. BEST VALUE: New Multi-Library Power Pack includes
Mobile, Cloud, Java, and UX Design. Lowest price ever! Ends 9/20/13. 
http://pubads.g.doubleclick.net/gampad/clk?id=58041151&iu=/4140/ostg.clktrk
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to