Hey there,
Sorry for late reply,

Modification to the actual extractSsid code would be required. There is kind of 
two options here:
- Pay for sponsored development since it “is not on our short term roadmap” but 
it will sure be fixed in a timely manner since the actual code is kindof 
erratic;
- Wait for the development to be done or for someone in the community to 
provide a patch;

In both case, that would be great if you can fill in a bug report in our BTS 
(http://packetfence.org/bugs) with the info provided by Fabrice. Please make 
sure that such bug is not yet in the BTS tho.

Cheers!
dw.

--
Derek Wuelfrath
[email protected] :: +1.514.447.4918 (x110) :: www.inverse.ca
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence 
(www.packetfence.org)

On Sep 30, 2013, at 12:11 PM, Pedro Tavares <[email protected]> wrote:

> 
> 
> Hello,
> 
> Is there any new developments on the issue?
> Monnier, were you able to modify the function?
> 
> Best regards,
> 
> Pedro
> 
> 
> 
> Em 25-09-2013 10:22, Monnier Fabrice escreveu:
>> Hello
>> 
>> I think i have a similar problem with a Cisco Aironet SAP2602i.
>> I use your debug instruction in Aironet.pm.
>> Cisco-AVPair return an array instead a string.
>> 
>> (pf::SNMP::Cisco::Aironet::extractSsid)
>> Sep 23 10:44:47 pf::WebAPI(9316) WARN: Radius Request: $VAR1 = {
>>           'NAS-Port-Type' => 'Wireless-802.11',
>>           'Service-Type' => 'Login-User',
>>           'Cisco-NAS-Port' => '1220',
>>           'Calling-Station-Id' => '2020.7a8e.c9db',
>>           'Called-Station-Id' => '0c69.03ca.76d0',
>>           'Cisco-AVPair' => [
>>                             'ssid=TEST',
>>                             'service-type=Login'
>>                           ],
>>           'User-Name' => '20207a8ec9db',
>>           'User-Password' => '20207a8ec9db',
>>           'NAS-IP-Address' => '192.168.XX.XX',
>>           'NAS-Port' => '1220',
>>           'NAS-Port-Id' => '1220',
>>           'WISPr-Location-Name' => 'SALLE DE TESTS'
>>         };
>> 
>> If I fix the function to read the first line of the table the test works
>> for my new AP but of course not for my oldest AP.
>> 
>> Fabrice
>> 
>> Le 20/09/2013 14:55, Derek Wuelfrath a écrit :
>>> Pedro,
>>> 
>>> Have you restarted PacketFence after adding the lines, cause I don't
>>> see the PACKETFENCE DEBUGGING line in the logs.
>>> 
>>> Derek
>>> 
>>> --
>>> Derek Wuelfrath
>>> dwuelfrath-tiT8nZ+Z9Bqw5LPnMra/[email protected] :: +1.514.447.4918
>>> (x110) :: www.inverse.ca
>>> Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
>>> (www.packetfence.org)
>>> 
>>> On 2013-09-20, at 6:02 AM, Pedro Tavares
>>> <[email protected]> wrote:
>>> 
>>>> 
>>>> 
>>>> Hello Derek,
>>>> 
>>>> Thank you for your help on this.
>>>> 
>>>> I've done as you instructed and here are the logs (packetfence.log and
>>>> radiusd -X)
>>>> 
>>>> Hopefully those are the relevant logs :)
>>>> 
>>>> Best regards,
>>>> 
>>>> Pedro
>>>> 
>>>> 
>>>> ####Packetfence.log
>>>> 
>>>> 
>>>> Sep 20 09:34:40 pf::WebAPI(8473) INFO: handling radius autz request:
>>>> from switch_ip => 192.168.69.244, connection_type =>
>>>> Wireless-802.11-NoEAP mac => 04:46:65:5a:f9:d5, port => 333, username =>
>>>> 0446655af9d5 (pf::radius::authorize)
>>>> Sep 20 09:34:40 pf::WebAPI(8473) WARN: Unable to extract SSID for module
>>>> pf::SNMP::Cisco::Aironet_1250. SSID-based VLAN assignments won't work.
>>>> Make sure you enable Vendor Specific Attributes (VSA) on the AP if you
>>>> want them to work. (pf::SNMP::Cisco::Aironet::extractSsid)
>>>> Sep 20 09:34:41 pf::WebAPI(8473) INFO: highest priority violation for
>>>> 04:46:65:5a:f9:d5 is 1200001. Target VLAN for violation: registration
>>>> (11) (pf::vlan::getViolationVlan)
>>>> Sep 20 09:34:41 pf::WebAPI(8473) WARN: Role-based Network Access Control
>>>> is not supported on network device type pf::SNMP::Cisco::Aironet_1250.
>>>> (pf::SNMP::supportsRoleBasedEnforcement)
>>>> Sep 20 09:34:49 pfdhcplistener(8540) INFO: DHCPOFFER from 10.10.150.1
>>>> (00:1d:09:f0:64:26) to host 04:46:65:5a:f9:d5 (10.10.150.10)
>>>> (main::parse_dhcp_offer)
>>>> Sep 20 09:34:49 pfdhcplistener(8540) INFO: DHCPREQUEST from
>>>> 04:46:65:5a:f9:d5 (10.10.150.10) (main::parse_dhcp_request)
>>>> Sep 20 09:34:49 pfdhcplistener(8540) INFO: could not resolve
>>>> 10.10.150.10 to mac in ARP table (pf::iplog::ip2macinarp)
>>>> Sep 20 09:34:49 pfdhcplistener(8540) INFO: resolved 10.10.150.10 to mac
>>>> (04:46:65:5a:f9:d5) in ARP table (pf::iplog::ip2macinarp)
>>>> Sep 20 09:34:49 pfdhcplistener(8540) INFO: oldip (192.168.70.10) and
>>>> newip (10.10.150.10) are different for 04:46:65:5a:f9:d5 - closing iplog
>>>> entry (main::update_iplog)
>>>> Sep 20 09:34:50 pfdhcplistener(8540) INFO: 04:46:65:5a:f9:d5 requested
>>>> an IP. DHCP Fingerprint: OS::1112 (Samsung Android). Modified node with
>>>> last_dhcp = 2013-09-20 09:34:50,computername =
>>>> android-cfbfb835f3c74cd4,dhcp_fingerprint = 1,33,3,6,15,28,51,58,59
>>>> (main::listen_dhcp)
>>>> 
>>>> 
>>>> 
>>>> Radiusd -X -d /usr/local/pf/raddb
>>>> 
>>>> [root@pfense bin]# radiusd -X -d /usr/local/pf/raddb/
>>>> FreeRADIUS Version 2.2.0, for host x86_64-unknown-linux-gnu, built on
>>>> Oct 18 2012 at 13:58:38
>>>> Copyright (C) 1999-2012 The FreeRADIUS server project and contributors.
>>>> There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
>>>> PARTICULAR PURPOSE.
>>>> You may redistribute copies of FreeRADIUS under the terms of the
>>>> GNU General Public License v2.
>>>> Starting - reading configuration files ...
>>>> including configuration file /usr/local/pf/raddb//radiusd.conf
>>>> including configuration file /usr/local/pf/raddb//proxy.conf
>>>> including configuration file /usr/local/pf/raddb//clients.conf
>>>> including files in directory /usr/local/pf/raddb//modules/
>>>> including configuration file /usr/local/pf/raddb//modules/always
>>>> including configuration file /usr/local/pf/raddb//modules/pap
>>>> including configuration file /usr/local/pf/raddb//modules/unix
>>>> including configuration file /usr/local/pf/raddb//modules/mschap
>>>> including configuration file
>>>> /usr/local/pf/raddb//modules/sqlcounter_expire_on_login
>>>> including configuration file /usr/local/pf/raddb//modules/realm
>>>> including configuration file /usr/local/pf/raddb//modules/otp
>>>> including configuration file /usr/local/pf/raddb//modules/ntlm_auth
>>>> including configuration file /usr/local/pf/raddb//modules/counter
>>>> including configuration file /usr/local/pf/raddb//modules/checkval
>>>> including configuration file /usr/local/pf/raddb//modules/inner-eap
>>>> including configuration file /usr/local/pf/raddb//modules/soh
>>>> including configuration file /usr/local/pf/raddb//modules/pam
>>>> including configuration file /usr/local/pf/raddb//modules/mac2vlan
>>>> including configuration file /usr/local/pf/raddb//modules/acct_unique
>>>> including configuration file /usr/local/pf/raddb//modules/expiration
>>>> including configuration file /usr/local/pf/raddb//modules/smsotp
>>>> including configuration file /usr/local/pf/raddb//modules/etc_group
>>>> including configuration file /usr/local/pf/raddb//modules/preprocess
>>>> including configuration file /usr/local/pf/raddb//modules/perl
>>>> including configuration file /usr/local/pf/raddb//modules/ippool
>>>> including configuration file /usr/local/pf/raddb//modules/sql_log
>>>> including configuration file /usr/local/pf/raddb//modules/wimax
>>>> including configuration file /usr/local/pf/raddb//modules/chap
>>>> including configuration file /usr/local/pf/raddb//modules/digest
>>>> including configuration file /usr/local/pf/raddb//modules/rediswho
>>>> including configuration file /usr/local/pf/raddb//modules/detail
>>>> including configuration file /usr/local/pf/raddb//modules/logintime
>>>> including configuration file /usr/local/pf/raddb//modules/detail.log
>>>> including configuration file /usr/local/pf/raddb//modules/ldap
>>>> including configuration file /usr/local/pf/raddb//modules/echo
>>>> including configuration file /usr/local/pf/raddb//modules/mac2ip
>>>> including configuration file /usr/local/pf/raddb//modules/attr_rewrite
>>>> including configuration file /usr/local/pf/raddb//modules/policy
>>>> including configuration file /usr/local/pf/raddb//modules/radutmp
>>>> including configuration file /usr/local/pf/raddb//modules/smbpasswd
>>>> including configuration file /usr/local/pf/raddb//modules/expr
>>>> including configuration file /usr/local/pf/raddb//modules/attr_filter
>>>> including configuration file /usr/local/pf/raddb//modules/replicate
>>>> including configuration file /usr/local/pf/raddb//modules/sradutmp
>>>> including configuration file /usr/local/pf/raddb//modules/redis
>>>> including configuration file /usr/local/pf/raddb//modules/linelog
>>>> including configuration file
>>>> /usr/local/pf/raddb//modules/detail.example.com
>>>> including configuration file /usr/local/pf/raddb//modules/passwd
>>>> including configuration file
>>>> /usr/local/pf/raddb//modules/dynamic_clients
>>>> including configuration file /usr/local/pf/raddb//modules/cui
>>>> including configuration file /usr/local/pf/raddb//modules/files
>>>> including configuration file /usr/local/pf/raddb//modules/exec
>>>> including configuration file /usr/local/pf/raddb//modules/opendirectory
>>>> including configuration file /usr/local/pf/raddb//eap.conf
>>>> including configuration file /usr/local/pf/raddb//sql.conf
>>>> including configuration file
>>>> /usr/local/pf/raddb//sql/mysql/packetfence.conf
>>>> including configuration file /usr/local/pf/raddb//policy.conf
>>>> including files in directory /usr/local/pf/raddb//sites-enabled/
>>>> including configuration file /usr/local/pf/raddb//sites-enabled/default
>>>> including configuration file
>>>> /usr/local/pf/raddb//sites-enabled/packetfence
>>>> including configuration file
>>>> /usr/local/pf/raddb//sites-enabled/packetfence-soh
>>>> including configuration file
>>>> /usr/local/pf/raddb//sites-enabled/control-socket
>>>> including configuration file
>>>> /usr/local/pf/raddb//sites-enabled/packetfence-tunnel
>>>> including configuration file
>>>> /usr/local/pf/raddb//sites-enabled/inner-tunnel
>>>> main {
>>>>         user = "pf"
>>>>         group = "pf"
>>>>         allow_core_dumps = no
>>>> }
>>>> including dictionary file /usr/local/pf/raddb//dictionary
>>>> main {
>>>>         name = "radiusd"
>>>>         prefix = "/usr"
>>>>         localstatedir = "/usr/local/pf/var"
>>>>         sbindir = "/usr/sbin"
>>>>         logdir = "/usr/local/pf/logs"
>>>>         run_dir = "/usr/local/pf/var/run"
>>>>         libdir = "/usr/lib/freeradius"
>>>>         radacctdir = "/usr/local/pf/logs/radacct"
>>>>         hostname_lookups = no
>>>>         max_request_time = 30
>>>>         cleanup_delay = 5
>>>>         max_requests = 1024
>>>>         pidfile = "/usr/local/pf/var/run/radiusd.pid"
>>>>         checkrad = "/usr/sbin/checkrad"
>>>>         debug_level = 0
>>>>         proxy_requests = yes
>>>>  log {
>>>>         stripped_names = no
>>>>         auth = yes
>>>>         auth_badpass = no
>>>>         auth_goodpass = no
>>>>  }
>>>>  security {
>>>>         max_attributes = 200
>>>>         reject_delay = 1
>>>>         status_server = yes
>>>>  }
>>>> }
>>>> radiusd: #### Loading Realms and Home Servers ####
>>>>  proxy server {
>>>>         retry_delay = 5
>>>>         retry_count = 3
>>>>         default_fallback = no
>>>>         dead_time = 120
>>>>         wake_all_if_all_dead = no
>>>>  }
>>>>  home_server localhost {
>>>>         ipaddr = 127.0.0.1
>>>>         port = 1812
>>>>         type = "auth"
>>>>         secret = "XXXXXXXXX:REMOVED"
>>>>         response_window = 20
>>>>         max_outstanding = 65536
>>>>         require_message_authenticator = yes
>>>>         zombie_period = 40
>>>>         status_check = "status-server"
>>>>         ping_interval = 30
>>>>         check_interval = 30
>>>>         num_answers_to_alive = 3
>>>>         num_pings_to_alive = 3
>>>>         revive_interval = 120
>>>>         status_check_timeout = 4
>>>>   coa {
>>>>         irt = 2
>>>>         mrt = 16
>>>>         mrc = 5
>>>>         mrd = 30
>>>>   }
>>>>  }
>>>>  home_server_pool my_auth_failover {
>>>>         type = fail-over
>>>>         home_server = localhost
>>>>  }
>>>>  realm example.com {
>>>>         auth_pool = my_auth_failover
>>>>  }
>>>>  realm LOCAL {
>>>>  }
>>>> radiusd: #### Loading Clients ####
>>>>  client localhost {
>>>>         ipaddr = 127.0.0.1
>>>>         require_message_authenticator = no
>>>>         secret = "XXXXXXXXX:REMOVED"
>>>>         nastype = "other"
>>>>  }
>>>> radiusd: #### Instantiating modules ####
>>>>  instantiate {
>>>>  Module: Linked to module rlm_exec
>>>>  Module: Instantiating module "exec" from file
>>>> /usr/local/pf/raddb//modules/exec
>>>>   exec {
>>>>         wait = no
>>>>         input_pairs = "request"
>>>>         shell_escape = yes
>>>>   }
>>>>  Module: Linked to module rlm_expr
>>>>  Module: Instantiating module "expr" from file
>>>> /usr/local/pf/raddb//modules/expr
>>>>  Module: Linked to module rlm_expiration
>>>>  Module: Instantiating module "expiration" from file
>>>> /usr/local/pf/raddb//modules/expiration
>>>>   expiration {
>>>>         reply-message = "Password Has Expired  "
>>>>   }
>>>>  Module: Linked to module rlm_logintime
>>>>  Module: Instantiating module "logintime" from file
>>>> /usr/local/pf/raddb//modules/logintime
>>>>   logintime {
>>>>         reply-message = "You are calling outside your allowed
>>>> timespan  "
>>>>         minimum-timeout = 60
>>>>   }
>>>>  }
>>>> radiusd: #### Loading Virtual Servers ####
>>>> server { # from file /usr/local/pf/raddb//radiusd.conf
>>>>  modules {
>>>>   Module: Creating Auth-Type = digest
>>>>   Module: Creating Post-Auth-Type = REJECT
>>>>  Module: Checking authenticate {...} for more modules to load
>>>>  Module: Linked to module rlm_pap
>>>>  Module: Instantiating module "pap" from file
>>>> /usr/local/pf/raddb//modules/pap
>>>>   pap {
>>>>         encryption_scheme = "auto"
>>>>         auto_header = no
>>>>   }
>>>>  Module: Linked to module rlm_chap
>>>>  Module: Instantiating module "chap" from file
>>>> /usr/local/pf/raddb//modules/chap
>>>>  Module: Linked to module rlm_mschap
>>>>  Module: Instantiating module "mschap" from file
>>>> /usr/local/pf/raddb//modules/mschap
>>>>   mschap {
>>>>         use_mppe = yes
>>>>         require_encryption = yes
>>>>         require_strong = no
>>>>         with_ntdomain_hack = yes
>>>>         ntlm_auth = "/usr/bin/ntlm_auth --request-nt-key
>>>> --username=%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}
>>>> --challenge=%{mschap:Challenge:-00}
>>>> --nt-response=%{mschap:NT-response:-00}"
>>>>         allow_retry = yes
>>>>   }
>>>>  Module: Linked to module rlm_digest
>>>>  Module: Instantiating module "digest" from file
>>>> /usr/local/pf/raddb//modules/digest
>>>>  Module: Linked to module rlm_unix
>>>>  Module: Instantiating module "unix" from file
>>>> /usr/local/pf/raddb//modules/unix
>>>>   unix {
>>>>         radwtmp = "/usr/local/pf/logs/radwtmp"
>>>>   }
>>>>  Module: Linked to module rlm_eap
>>>>  Module: Instantiating module "eap" from file
>>>> /usr/local/pf/raddb//eap.conf
>>>>   eap {
>>>>         default_eap_type = "peap"
>>>>         timer_expire = 60
>>>>         ignore_unknown_eap_types = no
>>>>         cisco_accounting_username_bug = no
>>>>         max_sessions = 2048
>>>>   }
>>>>  Module: Linked to sub-module rlm_eap_md5
>>>>  Module: Instantiating eap-md5
>>>>  Module: Linked to sub-module rlm_eap_tls
>>>>  Module: Instantiating eap-tls
>>>>    tls {
>>>>         rsa_key_exchange = no
>>>>         dh_key_exchange = yes
>>>>         rsa_key_length = 512
>>>>         dh_key_length = 512
>>>>         verify_depth = 0
>>>>         pem_file_type = yes
>>>>         private_key_file = "/usr/local/pf/conf/ssl/server.key"
>>>>         certificate_file = "/usr/local/pf/conf/ssl/server.crt"
>>>>         dh_file = "/usr/local/pf/raddb//certs/dh"
>>>>         random_file = "/dev/urandom"
>>>>         fragment_size = 1024
>>>>         include_length = yes
>>>>         check_crl = no
>>>>         cipher_list = "DEFAULT"
>>>>         make_cert_command = "/usr/local/pf/raddb//certs/bootstrap"
>>>>     cache {
>>>>         enable = no
>>>>         lifetime = 24
>>>>         max_entries = 255
>>>>     }
>>>>     verify {
>>>>     }
>>>>     ocsp {
>>>>         enable = no
>>>>         override_cert_url = yes
>>>>         url = "http://127.0.0.1/ocsp/";
>>>>         use_nonce = yes
>>>>         timeout = 0
>>>>         softfail = no
>>>>     }
>>>>    }
>>>>  Module: Linked to sub-module rlm_eap_ttls
>>>>  Module: Instantiating eap-ttls
>>>>    ttls {
>>>>         default_eap_type = "md5"
>>>>         copy_request_to_tunnel = yes
>>>>         use_tunneled_reply = yes
>>>>         virtual_server = "packetfence-tunnel"
>>>>         include_length = yes
>>>>    }
>>>>  Module: Linked to sub-module rlm_eap_peap
>>>>  Module: Instantiating eap-peap
>>>>    peap {
>>>>         default_eap_type = "mschapv2"
>>>>         copy_request_to_tunnel = yes
>>>>         use_tunneled_reply = yes
>>>>         proxy_tunneled_request_as_eap = yes
>>>>         virtual_server = "packetfence-tunnel"
>>>>         soh = no
>>>>    }
>>>>  Module: Linked to sub-module rlm_eap_mschapv2
>>>>  Module: Instantiating eap-mschapv2
>>>>    mschapv2 {
>>>>         with_ntdomain_hack = no
>>>>         send_error = no
>>>>    }
>>>>  Module: Checking authorize {...} for more modules to load
>>>>  Module: Linked to module rlm_preprocess
>>>>  Module: Instantiating module "preprocess" from file
>>>> /usr/local/pf/raddb//modules/preprocess
>>>>   preprocess {
>>>>         huntgroups = "/usr/local/pf/raddb//huntgroups"
>>>>         hints = "/usr/local/pf/raddb//hints"
>>>>         with_ascend_hack = no
>>>>         ascend_channels_per_line = 23
>>>>         with_ntdomain_hack = no
>>>>         with_specialix_jetstream_hack = no
>>>>         with_cisco_vsa_hack = no
>>>>         with_alvarion_vsa_hack = no
>>>>   }
>>>> reading pairlist file /usr/local/pf/raddb//huntgroups
>>>> reading pairlist file /usr/local/pf/raddb//hints
>>>>  Module: Linked to module rlm_realm
>>>>  Module: Instantiating module "suffix" from file
>>>> /usr/local/pf/raddb//modules/realm
>>>>   realm suffix {
>>>>         format = "suffix"
>>>>         delimiter = "@"
>>>>         ignore_default = no
>>>>         ignore_null = no
>>>>   }
>>>>  Module: Linked to module rlm_files
>>>>  Module: Instantiating module "files" from file
>>>> /usr/local/pf/raddb//modules/files
>>>>   files {
>>>>         usersfile = "/usr/local/pf/raddb//users"
>>>>         acctusersfile = "/usr/local/pf/raddb//acct_users"
>>>>         preproxy_usersfile = "/usr/local/pf/raddb//preproxy_users"
>>>>         compat = "no"
>>>>   }
>>>> reading pairlist file /usr/local/pf/raddb//users
>>>> reading pairlist file /usr/local/pf/raddb//acct_users
>>>> reading pairlist file /usr/local/pf/raddb//preproxy_users
>>>>  Module: Checking preacct {...} for more modules to load
>>>>  Module: Linked to module rlm_acct_unique
>>>>  Module: Instantiating module "acct_unique" from file
>>>> /usr/local/pf/raddb//modules/acct_unique
>>>>   acct_unique {
>>>>         key = "User-Name, Acct-Session-Id, NAS-IP-Address,
>>>> Client-IP-Address, NAS-Port"
>>>>   }
>>>>  Module: Checking accounting {...} for more modules to load
>>>>  Module: Linked to module rlm_detail
>>>>  Module: Instantiating module "detail" from file
>>>> /usr/local/pf/raddb//modules/detail
>>>>   detail {
>>>>         detailfile =
>>>> "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"
>>>> 
>>>>         header = "%t"
>>>>         detailperm = 384
>>>>         dirperm = 493
>>>>         locking = no
>>>>         log_packet_header = no
>>>>   }
>>>>  Module: Linked to module rlm_radutmp
>>>>  Module: Instantiating module "radutmp" from file
>>>> /usr/local/pf/raddb//modules/radutmp
>>>>   radutmp {
>>>>         filename = "/usr/local/pf/logs/radutmp"
>>>>         username = "%{User-Name}"
>>>>         case_sensitive = yes
>>>>         check_with_nas = yes
>>>>         perm = 384
>>>>         callerid = yes
>>>>   }
>>>>  Module: Linked to module rlm_attr_filter
>>>>  Module: Instantiating module "attr_filter.accounting_response" from
>>>> file /usr/local/pf/raddb//modules/attr_filter
>>>>   attr_filter attr_filter.accounting_response {
>>>>         attrsfile = "/usr/local/pf/raddb//attrs.accounting_response"
>>>>         key = "%{User-Name}"
>>>>         relaxed = no
>>>>   }
>>>> reading pairlist file /usr/local/pf/raddb//attrs.accounting_response
>>>>  Module: Checking session {...} for more modules to load
>>>>  Module: Checking post-proxy {...} for more modules to load
>>>>  Module: Checking post-auth {...} for more modules to load
>>>>  Module: Instantiating module "attr_filter.access_reject" from file
>>>> /usr/local/pf/raddb//modules/attr_filter
>>>>   attr_filter attr_filter.access_reject {
>>>>         attrsfile = "/usr/local/pf/raddb//attrs.access_reject"
>>>>         key = "%{User-Name}"
>>>>         relaxed = no
>>>>   }
>>>> reading pairlist file /usr/local/pf/raddb//attrs.access_reject
>>>>  } # modules
>>>> } # server
>>>> server packetfence { # from file
>>>> /usr/local/pf/raddb//sites-enabled/packetfence
>>>>  modules {
>>>>  Module: Checking authenticate {...} for more modules to load
>>>>  Module: Checking authorize {...} for more modules to load
>>>>  Module: Linked to module rlm_perl
>>>>  Module: Instantiating module "packetfence" from file
>>>> /usr/local/pf/raddb//modules/perl
>>>>   perl packetfence {
>>>>         module = "/usr/local/pf/raddb//packetfence.pm"
>>>>         func_authorize = "authorize"
>>>>         func_authenticate = "authenticate"
>>>>         func_accounting = "accounting"
>>>>         func_preacct = "preacct"
>>>>         func_checksimul = "checksimul"
>>>>         func_detach = "detach"
>>>>         func_xlat = "xlat"
>>>>         func_pre_proxy = "pre_proxy"
>>>>         func_post_proxy = "post_proxy"
>>>>         func_post_auth = "post_auth"
>>>>         func_recv_coa = "recv_coa"
>>>>         func_send_coa = "send_coa"
>>>>   }
>>>>  Module: Checking preacct {...} for more modules to load
>>>>  Module: Checking accounting {...} for more modules to load
>>>>  Module: Linked to module rlm_sql
>>>>  Module: Instantiating module "sql" from file
>>>> /usr/local/pf/raddb//sql.conf
>>>>   sql {
>>>>         driver = "rlm_sql_mysql"
>>>>         server = "localhost"
>>>>         port = "3306"
>>>>         login = "pf"
>>>>         password = "XXXXXXXXX:REMOVED"
>>>>         radius_db = "pf"
>>>>         read_groups = yes
>>>>         sqltrace = no
>>>>         sqltracefile = "/usr/local/pf/logs/sqltrace.sql"
>>>>         readclients = yes
>>>>         deletestalesessions = yes
>>>>         num_sql_socks = 5
>>>>         lifetime = 0
>>>>         max_queries = 0
>>>>         sql_user_name = "%{User-Name}"
>>>>         default_user_profile = ""
>>>>         nas_query = "SELECT id, nasname, shortname, type, secret FROM
>>>> radius_nas"
>>>>         authorize_check_query = "SELECT id, username, attribute, value,
>>>> op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id"
>>>>         authorize_reply_query = "SELECT id, username, attribute, value,
>>>> op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id"
>>>>         authorize_group_check_query = "SELECT id, groupname, attribute,
>>>> Value, op FROM radgroupcheck  WHERE groupname = '%{Sql-Group}'ORDER
>>>> BY id"
>>>>         authorize_group_reply_query = "SELECT id, groupname, attribute,
>>>> value, op FROM radgroupreply  WHERE groupname = '%{Sql-Group}'ORDER
>>>> BY id"
>>>>         accounting_onoff_query = "UPDATE radacct SET acctstoptime='%S',
>>>> acctsessiontime =  unix_timestamp('%S') - unix_timestamp(acctstarttime),
>>>> acctterminatecause =  '%{Acct-Terminate-Cause}', acctstopdelay =
>>>> %{%{Acct-Delay-Time}:-0} WHERE acctstoptime IS NULL AND nasipaddress  =
>>>>  '%{NAS-IP-Address}' AND acctstarttime  <= '%S'"
>>>>         accounting_update_query = "CALL acct_update ('%S',
>>>> '%{Acct-Session-Time}','%{%{Acct-Input-Gigawords}:-0}'  << 32 | '%{%{Ac
>>>>                         ct-Input-Octets}:-0}',
>>>> '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Ac
>>>>  ct-Output-Octets}:-0}','%{Acct-Session-Id}', '%{SQL-User-Name}' ,
>>>> '%{NAS-IP-Address}', '%{Framed-IP-Address}', '%{Acct-Status-Type}')"
>>>>         accounting_update_query_alt = "INSERT INTO
>>>> radacct(acctsessionid,    acctuniqueid,      username,
>>>> realm,                                     nasipaddress,      nasportid,
>>>>              nasporttype, acctstarttime,  acctsessiontime,
>>>> acctauthentic,    connectinfo_start, acctinputoctets, acctoutputoctets,
>>>> calledstationid,   callingstationid, servicetype, framedprotocol,
>>>> framedipaddress, acctstartdelay,   xascendsessionsvrkey) VALUES
>>>> ('%{Acct-Session-Id}',
>>>> '%{Acct-Unique-Session-Id}','%{SQL-User-Name}','%{Realm}',
>>>> '%{NAS-IP-Address}', '%{NAS-Port}', '%{NAS-Port-Type}',
>>>> DATE_SUB('%S',INTERVAL (%{%{Acct-Session-Time}:-0} +
>>>> %{%{Acct-Delay-Time}:-0}) SECOND),  '%{Acct-Session-Time}',
>>>> '%{Acct-Authentic}', '',  '%{%{Acct-Input-Gigawords}:-0}' << 32 |
>>>> '%{%{Acct-Input-Octets}:-0}',   '%{%{Acct-Output-Gigawords}:-0}' << 32 |
>>>>  '%{%{Acct-Output-Octets}:-0}',
>>>> REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''),
>>>> REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':',''),
>>>> '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', '0',
>>>> '%{X-Ascend-Session-Svr-Key}')"
>>>>         accounting_start_query = "CALL acct_start
>>>> ('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}',
>>>> '%{SQL-User-Name}',                                      '%{Realm}',
>>>> '%{NAS-IP-Address}', '%{NAS-Port}','%{NAS-Port-Type}', '%S', NULL, '0',
>>>> '%{Acct-Authentic}', '%{Connect-Info}',
>>>>      '', '0', '0',
>>>> REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''),
>>>> REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':',''), '',
>>>> '%{Service-Type}', '%{Framed-Protocol}',
>>>> '%{Framed-IP-Address}','%{%{Acct-Delay-Time}:-0}', '0',
>>>> '%{X-Ascend-Session-Svr-Key}', '%{Acct-Status-Type}')"
>>>>         accounting_start_query_alt = "UPDATE radacct SET acctstarttime
>>>>     = '%S',              acctstartdelay    = '%{%{Acct-Delay-Time
>>>>                    }:-0}',              connectinfo_start =
>>>> '%{Connect-Info}'  WHERE acctsessionid  = '%{Acct-Session-Id}'AND
>>>> username         = '%{SQL-User-Name}' AND nasipaddress  =
>>>> '%{NAS-IP-Address}'"
>>>>         accounting_stop_query = "CALL acct_stop
>>>> ('%S','%{Acct-Session-Time}','%{%{Acct-Input-Gigawords}:-0}' <<
>>>>                  32 | '%{%{Acct-Input-Octets}:-0}',
>>>> '%{%{Acct-Output-Gigawords}:-0}'                          << 32 |
>>>> '%{%{Acct-Output-Octets}:-0}', '%{Acct-Terminate-Cause}',
>>>> '%{%{Acct-Delay-Time}:-0}', '%{Connect-Info}', '%{Acct-Session-Id}',
>>>> '%{SQL-User-Name}', '%{NAS-IP-Address}', '%{Acct-Status-Type}')"
>>>>         accounting_stop_query_alt = "INSERT INTO radacct(acctsessionid,
>>>> acctuniqueid, username, realm, nasipaddress, naspor  tid,  nasporttype,
>>>> acctstarttime, acctstoptime, acctsessiontime, acctauthentic,
>>>> connectinfo_start, connectinfo_stop, acctinputoctets,
>>>> acctoutputoctets,calledstationid, callingstationid, acctterminatecause,
>>>> servicetype, framedprotocol, framedipaddress,       acctstartdelay,
>>>> acctstopdelay)  VALUES  ('%{Acct-Session-Id}',
>>>> '%{Acct-Unique-Session-Id}','%{SQL-User-Name}', '%{Realm}',
>>>> '%{NAS-IP-Address}', '%{NAS-Port}', '%{NAS-Port-Type}', DATE_SUB('%S',
>>>> INTERVAL (%{%{Acct-Session-Time}:-0} +  %{%{Acct-Delay-Time}:-0})
>>>> SECOND), '%S', '%{Acct-Session-Time}', '%{Acct-Authentic}', '',
>>>> '%{Connect-Info}', '%{%{Acct-Input-Gigawords}:-0}' << 32 |
>>>> '%{%{Acct-Input-Octets}:-0}',  '%{%{Acct-Output-Gigawords}:-0}' << 32 |
>>>>  '%{%{Acct-Output-Octets}:-0}',
>>>> REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''),
>>>> REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':', ''),
>>>> '%{Acct-Terminate-Cause}',  '%{Service-Type}', '%{Framed-Protocol}',
>>>> '%{Framed-IP-Address}', '0', '%{%{Acct-Delay-Time}:-0}')"
>>>>         group_membership_query = "SELECT groupname FROM radusergroup
>>>> WHERE username = '%{SQL-User-Name}'           ORDER BY priority"
>>>>         connect_failure_retry_delay = 60
>>>>         simul_count_query = ""
>>>>         simul_verify_query = "SELECT radacctid, acctsessionid,
>>>> username, nasipaddress, nasportid, framedipaddress,  callingstationid,
>>>> framedprotocol  FROM radacct  WHERE username = '%{SQL-User-Name}' AND
>>>> acctstoptime IS NULL"
>>>>         postauth_query = "INSERT INTO radpostauth(username, pass,
>>>> reply, authdate)  VALUES
>>>> ('%{User-Name}','%{%{User-Password}:-%{Chap-Password}}','%{reply:Packet-Type}',
>>>> 
>>>> '%S')"
>>>>         safe-characters =
>>>> "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
>>>>   }
>>>> rlm_sql (sql): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and
>>>> linked
>>>> rlm_sql (sql): Attempting to connect to pf@localhost:3306/pf
>>>> rlm_sql (sql): starting 0
>>>> rlm_sql (sql): Attempting to connect rlm_sql_mysql #0
>>>> rlm_sql_mysql: Starting connect to MySQL server for #0
>>>> rlm_sql (sql): Connected new DB handle, #0
>>>> rlm_sql (sql): starting 1
>>>> rlm_sql (sql): Attempting to connect rlm_sql_mysql #1
>>>> rlm_sql_mysql: Starting connect to MySQL server for #1
>>>> rlm_sql (sql): Connected new DB handle, #1
>>>> rlm_sql (sql): starting 2
>>>> rlm_sql (sql): Attempting to connect rlm_sql_mysql #2
>>>> rlm_sql_mysql: Starting connect to MySQL server for #2
>>>> rlm_sql (sql): Connected new DB handle, #2
>>>> rlm_sql (sql): starting 3
>>>> rlm_sql (sql): Attempting to connect rlm_sql_mysql #3
>>>> rlm_sql_mysql: Starting connect to MySQL server for #3
>>>> rlm_sql (sql): Connected new DB handle, #3
>>>> rlm_sql (sql): starting 4
>>>> rlm_sql (sql): Attempting to connect rlm_sql_mysql #4
>>>> rlm_sql_mysql: Starting connect to MySQL server for #4
>>>> rlm_sql (sql): Connected new DB handle, #4
>>>> rlm_sql (sql): Processing generate_sql_clients
>>>> rlm_sql (sql) in generate_sql_clients: query is SELECT id, nasname,
>>>> shortname, type, secret FROM radius_nas
>>>> rlm_sql (sql): Reserving sql socket id: 4
>>>> rlm_sql (sql): Read entry
>>>> nasname=192.168.69.244,shortname=192.168.69.244,secret=XXXXXXXXX:REMOVED
>>>> rlm_sql (sql): Adding client 192.168.69.244 (192.168.69.244,
>>>> server=<none>) to clients list
>>>> rlm_sql (sql): Read entry
>>>> nasname=192.168.69.246,shortname=192.168.69.246,secret=XXXXXXXXX:REMOVED
>>>> rlm_sql (sql): Adding client 192.168.69.246 (192.168.69.246,
>>>> server=<none>) to clients list
>>>> rlm_sql (sql): Released sql socket id: 4
>>>>  Module: Checking post-proxy {...} for more modules to load
>>>>  Module: Checking post-auth {...} for more modules to load
>>>>  } # modules
>>>> } # server
>>>> server soh-server { # from file
>>>> /usr/local/pf/raddb//sites-enabled/packetfence-soh
>>>>  modules {
>>>>  Module: Checking authorize {...} for more modules to load
>>>>  Module: Instantiating module "packetfence-soh" from file
>>>> /usr/local/pf/raddb//modules/perl
>>>>   perl packetfence-soh {
>>>>         module = "/usr/local/pf/raddb//packetfence-soh.pm"
>>>>         func_authorize = "authorize"
>>>>         func_authenticate = "authenticate"
>>>>         func_accounting = "accounting"
>>>>         func_preacct = "preacct"
>>>>         func_checksimul = "checksimul"
>>>>         func_detach = "detach"
>>>>         func_xlat = "xlat"
>>>>         func_pre_proxy = "pre_proxy"
>>>>         func_post_proxy = "post_proxy"
>>>>         func_post_auth = "post_auth"
>>>>         func_recv_coa = "recv_coa"
>>>>         func_send_coa = "send_coa"
>>>>   }
>>>>  } # modules
>>>> } # server
>>>> server packetfence-tunnel { # from file
>>>> /usr/local/pf/raddb//sites-enabled/packetfence-tunnel
>>>>  modules {
>>>>  Module: Checking authenticate {...} for more modules to load
>>>>  Module: Checking authorize {...} for more modules to load
>>>>  Module: Instantiating module "ntdomain" from file
>>>> /usr/local/pf/raddb//modules/realm
>>>>   realm ntdomain {
>>>>         format = "prefix"
>>>>         delimiter = "\"
>>>>         ignore_default = no
>>>>         ignore_null = no
>>>>   }
>>>>  Module: Checking session {...} for more modules to load
>>>>  Module: Checking post-proxy {...} for more modules to load
>>>>  Module: Checking post-auth {...} for more modules to load
>>>>  } # modules
>>>> } # server
>>>> server inner-tunnel { # from file
>>>> /usr/local/pf/raddb//sites-enabled/inner-tunnel
>>>>  modules {
>>>>  Module: Checking authenticate {...} for more modules to load
>>>>  Module: Checking authorize {...} for more modules to load
>>>>  Module: Checking session {...} for more modules to load
>>>>  Module: Checking post-proxy {...} for more modules to load
>>>>  Module: Checking post-auth {...} for more modules to load
>>>>  } # modules
>>>> } # server
>>>> radiusd: #### Opening IP addresses and Ports ####
>>>> listen {
>>>>         type = "auth"
>>>>         virtual_server = "packetfence"
>>>>         ipaddr = 192.168.69.247
>>>>         port = 0
>>>> }
>>>> listen {
>>>>         type = "acct"
>>>>         virtual_server = "packetfence"
>>>>         ipaddr = 192.168.69.247
>>>>         port = 0
>>>> }
>>>> listen {
>>>>         type = "control"
>>>>  listen {
>>>>         socket = "/usr/local/pf/var/run/radiusd.sock"
>>>>         mode = "rw"
>>>>  }
>>>> }
>>>> listen {
>>>>         type = "auth"
>>>>         ipaddr = 127.0.0.1
>>>>         port = 18120
>>>> }
>>>>  ... adding new socket proxy address * port 56024
>>>> Listening on authentication address 192.168.69.247 port 1812 as server
>>>> packetfence
>>>> Listening on accounting address 192.168.69.247 port 1813 as server
>>>> packetfence
>>>> Listening on command file /usr/local/pf/var/run/radiusd.sock
>>>> Listening on authentication address 127.0.0.1 port 18120 as server
>>>> inner-tunnel
>>>> Listening on proxy address 192.168.69.247 port 1814
>>>> Ready to process requests.
>>>> rad_recv: Access-Request packet from host 192.168.69.244 port 1645,
>>>> id=185, length=173
>>>>         User-Name = "0446655af9d5"
>>>>         User-Password = "0446655af9d5"
>>>>         Called-Station-Id = "00-23-5E-B0-38-00"
>>>>         Calling-Station-Id = "04-46-65-5A-F9-D5"
>>>>         Cisco-AVPair = "ssid=TWGuest"
>>>>         Service-Type = Login-User
>>>>         Cisco-AVPair = "service-type=Login"
>>>>         NAS-Port-Type = Wireless-802.11
>>>>         NAS-Port = 333
>>>>         NAS-Port-Id = "333"
>>>>         NAS-IP-Address = 192.168.69.244
>>>>         NAS-Identifier = "wifi02"
>>>> server packetfence {
>>>> # Executing section authorize from file
>>>> /usr/local/pf/raddb//sites-enabled/packetfence
>>>> +- entering group authorize {...}
>>>> [suffix] No '@' in User-Name = "0446655af9d5", looking up realm NULL
>>>> [suffix] No such realm "NULL"
>>>> ++[suffix] returns noop
>>>> ++[preprocess] returns ok
>>>> [eap] No EAP-Message, not doing EAP
>>>> ++[eap] returns noop
>>>> [files] users: Matched entry DEFAULT at line 1
>>>> ++[files] returns ok
>>>> ++[expiration] returns noop
>>>> ++[logintime] returns noop
>>>> rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
>>>> rlm_perl: Added pair Service-Type = Login-User
>>>> rlm_perl: Added pair Calling-Station-Id = 04-46-65-5A-F9-D5
>>>> rlm_perl: Added pair Called-Station-Id = 00-23-5E-B0-38-00
>>>> rlm_perl: Added pair Cisco-AVPair = ssid=TWGuest
>>>> rlm_perl: Added pair Cisco-AVPair = service-type=Login
>>>> rlm_perl: Added pair User-Name = 0446655af9d5
>>>> rlm_perl: Added pair NAS-Identifier = wifi02
>>>> rlm_perl: Added pair User-Password = 0446655af9d5
>>>> rlm_perl: Added pair NAS-IP-Address = 192.168.69.244
>>>> rlm_perl: Added pair NAS-Port = 333
>>>> rlm_perl: Added pair NAS-Port-Id = 333
>>>> rlm_perl: Added pair Auth-Type = Accept
>>>> ++[packetfence] returns noop
>>>> Found Auth-Type = Accept
>>>> Auth-Type = Accept, accepting the user
>>>> Login OK: [0446655af9d5] (from client 192.168.69.244 port 333 cli
>>>> 04-46-65-5A-F9-D5)
>>>> # Executing section post-auth from file
>>>> /usr/local/pf/raddb//sites-enabled/packetfence
>>>> +- entering group post-auth {...}
>>>> ++[exec] returns noop
>>>> ++? if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25))
>>>> ? Evaluating !(EAP-Type ) -> TRUE
>>>> ?? Skipping (EAP-Type != 21 )
>>>> ?? Skipping (EAP-Type != 25)
>>>> ++? if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25)) -> TRUE
>>>> ++- entering if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25)) {...}
>>>> rlm_perl: Returning vlan 11 to request from 04:46:65:5a:f9:d5 port 333
>>>> rlm_perl: PacketFence RESULT RESPONSE CODE: 2 (2 means OK)
>>>> rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
>>>> rlm_perl: Added pair Service-Type = Login-User
>>>> rlm_perl: Added pair Called-Station-Id = 00-23-5E-B0-38-00
>>>> rlm_perl: Added pair Calling-Station-Id = 04-46-65-5A-F9-D5
>>>> rlm_perl: Added pair Cisco-AVPair = ssid=TWGuest
>>>> rlm_perl: Added pair Cisco-AVPair = service-type=Login
>>>> rlm_perl: Added pair User-Name = 0446655af9d5
>>>> rlm_perl: Added pair NAS-Identifier = wifi02
>>>> rlm_perl: Added pair User-Password = 0446655af9d5
>>>> rlm_perl: Added pair NAS-Port = 333
>>>> rlm_perl: Added pair NAS-IP-Address = 192.168.69.244
>>>> rlm_perl: Added pair NAS-Port-Id = 333
>>>> rlm_perl: Added pair Tunnel-Private-Group-ID = 11
>>>> rlm_perl: Added pair Tunnel-Type = 13
>>>> rlm_perl: Added pair Tunnel-Medium-Type = 6
>>>> rlm_perl: Added pair Auth-Type = Accept
>>>> +++[packetfence] returns ok
>>>> ++- if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25)) returns ok
>>>> } # server packetfence
>>>> Sending Access-Accept of id 185 to 192.168.69.244 port 1645
>>>>         Tunnel-Private-Group-Id:0 = "11"
>>>>         Tunnel-Type:0 = VLAN
>>>>         Tunnel-Medium-Type:0 = IEEE-802
>>>> Finished request 0.
>>>> Going to the next request
>>>> Waking up in 4.9 seconds.
>>>> rad_recv: Access-Request packet from host 192.168.69.244 port 1645,
>>>> id=185, length=173
>>>> Sending duplicate reply to client 192.168.69.244 port 1645 - ID: 185
>>>> Sending Access-Accept of id 185 to 192.168.69.244 port 1645
>>>> Waking up in 4.9 seconds.
>>>> Cleaning up request 0 ID 185 with timestamp +13
>>>> Ready to process requests.
>>>> 
>>>> 
>>>> 
>>>> Em 19-09-2013 14:51, Derek Wuelfrath escreveu:
>>>>> Hello Pedro
>>>>> 
>>>>> Can you edit the /usr/local/pf/lib/SNMP/Cisco/Aironet_WDS.pm file and
>>>>> add the following:
>>>>> 
>>>>> in sub extractSsid, just after the "my $logger … " line (at line 204 if
>>>>> you use latest version of PacketFence), add the following two lines
>>>>> 
>>>>> use Data::Dumper;
>>>>> $logger->info("PACKETFENCE DEBUGGING: " . Dump($radius_request));
>>>>> 
>>>>> Then, restart PacketFence and retry. Paste the relevant log output.
>>>>> 
>>>>> Cheers!
>>>>> dw.
>>>>> 
>>>>> --
>>>>> Derek Wuelfrath
>>>>> dwuelfrath-tiT8nZ+Z9Bqw5LPnMra/[email protected]
>>>>> 
>>>>> <mailto:dwuelfrath-tiT8nZ+Z9Bqw5LPnMra/[email protected]>
>>>>> ::
>>>>> +1.514.447.4918 (x110) :: www.inverse.ca <http://www.inverse.ca/>
>>>>> Inverse inc. :: Leaders behind SOGo (www.sogo.nu <http://www.sogo.nu/>)
>>>>> and PacketFence (www.packetfence.org <http://www.packetfence.org/>)
>>>>> 
>>>>> On 2013-09-17, at 5:33 AM, "Pedro, Tavares"
>>>>> <pltavares-re5jqeeqqe8avxtiumwx3w-xmd5yjdbdmrexy1tmh2...@public.gmane.org
>>>>> 
>>>>> <mailto:pltavares-re5jqeeqqe8avxtiumwx3w-xmd5yjdbdmrexy1tmh2...@public.gmane.org>>
>>>>> wrote:
>>>>> 
>>>>>> Hello all.
>>>>>> Regarding this issue, I've been searching for a while and I did found
>>>>>> others reporting similar issues (same errors in logs) but for some
>>>>>> reason didn't apply to my case.
>>>>>> The environment
>>>>>> PF is in Vlan enforcement mode. Although it's working, I'm aware
>>>>>> that's not the best configuration. I'm still learning :)
>>>>>> Native Vlan = 1
>>>> 
>>>> 
>>>> 
>>>> 
>>>> ------------------------------------------------------------------------------
>>>> 
>>>> LIMITED TIME SALE - Full Year of Microsoft Training For Just $49.99!
>>>> 1,500+ hours of tutorials including VisualStudio 2012, Windows 8,
>>>> SharePoint
>>>> 2013, SQL 2012, MVC 4, more. BEST VALUE: New Multi-Library Power Pack
>>>> includes
>>>> Mobile, Cloud, Java, and UX Design. Lowest price ever! Ends 9/20/13.
>>>> http://pubads.g.doubleclick.net/gampad/clk?id=58041151&iu=/4140/ostg.clktrk
>>>> 
>>>> _______________________________________________
>>>> PacketFence-users mailing list
>>>> packetfence-users-5nwgofrqmnerv+lv9mx5uipxlwaov...@public.gmane.org
>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>> 
>>> ------------------------------------------------------------------------------
>>> 
>>> LIMITED TIME SALE - Full Year of Microsoft Training For Just $49.99!
>>> 1,500+ hours of tutorials including VisualStudio 2012, Windows 8,
>>> SharePoint
>>> 2013, SQL 2012, MVC 4, more. BEST VALUE: New Multi-Library Power Pack
>>> includes
>>> Mobile, Cloud, Java, and UX Design. Lowest price ever! Ends 9/20/13.
>>> http://pubads.g.doubleclick.net/gampad/clk?id=58041151&iu=/4140/ostg.clktrk
>>> 
>>> _______________________________________________
>>> PacketFence-users mailing list
>>> packetfence-users-5nwgofrqmnerv+lv9mx5uipxlwaov...@public.gmane.org
>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>> 
>>> 
>> 
>> 
>> 
>> ------------------------------------------------------------------------------
>> October Webinars: Code for Performance
>> Free Intel webinars can help you accelerate application performance.
>> Explore tips for MPI, OpenMP, advanced profiling, and more. Get the most from
>> the latest Intel processors and coprocessors. See abstracts and register >
>> http://pubads.g.doubleclick.net/gampad/clk?id=60133471&iu=/4140/ostg.clktrk
>> 
>> 
>> 
>> _______________________________________________
>> PacketFence-users mailing list
>> packetfence-users-5nwgofrqmnerv+lv9mx5uipxlwaov...@public.gmane.org
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>> 
> 
> 
> 
> ------------------------------------------------------------------------------
> October Webinars: Code for Performance
> Free Intel webinars can help you accelerate application performance.
> Explore tips for MPI, OpenMP, advanced profiling, and more. Get the most from 
> the latest Intel processors and coprocessors. See abstracts and register >
> http://pubads.g.doubleclick.net/gampad/clk?id=60133471&iu=/4140/ostg.clktrk
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users


------------------------------------------------------------------------------
October Webinars: Code for Performance
Free Intel webinars can help you accelerate application performance.
Explore tips for MPI, OpenMP, advanced profiling, and more. Get the most from 
the latest Intel processors and coprocessors. See abstracts and register >
http://pubads.g.doubleclick.net/gampad/clk?id=60135991&iu=/4140/ostg.clktrk
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to