Hi Derek,

thanks for the answer.

Here is the output of ifconfig -a just for completion. While the problem
was persisting i had to reinstall the Server since he failed to bring the
interfaces up after a restart.
The Reinstallation fixed it. (And i could also update from 4.0.1 to 4.0.6
^^)



root@Packetfence:/usr/local/pf/logs# ifconfig -a
eth0      Link encap:Ethernet  Hardware Adresse 00:22:68:0d:ae:2a
          inet6-Adresse: fe80::222:68ff:fe0d:ae2a/64
Gültigkeitsbereich:Verbindung
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metrik:1
          RX packets:218701 errors:0 dropped:644 overruns:0 frame:0
          TX packets:2243 errors:0 dropped:0 overruns:0 carrier:0
          Kollisionen:0 Sendewarteschlangenlänge:1000
          RX-Bytes:16888020 (16.8 MB)  TX-Bytes:1543377 (1.5 MB)
          Interrupt:20 Speicher:fc000000-fc020000

eth0.555  Link encap:Ethernet  Hardware Adresse 00:22:68:0d:ae:2a
          inet Adresse:10.55.55.2  Bcast:10.55.55.255  Maske:255.255.255.0
          inet6-Adresse: fe80::222:68ff:fe0d:ae2a/64
Gültigkeitsbereich:Verbindung
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metrik:1
          RX packets:3789 errors:0 dropped:0 overruns:0 frame:0
          TX packets:105 errors:0 dropped:0 overruns:0 carrier:0
          Kollisionen:0 Sendewarteschlangenlänge:0
          RX-Bytes:189450 (189.4 KB)  TX-Bytes:12949 (12.9 KB)

eth0.666  Link encap:Ethernet  Hardware Adresse 00:22:68:0d:ae:2a
          inet Adresse:10.66.66.2  Bcast:10.66.66.255  Maske:255.255.255.0
          inet6-Adresse: fe80::222:68ff:fe0d:ae2a/64
Gültigkeitsbereich:Verbindung
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metrik:1
          RX packets:4461 errors:0 dropped:0 overruns:0 frame:0
          TX packets:519 errors:0 dropped:0 overruns:0 carrier:0
          Kollisionen:0 Sendewarteschlangenlänge:0
          RX-Bytes:287149 (287.1 KB)  TX-Bytes:303485 (303.4 KB)

eth0.777  Link encap:Ethernet  Hardware Adresse 00:22:68:0d:ae:2a
          inet Adresse:10.77.77.2  Bcast:10.77.77.255  Maske:255.255.255.0
          inet6-Adresse: fe80::222:68ff:fe0d:ae2a/64
Gültigkeitsbereich:Verbindung
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metrik:1
          RX packets:10052 errors:0 dropped:0 overruns:0 frame:0
          TX packets:669 errors:0 dropped:0 overruns:0 carrier:0
          Kollisionen:0 Sendewarteschlangenlänge:0
          RX-Bytes:525289 (525.2 KB)  TX-Bytes:1146914 (1.1 MB)

lo        Link encap:Lokale Schleife
          inet Adresse:127.0.0.1  Maske:255.0.0.0
          inet6-Adresse: ::1/128 Gültigkeitsbereich:Maschine
          UP LOOPBACK RUNNING  MTU:16436  Metrik:1
          RX packets:7806 errors:0 dropped:0 overruns:0 frame:0
          TX packets:7806 errors:0 dropped:0 overruns:0 carrier:0
          Kollisionen:0 Sendewarteschlangenlänge:0
          RX-Bytes:14885182 (14.8 MB)  TX-Bytes:14885182 (14.8 MB)



Kind regards,

Patrick Schadewitz

Aprentice Qualified IT-Specialist for Systemintegration
Vocational Training.

---------------------------------------------------------
Sennheiser electronic GmbH & Co. KG
Am Labor 1
30900 Wedemark

(Phone
*email

:
:
:
+49 5130 600 0
[email protected]
www.sennheiser.com

----- Weitergeleitet von Patrick Schadewitz/Wennebostel/DE/Sennheiser am
25.10.2013 07:53 -----

Von:    Patrick Schadewitz/Wennebostel/DE/Sennheiser
An:     [email protected],
Datum:  08.10.2013 09:57
Betreff:        RE: RADIUS not answering to Access Request


Hey Derek,

sorry for the long delay. I was at school and had no access to our
packetfence Server.

Please delete the other case i opened by accident since i forgot to delete
the WG from the other Subject.



Here is the output of iptables -nvL


Chain INPUT (policy DROP 120 packets, 8040 bytes)
 pkts bytes target     prot opt in     out     source destination
 5393 1806K ACCEPT     all  --  lo     *       0.0.0.0/0 0.0.0.0/0
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0 0.0.0.0/0  state
RELATED,ESTABLISHED
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0 0.0.0.0/0
icmptype 8
    0     0 input-internal-vlan-if  all  --  eth0.555 *       0.0.0.0/0  
  10.55.55.2
    0     0 input-internal-vlan-if  all  --  eth0.555 *       0.0.0.0/0  
  255.255.255.255
    0     0 input-internal-vlan-if  all  --  eth0.777 *       0.0.0.0/0  
  10.77.77.2
    0     0 input-internal-vlan-if  all  --  eth0.777 *       0.0.0.0/0  
  255.255.255.255
   30  2010 input-management-if  all  --  eth0.666 *       0.0.0.0/0
0.0.0.0/0

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source destination

Chain OUTPUT (policy ACCEPT 5513 packets, 1815K bytes)
 pkts bytes target     prot opt in     out     source destination

Chain forward-internal-inline-if (0 references)
 pkts bytes target     prot opt in     out     source destination

Chain forward-internal-vlan-if (0 references)
 pkts bytes target     prot opt in     out     source destination

Chain input-highavailability-if (0 references)
 pkts bytes target     prot opt in     out     source destination
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0  state
NEW tcp dpt:22
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:5405
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:5407
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:7788

Chain input-internal-inline-if (0 references)
 pkts bytes target     prot opt in     out     source destination
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:67
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:67
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:53 mark match 0x3
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:53 mark match 0x3
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:53 mark match 0x2
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:53 mark match 0x2
    0     0 DROP       tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:53 mark match 0x1
    0     0 DROP       udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:53 mark match 0x1
    0     0 DROP       tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:80 mark match 0x1
    0     0 DROP       tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:443 mark match 0x1
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:80
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:443

Chain input-internal-vlan-if (4 references)
 pkts bytes target     prot opt in     out     source destination
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:53
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:67
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:67
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:80
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:443

Chain input-management-if (1 references)
 pkts bytes target     prot opt in     out     source destination
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0  state
NEW tcp dpt:22
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:1443
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:9090
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:1812
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:1812
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:1813
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:1813
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:162
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:67
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:67
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:9392
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:8834
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:443


Kind regards,

Patrick Schadewitz

Aprentice Qualified IT-Specialist for Systemintegration
Vocational Training.

---------------------------------------------------------
Sennheiser electronic GmbH & Co. KG
Am Labor 1
30900 Wedemark

(Phone
*email

:
:
:
+49 5130 600 0
[email protected]
www.sennheiser.com
________________________________________________________________________________________

Sennheiser electronic GmbH & Co. KG · Sitz 30900 Wedemark, Amtsgericht Hannover 
HRA 120100
phG: Sennheiser Beteiligungs-GmbH · Sitz 30900 Wedemark, Amtsgericht Hannover 
HRB 120179
Geschäftsführende Gesellschafter Dr. sc. techn. Andreas Sennheiser, Daniel 
Sennheiser · Vorsitzender des Aufsichtsrates Prof. Dr. sc. techn. Jörg 
Sennheiser

Diese E-Mail enthält vertrauliche oder rechtlich geschützte Informationen. Wenn 
Sie nicht der beabsichtigte Empfänger sind, informieren Sie bitte sofort den 
Absender
und löschen Sie diese E-Mail. Das unbefugte Kopieren dieser E-Mail oder die 
unbefugte Weitergabe der enthaltenen Informationen ist nicht gestattet.

The information contained in this message is confidential or protected by law. 
If you are not the intended recipient, please contact the sender
and delete this message. Any unauthorized copying of this message or 
unauthorized distribution of the information contained herein is prohibited.

________________________________________________________________________________________
------------------------------------------------------------------------------
October Webinars: Code for Performance
Free Intel webinars can help you accelerate application performance.
Explore tips for MPI, OpenMP, advanced profiling, and more. Get the most from 
the latest Intel processors and coprocessors. See abstracts and register >
http://pubads.g.doubleclick.net/gampad/clk?id=60135991&iu=/4140/ostg.clktrk
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to