Hi Patrick

> The Reinstallation fixed it. (And i could also update from 4.0.1 to 4.0.6 ^^) 

Glad to hear that !

Cheers!
dw.

--
Derek Wuelfrath
[email protected] :: +1.514.447.4918 (x110) :: www.inverse.ca
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence 
(www.packetfence.org)

On Oct 25, 2013, at 2:00 AM, Patrick Schadewitz 
<[email protected]> wrote:

> Hi Derek, 
> 
> thanks for the answer. 
> 
> Here is the output of ifconfig -a just for completion. While the problem was 
> persisting i had to reinstall the Server since he failed to bring the 
> interfaces up after a restart. 
> The Reinstallation fixed it. (And i could also update from 4.0.1 to 4.0.6 ^^) 
> 
> 
> 
> root@Packetfence:/usr/local/pf/logs# ifconfig -a 
> eth0      Link encap:Ethernet  Hardware Adresse 00:22:68:0d:ae:2a   
>           inet6-Adresse: fe80::222:68ff:fe0d:ae2a/64 
> Gültigkeitsbereich:Verbindung 
>           UP BROADCAST RUNNING MULTICAST  MTU:1500  Metrik:1 
>           RX packets:218701 errors:0 dropped:644 overruns:0 frame:0 
>           TX packets:2243 errors:0 dropped:0 overruns:0 carrier:0 
>           Kollisionen:0 Sendewarteschlangenlänge:1000 
>           RX-Bytes:16888020 (16.8 MB)  TX-Bytes:1543377 (1.5 MB) 
>           Interrupt:20 Speicher:fc000000-fc020000 
> 
> eth0.555  Link encap:Ethernet  Hardware Adresse 00:22:68:0d:ae:2a   
>           inet Adresse:10.55.55.2  Bcast:10.55.55.255  Maske:255.255.255.0 
>           inet6-Adresse: fe80::222:68ff:fe0d:ae2a/64 
> Gültigkeitsbereich:Verbindung 
>           UP BROADCAST RUNNING MULTICAST  MTU:1500  Metrik:1 
>           RX packets:3789 errors:0 dropped:0 overruns:0 frame:0 
>           TX packets:105 errors:0 dropped:0 overruns:0 carrier:0 
>           Kollisionen:0 Sendewarteschlangenlänge:0 
>           RX-Bytes:189450 (189.4 KB)  TX-Bytes:12949 (12.9 KB) 
> 
> eth0.666  Link encap:Ethernet  Hardware Adresse 00:22:68:0d:ae:2a   
>           inet Adresse:10.66.66.2  Bcast:10.66.66.255  Maske:255.255.255.0 
>           inet6-Adresse: fe80::222:68ff:fe0d:ae2a/64 
> Gültigkeitsbereich:Verbindung 
>           UP BROADCAST RUNNING MULTICAST  MTU:1500  Metrik:1 
>           RX packets:4461 errors:0 dropped:0 overruns:0 frame:0 
>           TX packets:519 errors:0 dropped:0 overruns:0 carrier:0 
>           Kollisionen:0 Sendewarteschlangenlänge:0 
>           RX-Bytes:287149 (287.1 KB)  TX-Bytes:303485 (303.4 KB) 
> 
> eth0.777  Link encap:Ethernet  Hardware Adresse 00:22:68:0d:ae:2a   
>           inet Adresse:10.77.77.2  Bcast:10.77.77.255  Maske:255.255.255.0 
>           inet6-Adresse: fe80::222:68ff:fe0d:ae2a/64 
> Gültigkeitsbereich:Verbindung 
>           UP BROADCAST RUNNING MULTICAST  MTU:1500  Metrik:1 
>           RX packets:10052 errors:0 dropped:0 overruns:0 frame:0 
>           TX packets:669 errors:0 dropped:0 overruns:0 carrier:0 
>           Kollisionen:0 Sendewarteschlangenlänge:0 
>           RX-Bytes:525289 (525.2 KB)  TX-Bytes:1146914 (1.1 MB) 
> 
> lo        Link encap:Lokale Schleife   
>           inet Adresse:127.0.0.1  Maske:255.0.0.0 
>           inet6-Adresse: ::1/128 Gültigkeitsbereich:Maschine 
>           UP LOOPBACK RUNNING  MTU:16436  Metrik:1 
>           RX packets:7806 errors:0 dropped:0 overruns:0 frame:0 
>           TX packets:7806 errors:0 dropped:0 overruns:0 carrier:0 
>           Kollisionen:0 Sendewarteschlangenlänge:0 
>           RX-Bytes:14885182 (14.8 MB)  TX-Bytes:14885182 (14.8 MB) 
> 
> 
> 
> Kind regards, 
> 
> Patrick Schadewitz 
> 
> Aprentice Qualified IT-Specialist for Systemintegration 
> Vocational Training. 
> 
> ---------------------------------------------------------
> Sennheiser electronic GmbH & Co. KG
> Am Labor 1
> 30900 Wedemark 
> (Phone 
> *email 
> : 
> : 
> :     +49 5130 600 0 
> [email protected] 
> www.sennheiser.com
> 
> 
> ----- Weitergeleitet von Patrick Schadewitz/Wennebostel/DE/Sennheiser am 
> 25.10.2013 07:53 ----- 
> 
> Von:        Patrick Schadewitz/Wennebostel/DE/Sennheiser 
> An:        [email protected], 
> Datum:        08.10.2013 09:57 
> Betreff:        RE: RADIUS not answering to Access Request 
> 
> 
> Hey Derek, 
> 
> sorry for the long delay. I was at school and had no access to our 
> packetfence Server. 
> 
> Please delete the other case i opened by accident since i forgot to delete 
> the WG from the other Subject. 
> 
> 
> 
> Here is the output of iptables -nvL 
> 
> 
> Chain INPUT (policy DROP 120 packets, 8040 bytes) 
>  pkts bytes target     prot opt in     out     source               
> destination         
>  5393 1806K ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0 
>           
>     0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            state RELATED,ESTABLISHED 
>     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0 
>            icmptype 8 
>     0     0 input-internal-vlan-if  all  --  eth0.555 *       0.0.0.0/0       
>      10.55.55.2           
>     0     0 input-internal-vlan-if  all  --  eth0.555 *       0.0.0.0/0       
>      255.255.255.255     
>     0     0 input-internal-vlan-if  all  --  eth0.777 *       0.0.0.0/0       
>      10.77.77.2           
>     0     0 input-internal-vlan-if  all  --  eth0.777 *       0.0.0.0/0       
>      255.255.255.255     
>    30  2010 input-management-if  all  --  eth0.666 *       0.0.0.0/0          
>   0.0.0.0/0           
> 
> Chain FORWARD (policy DROP 0 packets, 0 bytes) 
>  pkts bytes target     prot opt in     out     source               
> destination         
> 
> Chain OUTPUT (policy ACCEPT 5513 packets, 1815K bytes) 
>  pkts bytes target     prot opt in     out     source               
> destination         
> 
> Chain forward-internal-inline-if (0 references) 
>  pkts bytes target     prot opt in     out     source               
> destination         
> 
> Chain forward-internal-vlan-if (0 references) 
>  pkts bytes target     prot opt in     out     source               
> destination         
> 
> Chain input-highavailability-if (0 references) 
>  pkts bytes target     prot opt in     out     source               
> destination         
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            state NEW tcp dpt:22 
>     0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            udp dpt:5405 
>     0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            udp dpt:5407 
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            tcp dpt:7788 
> 
> Chain input-internal-inline-if (0 references) 
>  pkts bytes target     prot opt in     out     source               
> destination         
>     0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            udp dpt:67 
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            tcp dpt:67 
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            tcp dpt:53 mark match 0x3 
>     0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            udp dpt:53 mark match 0x3 
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            tcp dpt:53 mark match 0x2 
>     0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            udp dpt:53 mark match 0x2 
>     0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            tcp dpt:53 mark match 0x1 
>     0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            udp dpt:53 mark match 0x1 
>     0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            tcp dpt:80 mark match 0x1 
>     0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            tcp dpt:443 mark match 0x1 
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            tcp dpt:80 
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            tcp dpt:443 
> 
> Chain input-internal-vlan-if (4 references) 
>  pkts bytes target     prot opt in     out     source               
> destination         
>     0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            udp dpt:53 
>     0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            udp dpt:67 
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            tcp dpt:67 
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            tcp dpt:80 
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            tcp dpt:443 
> 
> Chain input-management-if (1 references) 
>  pkts bytes target     prot opt in     out     source               
> destination         
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            state NEW tcp dpt:22 
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            tcp dpt:1443 
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            tcp dpt:9090 
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            tcp dpt:1812 
>     0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            udp dpt:1812 
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            tcp dpt:1813 
>     0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            udp dpt:1813 
>     0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            udp dpt:162 
>     0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            udp dpt:67 
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            tcp dpt:67 
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            tcp dpt:9392 
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            tcp dpt:8834 
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0 
>            tcp dpt:443 
> 
> 
> Kind regards, 
> 
> Patrick Schadewitz 
> 
> Aprentice Qualified IT-Specialist for Systemintegration 
> Vocational Training. 
> 
> ---------------------------------------------------------
> Sennheiser electronic GmbH & Co. KG
> Am Labor 1
> 30900 Wedemark 
> (Phone 
> *email 
> : 
> : 
> :     +49 5130 600 0 
> [email protected] 
> www.sennheiser.com
> 
> Sennheiser electronic GmbH & Co. KG · Sitz 30900 Wedemark, Amtsgericht 
> Hannover HRA 120100
> phG: Sennheiser Beteiligungs-GmbH · Sitz 30900 Wedemark, Amtsgericht Hannover 
> HRB 120179
> Geschäftsführende Gesellschafter Dr. sc. techn. Andreas Sennheiser, Daniel 
> Sennheiser · Vorsitzender des Aufsichtsrates Prof. Dr. sc. techn. Jörg 
> Sennheiser
> 
> Diese E-Mail enthält vertrauliche oder rechtlich geschützte Informationen. 
> Wenn Sie nicht der beabsichtigte Empfänger sind, informieren Sie bitte sofort 
> den Absender
> und löschen Sie diese E-Mail. Das unbefugte Kopieren dieser E-Mail oder die 
> unbefugte Weitergabe der enthaltenen Informationen ist nicht gestattet.
> 
> The information contained in this message is confidential or protected by 
> law. If you are not the intended recipient, please contact the sender
> and delete this message. Any unauthorized copying of this message or 
> unauthorized distribution of the information contained herein is prohibited.
>  
> 
> ------------------------------------------------------------------------------
> October Webinars: Code for Performance
> Free Intel webinars can help you accelerate application performance.
> Explore tips for MPI, OpenMP, advanced profiling, and more. Get the most from 
> the latest Intel processors and coprocessors. See abstracts and register >
> http://pubads.g.doubleclick.net/gampad/clk?id=60135991&iu=/4140/ostg.clktrk_______________________________________________
> PacketFence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users

------------------------------------------------------------------------------
October Webinars: Code for Performance
Free Intel webinars can help you accelerate application performance.
Explore tips for MPI, OpenMP, advanced profiling, and more. Get the most from 
the latest Intel processors and coprocessors. See abstracts and register >
http://pubads.g.doubleclick.net/gampad/clk?id=60135991&iu=/4140/ostg.clktrk
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to