Ok this is better, so now i think you have a misconfiguration in the WLC.

Check if that is the same on the WLC 
https://github.com/inverse-inc/packetfence/blob/devel/docs/images/SSID_6.png 
(NAC State)

Regards
Fabrice



Le 2014-10-27 12:48, Christopher Mielke a écrit :
> Ok, I believe the switch type was incorrect. I set it to Cisco::WLC_http
> and now receive the following output from RADIUS:
>
> +++[packetfence] = ok
> ++} # if (!EAP-Type || (EAP-Type != EAP-TTLS  && EAP-Type != PEAP)) = ok
> +} # group post-auth = ok
> Sending Access-Accept of id 68 to 172.31.255.20 port 32768
>       Cisco-AVPair += "url-redirect-acl=PreAuth4WebRedirect"
>       Cisco-AVPair += "url-redirect=http://192.168.254.10/cep1cb5c0";
>       User-Name = "a0:88:b4:17:73:a4"
> Finished request 1.
>
> However, when I view the client on the controller the redirect URL is
> applied, but the PreAuth ACL is not. When I open a browser I am not
> redirect to the captive portal. The client is fully connected and free to
> roam the Internet. If I set the switch type in PacketFence back to
> Cisco::WLC_2500 the PreAuth ACL is set, but I never receive the redirect
> URL. I cannot connect to the captive portal or anything else.
>
>
>
> Thanks,
> _______________________________________
> Chris Mielke  |  Lead, ISS Network Systems
> Drake Technology Services (DTS) | Drake University
>   
> T  515.271.4640
> E  [email protected]
>
>
>
>
> On 10/27/14, 11:25 AM, "Christopher Mielke" <[email protected]> wrote:
>
>> Here is the output:
>>
>> rad_recv: Access-Request packet from host 172.31.255.20 port 32768, id=67,
>> length=186
>>      User-Name = "a0:88:b4:17:73:a4"
>>      Called-Station-Id = "00-27-0d-4a-77-b0:DUGuest-Test"
>>      Calling-Station-Id = "a0-88-b4-17-73-a4"
>>      NAS-Port = 1
>>      NAS-IP-Address = 172.31.255.20
>>      NAS-Identifier = "dial2504-wlc-test"
>>      Airespace-Wlan-Id = 4
>>      User-Password = “supersecretpassword"
>>      Service-Type = Call-Check
>>      Framed-MTU = 1300
>>      NAS-Port-Type = Wireless-802.11
>>      Tunnel-Type:0 = VLAN
>>      Tunnel-Medium-Type:0 = IEEE-802
>>      Tunnel-Private-Group-Id:0 = "500"
>> server packetfence {
>> # Executing section authorize from file
>> /usr/local/pf/raddb/sites-enabled/packetfence
>> +group authorize {
>> [suffix] No '@' in User-Name = "a0:88:b4:17:73:a4", looking up realm NULL
>> [suffix] No such realm "NULL"
>> ++[suffix] = noop
>> ++[preprocess] = ok
>> [eap] No EAP-Message, not doing EAP
>> ++[eap] = noop
>> [files] users: Matched entry DEFAULT at line 1
>> ++[files] = ok
>> ++[expiration] = noop
>> ++[logintime] = noop
>> ++update request {
>>      expand: %{Packet-Src-IP-Address} -> 172.31.255.20
>> ++} # update request = noop
>> ++update control {
>> ++} # update control = noop
>> rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
>> rlm_perl: Added pair Service-Type = Call-Check
>> rlm_perl: Added pair Tunnel-Medium-Type = IEEE-802
>> rlm_perl: Added pair Tunnel-Type = VLAN
>> rlm_perl: Added pair Calling-Station-Id = a0-88-b4-17-73-a4
>> rlm_perl: Added pair Called-Station-Id = 00-27-0d-4a-77-b0:DUGuest-Test
>> rlm_perl: Added pair FreeRADIUS-Client-IP-Address = 172.31.255.20
>> rlm_perl: Added pair Airespace-Wlan-Id = 4
>> rlm_perl: Added pair User-Name = a0:88:b4:17:73:a4
>> rlm_perl: Added pair NAS-Identifier = dial2504-wlc-test
>> rlm_perl: Added pair User-Password = p@ck3tf3nc3
>> rlm_perl: Added pair NAS-Port = 1
>> rlm_perl: Added pair NAS-IP-Address = 172.31.255.20
>> rlm_perl: Added pair Tunnel-Private-Group-Id = 500
>> rlm_perl: Added pair Framed-MTU = 1300
>> rlm_perl: Added pair PacketFence-RPC-Pass =
>> rlm_perl: Added pair PacketFence-RPC-Server = 127.0.0.1
>> rlm_perl: Added pair PacketFence-RPC-Proto = http
>> rlm_perl: Added pair PacketFence-RPC-User =
>> rlm_perl: Added pair Auth-Type = Accept
>> rlm_perl: Added pair PacketFence-RPC-Port = 9090
>> ++[packetfence] = noop
>> +} # group authorize = ok
>> Found Auth-Type = Accept
>> Auth-Type = Accept, accepting the user
>> Login OK: [a0:88:b4:17:73:a4] (from client 172.31.255.20 port 1 cli
>> a0-88-b4-17-73-a4)
>> } # server packetfence
>> # Executing section post-auth from file
>> /usr/local/pf/raddb/sites-enabled/packetfence
>> +group post-auth {
>> ++[exec] = noop
>> ++? if (!EAP-Type || (EAP-Type != EAP-TTLS  && EAP-Type != PEAP))
>> ? Evaluating !(EAP-Type ) -> TRUE
>> ?? Skipping (EAP-Type != EAP-TTLS  )
>> ?? Skipping (EAP-Type != PEAP)
>> ++? if (!EAP-Type || (EAP-Type != EAP-TTLS  && EAP-Type != PEAP)) -> TRUE
>> ++if (!EAP-Type || (EAP-Type != EAP-TTLS  && EAP-Type != PEAP)) {
>> +++update control {
>> +++} # update control = noop
>> rlm_perl: request from a0:88:b4:17:73:a4 port 1 was accepted but no VLAN
>> returned. This could be normal. See server logs for details.
>> rlm_perl: PacketFence RESULT RESPONSE CODE: 2 (2 means OK)
>> rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
>> rlm_perl: Added pair Service-Type = Call-Check
>> rlm_perl: Added pair Tunnel-Type = VLAN
>> rlm_perl: Added pair Tunnel-Medium-Type = IEEE-802
>> rlm_perl: Added pair Called-Station-Id = 00-27-0d-4a-77-b0:DUGuest-Test
>> rlm_perl: Added pair Calling-Station-Id = a0-88-b4-17-73-a4
>> rlm_perl: Added pair Airespace-Wlan-Id = 4
>> rlm_perl: Added pair FreeRADIUS-Client-IP-Address = 172.31.255.20
>> rlm_perl: Added pair User-Name = a0:88:b4:17:73:a4
>> rlm_perl: Added pair User-Password = p@ck3tf3nc3
>> rlm_perl: Added pair NAS-Identifier = dial2504-wlc-test
>> rlm_perl: Added pair NAS-IP-Address = 172.31.255.20
>> rlm_perl: Added pair NAS-Port = 1
>> rlm_perl: Added pair Framed-MTU = 1300
>> rlm_perl: Added pair Tunnel-Private-Group-Id = 500
>> rlm_perl: Added pair Airespace-ACL-Name = PreAuth4WebRedirect
>> rlm_perl: Added pair PacketFence-RPC-Pass =
>> rlm_perl: Added pair PacketFence-RPC-Server = 127.0.0.1
>> rlm_perl: Added pair PacketFence-RPC-User =
>> rlm_perl: Added pair PacketFence-RPC-Proto = http
>> rlm_perl: Added pair Auth-Type = Accept
>> rlm_perl: Added pair PacketFence-RPC-Port = 9090
>> +++[packetfence] = ok
>> ++} # if (!EAP-Type || (EAP-Type != EAP-TTLS  && EAP-Type != PEAP)) = ok
>> +} # group post-auth = ok
>> Sending Access-Accept of id 67 to 172.31.255.20 port 32768
>>      Airespace-ACL-Name = "PreAuth4WebRedirect"
>> Finished request 0.
>> Going to the next request
>> Waking up in 4.9 seconds.
>> Cleaning up request 0 ID 67 with timestamp +21
>> Ready to process requests.
>>
>>
>>
>>
>>
>> Thanks,
>> _______________________________________
>> Chris Mielke  |  Lead, ISS Network Systems
>> Drake Technology Services (DTS) | Drake University
>>
>> T  515.271.4640
>> E  [email protected]
>>
>>
>>
>>
>> On 10/23/14, 5:00 PM, "Durand fabrice" <[email protected]> wrote:
>>
>>> Ok so in a perfect world AAA URL redirect should be something like
>>> http://192.168.254.1/cep....
>>>
>>> Can you run freeradius in debug mode:
>>>
>>> pkill radiusd
>>> radiusd -d /usr/local/pf/raddb -X
>>>
>>> and paste what is the debug when you try to connect.
>>>
>>>
>>> Regards
>>> Fabrice
>>>
>>> Le 2014-10-23 15:14, Christopher Mielke a écrit :
>>>> Here is the output:
>>>>
>>>> show client detail a088b41773a4
>>>> Client MAC Address............................... a0:88:b4:17:73:a4
>>>> Client Username ................................. N/A
>>>> AP MAC Address................................... 00:27:0d:4a:77:b0
>>>> AP Name.......................................... dial1142wap-test
>>>> AP radio slot Id................................. 0
>>>> Client State..................................... Associated
>>>> Client NAC OOB State............................. Access
>>>> Wireless LAN Id.................................. 4
>>>> Hotspot (802.11u)................................ Not Supported
>>>> BSSID............................................ 00:27:0d:4a:77:b3
>>>> Connected For ................................... 36 secs
>>>> Channel.......................................... 1
>>>> IP Address....................................... Unknown
>>>> Gateway Address.................................. Unknown
>>>> Netmask.......................................... Unknown
>>>> IPv6 Address.....................................
>>>> fe80::bc0b:5c58:e766:93de
>>>> Association Id................................... 1
>>>> Authentication Algorithm......................... Open System
>>>> Reason Code...................................... 1
>>>> Status Code...................................... 0
>>>> Session Timeout.................................. 1800
>>>> Client CCX version............................... 4
>>>> Client E2E version............................... 1
>>>> QoS Level........................................ Silver
>>>> Avg data Rate.................................... 0
>>>> Burst data Rate.................................. 0
>>>> Avg Real time data Rate.......................... 0
>>>> Burst Real Time data Rate........................ 0
>>>> 802.1P Priority Tag.............................. disabled
>>>> CTS Security Group Tag........................... Not Applicable
>>>> KTS CAC Capability............................... No
>>>> WMM Support...................................... Enabled
>>>>     APSD ACs.......................................  BK  BE  VI  VO
>>>> Power Save....................................... OFF
>>>> Current Rate..................................... 54.0
>>>> Supported Rates..................................
>>>> 12.0,18.0,24.0,36.0,48.0,
>>>>       ............................................. 54.0
>>>> Mobility State................................... Local
>>>> Mobility Move Count.............................. 0
>>>> Security Policy Completed........................ Yes
>>>> Policy Manager State............................. RUN
>>>> Policy Manager Rule Created...................... Yes
>>>> AAA Override ACL Name............................ none
>>>> AAA Override ACL Applied Status.................. Unavailable
>>>> AAA Override Flex ACL Name....................... none
>>>> AAA Override Flex ACL Applied Status............. Unavailable
>>>> AAA URL redirect................................. none
>>>> Audit Session ID.................................
>>>> ac1fff1400000016544952a8
>>>> AAA Role Type.................................... none
>>>> Local Policy Applied............................. none
>>>> IPv4 ACL Name.................................... PreAuth4WebRedirect
>>>> FlexConnect ACL Applied Status................... Unavailable
>>>> IPv4 ACL Applied Status.......................... Yes
>>>> IPv6 ACL Name.................................... none
>>>> IPv6 ACL Applied Status.......................... Unavailable
>>>> Layer2 ACL Name.................................. none
>>>> Layer2 ACL Applied Status........................ Unavailable
>>>> mDNS Status...................................... Enabled
>>>> mDNS Profile Name................................ default-mdns-profile
>>>> No. of mDNS Services Advertised.................. 0
>>>> Policy Type...................................... N/A
>>>> Encryption Cipher................................ None
>>>> Protected Management Frame ...................... No
>>>> Management Frame Protection...................... No
>>>> EAP Type......................................... Unknown
>>>> Interface........................................ guest-wl
>>>> VLAN............................................. 500
>>>> Quarantine VLAN.................................. 0
>>>> Access VLAN...................................... 500
>>>> Client Capabilities:
>>>>         CF Pollable................................ Not implemented
>>>>         CF Poll Request............................ Not implemented
>>>>         Short Preamble............................. Implemented
>>>>         PBCC....................................... Not implemented
>>>>         Channel Agility............................ Not implemented
>>>>         Listen Interval............................ 90
>>>>         Fast BSS Transition........................ Not implemented
>>>> Client Wifi Direct Capabilities:
>>>>         WFD capable................................ No
>>>>         Manged WFD capable......................... No
>>>>         Cross Connection Capable................... No
>>>>         Support Concurrent Operation............... No
>>>> Fast BSS Transition Details:
>>>> Client Statistics:
>>>>         Number of Bytes Received................... 12120
>>>>         Number of Bytes Sent....................... 0
>>>>         Total Number of Bytes Sent................. 0
>>>>         Total Number of Bytes Recv................. 12120
>>>>         Number of Bytes Sent (last 90s)............ 0
>>>>         Number of Bytes Recv (last 90s)............ 12120
>>>>         Number of Packets Received................. 126
>>>>         Number of Packets Sent..................... 0
>>>>         Number of Interim-Update Sent.............. 0
>>>>         Number of EAP Id Request Msg Timeouts...... 0
>>>>         Number of EAP Id Request Msg Failures...... 0
>>>>         Number of EAP Request Msg Timeouts......... 0
>>>>         Number of EAP Request Msg Failures......... 0
>>>>         Number of EAP Key Msg Timeouts............. 0
>>>>         Number of EAP Key Msg Failures............. 0
>>>>         Number of Data Retries..................... 0
>>>>         Number of RTS Retries...................... 0
>>>>         Number of Duplicate Received Packets....... 0
>>>>         Number of Decrypt Failed Packets........... 0
>>>>         Number of Mic Failured Packets............. 0
>>>>         Number of Mic Missing Packets.............. 0
>>>>         Number of RA Packets Dropped............... 0
>>>>         Number of Policy Errors.................... 0
>>>>         Radio Signal Strength Indicator............ -67 dBm
>>>>         Signal to Noise Ratio...................... 25 dB
>>>> Client Rate Limiting Statistics:
>>>>         Number of Data Packets Recieved............ 0
>>>>         Number of Data Rx Packets Dropped.......... 0
>>>>         Number of Data Bytes Recieved.............. 0
>>>>         Number of Data Rx Bytes Dropped............ 0
>>>>         Number of Realtime Packets Recieved........ 0
>>>>         Number of Realtime Rx Packets Dropped...... 0
>>>>         Number of Realtime Bytes Recieved.......... 0
>>>>         Number of Realtime Rx Bytes Dropped........ 0
>>>>         Number of Data Packets Sent................ 0
>>>>         Number of Data Tx Packets Dropped.......... 0
>>>>         Number of Data Bytes Sent.................. 0
>>>>         Number of Data Tx Bytes Dropped............ 0
>>>>         Number of Realtime Packets Sent............ 0
>>>>         Number of Realtime Tx Packets Dropped...... 0
>>>>         Number of Realtime Bytes Sent.............. 0
>>>>         Number of Realtime Tx Bytes Dropped........ 0
>>>> Nearby AP Statistics:
>>>>         dial1142wap-test(slot 0)
>>>>           antenna0: 36 secs ago.................... -64 dBm
>>>>           antenna1: 36 secs ago.................... -66 dBm
>>>>         dial1142wap-test(slot 1)
>>>>           antenna0: 112 secs ago................... -77 dBm
>>>>           antenna1: 112 secs ago................... -77 dBm
>>>> DNS Server details:
>>>>         DNS server IP ............................. 0.0.0.0
>>>>         DNS server IP ............................. 0.0.0.0
>>>> Assisted Roaming Prediction List details:
>>>>
>>>>    Client Dhcp Required:     True
>>>> Allowed (URL)IP Addresses
>>>> -------------------------
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> Thanks,
>>>> _______________________________________
>>>> Chris Mielke  |  Lead, ISS Network Systems
>>>> Drake Technology Services (DTS) | Drake University
>>>>    
>>>> T  515.271.4640
>>>> E  [email protected]
>>>>
>>>>
>>>>
>>>>
>>>> On 10/23/14, 1:57 PM, "Fabrice DURAND" <[email protected]> wrote:
>>>>
>>>>> Strange it doesn´t detect that it´s a wlc redirection.
>>>>> Can you paste a sh client @mac (wlc) ?
>>>>>
>>>>> Regards
>>>>> Fabrice
>>>>>
>>>>> Le 2014-10-23 14:35, Christopher Mielke a écrit :
>>>>>> I didn’t try to ping because of the ACL, but I was able to telnet to
>>>>>> the
>>>>>> server on port 80. When I open a browser it tries to redirect to
>>>>>>
>>>>>>
>>>>>> “https://pf.drake.edu/captive-portal?destination_url=http://192.168.25
>>>>>> 4
>>>>>> .1
>>>>>> 0/
>>>>>> &”, but then it times out.
>>>>>>
>>>>>> Thanks,
>>>>>> _______________________________________
>>>>>> Chris Mielke  |  Lead, ISS Network Systems
>>>>>> Drake Technology Services (DTS) | Drake University
>>>>>>     
>>>>>> T  515.271.4640
>>>>>> E  [email protected]
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>> On 10/23/14, 12:39 PM, "Fabrice DURAND" <[email protected]> wrote:
>>>>>>
>>>>>>> Yes this is correct but are you able to ping the portal ip address ?
>>>>>>> (Also change the acl to allow icmp)
>>>>>>>
>>>>>>> Fabrice
>>>>>>>
>>>>>>> Le 2014-10-23 12:36, Christopher Mielke a écrit :
>>>>>>>> Sorry it took so long to respond. I had to rebuild my test
>>>>>>>> environment.
>>>>>>>> I
>>>>>>>> am able to connect to the SSID and on the wlc I can see the
>>>>>>>> “PreAuth”
>>>>>>>> access-list is being applied. However, when I open a web browser I
>>>>>>>> do
>>>>>>>> not
>>>>>>>> get to the captive portal. I am pointing to production DNS right
>>>>>>>> now.
>>>>>>>> Is
>>>>>>>> that correct?
>>>>>>>>
>>>>>>>> Thanks,
>>>>>>>> _______________________________________
>>>>>>>> Chris Mielke  |  Lead, ISS Network Systems
>>>>>>>> Drake Technology Services (DTS) | Drake University
>>>>>>>>      
>>>>>>>> T  515.271.4640
>>>>>>>> E  [email protected]
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> On 10/15/14, 12:23 PM, "Fabrice DURAND" <[email protected]> wrote:
>>>>>>>>
>>>>>>>>> Hello Christopher,
>>>>>>>>>
>>>>>>>>> it depend of your network configuration, but you can use an alias
>>>>>>>>> (eth0:1) as the ip address of the captive portal.
>>>>>>>>>
>>>>>>>>> But let´s start with a simple config, in packetfence create a
>>>>>>>>> management
>>>>>>>>> interface, registration interface and a isolation interface.
>>>>>>>>>
>>>>>>>>> The registration interface must be able to talk with the wlc and
>>>>>>>>> the
>>>>>>>>> devices connected on and don´t forget to disable dhcp on the reg
>>>>>>>>> interface.
>>>>>>>>> So on the wlc side configure an ACL (Pre-Auth-For-WebRedirect)
>>>>>>>>> that
>>>>>>>>> forward the traffic to the ip address of the registration
>>>>>>>>> interface
>>>>>>>>> and
>>>>>>>>> configure another ACL (Authorize_any) to allow any any and
>>>>>>>>> configure
>>>>>>>>> the
>>>>>>>>> WLC to be the dhcp server for the client.
>>>>>>>>>
>>>>>>>>> Then try to connect on the ssid and check the status of the client
>>>>>>>>> in
>>>>>>>>> the WLC, if all is ok you will be able to see that the ACL applied
>>>>>>>>> to
>>>>>>>>> the client is the Pre-Auth-For-WebRedirect.
>>>>>>>>>
>>>>>>>>> Let me know if it´s ok.
>>>>>>>>>
>>>>>>>>> Regards
>>>>>>>>> Fabrice
>>>>>>>>>
>>>>>>>>> Le 2014-10-14 17:49, Christopher Mielke a écrit :
>>>>>>>>>> I am completely new to PacketFence and trying to set up WebAuth
>>>>>>>>>> for
>>>>>>>>>> a
>>>>>>>>>> guest SSID using a Cisco WLC running 7.6.130.0. I have installed
>>>>>>>>>> PacketFence ZEN 4.4.1 and have it running. I am trying to follow
>>>>>>>>>> the
>>>>>>>>>> instructions for ³Wireless LAN Controller (WLC) Web Auth² from
>>>>>>>>>> the
>>>>>>>>>> network
>>>>>>>>>> configuration guide, but I¹m confused about the captive portal
>>>>>>>>>> configuration. In the guide it says the captive portal is using
>>>>>>>>>> IP
>>>>>>>>>> address
>>>>>>>>>> 172.16.0.250 and the administration (I presume management)
>>>>>>>>>> interface
>>>>>>>>>> uses
>>>>>>>>>> IP address 172.16.0.249. How do I set up a captive portal IP
>>>>>>>>>> address
>>>>>>>>>> in
>>>>>>>>>> the same subnet as the management IP address? I apparently cannot
>>>>>>>>>> use
>>>>>>>>>> the
>>>>>>>>>> management IP for the captive portal because iptables blocks
>>>>>>>>>> HTTP(S)
>>>>>>>>>> traffic to that IP address because it is in the
>>>>>>>>>> ³input-management-if²
>>>>>>>>>> chain.
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> Thanks,
>>>>>>>>>> Chris
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> ------------------------------------------------------------------
>>>>>>>>>> -
>>>>>>>>>> --
>>>>>>>>>> --
>>>>>>>>>> --
>>>>>>>>>> -----
>>>>>>>>>> Comprehensive Server Monitoring with Site24x7.
>>>>>>>>>> Monitor 10 servers for $9/Month.
>>>>>>>>>> Get alerted through email, SMS, voice calls or mobile push
>>>>>>>>>> notifications.
>>>>>>>>>> Take corrective actions from your mobile device.
>>>>>>>>>> http://p.sf.net/sfu/Zoho
>>>>>>>>>> _______________________________________________
>>>>>>>>>> PacketFence-users mailing list
>>>>>>>>>> [email protected]
>>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>>>>> -- 
>>>>>>>>> Fabrice Durand
>>>>>>>>> [email protected] ::  +1.514.447.4918 (x135) ::  www.inverse.ca
>>>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and
>>>>>>>>> PacketFence
>>>>>>>>> (http://packetfence.org)
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> -------------------------------------------------------------------
>>>>>>>>> -
>>>>>>>>> --
>>>>>>>>> --
>>>>>>>>> --
>>>>>>>>> ----
>>>>>>>>> Comprehensive Server Monitoring with Site24x7.
>>>>>>>>> Monitor 10 servers for $9/Month.
>>>>>>>>> Get alerted through email, SMS, voice calls or mobile push
>>>>>>>>> notifications.
>>>>>>>>> Take corrective actions from your mobile device.
>>>>>>>>> http://p.sf.net/sfu/Zoho
>>>>>>>>> _______________________________________________
>>>>>>>>> PacketFence-users mailing list
>>>>>>>>> [email protected]
>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>>>> --------------------------------------------------------------------
>>>>>>>> -
>>>>>>>> --
>>>>>>>> --
>>>>>>>> -----
>>>>>>>> _______________________________________________
>>>>>>>> PacketFence-users mailing list
>>>>>>>> [email protected]
>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>>> -- 
>>>>>>> Fabrice Durand
>>>>>>> [email protected] ::  +1.514.447.4918 (x135) ::  www.inverse.ca
>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and
>>>>>>> PacketFence
>>>>>>> (http://packetfence.org)
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> ---------------------------------------------------------------------
>>>>>>> -
>>>>>>> --
>>>>>>> --
>>>>>>> ----
>>>>>>> _______________________________________________
>>>>>>> PacketFence-users mailing list
>>>>>>> [email protected]
>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>> ----------------------------------------------------------------------
>>>>>> -
>>>>>> --
>>>>>> -----
>>>>>> _______________________________________________
>>>>>> PacketFence-users mailing list
>>>>>> [email protected]
>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>> -- 
>>>>> Fabrice Durand
>>>>> [email protected] ::  +1.514.447.4918 (x135) ::  www.inverse.ca
>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and
>>>>> PacketFence
>>>>> (http://packetfence.org)
>>>>>
>>>>>
>>>>>
>>>>> -----------------------------------------------------------------------
>>>>> -
>>>>> --
>>>>> ----
>>>>> _______________________________________________
>>>>> PacketFence-users mailing list
>>>>> [email protected]
>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>> ------------------------------------------------------------------------
>>>> -
>>>> -----
>>>> _______________________________________________
>>>> PacketFence-users mailing list
>>>> [email protected]
>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>
>>> -------------------------------------------------------------------------
>>> -
>>> ----
>>> _______________________________________________
>>> PacketFence-users mailing list
>>> [email protected]
>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
> ------------------------------------------------------------------------------
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users


-- 
Fabrice Durand
[email protected] ::  +1.514.447.4918 (x135) ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org)


------------------------------------------------------------------------------
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to