It is working now. I had neglected to set the “NAC State” option to “RADIUS NAC”.
I do have an unrelated question. We do not allow any outbound SMTP that is not routed through an SMTP relay we have on campus. How can I configure PacketFence to relay all mail through this gateway? Let me know if you would prefer I open a different thread. Thanks, _______________________________________ Chris Mielke | Lead, ISS Network Systems Drake Technology Services (DTS) | Drake University T 515.271.4640 E [email protected] On 10/27/14, 12:41 PM, "Fabrice DURAND" <[email protected]> wrote: >Ok this is better, so now i think you have a misconfiguration in the WLC. > >Check if that is the same on the WLC >https://github.com/inverse-inc/packetfence/blob/devel/docs/images/SSID_6.p >ng >(NAC State) > >Regards >Fabrice > > > >Le 2014-10-27 12:48, Christopher Mielke a écrit : >> Ok, I believe the switch type was incorrect. I set it to Cisco::WLC_http >> and now receive the following output from RADIUS: >> >> +++[packetfence] = ok >> ++} # if (!EAP-Type || (EAP-Type != EAP-TTLS && EAP-Type != PEAP)) = ok >> +} # group post-auth = ok >> Sending Access-Accept of id 68 to 172.31.255.20 port 32768 >> Cisco-AVPair += "url-redirect-acl=PreAuth4WebRedirect" >> Cisco-AVPair += "url-redirect=http://192.168.254.10/cep1cb5c0" >> User-Name = "a0:88:b4:17:73:a4" >> Finished request 1. >> >> However, when I view the client on the controller the redirect URL is >> applied, but the PreAuth ACL is not. When I open a browser I am not >> redirect to the captive portal. The client is fully connected and free >>to >> roam the Internet. If I set the switch type in PacketFence back to >> Cisco::WLC_2500 the PreAuth ACL is set, but I never receive the redirect >> URL. I cannot connect to the captive portal or anything else. >> >> >> >> Thanks, >> _______________________________________ >> Chris Mielke | Lead, ISS Network Systems >> Drake Technology Services (DTS) | Drake University >> >> T 515.271.4640 >> E [email protected] >> >> >> >> >> On 10/27/14, 11:25 AM, "Christopher Mielke" <[email protected]> >>wrote: >> >>> Here is the output: >>> >>> rad_recv: Access-Request packet from host 172.31.255.20 port 32768, >>>id=67, >>> length=186 >>> User-Name = "a0:88:b4:17:73:a4" >>> Called-Station-Id = "00-27-0d-4a-77-b0:DUGuest-Test" >>> Calling-Station-Id = "a0-88-b4-17-73-a4" >>> NAS-Port = 1 >>> NAS-IP-Address = 172.31.255.20 >>> NAS-Identifier = "dial2504-wlc-test" >>> Airespace-Wlan-Id = 4 >>> User-Password = “supersecretpassword" >>> Service-Type = Call-Check >>> Framed-MTU = 1300 >>> NAS-Port-Type = Wireless-802.11 >>> Tunnel-Type:0 = VLAN >>> Tunnel-Medium-Type:0 = IEEE-802 >>> Tunnel-Private-Group-Id:0 = "500" >>> server packetfence { >>> # Executing section authorize from file >>> /usr/local/pf/raddb/sites-enabled/packetfence >>> +group authorize { >>> [suffix] No '@' in User-Name = "a0:88:b4:17:73:a4", looking up realm >>>NULL >>> [suffix] No such realm "NULL" >>> ++[suffix] = noop >>> ++[preprocess] = ok >>> [eap] No EAP-Message, not doing EAP >>> ++[eap] = noop >>> [files] users: Matched entry DEFAULT at line 1 >>> ++[files] = ok >>> ++[expiration] = noop >>> ++[logintime] = noop >>> ++update request { >>> expand: %{Packet-Src-IP-Address} -> 172.31.255.20 >>> ++} # update request = noop >>> ++update control { >>> ++} # update control = noop >>> rlm_perl: Added pair NAS-Port-Type = Wireless-802.11 >>> rlm_perl: Added pair Service-Type = Call-Check >>> rlm_perl: Added pair Tunnel-Medium-Type = IEEE-802 >>> rlm_perl: Added pair Tunnel-Type = VLAN >>> rlm_perl: Added pair Calling-Station-Id = a0-88-b4-17-73-a4 >>> rlm_perl: Added pair Called-Station-Id = 00-27-0d-4a-77-b0:DUGuest-Test >>> rlm_perl: Added pair FreeRADIUS-Client-IP-Address = 172.31.255.20 >>> rlm_perl: Added pair Airespace-Wlan-Id = 4 >>> rlm_perl: Added pair User-Name = a0:88:b4:17:73:a4 >>> rlm_perl: Added pair NAS-Identifier = dial2504-wlc-test >>> rlm_perl: Added pair User-Password = p@ck3tf3nc3 >>> rlm_perl: Added pair NAS-Port = 1 >>> rlm_perl: Added pair NAS-IP-Address = 172.31.255.20 >>> rlm_perl: Added pair Tunnel-Private-Group-Id = 500 >>> rlm_perl: Added pair Framed-MTU = 1300 >>> rlm_perl: Added pair PacketFence-RPC-Pass = >>> rlm_perl: Added pair PacketFence-RPC-Server = 127.0.0.1 >>> rlm_perl: Added pair PacketFence-RPC-Proto = http >>> rlm_perl: Added pair PacketFence-RPC-User = >>> rlm_perl: Added pair Auth-Type = Accept >>> rlm_perl: Added pair PacketFence-RPC-Port = 9090 >>> ++[packetfence] = noop >>> +} # group authorize = ok >>> Found Auth-Type = Accept >>> Auth-Type = Accept, accepting the user >>> Login OK: [a0:88:b4:17:73:a4] (from client 172.31.255.20 port 1 cli >>> a0-88-b4-17-73-a4) >>> } # server packetfence >>> # Executing section post-auth from file >>> /usr/local/pf/raddb/sites-enabled/packetfence >>> +group post-auth { >>> ++[exec] = noop >>> ++? if (!EAP-Type || (EAP-Type != EAP-TTLS && EAP-Type != PEAP)) >>> ? Evaluating !(EAP-Type ) -> TRUE >>> ?? Skipping (EAP-Type != EAP-TTLS ) >>> ?? Skipping (EAP-Type != PEAP) >>> ++? if (!EAP-Type || (EAP-Type != EAP-TTLS && EAP-Type != PEAP)) -> >>>TRUE >>> ++if (!EAP-Type || (EAP-Type != EAP-TTLS && EAP-Type != PEAP)) { >>> +++update control { >>> +++} # update control = noop >>> rlm_perl: request from a0:88:b4:17:73:a4 port 1 was accepted but no >>>VLAN >>> returned. This could be normal. See server logs for details. >>> rlm_perl: PacketFence RESULT RESPONSE CODE: 2 (2 means OK) >>> rlm_perl: Added pair NAS-Port-Type = Wireless-802.11 >>> rlm_perl: Added pair Service-Type = Call-Check >>> rlm_perl: Added pair Tunnel-Type = VLAN >>> rlm_perl: Added pair Tunnel-Medium-Type = IEEE-802 >>> rlm_perl: Added pair Called-Station-Id = 00-27-0d-4a-77-b0:DUGuest-Test >>> rlm_perl: Added pair Calling-Station-Id = a0-88-b4-17-73-a4 >>> rlm_perl: Added pair Airespace-Wlan-Id = 4 >>> rlm_perl: Added pair FreeRADIUS-Client-IP-Address = 172.31.255.20 >>> rlm_perl: Added pair User-Name = a0:88:b4:17:73:a4 >>> rlm_perl: Added pair User-Password = p@ck3tf3nc3 >>> rlm_perl: Added pair NAS-Identifier = dial2504-wlc-test >>> rlm_perl: Added pair NAS-IP-Address = 172.31.255.20 >>> rlm_perl: Added pair NAS-Port = 1 >>> rlm_perl: Added pair Framed-MTU = 1300 >>> rlm_perl: Added pair Tunnel-Private-Group-Id = 500 >>> rlm_perl: Added pair Airespace-ACL-Name = PreAuth4WebRedirect >>> rlm_perl: Added pair PacketFence-RPC-Pass = >>> rlm_perl: Added pair PacketFence-RPC-Server = 127.0.0.1 >>> rlm_perl: Added pair PacketFence-RPC-User = >>> rlm_perl: Added pair PacketFence-RPC-Proto = http >>> rlm_perl: Added pair Auth-Type = Accept >>> rlm_perl: Added pair PacketFence-RPC-Port = 9090 >>> +++[packetfence] = ok >>> ++} # if (!EAP-Type || (EAP-Type != EAP-TTLS && EAP-Type != PEAP)) = >>>ok >>> +} # group post-auth = ok >>> Sending Access-Accept of id 67 to 172.31.255.20 port 32768 >>> Airespace-ACL-Name = "PreAuth4WebRedirect" >>> Finished request 0. >>> Going to the next request >>> Waking up in 4.9 seconds. >>> Cleaning up request 0 ID 67 with timestamp +21 >>> Ready to process requests. >>> >>> >>> >>> >>> >>> Thanks, >>> _______________________________________ >>> Chris Mielke | Lead, ISS Network Systems >>> Drake Technology Services (DTS) | Drake University >>> >>> T 515.271.4640 >>> E [email protected] >>> >>> >>> >>> >>> On 10/23/14, 5:00 PM, "Durand fabrice" <[email protected]> wrote: >>> >>>> Ok so in a perfect world AAA URL redirect should be something like >>>> http://192.168.254.1/cep.... >>>> >>>> Can you run freeradius in debug mode: >>>> >>>> pkill radiusd >>>> radiusd -d /usr/local/pf/raddb -X >>>> >>>> and paste what is the debug when you try to connect. >>>> >>>> >>>> Regards >>>> Fabrice >>>> >>>> Le 2014-10-23 15:14, Christopher Mielke a écrit : >>>>> Here is the output: >>>>> >>>>> show client detail a088b41773a4 >>>>> Client MAC Address............................... a0:88:b4:17:73:a4 >>>>> Client Username ................................. N/A >>>>> AP MAC Address................................... 00:27:0d:4a:77:b0 >>>>> AP Name.......................................... dial1142wap-test >>>>> AP radio slot Id................................. 0 >>>>> Client State..................................... Associated >>>>> Client NAC OOB State............................. Access >>>>> Wireless LAN Id.................................. 4 >>>>> Hotspot (802.11u)................................ Not Supported >>>>> BSSID............................................ 00:27:0d:4a:77:b3 >>>>> Connected For ................................... 36 secs >>>>> Channel.......................................... 1 >>>>> IP Address....................................... Unknown >>>>> Gateway Address.................................. Unknown >>>>> Netmask.......................................... Unknown >>>>> IPv6 Address..................................... >>>>> fe80::bc0b:5c58:e766:93de >>>>> Association Id................................... 1 >>>>> Authentication Algorithm......................... Open System >>>>> Reason Code...................................... 1 >>>>> Status Code...................................... 0 >>>>> Session Timeout.................................. 1800 >>>>> Client CCX version............................... 4 >>>>> Client E2E version............................... 1 >>>>> QoS Level........................................ Silver >>>>> Avg data Rate.................................... 0 >>>>> Burst data Rate.................................. 0 >>>>> Avg Real time data Rate.......................... 0 >>>>> Burst Real Time data Rate........................ 0 >>>>> 802.1P Priority Tag.............................. disabled >>>>> CTS Security Group Tag........................... Not Applicable >>>>> KTS CAC Capability............................... No >>>>> WMM Support...................................... Enabled >>>>> APSD ACs....................................... BK BE VI VO >>>>> Power Save....................................... OFF >>>>> Current Rate..................................... 54.0 >>>>> Supported Rates.................................. >>>>> 12.0,18.0,24.0,36.0,48.0, >>>>> ............................................. 54.0 >>>>> Mobility State................................... Local >>>>> Mobility Move Count.............................. 0 >>>>> Security Policy Completed........................ Yes >>>>> Policy Manager State............................. RUN >>>>> Policy Manager Rule Created...................... Yes >>>>> AAA Override ACL Name............................ none >>>>> AAA Override ACL Applied Status.................. Unavailable >>>>> AAA Override Flex ACL Name....................... none >>>>> AAA Override Flex ACL Applied Status............. Unavailable >>>>> AAA URL redirect................................. none >>>>> Audit Session ID................................. >>>>> ac1fff1400000016544952a8 >>>>> AAA Role Type.................................... none >>>>> Local Policy Applied............................. none >>>>> IPv4 ACL Name.................................... PreAuth4WebRedirect >>>>> FlexConnect ACL Applied Status................... Unavailable >>>>> IPv4 ACL Applied Status.......................... Yes >>>>> IPv6 ACL Name.................................... none >>>>> IPv6 ACL Applied Status.......................... Unavailable >>>>> Layer2 ACL Name.................................. none >>>>> Layer2 ACL Applied Status........................ Unavailable >>>>> mDNS Status...................................... Enabled >>>>> mDNS Profile Name................................ >>>>>default-mdns-profile >>>>> No. of mDNS Services Advertised.................. 0 >>>>> Policy Type...................................... N/A >>>>> Encryption Cipher................................ None >>>>> Protected Management Frame ...................... No >>>>> Management Frame Protection...................... No >>>>> EAP Type......................................... Unknown >>>>> Interface........................................ guest-wl >>>>> VLAN............................................. 500 >>>>> Quarantine VLAN.................................. 0 >>>>> Access VLAN...................................... 500 >>>>> Client Capabilities: >>>>> CF Pollable................................ Not implemented >>>>> CF Poll Request............................ Not implemented >>>>> Short Preamble............................. Implemented >>>>> PBCC....................................... Not implemented >>>>> Channel Agility............................ Not implemented >>>>> Listen Interval............................ 90 >>>>> Fast BSS Transition........................ Not implemented >>>>> Client Wifi Direct Capabilities: >>>>> WFD capable................................ No >>>>> Manged WFD capable......................... No >>>>> Cross Connection Capable................... No >>>>> Support Concurrent Operation............... No >>>>> Fast BSS Transition Details: >>>>> Client Statistics: >>>>> Number of Bytes Received................... 12120 >>>>> Number of Bytes Sent....................... 0 >>>>> Total Number of Bytes Sent................. 0 >>>>> Total Number of Bytes Recv................. 12120 >>>>> Number of Bytes Sent (last 90s)............ 0 >>>>> Number of Bytes Recv (last 90s)............ 12120 >>>>> Number of Packets Received................. 126 >>>>> Number of Packets Sent..................... 0 >>>>> Number of Interim-Update Sent.............. 0 >>>>> Number of EAP Id Request Msg Timeouts...... 0 >>>>> Number of EAP Id Request Msg Failures...... 0 >>>>> Number of EAP Request Msg Timeouts......... 0 >>>>> Number of EAP Request Msg Failures......... 0 >>>>> Number of EAP Key Msg Timeouts............. 0 >>>>> Number of EAP Key Msg Failures............. 0 >>>>> Number of Data Retries..................... 0 >>>>> Number of RTS Retries...................... 0 >>>>> Number of Duplicate Received Packets....... 0 >>>>> Number of Decrypt Failed Packets........... 0 >>>>> Number of Mic Failured Packets............. 0 >>>>> Number of Mic Missing Packets.............. 0 >>>>> Number of RA Packets Dropped............... 0 >>>>> Number of Policy Errors.................... 0 >>>>> Radio Signal Strength Indicator............ -67 dBm >>>>> Signal to Noise Ratio...................... 25 dB >>>>> Client Rate Limiting Statistics: >>>>> Number of Data Packets Recieved............ 0 >>>>> Number of Data Rx Packets Dropped.......... 0 >>>>> Number of Data Bytes Recieved.............. 0 >>>>> Number of Data Rx Bytes Dropped............ 0 >>>>> Number of Realtime Packets Recieved........ 0 >>>>> Number of Realtime Rx Packets Dropped...... 0 >>>>> Number of Realtime Bytes Recieved.......... 0 >>>>> Number of Realtime Rx Bytes Dropped........ 0 >>>>> Number of Data Packets Sent................ 0 >>>>> Number of Data Tx Packets Dropped.......... 0 >>>>> Number of Data Bytes Sent.................. 0 >>>>> Number of Data Tx Bytes Dropped............ 0 >>>>> Number of Realtime Packets Sent............ 0 >>>>> Number of Realtime Tx Packets Dropped...... 0 >>>>> Number of Realtime Bytes Sent.............. 0 >>>>> Number of Realtime Tx Bytes Dropped........ 0 >>>>> Nearby AP Statistics: >>>>> dial1142wap-test(slot 0) >>>>> antenna0: 36 secs ago.................... -64 dBm >>>>> antenna1: 36 secs ago.................... -66 dBm >>>>> dial1142wap-test(slot 1) >>>>> antenna0: 112 secs ago................... -77 dBm >>>>> antenna1: 112 secs ago................... -77 dBm >>>>> DNS Server details: >>>>> DNS server IP ............................. 0.0.0.0 >>>>> DNS server IP ............................. 0.0.0.0 >>>>> Assisted Roaming Prediction List details: >>>>> >>>>> Client Dhcp Required: True >>>>> Allowed (URL)IP Addresses >>>>> ------------------------- >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> Thanks, >>>>> _______________________________________ >>>>> Chris Mielke | Lead, ISS Network Systems >>>>> Drake Technology Services (DTS) | Drake University >>>>> >>>>> T 515.271.4640 >>>>> E [email protected] >>>>> >>>>> >>>>> >>>>> >>>>> On 10/23/14, 1:57 PM, "Fabrice DURAND" <[email protected]> wrote: >>>>> >>>>>> Strange it doesn´t detect that it´s a wlc redirection. >>>>>> Can you paste a sh client @mac (wlc) ? >>>>>> >>>>>> Regards >>>>>> Fabrice >>>>>> >>>>>> Le 2014-10-23 14:35, Christopher Mielke a écrit : >>>>>>> I didn’t try to ping because of the ACL, but I was able to telnet >>>>>>>to >>>>>>> the >>>>>>> server on port 80. When I open a browser it tries to redirect to >>>>>>> >>>>>>> >>>>>>> >>>>>>>“https://pf.drake.edu/captive-portal?destination_url=http://192.168. >>>>>>>25 >>>>>>> 4 >>>>>>> .1 >>>>>>> 0/ >>>>>>> &”, but then it times out. >>>>>>> >>>>>>> Thanks, >>>>>>> _______________________________________ >>>>>>> Chris Mielke | Lead, ISS Network Systems >>>>>>> Drake Technology Services (DTS) | Drake University >>>>>>> >>>>>>> T 515.271.4640 >>>>>>> E [email protected] >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> On 10/23/14, 12:39 PM, "Fabrice DURAND" <[email protected]> wrote: >>>>>>> >>>>>>>> Yes this is correct but are you able to ping the portal ip >>>>>>>>address ? >>>>>>>> (Also change the acl to allow icmp) >>>>>>>> >>>>>>>> Fabrice >>>>>>>> >>>>>>>> Le 2014-10-23 12:36, Christopher Mielke a écrit : >>>>>>>>> Sorry it took so long to respond. I had to rebuild my test >>>>>>>>> environment. >>>>>>>>> I >>>>>>>>> am able to connect to the SSID and on the wlc I can see the >>>>>>>>> “PreAuth” >>>>>>>>> access-list is being applied. However, when I open a web browser >>>>>>>>>I >>>>>>>>> do >>>>>>>>> not >>>>>>>>> get to the captive portal. I am pointing to production DNS right >>>>>>>>> now. >>>>>>>>> Is >>>>>>>>> that correct? >>>>>>>>> >>>>>>>>> Thanks, >>>>>>>>> _______________________________________ >>>>>>>>> Chris Mielke | Lead, ISS Network Systems >>>>>>>>> Drake Technology Services (DTS) | Drake University >>>>>>>>> >>>>>>>>> T 515.271.4640 >>>>>>>>> E [email protected] >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> On 10/15/14, 12:23 PM, "Fabrice DURAND" <[email protected]> >>>>>>>>>wrote: >>>>>>>>> >>>>>>>>>> Hello Christopher, >>>>>>>>>> >>>>>>>>>> it depend of your network configuration, but you can use an >>>>>>>>>>alias >>>>>>>>>> (eth0:1) as the ip address of the captive portal. >>>>>>>>>> >>>>>>>>>> But let´s start with a simple config, in packetfence create a >>>>>>>>>> management >>>>>>>>>> interface, registration interface and a isolation interface. >>>>>>>>>> >>>>>>>>>> The registration interface must be able to talk with the wlc and >>>>>>>>>> the >>>>>>>>>> devices connected on and don´t forget to disable dhcp on the reg >>>>>>>>>> interface. >>>>>>>>>> So on the wlc side configure an ACL (Pre-Auth-For-WebRedirect) >>>>>>>>>> that >>>>>>>>>> forward the traffic to the ip address of the registration >>>>>>>>>> interface >>>>>>>>>> and >>>>>>>>>> configure another ACL (Authorize_any) to allow any any and >>>>>>>>>> configure >>>>>>>>>> the >>>>>>>>>> WLC to be the dhcp server for the client. >>>>>>>>>> >>>>>>>>>> Then try to connect on the ssid and check the status of the >>>>>>>>>>client >>>>>>>>>> in >>>>>>>>>> the WLC, if all is ok you will be able to see that the ACL >>>>>>>>>>applied >>>>>>>>>> to >>>>>>>>>> the client is the Pre-Auth-For-WebRedirect. >>>>>>>>>> >>>>>>>>>> Let me know if it´s ok. >>>>>>>>>> >>>>>>>>>> Regards >>>>>>>>>> Fabrice >>>>>>>>>> >>>>>>>>>> Le 2014-10-14 17:49, Christopher Mielke a écrit : >>>>>>>>>>> I am completely new to PacketFence and trying to set up WebAuth >>>>>>>>>>> for >>>>>>>>>>> a >>>>>>>>>>> guest SSID using a Cisco WLC running 7.6.130.0. I have >>>>>>>>>>>installed >>>>>>>>>>> PacketFence ZEN 4.4.1 and have it running. I am trying to >>>>>>>>>>>follow >>>>>>>>>>> the >>>>>>>>>>> instructions for ³Wireless LAN Controller (WLC) Web Auth² from >>>>>>>>>>> the >>>>>>>>>>> network >>>>>>>>>>> configuration guide, but I¹m confused about the captive portal >>>>>>>>>>> configuration. In the guide it says the captive portal is using >>>>>>>>>>> IP >>>>>>>>>>> address >>>>>>>>>>> 172.16.0.250 and the administration (I presume management) >>>>>>>>>>> interface >>>>>>>>>>> uses >>>>>>>>>>> IP address 172.16.0.249. How do I set up a captive portal IP >>>>>>>>>>> address >>>>>>>>>>> in >>>>>>>>>>> the same subnet as the management IP address? I apparently >>>>>>>>>>>cannot >>>>>>>>>>> use >>>>>>>>>>> the >>>>>>>>>>> management IP for the captive portal because iptables blocks >>>>>>>>>>> HTTP(S) >>>>>>>>>>> traffic to that IP address because it is in the >>>>>>>>>>> ³input-management-if² >>>>>>>>>>> chain. >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> Thanks, >>>>>>>>>>> Chris >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>>---------------------------------------------------------------- >>>>>>>>>>>-- >>>>>>>>>>> - >>>>>>>>>>> -- >>>>>>>>>>> -- >>>>>>>>>>> -- >>>>>>>>>>> ----- >>>>>>>>>>> Comprehensive Server Monitoring with Site24x7. >>>>>>>>>>> Monitor 10 servers for $9/Month. >>>>>>>>>>> Get alerted through email, SMS, voice calls or mobile push >>>>>>>>>>> notifications. >>>>>>>>>>> Take corrective actions from your mobile device. >>>>>>>>>>> http://p.sf.net/sfu/Zoho >>>>>>>>>>> _______________________________________________ >>>>>>>>>>> PacketFence-users mailing list >>>>>>>>>>> [email protected] >>>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>>>>> -- >>>>>>>>>> Fabrice Durand >>>>>>>>>> [email protected] :: +1.514.447.4918 (x135) :: www.inverse.ca >>>>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and >>>>>>>>>> PacketFence >>>>>>>>>> (http://packetfence.org) >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>>----------------------------------------------------------------- >>>>>>>>>>-- >>>>>>>>>> - >>>>>>>>>> -- >>>>>>>>>> -- >>>>>>>>>> -- >>>>>>>>>> ---- >>>>>>>>>> Comprehensive Server Monitoring with Site24x7. >>>>>>>>>> Monitor 10 servers for $9/Month. >>>>>>>>>> Get alerted through email, SMS, voice calls or mobile push >>>>>>>>>> notifications. >>>>>>>>>> Take corrective actions from your mobile device. >>>>>>>>>> http://p.sf.net/sfu/Zoho >>>>>>>>>> _______________________________________________ >>>>>>>>>> PacketFence-users mailing list >>>>>>>>>> [email protected] >>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>>>> >>>>>>>>>------------------------------------------------------------------ >>>>>>>>>-- >>>>>>>>> - >>>>>>>>> -- >>>>>>>>> -- >>>>>>>>> ----- >>>>>>>>> _______________________________________________ >>>>>>>>> PacketFence-users mailing list >>>>>>>>> [email protected] >>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>>> -- >>>>>>>> Fabrice Durand >>>>>>>> [email protected] :: +1.514.447.4918 (x135) :: www.inverse.ca >>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and >>>>>>>> PacketFence >>>>>>>> (http://packetfence.org) >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>>------------------------------------------------------------------- >>>>>>>>-- >>>>>>>> - >>>>>>>> -- >>>>>>>> -- >>>>>>>> ---- >>>>>>>> _______________________________________________ >>>>>>>> PacketFence-users mailing list >>>>>>>> [email protected] >>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>> >>>>>>>-------------------------------------------------------------------- >>>>>>>-- >>>>>>> - >>>>>>> -- >>>>>>> ----- >>>>>>> _______________________________________________ >>>>>>> PacketFence-users mailing list >>>>>>> [email protected] >>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>> -- >>>>>> Fabrice Durand >>>>>> [email protected] :: +1.514.447.4918 (x135) :: www.inverse.ca >>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and >>>>>> PacketFence >>>>>> (http://packetfence.org) >>>>>> >>>>>> >>>>>> >>>>>> >>>>>>--------------------------------------------------------------------- >>>>>>-- >>>>>> - >>>>>> -- >>>>>> ---- >>>>>> _______________________________________________ >>>>>> PacketFence-users mailing list >>>>>> [email protected] >>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>> >>>>>---------------------------------------------------------------------- >>>>>-- >>>>> - >>>>> ----- >>>>> _______________________________________________ >>>>> PacketFence-users mailing list >>>>> [email protected] >>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>> >>>> >>>>----------------------------------------------------------------------- >>>>-- >>>> - >>>> ---- >>>> _______________________________________________ >>>> PacketFence-users mailing list >>>> [email protected] >>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >> >>------------------------------------------------------------------------- >>----- >> _______________________________________________ >> PacketFence-users mailing list >> [email protected] >> https://lists.sourceforge.net/lists/listinfo/packetfence-users > > >-- >Fabrice Durand >[email protected] :: +1.514.447.4918 (x135) :: www.inverse.ca >Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence >(http://packetfence.org) > > >-------------------------------------------------------------------------- >---- >_______________________________________________ >PacketFence-users mailing list >[email protected] >https://lists.sourceforge.net/lists/listinfo/packetfence-users ------------------------------------------------------------------------------ _______________________________________________ PacketFence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
