You can install postfix and add in main.cf: relayhost = 10.0.0.1 Regards Fabrice
Le 2014-10-27 15:09, Christopher Mielke a écrit : > It is working now. I had neglected to set the “NAC State” option to > “RADIUS NAC”. > > I do have an unrelated question. We do not allow any outbound SMTP that is > not routed through an SMTP relay we have on campus. How can I configure > PacketFence to relay all mail through this gateway? Let me know if you > would prefer I open a different thread. > > Thanks, > _______________________________________ > Chris Mielke | Lead, ISS Network Systems > Drake Technology Services (DTS) | Drake University > > T 515.271.4640 > E [email protected] > > > > > On 10/27/14, 12:41 PM, "Fabrice DURAND" <[email protected]> wrote: > >> Ok this is better, so now i think you have a misconfiguration in the WLC. >> >> Check if that is the same on the WLC >> https://github.com/inverse-inc/packetfence/blob/devel/docs/images/SSID_6.p >> ng >> (NAC State) >> >> Regards >> Fabrice >> >> >> >> Le 2014-10-27 12:48, Christopher Mielke a écrit : >>> Ok, I believe the switch type was incorrect. I set it to Cisco::WLC_http >>> and now receive the following output from RADIUS: >>> >>> +++[packetfence] = ok >>> ++} # if (!EAP-Type || (EAP-Type != EAP-TTLS && EAP-Type != PEAP)) = ok >>> +} # group post-auth = ok >>> Sending Access-Accept of id 68 to 172.31.255.20 port 32768 >>> Cisco-AVPair += "url-redirect-acl=PreAuth4WebRedirect" >>> Cisco-AVPair += "url-redirect=http://192.168.254.10/cep1cb5c0" >>> User-Name = "a0:88:b4:17:73:a4" >>> Finished request 1. >>> >>> However, when I view the client on the controller the redirect URL is >>> applied, but the PreAuth ACL is not. When I open a browser I am not >>> redirect to the captive portal. The client is fully connected and free >>> to >>> roam the Internet. If I set the switch type in PacketFence back to >>> Cisco::WLC_2500 the PreAuth ACL is set, but I never receive the redirect >>> URL. I cannot connect to the captive portal or anything else. >>> >>> >>> >>> Thanks, >>> _______________________________________ >>> Chris Mielke | Lead, ISS Network Systems >>> Drake Technology Services (DTS) | Drake University >>> >>> T 515.271.4640 >>> E [email protected] >>> >>> >>> >>> >>> On 10/27/14, 11:25 AM, "Christopher Mielke" <[email protected]> >>> wrote: >>> >>>> Here is the output: >>>> >>>> rad_recv: Access-Request packet from host 172.31.255.20 port 32768, >>>> id=67, >>>> length=186 >>>> User-Name = "a0:88:b4:17:73:a4" >>>> Called-Station-Id = "00-27-0d-4a-77-b0:DUGuest-Test" >>>> Calling-Station-Id = "a0-88-b4-17-73-a4" >>>> NAS-Port = 1 >>>> NAS-IP-Address = 172.31.255.20 >>>> NAS-Identifier = "dial2504-wlc-test" >>>> Airespace-Wlan-Id = 4 >>>> User-Password = “supersecretpassword" >>>> Service-Type = Call-Check >>>> Framed-MTU = 1300 >>>> NAS-Port-Type = Wireless-802.11 >>>> Tunnel-Type:0 = VLAN >>>> Tunnel-Medium-Type:0 = IEEE-802 >>>> Tunnel-Private-Group-Id:0 = "500" >>>> server packetfence { >>>> # Executing section authorize from file >>>> /usr/local/pf/raddb/sites-enabled/packetfence >>>> +group authorize { >>>> [suffix] No '@' in User-Name = "a0:88:b4:17:73:a4", looking up realm >>>> NULL >>>> [suffix] No such realm "NULL" >>>> ++[suffix] = noop >>>> ++[preprocess] = ok >>>> [eap] No EAP-Message, not doing EAP >>>> ++[eap] = noop >>>> [files] users: Matched entry DEFAULT at line 1 >>>> ++[files] = ok >>>> ++[expiration] = noop >>>> ++[logintime] = noop >>>> ++update request { >>>> expand: %{Packet-Src-IP-Address} -> 172.31.255.20 >>>> ++} # update request = noop >>>> ++update control { >>>> ++} # update control = noop >>>> rlm_perl: Added pair NAS-Port-Type = Wireless-802.11 >>>> rlm_perl: Added pair Service-Type = Call-Check >>>> rlm_perl: Added pair Tunnel-Medium-Type = IEEE-802 >>>> rlm_perl: Added pair Tunnel-Type = VLAN >>>> rlm_perl: Added pair Calling-Station-Id = a0-88-b4-17-73-a4 >>>> rlm_perl: Added pair Called-Station-Id = 00-27-0d-4a-77-b0:DUGuest-Test >>>> rlm_perl: Added pair FreeRADIUS-Client-IP-Address = 172.31.255.20 >>>> rlm_perl: Added pair Airespace-Wlan-Id = 4 >>>> rlm_perl: Added pair User-Name = a0:88:b4:17:73:a4 >>>> rlm_perl: Added pair NAS-Identifier = dial2504-wlc-test >>>> rlm_perl: Added pair User-Password = p@ck3tf3nc3 >>>> rlm_perl: Added pair NAS-Port = 1 >>>> rlm_perl: Added pair NAS-IP-Address = 172.31.255.20 >>>> rlm_perl: Added pair Tunnel-Private-Group-Id = 500 >>>> rlm_perl: Added pair Framed-MTU = 1300 >>>> rlm_perl: Added pair PacketFence-RPC-Pass = >>>> rlm_perl: Added pair PacketFence-RPC-Server = 127.0.0.1 >>>> rlm_perl: Added pair PacketFence-RPC-Proto = http >>>> rlm_perl: Added pair PacketFence-RPC-User = >>>> rlm_perl: Added pair Auth-Type = Accept >>>> rlm_perl: Added pair PacketFence-RPC-Port = 9090 >>>> ++[packetfence] = noop >>>> +} # group authorize = ok >>>> Found Auth-Type = Accept >>>> Auth-Type = Accept, accepting the user >>>> Login OK: [a0:88:b4:17:73:a4] (from client 172.31.255.20 port 1 cli >>>> a0-88-b4-17-73-a4) >>>> } # server packetfence >>>> # Executing section post-auth from file >>>> /usr/local/pf/raddb/sites-enabled/packetfence >>>> +group post-auth { >>>> ++[exec] = noop >>>> ++? if (!EAP-Type || (EAP-Type != EAP-TTLS && EAP-Type != PEAP)) >>>> ? Evaluating !(EAP-Type ) -> TRUE >>>> ?? Skipping (EAP-Type != EAP-TTLS ) >>>> ?? Skipping (EAP-Type != PEAP) >>>> ++? if (!EAP-Type || (EAP-Type != EAP-TTLS && EAP-Type != PEAP)) -> >>>> TRUE >>>> ++if (!EAP-Type || (EAP-Type != EAP-TTLS && EAP-Type != PEAP)) { >>>> +++update control { >>>> +++} # update control = noop >>>> rlm_perl: request from a0:88:b4:17:73:a4 port 1 was accepted but no >>>> VLAN >>>> returned. This could be normal. See server logs for details. >>>> rlm_perl: PacketFence RESULT RESPONSE CODE: 2 (2 means OK) >>>> rlm_perl: Added pair NAS-Port-Type = Wireless-802.11 >>>> rlm_perl: Added pair Service-Type = Call-Check >>>> rlm_perl: Added pair Tunnel-Type = VLAN >>>> rlm_perl: Added pair Tunnel-Medium-Type = IEEE-802 >>>> rlm_perl: Added pair Called-Station-Id = 00-27-0d-4a-77-b0:DUGuest-Test >>>> rlm_perl: Added pair Calling-Station-Id = a0-88-b4-17-73-a4 >>>> rlm_perl: Added pair Airespace-Wlan-Id = 4 >>>> rlm_perl: Added pair FreeRADIUS-Client-IP-Address = 172.31.255.20 >>>> rlm_perl: Added pair User-Name = a0:88:b4:17:73:a4 >>>> rlm_perl: Added pair User-Password = p@ck3tf3nc3 >>>> rlm_perl: Added pair NAS-Identifier = dial2504-wlc-test >>>> rlm_perl: Added pair NAS-IP-Address = 172.31.255.20 >>>> rlm_perl: Added pair NAS-Port = 1 >>>> rlm_perl: Added pair Framed-MTU = 1300 >>>> rlm_perl: Added pair Tunnel-Private-Group-Id = 500 >>>> rlm_perl: Added pair Airespace-ACL-Name = PreAuth4WebRedirect >>>> rlm_perl: Added pair PacketFence-RPC-Pass = >>>> rlm_perl: Added pair PacketFence-RPC-Server = 127.0.0.1 >>>> rlm_perl: Added pair PacketFence-RPC-User = >>>> rlm_perl: Added pair PacketFence-RPC-Proto = http >>>> rlm_perl: Added pair Auth-Type = Accept >>>> rlm_perl: Added pair PacketFence-RPC-Port = 9090 >>>> +++[packetfence] = ok >>>> ++} # if (!EAP-Type || (EAP-Type != EAP-TTLS && EAP-Type != PEAP)) = >>>> ok >>>> +} # group post-auth = ok >>>> Sending Access-Accept of id 67 to 172.31.255.20 port 32768 >>>> Airespace-ACL-Name = "PreAuth4WebRedirect" >>>> Finished request 0. >>>> Going to the next request >>>> Waking up in 4.9 seconds. >>>> Cleaning up request 0 ID 67 with timestamp +21 >>>> Ready to process requests. >>>> >>>> >>>> >>>> >>>> >>>> Thanks, >>>> _______________________________________ >>>> Chris Mielke | Lead, ISS Network Systems >>>> Drake Technology Services (DTS) | Drake University >>>> >>>> T 515.271.4640 >>>> E [email protected] >>>> >>>> >>>> >>>> >>>> On 10/23/14, 5:00 PM, "Durand fabrice" <[email protected]> wrote: >>>> >>>>> Ok so in a perfect world AAA URL redirect should be something like >>>>> http://192.168.254.1/cep.... >>>>> >>>>> Can you run freeradius in debug mode: >>>>> >>>>> pkill radiusd >>>>> radiusd -d /usr/local/pf/raddb -X >>>>> >>>>> and paste what is the debug when you try to connect. >>>>> >>>>> >>>>> Regards >>>>> Fabrice >>>>> >>>>> Le 2014-10-23 15:14, Christopher Mielke a écrit : >>>>>> Here is the output: >>>>>> >>>>>> show client detail a088b41773a4 >>>>>> Client MAC Address............................... a0:88:b4:17:73:a4 >>>>>> Client Username ................................. N/A >>>>>> AP MAC Address................................... 00:27:0d:4a:77:b0 >>>>>> AP Name.......................................... dial1142wap-test >>>>>> AP radio slot Id................................. 0 >>>>>> Client State..................................... Associated >>>>>> Client NAC OOB State............................. Access >>>>>> Wireless LAN Id.................................. 4 >>>>>> Hotspot (802.11u)................................ Not Supported >>>>>> BSSID............................................ 00:27:0d:4a:77:b3 >>>>>> Connected For ................................... 36 secs >>>>>> Channel.......................................... 1 >>>>>> IP Address....................................... Unknown >>>>>> Gateway Address.................................. Unknown >>>>>> Netmask.......................................... Unknown >>>>>> IPv6 Address..................................... >>>>>> fe80::bc0b:5c58:e766:93de >>>>>> Association Id................................... 1 >>>>>> Authentication Algorithm......................... Open System >>>>>> Reason Code...................................... 1 >>>>>> Status Code...................................... 0 >>>>>> Session Timeout.................................. 1800 >>>>>> Client CCX version............................... 4 >>>>>> Client E2E version............................... 1 >>>>>> QoS Level........................................ Silver >>>>>> Avg data Rate.................................... 0 >>>>>> Burst data Rate.................................. 0 >>>>>> Avg Real time data Rate.......................... 0 >>>>>> Burst Real Time data Rate........................ 0 >>>>>> 802.1P Priority Tag.............................. disabled >>>>>> CTS Security Group Tag........................... Not Applicable >>>>>> KTS CAC Capability............................... No >>>>>> WMM Support...................................... Enabled >>>>>> APSD ACs....................................... BK BE VI VO >>>>>> Power Save....................................... OFF >>>>>> Current Rate..................................... 54.0 >>>>>> Supported Rates.................................. >>>>>> 12.0,18.0,24.0,36.0,48.0, >>>>>> ............................................. 54.0 >>>>>> Mobility State................................... Local >>>>>> Mobility Move Count.............................. 0 >>>>>> Security Policy Completed........................ Yes >>>>>> Policy Manager State............................. RUN >>>>>> Policy Manager Rule Created...................... Yes >>>>>> AAA Override ACL Name............................ none >>>>>> AAA Override ACL Applied Status.................. Unavailable >>>>>> AAA Override Flex ACL Name....................... none >>>>>> AAA Override Flex ACL Applied Status............. Unavailable >>>>>> AAA URL redirect................................. none >>>>>> Audit Session ID................................. >>>>>> ac1fff1400000016544952a8 >>>>>> AAA Role Type.................................... none >>>>>> Local Policy Applied............................. none >>>>>> IPv4 ACL Name.................................... PreAuth4WebRedirect >>>>>> FlexConnect ACL Applied Status................... Unavailable >>>>>> IPv4 ACL Applied Status.......................... Yes >>>>>> IPv6 ACL Name.................................... none >>>>>> IPv6 ACL Applied Status.......................... Unavailable >>>>>> Layer2 ACL Name.................................. none >>>>>> Layer2 ACL Applied Status........................ Unavailable >>>>>> mDNS Status...................................... Enabled >>>>>> mDNS Profile Name................................ >>>>>> default-mdns-profile >>>>>> No. of mDNS Services Advertised.................. 0 >>>>>> Policy Type...................................... N/A >>>>>> Encryption Cipher................................ None >>>>>> Protected Management Frame ...................... No >>>>>> Management Frame Protection...................... No >>>>>> EAP Type......................................... Unknown >>>>>> Interface........................................ guest-wl >>>>>> VLAN............................................. 500 >>>>>> Quarantine VLAN.................................. 0 >>>>>> Access VLAN...................................... 500 >>>>>> Client Capabilities: >>>>>> CF Pollable................................ Not implemented >>>>>> CF Poll Request............................ Not implemented >>>>>> Short Preamble............................. Implemented >>>>>> PBCC....................................... Not implemented >>>>>> Channel Agility............................ Not implemented >>>>>> Listen Interval............................ 90 >>>>>> Fast BSS Transition........................ Not implemented >>>>>> Client Wifi Direct Capabilities: >>>>>> WFD capable................................ No >>>>>> Manged WFD capable......................... No >>>>>> Cross Connection Capable................... No >>>>>> Support Concurrent Operation............... No >>>>>> Fast BSS Transition Details: >>>>>> Client Statistics: >>>>>> Number of Bytes Received................... 12120 >>>>>> Number of Bytes Sent....................... 0 >>>>>> Total Number of Bytes Sent................. 0 >>>>>> Total Number of Bytes Recv................. 12120 >>>>>> Number of Bytes Sent (last 90s)............ 0 >>>>>> Number of Bytes Recv (last 90s)............ 12120 >>>>>> Number of Packets Received................. 126 >>>>>> Number of Packets Sent..................... 0 >>>>>> Number of Interim-Update Sent.............. 0 >>>>>> Number of EAP Id Request Msg Timeouts...... 0 >>>>>> Number of EAP Id Request Msg Failures...... 0 >>>>>> Number of EAP Request Msg Timeouts......... 0 >>>>>> Number of EAP Request Msg Failures......... 0 >>>>>> Number of EAP Key Msg Timeouts............. 0 >>>>>> Number of EAP Key Msg Failures............. 0 >>>>>> Number of Data Retries..................... 0 >>>>>> Number of RTS Retries...................... 0 >>>>>> Number of Duplicate Received Packets....... 0 >>>>>> Number of Decrypt Failed Packets........... 0 >>>>>> Number of Mic Failured Packets............. 0 >>>>>> Number of Mic Missing Packets.............. 0 >>>>>> Number of RA Packets Dropped............... 0 >>>>>> Number of Policy Errors.................... 0 >>>>>> Radio Signal Strength Indicator............ -67 dBm >>>>>> Signal to Noise Ratio...................... 25 dB >>>>>> Client Rate Limiting Statistics: >>>>>> Number of Data Packets Recieved............ 0 >>>>>> Number of Data Rx Packets Dropped.......... 0 >>>>>> Number of Data Bytes Recieved.............. 0 >>>>>> Number of Data Rx Bytes Dropped............ 0 >>>>>> Number of Realtime Packets Recieved........ 0 >>>>>> Number of Realtime Rx Packets Dropped...... 0 >>>>>> Number of Realtime Bytes Recieved.......... 0 >>>>>> Number of Realtime Rx Bytes Dropped........ 0 >>>>>> Number of Data Packets Sent................ 0 >>>>>> Number of Data Tx Packets Dropped.......... 0 >>>>>> Number of Data Bytes Sent.................. 0 >>>>>> Number of Data Tx Bytes Dropped............ 0 >>>>>> Number of Realtime Packets Sent............ 0 >>>>>> Number of Realtime Tx Packets Dropped...... 0 >>>>>> Number of Realtime Bytes Sent.............. 0 >>>>>> Number of Realtime Tx Bytes Dropped........ 0 >>>>>> Nearby AP Statistics: >>>>>> dial1142wap-test(slot 0) >>>>>> antenna0: 36 secs ago.................... -64 dBm >>>>>> antenna1: 36 secs ago.................... -66 dBm >>>>>> dial1142wap-test(slot 1) >>>>>> antenna0: 112 secs ago................... -77 dBm >>>>>> antenna1: 112 secs ago................... -77 dBm >>>>>> DNS Server details: >>>>>> DNS server IP ............................. 0.0.0.0 >>>>>> DNS server IP ............................. 0.0.0.0 >>>>>> Assisted Roaming Prediction List details: >>>>>> >>>>>> Client Dhcp Required: True >>>>>> Allowed (URL)IP Addresses >>>>>> ------------------------- >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> Thanks, >>>>>> _______________________________________ >>>>>> Chris Mielke | Lead, ISS Network Systems >>>>>> Drake Technology Services (DTS) | Drake University >>>>>> >>>>>> T 515.271.4640 >>>>>> E [email protected] >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> On 10/23/14, 1:57 PM, "Fabrice DURAND" <[email protected]> wrote: >>>>>> >>>>>>> Strange it doesn´t detect that it´s a wlc redirection. >>>>>>> Can you paste a sh client @mac (wlc) ? >>>>>>> >>>>>>> Regards >>>>>>> Fabrice >>>>>>> >>>>>>> Le 2014-10-23 14:35, Christopher Mielke a écrit : >>>>>>>> I didn’t try to ping because of the ACL, but I was able to telnet >>>>>>>> to >>>>>>>> the >>>>>>>> server on port 80. When I open a browser it tries to redirect to >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> “https://pf.drake.edu/captive-portal?destination_url=http://192.168. >>>>>>>> 25 >>>>>>>> 4 >>>>>>>> .1 >>>>>>>> 0/ >>>>>>>> &”, but then it times out. >>>>>>>> >>>>>>>> Thanks, >>>>>>>> _______________________________________ >>>>>>>> Chris Mielke | Lead, ISS Network Systems >>>>>>>> Drake Technology Services (DTS) | Drake University >>>>>>>> >>>>>>>> T 515.271.4640 >>>>>>>> E [email protected] >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> On 10/23/14, 12:39 PM, "Fabrice DURAND" <[email protected]> wrote: >>>>>>>> >>>>>>>>> Yes this is correct but are you able to ping the portal ip >>>>>>>>> address ? >>>>>>>>> (Also change the acl to allow icmp) >>>>>>>>> >>>>>>>>> Fabrice >>>>>>>>> >>>>>>>>> Le 2014-10-23 12:36, Christopher Mielke a écrit : >>>>>>>>>> Sorry it took so long to respond. I had to rebuild my test >>>>>>>>>> environment. >>>>>>>>>> I >>>>>>>>>> am able to connect to the SSID and on the wlc I can see the >>>>>>>>>> “PreAuth” >>>>>>>>>> access-list is being applied. However, when I open a web browser >>>>>>>>>> I >>>>>>>>>> do >>>>>>>>>> not >>>>>>>>>> get to the captive portal. I am pointing to production DNS right >>>>>>>>>> now. >>>>>>>>>> Is >>>>>>>>>> that correct? >>>>>>>>>> >>>>>>>>>> Thanks, >>>>>>>>>> _______________________________________ >>>>>>>>>> Chris Mielke | Lead, ISS Network Systems >>>>>>>>>> Drake Technology Services (DTS) | Drake University >>>>>>>>>> >>>>>>>>>> T 515.271.4640 >>>>>>>>>> E [email protected] >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> On 10/15/14, 12:23 PM, "Fabrice DURAND" <[email protected]> >>>>>>>>>> wrote: >>>>>>>>>> >>>>>>>>>>> Hello Christopher, >>>>>>>>>>> >>>>>>>>>>> it depend of your network configuration, but you can use an >>>>>>>>>>> alias >>>>>>>>>>> (eth0:1) as the ip address of the captive portal. >>>>>>>>>>> >>>>>>>>>>> But let´s start with a simple config, in packetfence create a >>>>>>>>>>> management >>>>>>>>>>> interface, registration interface and a isolation interface. >>>>>>>>>>> >>>>>>>>>>> The registration interface must be able to talk with the wlc and >>>>>>>>>>> the >>>>>>>>>>> devices connected on and don´t forget to disable dhcp on the reg >>>>>>>>>>> interface. >>>>>>>>>>> So on the wlc side configure an ACL (Pre-Auth-For-WebRedirect) >>>>>>>>>>> that >>>>>>>>>>> forward the traffic to the ip address of the registration >>>>>>>>>>> interface >>>>>>>>>>> and >>>>>>>>>>> configure another ACL (Authorize_any) to allow any any and >>>>>>>>>>> configure >>>>>>>>>>> the >>>>>>>>>>> WLC to be the dhcp server for the client. >>>>>>>>>>> >>>>>>>>>>> Then try to connect on the ssid and check the status of the >>>>>>>>>>> client >>>>>>>>>>> in >>>>>>>>>>> the WLC, if all is ok you will be able to see that the ACL >>>>>>>>>>> applied >>>>>>>>>>> to >>>>>>>>>>> the client is the Pre-Auth-For-WebRedirect. >>>>>>>>>>> >>>>>>>>>>> Let me know if it´s ok. >>>>>>>>>>> >>>>>>>>>>> Regards >>>>>>>>>>> Fabrice >>>>>>>>>>> >>>>>>>>>>> Le 2014-10-14 17:49, Christopher Mielke a écrit : >>>>>>>>>>>> I am completely new to PacketFence and trying to set up WebAuth >>>>>>>>>>>> for >>>>>>>>>>>> a >>>>>>>>>>>> guest SSID using a Cisco WLC running 7.6.130.0. I have >>>>>>>>>>>> installed >>>>>>>>>>>> PacketFence ZEN 4.4.1 and have it running. I am trying to >>>>>>>>>>>> follow >>>>>>>>>>>> the >>>>>>>>>>>> instructions for ³Wireless LAN Controller (WLC) Web Auth² from >>>>>>>>>>>> the >>>>>>>>>>>> network >>>>>>>>>>>> configuration guide, but I¹m confused about the captive portal >>>>>>>>>>>> configuration. In the guide it says the captive portal is using >>>>>>>>>>>> IP >>>>>>>>>>>> address >>>>>>>>>>>> 172.16.0.250 and the administration (I presume management) >>>>>>>>>>>> interface >>>>>>>>>>>> uses >>>>>>>>>>>> IP address 172.16.0.249. How do I set up a captive portal IP >>>>>>>>>>>> address >>>>>>>>>>>> in >>>>>>>>>>>> the same subnet as the management IP address? I apparently >>>>>>>>>>>> cannot >>>>>>>>>>>> use >>>>>>>>>>>> the >>>>>>>>>>>> management IP for the captive portal because iptables blocks >>>>>>>>>>>> HTTP(S) >>>>>>>>>>>> traffic to that IP address because it is in the >>>>>>>>>>>> ³input-management-if² >>>>>>>>>>>> chain. >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> Thanks, >>>>>>>>>>>> Chris >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> ---------------------------------------------------------------- >>>>>>>>>>>> -- >>>>>>>>>>>> - >>>>>>>>>>>> -- >>>>>>>>>>>> -- >>>>>>>>>>>> -- >>>>>>>>>>>> ----- >>>>>>>>>>>> Comprehensive Server Monitoring with Site24x7. >>>>>>>>>>>> Monitor 10 servers for $9/Month. >>>>>>>>>>>> Get alerted through email, SMS, voice calls or mobile push >>>>>>>>>>>> notifications. >>>>>>>>>>>> Take corrective actions from your mobile device. >>>>>>>>>>>> http://p.sf.net/sfu/Zoho >>>>>>>>>>>> _______________________________________________ >>>>>>>>>>>> PacketFence-users mailing list >>>>>>>>>>>> [email protected] >>>>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>>>>>> -- >>>>>>>>>>> Fabrice Durand >>>>>>>>>>> [email protected] :: +1.514.447.4918 (x135) :: www.inverse.ca >>>>>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and >>>>>>>>>>> PacketFence >>>>>>>>>>> (http://packetfence.org) >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> ----------------------------------------------------------------- >>>>>>>>>>> -- >>>>>>>>>>> - >>>>>>>>>>> -- >>>>>>>>>>> -- >>>>>>>>>>> -- >>>>>>>>>>> ---- >>>>>>>>>>> Comprehensive Server Monitoring with Site24x7. >>>>>>>>>>> Monitor 10 servers for $9/Month. >>>>>>>>>>> Get alerted through email, SMS, voice calls or mobile push >>>>>>>>>>> notifications. >>>>>>>>>>> Take corrective actions from your mobile device. >>>>>>>>>>> http://p.sf.net/sfu/Zoho >>>>>>>>>>> _______________________________________________ >>>>>>>>>>> PacketFence-users mailing list >>>>>>>>>>> [email protected] >>>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>>>>> ------------------------------------------------------------------ >>>>>>>>>> -- >>>>>>>>>> - >>>>>>>>>> -- >>>>>>>>>> -- >>>>>>>>>> ----- >>>>>>>>>> _______________________________________________ >>>>>>>>>> PacketFence-users mailing list >>>>>>>>>> [email protected] >>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>>>> -- >>>>>>>>> Fabrice Durand >>>>>>>>> [email protected] :: +1.514.447.4918 (x135) :: www.inverse.ca >>>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and >>>>>>>>> PacketFence >>>>>>>>> (http://packetfence.org) >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> ------------------------------------------------------------------- >>>>>>>>> -- >>>>>>>>> - >>>>>>>>> -- >>>>>>>>> -- >>>>>>>>> ---- >>>>>>>>> _______________________________________________ >>>>>>>>> PacketFence-users mailing list >>>>>>>>> [email protected] >>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>>> -------------------------------------------------------------------- >>>>>>>> -- >>>>>>>> - >>>>>>>> -- >>>>>>>> ----- >>>>>>>> _______________________________________________ >>>>>>>> PacketFence-users mailing list >>>>>>>> [email protected] >>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>> -- >>>>>>> Fabrice Durand >>>>>>> [email protected] :: +1.514.447.4918 (x135) :: www.inverse.ca >>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and >>>>>>> PacketFence >>>>>>> (http://packetfence.org) >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> --------------------------------------------------------------------- >>>>>>> -- >>>>>>> - >>>>>>> -- >>>>>>> ---- >>>>>>> _______________________________________________ >>>>>>> PacketFence-users mailing list >>>>>>> [email protected] >>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>> ---------------------------------------------------------------------- >>>>>> -- >>>>>> - >>>>>> ----- >>>>>> _______________________________________________ >>>>>> PacketFence-users mailing list >>>>>> [email protected] >>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>> >>>>> ----------------------------------------------------------------------- >>>>> -- >>>>> - >>>>> ---- >>>>> _______________________________________________ >>>>> PacketFence-users mailing list >>>>> [email protected] >>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>> ------------------------------------------------------------------------- >>> ----- >>> _______________________________________________ >>> PacketFence-users mailing list >>> [email protected] >>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >> >> -- >> Fabrice Durand >> [email protected] :: +1.514.447.4918 (x135) :: www.inverse.ca >> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence >> (http://packetfence.org) >> >> >> -------------------------------------------------------------------------- >> ---- >> _______________________________________________ >> PacketFence-users mailing list >> [email protected] >> https://lists.sourceforge.net/lists/listinfo/packetfence-users > ------------------------------------------------------------------------------ > _______________________________________________ > PacketFence-users mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/packetfence-users -- Fabrice Durand [email protected] :: +1.514.447.4918 (x135) :: www.inverse.ca Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence (http://packetfence.org) ------------------------------------------------------------------------------ _______________________________________________ PacketFence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
