Ok, so the headers looks something like this, it repeats forever when
redirected:
GET /cep0a5a10 HTTP/1.1
Host: 10.5.0.3
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:38.0) Gecko/20100101 Firefox/38.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: keep-alive
Cache-Control: max-age=0
HTTP/1.1 200 OK
Location: http://10.5.0.3/cep0a5a10
Content-Type: text/html
Content-Length: 278
----------------------------------------------------------http://10.5.0.3/cep0a5a10
GET /cep0a5a10 HTTP/1.1
Host: 10.5.0.3
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:38.0) Gecko/20100101 Firefox/38.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: keep-alive
Cache-Control: max-age=0
HTTP/1.1 200 OK
Location: http://10.5.0.3/cep0a5a10
Content-Type: text/html
Content-Length: 278
----------------------------------------------------------http://10.5.0.3/cep0a5a10
GET /cep0a5a10 HTTP/1.1
Host: 10.5.0.3
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:38.0) Gecko/20100101 Firefox/38.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: keep-alive
Cache-Control: max-age=0
As for the radius debug, there is quite a bit of output, what am i looking
for? I guess I can copy what I found interesting in it that would pertain
to the WLC:
rlm_sql (sql): Read entry
nasname=172.16.4.4,shortname=172.16.4.4,secret=private
rlm_sql (sql): Adding client 172.16.4.4 (172.16.4.4, server=<none>) to
clients list
adiusd: #### Opening IP addresses and Ports ####
listen {
type = "auth"
virtual_server = "packetfence"
ipaddr = 10.10.1.13
port = 0
Failed binding to authentication address 10.10.1.13 port 1812 as server
packetfence: Address already in use
/usr/local/pf/raddb//radiusd.conf[37]: Error binding to port for 10.10.1.13
port 1812
radiusd.conf line starting at line 37:
listen {
type = auth
ipaddr = 10.10.1.13
port = 0
virtual_server = packetfence
}
listen {
ipaddr = 10.10.1.13
port = 0
type = acct
virtual_server = packetfence
}
On Thu, May 21, 2015 at 3:02 PM, Fabrice DURAND <[email protected]> wrote:
> Ok so the problem is elsewhere.
>
> Can you check with radius in debug mode is the vsa are correct ?
> radiusd -d /usr/local/pf/raddb/ -X
>
> And on the client side with Live HTTP Headers (firefox extension) what
> contain the redirection ?
>
> Regards
> Fabrice
>
>
> Le 2015-05-21 15:46, J Nelson a écrit :
>
> I'm running version 4.5.1
>
> my subroutine looks like:
> sub returnRadiusAccessAccept {
> my ($this, $vlan, $mac, $port, $connection_type, $user_name, $ssid,
> $wasInline, $user_role) = @_;
> my $logger = Log::Log4perl::get_logger( ref($this) );
>
> my $radius_reply_ref = {};
>
> my $role = $this->getRoleByName($user_role);
> # Roles are configured and the user should have one
> if (defined($role) && isenabled($this->{_RoleMap})) {
> my $node_info = node_view($mac);
> if ($node_info->{'status'} eq $pf::node::STATUS_REGISTERED) {
> $radius_reply_ref = {
> 'User-Name' => $mac,
> $this->returnRoleAttribute => $role,
> };
> }
> else {
> my (%session_id);
> pf::web::util::session(\%session_id,undef,6);
> $session_id{client_mac} = $mac;
> $session_id{wlan} = $ssid;
> $session_id{switch_id} = $this->{_id};
> my $portal_url;
> if ( $ssid eq "Webreg-Production") {
> $portal_url='http://10.4.0.3';
> }elsif ( $ssid eq "Augie-Guest") {
> $portal_url='http://10.5.0.3';
> } else {
> $portal_url=$this->{'_portalURL'};
> }
>
> $radius_reply_ref = {
> 'User-Name' => $mac,
> 'Cisco-AVPair' =>
> ["url-redirect-acl=$role","url-redirect=".$portal_url."/cep$session_id{_session_id}"],
> };
> }
> $logger->info("[$mac] (".$this->{'_id'}.") Returning ACCEPT with
> role: $role");
> }
>
> its different than what you posted. If I put in the entire code that you
> posted, neither of the SSID's will work anymore. If I include this code:
> my $portal_url;
> if ( $ssid eq "Webreg-Production") {
> $portal_url='http://10.4.0.3';
> }elsif ( $ssid eq "Augie-Guest") {
> $portal_url='http://10.5.0.3';
> } else {
> $portal_url=$this->{'_portalURL'};
> }
>
> $radius_reply_ref = {
> 'User-Name' => $mac,
> 'Cisco-AVPair' =>
> ["url-redirect-acl=$role","url-redirect=".$portal_url."/cep$session_id{_session_id}"],
> };
> }
> $logger->info("[$mac] (".$this->{'_id'}.") Returning ACCEPT with
> role: $role");
> }
>
> then Webreg-Production works, and Augie-Guest appears to continuously
> loop.
>
>
>
> On Thu, May 21, 2015 at 12:05 PM, Fabrice DURAND <[email protected]>
> wrote:
>
>> The function is like that ? :
>>
>> sub returnRadiusAccessAccept {
>> my ($this, $vlan, $mac, $port, $connection_type, $user_name, $ssid,
>> $wasInline, $user_role) = @_;
>> my $logger = Log::Log4perl::get_logger( ref($this) );
>>
>> my $radius_reply_ref = {};
>>
>> my $role = $this->getRoleByName($user_role);
>> # Roles are configured and the user should have one
>> if (defined($role) && isenabled($this->{_RoleMap})) {
>> my $node_info = node_view($mac);
>> my $violation = pf::violation::violation_view_top($mac);
>> if ($node_info->{'status'} eq $pf::node::STATUS_REGISTERED &&
>> !defined($violation)) {
>> $radius_reply_ref = {
>> 'User-Name' => $mac,
>> $this->returnRoleAttribute => $role,
>> };
>> }
>> else {
>> my (%session_id);
>> pf::web::util::session(\%session_id,undef,6);
>> $session_id{client_mac} = $mac;
>> $session_id{wlan} = $ssid;
>> $session_id{switch_id} = $this->{_id};
>> pf::locationlog::locationlog_set_session($mac,
>> $session_id{_session_id});
>> my $portal_url;
>> if ( $ssid eq "Webreg-Production") {
>> $portal_url='http://10.4.0.3';
>> }elsif ( $ssid eq "Augie-Guest") {
>> $portal_url='http://10.5.0.3';
>> } else {
>> $portal_url=$this->{'_portalURL'};
>> }
>>
>> $radius_reply_ref = {
>> 'User-Name' => $mac,
>> 'Cisco-AVPair' =>
>> ["url-redirect-acl=$role","url-redirect=".$portal_url."/cep$session_id{_session_id}"],
>> };
>> }
>> $logger->info("[$mac] (".$this->{'_id'}.") Returning ACCEPT with
>> role: $role");
>> }
>>
>> Also check the httpd.admin... log files, you should be able to see what
>> is the error.
>>
>> Regards
>> Fabrice
>>
>>
>>
>>
>>
>> Le 2015-05-21 12:28, J Nelson a écrit :
>>
>> Closer, but not quite. So, my code now looks like:
>>
>> my $portal_url;
>> if ( $ssid eq "Webreg-Production") {
>> $portal_url='http://10.4.0.3';
>> }elsif ( $ssid eq "Augie-Guest") {
>> $portal_url='http://10.5.0.3';
>> } else {
>> $portal_url=$this->{'_portalURL'};
>> };
>>
>> $radius_reply_ref = {
>> 'User-Name' => $mac,
>> 'Cisco-AVPair' =>
>> ["url-redirect-acl=$role","url-redirect=".$portal_url."/cep$session_id{_session_id}"],
>> };
>> }
>>
>> So this is what I am experiencing now:
>> Webreg-Production SSID works
>> Augie-Guest SSID continues to loop
>> in the packetfence GUI, under Network, when I click Switches i get:
>> *Error!* An error occured while contacting the server. Please try again
>> later.
>> I'm not seeing an error when packetfence starts.
>>
>> On Thu, May 21, 2015 at 10:40 AM, Fabrice DURAND <[email protected]>
>> wrote:
>>
>>> Hi Nelson,
>>>
>>> my bad:
>>>
>>> $portal_url="10.4.0.3"; => $portal_url='http://10.4.0.3';
>>> $portal_url="10.5.0.3"; => $portal_url='http://10.5.0.3';
>>>
>>> Regards
>>> Fabrice
>>>
>>>
>>> Le 2015-05-21 10:47, J Nelson a écrit :
>>>
>>> Fabrice,
>>>
>>> I tried to add what you provided to the code of WLC_http.pm, but once I
>>> do it, I get put into an endless redirect loop on both networks. I do see
>>> that each network is trying to redirect to the proper portal IP. I'm
>>> putting what I have in WLC_http.pm - i'm including some lines before and
>>> after the code tweak you provided - just so you can see if anything is
>>> missing before/after like a { or ; somewhere.
>>>
>>> my $role = $this->getRoleByName($user_role);
>>> # Roles are configured and the user should have one
>>> if (defined($role) && isenabled($this->{_RoleMap})) {
>>> my $node_info = node_view($mac);
>>> if ($node_info->{'status'} eq $pf::node::STATUS_REGISTERED) {
>>> $radius_reply_ref = {
>>> 'User-Name' => $mac,
>>> $this->returnRoleAttribute => $role,
>>> };
>>> }
>>> else {
>>> my (%session_id);
>>> pf::web::util::session(\%session_id,undef,6);
>>> $session_id{client_mac} = $mac;
>>> $session_id{wlan} = $ssid;
>>> $session_id{switch_id} = $this->{_id};
>>> my $portal_url;
>>> if ( $ssid eq "Webreg-Production") {
>>> $portal_url="10.4.0.3";
>>> }elsif ( $ssid eq "Augie-Guest") {
>>> $portal_url="10.5.0.3";
>>> } else {
>>> $portal_url=$this->{'_portalURL'};
>>> }
>>>
>>> $radius_reply_ref = {
>>> 'User-Name' => $mac,
>>> 'Cisco-AVPair' =>
>>> ["url-redirect-acl=$role","url-redirect=".$portal_url."/cep$session_id{_session_id}"],
>>> };
>>>
>>> }
>>> $logger->info("[$mac] (".$this->{'_id'}.") Returning ACCEPT with
>>> role: $role");
>>> }
>>>
>>>
>>>
>>>
>>> On Wed, May 20, 2015 at 9:33 AM, Fabrice DURAND <[email protected]>
>>> wrote:
>>>
>>>> Hi John,
>>>>
>>>> so you will have to go in the code because there is only one portal url
>>>> per switch config.
>>>>
>>>> So let's do a hack:
>>>>
>>>> https://github.com/inverse-inc/packetfence/blob/devel/lib/pf/Switch/Cisco/WLC_http.pm#L161
>>>>
>>>> my $portal_url;
>>>> if ( $ssid eq "Staff") {
>>>> $portal_url="10.4.0.3";
>>>> }elsif ( $ssid eq "Guest") {
>>>> $portal_url="10.5.0.3";
>>>> } else {
>>>> $portal_url=$this->{'_portalURL'};
>>>> }
>>>>
>>>> $radius_reply_ref = {
>>>> 'User-Name' => $mac,
>>>> 'Cisco-AVPair' =>
>>>> ["url-redirect-acl=$role","url-redirect=".$portal_url."/cep$session_id{_session_id}"],
>>>> };
>>>>
>>>>
>>>> Regards
>>>> Fabrice
>>>>
>>>>
>>>>
>>>> Le 2015-05-20 09:40, J Nelson a écrit :
>>>>
>>>> Fabrice, I am purely Web Auth via Cisco WLC.
>>>>
>>>> So, in that configuration, I dont believe there is any way to change
>>>> VLANs - as Web Auth is purely controlling access via ACL's on the WLC.
>>>> - now if i'm wrong on this, I need to be pointed in the right
>>>> direction.
>>>>
>>>> So, I am trying to figure out how to basically have two registration
>>>> interfaces in a pure WLC Web Auth setup:
>>>> Vlan4 - Staff/Fac
>>>> Vlan5 - Guest
>>>>
>>>> but, it looks like I can only have portal, since i setup Vlan 4 first
>>>> - the portal exists on that address space/subnet. So, the issue I'm
>>>> having, when i join the Guest network, a client in that network is unable
>>>> to get to the portal page. It looks like a redirect is happening, but i
>>>> just cant get to it (the PF portal). The ACL on the WLC is indicating that
>>>> the traffic is being passed, but I dont believe IPtables on the PF box is
>>>> allowing it. A client in the Guest network definitely cannot get to
>>>> http/https on the PF portal ip address (confirming via an NMAP scan).
>>>>
>>>> So i guess the question is, providing you understand what I'm trying
>>>> to accomplish,can i have multiple Registration interfaces that use the
>>>> same PF portal? And what are the configuration requirements? Throwing up
>>>> two PF boxes - one for Staff/Fac/Student one for Guest would certainly
>>>> work, just curious if I can do it all in one box.
>>>>
>>>> thanks..
>>>>
>>>> On Wed, May 20, 2015 at 8:23 AM, Fabrice DURAND <[email protected]>
>>>> wrote:
>>>>
>>>>> Hello Nelson,
>>>>>
>>>>> i am not sure to understand what you really want to do.
>>>>>
>>>>> Let's say you have a registration network: VLAN 4
>>>>> A production network for the staff and a production network for the
>>>>> guest (5).
>>>>>
>>>>> When a device is unreg then packetfence will return the vlan 5 and the
>>>>> device will hit the portal.
>>>>> Then depending if it's a Staff or a guest then after registration the
>>>>> device will be placed on his production network (depending of his role).
>>>>>
>>>>> Is it something like that you want to achieve ?
>>>>>
>>>>> Regards
>>>>> Fabrice
>>>>>
>>>>>
>>>>> Le 2015-05-19 14:18, J Nelson a écrit :
>>>>>
>>>>> any role configured on a different subnet other than the native
>>>>> subnet where the captive portal is located will not work.
>>>>>
>>>>> So, what i do have working is my Fac-Staff SSID which is on VLAN 4/
>>>>> 10.4.0.0/24
>>>>> captive portal is located at: 10.4.0.3
>>>>> WLC is configured at Network | Switches | and is configured to do Role
>>>>> by Switch Role, where WLC ACL’s are entered to define Registration and
>>>>> then
>>>>> Fac-Staff access upon registration.
>>>>>
>>>>> The Portal URL is in the Fac-Staff registration network - IP address,
>>>>> in this case: 10.4.0.3
>>>>>
>>>>> So, the problem I’m running into, is that i want Guests on a different
>>>>> subnet and SSID other than where Fac-Staff reside. So I create a new
>>>>> interface, on a different subnet, as: Type - Registration, and configure a
>>>>> new SSID on the WLC side.
>>>>>
>>>>> So, for now, I configure the WLC under switches with the same ACL’s as
>>>>> Fac-Staff for the Guest role - just for simplicity i’m using the same
>>>>> ACL’s
>>>>> for now, since I know they work.
>>>>>
>>>>> The Guest network info is: vlan 5 | 10.5.0.0
>>>>>
>>>>> So, when logging on as guest, it appears as though a redirect attempts
>>>>> to happen, but doing a port scan shows that a computer attached to the
>>>>> guest SSID does not have http/https available to them on 10.4.0.3 - the
>>>>> captive portal.
>>>>>
>>>>> looking at the PF iptables config, it appears as though there is a
>>>>> variable that says any registration network should have access to the
>>>>> captive portal. but that seems t not be the case.
>>>>>
>>>>> So, why am i trying to configure this?
>>>>> with guests on a different vlan, i can very easily control the
>>>>> bandwidth available to them in multiple places - from the WLC, from the
>>>>> core switches, or from our NetEnforcer.
>>>>>
>>>>> Basic network configuration is correct: PF can ping guest network
>>>>> gateway and WLC interfaces as well.
>>>>>
>>>>> But, it seems to me like its definitely in IPTables, but I'm hesitant
>>>>> to make changes in case what i'm trying to accomplish is way off base.
>>>>>
>>>>> Hopefully its somewhat clear what i’m trying to do here, any ideas?
>>>>>
>>>>> --
>>>>> Justin Nelson
>>>>> Network Engineer
>>>>> Augustana College
>>>>>
>>>>>
>>>>>
>>>>> ------------------------------------------------------------------------------
>>>>> One dashboard for servers and applications across Physical-Virtual-Cloud
>>>>> Widest out-of-the-box monitoring support with 50+ applications
>>>>> Performance metrics, stats and reports that give you Actionable Insights
>>>>> Deep dive visibility with transaction tracing using APM
>>>>> Insight.http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
>>>>>
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> PacketFence-users mailing
>>>>> [email protected]https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>
>>>>>
>>>>>
>>>>> --
>>>>> Fabrice [email protected] :: +1.514.447.4918 (x135) ::
>>>>> www.inverse.ca
>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence
>>>>> (http://packetfence.org)
>>>>>
>>>>>
>>>>>
>>>>> ------------------------------------------------------------------------------
>>>>> One dashboard for servers and applications across
>>>>> Physical-Virtual-Cloud
>>>>> Widest out-of-the-box monitoring support with 50+ applications
>>>>> Performance metrics, stats and reports that give you Actionable
>>>>> Insights
>>>>> Deep dive visibility with transaction tracing using APM Insight.
>>>>> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
>>>>> _______________________________________________
>>>>> PacketFence-users mailing list
>>>>> [email protected]
>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>
>>>>>
>>>>
>>>>
>>>> --
>>>> Justin Nelson
>>>> Network Engineer
>>>> Augustana College
>>>>
>>>>
>>>> ------------------------------------------------------------------------------
>>>> One dashboard for servers and applications across Physical-Virtual-Cloud
>>>> Widest out-of-the-box monitoring support with 50+ applications
>>>> Performance metrics, stats and reports that give you Actionable Insights
>>>> Deep dive visibility with transaction tracing using APM
>>>> Insight.http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
>>>>
>>>>
>>>>
>>>> _______________________________________________
>>>> PacketFence-users mailing
>>>> [email protected]https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>
>>>>
>>>>
>>>> --
>>>> Fabrice [email protected] :: +1.514.447.4918 (x135) ::
>>>> www.inverse.ca
>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence
>>>> (http://packetfence.org)
>>>>
>>>>
>>>>
>>>> ------------------------------------------------------------------------------
>>>> One dashboard for servers and applications across Physical-Virtual-Cloud
>>>> Widest out-of-the-box monitoring support with 50+ applications
>>>> Performance metrics, stats and reports that give you Actionable Insights
>>>> Deep dive visibility with transaction tracing using APM Insight.
>>>> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
>>>> _______________________________________________
>>>> PacketFence-users mailing list
>>>> [email protected]
>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>
>>>>
>>>
>>>
>>> --
>>> Justin Nelson
>>> Network Engineer
>>> Augustana College
>>>
>>>
>>> ------------------------------------------------------------------------------
>>> One dashboard for servers and applications across Physical-Virtual-Cloud
>>> Widest out-of-the-box monitoring support with 50+ applications
>>> Performance metrics, stats and reports that give you Actionable Insights
>>> Deep dive visibility with transaction tracing using APM
>>> Insight.http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
>>>
>>>
>>>
>>> _______________________________________________
>>> PacketFence-users mailing
>>> [email protected]https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>
>>>
>>>
>>> --
>>> Fabrice [email protected] :: +1.514.447.4918 (x135) ::
>>> www.inverse.ca
>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence
>>> (http://packetfence.org)
>>>
>>>
>>>
>>> ------------------------------------------------------------------------------
>>> One dashboard for servers and applications across Physical-Virtual-Cloud
>>> Widest out-of-the-box monitoring support with 50+ applications
>>> Performance metrics, stats and reports that give you Actionable Insights
>>> Deep dive visibility with transaction tracing using APM Insight.
>>> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
>>> _______________________________________________
>>> PacketFence-users mailing list
>>> [email protected]
>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>
>>>
>>
>>
>> --
>> Justin Nelson
>> Network Engineer
>> Augustana College
>>
>>
>> ------------------------------------------------------------------------------
>> One dashboard for servers and applications across Physical-Virtual-Cloud
>> Widest out-of-the-box monitoring support with 50+ applications
>> Performance metrics, stats and reports that give you Actionable Insights
>> Deep dive visibility with transaction tracing using APM
>> Insight.http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
>>
>>
>>
>> _______________________________________________
>> PacketFence-users mailing
>> [email protected]https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>
>>
>>
>> --
>> Fabrice [email protected] :: +1.514.447.4918 (x135) ::
>> www.inverse.ca
>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence
>> (http://packetfence.org)
>>
>>
>>
>> ------------------------------------------------------------------------------
>> One dashboard for servers and applications across Physical-Virtual-Cloud
>> Widest out-of-the-box monitoring support with 50+ applications
>> Performance metrics, stats and reports that give you Actionable Insights
>> Deep dive visibility with transaction tracing using APM Insight.
>> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
>> _______________________________________________
>> PacketFence-users mailing list
>> [email protected]
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>
>>
>
>
> --
> Justin Nelson
> Network Engineer
> Augustana College
>
>
> ------------------------------------------------------------------------------
> One dashboard for servers and applications across Physical-Virtual-Cloud
> Widest out-of-the-box monitoring support with 50+ applications
> Performance metrics, stats and reports that give you Actionable Insights
> Deep dive visibility with transaction tracing using APM
> Insight.http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
>
>
>
> _______________________________________________
> PacketFence-users mailing
> [email protected]https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
>
>
> --
> Fabrice [email protected] :: +1.514.447.4918 (x135) :: www.inverse.ca
> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence
> (http://packetfence.org)
>
>
>
> ------------------------------------------------------------------------------
> One dashboard for servers and applications across Physical-Virtual-Cloud
> Widest out-of-the-box monitoring support with 50+ applications
> Performance metrics, stats and reports that give you Actionable Insights
> Deep dive visibility with transaction tracing using APM Insight.
> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
>
--
Justin Nelson
Network Engineer
Augustana College
------------------------------------------------------------------------------
One dashboard for servers and applications across Physical-Virtual-Cloud
Widest out-of-the-box monitoring support with 50+ applications
Performance metrics, stats and reports that give you Actionable Insights
Deep dive visibility with transaction tracing using APM Insight.
http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users