Fabrice,

1st of all: thanks for all the help.

2nd: my issue wound up being my WLC access list - i forgot to permit the
guest network PF portal ip address ( 10.5.0.3) in my PreAuthACL.  So, once
I put that in, the loop on the guest side stopped, and its working like I
had wanted.  Testing so far looks good.

thanks again!

On Mon, May 25, 2015 at 7:46 AM, Fabrice DURAND <[email protected]> wrote:

>  Hello Justin,
>
> to have radius in debug mode let's kill radius before (pkill radiusd) and
> retry.
>
> Other stuff, can you check in httpd.portal.access to see if it's the
> portal that loop or the wlc.
> If it's the wlc then you probably have to check the debug/acl.
>
> Regards
> Fabrice
>
>
>
> Le 2015-05-22 11:29, J Nelson a écrit :
>
>  Ok, so the headers looks something like this, it repeats forever when
> redirected:
>
> GET /cep0a5a10 HTTP/1.1
> Host: 10.5.0.3
> User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:38.0) Gecko/20100101 Firefox/38.0
> Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
> Accept-Language: en-US,en;q=0.5
> Accept-Encoding: gzip, deflate
> Connection: keep-alive
> Cache-Control: max-age=0
>
> HTTP/1.1 200 OK
> Location: http://10.5.0.3/cep0a5a10
> Content-Type: text/html
> Content-Length: 278
> ----------------------------------------------------------http://10.5.0.3/cep0a5a10
>
> GET /cep0a5a10 HTTP/1.1
> Host: 10.5.0.3
> User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:38.0) Gecko/20100101 Firefox/38.0
> Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
> Accept-Language: en-US,en;q=0.5
> Accept-Encoding: gzip, deflate
> Connection: keep-alive
> Cache-Control: max-age=0
>
> HTTP/1.1 200 OK
> Location: http://10.5.0.3/cep0a5a10
> Content-Type: text/html
> Content-Length: 278
> ----------------------------------------------------------http://10.5.0.3/cep0a5a10
>
> GET /cep0a5a10 HTTP/1.1
> Host: 10.5.0.3
> User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:38.0) Gecko/20100101 Firefox/38.0
> Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
> Accept-Language: en-US,en;q=0.5
> Accept-Encoding: gzip, deflate
> Connection: keep-alive
> Cache-Control: max-age=0
>
> As for the radius debug, there is quite a bit of output, what am i looking
> for?  I guess I can copy what I found interesting in it that would pertain
> to the WLC:
>
> rlm_sql (sql): Read entry
> nasname=172.16.4.4,shortname=172.16.4.4,secret=private
> rlm_sql (sql): Adding client 172.16.4.4 (172.16.4.4, server=<none>) to
> clients list
>
> adiusd: #### Opening IP addresses and Ports ####
> listen {
>      type = "auth"
>      virtual_server = "packetfence"
>      ipaddr = 10.10.1.13
>      port = 0
> Failed binding to authentication address 10.10.1.13 port 1812 as server
> packetfence: Address already in use
> /usr/local/pf/raddb//radiusd.conf[37]: Error binding to port for
> 10.10.1.13 port 1812
>
>  radiusd.conf line starting at line 37:
>
> listen {
>         type = auth
>         ipaddr = 10.10.1.13
>         port = 0
>         virtual_server = packetfence
> }
>
> listen {
>         ipaddr = 10.10.1.13
>         port = 0
>         type = acct
>         virtual_server = packetfence
> }
>
>
> On Thu, May 21, 2015 at 3:02 PM, Fabrice DURAND <[email protected]>
> wrote:
>
>>  Ok so the problem is elsewhere.
>>
>> Can you check with radius in debug mode is the vsa are correct ?
>> radiusd -d /usr/local/pf/raddb/ -X
>>
>> And on the client side with Live HTTP Headers (firefox extension) what
>> contain the redirection ?
>>
>> Regards
>> Fabrice
>>
>>
>> Le 2015-05-21 15:46, J Nelson a écrit :
>>
>>   I'm running version 4.5.1
>>
>>  my subroutine looks like:
>> sub returnRadiusAccessAccept {
>>     my ($this, $vlan, $mac, $port, $connection_type, $user_name, $ssid,
>> $wasInline, $user_role) = @_;
>>     my $logger = Log::Log4perl::get_logger( ref($this) );
>>
>>     my $radius_reply_ref = {};
>>
>>     my $role = $this->getRoleByName($user_role);
>>     # Roles are configured and the user should have one
>>     if (defined($role) && isenabled($this->{_RoleMap})) {
>>         my $node_info = node_view($mac);
>>         if ($node_info->{'status'} eq $pf::node::STATUS_REGISTERED) {
>>             $radius_reply_ref = {
>>                 'User-Name' => $mac,
>>                 $this->returnRoleAttribute => $role,
>>             };
>>         }
>>         else {
>>             my (%session_id);
>>             pf::web::util::session(\%session_id,undef,6);
>>             $session_id{client_mac} = $mac;
>>             $session_id{wlan} = $ssid;
>>             $session_id{switch_id} = $this->{_id};
>>      my $portal_url;
>>             if ( $ssid eq "Webreg-Production") {
>>                 $portal_url='http://10.4.0.3';
>>             }elsif ( $ssid eq "Augie-Guest") {
>>                 $portal_url='http://10.5.0.3';
>>             } else {
>>                $portal_url=$this->{'_portalURL'};
>>             }
>>
>>             $radius_reply_ref = {
>>                 'User-Name' => $mac,
>>                 'Cisco-AVPair' =>
>> ["url-redirect-acl=$role","url-redirect=".$portal_url."/cep$session_id{_session_id}"],
>>             };
>>         }
>>         $logger->info("[$mac] (".$this->{'_id'}.") Returning ACCEPT with
>> role: $role");
>>     }
>>
>>  its different than what you posted.  If I put in the entire code that
>> you posted, neither of the SSID's will work anymore.  If I include this
>> code:
>> my $portal_url;
>>             if ( $ssid eq "Webreg-Production") {
>>                 $portal_url='http://10.4.0.3';
>>             }elsif ( $ssid eq "Augie-Guest") {
>>                 $portal_url='http://10.5.0.3';
>>             } else {
>>                $portal_url=$this->{'_portalURL'};
>>             }
>>
>>             $radius_reply_ref = {
>>                 'User-Name' => $mac,
>>                 'Cisco-AVPair' =>
>> ["url-redirect-acl=$role","url-redirect=".$portal_url."/cep$session_id{_session_id}"],
>>             };
>>         }
>>         $logger->info("[$mac] (".$this->{'_id'}.") Returning ACCEPT with
>> role: $role");
>>     }
>>
>>  then Webreg-Production works, and Augie-Guest appears to continuously
>> loop.
>>
>>
>>
>> On Thu, May 21, 2015 at 12:05 PM, Fabrice DURAND <[email protected]>
>> wrote:
>>
>>>  The function is like that ? :
>>>
>>> sub returnRadiusAccessAccept {
>>>     my ($this, $vlan, $mac, $port, $connection_type, $user_name, $ssid,
>>> $wasInline, $user_role) = @_;
>>>     my $logger = Log::Log4perl::get_logger( ref($this) );
>>>
>>>     my $radius_reply_ref = {};
>>>
>>>     my $role = $this->getRoleByName($user_role);
>>>     # Roles are configured and the user should have one
>>>     if (defined($role) && isenabled($this->{_RoleMap})) {
>>>         my $node_info = node_view($mac);
>>>          my $violation = pf::violation::violation_view_top($mac);
>>>         if ($node_info->{'status'} eq $pf::node::STATUS_REGISTERED &&
>>> !defined($violation)) {
>>>             $radius_reply_ref = {
>>>                 'User-Name' => $mac,
>>>                 $this->returnRoleAttribute => $role,
>>>             };
>>>         }
>>>         else {
>>>             my (%session_id);
>>>             pf::web::util::session(\%session_id,undef,6);
>>>             $session_id{client_mac} = $mac;
>>>             $session_id{wlan} = $ssid;
>>>             $session_id{switch_id} = $this->{_id};
>>>              pf::locationlog::locationlog_set_session($mac,
>>> $session_id{_session_id});
>>>             my $portal_url;
>>>             if ( $ssid eq "Webreg-Production") {
>>>                 $portal_url='http://10.4.0.3';
>>>             }elsif ( $ssid eq "Augie-Guest") {
>>>                 $portal_url='http://10.5.0.3';
>>>             } else {
>>>                $portal_url=$this->{'_portalURL'};
>>>             }
>>>
>>>             $radius_reply_ref = {
>>>                 'User-Name' => $mac,
>>>                 'Cisco-AVPair' =>
>>> ["url-redirect-acl=$role","url-redirect=".$portal_url."/cep$session_id{_session_id}"],
>>>             };
>>>         }
>>>          $logger->info("[$mac] (".$this->{'_id'}.") Returning ACCEPT
>>> with role: $role");
>>>     }
>>>
>>>  Also check the httpd.admin... log files, you should be able to see what
>>> is the error.
>>>
>>> Regards
>>> Fabrice
>>>
>>>
>>>
>>>
>>>
>>> Le 2015-05-21 12:28, J Nelson a écrit :
>>>
>>>    Closer, but not quite.  So, my code now looks like:
>>>
>>>   my $portal_url;
>>>         if ( $ssid eq "Webreg-Production") {
>>>          $portal_url='http://10.4.0.3';
>>>         }elsif ( $ssid eq "Augie-Guest") {
>>>          $portal_url='http://10.5.0.3';
>>>         } else {
>>>         $portal_url=$this->{'_portalURL'};
>>> };
>>>
>>> $radius_reply_ref = {
>>> 'User-Name' => $mac,
>>> 'Cisco-AVPair' =>
>>> ["url-redirect-acl=$role","url-redirect=".$portal_url."/cep$session_id{_session_id}"],
>>> };
>>>         }
>>>
>>>  So this is what I am experiencing now:
>>>  Webreg-Production SSID works
>>>  Augie-Guest SSID continues to loop
>>>  in the packetfence GUI, under Network, when I click Switches i get:
>>> *Error!* An error occured while contacting the server. Please try again
>>> later.
>>>  I'm not seeing an error when packetfence starts.
>>>
>>> On Thu, May 21, 2015 at 10:40 AM, Fabrice DURAND <[email protected]>
>>> wrote:
>>>
>>>>  Hi Nelson,
>>>>
>>>> my bad:
>>>>
>>>> $portal_url="10.4.0.3"; => $portal_url='http://10.4.0.3';
>>>> $portal_url="10.5.0.3"; => $portal_url='http://10.5.0.3';
>>>>
>>>> Regards
>>>> Fabrice
>>>>
>>>>
>>>> Le 2015-05-21 10:47, J Nelson a écrit :
>>>>
>>>>  Fabrice,
>>>>
>>>>  I tried to add what you provided to the code of WLC_http.pm, but once
>>>> I do it, I get put into an endless redirect loop on both networks.  I do
>>>> see that each network is trying to redirect to the proper portal IP.  I'm
>>>> putting what I have in WLC_http.pm - i'm including some lines before and
>>>> after the code tweak you provided - just so you can see if anything is
>>>> missing before/after like a { or ; somewhere.
>>>>
>>>>   my $role = $this->getRoleByName($user_role);
>>>>     # Roles are configured and the user should have one
>>>>     if (defined($role) && isenabled($this->{_RoleMap})) {
>>>>         my $node_info = node_view($mac);
>>>>         if ($node_info->{'status'} eq $pf::node::STATUS_REGISTERED) {
>>>>             $radius_reply_ref = {
>>>>                 'User-Name' => $mac,
>>>>                 $this->returnRoleAttribute => $role,
>>>>             };
>>>>         }
>>>>         else {
>>>>             my (%session_id);
>>>>             pf::web::util::session(\%session_id,undef,6);
>>>>             $session_id{client_mac} = $mac;
>>>>             $session_id{wlan} = $ssid;
>>>>             $session_id{switch_id} = $this->{_id};
>>>>     my $portal_url;
>>>>         if ( $ssid eq "Webreg-Production") {
>>>>         $portal_url="10.4.0.3";
>>>>         }elsif ( $ssid eq "Augie-Guest") {
>>>>         $portal_url="10.5.0.3";
>>>>         } else {
>>>>         $portal_url=$this->{'_portalURL'};
>>>>         }
>>>>
>>>>         $radius_reply_ref = {
>>>>         'User-Name' => $mac,
>>>>         'Cisco-AVPair' =>
>>>> ["url-redirect-acl=$role","url-redirect=".$portal_url."/cep$session_id{_session_id}"],
>>>>         };
>>>>
>>>>         }
>>>>         $logger->info("[$mac] (".$this->{'_id'}.") Returning ACCEPT
>>>> with role: $role");
>>>>     }
>>>>
>>>>
>>>>
>>>>
>>>> On Wed, May 20, 2015 at 9:33 AM, Fabrice DURAND <[email protected]>
>>>> wrote:
>>>>
>>>>>  Hi John,
>>>>>
>>>>> so you will have to go in the code because there is only one portal
>>>>> url per switch config.
>>>>>
>>>>> So let's do a hack:
>>>>>
>>>>> https://github.com/inverse-inc/packetfence/blob/devel/lib/pf/Switch/Cisco/WLC_http.pm#L161
>>>>>
>>>>> my $portal_url;
>>>>> if ( $ssid eq "Staff") {
>>>>> $portal_url="10.4.0.3";
>>>>> }elsif ( $ssid eq "Guest") {
>>>>> $portal_url="10.5.0.3";
>>>>> } else {
>>>>> $portal_url=$this->{'_portalURL'};
>>>>> }
>>>>>
>>>>> $radius_reply_ref = {
>>>>> 'User-Name' => $mac,
>>>>> 'Cisco-AVPair' =>
>>>>> ["url-redirect-acl=$role","url-redirect=".$portal_url."/cep$session_id{_session_id}"],
>>>>> };
>>>>>
>>>>>
>>>>> Regards
>>>>> Fabrice
>>>>>
>>>>>
>>>>>
>>>>> Le 2015-05-20 09:40, J Nelson a écrit :
>>>>>
>>>>>     Fabrice, I am purely Web Auth via Cisco WLC.
>>>>>
>>>>>  So, in that configuration, I dont believe there is any way to change
>>>>> VLANs - as Web Auth is purely controlling access via ACL's on the WLC.
>>>>>  - now if i'm wrong on this, I need to be pointed in the right
>>>>> direction.
>>>>>
>>>>>  So, I am trying to figure out how to basically have two registration
>>>>> interfaces in a pure WLC Web Auth setup:
>>>>>  Vlan4 - Staff/Fac
>>>>>  Vlan5 - Guest
>>>>>
>>>>>  but, it looks like I can only have portal, since i setup Vlan 4 first
>>>>> - the portal exists on that address space/subnet.  So, the issue I'm
>>>>> having, when i join the Guest network, a client in that network is unable
>>>>> to get to the portal page.  It looks like a redirect is happening, but i
>>>>> just cant get to it (the PF portal).  The ACL on the WLC is indicating 
>>>>> that
>>>>> the traffic is being passed, but I dont believe IPtables on the PF box is
>>>>> allowing it. A client in the Guest network definitely cannot get to
>>>>> http/https on the PF portal ip address (confirming via an NMAP scan).
>>>>>
>>>>>  So i guess the question is, providing you understand what I'm trying
>>>>> to accomplish,can i have multiple Registration interfaces  that use the
>>>>> same PF portal? And what are the configuration requirements?  Throwing up
>>>>> two PF boxes - one for Staff/Fac/Student one for Guest would certainly
>>>>> work, just curious if I can do it all in one box.
>>>>>
>>>>>  thanks..
>>>>>
>>>>> On Wed, May 20, 2015 at 8:23 AM, Fabrice DURAND <[email protected]>
>>>>> wrote:
>>>>>
>>>>>>  Hello Nelson,
>>>>>>
>>>>>> i am not sure to understand what you really want to do.
>>>>>>
>>>>>> Let's say you have a registration network: VLAN 4
>>>>>> A production network for the staff and a production network for the
>>>>>> guest (5).
>>>>>>
>>>>>> When a device is unreg then packetfence will return the vlan 5 and
>>>>>> the device will hit the portal.
>>>>>> Then depending if it's a Staff or a guest then after registration the
>>>>>> device will be placed on his production network (depending of his role).
>>>>>>
>>>>>> Is it something like that you want to achieve ?
>>>>>>
>>>>>> Regards
>>>>>> Fabrice
>>>>>>
>>>>>>
>>>>>> Le 2015-05-19 14:18, J Nelson a écrit :
>>>>>>
>>>>>>   any role configured on a different subnet other than the native
>>>>>> subnet where the captive portal is located will not work.
>>>>>>
>>>>>> So, what i do have working is my Fac-Staff SSID which is on VLAN 4/
>>>>>> 10.4.0.0/24
>>>>>> captive portal is located at: 10.4.0.3
>>>>>> WLC is configured at Network | Switches | and is configured to do
>>>>>> Role by Switch Role, where WLC ACL’s are entered to define Registration 
>>>>>> and
>>>>>> then Fac-Staff access upon registration.
>>>>>>
>>>>>> The Portal URL is in the Fac-Staff registration network - IP address,
>>>>>> in this case: 10.4.0.3
>>>>>>
>>>>>> So, the problem I’m running into, is that i want Guests on a
>>>>>> different subnet and SSID other than where Fac-Staff reside.  So I 
>>>>>> create a
>>>>>> new interface, on a different subnet, as: Type - Registration, and
>>>>>> configure a new SSID on the WLC side.
>>>>>>
>>>>>> So, for now, I configure the WLC under switches with the same ACL’s
>>>>>> as Fac-Staff for the Guest role - just for simplicity i’m using the same
>>>>>> ACL’s for now, since I know they work.
>>>>>>
>>>>>> The Guest network info is: vlan 5 | 10.5.0.0
>>>>>>
>>>>>> So, when logging on as guest, it appears as though a redirect
>>>>>> attempts to happen, but doing a port scan shows that a computer attached 
>>>>>> to
>>>>>> the guest SSID does not have http/https available to them on 10.4.0.3 - 
>>>>>> the
>>>>>> captive portal.
>>>>>>
>>>>>> looking at the PF iptables config, it appears as though there is a
>>>>>> variable that says any registration network should have access to the
>>>>>> captive portal. but that seems t not be the case.
>>>>>>
>>>>>> So, why am i trying to configure this?
>>>>>> with guests on a different vlan, i can very easily control the
>>>>>> bandwidth available to them in multiple places - from the WLC, from the
>>>>>> core switches, or from our NetEnforcer.
>>>>>>
>>>>>>  Basic network configuration is correct: PF can ping guest network
>>>>>> gateway and WLC interfaces as well.
>>>>>>
>>>>>>  But, it seems to me like its definitely in IPTables, but I'm
>>>>>> hesitant to make changes in case what i'm trying to accomplish is way off
>>>>>> base.
>>>>>>
>>>>>> Hopefully its somewhat clear what i’m trying to do here, any ideas?
>>>>>>
>>>>>> --
>>>>>>   Justin Nelson
>>>>>>  Network Engineer
>>>>>>  Augustana College
>>>>>>
>>>>>>
>>>>>>  
>>>>>> ------------------------------------------------------------------------------
>>>>>> One dashboard for servers and applications across Physical-Virtual-Cloud
>>>>>> Widest out-of-the-box monitoring support with 50+ applications
>>>>>> Performance metrics, stats and reports that give you Actionable Insights
>>>>>> Deep dive visibility with transaction tracing using APM 
>>>>>> Insight.http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
>>>>>>
>>>>>>
>>>>>>
>>>>>> _______________________________________________
>>>>>> PacketFence-users mailing 
>>>>>> [email protected]https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>>
>>>>>>
>>>>>>
>>>>>> --
>>>>>> Fabrice [email protected] ::  +1.514.447.4918 (x135) ::  
>>>>>> www.inverse.ca
>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
>>>>>> (http://packetfence.org)
>>>>>>
>>>>>>
>>>>>>
>>>>>> ------------------------------------------------------------------------------
>>>>>> One dashboard for servers and applications across
>>>>>> Physical-Virtual-Cloud
>>>>>> Widest out-of-the-box monitoring support with 50+ applications
>>>>>> Performance metrics, stats and reports that give you Actionable
>>>>>> Insights
>>>>>> Deep dive visibility with transaction tracing using APM Insight.
>>>>>> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
>>>>>> _______________________________________________
>>>>>> PacketFence-users mailing list
>>>>>> [email protected]
>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>>
>>>>>>
>>>>>
>>>>>
>>>>> --
>>>>>   Justin Nelson
>>>>>  Network Engineer
>>>>>  Augustana College
>>>>>
>>>>>
>>>>> ------------------------------------------------------------------------------
>>>>> One dashboard for servers and applications across Physical-Virtual-Cloud
>>>>> Widest out-of-the-box monitoring support with 50+ applications
>>>>> Performance metrics, stats and reports that give you Actionable Insights
>>>>> Deep dive visibility with transaction tracing using APM 
>>>>> Insight.http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
>>>>>
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> PacketFence-users mailing 
>>>>> [email protected]https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>
>>>>>
>>>>>
>>>>> --
>>>>> Fabrice [email protected] ::  +1.514.447.4918 (x135) ::  
>>>>> www.inverse.ca
>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
>>>>> (http://packetfence.org)
>>>>>
>>>>>
>>>>>
>>>>> ------------------------------------------------------------------------------
>>>>> One dashboard for servers and applications across
>>>>> Physical-Virtual-Cloud
>>>>> Widest out-of-the-box monitoring support with 50+ applications
>>>>> Performance metrics, stats and reports that give you Actionable
>>>>> Insights
>>>>> Deep dive visibility with transaction tracing using APM Insight.
>>>>> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
>>>>> _______________________________________________
>>>>> PacketFence-users mailing list
>>>>> [email protected]
>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>
>>>>>
>>>>
>>>>
>>>> --
>>>>   Justin Nelson
>>>>  Network Engineer
>>>>  Augustana College
>>>>
>>>>
>>>> ------------------------------------------------------------------------------
>>>> One dashboard for servers and applications across Physical-Virtual-Cloud
>>>> Widest out-of-the-box monitoring support with 50+ applications
>>>> Performance metrics, stats and reports that give you Actionable Insights
>>>> Deep dive visibility with transaction tracing using APM 
>>>> Insight.http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
>>>>
>>>>
>>>>
>>>> _______________________________________________
>>>> PacketFence-users mailing 
>>>> [email protected]https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>
>>>>
>>>>
>>>> --
>>>> Fabrice [email protected] ::  +1.514.447.4918 (x135) ::  
>>>> www.inverse.ca
>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
>>>> (http://packetfence.org)
>>>>
>>>>
>>>>
>>>> ------------------------------------------------------------------------------
>>>> One dashboard for servers and applications across Physical-Virtual-Cloud
>>>> Widest out-of-the-box monitoring support with 50+ applications
>>>> Performance metrics, stats and reports that give you Actionable Insights
>>>> Deep dive visibility with transaction tracing using APM Insight.
>>>> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
>>>> _______________________________________________
>>>> PacketFence-users mailing list
>>>> [email protected]
>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>
>>>>
>>>
>>>
>>> --
>>>   Justin Nelson
>>>  Network Engineer
>>>  Augustana College
>>>
>>>
>>> ------------------------------------------------------------------------------
>>> One dashboard for servers and applications across Physical-Virtual-Cloud
>>> Widest out-of-the-box monitoring support with 50+ applications
>>> Performance metrics, stats and reports that give you Actionable Insights
>>> Deep dive visibility with transaction tracing using APM 
>>> Insight.http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
>>>
>>>
>>>
>>> _______________________________________________
>>> PacketFence-users mailing 
>>> [email protected]https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>
>>>
>>>
>>> --
>>> Fabrice [email protected] ::  +1.514.447.4918 (x135) ::  
>>> www.inverse.ca
>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
>>> (http://packetfence.org)
>>>
>>>
>>>
>>> ------------------------------------------------------------------------------
>>> One dashboard for servers and applications across Physical-Virtual-Cloud
>>> Widest out-of-the-box monitoring support with 50+ applications
>>> Performance metrics, stats and reports that give you Actionable Insights
>>> Deep dive visibility with transaction tracing using APM Insight.
>>> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
>>> _______________________________________________
>>> PacketFence-users mailing list
>>> [email protected]
>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>
>>>
>>
>>
>> --
>>   Justin Nelson
>>  Network Engineer
>>  Augustana College
>>
>>
>> ------------------------------------------------------------------------------
>> One dashboard for servers and applications across Physical-Virtual-Cloud
>> Widest out-of-the-box monitoring support with 50+ applications
>> Performance metrics, stats and reports that give you Actionable Insights
>> Deep dive visibility with transaction tracing using APM 
>> Insight.http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
>>
>>
>>
>> _______________________________________________
>> PacketFence-users mailing 
>> [email protected]https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>
>>
>>
>> --
>> Fabrice [email protected] ::  +1.514.447.4918 (x135) ::  
>> www.inverse.ca
>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
>> (http://packetfence.org)
>>
>>
>>
>> ------------------------------------------------------------------------------
>> One dashboard for servers and applications across Physical-Virtual-Cloud
>> Widest out-of-the-box monitoring support with 50+ applications
>> Performance metrics, stats and reports that give you Actionable Insights
>> Deep dive visibility with transaction tracing using APM Insight.
>> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
>> _______________________________________________
>> PacketFence-users mailing list
>> [email protected]
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>
>>
>
>
> --
>   Justin Nelson
>  Network Engineer
>  Augustana College
>
>
> ------------------------------------------------------------------------------
> One dashboard for servers and applications across Physical-Virtual-Cloud
> Widest out-of-the-box monitoring support with 50+ applications
> Performance metrics, stats and reports that give you Actionable Insights
> Deep dive visibility with transaction tracing using APM 
> Insight.http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
>
>
>
> _______________________________________________
> PacketFence-users mailing 
> [email protected]https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
>
>
> --
> Fabrice [email protected] ::  +1.514.447.4918 (x135) ::  www.inverse.ca
> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
> (http://packetfence.org)
>
>
>
> ------------------------------------------------------------------------------
> One dashboard for servers and applications across Physical-Virtual-Cloud
> Widest out-of-the-box monitoring support with 50+ applications
> Performance metrics, stats and reports that give you Actionable Insights
> Deep dive visibility with transaction tracing using APM Insight.
> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
>


-- 
Justin Nelson
Network Engineer
Augustana College
------------------------------------------------------------------------------
One dashboard for servers and applications across Physical-Virtual-Cloud 
Widest out-of-the-box monitoring support with 50+ applications
Performance metrics, stats and reports that give you Actionable Insights
Deep dive visibility with transaction tracing using APM Insight.
http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to