I haven't tried yet with multiple SSIDs, but I don't think I've seen that problem before in my testing. I was having so much trouble I wanted to keep things as simple as possible.
The closest I has to that problem was that on an AP running 14.07 with 2.4 and 5 Ghz I could only enable one or the other frequency radio. I was able to fix that by upgrading to chaos calmer (trunk) a month or so back before rc1. I haven't been able to test the working hostapd.sh script on chaos calmer yet, so I'm not sure that's a solution or a way to have more problems. Sorry if that's not useful but that's what I know so far. Probably worth a post to the OpenWRT forums to see if they can help. -earl On Mon, Jun 1, 2015 at 11:55 AM, Chris Abel <[email protected]> wrote: > Hey Earl, > > I'm hitting one issue actually with the hostapd.sh file. Wireless becomes > disabled when you try to configure multiple SSIDs. Do you also see this > behavior? > > Thanks, > Chris > > On Thu, May 28, 2015 at 3:13 PM, Earl Robinson <[email protected]> wrote: > >> My pleasure Chris, >> >> I'm not really that familiar with the entire script and whether or not >> the version I've posted is fully functional, or if it just happens to work >> for my setup. I've reached out to the OpenWRT folks to see if there's some >> way to merge the functionality into the most recent hostapd.sh script, but >> I don't know yet what they're willing to do. >> >> -earl >> >> On Wed, May 27, 2015 at 12:45 PM, Chris Abel <[email protected]> >> wrote: >> >>> Thanks so much Earl. Your hostapd.sh patch is working perfectly for me >>> as well. Great to have PF work with the latest version of OpenWRT. >>> >>> On Thu, May 21, 2015 at 4:02 PM, Earl Robinson <[email protected]> >>> wrote: >>> >>>> I've got it working! >>>> >>>> The solution was merging your version of /lib/netifd/hostapd.sh with >>>> some changes from patch r41963 : >>>> https://dev.openwrt.org/changeset/41963 >>>> I think the secret sauce is the lines with vlan_naming. I've attached >>>> the version which is working for me. >>>> hostapd.sh : md5 2fcef5f0bf3b858f38a9132bde40868a >>>> >>>> This change tells the hostapd.sh script to join the wireless client to >>>> the existing bridge on vlan 11 named br-vlan11 rather than create a new >>>> bridge named breth0.11 >>>> >>>> Thanks again for your help >>>> -earl >>>> >>>> >>>> On Thu, May 21, 2015 at 2:46 PM, Earl Robinson <[email protected]> >>>> wrote: >>>> >>>>> nope, I've got /etc/config/hostapd.vlan >>>>> >>>>> # cat /etc/config/hostapd.vlan >>>>> * wlan0.# >>>>> >>>>> >>>>> On Thu, May 21, 2015 at 2:23 PM, Ludovic Zammit <[email protected]> >>>>> wrote: >>>>> >>>>>> Earl, >>>>>> >>>>>> Maybe you’re missing that part in your configuration: >>>>>> >>>>>> vlan_file=/etc/config/hostapd.vlan >>>>>> >>>>>> That file should contain: >>>>>> >>>>>> * wlan0.# >>>>>> >>>>>> To add that line in your configuration: >>>>>> >>>>>> uci add_list wireless.@wifi-iface >>>>>> [0].vlan_file=/etc/config/hostapd.vlan >>>>>> >>>>>> It will add the configuration on the first SSID [0]. >>>>>> >>>>>> Thanks, >>>>>> >>>>>> Ludovic [email protected] <[email protected]> :: >>>>>> +1.514.447.4918 (x145) :: www.inverse.ca >>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence >>>>>> (http://packetfence.org) >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> Le 2015-05-21 à 14:18, Ludovic Zammit <[email protected]> a écrit : >>>>>> >>>>>> HEllo Earl, >>>>>> >>>>>> Can you post the result of this command from the OpenWRT: >>>>>> >>>>>> cat /var/run/hostapd-phy0.conf >>>>>> >>>>>> Thanks, >>>>>> >>>>>> >>>>>> Ludovic [email protected] <[email protected]> :: >>>>>> +1.514.447.4918 (x145) :: www.inverse.ca >>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence >>>>>> (http://packetfence.org) >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> Le 2015-05-21 à 14:06, Earl Robinson <[email protected]> a écrit : >>>>>> >>>>>> Wow, >>>>>> >>>>>> That's got me so much closer. I now have RADIUS auth against >>>>>> packetfence with open SSID working. Apparently dynamic vlans on an open >>>>>> SSID isn't working yet on the devel (trunk v15 r46***) branch yet. >>>>>> Hopefully that will be resolved before the next release. >>>>>> >>>>>> So I'm left with issues with the wireless client on vlan 11 >>>>>> (wlan0.11) joining a new bridge breth0.11, instead of the existing >>>>>> br-vlan11 that I've configured. I posted to the openwrt wiki: >>>>>> https://forum.openwrt.org/viewtopic.php?id=53227 >>>>>> >>>>>> so hopefully they can help me get closer still. >>>>>> >>>>>> Thanks, >>>>>> Earl >>>>>> >>>>>> >>>>>> On Wed, May 20, 2015 at 4:21 PM, Earl Robinson <[email protected]> >>>>>> wrote: >>>>>> >>>>>>> Thanks, >>>>>>> >>>>>>> I'll try this out and see if it works better for me. I appreciate >>>>>>> you including the sample wireless config as well. I've had lots of >>>>>>> trouble >>>>>>> figuring out which config directives should work on various versions of >>>>>>> OpenWRT. >>>>>>> >>>>>>> -earl >>>>>>> >>>>>>> On Wed, May 20, 2015 at 11:57 AM, Ludovic Zammit <[email protected] >>>>>>> > wrote: >>>>>>> >>>>>>>> Earl, >>>>>>>> >>>>>>>> This is the /lib/netifd/hostapd.sh for 14.07 BB: >>>>>>>> >>>>>>>> hostapd_add_rate() { >>>>>>>> local var="$1" >>>>>>>> local val="$(($2 / 1000))" >>>>>>>> local sub="$((($2 / 100) % 10))" >>>>>>>> append $var "$val" "," >>>>>>>> [ $sub -gt 0 ] && append $var "." >>>>>>>> } >>>>>>>> >>>>>>>> hostapd_add_basic_rate() { >>>>>>>> local var="$1" >>>>>>>> local val="$(($2 / 100))" >>>>>>>> append $var "$val" " " >>>>>>>> } >>>>>>>> >>>>>>>> hostapd_append_wep_key() { >>>>>>>> local var="$1" >>>>>>>> >>>>>>>> wep_keyidx=0 >>>>>>>> set_default key 1 >>>>>>>> case "$key" in >>>>>>>> [1234]) >>>>>>>> for idx in 1 2 3 4; do >>>>>>>> local zidx >>>>>>>> zidx=$(($idx - 1)) >>>>>>>> json_get_var ckey "key${idx}" >>>>>>>> [ -n "$ckey" ] && \ >>>>>>>> append $var "wep_key${zidx}=$(prepare_key_wep "$ckey")" "$N$T" >>>>>>>> done >>>>>>>> wep_keyidx=$((key - 1)) >>>>>>>> ;; >>>>>>>> *) >>>>>>>> append $var "wep_key0=$(prepare_key_wep "$key")" "$N$T" >>>>>>>> ;; >>>>>>>> esac >>>>>>>> } >>>>>>>> >>>>>>>> hostapd_add_log_config() { >>>>>>>> config_add_boolean \ >>>>>>>> log_80211 \ >>>>>>>> log_8021x \ >>>>>>>> log_radius \ >>>>>>>> log_wpa \ >>>>>>>> log_driver \ >>>>>>>> log_iapp \ >>>>>>>> log_mlme >>>>>>>> >>>>>>>> config_add_int log_level >>>>>>>> } >>>>>>>> >>>>>>>> hostapd_common_add_device_config() { >>>>>>>> config_add_array basic_rate >>>>>>>> >>>>>>>> config_add_string country >>>>>>>> config_add_boolean country_ie doth >>>>>>>> config_add_string require_mode >>>>>>>> >>>>>>>> hostapd_add_log_config >>>>>>>> } >>>>>>>> >>>>>>>> hostapd_prepare_device_config() { >>>>>>>> local config="$1" >>>>>>>> local driver="$2" >>>>>>>> >>>>>>>> local base="${config%%.conf}" >>>>>>>> local base_cfg= >>>>>>>> >>>>>>>> json_get_vars country country_ie beacon_int doth require_mode >>>>>>>> >>>>>>>> hostapd_set_log_options base_cfg >>>>>>>> >>>>>>>> set_default country_ie 1 >>>>>>>> set_default doth 1 >>>>>>>> >>>>>>>> [ -n "$country" ] && { >>>>>>>> append base_cfg "country_code=$country" "$N" >>>>>>>> >>>>>>>> [ "$country_ie" -gt 0 ] && append base_cfg "ieee80211d=1" "$N" >>>>>>>> [ "$hwmode" = "a" -a "$doth" -gt 0 ] && append base_cfg >>>>>>>> "ieee80211h=1" "$N" >>>>>>>> } >>>>>>>> [ -n "$hwmode" ] && append base_cfg "hw_mode=$hwmode" "$N" >>>>>>>> >>>>>>>> local brlist= br >>>>>>>> json_get_values basic_rate_list basic_rate >>>>>>>> for br in $basic_rate_list; do >>>>>>>> hostapd_add_basic_rate brlist "$br" >>>>>>>> done >>>>>>>> case "$require_mode" in >>>>>>>> g) brlist="60 120 240" ;; >>>>>>>> n) append base_cfg "require_ht=1" "$N";; >>>>>>>> ac) append base_cfg "require_vht=1" "$N";; >>>>>>>> esac >>>>>>>> [ -n "$brlist" ] && append base_cfg "basic_rates=$brlist" "$N" >>>>>>>> [ -n "$beacon_int" ] && append base_cfg "beacon_int=$beacon_int" >>>>>>>> "$N" >>>>>>>> >>>>>>>> cat > "$config" <<EOF >>>>>>>> driver=$driver >>>>>>>> $base_cfg >>>>>>>> EOF >>>>>>>> } >>>>>>>> >>>>>>>> hostapd_common_add_bss_config() { >>>>>>>> config_add_string 'bssid:macaddr' 'ssid:string' >>>>>>>> config_add_boolean wds wmm hidden >>>>>>>> >>>>>>>> config_add_int maxassoc max_inactivity >>>>>>>> config_add_boolean disassoc_low_ack isolate short_preamble >>>>>>>> >>>>>>>> config_add_int \ >>>>>>>> wep_rekey eap_reauth_period \ >>>>>>>> wpa_group_rekey wpa_pair_rekey wpa_master_rekey >>>>>>>> >>>>>>>> config_add_boolean rsn_preauth auth_cache >>>>>>>> config_add_int ieee80211w >>>>>>>> >>>>>>>> config_add_string 'auth_server:host' 'server:host' >>>>>>>> config_add_string auth_secret >>>>>>>> config_add_int 'auth_port:port' 'port:port' >>>>>>>> >>>>>>>> config_add_string acct_server >>>>>>>> config_add_string acct_secret >>>>>>>> config_add_int acct_port >>>>>>>> >>>>>>>> config_add_string dae_client >>>>>>>> config_add_string dae_secret >>>>>>>> config_add_int dae_port >>>>>>>> >>>>>>>> config_add_string nasid >>>>>>>> config_add_string ownip >>>>>>>> config_add_string iapp_interface >>>>>>>> config_add_string eap_type ca_cert client_cert identity auth >>>>>>>> priv_key priv_key_pwd >>>>>>>> >>>>>>>> config_add_int dynamic_vlan vlan_naming >>>>>>>> config_add_string vlan_tagged_interface >>>>>>>> >>>>>>>> config_add_string 'key1:wepkey' 'key2:wepkey' 'key3:wepkey' >>>>>>>> 'key4:wepkey' 'password:wpakey' >>>>>>>> >>>>>>>> config_add_boolean wps_pushbutton wps_label ext_registrar >>>>>>>> wps_pbc_in_m1 >>>>>>>> config_add_string wps_device_type wps_device_name wps_manufacturer >>>>>>>> wps_pin >>>>>>>> >>>>>>>> config_add_int ieee80211w_max_timeout ieee80211w_retry_timeout >>>>>>>> >>>>>>>> config_add_string macfilter 'macfile:file' >>>>>>>> config_add_array 'maclist:list(macaddr)' >>>>>>>> >>>>>>>> config_add_int mcast_rate >>>>>>>> config_add_array basic_rate >>>>>>>> } >>>>>>>> >>>>>>>> hostapd_set_bss_options() { >>>>>>>> local var="$1" >>>>>>>> local phy="$2" >>>>>>>> local vif="$3" >>>>>>>> >>>>>>>> wireless_vif_parse_encryption >>>>>>>> >>>>>>>> local bss_conf >>>>>>>> local wep_rekey wpa_group_rekey wpa_pair_rekey wpa_master_rekey >>>>>>>> >>>>>>>> json_get_vars \ >>>>>>>> wep_rekey wpa_group_rekey wpa_pair_rekey wpa_master_rekey \ >>>>>>>> maxassoc max_inactivity disassoc_low_ack isolate auth_cache \ >>>>>>>> wps_pushbutton wps_label ext_registrar wps_pbc_in_m1 \ >>>>>>>> wps_device_type wps_device_name wps_manufacturer wps_pin \ >>>>>>>> macfilter ssid wmm hidden short_preamble rsn_preauth >>>>>>>> >>>>>>>> set_default isolate 0 >>>>>>>> set_default maxassoc 0 >>>>>>>> set_default max_inactivity 0 >>>>>>>> set_default short_preamble 1 >>>>>>>> set_default disassoc_low_ack 1 >>>>>>>> set_default hidden 0 >>>>>>>> set_default wmm 1 >>>>>>>> >>>>>>>> append bss_conf "ctrl_interface=/var/run/hostapd" >>>>>>>> if [ "$isolate" -gt 0 ]; then >>>>>>>> append bss_conf "ap_isolate=$isolate" "$N" >>>>>>>> fi >>>>>>>> if [ "$maxassoc" -gt 0 ]; then >>>>>>>> append bss_conf "max_num_sta=$maxassoc" "$N" >>>>>>>> fi >>>>>>>> if [ "$max_inactivity" -gt 0 ]; then >>>>>>>> append bss_conf "ap_max_inactivity=$max_inactivity" "$N" >>>>>>>> fi >>>>>>>> >>>>>>>> append bss_conf "disassoc_low_ack=$disassoc_low_ack" "$N" >>>>>>>> append bss_conf "preamble=$short_preamble" "$N" >>>>>>>> append bss_conf "wmm_enabled=$wmm" "$N" >>>>>>>> append bss_conf "ignore_broadcast_ssid=$hidden" "$N" >>>>>>>> >>>>>>>> [ "$wpa" -gt 0 ] && { >>>>>>>> [ -n "$wpa_group_rekey" ] && append bss_conf >>>>>>>> "wpa_group_rekey=$wpa_group_rekey" "$N" >>>>>>>> [ -n "$wpa_pair_rekey" ] && append bss_conf >>>>>>>> "wpa_ptk_rekey=$wpa_pair_rekey" "$N" >>>>>>>> [ -n "$wpa_master_rekey" ] && append bss_conf >>>>>>>> "wpa_gmk_rekey=$wpa_master_rekey" "$N" >>>>>>>> } >>>>>>>> >>>>>>>> case "$auth_type" in >>>>>>>> none) >>>>>>>> wps_possible=1 >>>>>>>> # Here we make the assumption that if we're in open mode >>>>>>>> # with WPS enabled, we got to be in unconfigured state. >>>>>>>> wps_not_configured=1 >>>>>>>> json_get_vars \ >>>>>>>> auth_server auth_secret auth_port \ >>>>>>>> acct_server acct_secret acct_port \ >>>>>>>> dae_client dae_secret dae_port \ >>>>>>>> nasid iapp_interface dynamic_vlan \ >>>>>>>> vlan_tagged_interface >>>>>>>> # legacy compatibility >>>>>>>> [ -n "$auth_server" ] || json_get_var auth_server server >>>>>>>> [ -n "$auth_port" ] || json_get_var auth_port port >>>>>>>> [ -n "$auth_secret" ] || json_get_var auth_secret key >>>>>>>> >>>>>>>> set_default auth_port 1812 >>>>>>>> set_default acct_port 1813 >>>>>>>> >>>>>>>> set_default vlan_naming 1 >>>>>>>> >>>>>>>> append bss_conf "auth_server_addr=$auth_server" "$N" >>>>>>>> append bss_conf "auth_server_port=$auth_port" "$N" >>>>>>>> append bss_conf "auth_server_shared_secret=$auth_secret" "$N" >>>>>>>> append bss_conf "vlan_file=/etc/config/hostapd.vlan" "$N" >>>>>>>> #Mac authentication >>>>>>>> append bss_conf "macaddr_acl=2" "$N" >>>>>>>> [ -n "$acct_server" ] && { >>>>>>>> append bss_conf "acct_server_addr=$acct_server" "$N" >>>>>>>> append bss_conf "acct_server_port=$acct_port" "$N" >>>>>>>> [ -n "$acct_secret" ] && \ >>>>>>>> append bss_conf "acct_server_shared_secret=$acct_secret" "$N" >>>>>>>> } >>>>>>>> [ -n "$dae_client" -a -n "$dae_secret" ] && { >>>>>>>> append bss_conf "radius_das_port=$dae_port" "$N" >>>>>>>> append bss_conf "radius_das_client=$dae_client $dae_secret" "$N" >>>>>>>> } >>>>>>>> >>>>>>>> append bss_conf "nas_identifier=$nasid" "$N" >>>>>>>> [ -n "$dynamic_vlan" ] && { >>>>>>>> append bss_conf "dynamic_vlan=$dynamic_vlan" "$N" >>>>>>>> append bss_conf "vlan_naming=$vlan_naming" "$N" >>>>>>>> [ -n "$vlan_tagged_interface" ] && \ >>>>>>>> append bss_conf "vlan_tagged_interface=$vlan_tagged_interface" "$N" >>>>>>>> } >>>>>>>> ;; >>>>>>>> psk) >>>>>>>> json_get_vars key >>>>>>>> if [ ${#key} -lt 8 ]; then >>>>>>>> wireless_setup_vif_failed INVALID_WPA_PSK >>>>>>>> return 1 >>>>>>>> elif [ ${#key} -eq 64 ]; then >>>>>>>> append bss_conf "wpa_psk=$key" "$N" >>>>>>>> else >>>>>>>> append bss_conf "wpa_passphrase=$key" "$N" >>>>>>>> json_get_vars \ >>>>>>>> auth_server auth_secret auth_port \ >>>>>>>> acct_server acct_secret acct_port \ >>>>>>>> dae_client dae_secret dae_port \ >>>>>>>> nasid iapp_interface dynamic_vlan \ >>>>>>>> vlan_tagged_interface >>>>>>>> # legacy compatibility >>>>>>>> [ -n "$auth_server" ] || json_get_var auth_server server >>>>>>>> [ -n "$auth_port" ] || json_get_var auth_port port >>>>>>>> [ -n "$auth_secret" ] || json_get_var auth_secret key >>>>>>>> >>>>>>>> set_default auth_port 1812 >>>>>>>> set_default acct_port 1813 >>>>>>>> >>>>>>>> set_default vlan_naming 1 >>>>>>>> >>>>>>>> append bss_conf "auth_server_addr=$auth_server" "$N" >>>>>>>> append bss_conf "auth_server_port=$auth_port" "$N" >>>>>>>> append bss_conf "auth_server_shared_secret=$auth_secret" "$N" >>>>>>>> append bss_conf "vlan_file=/etc/config/hostapd.vlan" "$N" >>>>>>>> #Mac authentication >>>>>>>> append bss_conf "macaddr_acl=2" "$N" >>>>>>>> [ -n "$acct_server" ] && { >>>>>>>> append bss_conf "acct_server_addr=$acct_server" "$N" >>>>>>>> append bss_conf "acct_server_port=$acct_port" "$N" >>>>>>>> [ -n "$acct_secret" ] && \ >>>>>>>> append bss_conf "acct_server_shared_secret=$acct_secret" "$N" >>>>>>>> } >>>>>>>> [ -n "$dae_client" -a -n "$dae_secret" ] && { >>>>>>>> append bss_conf "radius_das_port=$dae_port" "$N" >>>>>>>> append bss_conf "radius_das_client=$dae_client $dae_secret" "$N" >>>>>>>> } >>>>>>>> >>>>>>>> append bss_conf "nas_identifier=$nasid" "$N" >>>>>>>> [ -n "$dynamic_vlan" ] && { >>>>>>>> append bss_conf "dynamic_vlan=$dynamic_vlan" "$N" >>>>>>>> append bss_conf "vlan_naming=$vlan_naming" "$N" >>>>>>>> [ -n "$vlan_tagged_interface" ] && \ >>>>>>>> append bss_conf "vlan_tagged_interface=$vlan_tagged_interface" "$N" >>>>>>>> } >>>>>>>> >>>>>>>> fi >>>>>>>> wps_possible=1 >>>>>>>> ;; >>>>>>>> eap) >>>>>>>> json_get_vars \ >>>>>>>> auth_server auth_secret auth_port \ >>>>>>>> acct_server acct_secret acct_port \ >>>>>>>> dae_client dae_secret dae_port \ >>>>>>>> nasid iapp_interface ownip \ >>>>>>>> eap_reauth_period dynamic_vlan \ >>>>>>>> vlan_tagged_interface >>>>>>>> >>>>>>>> # legacy compatibility >>>>>>>> [ -n "$auth_server" ] || json_get_var auth_server server >>>>>>>> [ -n "$auth_port" ] || json_get_var auth_port port >>>>>>>> [ -n "$auth_secret" ] || json_get_var auth_secret key >>>>>>>> >>>>>>>> set_default auth_port 1812 >>>>>>>> set_default acct_port 1813 >>>>>>>> set_default dae_port 3799 >>>>>>>> >>>>>>>> set_default vlan_naming 1 >>>>>>>> >>>>>>>> append bss_conf "auth_server_addr=$auth_server" "$N" >>>>>>>> append bss_conf "auth_server_port=$auth_port" "$N" >>>>>>>> append bss_conf "auth_server_shared_secret=$auth_secret" "$N" >>>>>>>> append bss_conf "vlan_file=/etc/config/hostapd.vlan" "$N" >>>>>>>> >>>>>>>> [ -n "$acct_server" ] && { >>>>>>>> append bss_conf "acct_server_addr=$acct_server" "$N" >>>>>>>> append bss_conf "acct_server_port=$acct_port" "$N" >>>>>>>> [ -n "$acct_secret" ] && \ >>>>>>>> append bss_conf "acct_server_shared_secret=$acct_secret" "$N" >>>>>>>> } >>>>>>>> >>>>>>>> [ -n "$eap_reauth_period" ] && append bss_conf >>>>>>>> "eap_reauth_period=$eap_reauth_period" "$N" >>>>>>>> >>>>>>>> [ -n "$dae_client" -a -n "$dae_secret" ] && { >>>>>>>> append bss_conf "radius_das_port=$dae_port" "$N" >>>>>>>> append bss_conf "radius_das_client=$dae_client $dae_secret" "$N" >>>>>>>> } >>>>>>>> >>>>>>>> append bss_conf "nas_identifier=$nasid" "$N" >>>>>>>> [ -n "$ownip" ] && append bss_conf "own_ip_addr=$ownip" "$N" >>>>>>>> append bss_conf "eapol_key_index_workaround=1" "$N" >>>>>>>> append bss_conf "ieee8021x=1" "$N" >>>>>>>> append bss_conf "wpa_key_mgmt=WPA-EAP" "$N" >>>>>>>> >>>>>>>> [ -n "$dynamic_vlan" ] && { >>>>>>>> append bss_conf "dynamic_vlan=$dynamic_vlan" "$N" >>>>>>>> append bss_conf "vlan_naming=$vlan_naming" "$N" >>>>>>>> [ -n "$vlan_tagged_interface" ] && \ >>>>>>>> append bss_conf "vlan_tagged_interface=$vlan_tagged_interface" "$N" >>>>>>>> } >>>>>>>> ;; >>>>>>>> wep) >>>>>>>> local wep_keyidx=0 >>>>>>>> json_get_vars key >>>>>>>> hostapd_append_wep_key bss_conf >>>>>>>> append bss_conf "wep_default_key=$wep_keyidx" "$N" >>>>>>>> [ -n "$wep_rekey" ] && append bss_conf >>>>>>>> "wep_rekey_period=$wep_rekey" "$N" >>>>>>>> ;; >>>>>>>> esac >>>>>>>> >>>>>>>> local auth_algs=$((($auth_mode_shared << 1) | $auth_mode_open)) >>>>>>>> append bss_conf "auth_algs=${auth_algs:-1}" "$N" >>>>>>>> append bss_conf "wpa=$wpa" "$N" >>>>>>>> [ -n "$wpa_pairwise" ] && append bss_conf >>>>>>>> "wpa_pairwise=$wpa_pairwise" "$N" >>>>>>>> >>>>>>>> set_default wps_pushbutton 0 >>>>>>>> set_default wps_label 0 >>>>>>>> set_default wps_pbc_in_m1 0 >>>>>>>> >>>>>>>> config_methods= >>>>>>>> [ "$wps_pushbutton" -gt 0 ] && append config_methods push_button >>>>>>>> [ "$wps_label" -gt 0 ] && append config_methods label >>>>>>>> >>>>>>>> [ -n "$wps_possible" -a -n "$config_methods" ] && { >>>>>>>> set_default ext_registrar 0 >>>>>>>> set_default wps_device_type "6-0050F204-1" >>>>>>>> set_default wps_device_name "OpenWrt AP" >>>>>>>> set_default wps_manufacturer "openwrt.org" >>>>>>>> >>>>>>>> wps_state=2 >>>>>>>> [ -n "$wps_configured" ] && wps_state=1 >>>>>>>> >>>>>>>> [ "$ext_registrar" -gt 0 -a -n "$network_bridge" ] && append >>>>>>>> bss_conf "upnp_iface=$network_bridge" "$N" >>>>>>>> >>>>>>>> append bss_conf "eap_server=1" "$N" >>>>>>>> [ -n "$wps_pin" ] && append bss_conf "ap_pin=$wps_pin" "$N" >>>>>>>> append bss_conf "wps_state=$wps_state" "$N" >>>>>>>> append bss_conf "ap_setup_locked=0" "$N" >>>>>>>> append bss_conf "device_type=$wps_device_type" "$N" >>>>>>>> append bss_conf "device_name=$wps_device_name" "$N" >>>>>>>> append bss_conf "manufacturer=$wps_manufacturer" "$N" >>>>>>>> append bss_conf "config_methods=$config_methods" "$N" >>>>>>>> [ "$wps_pbc_in_m1" -gt 0 ] && append bss_conf >>>>>>>> "pbc_in_m1=$wps_pbc_in_m1" "$N" >>>>>>>> } >>>>>>>> >>>>>>>> append bss_conf "ssid=$ssid" "$N" >>>>>>>> [ -n "$network_bridge" ] && append bss_conf >>>>>>>> "bridge=$network_bridge" "$N" >>>>>>>> [ -n "$iapp_interface" ] && { >>>>>>>> iapp_interface="$(uci_get_state network "$iapp_interface" ifname >>>>>>>> "$iapp_interface")" >>>>>>>> [ -n "$iapp_interface" ] && append bss_conf >>>>>>>> "iapp_interface=$iapp_interface" "$N" >>>>>>>> } >>>>>>>> >>>>>>>> if [ "$wpa" -ge "2" ]; then >>>>>>>> if [ -n "$network_bridge" -a "$rsn_preauth" = 1 ]; then >>>>>>>> set_default auth_cache 1 >>>>>>>> append bss_conf "rsn_preauth=1" "$N" >>>>>>>> append bss_conf "rsn_preauth_interfaces=$network_bridge" "$N" >>>>>>>> else >>>>>>>> set_default auth_cache 1 >>>>>>>> append bss_conf "rsn_preauth=1" "$N" >>>>>>>> append bss_conf "rsn_preauth_interfaces=$network_bridge" "$N" >>>>>>>> fi >>>>>>>> >>>>>>>> append bss_conf "okc=$auth_cache" "$N" >>>>>>>> [ "$auth_cache" = 0 ] && append bss_conf "disable_pmksa_caching=1" >>>>>>>> "$N" >>>>>>>> >>>>>>>> # RSN -> allow management frame protection >>>>>>>> json_get_var ieee80211w ieee80211w >>>>>>>> case "$ieee80211w" in >>>>>>>> [012]) >>>>>>>> json_get_vars ieee80211w_max_timeout ieee80211w_retry_timeout >>>>>>>> append bss_conf "ieee80211w=$ieee80211w" "$N" >>>>>>>> [ "$ieee80211w" -gt "0" ] && { >>>>>>>> [ -n "$ieee80211w_max_timeout" ] && \ >>>>>>>> append bss_conf >>>>>>>> "assoc_sa_query_max_timeout=$ieee80211w_max_timeout" "$N" >>>>>>>> [ -n "$ieee80211w_retry_timeout" ] && \ >>>>>>>> append bss_conf >>>>>>>> "assoc_sa_query_retry_timeout=$ieee80211w_retry_timeout" "$N" >>>>>>>> } >>>>>>>> ;; >>>>>>>> esac >>>>>>>> fi >>>>>>>> >>>>>>>> _macfile="/var/run/hostapd-$ifname.maclist" >>>>>>>> case "$macfilter" in >>>>>>>> allow) >>>>>>>> append bss_conf "macaddr_acl=1" "$N" >>>>>>>> append bss_conf "accept_mac_file=$_macfile" "$N" >>>>>>>> ;; >>>>>>>> deny) >>>>>>>> append bss_conf "macaddr_acl=0" "$N" >>>>>>>> append bss_conf "deny_mac_file=$_macfile" "$N" >>>>>>>> ;; >>>>>>>> *) >>>>>>>> _macfile="" >>>>>>>> ;; >>>>>>>> esac >>>>>>>> >>>>>>>> [ -n "$_macfile" ] && { >>>>>>>> json_get_vars macfile >>>>>>>> json_get_values maclist maclist >>>>>>>> >>>>>>>> rm -f "$_macfile" >>>>>>>> ( >>>>>>>> for mac in $maclist; do >>>>>>>> echo "$mac" >>>>>>>> done >>>>>>>> [ -n "$macfile" -a -f "$macfile" ] && cat "$macfile" >>>>>>>> ) > "$_macfile" >>>>>>>> } >>>>>>>> >>>>>>>> append "$var" "$bss_conf" "$N" >>>>>>>> return 0 >>>>>>>> } >>>>>>>> >>>>>>>> hostapd_set_log_options() { >>>>>>>> local var="$1" >>>>>>>> >>>>>>>> local log_level log_80211 log_8021x log_radius log_wpa log_driver >>>>>>>> log_iapp log_mlme >>>>>>>> json_get_vars log_level log_80211 log_8021x log_radius log_wpa >>>>>>>> log_driver log_iapp log_mlme >>>>>>>> >>>>>>>> set_default log_level 1 >>>>>>>> set_default log_80211 1 >>>>>>>> set_default log_8021x 1 >>>>>>>> set_default log_radius 1 >>>>>>>> set_default log_wpa 1 >>>>>>>> set_default log_driver 1 >>>>>>>> set_default log_iapp 1 >>>>>>>> set_default log_mlme 1 >>>>>>>> >>>>>>>> local log_mask=$(( \ >>>>>>>> ($log_80211 << 0) | \ >>>>>>>> ($log_8021x << 1) | \ >>>>>>>> ($log_radius << 2) | \ >>>>>>>> ($log_wpa << 3) | \ >>>>>>>> ($log_driver << 4) | \ >>>>>>>> ($log_iapp << 5) | \ >>>>>>>> ($log_mlme << 6) \ >>>>>>>> )) >>>>>>>> >>>>>>>> append "$var" "logger_syslog=$log_mask" "$N" >>>>>>>> append "$var" "logger_syslog_level=$log_level" "$N" >>>>>>>> append "$var" "logger_stdout=$log_mask" "$N" >>>>>>>> append "$var" "logger_stdout_level=$log_level" "$N" >>>>>>>> >>>>>>>> return 0 >>>>>>>> } >>>>>>>> >>>>>>>> _wpa_supplicant_common() { >>>>>>>> local ifname="$1" >>>>>>>> >>>>>>>> _rpath="/var/run/wpa_supplicant" >>>>>>>> _config="${_rpath}-$ifname.conf" >>>>>>>> } >>>>>>>> >>>>>>>> wpa_supplicant_teardown_interface() { >>>>>>>> _wpa_supplicant_common "$1" >>>>>>>> rm -rf "$_rpath/$1" "$_config" >>>>>>>> } >>>>>>>> >>>>>>>> wpa_supplicant_prepare_interface() { >>>>>>>> local ifname="$1" >>>>>>>> _w_driver="$2" >>>>>>>> >>>>>>>> _wpa_supplicant_common "$1" >>>>>>>> >>>>>>>> json_get_vars mode wds >>>>>>>> >>>>>>>> [ -n "$network_bridge" ] && { >>>>>>>> fail= >>>>>>>> case "$mode" in >>>>>>>> adhoc) >>>>>>>> fail=1 >>>>>>>> ;; >>>>>>>> sta) >>>>>>>> [ "$wds" = 1 ] || fail=1 >>>>>>>> ;; >>>>>>>> esac >>>>>>>> >>>>>>>> [ -n "$fail" ] && { >>>>>>>> wireless_setup_vif_failed BRIDGE_NOT_ALLOWED >>>>>>>> return 1 >>>>>>>> } >>>>>>>> } >>>>>>>> >>>>>>>> local ap_scan= >>>>>>>> >>>>>>>> _w_mode="$mode" >>>>>>>> _w_modestr= >>>>>>>> >>>>>>>> [[ "$mode" = adhoc ]] && { >>>>>>>> ap_scan="ap_scan=2" >>>>>>>> >>>>>>>> _w_modestr="mode=1" >>>>>>>> } >>>>>>>> >>>>>>>> wpa_supplicant_teardown_interface "$ifname" >>>>>>>> cat > "$_config" <<EOF >>>>>>>> $ap_scan >>>>>>>> EOF >>>>>>>> return 0 >>>>>>>> } >>>>>>>> >>>>>>>> wpa_supplicant_add_network() { >>>>>>>> local ifname="$1" >>>>>>>> >>>>>>>> _wpa_supplicant_common "$1" >>>>>>>> wireless_vif_parse_encryption >>>>>>>> >>>>>>>> json_get_vars \ >>>>>>>> ssid bssid key \ >>>>>>>> basic_rate mcast_rate \ >>>>>>>> ieee80211w >>>>>>>> >>>>>>>> local key_mgmt='NONE' >>>>>>>> local enc_str= >>>>>>>> local network_data= >>>>>>>> local T=" " >>>>>>>> >>>>>>>> local wpa_key_mgmt="WPA-PSK" >>>>>>>> local scan_ssid="1" >>>>>>>> local freq >>>>>>>> >>>>>>>> [[ "$_w_mode" = "adhoc" ]] && { >>>>>>>> append network_data "mode=1" "$N$T" >>>>>>>> [ -n "$channel" ] && { >>>>>>>> freq="$(get_freq "$phy" "$channel")" >>>>>>>> append network_data "fixed_freq=1" "$N$T" >>>>>>>> append network_data "frequency=$freq" "$N$T" >>>>>>>> } >>>>>>>> >>>>>>>> scan_ssid=0 >>>>>>>> >>>>>>>> [ "$_w_driver" = "nl80211" ] || wpa_key_mgmt="WPA-NONE" >>>>>>>> } >>>>>>>> >>>>>>>> [[ "$_w_mode" = adhoc ]] && append network_data "$_w_modestr" "$N$T" >>>>>>>> >>>>>>>> case "$auth_type" in >>>>>>>> none) ;; >>>>>>>> wep) >>>>>>>> local wep_keyidx=0 >>>>>>>> hostapd_append_wep_key network_data >>>>>>>> append network_data "wep_tx_keyidx=$wep_keyidx" "$N$T" >>>>>>>> ;; >>>>>>>> psk) >>>>>>>> local passphrase >>>>>>>> >>>>>>>> key_mgmt="$wpa_key_mgmt" >>>>>>>> if [ ${#key} -eq 64 ]; then >>>>>>>> passphrase="psk=${key}" >>>>>>>> else >>>>>>>> passphrase="psk=\"${key}\"" >>>>>>>> fi >>>>>>>> append network_data "$passphrase" "$N$T" >>>>>>>> ;; >>>>>>>> eap) >>>>>>>> key_mgmt='WPA-EAP' >>>>>>>> >>>>>>>> json_get_vars eap_type identity ca_cert >>>>>>>> [ -n "$ca_cert" ] && append network_data "ca_cert=\"$ca_cert\"" >>>>>>>> "$N$T" >>>>>>>> [ -n "$identity" ] && append network_data "identity=\"$identity\"" >>>>>>>> "$N$T" >>>>>>>> case "$eap_type" in >>>>>>>> tls) >>>>>>>> json_get_vars client_cert priv_key priv_key_pwd >>>>>>>> append network_data "client_cert=\"$client_cert\"" "$N$T" >>>>>>>> append network_data "private_key=\"$priv_key\"" "$N$T" >>>>>>>> append network_data "private_key_passwd=\"$priv_key_pwd\"" "$N$T" >>>>>>>> ;; >>>>>>>> peap|ttls) >>>>>>>> json_get_vars auth password >>>>>>>> set_default auth MSCHAPV2 >>>>>>>> append network_data "phase2=\"$auth\"" "$N$T" >>>>>>>> append network_data "password=\"$password\"" "$N$T" >>>>>>>> ;; >>>>>>>> esac >>>>>>>> append network_data "eap=$(echo $eap_type | tr 'a-z' 'A-Z')" "$N$T" >>>>>>>> ;; >>>>>>>> esac >>>>>>>> >>>>>>>> case "$wpa" in >>>>>>>> 1) >>>>>>>> append network_data "proto=WPA" "$N$T" >>>>>>>> ;; >>>>>>>> 2) >>>>>>>> append network_data "proto=RSN" "$N$T" >>>>>>>> ;; >>>>>>>> esac >>>>>>>> >>>>>>>> case "$ieee80211w" in >>>>>>>> [012]) >>>>>>>> [ "$wpa" -ge 2 ] && append network_data "ieee80211w=$ieee80211w" >>>>>>>> "$N$T" >>>>>>>> ;; >>>>>>>> esac >>>>>>>> >>>>>>>> local beacon_int brates mrate >>>>>>>> [ -n "$bssid" ] && append network_data "bssid=$bssid" "$N$T" >>>>>>>> [ -n "$beacon_int" ] && append network_data >>>>>>>> "beacon_int=$beacon_int" "$N$T" >>>>>>>> >>>>>>>> >>>>>>>> [ -n "$basic_rate" ] && { >>>>>>>> local br rate_list= >>>>>>>> for br in $basic_rate; do >>>>>>>> hostapd_add_rate rate_list "$br" >>>>>>>> done >>>>>>>> [ -n "$rate_list" ] && append network_data "rates=$rate_list" "$N$T" >>>>>>>> } >>>>>>>> >>>>>>>> [ -n "$mcast_rate" ] && { >>>>>>>> local mc_rate= >>>>>>>> hostapd_add_rate mc_rate "$mcast_rate" >>>>>>>> append network_data "mcast_rate=$mc_rate" "$N$T" >>>>>>>> } >>>>>>>> >>>>>>>> local ht_str >>>>>>>> [ -n "$ht" ] && append network_data "htmode=$ht" "$N$T" >>>>>>>> >>>>>>>> cat >> "$_config" <<EOF >>>>>>>> network={ >>>>>>>> scan_ssid=$scan_ssid >>>>>>>> ssid="$ssid" >>>>>>>> key_mgmt=$key_mgmt >>>>>>>> $network_data >>>>>>>> } >>>>>>>> EOF >>>>>>>> return 0 >>>>>>>> } >>>>>>>> >>>>>>>> wpa_supplicant_run() { >>>>>>>> local ifname="$1"; shift >>>>>>>> >>>>>>>> _wpa_supplicant_common "$ifname" >>>>>>>> >>>>>>>> /usr/sbin/wpa_supplicant -B \ >>>>>>>> ${network_bridge:+-b $network_bridge} \ >>>>>>>> -P "/var/run/wpa_supplicant-${ifname}.pid" \ >>>>>>>> -D ${_w_driver:-wext} \ >>>>>>>> -i "$ifname" \ >>>>>>>> -c "$_config" \ >>>>>>>> -C "$_rpath" \ >>>>>>>> "$@" >>>>>>>> >>>>>>>> ret="$?" >>>>>>>> wireless_add_process "$(cat >>>>>>>> "/var/run/wpa_supplicant-${ifname}.pid")" /usr/sbin/wpa_supplicant 1 >>>>>>>> >>>>>>>> [ "$ret" != 0 ] && wireless_setup_vif_failed WPA_SUPPLICANT_FAILED >>>>>>>> >>>>>>>> return $ret >>>>>>>> } >>>>>>>> >>>>>>>> hostapd_common_cleanup() { >>>>>>>> killall hostapd wpa_supplicant meshd-nl80211 >>>>>>>> } >>>>>>>> >>>>>>>> /etc/config/wireless >>>>>>>> >>>>>>>> config wifi-device 'radio0' >>>>>>>> option type 'mac80211' >>>>>>>> option path 'pci0000:00/0000:00:00.0' >>>>>>>> option htmode 'HT20' >>>>>>>> option hwmode '11ng' >>>>>>>> list ht_capab 'SHORT-GI-40' >>>>>>>> list ht_capab 'TX-STBC' >>>>>>>> list ht_capab 'RX-STBC1' >>>>>>>> list ht_capab 'DSSS_CCK-40' >>>>>>>> option txpower '27' >>>>>>>> option country 'US' >>>>>>>> >>>>>>>> config wifi-iface >>>>>>>> option device 'radio0' >>>>>>>> option mode 'ap' >>>>>>>> option ssid 'Test' >>>>>>>> option network 'lan' >>>>>>>> option encryption ’none' >>>>>>>> option auth_server ‘172.X.X.X' >>>>>>>> option auth_port '1812' >>>>>>>> option auth_secret 'secret' >>>>>>>> option acct_server ‘172.X.X.X' >>>>>>>> option acct_port '1812' >>>>>>>> option acct_secret 'secret' >>>>>>>> option dynamic_vlan '2' >>>>>>>> option vlan_file '/etc/config/hostapd.vlan' >>>>>>>> option vlan_tagged_interface 'eth0' >>>>>>>> option dae_secret 'secret' >>>>>>>> option dae_client ‘172.X.X.X' >>>>>>>> option macfilter '2' >>>>>>>> option dae_port '3799' >>>>>>>> option nasid ‘Ubiquiti’ >>>>>>>> >>>>>>>> >>>>>>>> You will need the wpad package and hostapd >>>>>>>> >>>>>>>> Thanks, >>>>>>>> >>>>>>>> Ludovic [email protected] <[email protected]> :: >>>>>>>> +1.514.447.4918 (x145) :: www.inverse.ca >>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and >>>>>>>> PacketFence (http://packetfence.org) >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> Le 2015-05-20 à 11:46, Earl Robinson <[email protected]> a écrit : >>>>>>>> >>>>>>>> Thanks Chris, >>>>>>>> >>>>>>>> I tried with the current stable release ,14.07 (barrier breaker), a >>>>>>>> few weeks ago and I was having problems with getting drivers for 5ghz >>>>>>>> wifi >>>>>>>> working. I'm assuming the driver situation with 12.09 (attitude >>>>>>>> adjustment) >>>>>>>> is even worse since that release is 18 months older. >>>>>>>> >>>>>>>> I've got a spare 2.4ghz router I can try with 14.07. There seems to >>>>>>>> be a lot of changes to the code for dynamic vlans between 14.07 and >>>>>>>> trunk >>>>>>>> (16.?) so I was hoping there's some config magic that hasn't made it >>>>>>>> to the >>>>>>>> docs yet that will resolve the issues I've had. >>>>>>>> >>>>>>>> I'll followup on this list on how my testing goes. >>>>>>>> >>>>>>>> -earl >>>>>>>> >>>>>>>> On Tue, May 19, 2015 at 1:33 PM, Chris Abel < >>>>>>>> [email protected]> wrote: >>>>>>>> >>>>>>>>> Make sure to use OpenWRT 12.09 Attitude Adjustment. >>>>>>>>> >>>>>>>>> On Tue, May 19, 2015 at 1:26 PM, Earl Robinson <[email protected] >>>>>>>>> > wrote: >>>>>>>>> >>>>>>>>>> Hey Ludovic, >>>>>>>>>> >>>>>>>>>> I'm running on a TP-Link Archer C7 v2 and a TP-Link TL-WDR4300 >>>>>>>>>> v1. I have hostapd and hostapd-common installed. If I try to install >>>>>>>>>> wpad i >>>>>>>>>> get the error: >>>>>>>>>> root@OpenWRT:~# opkg install wpad >>>>>>>>>> Installing wpad (2015-03-25-1) to root... >>>>>>>>>> Downloading >>>>>>>>>> http://downloads.openwrt.org/snapshots/trunk/ar71xx/generic/packages/base/wpad_2015-03-25-1_ar71xx.ipk >>>>>>>>>> . >>>>>>>>>> Collected errors: >>>>>>>>>> * check_data_file_clashes: Package wpad wants to install file >>>>>>>>>> /usr/sbin/hostapd >>>>>>>>>> But that file is already provided by package * hostapd >>>>>>>>>> * opkg_install_cmd: Cannot install package wpad. >>>>>>>>>> >>>>>>>>>> -earl >>>>>>>>>> >>>>>>>>>> On Tue, May 19, 2015 at 10:53 AM, Ludovic Zammit < >>>>>>>>>> [email protected]> wrote: >>>>>>>>>> >>>>>>>>>>> Hello Earl, >>>>>>>>>>> >>>>>>>>>>> With which equipment you are using the OpenWRT ? >>>>>>>>>>> >>>>>>>>>>> The radius part is handle by Hostapd and wpad so make sure that >>>>>>>>>>> these two packages are installed ( hostap-common + wpad ). >>>>>>>>>>> >>>>>>>>>>> Thanks, >>>>>>>>>>> >>>>>>>>>>> Ludovic [email protected] <[email protected]> :: >>>>>>>>>>> +1.514.447.4918 (x145) :: www.inverse.ca >>>>>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and >>>>>>>>>>> PacketFence (http://packetfence.org) >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> Le 2015-05-18 à 16:18, Earl Robinson <[email protected]> a >>>>>>>>>>> écrit : >>>>>>>>>>> >>>>>>>>>>> I've been working to get PacketFence (v5.0.1) working with >>>>>>>>>>> OpenWRT (devel v15 r46557). >>>>>>>>>>> >>>>>>>>>>> My end goal is to have PacketFence controlling the OpenWRT AP in >>>>>>>>>>> VLAN mode, using dynamic VLAN assignment. I've followed the PF >>>>>>>>>>> Device >>>>>>>>>>> configuration guide and the administration guide, the new ZEN >>>>>>>>>>> out-of-band >>>>>>>>>>> quick guide. I've used various docs to sett up the OpenWRT AP >>>>>>>>>>> including >>>>>>>>>>> this one: >>>>>>>>>>> http://wiki.openwrt.org/doc/howto/wireless.security.8021x >>>>>>>>>>> >>>>>>>>>>> I've been able to get a cisco 3560 switch working great. When I >>>>>>>>>>> connect a device, the cisco switch automatically send a RADIUS auth >>>>>>>>>>> request >>>>>>>>>>> to the pf server using the device mac address (mab). And when I >>>>>>>>>>> auth to the >>>>>>>>>>> pf server via the web, my VLAN is reassigned properly. >>>>>>>>>>> >>>>>>>>>>> With the same client devices, I can connect to an open SSID on >>>>>>>>>>> the AP, but then get no RADIUS traffic (dynamic VLANs and nab >>>>>>>>>>> doesn't work >>>>>>>>>>> with an open SSID?). So I have to set the SSID to WPA2, and then I >>>>>>>>>>> get an >>>>>>>>>>> 802.1x auth prompt on the client, which generates a RADIUS request >>>>>>>>>>> back to >>>>>>>>>>> pf. >>>>>>>>>>> >>>>>>>>>>> There's a thread on the openwrt list from 2013-2014: >>>>>>>>>>> https://forum.openwrt.org/viewtopic.php?id=44968 >>>>>>>>>>> which seems to show Fabrice was able to implement what I want >>>>>>>>>>> with earlier versions of OpenWRT, but with heavy mods. The current >>>>>>>>>>> devel >>>>>>>>>>> version is supposed to work without any special mods. >>>>>>>>>>> >>>>>>>>>>> Has anybody been able to get this working recently, and if so >>>>>>>>>>> have any guidance? At this point I believe my problem lies on the >>>>>>>>>>> OpenWRT >>>>>>>>>>> side, but I figure somebody on this list is likely to know the fix. >>>>>>>>>>> >>>>>>>>>>> Thanks, >>>>>>>>>>> Earl >>>>>>>>>>> >>>>>>>>>>> ------------------------------------------------------------------------------ >>>>>>>>>>> One dashboard for servers and applications across >>>>>>>>>>> Physical-Virtual-Cloud >>>>>>>>>>> Widest out-of-the-box monitoring support with 50+ applications >>>>>>>>>>> Performance metrics, stats and reports that give you Actionable >>>>>>>>>>> Insights >>>>>>>>>>> Deep dive visibility with transaction tracing using APM Insight. >>>>>>>>>>> >>>>>>>>>>> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y_______________________________________________ >>>>>>>>>>> PacketFence-users mailing list >>>>>>>>>>> [email protected] >>>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> ------------------------------------------------------------------------------ >>>>>>>>>>> One dashboard for servers and applications across >>>>>>>>>>> Physical-Virtual-Cloud >>>>>>>>>>> Widest out-of-the-box monitoring support with 50+ applications >>>>>>>>>>> Performance metrics, stats and reports that give you Actionable >>>>>>>>>>> Insights >>>>>>>>>>> Deep dive visibility with transaction tracing using APM Insight. >>>>>>>>>>> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y >>>>>>>>>>> _______________________________________________ >>>>>>>>>>> PacketFence-users mailing list >>>>>>>>>>> [email protected] >>>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> ------------------------------------------------------------------------------ >>>>>>>>>> One dashboard for servers and applications across >>>>>>>>>> Physical-Virtual-Cloud >>>>>>>>>> Widest out-of-the-box monitoring support with 50+ applications >>>>>>>>>> Performance metrics, stats and reports that give you Actionable >>>>>>>>>> Insights >>>>>>>>>> Deep dive visibility with transaction tracing using APM Insight. >>>>>>>>>> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y >>>>>>>>>> _______________________________________________ >>>>>>>>>> PacketFence-users mailing list >>>>>>>>>> [email protected] >>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>>>>> >>>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> -- >>>>>>>>> Chris Abel >>>>>>>>> Systems and Network Administrator >>>>>>>>> Wildwood Programs >>>>>>>>> 2995 Curry Road Extension >>>>>>>>> Schenectady, NY 12303 >>>>>>>>> 518-836-2341 >>>>>>>>> >>>>>>>>> IMPORTANT NOTICE: This message and any attachments are solely for >>>>>>>>> the intended recipient and may contain confidential information, >>>>>>>>> which is, >>>>>>>>> or may be, legally privileged or otherwise protected by law from >>>>>>>>> further >>>>>>>>> disclosure. If you are not the intended recipient, any disclosure, >>>>>>>>> copying, >>>>>>>>> use, or distribution of the information included in this email and any >>>>>>>>> attachments is prohibited. If you have received this communication in >>>>>>>>> error, please notify the sender by reply email and immediately and >>>>>>>>> permanently delete this email and any attachments. >>>>>>>>> >>>>>>>>> ------------------------------------------------------------------------------ >>>>>>>>> One dashboard for servers and applications across >>>>>>>>> Physical-Virtual-Cloud >>>>>>>>> Widest out-of-the-box monitoring support with 50+ applications >>>>>>>>> Performance metrics, stats and reports that give you Actionable >>>>>>>>> Insights >>>>>>>>> Deep dive visibility with transaction tracing using APM Insight. >>>>>>>>> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y >>>>>>>>> _______________________________________________ >>>>>>>>> PacketFence-users mailing list >>>>>>>>> [email protected] >>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>>>> >>>>>>>>> >>>>>>>> >>>>>>>> ------------------------------------------------------------------------------ >>>>>>>> One dashboard for servers and applications across >>>>>>>> Physical-Virtual-Cloud >>>>>>>> Widest out-of-the-box monitoring support with 50+ applications >>>>>>>> Performance metrics, stats and reports that give you Actionable >>>>>>>> Insights >>>>>>>> Deep dive visibility with transaction tracing using APM Insight. >>>>>>>> >>>>>>>> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y_______________________________________________ >>>>>>>> PacketFence-users mailing list >>>>>>>> [email protected] >>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> ------------------------------------------------------------------------------ >>>>>>>> One dashboard for servers and applications across >>>>>>>> Physical-Virtual-Cloud >>>>>>>> Widest out-of-the-box monitoring support with 50+ applications >>>>>>>> Performance metrics, stats and reports that give you Actionable >>>>>>>> Insights >>>>>>>> Deep dive visibility with transaction tracing using APM Insight. >>>>>>>> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y >>>>>>>> _______________________________________________ >>>>>>>> PacketFence-users mailing list >>>>>>>> [email protected] >>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>>> >>>>>>>> >>>>>>> >>>>>> >>>>>> ------------------------------------------------------------------------------ >>>>>> One dashboard for servers and applications across >>>>>> Physical-Virtual-Cloud >>>>>> Widest out-of-the-box monitoring support with 50+ applications >>>>>> Performance metrics, stats and reports that give you Actionable >>>>>> Insights >>>>>> Deep dive visibility with transaction tracing using APM Insight. >>>>>> >>>>>> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y_______________________________________________ >>>>>> PacketFence-users mailing list >>>>>> [email protected] >>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> ------------------------------------------------------------------------------ >>>>>> One dashboard for servers and applications across >>>>>> Physical-Virtual-Cloud >>>>>> Widest out-of-the-box monitoring support with 50+ applications >>>>>> Performance metrics, stats and reports that give you Actionable >>>>>> Insights >>>>>> Deep dive visibility with transaction tracing using APM Insight. >>>>>> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y >>>>>> _______________________________________________ >>>>>> PacketFence-users mailing list >>>>>> [email protected] >>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>> >>>>>> >>>>> >>>> >>>> >>>> ------------------------------------------------------------------------------ >>>> One dashboard for servers and applications across Physical-Virtual-Cloud >>>> Widest out-of-the-box monitoring support with 50+ applications >>>> Performance metrics, stats and reports that give you Actionable Insights >>>> Deep dive visibility with transaction tracing using APM Insight. >>>> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y >>>> _______________________________________________ >>>> PacketFence-users mailing list >>>> [email protected] >>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>> >>>> >>> >>> >>> -- >>> Chris Abel >>> Systems and Network Administrator >>> Wildwood Programs >>> 2995 Curry Road Extension >>> Schenectady, NY 12303 >>> 518-836-2341 >>> >>> IMPORTANT NOTICE: This message and any attachments are solely for the >>> intended recipient and may contain confidential information, which is, or >>> may be, legally privileged or otherwise protected by law from further >>> disclosure. If you are not the intended recipient, any disclosure, copying, >>> use, or distribution of the information included in this email and any >>> attachments is prohibited. If you have received this communication in >>> error, please notify the sender by reply email and immediately and >>> permanently delete this email and any attachments. >>> >>> >>> ------------------------------------------------------------------------------ >>> >>> _______________________________________________ >>> PacketFence-users mailing list >>> [email protected] >>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>> >>> >> >> >> ------------------------------------------------------------------------------ >> >> _______________________________________________ >> PacketFence-users mailing list >> [email protected] >> https://lists.sourceforge.net/lists/listinfo/packetfence-users >> >> > > > -- > Chris Abel > Systems and Network Administrator > Wildwood Programs > 2995 Curry Road Extension > Schenectady, NY 12303 > 518-836-2341 > > IMPORTANT NOTICE: This message and any attachments are solely for the > intended recipient and may contain confidential information, which is, or > may be, legally privileged or otherwise protected by law from further > disclosure. If you are not the intended recipient, any disclosure, copying, > use, or distribution of the information included in this email and any > attachments is prohibited. If you have received this communication in > error, please notify the sender by reply email and immediately and > permanently delete this email and any attachments. > > > ------------------------------------------------------------------------------ > > _______________________________________________ > PacketFence-users mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/packetfence-users > >
------------------------------------------------------------------------------
_______________________________________________ PacketFence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
