Hum strange.
What you can try is to define an interface in the vlan 2 (manually on an
switch port) and plug your test machine in it. (you must receive an ip
from PacketFence).
If you receive an ip from the 172.16.0.0/24 then it mean that you have a
switch configuration issue. (any layer 3 interfaces defined in the vlan
2 ?).
Also what i can see is that there is no mac in the vlan 2 and the vlan 3
for the interface 11.
You should have something like that too:
2 08:00:27:35:fc:c4 Dynamic Gi1/0/11/- PacketFence Reg
/
3 08:00:27:35:fc:c4 Dynamic Gi1/0/11/- PacketFence Isol/
Regards
Fabrice
Le 2018-01-02 à 13:55, André Scrivener a écrit :
> Opss, Fabrice!
>
> I forgot an information, the MAC addresses on the switch.
>
> By the logs, it is in VLAN 2, the correct vlan.
>
> Right now I do not understand, because it does not assign the correct
> address
>
>
> console#show mac address-table
>
> Aging time is 300 Sec
>
> Vlan Mac Address Type Port
> -------- --------------------- ----------- ---------------------
> 1 0800.2700.58E2 Dynamic Gi1/0/11 /- Windows Server
> 2008/
> 1 0800.2735.FCC4 Dynamic Gi1/0/11/- PacketFence/
> 1 1418.77EA.F0A3 Management Vl1 / - Switch Dell/
> 1 641C.XXXXXXXXX Dynamic Gi1/0/11 /- My physical pc/
> 2 847B.EBE3.8442 Dynamic Gi1/0/13 /- My test machine/
>
> Total MAC Addresses in use: 5
>
> console#show mac address-table interface Gi1/0/13
>
> Aging time is 300 Sec
>
> Vlan Mac Address Type Port
> -------- --------------------- ----------- ---------------------
> 2 847B.EBE3.8442 Dynamic Gi1/0/13/- My test machine/
>
>
> console#
>
>
> 2018-01-02 15:22 GMT-03:00 André Scrivener <[email protected]
> <mailto:[email protected]>>:
>
> Hello Fabrice,
>
> I simplified the environment, I'm using only 1 interface!
>
>
> enp0s3: Management - DHCP FROM WINDOWS SERVER
> enp0s3 VLAN 2: Registration - DHCP ENABLE
> enp0s3 VLAN 3: Isolation - DHCP ENABLE
> enp0s3 VLAN 10: Normal - NO DHCP
>
> IP Address Switch Managed: 172.16.0.50
> Interface 11: My physical machine, and virtual machine
> (virtualbox) where is the PacketFence (interface mode bridge)
> Interface 23: My client test Windows 8 (interface mode bridge)
>
>
> Problem continue, in the logs it returns to vlan correct, but does
> not assign to the computer, it stubborn in assigning the network
> 172.16.0.0/24 <http://172.16.0.0/24> (Management Network).
>
>
> root@packetfence ~]# tailf /usr/local/pf/logs/packetfence.log
> Jan 2 14:03:10 packetfence packetfence_httpd.aaa:
> httpd.aaa(30935) INFO: [mac:84:7b:eb:e3:84:42] handling radius
> autz request: from switch_ip => (172.16.0.50), connection_type =>
> WIRED_MAC_AUTH,switch_mac => (14:18:77:ea:f0:a2), mac =>
> [84:7b:eb:e3:84:42], port => 13, username => "847BEBE38442"
> (pf::radius::authorize)
> Jan 2 14:03:10 packetfence packetfence_httpd.aaa:
> httpd.aaa(30935) INFO: [mac:84:7b:eb:e3:84:42] Instantiate profile
> default (pf::Connection::ProfileFactory::_from_profile)
> Jan 2 14:03:10 packetfence packetfence_httpd.aaa:
> httpd.aaa(30935) INFO: [mac:84:7b:eb:e3:84:42] is of status unreg;
> belongs into registration VLAN (pf::role::getRegistrationRole)
> Jan 2 14:03:10 packetfence packetfence_httpd.aaa:
> httpd.aaa(30935) INFO: [mac:84:7b:eb:e3:84:42] (172.16.0.50) Added
> VLAN 2 to the returned RADIUS Access-Accept
> (pf::Switch::returnRadiusAccessAccept)
>
>
>
> [root@packetfence ~]# tailf /usr/local/pf/logs/radius.log
> Jan 2 14:03:10 packetfence auth[31813]: Need 1 more connections
> to reach min connections (3)
> Jan 2 14:03:10 packetfence auth[31813]: rlm_rest (rest): Opening
> additional connection (15), 1 of 62 pending slots used
> Jan 2 14:03:10 packetfence auth[31813]: Need 7 more connections
> to reach 10 spares
> Jan 2 14:03:10 packetfence auth[31813]: rlm_sql (sql): Opening
> additional connection (18), 1 of 61 pending slots used
> Jan 2 14:03:10 packetfence auth[31813]: [mac:84:7b:eb:e3:84:42]
> Accepted user: and returned VLAN 2
> Jan 2 14:03:10 packetfence auth[31813]: (32) Login OK:
> [847BEBE38442] (from client 172.16.0.50 port 13 cli 84:7b:eb:e3:84:42)
>
>
>
>
> Follow network settings:
>
> [root@packetfence ~]# ifconfig
> enp0s3: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
> inet 172.16.0.2 netmask 255.255.255.0 broadcast 172.16.0.255
> inet6 fe80::a00:27ff:fe35:fcc4 prefixlen 64 scopeid
> 0x20<link>
> ether 08:00:27:35:fc:c4 txqueuelen 1000 (Ethernet)
> RX packets 560936 bytes 711890423 (678.9 MiB)
> RX errors 0 dropped 0 overruns 0 frame 0
> TX packets 153523 bytes 23163746 (22.0 MiB)
> TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
>
> enp0s3.2: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
> inet 192.168.2.2 netmask 255.255.255.0 broadcast
> 192.168.2.255
> inet6 fe80::a00:27ff:fe35:fcc4 prefixlen 64 scopeid
> 0x20<link>
> ether 08:00:27:35:fc:c4 txqueuelen 1000 (Ethernet)
> RX packets 0 bytes 0 (0.0 B)
> RX errors 0 dropped 0 overruns 0 frame 0
> TX packets 10 bytes 732 (732.0 B)
> TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
>
> enp0s3.3: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
> inet 192.168.3.2 netmask 255.255.255.0 broadcast
> 192.168.3.255
> inet6 fe80::a00:27ff:fe35:fcc4 prefixlen 64 scopeid
> 0x20<link>
> ether 08:00:27:35:fc:c4 txqueuelen 1000 (Ethernet)
> RX packets 0 bytes 0 (0.0 B)
> RX errors 0 dropped 0 overruns 0 frame 0
> TX packets 10 bytes 732 (732.0 B)
> TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
>
> enp0s3.10: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
> inet 192.168.1.1 netmask 255.255.255.0 broadcast
> 192.168.1.255
> inet6 fe80::a00:27ff:fe35:fcc4 prefixlen 64 scopeid
> 0x20<link>
> ether 08:00:27:35:fc:c4 txqueuelen 1000 (Ethernet)
> RX packets 0 bytes 0 (0.0 B)
> RX errors 0 dropped 0 overruns 0 frame 0
> TX packets 10 bytes 732 (732.0 B)
> TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
>
> lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
> inet 127.0.0.1 netmask 255.0.0.0
> inet6 ::1 prefixlen 128 scopeid 0x10<host>
> loop txqueuelen 1 (Loopback Local)
> RX packets 1162494 bytes 167041449 (159.3 MiB)
> RX errors 0 dropped 0 overruns 0 frame 0
> TX packets 1162494 bytes 167041449 (159.3 MiB)
> TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
>
> [root@packetfence ~]#
>
>
>
> [root@packetfence ~]# cat /usr/local/pf/conf/networks.conf
> [192.168.3.0]
> dns=192.168.3.2
> dhcp_start=192.168.3.10
> gateway=192.168.3.2
> domain-name=vlan-isolation.scrivener.com.br
> <http://vlan-isolation.scrivener.com.br>
> nat_enabled=disabled
> named=enabled
> dhcp_max_lease_time=30
> fake_mac_enabled=disabled
> dhcpd=enabled
> dhcp_end=192.168.3.246
> type=vlan-isolation
> netmask=255.255.255.0
> dhcp_default_lease_time=30
>
> [192.168.2.0]
> dns=192.168.2.2
> dhcp_start=192.168.2.10
> gateway=192.168.2.2
> domain-name=vlan-registration.scrivener.com.br
> <http://vlan-registration.scrivener.com.br>
> nat_enabled=disabled
> named=enabled
> dhcp_max_lease_time=30
> fake_mac_enabled=disabled
> dhcpd=enabled
> dhcp_end=192.168.2.246
> type=vlan-registration
> netmask=255.255.255.0
> dhcp_default_lease_time=30
> [root@packetfence ~]#
>
>
>
> [root@packetfence ~]# cat /usr/local/pf/conf/switches.conf
> [172.16.0.50]
> mode=production
> defaultVlan=10
> deauthMethod=RADIUS
> description=SWITCH DELL - 172.16.0.50
> type=Dell::N1500
> radiusSecret=useStrongerSecret
> SNMPVersion=2c
>
> #
> # Copyright (C) 2005-2017 Inverse inc.
> #
> # See the enclosed file COPYING for license information (GPL).
> # If you did not receive this file, see
> # http://www.fsf.org/licensing/licenses/gpl.html
> <http://www.fsf.org/licensing/licenses/gpl.html>
> [192.168.0.1]
> description=Test Switch
> type=Cisco::Catalyst_2900XL
> mode=production
> uplink=23,24
>
> #SNMPVersion = 3
> #SNMPEngineID = 0000000000000
> #SNMPUserNameRead = readUser
> #SNMPAuthProtocolRead = MD5
> #SNMPAuthPasswordRead = authpwdread
> #SNMPPrivProtocolRead = DES
> #SNMPPrivPasswordRead = privpwdread
> #SNMPUserNameWrite = writeUser
> #SNMPAuthProtocolWrite = MD5
> #SNMPAuthPasswordWrite = authpwdwrite
> #SNMPPrivProtocolWrite = DES
> #SNMPPrivPasswordWrite = privpwdwrite
> #SNMPVersionTrap = 3
> #SNMPUserNameTrap = readUser
> #SNMPAuthProtocolTrap = MD5
> #SNMPAuthPasswordTrap = authpwdread
> #SNMPPrivProtocolTrap = DES
> #SNMPPrivPasswordTrap = privpwdread
> [192.168.1.0/24 <http://192.168.1.0/24>]
> description=Test Range Switch
> type=Cisco::Catalyst_2900XL
> mode=production
> uplink=23,24
> [root@packetfence ~]#
>
>
> Follow switch configuration:
>
> Following the configuration of the manual, the model of my switch
> is DELL n1548.
>
> (https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_dell
>
> <https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_dell>)
>
>
> console#show running-config
>
> !Current Configuration:
> !System Description "Dell Networking N1548, 6.2.6.6, Linux 3.6.5"
> !System Software Version 6.2.6.6
> !
> configure
> vlan 2-5,10,100
> exit
> vlan 2
> name "Registration"
> exit
> vlan 3
> name "Isolation"
> exit
> vlan 4
> name "Mac detection"
> exit
> vlan 5
> name "Guest"
> exit
> vlan 100
> name "VoIP"
> exit
> stack
> member 1 3 ! N1548
> exit
> interface vlan 1
> ip address 172.16.0.50 255.255.255.0
> exit
> authentication enable
> dot1x system-auth-control
> aaa authentication dot1x default radius
> aaa authorization network default radius
> dot1x dynamic-vlan enable
> voice vlan
> aaa server radius dynamic-author
> client 172.16.0.2 server-key "useStrongerSecret"
> exit
> radius-server host auth 172.16.0.2
> name "PacketFence"
> usage 802.1x
> key "useStrongerSecret"
> exit
> !
> interface Gi1/0/11
> switchport mode trunk
> switchport trunk allowed vlan 1-5,100
> dot1x port-control force-authorized
> exit
> !
> interface Gi1/0/13
> switchport voice detect auto
> switchport mode general
> switchport access vlan 10
> dot1x port-control mac-based
> dot1x reauthentication
> dot1x mac-auth-bypass
> authentication order mab
> authentication priority mab
> lldp transmit-tlv sys-desc sys-cap
> lldp transmit-mgmt
> lldp notification
> lldp med confignotification
> voice vlan 100
> exit
> snmp-server engineid local 800002a203141877eaf0a0
> snmp-server community "private" rw
> snmp-server community "public" ro
> exit
>
> console#
>
>
>
>
> I still do not understand where the error is. Any idea
>
>
> 2017-12-29 11:15 GMT-03:00 Fabrice Durand via PacketFence-users
> <[email protected]
> <mailto:[email protected]>>:
>
> Hello André,
>
> First you need to check on the switch side if the mac address
> of the device is in the vlan 300.
>
> Next a registration vlan is a vlan managed by PacketFence, so
> you need to enable dhcp on the vlan 300 and 600.
>
> Another thing i can see is that the interface enp0s8.300 (vlan
> 300) use the network 172.17.0.0/24 <http://172.17.0.0/24> and
> it should be 172.16.0.0/24 <http://172.16.0.0/24> ?! (but
> enp0s8 use this network).
>
> So i my opinion, you probably mess up the vlan/interface config.
>
> If enp0s8 interface is really on the vlan 300 then enp0s8.300
> is useless and you probably have to use the vlan 301 as the
> registration network.
>
> Last things, be sure that enp0s8 is plugged on a trunk port
> and be sure that you define all the vlans in your switch
> configuration.
>
> Regards
> Fabrice
>
>
>
>
> Le 2017-12-29 à 08:50, André Scrivener via PacketFence-users a
> écrit :
>> I'm configuring pf as vlan enforcement, but I'm having a
>> problem, where vlans with their respective IPs are not being
>> assigned. In the logs it returns the correct vlans, but does
>> not apply to the station.
>>
>> /
>> /
>> /Dec 29 11:36:54 packtfence packetfence_httpd.aaa:
>> httpd.aaa(5185) INFO: [mac:64:1c:67:82:7d:f2] handling radius
>> autz request: from switch_ip => (172.16.0.50),
>> connection_type => WIRED_MAC_AUTH,switch_mac =>
>> (14:18:77:ea:f0:a2), mac => [64:1c:67:82:7d:f2], port => 41,
>> username => "641C67827DF2" (pf::radius::authorize)/
>> /Dec 29 11:36:54 packtfence packetfence_httpd.aaa:
>> httpd.aaa(5185) INFO: [mac:64:1c:67:82:7d:f2] Instantiate
>> profile default (pf::Connection::ProfileFactory::_from_profile)/
>> /Dec 29 11:36:54 packtfence packetfence_httpd.aaa:
>> httpd.aaa(5185) INFO: [mac:64:1c:67:82:7d:f2] is of status
>> unreg; belongs into registration VLAN
>> (pf::role::getRegistrationRole)/
>> /Dec 29 11:36:54 packtfence packetfence_httpd.aaa:
>> httpd.aaa(5185) INFO: [mac:64:1c:67:82:7d:f2] (172.16.0.50)
>> Added VLAN 300 to the returned RADIUS Access-Accept
>> (pf::Switch::returnRadiusAccessAccept)/
>>
>>
>> /Dec 29 11:36:54 packtfence auth[7662]: Need 1 more
>> connections to reach min connections (3)/
>> /Dec 29 11:36:54 packtfence auth[7662]: rlm_rest (rest):
>> Opening additional connection (23), 1 of 62 pending slots used/
>> /Dec 29 11:36:54 packtfence auth[7662]: Need 1 more
>> connections to reach min connections (3)/
>> /Dec 29 11:36:54 packtfence auth[7662]: rlm_sql (sql):
>> Opening additional connection (25), 1 of 62 pending slots used/
>> /Dec 29 11:36:54 packtfence auth[7662]:
>> [mac:64:1c:67:82:7d:f2] Accepted user: and returned VLAN 300/
>> /Dec 29 11:36:54 packtfence auth[7662]: (44) Login OK:
>> [641C67827DF2] (from client 172.16.0.50 port 41 cli
>> 64:1c:67:82:7d:f2)/
>>
>>
>> In the logs it returns to vlan correct, but does not assign
>> to the computer, it stubborn in assigning the network
>> 172.16.0.0/24 <http://172.16.0.0/24>.
>>
>> I did not configure DHCP in packetfence, when packetfence
>> returns a vlan it is for it to get dhcp from my
>> infrastructure. (So I imagine.)
>>
>> Follows some of my settings, it's okay to expose information
>> since it's a lab.
>>
>>
>> [root@packtfence ~]# ifconfig
>> SCRIVENER-b: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
>> inet 169.254.0.2 netmask 255.255.255.252 broadcast
>> 169.254.0.3
>> inet6 fe80::c8b5:5bff:febe:b1cc prefixlen 64
>> scopeid 0x20<link>
>> ether ca:b5:5b:be:b1:cc txqueuelen 1000 (Ethernet)
>> RX packets 8 bytes 648 (648.0 B)
>> RX errors 0 dropped 0 overruns 0 frame 0
>> TX packets 8 bytes 648 (648.0 B)
>> TX errors 0 dropped 0 overruns 0 carrier 0
>> collisions 0
>>
>> enp0s3: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500
>> ether 08:00:27:a3:36:2a txqueuelen 1000 (Ethernet)
>> RX packets 5668 bytes 8119227 (7.7 MiB)
>> RX errors 0 dropped 0 overruns 0 frame 0
>> TX packets 1260 bytes 80253 (78.3 KiB)
>> TX errors 0 dropped 0 overruns 0 carrier 0
>> collisions 0
>>
>> enp0s8: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
>> inet 172.16.0.2 netmask 255.255.255.0 broadcast
>> 172.16.0.255
>> inet6 fe80::a00:27ff:fef4:37f8 prefixlen 64 scopeid
>> 0x20<link>
>> ether 08:00:27:f4:37:f8 txqueuelen 1000 (Ethernet)
>> RX packets 20960 bytes 4119093 (3.9 MiB)
>> RX errors 0 dropped 0 overruns 0 frame 0
>> TX packets 12227 bytes 21064744 (20.0 MiB)
>> TX errors 0 dropped 0 overruns 0 carrier 0
>> collisions 0
>>
>> enp0s8.300: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
>> inet 172.17.0.2 netmask 255.255.255.0 broadcast
>> 172.17.0.255
>> inet6 fe80::a00:27ff:fef4:37f8 prefixlen 64 scopeid
>> 0x20<link>
>> ether 08:00:27:f4:37:f8 txqueuelen 1000 (Ethernet)
>> RX packets 10 bytes 628 (628.0 B)
>> RX errors 0 dropped 0 overruns 0 frame 0
>> TX packets 14 bytes 900 (900.0 B)
>> TX errors 0 dropped 0 overruns 0 carrier 0
>> collisions 0
>>
>> enp0s8.301: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
>> inet 172.19.0.2 netmask 255.255.255.0 broadcast
>> 172.19.0.255
>> inet6 fe80::a00:27ff:fef4:37f8 prefixlen 64 scopeid
>> 0x20<link>
>> ether 08:00:27:f4:37:f8 txqueuelen 1000 (Ethernet)
>> RX packets 10 bytes 628 (628.0 B)
>> RX errors 0 dropped 0 overruns 0 frame 0
>> TX packets 14 bytes 900 (900.0 B)
>> TX errors 0 dropped 0 overruns 0 carrier 0
>> collisions 0
>>
>> enp0s8.600: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
>> inet 172.18.0.2 netmask 255.255.255.0 broadcast
>> 172.18.0.255
>> inet6 fe80::a00:27ff:fef4:37f8 prefixlen 64 scopeid
>> 0x20<link>
>> ether 08:00:27:f4:37:f8 txqueuelen 1000 (Ethernet)
>> RX packets 10 bytes 628 (628.0 B)
>> RX errors 0 dropped 0 overruns 0 frame 0
>> TX packets 14 bytes 900 (900.0 B)
>> TX errors 0 dropped 0 overruns 0 carrier 0
>> collisions 0
>>
>> lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
>> inet 127.0.0.1 netmask 255.0.0.0
>> inet6 ::1 prefixlen 128 scopeid 0x10<host>
>> loop txqueuelen 1 (Loopback Local)
>> RX packets 1567747 bytes 224694729 (214.2 MiB)
>> RX errors 0 dropped 0 overruns 0 frame 0
>> TX packets 1567747 bytes 224694729 (214.2 MiB)
>> TX errors 0 dropped 0 overruns 0 carrier 0
>> collisions 0
>>
>>
>>
>>
>> [root@packtfence ~]# cat /usr/local/pf/conf/networks.co
>> <http://networks.co>nf
>> [172.17.0.0]
>> dns=172.17.0.2
>> dhcp_start=172.17.0.10
>> gateway=172.17.0.2
>> domain-name=vlan-registration.scrivener.com.br
>> <http://vlan-registration.scrivener.com.br>
>> nat_enabled=disabled
>> named=enabled
>> dhcp_max_lease_time=30
>> fake_mac_enabled=disabled
>> dhcpd=disabled
>> dhcp_end=172.17.0.246
>> type=vlan-registration
>> netmask=255.255.255.0
>> dhcp_default_lease_time=30
>>
>> [172.18.0.0]
>> dns=172.18.0.2
>> dhcp_start=172.18.0.10
>> gateway=172.18.0.2
>> domain-name=vlan-isolation.scrivener.com.br
>> <http://vlan-isolation.scrivener.com.br>
>> nat_enabled=disabled
>> named=enabled
>> dhcp_max_lease_time=30
>> fake_mac_enabled=disabled
>> dhcpd=disabled
>> dhcp_end=172.18.0.246
>> type=vlan-isolation
>> netmask=255.255.255.0
>> dhcp_default_lease_time=30
>>
>>
>>
>>
>>
>> [root@packtfence ~]# cat /usr/local/pf/conf/switches.co
>> <http://switches.co>nf
>> #
>> # Copyright (C) 2005-2017 Inverse inc.
>> #
>> # See the enclosed file COPYING for license information (GPL).
>> # If you did not receive this file, see
>> # http://www.fsf.org/licensing/licenses/gpl.html
>> <http://www.fsf.org/licensing/licenses/gpl.html>
>> [default]
>> type=Dell::N1500
>> registrationVlan=300
>> isolationVlan=600
>> uplink=5
>> cliUser=[secret]
>> cliPwd=[secret]
>> cliEnablePwd=[secret]
>> #
>> # SNMP section
>> #
>> # PacketFence -> Switch
>> SNMPVersion=2c
>> #
>> # RADIUS NAS Client config
>> #
>> # RADIUS shared secret with switch
>> radiusSecret=teste123
>> CORPORATIVOVlan=301
>> uplink_dynamic=0
>>
>> [172.16.0.50]
>> mode=production
>> description=172.16.0.50
>> ExternalPortalEnforcement=Y
>> deauthMethod=Telnet
>> cliAccess=Y
>> defaultVlan=301
>>
>>
>>
>> Any can help? Please! My Christmas present and New Year's Eve.
>>
>>
>>
>>
>> Att,
>> Andre Scrivener
>>
>>
>>
>> ------------------------------------------------------------------------------
>> Check out the vibrant tech community on one of the world's most
>> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
>>
>>
>> _______________________________________________
>> PacketFence-users mailing list
>> [email protected]
>> <mailto:[email protected]>
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>> <https://lists.sourceforge.net/lists/listinfo/packetfence-users>
>
> --
> Fabrice Durand
> [email protected] <mailto:[email protected]> :: +1.514.447.4918
> (x135) :: www.inverse.ca <http://www.inverse.ca>
> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and
> PacketFence (http://packetfence.org)
>
>
>
> ------------------------------------------------------------------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> <mailto:[email protected]>
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
> <https://lists.sourceforge.net/lists/listinfo/packetfence-users>
>
>
>
>
> --
> Att
> *Andre*
>
>
>
>
> --
> Att
> *Andre*
--
Fabrice Durand
[email protected] :: +1.514.447.4918 (x135) :: www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence
(http://packetfence.org)
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users