Hum strange.

What you can try is to define an interface in the vlan 2 (manually on an
switch port) and plug your test machine in it. (you must receive an ip
from PacketFence).

If you receive an ip from the 172.16.0.0/24 then it mean that you have a
switch configuration issue. (any layer 3 interfaces defined in the vlan
2 ?).

Also what i can see is that there is no mac in the vlan 2 and the vlan 3
for the interface 11.

You should have something like that too:

2 08:00:27:35:fc:c4 Dynamic     Gi1/0/11/- PacketFence Reg
/

3 08:00:27:35:fc:c4 Dynamic     Gi1/0/11/- PacketFence Isol/

Regards
Fabrice

Le 2018-01-02 à 13:55, André Scrivener a écrit :
> Opss, Fabrice!
>
> I forgot an information, the MAC addresses on the switch.
>
> By the logs, it is in VLAN 2, the correct vlan.
>
> Right now I do not understand, because it does not assign the correct
> address
>
>
> console#show mac address-table           
>
> Aging time is 300 Sec
>
> Vlan     Mac Address           Type        Port
> -------- --------------------- ----------- ---------------------
> 1        0800.2700.58E2        Dynamic     Gi1/0/11 /- Windows Server
> 2008/
> 1        0800.2735.FCC4        Dynamic     Gi1/0/11/- PacketFence/
> 1        1418.77EA.F0A3        Management  Vl1    / - Switch Dell/
> 1        641C.XXXXXXXXX        Dynamic     Gi1/0/11 /- My physical pc/
> 2        847B.EBE3.8442        Dynamic     Gi1/0/13 /- My test machine/
>
> Total MAC Addresses in use: 5
>
> console#show mac address-table interface Gi1/0/13
>
> Aging time is 300 Sec
>
> Vlan     Mac Address           Type        Port
> -------- --------------------- ----------- ---------------------
> 2        847B.EBE3.8442        Dynamic     Gi1/0/13/- My test machine/
>
>
> console#
>
>
> 2018-01-02 15:22 GMT-03:00 André Scrivener <[email protected]
> <mailto:[email protected]>>:
>
>     Hello Fabrice, 
>
>     I simplified the environment, I'm using only 1 interface!
>
>
>     enp0s3:             Management - DHCP FROM WINDOWS SERVER
>     enp0s3 VLAN 2: Registration  - DHCP ENABLE
>     enp0s3 VLAN 3: Isolation       - DHCP ENABLE
>     enp0s3 VLAN 10: Normal       - NO DHCP
>
>     IP Address Switch Managed: 172.16.0.50
>     Interface 11: My physical machine, and virtual machine
>     (virtualbox) where is the PacketFence  (interface mode bridge)
>     Interface 23: My client test Windows 8 (interface mode bridge)
>
>
>     Problem continue, in the logs it returns to vlan correct, but does
>     not assign to the computer, it stubborn in assigning the network
>     172.16.0.0/24 <http://172.16.0.0/24> (Management Network).
>
>
>     root@packetfence ~]# tailf  /usr/local/pf/logs/packetfence.log
>     Jan  2 14:03:10 packetfence packetfence_httpd.aaa:
>     httpd.aaa(30935) INFO: [mac:84:7b:eb:e3:84:42] handling radius
>     autz request: from switch_ip => (172.16.0.50), connection_type =>
>     WIRED_MAC_AUTH,switch_mac => (14:18:77:ea:f0:a2), mac =>
>     [84:7b:eb:e3:84:42], port => 13, username => "847BEBE38442"
>     (pf::radius::authorize)
>     Jan  2 14:03:10 packetfence packetfence_httpd.aaa:
>     httpd.aaa(30935) INFO: [mac:84:7b:eb:e3:84:42] Instantiate profile
>     default (pf::Connection::ProfileFactory::_from_profile)
>     Jan  2 14:03:10 packetfence packetfence_httpd.aaa:
>     httpd.aaa(30935) INFO: [mac:84:7b:eb:e3:84:42] is of status unreg;
>     belongs into registration VLAN (pf::role::getRegistrationRole)
>     Jan  2 14:03:10 packetfence packetfence_httpd.aaa:
>     httpd.aaa(30935) INFO: [mac:84:7b:eb:e3:84:42] (172.16.0.50) Added
>     VLAN 2 to the returned RADIUS Access-Accept
>     (pf::Switch::returnRadiusAccessAccept)
>
>
>
>     [root@packetfence ~]# tailf  /usr/local/pf/logs/radius.log 
>     Jan  2 14:03:10 packetfence auth[31813]: Need 1 more connections
>     to reach min connections (3)
>     Jan  2 14:03:10 packetfence auth[31813]: rlm_rest (rest): Opening
>     additional connection (15), 1 of 62 pending slots used
>     Jan  2 14:03:10 packetfence auth[31813]: Need 7 more connections
>     to reach 10 spares
>     Jan  2 14:03:10 packetfence auth[31813]: rlm_sql (sql): Opening
>     additional connection (18), 1 of 61 pending slots used
>     Jan  2 14:03:10 packetfence auth[31813]: [mac:84:7b:eb:e3:84:42]
>     Accepted user:  and returned VLAN 2
>     Jan  2 14:03:10 packetfence auth[31813]: (32) Login OK:
>     [847BEBE38442] (from client 172.16.0.50 port 13 cli 84:7b:eb:e3:84:42)
>
>
>
>
>     Follow network settings:
>
>     [root@packetfence ~]# ifconfig 
>     enp0s3: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
>             inet 172.16.0.2  netmask 255.255.255.0  broadcast 172.16.0.255
>             inet6 fe80::a00:27ff:fe35:fcc4  prefixlen 64  scopeid
>     0x20<link>
>             ether 08:00:27:35:fc:c4  txqueuelen 1000  (Ethernet)
>             RX packets 560936  bytes 711890423 (678.9 MiB)
>             RX errors 0  dropped 0  overruns 0  frame 0
>             TX packets 153523  bytes 23163746 (22.0 MiB)
>             TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>
>     enp0s3.2: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
>             inet 192.168.2.2  netmask 255.255.255.0  broadcast
>     192.168.2.255
>             inet6 fe80::a00:27ff:fe35:fcc4  prefixlen 64  scopeid
>     0x20<link>
>             ether 08:00:27:35:fc:c4  txqueuelen 1000  (Ethernet)
>             RX packets 0  bytes 0 (0.0 B)
>             RX errors 0  dropped 0  overruns 0  frame 0
>             TX packets 10  bytes 732 (732.0 B)
>             TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>
>     enp0s3.3: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
>             inet 192.168.3.2  netmask 255.255.255.0  broadcast
>     192.168.3.255
>             inet6 fe80::a00:27ff:fe35:fcc4  prefixlen 64  scopeid
>     0x20<link>
>             ether 08:00:27:35:fc:c4  txqueuelen 1000  (Ethernet)
>             RX packets 0  bytes 0 (0.0 B)
>             RX errors 0  dropped 0  overruns 0  frame 0
>             TX packets 10  bytes 732 (732.0 B)
>             TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>
>     enp0s3.10: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
>             inet 192.168.1.1  netmask 255.255.255.0  broadcast
>     192.168.1.255
>             inet6 fe80::a00:27ff:fe35:fcc4  prefixlen 64  scopeid
>     0x20<link>
>             ether 08:00:27:35:fc:c4  txqueuelen 1000  (Ethernet)
>             RX packets 0  bytes 0 (0.0 B)
>             RX errors 0  dropped 0  overruns 0  frame 0
>             TX packets 10  bytes 732 (732.0 B)
>             TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>
>     lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
>             inet 127.0.0.1  netmask 255.0.0.0
>             inet6 ::1  prefixlen 128  scopeid 0x10<host>
>             loop  txqueuelen 1  (Loopback Local)
>             RX packets 1162494  bytes 167041449 (159.3 MiB)
>             RX errors 0  dropped 0  overruns 0  frame 0
>             TX packets 1162494  bytes 167041449 (159.3 MiB)
>             TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>
>     [root@packetfence ~]# 
>
>
>
>     [root@packetfence ~]# cat /usr/local/pf/conf/networks.conf
>     [192.168.3.0]
>     dns=192.168.3.2
>     dhcp_start=192.168.3.10
>     gateway=192.168.3.2
>     domain-name=vlan-isolation.scrivener.com.br
>     <http://vlan-isolation.scrivener.com.br>
>     nat_enabled=disabled
>     named=enabled
>     dhcp_max_lease_time=30
>     fake_mac_enabled=disabled
>     dhcpd=enabled
>     dhcp_end=192.168.3.246
>     type=vlan-isolation
>     netmask=255.255.255.0
>     dhcp_default_lease_time=30
>
>     [192.168.2.0]
>     dns=192.168.2.2
>     dhcp_start=192.168.2.10
>     gateway=192.168.2.2
>     domain-name=vlan-registration.scrivener.com.br
>     <http://vlan-registration.scrivener.com.br>
>     nat_enabled=disabled
>     named=enabled
>     dhcp_max_lease_time=30
>     fake_mac_enabled=disabled
>     dhcpd=enabled
>     dhcp_end=192.168.2.246
>     type=vlan-registration
>     netmask=255.255.255.0
>     dhcp_default_lease_time=30
>     [root@packetfence ~]# 
>
>
>
>     [root@packetfence ~]# cat /usr/local/pf/conf/switches.conf
>     [172.16.0.50]
>     mode=production
>     defaultVlan=10
>     deauthMethod=RADIUS
>     description=SWITCH DELL - 172.16.0.50
>     type=Dell::N1500
>     radiusSecret=useStrongerSecret
>     SNMPVersion=2c
>
>     #
>     # Copyright (C) 2005-2017 Inverse inc.
>     #
>     # See the enclosed file COPYING for license information (GPL).
>     # If you did not receive this file, see
>     # http://www.fsf.org/licensing/licenses/gpl.html
>     <http://www.fsf.org/licensing/licenses/gpl.html>
>     [192.168.0.1]
>     description=Test Switch
>     type=Cisco::Catalyst_2900XL
>     mode=production
>     uplink=23,24
>
>     #SNMPVersion = 3
>     #SNMPEngineID = 0000000000000
>     #SNMPUserNameRead = readUser
>     #SNMPAuthProtocolRead = MD5
>     #SNMPAuthPasswordRead = authpwdread
>     #SNMPPrivProtocolRead = DES 
>     #SNMPPrivPasswordRead = privpwdread
>     #SNMPUserNameWrite = writeUser
>     #SNMPAuthProtocolWrite = MD5
>     #SNMPAuthPasswordWrite = authpwdwrite
>     #SNMPPrivProtocolWrite = DES 
>     #SNMPPrivPasswordWrite = privpwdwrite
>     #SNMPVersionTrap = 3
>     #SNMPUserNameTrap = readUser
>     #SNMPAuthProtocolTrap = MD5
>     #SNMPAuthPasswordTrap = authpwdread
>     #SNMPPrivProtocolTrap = DES
>     #SNMPPrivPasswordTrap = privpwdread
>     [192.168.1.0/24 <http://192.168.1.0/24>]
>     description=Test Range Switch
>     type=Cisco::Catalyst_2900XL
>     mode=production
>     uplink=23,24
>     [root@packetfence ~]# 
>
>
>     Follow switch configuration: 
>
>     Following the configuration of the manual, the model of my switch
>     is DELL n1548.
>     
> (https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_dell
>     
> <https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_dell>)
>
>
>     console#show running-config 
>
>     !Current Configuration:
>     !System Description "Dell Networking N1548, 6.2.6.6, Linux 3.6.5"
>     !System Software Version 6.2.6.6
>     !
>     configure
>     vlan 2-5,10,100
>     exit
>     vlan 2
>     name "Registration"
>     exit
>     vlan 3
>     name "Isolation"
>     exit
>     vlan 4
>     name "Mac detection"
>     exit
>     vlan 5
>     name "Guest"
>     exit
>     vlan 100
>     name "VoIP"
>     exit
>     stack             
>     member 1 3    ! N1548
>     exit              
>     interface vlan 1  
>     ip address 172.16.0.50 255.255.255.0
>     exit              
>     authentication enable
>     dot1x system-auth-control
>     aaa authentication dot1x default radius
>     aaa authorization network default radius
>     dot1x dynamic-vlan enable
>     voice vlan        
>     aaa server radius dynamic-author
>     client 172.16.0.2 server-key "useStrongerSecret"
>     exit              
>     radius-server host auth 172.16.0.2
>     name "PacketFence"
>     usage 802.1x      
>     key "useStrongerSecret"
>     exit              
>     !                 
>     interface Gi1/0/11
>     switchport mode trunk
>     switchport trunk allowed vlan 1-5,100
>     dot1x port-control force-authorized
>     exit              
>     !                 
>     interface Gi1/0/13
>     switchport voice detect auto
>     switchport mode general
>     switchport access vlan 10
>     dot1x port-control mac-based
>     dot1x reauthentication
>     dot1x mac-auth-bypass
>     authentication order mab
>     authentication priority mab
>     lldp transmit-tlv sys-desc sys-cap
>     lldp transmit-mgmt
>     lldp notification 
>     lldp med confignotification
>     voice vlan 100    
>     exit              
>     snmp-server engineid local 800002a203141877eaf0a0
>     snmp-server community "private" rw
>     snmp-server community "public" ro
>     exit              
>
>     console#
>
>
>
>
>     I still do not understand where the error is. Any idea
>
>
>     2017-12-29 11:15 GMT-03:00 Fabrice Durand via PacketFence-users
>     <[email protected]
>     <mailto:[email protected]>>:
>
>         Hello André,
>
>         First you need to check on the switch side if the mac address
>         of the device is in the vlan 300.
>
>         Next a registration vlan is a vlan managed by PacketFence, so
>         you need to enable dhcp on the vlan 300 and 600.
>
>         Another thing i can see is that the interface enp0s8.300 (vlan
>         300) use the network 172.17.0.0/24 <http://172.17.0.0/24> and
>         it should be 172.16.0.0/24 <http://172.16.0.0/24> ?! (but
>         enp0s8 use this network).
>
>         So i my opinion, you probably mess up the vlan/interface config.
>
>         If enp0s8 interface is really on the vlan 300 then enp0s8.300
>         is useless and you probably have to use the vlan 301 as the
>         registration network.
>
>         Last things, be sure that enp0s8 is plugged on a trunk port
>         and be sure that you define all the vlans in your switch
>         configuration.
>
>         Regards
>         Fabrice
>
>
>
>
>         Le 2017-12-29 à 08:50, André Scrivener via PacketFence-users a
>         écrit :
>>         I'm configuring pf as vlan enforcement, but I'm having a
>>         problem, where vlans with their respective IPs are not being
>>         assigned. In the logs it returns the correct vlans, but does
>>         not apply to the station.
>>
>>         /
>>         /
>>         /Dec 29 11:36:54 packtfence packetfence_httpd.aaa:
>>         httpd.aaa(5185) INFO: [mac:64:1c:67:82:7d:f2] handling radius
>>         autz request: from switch_ip => (172.16.0.50),
>>         connection_type => WIRED_MAC_AUTH,switch_mac =>
>>         (14:18:77:ea:f0:a2), mac => [64:1c:67:82:7d:f2], port => 41,
>>         username => "641C67827DF2" (pf::radius::authorize)/
>>         /Dec 29 11:36:54 packtfence packetfence_httpd.aaa:
>>         httpd.aaa(5185) INFO: [mac:64:1c:67:82:7d:f2] Instantiate
>>         profile default (pf::Connection::ProfileFactory::_from_profile)/
>>         /Dec 29 11:36:54 packtfence packetfence_httpd.aaa:
>>         httpd.aaa(5185) INFO: [mac:64:1c:67:82:7d:f2] is of status
>>         unreg; belongs into registration VLAN
>>         (pf::role::getRegistrationRole)/
>>         /Dec 29 11:36:54 packtfence packetfence_httpd.aaa:
>>         httpd.aaa(5185) INFO: [mac:64:1c:67:82:7d:f2] (172.16.0.50)
>>         Added VLAN 300 to the returned RADIUS Access-Accept
>>         (pf::Switch::returnRadiusAccessAccept)/
>>
>>
>>         /Dec 29 11:36:54 packtfence auth[7662]: Need 1 more
>>         connections to reach min connections (3)/
>>         /Dec 29 11:36:54 packtfence auth[7662]: rlm_rest (rest):
>>         Opening additional connection (23), 1 of 62 pending slots used/
>>         /Dec 29 11:36:54 packtfence auth[7662]: Need 1 more
>>         connections to reach min connections (3)/
>>         /Dec 29 11:36:54 packtfence auth[7662]: rlm_sql (sql):
>>         Opening additional connection (25), 1 of 62 pending slots used/
>>         /Dec 29 11:36:54 packtfence auth[7662]:
>>         [mac:64:1c:67:82:7d:f2] Accepted user:  and returned VLAN 300/
>>         /Dec 29 11:36:54 packtfence auth[7662]: (44) Login OK:
>>         [641C67827DF2] (from client 172.16.0.50 port 41 cli
>>         64:1c:67:82:7d:f2)/
>>
>>
>>         In the logs it returns to vlan correct, but does not assign
>>         to the computer, it stubborn in assigning the network
>>         172.16.0.0/24 <http://172.16.0.0/24>.
>>
>>         I did not configure DHCP in packetfence, when packetfence
>>         returns a vlan it is for it to get dhcp from my
>>         infrastructure. (So I imagine.)
>>
>>         Follows some of my settings, it's okay to expose information
>>         since it's a lab.
>>
>>
>>         [root@packtfence ~]# ifconfig 
>>         SCRIVENER-b: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
>>                 inet 169.254.0.2  netmask 255.255.255.252  broadcast
>>         169.254.0.3
>>                 inet6 fe80::c8b5:5bff:febe:b1cc  prefixlen 64
>>          scopeid 0x20<link>
>>                 ether ca:b5:5b:be:b1:cc  txqueuelen 1000  (Ethernet)
>>                 RX packets 8  bytes 648 (648.0 B)
>>                 RX errors 0  dropped 0  overruns 0  frame 0
>>                 TX packets 8  bytes 648 (648.0 B)
>>                 TX errors 0  dropped 0 overruns 0  carrier 0
>>          collisions 0
>>
>>         enp0s3: flags=4099<UP,BROADCAST,MULTICAST>  mtu 1500
>>                 ether 08:00:27:a3:36:2a  txqueuelen 1000  (Ethernet)
>>                 RX packets 5668  bytes 8119227 (7.7 MiB)
>>                 RX errors 0  dropped 0  overruns 0  frame 0
>>                 TX packets 1260  bytes 80253 (78.3 KiB)
>>                 TX errors 0  dropped 0 overruns 0  carrier 0
>>          collisions 0
>>
>>         enp0s8: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
>>                 inet 172.16.0.2  netmask 255.255.255.0  broadcast
>>         172.16.0.255
>>                 inet6 fe80::a00:27ff:fef4:37f8  prefixlen 64  scopeid
>>         0x20<link>
>>                 ether 08:00:27:f4:37:f8  txqueuelen 1000  (Ethernet)
>>                 RX packets 20960  bytes 4119093 (3.9 MiB)
>>                 RX errors 0  dropped 0  overruns 0  frame 0
>>                 TX packets 12227  bytes 21064744 (20.0 MiB)
>>                 TX errors 0  dropped 0 overruns 0  carrier 0
>>          collisions 0
>>
>>         enp0s8.300: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
>>                 inet 172.17.0.2  netmask 255.255.255.0  broadcast
>>         172.17.0.255
>>                 inet6 fe80::a00:27ff:fef4:37f8  prefixlen 64  scopeid
>>         0x20<link>
>>                 ether 08:00:27:f4:37:f8  txqueuelen 1000  (Ethernet)
>>                 RX packets 10  bytes 628 (628.0 B)
>>                 RX errors 0  dropped 0  overruns 0  frame 0
>>                 TX packets 14  bytes 900 (900.0 B)
>>                 TX errors 0  dropped 0 overruns 0  carrier 0
>>          collisions 0
>>
>>         enp0s8.301: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
>>                 inet 172.19.0.2  netmask 255.255.255.0  broadcast
>>         172.19.0.255
>>                 inet6 fe80::a00:27ff:fef4:37f8  prefixlen 64  scopeid
>>         0x20<link>
>>                 ether 08:00:27:f4:37:f8  txqueuelen 1000  (Ethernet)
>>                 RX packets 10  bytes 628 (628.0 B)
>>                 RX errors 0  dropped 0  overruns 0  frame 0
>>                 TX packets 14  bytes 900 (900.0 B)
>>                 TX errors 0  dropped 0 overruns 0  carrier 0
>>          collisions 0
>>
>>         enp0s8.600: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
>>                 inet 172.18.0.2  netmask 255.255.255.0  broadcast
>>         172.18.0.255
>>                 inet6 fe80::a00:27ff:fef4:37f8  prefixlen 64  scopeid
>>         0x20<link>
>>                 ether 08:00:27:f4:37:f8  txqueuelen 1000  (Ethernet)
>>                 RX packets 10  bytes 628 (628.0 B)
>>                 RX errors 0  dropped 0  overruns 0  frame 0
>>                 TX packets 14  bytes 900 (900.0 B)
>>                 TX errors 0  dropped 0 overruns 0  carrier 0
>>          collisions 0
>>
>>         lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
>>                 inet 127.0.0.1  netmask 255.0.0.0
>>                 inet6 ::1  prefixlen 128  scopeid 0x10<host>
>>                 loop  txqueuelen 1  (Loopback Local)
>>                 RX packets 1567747  bytes 224694729 (214.2 MiB)
>>                 RX errors 0  dropped 0  overruns 0  frame 0
>>                 TX packets 1567747  bytes 224694729 (214.2 MiB)
>>                 TX errors 0  dropped 0 overruns 0  carrier 0
>>          collisions 0
>>
>>
>>
>>
>>         [root@packtfence ~]# cat /usr/local/pf/conf/networks.co
>>         <http://networks.co>nf
>>         [172.17.0.0]
>>         dns=172.17.0.2
>>         dhcp_start=172.17.0.10
>>         gateway=172.17.0.2
>>         domain-name=vlan-registration.scrivener.com.br
>>         <http://vlan-registration.scrivener.com.br>
>>         nat_enabled=disabled
>>         named=enabled
>>         dhcp_max_lease_time=30
>>         fake_mac_enabled=disabled
>>         dhcpd=disabled
>>         dhcp_end=172.17.0.246
>>         type=vlan-registration
>>         netmask=255.255.255.0
>>         dhcp_default_lease_time=30
>>
>>         [172.18.0.0]
>>         dns=172.18.0.2
>>         dhcp_start=172.18.0.10
>>         gateway=172.18.0.2
>>         domain-name=vlan-isolation.scrivener.com.br
>>         <http://vlan-isolation.scrivener.com.br>
>>         nat_enabled=disabled
>>         named=enabled
>>         dhcp_max_lease_time=30
>>         fake_mac_enabled=disabled
>>         dhcpd=disabled
>>         dhcp_end=172.18.0.246
>>         type=vlan-isolation
>>         netmask=255.255.255.0
>>         dhcp_default_lease_time=30
>>
>>
>>
>>
>>
>>         [root@packtfence ~]# cat /usr/local/pf/conf/switches.co
>>         <http://switches.co>nf
>>         #
>>         # Copyright (C) 2005-2017 Inverse inc.
>>         #
>>         # See the enclosed file COPYING for license information (GPL).
>>         # If you did not receive this file, see
>>         # http://www.fsf.org/licensing/licenses/gpl.html
>>         <http://www.fsf.org/licensing/licenses/gpl.html>
>>         [default]
>>         type=Dell::N1500
>>         registrationVlan=300
>>         isolationVlan=600
>>         uplink=5
>>         cliUser=[secret]
>>         cliPwd=[secret]
>>         cliEnablePwd=[secret]
>>         #
>>         # SNMP section
>>         #
>>         # PacketFence -> Switch
>>         SNMPVersion=2c
>>         #
>>         # RADIUS NAS Client config
>>         #
>>         # RADIUS shared secret with switch
>>         radiusSecret=teste123
>>         CORPORATIVOVlan=301
>>         uplink_dynamic=0
>>
>>         [172.16.0.50]
>>         mode=production
>>         description=172.16.0.50
>>         ExternalPortalEnforcement=Y
>>         deauthMethod=Telnet
>>         cliAccess=Y
>>         defaultVlan=301
>>
>>
>>
>>         Any can help? Please! My Christmas present and New Year's Eve.
>>
>>
>>
>>
>>         Att,
>>         Andre Scrivener
>>
>>
>>         
>> ------------------------------------------------------------------------------
>>         Check out the vibrant tech community on one of the world's most
>>         engaging tech sites, Slashdot.org! http://sdm.link/slashdot
>>
>>
>>         _______________________________________________
>>         PacketFence-users mailing list
>>         [email protected]
>>         <mailto:[email protected]>
>>         https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>         <https://lists.sourceforge.net/lists/listinfo/packetfence-users>
>
>         -- 
>         Fabrice Durand
>         [email protected] <mailto:[email protected]> ::  +1.514.447.4918 
> (x135) ::  www.inverse.ca <http://www.inverse.ca>
>         Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and 
> PacketFence (http://packetfence.org) 
>
>
>         
> ------------------------------------------------------------------------------
>         Check out the vibrant tech community on one of the world's most
>         engaging tech sites, Slashdot.org! http://sdm.link/slashdot
>         _______________________________________________
>         PacketFence-users mailing list
>         [email protected]
>         <mailto:[email protected]>
>         https://lists.sourceforge.net/lists/listinfo/packetfence-users
>         <https://lists.sourceforge.net/lists/listinfo/packetfence-users>
>
>
>
>
>     -- 
>     Att
>     *Andre*
>
>
>
>
> -- 
> Att
> *Andre*

-- 
Fabrice Durand
[email protected] ::  +1.514.447.4918 (x135) ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org) 

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to