Ok, finally I got the portal registration going. The redirect ACL should be defined in the "role by switch role" registration role while http://pfip/Cisco::ASA should be the registration role in "Role by Webauth URL"

What if I want to bypass the portal completely and assign role based on the radius authentication?

I tried to flag "Automatically register devices" in the connection profile like I do with 802.1x but the vpn client stays unregistered:

Jun  4 13:59:12 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2480) INFO: [mac:[undef]] Unable to extract MAC from Called-Station-Id: 89.97.236.20 (pf::radius::extractApMacFromRadiusRequest) Jun  4 13:59:12 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2480) INFO: [mac:[undef]] Instantiate profile testasa (pf::Connection::ProfileFactory::_from_profile) Jun  4 13:59:12 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2480) INFO: [mac:[undef]] Found authentication source(s) : 'AuthAD' for realm 'null' (pf::config::util::filter_authentication_sources) Jun  4 13:59:12 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2480) INFO: [mac:[undef]] is of status unreg; belongs into registration VLAN (pf::role::getRegistrationRole) Jun  4 13:59:12 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2480) INFO: [mac:[undef]] LDAP testing connection (pf::LDAP::expire_if) Jun  4 13:59:12 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2480) INFO: [mac:[undef]] [AuthAD] Authentication successful for c.mammoli (pf::Authentication::Source::LDAPSource::authenticate) Jun  4 13:59:12 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2480) INFO: [mac:[undef]] Authentication successful for c.mammoli in source AuthAD (AD) (pf::authentication::authenticate) Jun  4 13:59:12 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2480) INFO: [mac:[undef]] Updating locationlog from accounting request (pf::api::handle_accounting_metadata) Jun  4 13:59:12 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2480) INFO: [mac:[undef]] Unable to extract MAC from Called-Station-Id: 89.97.236.20 (pf::radius::extractApMacFromRadiusRequest) Jun  4 13:59:12 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2480) INFO: [mac:[undef]] Unable to extract MAC from Called-Station-Id: 89.97.236.20 (pf::radius::extractApMacFromRadiusRequest) Jun  4 13:59:13 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2480) INFO: [mac:[undef]] Unable to extract MAC from Called-Station-Id: 89.97.236.20 (pf::radius::extractApMacFromRadiusRequest) Jun  4 13:59:13 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2480) WARN: [mac:[undef]] Use of uninitialized value $conn_type in bitwise and (&) at /usr/local/pf/lib/pf/radius.pm line 660.
 (pf::radius::_translateNasPortToIfIndex)
Jun  4 13:59:13 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2480) WARN: [mac:[undef]] Use of uninitialized value $conn_type in bitwise and (&) at /usr/local/pf/lib/pf/radius.pm line 663.
 (pf::radius::_translateNasPortToIfIndex)


Il 03/06/2019 18:05, Cristian Mammoli via PacketFence-users ha scritto:
Ok, a little bit of info:

The redirect acl on the example is unused, as well as the vpn profile, so they should be removed by the docs
The plugin relies on the
mdm-tlv=device-mac=
radius attribute from the client and since I was testing using OpenConnect and not the official AnyConnect client it didn't work and PF could not see my MAC


Il 03/06/2019 12:29, Cristian Mammoli via PacketFence-users ha scritto:
This is a debug log of a vpn connection.
Things I noticed:
There is no MAC address associated with the request and in Audit I see the remote IP address as MAC address. Is it correct? Connection profile is not instantiated, instead, all authentication sources are tried in order PF complains no roles are returned by the authentication source but the auth source DOES, see previous mails


Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] application/json (pf::WebAPI::handler) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] invalid MAC: empty (pf::util::valid_mac) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] instantiating new pf::radius object (pf::radius::new) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) INFO: [mac:[undef]] Unable to extract MAC from Called-Station-Id: 89.97.236.20 (pf::radius::extractApMacFromRadiusRequest) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] instantiating switch (pf::radius::switch_access) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] cache get for namespace='switch.overlay', key='10.11.10.254', cache='DBI', time='1ms': MISS (not in cache) (CHI::Driver::_log_get_result) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] instantiating new pf::access_filter::switch (pf::access_filter::new) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] No engine found for instantiate_module (pf::access_filter::test) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] creating new pf::Switch::Cisco::ASA object (pf::SwitchFactory::instantiate) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] Extracting username 'c.mammoli' from RADIUS attribute User-Name (pf::Switch::parseRequestUsername) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] Extracting username 'c.mammoli' from RADIUS attribute User-Name (pf::Switch::parseRequestUsername) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] Stripping username is enabled in this context (radius). Will return a split username and realm. (pf::config::util::strip_username_if_needed) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] Authenticating 'c.mammoli' from source(s) local, apra-machine-auth-dc01, apra-user-auth-dc01, apra-vpn-auth-dc01 (pf::authentication::authenticate) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] cache get for namespace='Default', key='ARRAY(0x55dd536f26e8)', cache='RawMemory', time='0ms': MISS (not in cache) (CHI::Driver::_log_get_result) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] cache set for namespace='Default', key='["192.168.0.76","read_timeout","10","write_timeout","5","timeout","5","encryption","starttls","port","389"]', size=1, expires='never', cache='RawMemory', time='0ms' (CHI::Driver::_log_set_result) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] [apra-machine-auth-dc01] Using LDAP connection to 192.168.0.76 (pf::Authentication::Source::LDAPSource::_connect) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) WARN: [mac:[undef]] [apra-machine-auth-dc01] No entries found (0) with filter (servicePrincipalName=c.mammoli) from dc=apra,dc=it on 192.168.0.76:389 (pf::Authentication::Source::LDAPSource::authenticate) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) INFO: [mac:[undef]] LDAP testing connection (pf::LDAP::expire_if) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] cache get for namespace='Default', key='ARRAY(0x55dd5386cfd0)', cache='RawMemory', time='0ms': HIT (CHI::Driver::_log_get_result) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] [apra-user-auth-dc01] Using LDAP connection to 192.168.0.76 (pf::Authentication::Source::LDAPSource::_connect) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) INFO: [mac:[undef]] [apra-user-auth-dc01] Authentication successful for c.mammoli (pf::Authentication::Source::LDAPSource::authenticate) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) INFO: [mac:[undef]] Authentication successful for c.mammoli in source apra-user-auth-dc01 (AD) (pf::authentication::authenticate) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] (10.11.10.254) Received undefined VLAN. No VLAN added to RADIUS Access-Accept (pf::Switch::returnRadiusAccessAccept) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] Network device (10.11.10.254) supports roles. Evaluating role to be returned (pf::Switch::returnRadiusAccessAccept) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] (10.11.10.254) Received undefined role. No Role added to RADIUS Access-Accept (pf::Switch::returnRadiusAccessAccept) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] Network device (10.11.10.254) supports roles. Evaluating role to be returned (pf::Switch::Cisco::ASA::returnAuthorizeVPN) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] (10.11.10.254) Received undefined role. No Role added to RADIUS Access-Accept (pf::Switch::Cisco::ASA::returnAuthorizeVPN) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) WARN: [mac:[undef]] Use of uninitialized value $roleName in hash element at /usr/local/pf/lib/pf/Switch.pm line 783.
 (pf::Switch::getRoleByName)
Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) WARN: [mac:[undef]] Use of uninitialized value $roleName in concatenation (.) or string at /usr/local/pf/lib/pf/Switch.pm line 786.
 (pf::Switch::getRoleByName)
Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] instantiating new pf::access_filter::radius (pf::access_filter::new) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] application/json (pf::WebAPI::handler) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] Entering handling of accounting metadata (pf::api::handle_accounting_metadata) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) INFO: [mac:[undef]] Updating locationlog from accounting request (pf::api::handle_accounting_metadata) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] instantiating new pf::radius object (pf::radius::new) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) INFO: [mac:[undef]] Unable to extract MAC from Called-Station-Id: 89.97.236.20 (pf::radius::extractApMacFromRadiusRequest) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] instantiating switch (pf::radius::update_locationlog_accounting) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] cache get for namespace='switch.overlay', key='10.11.10.254', cache='DBI', time='1ms': MISS (not in cache) (CHI::Driver::_log_get_result) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] instantiating new pf::access_filter::switch (pf::access_filter::new) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] No engine found for instantiate_module (pf::access_filter::test) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] creating new pf::Switch::Cisco::ASA object (pf::SwitchFactory::instantiate) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] Setting current tenant ID to 1 (pf::dal::set_tenant) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] Not handling iplog update because we're not configured to do so on accounting packets. (pf::api::handle_accounting_metadata) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] Not handling scan engines because we're not configured to do so on accounting packets or the IP address (Framed-IP-Address) is missing from the packet. (pf::api::handle_accounting_metadata) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] instantiating new pf::radius object (pf::radius::new) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) INFO: [mac:[undef]] Unable to extract MAC from Called-Station-Id: 89.97.236.20 (pf::radius::extractApMacFromRadiusRequest) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] instantiating switch (pf::radius::accounting) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] cache get for namespace='switch.overlay', key='10.11.10.254', cache='DBI', time='0ms': MISS (not in cache) (CHI::Driver::_log_get_result) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] instantiating new pf::access_filter::switch (pf::access_filter::new) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] No engine found for instantiate_module (pf::access_filter::test) Jun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] creating new pf::Switch::Cisco::ASA object (pf::SwitchFactory::instantiate) ^CJun  3 12:24:26 srvpf packetfence_httpd.aaa: httpd.aaa(28389) DEBUG: [mac:[undef]] Setting current tenant ID

Il 03/06/2019 10:36, Cristian Mammoli via PacketFence-users ha scritto:
Hi, is it possible to have further info on the new VPN feature?
The docs are lacking info:

I tried again from scratch on a Cisco ASA and the example config refers a vpn client profile that does not exists by default:

  anyconnect profiles VPN_client_profile disk0:/VPN_client_profile.xml

Please, can you share some additional information and examples?


Il 24/05/2019 14:49, Cristian Mammoli via PacketFence-users ha scritto:
Hi Fabrice, any chance I can get a little bit more info on this topic?

Thanks for your time

Il 18/05/2019 09:33, Cristian Mammoli via PacketFence-users ha scritto:
Hi Fabrice, the auth source is already in use for wired and wireless access and has role assignment working:

Testing authentication for "c.mammoli"

Authenticating against 'apra-user-auth-dc01' in context 'admin'
  Authentication SUCCEEDED against apra-user-auth-dc01 (Authentication successfu l.)
  Matched against apra-user-auth-dc01 for 'authentication' rules
    set_role : staff_it
    set_access_duration : 10Y
  Matched against apra-user-auth-dc01 for 'administration' rules
    set_access_level : ALL
    mark_as_sponsor : 1

Authenticating against 'apra-user-auth-dc01' in context 'portal'
  Authentication SUCCEEDED against apra-user-auth-dc01 (Authentication successfu l.)
  Matched against apra-user-auth-dc01 for 'authentication' rules
    set_role : staff_it
    set_access_duration : 10Y
  Matched against apra-user-auth-dc01 for 'administration' rules
    set_access_level : ALL
    mark_as_sponsor : 1



In authentication.conf:

[apra-user-auth-dc01]
cache_match=0
realms=apra,apra.it,default,null
basedn=dc=apra,dc=it
password=XXXXXXXXXXXXXX
set_access_level_action=
scope=sub
email_attribute=mail
usernameattribute=sAMAccountName
connection_timeout=5
binddn=cn=packetfence,cn=Users,dc=apra,dc=it
encryption=starttls
port=389
description=Apra User authentication
host=192.168.0.7,192.168.0.76
type=AD
read_timeout=10
write_timeout=5
monitor=1
dynamic_routing_module=AuthModule
shuffle=1
searchattributes=

[apra-user-auth-dc01 rule Administrator]
action0=set_access_level=ALL
condition0=memberOf,equals,CN=Tecnici,OU=Gruppi apra,OU=Utenti,DC=apra,DC=it
match=all
class=administration
action1=mark_as_sponsor=1

[apra-user-auth-dc01 rule Sponsors]
action0=mark_as_sponsor=1
match=all
class=administration

[apra-user-auth-dc01 rule Voice]
action0=set_role=voice
condition0=sAMAccountName,equals,voice
match=all
class=authentication
action1=set_access_duration=10Y

[apra-user-auth-dc01 rule Staff_IT]
action0=set_role=staff_it
condition0=memberOf,equals,CN=Tecnici,OU=Gruppi apra,OU=Utenti,DC=apra,DC=it
match=all
class=authentication
action1=set_access_duration=10Y

[apra-user-auth-dc01 rule Employees]
action0=set_role=employees
match=all
class=authentication
action1=set_access_duration=10Y

Regards


Il 17/05/2019 19:38, Fabrice Durand via PacketFence-users ha scritto:
Hello Cristian,

first you need to fix your authentication source apra-user-auth-dc01 and add a authentication rule that return a role and an access duration. (use: /usr/local/pf/bin/pftest authentication c.mammoli bob apra-user-auth-dc01)

After that you should be able to see a role associated to your device and probably something better in the radius audit log and we will see for the next steps.

Regards

Fabrice


Le 19-05-17 à 12 h 37, Cristian Mammoli via PacketFence-users a écrit :
Cisco ASA VPN Configuration in 9.0

Hi, I'm trying to configure our ASA for VPN authentication but the docs are a little bit vague considering this is a new concept

Steps I did:

* Added the asa in the switch group, configured PSK etc
* Configured access list in "Role by Access List"
* Added a connection profile with the following filter: switch=<asa ip address> * I used an existing authentication source with LDAP role assignment * Configured the Packetfence Radius server in the ASA and the vpn as in the example provided

Now what?

I can connect via vpn and surf the Internet
In the audit log I see my authentication:

Request Time
0
RADIUS Request
User-Name = "c.mammoli"
User-Password = "******"
NAS-IP-Address = 10.11.10.254
NAS-Port = 186806272
Called-Station-Id = "X.X.X.X"
Calling-Station-Id = "5.90.220.187"
NAS-Port-Type = Virtual
Tunnel-Client-Endpoint:0 = "5.90.220.187"
Event-Timestamp = "May 17 2019 18:27:47 CEST"
Cisco-AVPair = "audit-session-id=0a0b0afe0b2270005cdee105"
Cisco-AVPair = "ip:source-ip=5.90.220.187"
Cisco-AVPair = "coa-push=true"
ASA-TunnelGroupName = "VPN"
ASA-ClientType = AnyConnect-Client-SSL-VPN
Stripped-User-Name = "c.mammoli"
Realm = "null"
FreeRADIUS-Client-IP-Address = 10.11.10.254
SQL-User-Name = "c.mammoli"

RADIUS Reply

But the reply is empty

In the logs:
httpd.aaa(6766) INFO: [mac:c4:86:e9:96:61:e1] Unable to extract MAC from Called-Station-Id: 89.97.236.20 (pf::radius::extractApMacFromRadiusRequest) httpd.aaa(6766) INFO: [mac:c4:86:e9:96:61:e1] LDAP testing connection (pf::LDAP::expire_if) httpd.aaa(6766) WARN: [mac:c4:86:e9:96:61:e1] [apra-machine-auth-dc01] No entries found (0) with filter (servicePrincipalName=c.mammoli) from dc=apra,dc=it on 192.168.0.76:389 (pf::Authentication::Source::LDAPSource::authenticate) httpd.aaa(6766) INFO: [mac:c4:86:e9:96:61:e1] LDAP testing connection (pf::LDAP::expire_if) httpd.aaa(6766) INFO: [mac:c4:86:e9:96:61:e1] [apra-user-auth-dc01] Authentication successful for c.mammoli (pf::Authentication::Source::LDAPSource::authenticate) httpd.aaa(6766) INFO: [mac:c4:86:e9:96:61:e1] Authentication successful for c.mammoli in source apra-user-auth-dc01 (AD) (pf::authentication::authenticate) httpd.aaa(6766) WARN: [mac:c4:86:e9:96:61:e1] Use of uninitialized value $roleName in hash element at /usr/local/pf/lib/pf/Switch.pm line 783.

httpd.aaa(6766) WARN: [mac:c4:86:e9:96:61:e1] Use of uninitialized value $roleName in concatenation (.) or string at /usr/local/pf/lib/pf/Switch.pm line 786.
 (pf::Switch::getRoleByName)

It looks like the connection profile isn't even matched, and all authentication sources are tried even if I only specified one

BTW, what is the redirect acl int he docs used for?? It is not applied anywhere and I can't see it int he ASA.pm code

The docs say: "You can force VPN users to authenticate first on the captive portal and based on the role of the device allow it and/or set dynamic ACL." Is the portal authentication a requirement? I would like to authenticate users and assign a dynamic ACL without external portal authentication

Thanks

C.





_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users



--

*Cristian Mammoli*
System Administrator

T.  +39 0731 719822
www.apra.it <http://www.apra.it>


ApraSpa

linksocial

*Avviso sulla tutela di informazioni riservate.* Questo messaggio è stato spedito da Apra spa o da una delle aziende del Gruppo. Esso e gli eventuali allegati, potrebbero contenere informazioni di carattere estremamente riservato e confidenziale. Qualora non foste i destinatari designati, vogliate cortesemente informarci immediatamente con lo stesso mezzo ed eliminare il messaggio e i relativi eventuali allegati, senza trattenerne copia.



_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

--

*Cristian Mammoli*
System Administrator

T.  +39 0731 719822
www.apra.it <http://www.apra.it>


ApraSpa

linksocial

*Avviso sulla tutela di informazioni riservate.* Questo messaggio è stato spedito da Apra spa o da una delle aziende del Gruppo. Esso e gli eventuali allegati, potrebbero contenere informazioni di carattere estremamente riservato e confidenziale. Qualora non foste i destinatari designati, vogliate cortesemente informarci immediatamente con lo stesso mezzo ed eliminare il messaggio e i relativi eventuali allegati, senza trattenerne copia.



_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

--

*Cristian Mammoli*
System Administrator

T.  +39 0731 719822
www.apra.it <http://www.apra.it>


ApraSpa

linksocial

*Avviso sulla tutela di informazioni riservate.* Questo messaggio è stato spedito da Apra spa o da una delle aziende del Gruppo. Esso e gli eventuali allegati, potrebbero contenere informazioni di carattere estremamente riservato e confidenziale. Qualora non foste i destinatari designati, vogliate cortesemente informarci immediatamente con lo stesso mezzo ed eliminare il messaggio e i relativi eventuali allegati, senza trattenerne copia.



_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

--

*Cristian Mammoli*
System Administrator

T.  +39 0731 719822
www.apra.it <http://www.apra.it>


ApraSpa

linksocial

*Avviso sulla tutela di informazioni riservate.* Questo messaggio è stato spedito da Apra spa o da una delle aziende del Gruppo. Esso e gli eventuali allegati, potrebbero contenere informazioni di carattere estremamente riservato e confidenziale. Qualora non foste i destinatari designati, vogliate cortesemente informarci immediatamente con lo stesso mezzo ed eliminare il messaggio e i relativi eventuali allegati, senza trattenerne copia.



_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

--

*Cristian Mammoli*
System Administrator

T.  +39 0731 719822
www.apra.it <http://www.apra.it>


ApraSpa

linksocial

*Avviso sulla tutela di informazioni riservate.* Questo messaggio è stato spedito da Apra spa o da una delle aziende del Gruppo. Esso e gli eventuali allegati, potrebbero contenere informazioni di carattere estremamente riservato e confidenziale. Qualora non foste i destinatari designati, vogliate cortesemente informarci immediatamente con lo stesso mezzo ed eliminare il messaggio e i relativi eventuali allegati, senza trattenerne copia.

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to