In this case, is it a webauth setup ? (https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_webauth)

If it's the case, the portal URL must be https://PACKETFENCESERVER/Aruba .

https://github.com/inverse-inc/packetfence/blob/devel/lib/pf/web/constants.pm#L105


Le 20-03-12 à 14 h 31, Zacharry Williams via PacketFence-users a écrit :
The bluedogrv SSID issues have been pretty much solved. I just did some tweaking to the bindings, and connection profile and people had to forget the network as the certificate changes made a few devices freak out. Little issues here and there but nothing major. it's really the captive portal that's holding me up. Details are in the last mail message.

On Wed, Mar 11, 2020 at 6:06 PM Durand fabrice via PacketFence-users <packetfence-users@lists.sourceforge.net <mailto:packetfence-users@lists.sourceforge.net>> wrote:

    Do you have the logs related to this radius request ?
    (packetfence.log)

    It looks to me that you are doing 802.1x + web auth.

    For the ssid BlueDogRV, just configure it like
    
https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_all_aruba_os
    (Secure SSID and not like WebAuth).

    Once done, connect to the ssid BlueDogRV, you are supposed to see :


    Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) INFO:
    [mac:00:24:d7:90:be:84] handling radius autz request: from
    switch_ip => (192.168.100.216), connection_type =>
    Wireless-802.11-EAP,switch_mac => (c8:b5:ad:ce:43:7c), mac =>
    [00:24:d7:90:be:84], port => 0, username => "host/ tacos
    -016.BluedogRV.lan", ssid => "BlueDogRV" (pf::radius::authorize)

    If it's the case then change the filter of your connection profile
    to use SSID = BlueDogRV and add the source you want to use for
    machine auth.

    Let me know if it's ok.

    Regards

    Fabrice


    Le 20-03-11 à 17 h 12, Zacharry Williams via PacketFence-users a
    écrit :
    User-Name = "host/ta-00614.BluedogRV.lan"
    NAS-IP-Address = 192.168.100.217
    NAS-Port = 0
    Service-Type = Framed-User
    Framed-MTU = 1100
    State = 0x2880f3b42988e97dfdf00d5089857e6a
    Called-Station-Id = "f0:5c:19:c2:13:96"
    Calling-Station-Id = "9c:30:5b:1c:06:4b"
    NAS-Identifier = "Aruba_Wireless"
    NAS-Port-Type = Wireless-802.11
    Event-Timestamp = "Mar 11 2020 08:58:36 PDT"
    EAP-Message = 0x020800061a03
    Aruba-Essid-Name = "BlueDogRV"
    Aruba-Location-Id = "ID-PF-SLS"
    Aruba-AP-Group = "PostFalls"
    FreeRADIUS-Proxied-To = 127.0.0.1
    EAP-Type = MSCHAPv2
    Realm = "BluedogRV.lan"
    Called-Station-SSID = "BlueDogRV"
    PacketFence-Domain = "Bluedogrv"
    PacketFence-KeyBalanced = "f20536da90cb9e178c302675355f1678"
    PacketFence-Radius-Ip = "192.168.100.211"
    PacketFence-NTLMv2-Only = ""
    User-Password = "******"
    SQL-User-Name = "host/ta-00614.BluedogRV.lan"

    It's there as Aruba-Essid-Name, which i'm guessing isn't being
    accepted.
    Either way i deleted the switch and put it back in. Which seems
    to have alleviated the majority of the issues.

    As for the captive portal, I'm thinking is in the same boat as
    there aerohive stuff maybe? Where the url isn't being parsed
    correctly or something?

    On Wed, Mar 11, 2020 at 10:45 AM Fabrice Durand via
    PacketFence-users <packetfence-users@lists.sourceforge.net
    <mailto:packetfence-users@lists.sourceforge.net>> wrote:

        Ok so first there is no ssid sent in the radius request so
        you can't use a filter based on the ssid.

        So what you can do (removed the ssid):


        [Wireless_EAP]
        filter_match_style=all
        description=Wireless_EAP
        sources=tacos-MachineAuth
        filter=connection_type:Wireless-802.11-EAP
        autoregister=enabled
        redirecturl=https://www.tacos.com
        logo=/common/Logo-horz.png

        So when you will connect you will see "Instantiate profile
        Wireless_EAP"  and "Found authentication source(s) :
        'tacos-MachineAuth' for realm ' tacos.lan'"

        Next you need to be sure that tacos-MachineAuth return a role.

        Test that and let me know.

        Regards

        Fabrice

        Le 20-03-11 à 12 h 07, Zacharry Williams via
        PacketFence-users a écrit :
        Okay so this is the one from today. get's matched to the
        Ethernet profile and denied.


        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        INFO: [mac:00:24:d7:90:be:84] handling radius autz request:
        from switch_ip => (192.168.100.216), connection_type =>
        Wireless-802.11-EAP,switch_mac => (c8:b5:ad:ce:43:7c), mac
        => [00:24:d7:90:be:84], port => 0, username => "host/ tacos
        -016.BluedogRV.lan" (pf::radius::authorize)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        INFO: [mac:00:24:d7:90:be:84] is doing machine auth with
        account 'host/ tacos . tacos.lan'. (pf::radius::authorize)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] instantiating new pf::role
        object (pf::role::new)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] instantiating new
        pf::access_filter::vlan (pf::access_filter::new)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] No engine found for IsPhone
        (pf::access_filter::test)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] Trying to match IP address to
        MAC '00:24:d7:90:be:84' using SQL 'ip4log' table
        (pf::ip4log::mac2ip)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] Viewing an 'ip4log' table
        entry for the following MAC address '00:24:d7:90:be:84'
        (pf::ip4log::_view_by_mac)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] Matched MAC
        '00:24:d7:90:be:84' to IP address '192.168.50.119' using SQL
        'ip4log' table (pf::ip4log::mac2ip)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] Memory configuration is not
        valid anymore for key FilterEngine::Profile() in local
        cached_hash (pfconfig::cached::is_valid)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] Memory configuration is not
        valid anymore for key config::Profiles() in local
        cached_hash (pfconfig::cached::is_valid)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        INFO: [mac:00:24:d7:90:be:84] Instantiate profile
        Ethernet802.1x (pf::Connection::ProfileFactory::_from_profile)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] instantiating new
        pf::Connection::Profile object (pf::Connection::Profile::new)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] instantiating new
        pf::access_filter::vlan (pf::access_filter::new)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] No engine found for
        AutoRegister (pf::access_filter::test)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] Autoregistration set on
        profile Ethernet802.1x (pf::role::shouldAutoRegister)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] instantiating new
        pf::access_filter::vlan (pf::access_filter::new)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] No engine found for
        NodeInfoForAutoReg (pf::access_filter::test)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] Memory configuration is not
        valid anymore for key config::Profiles() in local
        cached_hash (pfconfig::cached::is_valid)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] Used realm tacos tacos.lan is
        associated to the configured realm tacos.lan
        (pf::config::util::get_realm_authentication_source)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        INFO: [mac:00:24:d7:90:be:84] Found authentication source(s)
        : 'tacod1' for realm ' tacos.lan'
        (pf::config::util::filter_authentication_sources)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] EAP connection with a
        username "host/ tacos -016. tacos .lan". Trying to match
        rules from authentication sources.
        (pf::role::getNodeInfoForAutoReg)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        WARN: [mac:00:24:d7:90:be:84] Use of uninitialized value in
        concatenation (.) or string at
        /usr/local/pf/lib/pf/authentication.pm
        <http://authentication.pm> line 389.
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] Match called with parameters
        radius_request => HASH(0x55bbf87d1a00), rule_class =>
        authentication, stripped_user_name => , SSID => , username
        => host/tacos-016. tacos .lan, realm => BluedogRV.lan,
        context => radius, connection_type => Wireless-802.11-EAP
        (pf::authentication::match2)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] Stripping username is enabled
        in this context (radius). Will return a split username and
        realm. (pf::config::util::strip_username_if_needed)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        INFO: [mac:00:24:d7:90:be:84] Using sources tacos for
        matching (pf::authentication::match2)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        INFO: [mac:00:24:d7:90:be:84] LDAP testing connection
        (pf::LDAP::expire_if)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] cache get for
        namespace='Default', key='ARRAY(0x55bbfd640658)',
        cache='RawMemory', time='0ms': HIT
        (CHI::Driver::_log_get_result)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] [ tacos ] Using LDAP
        connection to 192.168.20.98
        (pf::Authentication::Source::LDAPSource::_connect)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] [ tacos tacos ] Searching for
        (|(sAMAccountName=host/ tacos -016. tacos
        .lan)(servicePrincipalName=host/ tacos -016. tacos .lan)),
        from DC= tacos ,DC=lan, with scope sub
        (pf::Authentication::Source::LDAPSource::match_in_subclass)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] [ tacos tacos ] Found 1
        results
        (pf::Authentication::Source::LDAPSource::_match_in_subclass)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] [ tacos tacos ] Searching
        is_member filter (|(member=CN= tacos -016,OU=Post Falls,OU=
        tacos Computers,DC= tacos ,DC=lan)(uniqueMember=CN= tacos
        -016,OU=Post Falls,OU= tacos Computers,DC= tacos
        ,DC=lan)(memberUid=))
        (pf::Authentication::Source::LDAPSource::_match_in_subclass)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] [ tacos Domain_Users]
        Searching for (|(sAMAccountName=host/ tacos -016. tacos
        .lan)(servicePrincipalName=host/ tacos -016. tacos .lan)),
        from DC= tacos ,DC=lan, with scope sub
        (pf::Authentication::Source::LDAPSource::match_in_subclass)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] [ tacos Domain_Users] Found 1
        results
        (pf::Authentication::Source::LDAPSource::_match_in_subclass)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] [ tacos Domain_Users]
        Searching is_member filter (|(member=CN= tacos -016,OU=Post
        Falls,OU= tacos Computers,DC= tacos
        ,DC=lan)(uniqueMember=CN= tacos -016,OU=Post Falls,OU= tacos
        Computers,DC= tacos ,DC=lan)(memberUid=))
        (pf::Authentication::Source::LDAPSource::_match_in_subclass)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        WARN: [mac:00:24:d7:90:be:84] No category computed for
        autoreg (pf::role::getNodeInfoForAutoReg)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] [00:24:d7:90:be:84]
        auto-registering node (pf::radius::authorize)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        WARN: [mac:00:24:d7:90:be:84] No role specified or found for
        pid host/ tacos -016.BluedogRV.lan (MAC 00:24:d7:90:be:84);
        assume maximum number of registered nodes is reached
        (pf::node::is_max_reg_nodes_reached)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        ERROR: [mac:00:24:d7:90:be:84] max nodes per pid met or
        exceeded - registration of 00:24:d7:90:be:84 to host/ tacos
        -016.BluedogRV.lan failed
        (pf::registration::setup_node_for_registration)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        ERROR: [mac:00:24:d7:90:be:84] auto-registration of node
        failed max nodes per pid met or exceeded (pf::radius::authorize)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        ERROR: [mac:00:24:d7:90:be:84] Database query failed with
        non retryable error: Cannot add or update a child row: a
        foreign key constraint fails (`pf`.`node`, CONSTRAINT `0_57`
        FOREIGN KEY (`tenant_id`, `pid`) REFERENCES `person`
        (`tenant_id`, `pid`) ON DELETE CASCADE ON UPDATE CASCADE)
        (errno: 1452) [INSERT INTO `node` ( `autoreg`,
        `bandwidth_balance`, `bypass_role_id`, `bypass_vlan`,
        `category_id`, `computername`, `detect_date`,
        `device_class`, `device_manufacturer`, `device_score`,
        `device_type`, `device_version`, `dhcp6_enterprise`,
        `dhcp6_fingerprint`, `dhcp_fingerprint`, `dhcp_vendor`,
        `last_arp`, `last_dhcp`, `last_seen`, `lastskip`, `mac`,
        `machine_account`, `notes`, `pid`, `regdate`, `sessionid`,
        `status`, `tenant_id`, `time_balance`, `unregdate`,
        `user_agent`, `voip`) VALUES ( ?, ?, ?, ?, ?, ?, ?, ?, ?, ?,
        ?, ?, ?, ?, ?, ?, ?, ?, NOW(), ?, ?, ?, ?, ?, ?, ?, ?, ?, ?,
        ?, ?, ? ) ON DUPLICATE KEY UPDATE `autoreg` = ?, `last_seen`
        = NOW(), `machine_account` = ?, `pid` = ?, `status` = ?,
        `tenant_id` = ?]{yes, NULL, NULL, NULL, NULL, NULL,
        2020-03-11 08:53:16, NULL, NULL, NULL, NULL, NULL, NULL,
        NULL, NULL, NULL, 0000-00-00 00:00:00, 0000-00-00 00:00:00,
        0000-00-00 00:00:00, 00:24:d7:90:be:84, host/ tacos
        -016.BluedogRV.lan, NULL, host/ tacos -016.BluedogRV.lan,
        0000-00-00 00:00:00, NULL, reg, 1, NULL, 0000-00-00
        00:00:00, NULL, no, yes, host/ tacos -016. tacos .lan, host/
        tacos -016.BluedogRV.lan, reg, 1} (pf::dal::db_execute)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        DEBUG: [mac:00:24:d7:90:be:84] disconnecting db
        (pf::db::db_disconnect)
        Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641)
        ERROR: [mac:00:24:d7:90:be:84] Cannot save 00:24:d7:90:be:84
        error (500) (pf::radius::authorize)

        #
        # Copyright (C) 2005-2019 Inverse inc.
        #
        # See the enclosed file COPYING for license information (GPL).
        # If you did not receive this file, see
        # http://www.fsf.org/licensing/licenses/gpl.html
        [default]
        sources=null

        [Wire_noEAP]
        locale=
        filter=connection_type:Ethernet-NoEAP
        autoregister=enabled

        [Wireless_EAP]
        filter_match_style=all
        description=Wireless_EAP
        sources=tacos-MachineAuth
        filter=connection_type:Wireless-802.11-EAP,ssid:tacos
        autoregister=enabled
        redirecturl=https://www.tacos.com
        logo=/common/Logo-horz.png

        #
        # Copyright (C) 2005-2019 Inverse inc.
        #
        # See the enclosed file COPYING for license information (GPL).
        # If you did not receive this file, see
        # http://www.fsf.org/licensing/licenses/gpl.html
        [Ethernet802.1x]
        filter=connection_type:Ethernet-EAP,connection_sub_type:MS-CHAP-V2
        sources=BDRVDC1
        unreg_on_acct_stop=enabled
        autoregister=enabled

        [Wireless_BYOD]
        filter_match_style=all
        description=Wireless_EAP
        sources=BDRVDC1
        filter=connection_type:Wireless-802.11-EAP,ssid:tacos-BYOD
        autoregister=enabled
        logo=/common/Logo-horz.png
        redirecturl=https://www.tacos.com
        #
        # Copyright (C) 2005-2019 Inverse inc.
        #
        # See the enclosed file COPYING for license information (GPL).
        # If you did not receive this file, see
        # http://www.fsf.org/licensing/licenses/gpl.html
        ~
        ~
        ~
        ~
        ~
        ~
        ~

        On Wed, Mar 11, 2020 at 8:48 AM Zacharry Williams
        <zachar...@gmail.com <mailto:zachar...@gmail.com>> wrote:

            Yep I'm scrubbing them now. It's also matching clients
            connecting on wireless-eap to wired-eap

            On Tue, Mar 10, 2020, 4:53 PM Durand fabrice via
            PacketFence-users
            <packetfence-users@lists.sourceforge.net
            <mailto:packetfence-users@lists.sourceforge.net>> wrote:

                Hello,

                can you provide the packetfence.log file and the
                profiles.conf file ?

                Regards

                Fabrice


                Le 20-03-10 à 15 h 19, Zacharry Williams via
                PacketFence-users a écrit :
                Hey all,

                Randomly it matched the correct connection profile,
                one time. Is this like a 9.3 bug where connection
                profiles aren't being match?

                On Mon, Mar 9, 2020 at 3:06 PM Zacharry Williams
                <zachar...@gmail.com <mailto:zachar...@gmail.com>>
                wrote:

                    Hey all,

                    I've been working on setting up a guest LAN and
                    a byod LAN for a few days now. When I use a PSK
                    or AD Authentication it works fine, but the
                    captive portal isn't working like I think it
                    should be.
                    I revisited the guide a few times to check and
                    I don't think i'm missing any settings. I
                    customized a captive portal with a logo and an
                    acceptable use policy but every time I get the
                    captive portal, I don't get the portal I
                    customized but instead get the default one.
                    It's like the default connection profile is
                    matched first. I set the httpd.aaa.conf logging
                    to debug but nothing shows up as to why it's
                    picking that connection profile in
                    packetfence.log. I'm using Aruba instants, and
                    managing them through Aruba Central.

                    Where are the logs to read into why it's
                    picking that portal?



                _______________________________________________
                PacketFence-users mailing list
                PacketFence-users@lists.sourceforge.net  
<mailto:PacketFence-users@lists.sourceforge.net>
                https://lists.sourceforge.net/lists/listinfo/packetfence-users
                _______________________________________________
                PacketFence-users mailing list
                PacketFence-users@lists.sourceforge.net
                <mailto:PacketFence-users@lists.sourceforge.net>
                https://lists.sourceforge.net/lists/listinfo/packetfence-users



        _______________________________________________
        PacketFence-users mailing list
        PacketFence-users@lists.sourceforge.net  
<mailto:PacketFence-users@lists.sourceforge.net>
        https://lists.sourceforge.net/lists/listinfo/packetfence-users

-- Fabrice Durand
        fdur...@inverse.ca  <mailto:fdur...@inverse.ca>  ::  +1.514.447.4918 (x135) 
::www.inverse.ca  <http://www.inverse.ca>
        Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and 
PacketFence (http://packetfence.org)

        _______________________________________________
        PacketFence-users mailing list
        PacketFence-users@lists.sourceforge.net
        <mailto:PacketFence-users@lists.sourceforge.net>
        https://lists.sourceforge.net/lists/listinfo/packetfence-users



    _______________________________________________
    PacketFence-users mailing list
    PacketFence-users@lists.sourceforge.net  
<mailto:PacketFence-users@lists.sourceforge.net>
    https://lists.sourceforge.net/lists/listinfo/packetfence-users
    _______________________________________________
    PacketFence-users mailing list
    PacketFence-users@lists.sourceforge.net
    <mailto:PacketFence-users@lists.sourceforge.net>
    https://lists.sourceforge.net/lists/listinfo/packetfence-users



_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to