Ah that's the problem. If I use /Aruba or anything else I get the Not Implemented. Get to /Aruba is not supported.
On Thu, Mar 12, 2020, 5:53 PM Durand fabrice via PacketFence-users < packetfence-users@lists.sourceforge.net> wrote: > In this case, is it a webauth setup ? ( > https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_webauth > ) > > If it's the case, the portal URL must be https://PACKETFENCESERVER/Aruba . > > > https://github.com/inverse-inc/packetfence/blob/devel/lib/pf/web/constants.pm#L105 > > > Le 20-03-12 à 14 h 31, Zacharry Williams via PacketFence-users a écrit : > > The bluedogrv SSID issues have been pretty much solved. I just did some > tweaking to the bindings, and connection profile and people had to forget > the network as the certificate changes made a few devices freak out. Little > issues here and there but nothing major. it's really the captive portal > that's holding me up. Details are in the last mail message. > > On Wed, Mar 11, 2020 at 6:06 PM Durand fabrice via PacketFence-users < > packetfence-users@lists.sourceforge.net> wrote: > >> Do you have the logs related to this radius request ? (packetfence.log) >> >> It looks to me that you are doing 802.1x + web auth. >> >> For the ssid BlueDogRV, just configure it like >> https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_all_aruba_os >> (Secure SSID and not like WebAuth). >> >> Once done, connect to the ssid BlueDogRV, you are supposed to see : >> >> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) INFO: >> [mac:00:24:d7:90:be:84] handling radius autz request: from switch_ip => >> (192.168.100.216), connection_type => Wireless-802.11-EAP,switch_mac => >> (c8:b5:ad:ce:43:7c), mac => [00:24:d7:90:be:84], port => 0, username => >> "host/ tacos -016.BluedogRV.lan", ssid => "BlueDogRV" >> (pf::radius::authorize) >> >> If it's the case then change the filter of your connection profile to use >> SSID = BlueDogRV and add the source you want to use for machine auth. >> >> Let me know if it's ok. >> >> Regards >> >> Fabrice >> >> >> Le 20-03-11 à 17 h 12, Zacharry Williams via PacketFence-users a écrit : >> >> User-Name = "host/ta-00614.BluedogRV.lan" >> NAS-IP-Address = 192.168.100.217 >> NAS-Port = 0 >> Service-Type = Framed-User >> Framed-MTU = 1100 >> State = 0x2880f3b42988e97dfdf00d5089857e6a >> Called-Station-Id = "f0:5c:19:c2:13:96" >> Calling-Station-Id = "9c:30:5b:1c:06:4b" >> NAS-Identifier = "Aruba_Wireless" >> NAS-Port-Type = Wireless-802.11 >> Event-Timestamp = "Mar 11 2020 08:58:36 PDT" >> EAP-Message = 0x020800061a03 >> Aruba-Essid-Name = "BlueDogRV" >> Aruba-Location-Id = "ID-PF-SLS" >> Aruba-AP-Group = "PostFalls" >> FreeRADIUS-Proxied-To = 127.0.0.1 >> EAP-Type = MSCHAPv2 >> Realm = "BluedogRV.lan" >> Called-Station-SSID = "BlueDogRV" >> PacketFence-Domain = "Bluedogrv" >> PacketFence-KeyBalanced = "f20536da90cb9e178c302675355f1678" >> PacketFence-Radius-Ip = "192.168.100.211" >> PacketFence-NTLMv2-Only = "" >> User-Password = "******" >> SQL-User-Name = "host/ta-00614.BluedogRV.lan" >> >> It's there as Aruba-Essid-Name, which i'm guessing isn't being accepted. >> Either way i deleted the switch and put it back in. Which seems to have >> alleviated the majority of the issues. >> >> As for the captive portal, I'm thinking is in the same boat as there >> aerohive stuff maybe? Where the url isn't being parsed correctly or >> something? >> >> On Wed, Mar 11, 2020 at 10:45 AM Fabrice Durand via PacketFence-users < >> packetfence-users@lists.sourceforge.net> wrote: >> >>> Ok so first there is no ssid sent in the radius request so you can't use >>> a filter based on the ssid. >>> >>> So what you can do (removed the ssid): >>> >>> >>> [Wireless_EAP] >>> filter_match_style=all >>> description=Wireless_EAP >>> sources=tacos-MachineAuth >>> filter=connection_type:Wireless-802.11-EAP >>> autoregister=enabled >>> redirecturl=https://www.tacos.com >>> logo=/common/Logo-horz.png >>> >>> So when you will connect you will see "Instantiate profile >>> Wireless_EAP" and "Found authentication source(s) : 'tacos-MachineAuth' >>> for realm ' tacos.lan'" >>> >>> Next you need to be sure that tacos-MachineAuth return a role. >>> >>> Test that and let me know. >>> >>> Regards >>> >>> Fabrice >>> Le 20-03-11 à 12 h 07, Zacharry Williams via PacketFence-users a écrit : >>> >>> Okay so this is the one from today. get's matched to the >>> Ethernet profile and denied. >>> >>> >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) INFO: >>> [mac:00:24:d7:90:be:84] handling radius autz request: from switch_ip => >>> (192.168.100.216), connection_type => Wireless-802.11-EAP,switch_mac => >>> (c8:b5:ad:ce:43:7c), mac => [00:24:d7:90:be:84], port => 0, username => >>> "host/ tacos -016.BluedogRV.lan" (pf::radius::authorize) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) INFO: >>> [mac:00:24:d7:90:be:84] is doing machine auth with account 'host/ tacos . >>> tacos.lan'. (pf::radius::authorize) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] instantiating new pf::role object (pf::role::new) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] instantiating new pf::access_filter::vlan >>> (pf::access_filter::new) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] No engine found for IsPhone >>> (pf::access_filter::test) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] Trying to match IP address to MAC >>> '00:24:d7:90:be:84' using SQL 'ip4log' table (pf::ip4log::mac2ip) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] Viewing an 'ip4log' table entry for the following >>> MAC address '00:24:d7:90:be:84' (pf::ip4log::_view_by_mac) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] Matched MAC '00:24:d7:90:be:84' to IP address >>> '192.168.50.119' using SQL 'ip4log' table (pf::ip4log::mac2ip) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] Memory configuration is not valid anymore for key >>> FilterEngine::Profile() in local cached_hash (pfconfig::cached::is_valid) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] Memory configuration is not valid anymore for key >>> config::Profiles() in local cached_hash (pfconfig::cached::is_valid) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) INFO: >>> [mac:00:24:d7:90:be:84] Instantiate profile Ethernet802.1x >>> (pf::Connection::ProfileFactory::_from_profile) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] instantiating new pf::Connection::Profile object >>> (pf::Connection::Profile::new) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] instantiating new pf::access_filter::vlan >>> (pf::access_filter::new) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] No engine found for AutoRegister >>> (pf::access_filter::test) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] Autoregistration set on profile Ethernet802.1x >>> (pf::role::shouldAutoRegister) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] instantiating new pf::access_filter::vlan >>> (pf::access_filter::new) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] No engine found for NodeInfoForAutoReg >>> (pf::access_filter::test) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] Memory configuration is not valid anymore for key >>> config::Profiles() in local cached_hash (pfconfig::cached::is_valid) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] Used realm tacos tacos.lan is associated to the >>> configured realm tacos.lan >>> (pf::config::util::get_realm_authentication_source) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) INFO: >>> [mac:00:24:d7:90:be:84] Found authentication source(s) : 'tacod1' for realm >>> ' tacos.lan' (pf::config::util::filter_authentication_sources) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] EAP connection with a username "host/ tacos -016. >>> tacos .lan". Trying to match rules from authentication sources. >>> (pf::role::getNodeInfoForAutoReg) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) WARN: >>> [mac:00:24:d7:90:be:84] Use of uninitialized value in concatenation (.) or >>> string at /usr/local/pf/lib/pf/authentication.pm line 389. >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] Match called with parameters radius_request => >>> HASH(0x55bbf87d1a00), rule_class => authentication, stripped_user_name => , >>> SSID => , username => host/tacos-016. tacos .lan, realm => BluedogRV.lan, >>> context => radius, connection_type => Wireless-802.11-EAP >>> (pf::authentication::match2) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] Stripping username is enabled in this context >>> (radius). Will return a split username and realm. >>> (pf::config::util::strip_username_if_needed) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) INFO: >>> [mac:00:24:d7:90:be:84] Using sources tacos for matching >>> (pf::authentication::match2) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) INFO: >>> [mac:00:24:d7:90:be:84] LDAP testing connection (pf::LDAP::expire_if) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] cache get for namespace='Default', >>> key='ARRAY(0x55bbfd640658)', cache='RawMemory', time='0ms': HIT >>> (CHI::Driver::_log_get_result) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] [ tacos ] Using LDAP connection to 192.168.20.98 >>> (pf::Authentication::Source::LDAPSource::_connect) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] [ tacos tacos ] Searching for >>> (|(sAMAccountName=host/ tacos -016. tacos .lan)(servicePrincipalName=host/ >>> tacos -016. tacos .lan)), from DC= tacos ,DC=lan, with scope sub >>> (pf::Authentication::Source::LDAPSource::match_in_subclass) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] [ tacos tacos ] Found 1 results >>> (pf::Authentication::Source::LDAPSource::_match_in_subclass) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] [ tacos tacos ] Searching is_member filter >>> (|(member=CN= tacos -016,OU=Post Falls,OU= tacos Computers,DC= tacos >>> ,DC=lan)(uniqueMember=CN= tacos -016,OU=Post Falls,OU= tacos Computers,DC= >>> tacos ,DC=lan)(memberUid=)) >>> (pf::Authentication::Source::LDAPSource::_match_in_subclass) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] [ tacos Domain_Users] Searching for >>> (|(sAMAccountName=host/ tacos -016. tacos .lan)(servicePrincipalName=host/ >>> tacos -016. tacos .lan)), from DC= tacos ,DC=lan, with scope sub >>> (pf::Authentication::Source::LDAPSource::match_in_subclass) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] [ tacos Domain_Users] Found 1 results >>> (pf::Authentication::Source::LDAPSource::_match_in_subclass) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] [ tacos Domain_Users] Searching is_member filter >>> (|(member=CN= tacos -016,OU=Post Falls,OU= tacos Computers,DC= tacos >>> ,DC=lan)(uniqueMember=CN= tacos -016,OU=Post Falls,OU= tacos Computers,DC= >>> tacos ,DC=lan)(memberUid=)) >>> (pf::Authentication::Source::LDAPSource::_match_in_subclass) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) WARN: >>> [mac:00:24:d7:90:be:84] No category computed for autoreg >>> (pf::role::getNodeInfoForAutoReg) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] [00:24:d7:90:be:84] auto-registering node >>> (pf::radius::authorize) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) WARN: >>> [mac:00:24:d7:90:be:84] No role specified or found for pid host/ tacos >>> -016.BluedogRV.lan (MAC 00:24:d7:90:be:84); assume maximum number of >>> registered nodes is reached (pf::node::is_max_reg_nodes_reached) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) ERROR: >>> [mac:00:24:d7:90:be:84] max nodes per pid met or exceeded - registration of >>> 00:24:d7:90:be:84 to host/ tacos -016.BluedogRV.lan failed >>> (pf::registration::setup_node_for_registration) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) ERROR: >>> [mac:00:24:d7:90:be:84] auto-registration of node failed max nodes per pid >>> met or exceeded (pf::radius::authorize) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) ERROR: >>> [mac:00:24:d7:90:be:84] Database query failed with non retryable error: >>> Cannot add or update a child row: a foreign key constraint fails >>> (`pf`.`node`, CONSTRAINT `0_57` FOREIGN KEY (`tenant_id`, `pid`) REFERENCES >>> `person` (`tenant_id`, `pid`) ON DELETE CASCADE ON UPDATE CASCADE) (errno: >>> 1452) [INSERT INTO `node` ( `autoreg`, `bandwidth_balance`, >>> `bypass_role_id`, `bypass_vlan`, `category_id`, `computername`, >>> `detect_date`, `device_class`, `device_manufacturer`, `device_score`, >>> `device_type`, `device_version`, `dhcp6_enterprise`, `dhcp6_fingerprint`, >>> `dhcp_fingerprint`, `dhcp_vendor`, `last_arp`, `last_dhcp`, `last_seen`, >>> `lastskip`, `mac`, `machine_account`, `notes`, `pid`, `regdate`, >>> `sessionid`, `status`, `tenant_id`, `time_balance`, `unregdate`, >>> `user_agent`, `voip`) VALUES ( ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, >>> ?, ?, ?, NOW(), ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ? ) ON DUPLICATE KEY >>> UPDATE `autoreg` = ?, `last_seen` = NOW(), `machine_account` = ?, `pid` = >>> ?, `status` = ?, `tenant_id` = ?]{yes, NULL, NULL, NULL, NULL, NULL, >>> 2020-03-11 08:53:16, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, >>> 0000-00-00 00:00:00, 0000-00-00 00:00:00, 0000-00-00 00:00:00, >>> 00:24:d7:90:be:84, host/ tacos -016.BluedogRV.lan, NULL, host/ tacos >>> -016.BluedogRV.lan, 0000-00-00 00:00:00, NULL, reg, 1, NULL, 0000-00-00 >>> 00:00:00, NULL, no, yes, host/ tacos -016. tacos .lan, host/ tacos >>> -016.BluedogRV.lan, reg, 1} (pf::dal::db_execute) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG: >>> [mac:00:24:d7:90:be:84] disconnecting db (pf::db::db_disconnect) >>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) ERROR: >>> [mac:00:24:d7:90:be:84] Cannot save 00:24:d7:90:be:84 error (500) >>> (pf::radius::authorize) >>> >>> # >>> # Copyright (C) 2005-2019 Inverse inc. >>> # >>> # See the enclosed file COPYING for license information (GPL). >>> # If you did not receive this file, see >>> # http://www.fsf.org/licensing/licenses/gpl.html >>> [default] >>> sources=null >>> >>> [Wire_noEAP] >>> locale= >>> filter=connection_type:Ethernet-NoEAP >>> autoregister=enabled >>> >>> [Wireless_EAP] >>> filter_match_style=all >>> description=Wireless_EAP >>> sources=tacos-MachineAuth >>> filter=connection_type:Wireless-802.11-EAP,ssid:tacos >>> autoregister=enabled >>> redirecturl=https://www.tacos.com >>> logo=/common/Logo-horz.png >>> >>> # >>> # Copyright (C) 2005-2019 Inverse inc. >>> # >>> # See the enclosed file COPYING for license information (GPL). >>> # If you did not receive this file, see >>> # http://www.fsf.org/licensing/licenses/gpl.html >>> [Ethernet802.1x] >>> filter=connection_type:Ethernet-EAP,connection_sub_type:MS-CHAP-V2 >>> sources=BDRVDC1 >>> unreg_on_acct_stop=enabled >>> autoregister=enabled >>> >>> [Wireless_BYOD] >>> filter_match_style=all >>> description=Wireless_EAP >>> sources=BDRVDC1 >>> filter=connection_type:Wireless-802.11-EAP,ssid:tacos-BYOD >>> autoregister=enabled >>> logo=/common/Logo-horz.png >>> redirecturl=https://www.tacos.com >>> # >>> # Copyright (C) 2005-2019 Inverse inc. >>> # >>> # See the enclosed file COPYING for license information (GPL). >>> # If you did not receive this file, see >>> # http://www.fsf.org/licensing/licenses/gpl.html >>> ~ >>> ~ >>> ~ >>> ~ >>> ~ >>> ~ >>> ~ >>> >>> On Wed, Mar 11, 2020 at 8:48 AM Zacharry Williams <zachar...@gmail.com> >>> wrote: >>> >>>> Yep I'm scrubbing them now. It's also matching clients connecting on >>>> wireless-eap to wired-eap >>>> >>>> On Tue, Mar 10, 2020, 4:53 PM Durand fabrice via PacketFence-users < >>>> packetfence-users@lists.sourceforge.net> wrote: >>>> >>>>> Hello, >>>>> >>>>> can you provide the packetfence.log file and the profiles.conf file ? >>>>> >>>>> Regards >>>>> >>>>> Fabrice >>>>> >>>>> >>>>> Le 20-03-10 à 15 h 19, Zacharry Williams via PacketFence-users a >>>>> écrit : >>>>> >>>>> Hey all, >>>>> >>>>> Randomly it matched the correct connection profile, one time. Is this >>>>> like a 9.3 bug where connection profiles aren't being match? >>>>> >>>>> On Mon, Mar 9, 2020 at 3:06 PM Zacharry Williams <zachar...@gmail.com> >>>>> wrote: >>>>> >>>>>> Hey all, >>>>>> >>>>>> I've been working on setting up a guest LAN and a byod LAN for a few >>>>>> days now. When I use a PSK or AD Authentication it works fine, but the >>>>>> captive portal isn't working like I think it should be. >>>>>> I revisited the guide a few times to check and I don't think i'm >>>>>> missing any settings. I customized a captive portal with a logo and an >>>>>> acceptable use policy but every time I get the captive portal, I don't >>>>>> get >>>>>> the portal I customized but instead get the default one. It's like the >>>>>> default connection profile is matched first. I set the httpd.aaa.conf >>>>>> logging to debug but nothing shows up as to why it's picking that >>>>>> connection profile in packetfence.log. I'm using Aruba instants, and >>>>>> managing them through Aruba Central. >>>>>> >>>>>> Where are the logs to read into why it's picking that portal? >>>>>> >>>>>> >>>>> >>>>> _______________________________________________ >>>>> PacketFence-users mailing >>>>> listPacketFence-users@lists.sourceforge.nethttps://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>> >>>>> _______________________________________________ >>>>> PacketFence-users mailing list >>>>> PacketFence-users@lists.sourceforge.net >>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>> >>>> >>> >>> _______________________________________________ >>> PacketFence-users mailing >>> listPacketFence-users@lists.sourceforge.nethttps://lists.sourceforge.net/lists/listinfo/packetfence-users >>> >>> -- >>> Fabrice durandfdur...@inverse.ca :: +1.514.447.4918 (x135) :: >>> www.inverse.ca >>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence >>> (http://packetfence.org) >>> >>> _______________________________________________ >>> PacketFence-users mailing list >>> PacketFence-users@lists.sourceforge.net >>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>> >> >> >> _______________________________________________ >> PacketFence-users mailing >> listPacketFence-users@lists.sourceforge.nethttps://lists.sourceforge.net/lists/listinfo/packetfence-users >> >> _______________________________________________ >> PacketFence-users mailing list >> PacketFence-users@lists.sourceforge.net >> https://lists.sourceforge.net/lists/listinfo/packetfence-users >> > > > _______________________________________________ > PacketFence-users mailing > listPacketFence-users@lists.sourceforge.nethttps://lists.sourceforge.net/lists/listinfo/packetfence-users > > _______________________________________________ > PacketFence-users mailing list > PacketFence-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/packetfence-users >
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users