Ah that's the problem. If I use /Aruba or anything else I get the Not
Implemented. Get to /Aruba is not supported.

On Thu, Mar 12, 2020, 5:53 PM Durand fabrice via PacketFence-users <
packetfence-users@lists.sourceforge.net> wrote:

> In this case, is it a webauth setup ? (
> https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_webauth
> )
>
> If it's the case, the portal URL must be https://PACKETFENCESERVER/Aruba .
>
>
> https://github.com/inverse-inc/packetfence/blob/devel/lib/pf/web/constants.pm#L105
>
>
> Le 20-03-12 à 14 h 31, Zacharry Williams via PacketFence-users a écrit :
>
> The bluedogrv SSID issues have been pretty much solved. I just did some
> tweaking to the bindings, and connection profile and people had to forget
> the network as the certificate changes made a few devices freak out. Little
> issues here and there but nothing major. it's really the captive portal
> that's holding me up. Details are in the last mail message.
>
> On Wed, Mar 11, 2020 at 6:06 PM Durand fabrice via PacketFence-users <
> packetfence-users@lists.sourceforge.net> wrote:
>
>> Do you have the logs related to this radius request ? (packetfence.log)
>>
>> It looks to me that you are doing 802.1x + web auth.
>>
>> For the ssid BlueDogRV, just configure it like
>> https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_all_aruba_os
>> (Secure SSID and not like WebAuth).
>>
>> Once done, connect to the ssid BlueDogRV, you are supposed to see :
>>
>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) INFO:
>> [mac:00:24:d7:90:be:84] handling radius autz request: from switch_ip =>
>> (192.168.100.216), connection_type => Wireless-802.11-EAP,switch_mac =>
>> (c8:b5:ad:ce:43:7c), mac => [00:24:d7:90:be:84], port => 0, username =>
>> "host/ tacos -016.BluedogRV.lan", ssid =>  "BlueDogRV"
>> (pf::radius::authorize)
>>
>> If it's the case then change the filter of your connection profile to use
>> SSID = BlueDogRV and add the source you want to use for machine auth.
>>
>> Let me know if it's ok.
>>
>> Regards
>>
>> Fabrice
>>
>>
>> Le 20-03-11 à 17 h 12, Zacharry Williams via PacketFence-users a écrit :
>>
>> User-Name = "host/ta-00614.BluedogRV.lan"
>> NAS-IP-Address = 192.168.100.217
>> NAS-Port = 0
>> Service-Type = Framed-User
>> Framed-MTU = 1100
>> State = 0x2880f3b42988e97dfdf00d5089857e6a
>> Called-Station-Id = "f0:5c:19:c2:13:96"
>> Calling-Station-Id = "9c:30:5b:1c:06:4b"
>> NAS-Identifier = "Aruba_Wireless"
>> NAS-Port-Type = Wireless-802.11
>> Event-Timestamp = "Mar 11 2020 08:58:36 PDT"
>> EAP-Message = 0x020800061a03
>> Aruba-Essid-Name = "BlueDogRV"
>> Aruba-Location-Id = "ID-PF-SLS"
>> Aruba-AP-Group = "PostFalls"
>> FreeRADIUS-Proxied-To = 127.0.0.1
>> EAP-Type = MSCHAPv2
>> Realm = "BluedogRV.lan"
>> Called-Station-SSID = "BlueDogRV"
>> PacketFence-Domain = "Bluedogrv"
>> PacketFence-KeyBalanced = "f20536da90cb9e178c302675355f1678"
>> PacketFence-Radius-Ip = "192.168.100.211"
>> PacketFence-NTLMv2-Only = ""
>> User-Password = "******"
>> SQL-User-Name = "host/ta-00614.BluedogRV.lan"
>>
>> It's there as Aruba-Essid-Name, which i'm guessing isn't being accepted.
>> Either way i deleted the switch and put it back in. Which seems to have
>> alleviated the majority of the issues.
>>
>> As for the captive portal, I'm thinking is in the same boat as there
>> aerohive stuff maybe? Where the url isn't being parsed correctly or
>> something?
>>
>> On Wed, Mar 11, 2020 at 10:45 AM Fabrice Durand via PacketFence-users <
>> packetfence-users@lists.sourceforge.net> wrote:
>>
>>> Ok so first there is no ssid sent in the radius request so you can't use
>>> a filter based on the ssid.
>>>
>>> So what you can do (removed the ssid):
>>>
>>>
>>> [Wireless_EAP]
>>> filter_match_style=all
>>> description=Wireless_EAP
>>> sources=tacos-MachineAuth
>>> filter=connection_type:Wireless-802.11-EAP
>>> autoregister=enabled
>>> redirecturl=https://www.tacos.com
>>> logo=/common/Logo-horz.png
>>>
>>> So when you will connect you will see "Instantiate profile
>>> Wireless_EAP"  and "Found authentication source(s) : 'tacos-MachineAuth'
>>> for realm ' tacos.lan'"
>>>
>>> Next you need to be sure that tacos-MachineAuth return a role.
>>>
>>> Test that and let me know.
>>>
>>> Regards
>>>
>>> Fabrice
>>> Le 20-03-11 à 12 h 07, Zacharry Williams via PacketFence-users a écrit :
>>>
>>> Okay so this is the one from today. get's matched to the
>>> Ethernet profile and denied.
>>>
>>>
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) INFO:
>>> [mac:00:24:d7:90:be:84] handling radius autz request: from switch_ip =>
>>> (192.168.100.216), connection_type => Wireless-802.11-EAP,switch_mac =>
>>> (c8:b5:ad:ce:43:7c), mac => [00:24:d7:90:be:84], port => 0, username =>
>>> "host/ tacos -016.BluedogRV.lan" (pf::radius::authorize)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) INFO:
>>> [mac:00:24:d7:90:be:84] is doing machine auth with account 'host/ tacos .
>>> tacos.lan'. (pf::radius::authorize)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] instantiating new pf::role object (pf::role::new)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] instantiating new pf::access_filter::vlan
>>> (pf::access_filter::new)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] No engine found for IsPhone
>>> (pf::access_filter::test)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] Trying to match IP address to MAC
>>> '00:24:d7:90:be:84' using SQL 'ip4log' table (pf::ip4log::mac2ip)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] Viewing an 'ip4log' table entry for the following
>>> MAC address '00:24:d7:90:be:84' (pf::ip4log::_view_by_mac)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] Matched MAC '00:24:d7:90:be:84' to IP address
>>> '192.168.50.119' using SQL 'ip4log' table (pf::ip4log::mac2ip)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] Memory configuration is not valid anymore for key
>>> FilterEngine::Profile() in local cached_hash (pfconfig::cached::is_valid)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] Memory configuration is not valid anymore for key
>>> config::Profiles() in local cached_hash (pfconfig::cached::is_valid)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) INFO:
>>> [mac:00:24:d7:90:be:84] Instantiate profile Ethernet802.1x
>>> (pf::Connection::ProfileFactory::_from_profile)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] instantiating new pf::Connection::Profile object
>>> (pf::Connection::Profile::new)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] instantiating new pf::access_filter::vlan
>>> (pf::access_filter::new)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] No engine found for AutoRegister
>>> (pf::access_filter::test)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] Autoregistration set on profile Ethernet802.1x
>>> (pf::role::shouldAutoRegister)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] instantiating new pf::access_filter::vlan
>>> (pf::access_filter::new)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] No engine found for NodeInfoForAutoReg
>>> (pf::access_filter::test)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] Memory configuration is not valid anymore for key
>>> config::Profiles() in local cached_hash (pfconfig::cached::is_valid)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] Used realm tacos tacos.lan is associated to the
>>> configured realm tacos.lan
>>> (pf::config::util::get_realm_authentication_source)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) INFO:
>>> [mac:00:24:d7:90:be:84] Found authentication source(s) : 'tacod1' for realm
>>> ' tacos.lan' (pf::config::util::filter_authentication_sources)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] EAP connection with a username "host/ tacos -016.
>>> tacos .lan". Trying to match rules from authentication sources.
>>> (pf::role::getNodeInfoForAutoReg)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) WARN:
>>> [mac:00:24:d7:90:be:84] Use of uninitialized value in concatenation (.) or
>>> string at /usr/local/pf/lib/pf/authentication.pm line 389.
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] Match called with parameters radius_request =>
>>> HASH(0x55bbf87d1a00), rule_class => authentication, stripped_user_name => ,
>>> SSID => , username => host/tacos-016. tacos .lan, realm => BluedogRV.lan,
>>> context => radius, connection_type => Wireless-802.11-EAP
>>> (pf::authentication::match2)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] Stripping username is enabled in this context
>>> (radius). Will return a split username and realm.
>>> (pf::config::util::strip_username_if_needed)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) INFO:
>>> [mac:00:24:d7:90:be:84] Using sources tacos for matching
>>> (pf::authentication::match2)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) INFO:
>>> [mac:00:24:d7:90:be:84] LDAP testing connection (pf::LDAP::expire_if)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] cache get for namespace='Default',
>>> key='ARRAY(0x55bbfd640658)', cache='RawMemory', time='0ms': HIT
>>> (CHI::Driver::_log_get_result)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] [ tacos ] Using LDAP connection to 192.168.20.98
>>> (pf::Authentication::Source::LDAPSource::_connect)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] [ tacos tacos ] Searching for
>>> (|(sAMAccountName=host/ tacos -016. tacos .lan)(servicePrincipalName=host/
>>> tacos -016. tacos .lan)), from DC= tacos ,DC=lan, with scope sub
>>> (pf::Authentication::Source::LDAPSource::match_in_subclass)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] [ tacos tacos ] Found 1 results
>>> (pf::Authentication::Source::LDAPSource::_match_in_subclass)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] [ tacos tacos ] Searching is_member filter
>>> (|(member=CN= tacos -016,OU=Post Falls,OU= tacos Computers,DC= tacos
>>> ,DC=lan)(uniqueMember=CN= tacos -016,OU=Post Falls,OU= tacos Computers,DC=
>>> tacos ,DC=lan)(memberUid=))
>>> (pf::Authentication::Source::LDAPSource::_match_in_subclass)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] [ tacos Domain_Users] Searching for
>>> (|(sAMAccountName=host/ tacos -016. tacos .lan)(servicePrincipalName=host/
>>> tacos -016. tacos .lan)), from DC= tacos ,DC=lan, with scope sub
>>> (pf::Authentication::Source::LDAPSource::match_in_subclass)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] [ tacos Domain_Users] Found 1 results
>>> (pf::Authentication::Source::LDAPSource::_match_in_subclass)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] [ tacos Domain_Users] Searching is_member filter
>>> (|(member=CN= tacos -016,OU=Post Falls,OU= tacos Computers,DC= tacos
>>> ,DC=lan)(uniqueMember=CN= tacos -016,OU=Post Falls,OU= tacos Computers,DC=
>>> tacos ,DC=lan)(memberUid=))
>>> (pf::Authentication::Source::LDAPSource::_match_in_subclass)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) WARN:
>>> [mac:00:24:d7:90:be:84] No category computed for autoreg
>>> (pf::role::getNodeInfoForAutoReg)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] [00:24:d7:90:be:84] auto-registering node
>>> (pf::radius::authorize)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) WARN:
>>> [mac:00:24:d7:90:be:84] No role specified or found for pid host/ tacos
>>> -016.BluedogRV.lan (MAC 00:24:d7:90:be:84); assume maximum number of
>>> registered nodes is reached (pf::node::is_max_reg_nodes_reached)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) ERROR:
>>> [mac:00:24:d7:90:be:84] max nodes per pid met or exceeded - registration of
>>> 00:24:d7:90:be:84 to host/ tacos -016.BluedogRV.lan failed
>>> (pf::registration::setup_node_for_registration)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) ERROR:
>>> [mac:00:24:d7:90:be:84] auto-registration of node failed max nodes per pid
>>> met or exceeded (pf::radius::authorize)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) ERROR:
>>> [mac:00:24:d7:90:be:84] Database query failed with non retryable error:
>>> Cannot add or update a child row: a foreign key constraint fails
>>> (`pf`.`node`, CONSTRAINT `0_57` FOREIGN KEY (`tenant_id`, `pid`) REFERENCES
>>> `person` (`tenant_id`, `pid`) ON DELETE CASCADE ON UPDATE CASCADE) (errno:
>>> 1452) [INSERT INTO `node` ( `autoreg`, `bandwidth_balance`,
>>> `bypass_role_id`, `bypass_vlan`, `category_id`, `computername`,
>>> `detect_date`, `device_class`, `device_manufacturer`, `device_score`,
>>> `device_type`, `device_version`, `dhcp6_enterprise`, `dhcp6_fingerprint`,
>>> `dhcp_fingerprint`, `dhcp_vendor`, `last_arp`, `last_dhcp`, `last_seen`,
>>> `lastskip`, `mac`, `machine_account`, `notes`, `pid`, `regdate`,
>>> `sessionid`, `status`, `tenant_id`, `time_balance`, `unregdate`,
>>> `user_agent`, `voip`) VALUES ( ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?,
>>> ?, ?, ?, NOW(), ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ? ) ON DUPLICATE KEY
>>> UPDATE `autoreg` = ?, `last_seen` = NOW(), `machine_account` = ?, `pid` =
>>> ?, `status` = ?, `tenant_id` = ?]{yes, NULL, NULL, NULL, NULL, NULL,
>>> 2020-03-11 08:53:16, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL,
>>> 0000-00-00 00:00:00, 0000-00-00 00:00:00, 0000-00-00 00:00:00,
>>> 00:24:d7:90:be:84, host/ tacos -016.BluedogRV.lan, NULL, host/ tacos
>>> -016.BluedogRV.lan, 0000-00-00 00:00:00, NULL, reg, 1, NULL, 0000-00-00
>>> 00:00:00, NULL, no, yes, host/ tacos -016. tacos .lan, host/ tacos
>>> -016.BluedogRV.lan, reg, 1} (pf::dal::db_execute)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) DEBUG:
>>> [mac:00:24:d7:90:be:84] disconnecting db (pf::db::db_disconnect)
>>> Mar 11 08:57:01 NAC1 packetfence_httpd.aaa: httpd.aaa(9641) ERROR:
>>> [mac:00:24:d7:90:be:84] Cannot save 00:24:d7:90:be:84 error (500)
>>> (pf::radius::authorize)
>>>
>>> #
>>> # Copyright (C) 2005-2019 Inverse inc.
>>> #
>>> # See the enclosed file COPYING for license information (GPL).
>>> # If you did not receive this file, see
>>> # http://www.fsf.org/licensing/licenses/gpl.html
>>> [default]
>>> sources=null
>>>
>>> [Wire_noEAP]
>>> locale=
>>> filter=connection_type:Ethernet-NoEAP
>>> autoregister=enabled
>>>
>>> [Wireless_EAP]
>>> filter_match_style=all
>>> description=Wireless_EAP
>>> sources=tacos-MachineAuth
>>> filter=connection_type:Wireless-802.11-EAP,ssid:tacos
>>> autoregister=enabled
>>> redirecturl=https://www.tacos.com
>>> logo=/common/Logo-horz.png
>>>
>>> #
>>> # Copyright (C) 2005-2019 Inverse inc.
>>> #
>>> # See the enclosed file COPYING for license information (GPL).
>>> # If you did not receive this file, see
>>> # http://www.fsf.org/licensing/licenses/gpl.html
>>> [Ethernet802.1x]
>>> filter=connection_type:Ethernet-EAP,connection_sub_type:MS-CHAP-V2
>>> sources=BDRVDC1
>>> unreg_on_acct_stop=enabled
>>> autoregister=enabled
>>>
>>> [Wireless_BYOD]
>>> filter_match_style=all
>>> description=Wireless_EAP
>>> sources=BDRVDC1
>>> filter=connection_type:Wireless-802.11-EAP,ssid:tacos-BYOD
>>> autoregister=enabled
>>> logo=/common/Logo-horz.png
>>> redirecturl=https://www.tacos.com
>>> #
>>> # Copyright (C) 2005-2019 Inverse inc.
>>> #
>>> # See the enclosed file COPYING for license information (GPL).
>>> # If you did not receive this file, see
>>> # http://www.fsf.org/licensing/licenses/gpl.html
>>> ~
>>> ~
>>> ~
>>> ~
>>> ~
>>> ~
>>> ~
>>>
>>> On Wed, Mar 11, 2020 at 8:48 AM Zacharry Williams <zachar...@gmail.com>
>>> wrote:
>>>
>>>> Yep I'm scrubbing them now. It's also matching clients connecting on
>>>> wireless-eap to wired-eap
>>>>
>>>> On Tue, Mar 10, 2020, 4:53 PM Durand fabrice via PacketFence-users <
>>>> packetfence-users@lists.sourceforge.net> wrote:
>>>>
>>>>> Hello,
>>>>>
>>>>> can you provide the packetfence.log file and the profiles.conf file ?
>>>>>
>>>>> Regards
>>>>>
>>>>> Fabrice
>>>>>
>>>>>
>>>>> Le 20-03-10 à 15 h 19, Zacharry Williams via PacketFence-users a
>>>>> écrit :
>>>>>
>>>>> Hey all,
>>>>>
>>>>> Randomly it matched the correct connection profile, one time. Is this
>>>>> like a 9.3 bug where connection profiles aren't being match?
>>>>>
>>>>> On Mon, Mar 9, 2020 at 3:06 PM Zacharry Williams <zachar...@gmail.com>
>>>>> wrote:
>>>>>
>>>>>> Hey all,
>>>>>>
>>>>>> I've been working on setting up a guest LAN and a byod LAN for a few
>>>>>> days now. When I use a PSK or AD Authentication it works fine, but the
>>>>>> captive portal isn't working like I think it should be.
>>>>>> I revisited the guide a few times to check and I don't think i'm
>>>>>> missing any settings. I customized a captive portal with a logo and an
>>>>>> acceptable use policy but every time I get the captive portal, I don't 
>>>>>> get
>>>>>> the portal I customized but instead get the default one. It's like the
>>>>>> default connection profile is matched first. I set the httpd.aaa.conf
>>>>>> logging to debug but nothing shows up as to why it's picking that
>>>>>> connection profile in packetfence.log. I'm using Aruba instants, and
>>>>>> managing them through Aruba Central.
>>>>>>
>>>>>> Where are the logs to read into why it's picking that portal?
>>>>>>
>>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> PacketFence-users mailing 
>>>>> listPacketFence-users@lists.sourceforge.nethttps://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>
>>>>> _______________________________________________
>>>>> PacketFence-users mailing list
>>>>> PacketFence-users@lists.sourceforge.net
>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>
>>>>
>>>
>>> _______________________________________________
>>> PacketFence-users mailing 
>>> listPacketFence-users@lists.sourceforge.nethttps://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>
>>> --
>>> Fabrice durandfdur...@inverse.ca ::  +1.514.447.4918 (x135) ::  
>>> www.inverse.ca
>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
>>> (http://packetfence.org)
>>>
>>> _______________________________________________
>>> PacketFence-users mailing list
>>> PacketFence-users@lists.sourceforge.net
>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>
>>
>>
>> _______________________________________________
>> PacketFence-users mailing 
>> listPacketFence-users@lists.sourceforge.nethttps://lists.sourceforge.net/lists/listinfo/packetfence-users
>>
>> _______________________________________________
>> PacketFence-users mailing list
>> PacketFence-users@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>
>
>
> _______________________________________________
> PacketFence-users mailing 
> listPacketFence-users@lists.sourceforge.nethttps://lists.sourceforge.net/lists/listinfo/packetfence-users
>
> _______________________________________________
> PacketFence-users mailing list
> PacketFence-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to