Here it is. It appears it isn’t able to extract the SSID from the Aruba 
Controller. This is ArubaOS 8.6 running on the controller.

Any ideas to workaround this? It even says to let you all know so you can add 
support for it. I appreciate all you do to keep this product awesome!

Oct  7 13:08:35 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] Unable to extract SSID of Called-Station-Id: 
20:4c:03:58:99:8a (pf::Switch::extractSsid)
Oct  7 13:08:35 localhost packetfence_httpd.aaa: httpd.aaa(2063) WARN: 
[mac:00:24:d6:5b:30:bc] Unable to extract SSID for module pf::Switch::Template. 
SSID-based VLAN assignments won't work. Please let us know so we can add 
support for it. (pf::Switch::extractSsid)
Oct  7 13:08:35 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] handling radius autz request: from switch_ip => 
(198.18.255.64), connection_type => Wireless-802.11-NoEAP,switch_mac => 
(20:4c:03:58:99:8a), mac => [00:24:d6:5b:30:bc], port => 0, username => 
"00-24-d6-5b-30-bc" (pf::radius::authorize)
Oct  7 13:08:35 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:08:35 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] Match rule MAC-Auth (pf::access_filter::test)
Oct  7 13:08:35 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] vlan filter match ; belongs into REJECT VLAN 
(pf::role::getRegistrationRole)
Oct  7 13:08:35 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] According to rules in fetchRoleForNode this node must 
be kicked out. Returning USERLOCK (pf::Switch::Template::handleRadiusDeny)
Oct  7 13:08:44 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:08:51 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:08:52 localhost packetfence_httpd.portal: httpd.portal(2657) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:08:57 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:08:57 localhost packetfence_httpd.portal: httpd.portal(2657) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:08:59 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) WARN: 
[mac:00:24:d6:5b:30:bc] Calling match with empty/invalid rule class. Defaulting 
to 'authentication' (pf::authentication::match)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Using sources OpenWifi for matching 
(pf::authentication::match)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Matched rule (catchall) in source OpenWifi, returning 
actions. (pf::Authentication::Source::match_rule)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Matched rule (catchall) in source OpenWifi, returning 
actions. (pf::Authentication::Source::match)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) WARN: 
[mac:00:24:d6:5b:30:bc] Calling match with empty/invalid rule class. Defaulting 
to 'authentication' (pf::authentication::match)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Using sources OpenWifi for matching 
(pf::authentication::match)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) WARN: 
[mac:00:24:d6:5b:30:bc] Calling match with empty/invalid rule class. Defaulting 
to 'authentication' (pf::authentication::match)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Using sources OpenWifi for matching 
(pf::authentication::match)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Matched rule (catchall) in source OpenWifi, returning 
actions. (pf::Authentication::Source::match_rule)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Matched rule (catchall) in source OpenWifi, returning 
actions. (pf::Authentication::Source::match)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) WARN: 
[mac:00:24:d6:5b:30:bc] Calling match with empty/invalid rule class. Defaulting 
to 'authentication' (pf::authentication::match)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Using sources OpenWifi for matching 
(pf::authentication::match)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2657) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] No provisioner found for 00:24:d6:5b:30:bc. Continuing. 
(captiveportal::PacketFence::DynamicRouting::Module::Provisioning::execute_child)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] security_event 1300003 force-closed for 
00:24:d6:5b:30:bc (pf::security_event::security_event_force_close)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) WARN: 
[mac:unknown] locale from the URL  is not supported 
(pf::Portal::Session::getLanguages)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) WARN: 
[mac:00:24:d6:5b:30:bc] locale from the URL  is not supported 
(pf::Portal::Session::getLanguages)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) WARN: 
[mac:00:24:d6:5b:30:bc] locale from the URL  is not supported 
(captiveportal::PacketFence::Controller::Root::getLanguages)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Releasing device 
(captiveportal::PacketFence::DynamicRouting::Module::Root::release)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:01 localhost packetfence_httpd.portal: httpd.portal(2656) WARN: 
[mac:00:24:d6:5b:30:bc] locale from the URL  is not supported 
(pf::Portal::Session::getLanguages)
Oct  7 13:09:01 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] re-evaluating access (manage_register called) 
(pf::enforcement::reevaluate_access)
Oct  7 13:09:01 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:09:01 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] VLAN reassignment is forced. 
(pf::enforcement::_should_we_reassign_vlan)
Oct  7 13:09:01 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] switch port is (198.18.255.64) ifIndex 0connection 
type: WiFi MAC Auth (pf::enforcement::_vlan_reevaluation)
Oct  7 13:09:02 localhost pfqueue: pfqueue(4604) INFO: [mac:00:24:d6:5b:30:bc] 
[00:24:d6:5b:30:bc] DesAssociating mac on switch (198.18.255.64) 
(pf::api::desAssociate)
Oct  7 13:09:02 localhost pfqueue: pfqueue(4604) INFO: [mac:00:24:d6:5b:30:bc] 
deauthenticating (pf::Switch::Template::radiusDisconnect)
Oct  7 13:09:02 localhost pfqueue: pfqueue(4604) INFO: [mac:00:24:d6:5b:30:bc] 
controllerIp is set, we will use controller 198.18.255.64 to perform deauth 
(pf::Switch::Template::disconnectAddress)
Oct  7 13:09:02 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] Unable to extract SSID of Called-Station-Id: 
20:4c:03:58:99:8a (pf::Switch::extractSsid)
Oct  7 13:09:02 localhost packetfence_httpd.aaa: httpd.aaa(2063) WARN: 
[mac:00:24:d6:5b:30:bc] Unable to extract SSID for module pf::Switch::Template. 
SSID-based VLAN assignments won't work. Please let us know so we can add 
support for it. (pf::Switch::extractSsid)
Oct  7 13:09:02 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] handling radius autz request: from switch_ip => 
(198.18.255.64), connection_type => Wireless-802.11-NoEAP,switch_mac => 
(20:4c:03:58:99:8a), mac => [00:24:d6:5b:30:bc], port => 0, username => 
"00-24-d6-5b-30-bc" (pf::radius::authorize)
Oct  7 13:09:02 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:09:02 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] Found authentication source(s) : 
'local,file1,LabDC,LabDC-TestSponsor' for realm 'null' 
(pf::config::util::filter_authentication_sources)
Oct  7 13:09:02 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] Connection type is MAC-AUTH. Getting role from 
node_info (pf::role::getRegisteredRole)
Oct  7 13:09:02 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] Username was defined "00-24-d6-5b-30-bc" - returning 
role 'guest' (pf::role::getRegisteredRole)
Oct  7 13:09:02 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] PID: "default", Status: reg Returned VLAN: (undefined), 
Role: guest (pf::role::fetchRoleForNode)
Oct  7 13:09:02 localhost packetfence_httpd.aaa: httpd.aaa(2063) WARN: 
[mac:00:24:d6:5b:30:bc] No parameter guestVlan found in conf/switches.conf for 
the switch 198.18.255.64 (pf::Switch::getVlanByName)
Oct  7 13:09:02 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] Updating locationlog from accounting request 
(pf::api::handle_accounting_metadata)
Louis Scaringella
Security Systems Engineer
Yellow Dog Networks, Inc
785-342-7903

> On Oct 7, 2020, at 11:41 AM, Fabrice Durand <fdur...@inverse.ca> wrote:
>
> What i am looking for is the line in packetfence.log that start with 
> "handling radius autz request"
>
> Le 20-10-07 à 12 h 02, Louis Scaringella a écrit :
>> Hello,
>>
>> When I add the SSID filter to the connection profile, this is the log I see:
>>
>> Oct 7 10:59:54 localhost packetfence_httpd.portal: httpd.portal(2613) INFO: 
>> [mac:00:24:d6:5b:30:bc] Instantiate profile default 
>> (pf::Connection::ProfileFactory::_from_profile)
>>
>> If the SSID filter is removed, it matches the connection profile I want 
>> which is the one with the customized portal logo and different guest 
>> authentication types. That is the "Lab-Aruba-OpenGuest-copy” profile in this 
>> case.
>>
>> Louis Scaringella
>> Security Systems Engineer
>> Yellow Dog Networks, Inc
>> 785-342-7903
>>
>>> On Oct 7, 2020, at 8:17 AM, Fabrice Durand via PacketFence-users 
>>> <packetfence-users@lists.sourceforge.net> wrote:
>>>
>>> Hello Louis,
>>>
>>> can you provide the packetfence.log when you authenticate and hit the 
>>> portal ?
>>>
>>> Regards
>>>
>>> Fabrice
>>>
>>>
>>> Le 20-10-06 à 17 h 30, Louis Scaringella via PacketFence-users a écrit :
>>>> Still no luck with this. Can someone verify that my profile config looks 
>>>> alright? It seems very straightforward with the SSID filter in place.
>>>>
>>>> I really appreciate any help that you can provide.
>>>>
>>>> Louis Scaringella
>>>> Security Systems Engineer
>>>> Yellow Dog Networks, Inc
>>>> 785-342-7903
>>>>
>>>>> On Oct 6, 2020, at 8:58 AM, Louis Scaringella via PacketFence-users 
>>>>> <packetfence-users@lists.sourceforge.net> wrote:
>>>>>
>>>>> To add to this, I tried add an advanced filter with what showed up for 
>>>>> the SSID name in the Radius request in the audit logs but still didn’t 
>>>>> match this. Things like called-station-ID and ArubaESSID but none of 
>>>>> those worked either.
>>>>>
>>>>> The wireless vendor is Aruba and there is a controller used.
>>>>>
>>>>> Louis Scaringella
>>>>> Security Systems Engineer
>>>>> Yellow Dog Networks, Inc
>>>>> 785-342-7903
>>>>>
>>>>>> On Oct 5, 2020, at 7:13 PM, Louis Scaringella via PacketFence-users 
>>>>>> <packetfence-users@lists.sourceforge.net> wrote:
>>>>>>
>>>>>> Any ideas on this?
>>>>>>
>>>>>> Louis Scaringella
>>>>>> Security Systems Engineer
>>>>>> Yellow Dog Networks, Inc
>>>>>> 785-342-7903
>>>>>>
>>>>>>> On Oct 5, 2020, at 8:50 AM, Louis Scaringella 
>>>>>>> <lscaringe...@yellowdognetworks.com> wrote:
>>>>>>>
>>>>>>> When I remove the SSID filter, the NoEap connection type matches 
>>>>>>> perfectly and it uses that profile and presents that customized page 
>>>>>>> for the captive portal. Whenever I use the SSID filter in addition to 
>>>>>>> the connection type, it seems to match the default and presents the 
>>>>>>> default captive portal screen.
>>>>>>>
>>>>>>> Louis Scaringella
>>>>>>> Security Systems Engineer
>>>>>>> Yellow Dog Networks, Inc
>>>>>>> 785-342-7903
>>>>>>>
>>>>>>>> On Oct 5, 2020, at 6:52 AM, Ludovic Zammit <lzam...@inverse.ca> wrote:
>>>>>>>>
>>>>>>>> Hello Louis,
>>>>>>>>
>>>>>>>> Could you show me your conf/profile.conf please.
>>>>>>>>
>>>>>>>> Thanks,
>>>>>>>>
>>>>>>>> Ludovic Zammit
>>>>>>>>
>>>>>>>> lzam...@inverse.ca ::  +1.514.447.4918 (x145) ::  www.inverse.ca
>>>>>>>>
>>>>>>>> Inverse inc. :: Leaders behind SOGo (
>>>>>>>> http://www.sogo.nu) and PacketFence (http://packetfence.org)
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>> On Oct 3, 2020, at 5:00 AM, Louis Scaringella via PacketFence-users 
>>>>>>>>> <packetfence-users@lists.sourceforge.net> wrote:
>>>>>>>>>
>>>>>>>>> Ultimately what I am trying to accomplish is to have multiple 
>>>>>>>>> connection profiles chosen by SSID so that I can present different 
>>>>>>>>> captive portal pages and authentication types. The only way I see to 
>>>>>>>>> do that is through the connection profile.
>>>>>>>>>
>>>>>>>>> Am I missing something with the SSID filter not working with non-EAP 
>>>>>>>>> connection types?
>>>>>>>>>
>>>>>>>>> Louis Scaringella
>>>>>>>>> Security Systems Engineer
>>>>>>>>> Yellow Dog Networks, Inc
>>>>>>>>> 785-342-7903
>>>>>>>>>
>>>>>>>>>> On Oct 3, 2020, at 2:16 AM, Louis Scaringella 
>>>>>>>>>> <lscaringe...@yellowdognetworks.com> wrote:
>>>>>>>>>>
>>>>>>>>>> I am running 10.1, I forgot to mention.
>>>>>>>>>>
>>>>>>>>>> Louis Scaringella
>>>>>>>>>> Security Systems Engineer
>>>>>>>>>> Yellow Dog Networks, Inc
>>>>>>>>>> 785-342-7903
>>>>>>>>>>
>>>>>>>>>>> On Oct 3, 2020, at 1:40 AM, Louis Scaringella 
>>>>>>>>>>> <lscaringe...@yellowdognetworks.com> wrote:
>>>>>>>>>>>
>>>>>>>>>>> Hello,
>>>>>>>>>>>
>>>>>>>>>>> When I configure a custom connection profile for my open guest 
>>>>>>>>>>> captive portal connection with AUP, I am able to have the 
>>>>>>>>>>> connection profile get triggered and used when I use the Connection 
>>>>>>>>>>> Type filter with “Wireless-802.11-NoEAP”.
>>>>>>>>>>>
>>>>>>>>>>> However, if I add the condition of all and add the SSID filter, it 
>>>>>>>>>>> doesn’t match that connection profile and just uses the default 
>>>>>>>>>>> even though the SSID is correct. I have to manually type the SSID 
>>>>>>>>>>> in and the SSID doesn’t show anywhere in the nodes section which 
>>>>>>>>>>> from past messages, I understand that this is where that comes from.
>>>>>>>>>>>
>>>>>>>>>>> I found a bug that describes this issue close enough. Could this be 
>>>>>>>>>>> that problem?
>>>>>>>>>>>
>>>>>>>>>>> Louis Scaringella
>>>>>>>>>>> Security Systems Engineer
>>>>>>>>>>> Yellow Dog Networks, Inc
>>>>>>>>>>> 785-342-7903
>>>>>>>>>>>
>>>>>>>>> The information transmitted, including any attachments, is intended 
>>>>>>>>> only for the person or entity to which it is addressed and may 
>>>>>>>>> contain confidential and/or privileged material. Any review, 
>>>>>>>>> retransmission, dissemination or other use of, or taking of any 
>>>>>>>>> action in reliance upon, this information by persons or entities 
>>>>>>>>> other than the intended recipient is prohibited, and all liability 
>>>>>>>>> arising therefrom is disclaimed. If you received this in error, 
>>>>>>>>> please contact the sender and delete the material from any computer.
>>>>>>>>>
>>>>>>>>> _______________________________________________
>>>>>>>>> PacketFence-users mailing list
>>>>>>>>> PacketFence-users@lists.sourceforge.net
>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>> The information transmitted, including any attachments, is intended only 
>>>>>> for the person or entity to which it is addressed and may contain 
>>>>>> confidential and/or privileged material. Any review, retransmission, 
>>>>>> dissemination or other use of, or taking of any action in reliance upon, 
>>>>>> this information by persons or entities other than the intended 
>>>>>> recipient is prohibited, and all liability arising therefrom is 
>>>>>> disclaimed. If you received this in error, please contact the sender and 
>>>>>> delete the material from any computer.
>>>>>>
>>>>>> _______________________________________________
>>>>>> PacketFence-users mailing list
>>>>>> PacketFence-users@lists.sourceforge.net
>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>> The information transmitted, including any attachments, is intended only 
>>>>> for the person or entity to which it is addressed and may contain 
>>>>> confidential and/or privileged material. Any review, retransmission, 
>>>>> dissemination or other use of, or taking of any action in reliance upon, 
>>>>> this information by persons or entities other than the intended recipient 
>>>>> is prohibited, and all liability arising therefrom is disclaimed. If you 
>>>>> received this in error, please contact the sender and delete the material 
>>>>> from any computer.
>>>>>
>>>>> _______________________________________________
>>>>> PacketFence-users mailing list
>>>>> PacketFence-users@lists.sourceforge.net
>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>> The information transmitted, including any attachments, is intended only 
>>>> for the person or entity to which it is addressed and may contain 
>>>> confidential and/or privileged material. Any review, retransmission, 
>>>> dissemination or other use of, or taking of any action in reliance upon, 
>>>> this information by persons or entities other than the intended recipient 
>>>> is prohibited, and all liability arising therefrom is disclaimed. If you 
>>>> received this in error, please contact the sender and delete the material 
>>>> from any computer.
>>>>
>>>> _______________________________________________
>>>> PacketFence-users mailing list
>>>> PacketFence-users@lists.sourceforge.net
>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>> --
>>> Fabrice Durand
>>> fdur...@inverse.ca ::  +1.514.447.4918 (x135) ::  www.inverse.ca
>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
>>> (http://packetfence.org)
>>>
>>>
>>>
>>> _______________________________________________
>>> PacketFence-users mailing list
>>> PacketFence-users@lists.sourceforge.net
>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>> The information transmitted, including any attachments, is intended only for 
>> the person or entity to which it is addressed and may contain confidential 
>> and/or privileged material. Any review, retransmission, dissemination or 
>> other use of, or taking of any action in reliance upon, this information by 
>> persons or entities other than the intended recipient is prohibited, and all 
>> liability arising therefrom is disclaimed. If you received this in error, 
>> please contact the sender and delete the material from any computer.
>
> --
> Fabrice Durand
> fdur...@inverse.ca ::  +1.514.447.4918 (x135) ::  www.inverse.ca
> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
> (http://packetfence.org)

The information transmitted, including any attachments, is intended only for 
the person or entity to which it is addressed and may contain confidential 
and/or privileged material. Any review, retransmission, dissemination or other 
use of, or taking of any action in reliance upon, this information by persons 
or entities other than the intended recipient is prohibited, and all liability 
arising therefrom is disclaimed. If you received this in error, please contact 
the sender and delete the material from any computer.

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to