Did you remove that? If not, remove it.
Thanks, Ludovic Zammit lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 (x145) :: www.inverse.ca <http://www.inverse.ca/> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu <http://www.sogo.nu/>) and PacketFence (http://packetfence.org <http://packetfence.org/>) > On Dec 1, 2020, at 12:35 PM, Ezeh Victor <vickeyzed...@gmail.com> wrote: > > Hi Ludovic, > > Kindly find attached the logs. > > On Tue, 1 Dec 2020 at 17:24, Ludovic Zammit <lzam...@inverse.ca > <mailto:lzam...@inverse.ca>> wrote: > In that case, on that version the ACL just need to be there on the controller > as you did create it. > > The ACL is assigned dynamically to your device and not the SSID. > > Try to debug with that command using SSH on the controller: > > (Cisco Controller) >debug client ? > > <MAC addr1> Enter MAC address > > Command: debug client aa:bb:cc:dd:ee:ff > > Send me the output please. > > Thanks, > > Ludovic Zammit > lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 (x145) :: > www.inverse.ca <http://www.inverse.ca/> > Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu > <http://www.sogo.nu/>) and PacketFence (http://packetfence.org > <http://packetfence.org/>) > > > > >> On Dec 1, 2020, at 10:15 AM, Ezeh Victor <vickeyzed...@gmail.com >> <mailto:vickeyzed...@gmail.com>> wrote: >> >> Also, when I tried applying it to the WLAN in the Flexconnect group below is >> the error I received >> >> <image.png> >> >> On Tue, 1 Dec 2020 at 15:44, Ezeh Victor <vickeyzed...@gmail.com >> <mailto:vickeyzed...@gmail.com>> wrote: >> Hi Ludovic, >> >> Thanks for the response and the correction. >> >> Kindly note that the WLAN is in flex connect mode and from initial >> correspondence, I created a flex connect ACL. >> >> I cannot assign a flex connect ACL to a WLAN directly. >> >> However, I created an ACL on the controller and applied it to the WLAN >> directly as seen below; >> >> <image.png> >> >> >> <image.png> >> >> This did not also work and I am not getting automatic re-direction as I >> previously got. >> <image.png> >> >> <image.png> >> >> On Tue, 1 Dec 2020 at 14:17, Ludovic Zammit <lzam...@inverse.ca >> <mailto:lzam...@inverse.ca>> wrote: >> Hello Victor, >> >> Your Web auth reg ACL is not good, the TCP should match the PF management IP >> address. >> >> When you add the ACL on the flexconnect, you need to add them under the WLAN >> and not the VLAN itself. >> >> Thanks, >> >> Ludovic Zammit >> lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 (x145) :: >> www.inverse.ca <http://www.inverse.ca/> >> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >> <http://packetfence.org/>) >> >> >> >> >>> On Dec 1, 2020, at 3:36 AM, Ezeh Victor <vickeyzed...@gmail.com >>> <mailto:vickeyzed...@gmail.com>> wrote: >>> >>> Hi Ludovic, >>> >>> Kindly find the response below; >>> >>> >>> - Do you have the portal listening on 172.20.130.50? >>> <image.png> >>> >>> >>> >>> >>> - Could you show me the radius reply regarding that wireless connection? >>> <image.png> >>> >>> >>> >>> - Do you have the External portal checked on your switch module? >>> <image.png> >>> >>> >>> >>> >>> - Do you have access to the portal from your guest network? >>> >>> A user connected to the Guest SSID - I do not understand why this is >>> happening because the gateway can reach the PacketFence management IP >>> <image.png> >>> >>> Core device reachability to PacketFence from GUEST SSID Gateway >>> <image.png> >>> >>> PacketFence reachability to GUEST Gateway >>> <image.png> >>> >>> PacketFence reachability to a client connected to the GUEST SSID - This is >>> also surprising since the server can reach the Guest gateway >>> <image.png> >>> >>> The route to the GUEST network from PacketFence >>> <image.png> >>> >>> >>> >>> >>> - Does your ACL Pre-Auth-For-WebRedirect is correctly configured on the >>> controller? >>> <image.png> >>> >>> Tried the following combinations below; >>> <image.png> >>> >>> <image.png> >>> >>> <image.png> >>> >>> But it keeps showing a blank page with via this link: >>> http://172.20.130.50/Cisco::WLC/sid774610 >>> <http://172.20.130.50/Cisco::WLC/sid774610>? >>> >>> On Mon, 30 Nov 2020 at 20:32, Ludovic Zammit <lzam...@inverse.ca >>> <mailto:lzam...@inverse.ca>> wrote: >>> Alright, few things to checkout: >>> >>> - Do you have the portal listening on 172.20.130.50? >>> - Could you show me the radius reply regarding that wireless connection ? >>> - Do you have the External portal checked on your switch module? >>> - Do you have access to the portal from your guest network ? >>> - Does your ACL Pre-Auth-For-WebRedirect is correctly configured on the >>> controller? >>> >>> Thanks, >>> >>> Ludovic Zammit >>> lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 (x145) >>> :: www.inverse.ca <http://www.inverse.ca/> >>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >>> <http://packetfence.org/>) >>> >>> >>> >>> >>>> On Nov 30, 2020, at 9:00 AM, Ezeh Victor <vickeyzed...@gmail.com >>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>> >>>> Hi Ludovic, >>>> >>>> Thank you for your email. >>>> >>>> Kindly find below issue experienced. >>>> >>>> When I connect to the SSID Guest-Test, the processes below are what takes >>>> place; >>>> The computer opens a browser and tries to visit >>>> http://www.msftconnecttest.com/redirect >>>> <http://www.msftconnecttest.com/redirect> then >>>> http://172.20.130.50/Cisco::WLC/sidff17da >>>> <http://172.20.130.50/Cisco::WLC/sidff17da>? >>>> It then ends http://172.20.130.50/access?lang= >>>> <http://172.20.130.50/access?lang=> with no display. >>>> When I now try to change the SSID back to the normal staff SSID, it then >>>> continues to >>>> http://172.20.130.50/captive-portal?destination_url=http://172.20.130.50/Cisco::WLC/sidff17da?& >>>> >>>> <http://172.20.130.50/captive-portal?destination_url=http://172.20.130.50/Cisco::WLC/sidff17da?&> >>>> and displays the captive portal which obviously returns with an error >>>> that no network access is detected. >>>> Kindly advise, what am I missing? >>>> >>>> >>>> On Thu, 26 Nov 2020 at 15:59, Ezeh Victor <vickeyzed...@gmail.com >>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>> Hi Durand, >>>> >>>> I also made some observations today; >>>> >>>> When I connect to the SSID Guest-Test, the processes below are what takes >>>> place; >>>> The computer opens a browser and tries to visit >>>> http://www.msftconnecttest.com/redirect >>>> <http://www.msftconnecttest.com/redirect> then >>>> http://172.20.130.50/Cisco::WLC/sidff17da >>>> <http://172.20.130.50/Cisco::WLC/sidff17da>? >>>> It then ends http://172.20.130.50/access?lang= >>>> <http://172.20.130.50/access?lang=> with no display. >>>> >>>> When I now try to change the SSID back to the normal staff SSID, it then >>>> continues to >>>> http://172.20.130.50/captive-portal?destination_url=http://172.20.130.50/Cisco::WLC/sidff17da?& >>>> >>>> <http://172.20.130.50/captive-portal?destination_url=http://172.20.130.50/Cisco::WLC/sidff17da?&> >>>> and displays the captive portal which obviously returns with an error >>>> that no network access is detected. >>>> >>>> Kindly advise, what am I missing? >>>> >>>> >>>> On Thu, 26 Nov 2020 at 09:26, Ezeh Victor <vickeyzed...@gmail.com >>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>> Dear Durand, >>>> >>>> Kindly find below; >>>> >>>> Access-list changed >>>> <image.png> >>>> >>>> Pings to Packet fence from a wire device >>>> <image.png> >>>> >>>> <image.png> >>>> >>>> Pings from Packet Fence and route table >>>> >>>> <image.png> >>>> >>>> After connecting to the Guest SSID, I got a re-direction but the captive >>>> portal did not show up; >>>> >>>> <image.png> >>>> >>>> It seems I have an issue with the captive portal. >>>> >>>> Kindly assist. >>>> >>>> On Thu, 26 Nov 2020 at 02:33, Durand fabrice <fdur...@inverse.ca >>>> <mailto:fdur...@inverse.ca>> wrote: >>>> If i understand correctly, your vlan 300 is the guest vlan where the user >>>> device is, right ? >>>> >>>> And if i understand correctly the ACL, you permit the source 172.20.130.50 >>>> to reach 172.26.80.0/25 <http://172.26.80.0/25> but it should be the >>>> inverse ! (your ACL is in IN direction) >>>> >>>> So put a wire device in the vlan 300 and try to ping 172.20.130.50 , if it >>>> doesn't work then remove your acl and retry. >>>> >>>> Also from the packetfence server are you able to ping 172.26.80.1 ? >>>> >>>> What is the result of : ip route get 172.26.80.1 >>>> >>>> is it returning the source interface where the portal is ? >>>> >>>> Regards >>>> >>>> Fabrice >>>> >>>> >>>> >>>> >>>> >>>> Le 20-11-25 à 05 h 31, Ezeh Victor a écrit : >>>>> Hi Durand, >>>>> >>>>> Kindly find below screenshots; >>>>> >>>>> <image.png> >>>>> <image.png> >>>>> <image.png> >>>>> <image.png> >>>>> <image.png> >>>>> <image.png> >>>>> >>>>> <image.png> >>>>> <image.png> >>>>> >>>>> >>>>> On Wed, 25 Nov 2020 at 03:01, Durand fabrice <fdur...@inverse.ca >>>>> <mailto:fdur...@inverse.ca>> wrote: >>>>> First you need to try with a acl with permit any any and try to go on the >>>>> portal url. >>>>> >>>>> If it doesn't show the portal then it mean that there is a network issue >>>>> between the vlan where the device is and the ip of the captive portal. >>>>> >>>>> What you can try also is to put a wired device in this guest vlan and try >>>>> to go on https://172.20.130.50/captive-portal >>>>> <https://172.20.130.50/captive-portal> >>>>> Regards >>>>> >>>>> Fabrice >>>>> >>>>> >>>>> >>>>> Le 20-11-24 à 05 h 57, Ezeh Victor a écrit : >>>>>> Hi Durand, >>>>>> >>>>>> This is the result of trying to access the captive portal; >>>>>> >>>>>> <image.png> >>>>>> >>>>>> Is that the right URL? >>>>>> >>>>>> I would appreciate your response. >>>>>> >>>>>> Best Regards >>>>>> >>>>>> On Tue, 24 Nov 2020 at 10:01, Ezeh Victor <vickeyzed...@gmail.com >>>>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>>>> Hi Durand, >>>>>> >>>>>> Any feedback on my previous response? >>>>>> >>>>>> Find screenshot again >>>>>> <image.png> >>>>>> >>>>>> On Mon, 23 Nov 2020 at 12:57, Ezeh Victor <vickeyzed...@gmail.com >>>>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>>>> Hi Durand, >>>>>> >>>>>> I have done as directed. >>>>>> >>>>>> >>>>>> Also, find below a screenshot of Radius Audit Logs >>>>>> >>>>>> <image.png> >>>>>> >>>>>> >>>>>> >>>>>> On Tue, 17 Nov 2020 at 04:07, Durand fabrice via PacketFence-users >>>>>> <packetfence-users@lists.sourceforge.net >>>>>> <mailto:packetfence-users@lists.sourceforge.net>> wrote: >>>>>> Hello Victor, >>>>>> >>>>>> it looks that you defined https://172.20.130.50:1443/ >>>>>> <https://172.20.130.50:1443/>... as the registrationUrl. >>>>>> >>>>>> And in the switch config you need to enable "External Portal >>>>>> Enforcement". >>>>>> >>>>>> Also do you have the portal daemon enabled on the management interface ? >>>>>> (https://mgmt:1443/admin/alt#/configuration/interfaces >>>>>> <https://mgmt:1443/admin/alt#/configuration/interfaces>) >>>>>> >>>>>> Can you paste a screenshot of the radius audit log (radius tab) when you >>>>>> connect on the ssid ? >>>>>> >>>>>> Regards >>>>>> >>>>>> Fabrice >>>>>> >>>>>> >>>>>> >>>>>> Le 20-11-16 à 17 h 56, Ezeh Victor via PacketFence-users a écrit : >>>>>>> Hi >>>>>>> >>>>>>> Please can someone assist me. This project has come to a halt. >>>>>>> >>>>>>> I do not seem to be getting something right. The captive portal does >>>>>>> not come up after connecting to the guest SSID. >>>>>>> >>>>>>> I would really appreciate a response as soon as possible. >>>>>>> >>>>>>> Best regards >>>>>>> >>>>>>> On Mon, Nov 16, 2020, 11:23 Ezeh Victor <vickeyzed...@gmail.com >>>>>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>>>>> Hi Ludovic/All, >>>>>>> >>>>>>> Kindly see the status of trying to access the captive portal; >>>>>>> >>>>>>> <image.png> >>>>>>> >>>>>>> On Mon, 16 Nov 2020 at 09:42, Ezeh Victor <vickeyzed...@gmail.com >>>>>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>>>>> Hi Ludovic, >>>>>>> >>>>>>> Kind reminder. >>>>>>> >>>>>>> On Sun, Nov 15, 2020, 16:51 Ezeh Victor <vickeyzed...@gmail.com >>>>>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>>>>> Hi Ludovic, >>>>>>> >>>>>>> Please I am still expecting your reply. >>>>>>> >>>>>>> On Fri, Nov 13, 2020, 19:27 Ezeh Victor <vickeyzed...@gmail.com >>>>>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>>>>> Kindly find below; >>>>>>> >>>>>>> # Copyright (C) Inverse inc. >>>>>>> # >>>>>>> # >>>>>>> # >>>>>>> # See the enclosed file COPYING for license information (GPL). >>>>>>> # If you did not receive this file, see >>>>>>> # http://www.fsf.org/licensing/licenses/gpl.html >>>>>>> <http://www.fsf.org/licensing/licenses/gpl.html> >>>>>>> [default] >>>>>>> type=Cisco::WLC_2500 >>>>>>> VoIPDHCPDetect=N >>>>>>> coaPort=3799 >>>>>>> uplink_dynamic=0 >>>>>>> deauthMethod=RADIUS >>>>>>> always_trigger=1 >>>>>>> >>>>>>> [172.20.130.252] >>>>>>> description=WLC >>>>>>> RoleMap=Y >>>>>>> VlanMap=N >>>>>>> registrationUrl=http://172.20.130.50/Cisco::WLC >>>>>>> <http://172.20.130.50/Cisco::WLC> >>>>>>> UrlMap=Y >>>>>>> isolationRole=Isolation >>>>>>> defaultRole=Authorize_Any >>>>>>> registrationRole=Pre-Auth-For-WebRedirect >>>>>>> radiusSecret=D4n-n3t0ps >>>>>>> inlineRole=Inline >>>>>>> >>>>>>> # Copyright (C) Inverse inc. >>>>>>> # >>>>>>> # >>>>>>> # >>>>>>> # See the enclosed file COPYING for license information (GPL). >>>>>>> # If you did not receive this file, see >>>>>>> # http://www.fsf.org/licensing/licenses/gpl.html >>>>>>> <http://www.fsf.org/licensing/licenses/gpl.html> >>>>>>> [192.168.0.1] >>>>>>> description=Test Switch >>>>>>> type=Cisco::Catalyst_2960 >>>>>>> mode=production >>>>>>> uplink=23,24 >>>>>>> VoIPLLDPDetect=N >>>>>>> >>>>>>> #SNMPVersion = 3 >>>>>>> #SNMPEngineID = 0000000000000 >>>>>>> #SNMPUserNameRead = readUser >>>>>>> #SNMPAuthProtocolRead = MD5 >>>>>>> #SNMPAuthPasswordRead = authpwdread >>>>>>> #SNMPPrivProtocolRead = DES >>>>>>> #SNMPPrivPasswordRead = privpwdread >>>>>>> #SNMPUserNameWrite = writeUser >>>>>>> #SNMPAuthProtocolWrite = MD5 >>>>>>> #SNMPAuthPasswordWrite = authpwdwrite >>>>>>> #SNMPPrivProtocolWrite = DES >>>>>>> #SNMPPrivPasswordWrite = privpwdwrite >>>>>>> #SNMPVersionTrap = 3 >>>>>>> #SNMPUserNameTrap = readUser >>>>>>> #SNMPAuthProtocolTrap = MD5 >>>>>>> #SNMPAuthPasswordTrap = authpwdread >>>>>>> #SNMPPrivProtocolTrap = DES >>>>>>> #SNMPPrivPasswordTrap = privpwdread >>>>>>> [192.168.1.0/24 <http://192.168.1.0/24>] >>>>>>> description=Test Range WLC >>>>>>> type=Cisco::WLC >>>>>>> mode=production >>>>>>> uplink_dynamic=0 >>>>>>> VoIPLLDPDetect=N >>>>>>> >>>>>>> On Fri, 13 Nov 2020 at 19:22, Ludovic Zammit <lzam...@inverse.ca >>>>>>> <mailto:lzam...@inverse.ca>> wrote: >>>>>>> Send me your conf/switches.conf >>>>>>> >>>>>>> Thanks, >>>>>>> >>>>>>>> On Nov 13, 2020, at 1:20 PM, Ezeh Victor <vickeyzed...@gmail.com >>>>>>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>>>>>> >>>>>>>> >>>>>>>> Hi Ludovic, >>>>>>>> >>>>>>>> Thank you for your timely assistance. >>>>>>>> >>>>>>>> Kindly below some of the logs observed; >>>>>>>> <image.png> >>>>>>>> >>>>>>>> >>>>>>>> <image.png> >>>>>>>> >>>>>>>> >>>>>>>> On Fri, 13 Nov 2020 at 18:48, Ludovic Zammit <lzam...@inverse.ca >>>>>>>> <mailto:lzam...@inverse.ca>> wrote: >>>>>>>> Glad you are progressing. >>>>>>>> >>>>>>>> In web auth, the client IP address is sent out to PF management >>>>>>>> interface inside a HTTP request. >>>>>>>> >>>>>>>> So if you don’t see the portal, there is a good chance that IP won’t >>>>>>>> populate. >>>>>>>> >>>>>>>> Check in the logs/httpd.portal.access you should see the request I’m >>>>>>>> talking about above. >>>>>>>> >>>>>>>> Thanks, >>>>>>>> Ludovic Zammit >>>>>>>> lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 >>>>>>>> (x145) :: www.inverse.ca <http://www.inverse.ca/> >>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>>>>>>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >>>>>>>> <http://packetfence.org/>) >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>>> On Nov 13, 2020, at 10:44 AM, Ezeh Victor <vickeyzed...@gmail.com >>>>>>>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>>>>>>> >>>>>>>>> Hi Ludovic, >>>>>>>>> >>>>>>>>> Thank you soo much for the last mail. >>>>>>>>> >>>>>>>>> I have made some progress and the device can now connect and receive >>>>>>>>> IP information. The directive on FlexConnect ACL I think did the >>>>>>>>> trick. Also, it is seen as an online node. >>>>>>>>> >>>>>>>>> The challenge now is the captive portal does not pop up as the device >>>>>>>>> remains in unregistered mode and is assigned a vlan 0 as against the >>>>>>>>> guest vlan 300 >>>>>>>>> <image.png> >>>>>>>>> >>>>>>>>> <image.png> >>>>>>>>> >>>>>>>>> How do I ensure that the captive portal comes up after connection? >>>>>>>>> >>>>>>>>> On Thu, 12 Nov 2020 at 14:50, Ludovic Zammit <lzam...@inverse.ca >>>>>>>>> <mailto:lzam...@inverse.ca>> wrote: >>>>>>>>> Hello Victor, >>>>>>>>> >>>>>>>>> Here’s few steps that you can validate before moving forward. >>>>>>>>> >>>>>>>>> SSID config: >>>>>>>>> >>>>>>>>> - AAA override checked, RADIUS NAC (or ISE) enabled >>>>>>>>> - Interface set to the correct guest vlan >>>>>>>>> - Since you are using flex connect, make sure your vlan / ACL are >>>>>>>>> created on the flex connect config >>>>>>>>> >>>>>>>>> PacketFence: >>>>>>>>> >>>>>>>>> - receive the radius request on each connection >>>>>>>>> - reply the portal URL + the ACL name for the captive portal >>>>>>>>> - enable the external portal on the switch >>>>>>>>> - getting the portal deamon listening to the management interface >>>>>>>>> >>>>>>>>> Do you have an IP address when you connect? >>>>>>>>> >>>>>>>>> You can do advanced debuting with the SSH Cisco CLI like: >>>>>>>>> >>>>>>>>> debug client mac aa:bb:cc:dd:ee:ff >>>>>>>>> >>>>>>>>> Look at the logs, they will tell you why you client can’t connect >>>>>>>>> successfully. >>>>>>>>> >>>>>>>>> Thanks, >>>>>>>>> Ludovic Zammit >>>>>>>>> lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 >>>>>>>>> (x145) :: www.inverse.ca <http://www.inverse.ca/> >>>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>>>>>>>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >>>>>>>>> <http://packetfence.org/>) >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>>> On Nov 12, 2020, at 3:02 AM, Ezeh Victor <vickeyzed...@gmail.com >>>>>>>>>> <mailto:vickeyzed...@gmail.com>> wrote: >>>>>>>>>> >>>>>>>>>> Hi, >>>>>>>>>> >>>>>>>>>> Thanks for all your responses but I have gone through the provided >>>>>>>>>> links prior to making this request. >>>>>>>>>> >>>>>>>>>> A little bit of additional detail; >>>>>>>>>> My SSID is Open and is a flex connect SSID to enable users to pick >>>>>>>>>> IP addresses from local DHCP servers >>>>>>>>>> I have my access-lists in place >>>>>>>>>> I have configured the controller on packet fence following the >>>>>>>>>> documentation >>>>>>>>>> I have enabled the captive portal on the management interface >>>>>>>>>> I have enabled self preregistration >>>>>>>>>> My challenges however are; >>>>>>>>>> I cannot connect to the SSID. I keep getting an authentication error. >>>>>>>>>> The captive portal does not show up >>>>>>>>>> I cannot see the controller node online as it is recorded as offline >>>>>>>>>> on packetfence >>>>>>>>>> >>>>>>>>>> I would appreciate a clear step on what to do based off of >>>>>>>>>> successful implementations already done. >>>>>>>>>> >>>>>>>>>> The documentation has helped but I have not been successful. >>>>>>>>>> >>>>>>>>>> On Wed, 11 Nov 2020 at 20:14, Ludovic Zammit <lzam...@inverse.ca >>>>>>>>>> <mailto:lzam...@inverse.ca>> wrote: >>>>>>>>>> Hello, >>>>>>>>>> >>>>>>>>>> https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_cisco_2 >>>>>>>>>> >>>>>>>>>> <https://packetfence.org/doc/PacketFence_Network_Devices_Configuration_Guide.html#_cisco_2> >>>>>>>>>> >>>>>>>>>> Thanks, >>>>>>>>>> Ludovic Zammit >>>>>>>>>> lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 >>>>>>>>>> (x145) :: www.inverse.ca <http://www.inverse.ca/> >>>>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>>>>>>>>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org >>>>>>>>>> <http://packetfence.org/>) >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>>> On Nov 10, 2020, at 8:24 AM, Ezeh Victor via PacketFence-users >>>>>>>>>>> <packetfence-users@lists.sourceforge.net >>>>>>>>>>> <mailto:packetfence-users@lists.sourceforge.net>> wrote: >>>>>>>>>>> >>>>>>>>>>> Hi, >>>>>>>>>>> >>>>>>>>>>> Please I need assistance with figuring how I can integrate >>>>>>>>>>> PacketFence with Cisco WLC. >>>>>>>>>>> >>>>>>>>>>> Any assistance will be appreciated. >>>>>>>>>>> >>>>>>>>>>> Regards. >>>>>>>>>>> _______________________________________________ >>>>>>>>>>> PacketFence-users mailing list >>>>>>>>>>> PacketFence-users@lists.sourceforge.net >>>>>>>>>>> <mailto:PacketFence-users@lists.sourceforge.net> >>>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>>>>>> <https://lists.sourceforge.net/lists/listinfo/packetfence-users> >>>>>>>>>> >>>>>>>>> >>>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> _______________________________________________ >>>>>>> PacketFence-users mailing list >>>>>>> PacketFence-users@lists.sourceforge.net >>>>>>> <mailto:PacketFence-users@lists.sourceforge.net> >>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>> <https://lists.sourceforge.net/lists/listinfo/packetfence-users> >>>>>> _______________________________________________ >>>>>> PacketFence-users mailing list >>>>>> PacketFence-users@lists.sourceforge.net >>>>>> <mailto:PacketFence-users@lists.sourceforge.net> >>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>> <https://lists.sourceforge.net/lists/listinfo/packetfence-users> >>> >> > > <putty.log>
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users