I did. That last email is seriously all that's there. [root@gatekeeper ~]# grep 58:cb:52:37:5d:ab /usr/local/pf/logs/packetfence.log Apr 16 09:13:51 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping the first one 'null' (pf::radius::_parseRequest) Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping the first one 'null' (pf::radius::_parseRequest) Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping the first one 'null' (pf::radius::_parseRequest) Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping the first one 'null' (pf::radius::_parseRequest) Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping the first one 'null' (pf::radius::_parseRequest) Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping the first one 'null' (pf::radius::_parseRequest) Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping the first one 'null' (pf::radius::_parseRequest) Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping the first one 'null' (pf::radius::_parseRequest) Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: [mac:58:cb:52:37:5d:ab] Updating locationlog from accounting request (pf::api::handle_accounting_metadata)
That second entry from *Apr 15 15:40:15* to *Apr 15 15:41:04* is completely unfiltered. Absolutely everything logged between those times is there, and in that time frame I got a fairly sizable radius debug log (the end of which I included in my first email). I'm gathering from your email, though, that somehow my installation is broken? Joshua Nathan *IT Supervisor* Black Forest Academy p: +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056 a: w: Hammersteiner Straße 50, 79400 Kandern bfacademy.de On Thu, Apr 22, 2021 at 3:17 PM Zammit, Ludovic <luza...@akamai.com> wrote: > Hello Nathan, > > Show me the output of: > > grep 58:cb:52:37:5d:ab /usr/local/pf/logs/packetfence.log > > Thanks, > > *Ludovic Zammit* > *Product Support Engineer Principal* > *Cell:* +1.613.670.8432 > Akamai Technologies - Inverse > 145 Broadway > Cambridge, MA 02142 > Connect with Us: <https://community.akamai.com> <http://blogs.akamai.com> > <https://twitter.com/akamai> <http://www.facebook.com/AkamaiTechnologies> > <http://www.linkedin.com/company/akamai-technologies> > <http://www.youtube.com/user/akamaitechnologies?feature=results_main> > > On Apr 22, 2021, at 2:35 AM, Nathan, Josh <josh.nat...@bfacademy.de> > wrote: > > Any further insights regarding what I could try or where I should look? > I've not had any luck this week at figuring anything out, either. :-/ > > Joshua Nathan > *IT Supervisor* > Black Forest Academy > > p: +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056 > a: > w: Hammersteiner Straße 50, 79400 Kandern > bfacademy.de > <https://urldefense.com/v3/__http://bfacademy.de/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmISt3FAmr$> > > > > > On Fri, Apr 16, 2021 at 9:39 AM Nathan, Josh <josh.nat...@bfacademy.de> > wrote: > >> Hello Ludovic, >> >> OK, here's from this morning: >> >> [root@gatekeeper ~]# grep 58:cb:52:37:5d:ab >> /usr/local/pf/logs/packetfence.log >> Apr 16 09:13:51 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >> Keeping the first one 'null' (pf::radius::_parseRequest) >> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >> Keeping the first one 'null' (pf::radius::_parseRequest) >> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >> Keeping the first one 'null' (pf::radius::_parseRequest) >> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >> Keeping the first one 'null' (pf::radius::_parseRequest) >> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >> Keeping the first one 'null' (pf::radius::_parseRequest) >> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >> Keeping the first one 'null' (pf::radius::_parseRequest) >> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >> Keeping the first one 'null' (pf::radius::_parseRequest) >> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >> Keeping the first one 'null' (pf::radius::_parseRequest) >> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >> [mac:58:cb:52:37:5d:ab] Updating locationlog from accounting request >> (pf::api::handle_accounting_metadata) >> >> >> And here's from yesterday during that 15:40 timeframe if that helps: >> >> Apr 15 15:40:15 gatekeeper packetfence: pfperl-api(2161) INFO: Using 300 >> resolution threshold (pf::pfcron::task::cluster_check::run) >> Apr 15 15:40:15 gatekeeper packetfence: pfperl-api(2161) INFO: All >> cluster members are running the same configuration version >> (pf::pfcron::task::cluster_check::run) >> Apr 15 15:40:15 gatekeeper packetfence: pfperl-api(2162) INFO: getting >> security_events triggers for accounting cleanup >> (pf::accounting::acct_maintenance) >> Apr 15 15:40:42 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >> Keeping the first one 'null' (pf::radius::_parseRequest) >> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >> Keeping the first one 'null' (pf::radius::_parseRequest) >> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >> Keeping the first one 'null' (pf::radius::_parseRequest) >> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >> Keeping the first one 'null' (pf::radius::_parseRequest) >> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >> Keeping the first one 'null' (pf::radius::_parseRequest) >> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >> Keeping the first one 'null' (pf::radius::_parseRequest) >> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >> Keeping the first one 'null' (pf::radius::_parseRequest) >> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >> Keeping the first one 'null' (pf::radius::_parseRequest) >> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >> [mac:58:cb:52:37:5d:ab] Updating locationlog from accounting request >> (pf::api::handle_accounting_metadata) >> Apr 15 15:41:04 gatekeeper pfqueue: pfqueue(17589) WARN: >> [mac:00:25:90:87:e9:50] Unable to pull accounting history for device >> 00:25:90:87:e9:50. The history set doesn't exist yet. >> (pf::accounting_events_history::latest_mac_history) >> >> >> Joshua Nathan >> *IT Supervisor* >> Black Forest Academy >> >> p: +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056 >> a: >> w: Hammersteiner Straße 50, 79400 Kandern >> bfacademy.de >> <https://urldefense.com/v3/__http://bfacademy.de/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmISt3FAmr$> >> >> >> >> >> On Thu, Apr 15, 2021 at 3:52 PM Ludovic Zammit <lzam...@inverse.ca> >> wrote: >> >>> Hello Nathan, >>> >>> Show me the output of: >>> >>> grep 58:cb:52:37:5d:ab /usr/local/pf/logs/packetfence.log >>> >>> Thanks, >>> >>> >>> Ludovic Zammit >>> lzam...@inverse.ca :: +1.514.447.4918 (x145) :: www.inverse.ca >>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>> <https://urldefense.com/v3/__http://www.sogo.nu/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIdmZL8FU$>) >>> and PacketFence (http://packetfence.org) >>> >>> >>> >>> >>> >>> >>> >>> >>> On Apr 15, 2021, at 9:48 AM, Nathan, Josh via PacketFence-users < >>> packetfence-users@lists.sourceforge.net> wrote: >>> >>> Hello, >>> >>> So, I'm trying to configure a 10.2 Zen version of PF. Our user >>> authentication happens via RADIUS. So I configured our RADIUS server under >>> the "Internal Sources" section, and everything is now "mostly" working. My >>> devices authenticate, but the Authentication Rules don't seem to be taking >>> effect. >>> >>> When I try using the debug command for RADIUS (raddebug -f >>> /usr/local/pf/var/run/radiusd.sock -t 3600), here's what I get. There must >>> be a setting I'm missing somewhere. The packetfence.log file is >>> effectively silent on the issue. >>> >>> (327) Thu Apr 15 15:40:43 2021: Debug: rest: Processing response header >>> (327) Thu Apr 15 15:40:43 2021: Debug: rest: Status : 200 (OK) >>> (327) Thu Apr 15 15:40:43 2021: Debug: rest: Type : json >>> (application/json) >>> (327) Thu Apr 15 15:40:43 2021: Debug: rest: Parsing attribute >>> "control:PacketFence-Authorization-Status" >>> (327) Thu Apr 15 15:40:43 2021: Debug: rest: EXPAND allow >>> (327) Thu Apr 15 15:40:43 2021: Debug: rest: --> allow >>> (327) Thu Apr 15 15:40:43 2021: Debug: rest: >>> PacketFence-Authorization-Status := "allow" >>> (327) Thu Apr 15 15:40:43 2021: Debug: [rest] = updated >>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Peer sent EAP Response (code >>> 2) ID 56 length 46 >>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Continuing tunnel setup >>> (327) Thu Apr 15 15:40:43 2021: Debug: [eap] = ok >>> (327) Thu Apr 15 15:40:43 2021: Debug: } # authorize = ok >>> (327) Thu Apr 15 15:40:43 2021: Debug: Found Auth-Type = eap >>> (327) Thu Apr 15 15:40:43 2021: Debug: # Executing group from file >>> /usr/local/pf/raddb/sites-enabled/packetfence >>> (327) Thu Apr 15 15:40:43 2021: Debug: authenticate { >>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Expiring EAP session with >>> state 0xce6b3ab6c75323c5 >>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Finished EAP session with >>> state 0xce6b3ab6c75323c5 >>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Previous EAP request found >>> for state 0xce6b3ab6c75323c5, released from the list >>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Peer sent packet with method >>> EAP PEAP (25) >>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Calling submodule eap_peap >>> to process data >>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Continuing EAP-TLS >>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: [eaptls verify] = ok >>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Done initial handshake >>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: [eaptls process] = ok >>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Session established. >>> Decoding tunneled attributes >>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: PEAP state send tlv >>> success >>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Received EAP-TLV >>> response >>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Success >>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Using saved attributes >>> from the original Access-Accept >>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: User-Name = >>> "josh.nathan" >>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Sending EAP Success (code 3) >>> ID 56 length 4 >>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Freeing handler >>> (327) Thu Apr 15 15:40:43 2021: Debug: [eap] = ok >>> (327) Thu Apr 15 15:40:43 2021: Debug: } # authenticate = ok >>> (327) Thu Apr 15 15:40:43 2021: Debug: # Executing section post-auth >>> from file /usr/local/pf/raddb/sites-enabled/packetfence >>> (327) Thu Apr 15 15:40:43 2021: Debug: post-auth { >>> (327) Thu Apr 15 15:40:43 2021: Debug: update { >>> (327) Thu Apr 15 15:40:43 2021: Debug: EXPAND >>> %{Packet-Src-IP-Address} >>> (327) Thu Apr 15 15:40:43 2021: Debug: --> 172.20.50.76 >>> (327) Thu Apr 15 15:40:43 2021: Debug: EXPAND >>> %{Packet-Dst-IP-Address} >>> (327) Thu Apr 15 15:40:43 2021: Debug: --> 172.20.104.31 >>> (327) Thu Apr 15 15:40:43 2021: Debug: } # update = noop >>> (327) Thu Apr 15 15:40:43 2021: Debug: policy >>> packetfence-set-tenant-id { >>> (327) Thu Apr 15 15:40:43 2021: Debug: if (!NAS-IP-Address || >>> NAS-IP-Address == "0.0.0.0"){ >>> (327) Thu Apr 15 15:40:43 2021: Debug: if (!NAS-IP-Address || >>> NAS-IP-Address == "0.0.0.0") -> FALSE >>> (327) Thu Apr 15 15:40:43 2021: Debug: if ( >>> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") { >>> (327) Thu Apr 15 15:40:43 2021: Debug: EXPAND >>> %{%{control:PacketFence-Tenant-Id}:-0} >>> (327) Thu Apr 15 15:40:43 2021: Debug: --> 1 >>> (327) Thu Apr 15 15:40:43 2021: Debug: if ( >>> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> FALSE >>> (327) Thu Apr 15 15:40:43 2021: Debug: if ( >>> &control:PacketFence-Tenant-Id == 0 ) { >>> (327) Thu Apr 15 15:40:43 2021: Debug: if ( >>> &control:PacketFence-Tenant-Id == 0 ) -> FALSE >>> (327) Thu Apr 15 15:40:43 2021: Debug: } # policy >>> packetfence-set-tenant-id = noop >>> (327) Thu Apr 15 15:40:43 2021: Debug: if >>> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") { >>> (327) Thu Apr 15 15:40:43 2021: Debug: EXPAND >>> %{%{control:PacketFence-Proxied-From}:-False} >>> (327) Thu Apr 15 15:40:43 2021: Debug: --> False >>> (327) Thu Apr 15 15:40:43 2021: Debug: if >>> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") -> FALSE >>> (327) Thu Apr 15 15:40:43 2021: Debug: if (! EAP-Type || (EAP-Type >>> != TTLS && EAP-Type != PEAP) ) { >>> (327) Thu Apr 15 15:40:43 2021: Debug: if (! EAP-Type || (EAP-Type >>> != TTLS && EAP-Type != PEAP) ) -> FALSE >>> (327) Thu Apr 15 15:40:43 2021: Debug: >>> attr_filter.packetfence_post_auth: EXPAND %{User-Name} >>> (327) Thu Apr 15 15:40:43 2021: Debug: >>> attr_filter.packetfence_post_auth: --> josh.nathan >>> (327) Thu Apr 15 15:40:43 2021: Debug: >>> attr_filter.packetfence_post_auth: Matched entry DEFAULT at line 10 >>> (327) Thu Apr 15 15:40:43 2021: Debug: >>> [attr_filter.packetfence_post_auth] = updated >>> (327) Thu Apr 15 15:40:43 2021: Debug: linelog: EXPAND >>> messages.%{%{reply:Packet-Type}:-default} >>> (327) Thu Apr 15 15:40:43 2021: Debug: linelog: --> >>> messages.Access-Accept >>> (327) Thu Apr 15 15:40:43 2021: Debug: linelog: EXPAND >>> [mac:%{Calling-Station-Id}] Accepted user: %{reply:User-Name} and returned >>> VLAN %{reply:Tunnel-Private-Group-ID} >>> (327) Thu Apr 15 15:40:43 2021: Debug: linelog: --> >>> [mac:58:cb:52:37:5d:ab] Accepted user: josh.nathan and returned VLAN >>> (327) Thu Apr 15 15:40:43 2021: Debug: [linelog] = ok >>> (327) Thu Apr 15 15:40:43 2021: Debug: } # post-auth = updated >>> (327) Thu Apr 15 15:40:43 2021: Debug: Sent Access-Accept Id 229 from >>> 172.20.104.31:1812 >>> <https://urldefense.com/v3/__http://172.20.104.31:1812/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIQCj3ZD8$> >>> to 172.20.50.76:40485 >>> <https://urldefense.com/v3/__http://172.20.50.76:40485/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIavZqZFs$> >>> length 0 >>> (327) Thu Apr 15 15:40:43 2021: Debug: User-Name = "josh.nathan" >>> (327) Thu Apr 15 15:40:43 2021: Debug: MS-MPPE-Recv-Key = >>> 0x600da060c2faa9fdf49eb732f5110f438b5d71f66e661345f268bf24252e85c3 >>> (327) Thu Apr 15 15:40:43 2021: Debug: MS-MPPE-Send-Key = >>> 0x8d6d99afd78af3ebade3b3869adc9ceef8f9782d323d553bce8cf5c1511d05d1 >>> (327) Thu Apr 15 15:40:43 2021: Debug: EAP-Message = 0x03380004 >>> (327) Thu Apr 15 15:40:43 2021: Debug: Message-Authenticator = >>> 0x00000000000000000000000000000000 >>> (327) Thu Apr 15 15:40:43 2021: Debug: Finished request >>> (317) Thu Apr 15 15:40:44 2021: Debug: Cleaning up request packet ID 219 >>> with timestamp +4564 >>> (318) Thu Apr 15 15:40:44 2021: Debug: Cleaning up request packet ID 220 >>> with timestamp +4564 >>> (319) Thu Apr 15 15:40:44 2021: Debug: Cleaning up request packet ID 221 >>> with timestamp +4564 >>> (328) Thu Apr 15 15:40:45 2021: Debug: Received Status-Server Id 161 >>> from 127.0.0.1:45116 >>> <https://urldefense.com/v3/__http://127.0.0.1:45116/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIf5Jx0mf$> >>> to 127.0.0.1:18121 >>> <https://urldefense.com/v3/__http://127.0.0.1:18121/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIecH5d9e$> >>> length 50 >>> (328) Thu Apr 15 15:40:45 2021: Debug: Message-Authenticator = >>> 0x0630aabb861db1ebd2a0892a5d55941e >>> (328) Thu Apr 15 15:40:45 2021: Debug: FreeRADIUS-Statistics-Type = 15 >>> (328) Thu Apr 15 15:40:45 2021: Debug: # Executing group from file >>> /usr/local/pf/raddb/sites-enabled/status >>> (328) Thu Apr 15 15:40:45 2021: Debug: Autz-Type Status-Server { >>> (328) Thu Apr 15 15:40:45 2021: Debug: [ok] = ok >>> (328) Thu Apr 15 15:40:45 2021: Debug: } # Autz-Type Status-Server = ok >>> (328) Thu Apr 15 15:40:45 2021: Debug: Sent Access-Accept Id 161 from >>> 127.0.0.1:18121 >>> <https://urldefense.com/v3/__http://127.0.0.1:18121/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIecH5d9e$> >>> to 127.0.0.1:45116 >>> <https://urldefense.com/v3/__http://127.0.0.1:45116/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIf5Jx0mf$> >>> length 0 >>> >>> >>> >>> Thank you for any guidance you can give! >>> >>> Joshua Nathan >>> *IT Supervisor* >>> Black Forest Academy >>> >>> p: +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056 >>> a: >>> w: Hammersteiner Straße 50, 79400 Kandern >>> bfacademy.de >>> <https://urldefense.com/v3/__http://bfacademy.de/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmISt3FAmr$> >>> >>> >>> _______________________________________________ >>> PacketFence-users mailing list >>> PacketFence-users@lists.sourceforge.net >>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>> <https://urldefense.com/v3/__https://lists.sourceforge.net/lists/listinfo/packetfence-users__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIW82ehl3$> >>> >>> >>> >
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users