Hello Arun, sorry for the late reply.
Can you add just before this line: https://github.com/inverse-inc/packetfence/blob/devel/lib/pf/role.pm#L737 use Data;;Dumper; $logger->warn(Dumper $args); then restart httpd.aaa and retry. You should be able to see all the args in the logs. (if you can paste them). Regards Fabrice Le dim. 19 sept. 2021 à 08:15, Arun Kangle <akan...@gmail.com> a écrit : > Hi Fabrice, > Update no 2: > > I could be wrong but I think for some reason "condition=security_event.id > == "3000008"" is not honoured (On GUI I can see security even is in "open" > state). Because just to verify I changed "condition=username == "hodtest"" > and form the logs I see that condition is honored and node is assigned to > "isolation" vlan. > > > Logs: > Sep 19 17:30:58 aolicnac packetfence_httpd.aaa[284027]: httpd.aaa(249065) > INFO: [mac:38:ba:f8:de:a7:10] handling radius autz request: from switch_ip > => (192.168.2.27), connection_type => Wireless-802.11-EAP,switch_mac => > (00:4e:35:cc:8d:ee), mac => [38:ba:f8:de:a7:10], port => 0, username => > "hodtest", ssid => aolicnet (pf::radius::authorize) > Sep 19 17:30:58 aolicnac packetfence_httpd.aaa[284027]: httpd.aaa(249065) > INFO: [mac:38:ba:f8:de:a7:10] Instantiate profile dot1x-eap > (pf::Connection::ProfileFactory::_from_profile) > > *Sep 19 17:30:58 aolicnac packetfence_httpd.aaa[284027]: httpd.aaa(249065) > INFO: [mac:38:ba:f8:de:a7:10] Match rule Disable_auto_reg > (pf::access_filter::test)*Sep 19 17:30:58 aolicnac > packetfence_httpd.aaa[284027]: httpd.aaa(249065) INFO: > [mac:38:ba:f8:de:a7:10] highest priority security_event is 3000008. Target > Role for security_event: isolation (pf::role::getIsolationRole) > Sep 19 17:30:58 aolicnac packetfence_httpd.aaa[284027]: httpd.aaa(249065) > INFO: [mac:38:ba:f8:de:a7:10] (192.168.2.27) Added VLAN 19 to the returned > RADIUS Access-Accept (pf::Switch::returnRadiusAccessAccept) > Sep 19 17:30:58 aolicnac packetfence_httpd.aaa[284027]: httpd.aaa(249065) > WARN: [mac:38:ba:f8:de:a7:10] No parameter isolationRole found in > conf/switches.conf for the switch 192.168.2.27 (pf::Switch::getRoleByName) > Sep 19 17:31:06 aolicnac packetfence_httpd.aaa[463999]: httpd.aaa(249065) > INFO: [mac:38:ba:f8:de:a7:10] Updating locationlog from accounting request > (pf::api::handle_accounting_metadata) > Sep 19 17:31:06 aolicnac packetfence_httpd.aaa[463999]: httpd.aaa(249065) > WARN: [mac:38:ba:f8:de:a7:10] Firewall SSO Notify > (pf::api::firewallsso_accounting) > Sep 19 17:31:06 aolicnac packetfence_httpd.aaa[463999]: httpd.aaa(249065) > INFO: [mac:38:ba:f8:de:a7:10] Sending a firewall SSO 'Update' request for > MAC '38:ba:f8:de:a7:10' and IP '192.168.10.58' (pf::firewallsso::do_sso) > Sep 19 17:31:06 aolicnac packetfence_httpd.aaa[463999]: httpd.aaa(249065) > INFO: [mac:38:ba:f8:de:a7:10] Request to /api/v1/firewall_sso/update is > unauthorized, will perform a login (pf::api::unifiedapiclient::call) > Sep 19 17:31:07 aolicnac pfqueue[476302]: pfqueue(476302) INFO: > [mac:38:ba:f8:de:a7:10] Sending a firewall SSO 'Update' request for MAC > '38:ba:f8:de:a7:10' and IP '192.168.10.58' (pf::firewallsso::do_sso) > Sep 19 17:31:07 aolicnac pfqueue[476302]: pfqueue(476302) WARN: > [mac:38:ba:f8:de:a7:10] Unable to match MAC address to IP '192.168.10.58' > (pf::ip4log::ip2mac) > Sep 19 17:31:07 aolicnac pfqueue[478327]: pfqueue(478327) INFO: > [mac:38:ba:f8:de:a7:10] Instantiate profile dot1x-eap > (pf::Connection::ProfileFactory::_from_profile) > Sep 19 17:31:14 aolicnac packetfence_httpd.aaa[463999]: httpd.aaa(249065) > WARN: [mac:38:ba:f8:de:a7:10] Firewall SSO Notify > (pf::api::firewallsso_accounting) > Sep 19 17:31:14 aolicnac packetfence_httpd.aaa[463999]: httpd.aaa(249065) > INFO: [mac:38:ba:f8:de:a7:10] Sending a firewall SSO 'Stop' request for MAC > '38:ba:f8:de:a7:10' and IP '192.168.10.58' (pf::firewallsso::do_sso) > Sep 19 17:31:14 aolicnac packetfence_httpd.aaa[463999]: httpd.aaa(249065) > INFO: [mac:38:ba:f8:de:a7:10] Updating locationlog from accounting request > (pf::api::handle_accounting_metadata) > Sep 19 17:31:14 aolicnac packetfence_httpd.aaa[463999]: httpd.aaa(249065) > WARN: [mac:38:ba:f8:de:a7:10] Firewall SSO Notify > (pf::api::firewallsso_accounting) > Sep 19 17:31:14 aolicnac packetfence_httpd.aaa[463999]: httpd.aaa(249065) > INFO: [mac:38:ba:f8:de:a7:10] Sending a firewall SSO 'Update' request for > MAC '38:ba:f8:de:a7:10' and IP '192.168.10.58' (pf::firewallsso::do_sso) > Sep 19 17:31:15 aolicnac packetfence_httpd.aaa[463999]: httpd.aaa(249065) > WARN: [mac:38:ba:f8:de:a7:10] Unable to pull accounting history for device > 38:ba:f8:de:a7:10. The history set doesn't exist yet. > (pf::accounting_events_history::latest_mac_history) > Sep 19 17:31:15 aolicnac pfqueue[476998]: pfqueue(476998) INFO: > [mac:38:ba:f8:de:a7:10] Sending a firewall SSO 'Update' request for MAC > '38:ba:f8:de:a7:10' and IP '192.168.10.58' (pf::firewallsso::do_sso) > Sep 19 17:31:15 aolicnac packetfence_httpd.aaa[463999]: httpd.aaa(249065) > WARN: [mac:38:ba:f8:de:a7:10] Unable to pull accounting history for device > 38:ba:f8:de:a7:10. The history set doesn't exist yet. > (pf::accounting_events_history::latest_mac_history) > Sep 19 17:31:15 aolicnac pfqueue[478332]: pfqueue(478332) INFO: > [mac:38:ba:f8:de:a7:10] Instantiate profile dot1x-eap > (pf::Connection::ProfileFactory::_from_profile) > Sep 19 17:31:16 aolicnac packetfence_httpd.portal[476285]: > httpd.portal(476285) INFO: [mac:38:ba:f8:de:a7:10] Instantiate profile > dot1x-eap (pf::Connection::ProfileFactory::_from_profile) > Sep 19 17:31:16 aolicnac packetfence_httpd.portal[476292]: > httpd.portal(476292) INFO: [mac:38:ba:f8:de:a7:10] Instantiate profile > dot1x-eap (pf::Connection::ProfileFactory::_from_profile) > Sep 19 17:31:16 aolicnac packetfence_httpd.portal[476292]: > httpd.portal(476292) INFO: [mac:38:ba:f8:de:a7:10] Showing the > security_events/banned_os.html remediation page. > (captiveportal::PacketFence::Controller::SecurityEvent::index) > Sep 19 17:31:30 aolicnac pfqueue[476506]: pfqueue(476506) INFO: > [mac:38:ba:f8:de:a7:10] Sending a firewall SSO 'Update' request for MAC > '38:ba:f8:de:a7:10' and IP '192.168.10.58' (pf::firewallsso::do_sso) > > > more /usr/local/pf/conf/security_events.conf > > [3000008] > access_duration=12h > enabled=Y > trigger=internal::is_max_reg_nodes_reached > desc=Max nodes reached > actions=reevaluate_access > > > more /usr/local/pf/conf/vlan_filters.conf > > [Disable_auto_reg] > status=enabled > condition=username == "hodtest" > run_actions=enabled > scopes=AutoRegister > top_op=and > > Thanks, > - Arun > > On Fri, Sep 17, 2021 at 1:03 AM Arun Kangle <akan...@gmail.com> wrote: > >> Sorry Fabrice, filter for the packefence.log was wrong so please ignore >> the earlier email. >> >> Update is, I see the security event triggered but node is not assigned to >> Isolation VLAN: >> >> Sep 17 00:59:13 aolicnac packetfence_httpd.aaa[250198]: httpd.aaa(249065) >> INFO: [mac:38:ba:f8:de:a7:10] handling radius autz request: from switch_ip >> => (192.168.2.27), connection_type => Wireless-802.11-EAP,switch_mac => >> (00:4e:35:cc:8d:ee), mac => [38:ba:f8:de:a7:10], port => 0, username => >> "hodtest", ssid => aolicnet (pf::radius::authorize) >> Sep 17 00:59:13 aolicnac packetfence_httpd.aaa[250198]: httpd.aaa(249065) >> INFO: [mac:38:ba:f8:de:a7:10] Instantiate profile dot1x-eap >> (pf::Connection::ProfileFactory::_from_profile) >> Sep 17 00:59:13 aolicnac packetfence_httpd.aaa[250198]: httpd.aaa(249065) >> INFO: [mac:38:ba:f8:de:a7:10] Found authentication source(s) : >> 'set-group-based-role' for realm 'null' >> (pf::config::util::filter_authentication_sources) >> Sep 17 00:59:13 aolicnac packetfence_httpd.aaa[250198]: httpd.aaa(249065) >> INFO: [mac:38:ba:f8:de:a7:10] Using sources set-group-based-role for >> matching (pf::authentication::match2) >> Sep 17 00:59:13 aolicnac packetfence_httpd.aaa[250198]: httpd.aaa(249065) >> WARN: [mac:38:ba:f8:de:a7:10] [set-group-based-role set-role-Bypassed] >> Searching for >> (&(sAMAccountName=hodtest)(memberOf=CN=Bypassed,OU=AOL-Group,DC=AOLIC,DC=NET)), >> from DC=AOLIC,DC=NET, with scope sub >> (pf::Authentication::Source::LDAPSource::match_in_subclass) >> Sep 17 00:59:13 aolicnac packetfence_httpd.aaa[250198]: httpd.aaa(249065) >> WARN: [mac:38:ba:f8:de:a7:10] [set-group-based-role set-role-HOD] Searching >> for >> (&(sAMAccountName=hodtest)(memberOf=CN=HOD,OU=AOL-Group,DC=AOLIC,DC=NET)), >> from DC=AOLIC,DC=NET, with scope sub >> (pf::Authentication::Source::LDAPSource::match_in_subclass) >> Sep 17 00:59:13 aolicnac packetfence_httpd.aaa[250198]: httpd.aaa(249065) >> INFO: [mac:38:ba:f8:de:a7:10] Matched rule (set-role-HOD) in source >> set-group-based-role, returning actions. >> (pf::Authentication::Source::match_rule) >> Sep 17 00:59:13 aolicnac packetfence_httpd.aaa[250198]: httpd.aaa(249065) >> INFO: [mac:38:ba:f8:de:a7:10] Matched rule (set-role-HOD) in source >> set-group-based-role, returning actions. (pf::Authentication::Source::match) >> Sep 17 00:59:13 aolicnac packetfence_httpd.aaa[250198]: httpd.aaa(249065) >> INFO: [mac:38:ba:f8:de:a7:10] per-role max nodes per-user limit reached: 1 >> are already registered to pid hodtest for role HOD >> (pf::node::is_max_reg_nodes_reached) >> Sep 17 00:59:13 aolicnac packetfence_httpd.aaa[250198]: httpd.aaa(249065) >> WARN: [mac:38:ba:f8:de:a7:10] Unable to pull accounting history for device >> 38:ba:f8:de:a7:10. The history set doesn't exist yet. >> (pf::accounting_events_history::latest_mac_history) >> >> *Sep 17 00:59:13 aolicnac packetfence_httpd.aaa[250198]: >> httpd.aaa(249065) INFO: [mac:38:ba:f8:de:a7:10] security_event 3000008 >> (trigger internal::is_max_reg_nodes_reached) already exists for >> 38:ba:f8:de:a7:10, not adding again >> (pf::security_event::security_event_trigger)*Sep 17 00:59:13 aolicnac >> packetfence_httpd.aaa[250198]: httpd.aaa(249065) ERROR: >> [mac:38:ba:f8:de:a7:10] max nodes per pid met or exceeded - registration of >> 38:ba:f8:de:a7:10 to hodtest failed >> (pf::registration::setup_node_for_registration) >> Sep 17 00:59:13 aolicnac packetfence_httpd.aaa[250198]: httpd.aaa(249065) >> ERROR: [mac:38:ba:f8:de:a7:10] auto-registration of node failed max nodes >> per pid met or exceeded (pf::radius::authorize) >> >> >> root@aolicnac:/usr/local/pf/conf# more security_events.conf >> >> [3000008] >> access_duration=12h >> enabled=Y >> trigger=internal::is_max_reg_nodes_reached >> desc=Max nodes reached >> actions=reevaluate_access >> window=dynamic >> >> >> root@aolicnac:/usr/local/pf/conf# more vlan_filters.conf >> >> [Disable_auto_reg] >> status=enabled >> condition=security_event.id == "3000008" >> run_actions=enabled >> scopes=AutoRegister >> top_op=and >> description=Disable auto registration on security event >> role=REJECT >> >> On Thu, Sep 16, 2021 at 7:23 PM Arun Kangle <akan...@gmail.com> wrote: >> >>> Fabrice, >>> The Problem is I don't see security even getting triggered. What i mean >>> is, *for example*, i don't see security event trigger message like the >>> one below (this one is for random_mac) in the packetfence.log for >>> event_id=3000008 >>> >>> 2021-09-16T19:09:43+05:30aolicnacpfqueuepfqueueinfo pfqueue(234785) >>> INFO: [mac:d2:41:be:48:3a:1f] calling security_event_add with >>> security_event_id=3000007 mac=d2:41:be:48:3a:1f release_date=0000-00-00 >>> 00:00:00 (trigger internal::new_dhcp_info) >>> (pf::security_event::security_event_trigger) >>> >>> And because of that under report or under node, I don't see any >>> "Security events" entry. >>> >>> root@aolicnac:/usr/local/pf/conf# more security_events.conf >>> [3000007] >>> desc=Private MAC Address detection >>> actions=log,reevaluate_access >>> enabled=Y >>> whitelisted_roles=default,v-guest,r-guest,registration >>> >>> [3000008] >>> access_duration=12h >>> enabled=Y >>> trigger=internal::is_max_reg_nodes_reached >>> desc=Max nodes reached >>> actions=reevaluate_access >>> window=dynamic >>> >>> >>> root@aolicnac:/usr/local/pf/conf# more vlan_filters.conf >>> [ster,RegistrationRole >>> >>> [Disable_auto_reg] >>> status=enabled >>> condition=security_event.id == "3000008" >>> run_actions=enabled >>> scopes=AutoRegister >>> top_op=and >>> description=Disable auto registration on security event >>> role=REJECT >>> >>> Thanks in advance, >>> - Arun >>> >>> On Wed, Sep 15, 2021 at 7:21 PM Fabrice Durand <oeufd...@gmail.com> >>> wrote: >>> >>>> In fact it´s a little bit more complicate since you do autoregistration. >>>> >>>> What you can do is to trigger the security event with action isolate. >>>> Then create a vlan filter that disable the autoregistration if the >>>> security event is open for this device. >>>> >>>> Then the first request will be rejected (security event triggered) and >>>> once the device reconnect it will go in the isolation vlan. >>>> >>>> >>>> Vlan filter: >>>> >>>> [Disable_Auto_reg] >>>> description=Disable Auto Reg on security event >>>> run_actions=enabled >>>> status=enabled >>>> condition=security_event.id == "3000009" >>>> top_op=and >>>> scopes=AutoRegister >>>> role=REJECT >>>> >>>> Security event: >>>> >>>> [3000009] >>>> trigger=internal::is_max_reg_nodes_reached >>>> desc=Max node >>>> access_duration=12h >>>> actions=reevaluate_access >>>> window=dynamic >>>> enabled=Y >>>> >>>> >>>> >>>> Le lun. 13 sept. 2021 à 13:04, Arun Kangle <akan...@gmail.com> a >>>> écrit : >>>> >>>>> Hi Fabrice, >>>>> I did quick testing, it's not triggering. I am using V 11.0, upgraded >>>>> from 10.3.9 >>>>> 1) while creating the security event, GUI shows the error (attached >>>>> screenshot) but event is created successfully >>>>> 2) event is not getting triggered, so no further actions (like >>>>> assign isoalation role and not getting redirected to web-page) >>>>> >>>>> security_event.conf >>>>> more security_events.conf >>>>> [3000007] >>>>> desc=Private MAC Address detection >>>>> actions=log,reevaluate_access >>>>> enabled=Y >>>>> whitelisted_roles=default,v-guest,r-guest,registration >>>>> >>>>> [3000008] >>>>> access_duration=12h >>>>> enabled=Y >>>>> template=banned_os >>>>> trigger=internal::is_max_reg_nodes_reached >>>>> desc=Max nodes reached >>>>> actions=reevaluate_access >>>>> # Copyright (C) Inverse inc. >>>>> >>>>> >>>>> Logs: >>>>> >>>>> Sep 13 22:27:49 aolicnac packetfence_httpd.aaa[3379]: httpd.aaa(2029) >>>>> INFO: [mac:38:ba:f8:de:a7:10] handling radius autz request: from switch_ip >>>>> => (192.168.2.27), connection_type => Wireless-802.11-EAP,switch_mac => >>>>> (00:4e:35:cc:8d:ee), mac => [38:ba:f8:de:a7:10], port => 0, username => >>>>> "hodtest", ssid => aolicnet (pf::radius::authorize) >>>>> Sep 13 22:27:49 aolicnac packetfence_httpd.aaa[3379]: httpd.aaa(2029) >>>>> INFO: [mac:38:ba:f8:de:a7:10] Instantiate profile dot1x-eap >>>>> (pf::Connection::ProfileFactory::_from_profile) >>>>> Sep 13 22:27:49 aolicnac packetfence_httpd.aaa[3379]: httpd.aaa(2029) >>>>> INFO: [mac:38:ba:f8:de:a7:10] Found authentication source(s) : >>>>> 'set-group-based-role' for realm 'null' >>>>> (pf::config::util::filter_authentication_sources) >>>>> Sep 13 22:27:49 aolicnac packetfence_httpd.aaa[3379]: httpd.aaa(2029) >>>>> INFO: [mac:38:ba:f8:de:a7:10] Using sources set-group-based-role for >>>>> matching (pf::authentication::match2) >>>>> Sep 13 22:27:49 aolicnac packetfence_httpd.aaa[3379]: httpd.aaa(2029) >>>>> WARN: [mac:38:ba:f8:de:a7:10] [set-group-based-role set-role-Bypassed] >>>>> Searching for >>>>> (&(sAMAccountName=hodtest)(memberOf=CN=Bypassed,OU=AOL-Group,DC=AOLIC,DC=NET)), >>>>> from DC=AOLIC,DC=NET, with scope sub >>>>> (pf::Authentication::Source::LDAPSource::match_in_subclass) >>>>> Sep 13 22:27:49 aolicnac packetfence_httpd.aaa[3379]: httpd.aaa(2029) >>>>> WARN: [mac:38:ba:f8:de:a7:10] [set-group-based-role set-role-HOD] >>>>> Searching >>>>> for >>>>> (&(sAMAccountName=hodtest)(memberOf=CN=HOD,OU=AOL-Group,DC=AOLIC,DC=NET)), >>>>> from DC=AOLIC,DC=NET, with scope sub >>>>> (pf::Authentication::Source::LDAPSource::match_in_subclass) >>>>> Sep 13 22:27:49 aolicnac packetfence_httpd.aaa[3379]: httpd.aaa(2029) >>>>> INFO: [mac:38:ba:f8:de:a7:10] Matched rule (set-role-HOD) in source >>>>> set-group-based-role, returning actions. >>>>> (pf::Authentication::Source::match_rule) >>>>> Sep 13 22:27:49 aolicnac packetfence_httpd.aaa[3379]: httpd.aaa(2029) >>>>> INFO: [mac:38:ba:f8:de:a7:10] Matched rule (set-role-HOD) in source >>>>> set-group-based-role, returning actions. >>>>> (pf::Authentication::Source::match) >>>>> Sep 13 22:27:49 aolicnac packetfence_httpd.aaa[3379]: httpd.aaa(2029) >>>>> INFO: [mac:38:ba:f8:de:a7:10] per-role max nodes per-user limit reached: 1 >>>>> are already registered to pid hodtest for role HOD >>>>> (pf::node::is_max_reg_nodes_reached) >>>>> Sep 13 22:27:49 aolicnac packetfence_httpd.aaa[3379]: httpd.aaa(2029) >>>>> WARN: [mac:38:ba:f8:de:a7:10] Unable to pull accounting history for device >>>>> 38:ba:f8:de:a7:10. The history set doesn't exist yet. >>>>> (pf::accounting_events_history::latest_mac_history) >>>>> Sep 13 22:27:49 aolicnac packetfence_httpd.aaa[3379]: httpd.aaa(2029) >>>>> INFO: [mac:38:ba:f8:de:a7:10] security_event 3000008 (trigger >>>>> internal::is_max_reg_nodes_reached) already exists for 38:ba:f8:de:a7:10, >>>>> not adding again (pf::security_event::security_event_trigger) >>>>> Sep 13 22:27:49 aolicnac packetfence_httpd.aaa[3379]: httpd.aaa(2029) >>>>> ERROR: [mac:38:ba:f8:de:a7:10] max nodes per pid met or exceeded - >>>>> registration of 38:ba:f8:de:a7:10 to hodtest failed >>>>> (pf::registration::setup_node_for_registration) >>>>> Sep 13 22:27:49 aolicnac packetfence_httpd.aaa[3379]: httpd.aaa(2029) >>>>> ERROR: [mac:38:ba:f8:de:a7:10] auto-registration of node failed max nodes >>>>> per pid met or exceeded (pf::radius::authorize) >>>>> >>>>> >>>>> On Mon, Sep 13, 2021 at 1:33 PM Arun Kangle <akan...@gmail.com> wrote: >>>>> >>>>>> Thanks a lot for your help Fabrice. I patched my server. Will do some >>>>>> testing and let you know. >>>>>> >>>>>> Regards, >>>>>> - Arun >>>>>> >>>>>> On Mon, Sep 13, 2021 at 5:56 AM Fabrice Durand <oeufd...@gmail.com> >>>>>> wrote: >>>>>> >>>>>>> Hello Arun, >>>>>>> >>>>>>> try that. >>>>>>> cd /usr/local/pf >>>>>>> patch -p1 --dry-run < max_node.diff >>>>>>> if there is no error: >>>>>>> patch -p1 < max_node.diff >>>>>>> >>>>>>> Then restart packetfence. >>>>>>> >>>>>>> Regards >>>>>>> Fabrice >>>>>>> >>>>>>> Le sam. 11 sept. 2021 à 10:40, Arun Kangle <akan...@gmail.com> a >>>>>>> écrit : >>>>>>> >>>>>>>> Hi Fabrice, >>>>>>>> Thanks for your reply. I will need help on this. >>>>>>>> >>>>>>>> Thanks again, >>>>>>>> - Arun >>>>>>>> >>>>>>>> On Sat, Sep 11, 2021 at 7:25 AM Fabrice Durand <oeufd...@gmail.com> >>>>>>>> wrote: >>>>>>>> >>>>>>>>> Hello Arun, >>>>>>>>> >>>>>>>>> there is no security event that trigger that but it´s >>>>>>>>> not something really complicate to add in packetfence. >>>>>>>>> >>>>>>>>> If you look at is_max_reg_nodes_reached in node.pm, you can >>>>>>>>> trigger a security event from there. >>>>>>>>> >>>>>>>>> Let me know if you need help on that, it won´t take me so much >>>>>>>>> time to code it. >>>>>>>>> >>>>>>>>> Regards >>>>>>>>> Fabrice >>>>>>>>> >>>>>>>>> >>>>>>>>> Le mer. 25 août 2021 à 05:54, Arun Kangle via PacketFence-users < >>>>>>>>> packetfence-users@lists.sourceforge.net> a écrit : >>>>>>>>> >>>>>>>>>> Hello All, >>>>>>>>>> I went through the install guide and this list but I did not find >>>>>>>>>> information on how to configure a customer security event. >>>>>>>>>> Basically I wanted to trigger a custom security event when " max >>>>>>>>>> nodes per pid met or exceeded" and move the node to the isolation >>>>>>>>>> vlan so >>>>>>>>>> that the user can deregister one of the nodes to proceed. >>>>>>>>>> >>>>>>>>>> Thanks on advance, >>>>>>>>>> - Arun >>>>>>>>>> _______________________________________________ >>>>>>>>>> PacketFence-users mailing list >>>>>>>>>> PacketFence-users@lists.sourceforge.net >>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>>>>> >>>>>>>>>
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users