Re: [PacketFence-users] Bandwidth statistics make no sense (Cisco 2960x)

2017-11-13 Thread Durand fabrice via PacketFence-users

Hello Cristian,

i will be back to you tomorrow, with details and sql request to do.

Regards

Fabrice



Le 2017-11-13 à 07:59, Cristian Mammoli via PacketFence-users a écrit :
Hi Fabrice, could you please give me an hint to start looking whats 
going wrong here? How is bandwidth calculated and where?


Thanks in advance

Il 19/10/2017 18:22, Cristian Mammoli via PacketFence-users ha scritto:

If you mean PacketFence is 7.3.0
If you mean IOS: Cisco IOS Software, C2960X Software 
(C2960X-UNIVERSALK9-M), Version 15.2(2)E6, RELEASE SOFTWARE (fc1)



Il 19/10/2017 16:41, Fabrice Durand via PacketFence-users ha scritto:

Hello Cristian,

which version are you running ?

Regards

Fabrice




-- 


Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


--
Mammoli Cristian
System administrator
T. +39 0731 22911
Via Brodolini 6 | 60035 Jesi (an)



--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot


___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


Re: [PacketFence-users] auth request from wrong switch

2017-11-13 Thread Durand fabrice via PacketFence-users

Hi Darryl,

can you also run radius in debug mode to see all the details ?

Regards

Fabrice



Le 2017-11-13 à 16:22, Jason Sloan via PacketFence-users a écrit :

A few questions.
172.16.0.196 - is that a switch at all? If so, is that switch on the 
same vlan? Have you reviewed your spanning-tree blocks? Are you able 
to set a radius source interface? If so, is it set to the appropriate 
SVI / L3 link? Any NATs in the topology?


On Mon, Nov 13, 2017 at 3:40 PM, Sokolowski, Darryl via 
PacketFence-users > wrote:


Hi all,

I have a strange problem I can’t see the reason for,

I have machines that get “stuck” unable to access the network
seems like because the 802.1x authentication request is coming
from a switch that the device isn’t plugged into.

In this case, I have a computer (18:66:da:1e:06:0a) plugged into
switch with IP 172.16.0.200.

In the log it shows that the request is coming from 172.16.0.196,
and authorizes the machine and assigns the correct vlan, but it is
assigned to the wrong switch, so the client never can access the
network.

Further, there is already the correct machine (64:00:6a:7c:34:ce)
authorized on that port because that machine really does plug in
there.

Nov 13 03:12:37 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
[mac:18:66:da:1e:06:0a] handling radius autz request: from
switch_ip => (172.16.0.196), connection_type =>
WIRED_MAC_AUTH,switch_mac => (00:23:ac:d0:ca:8a), mac =>
[18:66:da:1e:06:0a], port => 10110, username => "1866da1e060a"
(pf::radius::authorize)

Nov 13 03:12:37 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
[mac:18:66:da:1e:06:0a] Instantiate profile default
(pf::Connection::ProfileFactory::_from_profile)

Nov 13 03:12:37 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
[mac:18:66:da:1e:06:0a] Connection type is WIRED_MAC_AUTH. Getting
role from node_info (pf::role::getRegisteredRole)

Nov 13 03:12:37 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
[mac:18:66:da:1e:06:0a] Username was defined "1866da1e060a" -
returning role 'Employee' (pf::role::getRegisteredRole)

Nov 13 03:12:37 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
[mac:18:66:da:1e:06:0a] PID: "CORE\amblerd", Status: reg Returned
VLAN: (undefined), Role: Employee (pf::role::fetchRoleForNode)

Nov 13 03:12:37 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
[mac:18:66:da:1e:06:0a] (172.16.0.196) Added VLAN 18 to the
returned RADIUS Access-Accept (pf::Switch::returnRadiusAccessAccept)

Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
[mac:64:00:6a:7c:34:ce] handling radius autz request: from
switch_ip => (172.16.0.196), connection_type =>
Ethernet-EAP,switch_mac => (00:23:ac:d0:ca:8a), mac =>
[64:00:6a:7c:34:ce], port => 10110, username =>
"host/LoboA7.CORE.LOCAL" (pf::radius::authorize)

Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
[mac:64:00:6a:7c:34:ce] is doing machine auth with account
'host/LoboA7.CORE.LOCAL'. (pf::radius::authorize)

Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
[mac:64:00:6a:7c:34:ce] Instantiate profile Earthcolor_Owned
(pf::Connection::ProfileFactory::_from_profile)

Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
[mac:64:00:6a:7c:34:ce] Found authentication source(s) : 'AD-Auth'
for realm 'null' (pf::config::util::filter_authentication_sources)

Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) WARN:
[mac:64:00:6a:7c:34:ce] Calling match with empty/invalid rule
class. Defaulting to 'authentication' (pf::authentication::match2)

Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
[mac:64:00:6a:7c:34:ce] Using sources AD-Auth for matching
(pf::authentication::match2)

Nov 13 03:12:52 pf1 pfqueue: pfqueue(9628) INFO: [mac:unknown]
undefined source id provided (pf::lookup::person::lookup_person)

Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
[mac:64:00:6a:7c:34:ce] Found authentication source(s) : 'AD-Auth'
for realm 'null' (pf::config::util::filter_authentication_sources)

Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
[mac:64:00:6a:7c:34:ce] Using sources AD-Auth for matching
(pf::authentication::match2)

Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
[mac:64:00:6a:7c:34:ce] Username was NOT defined or unable to
match a role - returning node based role 'Employee'
(pf::role::getRegisteredRole)

Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
[mac:64:00:6a:7c:34:ce] PID: "host/LoboA7.CORE.LOCAL", Status: reg
Returned VLAN: (undefined), Role: Employee
(pf::role::fetchRoleForNode)

Nov 13 03:12:52 pf1 

Re: [PacketFence-users] Recommended Distribution / Version

2017-11-13 Thread Durand fabrice via PacketFence-users

Hello Jason,

use Centos 7 , this is the version we use to develop.

Also i did some fix on the pki to make it work under Centos 7, just tell 
me what is the issue and i will fix it.



Le 2017-11-13 à 15:30, Jason Sloan via PacketFence-users a écrit :
Wondering if there's a recommended distribution for Packetfence. I 
initially tried with Centos 7, but I'm having trouble installing 
packetfence-pki. I poked around with Ubuntu LTS 16.04, but similar 
issues.


I'd like to essentially do the following:

  * Use packetfence for RADIUS auth for Network Administration (Switch
CLI)


Supported, it depend of the switch model.


  * Authenticate VPN users via RADIUS MSPKI+Password (Add two-factor
in the future)


You will probably need to play with Freeradius for that.


  * Authenticate Corporate WiFi (EAP-TLS from MSPKI AutoEnromment
Certificates)

Supported, 
https://packetfence.org/doc/PacketFence_MSPKI_Quick_Install_Guide.html


  * Provision BYOD Devices (PacketFence as a SubCA issued by MSPKI) (I
believe this is where packetfence-pki comes in)


PacketFence-pki or MSPKI.


It seems like many of the instructions / precompiled binaries are for 
older version of Debian or RHEL. I'd like to avoid compiling for 
source or wandering the internet looking to satisfy dependencies


I think I'm going to give Centos 6 a shot.

You can't install PacketFence version 7 on Centos 6 since it use systemd.

Regards
Fabrice




--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot


___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


Re: [PacketFence-users] Understanding VLAN Filter

2017-11-13 Thread Durand fabrice via PacketFence-users

Hello Charles,



Le 2017-11-13 à 14:27, Charles Rumford via PacketFence-users a écrit :

I'm currently working on getting some VLAN filters together, but have a couple
of questions:

1) Order of Processing
Is there a deterministic order to which the different filters are processed? If
so, how do I go about forcing the order?

It will follow the order in the file.

2) Examples
Are there are any examples of using either the operator regex or match_not? Is
there a good way to test this? Should there be any quoting around the value at 
all?


match will only search for a string in another string (ba will match 
with banana), so match_not is the opposite.
regex will match with a perl regex expression 
https://perldoc.perl.org/perlre.html.
I was thinking about a way to test the different filter through the 
admin gui but i miss time to do that.

Btw i use this website to test my regex https://www.debuggex.com.

Regards
Fabrice



--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


Re: [PacketFence-users] auth request from wrong switch

2017-11-13 Thread Jason Sloan via PacketFence-users
A few questions.
172.16.0.196 - is that a switch at all? If so, is that switch on the same
vlan? Have you reviewed your spanning-tree blocks? Are you able to set a
radius source interface? If so, is it set to the appropriate SVI / L3 link?
Any NATs in the topology?

On Mon, Nov 13, 2017 at 3:40 PM, Sokolowski, Darryl via PacketFence-users <
packetfence-users@lists.sourceforge.net> wrote:

> Hi all,
>
> I have a strange problem I can’t see the reason for,
>
> I have machines that get “stuck” unable to access the network seems like
> because the 802.1x authentication request is coming from a switch that the
> device isn’t plugged into.
>
> In this case, I have a computer (18:66:da:1e:06:0a) plugged into switch
> with IP 172.16.0.200.
>
> In the log it shows that the request is coming from 172.16.0.196, and
> authorizes the machine and assigns the correct vlan, but it is assigned to
> the wrong switch, so the client never can access the network.
>
> Further, there is already the correct machine (64:00:6a:7c:34:ce)
> authorized on that port because that machine really does plug in there.
>
>
>
> Nov 13 03:12:37 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
> [mac:18:66:da:1e:06:0a] handling radius autz request: from switch_ip =>
> (172.16.0.196), connection_type => WIRED_MAC_AUTH,switch_mac =>
> (00:23:ac:d0:ca:8a), mac => [18:66:da:1e:06:0a], port => 10110, username =>
> "1866da1e060a" (pf::radius::authorize)
>
> Nov 13 03:12:37 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
> [mac:18:66:da:1e:06:0a] Instantiate profile default (pf::Connection::
> ProfileFactory::_from_profile)
>
> Nov 13 03:12:37 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
> [mac:18:66:da:1e:06:0a] Connection type is WIRED_MAC_AUTH. Getting role
> from node_info (pf::role::getRegisteredRole)
>
> Nov 13 03:12:37 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
> [mac:18:66:da:1e:06:0a] Username was defined "1866da1e060a" - returning
> role 'Employee' (pf::role::getRegisteredRole)
>
> Nov 13 03:12:37 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
> [mac:18:66:da:1e:06:0a] PID: "CORE\amblerd", Status: reg Returned VLAN:
> (undefined), Role: Employee (pf::role::fetchRoleForNode)
>
> Nov 13 03:12:37 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
> [mac:18:66:da:1e:06:0a] (172.16.0.196) Added VLAN 18 to the returned RADIUS
> Access-Accept (pf::Switch::returnRadiusAccessAccept)
>
> Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
> [mac:64:00:6a:7c:34:ce] handling radius autz request: from switch_ip =>
> (172.16.0.196), connection_type => Ethernet-EAP,switch_mac =>
> (00:23:ac:d0:ca:8a), mac => [64:00:6a:7c:34:ce], port => 10110, username =>
> "host/LoboA7.CORE.LOCAL" (pf::radius::authorize)
>
> Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
> [mac:64:00:6a:7c:34:ce] is doing machine auth with account
> 'host/LoboA7.CORE.LOCAL'. (pf::radius::authorize)
>
> Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
> [mac:64:00:6a:7c:34:ce] Instantiate profile Earthcolor_Owned
> (pf::Connection::ProfileFactory::_from_profile)
>
> Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
> [mac:64:00:6a:7c:34:ce] Found authentication source(s) : 'AD-Auth' for
> realm 'null' (pf::config::util::filter_authentication_sources)
>
> Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) WARN:
> [mac:64:00:6a:7c:34:ce] Calling match with empty/invalid rule class.
> Defaulting to 'authentication' (pf::authentication::match2)
>
> Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
> [mac:64:00:6a:7c:34:ce] Using sources AD-Auth for matching
> (pf::authentication::match2)
>
> Nov 13 03:12:52 pf1 pfqueue: pfqueue(9628) INFO: [mac:unknown] undefined
> source id provided (pf::lookup::person::lookup_person)
>
> Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
> [mac:64:00:6a:7c:34:ce] Found authentication source(s) : 'AD-Auth' for
> realm 'null' (pf::config::util::filter_authentication_sources)
>
> Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
> [mac:64:00:6a:7c:34:ce] Using sources AD-Auth for matching
> (pf::authentication::match2)
>
> Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
> [mac:64:00:6a:7c:34:ce] Username was NOT defined or unable to match a role
> - returning node based role 'Employee' (pf::role::getRegisteredRole)
>
> Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
> [mac:64:00:6a:7c:34:ce] PID: "host/LoboA7.CORE.LOCAL", Status: reg Returned
> VLAN: (undefined), Role: Employee (pf::role::fetchRoleForNode)
>
> Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO:
> [mac:64:00:6a:7c:34:ce] (172.16.0.196) Added VLAN 18 to the returned RADIUS
> Access-Accept (pf::Switch::returnRadiusAccessAccept)
>
>
>
> I can’t figure out what’s going on here.
>
> Anyone seen this and can you point me how to make it right?
>
>
>
> Thanks
>
> Darryl
>
>
>
> 

[PacketFence-users] Understanding VLAN Filter

2017-11-13 Thread Charles Rumford via PacketFence-users
I'm currently working on getting some VLAN filters together, but have a couple
of questions:

1) Order of Processing
Is there a deterministic order to which the different filters are processed? If
so, how do I go about forcing the order?

2) Examples
Are there are any examples of using either the operator regex or match_not? Is
there a good way to test this? Should there be any quoting around the value at 
all?

-- 
Charles Rumford
Senior Network Engineer
ISC Tech Services
University of Pennsylvania
OpenPGP Key ID: 0xF3D8215A

--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


[PacketFence-users] Recommended Distribution / Version

2017-11-13 Thread Jason Sloan via PacketFence-users
Wondering if there's a recommended distribution for Packetfence. I
initially tried with Centos 7, but I'm having trouble installing
packetfence-pki. I poked around with Ubuntu LTS 16.04, but similar issues.

I'd like to essentially do the following:


   - Use packetfence for RADIUS auth for Network Administration (Switch CLI)
   - Authenticate VPN users via RADIUS MSPKI+Password (Add two-factor in
   the future)
   - Authenticate Corporate WiFi (EAP-TLS from MSPKI AutoEnromment
   Certificates)
   - Provision BYOD Devices (PacketFence as a SubCA issued by MSPKI) (I
   believe this is where packetfence-pki comes in)


It seems like many of the instructions / precompiled binaries are for older
version of Debian or RHEL. I'd like to avoid compiling for source or
wandering the internet looking to satisfy dependencies

I think I'm going to give Centos 6 a shot.
--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


[PacketFence-users] auth request from wrong switch

2017-11-13 Thread Sokolowski, Darryl via PacketFence-users
Hi all,
I have a strange problem I can't see the reason for,
I have machines that get "stuck" unable to access the network seems like 
because the 802.1x authentication request is coming from a switch that the 
device isn't plugged into.
In this case, I have a computer (18:66:da:1e:06:0a) plugged into switch with IP 
172.16.0.200.
In the log it shows that the request is coming from 172.16.0.196, and 
authorizes the machine and assigns the correct vlan, but it is assigned to the 
wrong switch, so the client never can access the network.
Further, there is already the correct machine (64:00:6a:7c:34:ce) authorized on 
that port because that machine really does plug in there.

Nov 13 03:12:37 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO: 
[mac:18:66:da:1e:06:0a] handling radius autz request: from switch_ip => 
(172.16.0.196), connection_type => WIRED_MAC_AUTH,switch_mac => 
(00:23:ac:d0:ca:8a), mac => [18:66:da:1e:06:0a], port => 10110, username => 
"1866da1e060a" (pf::radius::authorize)
Nov 13 03:12:37 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO: 
[mac:18:66:da:1e:06:0a] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Nov 13 03:12:37 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO: 
[mac:18:66:da:1e:06:0a] Connection type is WIRED_MAC_AUTH. Getting role from 
node_info (pf::role::getRegisteredRole)
Nov 13 03:12:37 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO: 
[mac:18:66:da:1e:06:0a] Username was defined "1866da1e060a" - returning role 
'Employee' (pf::role::getRegisteredRole)
Nov 13 03:12:37 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO: 
[mac:18:66:da:1e:06:0a] PID: "CORE\amblerd", Status: reg Returned VLAN: 
(undefined), Role: Employee (pf::role::fetchRoleForNode)
Nov 13 03:12:37 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO: 
[mac:18:66:da:1e:06:0a] (172.16.0.196) Added VLAN 18 to the returned RADIUS 
Access-Accept (pf::Switch::returnRadiusAccessAccept)
Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO: 
[mac:64:00:6a:7c:34:ce] handling radius autz request: from switch_ip => 
(172.16.0.196), connection_type => Ethernet-EAP,switch_mac => 
(00:23:ac:d0:ca:8a), mac => [64:00:6a:7c:34:ce], port => 10110, username => 
"host/LoboA7.CORE.LOCAL" (pf::radius::authorize)
Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO: 
[mac:64:00:6a:7c:34:ce] is doing machine auth with account 
'host/LoboA7.CORE.LOCAL'. (pf::radius::authorize)
Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO: 
[mac:64:00:6a:7c:34:ce] Instantiate profile Earthcolor_Owned 
(pf::Connection::ProfileFactory::_from_profile)
Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO: 
[mac:64:00:6a:7c:34:ce] Found authentication source(s) : 'AD-Auth' for realm 
'null' (pf::config::util::filter_authentication_sources)
Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) WARN: 
[mac:64:00:6a:7c:34:ce] Calling match with empty/invalid rule class. Defaulting 
to 'authentication' (pf::authentication::match2)
Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO: 
[mac:64:00:6a:7c:34:ce] Using sources AD-Auth for matching 
(pf::authentication::match2)
Nov 13 03:12:52 pf1 pfqueue: pfqueue(9628) INFO: [mac:unknown] undefined source 
id provided (pf::lookup::person::lookup_person)
Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO: 
[mac:64:00:6a:7c:34:ce] Found authentication source(s) : 'AD-Auth' for realm 
'null' (pf::config::util::filter_authentication_sources)
Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO: 
[mac:64:00:6a:7c:34:ce] Using sources AD-Auth for matching 
(pf::authentication::match2)
Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO: 
[mac:64:00:6a:7c:34:ce] Username was NOT defined or unable to match a role - 
returning node based role 'Employee' (pf::role::getRegisteredRole)
Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO: 
[mac:64:00:6a:7c:34:ce] PID: "host/LoboA7.CORE.LOCAL", Status: reg Returned 
VLAN: (undefined), Role: Employee (pf::role::fetchRoleForNode)
Nov 13 03:12:52 pf1 packetfence_httpd.aaa: httpd.aaa(24173) INFO: 
[mac:64:00:6a:7c:34:ce] (172.16.0.196) Added VLAN 18 to the returned RADIUS 
Access-Accept (pf::Switch::returnRadiusAccessAccept)

I can't figure out what's going on here.
Anyone seen this and can you point me how to make it right?

Thanks
Darryl

--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


Re: [PacketFence-users] Question about device-registration page

2017-11-13 Thread Sallee, Jake via PacketFence-users
All:

Forgive me for jumping in here but I wanted to put in my $.02.

Generally the user's role is how you assign the user's level of network access. 
 If you give the user a way to self assign a role you will need to find a way 
to verify that user has the necessary rights to that role.

Guests may have different levels of access than patrons/students, while 
patrons/students will have different access than employees or admin users.

If you allow the user to self assign the role you will need to somehow prove 
the user has the appropriate  permissions for that role.

If you are able to prove the permissions necessary for a given role, then you 
should be able to automatically assign the role without the user's need to pick 
one. Right?

I can see the ability to choose a role being helpful if you have multiple roles 
with identical access, the ability to choose then could be helpful in 
reporting.  But, that relies on your user's being honest and I just don't trust 
users ... but that could just be my battle hardened cynicism coming into play : 
)

Obviously, there is no disrespect intended here, just joining the discussion.

Jake Sallee
Godfather of Bandwidth
System Engineer
University of Mary Hardin-Baylor
WWW.UMHB.EDU

900 College St.
Belton, Texas
76513

Fone: 254-295-4658
Phax: 254-295-4221


From: Fabrice Durand via PacketFence-users 

Sent: Monday, November 13, 2017 10:10 AM
To: packetfence-users@lists.sourceforge.net
Cc: Fabrice Durand
Subject: Re: [PacketFence-users] Question about device-registration page

Hello Marcus,

in the device registration page there is no way to allow the end user to
choose the role.

You define it or PacketFence use the same one of the user.

Also Julien did this sort of thing you want to use on the device
registration page but for the captive portal.
(https://github.com/inverse-inc/packetfence/pull/2471)

Right now nobody asked to add a way to be able to select a role on the
device registration page, so if you want to do that we will be happy to
include this patch in PacketFence.

Regards

Fabrice



Le 2017-11-13 à 10:35, Marcus Lauer via PacketFence-users a écrit :
>I am running PacketFence 7.3.0 on a RHEL7 system and have
> encountered some issues with device registration. First, registration
> though the https://hostname/device-registration page did not work at all
> until I installed the patch at
> https://github.com/inverse-inc/packetfence/commit/10223d70146120a4e2a63bd169536ebcd82917c4.
> So thank you julsemaan for that patch.
>
>My question is this: Is there an easy way to let the user choose
> a Role through the device-registration page?
>
>In our captive portal the first thing users have to do is chose
> either "Computer" or "Device". This is easy to do in the captive portal.
> I just have a "Choice" portal module which lets them choose between two
> authentication modules, each of which does a "set_role" upon successful
> login. These Roles end up on different VLANs.
>
>Unfortunately in the device-registration page there is no mention
> of the device role. The Role is not among the device information shown
> in the list of registered devices. Also, when registering a device there
> is no method for selecting the Role. It appears that whichever Role was
> chosen in the Device Registration selected for that Connection Profile
> is the one which is applied.
>
>I could probably do the necessary coding to add Role selection to
> the device-registration page. Before I do that I just want to make sure
> that I'm not missing an easier way to do it.
>
>I would also like to note that in the unpatched PacketFence 7.3.0
> is it possible to select multiple roles for a Device Registration. The
> patch I mentioned above changed the multiple selection box for Role in a
> Device Registration Entry to a drop-down list. This suggests to me that
> someone might have intended to allow multiple roles to be associated
> with one device registration. Perhaps the idea was to let the user
> select a role after registering? If this is the case then I would love
> to know so that I don't duplicate someone else's efforts.
>

--
Fabrice Durand
fdur...@inverse.ca ::  +1.514.447.4918 (x135) ::  
https://linkprotect.cudasvc.com/url?a=https://www.inverse.ca=E,1,7G3YNtDhAp23DlxNMtOREslYK-1f2OtZ0LDCSkcfi5vHf0JqrQ8P6SupI8IAxQoTBHqWk0HD6hcDFLSdtXsAjQLQo6tRivmhDzQL75gHmS8VvYP7JiF4Wot2IQ,,=1
Inverse inc. :: Leaders behind SOGo 
(https://linkprotect.cudasvc.com/url?a=http://www.sogo.nu=E,1,dpB_FNCxtz3gLpiSawwfVzzGy1BZryJLkdoKEtWWEbhRoCvA8_a5u25CRcDlFyI-sRICMIiVWcM4DBFefxkE4e2aGGq2IT_Kk-fPZuo_uJUeOgE4G5Br=1)
 and PacketFence 
(https://linkprotect.cudasvc.com/url?a=http://packetfence.org=E,1,FS41WDLDW-XOknP4KRLjJW7-lNcejTjjy2b6hexenYUpmZfvGsrcbU7wU-lyIX0b858Ba1iJITQ0sXICumoDDBb-mOeiK3eYtD5Rg06d-zkpSbBBYyk,=1)




Re: [PacketFence-users] Question about device-registration page

2017-11-13 Thread Fabrice Durand via PacketFence-users
Hello Marcus,

in the device registration page there is no way to allow the end user to
choose the role.

You define it or PacketFence use the same one of the user.

Also Julien did this sort of thing you want to use on the device
registration page but for the captive portal.
(https://github.com/inverse-inc/packetfence/pull/2471)

Right now nobody asked to add a way to be able to select a role on the
device registration page, so if you want to do that we will be happy to
include this patch in PacketFence.

Regards

Fabrice



Le 2017-11-13 à 10:35, Marcus Lauer via PacketFence-users a écrit :
>I am running PacketFence 7.3.0 on a RHEL7 system and have
> encountered some issues with device registration. First, registration
> though the https://hostname/device-registration page did not work at all
> until I installed the patch at
> https://github.com/inverse-inc/packetfence/commit/10223d70146120a4e2a63bd169536ebcd82917c4.
> So thank you julsemaan for that patch.
>
>My question is this: Is there an easy way to let the user choose
> a Role through the device-registration page?
>
>In our captive portal the first thing users have to do is chose
> either "Computer" or "Device". This is easy to do in the captive portal.
> I just have a "Choice" portal module which lets them choose between two
> authentication modules, each of which does a "set_role" upon successful
> login. These Roles end up on different VLANs.
>
>Unfortunately in the device-registration page there is no mention
> of the device role. The Role is not among the device information shown
> in the list of registered devices. Also, when registering a device there
> is no method for selecting the Role. It appears that whichever Role was
> chosen in the Device Registration selected for that Connection Profile
> is the one which is applied.
>
>I could probably do the necessary coding to add Role selection to
> the device-registration page. Before I do that I just want to make sure
> that I'm not missing an easier way to do it.
>
>I would also like to note that in the unpatched PacketFence 7.3.0
> is it possible to select multiple roles for a Device Registration. The
> patch I mentioned above changed the multiple selection box for Role in a
> Device Registration Entry to a drop-down list. This suggests to me that
> someone might have intended to allow multiple roles to be associated
> with one device registration. Perhaps the idea was to let the user
> select a role after registering? If this is the case then I would love
> to know so that I don't duplicate someone else's efforts.
>

-- 
Fabrice Durand
fdur...@inverse.ca ::  +1.514.447.4918 (x135) ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org) 



--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


[PacketFence-users] Question about device-registration page

2017-11-13 Thread Marcus Lauer via PacketFence-users
   I am running PacketFence 7.3.0 on a RHEL7 system and have
encountered some issues with device registration. First, registration
though the https://hostname/device-registration page did not work at all
until I installed the patch at
https://github.com/inverse-inc/packetfence/commit/10223d70146120a4e2a63bd169536ebcd82917c4.
So thank you julsemaan for that patch.

   My question is this: Is there an easy way to let the user choose
a Role through the device-registration page?

   In our captive portal the first thing users have to do is chose
either "Computer" or "Device". This is easy to do in the captive portal.
I just have a "Choice" portal module which lets them choose between two
authentication modules, each of which does a "set_role" upon successful
login. These Roles end up on different VLANs.

   Unfortunately in the device-registration page there is no mention
of the device role. The Role is not among the device information shown
in the list of registered devices. Also, when registering a device there
is no method for selecting the Role. It appears that whichever Role was
chosen in the Device Registration selected for that Connection Profile
is the one which is applied.

   I could probably do the necessary coding to add Role selection to
the device-registration page. Before I do that I just want to make sure
that I'm not missing an easier way to do it.

   I would also like to note that in the unpatched PacketFence 7.3.0
is it possible to select multiple roles for a Device Registration. The
patch I mentioned above changed the multiple selection box for Role in a
Device Registration Entry to a drop-down list. This suggests to me that
someone might have intended to allow multiple roles to be associated
with one device registration. Perhaps the idea was to let the user
select a role after registering? If this is the case then I would love
to know so that I don't duplicate someone else's efforts.

-- 
Marcus Lauer
IT Systems Analyst
UMD Department of Computer Science

--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


Re: [PacketFence-users] R: R: R: Switch Compatibility

2017-11-13 Thread Fabrice Durand via PacketFence-users
Hello Alessandro,

i saw that cisco attributes are also compatible with the Zyxel switches.

So if you choose Cisco_2960 as switch type to make a test.

Regards

Fabrice



Le 2017-11-13 à 07:06, Alessandro Canella a écrit :
>
> Hello All,
>
>  
>
> I’ ve created new switch under PF\ folder.
>
>  
>
> All seems fine, but no cli login.
>
>  
>
> Switch Log reports
>
>  
>
>    1 Nov 13 12:44:23 NO authentication: SSH authentication failure
> [username: newuser, IP address = 153.47.30.125]
>
>    2 Nov 13 12:44:23 WA authentication: Invalid Service Type: USER
> [   newuser]
>
>  
>
> PF GUI Reports
>
>  
>
>  
>
> RADIUS Request
>
>   
>
> User-Name = "newuser"
>
> User-Password = "**"
>
> NAS-IP-Address = 10.206.1.136
>
> NAS-Identifier = "K873MUXSW1"
>
> Event-Timestamp = "Nov 13 2017 11:45:37 UTC"
>
> Stripped-User-Name = "newuser"
>
> Realm = "null"
>
> FreeRADIUS-Client-IP-Address = 10.206.1.136
>
> SQL-User-Name = "newuser"
>
> RADIUS Reply
>
>   
>
> Reply-Message = "Switch enable access granted by PacketFence"
>
> Zyxel-Privilege-AVPair = "shell:priv-lvl=15"
>
>  
>
> PF LOG respond :
>
>  
>
> Nov 13 11:44:18 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2712)
> INFO: [mac:[undef]] Authentication successful for newuser in source
> file1 (Htpasswd) (pf::authentication::authenticate)
>
> Nov 13 11:44:18 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2712)
> INFO: [mac:[undef]] Using sources file1 for matching
> (pf::authentication::match2)
>
> Nov 13 11:44:18 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2712)
> INFO: [mac:[undef]] Matched rule (admins) in source file1, returning
> actions. (pf::Authentication::Source::match)
>
> Nov 13 11:44:18 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2712)
> INFO: [mac:[undef]] User newuser logged in 10.206.1.136 with write
> access (pf::Switch::Zyxel::returnAuthorizeWrite)
>
> Nov 13 11:44:21 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2712)
> INFO: [mac:[undef]] Authentication successful for newuser in source
> file1 (Htpasswd) (pf::authentication::authenticate)
>
> * *
>
> *Da:*Alessandro Canella via PacketFence-users
> [mailto:packetfence-users@lists.sourceforge.net]
> *Inviato:* domenica 12 novembre 2017 23.26
> *A:* Durand fabrice ;
> packetfence-users@lists.sourceforge.net
> *Cc:* Alessandro Canella 
> *Oggetto:* [PacketFence-users] R: R: Switch Compatibility
>
>  
>
> I will try tomorrow.
>
>  
>
> Don’t sure where is file, I will check documentation.
>
>  
>
>  
>
> *Da:*Durand fabrice [mailto:fdur...@inverse.ca]
> *Inviato:* sabato 11 novembre 2017 13.51
> *A:* Alessandro Canella  >;
> packetfence-users@lists.sourceforge.net
> 
> *Oggetto:* Re: R: [PacketFence-users] Switch Compatibility
>
>  
>
> Hello Alessandro,
>
>  
>
> you will need to edit the switch module and add this:
>
> =item returnAuthorizeWrite
> Return radius attributes to allow write access
> =cut
>
> sub returnAuthorizeWrite {
>     my ($self, $args) = @_;
>     my $logger = $self->logger;
>     my $radius_reply_ref;
>     my $status;
>     $radius_reply_ref->{'Zyxel-Privilege-AVPair'} = 'shell:priv-lvl=15';
>     $radius_reply_ref->{'Reply-Message'} = "Switch enable access
> granted by PacketFence";
>     $logger->info("User $args->{'user_name'} logged in
> $args->{'switch'}{'_id'} with write access");
>     my $filter = pf::access_filter::radius->new;
>     my $rule = $filter->test('returnAuthorizeWrite', $args);
>     ($radius_reply_ref, $status) =
> $filter->handleAnswerInRule($rule,$args,$radius_reply_ref);
>     return [$status, %$radius_reply_ref];
>
> }
>
> =item returnAuthorizeRead
> Return radius attributes to allow read access
> =cut
>
> sub returnAuthorizeRead {
>     my ($self, $args) = @_;
>     my $logger = $self->logger;
>     my $radius_reply_ref;
>     my $status;
>     $radius_reply_ref->{'Zyxel-Privilege-AVPair'} = 'shell:priv-lvl=3';
>     $radius_reply_ref->{'Reply-Message'} = "Switch read access granted
> by PacketFence";
>     $logger->info("User $args->{'user_name'} logged in
> $args->{'switch'}{'_id'} with read access");
>     my $filter = pf::access_filter::radius->new;
>     my $rule = $filter->test('returnAuthorizeRead', $args);
>     ($radius_reply_ref, $status) =
> $filter->handleAnswerInRule($rule,$args,$radius_reply_ref);
>     return [$status, %$radius_reply_ref];
> }
>
> Then restart PacketFence.
>
> Let me know if it works.
>
> Regards
>
> Fabrice
>
>  
>
>  
>
> Le 2017-11-11 à 02:41, Alessandro Canella a écrit :
>
> Zyxel GS 2210.
>
>  
>
> I need only AAA for switch login (if you remember I use captive
> portal for wifi in inline mode)
>
>  
>
> Zyxel provide
> 
> https://kb.zyxel.com/KB/searchArticle!gwsViewDetail.action?articleOid=009451=EN
> 
> 

[PacketFence-users] R: R: R: Switch Compatibility

2017-11-13 Thread Alessandro Canella via PacketFence-users
Hello All,

I' ve created new switch under PF\ folder.

All seems fine, but no cli login.

Switch Log reports

   1 Nov 13 12:44:23 NO authentication: SSH authentication failure [username: 
newuser, IP address = 153.47.30.125]
   2 Nov 13 12:44:23 WA authentication: Invalid Service Type: USER [
   newuser]

PF GUI Reports


RADIUS Request

User-Name = "newuser"
User-Password = "**"
NAS-IP-Address = 10.206.1.136
NAS-Identifier = "K873MUXSW1"
Event-Timestamp = "Nov 13 2017 11:45:37 UTC"
Stripped-User-Name = "newuser"
Realm = "null"
FreeRADIUS-Client-IP-Address = 10.206.1.136
SQL-User-Name = "newuser"

RADIUS Reply

Reply-Message = "Switch enable access granted by PacketFence"
Zyxel-Privilege-AVPair = "shell:priv-lvl=15"


PF LOG respond :

Nov 13 11:44:18 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2712) INFO: 
[mac:[undef]] Authentication successful for newuser in source file1 (Htpasswd) 
(pf::authentication::authenticate)
Nov 13 11:44:18 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2712) INFO: 
[mac:[undef]] Using sources file1 for matching (pf::authentication::match2)
Nov 13 11:44:18 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2712) INFO: 
[mac:[undef]] Matched rule (admins) in source file1, returning actions. 
(pf::Authentication::Source::match)
Nov 13 11:44:18 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2712) INFO: 
[mac:[undef]] User newuser logged in 10.206.1.136 with write access 
(pf::Switch::Zyxel::returnAuthorizeWrite)
Nov 13 11:44:21 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2712) INFO: 
[mac:[undef]] Authentication successful for newuser in source file1 (Htpasswd) 
(pf::authentication::authenticate)

Da: Alessandro Canella via PacketFence-users 
[mailto:packetfence-users@lists.sourceforge.net]
Inviato: domenica 12 novembre 2017 23.26
A: Durand fabrice ; packetfence-users@lists.sourceforge.net
Cc: Alessandro Canella 
Oggetto: [PacketFence-users] R: R: Switch Compatibility

I will try tomorrow.

Don't sure where is file, I will check documentation.


Da: Durand fabrice [mailto:fdur...@inverse.ca]
Inviato: sabato 11 novembre 2017 13.51
A: Alessandro Canella 
>; 
packetfence-users@lists.sourceforge.net
Oggetto: Re: R: [PacketFence-users] Switch Compatibility


Hello Alessandro,



you will need to edit the switch module and add this:

=item returnAuthorizeWrite
Return radius attributes to allow write access
=cut

sub returnAuthorizeWrite {
my ($self, $args) = @_;
my $logger = $self->logger;
my $radius_reply_ref;
my $status;
$radius_reply_ref->{'Zyxel-Privilege-AVPair'} = 'shell:priv-lvl=15';
$radius_reply_ref->{'Reply-Message'} = "Switch enable access granted by 
PacketFence";
$logger->info("User $args->{'user_name'} logged in $args->{'switch'}{'_id'} 
with write access");
my $filter = pf::access_filter::radius->new;
my $rule = $filter->test('returnAuthorizeWrite', $args);
($radius_reply_ref, $status) = 
$filter->handleAnswerInRule($rule,$args,$radius_reply_ref);
return [$status, %$radius_reply_ref];

}

=item returnAuthorizeRead
Return radius attributes to allow read access
=cut

sub returnAuthorizeRead {
my ($self, $args) = @_;
my $logger = $self->logger;
my $radius_reply_ref;
my $status;
$radius_reply_ref->{'Zyxel-Privilege-AVPair'} = 'shell:priv-lvl=3';
$radius_reply_ref->{'Reply-Message'} = "Switch read access granted by 
PacketFence";
$logger->info("User $args->{'user_name'} logged in $args->{'switch'}{'_id'} 
with read access");
my $filter = pf::access_filter::radius->new;
my $rule = $filter->test('returnAuthorizeRead', $args);
($radius_reply_ref, $status) = 
$filter->handleAnswerInRule($rule,$args,$radius_reply_ref);
return [$status, %$radius_reply_ref];
}

Then restart PacketFence.

Let me know if it works.

Regards

Fabrice



Le 2017-11-11 à 02:41, Alessandro Canella a écrit :
Zyxel GS 2210.

I need only AAA for switch login (if you remember I use captive portal for wifi 
in inline mode)

Zyxel provide 
https://kb.zyxel.com/KB/searchArticle!gwsViewDetail.action?articleOid=009451=EN

I've done all as wrote in this doc (dictionary and so on)

Da: Fabrice Durand via PacketFence-users 
[mailto:packetfence-users@lists.sourceforge.net]
Inviato: venerdì 10 novembre 2017 21.35
A: 
packetfence-users@lists.sourceforge.net
Cc: Fabrice Durand 
Oggetto: Re: [PacketFence-users] Switch Compatibility


Hello Alessandro,

what is the type of the switch ?

Regards

Fabrice



Le 2017-11-10 à 09:44, Alessandro Canella via PacketFence-users a écrit :
Hello all,

I solved everything (thanks to all..) ando now I0m investigating about 

[PacketFence-users] AD Group Membership Match Intermittent

2017-11-13 Thread Jason Sloan via PacketFence-users
This is my first foray into Packetfence, but I've noticed some strange
behavior testing with pfcmd for AD group membership.

Running "pfcmd authentication testuser test123" twice (about 35 seconds
apart)


Authenticating against AD-USERS
  Authentication SUCCEEDED against AD-USERS (Authentication successful.)
  Did not match against AD-USERS for 'authentication' rules
  Matched against AD-USERS for 'administration' rules
set_access_level : Network-Admin

Nov 12 22:34:07 scnetm01 packetfence: INFO pftest(30001): [AD-USERS]
Authentication successful for testuser
(pf::Authentication::Source::LDAPSource::authenticate)
Nov 12 22:34:07 scnetm01 packetfence: INFO pftest(30001): Using sources
AD-USERS for matching (pf::authentication::match2)
Nov 12 22:34:07 scnetm01 packetfence: INFO pftest(30001): Using sources
AD-USERS for matching (pf::authentication::match2)
Nov 12 22:34:07 scnetm01 packetfence: INFO pftest(30001): Matched rule
(Network-Admin) in source AD-USERS, returning actions.
(pf::Authentication::Source::match)

Authenticating against AD-USERS
  Authentication SUCCEEDED against AD-USERS (Authentication successful.)
  Did not match against AD-USERS for 'authentication' rules
  Did not match against AD-USERS for 'administration' rules

Nov 12 22:34:42 scnetm01 packetfence: INFO pftest(30003): [AD-USERS]
Authentication successful for testuser
(pf::Authentication::Source::LDAPSource::authenticate)
Nov 12 22:34:42 scnetm01 packetfence: INFO pftest(30003): Using sources
AD-USERS for matching (pf::authentication::match2)
Nov 12 22:34:42 scnetm01 packetfence: INFO pftest(30003): Using sources
AD-USERS for matching (pf::authentication::match2)

 Note, no match on Network-Admin Rule 

I'm not sure if there's a log I can see to review what AD attributes are
pulled back from the lookup?
It definitely seems time based as I can wait a few minutes and receive a
successful lookup.

AD server is 2K16 - DataCenter
Domain Functional level is 2k8.
Any insight would be greatly appreciated.

Thanks.
--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


Re: [PacketFence-users] Bandwidth statistics make no sense (Cisco 2960x)

2017-11-13 Thread Cristian Mammoli via PacketFence-users
Hi Fabrice, could you please give me an hint to start looking whats 
going wrong here? How is bandwidth calculated and where?


Thanks in advance

Il 19/10/2017 18:22, Cristian Mammoli via PacketFence-users ha scritto:

If you mean PacketFence is 7.3.0
If you mean IOS: Cisco IOS Software, C2960X Software 
(C2960X-UNIVERSALK9-M), Version 15.2(2)E6, RELEASE SOFTWARE (fc1)



Il 19/10/2017 16:41, Fabrice Durand via PacketFence-users ha scritto:

Hello Cristian,

which version are you running ?

Regards

Fabrice




-- 


Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


--
Mammoli Cristian
System administrator
T. +39 0731 22911
Via Brodolini 6 | 60035 Jesi (an)

--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users