Re: [PacketFence-users] Unifi switch CoA support

2023-03-15 Thread Francis via PacketFence-users
Oh, great! I was able to enable CoA for an Unifi AP with the legacy UI then
I was able to configure PF. My PF configuration now works great to manage a
wifi network.

Now I wonder if CoA is also supported for unifi switch/wired networks? I
would like to use 802.1x with device authentication and a captive portal
for guest users. Can I use Unifi switches with PF? I can successfully
authenticate my device to the radius server with 802.1x, but without CoA
support, I understand that PF is unable to move the device to the required
vlan (my device gets no IP from the dhcp server).

Thank you!


Le mar. 14 mars 2023 à 16:08, Fabrice Durand  a écrit :

> Hello Francis,
>
> if i am not wrong you should be able to see the option if you switch to
> the legacy view of the controller.
> Also you can connect on the AP (ssh) and see if the port 3799 UDP is
> listening.
>
> Regards
>
> Fabrice
>
>
> Le mar. 14 mars 2023 à 15:50, Francis via PacketFence-users <
> packetfence-users@lists.sourceforge.net> a écrit :
>
>> Hello,
>>
>> I wonder if someone is using Unifi switches with packetfence? I
>> understand I need to activate CoA support to make it working with PF.
>>
>> I found release notes that say it was added by Ubiquiti in version
>> 5.12.22 of Unifi Controller. I found old screenshots that show the options
>> but I fail to find it in the newest version (Unifi controller 7.3.83 with
>> all firmware up to date).
>>
>> I found some posts in the UI forums of others wondering the same thing
>> but they never got answers and Ubiquiti support failed to reply to my
>> ticket for almost a week. So I wonder... maybe they just silently dropped
>> CoA support?
>>
>> Thanks!
>>
>> --
>> Francis
>> ___
>> PacketFence-users mailing list
>> PacketFence-users@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>
>
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


Re: [PacketFence-users] Unifi switch CoA support

2023-03-15 Thread Fabrice Durand via PacketFence-users
Based on the code, it's not supported (i did it a long time ago) and you
have to use the snmp method to reevaluate the access.
Btw if you are able to configure it on the switch side then the packetfence
switch module will need to be adapted.

Regards
Fabrice


Le mer. 15 mars 2023 à 16:29, Francis  a écrit :

> Oh, great! I was able to enable CoA for an Unifi AP with the legacy UI
> then I was able to configure PF. My PF configuration now works great to
> manage a wifi network.
>
> Now I wonder if CoA is also supported for unifi switch/wired networks? I
> would like to use 802.1x with device authentication and a captive portal
> for guest users. Can I use Unifi switches with PF? I can successfully
> authenticate my device to the radius server with 802.1x, but without CoA
> support, I understand that PF is unable to move the device to the required
> vlan (my device gets no IP from the dhcp server).
>
> Thank you!
>
>
> Le mar. 14 mars 2023 à 16:08, Fabrice Durand  a
> écrit :
>
>> Hello Francis,
>>
>> if i am not wrong you should be able to see the option if you switch to
>> the legacy view of the controller.
>> Also you can connect on the AP (ssh) and see if the port 3799 UDP is
>> listening.
>>
>> Regards
>>
>> Fabrice
>>
>>
>> Le mar. 14 mars 2023 à 15:50, Francis via PacketFence-users <
>> packetfence-users@lists.sourceforge.net> a écrit :
>>
>>> Hello,
>>>
>>> I wonder if someone is using Unifi switches with packetfence? I
>>> understand I need to activate CoA support to make it working with PF.
>>>
>>> I found release notes that say it was added by Ubiquiti in version
>>> 5.12.22 of Unifi Controller. I found old screenshots that show the options
>>> but I fail to find it in the newest version (Unifi controller 7.3.83 with
>>> all firmware up to date).
>>>
>>> I found some posts in the UI forums of others wondering the same thing
>>> but they never got answers and Ubiquiti support failed to reply to my
>>> ticket for almost a week. So I wonder... maybe they just silently dropped
>>> CoA support?
>>>
>>> Thanks!
>>>
>>> --
>>> Francis
>>> ___
>>> PacketFence-users mailing list
>>> PacketFence-users@lists.sourceforge.net
>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>
>>
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


Re: [PacketFence-users] Unable to 'preview' HTML files in 'Connection Profile->Files' in Admin GUI on PF12.1

2023-03-15 Thread Satkunas, Darren via PacketFence-users
HI Andrew,

I was able to reproduce your issue. I’ve opened an issue and you can track the 
progress here: https://github.com/inverse-inc/packetfence/issues/7592



Cheers,


Darren Satkunas
Sr. Software Engineer

[signature_1985110229]


Office: +1.617.444.1234
Cell: +1.617.444.1234

Akamai Technologies
145 Broadway
Cambridge, MA 02142


Connect with Us:

[signature_1742109546] [signature_1471493611] 
  [signature_4135796477]  
 [signature_2002881683]   
[signature_3997571003]   
[signature_1240438257] 




From: Andrew Torry via PacketFence-users 

Reply-To: "packetfence-users@lists.sourceforge.net" 

Date: Wednesday, March 15, 2023 at 8:31 AM
To: "packetfence-users@lists.sourceforge.net" 

Cc: Andrew Torry 
Subject: [PacketFence-users] Unable to 'preview' HTML files in 'Connection 
Profile->Files' in Admin GUI on PF12.1


RESTRICTED

Is it just me but when I preview an entire profile it works fine but if I try 
and preview an individual HTML file it gives me an
empty page.

The URL I get for the whole profile preview is:-

https://:1443/portal_preview/captive-portal?PORTAL=GUEST

and I am able to move around and preview all the portal pages but if I try and 
preview say the PARKING security
event page I get this:-

https:// :1443/config/profile/GUEST/preview/security_events/parked.html

and this page connects but has no content.

The template file used ‘parked.html’ is a simple copy of the 
‘generic.html’ template with slightly more informative text.

It works in 6.5 and 9.1 but cant see anything in PF11 or 12

Does not seem to be browser dependent either a sit does this in Chrome/Edge and 
Firefox

Andrew




RESTRICTED
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


Re: [PacketFence-users] Unable to 'preview' HTML files in 'Connection Profile->Files' in Admin GUI on PF12.1

2023-03-15 Thread Fabrice Durand via PacketFence-users
Hello Andrew,

i am able to reproduce on my side, we are looking on it.

Regards
Fabrice


Le mer. 15 mars 2023 à 08:32, Andrew Torry via PacketFence-users <
packetfence-users@lists.sourceforge.net> a écrit :

> RESTRICTED
>
> Is it just me but when I preview an entire profile it works fine but if I
> try and preview an individual HTML file it gives me an
>
> empty page.
>
>
>
> The URL I get for the whole profile preview is:-
>
>
>
> https:// address_of_PF_server>:1443/portal_preview/captive-portal?PORTAL=GUEST
>
>
>
> and I am able to move around and preview all the portal pages but if I try
> and preview say the PARKING security
>
> event page I get this:-
>
>
>
> https://  address_of_PF_server>:1443/config/profile/GUEST/preview/security_events/parked.html
>
>
>
> and this page connects but has no content.
>
>
>
> The template file used ‘parked.html’ is a simple copy of
> the ‘generic.html’ template with slightly more informative text.
>
>
>
> It works in 6.5 and 9.1 but cant see anything in PF11 or 12
>
>
>
> Does not seem to be browser dependent either a sit does this in
> Chrome/Edge and Firefox
>
>
>
> Andrew
>
>
>
>
>
> RESTRICTED
> ___
> PacketFence-users mailing list
> PacketFence-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


Re: [PacketFence-users] EAP-TLS Configuration

2023-03-15 Thread Mudrich, J. via PacketFence-users
Hallo Fabrice,

thanks fort the reply.
Internal PKI is already set up and I created a new cert for the RADIUS-Server 
and added the CA-Cert to the config. Everything is green here.
What’s next?
I added a new internal authentication source (EAPTLS) with Authentication Rule:
Matches: all
Conditions:
SSID equals “MySSID”
Actions:
Role “MyRole”
Access Duration 5 Days

Is it advised to create a new connection profile or could I just use the 
default profile to start with?

Kind regards
Johannes


Von: Fabrice Durand via PacketFence-users 
[mailto:packetfence-users@lists.sourceforge.net]
Gesendet: Mittwoch, 15. März 2023 13:26
An: packetfence-users@lists.sourceforge.net
Cc: Fabrice Durand 
Betreff: Re: [PacketFence-users] EAP-TLS Configuration

Hello Johannes,

in fact you can follow this to create the certificates needed for eap-tls. 
https://ddei5-0-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fwww.packetfence.org%2fdoc%2fPacketFence%5fInstallation%5fGuide.html%23%5fcertificate%5fauthority%5fcreation=E3706BCB-F6EF-8E05-80DF-86957D07AF20=3e2d8a84646f95c9f39ab0aaf495a2c8b99c6f77-89b6a79fa8e29690a0fb757f35a4e77ad72230b7

Once you have created the ca certificate and applied it in the radius section.

```

Once done copy the certificate in the clipboard from the Certificate 
Authorities list (Configuration → Integration → PKI → Certificate Authorities 
and click on Copy Certificate) then edit the RADIUS certificate section in 
Configuration → Systen Configuration → SSL Certificates → RADIUS → Edit and 
paste the public key in "Certificate Authority" and Save. (Don’t forget to 
restart radiusd-auth)

This will authorize the EAP TLS authentications using the PKI issued 
certificates.

```

Create a certificate template 
https://ddei5-0-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fwww.packetfence.org%2fdoc%2fPacketFence%5fInstallation%5fGuide.html%23%5ftemplate%5fcreation=E3706BCB-F6EF-8E05-80DF-86957D07AF20=3e2d8a84646f95c9f39ab0aaf495a2c8b99c6f77-47e8fdb284e6cf949b6f07f2c1b584fb27582f15
 and create a certificate for the end user.

Once you have the pkcs12 file, import it on your device and configure the 
supplicant to use this certificate to connect to a secure ssid (it could be 
wired too).



So when you will try to connect , you should be able to see the radius 
authentication in the radius audit log , the next steps will be to configure a 
EAPTLS or Authorize authentication source and assign it to a connection profile 
where you set the filter to sub_connection_type = EAP_TLS.



Let me know if you are stuck at some point.

Regards

Fabrice




Le mer. 15 mars 2023 à 07:45, Mudrich, J. via PacketFence-users 
mailto:packetfence-users@lists.sourceforge.net>>
 a écrit :
Hello again,

I’m trying to configure PF for EAP-TLS authentication. I couldn’t find any 
comprehensive guide or manual so I hope you can help.
I would like to use the internal PKI. That’s what I already set up. Maybe 
someone can walk me through this?

Some wild guesses:
I think I need to set up an Authentication Source (internal -> EAPTLS)?
Are there any changes needed in the RADIUS configuration (System Configuration 
-> Radius)?
What’s with “PKI SSL Certificates”, do I need to add the internal PKIs CA there?

Some additional thoughts: I can already see the devices I’d like to manage via 
EAP-TLS in my nodes list because of their DHCP broadcasts. Will these nodes 
then somehow be connected to the certificates issued by the internal PKI?

Thanks and kind regards
Johannes


Johannes Mudrich
Mitarbeiter
IT

Altmark-Klinikum gGmbH
Ernst-von-Bergmann-Straße 22
39638 Gardelegen
Tel.:

 03907 791229

Fax.:

 03907 791248

Mail:

 j.mudr...@altmark-klinikum.de



[cid:image001.png@01D95746.DA27F800]

Salus Altmark Holding gGmbH
Tel.: +49 39325700
Sitz der Gesellschaft:
Seepark 5 | 39116 Magdeburg
www.salusaltmarkholding.de

[cid:image003.png@01D95746.DA27F800]
 [cid:image005.png@01D95746.DA27F800] 

  [cid:image007.png@01D95746.DA27F800] 

  [cid:image009.png@01D95746.DA27F800] 

Re: [PacketFence-users] EAP-TLS Configuration

2023-03-15 Thread Fabrice Durand via PacketFence-users
So now create a client cert, install it on the device and try to connect
with the client certificate and check to see if the radius request has been
accepted. (Radius audit log and radius.log).
If it's ok then you can start to play with the connection profile and the
authentication source.



Le mer. 15 mars 2023 à 09:16, Mudrich, J.  a
écrit :

> Hallo Fabrice,
>
>
>
> thanks fort the reply.
>
> Internal PKI is already set up and I created a new cert for the
> RADIUS-Server and added the CA-Cert to the config. Everything is green here.
>
> What’s next?
>
> I added a new internal authentication source (EAPTLS) with Authentication
> Rule:
>
> Matches: all
>
> Conditions:
>
> SSID equals “MySSID”
>
> Actions:
>
> Role “MyRole”
>
> Access Duration 5 Days
>
>
>
> Is it advised to create a new connection profile or could I just use the
> default profile to start with?
>
>
>
> Kind regards
>
> Johannes
>
>
>
>
>
> *Von:* Fabrice Durand via PacketFence-users [mailto:
> packetfence-users@lists.sourceforge.net]
> *Gesendet:* Mittwoch, 15. März 2023 13:26
> *An:* packetfence-users@lists.sourceforge.net
> *Cc:* Fabrice Durand 
> *Betreff:* Re: [PacketFence-users] EAP-TLS Configuration
>
>
>
> Hello Johannes,
>
>
>
> in fact you can follow this to create the certificates needed for eap-tls.
> https://ddei5-0-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fwww.packetfence.org%2fdoc%2fPacketFence%5fInstallation%5fGuide.html%23%5fcertificate%5fauthority%5fcreation=E3706BCB-F6EF-8E05-80DF-86957D07AF20=3e2d8a84646f95c9f39ab0aaf495a2c8b99c6f77-89b6a79fa8e29690a0fb757f35a4e77ad72230b7
>
>
>
> Once you have created the ca certificate and applied it in the radius
> section.
>
>
>
> ```
>
> Once done copy the certificate in the clipboard from the Certificate
> Authorities list (Configuration → Integration → PKI → Certificate
> Authorities and click on *Copy Certificate*) then edit the RADIUS
> certificate section in Configuration → Systen Configuration → SSL
> Certificates → RADIUS → Edit and paste the public key in "Certificate
> Authority" and Save. (Don’t forget to restart radiusd-auth)
>
> This will authorize the EAP TLS authentications using the PKI issued
> certificates.
>
> ```
>
> Create a certificate template
> https://ddei5-0-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fwww.packetfence.org%2fdoc%2fPacketFence%5fInstallation%5fGuide.html%23%5ftemplate%5fcreation=E3706BCB-F6EF-8E05-80DF-86957D07AF20=3e2d8a84646f95c9f39ab0aaf495a2c8b99c6f77-47e8fdb284e6cf949b6f07f2c1b584fb27582f15
> and create a certificate for the end user.
>
> Once you have the pkcs12 file, import it on your device and configure the
> supplicant to use this certificate to connect to a secure ssid (it could be
> wired too).
>
>
>
> So when you will try to connect , you should be able to see the radius
> authentication in the radius audit log , the next steps will be to
> configure a EAPTLS or Authorize authentication source and assign it to a
> connection profile where you set the filter to sub_connection_type =
> EAP_TLS.
>
>
>
> Let me know if you are stuck at some point.
>
> Regards
>
> Fabrice
>
>
>
>
>
>
>
> Le mer. 15 mars 2023 à 07:45, Mudrich, J. via PacketFence-users <
> packetfence-users@lists.sourceforge.net> a écrit :
>
> Hello again,
>
>
>
> I’m trying to configure PF for EAP-TLS authentication. I couldn’t find any
> comprehensive guide or manual so I hope you can help.
>
> I would like to use the internal PKI. That’s what I already set up. Maybe
> someone can walk me through this?
>
>
>
> Some wild guesses:
>
> I think I need to set up an Authentication Source (internal -> EAPTLS)?
>
> Are there any changes needed in the RADIUS configuration (System
> Configuration -> Radius)?
>
> What’s with “PKI SSL Certificates”, do I need to add the internal PKIs CA
> there?
>
>
>
> Some additional thoughts: I can already see the devices I’d like to manage
> via EAP-TLS in my nodes list because of their DHCP broadcasts. Will these
> nodes then somehow be connected to the certificates issued by the internal
> PKI?
>
>
>
> Thanks and kind regards
>
> Johannes
>
>
>
> *Johannes Mudrich*
> Mitarbeiter
> IT
>
> Altmark-Klinikum gGmbH
> Ernst-von-Bergmann-Straße 22
> 39638 Gardelegen
>
> Tel.:
>
>  03907 791229
>
> Fax.:
>
>  03907 791248
>
> Mail:
>
>  j.mudr...@altmark-klinikum.de
>
>
>
> 
>
> Salus Altmark Holding gGmbH
> Tel.: +49 39325700
> Sitz der Gesellschaft:
> Seepark 5 | 39116 Magdeburg
> www.salusaltmarkholding.de
>
>
> 
>
> 

Re: [PacketFence-users] EAP-TLS Configuration

2023-03-15 Thread Fabrice Durand via PacketFence-users
Hello Johannes,

in fact you can follow this to create the certificates needed for eap-tls.
https://www.packetfence.org/doc/PacketFence_Installation_Guide.html#_certificate_authority_creation

Once you have created the ca certificate and applied it in the radius
section.

```

Once done copy the certificate in the clipboard from the Certificate
Authorities list (Configuration → Integration → PKI → Certificate
Authorities and click on Copy Certificate) then edit the RADIUS certificate
section in Configuration → Systen Configuration → SSL Certificates → RADIUS
→ Edit and paste the public key in "Certificate Authority" and Save. (Don’t
forget to restart radiusd-auth)

This will authorize the EAP TLS authentications using the PKI issued
certificates.

```

Create a certificate template
https://www.packetfence.org/doc/PacketFence_Installation_Guide.html#_template_creation
and create a certificate for the end user.

Once you have the pkcs12 file, import it on your device and configure the
supplicant to use this certificate to connect to a secure ssid (it could be
wired too).


So when you will try to connect , you should be able to see the radius
authentication in the radius audit log , the next steps will be to
configure a EAPTLS or Authorize authentication source and assign it to a
connection profile where you set the filter to sub_connection_type =
EAP_TLS.


Let me know if you are stuck at some point.

Regards

Fabrice




Le mer. 15 mars 2023 à 07:45, Mudrich, J. via PacketFence-users <
packetfence-users@lists.sourceforge.net> a écrit :

> Hello again,
>
>
>
> I’m trying to configure PF for EAP-TLS authentication. I couldn’t find any
> comprehensive guide or manual so I hope you can help.
>
> I would like to use the internal PKI. That’s what I already set up. Maybe
> someone can walk me through this?
>
>
>
> Some wild guesses:
>
> I think I need to set up an Authentication Source (internal -> EAPTLS)?
>
> Are there any changes needed in the RADIUS configuration (System
> Configuration -> Radius)?
>
> What’s with “PKI SSL Certificates”, do I need to add the internal PKIs CA
> there?
>
>
>
> Some additional thoughts: I can already see the devices I’d like to manage
> via EAP-TLS in my nodes list because of their DHCP broadcasts. Will these
> nodes then somehow be connected to the certificates issued by the internal
> PKI?
>
>
>
> Thanks and kind regards
>
> Johannes
>
>
> *Johannes Mudrich*
> Mitarbeiter
> IT
>
> Altmark-Klinikum gGmbH
> Ernst-von-Bergmann-Straße 22
> 39638 Gardelegen
>
> Tel.:  03907 791229
> Fax.:  03907 791248
> Mail:  j.mudr...@altmark-klinikum.de
>
>
>
>
>  
>
> Salus Altmark Holding gGmbH
> Tel.: +49 39325700
> Sitz der Gesellschaft:
> Seepark 5 | 39116 Magdeburg
> www.salusaltmarkholding.de
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> Registergericht: AG Stendal: HRB 112594
> Geschäftsführer: Jürgen Richter
> Aufsichtsratsvorsitz: Wolfgang Beck
> Gemäß Art. 13 DSGVO informieren wir darüber, dass Ihre Daten elektronisch
> gespeichert werden. Nähere Informationen:
> www.salusaltmarkholding.de/datenschutz
> Ab Januar 2022 nehmen wir keine Mails mit doc-, xls- und ppt-Anhängen mehr
> an.
> Bitte verwenden Sie die aktuellen Office-Formate docx, xlsx, pptx oder pdf.
> ___
> PacketFence-users mailing list
> PacketFence-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


[PacketFence-users] Unable to 'preview' HTML files in 'Connection Profile->Files' in Admin GUI on PF12.1

2023-03-15 Thread Andrew Torry via PacketFence-users
RESTRICTED

Is it just me but when I preview an entire profile it works fine but if I try 
and preview an individual HTML file it gives me an
empty page.

The URL I get for the whole profile preview is:-

https://:1443/portal_preview/captive-portal?PORTAL=GUEST

and I am able to move around and preview all the portal pages but if I try and 
preview say the PARKING security
event page I get this:-

https:// :1443/config/profile/GUEST/preview/security_events/parked.html

and this page connects but has no content.

The template file used 'parked.html' is a simple copy of the 
'generic.html' template with slightly more informative text.

It works in 6.5 and 9.1 but cant see anything in PF11 or 12

Does not seem to be browser dependent either a sit does this in Chrome/Edge and 
Firefox

Andrew




RESTRICTED
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


[PacketFence-users] EAP-TLS Configuration

2023-03-15 Thread Mudrich, J. via PacketFence-users
Hello again,

I'm trying to configure PF for EAP-TLS authentication. I couldn't find any 
comprehensive guide or manual so I hope you can help.
I would like to use the internal PKI. That's what I already set up. Maybe 
someone can walk me through this?

Some wild guesses:
I think I need to set up an Authentication Source (internal -> EAPTLS)?
Are there any changes needed in the RADIUS configuration (System Configuration 
-> Radius)?
What's with "PKI SSL Certificates", do I need to add the internal PKIs CA there?

Some additional thoughts: I can already see the devices I'd like to manage via 
EAP-TLS in my nodes list because of their DHCP broadcasts. Will these nodes 
then somehow be connected to the certificates issued by the internal PKI?

Thanks and kind regards
Johannes



Johannes Mudrich
Mitarbeiter
IT

Altmark-Klinikum gGmbH
Ernst-von-Bergmann-Stra?e 22
39638 Gardelegen

Tel.:03907 791229
Fax.:03907 791248
Mail:j.mudr...@altmark-klinikum.de



[cid:8b75ef7f4f404632a95c0ed1c20ce74b]
Salus Altmark Holding gGmbH
Tel.: +49 39325700
Sitz der Gesellschaft:
Seepark 5 | 39116 Magdeburg
www.salusaltmarkholding.de
[cid:20c9cb08881d423a944a29b83a2b9b14]
 [cid:891d9fa4257c479ea01a2cd69a624ee7] 
 
  
[cid:f8cb8f1fb6264a839bed894162f7bc29] 
 
  
[cid:8e8410f7afab48f3a1675434d3d5a691] 
 
  
[cid:403b1c2ebad046b0bad25158566c27b1] 
 

Registergericht: AG Stendal: HRB 112594
Gesch?ftsf?hrer: J?rgen Richter
Aufsichtsratsvorsitz: Wolfgang Beck
Gem?? Art. 13 DSGVO informieren wir dar?ber, dass Ihre Daten elektronisch 
gespeichert werden. N?here Informationen: 
www.salusaltmarkholding.de/datenschutz
Ab Januar 2022 nehmen wir keine Mails mit doc-, xls- und ppt-Anh?ngen mehr an.
Bitte verwenden Sie die aktuellen Office-Formate docx, xlsx, pptx oder pdf.
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users