Hello,
I'm trying to configure CLI access for admins via PF. I'm so far able to
make the admins login to the switch CLI, however when they try to enter
enable mode they receive "% Error in Authentication" message.
I tried and checked the radius.log which shows a successful authentication.
I have also enabled the checkbox on the switch config to allow cli access.
I understand that I need to send Cisco-AVPair for privileged access to work
but dunno where it is set.
Can someone pls help to grant the enable mode access on the switch via PF
Freeradius.
Below is the log from raddebug.
(747) Mon Dec 13 19:08:16 2021: Debug: Received Access-Request Id 20 from
10.141.254.40:1645 to 192.168.197.90:1812 length 81
(747) Mon Dec 13 19:08:16 2021: Debug: User-Name = "testuser123"
(747) Mon Dec 13 19:08:16 2021: Debug: User-Password = "cleartextpassword"
(747) Mon Dec 13 19:08:16 2021: Debug: NAS-Port = 2
(747) Mon Dec 13 19:08:16 2021: Debug: NAS-Port-Id = "tty2"
(747) Mon Dec 13 19:08:16 2021: Debug: NAS-Port-Type = Virtual
(747) Mon Dec 13 19:08:16 2021: Debug: NAS-IP-Address = 192.168.254.40
(747) Mon Dec 13 19:08:16 2021: Debug: # Executing section authorize from
file /usr/local/pf/raddb/sites-enabled/packetfence
(747) Mon Dec 13 19:08:16 2021: Debug: authorize {
(747) Mon Dec 13 19:08:16 2021: Debug: policy
packetfence-nas-ip-address {
(747) Mon Dec 13 19:08:16 2021: Debug: if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0"){
(747) Mon Dec 13 19:08:16 2021: Debug: if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0") -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: } # policy
packetfence-nas-ip-address = notfound
(747) Mon Dec 13 19:08:16 2021: Debug: update {
(747) Mon Dec 13 19:08:16 2021: Debug: EXPAND %{Packet-Src-IP-Address}
(747) Mon Dec 13 19:08:16 2021: Debug: --> 192.168.254.40
(747) Mon Dec 13 19:08:16 2021: Debug: EXPAND %{Packet-Dst-IP-Address}
(747) Mon Dec 13 19:08:16 2021: Debug: --> 192.168.197.90
(747) Mon Dec 13 19:08:16 2021: Debug: EXPAND %l
(747) Mon Dec 13 19:08:16 2021: Debug: --> 1639408096
(747) Mon Dec 13 19:08:16 2021: Debug: } # update = noop
(747) Mon Dec 13 19:08:16 2021: Debug: policy
packetfence-set-realm-if-machine {
(747) Mon Dec 13 19:08:16 2021: Debug: if (User-Name =~
/host\/([a-z0-9_-]*)[\.](.*)/i) {
(747) Mon Dec 13 19:08:16 2021: Debug: if (User-Name =~
/host\/([a-z0-9_-]*)[\.](.*)/i) -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: } # policy
packetfence-set-realm-if-machine = noop
(747) Mon Dec 13 19:08:16 2021: Debug: policy
packetfence-balanced-key-policy {
(747) Mon Dec 13 19:08:16 2021: Debug: if (&PacketFence-KeyBalanced
&& (&PacketFence-KeyBalanced =~ /^(.*)(.)$/i)) {
(747) Mon Dec 13 19:08:16 2021: Debug: if (&PacketFence-KeyBalanced
&& (&PacketFence-KeyBalanced =~ /^(.*)(.)$/i)) -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: else {
(747) Mon Dec 13 19:08:16 2021: Debug: update {
(747) Mon Dec 13 19:08:16 2021: Debug: EXPAND
%{md5:%{Calling-Station-Id}%{User-Name}}
(747) Mon Dec 13 19:08:16 2021: Debug: -->
7674cdd55c6099b093d1b9dcdda01825
(747) Mon Dec 13 19:08:16 2021: Debug: EXPAND
%{md5:%{Calling-Station-Id}%{User-Name}}
(747) Mon Dec 13 19:08:16 2021: Debug: -->
7674cdd55c6099b093d1b9dcdda01825
(747) Mon Dec 13 19:08:16 2021: Debug: } # update = noop
(747) Mon Dec 13 19:08:16 2021: Debug: } # else = noop
(747) Mon Dec 13 19:08:16 2021: Debug: } # policy
packetfence-balanced-key-policy = noop
(747) Mon Dec 13 19:08:16 2021: Debug: policy packetfence-set-tenant-id
{
(747) Mon Dec 13 19:08:16 2021: Debug: if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0"){
(747) Mon Dec 13 19:08:16 2021: Debug: if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0") -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(747) Mon Dec 13 19:08:16 2021: Debug: EXPAND
%{%{control:PacketFence-Tenant-Id}:-0}
(747) Mon Dec 13 19:08:16 2021: Debug: --> 0
(747) Mon Dec 13 19:08:16 2021: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE
(747) Mon Dec 13 19:08:16 2021: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(747) Mon Dec 13 19:08:16 2021: Debug: update control {
(747) Mon Dec 13 19:08:16 2021: Debug: EXPAND %{User-Name}
(747) Mon Dec 13 19:08:16 2021: Debug: --> testuser123
(747) Mon Dec 13 19:08:16 2021: Debug: SQL-User-Name set to
'testuser123'
(747) Mon Dec 13 19:08:16 2021: Debug: Executing select query:
SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
'192.168.254.40'), 0)
(747) Mon Dec 13 19:08:16 2021: Debug: EXPAND %{sql: SELECT
IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
'%{NAS-IP-Address}'), 0)}
(747) Mon Dec 13 19:08:16 2021: Debug: --> 1
(747) Mon Dec 13 19:08:16 2021: Debug: } # update control = noop
(747) Mon Dec 13 19:08:16 2021: Debug: } # if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop
(747) Mon Dec 13 19:08:16 2021: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) {
(747) Mon Dec 13 19:08:16 2021: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: } # policy
packetfence-set-tenant-id = noop
(747) Mon Dec 13 19:08:16 2021: Debug: policy
rewrite_calling_station_id {
(747) Mon Dec 13 19:08:16 2021: Debug: if (&Calling-Station-Id &&
(&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
{
(747) Mon Dec 13 19:08:16 2021: Debug: if (&Calling-Station-Id &&
(&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
-> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: else {
(747) Mon Dec 13 19:08:16 2021: Debug: [noop] = noop
(747) Mon Dec 13 19:08:16 2021: Debug: } # else = noop
(747) Mon Dec 13 19:08:16 2021: Debug: } # policy
rewrite_calling_station_id = noop
(747) Mon Dec 13 19:08:16 2021: Debug: policy rewrite_called_station_id
{
(747) Mon Dec 13 19:08:16 2021: Debug: if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
{
(747) Mon Dec 13 19:08:16 2021: Debug: if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
-> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: else {
(747) Mon Dec 13 19:08:16 2021: Debug: [noop] = noop
(747) Mon Dec 13 19:08:16 2021: Debug: } # else = noop
(747) Mon Dec 13 19:08:16 2021: Debug: } # policy
rewrite_called_station_id = noop
(747) Mon Dec 13 19:08:16 2021: Debug: if ( "%{client:shortname}" =~
/eduroam_tlrs/ ) {
(747) Mon Dec 13 19:08:16 2021: Debug: EXPAND %{client:shortname}
(747) Mon Dec 13 19:08:16 2021: Debug: --> 192.168.254.40/32
(747) Mon Dec 13 19:08:16 2021: Debug: if ( "%{client:shortname}" =~
/eduroam_tlrs/ ) -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: policy filter_username {
(747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name) {
(747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name) -> TRUE
(747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name) {
(747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name =~ / /) {
(747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name =~ / /) ->
FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name =~ /@[^@]*@/
) {
(747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name =~ /@[^@]*@/
) -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name =~ /\.\./ ) {
(747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name =~ /\.\./ )
-> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/)) {
(747) Mon Dec 13 19:08:16 2021: Debug: if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name =~ /\.$/) {
(747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name =~ /\.$/)
-> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name =~ /@\./) {
(747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name =~ /@\./)
-> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: } # if (&User-Name) = noop
(747) Mon Dec 13 19:08:16 2021: Debug: } # policy filter_username = noop
(747) Mon Dec 13 19:08:16 2021: Debug: policy filter_password {
(747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Password &&
(&User-Password != "%{string:User-Password}")) {
(747) Mon Dec 13 19:08:16 2021: Debug: EXPAND %{string:User-Password}
(747) Mon Dec 13 19:08:16 2021: Debug: --> cleartextpassword
(747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Password &&
(&User-Password != "%{string:User-Password}")) -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: } # policy filter_password = noop
(747) Mon Dec 13 19:08:16 2021: Debug: [preprocess] = ok
(747) Mon Dec 13 19:08:16 2021: Debug: [mschap] = noop
(747) Mon Dec 13 19:08:16 2021: Debug: suffix: Checking for suffix after "@"
(747) Mon Dec 13 19:08:16 2021: Debug: suffix: No '@' in User-Name =
"testuser123", skipping NULL due to config.
(747) Mon Dec 13 19:08:16 2021: Debug: [suffix] = noop
(747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: Checking for prefix before
"\"
(747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: No '\' in User-Name =
"testuser123", looking up realm NULL
(747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: Found realm "null"
(747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: Adding Stripped-User-Name
= "testuser123"
(747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: Adding Realm = "null"
(747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: Authentication realm is
LOCAL
(747) Mon Dec 13 19:08:16 2021: Debug: [ntdomain] = ok
(747) Mon Dec 13 19:08:16 2021: Debug: eap: No EAP-Message, not doing EAP
(747) Mon Dec 13 19:08:16 2021: Debug: [eap] = noop
(747) Mon Dec 13 19:08:16 2021: Debug: if ( !EAP-Message &&
"%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP") {
(747) Mon Dec 13 19:08:16 2021: Debug: EXPAND
%{%{Control:Auth-type}:-No-MS_CHAP}
(747) Mon Dec 13 19:08:16 2021: Debug: --> No-MS_CHAP
(747) Mon Dec 13 19:08:16 2021: Debug: if ( !EAP-Message &&
"%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP") -> TRUE
(747) Mon Dec 13 19:08:16 2021: Debug: if ( !EAP-Message &&
"%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP") {
(747) Mon Dec 13 19:08:16 2021: Debug: update {
(747) Mon Dec 13 19:08:16 2021: Debug: } # update = noop
(747) Mon Dec 13 19:08:16 2021: Debug: } # if ( !EAP-Message &&
"%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP") = noop
(747) Mon Dec 13 19:08:16 2021: Debug: if (Control:Auth-type ==
"MS-CHAP") {
(747) Mon Dec 13 19:08:16 2021: Debug: if (Control:Auth-type ==
"MS-CHAP") -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: policy
packetfence-eap-mac-policy {
(747) Mon Dec 13 19:08:16 2021: Debug: if ( &EAP-Type ) {
(747) Mon Dec 13 19:08:16 2021: Debug: if ( &EAP-Type ) -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: [noop] = noop
(747) Mon Dec 13 19:08:16 2021: Debug: } # policy
packetfence-eap-mac-policy = noop
(747) Mon Dec 13 19:08:16 2021: WARNING: pap:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
(747) Mon Dec 13 19:08:16 2021: WARNING: pap: !!! Ignoring
control:User-Password. Update your !!!
(747) Mon Dec 13 19:08:16 2021: WARNING: pap: !!! configuration so that the
"known good" clear text !!!
(747) Mon Dec 13 19:08:16 2021: WARNING: pap: !!! password is in
Cleartext-Password and NOT in !!!
(747) Mon Dec 13 19:08:16 2021: WARNING: pap: !!! User-Password.
!!!
(747) Mon Dec 13 19:08:16 2021: WARNING: pap:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
(747) Mon Dec 13 19:08:16 2021: WARNING: pap: Auth-Type already set. Not
setting to PAP
(747) Mon Dec 13 19:08:16 2021: Debug: [pap] = noop
(747) Mon Dec 13 19:08:16 2021: Debug: } # authorize = ok
(747) Mon Dec 13 19:08:16 2021: Debug: Found Auth-Type = Accept
(747) Mon Dec 13 19:08:16 2021: Debug: Auth-Type = Accept, accepting the
user
(747) Mon Dec 13 19:08:16 2021: Debug: # Executing section post-auth from
file /usr/local/pf/raddb/sites-enabled/packetfence
(747) Mon Dec 13 19:08:16 2021: Debug: post-auth {
(747) Mon Dec 13 19:08:16 2021: Debug: update {
(747) Mon Dec 13 19:08:16 2021: Debug: EXPAND %{Packet-Src-IP-Address}
(747) Mon Dec 13 19:08:16 2021: Debug: --> 192.168.254.40
(747) Mon Dec 13 19:08:16 2021: Debug: EXPAND %{Packet-Dst-IP-Address}
(747) Mon Dec 13 19:08:16 2021: Debug: --> 192.168.197.90
(747) Mon Dec 13 19:08:16 2021: Debug: } # update = noop
(747) Mon Dec 13 19:08:16 2021: Debug: policy packetfence-set-tenant-id
{
(747) Mon Dec 13 19:08:16 2021: Debug: if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0"){
(747) Mon Dec 13 19:08:16 2021: Debug: if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0") -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(747) Mon Dec 13 19:08:16 2021: Debug: EXPAND
%{%{control:PacketFence-Tenant-Id}:-0}
(747) Mon Dec 13 19:08:16 2021: Debug: --> 1
(747) Mon Dec 13 19:08:16 2021: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) {
(747) Mon Dec 13 19:08:16 2021: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: } # policy
packetfence-set-tenant-id = noop
(747) Mon Dec 13 19:08:16 2021: Debug: if
("%{%{control:PacketFence-Proxied-From}:-False}" == "True") {
(747) Mon Dec 13 19:08:16 2021: Debug: EXPAND
%{%{control:PacketFence-Proxied-From}:-False}
(747) Mon Dec 13 19:08:16 2021: Debug: --> False
(747) Mon Dec 13 19:08:16 2021: Debug: if
("%{%{control:PacketFence-Proxied-From}:-False}" == "True") -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: if (! EAP-Type || (EAP-Type !=
TTLS && EAP-Type != PEAP) ) {
(747) Mon Dec 13 19:08:16 2021: Debug: if (! EAP-Type || (EAP-Type !=
TTLS && EAP-Type != PEAP) ) -> TRUE
(747) Mon Dec 13 19:08:16 2021: Debug: if (! EAP-Type || (EAP-Type !=
TTLS && EAP-Type != PEAP) ) {
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Expanding URI components
(747) Mon Dec 13 19:08:16 2021: Debug: rest: EXPAND http://127.0.0.1:7070
(747) Mon Dec 13 19:08:16 2021: Debug: rest: --> http://127.0.0.1:7070
(747) Mon Dec 13 19:08:16 2021: Debug: rest: EXPAND //radius/rest/authorize
(747) Mon Dec 13 19:08:16 2021: Debug: rest: --> //radius/rest/authorize
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Sending HTTP POST to "
http://127.0.0.1:7070//radius/rest/authorize"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute "User-Name"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
"User-Password"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
"NAS-IP-Address"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute "NAS-Port"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
"NAS-Port-Type"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
"Event-Timestamp"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
"NAS-Port-Id"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
"Stripped-User-Name"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute "Realm"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
"SQL-User-Name"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
"FreeRADIUS-Client-IP-Address"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
"PacketFence-KeyBalanced"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
"PacketFence-Radius-Ip"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Processing response header
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Status : 200 (OK)
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Type : json
(application/json)
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Adding
reply:REST-HTTP-Status-Code += "200"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Parsing attribute
"Reply-Message"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: EXPAND Switch enable access
granted by PacketFence
(747) Mon Dec 13 19:08:16 2021: Debug: rest: --> Switch enable access
granted by PacketFence
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Reply-Message := "Switch
enable access granted by PacketFence"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Parsing attribute
"control:PacketFence-Authorization-Status"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: EXPAND allow
(747) Mon Dec 13 19:08:16 2021: Debug: rest: --> allow
(747) Mon Dec 13 19:08:16 2021: Debug: rest:
PacketFence-Authorization-Status := "allow"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Parsing attribute
"Cisco-AVPair"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: EXPAND shell:priv-lvl=15
(747) Mon Dec 13 19:08:16 2021: Debug: rest: --> shell:priv-lvl=15
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Cisco-AVPair :=
"shell:priv-lvl=15"
(747) Mon Dec 13 19:08:16 2021: Debug: [rest] = updated
(747) Mon Dec 13 19:08:16 2021: Debug: update {
(747) Mon Dec 13 19:08:16 2021: Debug: } # update = noop
(747) Mon Dec 13 19:08:16 2021: Debug: if
("%{%{control:PacketFence-Authorization-Status}:-Allow}" == "deny") {
(747) Mon Dec 13 19:08:16 2021: Debug: EXPAND
%{%{control:PacketFence-Authorization-Status}:-Allow}
(747) Mon Dec 13 19:08:16 2021: Debug: --> allow
(747) Mon Dec 13 19:08:16 2021: Debug: if
("%{%{control:PacketFence-Authorization-Status}:-Allow}" == "deny") ->
FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: else {
(747) Mon Dec 13 19:08:16 2021: Debug: policy
packetfence-audit-log-accept {
(747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name &&
(&User-Name == "dummy")) {
(747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name &&
(&User-Name == "dummy")) -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: else {
(747) Mon Dec 13 19:08:16 2021: Debug: policy request-timing {
(747) Mon Dec 13 19:08:16 2021: Debug: if
("%{%{control:PacketFence-Request-Time}:-0}" != 0) {
(747) Mon Dec 13 19:08:16 2021: Debug: EXPAND
%{%{control:PacketFence-Request-Time}:-0}
(747) Mon Dec 13 19:08:16 2021: Debug: --> 0
(747) Mon Dec 13 19:08:16 2021: Debug: if
("%{%{control:PacketFence-Request-Time}:-0}" != 0) -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug: } # policy
request-timing = updated
(747) Mon Dec 13 19:08:16 2021: Debug: sql: EXPAND type.accept.query
(747) Mon Dec 13 19:08:16 2021: Debug: sql: --> type.accept.query
(747) Mon Dec 13 19:08:16 2021: Debug: sql: Using query template 'query'
(747) Mon Dec 13 19:08:16 2021: Debug: sql: EXPAND %{User-Name}
(747) Mon Dec 13 19:08:16 2021: Debug: sql: --> testuser123
(747) Mon Dec 13 19:08:16 2021: Debug: sql: SQL-User-Name set to
'testuser123'
(747) Mon Dec 13 19:08:16 2021: Debug: sql: EXPAND INSERT INTO
radius_audit_log ( mac, ip, computer_name, user_name,
stripped_user_name, realm, event_type, switch_id,
switch_mac, switch_ip_address, radius_source_ip_address,
called_station_id, calling_station_id, nas_port_type, ssid,
nas_port_id, ifindex, nas_port, connection_type,
nas_ip_address, nas_identifier, auth_status, reason,
auth_type, eap_type, role, node_status, profile,
source, auto_reg, is_phone, pf_domain, uuid,
radius_request, radius_reply, request_time, tenant_id,
radius_ip) VALUES (
'%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}',
'%{%{control:PacketFence-Computer-Name}:-N/A}', '%{request:User-Name}',
'%{request:Stripped-User-Name}', '%{request:Realm}',
'Radius-Access-Request',
'%{%{control:PacketFence-Switch-Id}:-N/A}',
'%{%{control:PacketFence-Switch-Mac}:-N/A}',
'%{%{control:PacketFence-Switch-Ip-Address}:-N/A}',
'%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}',
'%{request:Calling-Station-Id}', '%{request:NAS-Port-Type}',
'%{request:Called-Station-SSID}', '%{request:NAS-Port-Id}',
'%{%{control:PacketFence-IfIndex}:-N/A}', '%{request:NAS-Port}',
'%{%{control:PacketFence-Connection-Type}:-N/A}',
'%{request:NAS-IP-Address}', '%{request:NAS-Identifier}', 'Accept',
'%{request:Module-Failure-Message}', '%{control:Auth-Type}',
'%{request:EAP-Type}',
'%{%{control:PacketFence-Role}:-N/A}',
'%{%{control:PacketFence-Status}:-N/A}',
'%{%{control:PacketFence-Profile}:-N/A}',
'%{%{control:PacketFence-Source}:-N/A}',
'%{%{control:PacketFence-AutoReg}:-0}',
'%{%{control:PacketFence-IsPhone}:-0}',
'%{request:PacketFence-Domain}', '',
'%{pairs:&request:[*]}','%{pairs:&reply:[*]}',
'%{control:PacketFence-Request-Time}', '%{control:PacketFence-Tenant-Id}',
'%{request:PacketFence-Radius-Ip}')
(747) Mon Dec 13 19:08:16 2021: Debug: sql: --> INSERT INTO
radius_audit_log ( mac, ip, computer_name, user_name,
stripped_user_name, realm, event_type, switch_id,
switch_mac, switch_ip_address, radius_source_ip_address,
called_station_id, calling_station_id, nas_port_type, ssid,
nas_port_id, ifindex, nas_port, connection_type,
nas_ip_address, nas_identifier, auth_status, reason,
auth_type, eap_type, role, node_status, profile,
source, auto_reg, is_phone, pf_domain, uuid,
radius_request, radius_reply, request_time, tenant_id,
radius_ip) VALUES ( '', '', 'N/A',
'testuser123', 'testuser123', 'null',
'Radius-Access-Request', 'N/A', 'N/A', 'N/A',
'192.168.254.40', '', '', 'Virtual', '', 'tty2',
'N/A', '2', 'N/A', '192.168.254.40', '', 'Accept',
'', 'Accept', '', 'N/A', 'N/A', 'N/A',
'N/A', '0', '0', '', '', 'User-Name =3D
=22testuser123=22, User-Password =3D =22=2A=2A=2A=2A=2A=2A=22,
NAS-IP-Address =3D 192.168.254.40, NAS-Port =3D 2, NAS-Port-Type =3D
Virtual, Event-Timestamp =3D =22Dec 13 2021 19:08:16 =2B04=22, NAS-Port-Id
=3D =22tty2=22, Stripped-User-Name =3D =22testuser123=22, Realm =3D
=22null=22, FreeRADIUS-Client-IP-Address =3D 192.168.254.40,
PacketFence-KeyBalanced =3D =227674cdd55c6099b093d1b9dcdda01825=22,
PacketFence-Radius-Ip =3D =22192.168.197.90=22, SQL-User-Name =3D
=22testuser123=22','REST-HTTP-Status-Code =3D 200, Reply-Message =3D
=22Switch enable access granted by PacketFence=22, Cisco-AVPair =3D
=22shell:priv-lvl=3D15=22', '0', '1', '192.168.197.90')
(747) Mon Dec 13 19:08:16 2021: Debug: sql: Executing query: INSERT INTO
radius_audit_log ( mac, ip, computer_name, user_name,
stripped_user_name, realm, event_type, switch_id,
switch_mac, switch_ip_address, radius_source_ip_address,
called_station_id, calling_station_id, nas_port_type, ssid,
nas_port_id, ifindex, nas_port, connection_type,
nas_ip_address, nas_identifier, auth_status, reason,
auth_type, eap_type, role, node_status, profile,
source, auto_reg, is_phone, pf_domain, uuid,
radius_request, radius_reply, request_time, tenant_id,
radius_ip) VALUES ( '', '', 'N/A',
'testuser123', 'testuser123', 'null',
'Radius-Access-Request', 'N/A', 'N/A', 'N/A',
'192.168.254.40', '', '', 'Virtual', '', 'tty2',
'N/A', '2', 'N/A', '192.168.254.40', '', 'Accept',
'', 'Accept', '', 'N/A', 'N/A', 'N/A',
'N/A', '0', '0', '', '', 'User-Name =3D
=22testuser123=22, User-Password =3D =22=2A=2A=2A=2A=2A=2A=22,
NAS-IP-Address =3D 192.168.254.40, NAS-Port =3D 2, NAS-Port-Type =3D
Virtual, Event-Timestamp =3D =22Dec 13 2021 19:08:16 =2B04=22, NAS-Port-Id
=3D =22tty2=22, Stripped-User-Name =3D =22testuser123=22, Realm =3D
=22null=22, FreeRADIUS-Client-IP-Address =3D 192.168.254.40,
PacketFence-KeyBalanced =3D =227674cdd55c6099b093d1b9dcdda01825=22,
PacketFence-Radius-Ip =3D =22192.168.197.90=22, SQL-User-Name =3D
=22testuser123=22','REST-HTTP-Status-Code =3D 200, Reply-Message =3D
=22Switch enable access granted by PacketFence=22, Cisco-AVPair =3D
=22shell:priv-lvl=3D15=22', '0', '1', '192.168.197.90')
(747) Mon Dec 13 19:08:16 2021: Debug: sql: SQL query returned: success
(747) Mon Dec 13 19:08:16 2021: Debug: sql: 1 record(s) updated
(747) Mon Dec 13 19:08:16 2021: Debug: [sql] = ok
(747) Mon Dec 13 19:08:16 2021: Debug: } # else = updated
(747) Mon Dec 13 19:08:16 2021: Debug: } # policy
packetfence-audit-log-accept = updated
(747) Mon Dec 13 19:08:16 2021: Debug: } # else = updated
(747) Mon Dec 13 19:08:16 2021: Debug: } # if (! EAP-Type || (EAP-Type
!= TTLS && EAP-Type != PEAP) ) = updated
(747) Mon Dec 13 19:08:16 2021: Debug: attr_filter.packetfence_post_auth:
EXPAND %{User-Name}
(747) Mon Dec 13 19:08:16 2021: Debug: attr_filter.packetfence_post_auth:
--> testuser123
(747) Mon Dec 13 19:08:16 2021: Debug: attr_filter.packetfence_post_auth:
Matched entry DEFAULT at line 10
(747) Mon Dec 13 19:08:16 2021: Debug:
[attr_filter.packetfence_post_auth] = updated
(747) Mon Dec 13 19:08:16 2021: Debug: linelog: EXPAND
messages.%{%{reply:Packet-Type}:-default}
(747) Mon Dec 13 19:08:16 2021: Debug: linelog: -->
messages.Access-Accept
(747) Mon Dec 13 19:08:16 2021: Debug: linelog: EXPAND
[mac:%{Calling-Station-Id}] Accepted user: %{reply:User-Name} and returned
VLAN %{reply:Tunnel-Private-Group-ID}
(747) Mon Dec 13 19:08:16 2021: Debug: linelog: --> [mac:] Accepted
user: and returned VLAN
(747) Mon Dec 13 19:08:16 2021: Debug: [linelog] = ok
(747) Mon Dec 13 19:08:16 2021: Debug: } # post-auth = updated
(747) Mon Dec 13 19:08:16 2021: Debug: Sent Access-Accept Id 20 from
192.168.197.90:1812 to 192.168.254.40:1645 length 0
(747) Mon Dec 13 19:08:16 2021: Debug: Reply-Message = "Switch enable
access granted by PacketFence"
(747) Mon Dec 13 19:08:16 2021: Debug: Cisco-AVPair = "shell:priv-lvl=15"
(747) Mon Dec 13 19:08:16 2021: Debug: Finished request
(747) Mon Dec 13 19:08:21 2021: Debug: Cleaning up request packet ID 20
with timestamp +10956
(748) Mon Dec 13 19:08:25 2021: Debug: Received Status-Server Id 117 from
127.0.0.1:54412 to 127.0.0.1:18121 length 50
(748) Mon Dec 13 19:08:25 2021: Debug: Message-Authenticator =
0x88a7c5faf457adb7610f55a0941bb0eb
(748) Mon Dec 13 19:08:25 2021: Debug: FreeRADIUS-Statistics-Type = 15
(748) Mon Dec 13 19:08:25 2021: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/status
(748) Mon Dec 13 19:08:25 2021: Debug: Autz-Type Status-Server {
(748) Mon Dec 13 19:08:25 2021: Debug: [ok] = ok
(748) Mon Dec 13 19:08:25 2021: Debug: } # Autz-Type Status-Server = ok
(748) Mon Dec 13 19:08:25 2021: Debug: Sent Access-Accept Id 117 from
127.0.0.1:18121 to 127.0.0.1:54412 length 0
(748) Mon Dec 13 19:08:25 2021: Debug: FreeRADIUS-Total-Access-Requests =
749
(748) Mon Dec 13 19:08:25 2021: Debug: FreeRADIUS-Total-Access-Accepts = 4
(748) Mon Dec 13 19:08:25 2021: Debug: FreeRADIUS-Total-Access-Rejects = 4
(748) Mon Dec 13 19:08:25 2021: Debug: FreeRADIUS-Total-Access-Challenges
= 0
(748) Mon Dec 13 19:08:25 2021: Debug: FreeRADIUS-Total-Auth-Responses = 8
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Auth-Duplicate-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Auth-Malformed-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Auth-Invalid-Requests = 9
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Auth-Dropped-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Auth-Unknown-Types = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Accounting-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Accounting-Responses = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Acct-Duplicate-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Acct-Malformed-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Acct-Invalid-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Acct-Dropped-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Acct-Unknown-Types = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Accepts = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Rejects = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Challenges = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Responses = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Accounting-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Accounting-Responses = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
(748) Mon Dec 13 19:08:25 2021: Debug: Finished request
(748) Mon Dec 13 19:08:30 2021: Debug: Cleaning up request packet ID 117
with timestamp +10965
(749) Mon Dec 13 19:08:40 2021: Debug: Received Status-Server Id 39 from
127.0.0.1:34233 to 127.0.0.1:18121 length 50
(749) Mon Dec 13 19:08:40 2021: Debug: Message-Authenticator =
0xdab43050a96590f4e4e456daf538da6e
(749) Mon Dec 13 19:08:40 2021: Debug: FreeRADIUS-Statistics-Type = 15
(749) Mon Dec 13 19:08:40 2021: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/status
(749) Mon Dec 13 19:08:40 2021: Debug: Autz-Type Status-Server {
(749) Mon Dec 13 19:08:40 2021: Debug: [ok] = ok
(749) Mon Dec 13 19:08:40 2021: Debug: } # Autz-Type Status-Server = ok
(749) Mon Dec 13 19:08:40 2021: Debug: Sent Access-Accept Id 39 from
127.0.0.1:18121 to 127.0.0.1:34233 length 0
(749) Mon Dec 13 19:08:40 2021: Debug: FreeRADIUS-Total-Access-Requests =
750
(749) Mon Dec 13 19:08:40 2021: Debug: FreeRADIUS-Total-Access-Accepts = 4
(749) Mon Dec 13 19:08:40 2021: Debug: FreeRADIUS-Total-Access-Rejects = 4
(749) Mon Dec 13 19:08:40 2021: Debug: FreeRADIUS-Total-Access-Challenges
= 0
(749) Mon Dec 13 19:08:40 2021: Debug: FreeRADIUS-Total-Auth-Responses = 8
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Auth-Duplicate-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Auth-Malformed-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Auth-Invalid-Requests = 9
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Auth-Dropped-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Auth-Unknown-Types = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Accounting-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Accounting-Responses = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Acct-Duplicate-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Acct-Malformed-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Acct-Invalid-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Acct-Dropped-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Acct-Unknown-Types = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Accepts = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Rejects = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Challenges = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Responses = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Accounting-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Accounting-Responses = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
(749) Mon Dec 13 19:08:40 2021: Debug: Finished request
(749) Mon Dec 13 19:08:45 2021: Debug: Cleaning up request packet ID 39
with timestamp +10980
(750) Mon Dec 13 19:08:55 2021: Debug: Received Status-Server Id 237 from
127.0.0.1:33232 to 127.0.0.1:18121 length 50
(750) Mon Dec 13 19:08:55 2021: Debug: Message-Authenticator =
0x0b84e6e16a6fdb6dba18c9c76ffdd204
(750) Mon Dec 13 19:08:55 2021: Debug: FreeRADIUS-Statistics-Type = 15
(750) Mon Dec 13 19:08:55 2021: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/status
(750) Mon Dec 13 19:08:55 2021: Debug: Autz-Type Status-Server {
(750) Mon Dec 13 19:08:55 2021: Debug: [ok] = ok
(750) Mon Dec 13 19:08:55 2021: Debug: } # Autz-Type Status-Server = ok
(750) Mon Dec 13 19:08:55 2021: Debug: Sent Access-Accept Id 237 from
127.0.0.1:18121 to 127.0.0.1:33232 length 0
(750) Mon Dec 13 19:08:55 2021: Debug: FreeRADIUS-Total-Access-Requests =
751
(750) Mon Dec 13 19:08:55 2021: Debug: FreeRADIUS-Total-Access-Accepts = 4
(750) Mon Dec 13 19:08:55 2021: Debug: FreeRADIUS-Total-Access-Rejects = 4
(750) Mon Dec 13 19:08:55 2021: Debug: FreeRADIUS-Total-Access-Challenges
= 0
(750) Mon Dec 13 19:08:55 2021: Debug: FreeRADIUS-Total-Auth-Responses = 8
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Auth-Duplicate-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Auth-Malformed-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Auth-Invalid-Requests = 9
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Auth-Dropped-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Auth-Unknown-Types = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Accounting-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Accounting-Responses = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Acct-Duplicate-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Acct-Malformed-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Acct-Invalid-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Acct-Dropped-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Acct-Unknown-Types = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Accepts = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Rejects = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Challenges = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Responses = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Accounting-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Accounting-Responses = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
(750) Mon Dec 13 19:08:55 2021: Debug: Finished request
Regards
Misbah
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users