As requested: request_time 0 RADIUS Request User-Name = "testradius" NAS-IP-Address = 10.100.64.67 NAS-Port = 49 State = 0x1feaf54a1efeef2b6fdba9e21c346c92 Called-Station-Id = "88:f0:77:d9:b2:48" Calling-Station-Id = "0c:4d:e9:b9:23:ac" NAS-Port-Type = Ethernet Acct-Session-Id = "050000FD" Event-Timestamp = "May 23 2019 11:24:40 EDT" EAP-Message = 0x021400061a03 FreeRADIUS-Proxied-To = 127.0.0.1 EAP-Type = MSCHAPv2 Stripped-User-Name = "testradius" Realm = "null" PacketFence-Domain = "YOUITV" User-Password = "******" SQL-User-Name = "testradius" RADIUS Reply EAP-Message = 0x03140004 Message-Authenticator = 0x00000000000000000000000000000000 User-Name = "testradius" Tunnel-Type = VLAN Tunnel-Private-Group-Id = "88" Tunnel-Medium-Type = IEEE-802
On Wed, May 22, 2019 at 10:16 PM Durand fabrice <fdur...@inverse.ca> wrote: > can i also ask you to have a copy of the radius request ? > > in the auditing tab click on the + on the left of the mac address then go > in the radius tab. > > https://mgmt_ip:1443/admin/auditing > > Thanks > > Fabrice > > > Le 19-05-22 à 12 h 46, Stuart Gendron a écrit : > > I assume I could make a copy of the SG300.pm file and have separate ones > for 24 and 48 port switches? > > Here's the info you requested: > > IF-MIB::ifDescr.49 = STRING: gigabitethernet1 > IF-MIB::ifDescr.50 = STRING: gigabitethernet2 > IF-MIB::ifDescr.51 = STRING: gigabitethernet3 > IF-MIB::ifDescr.52 = STRING: gigabitethernet4 > IF-MIB::ifDescr.53 = STRING: gigabitethernet5 > IF-MIB::ifDescr.54 = STRING: gigabitethernet6 > IF-MIB::ifDescr.55 = STRING: gigabitethernet7 > IF-MIB::ifDescr.56 = STRING: gigabitethernet8 > IF-MIB::ifDescr.57 = STRING: gigabitethernet9 > IF-MIB::ifDescr.58 = STRING: gigabitethernet10 > IF-MIB::ifDescr.59 = STRING: gigabitethernet11 > IF-MIB::ifDescr.60 = STRING: gigabitethernet12 > IF-MIB::ifDescr.61 = STRING: gigabitethernet13 > IF-MIB::ifDescr.62 = STRING: gigabitethernet14 > IF-MIB::ifDescr.63 = STRING: gigabitethernet15 > IF-MIB::ifDescr.64 = STRING: gigabitethernet16 > IF-MIB::ifDescr.65 = STRING: gigabitethernet17 > IF-MIB::ifDescr.66 = STRING: gigabitethernet18 > IF-MIB::ifDescr.67 = STRING: gigabitethernet19 > IF-MIB::ifDescr.68 = STRING: gigabitethernet20 > IF-MIB::ifDescr.69 = STRING: gigabitethernet21 > IF-MIB::ifDescr.70 = STRING: gigabitethernet22 > IF-MIB::ifDescr.71 = STRING: gigabitethernet23 > IF-MIB::ifDescr.72 = STRING: gigabitethernet24 > IF-MIB::ifDescr.73 = STRING: gigabitethernet25 > IF-MIB::ifDescr.74 = STRING: gigabitethernet26 > IF-MIB::ifDescr.75 = STRING: gigabitethernet27 > IF-MIB::ifDescr.76 = STRING: gigabitethernet28 > IF-MIB::ifDescr.77 = STRING: gigabitethernet29 > IF-MIB::ifDescr.78 = STRING: gigabitethernet30 > IF-MIB::ifDescr.79 = STRING: gigabitethernet31 > IF-MIB::ifDescr.80 = STRING: gigabitethernet32 > IF-MIB::ifDescr.81 = STRING: gigabitethernet33 > IF-MIB::ifDescr.82 = STRING: gigabitethernet34 > IF-MIB::ifDescr.83 = STRING: gigabitethernet35 > IF-MIB::ifDescr.84 = STRING: gigabitethernet36 > IF-MIB::ifDescr.85 = STRING: gigabitethernet37 > IF-MIB::ifDescr.86 = STRING: gigabitethernet38 > IF-MIB::ifDescr.87 = STRING: gigabitethernet39 > IF-MIB::ifDescr.88 = STRING: gigabitethernet40 > IF-MIB::ifDescr.89 = STRING: gigabitethernet41 > IF-MIB::ifDescr.90 = STRING: gigabitethernet42 > IF-MIB::ifDescr.91 = STRING: gigabitethernet43 > IF-MIB::ifDescr.92 = STRING: gigabitethernet44 > IF-MIB::ifDescr.93 = STRING: gigabitethernet45 > IF-MIB::ifDescr.94 = STRING: gigabitethernet46 > IF-MIB::ifDescr.95 = STRING: gigabitethernet47 > IF-MIB::ifDescr.96 = STRING: gigabitethernet48 > IF-MIB::ifDescr.97 = STRING: gigabitethernet49 > IF-MIB::ifDescr.98 = STRING: gigabitethernet50 > IF-MIB::ifDescr.99 = STRING: gigabitethernet51 > IF-MIB::ifDescr.100 = STRING: gigabitethernet52 > IF-MIB::ifDescr.1000 = STRING: Po1 > IF-MIB::ifDescr.1001 = STRING: Po2 > IF-MIB::ifDescr.1002 = STRING: Po3 > IF-MIB::ifDescr.1003 = STRING: Po4 > IF-MIB::ifDescr.1004 = STRING: Po5 > IF-MIB::ifDescr.1005 = STRING: Po6 > IF-MIB::ifDescr.1006 = STRING: Po7 > IF-MIB::ifDescr.1007 = STRING: Po8 > IF-MIB::ifDescr.3000 = STRING: tunnel1 > IF-MIB::ifDescr.7000 = STRING: loopback1 > IF-MIB::ifDescr.20000 = STRING: Logical-int 1 > IF-MIB::ifDescr.100000 = STRING: 1 > IF-MIB::ifDescr.100063 = STRING: 64 > IF-MIB::ifDescr.100067 = STRING: 68 > IF-MIB::ifDescr.100071 = STRING: 72 > IF-MIB::ifDescr.100075 = STRING: 76 > IF-MIB::ifDescr.100085 = STRING: 86 > IF-MIB::ifDescr.100087 = STRING: 88 > IF-MIB::ifDescr.100095 = STRING: 96 > IF-MIB::ifDescr.100099 = STRING: 100 > IF-MIB::ifDescr.300000 = STRING: 64 > > On Tue, May 21, 2019 at 9:02 PM Durand fabrice <fdur...@inverse.ca> wrote: > >> So you can just change this line: >> >> >> https://github.com/inverse-inc/packetfence/blob/devel/lib/pf/Switch/Cisco/SG300.pm#L91 >> >> with that: >> >> return $NAS_port - 48; >> >> My only concert is about other sg300 switches with let's say 24 port .... >> >> Last thing, can you do a snmpwalk on the oid 1.3.6.1.2.1.2.2.1.2 and >> paste the result ? >> >> Regards >> >> Fabrice >> >> >> Le 19-05-21 à 13 h 24, Stuart Gendron a écrit : >> >> Correct - it seems that the proper port for the SG300 switches is n-48 >> (where 48 is however many ports it has). >> >> Is this a global change, or can be tied to the device profile itself? >> >> On Tue, May 21, 2019 at 12:36 PM Fabrice Durand <fdur...@inverse.ca> >> wrote: >> >>> Hello Stuart, >>> >>> yes it's possible but when you plug in the port 2 is it the port 50 who >>> appear in the log ? >>> >>> Regards >>> >>> Fabrice >>> >>> >>> Le 19-05-21 à 11 h 42, Stuart Gendron a écrit : >>> >>> Logs below: >>> >>> May 21 11:39:50 youi-packetfence-p1 auth[25948]: rlm_sql (sql): Closing >>> connection (106): Hit idle_timeout, was idle for 431977 seconds >>> May 21 11:39:50 youi-packetfence-p1 auth[25948]: rlm_sql (sql): Closing >>> connection (108): Hit idle_timeout, was idle for 431977 seconds >>> May 21 11:39:50 youi-packetfence-p1 auth[25948]: rlm_sql (sql): Closing >>> connection (107): Hit idle_timeout, was idle for 431977 seconds >>> May 21 11:39:50 youi-packetfence-p1 auth[25948]: rlm_sql (sql): Closing >>> connection (105): Hit idle_timeout, was idle for 431977 seconds >>> May 21 11:39:50 youi-packetfence-p1 auth[25948]: rlm_sql (sql): Opening >>> additional connection (109), 1 of 64 pending slots used >>> May 21 11:39:50 youi-packetfence-p1 auth[25948]: Need 2 more connections >>> to reach min connections (3) >>> May 21 11:39:50 youi-packetfence-p1 auth[25948]: rlm_sql (sql): Opening >>> additional connection (110), 1 of 63 pending slots used >>> May 21 11:39:50 youi-packetfence-p1 auth[25948]: rlm_rest (rest): >>> Closing connection (98): Hit idle_timeout, was idle for 431989 seconds >>> May 21 11:39:50 youi-packetfence-p1 auth[25948]: rlm_rest (rest): >>> Closing connection (97): Hit idle_timeout, was idle for 431977 seconds >>> May 21 11:39:50 youi-packetfence-p1 auth[25948]: rlm_rest (rest): >>> Closing connection (99): Hit idle_timeout, was idle for 431977 seconds >>> May 21 11:39:50 youi-packetfence-p1 auth[25948]: rlm_rest (rest): >>> Opening additional connection (100), 1 of 64 pending slots used >>> May 21 11:39:51 youi-packetfence-p1 auth[25948]: Need 2 more connections >>> to reach min connections (3) >>> May 21 11:39:51 youi-packetfence-p1 auth[25948]: rlm_rest (rest): >>> Opening additional connection (101), 1 of 63 pending slots used >>> May 21 11:39:51 youi-packetfence-p1 auth[25948]: Need 1 more connections >>> to reach min connections (3) >>> May 21 11:39:51 youi-packetfence-p1 auth[25948]: rlm_sql (sql): Opening >>> additional connection (111), 1 of 62 pending slots used >>> May 21 11:39:51 youi-packetfence-p1 auth[25948]: [mac:0c:4d:e9:b9:23:ac] >>> Rejected user: 0c4de9b923ac >>> May 21 11:39:51 youi-packetfence-p1 auth[25948]: (41096) Rejected in >>> post-auth: [0c4de9b923ac] (from client 10.100.64.67 port 49 cli >>> 0c:4d:e9:b9:23:ac) >>> May 21 11:39:51 youi-packetfence-p1 auth[25948]: (41096) Login >>> incorrect: [0c4de9b923ac] (from client 10.100.64.67 port 49 cli >>> 0c:4d:e9:b9:23:ac) >>> May 21 11:40:02 youi-packetfence-p1 auth[25948]: Need 7 more connections >>> to reach 10 spares >>> May 21 11:40:02 youi-packetfence-p1 auth[25948]: rlm_sql (sql): Opening >>> additional connection (112), 1 of 61 pending slots used >>> May 21 11:40:02 youi-packetfence-p1 auth[25948]: Need 1 more connections >>> to reach min connections (3) >>> May 21 11:40:02 youi-packetfence-p1 auth[25948]: rlm_rest (rest): >>> Opening additional connection (102), 1 of 62 pending slots used >>> May 21 11:40:02 youi-packetfence-p1 auth[25948]: (41106) Login OK: >>> [testradius] (from client 10.100.64.67 port 49 cli 0c:4d:e9:b9:23:ac via >>> TLS tunnel) >>> May 21 11:40:02 youi-packetfence-p1 auth[25948]: [mac:0c:4d:e9:b9:23:ac] >>> Accepted user: testradius and returned VLAN 88 >>> May 21 11:40:02 youi-packetfence-p1 auth[25948]: (41107) Login OK: >>> [testradius] (from client 10.100.64.67 port 49 cli 0c:4d:e9:b9:23:ac) >>> >>> Looks like it's also sending port 49. >>> >>> Is there somewhere to make a modification where I can say $Port = $Port >>> - 48 or something? >>> >>> On Thu, May 16, 2019 at 9:27 PM Durand fabrice <fdur...@inverse.ca> >>> wrote: >>> >>>> Hello Stuart, >>>> >>>> it looks that the port is set to 49 in the radius request: >>>> >>>> May 16 11:40:01 youi-packetfence-p1 packetfence_httpd.aaa: >>>> httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] handling radius autz request: >>>> from switch_ip => (10.100.64.67), connection_type => >>>> Ethernet-NoEAP,switch_mac => (88:f0:77:d9:b2:48), mac => >>>> [78:7b:8a:d3:ae:74], port => 49, username => "787b8ad3ae74" >>>> (pf::radius::authorize) >>>> >>>> Are you able to check in the radius auditing what is the radius request >>>> (with all the attributes) and paste it to me ? >>>> >>>> Regards >>>> >>>> Fabrice >>>> >>>> >>>> Le 19-05-16 à 11 h 41, Stuart Gendron a écrit : >>>> >>>> Logs below: >>>> >>>> [root@youi-packetfence-p1 ~]# tail -f >>>> /usr/local/pf/logs/packetfence.log| grep 78:7b:8a:d3:ae:74 >>>> May 16 11:40:01 youi-packetfence-p1 packetfence_httpd.aaa: >>>> httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] handling radius autz request: >>>> from switch_ip => (10.100.64.67), connection_type => >>>> Ethernet-NoEAP,switch_mac => (88:f0:77:d9:b2:48), mac => >>>> [78:7b:8a:d3:ae:74], port => 49, username => "787b8ad3ae74" >>>> (pf::radius::authorize) >>>> May 16 11:40:01 youi-packetfence-p1 packetfence_httpd.aaa: >>>> httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] Instantiate profile default >>>> (pf::Connection::ProfileFactory::_from_profile) >>>> May 16 11:40:01 youi-packetfence-p1 packetfence_httpd.aaa: >>>> httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] Match rule >>>> mac_lan:unknown&pf_wired_mac_auth (pf::access_filter::test) >>>> May 16 11:40:01 youi-packetfence-p1 packetfence_httpd.aaa: >>>> httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] vlan filter match ; belongs >>>> into REJECT VLAN (pf::role::getRegistrationRole) >>>> May 16 11:40:01 youi-packetfence-p1 packetfence_httpd.aaa: >>>> httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] According to rules in >>>> fetchRoleForNode this node must be kicked out. Returning USERLOCK >>>> (pf::Switch::handleRadiusDeny) >>>> May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa: >>>> httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] handling radius autz request: >>>> from switch_ip => (10.100.64.67), connection_type => >>>> Ethernet-EAP,switch_mac => (88:f0:77:d9:b2:48), mac => [78:7b:8a:d3:ae:74], >>>> port => 49, username => "testradius" (pf::radius::authorize) >>>> May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa: >>>> httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] Instantiate profile 802.1x >>>> (pf::Connection::ProfileFactory::_from_profile) >>>> May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa: >>>> httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] Found authentication >>>> source(s) : 'YOUI-DC-P1' for realm 'null' >>>> (pf::config::util::filter_authentication_sources) >>>> May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa: >>>> httpd.aaa(6346) WARN: [mac:78:7b:8a:d3:ae:74] Calling match with >>>> empty/invalid rule class. Defaulting to 'authentication' >>>> (pf::authentication::match2) >>>> May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa: >>>> httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] Using sources YOUI-DC-P1 for >>>> matching (pf::authentication::match2) >>>> May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa: >>>> httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] LDAP testing connection >>>> (pf::LDAP::expire_if) >>>> May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa: >>>> httpd.aaa(6346) ERROR: [mac:78:7b:8a:d3:ae:74] Error binding: 'Connection >>>> reset by peer' (pf::LDAP::log_error_msg) >>>> May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa: >>>> httpd.aaa(6346) WARN: [mac:78:7b:8a:d3:ae:74] LDAP connection expired >>>> (pf::LDAP::expire_if) >>>> May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa: >>>> httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] Matched rule >>>> (youi_tv_employees) in source YOUI-DC-P1, returning actions. >>>> (pf::Authentication::Source::match_rule) >>>> May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa: >>>> httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] Matched rule >>>> (youi_tv_employees) in source YOUI-DC-P1, returning actions. >>>> (pf::Authentication::Source::match) >>>> May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa: >>>> httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] Role has already been >>>> computed and we don't want to recompute it. Getting role from node_info >>>> (pf::role::getRegisteredRole) >>>> May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa: >>>> httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] Username was defined >>>> "testradius" - returning role 'default' (pf::role::getRegisteredRole) >>>> May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa: >>>> httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] PID: "testradius", Status: >>>> reg Returned VLAN: (undefined), Role: default (pf::role::fetchRoleForNode) >>>> May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa: >>>> httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] (10.100.64.67) Added VLAN 88 >>>> to the returned RADIUS Access-Accept (pf::Switch::returnRadiusAccessAccept) >>>> May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa: >>>> httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] violation 1300003 >>>> force-closed for 78:7b:8a:d3:ae:74 (pf::violation::violation_force_close) >>>> May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa: >>>> httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] Instantiate profile 802.1x >>>> (pf::Connection::ProfileFactory::_from_profile) >>>> May 16 11:40:13 youi-packetfence-p1 packetfence_httpd.aaa: >>>> httpd.aaa(6346) INFO: [mac:78:7b:8a:d3:ae:74] Updating locationlog from >>>> accounting request (pf::api::handle_accounting_metadata) >>>> May 16 11:40:14 youi-packetfence-p1 pfqueue: pfqueue(18291) WARN: >>>> [mac:78:7b:8a:d3:ae:74] Unable to match MAC address to IP '10.100.90.109' >>>> (pf::ip4log::ip2mac) >>>> >>>> On Tue, May 14, 2019 at 9:18 PM Durand fabrice via PacketFence-users < >>>> packetfence-users@lists.sourceforge.net> wrote: >>>> >>>>> Hello Stuart, >>>>> >>>>> can you paste the log when you plug in the switch port ? >>>>> >>>>> tail -f /usr/local/pf/logs/packetfence.log| grep 00:11:22:33:44:55 >>>>> >>>>> with the real mac address of course. >>>>> >>>>> Regards >>>>> >>>>> Fabrice >>>>> >>>>> >>>>> Le 19-05-14 à 10 h 43, Stuart Gendron via PacketFence-users a écrit : >>>>> >>>>> >>>>> Hey there, >>>>> >>>>> Was wondering if anyone else has their ports showing up wrong for >>>>> Cisco SG300 switches? >>>>> >>>>> This is when plugged into port 1 on a 48 port switch: >>>>> >>>>> [image: Screen Shot 2019-05-14 at 10.42.07 AM.png] >>>>> >>>>> If there's a way to fix it that'd be really appreciated :-) >>>>> >>>>> >>>>> -- >>>>> >>>>> *Stuart Gendron* >>>>> IT Support Specialist >>>>> >>>>> *You.i Labs* >>>>> 307 Legget Drive, Kanata, ON, K2K 3C8 >>>>> <https://maps.google.com/?q=307+Legget+Drive,+Kanata,+ON,%C2%A0K2K+3C8&entry=gmail&source=g> >>>>> t (613) 228-9107 x258 | c (613) 697-6853 >>>>> >>>>> >>>>> _______________________________________________ >>>>> PacketFence-users mailing >>>>> listPacketFence-users@lists.sourceforge.nethttps://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>> >>>>> _______________________________________________ >>>>> PacketFence-users mailing list >>>>> PacketFence-users@lists.sourceforge.net >>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>> >>>> >>>> >>>> -- >>>> >>>> *Stuart Gendron* >>>> IT Support Specialist >>>> >>>> *You.i Labs* >>>> 307 Legget Drive, Kanata, ON, K2K 3C8 >>>> <https://maps.google.com/?q=307+Legget+Drive,+Kanata,+ON,%C2%A0K2K+3C8&entry=gmail&source=g> >>>> t (613) 228-9107 x258 | c (613) 697-6853 >>>> >>>> >>> >>> -- >>> >>> *Stuart Gendron* >>> IT Support Specialist >>> >>> *You.i Labs* >>> 307 Legget Drive, Kanata, ON, K2K 3C8 >>> <https://maps.google.com/?q=307+Legget+Drive,+Kanata,+ON,%C2%A0K2K+3C8&entry=gmail&source=g> >>> t (613) 228-9107 x258 | c (613) 697-6853 >>> >>> -- >>> Fabrice durandfdur...@inverse.ca :: +1.514.447.4918 (x135) :: >>> www.inverse.ca >>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence >>> (http://packetfence.org) >>> >>> >> >> -- >> >> *Stuart Gendron* >> IT Support Specialist >> >> *You.i Labs* >> 307 Legget Drive, Kanata, ON, K2K 3C8 >> <https://maps.google.com/?q=307+Legget+Drive,+Kanata,+ON,%C2%A0K2K+3C8&entry=gmail&source=g> >> t (613) 228-9107 x258 | c (613) 697-6853 >> >> > > -- > > *Stuart Gendron* > IT Support Specialist > > *You.i Labs* > 307 Legget Drive, Kanata, ON, K2K 3C8 > <https://maps.google.com/?q=307+Legget+Drive,+Kanata,+ON,%C2%A0K2K+3C8&entry=gmail&source=g> > t (613) 228-9107 x258 | c (613) 697-6853 > > -- *Stuart Gendron* IT Support Specialist *You.i Labs* 307 Legget Drive, Kanata, ON, K2K 3C8 <https://maps.google.com/?q=307+Legget+Drive,+Kanata,+ON,%C2%A0K2K+3C8&entry=gmail&source=g> t (613) 228-9107 x258 | c (613) 697-6853
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users