Hello Kenny,

What’s your packetfence version ?

Thanks,

Ludovic Zammit
[email protected] <mailto:[email protected]> ::  +1.514.447.4918 (x145) ::  
www.inverse.ca <http://www.inverse.ca/>
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu <http://www.sogo.nu/>) 
and PacketFence (http://packetfence.org <http://packetfence.org/>) 




> On Oct 20, 2020, at 3:00 PM, Ludovic Zammit <[email protected]> wrote:
> 
> As a work around, you could disable PFacct in the services and enable 
> radius-acct and it should work.
> 
> It’s fixed in 10.2 version.
> 
> Thanks,
> 
> Ludovic Zammit
> [email protected] <mailto:[email protected]> ::  +1.514.447.4918 (x145) ::  
> www.inverse.ca <http://www.inverse.ca/>
> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu 
> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org 
> <http://packetfence.org/>) 
> 
> 
> 
> 
>> On Oct 20, 2020, at 12:14 PM, Ludovic Zammit via PacketFence-users 
>> <[email protected] 
>> <mailto:[email protected]>> wrote:
>> 
>> Hello Kenny,
>> 
>> I did open a bug for it, thanks for reporting it.
>> 
>> https://github.com/inverse-inc/packetfence/issues/5930 
>> <https://github.com/inverse-inc/packetfence/issues/5930>
>> 
>> Thanks,
>> 
>> Ludovic Zammit
>> [email protected] <mailto:[email protected]> ::  +1.514.447.4918 (x145) :: 
>>  www.inverse.ca <http://www.inverse.ca/>
>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu 
>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org 
>> <http://packetfence.org/>) 
>> 
>> 
>> 
>> 
>>> On Oct 20, 2020, at 9:58 AM, Kenny Wallrath <[email protected] 
>>> <mailto:[email protected]>> wrote:
>>> 
>>> Here you go:
>>> 
>>> [root@packetfence ~]# netstat -nlp | grep 1813
>>> udp        0      0 10.0.21.20:1813         0.0.0.0:*
>>>         1660/pfacct
>>> 
>>> 
>>> It seems that pfacct is only bound towards my management interface and
>>> not my "radius interface"
>>> If I check the udp-1812 port I can see following:
>>> 
>>> [root@packetfence ~]# netstat -nlp | grep 1812
>>> udp        0      0 127.0.0.1:18121         0.0.0.0:*
>>>         2651/radiusd
>>> udp        0      0 10.0.21.20:1812         0.0.0.0:*
>>>         2651/radiusd
>>> udp        0      0 10.0.20.14:1812         0.0.0.0:*
>>>         2651/radiusd
>>> 
>>> my radius network interface is following:
>>> --> pf.conf
>>> [interface eth1]
>>> ip=10.0.20.14
>>> type=none,radius,dhcp-listener
>>> mask=255.255.255.0
>>> 
>>> On raddb/acct.conf
>>> I found a listen block for the radius interface
>>> 
>>> listen {
>>>        ipaddr = 10.0.20.14
>>>        port = 0
>>>        type = acct
>>>        virtual_server = packetfence
>>> }
>>> this explains why I receive accounting-replies at my switch, when I
>>> enable the radiusd-acct service.
>>> But I couldn't find any conf files for pfacct
>>> 
>>> Is my interface correctly configured?
>>> 
>>> If I restart pfacct service over the GUI I can see the deamon
>>> listening on the right interface
>>> [root@packetfence raddb]# netstat -nlp | grep 1813
>>> udp        0      0 10.0.21.20:1813         0.0.0.0:*
>>>         4133/pfacct
>>> udp     4352      0 10.0.20.14:1813         0.0.0.0:*
>>>         4133/pfacct
>>> 
>>> But if I power cycle my device or reevaluate switchport the netstat
>>> looks the same like in the beginning...
>>> 
>>> Best regards
>>> 
>>> Am Di., 20. Okt. 2020 um 14:41 Uhr schrieb Ludovic Zammit 
>>> <[email protected] <mailto:[email protected]>>:
>>>> 
>>>> Hello,
>>>> 
>>>> Can you show me the output of:
>>>> 
>>>> netstat -nlp | grep 1813
>>>> 
>>>> Thanks,
>>>> 
>>>> 
>>>> Ludovic Zammit
>>>> [email protected] <mailto:[email protected]> ::  +1.514.447.4918 (x145) 
>>>> ::  www.inverse.ca <http://www.inverse.ca/>
>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu 
>>>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org 
>>>> <http://packetfence.org/>)
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> On Oct 18, 2020, at 5:21 AM, Kenny Wallrath <[email protected] 
>>>> <mailto:[email protected]>> wrote:
>>>> 
>>>> Hi Ludovic,
>>>> 
>>>> I took another debug on the switch and packetfence. It seems that
>>>> Radius Accounting Start Packets are sent from
>>>> the switch to PF, anyways the online/offline state still is not
>>>> getting updated and PF is not sending accounting-response.
>>>> Also the pfacct.log remains empty
>>>> I attached the radsniff and my cisco debug below.
>>>> 
>>>> This is what I configured on the switch side:
>>>> 
>>>> aaa new-model
>>>> aaa group server radius PACKETFENCE
>>>> server name PACKETFENCE
>>>> aaa authentication login default local group radius
>>>> aaa authentication enable default enable
>>>> aaa authentication dot1x default group PACKETFENCE
>>>> aaa authorization console
>>>> aaa authorization exec default local group radius if-authenticated
>>>> aaa authorization network default group PACKETFENCE
>>>> aaa accounting update newinfo
>>>> aaa accounting dot1x default start-stop group PACKETFENCE
>>>> aaa accounting network default start-stop group PACKETFENCE
>>>> aaa accounting connection default start-stop group PACKETFENCE
>>>> aaa server radius dynamic-author
>>>> client 10.0.20.14 server-key xxxxxxxxxxxxxxxx
>>>> port 3799
>>>> aaa session-id common
>>>> radius-server vsa send accounting
>>>> radius-server vsa send authentication
>>>> 
>>>> 
>>>> 
>>>> Cisco "debug aaa accounting"
>>>> Oct 18 11:00:02.554: AAA/ACCT/DOT1X(0000005A): Pick method list 'default'
>>>> Oct 18 11:00:02.554: AAA/ACCT/SETMLIST(0000005A): Handle 0, mlist
>>>> 05861080, Name default
>>>> Oct 18 11:00:02.554: Getting session id for DOT1X(0000005A) : db=55391F0
>>>> Oct 18 11:00:02.554: AAA/ACCT/DOT1X(0000005A): add, count 2
>>>> Oct 18 11:00:03.513: AAA/ACCT/EVENT/(0000005A): ATTR REPLACE
>>>> Oct 18 11:00:03.513: AAA/ACCT(0000005A): Accounting response status = 
>>>> FAILURE
>>>> Oct 18 11:00:03.513: AAA/ACCT(0000005A): Send NEWINFO accounting
>>>> notification to EM failed
>>>> 
>>>> Oct 18 11:00:03.550: %AUTHMGR-5-SUCCESS: Authorization succeeded for
>>>> client (b827.eb3f.01c8) on Interface Gi1/0/2 Aud itSessionID
>>>> 0A0014FD0000002ED5397B59
>>>> Oct 18 11:00:03.550: AAA/ACCT/EVENT/(0000005A): NET UP
>>>> Oct 18 11:00:03.550: AAA/ACCT/HC(0000005A): Update Dot1X/2E00002F
>>>> Oct 18 11:00:03.550: AAA/ACCT/HC(0000005A): no HC Dot1X/2E00002F
>>>> Oct 18 11:00:03.550: AAA/ACCT/DOT1X(0000005A): Queueing record is START
>>>> Oct 18 11:00:03.550: AAA/ACCT(0000005A): Accounting method=PACKETFENCE 
>>>> (RADIUS)
>>>> Oct 18 11:00:15.011: AAA/ACCT/EVENT/(0000005A): ATTR REPLACE
>>>> Oct 18 11:00:15.011: AAA/ACCT/HC(0000005A): Update Dot1X/2E00002F
>>>> Oct 18 11:00:15.011: AAA/ACCT/HC(0000005A): no HC Dot1X/2E00002F
>>>> Oct 18 11:00:15.011: AAA/ACCT/DOT1X(0000005A): Queueing record is NEWINFO
>>>> Oct 18 11:00:15.011: AAA/ACCT/EVENT/(0000005A): SESSION INFO
>>>> Oct 18 11:00:15.011: AAA/ACCT/HC(0000005A): Update Dot1X/2E00002F
>>>> Oct 18 11:00:15.011: AAA/ACCT/HC(0000005A): no HC Dot1X/2E00002F
>>>> Oct 18 11:00:15.011: AAA/ACCT/DOT1X(0000005A): Queueing record is UPDATE
>>>> Oct 18 11:00:15.016: AAA/ACCT(0000005A): Accounting method=PACKETFENCE 
>>>> (RADIUS)
>>>> Oct 18 11:00:15.016: AAA/ACCT(0000005A): Accounting method=PACKETFENCE 
>>>> (RADIUS)
>>>> Oct 18 11:00:23.719: AAA/ACCT/DOT1X(0000005A): START protocol reply FAIL
>>>> Oct 18 11:00:23.719: AAA/ACCT(0000005A): Accounting method=NOT_SET
>>>> Oct 18 11:00:23.719: AAA/ACCT(0000005A): Accounting response status = 
>>>> FAILURE
>>>> Oct 18 11:00:23.719: AAA/ACCT(0000005A): Send START accounting
>>>> notification to EM failed
>>>> Oct 18 11:00:23.719: AAA/ACCT(0000005A): mlist_periodic is not set, 
>>>> interval 0
>>>> Oct 18 11:00:30.095: %RADIUS-4-RADIUS_DEAD: RADIUS server
>>>> 10.0.20.14:1812,1813 is not responding.
>>>> Oct 18 11:00:30.152: %RADIUS-4-RADIUS_ALIVE: RADIUS server
>>>> 10.0.20.14:1812,1813 is being marked alive.
>>>> Oct 18 11:00:35.107: AAA/ACCT/DOT1X(0000005A): NEWINFO protocol reply FAIL
>>>> Oct 18 11:00:35.107: AAA/ACCT(0000005A): Accounting method=NOT_SET
>>>> Oct 18 11:00:35.107: AAA/ACCT(0000005A): mlist_periodic is not set, 
>>>> interval 0
>>>> 
>>>> 
>>>> Packetfence radsniff:
>>>> 2020-10-18 11:00:32.445522 (5) Accounting-Request Id 158
>>>> eth1:10.0.20.253:1646 -> 10.0.20.14:1813 +23.614
>>>>       User-Name = "b8:27:eb:3f:01:c8"
>>>>       NAS-IP-Address = 10.0.20.253
>>>>       NAS-Port = 50102
>>>>       Service-Type = Framed-User
>>>>       Framed-IP-Address = 169.254.118.80
>>>>       Called-Station-Id = "3C-0E-23-5A-3E-02"
>>>>       Calling-Station-Id = "B8-27-EB-3F-01-C8"
>>>>       NAS-Port-Type = Ethernet
>>>>       Acct-Status-Type = Start
>>>>       Acct-Delay-Time = 0
>>>>       Acct-Session-Id = "00000050"
>>>>       Acct-Authentic = RADIUS
>>>>       NAS-Port-Id = "GigabitEthernet1/0/2"
>>>>       PMIP6-Home-HN-Prefix = 3039:4330:3842::/56
>>>>       Cisco-AVPair = "audit-session-id=0A0014FD0000002ED5397B59"
>>>>       Cisco-AVPair = "connect-progress=Call Up"
>>>>       Authenticator-Field = 0x603bc2274431edd546dc9c758d86191f
>>>> 2020-10-18 11:00:37.497158 (6) Accounting-Request Id 159
>>>> eth1:10.0.20.253:1646 -> 10.0.20.14:1813 +28.665
>>>>       User-Name = "b8:27:eb:3f:01:c8"
>>>>       NAS-IP-Address = 10.0.20.253
>>>>       NAS-Port = 50102
>>>>       Service-Type = Framed-User
>>>>       Framed-IP-Address = 169.254.118.80
>>>>       Called-Station-Id = "3C-0E-23-5A-3E-02"
>>>>       Calling-Station-Id = "B8-27-EB-3F-01-C8"
>>>>       NAS-Port-Type = Ethernet
>>>>       Acct-Status-Type = Start
>>>>       Acct-Delay-Time = 5
>>>>       Acct-Session-Id = "00000050"
>>>>       Acct-Authentic = RADIUS
>>>>       NAS-Port-Id = "GigabitEthernet1/0/2"
>>>>       PMIP6-Home-HN-Prefix = 3039:4330:3842::/56
>>>>       Cisco-AVPair = "audit-session-id=0A0014FD0000002ED5397B59"
>>>>       Cisco-AVPair = "connect-progress=Call Up"
>>>>       Authenticator-Field = 0xfb92fbb9cc7ef65439c9c4e49d8283c6
>>>> 2020-10-18 11:00:37.645522 (5) ** norsp ** Accounting-Request Id 158
>>>> eth1:10.0.20.253:1646 -> 10.0.20.14:1813
>>>> 2020-10-18 11:00:37.645522 (5) Cleaning up request packet ID 158
>>>> 2020-10-18 11:00:42.551582 (7) Accounting-Request Id 160
>>>> eth1:10.0.20.253:1646 -> 10.0.20.14:1813 +33.720
>>>>       User-Name = "b8:27:eb:3f:01:c8"
>>>>       NAS-IP-Address = 10.0.20.253
>>>>       NAS-Port = 50102
>>>>       Service-Type = Framed-User
>>>>       Framed-IP-Address = 169.254.118.80
>>>>       Called-Station-Id = "3C-0E-23-5A-3E-02"
>>>>       Calling-Station-Id = "B8-27-EB-3F-01-C8"
>>>>       NAS-Port-Type = Ethernet
>>>>       Acct-Status-Type = Start
>>>>       Acct-Delay-Time = 10
>>>>       Acct-Session-Id = "00000050"
>>>>       Acct-Authentic = RADIUS
>>>>       NAS-Port-Id = "GigabitEthernet1/0/2"
>>>>       PMIP6-Home-HN-Prefix = 3039:4330:3842::/56
>>>>       Cisco-AVPair = "audit-session-id=0A0014FD0000002ED5397B59"
>>>>       Cisco-AVPair = "connect-progress=Call Up"
>>>>       Authenticator-Field = 0x42233d99f083a7639d3684208165238f
>>>> 2020-10-18 11:00:42.697158 (6) ** norsp ** Accounting-Request Id 159
>>>> eth1:10.0.20.253:1646 -> 10.0.20.14:1813
>>>> 2020-10-18 11:00:42.697158 (6) Cleaning up request packet ID 159
>>>> 2020-10-18 11:00:43.911491 (8) Accounting-Request Id 161
>>>> eth1:10.0.20.253:1646 -> 10.0.20.14:1813 +35.080
>>>>       User-Name = "b8:27:eb:3f:01:c8"
>>>>       NAS-IP-Address = 10.0.20.253
>>>>       NAS-Port = 50102
>>>>       Service-Type = Framed-User
>>>>       Framed-IP-Address = 10.0.40.61
>>>>       Called-Station-Id = "3C-0E-23-5A-3E-02"
>>>>       Calling-Station-Id = "B8-27-EB-3F-01-C8"
>>>>       NAS-Port-Type = Ethernet
>>>>       Acct-Status-Type = Interim-Update
>>>>       Acct-Delay-Time = 0
>>>>       Acct-Input-Octets = 2857
>>>>       Acct-Output-Octets = 9508
>>>>       Acct-Session-Id = "00000050"
>>>>       Acct-Authentic = RADIUS
>>>>       Acct-Session-Time = 12
>>>>       Acct-Input-Packets = 17
>>>>       Acct-Output-Packets = 35
>>>>       NAS-Port-Id = "GigabitEthernet1/0/2"
>>>>       PMIP6-Home-HN-Prefix = 3039:4330:3842::/56
>>>>       Cisco-AVPair = "audit-session-id=0A0014FD0000002ED5397B59"
>>>>       Cisco-AVPair = "connect-progress=Call Up"
>>>>       Authenticator-Field = 0x2dbd87095bebf4a1b6ee64255131b410
>>>> 2020-10-18 11:00:43.912010 (9) Accounting-Request Id 162
>>>> eth1:10.0.20.253:1646 -> 10.0.20.14:1813 +35.080
>>>>       User-Name = "b8:27:eb:3f:01:c8"
>>>>       NAS-IP-Address = 10.0.20.253
>>>>       NAS-Port = 50102
>>>>       Service-Type = Framed-User
>>>>       Framed-IP-Address = 10.0.40.61
>>>>       Called-Station-Id = "3C-0E-23-5A-3E-02"
>>>>       Calling-Station-Id = "B8-27-EB-3F-01-C8"
>>>>       NAS-Port-Type = Ethernet
>>>>       Acct-Status-Type = Interim-Update
>>>>       Acct-Delay-Time = 0
>>>>       Acct-Input-Octets = 2857
>>>>       Acct-Output-Octets = 9508
>>>>       Acct-Session-Id = "00000050"
>>>>       Acct-Authentic = RADIUS
>>>>       Acct-Session-Time = 12
>>>>       Acct-Input-Packets = 17
>>>>       Acct-Output-Packets = 35
>>>>       NAS-Port-Id = "GigabitEthernet1/0/2"
>>>>       PMIP6-Home-HN-Prefix = 3039:4330:3842::/56
>>>>       Cisco-AVPair = "audit-session-id=0A0014FD0000002ED5397B59"
>>>>       Cisco-AVPair = "connect-progress=Call Up"
>>>>       Authenticator-Field = 0xb0a63e46552c8152ef507257f9e10b72
>>>> 2020-10-18 11:00:47.595411 (10) Accounting-Request Id 163
>>>> eth1:10.0.20.253:1646 -> 10.0.20.14:1813 +38.763
>>>>       User-Name = "b8:27:eb:3f:01:c8"
>>>>       NAS-IP-Address = 10.0.20.253
>>>>       NAS-Port = 50102
>>>>       Service-Type = Framed-User
>>>>       Framed-IP-Address = 169.254.118.80
>>>>       Called-Station-Id = "3C-0E-23-5A-3E-02"
>>>>       Calling-Station-Id = "B8-27-EB-3F-01-C8"
>>>>       NAS-Port-Type = Ethernet
>>>>       Acct-Status-Type = Start
>>>>       Acct-Delay-Time = 15
>>>>       Acct-Session-Id = "00000050"
>>>>       Acct-Authentic = RADIUS
>>>>       NAS-Port-Id = "GigabitEthernet1/0/2"
>>>>       PMIP6-Home-HN-Prefix = 3039:4330:3842::/56
>>>>       Cisco-AVPair = "audit-session-id=0A0014FD0000002ED5397B59"
>>>>       Cisco-AVPair = "connect-progress=Call Up"
>>>>       Authenticator-Field = 0xdc631f70c7df87de580a8d5c38561393
>>>> 2020-10-18 11:00:47.751582 (7) ** norsp ** Accounting-Request Id 160
>>>> eth1:10.0.20.253:1646 -> 10.0.20.14:1813
>>>> 2020-10-18 11:00:47.751582 (7) Cleaning up request packet ID 160
>>>> 
>>>> Am Fr., 16. Okt. 2020 um 14:30 Uhr schrieb Ludovic Zammit 
>>>> <[email protected] <mailto:[email protected]>>:
>>>> 
>>>> 
>>>> Hello Kenny,
>>>> 
>>>> PacketFence is looking for Accouting start / stop packet for the online 
>>>> offline.
>>>> 
>>>> It looks like the device does not send the Acct-Status-Type: Start or Stop.
>>>> 
>>>> Thanks,
>>>> 
>>>> 
>>>> Ludovic Zammit
>>>> [email protected] <mailto:[email protected]> ::  +1.514.447.4918 (x145) 
>>>> ::  www.inverse.ca <http://www.inverse.ca/>
>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu 
>>>> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org 
>>>> <http://packetfence.org/>)
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> On Oct 15, 2020, at 5:52 AM, Kenny Wallrath via PacketFence-users 
>>>> <[email protected] 
>>>> <mailto:[email protected]>> wrote:
>>>> 
>>>> Hi everyone,
>>>> 
>>>> I am currently trying to get the online/offline state working. It
>>>> seems that the state is working if requests are coming from Wireless
>>>> AccessPoints (My device gets registered when online and unregistered
>>>> when offline)
>>>> But if I try the same with my Cisco 2960S switches the nodes remain 
>>>> "unknown".
>>>> 
>>>> From what I understood pfacct supersedes radiusd-acct. The service
>>>> pfacct is running and there is no firewall in between. Switch is
>>>> configured to send accounting to PF on port 1813.
>>>> My switch debug tells me that there is no response from Server, which
>>>> I also can verify on PF side. A TCPDUMP shows that Radius Accounting
>>>> Requests arrive at the PF but no response is being generated.
>>>> If I check the pfacct.log it is empty... I pasted a radsniff on port
>>>> 1813 below...
>>>> 
>>>> Interestingly, if I disable pfacct and enable radiusd-acct a
>>>> Accounting-Reply is generated to the switch but the online/offline
>>>> state remains unknown.
>>>> 
>>>> 2020-10-15 11:42:21.448660 (5) Accounting-Request Id 49
>>>> eth1:10.0.20.253:1646 -> 10.0.20.14:1813 +10.924
>>>>      User-Name = "b8:27:eb:3f:01:c8"
>>>>      NAS-IP-Address = 10.0.20.253
>>>>      NAS-Port = 50102
>>>>      Service-Type = Framed-User
>>>>      Framed-IP-Address = 10.0.40.61
>>>>      Called-Station-Id = "3C-0E-23-5A-3E-02"
>>>>      Calling-Station-Id = "B8-27-EB-3F-01-C8"
>>>>      NAS-Port-Type = Ethernet
>>>>      Acct-Status-Type = Interim-Update
>>>>      Acct-Delay-Time = 10
>>>>      Acct-Input-Octets = 15178
>>>>      Acct-Output-Octets = 1620296
>>>>      Acct-Session-Id = "0000004B"
>>>>      Acct-Authentic = RADIUS
>>>>      Acct-Session-Time = 6229
>>>>      Acct-Input-Packets = 225
>>>>      Acct-Output-Packets = 9530
>>>>      NAS-Port-Id = "GigabitEthernet1/0/2"
>>>>      PMIP6-Home-HN-Prefix = 3831:3437:4232::/57
>>>>      Cisco-AVPair = "audit-session-id=0A0014FD0000002AC57E41EC"
>>>>      Cisco-AVPair = "connect-progress=Auth Open"
>>>>      Authenticator-Field = 0xe184ba9b392f14f26741c4f7c64c815a
>>>> 2020-10-15 11:42:21.214706 (4) ** norsp ** Accounting-Request Id 48
>>>> eth1:10.0.20.253:1646 -> 10.0.20.14:1813
>>>> 2020-10-15 11:42:21.214706 (4) Cleaning up request packet ID 48
>>>> 2020-10-15 11:42:26.606010 (6) Accounting-Request Id 50
>>>> eth1:10.0.20.253:1646 -> 10.0.20.14:1813 +15.940
>>>>      User-Name = "b8:27:eb:3f:01:c8"
>>>>      NAS-IP-Address = 10.0.20.253
>>>>      NAS-Port = 50102
>>>>      Service-Type = Framed-User
>>>>      Framed-IP-Address = 10.0.40.61
>>>>      Called-Station-Id = "3C-0E-23-5A-3E-02"
>>>>      Calling-Station-Id = "B8-27-EB-3F-01-C8"
>>>>      NAS-Port-Type = Ethernet
>>>>      Acct-Status-Type = Interim-Update
>>>>      Acct-Delay-Time = 15
>>>>      Acct-Input-Octets = 15178
>>>>      Acct-Output-Octets = 1620296
>>>>      Acct-Session-Id = "0000004B"
>>>>      Acct-Authentic = RADIUS
>>>>      Acct-Session-Time = 6229
>>>>      Acct-Input-Packets = 225
>>>>      Acct-Output-Packets = 9530
>>>>      NAS-Port-Id = "GigabitEthernet1/0/2"
>>>>      PMIP6-Home-HN-Prefix = 3831:3437:4232::/57
>>>>      Cisco-AVPair = "audit-session-id=0A0014FD0000002AC57E41EC"
>>>>      Cisco-AVPair = "connect-progress=Auth Open"
>>>>      Authenticator-Field = 0xe77e42cc33f62dcd1164461139b59e6d
>>>> 2020-10-15 11:42:26.244866 (5) ** norsp ** Accounting-Request Id 49
>>>> eth1:10.0.20.253:1646 -> 10.0.20.14:1813
>>>> 2020-10-15 11:42:26.244866 (5) Cleaning up request packet ID 49
>>>> 2020-10-15 11:42:31.260601 (6) ** norsp ** Accounting-Request Id 50
>>>> eth1:10.0.20.253:1646 -> 10.0.20.14:1813
>>>> 2020-10-15 11:42:31.260601 (6) Cleaning up request packet ID 50
>>>> 
>>>> 
>>>> _______________________________________________
>>>> PacketFence-users mailing list
>>>> [email protected] 
>>>> <mailto:[email protected]>
>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users 
>>>> <https://lists.sourceforge.net/lists/listinfo/packetfence-users>
>>>> 
>>>> 
>>>> 
>> 
>> _______________________________________________
>> PacketFence-users mailing list
>> [email protected] 
>> <mailto:[email protected]>
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
> 

_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to