Just to share heads up. I was able to fix this issue by disabling the
enable command, below is how my aaa config looks like.

aaa authentication login default local group NAC-Packetfence
aaa authentication login console group NAC-Packetfence
*aaa authentication enable default none*
aaa authentication dot1x default group NAC-Packetfence
aaa authorization network default group NAC-Packetfence
aaa accounting dot1x default start-stop group NAC-Packetfence
aaa server radius dynamic-author
 client 192.168.197.90 server-key 7 113A163153020A5533
 port 3799
!
!
radius server NAC1
 address ipv4 192.168.197.90 auth-port 1812 acct-port 1813
 key 7 046804324B314D1733
!
!
aaa group server radius NAC-Packetfence
 server name NAC1
 deadtime 1
!
!
!
aaa new-model
aaa session-id common


Regards
Misbah


On Mon, 13 Dec 2021 at 19:29, Misbah Hussaini <misbhaud...@gmail.com> wrote:

> Hello,
>
> I'm trying to configure CLI access for admins via PF. I'm so far able to
> make the admins login to the switch CLI, however when they try to enter
> enable mode they receive "% Error in Authentication" message.
>
> I tried and checked the radius.log which shows a successful
> authentication. I have also enabled the checkbox on the switch config to
> allow cli access. I understand that I need to send Cisco-AVPair for
> privileged access to work but dunno where it is set.
>
> Can someone pls help to grant the enable mode access on the switch via PF
> Freeradius.
>
> Below is the log from raddebug.
>
> (747) Mon Dec 13 19:08:16 2021: Debug: Received Access-Request Id 20 from
> 10.141.254.40:1645 to 192.168.197.90:1812 length 81
> (747) Mon Dec 13 19:08:16 2021: Debug:   User-Name = "testuser123"
> (747) Mon Dec 13 19:08:16 2021: Debug:   User-Password =
> "cleartextpassword"
> (747) Mon Dec 13 19:08:16 2021: Debug:   NAS-Port = 2
> (747) Mon Dec 13 19:08:16 2021: Debug:   NAS-Port-Id = "tty2"
> (747) Mon Dec 13 19:08:16 2021: Debug:   NAS-Port-Type = Virtual
> (747) Mon Dec 13 19:08:16 2021: Debug:   NAS-IP-Address = 192.168.254.40
> (747) Mon Dec 13 19:08:16 2021: Debug: # Executing section authorize from
> file /usr/local/pf/raddb/sites-enabled/packetfence
> (747) Mon Dec 13 19:08:16 2021: Debug:   authorize {
> (747) Mon Dec 13 19:08:16 2021: Debug:     policy
> packetfence-nas-ip-address {
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (!NAS-IP-Address ||
> NAS-IP-Address == "0.0.0.0"){
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (!NAS-IP-Address ||
> NAS-IP-Address == "0.0.0.0") -> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:     } # policy
> packetfence-nas-ip-address = notfound
> (747) Mon Dec 13 19:08:16 2021: Debug:     update {
> (747) Mon Dec 13 19:08:16 2021: Debug:       EXPAND
> %{Packet-Src-IP-Address}
> (747) Mon Dec 13 19:08:16 2021: Debug:          --> 192.168.254.40
> (747) Mon Dec 13 19:08:16 2021: Debug:       EXPAND
> %{Packet-Dst-IP-Address}
> (747) Mon Dec 13 19:08:16 2021: Debug:          --> 192.168.197.90
> (747) Mon Dec 13 19:08:16 2021: Debug:       EXPAND %l
> (747) Mon Dec 13 19:08:16 2021: Debug:          --> 1639408096
> (747) Mon Dec 13 19:08:16 2021: Debug:     } # update = noop
> (747) Mon Dec 13 19:08:16 2021: Debug:     policy
> packetfence-set-realm-if-machine {
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (User-Name =~
> /host\/([a-z0-9_-]*)[\.](.*)/i) {
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (User-Name =~
> /host\/([a-z0-9_-]*)[\.](.*)/i)  -> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:     } # policy
> packetfence-set-realm-if-machine = noop
> (747) Mon Dec 13 19:08:16 2021: Debug:     policy
> packetfence-balanced-key-policy {
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (&PacketFence-KeyBalanced
> && (&PacketFence-KeyBalanced =~ /^(.*)(.)$/i)) {
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (&PacketFence-KeyBalanced
> && (&PacketFence-KeyBalanced =~ /^(.*)(.)$/i))  -> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:       else {
> (747) Mon Dec 13 19:08:16 2021: Debug:         update {
> (747) Mon Dec 13 19:08:16 2021: Debug:           EXPAND
> %{md5:%{Calling-Station-Id}%{User-Name}}
> (747) Mon Dec 13 19:08:16 2021: Debug:              -->
> 7674cdd55c6099b093d1b9dcdda01825
> (747) Mon Dec 13 19:08:16 2021: Debug:           EXPAND
> %{md5:%{Calling-Station-Id}%{User-Name}}
> (747) Mon Dec 13 19:08:16 2021: Debug:              -->
> 7674cdd55c6099b093d1b9dcdda01825
> (747) Mon Dec 13 19:08:16 2021: Debug:         } # update = noop
> (747) Mon Dec 13 19:08:16 2021: Debug:       } # else = noop
> (747) Mon Dec 13 19:08:16 2021: Debug:     } # policy
> packetfence-balanced-key-policy = noop
> (747) Mon Dec 13 19:08:16 2021: Debug:     policy
> packetfence-set-tenant-id {
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (!NAS-IP-Address ||
> NAS-IP-Address == "0.0.0.0"){
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (!NAS-IP-Address ||
> NAS-IP-Address == "0.0.0.0") -> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
> (747) Mon Dec 13 19:08:16 2021: Debug:       EXPAND
> %{%{control:PacketFence-Tenant-Id}:-0}
> (747) Mon Dec 13 19:08:16 2021: Debug:          --> 0
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> TRUE
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  {
> (747) Mon Dec 13 19:08:16 2021: Debug:         update control {
> (747) Mon Dec 13 19:08:16 2021: Debug:           EXPAND %{User-Name}
> (747) Mon Dec 13 19:08:16 2021: Debug:              --> testuser123
> (747) Mon Dec 13 19:08:16 2021: Debug:           SQL-User-Name set to
> 'testuser123'
> (747) Mon Dec 13 19:08:16 2021: Debug:           Executing select query:
>  SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
> '192.168.254.40'), 0)
> (747) Mon Dec 13 19:08:16 2021: Debug:           EXPAND %{sql: SELECT
> IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
> '%{NAS-IP-Address}'), 0)}
> (747) Mon Dec 13 19:08:16 2021: Debug:              --> 1
> (747) Mon Dec 13 19:08:16 2021: Debug:         } # update control = noop
> (747) Mon Dec 13 19:08:16 2021: Debug:       } # if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  = noop
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (
> &control:PacketFence-Tenant-Id == 0 ) {
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (
> &control:PacketFence-Tenant-Id == 0 )  -> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:     } # policy
> packetfence-set-tenant-id = noop
> (747) Mon Dec 13 19:08:16 2021: Debug:     policy
> rewrite_calling_station_id {
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (&Calling-Station-Id &&
> (&Calling-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
> {
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (&Calling-Station-Id &&
> (&Calling-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
>  -> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:       else {
> (747) Mon Dec 13 19:08:16 2021: Debug:         [noop] = noop
> (747) Mon Dec 13 19:08:16 2021: Debug:       } # else = noop
> (747) Mon Dec 13 19:08:16 2021: Debug:     } # policy
> rewrite_calling_station_id = noop
> (747) Mon Dec 13 19:08:16 2021: Debug:     policy
> rewrite_called_station_id {
> (747) Mon Dec 13 19:08:16 2021: Debug:       if ((&Called-Station-Id) &&
> (&Called-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
> {
> (747) Mon Dec 13 19:08:16 2021: Debug:       if ((&Called-Station-Id) &&
> (&Called-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
>  -> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:       else {
> (747) Mon Dec 13 19:08:16 2021: Debug:         [noop] = noop
> (747) Mon Dec 13 19:08:16 2021: Debug:       } # else = noop
> (747) Mon Dec 13 19:08:16 2021: Debug:     } # policy
> rewrite_called_station_id = noop
> (747) Mon Dec 13 19:08:16 2021: Debug:     if ( "%{client:shortname}" =~
> /eduroam_tlrs/ ) {
> (747) Mon Dec 13 19:08:16 2021: Debug:     EXPAND %{client:shortname}
> (747) Mon Dec 13 19:08:16 2021: Debug:        --> 192.168.254.40/32
> (747) Mon Dec 13 19:08:16 2021: Debug:     if ( "%{client:shortname}" =~
> /eduroam_tlrs/ )  -> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:     policy filter_username {
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (&User-Name) {
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (&User-Name)  -> TRUE
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (&User-Name)  {
> (747) Mon Dec 13 19:08:16 2021: Debug:         if (&User-Name =~ / /) {
> (747) Mon Dec 13 19:08:16 2021: Debug:         if (&User-Name =~ / /)  ->
> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:         if (&User-Name =~ /@[^@]*@/
> ) {
> (747) Mon Dec 13 19:08:16 2021: Debug:         if (&User-Name =~ /@[^@]*@/
> )  -> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:         if (&User-Name =~ /\.\./ ) {
> (747) Mon Dec 13 19:08:16 2021: Debug:         if (&User-Name =~ /\.\./ )
>  -> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:         if ((&User-Name =~ /@/) &&
> (&User-Name !~ /@(.+)\.(.+)$/))  {
> (747) Mon Dec 13 19:08:16 2021: Debug:         if ((&User-Name =~ /@/) &&
> (&User-Name !~ /@(.+)\.(.+)$/))   -> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:         if (&User-Name =~ /\.$/)  {
> (747) Mon Dec 13 19:08:16 2021: Debug:         if (&User-Name =~ /\.$/)
> -> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:         if (&User-Name =~ /@\./)  {
> (747) Mon Dec 13 19:08:16 2021: Debug:         if (&User-Name =~ /@\./)
> -> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:       } # if (&User-Name)  = noop
> (747) Mon Dec 13 19:08:16 2021: Debug:     } # policy filter_username =
> noop
> (747) Mon Dec 13 19:08:16 2021: Debug:     policy filter_password {
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (&User-Password &&
> (&User-Password != "%{string:User-Password}")) {
> (747) Mon Dec 13 19:08:16 2021: Debug:       EXPAND %{string:User-Password}
> (747) Mon Dec 13 19:08:16 2021: Debug:          --> cleartextpassword
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (&User-Password &&
> (&User-Password != "%{string:User-Password}"))  -> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:     } # policy filter_password =
> noop
> (747) Mon Dec 13 19:08:16 2021: Debug:     [preprocess] = ok
> (747) Mon Dec 13 19:08:16 2021: Debug:     [mschap] = noop
> (747) Mon Dec 13 19:08:16 2021: Debug: suffix: Checking for suffix after
> "@"
> (747) Mon Dec 13 19:08:16 2021: Debug: suffix: No '@' in User-Name =
> "testuser123", skipping NULL due to config.
> (747) Mon Dec 13 19:08:16 2021: Debug:     [suffix] = noop
> (747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: Checking for prefix
> before "\"
> (747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: No '\' in User-Name =
> "testuser123", looking up realm NULL
> (747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: Found realm "null"
> (747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: Adding Stripped-User-Name
> = "testuser123"
> (747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: Adding Realm = "null"
> (747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: Authentication realm is
> LOCAL
> (747) Mon Dec 13 19:08:16 2021: Debug:     [ntdomain] = ok
> (747) Mon Dec 13 19:08:16 2021: Debug: eap: No EAP-Message, not doing EAP
> (747) Mon Dec 13 19:08:16 2021: Debug:     [eap] = noop
> (747) Mon Dec 13 19:08:16 2021: Debug:     if ( !EAP-Message &&
> "%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP") {
> (747) Mon Dec 13 19:08:16 2021: Debug:     EXPAND
> %{%{Control:Auth-type}:-No-MS_CHAP}
> (747) Mon Dec 13 19:08:16 2021: Debug:        --> No-MS_CHAP
> (747) Mon Dec 13 19:08:16 2021: Debug:     if ( !EAP-Message &&
> "%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP")  -> TRUE
> (747) Mon Dec 13 19:08:16 2021: Debug:     if ( !EAP-Message &&
> "%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP")  {
> (747) Mon Dec 13 19:08:16 2021: Debug:       update {
> (747) Mon Dec 13 19:08:16 2021: Debug:       } # update = noop
> (747) Mon Dec 13 19:08:16 2021: Debug:     } # if ( !EAP-Message &&
> "%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP")  = noop
> (747) Mon Dec 13 19:08:16 2021: Debug:     if (Control:Auth-type ==
> "MS-CHAP") {
> (747) Mon Dec 13 19:08:16 2021: Debug:     if (Control:Auth-type ==
> "MS-CHAP")  -> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:     policy
> packetfence-eap-mac-policy {
> (747) Mon Dec 13 19:08:16 2021: Debug:       if ( &EAP-Type ) {
> (747) Mon Dec 13 19:08:16 2021: Debug:       if ( &EAP-Type )  -> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:       [noop] = noop
> (747) Mon Dec 13 19:08:16 2021: Debug:     } # policy
> packetfence-eap-mac-policy = noop
> (747) Mon Dec 13 19:08:16 2021: WARNING: pap:
> !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
> (747) Mon Dec 13 19:08:16 2021: WARNING: pap: !!! Ignoring
> control:User-Password.  Update your        !!!
> (747) Mon Dec 13 19:08:16 2021: WARNING: pap: !!! configuration so that
> the "known good" clear text !!!
> (747) Mon Dec 13 19:08:16 2021: WARNING: pap: !!! password is in
> Cleartext-Password and NOT in        !!!
> (747) Mon Dec 13 19:08:16 2021: WARNING: pap: !!! User-Password.
>                            !!!
> (747) Mon Dec 13 19:08:16 2021: WARNING: pap:
> !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
> (747) Mon Dec 13 19:08:16 2021: WARNING: pap: Auth-Type already set.  Not
> setting to PAP
> (747) Mon Dec 13 19:08:16 2021: Debug:     [pap] = noop
> (747) Mon Dec 13 19:08:16 2021: Debug:   } # authorize = ok
> (747) Mon Dec 13 19:08:16 2021: Debug: Found Auth-Type = Accept
> (747) Mon Dec 13 19:08:16 2021: Debug: Auth-Type = Accept, accepting the
> user
> (747) Mon Dec 13 19:08:16 2021: Debug: # Executing section post-auth from
> file /usr/local/pf/raddb/sites-enabled/packetfence
> (747) Mon Dec 13 19:08:16 2021: Debug:   post-auth {
> (747) Mon Dec 13 19:08:16 2021: Debug:     update {
> (747) Mon Dec 13 19:08:16 2021: Debug:       EXPAND
> %{Packet-Src-IP-Address}
> (747) Mon Dec 13 19:08:16 2021: Debug:          --> 192.168.254.40
> (747) Mon Dec 13 19:08:16 2021: Debug:       EXPAND
> %{Packet-Dst-IP-Address}
> (747) Mon Dec 13 19:08:16 2021: Debug:          --> 192.168.197.90
> (747) Mon Dec 13 19:08:16 2021: Debug:     } # update = noop
> (747) Mon Dec 13 19:08:16 2021: Debug:     policy
> packetfence-set-tenant-id {
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (!NAS-IP-Address ||
> NAS-IP-Address == "0.0.0.0"){
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (!NAS-IP-Address ||
> NAS-IP-Address == "0.0.0.0") -> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
> (747) Mon Dec 13 19:08:16 2021: Debug:       EXPAND
> %{%{control:PacketFence-Tenant-Id}:-0}
> (747) Mon Dec 13 19:08:16 2021: Debug:          --> 1
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (
> &control:PacketFence-Tenant-Id == 0 ) {
> (747) Mon Dec 13 19:08:16 2021: Debug:       if (
> &control:PacketFence-Tenant-Id == 0 )  -> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:     } # policy
> packetfence-set-tenant-id = noop
> (747) Mon Dec 13 19:08:16 2021: Debug:     if
> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") {
> (747) Mon Dec 13 19:08:16 2021: Debug:     EXPAND
> %{%{control:PacketFence-Proxied-From}:-False}
> (747) Mon Dec 13 19:08:16 2021: Debug:        --> False
> (747) Mon Dec 13 19:08:16 2021: Debug:     if
> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True")  -> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:     if (! EAP-Type || (EAP-Type !=
> TTLS  && EAP-Type != PEAP) ) {
> (747) Mon Dec 13 19:08:16 2021: Debug:     if (! EAP-Type || (EAP-Type !=
> TTLS  && EAP-Type != PEAP) )  -> TRUE
> (747) Mon Dec 13 19:08:16 2021: Debug:     if (! EAP-Type || (EAP-Type !=
> TTLS  && EAP-Type != PEAP) )  {
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: Expanding URI components
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: EXPAND http://127.0.0.1:7070
> (747) Mon Dec 13 19:08:16 2021: Debug: rest:    --> http://127.0.0.1:7070
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: EXPAND //radius/rest/authorize
> (747) Mon Dec 13 19:08:16 2021: Debug: rest:    --> //radius/rest/authorize
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: Sending HTTP POST to "
> http://127.0.0.1:7070//radius/rest/authorize";
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute "User-Name"
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
> "User-Password"
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
> "NAS-IP-Address"
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute "NAS-Port"
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
> "NAS-Port-Type"
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
> "Event-Timestamp"
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
> "NAS-Port-Id"
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
> "Stripped-User-Name"
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute "Realm"
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
> "SQL-User-Name"
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
> "FreeRADIUS-Client-IP-Address"
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
> "PacketFence-KeyBalanced"
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
> "PacketFence-Radius-Ip"
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: Processing response header
> (747) Mon Dec 13 19:08:16 2021: Debug: rest:   Status : 200 (OK)
> (747) Mon Dec 13 19:08:16 2021: Debug: rest:   Type   : json
> (application/json)
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: Adding
> reply:REST-HTTP-Status-Code += "200"
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: Parsing attribute
> "Reply-Message"
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: EXPAND Switch enable access
> granted by PacketFence
> (747) Mon Dec 13 19:08:16 2021: Debug: rest:    --> Switch enable access
> granted by PacketFence
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: Reply-Message := "Switch
> enable access granted by PacketFence"
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: Parsing attribute
> "control:PacketFence-Authorization-Status"
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: EXPAND allow
> (747) Mon Dec 13 19:08:16 2021: Debug: rest:    --> allow
> (747) Mon Dec 13 19:08:16 2021: Debug: rest:
> PacketFence-Authorization-Status := "allow"
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: Parsing attribute
> "Cisco-AVPair"
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: EXPAND shell:priv-lvl=15
> (747) Mon Dec 13 19:08:16 2021: Debug: rest:    --> shell:priv-lvl=15
> (747) Mon Dec 13 19:08:16 2021: Debug: rest: Cisco-AVPair :=
> "shell:priv-lvl=15"
> (747) Mon Dec 13 19:08:16 2021: Debug:       [rest] = updated
> (747) Mon Dec 13 19:08:16 2021: Debug:       update {
> (747) Mon Dec 13 19:08:16 2021: Debug:       } # update = noop
> (747) Mon Dec 13 19:08:16 2021: Debug:       if
> ("%{%{control:PacketFence-Authorization-Status}:-Allow}" == "deny") {
> (747) Mon Dec 13 19:08:16 2021: Debug:       EXPAND
> %{%{control:PacketFence-Authorization-Status}:-Allow}
> (747) Mon Dec 13 19:08:16 2021: Debug:          --> allow
> (747) Mon Dec 13 19:08:16 2021: Debug:       if
> ("%{%{control:PacketFence-Authorization-Status}:-Allow}" == "deny")  ->
> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:       else {
> (747) Mon Dec 13 19:08:16 2021: Debug:         policy
> packetfence-audit-log-accept {
> (747) Mon Dec 13 19:08:16 2021: Debug:           if (&User-Name &&
> (&User-Name == "dummy")) {
> (747) Mon Dec 13 19:08:16 2021: Debug:           if (&User-Name &&
> (&User-Name == "dummy"))  -> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:           else {
> (747) Mon Dec 13 19:08:16 2021: Debug:             policy request-timing {
> (747) Mon Dec 13 19:08:16 2021: Debug:               if
> ("%{%{control:PacketFence-Request-Time}:-0}" != 0) {
> (747) Mon Dec 13 19:08:16 2021: Debug:               EXPAND
> %{%{control:PacketFence-Request-Time}:-0}
> (747) Mon Dec 13 19:08:16 2021: Debug:                  --> 0
> (747) Mon Dec 13 19:08:16 2021: Debug:               if
> ("%{%{control:PacketFence-Request-Time}:-0}" != 0)  -> FALSE
> (747) Mon Dec 13 19:08:16 2021: Debug:             } # policy
> request-timing = updated
> (747) Mon Dec 13 19:08:16 2021: Debug: sql: EXPAND type.accept.query
> (747) Mon Dec 13 19:08:16 2021: Debug: sql:    --> type.accept.query
> (747) Mon Dec 13 19:08:16 2021: Debug: sql: Using query template 'query'
> (747) Mon Dec 13 19:08:16 2021: Debug: sql: EXPAND %{User-Name}
> (747) Mon Dec 13 19:08:16 2021: Debug: sql:    --> testuser123
> (747) Mon Dec 13 19:08:16 2021: Debug: sql: SQL-User-Name set to
> 'testuser123'
> (747) Mon Dec 13 19:08:16 2021: Debug: sql: EXPAND INSERT INTO
> radius_audit_log               ( mac, ip, computer_name, user_name,
>        stripped_user_name,  realm, event_type,                switch_id,
> switch_mac, switch_ip_address,                radius_source_ip_address,
> called_station_id, calling_station_id,                nas_port_type, ssid,
> nas_port_id,                ifindex, nas_port, connection_type,
>    nas_ip_address, nas_identifier, auth_status,                reason,
> auth_type, eap_type,                role, node_status, profile,
>    source, auto_reg, is_phone,                pf_domain, uuid,
> radius_request,                radius_reply, request_time, tenant_id,
> radius_ip)              VALUES               (
> '%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}',
> '%{%{control:PacketFence-Computer-Name}:-N/A}', '%{request:User-Name}',
>            '%{request:Stripped-User-Name}', '%{request:Realm}',
> 'Radius-Access-Request',
>  '%{%{control:PacketFence-Switch-Id}:-N/A}',
> '%{%{control:PacketFence-Switch-Mac}:-N/A}',
> '%{%{control:PacketFence-Switch-Ip-Address}:-N/A}',
>  '%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}',
> '%{request:Calling-Station-Id}',                '%{request:NAS-Port-Type}',
> '%{request:Called-Station-SSID}', '%{request:NAS-Port-Id}',
>  '%{%{control:PacketFence-IfIndex}:-N/A}', '%{request:NAS-Port}',
> '%{%{control:PacketFence-Connection-Type}:-N/A}',
>  '%{request:NAS-IP-Address}', '%{request:NAS-Identifier}', 'Accept',
>          '%{request:Module-Failure-Message}', '%{control:Auth-Type}',
> '%{request:EAP-Type}',
>  '%{%{control:PacketFence-Role}:-N/A}',
> '%{%{control:PacketFence-Status}:-N/A}',
> '%{%{control:PacketFence-Profile}:-N/A}',
>  '%{%{control:PacketFence-Source}:-N/A}',
> '%{%{control:PacketFence-AutoReg}:-0}',
> '%{%{control:PacketFence-IsPhone}:-0}',
>  '%{request:PacketFence-Domain}', '',
> '%{pairs:&request:[*]}','%{pairs:&reply:[*]}',
> '%{control:PacketFence-Request-Time}', '%{control:PacketFence-Tenant-Id}',
> '%{request:PacketFence-Radius-Ip}')
> (747) Mon Dec 13 19:08:16 2021: Debug: sql:    --> INSERT INTO
> radius_audit_log               ( mac, ip, computer_name, user_name,
>        stripped_user_name,  realm, event_type,                switch_id,
> switch_mac, switch_ip_address,                radius_source_ip_address,
> called_station_id, calling_station_id,                nas_port_type, ssid,
> nas_port_id,                ifindex, nas_port, connection_type,
>    nas_ip_address, nas_identifier, auth_status,                reason,
> auth_type, eap_type,                role, node_status, profile,
>    source, auto_reg, is_phone,                pf_domain, uuid,
> radius_request,                radius_reply, request_time, tenant_id,
> radius_ip)              VALUES               ( '', '', 'N/A',
> 'testuser123',                'testuser123', 'null',
> 'Radius-Access-Request',                'N/A', 'N/A', 'N/A',
>  '192.168.254.40', '', '',                'Virtual', '', 'tty2',
>      'N/A', '2', 'N/A',                '192.168.254.40', '', 'Accept',
>            '', 'Accept', '',                'N/A', 'N/A', 'N/A',
>      'N/A', '0', '0',                '', '', 'User-Name =3D
> =22testuser123=22, User-Password =3D =22=2A=2A=2A=2A=2A=2A=22,
> NAS-IP-Address =3D 192.168.254.40, NAS-Port =3D 2, NAS-Port-Type =3D
> Virtual, Event-Timestamp =3D =22Dec 13 2021 19:08:16 =2B04=22, NAS-Port-Id
> =3D =22tty2=22, Stripped-User-Name =3D =22testuser123=22, Realm =3D
> =22null=22, FreeRADIUS-Client-IP-Address =3D 192.168.254.40,
> PacketFence-KeyBalanced =3D =227674cdd55c6099b093d1b9dcdda01825=22,
> PacketFence-Radius-Ip =3D =22192.168.197.90=22, SQL-User-Name =3D
> =22testuser123=22','REST-HTTP-Status-Code =3D 200, Reply-Message =3D
> =22Switch enable access granted by PacketFence=22, Cisco-AVPair =3D
> =22shell:priv-lvl=3D15=22', '0', '1', '192.168.197.90')
> (747) Mon Dec 13 19:08:16 2021: Debug: sql: Executing query: INSERT INTO
> radius_audit_log               ( mac, ip, computer_name, user_name,
>        stripped_user_name,  realm, event_type,                switch_id,
> switch_mac, switch_ip_address,                radius_source_ip_address,
> called_station_id, calling_station_id,                nas_port_type, ssid,
> nas_port_id,                ifindex, nas_port, connection_type,
>    nas_ip_address, nas_identifier, auth_status,                reason,
> auth_type, eap_type,                role, node_status, profile,
>    source, auto_reg, is_phone,                pf_domain, uuid,
> radius_request,                radius_reply, request_time, tenant_id,
> radius_ip)              VALUES               ( '', '', 'N/A',
> 'testuser123',                'testuser123', 'null',
> 'Radius-Access-Request',                'N/A', 'N/A', 'N/A',
>  '192.168.254.40', '', '',                'Virtual', '', 'tty2',
>      'N/A', '2', 'N/A',                '192.168.254.40', '', 'Accept',
>            '', 'Accept', '',                'N/A', 'N/A', 'N/A',
>      'N/A', '0', '0',                '', '', 'User-Name =3D
> =22testuser123=22, User-Password =3D =22=2A=2A=2A=2A=2A=2A=22,
> NAS-IP-Address =3D 192.168.254.40, NAS-Port =3D 2, NAS-Port-Type =3D
> Virtual, Event-Timestamp =3D =22Dec 13 2021 19:08:16 =2B04=22, NAS-Port-Id
> =3D =22tty2=22, Stripped-User-Name =3D =22testuser123=22, Realm =3D
> =22null=22, FreeRADIUS-Client-IP-Address =3D 192.168.254.40,
> PacketFence-KeyBalanced =3D =227674cdd55c6099b093d1b9dcdda01825=22,
> PacketFence-Radius-Ip =3D =22192.168.197.90=22, SQL-User-Name =3D
> =22testuser123=22','REST-HTTP-Status-Code =3D 200, Reply-Message =3D
> =22Switch enable access granted by PacketFence=22, Cisco-AVPair =3D
> =22shell:priv-lvl=3D15=22', '0', '1', '192.168.197.90')
> (747) Mon Dec 13 19:08:16 2021: Debug: sql: SQL query returned: success
> (747) Mon Dec 13 19:08:16 2021: Debug: sql: 1 record(s) updated
> (747) Mon Dec 13 19:08:16 2021: Debug:             [sql] = ok
> (747) Mon Dec 13 19:08:16 2021: Debug:           } # else = updated
> (747) Mon Dec 13 19:08:16 2021: Debug:         } # policy
> packetfence-audit-log-accept = updated
> (747) Mon Dec 13 19:08:16 2021: Debug:       } # else = updated
> (747) Mon Dec 13 19:08:16 2021: Debug:     } # if (! EAP-Type || (EAP-Type
> != TTLS  && EAP-Type != PEAP) )  = updated
> (747) Mon Dec 13 19:08:16 2021: Debug: attr_filter.packetfence_post_auth:
> EXPAND %{User-Name}
> (747) Mon Dec 13 19:08:16 2021: Debug: attr_filter.packetfence_post_auth:
>    --> testuser123
> (747) Mon Dec 13 19:08:16 2021: Debug: attr_filter.packetfence_post_auth:
> Matched entry DEFAULT at line 10
> (747) Mon Dec 13 19:08:16 2021: Debug:
> [attr_filter.packetfence_post_auth] = updated
> (747) Mon Dec 13 19:08:16 2021: Debug: linelog: EXPAND
> messages.%{%{reply:Packet-Type}:-default}
> (747) Mon Dec 13 19:08:16 2021: Debug: linelog:    -->
> messages.Access-Accept
> (747) Mon Dec 13 19:08:16 2021: Debug: linelog: EXPAND
> [mac:%{Calling-Station-Id}] Accepted user: %{reply:User-Name} and returned
> VLAN %{reply:Tunnel-Private-Group-ID}
> (747) Mon Dec 13 19:08:16 2021: Debug: linelog:    --> [mac:] Accepted
> user:  and returned VLAN
> (747) Mon Dec 13 19:08:16 2021: Debug:     [linelog] = ok
> (747) Mon Dec 13 19:08:16 2021: Debug:   } # post-auth = updated
> (747) Mon Dec 13 19:08:16 2021: Debug: Sent Access-Accept Id 20 from
> 192.168.197.90:1812 to 192.168.254.40:1645 length 0
> (747) Mon Dec 13 19:08:16 2021: Debug:   Reply-Message = "Switch enable
> access granted by PacketFence"
> (747) Mon Dec 13 19:08:16 2021: Debug:   Cisco-AVPair = "shell:priv-lvl=15"
> (747) Mon Dec 13 19:08:16 2021: Debug: Finished request
> (747) Mon Dec 13 19:08:21 2021: Debug: Cleaning up request packet ID 20
> with timestamp +10956
> (748) Mon Dec 13 19:08:25 2021: Debug: Received Status-Server Id 117 from
> 127.0.0.1:54412 to 127.0.0.1:18121 length 50
> (748) Mon Dec 13 19:08:25 2021: Debug:   Message-Authenticator =
> 0x88a7c5faf457adb7610f55a0941bb0eb
> (748) Mon Dec 13 19:08:25 2021: Debug:   FreeRADIUS-Statistics-Type = 15
> (748) Mon Dec 13 19:08:25 2021: Debug: # Executing group from file
> /usr/local/pf/raddb/sites-enabled/status
> (748) Mon Dec 13 19:08:25 2021: Debug:   Autz-Type Status-Server {
> (748) Mon Dec 13 19:08:25 2021: Debug:     [ok] = ok
> (748) Mon Dec 13 19:08:25 2021: Debug:   } # Autz-Type Status-Server = ok
> (748) Mon Dec 13 19:08:25 2021: Debug: Sent Access-Accept Id 117 from
> 127.0.0.1:18121 to 127.0.0.1:54412 length 0
> (748) Mon Dec 13 19:08:25 2021: Debug:   FreeRADIUS-Total-Access-Requests
> = 749
> (748) Mon Dec 13 19:08:25 2021: Debug:   FreeRADIUS-Total-Access-Accepts =
> 4
> (748) Mon Dec 13 19:08:25 2021: Debug:   FreeRADIUS-Total-Access-Rejects =
> 4
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Access-Challenges = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:   FreeRADIUS-Total-Auth-Responses =
> 8
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Auth-Duplicate-Requests = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Auth-Malformed-Requests = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Auth-Invalid-Requests = 9
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Auth-Dropped-Requests = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Auth-Unknown-Types = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Accounting-Requests = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Accounting-Responses = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Acct-Duplicate-Requests = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Acct-Malformed-Requests = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Acct-Invalid-Requests = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Acct-Dropped-Requests = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Acct-Unknown-Types = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Proxy-Access-Requests = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Proxy-Access-Accepts = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Proxy-Access-Rejects = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Proxy-Access-Challenges = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Proxy-Auth-Responses = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Proxy-Accounting-Requests = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Proxy-Accounting-Responses = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
> (748) Mon Dec 13 19:08:25 2021: Debug:
> FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
> (748) Mon Dec 13 19:08:25 2021: Debug: Finished request
> (748) Mon Dec 13 19:08:30 2021: Debug: Cleaning up request packet ID 117
> with timestamp +10965
> (749) Mon Dec 13 19:08:40 2021: Debug: Received Status-Server Id 39 from
> 127.0.0.1:34233 to 127.0.0.1:18121 length 50
> (749) Mon Dec 13 19:08:40 2021: Debug:   Message-Authenticator =
> 0xdab43050a96590f4e4e456daf538da6e
> (749) Mon Dec 13 19:08:40 2021: Debug:   FreeRADIUS-Statistics-Type = 15
> (749) Mon Dec 13 19:08:40 2021: Debug: # Executing group from file
> /usr/local/pf/raddb/sites-enabled/status
> (749) Mon Dec 13 19:08:40 2021: Debug:   Autz-Type Status-Server {
> (749) Mon Dec 13 19:08:40 2021: Debug:     [ok] = ok
> (749) Mon Dec 13 19:08:40 2021: Debug:   } # Autz-Type Status-Server = ok
> (749) Mon Dec 13 19:08:40 2021: Debug: Sent Access-Accept Id 39 from
> 127.0.0.1:18121 to 127.0.0.1:34233 length 0
> (749) Mon Dec 13 19:08:40 2021: Debug:   FreeRADIUS-Total-Access-Requests
> = 750
> (749) Mon Dec 13 19:08:40 2021: Debug:   FreeRADIUS-Total-Access-Accepts =
> 4
> (749) Mon Dec 13 19:08:40 2021: Debug:   FreeRADIUS-Total-Access-Rejects =
> 4
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Access-Challenges = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:   FreeRADIUS-Total-Auth-Responses =
> 8
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Auth-Duplicate-Requests = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Auth-Malformed-Requests = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Auth-Invalid-Requests = 9
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Auth-Dropped-Requests = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Auth-Unknown-Types = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Accounting-Requests = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Accounting-Responses = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Acct-Duplicate-Requests = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Acct-Malformed-Requests = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Acct-Invalid-Requests = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Acct-Dropped-Requests = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Acct-Unknown-Types = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Proxy-Access-Requests = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Proxy-Access-Accepts = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Proxy-Access-Rejects = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Proxy-Access-Challenges = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Proxy-Auth-Responses = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Proxy-Accounting-Requests = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Proxy-Accounting-Responses = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
> (749) Mon Dec 13 19:08:40 2021: Debug:
> FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
> (749) Mon Dec 13 19:08:40 2021: Debug: Finished request
> (749) Mon Dec 13 19:08:45 2021: Debug: Cleaning up request packet ID 39
> with timestamp +10980
> (750) Mon Dec 13 19:08:55 2021: Debug: Received Status-Server Id 237 from
> 127.0.0.1:33232 to 127.0.0.1:18121 length 50
> (750) Mon Dec 13 19:08:55 2021: Debug:   Message-Authenticator =
> 0x0b84e6e16a6fdb6dba18c9c76ffdd204
> (750) Mon Dec 13 19:08:55 2021: Debug:   FreeRADIUS-Statistics-Type = 15
> (750) Mon Dec 13 19:08:55 2021: Debug: # Executing group from file
> /usr/local/pf/raddb/sites-enabled/status
> (750) Mon Dec 13 19:08:55 2021: Debug:   Autz-Type Status-Server {
> (750) Mon Dec 13 19:08:55 2021: Debug:     [ok] = ok
> (750) Mon Dec 13 19:08:55 2021: Debug:   } # Autz-Type Status-Server = ok
> (750) Mon Dec 13 19:08:55 2021: Debug: Sent Access-Accept Id 237 from
> 127.0.0.1:18121 to 127.0.0.1:33232 length 0
> (750) Mon Dec 13 19:08:55 2021: Debug:   FreeRADIUS-Total-Access-Requests
> = 751
> (750) Mon Dec 13 19:08:55 2021: Debug:   FreeRADIUS-Total-Access-Accepts =
> 4
> (750) Mon Dec 13 19:08:55 2021: Debug:   FreeRADIUS-Total-Access-Rejects =
> 4
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Access-Challenges = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:   FreeRADIUS-Total-Auth-Responses =
> 8
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Auth-Duplicate-Requests = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Auth-Malformed-Requests = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Auth-Invalid-Requests = 9
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Auth-Dropped-Requests = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Auth-Unknown-Types = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Accounting-Requests = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Accounting-Responses = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Acct-Duplicate-Requests = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Acct-Malformed-Requests = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Acct-Invalid-Requests = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Acct-Dropped-Requests = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Acct-Unknown-Types = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Proxy-Access-Requests = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Proxy-Access-Accepts = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Proxy-Access-Rejects = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Proxy-Access-Challenges = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Proxy-Auth-Responses = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Proxy-Accounting-Requests = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Proxy-Accounting-Responses = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
> (750) Mon Dec 13 19:08:55 2021: Debug:
> FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
> (750) Mon Dec 13 19:08:55 2021: Debug: Finished request
>
> Regards
> Misbah
>
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to