Just to share heads up. I was able to fix this issue by disabling the enable command, below is how my aaa config looks like.
aaa authentication login default local group NAC-Packetfence aaa authentication login console group NAC-Packetfence *aaa authentication enable default none* aaa authentication dot1x default group NAC-Packetfence aaa authorization network default group NAC-Packetfence aaa accounting dot1x default start-stop group NAC-Packetfence aaa server radius dynamic-author client 192.168.197.90 server-key 7 113A163153020A5533 port 3799 ! ! radius server NAC1 address ipv4 192.168.197.90 auth-port 1812 acct-port 1813 key 7 046804324B314D1733 ! ! aaa group server radius NAC-Packetfence server name NAC1 deadtime 1 ! ! ! aaa new-model aaa session-id common Regards Misbah On Mon, 13 Dec 2021 at 19:29, Misbah Hussaini <misbhaud...@gmail.com> wrote: > Hello, > > I'm trying to configure CLI access for admins via PF. I'm so far able to > make the admins login to the switch CLI, however when they try to enter > enable mode they receive "% Error in Authentication" message. > > I tried and checked the radius.log which shows a successful > authentication. I have also enabled the checkbox on the switch config to > allow cli access. I understand that I need to send Cisco-AVPair for > privileged access to work but dunno where it is set. > > Can someone pls help to grant the enable mode access on the switch via PF > Freeradius. > > Below is the log from raddebug. > > (747) Mon Dec 13 19:08:16 2021: Debug: Received Access-Request Id 20 from > 10.141.254.40:1645 to 192.168.197.90:1812 length 81 > (747) Mon Dec 13 19:08:16 2021: Debug: User-Name = "testuser123" > (747) Mon Dec 13 19:08:16 2021: Debug: User-Password = > "cleartextpassword" > (747) Mon Dec 13 19:08:16 2021: Debug: NAS-Port = 2 > (747) Mon Dec 13 19:08:16 2021: Debug: NAS-Port-Id = "tty2" > (747) Mon Dec 13 19:08:16 2021: Debug: NAS-Port-Type = Virtual > (747) Mon Dec 13 19:08:16 2021: Debug: NAS-IP-Address = 192.168.254.40 > (747) Mon Dec 13 19:08:16 2021: Debug: # Executing section authorize from > file /usr/local/pf/raddb/sites-enabled/packetfence > (747) Mon Dec 13 19:08:16 2021: Debug: authorize { > (747) Mon Dec 13 19:08:16 2021: Debug: policy > packetfence-nas-ip-address { > (747) Mon Dec 13 19:08:16 2021: Debug: if (!NAS-IP-Address || > NAS-IP-Address == "0.0.0.0"){ > (747) Mon Dec 13 19:08:16 2021: Debug: if (!NAS-IP-Address || > NAS-IP-Address == "0.0.0.0") -> FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: } # policy > packetfence-nas-ip-address = notfound > (747) Mon Dec 13 19:08:16 2021: Debug: update { > (747) Mon Dec 13 19:08:16 2021: Debug: EXPAND > %{Packet-Src-IP-Address} > (747) Mon Dec 13 19:08:16 2021: Debug: --> 192.168.254.40 > (747) Mon Dec 13 19:08:16 2021: Debug: EXPAND > %{Packet-Dst-IP-Address} > (747) Mon Dec 13 19:08:16 2021: Debug: --> 192.168.197.90 > (747) Mon Dec 13 19:08:16 2021: Debug: EXPAND %l > (747) Mon Dec 13 19:08:16 2021: Debug: --> 1639408096 > (747) Mon Dec 13 19:08:16 2021: Debug: } # update = noop > (747) Mon Dec 13 19:08:16 2021: Debug: policy > packetfence-set-realm-if-machine { > (747) Mon Dec 13 19:08:16 2021: Debug: if (User-Name =~ > /host\/([a-z0-9_-]*)[\.](.*)/i) { > (747) Mon Dec 13 19:08:16 2021: Debug: if (User-Name =~ > /host\/([a-z0-9_-]*)[\.](.*)/i) -> FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: } # policy > packetfence-set-realm-if-machine = noop > (747) Mon Dec 13 19:08:16 2021: Debug: policy > packetfence-balanced-key-policy { > (747) Mon Dec 13 19:08:16 2021: Debug: if (&PacketFence-KeyBalanced > && (&PacketFence-KeyBalanced =~ /^(.*)(.)$/i)) { > (747) Mon Dec 13 19:08:16 2021: Debug: if (&PacketFence-KeyBalanced > && (&PacketFence-KeyBalanced =~ /^(.*)(.)$/i)) -> FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: else { > (747) Mon Dec 13 19:08:16 2021: Debug: update { > (747) Mon Dec 13 19:08:16 2021: Debug: EXPAND > %{md5:%{Calling-Station-Id}%{User-Name}} > (747) Mon Dec 13 19:08:16 2021: Debug: --> > 7674cdd55c6099b093d1b9dcdda01825 > (747) Mon Dec 13 19:08:16 2021: Debug: EXPAND > %{md5:%{Calling-Station-Id}%{User-Name}} > (747) Mon Dec 13 19:08:16 2021: Debug: --> > 7674cdd55c6099b093d1b9dcdda01825 > (747) Mon Dec 13 19:08:16 2021: Debug: } # update = noop > (747) Mon Dec 13 19:08:16 2021: Debug: } # else = noop > (747) Mon Dec 13 19:08:16 2021: Debug: } # policy > packetfence-balanced-key-policy = noop > (747) Mon Dec 13 19:08:16 2021: Debug: policy > packetfence-set-tenant-id { > (747) Mon Dec 13 19:08:16 2021: Debug: if (!NAS-IP-Address || > NAS-IP-Address == "0.0.0.0"){ > (747) Mon Dec 13 19:08:16 2021: Debug: if (!NAS-IP-Address || > NAS-IP-Address == "0.0.0.0") -> FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: if ( > "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") { > (747) Mon Dec 13 19:08:16 2021: Debug: EXPAND > %{%{control:PacketFence-Tenant-Id}:-0} > (747) Mon Dec 13 19:08:16 2021: Debug: --> 0 > (747) Mon Dec 13 19:08:16 2021: Debug: if ( > "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE > (747) Mon Dec 13 19:08:16 2021: Debug: if ( > "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") { > (747) Mon Dec 13 19:08:16 2021: Debug: update control { > (747) Mon Dec 13 19:08:16 2021: Debug: EXPAND %{User-Name} > (747) Mon Dec 13 19:08:16 2021: Debug: --> testuser123 > (747) Mon Dec 13 19:08:16 2021: Debug: SQL-User-Name set to > 'testuser123' > (747) Mon Dec 13 19:08:16 2021: Debug: Executing select query: > SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = > '192.168.254.40'), 0) > (747) Mon Dec 13 19:08:16 2021: Debug: EXPAND %{sql: SELECT > IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = > '%{NAS-IP-Address}'), 0)} > (747) Mon Dec 13 19:08:16 2021: Debug: --> 1 > (747) Mon Dec 13 19:08:16 2021: Debug: } # update control = noop > (747) Mon Dec 13 19:08:16 2021: Debug: } # if ( > "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop > (747) Mon Dec 13 19:08:16 2021: Debug: if ( > &control:PacketFence-Tenant-Id == 0 ) { > (747) Mon Dec 13 19:08:16 2021: Debug: if ( > &control:PacketFence-Tenant-Id == 0 ) -> FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: } # policy > packetfence-set-tenant-id = noop > (747) Mon Dec 13 19:08:16 2021: Debug: policy > rewrite_calling_station_id { > (747) Mon Dec 13 19:08:16 2021: Debug: if (&Calling-Station-Id && > (&Calling-Station-Id =~ > /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) > { > (747) Mon Dec 13 19:08:16 2021: Debug: if (&Calling-Station-Id && > (&Calling-Station-Id =~ > /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) > -> FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: else { > (747) Mon Dec 13 19:08:16 2021: Debug: [noop] = noop > (747) Mon Dec 13 19:08:16 2021: Debug: } # else = noop > (747) Mon Dec 13 19:08:16 2021: Debug: } # policy > rewrite_calling_station_id = noop > (747) Mon Dec 13 19:08:16 2021: Debug: policy > rewrite_called_station_id { > (747) Mon Dec 13 19:08:16 2021: Debug: if ((&Called-Station-Id) && > (&Called-Station-Id =~ > /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) > { > (747) Mon Dec 13 19:08:16 2021: Debug: if ((&Called-Station-Id) && > (&Called-Station-Id =~ > /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) > -> FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: else { > (747) Mon Dec 13 19:08:16 2021: Debug: [noop] = noop > (747) Mon Dec 13 19:08:16 2021: Debug: } # else = noop > (747) Mon Dec 13 19:08:16 2021: Debug: } # policy > rewrite_called_station_id = noop > (747) Mon Dec 13 19:08:16 2021: Debug: if ( "%{client:shortname}" =~ > /eduroam_tlrs/ ) { > (747) Mon Dec 13 19:08:16 2021: Debug: EXPAND %{client:shortname} > (747) Mon Dec 13 19:08:16 2021: Debug: --> 192.168.254.40/32 > (747) Mon Dec 13 19:08:16 2021: Debug: if ( "%{client:shortname}" =~ > /eduroam_tlrs/ ) -> FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: policy filter_username { > (747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name) { > (747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name) -> TRUE > (747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name) { > (747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name =~ / /) { > (747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name =~ / /) -> > FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name =~ /@[^@]*@/ > ) { > (747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name =~ /@[^@]*@/ > ) -> FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name =~ /\.\./ ) { > (747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name =~ /\.\./ ) > -> FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: if ((&User-Name =~ /@/) && > (&User-Name !~ /@(.+)\.(.+)$/)) { > (747) Mon Dec 13 19:08:16 2021: Debug: if ((&User-Name =~ /@/) && > (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name =~ /\.$/) { > (747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name =~ /\.$/) > -> FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name =~ /@\./) { > (747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name =~ /@\./) > -> FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: } # if (&User-Name) = noop > (747) Mon Dec 13 19:08:16 2021: Debug: } # policy filter_username = > noop > (747) Mon Dec 13 19:08:16 2021: Debug: policy filter_password { > (747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Password && > (&User-Password != "%{string:User-Password}")) { > (747) Mon Dec 13 19:08:16 2021: Debug: EXPAND %{string:User-Password} > (747) Mon Dec 13 19:08:16 2021: Debug: --> cleartextpassword > (747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Password && > (&User-Password != "%{string:User-Password}")) -> FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: } # policy filter_password = > noop > (747) Mon Dec 13 19:08:16 2021: Debug: [preprocess] = ok > (747) Mon Dec 13 19:08:16 2021: Debug: [mschap] = noop > (747) Mon Dec 13 19:08:16 2021: Debug: suffix: Checking for suffix after > "@" > (747) Mon Dec 13 19:08:16 2021: Debug: suffix: No '@' in User-Name = > "testuser123", skipping NULL due to config. > (747) Mon Dec 13 19:08:16 2021: Debug: [suffix] = noop > (747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: Checking for prefix > before "\" > (747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: No '\' in User-Name = > "testuser123", looking up realm NULL > (747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: Found realm "null" > (747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: Adding Stripped-User-Name > = "testuser123" > (747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: Adding Realm = "null" > (747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: Authentication realm is > LOCAL > (747) Mon Dec 13 19:08:16 2021: Debug: [ntdomain] = ok > (747) Mon Dec 13 19:08:16 2021: Debug: eap: No EAP-Message, not doing EAP > (747) Mon Dec 13 19:08:16 2021: Debug: [eap] = noop > (747) Mon Dec 13 19:08:16 2021: Debug: if ( !EAP-Message && > "%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP") { > (747) Mon Dec 13 19:08:16 2021: Debug: EXPAND > %{%{Control:Auth-type}:-No-MS_CHAP} > (747) Mon Dec 13 19:08:16 2021: Debug: --> No-MS_CHAP > (747) Mon Dec 13 19:08:16 2021: Debug: if ( !EAP-Message && > "%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP") -> TRUE > (747) Mon Dec 13 19:08:16 2021: Debug: if ( !EAP-Message && > "%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP") { > (747) Mon Dec 13 19:08:16 2021: Debug: update { > (747) Mon Dec 13 19:08:16 2021: Debug: } # update = noop > (747) Mon Dec 13 19:08:16 2021: Debug: } # if ( !EAP-Message && > "%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP") = noop > (747) Mon Dec 13 19:08:16 2021: Debug: if (Control:Auth-type == > "MS-CHAP") { > (747) Mon Dec 13 19:08:16 2021: Debug: if (Control:Auth-type == > "MS-CHAP") -> FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: policy > packetfence-eap-mac-policy { > (747) Mon Dec 13 19:08:16 2021: Debug: if ( &EAP-Type ) { > (747) Mon Dec 13 19:08:16 2021: Debug: if ( &EAP-Type ) -> FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: [noop] = noop > (747) Mon Dec 13 19:08:16 2021: Debug: } # policy > packetfence-eap-mac-policy = noop > (747) Mon Dec 13 19:08:16 2021: WARNING: pap: > !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! > (747) Mon Dec 13 19:08:16 2021: WARNING: pap: !!! Ignoring > control:User-Password. Update your !!! > (747) Mon Dec 13 19:08:16 2021: WARNING: pap: !!! configuration so that > the "known good" clear text !!! > (747) Mon Dec 13 19:08:16 2021: WARNING: pap: !!! password is in > Cleartext-Password and NOT in !!! > (747) Mon Dec 13 19:08:16 2021: WARNING: pap: !!! User-Password. > !!! > (747) Mon Dec 13 19:08:16 2021: WARNING: pap: > !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! > (747) Mon Dec 13 19:08:16 2021: WARNING: pap: Auth-Type already set. Not > setting to PAP > (747) Mon Dec 13 19:08:16 2021: Debug: [pap] = noop > (747) Mon Dec 13 19:08:16 2021: Debug: } # authorize = ok > (747) Mon Dec 13 19:08:16 2021: Debug: Found Auth-Type = Accept > (747) Mon Dec 13 19:08:16 2021: Debug: Auth-Type = Accept, accepting the > user > (747) Mon Dec 13 19:08:16 2021: Debug: # Executing section post-auth from > file /usr/local/pf/raddb/sites-enabled/packetfence > (747) Mon Dec 13 19:08:16 2021: Debug: post-auth { > (747) Mon Dec 13 19:08:16 2021: Debug: update { > (747) Mon Dec 13 19:08:16 2021: Debug: EXPAND > %{Packet-Src-IP-Address} > (747) Mon Dec 13 19:08:16 2021: Debug: --> 192.168.254.40 > (747) Mon Dec 13 19:08:16 2021: Debug: EXPAND > %{Packet-Dst-IP-Address} > (747) Mon Dec 13 19:08:16 2021: Debug: --> 192.168.197.90 > (747) Mon Dec 13 19:08:16 2021: Debug: } # update = noop > (747) Mon Dec 13 19:08:16 2021: Debug: policy > packetfence-set-tenant-id { > (747) Mon Dec 13 19:08:16 2021: Debug: if (!NAS-IP-Address || > NAS-IP-Address == "0.0.0.0"){ > (747) Mon Dec 13 19:08:16 2021: Debug: if (!NAS-IP-Address || > NAS-IP-Address == "0.0.0.0") -> FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: if ( > "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") { > (747) Mon Dec 13 19:08:16 2021: Debug: EXPAND > %{%{control:PacketFence-Tenant-Id}:-0} > (747) Mon Dec 13 19:08:16 2021: Debug: --> 1 > (747) Mon Dec 13 19:08:16 2021: Debug: if ( > "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: if ( > &control:PacketFence-Tenant-Id == 0 ) { > (747) Mon Dec 13 19:08:16 2021: Debug: if ( > &control:PacketFence-Tenant-Id == 0 ) -> FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: } # policy > packetfence-set-tenant-id = noop > (747) Mon Dec 13 19:08:16 2021: Debug: if > ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") { > (747) Mon Dec 13 19:08:16 2021: Debug: EXPAND > %{%{control:PacketFence-Proxied-From}:-False} > (747) Mon Dec 13 19:08:16 2021: Debug: --> False > (747) Mon Dec 13 19:08:16 2021: Debug: if > ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") -> FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: if (! EAP-Type || (EAP-Type != > TTLS && EAP-Type != PEAP) ) { > (747) Mon Dec 13 19:08:16 2021: Debug: if (! EAP-Type || (EAP-Type != > TTLS && EAP-Type != PEAP) ) -> TRUE > (747) Mon Dec 13 19:08:16 2021: Debug: if (! EAP-Type || (EAP-Type != > TTLS && EAP-Type != PEAP) ) { > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Expanding URI components > (747) Mon Dec 13 19:08:16 2021: Debug: rest: EXPAND http://127.0.0.1:7070 > (747) Mon Dec 13 19:08:16 2021: Debug: rest: --> http://127.0.0.1:7070 > (747) Mon Dec 13 19:08:16 2021: Debug: rest: EXPAND //radius/rest/authorize > (747) Mon Dec 13 19:08:16 2021: Debug: rest: --> //radius/rest/authorize > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Sending HTTP POST to " > http://127.0.0.1:7070//radius/rest/authorize" > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute "User-Name" > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute > "User-Password" > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute > "NAS-IP-Address" > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute "NAS-Port" > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute > "NAS-Port-Type" > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute > "Event-Timestamp" > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute > "NAS-Port-Id" > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute > "Stripped-User-Name" > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute "Realm" > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute > "SQL-User-Name" > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute > "FreeRADIUS-Client-IP-Address" > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute > "PacketFence-KeyBalanced" > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute > "PacketFence-Radius-Ip" > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Processing response header > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Status : 200 (OK) > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Type : json > (application/json) > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Adding > reply:REST-HTTP-Status-Code += "200" > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Parsing attribute > "Reply-Message" > (747) Mon Dec 13 19:08:16 2021: Debug: rest: EXPAND Switch enable access > granted by PacketFence > (747) Mon Dec 13 19:08:16 2021: Debug: rest: --> Switch enable access > granted by PacketFence > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Reply-Message := "Switch > enable access granted by PacketFence" > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Parsing attribute > "control:PacketFence-Authorization-Status" > (747) Mon Dec 13 19:08:16 2021: Debug: rest: EXPAND allow > (747) Mon Dec 13 19:08:16 2021: Debug: rest: --> allow > (747) Mon Dec 13 19:08:16 2021: Debug: rest: > PacketFence-Authorization-Status := "allow" > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Parsing attribute > "Cisco-AVPair" > (747) Mon Dec 13 19:08:16 2021: Debug: rest: EXPAND shell:priv-lvl=15 > (747) Mon Dec 13 19:08:16 2021: Debug: rest: --> shell:priv-lvl=15 > (747) Mon Dec 13 19:08:16 2021: Debug: rest: Cisco-AVPair := > "shell:priv-lvl=15" > (747) Mon Dec 13 19:08:16 2021: Debug: [rest] = updated > (747) Mon Dec 13 19:08:16 2021: Debug: update { > (747) Mon Dec 13 19:08:16 2021: Debug: } # update = noop > (747) Mon Dec 13 19:08:16 2021: Debug: if > ("%{%{control:PacketFence-Authorization-Status}:-Allow}" == "deny") { > (747) Mon Dec 13 19:08:16 2021: Debug: EXPAND > %{%{control:PacketFence-Authorization-Status}:-Allow} > (747) Mon Dec 13 19:08:16 2021: Debug: --> allow > (747) Mon Dec 13 19:08:16 2021: Debug: if > ("%{%{control:PacketFence-Authorization-Status}:-Allow}" == "deny") -> > FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: else { > (747) Mon Dec 13 19:08:16 2021: Debug: policy > packetfence-audit-log-accept { > (747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name && > (&User-Name == "dummy")) { > (747) Mon Dec 13 19:08:16 2021: Debug: if (&User-Name && > (&User-Name == "dummy")) -> FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: else { > (747) Mon Dec 13 19:08:16 2021: Debug: policy request-timing { > (747) Mon Dec 13 19:08:16 2021: Debug: if > ("%{%{control:PacketFence-Request-Time}:-0}" != 0) { > (747) Mon Dec 13 19:08:16 2021: Debug: EXPAND > %{%{control:PacketFence-Request-Time}:-0} > (747) Mon Dec 13 19:08:16 2021: Debug: --> 0 > (747) Mon Dec 13 19:08:16 2021: Debug: if > ("%{%{control:PacketFence-Request-Time}:-0}" != 0) -> FALSE > (747) Mon Dec 13 19:08:16 2021: Debug: } # policy > request-timing = updated > (747) Mon Dec 13 19:08:16 2021: Debug: sql: EXPAND type.accept.query > (747) Mon Dec 13 19:08:16 2021: Debug: sql: --> type.accept.query > (747) Mon Dec 13 19:08:16 2021: Debug: sql: Using query template 'query' > (747) Mon Dec 13 19:08:16 2021: Debug: sql: EXPAND %{User-Name} > (747) Mon Dec 13 19:08:16 2021: Debug: sql: --> testuser123 > (747) Mon Dec 13 19:08:16 2021: Debug: sql: SQL-User-Name set to > 'testuser123' > (747) Mon Dec 13 19:08:16 2021: Debug: sql: EXPAND INSERT INTO > radius_audit_log ( mac, ip, computer_name, user_name, > stripped_user_name, realm, event_type, switch_id, > switch_mac, switch_ip_address, radius_source_ip_address, > called_station_id, calling_station_id, nas_port_type, ssid, > nas_port_id, ifindex, nas_port, connection_type, > nas_ip_address, nas_identifier, auth_status, reason, > auth_type, eap_type, role, node_status, profile, > source, auto_reg, is_phone, pf_domain, uuid, > radius_request, radius_reply, request_time, tenant_id, > radius_ip) VALUES ( > '%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}', > '%{%{control:PacketFence-Computer-Name}:-N/A}', '%{request:User-Name}', > '%{request:Stripped-User-Name}', '%{request:Realm}', > 'Radius-Access-Request', > '%{%{control:PacketFence-Switch-Id}:-N/A}', > '%{%{control:PacketFence-Switch-Mac}:-N/A}', > '%{%{control:PacketFence-Switch-Ip-Address}:-N/A}', > '%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}', > '%{request:Calling-Station-Id}', '%{request:NAS-Port-Type}', > '%{request:Called-Station-SSID}', '%{request:NAS-Port-Id}', > '%{%{control:PacketFence-IfIndex}:-N/A}', '%{request:NAS-Port}', > '%{%{control:PacketFence-Connection-Type}:-N/A}', > '%{request:NAS-IP-Address}', '%{request:NAS-Identifier}', 'Accept', > '%{request:Module-Failure-Message}', '%{control:Auth-Type}', > '%{request:EAP-Type}', > '%{%{control:PacketFence-Role}:-N/A}', > '%{%{control:PacketFence-Status}:-N/A}', > '%{%{control:PacketFence-Profile}:-N/A}', > '%{%{control:PacketFence-Source}:-N/A}', > '%{%{control:PacketFence-AutoReg}:-0}', > '%{%{control:PacketFence-IsPhone}:-0}', > '%{request:PacketFence-Domain}', '', > '%{pairs:&request:[*]}','%{pairs:&reply:[*]}', > '%{control:PacketFence-Request-Time}', '%{control:PacketFence-Tenant-Id}', > '%{request:PacketFence-Radius-Ip}') > (747) Mon Dec 13 19:08:16 2021: Debug: sql: --> INSERT INTO > radius_audit_log ( mac, ip, computer_name, user_name, > stripped_user_name, realm, event_type, switch_id, > switch_mac, switch_ip_address, radius_source_ip_address, > called_station_id, calling_station_id, nas_port_type, ssid, > nas_port_id, ifindex, nas_port, connection_type, > nas_ip_address, nas_identifier, auth_status, reason, > auth_type, eap_type, role, node_status, profile, > source, auto_reg, is_phone, pf_domain, uuid, > radius_request, radius_reply, request_time, tenant_id, > radius_ip) VALUES ( '', '', 'N/A', > 'testuser123', 'testuser123', 'null', > 'Radius-Access-Request', 'N/A', 'N/A', 'N/A', > '192.168.254.40', '', '', 'Virtual', '', 'tty2', > 'N/A', '2', 'N/A', '192.168.254.40', '', 'Accept', > '', 'Accept', '', 'N/A', 'N/A', 'N/A', > 'N/A', '0', '0', '', '', 'User-Name =3D > =22testuser123=22, User-Password =3D =22=2A=2A=2A=2A=2A=2A=22, > NAS-IP-Address =3D 192.168.254.40, NAS-Port =3D 2, NAS-Port-Type =3D > Virtual, Event-Timestamp =3D =22Dec 13 2021 19:08:16 =2B04=22, NAS-Port-Id > =3D =22tty2=22, Stripped-User-Name =3D =22testuser123=22, Realm =3D > =22null=22, FreeRADIUS-Client-IP-Address =3D 192.168.254.40, > PacketFence-KeyBalanced =3D =227674cdd55c6099b093d1b9dcdda01825=22, > PacketFence-Radius-Ip =3D =22192.168.197.90=22, SQL-User-Name =3D > =22testuser123=22','REST-HTTP-Status-Code =3D 200, Reply-Message =3D > =22Switch enable access granted by PacketFence=22, Cisco-AVPair =3D > =22shell:priv-lvl=3D15=22', '0', '1', '192.168.197.90') > (747) Mon Dec 13 19:08:16 2021: Debug: sql: Executing query: INSERT INTO > radius_audit_log ( mac, ip, computer_name, user_name, > stripped_user_name, realm, event_type, switch_id, > switch_mac, switch_ip_address, radius_source_ip_address, > called_station_id, calling_station_id, nas_port_type, ssid, > nas_port_id, ifindex, nas_port, connection_type, > nas_ip_address, nas_identifier, auth_status, reason, > auth_type, eap_type, role, node_status, profile, > source, auto_reg, is_phone, pf_domain, uuid, > radius_request, radius_reply, request_time, tenant_id, > radius_ip) VALUES ( '', '', 'N/A', > 'testuser123', 'testuser123', 'null', > 'Radius-Access-Request', 'N/A', 'N/A', 'N/A', > '192.168.254.40', '', '', 'Virtual', '', 'tty2', > 'N/A', '2', 'N/A', '192.168.254.40', '', 'Accept', > '', 'Accept', '', 'N/A', 'N/A', 'N/A', > 'N/A', '0', '0', '', '', 'User-Name =3D > =22testuser123=22, User-Password =3D =22=2A=2A=2A=2A=2A=2A=22, > NAS-IP-Address =3D 192.168.254.40, NAS-Port =3D 2, NAS-Port-Type =3D > Virtual, Event-Timestamp =3D =22Dec 13 2021 19:08:16 =2B04=22, NAS-Port-Id > =3D =22tty2=22, Stripped-User-Name =3D =22testuser123=22, Realm =3D > =22null=22, FreeRADIUS-Client-IP-Address =3D 192.168.254.40, > PacketFence-KeyBalanced =3D =227674cdd55c6099b093d1b9dcdda01825=22, > PacketFence-Radius-Ip =3D =22192.168.197.90=22, SQL-User-Name =3D > =22testuser123=22','REST-HTTP-Status-Code =3D 200, Reply-Message =3D > =22Switch enable access granted by PacketFence=22, Cisco-AVPair =3D > =22shell:priv-lvl=3D15=22', '0', '1', '192.168.197.90') > (747) Mon Dec 13 19:08:16 2021: Debug: sql: SQL query returned: success > (747) Mon Dec 13 19:08:16 2021: Debug: sql: 1 record(s) updated > (747) Mon Dec 13 19:08:16 2021: Debug: [sql] = ok > (747) Mon Dec 13 19:08:16 2021: Debug: } # else = updated > (747) Mon Dec 13 19:08:16 2021: Debug: } # policy > packetfence-audit-log-accept = updated > (747) Mon Dec 13 19:08:16 2021: Debug: } # else = updated > (747) Mon Dec 13 19:08:16 2021: Debug: } # if (! EAP-Type || (EAP-Type > != TTLS && EAP-Type != PEAP) ) = updated > (747) Mon Dec 13 19:08:16 2021: Debug: attr_filter.packetfence_post_auth: > EXPAND %{User-Name} > (747) Mon Dec 13 19:08:16 2021: Debug: attr_filter.packetfence_post_auth: > --> testuser123 > (747) Mon Dec 13 19:08:16 2021: Debug: attr_filter.packetfence_post_auth: > Matched entry DEFAULT at line 10 > (747) Mon Dec 13 19:08:16 2021: Debug: > [attr_filter.packetfence_post_auth] = updated > (747) Mon Dec 13 19:08:16 2021: Debug: linelog: EXPAND > messages.%{%{reply:Packet-Type}:-default} > (747) Mon Dec 13 19:08:16 2021: Debug: linelog: --> > messages.Access-Accept > (747) Mon Dec 13 19:08:16 2021: Debug: linelog: EXPAND > [mac:%{Calling-Station-Id}] Accepted user: %{reply:User-Name} and returned > VLAN %{reply:Tunnel-Private-Group-ID} > (747) Mon Dec 13 19:08:16 2021: Debug: linelog: --> [mac:] Accepted > user: and returned VLAN > (747) Mon Dec 13 19:08:16 2021: Debug: [linelog] = ok > (747) Mon Dec 13 19:08:16 2021: Debug: } # post-auth = updated > (747) Mon Dec 13 19:08:16 2021: Debug: Sent Access-Accept Id 20 from > 192.168.197.90:1812 to 192.168.254.40:1645 length 0 > (747) Mon Dec 13 19:08:16 2021: Debug: Reply-Message = "Switch enable > access granted by PacketFence" > (747) Mon Dec 13 19:08:16 2021: Debug: Cisco-AVPair = "shell:priv-lvl=15" > (747) Mon Dec 13 19:08:16 2021: Debug: Finished request > (747) Mon Dec 13 19:08:21 2021: Debug: Cleaning up request packet ID 20 > with timestamp +10956 > (748) Mon Dec 13 19:08:25 2021: Debug: Received Status-Server Id 117 from > 127.0.0.1:54412 to 127.0.0.1:18121 length 50 > (748) Mon Dec 13 19:08:25 2021: Debug: Message-Authenticator = > 0x88a7c5faf457adb7610f55a0941bb0eb > (748) Mon Dec 13 19:08:25 2021: Debug: FreeRADIUS-Statistics-Type = 15 > (748) Mon Dec 13 19:08:25 2021: Debug: # Executing group from file > /usr/local/pf/raddb/sites-enabled/status > (748) Mon Dec 13 19:08:25 2021: Debug: Autz-Type Status-Server { > (748) Mon Dec 13 19:08:25 2021: Debug: [ok] = ok > (748) Mon Dec 13 19:08:25 2021: Debug: } # Autz-Type Status-Server = ok > (748) Mon Dec 13 19:08:25 2021: Debug: Sent Access-Accept Id 117 from > 127.0.0.1:18121 to 127.0.0.1:54412 length 0 > (748) Mon Dec 13 19:08:25 2021: Debug: FreeRADIUS-Total-Access-Requests > = 749 > (748) Mon Dec 13 19:08:25 2021: Debug: FreeRADIUS-Total-Access-Accepts = > 4 > (748) Mon Dec 13 19:08:25 2021: Debug: FreeRADIUS-Total-Access-Rejects = > 4 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Access-Challenges = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: FreeRADIUS-Total-Auth-Responses = > 8 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Auth-Duplicate-Requests = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Auth-Malformed-Requests = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Auth-Invalid-Requests = 9 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Auth-Dropped-Requests = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Auth-Unknown-Types = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Accounting-Requests = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Accounting-Responses = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Acct-Duplicate-Requests = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Acct-Malformed-Requests = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Acct-Invalid-Requests = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Acct-Dropped-Requests = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Acct-Unknown-Types = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Proxy-Access-Requests = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Proxy-Access-Accepts = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Proxy-Access-Rejects = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Proxy-Access-Challenges = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Responses = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Proxy-Accounting-Requests = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Proxy-Accounting-Responses = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: > FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0 > (748) Mon Dec 13 19:08:25 2021: Debug: Finished request > (748) Mon Dec 13 19:08:30 2021: Debug: Cleaning up request packet ID 117 > with timestamp +10965 > (749) Mon Dec 13 19:08:40 2021: Debug: Received Status-Server Id 39 from > 127.0.0.1:34233 to 127.0.0.1:18121 length 50 > (749) Mon Dec 13 19:08:40 2021: Debug: Message-Authenticator = > 0xdab43050a96590f4e4e456daf538da6e > (749) Mon Dec 13 19:08:40 2021: Debug: FreeRADIUS-Statistics-Type = 15 > (749) Mon Dec 13 19:08:40 2021: Debug: # Executing group from file > /usr/local/pf/raddb/sites-enabled/status > (749) Mon Dec 13 19:08:40 2021: Debug: Autz-Type Status-Server { > (749) Mon Dec 13 19:08:40 2021: Debug: [ok] = ok > (749) Mon Dec 13 19:08:40 2021: Debug: } # Autz-Type Status-Server = ok > (749) Mon Dec 13 19:08:40 2021: Debug: Sent Access-Accept Id 39 from > 127.0.0.1:18121 to 127.0.0.1:34233 length 0 > (749) Mon Dec 13 19:08:40 2021: Debug: FreeRADIUS-Total-Access-Requests > = 750 > (749) Mon Dec 13 19:08:40 2021: Debug: FreeRADIUS-Total-Access-Accepts = > 4 > (749) Mon Dec 13 19:08:40 2021: Debug: FreeRADIUS-Total-Access-Rejects = > 4 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Access-Challenges = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: FreeRADIUS-Total-Auth-Responses = > 8 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Auth-Duplicate-Requests = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Auth-Malformed-Requests = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Auth-Invalid-Requests = 9 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Auth-Dropped-Requests = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Auth-Unknown-Types = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Accounting-Requests = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Accounting-Responses = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Acct-Duplicate-Requests = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Acct-Malformed-Requests = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Acct-Invalid-Requests = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Acct-Dropped-Requests = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Acct-Unknown-Types = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Proxy-Access-Requests = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Proxy-Access-Accepts = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Proxy-Access-Rejects = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Proxy-Access-Challenges = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Responses = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Proxy-Accounting-Requests = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Proxy-Accounting-Responses = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: > FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0 > (749) Mon Dec 13 19:08:40 2021: Debug: Finished request > (749) Mon Dec 13 19:08:45 2021: Debug: Cleaning up request packet ID 39 > with timestamp +10980 > (750) Mon Dec 13 19:08:55 2021: Debug: Received Status-Server Id 237 from > 127.0.0.1:33232 to 127.0.0.1:18121 length 50 > (750) Mon Dec 13 19:08:55 2021: Debug: Message-Authenticator = > 0x0b84e6e16a6fdb6dba18c9c76ffdd204 > (750) Mon Dec 13 19:08:55 2021: Debug: FreeRADIUS-Statistics-Type = 15 > (750) Mon Dec 13 19:08:55 2021: Debug: # Executing group from file > /usr/local/pf/raddb/sites-enabled/status > (750) Mon Dec 13 19:08:55 2021: Debug: Autz-Type Status-Server { > (750) Mon Dec 13 19:08:55 2021: Debug: [ok] = ok > (750) Mon Dec 13 19:08:55 2021: Debug: } # Autz-Type Status-Server = ok > (750) Mon Dec 13 19:08:55 2021: Debug: Sent Access-Accept Id 237 from > 127.0.0.1:18121 to 127.0.0.1:33232 length 0 > (750) Mon Dec 13 19:08:55 2021: Debug: FreeRADIUS-Total-Access-Requests > = 751 > (750) Mon Dec 13 19:08:55 2021: Debug: FreeRADIUS-Total-Access-Accepts = > 4 > (750) Mon Dec 13 19:08:55 2021: Debug: FreeRADIUS-Total-Access-Rejects = > 4 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Access-Challenges = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: FreeRADIUS-Total-Auth-Responses = > 8 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Auth-Duplicate-Requests = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Auth-Malformed-Requests = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Auth-Invalid-Requests = 9 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Auth-Dropped-Requests = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Auth-Unknown-Types = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Accounting-Requests = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Accounting-Responses = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Acct-Duplicate-Requests = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Acct-Malformed-Requests = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Acct-Invalid-Requests = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Acct-Dropped-Requests = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Acct-Unknown-Types = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Proxy-Access-Requests = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Proxy-Access-Accepts = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Proxy-Access-Rejects = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Proxy-Access-Challenges = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Responses = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Proxy-Accounting-Requests = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Proxy-Accounting-Responses = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: > FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0 > (750) Mon Dec 13 19:08:55 2021: Debug: Finished request > > Regards > Misbah >
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users