Hi Fabrice,
thanks for answering. Here is the output:

 Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
(21571) Fri Apr  1 08:22:32 2022: Debug:   authenticate {
(21571) Fri Apr  1 08:22:32 2022: Debug: eap: Expiring EAP session with state 
0xdd37fd22d8d7e4c8
(21571) Fri Apr  1 08:22:32 2022: Debug: eap: Finished EAP session with state 
0xdd37fd22d8d7e4c8
(21571) Fri Apr  1 08:22:32 2022: Debug: eap: Previous EAP request found for 
state 0xdd37fd22d8d7e4c8, released from the list
(21571) Fri Apr  1 08:22:32 2022: Debug: eap: Peer sent packet with method EAP 
PEAP (25)
(21571) Fri Apr  1 08:22:32 2022: Debug: eap: Calling submodule eap_peap to 
process data
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap: (TLS) EAP Done initial 
handshake
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap: Session established.  
Decoding tunneled attributes
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap: PEAP state WAITING FOR INNER 
IDENTITY
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap: Identity - nijat
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap: Got inner identity 'nijat'
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap: Setting default EAP type for 
tunneled EAP session
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap: Got tunneled request
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap:   EAP-Message = 
0x02e0000a016e696a6174
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap: Setting User-Name to nijat
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap: Sending tunneled request to 
packetfence-tunnel
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap:   EAP-Message = 
0x02e0000a016e696a6174
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap:   FreeRADIUS-Proxied-To = 
127.0.0.1
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap:   User-Name = "nijat"
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap:   NAS-IP-Address = 
10.80.80.67
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap:   NAS-Identifier = 
"7a4558c7885f"
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap:   NAS-Port-Type = 
Wireless-802.11
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap:   Service-Type = Framed-User
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap:   Calling-Station-Id := 
"be:f1:bd:b6:40:a3"
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap:   Connect-Info = "CONNECT 
0Mbps 802.11a"
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap:   Acct-Session-Id = 
"A036F4CC8D711505"
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap:   Acct-Multi-Session-Id = 
"E87228BDB3EDFE41"
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap:   WLAN-Pairwise-Cipher = 
1027076
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap:   WLAN-Group-Cipher = 1027076
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap:   WLAN-AKM-Suite = 1027073
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap:   Framed-MTU = 1400
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap:   PacketFence-Radius-Ip := 
"10.80.80.143"
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap:   PacketFence-KeyBalanced := 
"b6125b7968479546eeef8c210c3176af"
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap:   Called-Station-Id := 
"7a:45:58:c7:88:5f:pftest"
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap:   Event-Timestamp = "Apr  1 
2022 08:22:32 UTC"
(21571) Fri Apr  1 08:22:32 2022: Debug: Virtual server packetfence-tunnel 
received request
(21571) Fri Apr  1 08:22:32 2022: Debug:   EAP-Message = 0x02e0000a016e696a6174
(21571) Fri Apr  1 08:22:32 2022: Debug:   FreeRADIUS-Proxied-To = 127.0.0.1
(21571) Fri Apr  1 08:22:32 2022: Debug:   User-Name = "nijat"
(21571) Fri Apr  1 08:22:32 2022: Debug:   NAS-IP-Address = 10.80.80.67
(21571) Fri Apr  1 08:22:32 2022: Debug:   NAS-Identifier = "7a4558c7885f"
(21571) Fri Apr  1 08:22:32 2022: Debug:   NAS-Port-Type = Wireless-802.11
(21571) Fri Apr  1 08:22:32 2022: Debug:   Service-Type = Framed-User
(21571) Fri Apr  1 08:22:32 2022: Debug:   Calling-Station-Id := 
"be:f1:bd:b6:40:a3"
(21571) Fri Apr  1 08:22:32 2022: Debug:   Connect-Info = "CONNECT 0Mbps 
802.11a"
(21571) Fri Apr  1 08:22:32 2022: Debug:   Acct-Session-Id = "A036F4CC8D711505"
(21571) Fri Apr  1 08:22:32 2022: Debug:   Acct-Multi-Session-Id = 
"E87228BDB3EDFE41"
(21571) Fri Apr  1 08:22:32 2022: Debug:   WLAN-Pairwise-Cipher = 1027076
(21571) Fri Apr  1 08:22:32 2022: Debug:   WLAN-Group-Cipher = 1027076
(21571) Fri Apr  1 08:22:32 2022: Debug:   WLAN-AKM-Suite = 1027073
(21571) Fri Apr  1 08:22:32 2022: Debug:   Framed-MTU = 1400
(21571) Fri Apr  1 08:22:32 2022: Debug:   PacketFence-Radius-Ip := 
"10.80.80.143"
(21571) Fri Apr  1 08:22:32 2022: Debug:   PacketFence-KeyBalanced := 
"b6125b7968479546eeef8c210c3176af"
(21571) Fri Apr  1 08:22:32 2022: Debug:   Called-Station-Id := 
"7a:45:58:c7:88:5f:pftest"
(21571) Fri Apr  1 08:22:32 2022: Debug:   Event-Timestamp = "Apr  1 2022 
08:22:32 UTC"
(21571) Fri Apr  1 08:22:32 2022: WARNING: Outer and inner identities are the 
same.  User privacy is compromised.
(21571) Fri Apr  1 08:22:32 2022: Debug: server packetfence-tunnel {
(21571) Fri Apr  1 08:22:32 2022: Debug:   # Executing section authorize from 
file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(21571) Fri Apr  1 08:22:32 2022: Debug:     authorize {
(21571) Fri Apr  1 08:22:32 2022: Debug:       if ( outer.EAP-Type == TTLS) {
(21571) Fri Apr  1 08:22:32 2022: Debug:       if ( outer.EAP-Type == TTLS)  -> 
FALSE
(21571) Fri Apr  1 08:22:32 2022: Debug:       policy 
packetfence-set-realm-if-machine {
(21571) Fri Apr  1 08:22:32 2022: Debug:         if (User-Name =~ 
/host\/([a-z0-9_-]*)[\.](.*)/i) {
(21571) Fri Apr  1 08:22:32 2022: Debug:         if (User-Name =~ 
/host\/([a-z0-9_-]*)[\.](.*)/i)  -> FALSE
(21571) Fri Apr  1 08:22:32 2022: Debug:       } # policy 
packetfence-set-realm-if-machine = notfound
(21571) Fri Apr  1 08:22:32 2022: Debug:       policy packetfence-set-tenant-id 
{
(21571) Fri Apr  1 08:22:32 2022: Debug:         if (!NAS-IP-Address || 
NAS-IP-Address == "0.0.0.0"){
(21571) Fri Apr  1 08:22:32 2022: Debug:         if (!NAS-IP-Address || 
NAS-IP-Address == "0.0.0.0") -> FALSE
(21571) Fri Apr  1 08:22:32 2022: Debug:         if ( 
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(21571) Fri Apr  1 08:22:32 2022: Debug:         EXPAND 
%{%{control:PacketFence-Tenant-Id}:-0}
(21571) Fri Apr  1 08:22:32 2022: Debug:            --> 0
(21571) Fri Apr  1 08:22:32 2022: Debug:         if ( 
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> TRUE
(21571) Fri Apr  1 08:22:32 2022: Debug:         if ( 
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  {
(21571) Fri Apr  1 08:22:32 2022: Debug:           if 
("%{request:Called-Station-Id}" =~ 
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})/i)
 {
(21571) Fri Apr  1 08:22:32 2022: Debug:           EXPAND 
%{request:Called-Station-Id}
(21571) Fri Apr  1 08:22:32 2022: Debug:              --> 
7a:45:58:c7:88:5f:pftest
(21571) Fri Apr  1 08:22:32 2022: Debug:           if 
("%{request:Called-Station-Id}" =~ 
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})/i)
  -> TRUE
(21571) Fri Apr  1 08:22:32 2022: Debug:           if 
("%{request:Called-Station-Id}" =~ 
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})/i)
  {
(21571) Fri Apr  1 08:22:32 2022: Debug:             update control {
(21571) Fri Apr  1 08:22:32 2022: Debug:               EXPAND %{User-Name}
(21571) Fri Apr  1 08:22:32 2022: Debug:                  --> nijat
(21571) Fri Apr  1 08:22:32 2022: Debug:               SQL-User-Name set to 
'nijat'
(21571) Fri Apr  1 08:22:32 2022: Debug:               Executing select query:  
SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = 
'7a:45:58:c7:88:5f'), 0)
(21571) Fri Apr  1 08:22:32 2022: Debug:               EXPAND %{sql: SELECT 
IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = 
'%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}'), 0)}
(21571) Fri Apr  1 08:22:32 2022: Debug:                  --> 0
(21571) Fri Apr  1 08:22:32 2022: Debug:             } # update control = noop
(21571) Fri Apr  1 08:22:32 2022: Debug:           } # if 
("%{request:Called-Station-Id}" =~ 
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})/i)
  = noop
(21571) Fri Apr  1 08:22:32 2022: Debug:           if ( 
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(21571) Fri Apr  1 08:22:32 2022: Debug:           EXPAND 
%{%{control:PacketFence-Tenant-Id}:-0}
(21571) Fri Apr  1 08:22:32 2022: Debug:              --> 0
(21571) Fri Apr  1 08:22:32 2022: Debug:           if ( 
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> TRUE
(21571) Fri Apr  1 08:22:32 2022: Debug:           if ( 
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  {
(21571) Fri Apr  1 08:22:32 2022: Debug:             update control {
(21571) Fri Apr  1 08:22:32 2022: Debug:               EXPAND %{User-Name}
(21571) Fri Apr  1 08:22:32 2022: Debug:                  --> nijat
(21571) Fri Apr  1 08:22:32 2022: Debug:               SQL-User-Name set to 
'nijat'
(21571) Fri Apr  1 08:22:32 2022: Debug:               Executing select query:  
SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '10.80.80.67'), 
0)
(21571) Fri Apr  1 08:22:32 2022: Debug:               EXPAND %{sql: SELECT 
IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '%{NAS-IP-Address}'), 
0)}
(21571) Fri Apr  1 08:22:32 2022: Debug:                  --> 1
(21571) Fri Apr  1 08:22:32 2022: Debug:             } # update control = noop
(21571) Fri Apr  1 08:22:32 2022: Debug:           } # if ( 
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  = noop
(21571) Fri Apr  1 08:22:32 2022: Debug:         } # if ( 
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  = noop
(21571) Fri Apr  1 08:22:32 2022: Debug:         if ( 
&control:PacketFence-Tenant-Id == 0 ) {
(21571) Fri Apr  1 08:22:32 2022: Debug:         if ( 
&control:PacketFence-Tenant-Id == 0 )  -> TRUE
(21571) Fri Apr  1 08:22:32 2022: Debug:         if ( 
&control:PacketFence-Tenant-Id == 0 )  {
(21571) Fri Apr  1 08:22:32 2022: Debug:           update control {
(21571) Fri Apr  1 08:22:32 2022: Debug:             EXPAND %{User-Name}
(21571) Fri Apr  1 08:22:32 2022: Debug:                --> nijat
(21571) Fri Apr  1 08:22:32 2022: Debug:             SQL-User-Name set to 
'nijat'
(21571) Fri Apr  1 08:22:32 2022: Debug:             Executing select query:  
SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= 
INET_ATON('10.80.80.67') and INET_ATON('10.80.80.67') <= end_ip order by 
range_length limit 1), 1)
(21571) Fri Apr  1 08:22:32 2022: Debug:             EXPAND %{sql: SELECT 
IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= 
INET_ATON('%{NAS-IP-Address}') and INET_ATON('%{NAS-IP-Address}') <= end_ip 
order by range_length limit 1), 1)}
(21571) Fri Apr  1 08:22:32 2022: Debug:                --> 1
(21571) Fri Apr  1 08:22:32 2022: Debug:           } # update control = noop
(21571) Fri Apr  1 08:22:32 2022: Debug:         } # if ( 
&control:PacketFence-Tenant-Id == 0 )  = noop
(21571) Fri Apr  1 08:22:32 2022: Debug:       } # policy 
packetfence-set-tenant-id = noop
(21571) Fri Apr  1 08:22:32 2022: Debug:       policy filter_username {
(21571) Fri Apr  1 08:22:32 2022: Debug:         if (&User-Name) {
(21571) Fri Apr  1 08:22:32 2022: Debug:         if (&User-Name)  -> TRUE
(21571) Fri Apr  1 08:22:32 2022: Debug:         if (&User-Name)  {
(21571) Fri Apr  1 08:22:32 2022: Debug:           if (&User-Name =~ / /) {
(21571) Fri Apr  1 08:22:32 2022: Debug:           if (&User-Name =~ / /)  -> 
FALSE
(21571) Fri Apr  1 08:22:32 2022: Debug:           if (&User-Name =~ /@[^@]*@/ 
) {
(21571) Fri Apr  1 08:22:32 2022: Debug:           if (&User-Name =~ /@[^@]*@/ 
)  -> FALSE
(21571) Fri Apr  1 08:22:32 2022: Debug:           if (&User-Name =~ /\.\./ ) {
(21571) Fri Apr  1 08:22:32 2022: Debug:           if (&User-Name =~ /\.\./ )  
-> FALSE
(21571) Fri Apr  1 08:22:32 2022: Debug:           if ((&User-Name =~ /@/) && 
(&User-Name !~ /@(.+)\.(.+)$/))  {
(21571) Fri Apr  1 08:22:32 2022: Debug:           if ((&User-Name =~ /@/) && 
(&User-Name !~ /@(.+)\.(.+)$/))   -> FALSE
(21571) Fri Apr  1 08:22:32 2022: Debug:           if (&User-Name =~ /\.$/)  {
(21571) Fri Apr  1 08:22:32 2022: Debug:           if (&User-Name =~ /\.$/)   
-> FALSE
(21571) Fri Apr  1 08:22:32 2022: Debug:           if (&User-Name =~ /@\./)  {
(21571) Fri Apr  1 08:22:32 2022: Debug:           if (&User-Name =~ /@\./)   
-> FALSE
(21571) Fri Apr  1 08:22:32 2022: Debug:         } # if (&User-Name)  = noop
(21571) Fri Apr  1 08:22:32 2022: Debug:       } # policy filter_username = noop
(21571) Fri Apr  1 08:22:32 2022: Debug:       update {
(21571) Fri Apr  1 08:22:32 2022: Debug:         EXPAND 
%{outer.request:User-Name}
(21571) Fri Apr  1 08:22:32 2022: Debug:            --> nijat
(21571) Fri Apr  1 08:22:32 2022: Debug:       } # update = noop
(21571) Fri Apr  1 08:22:32 2022: Debug:       [mschap] = noop
(21571) Fri Apr  1 08:22:32 2022: Debug: suffix: Checking for suffix after "@"
(21571) Fri Apr  1 08:22:32 2022: Debug: suffix: No '@' in User-Name = "nijat", 
skipping NULL due to config.
(21571) Fri Apr  1 08:22:32 2022: Debug:       [suffix] = noop
(21571) Fri Apr  1 08:22:32 2022: Debug: ntdomain: Checking for prefix before 
"\"
(21571) Fri Apr  1 08:22:32 2022: Debug: ntdomain: No '\' in User-Name = 
"nijat", looking up realm NULL
(21571) Fri Apr  1 08:22:32 2022: Debug: ntdomain: Found realm "null"
(21571) Fri Apr  1 08:22:32 2022: Debug: ntdomain: Adding Stripped-User-Name = 
"nijat"
(21571) Fri Apr  1 08:22:32 2022: Debug: ntdomain: Adding Realm = "null"
(21571) Fri Apr  1 08:22:32 2022: Debug: ntdomain: Authentication realm is LOCAL
(21571) Fri Apr  1 08:22:32 2022: Debug:       [ntdomain] = ok
(21571) Fri Apr  1 08:22:32 2022: Debug:       update control {
(21571) Fri Apr  1 08:22:32 2022: Debug:       } # update control = noop
(21571) Fri Apr  1 08:22:32 2022: Debug: eap: Peer sent EAP Response (code 2) 
ID 224 length 10
(21571) Fri Apr  1 08:22:32 2022: Debug: eap: EAP-Identity reply, returning 
'ok' so we can short-circuit the rest of authorize
(21571) Fri Apr  1 08:22:32 2022: Debug:       [eap] = ok
(21571) Fri Apr  1 08:22:32 2022: Debug:     } # authorize = ok
(21571) Fri Apr  1 08:22:32 2022: WARNING:   You set Proxy-To-Realm = local, 
but it is a LOCAL realm!  Cancelling proxy request.
(21571) Fri Apr  1 08:22:32 2022: Debug:   Found Auth-Type = eap
(21571) Fri Apr  1 08:22:32 2022: Debug:   # Executing group from file 
/usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(21571) Fri Apr  1 08:22:32 2022: Debug:     authenticate {
(21571) Fri Apr  1 08:22:32 2022: Debug: eap: Peer sent packet with method EAP 
Identity (1)
(21571) Fri Apr  1 08:22:32 2022: Debug: eap: Calling submodule eap_mschapv2 to 
process data
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_mschapv2: Issuing Challenge
(21571) Fri Apr  1 08:22:32 2022: Debug: eap: Sending EAP Request (code 1) ID 
225 length 43
(21571) Fri Apr  1 08:22:32 2022: Debug: eap: EAP session adding &reply:State = 
0xc0015143c0e04be0
(21571) Fri Apr  1 08:22:32 2022: Debug:       [eap] = handled
(21571) Fri Apr  1 08:22:32 2022: Debug:     } # authenticate = handled
(21571) Fri Apr  1 08:22:32 2022: Debug: } # server packetfence-tunnel
(21571) Fri Apr  1 08:22:32 2022: Debug: Virtual server sending reply
(21571) Fri Apr  1 08:22:32 2022: Debug:   EAP-Message = 
0x01e1002b1a01e10026108dd189798549a3fa2b743ff85850de1e667265657261646975732d332e302e3235
(21571) Fri Apr  1 08:22:32 2022: Debug:   Message-Authenticator = 
0x00000000000000000000000000000000
(21571) Fri Apr  1 08:22:32 2022: Debug:   State = 
0xc0015143c0e04be05026e3704434a669
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap: Got tunneled reply code 11
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap:   EAP-Message = 
0x01e1002b1a01e10026108dd189798549a3fa2b743ff85850de1e667265657261646975732d332e302e3235
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap:   Message-Authenticator = 
0x00000000000000000000000000000000
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap:   State = 
0xc0015143c0e04be05026e3704434a669
(21571) Fri Apr  1 08:22:32 2022: Debug: eap_peap: Got tunneled Access-Challenge
(21571) Fri Apr  1 08:22:32 2022: Debug: eap: Sending EAP Request (code 1) ID 
225 length 74
(21571) Fri Apr  1 08:22:32 2022: Debug: eap: EAP session adding &reply:State = 
0xdd37fd22dbd6e4c8
(21571) Fri Apr  1 08:22:32 2022: Debug:     [eap] = handled
(21571) Fri Apr  1 08:22:32 2022: Debug:   } # authenticate = handled
(21571) Fri Apr  1 08:22:32 2022: Debug: Using Post-Auth-Type Challenge
(21571) Fri Apr  1 08:22:32 2022: Debug: Post-Auth-Type sub-section not found.  
Ignoring.
(21571) Fri Apr  1 08:22:32 2022: Debug: # Executing group from file 
/usr/local/pf/raddb/sites-enabled/packetfence
(21571) Fri Apr  1 08:22:32 2022: Debug: session-state: Saving cached attributes
(21571) Fri Apr  1 08:22:32 2022: Debug:   Framed-MTU = 994
(21571) Fri Apr  1 08:22:32 2022: Debug:   TLS-Session-Cipher-Suite = 
"ECDHE-RSA-AES128-GCM-SHA256"
(21571) Fri Apr  1 08:22:32 2022: Debug:   TLS-Session-Version = "TLS 1.2"
(21571) Fri Apr  1 08:22:32 2022: Debug: Sent Access-Challenge Id 61 from 
10.80.80.143:1812 to 10.80.80.67:55172 length 132
(21571) Fri Apr  1 08:22:32 2022: Debug:   EAP-Message = 
0x01e1004a1900170303003fbc37259a75552b7546e8809ad730f61488803c5cb18a964c9b9dfe084e6f398a089c714940ceaf8acd15902edc1a07ada1f6e6271d0192e283e9cb6b5cfe15
(21571) Fri Apr  1 08:22:32 2022: Debug:   Message-Authenticator = 
0x00000000000000000000000000000000
(21571) Fri Apr  1 08:22:32 2022: Debug:   State = 
0xdd37fd22dbd6e4c89ecf933de8c2fe04
(21571) Fri Apr  1 08:22:32 2022: Debug: Finished request
 Hello Nicat, can you run this command and try to connect ? raddebug -f 
/usr/local/pf/var/run/radiusd.sock -t 300 Then paste the output. RegardsFabrice 
Le mer. 30 mars 2022 à 08:54, Nijat Sultanov via PacketFence-users 
<packetfence-users@lists.sourceforge.net> a écrit :Hi there,
I was looking for a support from packetfence and tried the mailing list. 
Somehow I'm not able to make a topic in the packetfence section on 
sourceforge.net.
Maybe you can help me now.

I'm trying to run packetfence with my unify AP, but struggle to make a 
successful authentification with my user. Previously I used a Switch and the 
authentification worked fine. Now, I'm trying to make a wireless 
authentification but somehow I'm getting rejected everytime with the reason: 
mschap: MS-CHAP2-Response is incorrect.

He is the RADIUS Auditing Log:
 Request Time
0RADIUS Request
User-Name = "nijat" Event-Timestamp = "Mar 28 2022 14:54:48 UTC" 
Calling-Station-Id = "be:f1:bd:b6:40:a3" WLAN-AKM-Suite = 1027073 
MS-CHAP-User-Name = "nijat" PacketFence-Outer-User = "nijat" Realm = "null" 
MS-CHAP2-Response = 
0x6e69e18213141ad3c9c9de0c32d6cedd713f0000000000000000dec8317a42db25f2e4ce62cf8b49d5727646a3cdbc15b035
 Acct-Multi-Session-Id = "723AF7C45EAA7B4C" NAS-IP-Address = 10.80.80.67 
Service-Type = Framed-User PacketFence-Radius-Ip = "10.80.80.143" 
PacketFence-KeyBalanced = "b6125b7968479546eeef8c210c3176af" WLAN-Group-Cipher 
= 1027076 NAS-Identifier = "7a4558c7885f" Called-Station-Id = 
"7a:45:58:c7:88:5f:pftest" EAP-Type = MSCHAPv2 EAP-Message = 
0x026e00401a026e003b31e18213141ad3c9c9de0c32d6cedd713f0000000000000000dec8317a42db25f2e4ce62cf8b49d5727646a3cdbc15b035006e696a6174
 Framed-MTU = 1400 WLAN-Pairwise-Cipher = 1027076 Stripped-User-Name = "nijat" 
Acct-Session-Id = "9C80BE880B7D623E" FreeRADIUS-Proxied-To = 127.0.0.1 State = 
0xeeed1a94ee8300284b8988160fb70984 Called-Station-SSID = "pftest" NAS-Port-Type 
= Wireless-802.11 Connect-Info = "CONNECT 0Mbps 802.11a" MS-CHAP-Challenge = 
0x573a1544f904d394d0a45b27858fcedf Module-Failure-Message = "mschap: 
MS-CHAP2-Response is incorrect" User-Password = "******" SQL-User-Name = 
"nijat"RADIUS Reply
MS-CHAP-Error = "nE=691 R=0 C=59ed45f1aa35086ebe0c808a8ff4e84b V=3 
M=Authentication rejected" EAP-Message = 0x046e0004 Message-Authenticator = 
0x00000000000000000000000000000000
-- Nicat Sultan
Trainee Systemintegration
Lucas Beier Moritz Maus Fusion2go IT GbR   +49 2253 - 609 89 47 
4info@fusion2go.dehttps://fusion2go.deTriftweg 9, 53902 Bad Münstereifel    
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users



-- Nicat Sultan
Trainee Systemintegration
Lucas Beier Moritz Maus Fusion2go IT GbR   +49 2253 - 609 89 47 
4info@fusion2go.dehttps://fusion2go.deTriftweg 9, 53902 Bad Münstereifel   
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to