Hello,

Did you configured something on 18120 ?

If yes, please undo that config because it conflicts with PF configuration.

PF does not use that 18120 port so it will be misconfiguration. Radius does not 
want to start because something already use that port. You should use RADIUS 
authentication is 1812.

Thanks,

Ludovic Zammit
Product Support Engineer Principal

Cell: +1.613.670.8432
Akamai Technologies - Inverse
145 Broadway
Cambridge, MA 02142
Connect with Us:         <https://community.akamai.com/>  
<http://blogs.akamai.com/>  <https://twitter.com/akamai>  
<http://www.facebook.com/AkamaiTechnologies>  
<http://www.linkedin.com/company/akamai-technologies>  
<http://www.youtube.com/user/akamaitechnologies?feature=results_main>

> On Apr 9, 2022, at 7:07 AM, P.Thirunavukkarasu <drthir...@tanuvas.org.in> 
> wrote:
> 
> Hi Ludovic
> Thanks for the reply 
> Herewith I am sending the reply for your kind perusal
> 
> root@packetfence:~# /usr/local/pf/bin/pfcmd service pf stop
> Created symlink 
> /etc/systemd/system/packetfence.target.wants/packetfence-fingerbank-collector.service
>  → /lib/systemd/system/packetfence-fingerbank-collector.service.
> Created symlink 
> /etc/systemd/system/packetfence.target.wants/packetfence-radiusd-eduroam.service
>  → /lib/systemd/system/packetfence-radiusd-eduroam.service.
> Synchronizing state of monit.service with SysV service script with 
> /lib/systemd/systemd-sysv-install.
> Executing: /lib/systemd/systemd-sysv-install disable monit
> Service                                                 Status    PID
> packetfence-api-frontend.service                        stopped   0
> packetfence-config.service                              started   0
> packetfence-fingerbank-collector.service                stopped   0
> packetfence-galera-autofix.service                      disabled  0
> packetfence-haproxy-admin.service                       stopped   0
> packetfence-haproxy-db.service                          disabled  0
> packetfence-haproxy-portal.service                      stopped   0
> packetfence-httpd.aaa.service                           stopped   0
> packetfence-httpd.admin_dispatcher.service              stopped   0
> packetfence-httpd.collector.service                     disabled  0
> packetfence-httpd.dispatcher.service                    stopped   0
> packetfence-httpd.portal.service                        stopped   0
> packetfence-httpd.proxy.service                         disabled  0
> packetfence-httpd.webservices.service                   stopped   0
> packetfence-ip6tables.service                           stopped   0
> packetfence-iptables.service                            stopped   0
> packetfence-keepalived.service                          stopped   0
> packetfence-mariadb.service                             started   799
> packetfence-mysql-probe.service                         disabled  0
> packetfence-netdata.service                             stopped   0
> packetfence-pfacct.service                              stopped   0
> packetfence-pfcertmanager.service                       stopped   0
> packetfence-pfcron.service                              stopped   0
> packetfence-pfdetect.service                            disabled  0
> packetfence-pfdhcp.service                              stopped   0
> packetfence-pfdhcplistener.service                      stopped   0
> packetfence-pfdns.service                               stopped   0
> packetfence-pffilter.service                            stopped   0
> packetfence-pfipset.service                             stopped   0
> packetfence-pfperl-api.service                          stopped   0
> packetfence-pfpki.service                               stopped   0
> packetfence-pfqueue.service                             stopped   0
> packetfence-pfsso.service                               stopped   0
> packetfence-pfstats.service                             stopped   0
> packetfence-radiusd-acct.service                        disabled  0
> packetfence-radiusd-auth.service                        stopped   0
> packetfence-radiusd-cli.service                         disabled  0
> packetfence-radiusd-eduroam.service                     stopped   0
> packetfence-radiusd-load_balancer.service               disabled  0
> packetfence-radsniff.service                            stopped   0
> packetfence-redis-cache.service                         started   486
> packetfence-redis_ntlm_cache.service                    disabled  0
> packetfence-redis_queue.service                         stopped   0
> packetfence-snmptrapd.service                           disabled  0
> packetfence-tc.service                                  disabled  0
> packetfence-tracking-config.service                     disabled  1
> packetfence-winbindd.service                            stopped   0
> 
> root@packetfence:~# netstat -nlp | grep 1812
> udp        0      0 127.0.0.1:18120 
> <https://urldefense.com/v3/__http://127.0.0.1:18120__;!!GjvTz_vk!RiAE0UdCVgF5Q4dnKxPKdS2ahcgEK6F_mTKGpw5qB9dYYl6IGLQBWsCY5Qt6HeVvDkOX9gkzXtFD4-nZoc4Zjw$>
>          0.0.0.0:*                           777/freeradius
> udp        0      0 0.0.0.0:1812 
> <https://urldefense.com/v3/__http://0.0.0.0:1812__;!!GjvTz_vk!RiAE0UdCVgF5Q4dnKxPKdS2ahcgEK6F_mTKGpw5qB9dYYl6IGLQBWsCY5Qt6HeVvDkOX9gkzXtFD4-mMW0UfpA$>
>             0.0.0.0:*                           777/freeradius
> udp6       0      0 :::1812                 :::*    
> 
> root@packetfence:~# freeradius -X
> FreeRADIUS Version 3.0.25
> Copyright (C) 1999-2021 The FreeRADIUS server project and contributors
> There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
> PARTICULAR PURPOSE
> You may redistribute copies of FreeRADIUS under the terms of the
> GNU General Public License
> For more information about these matters, see the file named COPYRIGHT
> Starting - reading configuration files ...
> including dictionary file /usr/share/freeradius/dictionary
> including dictionary file /usr/share/freeradius/dictionary.dhcp
> including dictionary file /usr/share/freeradius/dictionary.vqp
> including dictionary file /etc/freeradius/dictionary
> including configuration file /etc/freeradius/radiusd.conf
> including configuration file /etc/freeradius/proxy.conf
> including configuration file /etc/freeradius/clients.conf
> including files in directory /etc/freeradius/mods-enabled/
> including configuration file /etc/freeradius/mods-enabled/ntlm_auth
> including configuration file /etc/freeradius/mods-enabled/unix
> including configuration file /etc/freeradius/mods-enabled/chap
> including configuration file /etc/freeradius/mods-enabled/cache_eap
> including configuration file /etc/freeradius/mods-enabled/eap
> including configuration file /etc/freeradius/mods-enabled/radutmp
> including configuration file /etc/freeradius/mods-enabled/expr
> including configuration file /etc/freeradius/mods-enabled/soh
> including configuration file /etc/freeradius/mods-enabled/realm
> including configuration file /etc/freeradius/mods-enabled/totp
> including configuration file /etc/freeradius/mods-enabled/replicate
> including configuration file /etc/freeradius/mods-enabled/passwd
> including configuration file /etc/freeradius/mods-enabled/echo
> including configuration file /etc/freeradius/mods-enabled/files
> including configuration file /etc/freeradius/mods-enabled/preprocess
> including configuration file /etc/freeradius/mods-enabled/logintime
> including configuration file /etc/freeradius/mods-enabled/digest
> including configuration file /etc/freeradius/mods-enabled/detail.log
> including configuration file /etc/freeradius/mods-enabled/linelog
> including configuration file /etc/freeradius/mods-enabled/detail
> including configuration file /etc/freeradius/mods-enabled/dynamic_clients
> including configuration file /etc/freeradius/mods-enabled/unpack
> including configuration file /etc/freeradius/mods-enabled/sradutmp
> including configuration file /etc/freeradius/mods-enabled/date
> including configuration file /etc/freeradius/mods-enabled/expiration
> including configuration file /etc/freeradius/mods-enabled/exec
> including configuration file /etc/freeradius/mods-enabled/mschap
> including configuration file /etc/freeradius/mods-enabled/utf8
> including configuration file /etc/freeradius/mods-enabled/attr_filter
> including configuration file /etc/freeradius/mods-enabled/pap
> including configuration file /etc/freeradius/mods-enabled/always
> including files in directory /etc/freeradius/policy.d/
> including configuration file /etc/freeradius/policy.d/canonicalization
> including configuration file /etc/freeradius/policy.d/dhcp
> including configuration file /etc/freeradius/policy.d/cui
> including configuration file /etc/freeradius/policy.d/accounting
> including configuration file /etc/freeradius/policy.d/rfc7542
> including configuration file /etc/freeradius/policy.d/eap
> including configuration file /etc/freeradius/policy.d/filter
> including configuration file /etc/freeradius/policy.d/debug
> including configuration file /etc/freeradius/policy.d/control
> including configuration file /etc/freeradius/policy.d/abfab-tr
> including configuration file /etc/freeradius/policy.d/operator-name
> including configuration file /etc/freeradius/policy.d/moonshot-targeted-ids
> including files in directory /etc/freeradius/sites-enabled/
> including configuration file /etc/freeradius/sites-enabled/inner-tunnel
> including configuration file /etc/freeradius/sites-enabled/default
> main {
>  security {
>         user = "freerad"
>         group = "freerad"
>         allow_core_dumps = no
>  }
>         name = "freeradius"
>         prefix = "/usr"
>         localstatedir = "/var"
>         logdir = "/var/log/freeradius"
>         run_dir = "/var/run/freeradius"
> }
> main {
>         name = "freeradius"
>         prefix = "/usr"
>         localstatedir = "/var"
>         sbindir = "/usr/sbin"
>         logdir = "/var/log/freeradius"
>         run_dir = "/var/run/freeradius"
>         libdir = "/usr/lib/freeradius"
>         radacctdir = "/var/log/freeradius/radacct"
>         hostname_lookups = no
>         max_request_time = 30
>         cleanup_delay = 5
>         max_requests = 16384
>         postauth_client_lost = no
>         pidfile = "/var/run/freeradius/freeradius.pid"
>         checkrad = "/usr/sbin/checkrad"
>         debug_level = 0
>         proxy_requests = yes
>  log {
>         stripped_names = no
>         auth = no
>         auth_badpass = no
>         auth_goodpass = no
>         colourise = yes
>         msg_denied = "You are already logged in - access denied"
>  }
>  resources {
>  }
>  security {
>         max_attributes = 200
>         reject_delay = 1.000000
>         status_server = yes
>  }
> }
> radiusd: #### Loading Realms and Home Servers ####
>  proxy server {
>         retry_delay = 5
>         retry_count = 3
>         default_fallback = no
>         dead_time = 120
>         wake_all_if_all_dead = no
>  }
>  home_server localhost {
>         ipaddr = 127.0.0.1
>         port = 1812
>         type = "auth"
>         secret = <<< secret >>>
>         response_window = 20.000000
>         response_timeouts = 1
>         max_outstanding = 65536
>         zombie_period = 40
>         status_check = "status-server"
>         ping_interval = 30
>         check_interval = 30
>         check_timeout = 4
>         num_answers_to_alive = 3
>         revive_interval = 120
>   limit {
>         max_connections = 16
>         max_requests = 0
>         lifetime = 0
>         idle_timeout = 0
>   }
>   coa {
>         irt = 2
>         mrt = 16
>         mrc = 5
>         mrd = 30
>   }
>  }
>  home_server_pool my_auth_failover {
>         type = fail-over
>         home_server = localhost
>  }
>  realm example.com 
> <https://urldefense.com/v3/__http://example.com__;!!GjvTz_vk!RiAE0UdCVgF5Q4dnKxPKdS2ahcgEK6F_mTKGpw5qB9dYYl6IGLQBWsCY5Qt6HeVvDkOX9gkzXtFD4-mpuYlYLQ$>
>  {
>         auth_pool = my_auth_failover
>  }
>  realm LOCAL {
>  }
> radiusd: #### Loading Clients ####
>  client localhost {
>         ipaddr = 127.0.0.1
>         require_message_authenticator = no
>         secret = <<< secret >>>
>         nas_type = "other"
>         proto = "*"
>   limit {
>         max_connections = 16
>         lifetime = 0
>         idle_timeout = 30
>   }
>  }
>  client localhost_ipv6 {
>         ipv6addr = ::1
>         require_message_authenticator = no
>         secret = <<< secret >>>
>   limit {
>         max_connections = 16
>         lifetime = 0
>         idle_timeout = 30
>   }
>  }
> Debugger not attached
> systemd watchdog is disabled
>  # Creating Auth-Type = mschap
>  # Creating Auth-Type = eap
>  # Creating Auth-Type = PAP
>  # Creating Auth-Type = CHAP
>  # Creating Auth-Type = MS-CHAP
>  # Creating Auth-Type = digest
>  # Creating Autz-Type = New-TLS-Connection
> radiusd: #### Instantiating modules ####
>  modules {
>   # Loaded module rlm_exec
>   # Loading module "ntlm_auth" from file 
> /etc/freeradius/mods-enabled/ntlm_auth
>   exec ntlm_auth {
>         wait = yes
>         program = "/path/to/ntlm_auth --request-nt-key --domain=MYDOMAIN 
> --username=%{mschap:User-Name} --password=%{User-Password}"
>         shell_escape = yes
>   }
>   # Loaded module rlm_unix
>   # Loading module "unix" from file /etc/freeradius/mods-enabled/unix
>   unix {
>         radwtmp = "/var/log/freeradius/radwtmp"
>   }
> Creating attribute Unix-Group
>   # Loaded module rlm_chap
>   # Loading module "chap" from file /etc/freeradius/mods-enabled/chap
>   # Loaded module rlm_cache
>   # Loading module "cache_eap" from file 
> /etc/freeradius/mods-enabled/cache_eap
>   cache cache_eap {
>         driver = "rlm_cache_rbtree"
>         key = "%{%{control:State}:-%{%{reply:State}:-%{State}}}"
>         ttl = 15
>         max_entries = 0
>         epoch = 0
>         add_stats = no
>   }
>   # Loaded module rlm_eap
>   # Loading module "eap" from file /etc/freeradius/mods-enabled/eap
>   eap {
>         default_eap_type = "md5"
>         timer_expire = 60
>         ignore_unknown_eap_types = no
>         cisco_accounting_username_bug = no
>         max_sessions = 16384
>   }
>   # Loaded module rlm_radutmp
>   # Loading module "radutmp" from file /etc/freeradius/mods-enabled/radutmp
>   radutmp {
>         filename = "/var/log/freeradius/radutmp"
>         username = "%{User-Name}"
>         case_sensitive = yes
>         check_with_nas = yes
>         permissions = 384
>         caller_id = yes
>   }
>   # Loaded module rlm_expr
>   # Loading module "expr" from file /etc/freeradius/mods-enabled/expr
>   expr {
>         safe_characters = 
> "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: 
> /äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ"
>   }
>   # Loaded module rlm_soh
>   # Loading module "soh" from file /etc/freeradius/mods-enabled/soh
>   soh {
>         dhcp = yes
>   }
>   # Loaded module rlm_realm
>   # Loading module "IPASS" from file /etc/freeradius/mods-enabled/realm
>   realm IPASS {
>         format = "prefix"
>         delimiter = "/"
>         ignore_default = no
>         ignore_null = no
>   }
>   # Loading module "suffix" from file /etc/freeradius/mods-enabled/realm
>   realm suffix {
>         format = "suffix"
>         delimiter = "@"
>         ignore_default = no
>         ignore_null = no
>   }
>   # Loading module "bangpath" from file /etc/freeradius/mods-enabled/realm
>   realm bangpath {
>         format = "prefix"
>         delimiter = "!"
>         ignore_default = no
>         ignore_null = no
>   }
>   # Loading module "realmpercent" from file /etc/freeradius/mods-enabled/realm
>   realm realmpercent {
>         format = "suffix"
>         delimiter = "%"
>         ignore_default = no
>         ignore_null = no
>   }
>   # Loading module "ntdomain" from file /etc/freeradius/mods-enabled/realm
>   realm ntdomain {
>         format = "prefix"
>         delimiter = "\\"
>         ignore_default = no
>         ignore_null = no
>   }
>   # Loaded module rlm_totp
>   # Loading module "totp" from file /etc/freeradius/mods-enabled/totp
>   # Loaded module rlm_replicate
>   # Loading module "replicate" from file 
> /etc/freeradius/mods-enabled/replicate
>   # Loaded module rlm_passwd
>   # Loading module "etc_passwd" from file /etc/freeradius/mods-enabled/passwd
>   passwd etc_passwd {
>         filename = "/etc/passwd"
>         format = "*User-Name:Crypt-Password:"
>         delimiter = ":"
>         ignore_nislike = no
>         ignore_empty = yes
>         allow_multiple_keys = no
>         hash_size = 100
>   }
>   # Loading module "echo" from file /etc/freeradius/mods-enabled/echo
>   exec echo {
>         wait = yes
>         program = "/bin/echo %{User-Name}"
>         input_pairs = "request"
>         output_pairs = "reply"
>         shell_escape = yes
>   }
>   # Loaded module rlm_files
>   # Loading module "files" from file /etc/freeradius/mods-enabled/files
>   files {
>         filename = "/etc/freeradius/mods-config/files/authorize"
>         acctusersfile = "/etc/freeradius/mods-config/files/accounting"
>         preproxy_usersfile = "/etc/freeradius/mods-config/files/pre-proxy"
>   }
>   # Loaded module rlm_preprocess
>   # Loading module "preprocess" from file 
> /etc/freeradius/mods-enabled/preprocess
>   preprocess {
>         huntgroups = "/etc/freeradius/mods-config/preprocess/huntgroups"
>         hints = "/etc/freeradius/mods-config/preprocess/hints"
>         with_ascend_hack = no
>         ascend_channels_per_line = 23
>         with_ntdomain_hack = no
>         with_specialix_jetstream_hack = no
>         with_cisco_vsa_hack = no
>         with_alvarion_vsa_hack = no
>   }
>   # Loaded module rlm_logintime
>   # Loading module "logintime" from file 
> /etc/freeradius/mods-enabled/logintime
>   logintime {
>         minimum_timeout = 60
>   }
>   # Loaded module rlm_digest
>   # Loading module "digest" from file /etc/freeradius/mods-enabled/digest
>   # Loaded module rlm_detail
>   # Loading module "auth_log" from file 
> /etc/freeradius/mods-enabled/detail.log
>   detail auth_log {
>         filename = 
> "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d"
>         header = "%t"
>         permissions = 384
>         locking = no
>         escape_filenames = no
>         log_packet_header = no
>   }
>   # Loading module "reply_log" from file 
> /etc/freeradius/mods-enabled/detail.log
>   detail reply_log {
>         filename = 
> "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d"
>         header = "%t"
>         permissions = 384
>         locking = no
>         escape_filenames = no
>         log_packet_header = no
>   }
>   # Loading module "pre_proxy_log" from file 
> /etc/freeradius/mods-enabled/detail.log
>   detail pre_proxy_log {
>         filename = 
> "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d"
>         header = "%t"
>         permissions = 384
>         locking = no
>         escape_filenames = no
>         log_packet_header = no
>   }
>   # Loading module "post_proxy_log" from file 
> /etc/freeradius/mods-enabled/detail.log
>   detail post_proxy_log {
>         filename = 
> "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d"
>         header = "%t"
>         permissions = 384
>         locking = no
>         escape_filenames = no
>         log_packet_header = no
>   }
>   # Loaded module rlm_linelog
>   # Loading module "linelog" from file /etc/freeradius/mods-enabled/linelog
>   linelog {
>         filename = "/var/log/freeradius/linelog"
>         escape_filenames = no
>         syslog_severity = "info"
>         permissions = 384
>         format = "This is a log message for %{User-Name}"
>         reference = "messages.%{%{reply:Packet-Type}:-default}"
>   }
>   # Loading module "log_accounting" from file 
> /etc/freeradius/mods-enabled/linelog
>   linelog log_accounting {
>         filename = "/var/log/freeradius/linelog-accounting"
>         escape_filenames = no
>         syslog_severity = "info"
>         permissions = 384
>         format = ""
>         reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}"
>   }
>   # Loading module "detail" from file /etc/freeradius/mods-enabled/detail
>   detail {
>         filename = 
> "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"
>         header = "%t"
>         permissions = 384
>         locking = no
>         escape_filenames = no
>         log_packet_header = no
>   }
>   # Loaded module rlm_dynamic_clients
>   # Loading module "dynamic_clients" from file 
> /etc/freeradius/mods-enabled/dynamic_clients
>   # Loaded module rlm_unpack
>   # Loading module "unpack" from file /etc/freeradius/mods-enabled/unpack
>   # Loading module "sradutmp" from file /etc/freeradius/mods-enabled/sradutmp
>   radutmp sradutmp {
>         filename = "/var/log/freeradius/sradutmp"
>         username = "%{User-Name}"
>         case_sensitive = yes
>         check_with_nas = yes
>         permissions = 420
>         caller_id = no
>   }
>   # Loaded module rlm_date
>   # Loading module "date" from file /etc/freeradius/mods-enabled/date
>   date {
>         format = "%b %e %Y %H:%M:%S %Z"
>         utc = no
>   }
>   # Loading module "wispr2date" from file /etc/freeradius/mods-enabled/date
>   date wispr2date {
>         format = "%Y-%m-%dT%H:%M:%S"
>         utc = no
>   }
>   # Loaded module rlm_expiration
>   # Loading module "expiration" from file 
> /etc/freeradius/mods-enabled/expiration
>   # Loading module "exec" from file /etc/freeradius/mods-enabled/exec
>   exec {
>         wait = no
>         input_pairs = "request"
>         shell_escape = yes
>         timeout = 10
>   }
>   # Loaded module rlm_mschap
>   # Loading module "mschap" from file /etc/freeradius/mods-enabled/mschap
>   mschap {
>         use_mppe = yes
>         require_encryption = no
>         require_strong = no
>         with_ntdomain_hack = yes
>    passchange {
>    }
>         allow_retry = yes
>         winbind_retry_with_normalised_username = no
>   }
>   # Loaded module rlm_utf8
>   # Loading module "utf8" from file /etc/freeradius/mods-enabled/utf8
>   # Loaded module rlm_attr_filter
>   # Loading module "attr_filter.post-proxy" from file 
> /etc/freeradius/mods-enabled/attr_filter
>   attr_filter attr_filter.post-proxy {
>         filename = "/etc/freeradius/mods-config/attr_filter/post-proxy"
>         key = "%{Realm}"
>         relaxed = no
>   }
>   # Loading module "attr_filter.pre-proxy" from file 
> /etc/freeradius/mods-enabled/attr_filter
>   attr_filter attr_filter.pre-proxy {
>         filename = "/etc/freeradius/mods-config/attr_filter/pre-proxy"
>         key = "%{Realm}"
>         relaxed = no
>   }
>   # Loading module "attr_filter.access_reject" from file 
> /etc/freeradius/mods-enabled/attr_filter
>   attr_filter attr_filter.access_reject {
>         filename = "/etc/freeradius/mods-config/attr_filter/access_reject"
>         key = "%{User-Name}"
>         relaxed = no
>   }
>   # Loading module "attr_filter.access_challenge" from file 
> /etc/freeradius/mods-enabled/attr_filter
>   attr_filter attr_filter.access_challenge {
>         filename = "/etc/freeradius/mods-config/attr_filter/access_challenge"
>         key = "%{User-Name}"
>         relaxed = no
>   }
>   # Loading module "attr_filter.accounting_response" from file 
> /etc/freeradius/mods-enabled/attr_filter
>   attr_filter attr_filter.accounting_response {
>         filename = 
> "/etc/freeradius/mods-config/attr_filter/accounting_response"
>         key = "%{User-Name}"
>         relaxed = no
>   }
>   # Loading module "attr_filter.coa" from file 
> /etc/freeradius/mods-enabled/attr_filter
>   attr_filter attr_filter.coa {
>         filename = "/etc/freeradius/mods-config/attr_filter/coa"
>         key = "%{User-Name}"
>         relaxed = no
>   }
>   # Loaded module rlm_pap
>   # Loading module "pap" from file /etc/freeradius/mods-enabled/pap
>   pap {
>         normalise = yes
>   }
>   # Loaded module rlm_always
>   # Loading module "reject" from file /etc/freeradius/mods-enabled/always
>   always reject {
>         rcode = "reject"
>         simulcount = 0
>         mpp = no
>   }
>   # Loading module "fail" from file /etc/freeradius/mods-enabled/always
>   always fail {
>         rcode = "fail"
>         simulcount = 0
>         mpp = no
>   }
>   # Loading module "ok" from file /etc/freeradius/mods-enabled/always
>   always ok {
>         rcode = "ok"
>         simulcount = 0
>         mpp = no
>   }
>   # Loading module "handled" from file /etc/freeradius/mods-enabled/always
>   always handled {
>         rcode = "handled"
>         simulcount = 0
>         mpp = no
>   }
>   # Loading module "invalid" from file /etc/freeradius/mods-enabled/always
>   always invalid {
>         rcode = "invalid"
>         simulcount = 0
>         mpp = no
>   }
>   # Loading module "userlock" from file /etc/freeradius/mods-enabled/always
>   always userlock {
>         rcode = "userlock"
>         simulcount = 0
>         mpp = no
>   }
>   # Loading module "notfound" from file /etc/freeradius/mods-enabled/always
>   always notfound {
>         rcode = "notfound"
>         simulcount = 0
>         mpp = no
>   }
>   # Loading module "noop" from file /etc/freeradius/mods-enabled/always
>   always noop {
>         rcode = "noop"
>         simulcount = 0
>         mpp = no
>   }
>   # Loading module "updated" from file /etc/freeradius/mods-enabled/always
>   always updated {
>         rcode = "updated"
>         simulcount = 0
>         mpp = no
>   }
>   instantiate {
>   }
>   # Instantiating module "cache_eap" from file 
> /etc/freeradius/mods-enabled/cache_eap
> rlm_cache (cache_eap): Driver rlm_cache_rbtree (module rlm_cache_rbtree) 
> loaded and linked
>   # Instantiating module "eap" from file /etc/freeradius/mods-enabled/eap
>    # Linked to sub-module rlm_eap_md5
>    # Linked to sub-module rlm_eap_gtc
>    gtc {
>         challenge = "Password: "
>         auth_type = "PAP"
>    }
>    # Linked to sub-module rlm_eap_tls
>    tls {
>         tls = "tls-common"
>    }
>    tls-config tls-common {
>         verify_depth = 0
>         ca_path = "/etc/freeradius/certs"
>         pem_file_type = yes
>         private_key_file = "/etc/freeradius/certs/server.pem"
>         certificate_file = "/etc/freeradius/certs/server.pem"
>         ca_file = "/etc/freeradius/certs/ca.pem"
>         private_key_password = <<< secret >>>
>         dh_file = "/etc/freeradius/certs/dh"
>         fragment_size = 1024
>         include_length = yes
>         auto_chain = yes
>         check_crl = no
>         check_all_crl = no
>         ca_path_reload_interval = 0
>         cipher_list = "DEFAULT"
>         cipher_server_preference = no
>         reject_unknown_intermediate_ca = no
>         ecdh_curve = "prime256v1"
>         tls_max_version = "1.2"
>         tls_min_version = "1.2"
>     cache {
>         enable = no
>         lifetime = 24
>         max_entries = 255
>     }
>     verify {
>         skip_if_ocsp_ok = no
>     }
>     ocsp {
>         enable = no
>         override_cert_url = yes
>         url = "http://127.0.0.1/ocsp/ 
> <https://urldefense.com/v3/__http://127.0.0.1/ocsp/__;!!GjvTz_vk!RiAE0UdCVgF5Q4dnKxPKdS2ahcgEK6F_mTKGpw5qB9dYYl6IGLQBWsCY5Qt6HeVvDkOX9gkzXtFD4-k7xcRz8g$>"
>         use_nonce = yes
>         timeout = 0
>         softfail = no
>     }
>    }
>    # Linked to sub-module rlm_eap_ttls
>    ttls {
>         tls = "tls-common"
>         default_eap_type = "md5"
>         copy_request_to_tunnel = no
>         use_tunneled_reply = no
>         virtual_server = "inner-tunnel"
>         include_length = yes
>         require_client_cert = no
>    }
> tls: Using cached TLS configuration from previous invocation
>    # Linked to sub-module rlm_eap_peap
>    peap {
>         tls = "tls-common"
>         default_eap_type = "mschapv2"
>         copy_request_to_tunnel = no
>         use_tunneled_reply = no
>         proxy_tunneled_request_as_eap = yes
>         virtual_server = "inner-tunnel"
>         soh = no
>         require_client_cert = no
>    }
> tls: Using cached TLS configuration from previous invocation
>    # Linked to sub-module rlm_eap_mschapv2
>    mschapv2 {
>         with_ntdomain_hack = no
>         send_error = no
>    }
>   # Instantiating module "IPASS" from file /etc/freeradius/mods-enabled/realm
>   # Instantiating module "suffix" from file /etc/freeradius/mods-enabled/realm
>   # Instantiating module "bangpath" from file 
> /etc/freeradius/mods-enabled/realm
>   # Instantiating module "realmpercent" from file 
> /etc/freeradius/mods-enabled/realm
>   # Instantiating module "ntdomain" from file 
> /etc/freeradius/mods-enabled/realm
>   # Instantiating module "etc_passwd" from file 
> /etc/freeradius/mods-enabled/passwd
> rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no
>   # Instantiating module "files" from file /etc/freeradius/mods-enabled/files
> reading pairlist file /etc/freeradius/mods-config/files/authorize
> reading pairlist file /etc/freeradius/mods-config/files/accounting
> reading pairlist file /etc/freeradius/mods-config/files/pre-proxy
>   # Instantiating module "preprocess" from file 
> /etc/freeradius/mods-enabled/preprocess
> reading pairlist file /etc/freeradius/mods-config/preprocess/huntgroups
> reading pairlist file /etc/freeradius/mods-config/preprocess/hints
>   # Instantiating module "logintime" from file 
> /etc/freeradius/mods-enabled/logintime
>   # Instantiating module "auth_log" from file 
> /etc/freeradius/mods-enabled/detail.log
> rlm_detail (auth_log): 'User-Password' suppressed, will not appear in detail 
> output
>   # Instantiating module "reply_log" from file 
> /etc/freeradius/mods-enabled/detail.log
>   # Instantiating module "pre_proxy_log" from file 
> /etc/freeradius/mods-enabled/detail.log
>   # Instantiating module "post_proxy_log" from file 
> /etc/freeradius/mods-enabled/detail.log
>   # Instantiating module "linelog" from file 
> /etc/freeradius/mods-enabled/linelog
>   # Instantiating module "log_accounting" from file 
> /etc/freeradius/mods-enabled/linelog
>   # Instantiating module "detail" from file 
> /etc/freeradius/mods-enabled/detail
>   # Instantiating module "expiration" from file 
> /etc/freeradius/mods-enabled/expiration
>   # Instantiating module "mschap" from file 
> /etc/freeradius/mods-enabled/mschap
> rlm_mschap (mschap): using internal authentication
>   # Instantiating module "attr_filter.post-proxy" from file 
> /etc/freeradius/mods-enabled/attr_filter
> reading pairlist file /etc/freeradius/mods-config/attr_filter/post-proxy
>   # Instantiating module "attr_filter.pre-proxy" from file 
> /etc/freeradius/mods-enabled/attr_filter
> reading pairlist file /etc/freeradius/mods-config/attr_filter/pre-proxy
>   # Instantiating module "attr_filter.access_reject" from file 
> /etc/freeradius/mods-enabled/attr_filter
> reading pairlist file /etc/freeradius/mods-config/attr_filter/access_reject
>   # Instantiating module "attr_filter.access_challenge" from file 
> /etc/freeradius/mods-enabled/attr_filter
> reading pairlist file /etc/freeradius/mods-config/attr_filter/access_challenge
>   # Instantiating module "attr_filter.accounting_response" from file 
> /etc/freeradius/mods-enabled/attr_filter
> reading pairlist file 
> /etc/freeradius/mods-config/attr_filter/accounting_response
>   # Instantiating module "attr_filter.coa" from file 
> /etc/freeradius/mods-enabled/attr_filter
> reading pairlist file /etc/freeradius/mods-config/attr_filter/coa
>   # Instantiating module "pap" from file /etc/freeradius/mods-enabled/pap
>   # Instantiating module "reject" from file 
> /etc/freeradius/mods-enabled/always
>   # Instantiating module "fail" from file /etc/freeradius/mods-enabled/always
>   # Instantiating module "ok" from file /etc/freeradius/mods-enabled/always
>   # Instantiating module "handled" from file 
> /etc/freeradius/mods-enabled/always
>   # Instantiating module "invalid" from file 
> /etc/freeradius/mods-enabled/always
>   # Instantiating module "userlock" from file 
> /etc/freeradius/mods-enabled/always
>   # Instantiating module "notfound" from file 
> /etc/freeradius/mods-enabled/always
>   # Instantiating module "noop" from file /etc/freeradius/mods-enabled/always
>   # Instantiating module "updated" from file 
> /etc/freeradius/mods-enabled/always
>  } # modules
> radiusd: #### Loading Virtual Servers ####
> server { # from file /etc/freeradius/radiusd.conf
> } # server
> server inner-tunnel { # from file /etc/freeradius/sites-enabled/inner-tunnel
>  # Loading authenticate {...}
> Compiling Auth-Type PAP for attr Auth-Type
> Compiling Auth-Type CHAP for attr Auth-Type
> Compiling Auth-Type MS-CHAP for attr Auth-Type
>  # Loading authorize {...}
> Ignoring "sql" (see raddb/mods-available/README.rst)
> Ignoring "ldap" (see raddb/mods-available/README.rst)
>  # Loading session {...}
>  # Loading post-proxy {...}
>  # Loading post-auth {...}
>  # Skipping contents of 'if' as it is always 'false' -- 
> /etc/freeradius/sites-enabled/inner-tunnel:336
> Compiling Post-Auth-Type REJECT for attr Post-Auth-Type
> } # server inner-tunnel
> server default { # from file /etc/freeradius/sites-enabled/default
>  # Loading authenticate {...}
> Compiling Auth-Type PAP for attr Auth-Type
> Compiling Auth-Type CHAP for attr Auth-Type
> Compiling Auth-Type MS-CHAP for attr Auth-Type
>  # Loading authorize {...}
> Compiling Autz-Type New-TLS-Connection for attr Autz-Type
>  # Loading preacct {...}
>  # Loading accounting {...}
>  # Loading post-proxy {...}
>  # Loading post-auth {...}
> Compiling Post-Auth-Type REJECT for attr Post-Auth-Type
> Compiling Post-Auth-Type Challenge for attr Post-Auth-Type
> Compiling Post-Auth-Type Client-Lost for attr Post-Auth-Type
> } # server default
> radiusd: #### Opening IP addresses and Ports ####
> listen {
>         type = "auth"
>         ipaddr = 127.0.0.1
>         port = 18120
> Failed binding to auth address 127.0.0.1 port 18120 bound to server 
> inner-tunnel: Address already in use
> /etc/freeradius/sites-enabled/inner-tunnel[33]: Error binding to port for 
> 127.0.0.1 port 18120
> 
> With many thanks 
> Regards,
> Thirunavukkarasu

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to