If you use Trace 3 and something like LogFile %d-radius.log in your .cfg file, these 3 scripts might prove useful as a cronable task on UNIX to grab all the logfile info and copy it to a file that is on your web server. The .html file will be refreshed so that you get a display of the denied access attempts that occur on your Radiator servers by pointing a browser on your workstation at this file. Have fun, Chris #! /bin/sh # # scanRadiatorLog # check the Radiator log for bad things to report to tech support staff # # Look for these messages: # # INFO: Access rejected for barbina: No such user cat `/sbin/awkRadiatorDate` | grep INFO | grep 'Access rejected for' | /sbin/CREachLine > /tmp/rad$$ # now spew the results to a file and copy it to the monitoring server echo " <HTML>" > /tmp/radiator$$ echo "<HEAD>" >> /tmp/radiator$$ echo "<TITLE>" >> /tmp/radiator$$ echo "Radiator Authentication Log History" >> /tmp/radiator$$ echo "</TITLE>" >> /tmp/radiator$$ echo "<META HTTP-EQUIV=""Refresh"" CONTENT=300 >" >> /tmp/radiator$$ echo "</HEAD>" >> /tmp/radiator$$ echo "<BODY>" >> /tmp/radiator$$ echo "<H1>Users that have authentication problems</H1>" >> /tmp/radiator$$ echo "<HR>" >> /tmp/radiator$$ cat /tmp/rad$$ >> /tmp/radiator$$ echo "</BODY>" >> /tmp/radiator$$ echo "</HTML>" >> /tmp/radiator$$ /usr/bin/scp /tmp/radiator$$ yourhost:/home/httpd/html/mrtg/radiator/auth_log.html rm /tmp/rad$$ rm /tmp/radiator$$ exit # # add an HTML break after each line # # CREachLine # awk 'BEGIN { while ( getline > 0 ) { printf "%s<BR>\n",$0 } }' #! /bin/sh # # awkRadiatorDate # figure out what Radiator log file to look at # date | awk 'BEGIN { while ( getline > 0 ) { printf "\/var\/log\/radius\/%s-radius.log\n", $3 } }' === Archive at http://www.thesite.com.au/~radiator/ To unsubscribe, email '[EMAIL PROTECTED]' with 'unsubscribe radiator' in the body of the message.