Re: [PacketFence-users] Packetfence-ZEN-5-1 bandwidth violation

2015-07-31 Thread Hubert Kupper

Hi Fabrice,

should I use PF ZEN 5.3.1 and how to upgrade from ZEN 5.1.? How to do a 
interim update of radius in ZEN?


Regards
Hubert

Am 30.07.2015 um 14:19 schrieb Fabrice DURAND:

Hi Hubert,

It works when you disconnect because a radius accounting stop is sent, 
so it probably miss radius interim update.


Regards
Fabrice

Le 2015-07-30 07:29, Hubert Kupper a écrit :

Hi Louis,

I had a copy of the original violations.conf and copied it into the 
pf/conf directory. I edited the bandwidth exampel of the new 
violations.conf and now it works! The violation occours when I 
download more than 2GB/day but only if I disattach my device from 
network. What can be the reason of this?


Regards,
Hubert

Am 30.07.2015 um 06:50 schrieb Hubert Kupper:

Hello Louis,

I turned off pfbandwidth.d as you said.

pf.conf:

[general]
#
# general.domain
#
# Domain name of PacketFence system.
domain=our domain
#
# general.hostname
#
# Hostname of PacketFence system.  This is concatenated with the 
domain in Apache rewriting rules and therefore must be resolvable by 
clients.

hostname=pfence2
#
# general.dnsservers
#
# Comma-delimited list of DNS servers.  Passthroughs are created to 
allow queries to these servers from even trapped nodes.

dnsservers=IPs of our dns servers,127.0.0.1
#
# general.dhcpservers
#
# Comma-delimited list of DHCP servers.  Passthroughs are created to 
allow DHCP transactions from even trapped nodes.

dhcpservers=127.0.0.1,IPs of our dhcp servers
#
# general.timezone
#
# System's timezone in string format. Supported list:
# http://www.php.net/manual/en/timezones.php
timezone=Europe/Berlin

[trapping]
#
# trapping.range
#
# Comma-delimited list of address ranges/CIDR blocks that 
PacketFence will monitor/detect/trap on.  Gateway, network, and

# broadcast addresses are ignored.
range=our range

[alerting]
#
# alerting.emailaddr
#
# Email address to which notifications of rogue DHCP servers, 
violations with an action of email, or any other

# PacketFence-related message goes to.
emailaddr=f...@uni-landau.de

[database]
#
# database.pass
#
# Password for the mysql database used by PacketFence.
pass=foo
#
# database.user
#
# Username of the account with access to the mysql database used by 
PacketFence.

user=fooadmin

[expire]
#
# expire.node
#
# Time before a node is removed due to inactivity.
# A value of 0D disables expiration.
# example:
# node=90D
node=2m

[services]
#
# services.pfsetvlan
#
# Should pfsetvlan be managed by PacketFence?
pfsetvlan=enabled
#
# services.snmptrapd
#
# Should snmptrapd be managed by PacketFence?
snmptrapd=enabled
# database.pass
#
# Password for the mysql database used by PacketFence.
pass=foo
#
# database.user
#
# Username of the account with access to the mysql database used by 
PacketFence.

user=fooadmin

[expire]
#
# expire.node
#
# Time before a node is removed due to inactivity.
# A value of 0D disables expiration.
# example:
# node=90D
node=2m

[services]
#
# services.pfsetvlan
#
# Should pfsetvlan be managed by PacketFence?
pfsetvlan=enabled
#
# services.snmptrapd
#
# Should snmptrapd be managed by PacketFence?
snmptrapd=enabled

[inline]
#
# inline.interfaceSNAT
# Choose the interface(s) you want to use to enable snat (by default 
it´s the management interface)

interfaceSNAT=eth0.209
# inline.accounting
#
# Should we handle accouting data for inline clients?
# This controls inline accouting tasks in pfmon.
accounting=enabled


[interface eth0.37]
enforcement=vlan
ip=ip for vlan 37
type=management
mask=255.255.255.0

[interface eth0.209]
enforcement=vlan
ip=ip for vlan 209
type=internal,monitor
mask=255.255.255.0

[interface eth0.212]
enforcement=vlan
ip=ip for vlan 212
type=internal
mask=255.255.255.0

[interface eth0.213]
enforcement=vlan
ip=ip for vlan 213
type=internal
mask=255.255.255.0

Am 29.07.2015 um 15:39 schrieb Louis Munro:

Is this inline or out-of-band?

Please post your pf.conf.

Regards,
--
Louis Munro
lmu...@inverse.ca mailto:lmu...@inverse.ca  :: www.inverse.ca 
http://www.inverse.ca

+1.514.447.4918 x125  :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu 
http://www.sogo.nu) and PacketFence (www.packetfence.org 
http://www.packetfence.org)


On Jul 29, 2015, at 3:52 , Hubert Kupper kup...@uni-landau.de 
mailto:kup...@uni-landau.de wrote:



Hi Louis,

pfbandwidthd is using 100% cpu time and pfbandwidthd.log shows:

Jul 20 07:30:57 pfbandwidthd(5868) INFO: pfbandwidthd starting and 
writing 5871 to /usr/local/pf/var/run/pfbandwidthd.pid 
(pf::services::util::createpid)
Jul 21 02:04:13 pfbandwidthd(5868) FATAL: pfbandwidthd: caught 
SIGTERM - terminating (main::normal_sighandler)
Jul 21 02:04:13 pfbandwidthd(5868) FATAL: pfbandwidthd: caught 
SIGTERM - terminating at /usr/local/pf/sbin/pfbandwidthd line 285

 (IO::Select::can_read)
Jul 21 02:04:13 pfbandwidthd(5868) ERROR: pfbandwidthd: caught 
SIGTERM - terminating at /usr/local/pf/sbin/pfbandwidthd line 285

 (IO::Select::can_read)
Jul 21 02:05:24 

Re: [PacketFence-users] Packetfence-ZEN-5-1 bandwidth violation

2015-07-31 Thread Durand fabrice

Hi Hubert,

Interim update has to be configured on the AP side, not on PacketFence side.

Regards
Fabrice


Le 2015-07-31 00:13, Hubert Kupper a écrit :

Hi Fabrice,

should I use PF ZEN 5.3.1 and how to upgrade from ZEN 5.1.? How to do 
a interim update of radius in ZEN?


Regards
Hubert

Am 30.07.2015 um 14:19 schrieb Fabrice DURAND:

Hi Hubert,

It works when you disconnect because a radius accounting stop is 
sent, so it probably miss radius interim update.


Regards
Fabrice

Le 2015-07-30 07:29, Hubert Kupper a écrit :

Hi Louis,

I had a copy of the original violations.conf and copied it into the 
pf/conf directory. I edited the bandwidth exampel of the new 
violations.conf and now it works! The violation occours when I 
download more than 2GB/day but only if I disattach my device from 
network. What can be the reason of this?


Regards,
Hubert

Am 30.07.2015 um 06:50 schrieb Hubert Kupper:

Hello Louis,

I turned off pfbandwidth.d as you said.

pf.conf:

[general]
#
# general.domain
#
# Domain name of PacketFence system.
domain=our domain
#
# general.hostname
#
# Hostname of PacketFence system.  This is concatenated with the 
domain in Apache rewriting rules and therefore must be resolvable 
by clients.

hostname=pfence2
#
# general.dnsservers
#
# Comma-delimited list of DNS servers.  Passthroughs are created to 
allow queries to these servers from even trapped nodes.

dnsservers=IPs of our dns servers,127.0.0.1
#
# general.dhcpservers
#
# Comma-delimited list of DHCP servers.  Passthroughs are created 
to allow DHCP transactions from even trapped nodes.

dhcpservers=127.0.0.1,IPs of our dhcp servers
#
# general.timezone
#
# System's timezone in string format. Supported list:
# http://www.php.net/manual/en/timezones.php
timezone=Europe/Berlin

[trapping]
#
# trapping.range
#
# Comma-delimited list of address ranges/CIDR blocks that 
PacketFence will monitor/detect/trap on.  Gateway, network, and

# broadcast addresses are ignored.
range=our range

[alerting]
#
# alerting.emailaddr
#
# Email address to which notifications of rogue DHCP servers, 
violations with an action of email, or any other

# PacketFence-related message goes to.
emailaddr=f...@uni-landau.de

[database]
#
# database.pass
#
# Password for the mysql database used by PacketFence.
pass=foo
#
# database.user
#
# Username of the account with access to the mysql database used by 
PacketFence.

user=fooadmin

[expire]
#
# expire.node
#
# Time before a node is removed due to inactivity.
# A value of 0D disables expiration.
# example:
# node=90D
node=2m

[services]
#
# services.pfsetvlan
#
# Should pfsetvlan be managed by PacketFence?
pfsetvlan=enabled
#
# services.snmptrapd
#
# Should snmptrapd be managed by PacketFence?
snmptrapd=enabled
# database.pass
#
# Password for the mysql database used by PacketFence.
pass=foo
#
# database.user
#
# Username of the account with access to the mysql database used by 
PacketFence.

user=fooadmin

[expire]
#
# expire.node
#
# Time before a node is removed due to inactivity.
# A value of 0D disables expiration.
# example:
# node=90D
node=2m

[services]
#
# services.pfsetvlan
#
# Should pfsetvlan be managed by PacketFence?
pfsetvlan=enabled
#
# services.snmptrapd
#
# Should snmptrapd be managed by PacketFence?
snmptrapd=enabled

[inline]
#
# inline.interfaceSNAT
# Choose the interface(s) you want to use to enable snat (by 
default it´s the management interface)

interfaceSNAT=eth0.209
# inline.accounting
#
# Should we handle accouting data for inline clients?
# This controls inline accouting tasks in pfmon.
accounting=enabled


[interface eth0.37]
enforcement=vlan
ip=ip for vlan 37
type=management
mask=255.255.255.0

[interface eth0.209]
enforcement=vlan
ip=ip for vlan 209
type=internal,monitor
mask=255.255.255.0

[interface eth0.212]
enforcement=vlan
ip=ip for vlan 212
type=internal
mask=255.255.255.0

[interface eth0.213]
enforcement=vlan
ip=ip for vlan 213
type=internal
mask=255.255.255.0

Am 29.07.2015 um 15:39 schrieb Louis Munro:

Is this inline or out-of-band?

Please post your pf.conf.

Regards,
--
Louis Munro
lmu...@inverse.ca mailto:lmu...@inverse.ca  :: www.inverse.ca 
http://www.inverse.ca

+1.514.447.4918 x125  :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu 
http://www.sogo.nu) and PacketFence (www.packetfence.org 
http://www.packetfence.org)


On Jul 29, 2015, at 3:52 , Hubert Kupper kup...@uni-landau.de 
mailto:kup...@uni-landau.de wrote:



Hi Louis,

pfbandwidthd is using 100% cpu time and pfbandwidthd.log shows:

Jul 20 07:30:57 pfbandwidthd(5868) INFO: pfbandwidthd starting 
and writing 5871 to /usr/local/pf/var/run/pfbandwidthd.pid 
(pf::services::util::createpid)
Jul 21 02:04:13 pfbandwidthd(5868) FATAL: pfbandwidthd: caught 
SIGTERM - terminating (main::normal_sighandler)
Jul 21 02:04:13 pfbandwidthd(5868) FATAL: pfbandwidthd: caught 
SIGTERM - terminating at /usr/local/pf/sbin/pfbandwidthd line 285

 (IO::Select::can_read)
Jul 21 02:04:13 

Re: [PacketFence-users] Packetfence-ZEN-5-1 bandwidth violation

2015-07-30 Thread Fabrice DURAND
Hi Hubert,

It works when you disconnect because a radius accounting stop is sent,
so it probably miss radius interim update.

Regards
Fabrice

Le 2015-07-30 07:29, Hubert Kupper a écrit :
 Hi Louis,

 I had a copy of the original violations.conf and copied it into the
 pf/conf directory. I edited the bandwidth exampel of the new
 violations.conf and now it works! The violation occours when I
 download more than 2GB/day but only if I disattach my device from
 network. What can be the reason of this?

 Regards,
 Hubert
  
 Am 30.07.2015 um 06:50 schrieb Hubert Kupper:
 Hello Louis,

 I turned off pfbandwidth.d as you said.

 pf.conf:

 [general]
 #
 # general.domain
 #
 # Domain name of PacketFence system.
 domain=our domain
 #
 # general.hostname
 #
 # Hostname of PacketFence system.  This is concatenated with the
 domain in Apache rewriting rules and therefore must be resolvable by
 clients.
 hostname=pfence2
 #
 # general.dnsservers
 #
 # Comma-delimited list of DNS servers.  Passthroughs are created to
 allow queries to these servers from even trapped nodes.
 dnsservers=IPs of our dns servers,127.0.0.1
 #
 # general.dhcpservers
 #
 # Comma-delimited list of DHCP servers.  Passthroughs are created to
 allow DHCP transactions from even trapped nodes.
 dhcpservers=127.0.0.1,IPs of our dhcp servers
 #
 # general.timezone
 #
 # System's timezone in string format. Supported list:
 # http://www.php.net/manual/en/timezones.php
 timezone=Europe/Berlin

 [trapping]
 #
 # trapping.range
 #
 # Comma-delimited list of address ranges/CIDR blocks that PacketFence
 will monitor/detect/trap on.  Gateway, network, and
 # broadcast addresses are ignored.
 range=our range

 [alerting]
 #
 # alerting.emailaddr
 #
 # Email address to which notifications of rogue DHCP servers,
 violations with an action of email, or any other
 # PacketFence-related message goes to.
 emailaddr=f...@uni-landau.de

 [database]
 #
 # database.pass
 #
 # Password for the mysql database used by PacketFence.
 pass=foo
 #
 # database.user
 #
 # Username of the account with access to the mysql database used by
 PacketFence.
 user=fooadmin

 [expire]
 #
 # expire.node
 #
 # Time before a node is removed due to inactivity.
 # A value of 0D disables expiration.
 # example:
 # node=90D
 node=2m

 [services]
 #
 # services.pfsetvlan
 #
 # Should pfsetvlan be managed by PacketFence?
 pfsetvlan=enabled
 #
 # services.snmptrapd
 #
 # Should snmptrapd be managed by PacketFence?
 snmptrapd=enabled
 # database.pass
 #
 # Password for the mysql database used by PacketFence.
 pass=foo
 #
 # database.user
 #
 # Username of the account with access to the mysql database used by
 PacketFence.
 user=fooadmin

 [expire]
 #
 # expire.node
 #
 # Time before a node is removed due to inactivity.
 # A value of 0D disables expiration.
 # example:
 # node=90D
 node=2m

 [services]
 #
 # services.pfsetvlan
 #
 # Should pfsetvlan be managed by PacketFence?
 pfsetvlan=enabled
 #
 # services.snmptrapd
 #
 # Should snmptrapd be managed by PacketFence?
 snmptrapd=enabled

 [inline]
 #
 # inline.interfaceSNAT
 # Choose the interface(s) you want to use to enable snat (by default
 it´s the management interface)
 interfaceSNAT=eth0.209
 # inline.accounting
 #
 # Should we handle accouting data for inline clients?
 # This controls inline accouting tasks in pfmon.
 accounting=enabled


 [interface eth0.37]
 enforcement=vlan
 ip=ip for vlan 37
 type=management
 mask=255.255.255.0

 [interface eth0.209]
 enforcement=vlan
 ip=ip for vlan 209
 type=internal,monitor
 mask=255.255.255.0

 [interface eth0.212]
 enforcement=vlan
 ip=ip for vlan 212
 type=internal
 mask=255.255.255.0

 [interface eth0.213]
 enforcement=vlan
 ip=ip for vlan 213
 type=internal
 mask=255.255.255.0

 Am 29.07.2015 um 15:39 schrieb Louis Munro:
 Is this inline or out-of-band? 

 Please post your pf.conf.

 Regards,
 --
 Louis Munro
 lmu...@inverse.ca mailto:lmu...@inverse.ca  ::  www.inverse.ca
 http://www.inverse.ca 
 +1.514.447.4918 x125  :: +1 (866) 353-6153 x125
 Inverse inc. :: Leaders behind SOGo (www.sogo.nu
 http://www.sogo.nu) and PacketFence (www.packetfence.org
 http://www.packetfence.org)

 On Jul 29, 2015, at 3:52 , Hubert Kupper kup...@uni-landau.de
 mailto:kup...@uni-landau.de wrote:

 Hi Louis,

 pfbandwidthd is using 100% cpu time and pfbandwidthd.log shows:

 Jul 20 07:30:57 pfbandwidthd(5868) INFO: pfbandwidthd starting and
 writing 5871 to /usr/local/pf/var/run/pfbandwidthd.pid
 (pf::services::util::createpid)
 Jul 21 02:04:13 pfbandwidthd(5868) FATAL: pfbandwidthd: caught
 SIGTERM - terminating (main::normal_sighandler)
 Jul 21 02:04:13 pfbandwidthd(5868) FATAL: pfbandwidthd: caught
 SIGTERM - terminating at /usr/local/pf/sbin/pfbandwidthd line 285
  (IO::Select::can_read)
 Jul 21 02:04:13 pfbandwidthd(5868) ERROR: pfbandwidthd: caught
 SIGTERM - terminating at /usr/local/pf/sbin/pfbandwidthd line 285
  (IO::Select::can_read)
 Jul 21 02:05:24 pfbandwidthd(6848) INFO: pfbandwidthd starting and
 

Re: [PacketFence-users] Packetfence-ZEN-5-1 bandwidth violation

2015-07-30 Thread Hubert Kupper

Hi Louis,

I had a copy of the original violations.conf and copied it into the 
pf/conf directory. I edited the bandwidth exampel of the new 
violations.conf and now it works! The violation occours when I download 
more than 2GB/day but only if I disattach my device from network. What 
can be the reason of this?


Regards,
Hubert

Am 30.07.2015 um 06:50 schrieb Hubert Kupper:

Hello Louis,

I turned off pfbandwidth.d as you said.

pf.conf:

[general]
#
# general.domain
#
# Domain name of PacketFence system.
domain=our domain
#
# general.hostname
#
# Hostname of PacketFence system.  This is concatenated with the 
domain in Apache rewriting rules and therefore must be resolvable by 
clients.

hostname=pfence2
#
# general.dnsservers
#
# Comma-delimited list of DNS servers.  Passthroughs are created to 
allow queries to these servers from even trapped nodes.

dnsservers=IPs of our dns servers,127.0.0.1
#
# general.dhcpservers
#
# Comma-delimited list of DHCP servers.  Passthroughs are created to 
allow DHCP transactions from even trapped nodes.

dhcpservers=127.0.0.1,IPs of our dhcp servers
#
# general.timezone
#
# System's timezone in string format. Supported list:
# http://www.php.net/manual/en/timezones.php
timezone=Europe/Berlin

[trapping]
#
# trapping.range
#
# Comma-delimited list of address ranges/CIDR blocks that PacketFence 
will monitor/detect/trap on.  Gateway, network, and

# broadcast addresses are ignored.
range=our range

[alerting]
#
# alerting.emailaddr
#
# Email address to which notifications of rogue DHCP servers, 
violations with an action of email, or any other

# PacketFence-related message goes to.
emailaddr=f...@uni-landau.de

[database]
#
# database.pass
#
# Password for the mysql database used by PacketFence.
pass=foo
#
# database.user
#
# Username of the account with access to the mysql database used by 
PacketFence.

user=fooadmin

[expire]
#
# expire.node
#
# Time before a node is removed due to inactivity.
# A value of 0D disables expiration.
# example:
# node=90D
node=2m

[services]
#
# services.pfsetvlan
#
# Should pfsetvlan be managed by PacketFence?
pfsetvlan=enabled
#
# services.snmptrapd
#
# Should snmptrapd be managed by PacketFence?
snmptrapd=enabled
# database.pass
#
# Password for the mysql database used by PacketFence.
pass=foo
#
# database.user
#
# Username of the account with access to the mysql database used by 
PacketFence.

user=fooadmin

[expire]
#
# expire.node
#
# Time before a node is removed due to inactivity.
# A value of 0D disables expiration.
# example:
# node=90D
node=2m

[services]
#
# services.pfsetvlan
#
# Should pfsetvlan be managed by PacketFence?
pfsetvlan=enabled
#
# services.snmptrapd
#
# Should snmptrapd be managed by PacketFence?
snmptrapd=enabled

[inline]
#
# inline.interfaceSNAT
# Choose the interface(s) you want to use to enable snat (by default 
it´s the management interface)

interfaceSNAT=eth0.209
# inline.accounting
#
# Should we handle accouting data for inline clients?
# This controls inline accouting tasks in pfmon.
accounting=enabled


[interface eth0.37]
enforcement=vlan
ip=ip for vlan 37
type=management
mask=255.255.255.0

[interface eth0.209]
enforcement=vlan
ip=ip for vlan 209
type=internal,monitor
mask=255.255.255.0

[interface eth0.212]
enforcement=vlan
ip=ip for vlan 212
type=internal
mask=255.255.255.0

[interface eth0.213]
enforcement=vlan
ip=ip for vlan 213
type=internal
mask=255.255.255.0

Am 29.07.2015 um 15:39 schrieb Louis Munro:

Is this inline or out-of-band?

Please post your pf.conf.

Regards,
--
Louis Munro
lmu...@inverse.ca mailto:lmu...@inverse.ca  :: www.inverse.ca 
http://www.inverse.ca

+1.514.447.4918 x125  :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu 
http://www.sogo.nu) and PacketFence (www.packetfence.org 
http://www.packetfence.org)


On Jul 29, 2015, at 3:52 , Hubert Kupper kup...@uni-landau.de 
mailto:kup...@uni-landau.de wrote:



Hi Louis,

pfbandwidthd is using 100% cpu time and pfbandwidthd.log shows:

Jul 20 07:30:57 pfbandwidthd(5868) INFO: pfbandwidthd starting and 
writing 5871 to /usr/local/pf/var/run/pfbandwidthd.pid 
(pf::services::util::createpid)
Jul 21 02:04:13 pfbandwidthd(5868) FATAL: pfbandwidthd: caught 
SIGTERM - terminating (main::normal_sighandler)
Jul 21 02:04:13 pfbandwidthd(5868) FATAL: pfbandwidthd: caught 
SIGTERM - terminating at /usr/local/pf/sbin/pfbandwidthd line 285

 (IO::Select::can_read)
Jul 21 02:04:13 pfbandwidthd(5868) ERROR: pfbandwidthd: caught 
SIGTERM - terminating at /usr/local/pf/sbin/pfbandwidthd line 285

 (IO::Select::can_read)
Jul 21 02:05:24 pfbandwidthd(6848) INFO: pfbandwidthd starting and 
writing 6851 to /usr/local/pf/var/run/pfbandwidthd.pid 
(pf::services::util::createpid)
Jul 28 08:06:24 pfbandwidthd(6848) FATAL: pfbandwidthd: caught 
SIGTERM - terminating (main::normal_sighandler)
Jul 28 08:06:24 pfbandwidthd(6848) FATAL: pfbandwidthd: caught 
SIGTERM - terminating at /usr/local/pf/sbin/pfbandwidthd line 285

 

Re: [PacketFence-users] Packetfence-ZEN-5-1 bandwidth violation

2015-07-30 Thread Hubert Kupper

Hello Louis,

I turned off pfbandwidth.d as you said.

pf.conf:

[general]
#
# general.domain
#
# Domain name of PacketFence system.
domain=our domain
#
# general.hostname
#
# Hostname of PacketFence system.  This is concatenated with the domain 
in Apache rewriting rules and therefore must be resolvable by clients.

hostname=pfence2
#
# general.dnsservers
#
# Comma-delimited list of DNS servers.  Passthroughs are created to 
allow queries to these servers from even trapped nodes.

dnsservers=IPs of our dns servers,127.0.0.1
#
# general.dhcpservers
#
# Comma-delimited list of DHCP servers.  Passthroughs are created to 
allow DHCP transactions from even trapped nodes.

dhcpservers=127.0.0.1,IPs of our dhcp servers
#
# general.timezone
#
# System's timezone in string format. Supported list:
# http://www.php.net/manual/en/timezones.php
timezone=Europe/Berlin

[trapping]
#
# trapping.range
#
# Comma-delimited list of address ranges/CIDR blocks that PacketFence 
will monitor/detect/trap on.  Gateway, network, and

# broadcast addresses are ignored.
range=our range

[alerting]
#
# alerting.emailaddr
#
# Email address to which notifications of rogue DHCP servers, violations 
with an action of email, or any other

# PacketFence-related message goes to.
emailaddr=f...@uni-landau.de

[database]
#
# database.pass
#
# Password for the mysql database used by PacketFence.
pass=foo
#
# database.user
#
# Username of the account with access to the mysql database used by 
PacketFence.

user=fooadmin

[expire]
#
# expire.node
#
# Time before a node is removed due to inactivity.
# A value of 0D disables expiration.
# example:
# node=90D
node=2m

[services]
#
# services.pfsetvlan
#
# Should pfsetvlan be managed by PacketFence?
pfsetvlan=enabled
#
# services.snmptrapd
#
# Should snmptrapd be managed by PacketFence?
snmptrapd=enabled
# database.pass
#
# Password for the mysql database used by PacketFence.
pass=foo
#
# database.user
#
# Username of the account with access to the mysql database used by 
PacketFence.

user=fooadmin

[expire]
#
# expire.node
#
# Time before a node is removed due to inactivity.
# A value of 0D disables expiration.
# example:
# node=90D
node=2m

[services]
#
# services.pfsetvlan
#
# Should pfsetvlan be managed by PacketFence?
pfsetvlan=enabled
#
# services.snmptrapd
#
# Should snmptrapd be managed by PacketFence?
snmptrapd=enabled

[inline]
#
# inline.interfaceSNAT
# Choose the interface(s) you want to use to enable snat (by default 
it´s the management interface)

interfaceSNAT=eth0.209
# inline.accounting
#
# Should we handle accouting data for inline clients?
# This controls inline accouting tasks in pfmon.
accounting=enabled


[interface eth0.37]
enforcement=vlan
ip=ip for vlan 37
type=management
mask=255.255.255.0

[interface eth0.209]
enforcement=vlan
ip=ip for vlan 209
type=internal,monitor
mask=255.255.255.0

[interface eth0.212]
enforcement=vlan
ip=ip for vlan 212
type=internal
mask=255.255.255.0

[interface eth0.213]
enforcement=vlan
ip=ip for vlan 213
type=internal
mask=255.255.255.0

Am 29.07.2015 um 15:39 schrieb Louis Munro:

Is this inline or out-of-band?

Please post your pf.conf.

Regards,
--
Louis Munro
lmu...@inverse.ca mailto:lmu...@inverse.ca  :: www.inverse.ca 
http://www.inverse.ca

+1.514.447.4918 x125  :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu http://www.sogo.nu) 
and PacketFence (www.packetfence.org http://www.packetfence.org)


On Jul 29, 2015, at 3:52 , Hubert Kupper kup...@uni-landau.de 
mailto:kup...@uni-landau.de wrote:



Hi Louis,

pfbandwidthd is using 100% cpu time and pfbandwidthd.log shows:

Jul 20 07:30:57 pfbandwidthd(5868) INFO: pfbandwidthd starting and 
writing 5871 to /usr/local/pf/var/run/pfbandwidthd.pid 
(pf::services::util::createpid)
Jul 21 02:04:13 pfbandwidthd(5868) FATAL: pfbandwidthd: caught 
SIGTERM - terminating (main::normal_sighandler)
Jul 21 02:04:13 pfbandwidthd(5868) FATAL: pfbandwidthd: caught 
SIGTERM - terminating at /usr/local/pf/sbin/pfbandwidthd line 285

 (IO::Select::can_read)
Jul 21 02:04:13 pfbandwidthd(5868) ERROR: pfbandwidthd: caught 
SIGTERM - terminating at /usr/local/pf/sbin/pfbandwidthd line 285

 (IO::Select::can_read)
Jul 21 02:05:24 pfbandwidthd(6848) INFO: pfbandwidthd starting and 
writing 6851 to /usr/local/pf/var/run/pfbandwidthd.pid 
(pf::services::util::createpid)
Jul 28 08:06:24 pfbandwidthd(6848) FATAL: pfbandwidthd: caught 
SIGTERM - terminating (main::normal_sighandler)
Jul 28 08:06:24 pfbandwidthd(6848) FATAL: pfbandwidthd: caught 
SIGTERM - terminating at /usr/local/pf/sbin/pfbandwidthd line 285

 (IO::Select::can_read)
Jul 28 08:06:24 pfbandwidthd(6848) ERROR: pfbandwidthd: caught 
SIGTERM - terminating at /usr/local/pf/sbin/pfbandwidthd line 285

 (IO::Select::can_read)
Jul 28 08:06:24 pfbandwidthd(6848) FATAL: panic: leave_scope 
inconsistency at /usr/local/pf/sbin/pfbandwidthd line 157.

 (main::)
Jul 28 08:06:24 pfbandwidthd(6848) ERROR: panic: leave_scope 
inconsistency 

Re: [PacketFence-users] Packetfence-ZEN-5-1 bandwidth violation

2015-07-29 Thread Louis Munro
Turn off pfbandwithd.

If you have RADIUS accounting you don’t need it.

Regards,
--
Louis Munro
lmu...@inverse.ca  ::  www.inverse.ca 
+1.514.447.4918 x125  :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence 
(www.packetfence.org)

On Jul 29, 2015, at 3:52 , Hubert Kupper kup...@uni-landau.de wrote:

 Hi Louis,
 
 pfbandwidthd is using 100% cpu time and pfbandwidthd.log shows:
 
 Jul 20 07:30:57 pfbandwidthd(5868) INFO: pfbandwidthd starting and writing 
 5871 to /usr/local/pf/var/run/pfbandwidthd.pid (pf::services::util::createpid)
 Jul 21 02:04:13 pfbandwidthd(5868) FATAL: pfbandwidthd: caught SIGTERM - 
 terminating (main::normal_sighandler)
 Jul 21 02:04:13 pfbandwidthd(5868) FATAL: pfbandwidthd: caught SIGTERM - 
 terminating at /usr/local/pf/sbin/pfbandwidthd line 285
  (IO::Select::can_read)
 Jul 21 02:04:13 pfbandwidthd(5868) ERROR: pfbandwidthd: caught SIGTERM - 
 terminating at /usr/local/pf/sbin/pfbandwidthd line 285
  (IO::Select::can_read)
 Jul 21 02:05:24 pfbandwidthd(6848) INFO: pfbandwidthd starting and writing 
 6851 to /usr/local/pf/var/run/pfbandwidthd.pid (pf::services::util::createpid)
 Jul 28 08:06:24 pfbandwidthd(6848) FATAL: pfbandwidthd: caught SIGTERM - 
 terminating (main::normal_sighandler)
 Jul 28 08:06:24 pfbandwidthd(6848) FATAL: pfbandwidthd: caught SIGTERM - 
 terminating at /usr/local/pf/sbin/pfbandwidthd line 285
  (IO::Select::can_read)
 Jul 28 08:06:24 pfbandwidthd(6848) ERROR: pfbandwidthd: caught SIGTERM - 
 terminating at /usr/local/pf/sbin/pfbandwidthd line 285
  (IO::Select::can_read)
 Jul 28 08:06:24 pfbandwidthd(6848) FATAL: panic: leave_scope inconsistency at 
 /usr/local/pf/sbin/pfbandwidthd line 157.
  (main::)
 Jul 28 08:06:24 pfbandwidthd(6848) ERROR: panic: leave_scope inconsistency at 
 /usr/local/pf/sbin/pfbandwidthd line 157.
  (main::)
 Jul 28 08:06:24 pfbandwidthd(6848) FATAL: panic: leave_scope inconsistency at 
 /usr/local/pf/sbin/pfbandwidthd line 157.
  (main::)
 Jul 28 08:06:24 pfbandwidthd(6848) ERROR: panic: leave_scope inconsistency at 
 /usr/local/pf/sbin/pfbandwidthd line 157.
  (main::)
 Jul 28 08:07:29 pfbandwidthd(10196) INFO: pfbandwidthd starting and writing 
 10199 to /usr/local/pf/var/run/pfbandwidthd.pid 
 (pf::services::util::createpid)
 Jul 29 07:59:56 pfbandwidthd(10196) FATAL: pfbandwidthd: caught SIGTERM - 
 terminating (main::normal_sighandler)
 Jul 29 07:59:56 pfbandwidthd(10196) FATAL: pfbandwidthd: caught SIGTERM - 
 terminating at /usr/local/pf/sbin/pfbandwidthd line 285
  (main::)
 Jul 29 07:59:56 pfbandwidthd(10196) ERROR: pfbandwidthd: caught SIGTERM - 
 terminating at /usr/local/pf/sbin/pfbandwidthd line 285
  (main::)
 Jul 29 08:00:56 pfbandwidthd(12316) INFO: pfbandwidthd starting and writing 
 12319 to /usr/local/pf/var/run/pfbandwidthd.pid 
 (pf::services::util::createpid)
 [root@PacketFence-ZEN-5-1 logs]#
 
 Regards,
 Hubert
 
 Am 28.07.2015 um 20:23 schrieb Louis Munro:
 
 On Jul 28, 2015, at 8:37 , Hubert Kupper kup...@uni-landau.de wrote:
 
 there is traffic on port 1813 from the cisco switch to th server. tcpdump 
 shows it.
 
 mysql select count(*) from radacct; shows count(*) 44
 
 
 Is the MAC of the device among those listed in radacct?
 
 Something like this should return more: 
 
 mysql select 
 callingstationid,acctinputoctets,acctoutputoctets,acctstarttime from radacct;
 
 
 Regards,
 --
 Louis Munro
 
 --
 ___
 PacketFence-users mailing list
 PacketFence-users@lists.sourceforge.net
 https://lists.sourceforge.net/lists/listinfo/packetfence-users

--
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


Re: [PacketFence-users] Packetfence-ZEN-5-1 bandwidth violation

2015-07-29 Thread Hubert Kupper

Yes, the MAC ist listed in radacct.


mysql select 
callingstationid,acctinputoctets,acctoutputoctets,acctstarttime from 
radacct;

+--+-+--+-+
| callingstationid | acctinputoctets | acctoutputoctets | 
acctstarttime   |

+--+-+--+-+
| MAC of Device |  305985 |  2136314 | 2015-06-11 
05:31:10 |
| MAC of Device |  135939 |   321679 | 2015-06-11 
07:32:13 |
| MAC of Device |  544740 |  2168492 | 2015-06-11 
07:34:03 |
| MAC of Device |  411509 |  1880426 | 2015-06-16 
04:39:54 |
| MAC of Device |  316077 |  1993235 | 2015-07-01 
07:59:10 |
| MAC of Device |  315078 |  1101516 | 2015-07-02 
00:29:02 |
| MAC of Device |  226604 |   761901 | 2015-07-02 
01:43:50 |
| MAC of Device |   15288 |11989 | 2015-07-02 
01:47:19 |
| MAC of Device |   22990 |54229 | 2015-07-02 
04:06:15 |
| MAC of Device |   60292 |   165055 | 2015-07-02 
04:07:26 |
| MAC of Device |   0 |0 | 2015-07-02 
04:30:46 |
| MAC of Device |  196851 |   811680 | 2015-07-02 
04:38:57 |
| MAC of Device |   34725 |34158 | 2015-07-02 
07:07:31 |
| MAC of Device |   17383 |24721 | 2015-07-02 
07:17:34 |
| MAC of Device |   39313 |65616 | 2015-07-02 
07:24:14 |
| MAC of Device |  354304 |  1158021 | 2015-07-03 
01:13:53 |
| MAC of Device |  334114 |   570187 | 2015-07-03 
01:51:05 |
| MAC of Device |  212704 |   422752 | 2015-07-03 
04:55:47 |
| MAC of Device |  301328 |  1245402 | 2015-07-07 
07:36:40 |
| MAC of Device |   91855 |   267978 | 2015-07-07 
08:16:18 |
| MAC of Device |  118911 |   324120 | 2015-07-07 
08:36:41 |
| MAC of Device |   86473 |   329396 | 2015-07-08 
01:55:24 |
| MAC of Device |  442385 |  3770689 | 2015-07-08 
01:56:13 |
| MAC of Device |   124448991 |   5465876903 | 2015-07-09 
01:12:29 |
| MAC of Device |   127366974 |   9757331459 | 2015-07-09 
01:42:45 |
| MAC of Device |   131368744 |   9744742120 | 2015-07-09 
03:04:56 |
| MAC of Device |80610925 |   4877655570 | 2015-07-09 
04:53:02 |
| MAC of Device |   110464498 |   5096069898 | 2015-07-09 
05:30:39 |
| MAC of Device |  133285 |   870032 | 2015-07-14 
01:28:06 |
| MAC of Device |   251748459 |  10893782952 | 2015-07-14 
01:28:54 |
| MAC of Device |   39804 |99565 | 2015-07-14 
03:39:47 |
| MAC of Device |  349453 |  6216738 | 2015-07-14 
03:45:53 |
| MAC of Device |   13428 |32963 | 2015-07-14 
04:12:49 |
| MAC of Device |  165034 |   634026 | 2015-07-20 
05:22:59 |
| MAC of Device |82744904 |   5757677242 | 2015-07-20 
05:26:20 |
| MAC of Device | 6286503 |436994840 | 2015-07-20 
05:41:35 |
| MAC of Device | 8937332 |531312039 | 2015-07-20 
07:36:45 |
| MAC of Device | 5974933 |453600467 | 2015-07-20 
07:41:06 |
| MAC of Device | 1696527 |115864972 | 2015-07-20 
07:55:07 |
| MAC of Device |   15832 |   246426 | 2015-07-20 
08:01:41 |
| MAC of Device | 3415249 |208973612 | 2015-07-21 
03:05:05 |
| MAC of Device | 2701508 |153512871 | 2015-07-21 
03:08:54 |
| MAC of Device |   21482 | 6456 | 2015-07-28 
09:51:14 |
| MAC of Device |8756 |13620 | 2015-07-28 
09:54:30 |

+--+-+--+-+
44 rows in set (0.00 sec)

Regards,
Hubert



Am 28.07.2015 um 20:23 schrieb Louis Munro:


On Jul 28, 2015, at 8:37 , Hubert Kupper kup...@uni-landau.de 
mailto:kup...@uni-landau.de wrote:


there is traffic on port 1813 from the cisco switch to th server. 
tcpdump shows it.


mysql select count(*) from radacct; shows count(*) 44



Is the MAC of the device among those listed in radacct?

Something like this should return more:

mysql select 
callingstationid,acctinputoctets,acctoutputoctets,acctstarttime from 
radacct;



Regards,
--
Louis Munro
lmu...@inverse.ca mailto:lmu...@inverse.ca  :: www.inverse.ca 
http://www.inverse.ca

+1.514.447.4918 x125  :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu http://www.sogo.nu) 
and PacketFence (www.packetfence.org http://www.packetfence.org)




--



Re: [PacketFence-users] Packetfence-ZEN-5-1 bandwidth violation

2015-07-29 Thread Hubert Kupper

Hi Louis,

pfbandwidthd is using 100% cpu time and pfbandwidthd.log shows:

Jul 20 07:30:57 pfbandwidthd(5868) INFO: pfbandwidthd starting and 
writing 5871 to /usr/local/pf/var/run/pfbandwidthd.pid 
(pf::services::util::createpid)
Jul 21 02:04:13 pfbandwidthd(5868) FATAL: pfbandwidthd: caught SIGTERM - 
terminating (main::normal_sighandler)
Jul 21 02:04:13 pfbandwidthd(5868) FATAL: pfbandwidthd: caught SIGTERM - 
terminating at /usr/local/pf/sbin/pfbandwidthd line 285

 (IO::Select::can_read)
Jul 21 02:04:13 pfbandwidthd(5868) ERROR: pfbandwidthd: caught SIGTERM - 
terminating at /usr/local/pf/sbin/pfbandwidthd line 285

 (IO::Select::can_read)
Jul 21 02:05:24 pfbandwidthd(6848) INFO: pfbandwidthd starting and 
writing 6851 to /usr/local/pf/var/run/pfbandwidthd.pid 
(pf::services::util::createpid)
Jul 28 08:06:24 pfbandwidthd(6848) FATAL: pfbandwidthd: caught SIGTERM - 
terminating (main::normal_sighandler)
Jul 28 08:06:24 pfbandwidthd(6848) FATAL: pfbandwidthd: caught SIGTERM - 
terminating at /usr/local/pf/sbin/pfbandwidthd line 285

 (IO::Select::can_read)
Jul 28 08:06:24 pfbandwidthd(6848) ERROR: pfbandwidthd: caught SIGTERM - 
terminating at /usr/local/pf/sbin/pfbandwidthd line 285

 (IO::Select::can_read)
Jul 28 08:06:24 pfbandwidthd(6848) FATAL: panic: leave_scope 
inconsistency at /usr/local/pf/sbin/pfbandwidthd line 157.

 (main::)
Jul 28 08:06:24 pfbandwidthd(6848) ERROR: panic: leave_scope 
inconsistency at /usr/local/pf/sbin/pfbandwidthd line 157.

 (main::)
Jul 28 08:06:24 pfbandwidthd(6848) FATAL: panic: leave_scope 
inconsistency at /usr/local/pf/sbin/pfbandwidthd line 157.

 (main::)
Jul 28 08:06:24 pfbandwidthd(6848) ERROR: panic: leave_scope 
inconsistency at /usr/local/pf/sbin/pfbandwidthd line 157.

 (main::)
Jul 28 08:07:29 pfbandwidthd(10196) INFO: pfbandwidthd starting and 
writing 10199 to /usr/local/pf/var/run/pfbandwidthd.pid 
(pf::services::util::createpid)
Jul 29 07:59:56 pfbandwidthd(10196) FATAL: pfbandwidthd: caught SIGTERM 
- terminating (main::normal_sighandler)
Jul 29 07:59:56 pfbandwidthd(10196) FATAL: pfbandwidthd: caught SIGTERM 
- terminating at /usr/local/pf/sbin/pfbandwidthd line 285

 (main::)
Jul 29 07:59:56 pfbandwidthd(10196) ERROR: pfbandwidthd: caught SIGTERM 
- terminating at /usr/local/pf/sbin/pfbandwidthd line 285

 (main::)
Jul 29 08:00:56 pfbandwidthd(12316) INFO: pfbandwidthd starting and 
writing 12319 to /usr/local/pf/var/run/pfbandwidthd.pid 
(pf::services::util::createpid)

[root@PacketFence-ZEN-5-1 logs]#

Regards,
Hubert

Am 28.07.2015 um 20:23 schrieb Louis Munro:


On Jul 28, 2015, at 8:37 , Hubert Kupper kup...@uni-landau.de 
mailto:kup...@uni-landau.de wrote:


there is traffic on port 1813 from the cisco switch to th server. 
tcpdump shows it.


mysql select count(*) from radacct; shows count(*) 44



Is the MAC of the device among those listed in radacct?

Something like this should return more:

mysql select 
callingstationid,acctinputoctets,acctoutputoctets,acctstarttime from 
radacct;



Regards,
--
Louis Munromailto:lmu...@inverse.ca


--
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


Re: [PacketFence-users] Packetfence-ZEN-5-1 bandwidth violation

2015-07-29 Thread Louis Munro
Is this inline or out-of-band? 

Please post your pf.conf.

Regards,
--
Louis Munro
lmu...@inverse.ca  ::  www.inverse.ca 
+1.514.447.4918 x125  :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence 
(www.packetfence.org)

On Jul 29, 2015, at 3:52 , Hubert Kupper kup...@uni-landau.de wrote:

 Hi Louis,
 
 pfbandwidthd is using 100% cpu time and pfbandwidthd.log shows:
 
 Jul 20 07:30:57 pfbandwidthd(5868) INFO: pfbandwidthd starting and writing 
 5871 to /usr/local/pf/var/run/pfbandwidthd.pid (pf::services::util::createpid)
 Jul 21 02:04:13 pfbandwidthd(5868) FATAL: pfbandwidthd: caught SIGTERM - 
 terminating (main::normal_sighandler)
 Jul 21 02:04:13 pfbandwidthd(5868) FATAL: pfbandwidthd: caught SIGTERM - 
 terminating at /usr/local/pf/sbin/pfbandwidthd line 285
  (IO::Select::can_read)
 Jul 21 02:04:13 pfbandwidthd(5868) ERROR: pfbandwidthd: caught SIGTERM - 
 terminating at /usr/local/pf/sbin/pfbandwidthd line 285
  (IO::Select::can_read)
 Jul 21 02:05:24 pfbandwidthd(6848) INFO: pfbandwidthd starting and writing 
 6851 to /usr/local/pf/var/run/pfbandwidthd.pid (pf::services::util::createpid)
 Jul 28 08:06:24 pfbandwidthd(6848) FATAL: pfbandwidthd: caught SIGTERM - 
 terminating (main::normal_sighandler)
 Jul 28 08:06:24 pfbandwidthd(6848) FATAL: pfbandwidthd: caught SIGTERM - 
 terminating at /usr/local/pf/sbin/pfbandwidthd line 285
  (IO::Select::can_read)
 Jul 28 08:06:24 pfbandwidthd(6848) ERROR: pfbandwidthd: caught SIGTERM - 
 terminating at /usr/local/pf/sbin/pfbandwidthd line 285
  (IO::Select::can_read)
 Jul 28 08:06:24 pfbandwidthd(6848) FATAL: panic: leave_scope inconsistency at 
 /usr/local/pf/sbin/pfbandwidthd line 157.
  (main::)
 Jul 28 08:06:24 pfbandwidthd(6848) ERROR: panic: leave_scope inconsistency at 
 /usr/local/pf/sbin/pfbandwidthd line 157.
  (main::)
 Jul 28 08:06:24 pfbandwidthd(6848) FATAL: panic: leave_scope inconsistency at 
 /usr/local/pf/sbin/pfbandwidthd line 157.
  (main::)
 Jul 28 08:06:24 pfbandwidthd(6848) ERROR: panic: leave_scope inconsistency at 
 /usr/local/pf/sbin/pfbandwidthd line 157.
  (main::)
 Jul 28 08:07:29 pfbandwidthd(10196) INFO: pfbandwidthd starting and writing 
 10199 to /usr/local/pf/var/run/pfbandwidthd.pid 
 (pf::services::util::createpid)
 Jul 29 07:59:56 pfbandwidthd(10196) FATAL: pfbandwidthd: caught SIGTERM - 
 terminating (main::normal_sighandler)
 Jul 29 07:59:56 pfbandwidthd(10196) FATAL: pfbandwidthd: caught SIGTERM - 
 terminating at /usr/local/pf/sbin/pfbandwidthd line 285
  (main::)
 Jul 29 07:59:56 pfbandwidthd(10196) ERROR: pfbandwidthd: caught SIGTERM - 
 terminating at /usr/local/pf/sbin/pfbandwidthd line 285
  (main::)
 Jul 29 08:00:56 pfbandwidthd(12316) INFO: pfbandwidthd starting and writing 
 12319 to /usr/local/pf/var/run/pfbandwidthd.pid 
 (pf::services::util::createpid)
 [root@PacketFence-ZEN-5-1 logs]#
 
 Regards,
 Hubert
 
 Am 28.07.2015 um 20:23 schrieb Louis Munro:
 
 On Jul 28, 2015, at 8:37 , Hubert Kupper kup...@uni-landau.de wrote:
 
 there is traffic on port 1813 from the cisco switch to th server. tcpdump 
 shows it.
 
 mysql select count(*) from radacct; shows count(*) 44
 
 
 Is the MAC of the device among those listed in radacct?
 
 Something like this should return more: 
 
 mysql select 
 callingstationid,acctinputoctets,acctoutputoctets,acctstarttime from radacct;
 
 
 Regards,
 --
 Louis Munro
 
 --
 ___
 PacketFence-users mailing list
 PacketFence-users@lists.sourceforge.net
 https://lists.sourceforge.net/lists/listinfo/packetfence-users

--
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


Re: [PacketFence-users] Packetfence-ZEN-5-1 bandwidth violation

2015-07-28 Thread Hubert Kupper

Hi Louis,

there is traffic on port 1813 from the cisco switch to th server. 
tcpdump shows it.


mysql select count(*) from radacct; shows count(*) 44

Regards,
Hubert

Am 23.07.2015 um 15:08 schrieb Louis Munro:

Hi Hubert,
Can you see if there is actually traffic on port 1813 coming to the 
server then?


# tcpdump -iany -tnl -c 100 port 1813



And if there is, is there anything in the accounting tables of the 
database?


mysql select count(*) from radacct;


Regards,
--
Louis Munro
lmu...@inverse.ca mailto:lmu...@inverse.ca  :: www.inverse.ca 
http://www.inverse.ca

+1.514.447.4918 x125  :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu http://www.sogo.nu) 
and PacketFence (www.packetfence.org http://www.packetfence.org)


On Jul 23, 2015, at 1:02 , Hubert Kupper kup...@uni-landau.de 
mailto:kup...@uni-landau.de wrote:



Yes, I have done this.

On the 2960G:
aaa authentication dot1x default group radius
aaa accounting dot1x default start-stop group radius

Regards, Hubert

Am 22.07.2015 um 20:16 schrieb Louis Munro:

It may not be your config that’s wrong.
It may be that the switch is not sending accounting data to 
PacketFence.


Have you configured RADIUS accounting on the 2960?

Regards,
--
Louis Munro
lmu...@inverse.ca mailto:lmu...@inverse.ca  :: www.inverse.ca 
http://www.inverse.ca/

+1.514.447.4918 x125  :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu 
http://www.sogo.nu/) and PacketFence (www.packetfence.org 
http://www.packetfence.org/)


On Jul 22, 2015, at 1:11 , Hubert Kupper kup...@uni-landau.de 
mailto:kup...@uni-landau.de wrote:



Hello,

I have running Packetfence-ZEN-5-1 fine. I created a test bandwidth
violation of 2MB/Day but nothing happens when a client uses more than
2MB traffic. The web interface shows there is not enough data to 
create

the graph and violation.log shows only DHCP violations.

I added the following line to the Cisco 2960G in switches.conf:

deauthMethod=RADIUS

In violations.conf:

[1100013]
desc=Bandwidth Limit test (2MB/day)
template=bandwidth_limit
#hk090715 trigger=Accounting::BandwidthExpired
trigger=Accounting::TOT2MBD
window=dynamic
enabled=Y
actions=trap,log
priority=1
auto_enable=N
whitelisted_categories=
vlan=isolation


So what is wrong with my config?

Best regards,
Hubert

--
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net 
mailto:PacketFence-users@lists.sourceforge.net

https://lists.sourceforge.net/lists/listinfo/packetfence-users





--
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


Re: [PacketFence-users] Packetfence-ZEN-5-1 bandwidth violation

2015-07-28 Thread Louis Munro

On Jul 28, 2015, at 8:37 , Hubert Kupper kup...@uni-landau.de wrote:

 there is traffic on port 1813 from the cisco switch to th server. tcpdump 
 shows it.
 
 mysql select count(*) from radacct; shows count(*) 44


Is the MAC of the device among those listed in radacct?

Something like this should return more: 

mysql select callingstationid,acctinputoctets,acctoutputoctets,acctstarttime 
from radacct;


Regards,
--
Louis Munro
lmu...@inverse.ca  ::  www.inverse.ca 
+1.514.447.4918 x125  :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence 
(www.packetfence.org)

--
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


Re: [PacketFence-users] Packetfence-ZEN-5-1 bandwidth violation

2015-07-23 Thread Louis Munro
Hi Hubert,
Can you see if there is actually traffic on port 1813 coming to the server 
then? 

# tcpdump -iany -tnl -c 100 port 1813



And if there is, is there anything in the accounting tables of the database? 

mysql select count(*) from radacct;


Regards,
--
Louis Munro
lmu...@inverse.ca  ::  www.inverse.ca 
+1.514.447.4918 x125  :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence 
(www.packetfence.org)

On Jul 23, 2015, at 1:02 , Hubert Kupper kup...@uni-landau.de wrote:

 Yes, I have done this.
 
 On the 2960G:
 aaa authentication dot1x default group radius
 aaa accounting dot1x default start-stop group radius
 
 Regards, Hubert
 
 Am 22.07.2015 um 20:16 schrieb Louis Munro:
 It may not be your config that’s wrong. 
 It may be that the switch is not sending accounting data to PacketFence. 
 
 Have you configured RADIUS accounting on the 2960? 
 
 Regards,
 --
 Louis Munro
 lmu...@inverse.ca  ::  www.inverse.ca 
 +1.514.447.4918 x125  :: +1 (866) 353-6153 x125
 Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence 
 (www.packetfence.org)
 
 On Jul 22, 2015, at 1:11 , Hubert Kupper kup...@uni-landau.de wrote:
 
 Hello,
 
 I have running Packetfence-ZEN-5-1 fine. I created a test bandwidth 
 violation of 2MB/Day but nothing happens when a client uses more than 
 2MB traffic. The web interface shows there is not enough data to create 
 the graph and violation.log shows only DHCP violations.
 
 I added the following line to the Cisco 2960G in switches.conf:
 
 deauthMethod=RADIUS
 
 In violations.conf:
 
 [1100013]
 desc=Bandwidth Limit test (2MB/day)
 template=bandwidth_limit
 #hk090715 trigger=Accounting::BandwidthExpired
 trigger=Accounting::TOT2MBD
 window=dynamic
 enabled=Y
 actions=trap,log
 priority=1
 auto_enable=N
 whitelisted_categories=
 vlan=isolation
 
 
 So what is wrong with my config?
 
 Best regards,
 Hubert
 
 --
 ___
 PacketFence-users mailing list
 PacketFence-users@lists.sourceforge.net
 https://lists.sourceforge.net/lists/listinfo/packetfence-users
 
 
 
 --
 
 
 ___
 PacketFence-users mailing list
 PacketFence-users@lists.sourceforge.net
 https://lists.sourceforge.net/lists/listinfo/packetfence-users
 
 
 -- 
 _
 Hubert Kupper
 Universitaetsrechenzentrum in Landau
 Fortstrasse 7, D-76829 Landau
 Tel: +49 6341/28031173 Fax: +49 6341/28031267   
 
 --
 ___
 PacketFence-users mailing list
 PacketFence-users@lists.sourceforge.net
 https://lists.sourceforge.net/lists/listinfo/packetfence-users

--
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


Re: [PacketFence-users] Packetfence-ZEN-5-1 bandwidth violation

2015-07-23 Thread Hubert Kupper

Yes, I have done this.

On the 2960G:
aaa authentication dot1x default group radius
aaa accounting dot1x default start-stop group radius

Regards, Hubert

Am 22.07.2015 um 20:16 schrieb Louis Munro:

It may not be your config that’s wrong.
It may be that the switch is not sending accounting data to PacketFence.

Have you configured RADIUS accounting on the 2960?

Regards,
--
Louis Munro
lmu...@inverse.ca mailto:lmu...@inverse.ca  :: www.inverse.ca 
http://www.inverse.ca

+1.514.447.4918 x125  :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu http://www.sogo.nu) 
and PacketFence (www.packetfence.org http://www.packetfence.org)


On Jul 22, 2015, at 1:11 , Hubert Kupper kup...@uni-landau.de 
mailto:kup...@uni-landau.de wrote:



Hello,

I have running Packetfence-ZEN-5-1 fine. I created a test bandwidth
violation of 2MB/Day but nothing happens when a client uses more than
2MB traffic. The web interface shows there is not enough data to create
the graph and violation.log shows only DHCP violations.

I added the following line to the Cisco 2960G in switches.conf:

deauthMethod=RADIUS

In violations.conf:

[1100013]
desc=Bandwidth Limit test (2MB/day)
template=bandwidth_limit
#hk090715 trigger=Accounting::BandwidthExpired
trigger=Accounting::TOT2MBD
window=dynamic
enabled=Y
actions=trap,log
priority=1
auto_enable=N
whitelisted_categories=
vlan=isolation


So what is wrong with my config?

Best regards,
Hubert

--
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net 
mailto:PacketFence-users@lists.sourceforge.net

https://lists.sourceforge.net/lists/listinfo/packetfence-users




--


___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users



--
_
Hubert Kupper
Universitaetsrechenzentrum in Landau
Fortstrasse 7, D-76829 Landau
Tel: +49 6341/28031173 Fax: +49 6341/28031267

--
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


Re: [PacketFence-users] Packetfence-ZEN-5-1 bandwidth violation

2015-07-22 Thread Louis Munro
It may not be your config that’s wrong. 
It may be that the switch is not sending accounting data to PacketFence. 

Have you configured RADIUS accounting on the 2960? 

Regards,
--
Louis Munro
lmu...@inverse.ca  ::  www.inverse.ca 
+1.514.447.4918 x125  :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence 
(www.packetfence.org)

On Jul 22, 2015, at 1:11 , Hubert Kupper kup...@uni-landau.de wrote:

 Hello,
 
 I have running Packetfence-ZEN-5-1 fine. I created a test bandwidth 
 violation of 2MB/Day but nothing happens when a client uses more than 
 2MB traffic. The web interface shows there is not enough data to create 
 the graph and violation.log shows only DHCP violations.
 
 I added the following line to the Cisco 2960G in switches.conf:
 
 deauthMethod=RADIUS
 
 In violations.conf:
 
 [1100013]
 desc=Bandwidth Limit test (2MB/day)
 template=bandwidth_limit
 #hk090715 trigger=Accounting::BandwidthExpired
 trigger=Accounting::TOT2MBD
 window=dynamic
 enabled=Y
 actions=trap,log
 priority=1
 auto_enable=N
 whitelisted_categories=
 vlan=isolation
 
 
 So what is wrong with my config?
 
 Best regards,
 Hubert
 
 --
 ___
 PacketFence-users mailing list
 PacketFence-users@lists.sourceforge.net
 https://lists.sourceforge.net/lists/listinfo/packetfence-users

--
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users