(RADIATOR) where is radwho.cgi

2001-12-21 Thread Utku Er



Hi,

is radwho.cgi in the Radmin package? I 
installed radiator rpm but couldn't see radwho.cgi in it ? 

where is radwho.cgi explained in the manual 
?


thanks in advance Hugh,
Utku. 



(RADIATOR) Problem using Radiator to authenticate VPN access via a Cisco VPN 5008

2001-12-21 Thread Cheng T K, Edward (TECH_NPIP NWT)
Title:  (RADIATOR) Problem using Radiator to authenticate VPN access via a Cisco VPN 5008





I have the same problem, how can i solve it











Hello Howard -


On Thursday 06 September 2001 08:26, Jares, Howard M wrote:
 I am having problems configuring Radiator v2.18.2 to authenticate to a
 Cisco VPN 5001.

 I have been testing the using the following configuration files:

 goodies\simple2.cfg:
 # simple2.cfg
 #
 # Example Radiator configuration file.
 # This very simple file will allow you to get started with
 # a simple system. You can then add and change features.
 # We suggest you start simple, prove to yourself that it
 # works and then develop a more complicated configuration.
 #
 # This example will authenticate from a standard users file in
 # the current directory and log accounting to a file in the current
 # directory.
 # It will accept requests from any client and try to handle request
 # for any realm.
 # And it will print out what its doing in great detail.
 #
 # See radius.cfg for more complete examples of features and
 # syntax, and refer to the reference manual for a complete description
 # of all the features and syntax.
 #
 # You should consider this file to be a starting point only
 # $Id: simple.cfg,v 1.4 2001/04/25 23:47:13 mikem Exp $

 Foreground
 LogStdout
 LogDir  .
 DbDir  .
 DictionaryFile ./dictionary
 # User a lower trace level in production systems:
 Trace   4
 # Added by Howard Jares
 AuthPort 1812
 AcctPort 1813

 # You will probably want to add other Clients to suit your site,
 # one for each NAS you want to work with
 Client DEFAULT
  Secret *
  DupInterval 0
 /Client

 Realm DEFAULT
  AuthBy FILE
   Filename ./users2
  /AuthBy
  # Log accounting to a detail file
  AcctLogFileName ./detail
 /Realm


 Users2:
 DEFAULT Service-Type = Administrative-User, Auth-Type = System
  Idle-Timeout = 2000,

 DEFAULT Service-Type = Login-User, Expiration = Feb 2 2010
  Idle-Timeout = 2001,
  Fall-Through = yes

 # User-Password can be in a number of formats: plaintext,
 # UNIX encrypted,
 # SHA encrypted (as used in Netscape LDAP), or Linux MD5 password
 # defaults to plaintext
 pwtest1 User-Password = fred
 pwtest2 User-Password = {SHA}0DPiKuNIrrVmD8IUCuw1hQxNqZc=
 pwtest3 User-Password = {crypt}1xMKc0GIVUNbE
 pwtest4 User-Password = $1$cTpht$Obu9PLSMst1TDou.mN5bk0
 # Encrypted-Password can by in a variety of encryption standards too
 # but defaults to Unix crypt
 pwtest5 Encrypted-Password = {SHA}0DPiKuNIrrVmD8IUCuw1hQxNqZc=
 pwtest6 Encrypted-Password = {crypt}1xMKc0GIVUNbE
 pwtest7 Encrypted-Password = $1$cTpht$Obu9PLSMst1TDou.mN5bk0
 pwtest8 Encrypted-Password = 1xMKc0GIVUNbE
 pwtest9 Encrypted-Password = {MD5}VwqQv7+MfqtdxdTiaDLVsQ==
 pwtest10 User-Password = {MD5}VwqQv7+MfqtdxdTiaDLVsQ==


 [EMAIL PROTECTED] User-Password=fred
  cisco-VPNGroupInfo=Test,
  cisco-VPNPassword=fred
 # Connect-Info = Test

 I modified the standard dictionary file to include:

 #HJ
 VENDORATTR 9 cisco-VPNPassword 66 string
 VENDORATTR 9 cisco-VPNGroupInfo 67 string
 #HJ

 On the server running Radiator:
 F:\Radiator-2.18.2perl radiusd -config=goodies\simple2.cfg
 Wed Sep 5 16:35:13 2001: DEBUG: Reading users file ./users2
 Wed Sep 5 16:35:13 2001: INFO: Server started: Radiator 2.18.2 on ks1
 Wed Sep 5 16:35:24 2001: DEBUG: Packet dump:
 *** Received from 129.7.209.253 port 2050 
 Code: Access-Request
 Identifier: 41
 Authentic: z190244T251441437L1A15143v273
 Attributes:
 NAS-IP-Address = 129.7.209.253
 NAS-Port-Type = Virtual
 Service-Type = Authenticate-Only
 NAS-Port = 268435459
 User-Name = [EMAIL PROTECTED]
 CHAP-Password = ^Y18228239246230G^46h1136(243

 Wed Sep 5 16:35:24 2001: DEBUG: Handling request with Handler
 'Realm=DEFAULT'
 Wed Sep 5 16:35:24 2001: DEBUG: Deleting session for [EMAIL PROTECTED],
 129.7.209.253, 268435459
 Wed Sep 5 16:35:24 2001: DEBUG: Handling with Radius::AuthFILE
 Wed Sep 5 16:35:24 2001: DEBUG: Radius::AuthFILE looks for match with
 [EMAIL PROTECTED]
 Wed Sep 5 16:35:24 2001: DEBUG: Radius::AuthFILE ACCEPT:
 Wed Sep 5 16:35:24 2001: DEBUG: Access accepted for [EMAIL PROTECTED]
 Wed Sep 5 16:35:24 2001: DEBUG: Packet dump:
 *** Sending to 129.7.209.253 port 2050 
 Code: Access-Accept
 Identifier: 41
 Authentic: z190244T251441437L1A15143v273
 Attributes:
 cisco-VPNGroupInfo = Test
 cisco-VPNPassword = fred
 Connect-Info = Test

 On 129.7.225.8 I am using the Cisco VPN client version 5.1.1. When I try to
 connect using [EMAIL PROTECTED], the system sits there and then eventually times
 out.

 On the Cisco VPN 5001, I do a
 show sys log buffer
 and I get:

 Notice 9/5/01 16:35:21 New IKE connection: [129.7.225.8]:1284:[EMAIL PROTECTED]
 Debug 9/5/01 16:35:24 Received RADIUS challenge resp. from [EMAIL PROTECTED]
 at 129.7.225.8, contacting server
 Debug 9/5/01 16:35:24 No Connect-Info for [EMAIL PROTECTED]
 Debug 9/5/01 16:35:24 Bad config from RADIUS server for [EMAIL PROTECTED]
 Error 9/5/01 16:35:24 No Policy, , for user, [EMAIL PROTECTED]
 

Re: (RADIATOR) Code and hooks

2001-12-21 Thread Gustavo Moreira


Hi,

I'm trying to do something depending if in AuthLDAP2 the result was
Access-Accept , how can I get it in a PostSearchHook ?

[...] In radius.cfg
AuthAttrDef svcstatus,Svc-Status,request
PostSearchHook  sub {   my
($self,$p,$rp,$entry)=($_[0],$_[2],$_[5],$_[4]);\
my @attr = $_[4]-get('svcstatus');\
my $attr = @attr[0];\
return unless defined($attr);\
my $codeone=$rp-code;\
my $codetwo=$p-code;\
main::log($main::LOG_DEBUG,
$codeone  - $codetwo);\
return if $rp-code eq 'Access-Reject';\
[...]

[...]  In Log
Fri Dec 21 17:56:38 2001: DEBUG: LDAP got result for
cn=cocar,ou=Radius,ou=Internet,ou=Arnet,o=TS
Fri Dec 21 17:56:38 2001: DEBUG: LDAP got userPassword: NA17122001
Fri Dec 21 17:56:38 2001: DEBUG: LDAP got svcstatus: 1
Fri Dec 21 17:56:38 2001: DEBUG:    - Access-Request
Fri Dec 21 17:56:38 2001: DEBUG: Radius::AuthLDAP2 looks for match with
cocar
Fri Dec 21 17:56:38 2001: DEBUG: Radius::AuthLDAP2 REJECT: Bad Password
Fri Dec 21 17:56:38 2001: INFO: Access rejected for cocar: Bad Password
Fri Dec 21 17:56:38 2001: DEBUG: Packet dump:
*** Sending to 192.168.212.5 port 36442 
[...]

[...] In AuthLDAP2.pm
# Perhaps run a hook to do other things with the LDAP data
if (defined $self-{PostSearchHook})
{
# We use an eval so an error in the hook wont
# kill us.
eval{ {$self-{PostSearchHook}}($self, $name, $p, $user,
$entry, $rp);};
$self-log($main::LOG_ERR, Error in PostSearchHook(): $@)
if $@;
}
[...]


===
Archive at http://www.open.com.au/archives/radiator/
Announcements on [EMAIL PROTECTED]
To unsubscribe, email '[EMAIL PROTECTED]' with
'unsubscribe radiator' in the body of the message.



Re: (RADIATOR) where is radwho.cgi

2001-12-21 Thread Hugh Irvine


Hello Utku -

On Sat, 22 Dec 2001 00:20, Utku Er wrote:
  Hi,

  is radwho.cgi in the Radmin package? I installed radiator rpm but couldn't
 see radwho.cgi in it ?


The top level directory of the Radiator source distribution contains both the 
radwho.cgi and the radacct.cgi scripts.

  where is radwho.cgi explained in the manual ?


Section 12.0 in the Radiator reference manual (doc/ref.html).

regards

Hugh


-- 
Radiator: the most portable, flexible and configurable RADIUS server
anywhere. Available on *NIX, *BSD, Windows 95/98/2000, NT, MacOS X.
-
Nets: internetwork inventory and management - graphical, extensible,
flexible with hardware, software, platform and database independence.
===
Archive at http://www.open.com.au/archives/radiator/
Announcements on [EMAIL PROTECTED]
To unsubscribe, email '[EMAIL PROTECTED]' with
'unsubscribe radiator' in the body of the message.



Re: (RADIATOR) Problem using Radiator to authenticate VPN access via a Cisco VPN 5008

2001-12-21 Thread Hugh Irvine


Hello Edward -

A Cisco usually requires the same Service-Type value that is present in the 
radius request to be returned in the radius response, which usually means 

Service-Type = Framed-User

However, as mentioned below, the best source of Cisco configuration 
information is the Cisco web site.

regards

Hugh


On Sat, 22 Dec 2001 01:25, Cheng T K, Edward (TECH_NPIP NWT) wrote:
 I have the same problem, how can i solve it

 Hello Howard -

 On Thursday 06 September 2001 08:26, Jares, Howard M wrote:
  I am having problems configuring Radiator v2.18.2 to authenticate to a
  Cisco VPN 5001.
 
  I have been testing the using the following configuration files:
 
  goodies\simple2.cfg:
  # simple2.cfg
  #
  # Example Radiator configuration file.
  # This very simple file will allow you to get started with
  # a simple system. You can then add and change features.
  # We suggest you start simple, prove to yourself that it
  # works and then develop a more complicated configuration.
  #
  # This example will authenticate from a standard users file in
  # the current directory and log accounting to a file in the current
  # directory.
  # It will accept requests from any client and try to handle request
  # for any realm.
  # And it will print out what its doing in great detail.
  #
  # See radius.cfg for more complete examples of features and
  # syntax, and refer to the reference manual for a complete description
  # of all the features and syntax.
  #
  # You should consider this file to be a starting point only
  # $Id: simple.cfg,v 1.4 2001/04/25 23:47:13 mikem Exp $
 
  Foreground
  LogStdout
  LogDir  .
  DbDir   .
  DictionaryFile ./dictionary
  # User a lower trace level in production systems:
  Trace   4
  # Added by Howard Jares
  AuthPort 1812
  AcctPort 1813
 
  # You will probably want to add other Clients to suit your site,
  # one for each NAS you want to work with
  Client DEFAULT
  Secret  *
  DupInterval 0
  /Client
 
  Realm DEFAULT
  AuthBy FILE
  Filename ./users2
  /AuthBy
  # Log accounting to a detail file
  AcctLogFileName ./detail
  /Realm
 
 
  Users2:
  DEFAULT Service-Type = Administrative-User, Auth-Type = System
  Idle-Timeout = 2000,
 
  DEFAULT Service-Type = Login-User, Expiration = Feb 2 2010
  Idle-Timeout = 2001,
  Fall-Through = yes
 
  # User-Password can be in a number of formats: plaintext,
  # UNIX encrypted,
  # SHA encrypted (as used in Netscape LDAP), or Linux MD5 password
  # defaults to plaintext
  pwtest1   User-Password = fred
  pwtest2   User-Password = {SHA}0DPiKuNIrrVmD8IUCuw1hQxNqZc=
  pwtest3   User-Password = {crypt}1xMKc0GIVUNbE
  pwtest4   User-Password = $1$cTpht$Obu9PLSMst1TDou.mN5bk0
  # Encrypted-Password can by in a variety of encryption standards too
  # but defaults to Unix crypt
  pwtest5   Encrypted-Password = {SHA}0DPiKuNIrrVmD8IUCuw1hQxNqZc=
  pwtest6   Encrypted-Password = {crypt}1xMKc0GIVUNbE
  pwtest7  Encrypted-Password = $1$cTpht$Obu9PLSMst1TDou.mN5bk0
  pwtest8   Encrypted-Password = 1xMKc0GIVUNbE
  pwtest9   Encrypted-Password = {MD5}VwqQv7+MfqtdxdTiaDLVsQ==
  pwtest10   User-Password = {MD5}VwqQv7+MfqtdxdTiaDLVsQ==
 
 
  [EMAIL PROTECTED] User-Password=fred
  cisco-VPNGroupInfo=Test,
  cisco-VPNPassword=fred
  #   Connect-Info = Test
 
  I modified the standard dictionary file to include:
 
  #HJ
  VENDORATTR  9 cisco-VPNPassword   66 string
  VENDORATTR  9 cisco-VPNGroupInfo   67 string
  #HJ
 
  On the server running Radiator:
  F:\Radiator-2.18.2perl radiusd -config=goodies\simple2.cfg
  Wed Sep  5 16:35:13 2001: DEBUG: Reading users file ./users2
  Wed Sep  5 16:35:13 2001: INFO: Server started: Radiator 2.18.2 on ks1
  Wed Sep  5 16:35:24 2001: DEBUG: Packet dump:
  *** Received from 129.7.209.253 port 2050 
  Code:   Access-Request
  Identifier: 41
  Authentic:  z190244T251441437L1A15143v273
  Attributes:
  NAS-IP-Address = 129.7.209.253
  NAS-Port-Type = Virtual
  Service-Type = Authenticate-Only
  NAS-Port = 268435459
  User-Name = [EMAIL PROTECTED]
  CHAP-Password = ^Y18228239246230G^46h1136(243
 
  Wed Sep  5 16:35:24 2001: DEBUG: Handling request with Handler
  'Realm=DEFAULT'
  Wed Sep  5 16:35:24 2001: DEBUG:  Deleting session for [EMAIL PROTECTED],
  129.7.209.253, 268435459
  Wed Sep  5 16:35:24 2001: DEBUG: Handling with Radius::AuthFILE
  Wed Sep  5 16:35:24 2001: DEBUG: Radius::AuthFILE looks for match with
  [EMAIL PROTECTED]
  Wed Sep  5 16:35:24 2001: DEBUG: Radius::AuthFILE ACCEPT:
  Wed Sep  5 16:35:24 2001: DEBUG: Access accepted for [EMAIL PROTECTED]
  Wed Sep  5 16:35:24 2001: DEBUG: Packet dump:
  *** Sending to 129.7.209.253 port 2050 
  Code:   Access-Accept
  Identifier: 41
  Authentic:  z190244T251441437L1A15143v273
  Attributes:
  cisco-VPNGroupInfo = Test
  cisco-VPNPassword = fred
  

Re: (RADIATOR) Code and hooks

2001-12-21 Thread Hugh Irvine


Hello Gustavo -

You cannot do what you are trying to do, because the PostSearchHook fires 
*before* the user is authenticated, therefore the hook will never know the 
result. 

You will need to use a PostAuthHook to check the result.

regards

Hugh


On Fri, 22 Mar 2002 08:10, Gustavo Moreira wrote:
 Hi,

 I'm trying to do something depending if in AuthLDAP2 the result was
 Access-Accept , how can I get it in a PostSearchHook ?

 [...] In radius.cfg
 AuthAttrDef svcstatus,Svc-Status,request
 PostSearchHook  sub {   my
 ($self,$p,$rp,$entry)=($_[0],$_[2],$_[5],$_[4]);\
 my @attr = $_[4]-get('svcstatus');\
 my $attr = @attr[0];\
 return unless defined($attr);\
 my $codeone=$rp-code;\
 my $codetwo=$p-code;\
 main::log($main::LOG_DEBUG,
 $codeone  - $codetwo);\
 return if $rp-code eq 'Access-Reject';\
 [...]

 [...]  In Log
 Fri Dec 21 17:56:38 2001: DEBUG: LDAP got result for
 cn=cocar,ou=Radius,ou=Internet,ou=Arnet,o=TS
 Fri Dec 21 17:56:38 2001: DEBUG: LDAP got userPassword: NA17122001
 Fri Dec 21 17:56:38 2001: DEBUG: LDAP got svcstatus: 1
 Fri Dec 21 17:56:38 2001: DEBUG:    - Access-Request
 Fri Dec 21 17:56:38 2001: DEBUG: Radius::AuthLDAP2 looks for match with
 cocar
 Fri Dec 21 17:56:38 2001: DEBUG: Radius::AuthLDAP2 REJECT: Bad Password
 Fri Dec 21 17:56:38 2001: INFO: Access rejected for cocar: Bad Password
 Fri Dec 21 17:56:38 2001: DEBUG: Packet dump:
 *** Sending to 192.168.212.5 port 36442 
 [...]

 [...] In AuthLDAP2.pm
 # Perhaps run a hook to do other things with the LDAP data
 if (defined $self-{PostSearchHook})
 {
 # We use an eval so an error in the hook wont
 # kill us.
 eval{ {$self-{PostSearchHook}}($self, $name, $p, $user,
 $entry, $rp);};
 $self-log($main::LOG_ERR, Error in PostSearchHook(): $@)
 if $@;
 }
 [...]

-- 
Radiator: the most portable, flexible and configurable RADIUS server
anywhere. Available on *NIX, *BSD, Windows 95/98/2000, NT, MacOS X.
-
Nets: internetwork inventory and management - graphical, extensible,
flexible with hardware, software, platform and database independence.
===
Archive at http://www.open.com.au/archives/radiator/
Announcements on [EMAIL PROTECTED]
To unsubscribe, email '[EMAIL PROTECTED]' with
'unsubscribe radiator' in the body of the message.



Re: (RADIATOR) VoIP Block Time Woes

2001-12-21 Thread Simon Hackett

Hi Zebaulon,

I have done this before. Indeed, I do it now :)

I wrote a prepaid card system from scratch for Cisco 5400's 
(identical to 5300's in voice terms - essentially the next generation 
hardware).

There are two things here - one is related to understanding properly 
how voice accounting works on Cisco voice platforms, the other is the 
answer to your question about whether there is a 'trick' to 
organising to have prepaid cards only have their balance deducted 
'once' per call, not once per valid 'Stop' record for the call 
(because, yes, there are multiple of those).

First thing. Its normal, and expected, to generate multiple stop records.

In case you aren't aware of it, all calls have four 'legs' in 
principle (in practice you can even generate -more- than four legs in 
practice under certain circumstances).

Try reading these url's for a start:

http://www.cisco.com/warp/public/788/voip/dialpeer_call_leg.html

http://www.cisco.com/univercd/cc/td/doc/product/access/acs_serv/vapp_dev/vsaig3.htm


It can take a while to get ones' head around this stuff. The 
pathological case of more than four legs happens when a call tries to 
use (say) h323 to reach a remote voice node, that node rejects the 
call, and the originating voice gateway then hairpin's the call out 
locally. In that case you wind up with a Stop record for the zero 
duration attempted VoIP call, then a non-zero duration call (of call 
type 'Telephony') via the local gateway for the hairpinned call.

You can also wind up with less than four call legs for calls that 
don't succeed.

You will also get accounting Stop records from TWO gateways, not just 
one - the 'local' gateway and the 'remote' one all generate 
accounting records. So a Handler might not be good enough, you really 
need to figure out exactly -which- Stop record you want to use.

Each call leg has a duration, and those durations can differ (as you 
correctly indicate - one of them has the whole 'IVR' interaction time 
in it, others have the resulting leg durations for the parts of the 
call that involved attempts to commit telephony with someone).

The critical thing about these legs is that you can work out which 
leg (1, 2, 3 or 4) you're seeing by looking at the h323-call-type and 
the h323-call-origin.

The h323-call-type can be 'Telephony' or 'VoIP' (well those are the 
most common values); The h323-call-origin can be 'originate' or 
'answer'.

A 'standard' call leg set is literally:

leg 1:  Telephony/Answer(call from customer to your gateway)
leg 2:  VoIP/Originate  (VoIP leg leaving your gateway to remote GW)
leg 3:  VoIP/Answer (the same connection arriving on the remote GW)
leg 4:  Telephony/Originate (the call into the PSTN made by the remote GW)

In the standard case, the accounting records for legs 1 and 2 come from the
local gateway and the accounting records for legs 3 and 4 come from the remote
gateway. Take a look at the nice pictures on the cisco web site from 
those URL's I noted above.

In cases where the call is hairpinned from the local voice gateway, 
there may be no VoIP legs at all, or there may (as indicated above) 
be a zero duration set of VoIP legs due to a remote failure followed 
by 'local' Telephony/Originate legs. This is actually a degenerate 
case where the local gw and the remote gw are the same gw, if you see 
what I mean.

Second thing. You can handle this all 'properly', or you can use a 
hack. Of course :)

What I do is get radiator to call an external perl program I wrote 
(worked out easier for me to deal with it that way), and the 
following is the logic in my code that decides whether to 'charge' 
the time inherent in a stop record that comes floating past the 
code...

The critical point? That I decided after a lot of experimentation 
that the 'best' of the stop records to use is any leg which is of 
type 'originate' and which is of non-zero call duration, having 
discarded a few strange cases first. It turns out that there is only 
one of those per ultimate user session.

By the way, what's the non-hack method? Doing it 'right' involves a 
LOT more work. That work involves using the h323-conf-id, which is 
the unique key across all legs in a call, to store every received leg 
of every call into sql tables, and to collect data from each of the 
legs as they arrive, and make a decision to bill once sufficient 
information is known about the call. This is actually very 
non-trivial in practice - some things you need to know are in some 
legs, some things you need to know are in others, and legs arrive 
separated in time, from the two gateways concerned, as the call 
proceeds.

BUT: You actually don't need to do the above until you graduate to 
building a full post-paid billing engine for your VoIP nodes. I've 
done this, it's really quite non-trivial :) Ok -very- non-trivial :)

Again, for prepaid, don't bother. The simple hack is to only 'act' on 
'originate' records with nonzero call 

(RADIATOR) AuthBy Group Question

2001-12-21 Thread Tom Daly



Hi Guys,
I am using radiator as a proxy server for Wholesale 
Dialup. Here's whatI would like to do.

When a user makes a request, the request is proxied 
off to a remote radius server. At the same time, a call log entry is entered 
into a SQL server that I maintain. I am trying to accomplish this through the 
following:

AuthBy 
GROUP Identifier 
NetwayAuthDNIS RewriteUsername 
s/^NETWAY\/(.*)$/$1/ AuthByPolicy 
ContinueAlways AuthBy 
EMERALD 
DBSource 
dbi:FreeTDS:database=Radius;host=xxx.xxx.xxx.xxx;port=1433 
DBUsernamexxx 
DBAuthxxx 
# You can add to or change these if you 
want. 
AccountingTable 
netwaycalls 
AcctColumnDef 
UserName,User-Name 
AcctColumnDef 
CallDate,Timestamp,integer-date 
AcctColumnDef 
AcctStatusType,Acct-Status-Type,integer 
AcctColumnDef 
AcctDelayTime,Acct-Delay-Time,integer 
AcctColumnDef 
AcctInputOctets,Acct-Input-Octets,integer 
AcctColumnDef 
AcctOutputOctets,Acct-Output-Octets,integer 
AcctColumnDef 
AcctSessionId,Acct-Session-Id 
AcctColumnDef 
AcctSessionTime,Acct-Session-Time,integer 
AcctColumnDef 
AcctTerminateCause,Acct-Terminate-Cause,integer 
AcctColumnDef 
NASIdentifier,NAS-IP-Address 
AcctColumnDef 
NASPort,NAS-Port,integer 
AcctColumnDef 
UserService,Service-Type,integer 
AcctColumnDef 
FramedProtocol,Framed-Protocol,integer 
AcctColumnDef 
FramedAddress,Framed-IP-Address 
AcctColumnDef 
NASPortType,NAS-Port-Type,integer 
AcctColumnDef 
NASPortDNIS,Called-Station-Id 
AcctColumnDef 
CallerID,Calling-Station-Id 
 
AuthSelect 
/AuthBy

 
AuthBy 
RADIUS 
Hostxxx.xxx.xxx.xxx 
Hostyyy.yyy.yyy.yyy 
Secretzzz 
AuthPort 
1645 
AcctPort 
1646 
Retries 
2 
RetryTimeout 
30 
FailureBackoffTime 60 
/AuthBy/AuthBy

However, this does not put entries into my SQL 
database.

Any ideas?

Thanks,

-- Tom DalyNetwork Operations / Systems 
AdministratorG4 Communications Corp.V: 603.296.4413 / F: 
603.647.7576E: [EMAIL PROTECTED] / W3: www.g4.net