I had a dns-enforcement interface on the VLAN that the captive portal is
supposed to operate on. I think the captive portal brought up was a result of
the dns-enforcement rather than Ruckus performing redirection. I changed the
interface to just portal and find that no captive portal appears. I
Hello,
Is it possible to create an email alert that goes out when packetfence rejects authentication for a device? It seems like this would be setup with a violation but I cannot figure out the correct trigger for this.
Any help would be appreciated
Thanks!
Any other way to do it that’s easier? Like conf file
On Tue, 18 Dec 2018 at 13:57, G PL via PacketFence-users <
packetfence-users@lists.sourceforge.net> wrote:
> You can try with mysql -upf -ppf pf if you are using the same password of
> the documentation. After, you make select to see the last
Absolutely. Hopefully we can determine what the fix is.
From: Caique Araujo via PacketFence-users
Sent: Tuesday, December 18, 2018 4:20 AM
To: packetfence-users@lists.sourceforge.net
Cc: Caique Araujo
Subject: Re: [PacketFence-users] Captive Portal authorization Ruckus Interface
logging
Frien
Look at the schema upgrades in the db directory, one of them inserts few new
carriers.
On 18/12/18 02:01 AM, Wifi Guy via PacketFence-users wrote:
Hmm. I tried to add sql command into CLI. I just get an error. Is there
somewhere I should be adding this?
On Tue, 18 Dec 2018 at 02:20, G PL via Pa
I started tcpdump on packetfence to filter for traffic to my Ruckus controller.
tcpdump didn’t catch any traffic between PacketFence and the Ruckus Controller.
There was no signal from PacketFence to Ruckus to indicate that the computer is
authorized. PacketFence didn’t even try to communicate.
You can try with mysql -upf -ppf pf if you are using the same password of
the documentation. After, you make select to see the last id of the table
and after the insert
Le mardi 18 décembre 2018, Wifi Guy via PacketFence-users <
packetfence-users@lists.sourceforge.net> a écrit :
> This is the er
Friend, I have this same problem ... If I can identify I help you, if you
can, could you help me too?
Em ter, 18 de dez de 2018 às 00:20, Eric Rolleman via PacketFence-users <
packetfence-users@lists.sourceforge.net> escreveu:
> I followed the directions here:
> https://packetfence.org/doc/Packet
Hi,
We had the same problem here in our environment: fingerbank.log was really
heavy, CPU usage was high and I was tired of receiving API Usage limit
e-mails (ok, the last one I can blame on myself). At the end, we just
disabled Fingerbank service temporally.
Regards,
Murilo Calegari de Souza
Es
Hello,
We've found on Packetfence 8.2.1 fingerbank-collector is constantly using the
majority of cpu time so I am wondering if something untoward is happening
There are quite a lot of entries in the fingerbank.log saying problems with the
local db, so I am wondering if packetfence is failing to
Hi Ali, thank you for your response.
I already modify that entry in the new perl module, but the new switch
type does not appear in the dropdown list. I think I have to do
something else...
Matteo
Il 18/12/2018 02:51, Amjad Ali ha scritto:
Hello,
I think you need to add this to your modu
This is the error
[root@PF-NAC ~]# mysql -upf -p pf
Enter password:
ERROR 1045 (28000): Access denied for user 'pf'@'localhost' (using
password: YES)
On Tue, 18 Dec 2018 at 02:20, G PL via PacketFence-users <
packetfence-users@lists.sourceforge.net> wrote:
> Yes, it's a insert to make in
Hello Kalcho,
You added your rule in the correct file.
In place of: `pf/bin/pfcmd service iptables restart`, try:
```
/usr/local/pf/bin/pfcmd service iptables generateconfig
/usr/local/pf/bin/pfcmd service iptables restart
```
After first command, you should see your rule in `var/conf/iptables.co
Hmm. I tried to add sql command into CLI. I just get an error. Is there
somewhere I should be adding this?
On Tue, 18 Dec 2018 at 02:20, G PL via PacketFence-users <
packetfence-users@lists.sourceforge.net> wrote:
> Yes, it's a insert to make in the sql database.
> I'm using an other provider.
>
Hello all,
I have problem adding custom rule to iptables managed by the packetfence.
I am trying to append this rule under :input-management-if - [0:0]
# ICINGA Agent
-A input-management-if --protocol tcp --match tcp --dport 5665 --jump ACCEPT
to open port 5665 for tcp on management interface, b
15 matches
Mail list logo