[prev in list] [next in list] [prev in thread] [next in thread] 

List:       packetfence-users
Subject:    [PacketFence-users] Cisco 2960X - Unable to grant privileged CLI Access
From:       Misbah Hussaini via PacketFence-users <packetfence-users () lists ! sourceforge ! net>
Date:       2021-12-13 15:29:42
Message-ID: CAEg7r33+BTaWP2nB8OKTxX+U5uPr7_WE+P=BJzeu7mXkqasB8Q () mail ! gmail ! com
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


Hello,

I'm trying to configure CLI access for admins via PF. I'm so far able to
make the admins login to the switch CLI, however when they try to enter
enable mode they receive "% Error in Authentication" message.

I tried and checked the radius.log which shows a successful authentication.
I have also enabled the checkbox on the switch config to allow cli access.
I understand that I need to send Cisco-AVPair for privileged access to work
but dunno where it is set.

Can someone pls help to grant the enable mode access on the switch via PF
Freeradius.

Below is the log from raddebug.

(747) Mon Dec 13 19:08:16 2021: Debug: Received Access-Request Id 20 from
10.141.254.40:1645 to 192.168.197.90:1812 length 81
(747) Mon Dec 13 19:08:16 2021: Debug:   User-Name = "testuser123"
(747) Mon Dec 13 19:08:16 2021: Debug:   User-Password = "cleartextpassword"
(747) Mon Dec 13 19:08:16 2021: Debug:   NAS-Port = 2
(747) Mon Dec 13 19:08:16 2021: Debug:   NAS-Port-Id = "tty2"
(747) Mon Dec 13 19:08:16 2021: Debug:   NAS-Port-Type = Virtual
(747) Mon Dec 13 19:08:16 2021: Debug:   NAS-IP-Address = 192.168.254.40
(747) Mon Dec 13 19:08:16 2021: Debug: # Executing section authorize from
file /usr/local/pf/raddb/sites-enabled/packetfence
(747) Mon Dec 13 19:08:16 2021: Debug:   authorize {
(747) Mon Dec 13 19:08:16 2021: Debug:     policy
packetfence-nas-ip-address {
(747) Mon Dec 13 19:08:16 2021: Debug:       if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0"){
(747) Mon Dec 13 19:08:16 2021: Debug:       if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0") -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug:     } # policy
packetfence-nas-ip-address = notfound
(747) Mon Dec 13 19:08:16 2021: Debug:     update {
(747) Mon Dec 13 19:08:16 2021: Debug:       EXPAND %{Packet-Src-IP-Address}
(747) Mon Dec 13 19:08:16 2021: Debug:          --> 192.168.254.40
(747) Mon Dec 13 19:08:16 2021: Debug:       EXPAND %{Packet-Dst-IP-Address}
(747) Mon Dec 13 19:08:16 2021: Debug:          --> 192.168.197.90
(747) Mon Dec 13 19:08:16 2021: Debug:       EXPAND %l
(747) Mon Dec 13 19:08:16 2021: Debug:          --> 1639408096
(747) Mon Dec 13 19:08:16 2021: Debug:     } # update = noop
(747) Mon Dec 13 19:08:16 2021: Debug:     policy
packetfence-set-realm-if-machine {
(747) Mon Dec 13 19:08:16 2021: Debug:       if (User-Name =~
/host\/([a-z0-9_-]*)[\.](.*)/i) {
(747) Mon Dec 13 19:08:16 2021: Debug:       if (User-Name =~
/host\/([a-z0-9_-]*)[\.](.*)/i)  -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug:     } # policy
packetfence-set-realm-if-machine = noop
(747) Mon Dec 13 19:08:16 2021: Debug:     policy
packetfence-balanced-key-policy {
(747) Mon Dec 13 19:08:16 2021: Debug:       if (&PacketFence-KeyBalanced
&& (&PacketFence-KeyBalanced =~ /^(.*)(.)$/i)) {
(747) Mon Dec 13 19:08:16 2021: Debug:       if (&PacketFence-KeyBalanced
&& (&PacketFence-KeyBalanced =~ /^(.*)(.)$/i))  -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug:       else {
(747) Mon Dec 13 19:08:16 2021: Debug:         update {
(747) Mon Dec 13 19:08:16 2021: Debug:           EXPAND
%{md5:%{Calling-Station-Id}%{User-Name}}
(747) Mon Dec 13 19:08:16 2021: Debug:              -->
7674cdd55c6099b093d1b9dcdda01825
(747) Mon Dec 13 19:08:16 2021: Debug:           EXPAND
%{md5:%{Calling-Station-Id}%{User-Name}}
(747) Mon Dec 13 19:08:16 2021: Debug:              -->
7674cdd55c6099b093d1b9dcdda01825
(747) Mon Dec 13 19:08:16 2021: Debug:         } # update = noop
(747) Mon Dec 13 19:08:16 2021: Debug:       } # else = noop
(747) Mon Dec 13 19:08:16 2021: Debug:     } # policy
packetfence-balanced-key-policy = noop
(747) Mon Dec 13 19:08:16 2021: Debug:     policy packetfence-set-tenant-id
{
(747) Mon Dec 13 19:08:16 2021: Debug:       if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0"){
(747) Mon Dec 13 19:08:16 2021: Debug:       if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0") -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug:       if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(747) Mon Dec 13 19:08:16 2021: Debug:       EXPAND
%{%{control:PacketFence-Tenant-Id}:-0}
(747) Mon Dec 13 19:08:16 2021: Debug:          --> 0
(747) Mon Dec 13 19:08:16 2021: Debug:       if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> TRUE
(747) Mon Dec 13 19:08:16 2021: Debug:       if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  {
(747) Mon Dec 13 19:08:16 2021: Debug:         update control {
(747) Mon Dec 13 19:08:16 2021: Debug:           EXPAND %{User-Name}
(747) Mon Dec 13 19:08:16 2021: Debug:              --> testuser123
(747) Mon Dec 13 19:08:16 2021: Debug:           SQL-User-Name set to
'testuser123'
(747) Mon Dec 13 19:08:16 2021: Debug:           Executing select query:
 SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname '192.168.254.40'), 0)
(747) Mon Dec 13 19:08:16 2021: Debug:           EXPAND %{sql: SELECT
IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname '%{NAS-IP-Address}'), 0)}
(747) Mon Dec 13 19:08:16 2021: Debug:              --> 1
(747) Mon Dec 13 19:08:16 2021: Debug:         } # update control = noop
(747) Mon Dec 13 19:08:16 2021: Debug:       } # if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  = noop
(747) Mon Dec 13 19:08:16 2021: Debug:       if (
&control:PacketFence-Tenant-Id == 0 ) {
(747) Mon Dec 13 19:08:16 2021: Debug:       if (
&control:PacketFence-Tenant-Id == 0 )  -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug:     } # policy
packetfence-set-tenant-id = noop
(747) Mon Dec 13 19:08:16 2021: Debug:     policy
rewrite_calling_station_id {
(747) Mon Dec 13 19:08:16 2021: Debug:       if (&Calling-Station-Id &&
(&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
 {
(747) Mon Dec 13 19:08:16 2021: Debug:       if (&Calling-Station-Id &&
(&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
                
 -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug:       else {
(747) Mon Dec 13 19:08:16 2021: Debug:         [noop] = noop
(747) Mon Dec 13 19:08:16 2021: Debug:       } # else = noop
(747) Mon Dec 13 19:08:16 2021: Debug:     } # policy
rewrite_calling_station_id = noop
(747) Mon Dec 13 19:08:16 2021: Debug:     policy rewrite_called_station_id
{
(747) Mon Dec 13 19:08:16 2021: Debug:       if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
 {
(747) Mon Dec 13 19:08:16 2021: Debug:       if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
                
 -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug:       else {
(747) Mon Dec 13 19:08:16 2021: Debug:         [noop] = noop
(747) Mon Dec 13 19:08:16 2021: Debug:       } # else = noop
(747) Mon Dec 13 19:08:16 2021: Debug:     } # policy
rewrite_called_station_id = noop
(747) Mon Dec 13 19:08:16 2021: Debug:     if ( "%{client:shortname}" =~
/eduroam_tlrs/ ) {
(747) Mon Dec 13 19:08:16 2021: Debug:     EXPAND %{client:shortname}
(747) Mon Dec 13 19:08:16 2021: Debug:        --> 192.168.254.40/32
(747) Mon Dec 13 19:08:16 2021: Debug:     if ( "%{client:shortname}" =~
/eduroam_tlrs/ )  -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug:     policy filter_username {
(747) Mon Dec 13 19:08:16 2021: Debug:       if (&User-Name) {
(747) Mon Dec 13 19:08:16 2021: Debug:       if (&User-Name)  -> TRUE
(747) Mon Dec 13 19:08:16 2021: Debug:       if (&User-Name)  {
(747) Mon Dec 13 19:08:16 2021: Debug:         if (&User-Name =~ / /) {
(747) Mon Dec 13 19:08:16 2021: Debug:         if (&User-Name =~ / /)  ->
FALSE
(747) Mon Dec 13 19:08:16 2021: Debug:         if (&User-Name =~ /@[^@]*@/
) {
(747) Mon Dec 13 19:08:16 2021: Debug:         if (&User-Name =~ /@[^@]*@/
)  -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug:         if (&User-Name =~ /\.\./ ) {
(747) Mon Dec 13 19:08:16 2021: Debug:         if (&User-Name =~ /\.\./ )
 -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug:         if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/))  {
(747) Mon Dec 13 19:08:16 2021: Debug:         if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/))   -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug:         if (&User-Name =~ /\.$/)  {
(747) Mon Dec 13 19:08:16 2021: Debug:         if (&User-Name =~ /\.$/)
-> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug:         if (&User-Name =~ /@\./)  {
(747) Mon Dec 13 19:08:16 2021: Debug:         if (&User-Name =~ /@\./)
-> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug:       } # if (&User-Name)  = noop
(747) Mon Dec 13 19:08:16 2021: Debug:     } # policy filter_username = noop
(747) Mon Dec 13 19:08:16 2021: Debug:     policy filter_password {
(747) Mon Dec 13 19:08:16 2021: Debug:       if (&User-Password &&
(&User-Password != "%{string:User-Password}")) {
(747) Mon Dec 13 19:08:16 2021: Debug:       EXPAND %{string:User-Password}
(747) Mon Dec 13 19:08:16 2021: Debug:          --> cleartextpassword
(747) Mon Dec 13 19:08:16 2021: Debug:       if (&User-Password &&
(&User-Password != "%{string:User-Password}"))  -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug:     } # policy filter_password = noop
(747) Mon Dec 13 19:08:16 2021: Debug:     [preprocess] = ok
(747) Mon Dec 13 19:08:16 2021: Debug:     [mschap] = noop
(747) Mon Dec 13 19:08:16 2021: Debug: suffix: Checking for suffix after "@"
(747) Mon Dec 13 19:08:16 2021: Debug: suffix: No '@' in User-Name "testuser123", \
skipping NULL due to config. (747) Mon Dec 13 19:08:16 2021: Debug:     [suffix] = \
noop (747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: Checking for prefix before
"\"
(747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: No '\' in User-Name "testuser123", \
looking up realm NULL (747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: Found realm \
"null" (747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: Adding Stripped-User-Name
= "testuser123"
(747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: Adding Realm = "null"
(747) Mon Dec 13 19:08:16 2021: Debug: ntdomain: Authentication realm is
LOCAL
(747) Mon Dec 13 19:08:16 2021: Debug:     [ntdomain] = ok
(747) Mon Dec 13 19:08:16 2021: Debug: eap: No EAP-Message, not doing EAP
(747) Mon Dec 13 19:08:16 2021: Debug:     [eap] = noop
(747) Mon Dec 13 19:08:16 2021: Debug:     if ( !EAP-Message &&
"%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP") {
(747) Mon Dec 13 19:08:16 2021: Debug:     EXPAND
%{%{Control:Auth-type}:-No-MS_CHAP}
(747) Mon Dec 13 19:08:16 2021: Debug:        --> No-MS_CHAP
(747) Mon Dec 13 19:08:16 2021: Debug:     if ( !EAP-Message &&
"%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP")  -> TRUE
(747) Mon Dec 13 19:08:16 2021: Debug:     if ( !EAP-Message &&
"%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP")  {
(747) Mon Dec 13 19:08:16 2021: Debug:       update {
(747) Mon Dec 13 19:08:16 2021: Debug:       } # update = noop
(747) Mon Dec 13 19:08:16 2021: Debug:     } # if ( !EAP-Message &&
"%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP")  = noop
(747) Mon Dec 13 19:08:16 2021: Debug:     if (Control:Auth-type ="MS-CHAP") {
(747) Mon Dec 13 19:08:16 2021: Debug:     if (Control:Auth-type ="MS-CHAP")  -> \
FALSE (747) Mon Dec 13 19:08:16 2021: Debug:     policy
packetfence-eap-mac-policy {
(747) Mon Dec 13 19:08:16 2021: Debug:       if ( &EAP-Type ) {
(747) Mon Dec 13 19:08:16 2021: Debug:       if ( &EAP-Type )  -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug:       [noop] = noop
(747) Mon Dec 13 19:08:16 2021: Debug:     } # policy
packetfence-eap-mac-policy = noop
(747) Mon Dec 13 19:08:16 2021: WARNING: pap:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
(747) Mon Dec 13 19:08:16 2021: WARNING: pap: !!! Ignoring
control:User-Password.  Update your        !!!
(747) Mon Dec 13 19:08:16 2021: WARNING: pap: !!! configuration so that the
"known good" clear text !!!
(747) Mon Dec 13 19:08:16 2021: WARNING: pap: !!! password is in
Cleartext-Password and NOT in        !!!
(747) Mon Dec 13 19:08:16 2021: WARNING: pap: !!! User-Password.
                           !!!
(747) Mon Dec 13 19:08:16 2021: WARNING: pap:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
(747) Mon Dec 13 19:08:16 2021: WARNING: pap: Auth-Type already set.  Not
setting to PAP
(747) Mon Dec 13 19:08:16 2021: Debug:     [pap] = noop
(747) Mon Dec 13 19:08:16 2021: Debug:   } # authorize = ok
(747) Mon Dec 13 19:08:16 2021: Debug: Found Auth-Type = Accept
(747) Mon Dec 13 19:08:16 2021: Debug: Auth-Type = Accept, accepting the
user
(747) Mon Dec 13 19:08:16 2021: Debug: # Executing section post-auth from
file /usr/local/pf/raddb/sites-enabled/packetfence
(747) Mon Dec 13 19:08:16 2021: Debug:   post-auth {
(747) Mon Dec 13 19:08:16 2021: Debug:     update {
(747) Mon Dec 13 19:08:16 2021: Debug:       EXPAND %{Packet-Src-IP-Address}
(747) Mon Dec 13 19:08:16 2021: Debug:          --> 192.168.254.40
(747) Mon Dec 13 19:08:16 2021: Debug:       EXPAND %{Packet-Dst-IP-Address}
(747) Mon Dec 13 19:08:16 2021: Debug:          --> 192.168.197.90
(747) Mon Dec 13 19:08:16 2021: Debug:     } # update = noop
(747) Mon Dec 13 19:08:16 2021: Debug:     policy packetfence-set-tenant-id
{
(747) Mon Dec 13 19:08:16 2021: Debug:       if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0"){
(747) Mon Dec 13 19:08:16 2021: Debug:       if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0") -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug:       if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(747) Mon Dec 13 19:08:16 2021: Debug:       EXPAND
%{%{control:PacketFence-Tenant-Id}:-0}
(747) Mon Dec 13 19:08:16 2021: Debug:          --> 1
(747) Mon Dec 13 19:08:16 2021: Debug:       if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug:       if (
&control:PacketFence-Tenant-Id == 0 ) {
(747) Mon Dec 13 19:08:16 2021: Debug:       if (
&control:PacketFence-Tenant-Id == 0 )  -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug:     } # policy
packetfence-set-tenant-id = noop
(747) Mon Dec 13 19:08:16 2021: Debug:     if
("%{%{control:PacketFence-Proxied-From}:-False}" == "True") {
(747) Mon Dec 13 19:08:16 2021: Debug:     EXPAND
%{%{control:PacketFence-Proxied-From}:-False}
(747) Mon Dec 13 19:08:16 2021: Debug:        --> False
(747) Mon Dec 13 19:08:16 2021: Debug:     if
("%{%{control:PacketFence-Proxied-From}:-False}" == "True")  -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug:     if (! EAP-Type || (EAP-Type !TTLS  && \
EAP-Type != PEAP) ) { (747) Mon Dec 13 19:08:16 2021: Debug:     if (! EAP-Type || \
(EAP-Type !TTLS  && EAP-Type != PEAP) )  -> TRUE (747) Mon Dec 13 19:08:16 2021: \
Debug:     if (! EAP-Type || (EAP-Type !TTLS  && EAP-Type != PEAP) )  { (747) Mon Dec \
13 19:08:16 2021: Debug: rest: Expanding URI components (747) Mon Dec 13 19:08:16 \
2021: Debug: rest: EXPAND http://127.0.0.1:7070 (747) Mon Dec 13 19:08:16 2021: \
Debug: rest:    --> http://127.0.0.1:7070 (747) Mon Dec 13 19:08:16 2021: Debug: \
rest: EXPAND //radius/rest/authorize (747) Mon Dec 13 19:08:16 2021: Debug: rest:    \
--> //radius/rest/authorize (747) Mon Dec 13 19:08:16 2021: Debug: rest: Sending HTTP \
POST to " http://127.0.0.1:7070//radius/rest/authorize"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute "User-Name"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
"User-Password"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
"NAS-IP-Address"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute "NAS-Port"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
"NAS-Port-Type"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
"Event-Timestamp"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
"NAS-Port-Id"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
"Stripped-User-Name"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute "Realm"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
"SQL-User-Name"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
"FreeRADIUS-Client-IP-Address"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
"PacketFence-KeyBalanced"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Encoding attribute
"PacketFence-Radius-Ip"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Processing response header
(747) Mon Dec 13 19:08:16 2021: Debug: rest:   Status : 200 (OK)
(747) Mon Dec 13 19:08:16 2021: Debug: rest:   Type   : json
(application/json)
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Adding
reply:REST-HTTP-Status-Code += "200"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Parsing attribute
"Reply-Message"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: EXPAND Switch enable access
granted by PacketFence
(747) Mon Dec 13 19:08:16 2021: Debug: rest:    --> Switch enable access
granted by PacketFence
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Reply-Message := "Switch
enable access granted by PacketFence"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Parsing attribute
"control:PacketFence-Authorization-Status"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: EXPAND allow
(747) Mon Dec 13 19:08:16 2021: Debug: rest:    --> allow
(747) Mon Dec 13 19:08:16 2021: Debug: rest:
PacketFence-Authorization-Status := "allow"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Parsing attribute
"Cisco-AVPair"
(747) Mon Dec 13 19:08:16 2021: Debug: rest: EXPAND shell:priv-lvl
(747) Mon Dec 13 19:08:16 2021: Debug: rest:    --> shell:priv-lvl
(747) Mon Dec 13 19:08:16 2021: Debug: rest: Cisco-AVPair :"shell:priv-lvl"
(747) Mon Dec 13 19:08:16 2021: Debug:       [rest] = updated
(747) Mon Dec 13 19:08:16 2021: Debug:       update {
(747) Mon Dec 13 19:08:16 2021: Debug:       } # update = noop
(747) Mon Dec 13 19:08:16 2021: Debug:       if
("%{%{control:PacketFence-Authorization-Status}:-Allow}" == "deny") {
(747) Mon Dec 13 19:08:16 2021: Debug:       EXPAND
%{%{control:PacketFence-Authorization-Status}:-Allow}
(747) Mon Dec 13 19:08:16 2021: Debug:          --> allow
(747) Mon Dec 13 19:08:16 2021: Debug:       if
("%{%{control:PacketFence-Authorization-Status}:-Allow}" == "deny")  ->
FALSE
(747) Mon Dec 13 19:08:16 2021: Debug:       else {
(747) Mon Dec 13 19:08:16 2021: Debug:         policy
packetfence-audit-log-accept {
(747) Mon Dec 13 19:08:16 2021: Debug:           if (&User-Name &&
(&User-Name == "dummy")) {
(747) Mon Dec 13 19:08:16 2021: Debug:           if (&User-Name &&
(&User-Name == "dummy"))  -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug:           else {
(747) Mon Dec 13 19:08:16 2021: Debug:             policy request-timing {
(747) Mon Dec 13 19:08:16 2021: Debug:               if
("%{%{control:PacketFence-Request-Time}:-0}" != 0) {
(747) Mon Dec 13 19:08:16 2021: Debug:               EXPAND
%{%{control:PacketFence-Request-Time}:-0}
(747) Mon Dec 13 19:08:16 2021: Debug:                  --> 0
(747) Mon Dec 13 19:08:16 2021: Debug:               if
("%{%{control:PacketFence-Request-Time}:-0}" != 0)  -> FALSE
(747) Mon Dec 13 19:08:16 2021: Debug:             } # policy
request-timing = updated
(747) Mon Dec 13 19:08:16 2021: Debug: sql: EXPAND type.accept.query
(747) Mon Dec 13 19:08:16 2021: Debug: sql:    --> type.accept.query
(747) Mon Dec 13 19:08:16 2021: Debug: sql: Using query template 'query'
(747) Mon Dec 13 19:08:16 2021: Debug: sql: EXPAND %{User-Name}
(747) Mon Dec 13 19:08:16 2021: Debug: sql:    --> testuser123
(747) Mon Dec 13 19:08:16 2021: Debug: sql: SQL-User-Name set to
'testuser123'
(747) Mon Dec 13 19:08:16 2021: Debug: sql: EXPAND INSERT INTO
radius_audit_log               ( mac, ip, computer_name, user_name,
       stripped_user_name,  realm, event_type,                switch_id,
switch_mac, switch_ip_address,                radius_source_ip_address,
called_station_id, calling_station_id,                nas_port_type, ssid,
nas_port_id,                ifindex, nas_port, connection_type,
   nas_ip_address, nas_identifier, auth_status,                reason,
auth_type, eap_type,                role, node_status, profile,
   source, auto_reg, is_phone,                pf_domain, uuid,
radius_request,                radius_reply, request_time, tenant_id,
radius_ip)              VALUES               (
'%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}',
'%{%{control:PacketFence-Computer-Name}:-N/A}', '%{request:User-Name}',
           '%{request:Stripped-User-Name}', '%{request:Realm}',
'Radius-Access-Request',
 '%{%{control:PacketFence-Switch-Id}:-N/A}',
'%{%{control:PacketFence-Switch-Mac}:-N/A}',
'%{%{control:PacketFence-Switch-Ip-Address}:-N/A}',
 '%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}',
'%{request:Calling-Station-Id}',                '%{request:NAS-Port-Type}',
'%{request:Called-Station-SSID}', '%{request:NAS-Port-Id}',
 '%{%{control:PacketFence-IfIndex}:-N/A}', '%{request:NAS-Port}',
'%{%{control:PacketFence-Connection-Type}:-N/A}',
 '%{request:NAS-IP-Address}', '%{request:NAS-Identifier}', 'Accept',
         '%{request:Module-Failure-Message}', '%{control:Auth-Type}',
'%{request:EAP-Type}',
 '%{%{control:PacketFence-Role}:-N/A}',
'%{%{control:PacketFence-Status}:-N/A}',
'%{%{control:PacketFence-Profile}:-N/A}',
 '%{%{control:PacketFence-Source}:-N/A}',
'%{%{control:PacketFence-AutoReg}:-0}',
'%{%{control:PacketFence-IsPhone}:-0}',
 '%{request:PacketFence-Domain}', '',
'%{pairs:&request:[*]}','%{pairs:&reply:[*]}',
'%{control:PacketFence-Request-Time}', '%{control:PacketFence-Tenant-Id}',
'%{request:PacketFence-Radius-Ip}')
(747) Mon Dec 13 19:08:16 2021: Debug: sql:    --> INSERT INTO
radius_audit_log               ( mac, ip, computer_name, user_name,
       stripped_user_name,  realm, event_type,                switch_id,
switch_mac, switch_ip_address,                radius_source_ip_address,
called_station_id, calling_station_id,                nas_port_type, ssid,
nas_port_id,                ifindex, nas_port, connection_type,
   nas_ip_address, nas_identifier, auth_status,                reason,
auth_type, eap_type,                role, node_status, profile,
   source, auto_reg, is_phone,                pf_domain, uuid,
radius_request,                radius_reply, request_time, tenant_id,
radius_ip)              VALUES               ( '', '', 'N/A',
'testuser123',                'testuser123', 'null',
'Radius-Access-Request',                'N/A', 'N/A', 'N/A',
 '192.168.254.40', '', '',                'Virtual', '', 'tty2',
     'N/A', '2', 'N/A',                '192.168.254.40', '', 'Accept',
           '', 'Accept', '',                'N/A', 'N/A', 'N/A',
     'N/A', '0', '0',                '', '', 'User-Name =
"testuser123", User-Password = "******",
NAS-IP-Address = 192.168.254.40, NAS-Port = 2, NAS-Port-Type =
Virtual, Event-Timestamp = "Dec 13 2021 19:08:16 +04", NAS-Port-Id
= "tty2", Stripped-User-Name = "testuser123", Realm =
"null", FreeRADIUS-Client-IP-Address = 192.168.254.40,
PacketFence-KeyBalanced = "7674cdd55c6099b093d1b9dcdda01825",
PacketFence-Radius-Ip = "192.168.197.90", SQL-User-Name =
"testuser123"','REST-HTTP-Status-Code = 200, Reply-Message =
"Switch enable access granted by PacketFence", Cisco-AVPair =
"shell:priv-lvl=15"', '0', '1', '192.168.197.90')
(747) Mon Dec 13 19:08:16 2021: Debug: sql: Executing query: INSERT INTO
radius_audit_log               ( mac, ip, computer_name, user_name,
       stripped_user_name,  realm, event_type,                switch_id,
switch_mac, switch_ip_address,                radius_source_ip_address,
called_station_id, calling_station_id,                nas_port_type, ssid,
nas_port_id,                ifindex, nas_port, connection_type,
   nas_ip_address, nas_identifier, auth_status,                reason,
auth_type, eap_type,                role, node_status, profile,
   source, auto_reg, is_phone,                pf_domain, uuid,
radius_request,                radius_reply, request_time, tenant_id,
radius_ip)              VALUES               ( '', '', 'N/A',
'testuser123',                'testuser123', 'null',
'Radius-Access-Request',                'N/A', 'N/A', 'N/A',
 '192.168.254.40', '', '',                'Virtual', '', 'tty2',
     'N/A', '2', 'N/A',                '192.168.254.40', '', 'Accept',
           '', 'Accept', '',                'N/A', 'N/A', 'N/A',
     'N/A', '0', '0',                '', '', 'User-Name =
"testuser123", User-Password = "******",
NAS-IP-Address = 192.168.254.40, NAS-Port = 2, NAS-Port-Type =
Virtual, Event-Timestamp = "Dec 13 2021 19:08:16 +04", NAS-Port-Id
= "tty2", Stripped-User-Name = "testuser123", Realm =
"null", FreeRADIUS-Client-IP-Address = 192.168.254.40,
PacketFence-KeyBalanced = "7674cdd55c6099b093d1b9dcdda01825",
PacketFence-Radius-Ip = "192.168.197.90", SQL-User-Name =
"testuser123"','REST-HTTP-Status-Code = 200, Reply-Message =
"Switch enable access granted by PacketFence", Cisco-AVPair =
"shell:priv-lvl=15"', '0', '1', '192.168.197.90')
(747) Mon Dec 13 19:08:16 2021: Debug: sql: SQL query returned: success
(747) Mon Dec 13 19:08:16 2021: Debug: sql: 1 record(s) updated
(747) Mon Dec 13 19:08:16 2021: Debug:             [sql] = ok
(747) Mon Dec 13 19:08:16 2021: Debug:           } # else = updated
(747) Mon Dec 13 19:08:16 2021: Debug:         } # policy
packetfence-audit-log-accept = updated
(747) Mon Dec 13 19:08:16 2021: Debug:       } # else = updated
(747) Mon Dec 13 19:08:16 2021: Debug:     } # if (! EAP-Type || (EAP-Type
!= TTLS  && EAP-Type != PEAP) )  = updated
(747) Mon Dec 13 19:08:16 2021: Debug: attr_filter.packetfence_post_auth:
EXPAND %{User-Name}
(747) Mon Dec 13 19:08:16 2021: Debug: attr_filter.packetfence_post_auth:
 --> testuser123
(747) Mon Dec 13 19:08:16 2021: Debug: attr_filter.packetfence_post_auth:
Matched entry DEFAULT at line 10
(747) Mon Dec 13 19:08:16 2021: Debug:
[attr_filter.packetfence_post_auth] = updated
(747) Mon Dec 13 19:08:16 2021: Debug: linelog: EXPAND
messages.%{%{reply:Packet-Type}:-default}
(747) Mon Dec 13 19:08:16 2021: Debug: linelog:    -->
messages.Access-Accept
(747) Mon Dec 13 19:08:16 2021: Debug: linelog: EXPAND
[mac:%{Calling-Station-Id}] Accepted user: %{reply:User-Name} and returned
VLAN %{reply:Tunnel-Private-Group-ID}
(747) Mon Dec 13 19:08:16 2021: Debug: linelog:    --> [mac:] Accepted
user:  and returned VLAN
(747) Mon Dec 13 19:08:16 2021: Debug:     [linelog] = ok
(747) Mon Dec 13 19:08:16 2021: Debug:   } # post-auth = updated
(747) Mon Dec 13 19:08:16 2021: Debug: Sent Access-Accept Id 20 from
192.168.197.90:1812 to 192.168.254.40:1645 length 0
(747) Mon Dec 13 19:08:16 2021: Debug:   Reply-Message = "Switch enable
access granted by PacketFence"
(747) Mon Dec 13 19:08:16 2021: Debug:   Cisco-AVPair = "shell:priv-lvl"
(747) Mon Dec 13 19:08:16 2021: Debug: Finished request
(747) Mon Dec 13 19:08:21 2021: Debug: Cleaning up request packet ID 20
with timestamp +10956
(748) Mon Dec 13 19:08:25 2021: Debug: Received Status-Server Id 117 from
127.0.0.1:54412 to 127.0.0.1:18121 length 50
(748) Mon Dec 13 19:08:25 2021: Debug:   Message-Authenticator \
0x88a7c5faf457adb7610f55a0941bb0eb (748) Mon Dec 13 19:08:25 2021: Debug:   \
FreeRADIUS-Statistics-Type = 15 (748) Mon Dec 13 19:08:25 2021: Debug: # Executing \
                group from file
/usr/local/pf/raddb/sites-enabled/status
(748) Mon Dec 13 19:08:25 2021: Debug:   Autz-Type Status-Server {
(748) Mon Dec 13 19:08:25 2021: Debug:     [ok] = ok
(748) Mon Dec 13 19:08:25 2021: Debug:   } # Autz-Type Status-Server = ok
(748) Mon Dec 13 19:08:25 2021: Debug: Sent Access-Accept Id 117 from
127.0.0.1:18121 to 127.0.0.1:54412 length 0
(748) Mon Dec 13 19:08:25 2021: Debug:   FreeRADIUS-Total-Access-Requests 749
(748) Mon Dec 13 19:08:25 2021: Debug:   FreeRADIUS-Total-Access-Accepts = 4
(748) Mon Dec 13 19:08:25 2021: Debug:   FreeRADIUS-Total-Access-Rejects = 4
(748) Mon Dec 13 19:08:25 2021: Debug:   FreeRADIUS-Total-Access-Challenges
= 0
(748) Mon Dec 13 19:08:25 2021: Debug:   FreeRADIUS-Total-Auth-Responses = 8
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Auth-Duplicate-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Auth-Malformed-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Auth-Invalid-Requests = 9
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Auth-Dropped-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Auth-Unknown-Types = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Accounting-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Accounting-Responses = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Acct-Duplicate-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Acct-Malformed-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Acct-Invalid-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Acct-Dropped-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Acct-Unknown-Types = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Accepts = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Rejects = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Challenges = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Responses = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Accounting-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Accounting-Responses = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
(748) Mon Dec 13 19:08:25 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
(748) Mon Dec 13 19:08:25 2021: Debug: Finished request
(748) Mon Dec 13 19:08:30 2021: Debug: Cleaning up request packet ID 117
with timestamp +10965
(749) Mon Dec 13 19:08:40 2021: Debug: Received Status-Server Id 39 from
127.0.0.1:34233 to 127.0.0.1:18121 length 50
(749) Mon Dec 13 19:08:40 2021: Debug:   Message-Authenticator \
0xdab43050a96590f4e4e456daf538da6e (749) Mon Dec 13 19:08:40 2021: Debug:   \
FreeRADIUS-Statistics-Type = 15 (749) Mon Dec 13 19:08:40 2021: Debug: # Executing \
                group from file
/usr/local/pf/raddb/sites-enabled/status
(749) Mon Dec 13 19:08:40 2021: Debug:   Autz-Type Status-Server {
(749) Mon Dec 13 19:08:40 2021: Debug:     [ok] = ok
(749) Mon Dec 13 19:08:40 2021: Debug:   } # Autz-Type Status-Server = ok
(749) Mon Dec 13 19:08:40 2021: Debug: Sent Access-Accept Id 39 from
127.0.0.1:18121 to 127.0.0.1:34233 length 0
(749) Mon Dec 13 19:08:40 2021: Debug:   FreeRADIUS-Total-Access-Requests 750
(749) Mon Dec 13 19:08:40 2021: Debug:   FreeRADIUS-Total-Access-Accepts = 4
(749) Mon Dec 13 19:08:40 2021: Debug:   FreeRADIUS-Total-Access-Rejects = 4
(749) Mon Dec 13 19:08:40 2021: Debug:   FreeRADIUS-Total-Access-Challenges
= 0
(749) Mon Dec 13 19:08:40 2021: Debug:   FreeRADIUS-Total-Auth-Responses = 8
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Auth-Duplicate-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Auth-Malformed-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Auth-Invalid-Requests = 9
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Auth-Dropped-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Auth-Unknown-Types = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Accounting-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Accounting-Responses = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Acct-Duplicate-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Acct-Malformed-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Acct-Invalid-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Acct-Dropped-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Acct-Unknown-Types = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Accepts = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Rejects = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Challenges = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Responses = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Accounting-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Accounting-Responses = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
(749) Mon Dec 13 19:08:40 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
(749) Mon Dec 13 19:08:40 2021: Debug: Finished request
(749) Mon Dec 13 19:08:45 2021: Debug: Cleaning up request packet ID 39
with timestamp +10980
(750) Mon Dec 13 19:08:55 2021: Debug: Received Status-Server Id 237 from
127.0.0.1:33232 to 127.0.0.1:18121 length 50
(750) Mon Dec 13 19:08:55 2021: Debug:   Message-Authenticator \
0x0b84e6e16a6fdb6dba18c9c76ffdd204 (750) Mon Dec 13 19:08:55 2021: Debug:   \
FreeRADIUS-Statistics-Type = 15 (750) Mon Dec 13 19:08:55 2021: Debug: # Executing \
                group from file
/usr/local/pf/raddb/sites-enabled/status
(750) Mon Dec 13 19:08:55 2021: Debug:   Autz-Type Status-Server {
(750) Mon Dec 13 19:08:55 2021: Debug:     [ok] = ok
(750) Mon Dec 13 19:08:55 2021: Debug:   } # Autz-Type Status-Server = ok
(750) Mon Dec 13 19:08:55 2021: Debug: Sent Access-Accept Id 237 from
127.0.0.1:18121 to 127.0.0.1:33232 length 0
(750) Mon Dec 13 19:08:55 2021: Debug:   FreeRADIUS-Total-Access-Requests 751
(750) Mon Dec 13 19:08:55 2021: Debug:   FreeRADIUS-Total-Access-Accepts = 4
(750) Mon Dec 13 19:08:55 2021: Debug:   FreeRADIUS-Total-Access-Rejects = 4
(750) Mon Dec 13 19:08:55 2021: Debug:   FreeRADIUS-Total-Access-Challenges
= 0
(750) Mon Dec 13 19:08:55 2021: Debug:   FreeRADIUS-Total-Auth-Responses = 8
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Auth-Duplicate-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Auth-Malformed-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Auth-Invalid-Requests = 9
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Auth-Dropped-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Auth-Unknown-Types = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Accounting-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Accounting-Responses = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Acct-Duplicate-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Acct-Malformed-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Acct-Invalid-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Acct-Dropped-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Acct-Unknown-Types = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Accepts = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Rejects = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Access-Challenges = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Responses = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Accounting-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Accounting-Responses = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
(750) Mon Dec 13 19:08:55 2021: Debug:
FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
(750) Mon Dec 13 19:08:55 2021: Debug: Finished request

Regards
Misbah


[Attachment #5 (text/html)]

<div dir="ltr"><div>Hello,</div><div><br></div><div>I&#39;m trying to configure CLI \
access for admins via PF. I&#39;m so far able to make the admins login to the switch \
CLI, however when they try to enter enable mode they receive &quot;% Error in \
Authentication&quot; message. <br></div><div><br></div><div>I tried and checked the \
radius.log which shows a successful authentication. I have also enabled the checkbox \
on the switch config to allow cli access. I understand that I need to send \
Cisco-AVPair for privileged access to work but dunno where it is \
set.</div><div><br></div><div>Can someone pls help to grant the enable mode access on \
the switch via PF Freeradius.</div><div><br></div><div>Below is the log from \
raddebug.</div><div><br></div><div>(747) Mon Dec 13 19:08:16 2021: Debug: Received \
Access-Request Id 20 from <a href="http://10.141.254.40:1645">10.141.254.40:1645</a> \
to <a href="http://192.168.197.90:1812">192.168.197.90:1812</a> length 81<br>(747) \
Mon Dec 13 19:08:16 2021: Debug:    User-Name = &quot;testuser123&quot;<br>(747) Mon \
Dec 13 19:08:16 2021: Debug:    User-Password = \
&quot;cleartextpassword&quot;<br>(747) Mon Dec 13 19:08:16 2021: Debug:    NAS-Port = \
2<br>(747) Mon Dec 13 19:08:16 2021: Debug:    NAS-Port-Id = \
&quot;tty2&quot;<br>(747) Mon Dec 13 19:08:16 2021: Debug:    NAS-Port-Type = \
Virtual<br>(747) Mon Dec 13 19:08:16 2021: Debug:    NAS-IP-Address = \
192.168.254.40<br>(747) Mon Dec 13 19:08:16 2021: Debug: # Executing section \
authorize from file /usr/local/pf/raddb/sites-enabled/packetfence<br>(747) Mon Dec 13 \
19:08:16 2021: Debug:    authorize {<br>(747) Mon Dec 13 19:08:16 2021: Debug:       \
policy packetfence-nas-ip-address {<br>(747) Mon Dec 13 19:08:16 2021: Debug:         \
if (!NAS-IP-Address || NAS-IP-Address == &quot;0.0.0.0&quot;){<br>(747) Mon Dec 13 \
19:08:16 2021: Debug:          if (!NAS-IP-Address || NAS-IP-Address == \
&quot;0.0.0.0&quot;) -&gt; FALSE<br>(747) Mon Dec 13 19:08:16 2021: Debug:       } # \
policy packetfence-nas-ip-address = notfound<br>(747) Mon Dec 13 19:08:16 2021: \
Debug:       update {<br>(747) Mon Dec 13 19:08:16 2021: Debug:          EXPAND \
%{Packet-Src-IP-Address}<br>(747) Mon Dec 13 19:08:16 2021: Debug:               \
--&gt; 192.168.254.40<br>(747) Mon Dec 13 19:08:16 2021: Debug:          EXPAND \
%{Packet-Dst-IP-Address}<br>(747) Mon Dec 13 19:08:16 2021: Debug:               \
--&gt; 192.168.197.90<br>(747) Mon Dec 13 19:08:16 2021: Debug:          EXPAND \
%l<br>(747) Mon Dec 13 19:08:16 2021: Debug:               --&gt; 1639408096<br>(747) \
Mon Dec 13 19:08:16 2021: Debug:       } # update = noop<br>(747) Mon Dec 13 19:08:16 \
2021: Debug:       policy packetfence-set-realm-if-machine {<br>(747) Mon Dec 13 \
19:08:16 2021: Debug:          if (User-Name =~ /host\/([a-z0-9_-]*)[\.](.*)/i) \
{<br>(747) Mon Dec 13 19:08:16 2021: Debug:          if (User-Name =~ \
/host\/([a-z0-9_-]*)[\.](.*)/i)   -&gt; FALSE<br>(747) Mon Dec 13 19:08:16 2021: \
Debug:       } # policy packetfence-set-realm-if-machine = noop<br>(747) Mon Dec 13 \
19:08:16 2021: Debug:       policy packetfence-balanced-key-policy {<br>(747) Mon Dec \
13 19:08:16 2021: Debug:          if (&amp;PacketFence-KeyBalanced &amp;&amp; \
(&amp;PacketFence-KeyBalanced =~ /^(.*)(.)$/i)) {<br>(747) Mon Dec 13 19:08:16 2021: \
Debug:          if (&amp;PacketFence-KeyBalanced &amp;&amp; \
(&amp;PacketFence-KeyBalanced =~ /^(.*)(.)$/i))   -&gt; FALSE<br>(747) Mon Dec 13 \
19:08:16 2021: Debug:          else {<br>(747) Mon Dec 13 19:08:16 2021: Debug:       \
update {<br>(747) Mon Dec 13 19:08:16 2021: Debug:                EXPAND \
%{md5:%{Calling-Station-Id}%{User-Name}}<br>(747) Mon Dec 13 19:08:16 2021: Debug:    \
--&gt; 7674cdd55c6099b093d1b9dcdda01825<br>(747) Mon Dec 13 19:08:16 2021: Debug:     \
EXPAND %{md5:%{Calling-Station-Id}%{User-Name}}<br>(747) Mon Dec 13 19:08:16 2021: \
Debug:                     --&gt; 7674cdd55c6099b093d1b9dcdda01825<br>(747) Mon Dec \
13 19:08:16 2021: Debug:             } # update = noop<br>(747) Mon Dec 13 19:08:16 \
2021: Debug:          } # else = noop<br>(747) Mon Dec 13 19:08:16 2021: Debug:       \
} # policy packetfence-balanced-key-policy = noop<br>(747) Mon Dec 13 19:08:16 2021: \
Debug:       policy packetfence-set-tenant-id {<br>(747) Mon Dec 13 19:08:16 2021: \
Debug:          if (!NAS-IP-Address || NAS-IP-Address == \
&quot;0.0.0.0&quot;){<br>(747) Mon Dec 13 19:08:16 2021: Debug:          if \
(!NAS-IP-Address || NAS-IP-Address == &quot;0.0.0.0&quot;) -&gt; FALSE<br>(747) Mon \
Dec 13 19:08:16 2021: Debug:          if ( \
&quot;%{%{control:PacketFence-Tenant-Id}:-0}&quot; == &quot;0&quot;) {<br>(747) Mon \
Dec 13 19:08:16 2021: Debug:          EXPAND \
%{%{control:PacketFence-Tenant-Id}:-0}<br>(747) Mon Dec 13 19:08:16 2021: Debug:      \
--&gt; 0<br>(747) Mon Dec 13 19:08:16 2021: Debug:          if ( \
&quot;%{%{control:PacketFence-Tenant-Id}:-0}&quot; == &quot;0&quot;)   -&gt; \
TRUE<br>(747) Mon Dec 13 19:08:16 2021: Debug:          if ( \
&quot;%{%{control:PacketFence-Tenant-Id}:-0}&quot; == &quot;0&quot;)   {<br>(747) Mon \
Dec 13 19:08:16 2021: Debug:             update control {<br>(747) Mon Dec 13 \
19:08:16 2021: Debug:                EXPAND %{User-Name}<br>(747) Mon Dec 13 19:08:16 \
2021: Debug:                     --&gt; testuser123<br>(747) Mon Dec 13 19:08:16 \
2021: Debug:                SQL-User-Name set to &#39;testuser123&#39;<br>(747) Mon \
Dec 13 19:08:16 2021: Debug:                Executing select query:   SELECT \
IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = &#39;192.168.254.40&#39;), \
0)<br>(747) Mon Dec 13 19:08:16 2021: Debug:                EXPAND %{sql: SELECT \
IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = \
&#39;%{NAS-IP-Address}&#39;), 0)}<br>(747) Mon Dec 13 19:08:16 2021: Debug:           \
--&gt; 1<br>(747) Mon Dec 13 19:08:16 2021: Debug:             } # update control = \
noop<br>(747) Mon Dec 13 19:08:16 2021: Debug:          } # if ( \
&quot;%{%{control:PacketFence-Tenant-Id}:-0}&quot; == &quot;0&quot;)   = \
noop<br>(747) Mon Dec 13 19:08:16 2021: Debug:          if ( \
&amp;control:PacketFence-Tenant-Id == 0 ) {<br>(747) Mon Dec 13 19:08:16 2021: Debug: \
if ( &amp;control:PacketFence-Tenant-Id == 0 )   -&gt; FALSE<br>(747) Mon Dec 13 \
19:08:16 2021: Debug:       } # policy packetfence-set-tenant-id = noop<br>(747) Mon \
Dec 13 19:08:16 2021: Debug:       policy rewrite_calling_station_id {<br>(747) Mon \
Dec 13 19:08:16 2021: Debug:          if (&amp;Calling-Station-Id &amp;&amp; \
(&amp;Calling-Station-Id =~ \
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) \
{<br>(747) Mon Dec 13 19:08:16 2021: Debug:          if (&amp;Calling-Station-Id \
&amp;&amp; (&amp;Calling-Station-Id =~ \
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) \
-&gt; FALSE<br>(747) Mon Dec 13 19:08:16 2021: Debug:          else {<br>(747) Mon \
Dec 13 19:08:16 2021: Debug:             [noop] = noop<br>(747) Mon Dec 13 19:08:16 \
2021: Debug:          } # else = noop<br>(747) Mon Dec 13 19:08:16 2021: Debug:       \
} # policy rewrite_calling_station_id = noop<br>(747) Mon Dec 13 19:08:16 2021: \
Debug:       policy rewrite_called_station_id {<br>(747) Mon Dec 13 19:08:16 2021: \
Debug:          if ((&amp;Called-Station-Id) &amp;&amp; (&amp;Called-Station-Id =~ \
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) \
{<br>(747) Mon Dec 13 19:08:16 2021: Debug:          if ((&amp;Called-Station-Id) \
&amp;&amp; (&amp;Called-Station-Id =~ \
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) \
-&gt; FALSE<br>(747) Mon Dec 13 19:08:16 2021: Debug:          else {<br>(747) Mon \
Dec 13 19:08:16 2021: Debug:             [noop] = noop<br>(747) Mon Dec 13 19:08:16 \
2021: Debug:          } # else = noop<br>(747) Mon Dec 13 19:08:16 2021: Debug:       \
} # policy rewrite_called_station_id = noop<br>(747) Mon Dec 13 19:08:16 2021: Debug: \
if ( &quot;%{client:shortname}&quot; =~ /eduroam_tlrs/ ) {<br>(747) Mon Dec 13 \
19:08:16 2021: Debug:       EXPAND %{client:shortname}<br>(747) Mon Dec 13 19:08:16 \
2021: Debug:            --&gt; <a \
href="http://192.168.254.40/32">192.168.254.40/32</a><br>(747) Mon Dec 13 19:08:16 \
2021: Debug:       if ( &quot;%{client:shortname}&quot; =~ /eduroam_tlrs/ )   -&gt; \
FALSE<br>(747) Mon Dec 13 19:08:16 2021: Debug:       policy filter_username \
{<br>(747) Mon Dec 13 19:08:16 2021: Debug:          if (&amp;User-Name) {<br>(747) \
Mon Dec 13 19:08:16 2021: Debug:          if (&amp;User-Name)   -&gt; TRUE<br>(747) \
Mon Dec 13 19:08:16 2021: Debug:          if (&amp;User-Name)   {<br>(747) Mon Dec 13 \
19:08:16 2021: Debug:             if (&amp;User-Name =~ / /) {<br>(747) Mon Dec 13 \
19:08:16 2021: Debug:             if (&amp;User-Name =~ / /)   -&gt; FALSE<br>(747) \
Mon Dec 13 19:08:16 2021: Debug:             if (&amp;User-Name =~ /@[^@]*@/ ) \
{<br>(747) Mon Dec 13 19:08:16 2021: Debug:             if (&amp;User-Name =~ \
/@[^@]*@/ )   -&gt; FALSE<br>(747) Mon Dec 13 19:08:16 2021: Debug:             if \
(&amp;User-Name =~ /\.\./ ) {<br>(747) Mon Dec 13 19:08:16 2021: Debug:             \
if (&amp;User-Name =~ /\.\./ )   -&gt; FALSE<br>(747) Mon Dec 13 19:08:16 2021: \
Debug:             if ((&amp;User-Name =~ /@/) &amp;&amp; (&amp;User-Name !~ \
/@(.+)\.(.+)$/))   {<br>(747) Mon Dec 13 19:08:16 2021: Debug:             if \
((&amp;User-Name =~ /@/) &amp;&amp; (&amp;User-Name !~ /@(.+)\.(.+)$/))    -&gt; \
FALSE<br>(747) Mon Dec 13 19:08:16 2021: Debug:             if (&amp;User-Name =~ \
/\.$/)   {<br>(747) Mon Dec 13 19:08:16 2021: Debug:             if (&amp;User-Name \
=~ /\.$/)    -&gt; FALSE<br>(747) Mon Dec 13 19:08:16 2021: Debug:             if \
(&amp;User-Name =~ /@\./)   {<br>(747) Mon Dec 13 19:08:16 2021: Debug:             \
if (&amp;User-Name =~ /@\./)    -&gt; FALSE<br>(747) Mon Dec 13 19:08:16 2021: Debug: \
} # if (&amp;User-Name)   = noop<br>(747) Mon Dec 13 19:08:16 2021: Debug:       } # \
policy filter_username = noop<br>(747) Mon Dec 13 19:08:16 2021: Debug:       policy \
filter_password {<br>(747) Mon Dec 13 19:08:16 2021: Debug:          if \
(&amp;User-Password &amp;&amp;             (&amp;User-Password != \
&quot;%{string:User-Password}&quot;)) {<br>(747) Mon Dec 13 19:08:16 2021: Debug:     \
EXPAND %{string:User-Password}<br>(747) Mon Dec 13 19:08:16 2021: Debug:              \
--&gt; cleartextpassword<br>(747) Mon Dec 13 19:08:16 2021: Debug:          if \
(&amp;User-Password &amp;&amp;             (&amp;User-Password != \
&quot;%{string:User-Password}&quot;))   -&gt; FALSE<br>(747) Mon Dec 13 19:08:16 \
2021: Debug:       } # policy filter_password = noop<br>(747) Mon Dec 13 19:08:16 \
2021: Debug:       [preprocess] = ok<br>(747) Mon Dec 13 19:08:16 2021: Debug:       \
[mschap] = noop<br>(747) Mon Dec 13 19:08:16 2021: Debug: suffix: Checking for suffix \
after &quot;@&quot;<br>(747) Mon Dec 13 19:08:16 2021: Debug: suffix: No &#39;@&#39; \
in User-Name = &quot;testuser123&quot;, skipping NULL due to config.<br>(747) Mon Dec \
13 19:08:16 2021: Debug:       [suffix] = noop<br>(747) Mon Dec 13 19:08:16 2021: \
Debug: ntdomain: Checking for prefix before &quot;\&quot;<br>(747) Mon Dec 13 \
19:08:16 2021: Debug: ntdomain: No &#39;\&#39; in User-Name = \
&quot;testuser123&quot;, looking up realm NULL<br>(747) Mon Dec 13 19:08:16 2021: \
Debug: ntdomain: Found realm &quot;null&quot;<br>(747) Mon Dec 13 19:08:16 2021: \
Debug: ntdomain: Adding Stripped-User-Name = &quot;testuser123&quot;<br>(747) Mon Dec \
13 19:08:16 2021: Debug: ntdomain: Adding Realm = &quot;null&quot;<br>(747) Mon Dec \
13 19:08:16 2021: Debug: ntdomain: Authentication realm is LOCAL<br>(747) Mon Dec 13 \
19:08:16 2021: Debug:       [ntdomain] = ok<br>(747) Mon Dec 13 19:08:16 2021: Debug: \
eap: No EAP-Message, not doing EAP<br>(747) Mon Dec 13 19:08:16 2021: Debug:       \
[eap] = noop<br>(747) Mon Dec 13 19:08:16 2021: Debug:       if ( !EAP-Message \
&amp;&amp; &quot;%{%{Control:Auth-type}:-No-MS_CHAP}&quot; != &quot;MS-CHAP&quot;) \
{<br>(747) Mon Dec 13 19:08:16 2021: Debug:       EXPAND \
%{%{Control:Auth-type}:-No-MS_CHAP}<br>(747) Mon Dec 13 19:08:16 2021: Debug:         \
--&gt; No-MS_CHAP<br>(747) Mon Dec 13 19:08:16 2021: Debug:       if ( !EAP-Message \
&amp;&amp; &quot;%{%{Control:Auth-type}:-No-MS_CHAP}&quot; != &quot;MS-CHAP&quot;)   \
-&gt; TRUE<br>(747) Mon Dec 13 19:08:16 2021: Debug:       if ( !EAP-Message \
&amp;&amp; &quot;%{%{Control:Auth-type}:-No-MS_CHAP}&quot; != &quot;MS-CHAP&quot;)   \
{<br>(747) Mon Dec 13 19:08:16 2021: Debug:          update {<br>(747) Mon Dec 13 \
19:08:16 2021: Debug:          } # update = noop<br>(747) Mon Dec 13 19:08:16 2021: \
Debug:       } # if ( !EAP-Message &amp;&amp; \
&quot;%{%{Control:Auth-type}:-No-MS_CHAP}&quot; != &quot;MS-CHAP&quot;)   = \
noop<br>(747) Mon Dec 13 19:08:16 2021: Debug:       if (Control:Auth-type == \
&quot;MS-CHAP&quot;) {<br>(747) Mon Dec 13 19:08:16 2021: Debug:       if \
(Control:Auth-type == &quot;MS-CHAP&quot;)   -&gt; FALSE<br>(747) Mon Dec 13 19:08:16 \
2021: Debug:       policy packetfence-eap-mac-policy {<br>(747) Mon Dec 13 19:08:16 \
2021: Debug:          if ( &amp;EAP-Type ) {<br>(747) Mon Dec 13 19:08:16 2021: \
Debug:          if ( &amp;EAP-Type )   -&gt; FALSE<br>(747) Mon Dec 13 19:08:16 2021: \
Debug:          [noop] = noop<br>(747) Mon Dec 13 19:08:16 2021: Debug:       } # \
policy packetfence-eap-mac-policy = noop<br>(747) Mon Dec 13 19:08:16 2021: WARNING: \
pap: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!<br>(747) Mon Dec 13 \
19:08:16 2021: WARNING: pap: !!! Ignoring control:User-Password.   Update your        \
!!!<br>(747) Mon Dec 13 19:08:16 2021: WARNING: pap: !!! configuration so that the \
&quot;known good&quot; clear text !!!<br>(747) Mon Dec 13 19:08:16 2021: WARNING: \
pap: !!! password is in Cleartext-Password and NOT in            !!!<br>(747) Mon Dec \
13 19:08:16 2021: WARNING: pap: !!! User-Password.                                    \
!!!<br>(747) Mon Dec 13 19:08:16 2021: WARNING: pap: \
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!<br>(747) Mon Dec 13 \
19:08:16 2021: WARNING: pap: Auth-Type already set.   Not setting to PAP<br>(747) Mon \
Dec 13 19:08:16 2021: Debug:       [pap] = noop<br>(747) Mon Dec 13 19:08:16 2021: \
Debug:    } # authorize = ok<br>(747) Mon Dec 13 19:08:16 2021: Debug: Found \
Auth-Type = Accept<br>(747) Mon Dec 13 19:08:16 2021: Debug: Auth-Type = Accept, \
accepting the user<br>(747) Mon Dec 13 19:08:16 2021: Debug: # Executing section \
post-auth from file /usr/local/pf/raddb/sites-enabled/packetfence<br>(747) Mon Dec 13 \
19:08:16 2021: Debug:    post-auth {<br>(747) Mon Dec 13 19:08:16 2021: Debug:       \
update {<br>(747) Mon Dec 13 19:08:16 2021: Debug:          EXPAND \
%{Packet-Src-IP-Address}<br>(747) Mon Dec 13 19:08:16 2021: Debug:               \
--&gt; 192.168.254.40<br>(747) Mon Dec 13 19:08:16 2021: Debug:          EXPAND \
%{Packet-Dst-IP-Address}<br>(747) Mon Dec 13 19:08:16 2021: Debug:               \
--&gt; 192.168.197.90<br>(747) Mon Dec 13 19:08:16 2021: Debug:       } # update = \
noop<br>(747) Mon Dec 13 19:08:16 2021: Debug:       policy packetfence-set-tenant-id \
{<br>(747) Mon Dec 13 19:08:16 2021: Debug:          if (!NAS-IP-Address || \
NAS-IP-Address == &quot;0.0.0.0&quot;){<br>(747) Mon Dec 13 19:08:16 2021: Debug:     \
if (!NAS-IP-Address || NAS-IP-Address == &quot;0.0.0.0&quot;) -&gt; FALSE<br>(747) \
Mon Dec 13 19:08:16 2021: Debug:          if ( \
&quot;%{%{control:PacketFence-Tenant-Id}:-0}&quot; == &quot;0&quot;) {<br>(747) Mon \
Dec 13 19:08:16 2021: Debug:          EXPAND \
%{%{control:PacketFence-Tenant-Id}:-0}<br>(747) Mon Dec 13 19:08:16 2021: Debug:      \
--&gt; 1<br>(747) Mon Dec 13 19:08:16 2021: Debug:          if ( \
&quot;%{%{control:PacketFence-Tenant-Id}:-0}&quot; == &quot;0&quot;)   -&gt; \
FALSE<br>(747) Mon Dec 13 19:08:16 2021: Debug:          if ( \
&amp;control:PacketFence-Tenant-Id == 0 ) {<br>(747) Mon Dec 13 19:08:16 2021: Debug: \
if ( &amp;control:PacketFence-Tenant-Id == 0 )   -&gt; FALSE<br>(747) Mon Dec 13 \





_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic