<?xml version="1.0" encoding="utf-8"?>
<!--RSS generated by Flaimo.com RSS Builder [2026-04-08 17:38:54]-->
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"><channel><docs>https://packetfence.org/bugs/</docs><link>https://packetfence.org/bugs/</link><description><![CDATA[PacketFence - BTS - Issues]]></description><title>PacketFence - BTS - Issues</title><image><title>PacketFence - BTS - Issues</title><url>https://packetfence.org/bugs/images/mantis_logo_button.gif</url><link>https://packetfence.org/bugs/</link><description><![CDATA[PacketFence - BTS - Issues]]></description></image><language>en</language><category>All Projects</category><ttl>10</ttl><dc:language>en</dc:language><sy:updatePeriod>hourly</sy:updatePeriod><sy:updateFrequency>1</sy:updateFrequency><item><title>0001870: Web admin page for switches has phantom second page</title><author></author><link>https://packetfence.org/bugs/view.php?id=1870</link><description><![CDATA[(This applies to PF 4.6.1, which isn't in the picklist yet.)&lt;br /&gt;
When PF has exactly 25 switches defined, the web admin switches page adds footer links for a second page of switches.  Advancing to page 2 displays a blank space where switches should be listed, along with a button to add another switch.  Deleting a switch (switch count 24) properly displays only one page again.]]></description><category>web admin</category><pubDate>Wed, 04 Mar 2015 15:05:24 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1870</guid><comments>https://packetfence.org/bugs/view.php?id=1870#bugnotes</comments></item><item><title>0001826: Snort suddenly not starting but after a variable spelling change, it works.</title><author></author><link>https://packetfence.org/bugs/view.php?id=1826</link><description><![CDATA[Snort suddenly not working after a packetfence service restart. On /var/log/messages, it shows that it has a problem on a variable $DNS_SERVERS and When I run the cat /var/log/messages and got FATAL Error on snort as shown below:&lt;br /&gt;
 &lt;br /&gt;
   Sep 25 13:00:05 spfcn01 snort[26763]: FATAL ERROR: /usr/local/pf/conf/snort/emerging-trojan.rules(143) Undefined variable in the string: $DNS_SERVERS.&lt;br /&gt;
 &lt;br /&gt;
and the I run cat /usr/local/pf/conf/snort.conf and edit the:&lt;br /&gt;
 &lt;br /&gt;
    var DNS_SERVERS [%%dnsservers%%] &lt;br /&gt;
 &lt;br /&gt;
and changed to:&lt;br /&gt;
 &lt;br /&gt;
   var DNS_SERVERS [%%dns_servers%%]&lt;br /&gt;
 &lt;br /&gt;
and then restarted again the packetfence and the result, snort service is now running.]]></description><category>IDS</category><pubDate>Wed, 04 Mar 2015 12:11:29 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1826</guid><comments>https://packetfence.org/bugs/view.php?id=1826#bugnotes</comments></item><item><title>0001829: Admin Guide 4.4.0 clarification on paper pages 31-32</title><author></author><link>https://packetfence.org/bugs/view.php?id=1829</link><description><![CDATA[On paper pages 31-32 (PDF pages 35-36), there seems to be confusion in the sample command line text boxes:&lt;br /&gt;
&lt;br /&gt;
For Centos/RHEL:&lt;br /&gt;
&lt;br /&gt;
(box)&lt;br /&gt;
# usermod -a -G wbpriv pf&lt;br /&gt;
(/box)&lt;br /&gt;
&lt;br /&gt;
Finally, start winbind, and test the setup using ntlm_auth and radtest:&lt;br /&gt;
&lt;br /&gt;
(box)&lt;br /&gt;
# service winbind start&lt;br /&gt;
# chkconfig --level 345 winbind on&lt;br /&gt;
(/box)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For Debian and Ubuntu:&lt;br /&gt;
&lt;br /&gt;
(box)&lt;br /&gt;
# usermod -a -G winbindd_priv pf&lt;br /&gt;
# ntlm_auth --username myDomainUser&lt;br /&gt;
# radtest -t mschap -x myDomainUser myDomainPassword localhost:18120 12&lt;br /&gt;
 testing123&lt;br /&gt;
 Sending Access-Request of id 108 to 127.0.0.1 port 18120&lt;br /&gt;
 User-Name = &quot;myDomainUser&quot;&lt;br /&gt;
 NAS-IP-Address = 10.0.0.1&lt;br /&gt;
 NAS-Port = 12&lt;br /&gt;
 Message-Authenticator = 0x00000000000000000000000000000000&lt;br /&gt;
 MS-CHAP-Challenge = 0x79d62c9da4e55104&lt;br /&gt;
 MS-CHAP-Response =&lt;br /&gt;
 0x000100000000000000000000000000000000000000000000000091c843b420f0dec4228ed2f26bff07d5e49ad9a2974229e5&lt;br /&gt;
 rad_recv: Access-Accept packet from host 127.0.0.1 port 18120, id=108,&lt;br /&gt;
 length=20&lt;br /&gt;
(/box)&lt;br /&gt;
&lt;br /&gt;
When following this through for CentOS/RHEL, you do not do the ntlm_auth or radtest tests...since it is only in the Debian/Ubuntu textbox!!!&lt;br /&gt;
&lt;br /&gt;
ASSuming that the service and chkconfig work the same under Debian/Ubuntu (which I have personally never used),  this order seems to make sense to me:&lt;br /&gt;
&lt;br /&gt;
For Centos/RHEL:&lt;br /&gt;
&lt;br /&gt;
(box)&lt;br /&gt;
# usermod -a -G wbpriv pf&lt;br /&gt;
(/box)&lt;br /&gt;
&lt;br /&gt;
For Debian and Ubuntu:&lt;br /&gt;
&lt;br /&gt;
(box)&lt;br /&gt;
# usermod -a -G winbindd_priv pf&lt;br /&gt;
(/box)&lt;br /&gt;
&lt;br /&gt;
Start winbind:&lt;br /&gt;
&lt;br /&gt;
(box)&lt;br /&gt;
# service winbind start&lt;br /&gt;
# chkconfig --level 345 winbind on&lt;br /&gt;
(/box)&lt;br /&gt;
&lt;br /&gt;
Finally, test the setup using ntlm_auth and radtest:&lt;br /&gt;
&lt;br /&gt;
(box)&lt;br /&gt;
# ntlm_auth --username myDomainUser&lt;br /&gt;
# radtest -t mschap -x myDomainUser myDomainPassword localhost:18120 12&lt;br /&gt;
 testing123&lt;br /&gt;
 Sending Access-Request of id 108 to 127.0.0.1 port 18120&lt;br /&gt;
 User-Name = &quot;myDomainUser&quot;&lt;br /&gt;
 NAS-IP-Address = 10.0.0.1&lt;br /&gt;
 NAS-Port = 12&lt;br /&gt;
 Message-Authenticator = 0x00000000000000000000000000000000&lt;br /&gt;
 MS-CHAP-Challenge = 0x79d62c9da4e55104&lt;br /&gt;
 MS-CHAP-Response =&lt;br /&gt;
 0x000100000000000000000000000000000000000000000000000091c843b420f0dec4228ed2f26bff07d5e49ad9a2974229e5&lt;br /&gt;
 rad_recv: Access-Accept packet from host 127.0.0.1 port 18120, id=108,&lt;br /&gt;
 length=20&lt;br /&gt;
(/box)]]></description><category>doc</category><pubDate>Wed, 04 Mar 2015 12:10:06 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1829</guid><comments>https://packetfence.org/bugs/view.php?id=1829#bugnotes</comments></item><item><title>0001841: Issue with Nessus and Net::Nessus::XMLRPC</title><author></author><link>https://packetfence.org/bugs/view.php?id=1841</link><description><![CDATA[Some issues with Net::Nessus::XMLRPC upstream module may prevent Nessus scan succeed.&lt;br /&gt;
&lt;br /&gt;
Impacts:&lt;br /&gt;
- Issue with SSL communication when a self-signed certificate is being used between PacketFence and the Nessus server (https)&lt;br /&gt;
- Issue when trying to export the report&lt;br /&gt;
&lt;br /&gt;
Patch have been submitted but never merged.]]></description><category>upstream</category><pubDate>Wed, 04 Mar 2015 12:05:42 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1841</guid><comments>https://packetfence.org/bugs/view.php?id=1841#bugnotes</comments></item><item><title>0001851: When creating "Routed Networks" provide default values for DHCP leases</title><author></author><link>https://packetfence.org/bugs/view.php?id=1851</link><description><![CDATA[When creating a routed network, users are forced to specify DHCP lease times:&lt;br /&gt;
&lt;br /&gt;
Default Lease Time:&lt;br /&gt;
&lt;br /&gt;
Max Lease Time:&lt;br /&gt;
&lt;br /&gt;
Most people will have no idea what values are good for this, so please provide default values.  If someone wants a different value, it is very simple to change.]]></description><category>web admin</category><pubDate>Wed, 04 Mar 2015 12:04:44 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1851</guid><comments>https://packetfence.org/bugs/view.php?id=1851#bugnotes</comments></item><item><title>0001857: Add the ability to detect the switch type using SNMP</title><author></author><link>https://packetfence.org/bugs/view.php?id=1857</link><description><![CDATA[Admins want a simple way to deploy Packetfence, with the least tweaking necessary to make it work.  One way to accomplish this is to auto-detect the type of switch, based on SNMP response.  (I believe this is similar to how &quot;Uplink&quot; and &quot;VOIP&quot; detection works.)&lt;br /&gt;
&lt;br /&gt;
Packetfence should send an snmpget of 1.3.6.1.2.1.1.2.0 to the switch.  This will return the sysOID of the switch.  This number can then be looked up in a table that maps sysOID to device type.  (There are several open source tools like (www.nedi.ch) and Observium.org that already have this table.)  &lt;br /&gt;
&lt;br /&gt;
Now Packetfence knows what kind of switch it is talking to, without required the admin to specify the type.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.alvestrand.no/objectid/1.3.6.1.2.1.1.2.html&quot;&gt;http://www.alvestrand.no/objectid/1.3.6.1.2.1.1.2.html&lt;/a&gt; [&lt;a href=&quot;http://www.alvestrand.no/objectid/1.3.6.1.2.1.1.2.html&quot; target=&quot;_blank&quot;&gt;^&lt;/a&gt;]]]></description><category>web admin</category><pubDate>Wed, 04 Mar 2015 11:30:42 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1857</guid><comments>https://packetfence.org/bugs/view.php?id=1857#bugnotes</comments></item><item><title>0001842: Implement RADIUS de-authentication for Meru Wireless Controllers</title><author></author><link>https://packetfence.org/bugs/view.php?id=1842</link><description><![CDATA[Per a post to the PF-users list by Tim DeNike on 6 March 2014, Meru has added RADIUS de-auth to their firmware starting with System Director 5.3.x.  He even posted sample code to use the feature, which I can't use since the directory structure appears to have changed with PF 4.5.  Long story short, the existing module keeps telling us to pressure the vendor to implement RADUIS de-auth.  We have done our part.  Tag, you're it... :-)]]></description><category>hardware modules</category><pubDate>Wed, 04 Mar 2015 11:28:43 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1842</guid><comments>https://packetfence.org/bugs/view.php?id=1842#bugnotes</comments></item><item><title>0001853: Provide the ability to view logs from the web interface</title><author></author><link>https://packetfence.org/bugs/view.php?id=1853</link><description><![CDATA[Packetfence has some very useful log files, including &quot;packetfence.log&quot;, &quot;radius.log&quot;, and others.  These files are very helpful in understanding what is happening with Packetfence.&lt;br /&gt;
&lt;br /&gt;
It would be very useful for users to be able to view these logs in the web interface.  A static view of the file will provide this function.  However, a real-time scrolling interface could really help admins understand exactly what happens when they plug in a port.]]></description><category>web admin</category><pubDate>Wed, 04 Mar 2015 11:24:06 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1853</guid><comments>https://packetfence.org/bugs/view.php?id=1853#bugnotes</comments></item><item><title>0001858: Display description when adding Triggers to a Violation</title><author></author><link>https://packetfence.org/bugs/view.php?id=1858</link><description><![CDATA[&quot;Configuration &gt; Violations &gt; Add &gt; Triggers&quot;&lt;br /&gt;
and&lt;br /&gt;
&quot;Configuration &gt; Violations &gt; Edit &gt; Triggers&quot;&lt;br /&gt;
&lt;br /&gt;
If the user clicks on the white-space, they currently get a pull-down list of all violations listed solely by violation ID.&lt;br /&gt;
For example = Detect::2001664&lt;br /&gt;
For example = OS::6&lt;br /&gt;
&lt;br /&gt;
Please add the description to this pull-down list.  &lt;br /&gt;
For example = Detect::2001664 &quot;P2P (Gnutella)&quot;&lt;br /&gt;
For example = OS::6 &quot;Gaming Consoles&quot;&lt;br /&gt;
&lt;br /&gt;
These same descriptions should also be displayed when viewing configured &quot;Triggers&quot;.  I think it would make sense to have only one entry per line, and to use a scroll-bar if more lines are needed.&lt;br /&gt;
&lt;br /&gt;
Current =&lt;br /&gt;
[OS::4] [OS::10] [Detect::1100006] [Detect::1100005]&lt;br /&gt;
&lt;br /&gt;
Proposed =&lt;br /&gt;
[OS::4 &quot;Routers and APs&quot;]&lt;br /&gt;
[OS::10 &quot;Storage Devices]&lt;br /&gt;
[Detect::1100006 &quot;P2P Isolation (snort example)&quot;]&lt;br /&gt;
[Detect::1100005 &quot;Browser isolation example&quot;]&lt;br /&gt;
&lt;br /&gt;
Thanks!]]></description><category>web admin</category><pubDate>Wed, 04 Mar 2015 11:20:11 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1858</guid><comments>https://packetfence.org/bugs/view.php?id=1858#bugnotes</comments></item><item><title>0001856: Add the ability to test switch credentials (SNMP/CLI/HTTP) from web interface</title><author></author><link>https://packetfence.org/bugs/view.php?id=1856</link><description><![CDATA[When adding a switch (&quot;Configuration &gt; Switch&quot;) the admin wants to know if Packetfence can talk to the switch.&lt;br /&gt;
&lt;br /&gt;
Add the ability to test the credentials entered:&lt;br /&gt;
&lt;br /&gt;
SNMP&lt;br /&gt;
CLI (SSH/TELNET)&lt;br /&gt;
HTTP/HTTPS&lt;br /&gt;
&lt;br /&gt;
Provide this type of feedback to the admin:&lt;br /&gt;
&lt;br /&gt;
&quot;Fail: No response from device&quot;&lt;br /&gt;
&quot;Fail: Wrong username or password&quot;&lt;br /&gt;
&quot;Success&quot;]]></description><category>web admin</category><pubDate>Wed, 04 Mar 2015 11:20:11 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1856</guid><comments>https://packetfence.org/bugs/view.php?id=1856#bugnotes</comments></item><item><title>0001855: When creating a new user, require the password be typed twice to prevent errors</title><author></author><link>https://packetfence.org/bugs/view.php?id=1855</link><description><![CDATA[&quot;Users &gt; Create&quot; is used to create new users.  There is a password field, but the admin is not required to type the password twice.  This can cause issues when the user tries the password and the admin made a typo in this field.&lt;br /&gt;
&lt;br /&gt;
Please add a second password field to confirm the entry.&lt;br /&gt;
&lt;br /&gt;
(Note: This is already being done on the &quot;Reset Password&quot; function, when editing a user.)]]></description><category>web admin</category><pubDate>Wed, 04 Mar 2015 11:20:11 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1855</guid><comments>https://packetfence.org/bugs/view.php?id=1855#bugnotes</comments></item><item><title>0001854: Add the ability to manage SSL cert from web interface</title><author></author><link>https://packetfence.org/bugs/view.php?id=1854</link><description><![CDATA[Packetfence can use HTTPS for web admin and for captive portals.&lt;br /&gt;
&lt;br /&gt;
For production systems, admins need to provide a real SSL certificate.  For non-Linux admins, this can be a difficult process. &lt;br /&gt;
&lt;br /&gt;
Please add the ability to manage SSL cert from web interface.  This can involve generating keys and CSR, and then allowing SSL certs to be upload or pasted.]]></description><category>web admin</category><pubDate>Wed, 04 Mar 2015 11:20:11 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1854</guid><comments>https://packetfence.org/bugs/view.php?id=1854#bugnotes</comments></item><item><title>0001852: Add the ability to send a "Test" email from the web interface</title><author></author><link>https://packetfence.org/bugs/view.php?id=1852</link><description><![CDATA[&quot;Configuration &gt; Alerting&quot; is where users configure the email settings for alerts.  However, there is no way to know if they set things up right.&lt;br /&gt;
&lt;br /&gt;
Please provide a &quot;Send Test Email&quot; button that will do this.&lt;br /&gt;
&lt;br /&gt;
(There is a similar function already provided under &quot;Sources&quot; for testing LDAP.)]]></description><category>web admin</category><pubDate>Wed, 04 Mar 2015 11:20:11 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1852</guid><comments>https://packetfence.org/bugs/view.php?id=1852#bugnotes</comments></item><item><title>0001850: Show MAC addresses of Packetfence interfaces in web interface</title><author></author><link>https://packetfence.org/bugs/view.php?id=1850</link><description><![CDATA[When Packetfence is deployed in VMware (or other virtualized environment) the interfaces are given arbitrary names &quot;Network Adapter 1&quot;.  These names may or may not line up with Operating system names like &quot;eth0&quot;.&lt;br /&gt;
&lt;br /&gt;
It would be helpful if the web-interface displayed the MAC address of the interfaces of Packetfence in the &quot;Configuration &gt; Network &gt; Interfaces&quot; page.]]></description><category>web admin</category><pubDate>Wed, 04 Mar 2015 11:20:11 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1850</guid><comments>https://packetfence.org/bugs/view.php?id=1850#bugnotes</comments></item><item><title>0001849: The web interface needs to add a "confirm" step in many areas</title><author></author><link>https://packetfence.org/bugs/view.php?id=1849</link><description><![CDATA[In many places in the web interface you can delete items with a single click; there is no confirmation.  This means than a mistaken click can easily delete something you did not want to delete.  This is even worse when the delete button is right next to another button, like the &quot;Clone&quot; button.&lt;br /&gt;
&lt;br /&gt;
This problem exists in many areas, including:&lt;br /&gt;
&lt;br /&gt;
Nodes &gt; Delete&lt;br /&gt;
Switches &gt; Delete&lt;br /&gt;
Status &gt; Services &gt; Restart (not deleting, but still needs confirmation)&lt;br /&gt;
Admin Roles &gt; Delete&lt;br /&gt;
Floating devices &gt; Delete&lt;br /&gt;
Firewall SSO &gt; Delete&lt;br /&gt;
User Provisioners &gt; Delete&lt;br /&gt;
&lt;br /&gt;
Areas that do this correctly:&lt;br /&gt;
&lt;br /&gt;
Portal Profiles&lt;br /&gt;
User Roles&lt;br /&gt;
User Sources&lt;br /&gt;
Violations&lt;br /&gt;
&lt;br /&gt;
Please add a pop-up &quot;Confirm&quot; step to the problem areas listed above (and anything similar).]]></description><category>web admin</category><pubDate>Wed, 04 Mar 2015 11:20:11 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1849</guid><comments>https://packetfence.org/bugs/view.php?id=1849#bugnotes</comments></item><item><title>0001848: Change docs to recommend using "spanning-tree portfast" or similar technology</title><author></author><link>https://packetfence.org/bugs/view.php?id=1848</link><description><![CDATA[I set up my first Packetfence install on a lab switch following the Packetfence documentation:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.packetfence.org/downloads/PacketFence/doc/PacketFence_Network_Devices_Configuration_Guide-4.5.1.pdf&quot;&gt;http://www.packetfence.org/downloads/PacketFence/doc/PacketFence_Network_Devices_Configuration_Guide-4.5.1.pdf&lt;/a&gt; [&lt;a href=&quot;http://www.packetfence.org/downloads/PacketFence/doc/PacketFence_Network_Devices_Configuration_Guide-4.5.1.pdf&quot; target=&quot;_blank&quot;&gt;^&lt;/a&gt;]&lt;br /&gt;
&lt;br /&gt;
&quot;On each interface:&lt;br /&gt;
&lt;br /&gt;
switchport mode access&lt;br /&gt;
authentication order mab&lt;br /&gt;
authentication port-control auto&lt;br /&gt;
mab&lt;br /&gt;
dot1x pae authenticator&quot;&lt;br /&gt;
&lt;br /&gt;
I was using mac address bypass only, and my MacBook would give up on DHCP and self-assign 169.254.x.x address.  In order to prevent this, we need to add one more command to each interface:&lt;br /&gt;
&lt;br /&gt;
&quot;spanning-tree portfast&quot;&lt;br /&gt;
&lt;br /&gt;
I recommend adding this to all your port configs, including the corresponding command for other switch vendors.]]></description><category>doc</category><pubDate>Wed, 04 Mar 2015 11:20:11 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1848</guid><comments>https://packetfence.org/bugs/view.php?id=1848#bugnotes</comments></item><item><title>0001145: IPv6 Support</title><author></author><link>https://packetfence.org/bugs/view.php?id=1145</link><description><![CDATA[Since we all know that it's inevitable IPv6 will come into real production soon (well in 2 to 5 years), I guess it would be a wise idea to start looking at it, just to be ahead of the wave.]]></description><category>core</category><pubDate>Wed, 04 Mar 2015 11:18:09 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1145</guid><comments>https://packetfence.org/bugs/view.php?id=1145#bugnotes</comments></item><item><title>0001704: Guest expiration is not set using the temporary_password method</title><author></author><link>https://packetfence.org/bugs/view.php?id=1704</link><description><![CDATA[The default 31D expatiation of the password is never set in 4.0.5 code. It defaults to 0000-00-00 00:00:00&lt;br /&gt;
&lt;br /&gt;
This makes the guest authentication per email fail, since it requires the expatriation date.&lt;br /&gt;
&lt;br /&gt;
commenting the function in temporary_password.pm at line 309&lt;br /&gt;
    _update_field_for_action(&lt;br /&gt;
        $data,$actions,'expiration',&lt;br /&gt;
        'expiration',&quot;0000-00-00 00:00:00&quot;&lt;br /&gt;
    );&lt;br /&gt;
&lt;br /&gt;
in temporary password.pm fixxes this issue and sets the default of 31 days]]></description><category>guests</category><pubDate>Wed, 18 Feb 2015 11:27:25 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1704</guid><comments>https://packetfence.org/bugs/view.php?id=1704#bugnotes</comments></item><item><title>0001868: Netgear M Series module does not handle up/down SNMP traps</title><author></author><link>https://packetfence.org/bugs/view.php?id=1868</link><description><![CDATA[There is no handling of up/down traps on the Netgear M Series module.&lt;br /&gt;
&lt;br /&gt;
When it receives the trap, the following is written to the log:&lt;br /&gt;
&lt;br /&gt;
Feb 17 19:33:29 pfsetvlan(12) WARN: SNMP trap handling not implemented for this type of switch. (pf::Switch::parseTrap)&lt;br /&gt;
Feb 17 19:33:29 pfsetvlan(12) ERROR: Use of uninitialized value $trapType in string eq at /usr/local/pf/sbin/pfsetvlan line 670.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:29 pfsetvlan(12) ERROR: Use of uninitialized value $trapType in string ne at /usr/local/pf/sbin/pfsetvlan line 678.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:29 pfsetvlan(12) ERROR: Use of uninitialized value $trapType in string eq at /usr/local/pf/sbin/pfsetvlan line 689.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:29 pfsetvlan(12) ERROR: Use of uninitialized value $trapType in string eq at /usr/local/pf/sbin/pfsetvlan line 698.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:29 pfsetvlan(12) ERROR: Use of uninitialized value $trapType in string eq at /usr/local/pf/sbin/pfsetvlan line 703.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:29 pfsetvlan(12) ERROR: Use of uninitialized value $trapType in string eq at /usr/local/pf/sbin/pfsetvlan line 703.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:29 pfsetvlan(12) ERROR: Use of uninitialized value $trapType in string eq at /usr/local/pf/sbin/pfsetvlan line 709.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:29 pfsetvlan(12) ERROR: Use of uninitialized value $trapType in string eq at /usr/local/pf/sbin/pfsetvlan line 713.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:29 pfsetvlan(12) ERROR: Use of uninitialized value $trapType in string eq at /usr/local/pf/sbin/pfsetvlan line 716.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:29 pfsetvlan(12) ERROR: Use of uninitialized value $trapType in string eq at /usr/local/pf/sbin/pfsetvlan line 719.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:29 pfsetvlan(12) ERROR: Use of uninitialized value $switch_port in concatenation (.) or string at /usr/local/pf/sbin/pfsetvlan line 729.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:29 pfsetvlan(12) ERROR: Use of uninitialized value $trapType in concatenation (.) or string at /usr/local/pf/sbin/pfsetvlan line 729.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:29 pfsetvlan(1) WARN: unable to parse trapLine.. here's the line: 10.100.6.30||||||||| (main::startTrapHandlers)&lt;br /&gt;
Feb 17 19:33:29 pfsetvlan(1) INFO: nb of items in queue: 1; nb of threads running: 0 (main::startTrapHandlers)&lt;br /&gt;
Feb 17 19:33:29 pfsetvlan(1) ERROR: Use of uninitialized value $ifType in numeric eq (==) at /usr/local/pf/lib/pf/vlan.pm line 138.&lt;br /&gt;
 (pf::vlan::doWeActOnThisTrap)&lt;br /&gt;
Feb 17 19:33:29 pfsetvlan(1) ERROR: Use of uninitialized value $ifType in numeric eq (==) at /usr/local/pf/lib/pf/vlan.pm line 138.&lt;br /&gt;
 (pf::vlan::doWeActOnThisTrap)&lt;br /&gt;
Feb 17 19:33:29 pfsetvlan(1) INFO:  trap received on (10.100.6.30) ifindex  which is not ethernetCsmacd (pf::vlan::doWeActOnThisTrap)&lt;br /&gt;
Feb 17 19:33:29 pfsetvlan(1) INFO: doWeActOnThisTrap returns false. Stop  handling (main::handleTrap)&lt;br /&gt;
Feb 17 19:33:29 pfsetvlan(1) INFO: finished (main::cleanupAfterThread)&lt;br /&gt;
Feb 17 19:33:39 pfsetvlan(13) WARN: SNMP trap handling not implemented for this type of switch. (pf::Switch::parseTrap)&lt;br /&gt;
Feb 17 19:33:39 pfsetvlan(13) ERROR: Use of uninitialized value $trapType in string eq at /usr/local/pf/sbin/pfsetvlan line 670.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:39 pfsetvlan(13) ERROR: Use of uninitialized value $trapType in string ne at /usr/local/pf/sbin/pfsetvlan line 678.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:39 pfsetvlan(13) ERROR: Use of uninitialized value $trapType in string eq at /usr/local/pf/sbin/pfsetvlan line 689.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:39 pfsetvlan(13) ERROR: Use of uninitialized value $trapType in string eq at /usr/local/pf/sbin/pfsetvlan line 698.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:39 pfsetvlan(13) ERROR: Use of uninitialized value $trapType in string eq at /usr/local/pf/sbin/pfsetvlan line 703.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:39 pfsetvlan(13) ERROR: Use of uninitialized value $trapType in string eq at /usr/local/pf/sbin/pfsetvlan line 703.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:39 pfsetvlan(13) ERROR: Use of uninitialized value $trapType in string eq at /usr/local/pf/sbin/pfsetvlan line 709.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:39 pfsetvlan(13) ERROR: Use of uninitialized value $trapType in string eq at /usr/local/pf/sbin/pfsetvlan line 713.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:39 pfsetvlan(13) ERROR: Use of uninitialized value $trapType in string eq at /usr/local/pf/sbin/pfsetvlan line 716.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:39 pfsetvlan(13) ERROR: Use of uninitialized value $trapType in string eq at /usr/local/pf/sbin/pfsetvlan line 719.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:39 pfsetvlan(13) ERROR: Use of uninitialized value $switch_port in concatenation (.) or string at /usr/local/pf/sbin/pfsetvlan line 729.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:39 pfsetvlan(13) ERROR: Use of uninitialized value $trapType in concatenation (.) or string at /usr/local/pf/sbin/pfsetvlan line 729.&lt;br /&gt;
 (main::parseTrap)&lt;br /&gt;
Feb 17 19:33:39 pfsetvlan(3) WARN: unable to parse trapLine.. here's the line: 10.100.6.30||||||||| (main::startTrapHandlers)&lt;br /&gt;
Feb 17 19:33:39 pfsetvlan(3) INFO: nb of items in queue: 1; nb of threads running: 0 (main::startTrapHandlers)&lt;br /&gt;
Feb 17 19:33:39 pfsetvlan(3) ERROR: Use of uninitialized value $ifType in numeric eq (==) at /usr/local/pf/lib/pf/vlan.pm line 138.&lt;br /&gt;
 (pf::vlan::doWeActOnThisTrap)&lt;br /&gt;
Feb 17 19:33:39 pfsetvlan(3) ERROR: Use of uninitialized value $ifType in numeric eq (==) at /usr/local/pf/lib/pf/vlan.pm line 138.&lt;br /&gt;
 (pf::vlan::doWeActOnThisTrap)&lt;br /&gt;
Feb 17 19:33:39 pfsetvlan(3) INFO:  trap received on (10.100.6.30) ifindex  which is not ethernetCsmacd (pf::vlan::doWeActOnThisTrap)&lt;br /&gt;
Feb 17 19:33:39 pfsetvlan(3) INFO: doWeActOnThisTrap returns false. Stop  handling (main::handleTrap)&lt;br /&gt;
Feb 17 19:33:39 pfsetvlan(3) INFO: finished (main::cleanupAfterThread)&lt;br /&gt;
&lt;br /&gt;
For reference, here is the up trap it received:&lt;br /&gt;
&lt;br /&gt;
2015-02-17|03:41:46|UDP: [10.100.6.30]:33669-&gt;[10.100.16.108]|0.0.0.0|BEGIN TYPE 0 END TYPE BEGIN SUBTYPE 0 END SUBTYPE BEGIN VARIABLEBINDINGS .1.3.6.1.2.1.1.3.0 = Timeticks: (661683) 1:50:16.83|.1.3.6.1.6.3.1.1.4.1.0 = OID: .1.3.6.1.6.3.1.1.5.4|.1.3.6.1.2.1.2.2.1.1.1 = INTEGER: 1|.1.3.6.1.2.1.2.2.1.7.1 = INTEGER: up(1)|.1.3.6.1.2.1.2.2.1.8.1 = INTEGER: up(1) END VARIABLEBINDINGS&lt;br /&gt;
&lt;br /&gt;
and the down trap:&lt;br /&gt;
&lt;br /&gt;
2015-02-17|03:42:30|UDP: [10.100.6.30]:33669-&gt;[10.100.16.108]|0.0.0.0|BEGIN TYPE 0 END TYPE BEGIN SUBTYPE 0 END SUBTYPE BEGIN VARIABLEBINDINGS .1.3.6.1.2.1.1.3.0 = Timeticks: (666103) 1:51:01.03|.1.3.6.1.6.3.1.1.4.1.0 = OID: .1.3.6.1.6.3.1.1.5.3|.1.3.6.1.2.1.2.2.1.1.1 = INTEGER: 1|.1.3.6.1.2.1.2.2.1.7.1 = INTEGER: up(1)|.1.3.6.1.2.1.2.2.1.8.1 = INTEGER: down(2) END VARIABLEBINDINGS&lt;br /&gt;
&lt;br /&gt;
These were both when working on port 1]]></description><category>configuration</category><pubDate>Wed, 18 Feb 2015 10:24:34 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1868</guid><comments>https://packetfence.org/bugs/view.php?id=1868#bugnotes</comments></item><item><title>0001864: Compatibility of HP Access Points</title><author></author><link>https://packetfence.org/bugs/view.php?id=1864</link><description><![CDATA[Hi Packetfence,&lt;br /&gt;
&lt;br /&gt;
I ned to confirm what AP's are supported for HP Procurve. On the product support page it only states HP procurve, nothing else. DOes this mean all models are supported? &lt;br /&gt;
&lt;br /&gt;
At present we are looking at: HP 425 Wireless Dual Radio 802.11n (WW)]]></description><category>hardware modules</category><pubDate>Tue, 17 Feb 2015 11:14:48 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1864</guid><comments>https://packetfence.org/bugs/view.php?id=1864#bugnotes</comments></item><item><title>0001863: Trying to "Share unknown fingerprints" and got "Error! An error condition has occured. See server side logs for details."</title><author></author><link>https://packetfence.org/bugs/view.php?id=1863</link><description><![CDATA[httpd.admin.log shows this:&lt;br /&gt;
&lt;br /&gt;
Feb 02 16:57:21 httpd.admin(12447) INFO: loading Net::MAC::Vendor cache from /usr/local/pf/conf/oui.txt (pf::util::load_oui)&lt;br /&gt;
Feb 02 16:57:22 httpd.admin(12447) INFO: loading Net::MAC::Vendor cache from /usr/local/pf/conf/oui.txt (pf::util::load_oui)&lt;br /&gt;
Feb 02 16:57:22 httpd.admin(12447) INFO: loading Net::MAC::Vendor cache from /usr/local/pf/conf/oui.txt (pf::util::load_oui)&lt;br /&gt;
Feb 02 16:57:22 httpd.admin(12447) INFO: loading Net::MAC::Vendor cache from /usr/local/pf/conf/oui.txt (pf::util::load_oui)&lt;br /&gt;
Feb 02 16:57:22 httpd.admin(12447) INFO: loading Net::MAC::Vendor cache from /usr/local/pf/conf/oui.txt (pf::util::load_oui)&lt;br /&gt;
Feb 02 16:57:23 httpd.admin(12447) ERROR: Caught exception in pfappserver::Controller::Configuration::Fingerprints-&gt;upload &quot;Undefined subroutine &amp;pfappserver::Controller::Configuration::Fingerprints::uri_escape called at /usr/local/pf/html/pfappserver/lib/pfappserver/Controller/Configuration/Fingerprints.pm line 80.&quot; (pfappserver::Controller::Root::end)]]></description><category>web admin</category><pubDate>Tue, 03 Feb 2015 16:01:19 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1863</guid><comments>https://packetfence.org/bugs/view.php?id=1863#bugnotes</comments></item><item><title>0001844: Config CISCO SF300 / SG 300</title><author></author><link>https://packetfence.org/bugs/view.php?id=1844</link><description><![CDATA[Hello ...&lt;br /&gt;
&lt;br /&gt;
Installed and configured the server but now I'm having trouble with the models of Switches that have the doubt is there any configuration standard for CISCO equipment - Model SF300, SG300 Small Bussiness?&lt;br /&gt;
&lt;br /&gt;
Read the guide but it only appears routers and switches I have are management.&lt;br /&gt;
&lt;br /&gt;
Thank you ...]]></description><category>configuration</category><pubDate>Tue, 27 Jan 2015 20:07:26 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1844</guid><comments>https://packetfence.org/bugs/view.php?id=1844#bugnotes</comments></item><item><title>0001860: Oauth2 methods do not populate User account fields</title><author></author><link>https://packetfence.org/bugs/view.php?id=1860</link><description><![CDATA[When registering with Facebook/Google/MicrosoftLive (others untested) account, the user details (names, email, etc) are not captured.]]></description><category>captive portal</category><pubDate>Tue, 27 Jan 2015 10:09:21 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1860</guid><comments>https://packetfence.org/bugs/view.php?id=1860#bugnotes</comments></item><item><title>0001830: Packetfence does not start after upgrade</title><author></author><link>https://packetfence.org/bugs/view.php?id=1830</link><description><![CDATA[After upgrading from packetfence 4.3 to 4.4 via the inverse repository,&lt;br /&gt;
the following error message appears when &lt;br /&gt;
&lt;br /&gt;
  /usr/local/pf/bin/pfcmd anyparameter&lt;br /&gt;
&lt;br /&gt;
is executed:&lt;br /&gt;
&lt;br /&gt;
Fatal error preventing configuration to load. Please review your configuration. Error: Sereal: Error in srl_decoder.c line 657 and char 1 of input: Bad Sereal header: Not a valid Sereal document. at /usr/share/perl5/Data/Serializer/Sereal.pm line 51. at /usr/local/pf/lib/pf/config.pm line 394&lt;br /&gt;
Compilation failed in require at /usr/local/pf/bin/pfcmd.pl line 84.&lt;br /&gt;
BEGIN failed--compilation aborted at /usr/local/pf/bin/pfcmd.pl line 84.&lt;br /&gt;
&lt;br /&gt;
An &lt;br /&gt;
&lt;br /&gt;
  apt-get --reinstall install packetfence&lt;br /&gt;
&lt;br /&gt;
has been tried without success. Additionally,&lt;br /&gt;
&lt;br /&gt;
  rm -fr /usr/local/pf/var/cache/*&lt;br /&gt;
&lt;br /&gt;
has been executed as described in UPGRADE.asciidoc. The sereal Packages are installed:&lt;br /&gt;
&lt;br /&gt;
# dpkg -l | grep sereal&lt;br /&gt;
ii  libdata-serializer-sereal-perl                  1.05-1                             all          Creates bridge between Data::Serializer and Sereal&lt;br /&gt;
ii  libsereal-decoder-perl                          3.001.003-1                        amd64        fast, compact, powerful binary deserialization module&lt;br /&gt;
ii  libsereal-encoder-perl                          3.001.003-1                        amd64        fast, compact, powerful binary serializationa module]]></description><category>upgrade</category><pubDate>Mon, 22 Dec 2014 20:06:40 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1830</guid><comments>https://packetfence.org/bugs/view.php?id=1830#bugnotes</comments></item><item><title>0001678: Google oauth redirects back to captive portal before you can select yes/no to allow your site.</title><author></author><link>https://packetfence.org/bugs/view.php?id=1678</link><description><![CDATA[On the captive portal if you select Google ouath it will redirect you to the Google login, after this it will redirect you back to the captive portal.&lt;br /&gt;
(or first it will let you do your second-step authentication and then send you back to the captive portal page.)&lt;br /&gt;
&lt;br /&gt;
If you then select the Google oauth again you will get on the page where you can accept your site to have access and if you select yes the network access progress-bar appears and you have access.&lt;br /&gt;
&lt;br /&gt;
So you get 2 times the captive portal before you have access.&lt;br /&gt;
For the facebook oauth it is as you expect. (portal, login and then access)]]></description><category>captive portal</category><pubDate>Mon, 22 Dec 2014 20:02:48 -0500</pubDate><guid>https://packetfence.org/bugs/view.php?id=1678</guid><comments>https://packetfence.org/bugs/view.php?id=1678#bugnotes</comments></item></channel></rss>
