PacketFence - BTS - PacketFence
View Issue Details
0001712PacketFencehardware modulespublic2013-09-16 09:082013-10-06 16:53
alessiol 
 
normalblockalways
resolvedfixed 
4.0.6 
4.1.0 
https://github.com/inverse-inc/packetfence/commit/f5cfd3344bd1fd9f70c50ecb3f66230fb2bd1be5 [^]
0001712: Argument "noSuchObject" isn't numeric in numeric eq
I use an HP 4100 (J4121A) Switch but packetFence 4.0.6-2 can not get the MAC address by SNMP. This is the log:

Sep 16 14:38:07 pfsetvlan(4) INFO: up trap received on 10.0.0.150 ifIndex 41 (main::handleTrap)
Sep 16 14:38:07 pfsetvlan(4) INFO: setting 10.0.0.150 port 41 to MAC detection VLAN (main::handleTrap)
Argument "noSuchObject" isn't numeric in numeric eq (==) at /usr/local/pf/lib/pf/SNMP.pm line 985.
Sep 16 14:38:07 pfsetvlan(4) WARN: old VLAN noSuchObject is not a managed VLAN -> Do nothing (pf::SNMP::setVlan)
Sep 16 14:38:07 pfsetvlan(4) WARN: couldn't get MAC at ifIndex 41. This is a problem. (pf::SNMP::_getMacAtIfIndex)
Sep 16 14:38:09 pfsetvlan(4) WARN: couldn't get MAC at ifIndex 41. This is a problem. (pf::SNMP::_getMacAtIfIndex)
Sep 16 14:38:11 pfsetvlan(4) WARN: couldn't get MAC at ifIndex 41. This is a problem. (pf::SNMP::_getMacAtIfIndex)
Sep 16 14:38:13 pfsetvlan(4) WARN: couldn't get MAC at ifIndex 41. This is a problem. (pf::SNMP::_getMacAtIfIndex)
Sep 16 14:38:16 pfsetvlan(4) WARN: couldn't get MAC at ifIndex 41. This is a problem. (pf::SNMP::_getMacAtIfIndex)
Sep 16 14:38:18 pfsetvlan(4) WARN: couldn't get MAC at ifIndex 41. This is a problem. (pf::SNMP::_getMacAtIfIndex)
Sep 16 14:38:20 pfsetvlan(4) WARN: couldn't get MAC at ifIndex 41. This is a problem. (pf::SNMP::_getMacAtIfIndex)
Sep 16 14:38:22 pfsetvlan(4) WARN: couldn't get MAC at ifIndex 41. This is a problem. (pf::SNMP::_getMacAtIfIndex)
Sep 16 14:38:24 pfsetvlan(4) WARN: couldn't get MAC at ifIndex 41. This is a problem. (pf::SNMP::_getMacAtIfIndex)
Sep 16 14:38:26 pfsetvlan(4) WARN: couldn't get MAC at ifIndex 41. This is a problem. (pf::SNMP::_getMacAtIfIndex)
Sep 16 14:38:28 pfsetvlan(4) WARN: couldn't get MAC at ifIndex 41. This is a problem. (pf::SNMP::_getMacAtIfIndex)
Sep 16 14:38:30 pfsetvlan(4) WARN: couldn't get MAC at ifIndex 41. This is a problem. (pf::SNMP::_getMacAtIfIndex)
Sep 16 14:38:33 pfsetvlan(4) WARN: couldn't get MAC at ifIndex 41. This is a problem. (pf::SNMP::_getMacAtIfIndex)
Sep 16 14:38:35 pfsetvlan(4) WARN: couldn't get MAC at ifIndex 41. This is a problem. (pf::SNMP::_getMacAtIfIndex)
Sep 16 14:38:37 pfsetvlan(4) WARN: couldn't get MAC at ifIndex 41. This is a problem. (pf::SNMP::_getMacAtIfIndex)
Sep 16 14:38:39 pfsetvlan(4) WARN: couldn't get MAC at ifIndex 41. This is a problem. (pf::SNMP::_getMacAtIfIndex)
Sep 16 14:38:41 pfsetvlan(4) WARN: couldn't get MAC at ifIndex 41. This is a problem. (pf::SNMP::_getMacAtIfIndex)
Sep 16 14:38:43 pfsetvlan(4) WARN: couldn't get MAC at ifIndex 41. This is a problem. (pf::SNMP::_getMacAtIfIndex)
Sep 16 14:38:45 pfsetvlan(4) WARN: couldn't get MAC at ifIndex 41. This is a problem. (pf::SNMP::_getMacAtIfIndex)
This is fixed.

The message "Argument "noSuchObject" isn't numeric in numeric eq (==)" will no longer happen

You can find the patch here.

https://github.com/inverse-inc/packetfence/commit/f5cfd3344bd1fd9f70c50ecb3f66230fb2bd1be5 [^]
No tags attached.
Issue History
2013-09-16 09:08alessiolNew Issue
2013-09-16 10:16francisNote Added: 0003449
2013-09-16 10:47alessiolNote Added: 0003450
2013-09-27 13:25jrouzierfixed in git revision => https://github.com/inverse-inc/packetfence/commit/f5cfd3344bd1fd9f70c50ecb3f66230fb2bd1be5 [^]
2013-09-27 13:25jrouzierStatusnew => resolved
2013-09-27 13:25jrouzierResolutionopen => fixed
2013-09-27 13:25jrouzierAdditional Information Updated
2013-10-06 16:53francisFixed in Version => 4.1.0

Notes
(0003449)
francis   
2013-09-16 10:16   
Show your configuration file switches.conf.
(0003450)
alessiol   
2013-09-16 10:47   
#
# Copyright 2006-2008 Inverse inc.
#
# See the enclosed file COPYING for license information (GPL).
# If you did not receive this file, see
# http://www.fsf.org/licensing/licenses/gpl.html [^]
[default]
description=Switches Default Values
vlans=1,2,3,4,5
normalVlan=1
registrationVlan=2
isolationVlan=3
macDetectionVlan=4
voiceVlan=5
inlineVlan=6
inlineTrigger=
normalRole=normal
registrationRole=registration
isolationRole=isolation
macDetectionRole=macDetection
voiceRole=voice
inlineRole=inline
VoIPEnabled=no
mode=testing
macSearchesMaxNb=30
macSearchesSleepInterval=2
uplink=dynamic
#
# Command Line Interface
#
# cliTransport could be: Telnet, SSH or Serial
cliTransport=Telnet
cliUser=
cliPwd=
cliEnablePwd=
#
# SNMP section
#
# PacketFence -> Switch
SNMPVersion=1
SNMPCommunityRead=public
SNMPCommunityWrite=private
#SNMPEngineID = 0000000000000
#SNMPUserNameRead = readUser
#SNMPAuthProtocolRead = MD5
#SNMPAuthPasswordRead = authpwdread
#SNMPPrivProtocolRead = DES
#SNMPPrivPasswordRead = privpwdread
#SNMPUserNameWrite = writeUser
#SNMPAuthProtocolWrite = MD5
#SNMPAuthPasswordWrite = authpwdwrite
#SNMPPrivProtocolWrite = DES
#SNMPPrivPasswordWrite = privpwdwrite
# Switch -> PacketFence
SNMPVersionTrap=1
SNMPCommunityTrap=public
#SNMPAuthProtocolTrap = MD5
#SNMPAuthPasswordTrap = authpwdread
#SNMPPrivProtocolTrap = DES
#SNMPPrivPasswordTrap = privpwdread
#
# Web Services Interface
#
# wsTransport could be: http or https
wsTransport=http
wsUser=
wsPwd=
#
# RADIUS NAS Client config
#
# RADIUS shared secret with switch
radiusSecret=

[192.168.0.1]
description=Test Switch
type=Cisco::Catalyst_2900XL
mode=production
uplink=23,24

[10.0.0.149]
mode=production
description=TEST iPECS
type=LG::ES4500G
VoIPEnabled=N
uplink=1
radiusSecret=tele
ospitiVlan=1
ladelziaVlan=2
SNMPVersionTrap=2c
SNMPVersion=2c
macDetectionVlan=1
isolationVlan=30
voiceVlan=50
inlineVlan=60
ospitiRole=1
ladelziaRole=2
registrationVlan=1

[10.0.0.150]
mode=production
ospitiVlan=1
description=HP 4000
type=HP::Procurve_4100
VoIPEnabled=N
ladelziaVlan=2
uplink=1
ospitiRole=1
ladelziaRole=2
radiusSecret=tele
macDetectionVlan=1
isolationVlan=30
registrationVlan=1
voiceVlan=50
inlineVlan=60
SNMPVersionTrap=2c
SNMPVersion=2c
#SNMPVersion = 3
#SNMPEngineID = 0000000000000
#SNMPUserNameRead = readUser
#SNMPAuthProtocolRead = MD5
#SNMPAuthPasswordRead = authpwdread
#SNMPPrivProtocolRead = DES
#SNMPPrivPasswordRead = privpwdread
#SNMPUserNameWrite = writeUser
#SNMPAuthProtocolWrite = MD5
#SNMPAuthPasswordWrite = authpwdwrite
#SNMPPrivProtocolWrite = DES
#SNMPPrivPasswordWrite = privpwdwrite
#SNMPVersionTrap = 3
#SNMPUserNameTrap = readUser
#SNMPAuthProtocolTrap = MD5
#SNMPAuthPasswordTrap = authpwdread
#SNMPPrivProtocolTrap = DES
#SNMPPrivPasswordTrap = privpwdread