this is server side output!!!!<br><br>rad_recv: Access-Request packet from host 192.168.2.182:1027, id=4, length=177<br> Message-Authenticator = 0x758e436fc2b17672ad389e0ffeca2982<br> Service-Type = Framed-User<br> User-Name = "testuser"<br> Framed-MTU = 1488<br> Called-Station-Id = "00-03-7F-09-60-A0:ATH182"<br> Calling-Station-Id = "00-03-7F-05-C0-9C"<br> NAS-Port-Type = Wireless-802.11<br> Connect-Info = "CONNECT 54Mbps 802.11g"<br> EAP-Message = 0x0204000d017465737475736572<br> NAS-IP-Address = 192.168.2.182<br>
NAS-Port = 1<br> NAS-Port-Id = "STA port # 1"<br> Processing the authorize section of radiusd.conf<br>modcall: entering group authorize for request 20<br> modcall[authorize]: module "preprocess" returns ok for request 20<br> modcall[authorize]: module "chap" returns noop for request 20<br> modcall[authorize]: module "mschap" returns noop for request 20<br> rlm_realm: No '@' in User-Name = "testuser", looking up realm NULL<br> rlm_realm: No such realm "NULL"<br> modcall[authorize]: module "suffix" returns noop for request 20<br> rlm_eap: EAP packet type response id 4 length 13<br> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<br> modcall[authorize]: module "eap" returns updated for request 20<br> users: Matched entry testuser at line 155<br> modcall[authorize]: module "files" returns ok for request
20<br>rlm_pap: Found existing Auth-Type, not changing it.<br> modcall[authorize]: module "pap" returns noop for request 20<br>modcall: leaving group authorize (returns updated) for request 20<br> rad_check_password: Found Auth-Type EAP<br>auth: type "EAP"<br> Processing the authenticate section of radiusd.conf<br>modcall: entering group authenticate for request 20<br> rlm_eap: EAP Identity<br> rlm_eap: processing type md5<br>rlm_eap_md5: Issuing Challenge<br> modcall[authenticate]: module "eap" returns handled for request 20<br>modcall: leaving group authenticate (returns handled) for request 20<br>Sending Access-Challenge of id 4 to 192.168.2.182 port 1027<br> EAP-Message = 0x010500160410ef33bbaf01824abdd6b6989b2cc698ec<br> Message-Authenticator = 0x00000000000000000000000000000000<br> State =
0x4f68ec51f7791041fc61be6441d9ea92<br>Finished request 20<br>Going to the next request<br>--- Walking the entire request list ---<br>Waking up in 6 seconds...<br>rad_recv: Access-Request packet from host 192.168.2.182:1027, id=5, length=204<br> Message-Authenticator = 0xb98d04dcd12bbaa2dc7f6314231061bc<br> Service-Type = Framed-User<br> User-Name = "testuser"<br> Framed-MTU = 1488<br> State = 0x4f68ec51f7791041fc61be6441d9ea92<br> Called-Station-Id = "00-03-7F-09-60-A0:ATH182"<br> Calling-Station-Id = "00-03-7F-05-C0-9C"<br> NAS-Port-Type = Wireless-802.11<br> Connect-Info = "CONNECT 54Mbps
802.11g"<br> EAP-Message = 0x020500160410a221ad85e41c1260d31c5d14036dfce1<br> NAS-IP-Address = 192.168.2.182<br> NAS-Port = 1<br> NAS-Port-Id = "STA port # 1"<br> Processing the authorize section of radiusd.conf<br>modcall: entering group authorize for request 21<br> modcall[authorize]: module "preprocess" returns ok for request 21<br> modcall[authorize]: module "chap" returns noop for request 21<br> modcall[authorize]: module "mschap" returns noop for request 21<br> rlm_realm: No '@' in User-Name = "testuser", looking up realm NULL<br> rlm_realm: No such realm "NULL"<br> modcall[authorize]: module "suffix" returns noop for request 21<br> rlm_eap: EAP packet type response id 5 length 22<br> rlm_eap: No EAP Start, assuming it's an
on-going EAP conversation<br> modcall[authorize]: module "eap" returns updated for request 21<br> users: Matched entry testuser at line 155<br> modcall[authorize]: module "files" returns ok for request 21<br>rlm_pap: Found existing Auth-Type, not changing it.<br> modcall[authorize]: module "pap" returns noop for request 21<br>modcall: leaving group authorize (returns updated) for request 21<br> rad_check_password: Found Auth-Type EAP<br>auth: type "EAP"<br> Processing the authenticate section of radiusd.conf<br>modcall: entering group authenticate for request 21<br> rlm_eap: Request found, released from the list<br> rlm_eap: EAP/md5<br> rlm_eap: processing type md5<br> rlm_eap: Freeing handler<br> modcall[authenticate]: module "eap" returns ok for request 21<br>modcall: leaving group authenticate (returns ok) for request 21<br>Sending Access-Accept of id 5 to 192.168.2.182 port
1027<br> EAP-Message = 0x03050004<br> Message-Authenticator = 0x00000000000000000000000000000000<br> User-Name = "testuser"<br>Finished request 21<br>Going to the next request<br>Waking up in 6 seconds...<br>--- Walking the entire request list ---<br><br>it is sending an access accept packet!!!<br>my user file is like this:-<br>its an attachment(users)<br>thanks for ur help, <br><br>regards<br>shantanu<br><br><b><i>tnt@kalik.co.yu</i></b> wrote:<blockquote class="replbq" style="border-left: 2px solid rgb(16, 16, 255); margin-left: 5px; padding-left: 5px;"> Client output isn't showing Access-Accept packet content. Post radiusd<br>-X output and your users file.<br><br>Ivan Kalik<br>Kalik Informatika ISP<br><br><br>Dana 31/5/2007, "shantanu choudhary" <shantanu_843@yahoo.co.in> piše:<br><br>>hello,<br>>this is my client side
output:<br>>Authentication with 00:03:7f:09:60:a0 timed out.<br>>Added BSSID 00:03:7f:09:60:a0 into blacklist<br>>State: ASSOCIATED -> DISCONNECTED<br>>wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)<br>>WEXT: Operstate: linkmode=-1, operstate=5<br>>wpa_driver_wext_disassociate<br>>No keys have been configured - skip key clearing<br>>EAPOL: External notification - portEnabled=0<br>>EAPOL: SUPP_PAE entering state DISCONNECTED<br>>EAPOL: SUPP_BE entering state INITIALIZE<br>>EAP: EAP entering state DISABLED<br>>EAPOL: External notification - portValid=0<br>>Setting scan request: 0 sec 0 usec<br>>State: DISCONNECTED -> SCANNING<br>>Starting AP scan (specific SSID)<br>>Scan SSID - hexdump_ascii(len=6):<br>> 41 54 48 31 38 32 ATH182<br>>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<br>>Wireless event: cmd=0x8b15 len=20<br>>Wireless event: new AP:
00:00:00:00:00:00<br>>BSSID 00:03:7f:09:60:a0 blacklist count incremented to 2<br>>CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys<br>>wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0<br>>wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0<br>>wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0<br>>wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0<br>>wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0<br>>State: SCANNING -> DISCONNECTED<br>>wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)<br>>WEXT: Operstate: linkmode=-1, operstate=5<br>>EAPOL: External notification - portEnabled=0<br>>EAPOL: External notification - portValid=0<br>>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<br>>RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added<br>>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<br>>Wireless event:
cmd=0x8b19 len=8<br>>Received 1844 bytes of scan results (7 BSSes)<br>>Scan results: 7<br>>Selecting BSS from priority group 0<br>>0: 00:03:7f:09:60:7e ssid='ATH183' wpa_ie_len=0 rsn_ie_len=22 caps=0x11<br>> skip - SSID mismatch<br>>1: 00:03:7f:09:60:a0 ssid='ATH182' wpa_ie_len=0 rsn_ie_len=26 caps=0x11<br>> skip - blacklisted<br>>2: 00:18:0a:01:0f:31 ssid='AUKBC_MESH' wpa_ie_len=0 rsn_ie_len=0 caps=0x1<br>> skip - no WPA/RSN IE<br>>3: 00:a0:f8:ce:7d:18 ssid='symbol3' wpa_ie_len=0 rsn_ie_len=0 caps=0x1<br>> skip - no WPA/RSN IE<br>>4: 00:03:7f:09:60:15 ssid='AUKBC4' wpa_ie_len=0 rsn_ie_len=0 caps=0x1<br>> skip - no WPA/RSN IE<br>>5: 00:18:0a:01:03:fe ssid='AUKBC_MESH' wpa_ie_len=0 rsn_ie_len=0 caps=0x1<br>> skip - no WPA/RSN IE<br>>6: 00:18:0a:01:07:34 ssid='AUKBC_MESH' wpa_ie_len=0 rsn_ie_len=0 caps=0x1<br>> skip - no WPA/RSN IE<br>>No APs found - clear blacklist and try again<br>>Removed BSSID
00:03:7f:09:60:a0 from blacklist (clear)<br>>Selecting BSS from priority group 0<br>>0: 00:03:7f:09:60:7e ssid='ATH183' wpa_ie_len=0 rsn_ie_len=22 caps=0x11<br>> skip - SSID mismatch<br>>1: 00:03:7f:09:60:a0 ssid='ATH182' wpa_ie_len=0 rsn_ie_len=26 caps=0x11<br>> selected based on RSN IE<br>>Trying to associate with 00:03:7f:09:60:a0 (SSID='ATH182' freq=2437 MHz)<br>>Cancelling scan request<br>>WPA: clearing own WPA/RSN IE<br>>Automatic auth_alg selection: 0x1<br>>RSN: using IEEE 802.11i/D9.0<br>>WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2<br>>WPA: clearing AP WPA IE<br>>WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 01 00<br>>WPA: using GTK TKIP<br>>WPA: using PTK CCMP<br>>WPA: using KEY_MGMT 802.1X<br>>WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00<br>>No keys
have been configured - skip key clearing<br>>wpa_driver_wext_set_drop_unencrypted<br>>State: DISCONNECTED -> ASSOCIATING<br>>wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)<br>>WEXT: Operstate: linkmode=-1, operstate=5<br>>wpa_driver_wext_associate<br>>Setting authentication timeout: 10 sec 0 usec<br>>EAPOL: External notification - portControl=Auto<br>>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<br>>Wireless event: cmd=0x8b06 len=8<br>>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<br>>Wireless event: cmd=0x8b04 len=12<br>>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<br>>Wireless event: cmd=0x8b1a len=14<br>>RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])<br>>Wireless event: cmd=0x8b15 len=20<br>>Wireless event: new AP: 00:03:7f:09:60:a0<br>>State: ASSOCIATING -> ASSOCIATED<br>>wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)<br>>WEXT: Operstate: linkmode=-1,
operstate=5<br>>Associated to a new BSS: BSSID=00:03:7f:09:60:a0<br>>No keys have been configured - skip key clearing<br>>Associated with 00:03:7f:09:60:a0<br>>WPA: Association event - clear replay counter<br>>EAPOL: External notification - portEnabled=0<br>>EAPOL: External notification - portValid=0<br>>EAPOL: External notification - portEnabled=1<br>>EAPOL: SUPP_PAE entering state CONNECTING<br>>EAPOL: SUPP_BE entering state IDLE<br>>EAP: EAP entering state INITIALIZE<br>>EAP: deinitialize previously used EAP method (4, MD5) at INITIALIZE<br>>EAP: EAP entering state IDLE<br>>Setting authentication timeout: 10 sec 0 usec<br>>Cancelling scan request<br>>RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])<br>>RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added<br>>RX EAPOL from 00:03:7f:09:60:a0<br>>RX EAPOL - hexdump(len=9): 01 00 00 05 01 00 00 05 01<br>>Setting authentication timeout: 70 sec 0
usec<br>>EAPOL: Received EAP-Packet frame<br>>EAPOL: SUPP_PAE entering state RESTART<br>>EAP: EAP entering state INITIALIZE<br>>EAP: EAP entering state IDLE<br>>EAPOL: SUPP_PAE entering state AUTHENTICATING<br>>EAPOL: SUPP_BE entering state REQUEST<br>>EAPOL: getSuppRsp<br>>EAP: EAP entering state RECEIVED<br>>EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0<br>>EAP: EAP entering state IDENTITY<br>>CTRL-EVENT-EAP-STARTED EAP authentication started<br>>EAP: EAP-Request Identity data - hexdump_ascii(len=0):<br>>EAP: using real identity - hexdump_ascii(len=8):<br>> 74 65 73 74 75 73 65 72 testuser<br>>EAP: EAP entering state SEND_RESPONSE<br>>EAP: EAP entering state IDLE<br>>EAPOL: SUPP_BE entering state RESPONSE<br>>EAPOL: txSuppRsp<br>>TX EAPOL - hexdump(len=17): 01 00 00 0d 02 00 00 0d 01 74 65 73 74 75 73 65 72<br>>EAPOL: SUPP_BE entering state RECEIVE<br>>RX EAPOL
from 00:03:7f:09:60:a0<br>>RX EAPOL - hexdump(len=26): 01 00 00 16 01 01 00 16 04 10 6d db 12 c2 ff 1f c6 22 64 45 01 07 f9 73 8b 14<br>>EAPOL: Received EAP-Packet frame<br>>EAPOL: SUPP_BE entering state REQUEST<br>>EAPOL: getSuppRsp<br>>EAP: EAP entering state RECEIVED<br>>EAP: Received EAP-Request id=1 method=4 vendor=0 vendorMethod=0<br>>EAP: EAP entering state GET_METHOD<br>>EAP: Initialize selected EAP method: vendor 0 method 4 (MD5)<br>>CTRL-EVENT-EAP-METHOD EAP vendor 0 method 4 (MD5) selected<br>>EAP: EAP entering state METHOD<br>>EAP-MD5: Challenge - hexdump(len=16): 6d db 12 c2 ff 1f c6 22 64 45 01 07 f9 73 8b 14<br>>EAP-MD5: Generating Challenge Response<br>>EAP-MD5: Response - hexdump(len=16): e8 5f fa a3 fe 5d 10 a6 4a 65 11 6d f0 25 19 35<br>>EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC<br>>EAP: EAP entering state SEND_RESPONSE<br>>EAP: EAP entering state IDLE<br>>EAPOL:
SUPP_BE entering state RESPONSE<br>>EAPOL: txSuppRsp<br>>TX EAPOL - hexdump(len=26): 01 00 00 16 02 01 00 16 04 10 e8 5f fa a3 fe 5d 10 a6 4a 65 11 6d f0 25 19 35<br>>EAPOL: SUPP_BE entering state RECEIVE<br>>RX EAPOL from 00:03:7f:09:60:a0<br>>RX EAPOL - hexdump(len=8): 01 00 00 04 04 01 00 04<br>>EAPOL: Received EAP-Packet frame<br>>EAPOL: SUPP_BE entering state REQUEST<br>>EAPOL: getSuppRsp<br>>EAP: EAP entering state RECEIVED<br>>EAP: Received EAP-Failure<br>>EAP: EAP entering state DISCARD<br>>EAP: EAP entering state IDLE<br>>EAPOL: SUPP_BE entering state RECEIVE<br>>EAPOL: startWhen --> 0<br>>EAPOL: authWhile --> 0<br>>EAPOL: SUPP_BE entering state TIMEOUT<br>>EAPOL: SUPP_PAE entering state CONNECTING<br>>EAPOL: SUPP_BE entering state IDLE<br>>RX EAPOL from 00:03:7f:09:60:a0<br>>RX EAPOL - hexdump(len=9): 01 00 00 05 01 02 00 05 01<br>>EAPOL: Received EAP-Packet frame<br>>EAPOL: SUPP_PAE entering
state RESTART<br>>EAP: EAP entering state INITIALIZE<br>>EAP: deinitialize previously used EAP method (4, MD5) at INITIALIZE<br>>EAP: EAP entering state IDLE<br>>EAPOL: SUPP_PAE entering state AUTHENTICATING<br>>EAPOL: SUPP_BE entering state REQUEST<br>>EAPOL: getSuppRsp<br>>EAP: EAP entering state RECEIVED<br>>EAP: Received EAP-Request id=2 method=1 vendor=0 vendorMethod=0<br>>EAP: EAP entering state IDENTITY<br>>CTRL-EVENT-EAP-STARTED EAP authentication started<br>>EAP: EAP-Request Identity data - hexdump_ascii(len=0):<br>>EAP: using real identity - hexdump_ascii(len=8):<br>> 74 65 73 74 75 73 65 72 testuser<br>>EAP: EAP entering state SEND_RESPONSE<br>>EAP: EAP entering state IDLE<br>>EAPOL: SUPP_BE entering state RESPONSE<br>>EAPOL: txSuppRsp<br>>TX EAPOL - hexdump(len=17): 01 00 00 0d 02 02 00 0d 01 74 65 73 74 75 73 65 72<br>>EAPOL: SUPP_BE entering state RECEIVE<br>>RX EAPOL
from 00:03:7f:09:60:a0<br>>RX EAPOL - hexdump(len=26): 01 00 00 16 01 03 00 16 04 10 68 c8 ea 0c 97 f7 11 d3 f3 2a cd 62 8c 37 4d 40<br>>EAPOL: Received EAP-Packet frame<br>>EAPOL: SUPP_BE entering state REQUEST<br>>EAPOL: getSuppRsp<br>>EAP: EAP entering state RECEIVED<br>>EAP: Received EAP-Request id=3 method=4 vendor=0 vendorMethod=0<br>>EAP: EAP entering state GET_METHOD<br>>EAP: Initialize selected EAP method: vendor 0 method 4 (MD5)<br>>CTRL-EVENT-EAP-METHOD EAP vendor 0 method 4 (MD5) selected<br>>EAP: EAP entering state METHOD<br>>EAP-MD5: Challenge - hexdump(len=16): 68 c8 ea 0c 97 f7 11 d3 f3 2a cd 62 8c 37 4d 40<br>>EAP-MD5: Generating Challenge Response<br>>EAP-MD5: Response - hexdump(len=16): 03 76 fc e7 ce bc 66 b6 cd 50 2a 73 b3 cf eb 93<br>>EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC<br>>EAP: EAP entering state SEND_RESPONSE<br>>EAP: EAP entering state IDLE<br>>EAPOL:
SUPP_BE entering state RESPONSE<br>>EAPOL: txSuppRsp<br>>TX EAPOL - hexdump(len=26): 01 00 00 16 02 03 00 16 04 10 03 76 fc e7 ce bc 66 b6 cd 50 2a 73 b3 cf eb 93<br>>EAPOL: SUPP_BE entering state RECEIVE<br>>RX EAPOL from 00:03:7f:09:60:a0<br>>RX EAPOL - hexdump(len=8): 01 00 00 04 04 03 00 04<br>>EAPOL: Received EAP-Packet frame<br>>EAPOL: SUPP_BE entering state REQUEST<br>>EAPOL: getSuppRsp<br>>EAP: EAP entering state RECEIVED<br>>EAP: Received EAP-Failure<br>>EAP: EAP entering state DISCARD<br>>EAP: EAP entering state IDLE<br>>EAPOL: SUPP_BE entering state RECEIVE<br>>EAPOL: startWhen --> 0<br>>EAPOL: authWhile --> 0<br>>EAPOL: SUPP_BE entering state TIMEOUT<br>>EAPOL: SUPP_PAE entering state CONNECTING<br>>EAPOL: SUPP_BE entering state IDLE<br>>RX EAPOL from 00:03:7f:09:60:a0<br>>RX EAPOL - hexdump(len=9): 01 00 00 05 01 04 00 05 01<br>>EAPOL: Received EAP-Packet frame<br>>EAPOL: SUPP_PAE entering
state RESTART<br>>EAP: EAP entering state INITIALIZE<br>>EAP: deinitialize previously used EAP method (4, MD5) at INITIALIZE<br>>EAP: EAP entering state IDLE<br>>EAPOL: SUPP_PAE entering state AUTHENTICATING<br>>EAPOL: SUPP_BE entering state REQUEST<br>>EAPOL: getSuppRsp<br>>EAP: EAP entering state RECEIVED<br>>EAP: Received EAP-Request id=4 method=1 vendor=0 vendorMethod=0<br>>EAP: EAP entering state IDENTITY<br>>CTRL-EVENT-EAP-STARTED EAP authentication started<br>>EAP: EAP-Request Identity data - hexdump_ascii(len=0):<br>>EAP: using real identity - hexdump_ascii(len=8):<br>> 74 65 73 74 75 73 65 72 testuser<br>>EAP: EAP entering state SEND_RESPONSE<br>>EAP: EAP entering state IDLE<br>>EAPOL: SUPP_BE entering state RESPONSE<br>><br>><br>>the problem is i am getting EAP-FAILURE on client side even when server is giving ACCESS-ACCEPT!!!!<br>>i am not able to figure out the problem
output of server is same as that in earlier mail,<br>>one more thing what will be end message of this, will it be authentication or association? When i run GUI for supplicant it is showing associated not authenticated! is it end of connection and after it should i get an IP from that AP, even if i try for DHCP i am not able to get an IP!!!!<br>>it is all messed up, please do reply for this prob!!!<br>>regards<br>>shantanu<br>><br>>tnt@kalik.co.yu wrote: Well, now you dont have any IP address in your accept packet. Not a<br>>problem if you are doing DHCP. Otherwise you need to return IP address,<br>>netmask, MTU, Service-Type, DNS servers etc.<br>><br>>Leave that Framed-User DEFAULT entry alone - it should be there. You need<br>>to add stuff to your user config:<br>><br>>testuser Cleartext-Password:=yourpassword<br>> Framed-IP-Address=1.2.3.4<br>> Framed-MTU=yourMTU<br>>
Framed-IP-Netmask=255.255.255.255<br>>etc.<br>><br>>Ivan Kalik<br>>Kalik Informatika ISP<br>><br>><br>>Dana 30/5/2007, "shantanu choudhary" piše:<br>><br>>--- snip ---<br>>>Sending Access-Accept of id 2 to 192.168.2.182 port 1028<br>>> EAP-Message = 0x03020004<br>>> Message-Authenticator = 0x00000000000000000000000000000000<br>>> User-Name = "testuser"<br>>>Finished request 1<br>>>Going to the next request<br>>>Waking up in 6 seconds...<br>>>--- Walking the entire request list ---<br>>>Cleaning up request 0 ID 1 with timestamp 465d506e<br>>>Cleaning up request 1 ID 2 with timestamp 465d506e<br>>>Nothing to do. Sleeping until we see a request.<br>>><br>>>it is sending ACCESS ACCEPT but no access reject or failure!!!!<br>>>and when i try to check AP statistics from server it is showing an entry for AUTHENTICATION
FAILURE!!!!!!!<br>>><br>>>sorry for disturbing u again n again but can u help me out????<br>>>please!!<br>>>shantanu<br>>><br>><br>>-<br>>List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html<br>><br>><br>><br>><br>><br>>---------------------------------<br>> Did you know? You can CHAT without downloading messenger. Know how!<br>><br><br>- <br>List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html<br></shantanu_843@yahoo.co.in></blockquote><br><BR><BR><p>
<hr size=1></hr> Download prohibited? No problem! <a href="http://us.rd.yahoo.com/mail/in/ywebmessenger/*http://in.messenger.yahoo.com/webmessengerpromo.php">CHAT</a> from any browser, without download.