Thanks for that, can now see attributes being received by my NAS<br><br>Found Auth-Type = EAP<br>+- entering group authenticate {...}<br>[eap] Request found, released from the list<br>[eap] EAP/peap<br>[eap] processing type peap<br>
[peap] processing EAP-TLS<br>[peap] eaptls_verify returned 7 <br>[peap] Done initial handshake<br>[peap] eaptls_process returned 7 <br>[peap] EAPTLS_OK<br>[peap] Session established.  Decoding tunneled attributes.<br>[peap] Received EAP-TLV response.<br>
[peap] Success<br>[peap] Using saved attributes from the original Access-Accept<br>[eap] Freeing handler<br>++[eap] returns ok<br>+- entering group post-auth {...}<br>[sql]   expand: %{User-Name} -> radman02<br>[sql] sql_set_user escaped user --> 'radman02'<br>
[sql]   expand: %{User-Password} -> <br>[sql]   expand: %{Chap-Password} -> <br>[sql]   expand: INSERT INTO radpostauth                           (username, pass, reply, authdate)                           VALUES (                           '%{User-Name}',  <br>
                         '%{%{User-Password}:-%{Chap-Password}}',                           '%{reply:Packet-Type}', '%S') -> INSERT INTO radpostauth                           (us<br>ername, pass, reply, authdate)                           VALUES (                           'radman02',                           '',                           'Access-Accept', '<br>
2009-01-18 22:43:47')<br>rlm_sql (sql) in sql_postauth: query is INSERT INTO radpostauth                           (username, pass, reply, authdate)                           VALUES (                    <br>       'radman02',                           '',                           'Access-Accept', '2009-01-18 22:43:47')<br>
rlm_sql (sql): Reserving sql socket id: 1<br>rlm_sql (sql): Released sql socket id: 1<br>++[sql] returns ok<br>++[exec] returns noop<br>Sending Access-Accept of id 180 to 140.97.3.29 port 1645<br>        Tunnel-Medium-Type:0 = IEEE-802<br>
        Tunnel-Private-Group-Id:0 = "staff"<br>        Tunnel-Type:0 = VLAN<br>        User-Name = "radman02"<br>        MS-MPPE-Recv-Key = 0x467fedcc7b18167ddb432067c80db040b838295c47071a357e2d53785a2d2968<br>
        MS-MPPE-Send-Key = 0x8e6e1ce87235db5f65d5b7fdee69157be77cd18cd311416462dc1194e325de8f<br>        EAP-Message = 0x030c0004<br>        Message-Authenticator = 0x00000000000000000000000000000000<br>Finished request 22.<br>
Going to the next request<br>Waking up in 4.6 seconds.<br><br>