<table cellspacing="0" cellpadding="0" border="0" ><tr><td valign="top" style="font: inherit;">mm confusing..i just enable the sqlcounter in radiusd.conf. i just let it as default no change i made in noresetcounter module. then i adding noresetcounter in authorize and instantiate section. <br>i have defined 1user named tes and password tes has loged in normally before i add attribut max-all-session in the table radcheck just like this. <br>+----+----------+-----------------+----+--------+<br>| id | UserName | Attribute | op | Value |<br>+----+----------+-----------------+----+--------+<br>| 1 | nizar | Password | == | nizar | <br>| 2 | nizar1 | Password | == | nizar1 | <br>| 6 | tes | Max-All-Session | == | 90 | <br>|
4 | tes | Password | == | tes | <br>+----+----------+-----------------+----+--------+<br>after i adding the attribut max-all-session the user tes cannot login anymore. i do running freeradius in debug mode and the following si the result..<br>somebody help me please...<br>================freeradius debug result=======<br>rad_recv: Access-Request packet from host 192.168.0.1:56614, id=0, length=194<br> User-Name = "tes"<br> User-Password = "tes"<br> NAS-IP-Address = 0.0.0.0<br> Service-Type = Login-User<br> Framed-IP-Address = 192.168.182.3<br> Calling-Station-Id = "00-1E-68-23-E9-C8"<br> Called-Station-Id = "00-00-E2-78-FF-39"<br> NAS-Identifier = "nas01"<br> Acct-Session-Id =
"4a04816800000000"<br> NAS-Port-Type = Wireless-802.11<br> NAS-Port = 0<br> Message-Authenticator = 0x1c3a148590ef0762aed6069cc9ac0715<br> WISPr-Logoff-URL = "http://192.168.182.1:3990/logoff"<br> Processing the authorize section of radiusd.conf<br>modcall: entering group authorize for request 3<br> modcall[authorize]: module "preprocess" returns ok for request 3<br> modcall[authorize]: module "chap" returns noop for request 3<br> modcall[authorize]: module "mschap" returns noop for request 3<br> rlm_realm: No '@' in User-Name = "tes", looking up realm NULL<br> rlm_realm: No such realm "NULL"<br> modcall[authorize]: module "suffix" returns noop for request 3<br> rlm_eap: No EAP-Message, not doing EAP<br> modcall[authorize]: module "eap" returns noop for request 3<br>radius_xlat: 'tes'<br>rlm_sql
(sql): sql_set_user escaped user --> 'tes'<br>radius_xlat: 'SELECT id, UserName, Attribute, Value, op FROM radcheck WHERE Username = 'tes' ORDER BY id'<br>rlm_sql (sql): Reserving sql socket id: 0<br>radius_xlat: 'SELECT radgroupcheck.id,radgroupcheck.GroupName,radgroupcheck.Attribute,radgroupcheck.Value,radgroupcheck.op FROM radgroupcheck,usergroup WHERE usergroup.Username = 'tes' AND usergroup.GroupName = radgroupcheck.GroupName ORDER BY radgroupcheck.id'<br>radius_xlat: 'SELECT id, UserName, Attribute, Value, op FROM radreply WHERE Username = 'tes' ORDER BY
id'<br>radius_xlat: 'SELECT radgroupreply.id,radgroupreply.GroupName,radgroupreply.Attribute,radgroupreply.Value,radgroupreply.op FROM radgroupreply,usergroup WHERE usergroup.Username = 'tes' AND usergroup.GroupName = radgroupreply.GroupName ORDER BY radgroupreply.id'<br>rlm_sql (sql): Released sql socket id: 0<br>rlm_sql (sql): No matching entry in the database for request from user [tes]<br> modcall[authorize]: module "sql" returns notfound for request 3<br>rlm_sqlcounter: Entering module authorize code<br>rlm_sqlcounter: Could not find Check item value pair<br> modcall[authorize]: module "noresetcounter" returns noop for request 3<br>rlm_pap: WARNING! No "known good" password found for the user. Authentication may fail because of this.<br> modcall[authorize]: module "pap" returns noop for request 3<br>modcall: leaving group authorize (returns ok) for request 3<br>auth: No authenticate method (Auth-Type)
configuration found for the request: Rejecting the user<br>auth: Failed to validate the user.<br>Delaying request 3 for 1 seconds<br>Finished request 3<br>Going to the next request<br>--- Walking the entire request list ---<br>Waking up in 1 seconds...<br>--- Walking the entire request list ---<br>Waking up in 1 seconds...<br>rad_recv: Access-Request packet from host 192.168.0.1:56614, id=0, length=194<br>Sending Access-Reject of id 0 to 192.168.0.1 port 56614<br>Waking up in 1 seconds...<br>--- Walking the entire request list ---<br>Waking up in 4 seconds...<br>--- Walking the entire request list ---<br>Cleaning up request 3 ID 0 with timestamp 4a048180<br>Nothing to do. Sleeping until we see a request.<br><br></td></tr></table><br>