Cisco Prime Network Registrar 10.0 Open Source Documentation

Total Page:16

File Type:pdf, Size:1020Kb

Cisco Prime Network Registrar 10.0 Open Source Documentation Open Source Used In Cisco Prime Network Registrar 10.0 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. Text Part Number: 78EE117C99-173910825 Open Source Used In Cisco Prime Network Registrar 10.0 1 This document contains licenses and notices for open source software used in this product. With respect to the free/open source software listed in this document, if you have any questions or wish to receive a copy of any source code to which you may be entitled under the applicable free/open source license(s) (such as the GNU Lesser/General Public License), please contact us at [email protected]. In your requests please include the following reference number 78EE117C99-173910825 Contents 1.1 Bean Validation API 1.1.0.Final 1.1.1 Available under license 1.2 cglib 2.1.88 1.2.1 Available under license 1.3 ecdysis-unbound 1.4.7-20101117 1.3.1 Available under license 1.4 EclipseLink ANTLR 2.5.0 1.4.1 Available under license 1.5 EclipseLink ASM 2.5.0 1.5.1 Available under license 1.6 EclipseLink Core 2.5.0 1.6.1 Available under license 1.7 EclipseLink Moxy 2.5.0 1.7.1 Available under license 1.8 fingerbank 6.8.2 1.8.1 Available under license 1.9 freeradius 1.1.6 1.9.1 Available under license 1.10 gtar 1.13 1.10.1 Available under license 1.11 Guava: Google Core Libraries for Java 14.0.1 1.11.1 Available under license 1.12 gzip 1.6 1.12.1 Available under license 1.13 HK2 API module 2.1.88 1.13.1 Available under license Open Source Used In Cisco Prime Network Registrar 10.0 2 1.14 HK2 Implementation Utilities 2.1.88 1.14.1 Available under license 1.15 icu4c 57.1 1.15.1 Available under license 1.16 javax.annotation API 1.2 1.16.1 Available under license 1.17 javax.inject 2.1.88 1.17.1 Available under license 1.18 javax.ws.rs-api 2.0 1.18.1 Available under license 1.19 jaxb-api 2.2.7 1.19.1 Available under license 1.20 jaxb-api 2.2.2 1.20.1 Available under license 1.21 jaxb-xjc 2.2 1.21.1 Available under license 1.22 jaxrs-ri 2.6 1.22.1 Available under license 1.23 JAXWS-RI 2.2.6 1.23.1 Available under license 1.24 jaxws-rt 2.2.10 1.24.1 Available under license 1.25 jcommon 1.0 1.25.1 Available under license 1.26 JDOM 1.1 1.26.1 Notifications 1.26.2 Available under license 1.27 jersey-core-client 2.0 1.27.1 Available under license 1.28 jersey-core-common 2.0 1.28.1 Available under license 1.29 jersey-core-server 2.0 1.29.1 Available under license 1.30 jersey-entity-filtering 2.3.1 1.30.1 Available under license 1.31 jersey-media-moxy 2.6 1.31.1 Available under license 1.32 JfreeChart 1.0.1 1.32.1 Available under license Open Source Used In Cisco Prime Network Registrar 10.0 3 1.33 json_simple 1.1 1.33.1 Available under license 1.34 ldns 1.7.0 1.34.1 Available under license 1.35 libevent 2.0.22 1.35.1 Available under license 1.36 libgssapi 0.10 :2 1.36.1 Available under license 1.37 Net SNMP 5.6.2 1.37.1 Available under license 1.38 openldap 2.3.43 1.38.1 Available under license 1.39 OpenSSL 1.0.2p 1.39.1 Available under license 1.40 org.objectweb.asm.all 2.1.88 1.40.1 Available under license 1.41 osgi.resource.locator 1.0.1 1.41.1 Available under license 1.42 Regular expression libraries 3.8 1.42.1 Available under license 1.43 ServiceLocator 2.1.88 1.43.1 Available under license 1.44 tar 1.28 :r0 1.44.1 Available under license 1.45 tcl 8.6.4 1.45.1 Available under license 1.46 tomcat 8.5.32 1.46.1 Available under license 1.47 unbound 1.5.9 1.47.1 Available under license 1.48 zlib 1.2.11 1.48.1 Available under license 1.1 Bean Validation API 1.1.0.Final 1.1.1 Available under license : /* * Copyright 2009-2012, Red Hat, Inc. and/or its affiliates, and individual contributors * by the @authors tag. See the copyright.txt in the distribution for a * full listing of individual contributors. Open Source Used In Cisco Prime Network Registrar 10.0 4 * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * http://www.apache.org/licenses/LICENSE-2.0 * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. "Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity. "You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License. "Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files. "Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types. "Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below). "Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof. "Contribution" shall mean any work of authorship, including the original version of the Work and any modifications Open Source Used In Cisco Prime Network Registrar 10.0 5 or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution." "Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work. 2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form. 3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed.
Recommended publications
  • Ten Strategies of a World-Class Cybersecurity Operations Center Conveys MITRE’S Expertise on Accumulated Expertise on Enterprise-Grade Computer Network Defense
    Bleed rule--remove from file Bleed rule--remove from file MITRE’s accumulated Ten Strategies of a World-Class Cybersecurity Operations Center conveys MITRE’s expertise on accumulated expertise on enterprise-grade computer network defense. It covers ten key qualities enterprise- grade of leading Cybersecurity Operations Centers (CSOCs), ranging from their structure and organization, computer MITRE network to processes that best enable effective and efficient operations, to approaches that extract maximum defense Ten Strategies of a World-Class value from CSOC technology investments. This book offers perspective and context for key decision Cybersecurity Operations Center points in structuring a CSOC and shows how to: • Find the right size and structure for the CSOC team Cybersecurity Operations Center a World-Class of Strategies Ten The MITRE Corporation is • Achieve effective placement within a larger organization that a not-for-profit organization enables CSOC operations that operates federally funded • Attract, retain, and grow the right staff and skills research and development • Prepare the CSOC team, technologies, and processes for agile, centers (FFRDCs). FFRDCs threat-based response are unique organizations that • Architect for large-scale data collection and analysis with a assist the U.S. government with limited budget scientific research and analysis, • Prioritize sensor placement and data feed choices across development and acquisition, enteprise systems, enclaves, networks, and perimeters and systems engineering and integration. We’re proud to have If you manage, work in, or are standing up a CSOC, this book is for you. served the public interest for It is also available on MITRE’s website, www.mitre.org. more than 50 years.
    [Show full text]
  • Secure Magazine
    When it comes to information security, most of us will remember this year as the year when an industry giant suffered a huge incident with extensive ramifications. Naturally, I'm talking about the RSA breach back in March, when the company experienced privileged data loss. We've seen privacy snafus, data breaches, a rise of mobile malware and financial fraud. What can we expect next year? Unfortunately, probably more of the same. In any case, I wish you a successful 2012. Stay safe! Mirko Zorz Editor in Chief Visit the magazine website at www.insecuremag.com (IN)SECURE Magazine contacts Feedback and contributions: Mirko Zorz, Editor in Chief - [email protected] News: Zeljka Zorz, Managing Editor - [email protected] Marketing: Berislav Kucan, Director of Marketing - [email protected] Distribution (IN)SECURE Magazine can be freely distributed in the form of the original, non-modified PDF document. Distribution of modified versions of (IN)SECURE Magazine content is prohibited without the explicit permission from the editor. Copyright (IN)SECURE Magazine 2011. www.insecuremag.com IT pros can't resist peeking at information and other sensitive data including, privileged information for example, other people’s Christmas bonus details. • 42 percent of those surveyed said that in their organizations' IT staff are sharing passwords or access to systems or applications • 26 percent said that they were aware of an IT staff member abusing a privileged login to illicitly access sensitive information • 48 percent of respondents work at companies that are still not changing their IT security staff will be some of the most privileged passwords within 90 days – a informed people at the office Christmas party violation of most major regulatory compliance this year.
    [Show full text]
  • Clustering Quick Installation Guide
    ClusteringQuickInstallationGuide forPacketFenceversion5.3.1 ClusteringQuickInstallationGuide byInverseInc. Version5.3.1-July2015 Copyright©2015Inverseinc. Permissionisgrantedtocopy,distributeand/ormodifythisdocumentunderthetermsoftheGNUFreeDocumentationLicense,Version 1.2oranylaterversionpublishedbytheFreeSoftwareFoundation;withnoInvariantSections,noFront-CoverTexts,andnoBack-Cover Texts.Acopyofthelicenseisincludedinthesectionentitled"GNUFreeDocumentationLicense". ThefontsusedinthisguidearelicensedundertheSILOpenFontLicense,Version1.1.ThislicenseisavailablewithaFAQat:http:// scripts.sil.org/OFL Copyright©ŁukaszDziedzic,http://www.latofonts.com,withReservedFontName:"Lato". Copyright©RaphLevien,http://levien.com/,withReservedFontName:"Inconsolata". TableofContents AboutthisGuide.............................................................................................................. 1 Assumptions.....................................................................................................................2 Installation....................................................................................................................... 3 Step1:Installthereplicateddatabase........................................................................ 3 Step2:Serverconfiguration..................................................................................... 9 Step3:Createanewcluster.................................................................................. 10 Step4:Connectaslavepacketfenceserver..............................................................11
    [Show full text]
  • Trabajo Fin De Grado
    E.T.S. de Ingeniería Industrial, Informática y de Telecomunicación Renovación de la infraestructura de red de datos para soporte NAC (Network Access Control) de una empresa. Grado en Ingeniería en Tecnologías de Telecomunicación Trabajo Fin de Grado Autor: Ruth González Novillo Director: Eduardo Magaña Lizarrondo Pamplona, 25 Junio del 2014 ÍNDICE RESÚMEN .............................................................................................................................................. 0 ÍNDICE DE FIGURAS ................................................................................................................................ 1 LISTA DE PALABRAS CLAVE .................................................................................................................... 3 CAPÍTULO 1 – INTRODUCCIÓN. .............................................................................................................. 1 CAPÍTULO 2 – SITUACIÓN ACTUAL DE LA RED DE DATOS. ...................................................................... 3 2.1 Localizaciones de la Red de Datos. Infraestructura. ...................................................................... 3 2.2 Estructura lógica de la Red de Datos ............................................................................................ 5 2.3 Protocolos propietarios del fabricante ........................................................................................... 6 2.4 Red Corporativa ............................................................................................................................
    [Show full text]
  • Packetfence – Version 1.7.5
    PacketFence – version 1.7.5 Installation and Confguration Guide Copyright © 2008 Inverse inc. (http://inverse.ca) Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled “GNU Free Documentation License”. Version 1.7.5 – October 2008 Contents Chapter 1 About this Guide .............................................................................................................. 3 Chapter 2 Introduction .......................................................................................................................4 How does VLAN isolation work ? ............................................................................. 5 Blocking malicious activities with violations .............................................................7 New features in 1.7.5 ...............................................................................................9 Bugs fxed in 1.7.5 ................................................................................................... 9 Chapter 3 System Requirements .................................................................................................... 10 Assumptions .......................................................................................................... 10 Minimum Hardware Requirements .........................................................................11
    [Show full text]
  • Packetfence Administration Guide
    PacketFence Administration Guide for version 3.5.0 PacketFence Administration Guide by Olivier Bilodeau, Fabrice Durand, François Gaudreault, and Derek Wuelfrath Past Authors: Dominik Gehl Version 3.5.0 - August 2012 Copyright © 2008-2012 Inverse inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". The fonts used in this guide are licensed under the SIL Open Font License, Version 1.1. This license is available with a FAQ at: http://scripts.sil.org/OFL Copyright © Barry Schwartz, http://www.crudfactory.com, with Reserved Font Name: "Sorts Mill Goudy". Copyright © Raph Levien, http://levien.com/, with Reserved Font Name: "Inconsolata". Revision History Revision 2.5 2012-07-30 FG Doc update for RADIUS Revision 2.4 2012-07-26 DW Added documentation for new captive portal profiles feature. Revision 2.3 2012-07-19 FG Adding suricata documentation Revision 2.2 2012-06-13 OB, FD Added installation procedure for Debian. A minor fix to RHEL6 install instructions. Revision 2.1 2012-04-12 OB, DW Added new documentation about pre-registered, sponsored guests and role-based enforcement. Covered updated inline enforcement instructions. Updated drbd and samba installation instructions. SoH, ntlm_auth test and some typos fixed too. Revision 2.0 2012-02-22 FG, OB, DW Documentation ported to asciidoc.
    [Show full text]
  • 18T00505.Pdf
    ESCUELA SUPERIOR POLITÉCNICA DE CHIMBORAZO FACULTAD DE INFORMÁTICA Y ELECTRÓNICA ESCUELA DE INGENIERÍA EN SISTEMAS “ANÁLISIS COMPARATIVO DE HERRAMIENTAS N.A.C OPENSOURCE Y SU APLICACIÓN A LA DIRECCIÓN PROVINCIAL DEL CONSEJO DE LA JUDICATURA DE CHIMBORAZO” TESIS DE GRADO Previa la obtención del título de INGENIERO EN SISTEMAS INFORMÁTICOS Presentado por: CARLOS MIGUEL PADILLA CEVALLOS RIOBAMBA – ECUADOR 2012 AGRADECIMIENTO Agradezco infinitamente a Dios por ser la luz y la fuerza de mi vida, a mis padres por su apoyo incondicional y el sacrificio que han hecho por darme una educación; a mis hermanos y amigos por sus consejos y aprecio. DEDICATORIA A Dios y a mis padres por los buenos valores, hábitos y enseñanzas que me han ayudado a salir adelante y alcanzar mis sueños y objetivos. A mi novia por sus consejos, comprensión y apoyo. También a mis hermanos por siempre darme fuerza para seguir adelante. NOMBRE FIRMA FECHA Ing. Iván Ménes DECANO FACULTAD DE ..................................... ..................................... INFORMÁTICA Y ELECTRÓNICA Ing. Raúl Rosero DIRECTOR ESCUELA ..................................... ..................................... INGENIERÍA EN SISTEMAS Ing. Alberto Arellano DIRECTOR DE TESIS ..................................... ..................................... Ing. Diego Ávila MIEMBRO DEL ..................................... ..................................... TRIBUNAL Ing. Carlos Rodríguez DIRECTOR DPTO. ..................................... ..................................... DOCUMENTACIÓN NOTA
    [Show full text]
  • Clustering Quick Installation Guide
    ClusteringQuickInstallationGuide forPacketFenceversion6.0.0 ClusteringQuickInstallationGuide byInverseInc. Version6.0.0-Apr2016 Copyright©2015Inverseinc. Permissionisgrantedtocopy,distributeand/ormodifythisdocumentunderthetermsoftheGNUFreeDocumentationLicense,Version 1.2oranylaterversionpublishedbytheFreeSoftwareFoundation;withnoInvariantSections,noFront-CoverTexts,andnoBack-Cover Texts.Acopyofthelicenseisincludedinthesectionentitled"GNUFreeDocumentationLicense". ThefontsusedinthisguidearelicensedundertheSILOpenFontLicense,Version1.1.ThislicenseisavailablewithaFAQat:http:// scripts.sil.org/OFL Copyright©ŁukaszDziedzic,http://www.latofonts.com,withReservedFontName:"Lato". Copyright©RaphLevien,http://levien.com/,withReservedFontName:"Inconsolata". TableofContents AboutthisGuide.............................................................................................................. 1 Assumptions.....................................................................................................................2 InstallationonCentOS6................................................................................................... 3 Step1:Installthereplicateddatabase........................................................................ 3 Step2:Serverconfiguration..................................................................................... 9 InstallationonCentOS7................................................................................................. 11 Step1:Installthereplicateddatabase.......................................................................11
    [Show full text]
  • Packetfence Administration Guide
    PacketFence Administration Guide for version 3.5.1 PacketFence Administration Guide by Olivier Bilodeau, Fabrice Durand, François Gaudreault, and Derek Wuelfrath Past Authors: Dominik Gehl Version 3.5.1 - September 2012 Copyright © 2008-2012 Inverse inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". The fonts used in this guide are licensed under the SIL Open Font License, Version 1.1. This license is available with a FAQ at: http://scripts.sil.org/OFL Copyright © Barry Schwartz, http://www.crudfactory.com, with Reserved Font Name: "Sorts Mill Goudy". Copyright © Raph Levien, http://levien.com/, with Reserved Font Name: "Inconsolata". Revision History Revision 2.6 2012-09-05 OB, DW, FD Managed FreeRADIUS updates. Proper ownership of the /var/lib/samba/winbind_privileged folder since 3.5 release. Added EPEL on the installation line for RHEL-based systems. Revision 2.5 2012-07-30 FG Doc update for RADIUS Revision 2.4 2012-07-26 DW Added documentation for new captive portal profiles feature. Revision 2.3 2012-07-19 FG Adding suricata documentation Revision 2.2 2012-06-13 OB, FD Added installation procedure for Debian. A minor fix to RHEL6 install instructions. Revision 2.1 2012-04-12 OB, DW Added new documentation about pre-registered, sponsored guests and role-based enforcement.
    [Show full text]
  • Installation Guide
    Installation Guide PacketFence v11.0.0 Version 11.0.0 - September 2021 Table of Contents 1. About this Guide . 2 1.1. Other sources of information . 2 2. Introduction . 3 3. System Requirements . 4 3.1. Assumptions . 4 3.2. Minimum Hardware Requirements. 4 3.3. Operating System Requirements . 4 4. Installation . 6 4.1. Installing PacketFence from the ZEN. 6 4.2. Installing PacketFence on existing Linux . 7 5. Getting Started . 10 5.1. Going Through the Configurator . 10 5.2. Connecting PacketFence to Microsoft Active Directory . 11 5.3. Configuring Cisco Catalyst 2960 Switch. 11 5.4. Adding the Switch to PacketFence. 13 5.5. Configuring the Connection Profile . 13 5.6. Configuring Microsoft Windows Supplicant . 14 5.7. Testing. 14 5.8. Alerting . 14 6. Enabling the Captive Portal . 15 6.1. Creating Authentication Source for Guests. 15 6.2. Configure switchport for Web Authentication . 15 6.3. Adjust Switch Configuration in PacketFence. 16 6.4. Enabling Portal on Management Interface . 16 6.5. Configuring the Connection Profile . 17 6.6. Testing. 17 7. Authentication Sources . 18 7.1. Email Authentication for Guests. 19 7.2. Adding SMS Authentication for Guests . 20 8. Introduction to Role-based Access Control . 22 8.1. Adding Roles. 22 8.2. Using the Employee Role . 23 8.3. Using the Corporate_Machine Role . 23 9. Supported Enforcement Modes . 25 9.1. Technical Introduction to Inline Enforcement . 25 9.2. Technical Introduction to Out-of-band Enforcement . 26 9.3. Technical Introduction to Hybrid Enforcement. 30 9.4. Technical Introduction to RADIUS Enforcement.
    [Show full text]
  • Packetfence Administration Guide for Version 4.0.0 Packetfence Administration Guide by Inverse Inc
    PacketFence Administration Guide for version 4.0.0 PacketFence Administration Guide by Inverse Inc. Version 4.0.0 - May 2013 Copyright © 2008-2013 Inverse inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". The fonts used in this guide are licensed under the SIL Open Font License, Version 1.1. This license is available with a FAQ at: http://scripts.sil.org/OFL Copyright © Barry Schwartz, http://www.crudfactory.com, with Reserved Font Name: "Sorts Mill Goudy". Copyright © Raph Levien, http://levien.com/, with Reserved Font Name: "Inconsolata". Table of Contents About this Guide ................................................................................................................. 1 Other sources of information ......................................................................................... 1 Introduction ....................................................................................................................... 2 Features .................................................................................................................... 2 Network Integration .................................................................................................... 5 Components .............................................................................................................
    [Show full text]
  • Developer's Guide
    Developer’s Guide PacketFence v11.1.0 Version 11.1.0 - September 2021 Table of Contents 1. About this Guide . 2 1.1. Other sources of information . 2 2. Creating a new Switch via a Template. 3 2.1. Using web admin . 3 2.2. Using CLI. 3 2.3. Required Parameters . 3 2.4. RADIUS scope Parameters . 3 2.5. Additional parameters . 4 2.6. Comments . 4 2.7. Defining RADIUS Attributes . 4 2.8. Dynamic RADIUS Attribute Value Syntax . 4 3. Documentation . 13 4. Asciidoctor documentation . 14 4.1. Documentation Conventions . 14 4.2. Checklist to create a new guide . 19 5. Golang environment . 20 5.1. PacketFence Golang libraries . 20 6. Code conventions . 24 6.1. Code style. 24 7. HTTP JSON API . 26 7.1. How to use the API . 26 8. Customizing PacketFence . 28 8.1. Captive Portal. 28 8.2. Adding custom fields to the database . 30 8.3. VLAN assignment . 30 9. SNMP. 32 9.1. Introduction . 32 9.2. Obtaining switch and port information . 32 10. Supporting new network hardware. 33 10.1. Switch . 33 10.2. Wireless Access-Points or Controllers. 36 10.3. The "adding a new network device module in PacketFence" checklist . 38 11. PacketFence builds . 39 11.1. Packer . 39 11.2. Anatomy of Packer template . 39 11.3. How to build Docker images ? . 39 11.4. Troubleshooting . 40 12. Developer recipes. 41 12.1. Virtual environment. 41 12.2. Running development version . 41 13. Running tests . 44 13.1. Unit tests . 44 13.2. Integration tests. 45 14.
    [Show full text]