Hi,
looks like your device adds something similar to a MAC address to the TACACS+ packet's remote address field. Your best way of matching that would be with a regular expression, e.g..
if (client !~ /^192\.168\ .213´/) deny
There's currently no way to sanitize device input. What vendor
and product does cause that issue?
Cheers,
Marc
--
You received this message because you are subscribed to the Google Groups "Event-Driven Servers" group.
To unsubscribe from this group and stop receiving emails from it, send an email to event-driven-ser...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/event-driven-servers/d7e7e69d-f9f2-4749-a677-2391c8283dcen%40googlegroups.com.
Hi,
with commit 95148ce1343f698530e0ea3106161a00e38a8dfb, setting "bug compatibility = 16" at host level might help, too.
Cheers,
Marc
To view this discussion visit https://groups.google.com/d/msgid/event-driven-servers/3cfa14e7-f8ac-42a1-9d3d-96ca326dc305n%40googlegroups.com.