Importing the root CA The final step to configuring EAP for FreeRADIUS is to add the CA (Certificate Authority) to every client machine tha t performs EAP authentication. Before proceeding with this step, make sure that yo... FreeRADIUS Technical Guides
Don’t "set it and forget it" So you decided that whatever you were using for network security wasn’t getting the job done… either it didn’t scale with the growth in your user base, devices, or network design, or it was hindering ... Enterprises Network Security Best Practices
How does RADIUS Authorization work? During the process where the user requests access to the RADIUS server, RADIUS authorization and authentication happen simultaneously. An “authentication request” occurs when the Network Access Server... Network Security Protocols
Can you use FreeRADIUS and Active Directory together? The short answer is Yes, FreeRADIUS and Active Directory arecompatible with each other . However, there are some constraints and implications for the rest of the system. Like any technology choice, Ac... Enterprises FreeRADIUS Technical Guides
What does "unresponsive child" error message mean? Like any system, FreeRADIUS provides error messages to inform administrators of problems within the FreeRADIUS server itself. Sometimes however, error messages that are logged by FreeRADIUS are actual...
What is AAA in networking? In networking, AAA stands for Authentication, Authorisation, and Accounting . Itis a security framework that verifies user identity, determines what a verified user is allowed to do, and records what ...
8 Most common RADIUS mistakes We see a lot of questions on the FreeRADIUS mailing list and from our clients that boil down to “RADIUS isn’t working. Can you tell me why?” . Most of the time, the problem isn’t with RADIUS itself, i...
What does a "Shared secret is incorrect" error mean? The root cause for both messages is the same, and is unambiguous: The shared secret on the RADIUS server and the NAS are not the same . However, there can be some confusion because, depending on what ...
WiFi spoofing for fun and profit You can spend as much time as you want securing your RADIUS server infrastructure and the rest of your network. But are you really secureagainst WiFi spoofing attacks? In this article, we show just ho... Security Threats and Vulnerabilities
The FreeRADIUS getting started guide After an administrator installs FreeRADIUS for the first time, the big question is “Now what?” Most sites need complex policies, interactions with databases, and logging. Yet the documentation for the... FreeRADIUS Technical Guides
Virtual servers with FreeRADIUS Virtual servers provide a powerful way to define unique policies for different traffic sources . When policy rules for each traffic source are defined in their own separate configuration file, it’s a ...
Configuring FreeRADIUS authentication with PAP (Password Authentication Protocol) Introduction to PAP authentication Password Authentication Protocol (PAP) is one of the most fundamental authentication methods used in Remote Authentication Dial-In User Service (RADIUS). Despite bei... FreeRADIUS Technical Guides