How to customize an OEM instance of FreeRADIUS As the most popular RADIUS server in the world, FreeRADIUS is used by many hardware vendors. They ship their products with FreeRADIUS as an embedded or “OEM” product. It is common for them to need som... Network Security Protocols
Big Tech Concentration Made CrowdStrike Update a Catastrophe As we dissect the CrowdStrike outage, we’ll find the human error was multiplied by the concentration in Big Tech, says network security expert Alan DeKok of InkBridge Networks. There will be intense r... Security Threats and Vulnerabilities
How authentication protocols work Choosing an authentication protocol is one of the most important decisions when designing a RADIUS ecosystem. There are a variety of authentication protocols to choose from, each with their own set of... Network Security Protocols
PAP vs CHAP. Is PAP less secure? One of the most common questions about RADIUS security asks “Is PAP secure?” The usual answer is “no”, which is (in our opinion) seriously misleading. A better answer is “Here’s a comparison of PAP an... Network Security Best Practices Network Security Protocols
Authentication: Is it really you? RADIUS security is composed of three components: authentication, authorization, and accounting. These three links in the RADIUS security chain are often referred to by their acronym, “AAA”. The first ... Network Security Protocols
802.1X FreeRADIUS setup Undertaking 802.1X setup is a daunting experience for many organizations. There are detailed requirements on end-user PCs, switches, servers, certificates, and more. If any of these requirements are n... Network Security Best Practices
Client Case Study: RADIUS proxy consolidation for efficiency When an ISP is running a large number of systems at 99% idle capacity "just in case," you know there's room for optimization. We worked with a multi-service provider that had built four separate RADIU... Network Security Best Practices
RADIUS standards compliance: from RFC to WiFi Alliance We believe that standards compliance is critical for customer satisfaction and vendor interoperability. Systems that follow standards have known, documented behaviour, so there are few surprises. Our ... Network Security Protocols
Client Case Study: 802.1X implementation When months of 802.1X implementation attempts failed, we diagnosed firmware bugs and leveraged vendor relationships to deliver a working solution. One of our clients had customer-visible issues in the... Network Security Best Practices
Client Case Study: Slow SQL server performance When a major ISPs RADIUS database slowed to a crawl under growing data loads, we restored full performance without replacing a single system. Here's how proper database architecture beat a hardware up... Network Security Best Practices
Building RADIUS high availability systems that eliminate network downtime Enterprise networks require authentication systems that never fail. Here's how to build RADIUS high availability architecture that delivers true network reliability. When network authentication goes d... Network Security Best Practices
RADIUS Server Proxying We have extensive experience in the WiFi roaming arena, and we are actively involved in vendor forums. Proxying is a key part of most RADIUS infrastructures. We foster relationships with numerous comp... Network Security Best Practices