-
The RADIUS server uses the User Datagram Protocol (UDP) and the following
UDP ports:
-
Port 1645 for authentication
-
Port 1646 for accounting
If different ports are assigned to these services in the /etc/services
file, RADIUS uses those ports in preference to the default ports listed
above. You can also specify different UDP ports by using the radiusd
-p portnumber command on UNIX hosts. Port 1812 is
reserved for RADIUS authentication and port 1813 is reserved for RADIUS
accounting
How it works
This figure shows the interaction between a dial-in user and the
RADIUS client and server.
1- User initiates PPP authentication to the NAS.
-
2- NAS prompts for username and password (if PAP) or challenge (if CHAP).
-
3- User replies.
-
4- RADIUS client sends username and encrypted password to the RADIUS
server.
-
5- RADIUS server responds with Accept, Reject, or Challenge.
-
The RADIUS client acts upon services and services parameters
bundled with Accept or Reject.
Authentication and Authorization
The RADIUS server can support a variety of methods to authenticate a user.
When it is provided with the username and original password given by the
user, it can support PPP, PAP or CHAP, UNIX login, and other authentication
mechanisms. Typically, a user login consists of a query (Access-Request)
from the NAS to the RADIUS server and a corresponding response (Access-Accept
or Access-Reject) from the server. The Access-Request packet contains the
username, encrypted password, NAS IP address, and port. The format
of the request also provides information about the type of session that
the user wants to initiate. For example, if the query is presented in character
mode, the inference is "Service-Type = Exec-User," but if the request is
presented in PPP packet mode, the inference is "Service Type = Framed User"
and "Framed Type = PPP."
When the RADIUS server receives the Access-Request from the NAS, it
searches a database for the username listed. If the username does not exist
in the database, either a default profile is loaded or the RADIUS server
immediately sends an Access-Reject message. This Access-Reject message
can be accompanied by a text message indicating the reason for the refusal.
In RADIUS, authentication and authorization are coupled together. If
the username is found and the password is correct, the RADIUS server returns
an Access-Accept response, including a list of attribute-value pairs that
describe the parameters to be used for this session. Typical parameters
include service type (shell or framed), protocol type, IP address to assign
the user (static or dynamic), access list to apply, or a static route to
install in the NAS routing table. The configuration information in the
RADIUS server defines what will be installed on the NAS. The figure below
illustrates the RADIUS authentication and authorization sequence.
Accounting
The accounting features of the RADIUS protocol can be used independently
of RADIUS authentication or authorization. The RADIUS accounting functions
allow data to be sent at the start and end of sessions, indicating the
amount of resources (such as time, packets, bytes, and so on) used during
the session. An Internet service provider (ISP) might use RADIUS access
control and accounting software to meet special security and billing needs.
Transactions between the client and RADIUS server are authenticated
through the use of a shared secret, which is never sent over the network.
In addition, user passwords are sent encrypted between the client and RADIUS
server to eliminate the possibility that someone snooping on an insecure
network could determine a user's password.
Features
-
RADIUS offers the following features:
Security
In large networks, security information can be scattered throughout
the network on different devices. RADIUS allows user information to be
stored on one host, minimizing the risk of security loopholes. All authentication
and access to network services is managed by the host functioning as the
RADIUS server.
Flexibility
Using modifiable "stubs," RADIUS can be adapted to work with existing
security systems and protocols. You adapt the RADIUS server to your network,
rather than adjusting your network to work with RADIUS.
Simplified management
The RADIUS server stores security information in text files at a central
location; you add new users to the database or modify existing user information
by editing these text files.
Extensive auditing capabilities
RADIUS provides extensive accounting trail capabilities, referred to
as RADIUS accounting . Information collected in a log file can be
analyzed for security purposes or used for billing.
Enhancements
-
RADIUS 2.1 provides the following enhancements to improve
RADIUS functionality:
Proxy RADIUS
Proxy RADIUS enables your RADIUS server to forward authentication requests
from a network access server (NAS) to a remote RADIUS server and to pass
the reply back to the NAS. This feature enables cooperating Internet
service providers (ISPs) to handle dial-in service requests from each other's
users. Corporate users can easily forward packets from local to remote
networks.
RADIUS now supports ActivCard authentication on the following platforms
supported by ActivCard 2.1: AIX, HP-UX, Solaris, and Sun-OS. ActivCard
authenticates users by means of dynamic passwords generated by a handheld
token using the public Digital Encryption Standard (DES) algorithm. The
RADIUS server can forward all requests specified by the user profiles to
the ActivCard server.
Virtual ports
You can restrict the number of logins permitted to specified
telephone numbers.
Improved messages
The syslog message for many kinds of rejected access-requests
now includes the Calling-Station-Id--if known--enabling you to track down
where the failed login attempts are dialing from.
Enhanced debugging
You can turn on RADIUS debugging by sending a SIGUSR1 signal
to radiusd . Sending a SIGUSR2 signal to radiusd turns
debugging off. The RADIUS server logs a short summary message of
radiusd
activity when either signal is sent and when radiusd is exited.
-
RADIUS Installation and Configuration
Table1 provides a quick overview of the tasks required to install
and configure RADIUS.
Table1 Overview of RADIUS Installation and Configuration
Tasks
Task |
1. Select a host to use as the RADIUS server. |
2. Install the RADIUS server software on the host. |
3. Configure client information on the RADIUS server. |
4. Configure the NAS as a RADIUS client. |
5. Configure user profiles. |
6. You can optionally define menus to enable authenticated users to
select different login options. |
7. You can optionally install and configure RADIUS accounting. |
8. You can optionally configure RADIUS proxy service. |