Configuring the Application

Configuring the Radius Authentication

  1. Go to Settings >> System >> Plugins.

  2. Find Radius Authentication v5.2.0 and click Manage.

_images/ra_manage.png

Manage RADIUS Authentication

  1. Click Add Server.

_images/ra_server_information.png

RADIUS Server Information Panel

  1. Enter the RADIUS Server IP Address.

  2. Enter the Secret passphrase of the RADIUS server.

  3. Set the Priority of the RADIUS server in the application, 1 being the highest priority.

  4. Click Save.

Note

If you are adding a RADIUS server for the first time, the application prompts the Default Settings panel.

Configuring Default Settings

  1. Click Default Settings.

_images/radius_management_panel1.png

Radius Authentication Management Panel

  1. Select a LPSM user group as the Default Role.

_images/ra_default_settings.png

Default Settings Panel

  1. Click Save.

Mapping Roles

You can map a Radius role to a LPSM user group to define access permission on LPSM.

Follow these steps to map an Radius role to a LPSM user group:

  1. Click Roles Mapping.

  2. Enter a Radius Role.

  3. Select an LPSM user group in the LogPoint User Group field to assign to the Radius role mentioned above.

_images/ra_group_mapping.png

RADIUS Group Mapping

  1. Click Add.

The table in the Radius Group Mapping panel lists the mapped RADIUS roles and LPSM user groups. You can edit or delete the added mapping from the table.

_images/ra_group_mapping_added.png

Added RADIUS Group Mapping

  1. Click Submit.

Importing Roles Map

A roles map file contains the mapping of RADIUS users with their respective RADIUS roles in a Comma Separated Value (CSV) file.

_images/ra_roles_map.png

Roles Map File (CSV)

Note

To assign multiple roles to a user, separate the roles by a colon (:) in the roles map file.

Follow these steps to import a roles map file:

  1. Click Import Roles Map.

  2. Browse the roles map file (CSV).

  3. Click Submit.

Importing Dictionary

The RADIUS dictionary file maps the attribute numbers in the RADIUS packet to a descriptive name. Using the dictionary, you can define data types for different attributes or define new attributes of the RADIUS packets.

The Radius Authentication application includes a dictionary file by default. However, you can also import a vendor-specific dictionary file.

Follow these steps to import a dictionary in the Radius Authentication application:

  1. Set the name of the dictionary file as dictionary. Otherwise, the application prompts the following error:

_images/ra_dictionary_name_error.png
  1. Click Import Dictionary.

  2. Browse and open the dictionary file.

  3. Click Submit.

You can find the default dictionary of the Radius Authentication application at the following location:

/opt/immune/installed/webserver/pluggables/modules/Authentication/apps/RadiusAuthentication/utils/dictionary

The default dictionary file consists of the following part:

#
# Version $Id: dictionary,v 1.1.1.1 2002/10/11 12:25:39 wichert Exp $
#
#   This file contains dictionary translations for parsing
#   requests and generating responses.  All transactions are
#   composed of Attribute/Value Pairs.  The value of each attribute
#   is specified as one of 4 data types.  Valid data types are:
#
#   string  - 0-253 octets
#   ipaddr  - 4 octets in network byte order
#   integer - 32 bit value in big endian order (high byte first)
#   date    - 32 bit value in big endian order - seconds since
#                                   00:00:00 GMT,  Jan.  1,  1970
#
#   FreeRADIUS includes extended data types which are not defined
#   in RFC 2865 or RFC 2866.  These data types are:
#
#   abinary - Ascend's binary filter format.
#   octets  - raw octets, printed and input as hex strings.
#             e.g.: 0x123456789abcdef
#
#
#   Enumerated values are stored in the user file with dictionary
#   VALUE translations for easy administration.
#
#   Example:
#
#   ATTRIBUTE         VALUE
#   ---------------   -----
#   Framed-Protocol = PPP
#   7               = 1     (integer encoding)
#

#
#   Include compatibility dictionary for older users file. Move this
#   directive to the end of the file if you want to see the old names
#   in the logfiles too.
#
#$INCLUDE dictionary.shasta
#$INCLUDE dictionary.shiva
#$INCLUDE dictionary.tunnel
#$INCLUDE dictionary.usr
#$INCLUDE dictionary.versanet
#$INCLUDE dictionary.erx
#$INCLUDE dictionary.freeradius
#$INCLUDE dictionary.alcatel

#
#       Following are the proper new names. Use these.
#
ATTRIBUTE       User-Name               1       string
ATTRIBUTE       User-Password           2       string
ATTRIBUTE       CHAP-Password           3       octets
ATTRIBUTE       NAS-IP-Address          4       ipaddr
ATTRIBUTE       NAS-Port                5       integer
ATTRIBUTE       Service-Type            6       integer
ATTRIBUTE       Framed-Protocol         7       integer
ATTRIBUTE       Framed-IP-Address       8       ipaddr
ATTRIBUTE       Framed-IP-Netmask       9       ipaddr
ATTRIBUTE       Framed-Routing          10      integer
ATTRIBUTE       Filter-Id               11      string
ATTRIBUTE       Framed-MTU              12      integer
ATTRIBUTE       Framed-Compression      13      integer
ATTRIBUTE       Login-IP-Host           14      ipaddr
ATTRIBUTE       Login-Service           15      integer
ATTRIBUTE       Login-TCP-Port          16      integer
ATTRIBUTE       Reply-Message           18      string
ATTRIBUTE       Callback-Number         19      string
ATTRIBUTE       Callback-Id             20      string
ATTRIBUTE       Framed-Route            22      string
ATTRIBUTE       Framed-IPX-Network      23      ipaddr
ATTRIBUTE       State                   24      octets
ATTRIBUTE       Class                   25      octets
ATTRIBUTE       Vendor-Specific         26      octets
ATTRIBUTE       Session-Timeout         27      integer
ATTRIBUTE       Idle-Timeout            28      integer
ATTRIBUTE       Termination-Action      29      integer

Helpful?

We are glad this guide helped.


Please don't include any personal information in your comment

Contact Support