Is PAP secure? A common misconception is that PAP is less secure than other authentication protocols such as CHAP, MS-CHAP, or EAP-MSCHAP(v2). This perception arises because of a misunderstanding of how PAP is actua... Network Security Best Practices Network Security Protocols
MS-CHAP is dead While MS-CHAP has been used since 1998, it uses DES encryption which was deprecated in 2002. Attacks on MS-CHAP itself have been known since 2006, and those attacks have only gotten better over time. ... Network Security Best Practices Network Security Protocols
Client Case Study: Architecture A case study on how InkBridge Networks were able vastly improve the performance of a client’s RADIUS server, enabling them to move the system into production. Project description Our customer had inst... Network Security Best Practices
Accounting: Keeping track of it all We have already looked at authentication and authorization. In this third article, we’ll take a look at the accounting process, the process of monitoring and recording a client’s use of the network, a... Network Security Protocols
Network authentication protocols: compatibility between systems and methods In many network configurations, there will be some transactions for which the RADIUS server will not perform the authentication itself, but simply pass credentials to a third-party system and rely on ... Network Security Protocols
Authorization: Authorized personnel only The first article in our series described the authentication process, whereby the RADIUS server prevents unauthorized users from accessing the system. In today’s article, we’ll examine the second link...
Authentication: Is it really you? RADIUS security is composed of three components: authentication, authorization, and accounting. These three links in the RADIUS security chain are often referred to by their acronym, “AAA”. The first ... Network Security Protocols
802.1X FreeRADIUS setup Undertaking 802.1X setup is a daunting experience for many organizations. There are detailed requirements on end-user PCs, switches, servers, certificates, and more. If any of these requirements are n... Network Security Best Practices
Client Case Study: RADIUS Proxy A case study on how Network RADIUS were able to assist a client to increase the stability of their RADIUS proxy system. We were able to reuse common configuration, maintain existing capabilities and m...
FreeRADIUS v3.0.x packages now available Release packages are available for Debian, Ubuntu and CentOS 7. These packages are from the official “3.0.19” release, and will track all new versions of FreeRADIUS. The release packages are also inte... Network Security Protocols
RADIUS standards compliance We believe that standards compliance is critical for customer satisfaction and vendor interoperability. Systems that follow standards have known, documented behaviour, so there are few surprises. Our ... Network Security Protocols
How to configure a RADIUS server Even though clients may prefer to configure their own system, some clients are unsure of how to configure a RADIUS server. Although the process can be complex, clients can learn how to setup a RADIUS ... Network Security Best Practices