Why you should separate historical data from live data ISPs and telecoms are often legally required to keep user accounting data for long periods of time. However, keeping these records can result in enormous databases which then affect the performance of... Network Security Best Practices Network Security Protocols
Separating RADIUS Authentication and Accounting functionality Many ISP networks have Authentication and Accounting handled by the same databases. This configuration works for many situations, especially small and low-load systems. There are times, however, when ... Network Security Best Practices Network Security Protocols
Authorized users only: Why use RADIUS and 802.1x to control network access? RADIUS can be an alternative to implementing 802.1x for network access control in complex enterprise environments. Controlling which users and what devices are on your network has become significantly... Network Security Best Practices
Exposed: National Public Data breach makes a nation’s secrets public The hacking of 270 million social security numbers from National Public Data reinforces the best practice for personal data: always encrypt PII. The cat is out of the bag for National Public Data. In ... Network Security Best Practices
Expert Advice Beats Internet Wisdom: What Not To Do About BlastRADIUS There’s a lot of misinformation circulating about the BlastRADIUS vulnerability. For us, as RADIUS experts, it’s a depressing reminder of how little people understand about this foundational protocol ... Network Security Best Practices Network Security Protocols Security Threats and Vulnerabilities
RADIUS protocol and password compatibility In order for RADIUS authentication to work, user passwords need to be stored in a format that is understood by the authentication protocol used by the client. Unfortunately, not all protocols work wit... Network Security Best Practices Network Security Protocols
PAP vs CHAP. Is PAP less secure? One of the most common questions about RADIUS security asks “Is PAP secure?” The usual answer is “no”, which is (in our opinion) seriously misleading. A better answer is “Here’s a comparison of PAP an... Network Security Best Practices Network Security Protocols
Is PAP secure? A common misconception is that PAP is less secure than other authentication protocols such as CHAP, MS-CHAP, or EAP-MSCHAP(v2). This perception arises because of a misunderstanding of how PAP is actua... Network Security Best Practices Network Security Protocols
MS-CHAP is dead While MS-CHAP has been used since 1998, it uses DES encryption which was deprecated in 2002. Attacks on MS-CHAP itself have been known since 2006, and those attacks have only gotten better over time. ... Network Security Best Practices Network Security Protocols
Don't "Set it and Forget it" So you decided that whatever you were using for network security wasn’t getting the job done… Either it didn’t scale with the growth in your user base, devices, or network design, or it was hindering ... Network Security Best Practices Network Security Protocols
RADIUS WiFi: A guide to securing your business network When setting up a WiFi network at home, you typically set up an SSID and password, accept the defaults for any other options, and be done with it. (In some cases, these are done for you by your servic... Network Security Best Practices Network Security Protocols