This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
app-notes:coova-chilli-standalone [2015/04/16 07:47] – external edit 127.0.0.1 | app-notes:coova-chilli-standalone [2022/01/10 13:36] (current) – schmitt | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== |
+ | === What is chilli === | ||
+ | Chilli is running on the NetModule router and has three major interfaces: | ||
+ | * A downlink interface for accepting connections from clients - typicaly the WiFi interface | ||
+ | * A radius interface for authenticating clients -> Radius server runs on the back end | ||
+ | * An uplink network interface for forwarding traffic to other networks -> VPN tunnel to back end | ||
+ | === What is the difference beween Standalone and Backend === | ||
+ | In a **Standalone** scenario all software runs on the NetModule router and beside the internet connection no other functionality is needed. | ||
+ | In a **Backend** scenario there is additionaly functionality on an additional server. In a typical scenario the router is connected via bridged VPN (layer 2) to the backend server and all trafic is routed through the tunnel. The landing pages as well a radius server for user management are also running on the backend. | ||
===== Features ===== | ===== Features ===== | ||
- | ==== Standalone | + | ==== Standalone |
- | In Services-> | + | In Services-> |
With this Captive Portal every WLAN client need to accept the "terms of service" | With this Captive Portal every WLAN client need to accept the "terms of service" | ||
the internet will be granted. This feature is enabled by default on this patchimage. | the internet will be granted. This feature is enabled by default on this patchimage. | ||
Line 11: | Line 20: | ||
==== Download ==== | ==== Download ==== | ||
- | * [[ ftp:// | + | * [[ https:// |
===== Installation ===== | ===== Installation ===== | ||
- | The following section describes the steps you need to execute to have the Coova Chilli | + | The following section describes the steps you need to execute to have the CoovaChilli |
Please do not install this image if you are not connected directly via ethernet to the router. You will loose any remote access during the installation. | Please do not install this image if you are not connected directly via ethernet to the router. You will loose any remote access during the installation. | ||
- Visit the web manager and set your administration password | - Visit the web manager and set your administration password | ||
- | * After connecting your PC to the router via ethernt you should get an ip address from the 192.168.1.0/ | + | * After connecting your PC to the router via ethernt you should get an ip address from the 192.168.1.0/ |
- WWAN Link installation | - WWAN Link installation | ||
* Please configure your WWAN Connection according to the needs of your SIM Card. If this step is successfull you will see a steady Mob1 LED on the front of the router. | * Please configure your WWAN Connection according to the needs of your SIM Card. If this step is successfull you will see a steady Mob1 LED on the front of the router. | ||
Line 26: | Line 35: | ||
* Please connect to the WLAN " | * Please connect to the WLAN " | ||
- | {{ :coova1.png? | + | {{ :app-notes: |
- | {{ :coova2.png? | + | {{ :app-notes: |
Line 38: | Line 47: | ||
After you downloaded the example packe you can use it directly by uploading it with the with the | After you downloaded the example packe you can use it directly by uploading it with the with the | ||
" | " | ||
- | logo on the landing pages changed from the cooca chilli | + | logo on the landing pages changed from the CoovaChilli |
See Figure 4. | See Figure 4. | ||
==== Customize the example pages ==== | ==== Customize the example pages ==== | ||
Line 49: | Line 58: | ||
* terms.tmpl is the landing page it self, where the user have to accept the terms of service | * terms.tmpl is the landing page it self, where the user have to accept the terms of service | ||
* login_sucess.tmpl is the success page after accepting the terms of service and will redirect the user to the page requested at the beginning. | * login_sucess.tmpl is the success page after accepting the terms of service and will redirect the user to the page requested at the beginning. | ||
- | * logo.jpg is just an example image you can exchange this as you like. | + | * coova.jpg is just an example image you can exchange this as you like. |
Every page is basicly a html page with a few lines of javascript for the redirection. You can edit them | Every page is basicly a html page with a few lines of javascript for the redirection. You can edit them | ||
as you need. | as you need. | ||
Line 59: | Line 68: | ||
first. See 4. | first. See 4. | ||
- | {{ :coova3.png? | + | {{ :app-notes: |
- | {{ :coova4.png? | + | {{ :app-notes: |
+ | |||
+ | ==== Backend CoovaChilli Captive Portal ==== | ||
+ | |||
+ | How to set up a **Backend** server: | ||
+ | |||
+ | ===== Prerequisites ===== | ||
+ | |||
+ | * Debian 8 installation | ||
+ | * CoovaChilli installation on Router (Hotspot image) | ||
+ | * Freeradius Version 2.2.5 | ||
+ | |||
+ | ===== Install Freeradius ===== | ||
+ | |||
+ | |||
+ | '' | ||
+ | ====== Configure freeradius MySQL tables ====== | ||
+ | |||
+ | <code sql schema.sql> | ||
+ | ########################################################################### | ||
+ | # $Id: 70d8d07b56b44bf4129d7a512a5132ca67d6cd4c $ # | ||
+ | # # | ||
+ | # schema.sql | ||
+ | # # | ||
+ | # | ||
+ | # # | ||
+ | # To load: # | ||
+ | # mysql -uroot -prootpass radius < schema.sql | ||
+ | # # | ||
+ | # Mike Machado < | ||
+ | ########################################################################### | ||
+ | # | ||
+ | # Table structure for table ' | ||
+ | # | ||
+ | |||
+ | CREATE TABLE radacct ( | ||
+ | radacctid bigint(21) NOT NULL auto_increment, | ||
+ | acctsessionid varchar(64) NOT NULL default '', | ||
+ | acctuniqueid varchar(32) NOT NULL default '', | ||
+ | username varchar(64) NOT NULL default '', | ||
+ | groupname varchar(64) NOT NULL default '', | ||
+ | realm varchar(64) default '', | ||
+ | nasipaddress varchar(15) NOT NULL default '', | ||
+ | nasportid varchar(50) default NULL, | ||
+ | nasporttype varchar(32) default NULL, | ||
+ | acctstarttime datetime NULL default NULL, | ||
+ | acctupdatetime datetime NULL default NULL, | ||
+ | acctstoptime datetime NULL default NULL, | ||
+ | acctinterval int(12) default NULL, | ||
+ | acctsessiontime int(12) unsigned default NULL, | ||
+ | acctauthentic varchar(32) default NULL, | ||
+ | connectinfo_start varchar(50) default NULL, | ||
+ | connectinfo_stop varchar(50) default NULL, | ||
+ | acctinputoctets bigint(20) default NULL, | ||
+ | acctoutputoctets bigint(20) default NULL, | ||
+ | calledstationid varchar(50) NOT NULL default '', | ||
+ | callingstationid varchar(50) NOT NULL default '', | ||
+ | acctterminatecause varchar(32) NOT NULL default '', | ||
+ | servicetype varchar(32) default NULL, | ||
+ | framedprotocol varchar(32) default NULL, | ||
+ | framedipaddress varchar(15) NOT NULL default '', | ||
+ | acctstartdelay int(12) unsigned default NULL, | ||
+ | acctstopdelay int(12) unsigned default NULL, | ||
+ | xascendsessionsvrkey varchar(10) default NULL, | ||
+ | PRIMARY KEY (radacctid), | ||
+ | UNIQUE KEY acctuniqueid (acctuniqueid), | ||
+ | KEY username (username), | ||
+ | KEY framedipaddress (framedipaddress), | ||
+ | KEY acctsessionid (acctsessionid), | ||
+ | KEY acctsessiontime (acctsessiontime), | ||
+ | KEY acctstarttime (acctstarttime), | ||
+ | KEY acctinterval (acctinterval), | ||
+ | KEY acctstoptime (acctstoptime), | ||
+ | KEY nasipaddress (nasipaddress) | ||
+ | ) ENGINE = INNODB; | ||
+ | |||
+ | # | ||
+ | # Table structure for table ' | ||
+ | # | ||
+ | |||
+ | CREATE TABLE radcheck ( | ||
+ | id int(11) unsigned NOT NULL auto_increment, | ||
+ | username varchar(64) NOT NULL default '', | ||
+ | attribute varchar(64) | ||
+ | op char(2) NOT NULL DEFAULT ' | ||
+ | value varchar(253) NOT NULL default '', | ||
+ | PRIMARY KEY (id), | ||
+ | KEY username (username(32)) | ||
+ | ) ; | ||
+ | |||
+ | # | ||
+ | # Table structure for table ' | ||
+ | # | ||
+ | |||
+ | CREATE TABLE radgroupcheck ( | ||
+ | id int(11) unsigned NOT NULL auto_increment, | ||
+ | groupname varchar(64) NOT NULL default '', | ||
+ | attribute varchar(64) | ||
+ | op char(2) NOT NULL DEFAULT ' | ||
+ | value varchar(253) | ||
+ | PRIMARY KEY (id), | ||
+ | KEY groupname (groupname(32)) | ||
+ | ) ; | ||
+ | |||
+ | # | ||
+ | # Table structure for table ' | ||
+ | # | ||
+ | |||
+ | CREATE TABLE radgroupreply ( | ||
+ | id int(11) unsigned NOT NULL auto_increment, | ||
+ | groupname varchar(64) NOT NULL default '', | ||
+ | attribute varchar(64) | ||
+ | op char(2) NOT NULL DEFAULT ' | ||
+ | value varchar(253) | ||
+ | PRIMARY KEY (id), | ||
+ | KEY groupname (groupname(32)) | ||
+ | ) ; | ||
+ | |||
+ | # | ||
+ | # Table structure for table ' | ||
+ | # | ||
+ | |||
+ | CREATE TABLE radreply ( | ||
+ | id int(11) unsigned NOT NULL auto_increment, | ||
+ | username varchar(64) NOT NULL default '', | ||
+ | attribute varchar(64) NOT NULL default '', | ||
+ | op char(2) NOT NULL DEFAULT ' | ||
+ | value varchar(253) NOT NULL default '', | ||
+ | PRIMARY KEY (id), | ||
+ | KEY username (username(32)) | ||
+ | ) ; | ||
+ | |||
+ | |||
+ | # | ||
+ | # Table structure for table ' | ||
+ | # | ||
+ | |||
+ | CREATE TABLE radusergroup ( | ||
+ | username varchar(64) NOT NULL default '', | ||
+ | groupname varchar(64) NOT NULL default '', | ||
+ | priority int(11) NOT NULL default ' | ||
+ | KEY username (username(32)) | ||
+ | ) ; | ||
+ | |||
+ | # | ||
+ | # Table structure for table ' | ||
+ | # | ||
+ | |||
+ | CREATE TABLE radpostauth ( | ||
+ | id int(11) NOT NULL auto_increment, | ||
+ | username varchar(64) NOT NULL default '', | ||
+ | pass varchar(64) NOT NULL default '', | ||
+ | reply varchar(32) NOT NULL default '', | ||
+ | authdate timestamp NOT NULL, | ||
+ | PRIMARY KEY (id) | ||
+ | ) ENGINE = INNODB; | ||
+ | |||
+ | # | ||
+ | # Table structure for table ' | ||
+ | # | ||
+ | CREATE TABLE nas ( | ||
+ | id int(10) NOT NULL auto_increment, | ||
+ | nasname varchar(128) NOT NULL, | ||
+ | shortname varchar(32), | ||
+ | type varchar(30) DEFAULT ' | ||
+ | ports int(5), | ||
+ | secret varchar(60) DEFAULT ' | ||
+ | server varchar(64), | ||
+ | community varchar(50), | ||
+ | description varchar(200) DEFAULT ' | ||
+ | PRIMARY KEY (id), | ||
+ | KEY nasname (nasname) | ||
+ | ); | ||
+ | |||
+ | </ | ||
+ | |||
+ | Create radius database | ||
+ | '' | ||
+ | |||
+ | Generate database tables using MySQL schema: | ||
+ | '' | ||
+ | |||
+ | Create MySQL radius user and set privileges on radius database: | ||
+ | '' | ||
+ | GRANT ALL PRIVILEGES ON radius.* to [FREERADIUS_DB_USER]@localhost IDENTIFIED by ' | ||
+ | |||
+ | |||
+ | ====== Configure Freeradius | ||
+ | Configure the SQL radius module: | ||
+ | |||
+ | <code c sql.conf> | ||
+ | # -*- text -*- | ||
+ | ## | ||
+ | ## sql.conf -- SQL modules | ||
+ | ## | ||
+ | ## $Id: 6f346ec9f1d12190f132da20537f99607df71760 $ | ||
+ | |||
+ | ###################################################################### | ||
+ | # | ||
+ | # Configuration for the SQL module | ||
+ | # | ||
+ | # The database schemas and queries are located in subdirectories: | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # Where " | ||
+ | # | ||
+ | |||
+ | sql { | ||
+ | # | ||
+ | # Set the database to one of: | ||
+ | # | ||
+ | # mysql, mssql, oracle, postgresql | ||
+ | # | ||
+ | database = " | ||
+ | |||
+ | # | ||
+ | # Which FreeRADIUS driver to use. | ||
+ | # | ||
+ | driver = " | ||
+ | |||
+ | # Connection info: | ||
+ | server = " | ||
+ | port = 3306 | ||
+ | login = " | ||
+ | password = " | ||
+ | |||
+ | # Database table configuration for everything except Oracle | ||
+ | radius_db = " | ||
+ | # If you are using Oracle then use this instead | ||
+ | # radius_db = " | ||
+ | |||
+ | # If you want both stop and start records logged to the | ||
+ | # same SQL table, leave this as is. If you want them in | ||
+ | # different tables, put the start table in acct_table1 | ||
+ | # and stop table in acct_table2 | ||
+ | acct_table1 = " | ||
+ | acct_table2 = " | ||
+ | |||
+ | # Allow for storing data after authentication | ||
+ | postauth_table = " | ||
+ | |||
+ | authcheck_table = " | ||
+ | authreply_table = " | ||
+ | |||
+ | groupcheck_table = " | ||
+ | groupreply_table = " | ||
+ | |||
+ | # Table to keep group info | ||
+ | usergroup_table = " | ||
+ | |||
+ | # If set to ' | ||
+ | # If set to ' | ||
+ | # read_groups = yes | ||
+ | |||
+ | # Remove stale session if checkrad does not see a double login | ||
+ | deletestalesessions = yes | ||
+ | |||
+ | # Print all SQL statements when in debug mode (-x) | ||
+ | sqltrace = no | ||
+ | sqltracefile = ${logdir}/ | ||
+ | |||
+ | # number of sql connections to make to server | ||
+ | # | ||
+ | # Setting this to LESS than the number of threads means | ||
+ | # that some threads may starve, and you will see errors | ||
+ | # like "No connections available and at max connection limit" | ||
+ | # | ||
+ | # Setting this to MORE than the number of threads means | ||
+ | # that there are more connections than necessary. | ||
+ | # | ||
+ | num_sql_socks = ${thread[pool].max_servers} | ||
+ | |||
+ | # number of seconds to dely retrying on a failed database | ||
+ | # connection (per_socket) | ||
+ | connect_failure_retry_delay = 60 | ||
+ | |||
+ | # lifetime of an SQL socket. | ||
+ | # such as TCP sessions expiring, you may need to set the socket | ||
+ | # lifetime. | ||
+ | # closed " | ||
+ | lifetime = 0 | ||
+ | |||
+ | # Maximum number of queries used by an SQL socket. | ||
+ | # having issues with SQL sockets lasting "too long", you can | ||
+ | # limit the number of queries performed over one socket. | ||
+ | # " | ||
+ | max_queries = 0 | ||
+ | |||
+ | # Set to ' | ||
+ | # Clients will ONLY be read on server startup. | ||
+ | # and security reasons, finding clients via SQL queries CANNOT | ||
+ | # be done " | ||
+ | # | ||
+ | readclients = yes | ||
+ | |||
+ | # Table to keep radius client info | ||
+ | nas_table = " | ||
+ | |||
+ | # Read driver-specific configuration | ||
+ | $INCLUDE sql/ | ||
+ | } | ||
+ | |||
+ | </ | ||
+ | |||
+ | |||
+ | Uncomment and or change the following parameters: | ||
+ | '' | ||
+ | server = " | ||
+ | port = 3306 | ||
+ | login = " | ||
+ | password = " | ||
+ | readclients = yes'' | ||
+ | |||
+ | Add chillispot SQL counters: | ||
+ | <code sql counter.conf> | ||
+ | # -*- text -*- | ||
+ | ## | ||
+ | ## counter.conf -- PostgreSQL queries for rlm_sqlcounter | ||
+ | ## | ||
+ | ## $Id: a327819efb27c5342579ebb310aa47e9c4ade5d6 $ | ||
+ | |||
+ | # Rather than maintaining seperate (GDBM) databases of | ||
+ | # accounting info for each counter, this module uses the data | ||
+ | # stored in the raddacct table by the sql modules. This | ||
+ | # module NEVER does any database INSERTs or UPDATEs. | ||
+ | # totally dependent on the SQL module to process Accounting | ||
+ | # packets. | ||
+ | # | ||
+ | # The ' | ||
+ | # module to use when querying the SQL database. Normally it | ||
+ | # is just " | ||
+ | # instance (usually for failover situations), | ||
+ | # specify which module has access to the Accounting Data | ||
+ | # (radacct table). | ||
+ | # | ||
+ | # The ' | ||
+ | # reset to zero. It can be hourly, daily, weekly, monthly or | ||
+ | # never. | ||
+ | # form: | ||
+ | # num[hdwm] where: | ||
+ | # h: hours, d: days, w: weeks, m: months | ||
+ | # If the letter is ommited days will be assumed. In example: | ||
+ | # reset = 10h (reset every 10 hours) | ||
+ | # reset = 12 (reset every 12 days) | ||
+ | # | ||
+ | # The ' | ||
+ | # counter records (usually ' | ||
+ | # | ||
+ | # The ' | ||
+ | # the current Counter value from the database. There are 3 | ||
+ | # parameters that can be used in the query: | ||
+ | # | ||
+ | # %b unix time value of beginning of reset period | ||
+ | # %e unix time value of end of reset period | ||
+ | # | ||
+ | # The ' | ||
+ | # attribute to use to access the counter in the ' | ||
+ | # or SQL radcheck or radcheckgroup tables. | ||
+ | # | ||
+ | # DEFAULT | ||
+ | # Reply-Message = " | ||
+ | # | ||
+ | sqlcounter dailycounter { | ||
+ | counter-name = Daily-Session-Time | ||
+ | check-name = Max-Daily-Session | ||
+ | reply-name = Session-Timeout | ||
+ | sqlmod-inst = sql | ||
+ | key = User-Name | ||
+ | reset = daily | ||
+ | |||
+ | # This query properly handles calls that span from the | ||
+ | # previous reset period into the current period but | ||
+ | # involves more work for the SQL server than those | ||
+ | # below | ||
+ | query = " | ||
+ | | ||
+ | FROM radacct WHERE username = ' | ||
+ | | ||
+ | |||
+ | # This query ignores calls that started in a previous | ||
+ | # reset period and continue into into this one. But it | ||
+ | # is a little easier on the SQL server | ||
+ | # query = " | ||
+ | # username = ' | ||
+ | |||
+ | # This query is the same as above, but demonstrates an | ||
+ | # additional counter parameter ' | ||
+ | # timestamp for the end of the period | ||
+ | # query = " | ||
+ | # WHERE username = ' | ||
+ | # FROM_UNIXTIME(' | ||
+ | } | ||
+ | |||
+ | sqlcounter monthlycounter { | ||
+ | counter-name = Monthly-Session-Time | ||
+ | check-name = Max-Monthly-Session | ||
+ | reply-name = Session-Timeout | ||
+ | sqlmod-inst = sql | ||
+ | key = User-Name | ||
+ | reset = monthly | ||
+ | |||
+ | # This query properly handles calls that span from the | ||
+ | # previous reset period into the current period but | ||
+ | # involves more work for the SQL server than those | ||
+ | # below | ||
+ | query = " | ||
+ | | ||
+ | FROM radacct WHERE username=' | ||
+ | | ||
+ | |||
+ | # This query ignores calls that started in a previous | ||
+ | # reset period and continue into into this one. But it | ||
+ | # is a little easier on the SQL server | ||
+ | # query = " | ||
+ | # username=' | ||
+ | |||
+ | # This query is the same as above, but demonstrates an | ||
+ | # additional counter parameter ' | ||
+ | # timestamp for the end of the period | ||
+ | # query = " | ||
+ | # WHERE username=' | ||
+ | # FROM_UNIXTIME(' | ||
+ | } | ||
+ | |||
+ | sqlcounter noresetcounter { | ||
+ | counter-name = Max-All-Session-Time | ||
+ | check-name = Max-All-Session | ||
+ | sqlmod-inst = sql | ||
+ | key = User-Name | ||
+ | reset = never | ||
+ | query = " | ||
+ | } | ||
+ | |||
+ | sqlcounter chillispot_max_bytes { | ||
+ | counter-name = Max-Total-Octets | ||
+ | check-name = ChilliSpot-Max-Total-Octets | ||
+ | reply-name = ChilliSpot-Max-Total-Octets | ||
+ | reply-message = "You have reached your bandwidth limit" | ||
+ | sqlmod-inst = sql | ||
+ | key = User-Name | ||
+ | reset = never | ||
+ | query = " | ||
+ | } | ||
+ | |||
+ | </ | ||
+ | |||
+ | '' | ||
+ | |||
+ | Add this lines at the end of the above file: | ||
+ | |||
+ | < | ||
+ | counter-name = Max-Total-Octets | ||
+ | check-name = ChilliSpot-Max-Total-Octets | ||
+ | reply-name = ChilliSpot-Max-Total-Octets | ||
+ | reply-message = "You have reached your bandwidth limit" | ||
+ | sqlmod-inst = sql | ||
+ | key = User-Name | ||
+ | reset = never | ||
+ | query = " | ||
+ | } | ||
+ | </ | ||
+ | |||
+ | |||
+ | ====== Configure radius clients ====== | ||
+ | |||
+ | <code c clients.conf> | ||
+ | # -*- text -*- | ||
+ | ## | ||
+ | ## clients.conf -- client configuration directives | ||
+ | ## | ||
+ | ## $Id: 729c15d3e84c6cdb54a5f3652d93a2d7f8725fd4 $ | ||
+ | |||
+ | ####################################################################### | ||
+ | # | ||
+ | # Define RADIUS clients (usually a NAS, Access Point, etc.). | ||
+ | |||
+ | # | ||
+ | # Defines a RADIUS client. | ||
+ | # | ||
+ | # ' | ||
+ | # to allow testing of the server after an initial installation. | ||
+ | # are not going to be permitting RADIUS queries from localhost, we suggest | ||
+ | # that you delete, or comment out, this entry. | ||
+ | # | ||
+ | # | ||
+ | |||
+ | # | ||
+ | # Each client has a "short name" that is used to distinguish it from | ||
+ | # other clients. | ||
+ | # | ||
+ | # In version 1.x, the string after the word " | ||
+ | # address of the client. | ||
+ | # the " | ||
+ | # format is still accepted. | ||
+ | # | ||
+ | client localhost { | ||
+ | # Allowed values are: | ||
+ | # dotted quad (1.2.3.4) | ||
+ | # | ||
+ | ipaddr = 127.0.0.1 | ||
+ | |||
+ | # OR, you can use an IPv6 address, but not both | ||
+ | # at the same time. | ||
+ | # ipv6addr = :: # any. ::1 == localhost | ||
+ | |||
+ | # | ||
+ | # A note on DNS: We STRONGLY recommend using IP addresses | ||
+ | # rather than host names. | ||
+ | # server will do DNS lookups when it starts, making it | ||
+ | # dependent on DNS. i.e. If anything goes wrong with DNS, | ||
+ | # the server won't start! | ||
+ | # | ||
+ | # The server also looks up the IP address from DNS once, and | ||
+ | # only once, when it starts. | ||
+ | # updated, the server WILL NOT see that update. | ||
+ | # | ||
+ | |||
+ | # One client definition can be applied to an entire network. | ||
+ | # e.g. 127/8 should be defined with " | ||
+ | # " | ||
+ | # | ||
+ | # If not specified, the default netmask is 32 (i.e. /32) | ||
+ | # | ||
+ | # We do NOT recommend using anything other than 32. There | ||
+ | # are usually other, better ways to achieve the same goal. | ||
+ | # Using netmasks of other than 32 can cause security issues. | ||
+ | # | ||
+ | # You can specify overlapping networks (127/8 and 127.0/16) | ||
+ | # In that case, the smallest possible network will be used | ||
+ | # as the "best match" for the client. | ||
+ | # | ||
+ | # Clients can also be defined dynamically at run time, based | ||
+ | # on any criteria. | ||
+ | # etc. | ||
+ | # See raddb/ | ||
+ | # | ||
+ | |||
+ | # netmask = 32 | ||
+ | |||
+ | # | ||
+ | # The shared secret use to " | ||
+ | # the NAS and FreeRADIUS. | ||
+ | # default, otherwise it's not a secret any more! | ||
+ | # | ||
+ | # The secret can be any string, up to 8k characters in length. | ||
+ | # | ||
+ | # Control codes can be entered vi octal encoding, | ||
+ | # e.g. " | ||
+ | # Quotation marks can be entered by escaping them, | ||
+ | # e.g. " | ||
+ | # | ||
+ | # A note on security: | ||
+ | # depends COMPLETELY on this secret! | ||
+ | # shared secret that is composed of: | ||
+ | # | ||
+ | # upper case letters | ||
+ | # lower case letters | ||
+ | # | ||
+ | # | ||
+ | # And is at LEAST 8 characters long, preferably 16 characters in | ||
+ | # length. | ||
+ | # phrase, or anything else that is recognizable. | ||
+ | # | ||
+ | # The default secret below is only for testing, and should | ||
+ | # not be used in any real environment. | ||
+ | # | ||
+ | secret = test12345678 | ||
+ | |||
+ | # | ||
+ | # Old-style clients do not send a Message-Authenticator | ||
+ | # in an Access-Request. | ||
+ | # SHOULD include it in an Access-Request. | ||
+ | # item below allows the server to require it. If a client | ||
+ | # is required to include a Message-Authenticator and it does | ||
+ | # not, then the packet will be silently discarded. | ||
+ | # | ||
+ | # allowed values: yes, no | ||
+ | require_message_authenticator = no | ||
+ | |||
+ | # | ||
+ | # The short name is used as an alias for the fully qualified | ||
+ | # domain name, or the IP address. | ||
+ | # | ||
+ | # It is accepted for compatibility with 1.x, but it is no | ||
+ | # longer necessary in 2.0 | ||
+ | # | ||
+ | # | ||
+ | |||
+ | # | ||
+ | # the following three fields are optional, but may be used by | ||
+ | # checkrad.pl for simultaneous use checks | ||
+ | # | ||
+ | |||
+ | # | ||
+ | # The nastype tells ' | ||
+ | # use to query the NAS for simultaneous use. | ||
+ | # | ||
+ | # Permitted NAS types are: | ||
+ | # | ||
+ | # cisco | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # patton | ||
+ | # | ||
+ | # tc | ||
+ | # | ||
+ | # other # for all other types | ||
+ | |||
+ | # | ||
+ | nastype | ||
+ | |||
+ | # | ||
+ | # The following two configurations are for future use. | ||
+ | # The ' | ||
+ | # login name and password, which is used by checkrad.pl | ||
+ | # when querying the NAS for simultaneous use. | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | |||
+ | # | ||
+ | # As of 2.0, clients can also be tied to a virtual server. | ||
+ | # This is done by setting the " | ||
+ | # item, as in the example below. | ||
+ | # | ||
+ | # | ||
+ | |||
+ | # | ||
+ | # A pointer to the " | ||
+ | # section that contains the CoA configuration for this | ||
+ | # client. | ||
+ | # see raddb/ | ||
+ | # | ||
+ | } | ||
+ | |||
+ | # IPv6 Client | ||
+ | #client ::1 { | ||
+ | # secret = testing123 | ||
+ | # | ||
+ | #} | ||
+ | # | ||
+ | # All IPv6 Site-local clients | ||
+ | #client fe80::/16 { | ||
+ | # secret = testing123 | ||
+ | # | ||
+ | #} | ||
+ | |||
+ | #client some.host.org { | ||
+ | # secret = testing123 | ||
+ | # | ||
+ | #} | ||
+ | |||
+ | # | ||
+ | # You can now specify one secret for a network of clients. | ||
+ | # When a client request comes in, the BEST match is chosen. | ||
+ | # i.e. The entry from the smallest possible network. | ||
+ | # | ||
+ | #client 192.168.0.0/ | ||
+ | # secret = testing123-1 | ||
+ | # | ||
+ | #} | ||
+ | # | ||
+ | #client 192.168.0.0/ | ||
+ | # secret = testing123-2 | ||
+ | # | ||
+ | #} | ||
+ | |||
+ | |||
+ | #client 10.10.10.10 { | ||
+ | # # secret and password are mapped through the " | ||
+ | # | ||
+ | # | ||
+ | # # the following three fields are optional, but may be used by | ||
+ | # # checkrad.pl for simultaneous usage checks | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | #} | ||
+ | |||
+ | ####################################################################### | ||
+ | # | ||
+ | # Per-socket client lists. | ||
+ | # the same as above, but they are nested inside of a section. | ||
+ | # | ||
+ | # You can have as many per-socket client lists as you have " | ||
+ | # sections, or you can re-use a list among multiple " | ||
+ | # | ||
+ | # Un-comment this section, and edit a " | ||
+ | # " | ||
+ | # will then accept ONLY the clients listed in this section. | ||
+ | # | ||
+ | #clients per_socket_clients { | ||
+ | # client 192.168.3.4 { | ||
+ | # secret = testing123 | ||
+ | # } | ||
+ | #} | ||
+ | |||
+ | client 192.168.1.0/ | ||
+ | secret = [SECRET] | ||
+ | nastype | ||
+ | } | ||
+ | |||
+ | </ | ||
+ | |||
+ | Change the password to the password used above for FreeRadius MySQL database: | ||
+ | '' | ||
+ | |||
+ | or create new client: | ||
+ | |||
+ | < | ||
+ | # example for clients with net address 192.168.1.0/ | ||
+ | client 192.168.1.0/ | ||
+ | secret | ||
+ | nastype | ||
+ | } | ||
+ | </ | ||
+ | |||
+ | Configure radius server: | ||
+ | |||
+ | <code c radiusd.conf> | ||
+ | # -*- text -*- | ||
+ | ## | ||
+ | ## radiusd.conf -- FreeRADIUS server configuration file. | ||
+ | ## | ||
+ | ## | ||
+ | ## $Id: 201b70b31b5bb4c2ef98c102690daa3462d5e1e3 $ | ||
+ | ## | ||
+ | |||
+ | ###################################################################### | ||
+ | # | ||
+ | # Read "man radiusd" | ||
+ | # titled DEBUGGING. | ||
+ | # obtain the configuration you want, without running into | ||
+ | # | ||
+ | # | ||
+ | # Run the server in debugging mode, and READ the output. | ||
+ | # | ||
+ | # $ radiusd -X | ||
+ | # | ||
+ | # We cannot emphasize this point strongly enough. | ||
+ | # majority of problems can be solved by carefully reading the | ||
+ | # debugging output, which includes warnings about common issues, | ||
+ | # and suggestions for how they may be fixed. | ||
+ | # | ||
+ | # There may be a lot of output, but look carefully for words like: | ||
+ | # | ||
+ | # will usually be enough to guide you to a solution. | ||
+ | # | ||
+ | # If you are going to ask a question on the mailing list, then | ||
+ | # explain what you are trying to do, and include the output from | ||
+ | # debugging mode (radiusd -X). Failure to do so means that all | ||
+ | # of the responses to your question will be people telling you | ||
+ | # to "post the output of radiusd -X". | ||
+ | |||
+ | ###################################################################### | ||
+ | # | ||
+ | # The location of other config files and logfiles are declared | ||
+ | # in this file. | ||
+ | # | ||
+ | # Also general configuration for modules can be done in this | ||
+ | # file, it is exported through the API to modules that ask for | ||
+ | # it. | ||
+ | # | ||
+ | # See "man radiusd.conf" | ||
+ | # | ||
+ | # | ||
+ | # in the comments. | ||
+ | # | ||
+ | # As of 2.0.0, FreeRADIUS supports a simple processing language | ||
+ | # in the " | ||
+ | # See "man unlang" | ||
+ | # | ||
+ | |||
+ | prefix = /usr | ||
+ | exec_prefix = /usr | ||
+ | sysconfdir = /etc | ||
+ | localstatedir = /var | ||
+ | sbindir = ${exec_prefix}/ | ||
+ | logdir = / | ||
+ | raddbdir = / | ||
+ | radacctdir = ${logdir}/ | ||
+ | |||
+ | # | ||
+ | # name of the running server. | ||
+ | name = freeradius | ||
+ | |||
+ | # Location of config and logfiles. | ||
+ | confdir = ${raddbdir} | ||
+ | run_dir = ${localstatedir}/ | ||
+ | |||
+ | # Should likely be ${localstatedir}/ | ||
+ | db_dir = ${raddbdir} | ||
+ | |||
+ | # | ||
+ | # libdir: Where to find the rlm_* modules. | ||
+ | # | ||
+ | # This should be automatically set at configuration time. | ||
+ | # | ||
+ | # If the server builds and installs, but fails at execution time | ||
+ | # with an ' | ||
+ | # | ||
+ | # | ||
+ | # The cause is usually that a library has been installed on your | ||
+ | # | ||
+ | # | ||
+ | # be set up to allow the dynamic linker to find the library. | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # To work around the problem, find out which library contains that symbol, | ||
+ | # and add the directory containing that library to the end of ' | ||
+ | # with a colon separating the directory names. | ||
+ | # | ||
+ | # e.g. libdir = / | ||
+ | # | ||
+ | # You can also try setting the LD_LIBRARY_PATH environment variable | ||
+ | # in a script which starts the server. | ||
+ | # | ||
+ | # If that does not work, then you can re-configure and re-build the | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # make | ||
+ | # make install | ||
+ | # | ||
+ | libdir = / | ||
+ | |||
+ | # pidfile: Where to place the PID of the RADIUS server. | ||
+ | # | ||
+ | # The server may be signalled while it's running by using this | ||
+ | # file. | ||
+ | # | ||
+ | # This file is written when ONLY running in daemon mode. | ||
+ | # | ||
+ | # e.g.: kill -HUP `cat / | ||
+ | # | ||
+ | pidfile = ${run_dir}/ | ||
+ | |||
+ | # chroot: directory where the server does " | ||
+ | # | ||
+ | # The chroot is done very early in the process of starting the server. | ||
+ | # After the chroot has been performed it switches to the " | ||
+ | # below (which MUST be specified). | ||
+ | # to that group, too. Any other groups listed for the specified " | ||
+ | # in "/ | ||
+ | # | ||
+ | # The current working directory (chdir / cd) is left *outside* of the | ||
+ | # chroot until all of the modules have been initialized. | ||
+ | # the " | ||
+ | # modules have been initialized, | ||
+ | # means that it should be impossible to break out of the chroot. | ||
+ | # | ||
+ | # If you are worried about security issues related to this use of chdir, | ||
+ | # then simply ensure that the " | ||
+ | # end be sure to do "cd raddb" BEFORE starting the server. | ||
+ | # | ||
+ | # If the server is statically linked, then the only files that have | ||
+ | # to exist in the chroot are ${run_dir} and ${logdir}. | ||
+ | # "cd raddb" as discussed above, then the " | ||
+ | # inside of the chroot directory, too. | ||
+ | # | ||
+ | #chroot = / | ||
+ | |||
+ | # user/group: The name (or #number) of the user/group to run radiusd as. | ||
+ | # | ||
+ | # If these are commented out, the server will run as the user/ | ||
+ | # that started it. In order to change to a different user/group, you | ||
+ | # MUST be root ( or have root privleges ) to start the server. | ||
+ | # | ||
+ | # We STRONGLY recommend that you run the server with as few permissions | ||
+ | # as possible. | ||
+ | # user and group items below should be set to radius' | ||
+ | # | ||
+ | # NOTE that some kernels refuse to setgid(group) when the value of | ||
+ | # (unsigned)group is above 60000; don't use group nobody on these systems! | ||
+ | # | ||
+ | # On systems with shadow passwords, you might have to set 'group = shadow' | ||
+ | # for the server to be able to read the shadow password file. If you can | ||
+ | # authenticate users while in debug mode, but not in daemon mode, it may be | ||
+ | # that the debugging mode server is running as a user that can read the | ||
+ | # shadow info, and the user listed below can not. | ||
+ | # | ||
+ | # The server will also try to use " | ||
+ | # It will join all groups where " | ||
+ | # for some finer-grained access controls. | ||
+ | # | ||
+ | user = radiusd | ||
+ | group = radiusd | ||
+ | |||
+ | # panic_action: | ||
+ | # | ||
+ | # FOR PRODUCTION SYSTEMS, ACTIONS SHOULD ALWAYS EXIT. | ||
+ | # AN INTERACTIVE ACTION MEANS THE SERVER IS NOT RESPONDING TO REQUESTS. | ||
+ | # AN INTERACTICE ACTION MEANS THE SERVER WILL NOT RESTART. | ||
+ | # | ||
+ | # The panic action is a command which will be executed if the server | ||
+ | # receives a fatal, non user generated signal, i.e. SIGSEGV, SIGBUS, | ||
+ | # SIGABRT or SIGFPE. | ||
+ | # | ||
+ | # This can be used to start an interactive debugging session so | ||
+ | # that information regarding the current state of the server can | ||
+ | # be acquired. | ||
+ | # | ||
+ | # The following string substitutions are available: | ||
+ | # - %e The currently executing program e.g. / | ||
+ | # - %p The PID of the currently executing program e.g. 12345 | ||
+ | # | ||
+ | # Standard ${} substitutions are also allowed. | ||
+ | # | ||
+ | # An example panic action for opening an interactive session in GDB would be: | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # Again, don't use that on a production system. | ||
+ | # | ||
+ | # An example panic action for opening an automated session in GDB would be: | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # That command can be used on a production system. | ||
+ | # | ||
+ | |||
+ | # max_request_time: | ||
+ | # | ||
+ | # Requests which take more time than this to process may be killed, and | ||
+ | # a REJECT message is returned. | ||
+ | # | ||
+ | # WARNING: If you notice that requests take a long time to be handled, | ||
+ | # then this MAY INDICATE a bug in the server, in one of the modules | ||
+ | # used to handle a request, OR in your local configuration. | ||
+ | # | ||
+ | # This problem is most often seen when using an SQL database. | ||
+ | # more than a second or two to receive an answer from the SQL database, | ||
+ | # then it probably means that you haven' | ||
+ | # SQL server documentation for more information. | ||
+ | # | ||
+ | # Useful range of values: 5 to 120 | ||
+ | # | ||
+ | max_request_time = 30 | ||
+ | |||
+ | # cleanup_delay: | ||
+ | # a reply which was sent to the NAS. | ||
+ | # | ||
+ | # The RADIUS request is normally cached internally for a short period | ||
+ | # of time, after the reply is sent to the NAS. The reply packet may be | ||
+ | # lost in the network, and the NAS will not see it. The NAS will then | ||
+ | # re-send the request, and the server will respond quickly with the | ||
+ | # cached reply. | ||
+ | # | ||
+ | # If this value is set too low, then duplicate requests from the NAS | ||
+ | # MAY NOT be detected, and will instead be handled as seperate requests. | ||
+ | # | ||
+ | # If this value is set too high, then the server will cache too many | ||
+ | # requests, and some new requests may get blocked. | ||
+ | # | ||
+ | # Useful range of values: 2 to 10 | ||
+ | # | ||
+ | cleanup_delay = 5 | ||
+ | |||
+ | # max_requests: | ||
+ | # track of. This should be 256 multiplied by the number of clients. | ||
+ | # e.g. With 4 clients, this number should be 1024. | ||
+ | # | ||
+ | # If this number is too low, then when the server becomes busy, | ||
+ | # it will not respond to any new requests, until the ' | ||
+ | # time has passed, and it has removed the old requests. | ||
+ | # | ||
+ | # If this number is set too high, then the server will use a bit more | ||
+ | # memory for no real benefit. | ||
+ | # | ||
+ | # If you aren't sure what it should be set to, it's better to set it | ||
+ | # too high than too low. Setting it to 1000 per client is probably | ||
+ | # the highest it should be. | ||
+ | # | ||
+ | # Useful range of values: 256 to infinity | ||
+ | # | ||
+ | max_requests = 1024 | ||
+ | |||
+ | # listen: Make the server listen on a particular IP address, and send | ||
+ | # replies out from that address. This directive is most useful for | ||
+ | # hosts with multiple IP addresses on one interface. | ||
+ | # | ||
+ | # If you want the server to listen on additional addresses, or on | ||
+ | # additionnal ports, you can use multiple " | ||
+ | # | ||
+ | # Each section make the server listen for only one type of packet, | ||
+ | # therefore authentication and accounting have to be configured in | ||
+ | # different sections. | ||
+ | # | ||
+ | # The server ignore all " | ||
+ | # on the command line. | ||
+ | # | ||
+ | listen { | ||
+ | # Type of packets to listen for. | ||
+ | # Allowed values are: | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # see raddb/ | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | type = auth | ||
+ | |||
+ | # Note: "type = proxy" lets you control the source IP used for | ||
+ | # proxying packets, with some limitations: | ||
+ | # | ||
+ | # * A proxy listener CANNOT be used in a virtual server section. | ||
+ | # * You should probably set "port = 0". | ||
+ | # * Any " | ||
+ | # | ||
+ | # See also proxy.conf, and the " | ||
+ | # in the sample " | ||
+ | # source IP address for packets sent to a home server, the | ||
+ | # proxy listeners are automatically created. | ||
+ | |||
+ | # IP address on which to listen. | ||
+ | # Allowed values are: | ||
+ | # dotted quad (1.2.3.4) | ||
+ | # | ||
+ | # | ||
+ | ipaddr = * | ||
+ | |||
+ | # OR, you can use an IPv6 address, but not both | ||
+ | # at the same time. | ||
+ | # ipv6addr = :: # any. ::1 == localhost | ||
+ | |||
+ | # Port on which to listen. | ||
+ | # Allowed values are: | ||
+ | # integer port number (1812) | ||
+ | # 0 means "use / | ||
+ | port = 0 | ||
+ | |||
+ | # Some systems support binding to an interface, in addition | ||
+ | # to the IP address. | ||
+ | # but for sites with many IP addresses on one interface, | ||
+ | # it's useful to say " | ||
+ | # | ||
+ | # If your system does not support this feature, you will | ||
+ | # get an error if you try to use it. | ||
+ | # | ||
+ | # interface = eth0 | ||
+ | |||
+ | # Per-socket lists of clients. | ||
+ | # | ||
+ | # The name here is a reference to a section elsewhere in | ||
+ | # radiusd.conf, | ||
+ | # a reference allows multiple sockets to use the same | ||
+ | # set of clients. | ||
+ | # | ||
+ | # If this configuration is used, then the global list of clients | ||
+ | # is IGNORED for this " | ||
+ | # this feature, to ensure you don't accidentally disable a | ||
+ | # client you need. | ||
+ | # | ||
+ | # See clients.conf for the configuration of " | ||
+ | # | ||
+ | # clients = per_socket_clients | ||
+ | } | ||
+ | |||
+ | # This second " | ||
+ | # port, too. | ||
+ | # | ||
+ | listen { | ||
+ | ipaddr = * | ||
+ | # ipv6addr = :: | ||
+ | port = 0 | ||
+ | type = acct | ||
+ | # interface = eth0 | ||
+ | # clients = per_socket_clients | ||
+ | } | ||
+ | |||
+ | # hostname_lookups: | ||
+ | # e.g., www.freeradius.org (on) or 206.47.27.232 (off). | ||
+ | # | ||
+ | # The default is ' | ||
+ | # if people had to knowingly turn this feature on, since enabling it | ||
+ | # means that each client request will result in AT LEAST one lookup | ||
+ | # request to the nameserver. | ||
+ | # mean that your server may stop randomly for 30 seconds from time | ||
+ | # to time, if the DNS requests take too long. | ||
+ | # | ||
+ | # Turning hostname lookups off also means that the server won't block | ||
+ | # for 30 seconds, if it sees an IP address which has no name associated | ||
+ | # with it. | ||
+ | # | ||
+ | # allowed values: {no, yes} | ||
+ | # | ||
+ | hostname_lookups = no | ||
+ | |||
+ | # Core dumps are a bad thing. | ||
+ | # if you're debugging a problem with the server. | ||
+ | # | ||
+ | # allowed values: {no, yes} | ||
+ | # | ||
+ | allow_core_dumps = no | ||
+ | |||
+ | # Regular expressions | ||
+ | # | ||
+ | # These items are set at configure time. If they' | ||
+ | # then setting them to " | ||
+ | # | ||
+ | # If they' | ||
+ | # WILL NOT WORK. It will give you an error. | ||
+ | # | ||
+ | regular_expressions = yes | ||
+ | extended_expressions = yes | ||
+ | |||
+ | # | ||
+ | # Logging section. | ||
+ | # will eventually be moved here. | ||
+ | # | ||
+ | log { | ||
+ | # | ||
+ | # Destination for log messages. | ||
+ | # | ||
+ | # files - log to " | ||
+ | # syslog - to syslog (see also the " | ||
+ | # stdout - standard output | ||
+ | # stderr - standard error. | ||
+ | # | ||
+ | # The command-line option " | ||
+ | # logging to go to stdout. | ||
+ | # | ||
+ | destination = files | ||
+ | |||
+ | # | ||
+ | # The logging messages for the server are appended to the | ||
+ | # tail of this file if destination == " | ||
+ | # | ||
+ | # If the server is running in debugging mode, this file is | ||
+ | # NOT used. | ||
+ | # | ||
+ | file = ${logdir}/ | ||
+ | |||
+ | # | ||
+ | # If this configuration parameter is set, then log messages for | ||
+ | # a *request* go to this file, rather than to radius.log. | ||
+ | # | ||
+ | # i.e. This is a log file per request, once the server has accepted | ||
+ | # the request as being from a valid client. | ||
+ | # not associated with a request still go to radius.log. | ||
+ | # | ||
+ | # Not all log messages in the server core have been updated to use | ||
+ | # this new internal API. As a result, some messages will still | ||
+ | # go to radius.log. | ||
+ | # | ||
+ | # The file name is expanded dynamically. | ||
+ | # server-side attributes for the filename (e.g. things you control). | ||
+ | # Using this feature MAY also slow down the server substantially, | ||
+ | # especially if you do thinks like SQL calls as part of the | ||
+ | # expansion of the filename. | ||
+ | # | ||
+ | # The name of the log file should use attributes that don't change | ||
+ | # over the lifetime of a request, such as User-Name, | ||
+ | # Virtual-Server or Packet-Src-IP-Address. | ||
+ | # messages will be distributed over multiple files. | ||
+ | # | ||
+ | # Logging can be enabled for an individual request by a special | ||
+ | # dynamic expansion macro: | ||
+ | # for this request is set to ' | ||
+ | # | ||
+ | # ... | ||
+ | # update control { | ||
+ | # | ||
+ | # } | ||
+ | # ... | ||
+ | # | ||
+ | # The attribute that the value is assigned to is unimportant, | ||
+ | # and should be a " | ||
+ | # | ||
+ | #requests = ${logdir}/ | ||
+ | |||
+ | # | ||
+ | # Which syslog facility to use, if ${destination} == " | ||
+ | # | ||
+ | # The exact values permitted here are OS-dependent. | ||
+ | # don't want to change this. | ||
+ | # | ||
+ | syslog_facility = daemon | ||
+ | |||
+ | # Log the full User-Name attribute, as it was found in the request. | ||
+ | # | ||
+ | # allowed values: {no, yes} | ||
+ | # | ||
+ | stripped_names = no | ||
+ | |||
+ | # Log authentication requests to the log file. | ||
+ | # | ||
+ | # allowed values: {no, yes} | ||
+ | # | ||
+ | auth = no | ||
+ | |||
+ | # Log passwords with the authentication requests. | ||
+ | # auth_badpass | ||
+ | # auth_goodpass - logs password if it's correct | ||
+ | # | ||
+ | # allowed values: {no, yes} | ||
+ | # | ||
+ | auth_badpass = no | ||
+ | auth_goodpass = no | ||
+ | |||
+ | # Log additional text at the end of the "Login OK" messages. | ||
+ | # for these to work, the " | ||
+ | # configurations above have to be set to " | ||
+ | # | ||
+ | # The strings below are dynamically expanded, which means that | ||
+ | # you can put anything you want in them. However, note that | ||
+ | # this expansion can be slow, and can negatively impact server | ||
+ | # performance. | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | } | ||
+ | |||
+ | # The program to execute to do concurrency checks. | ||
+ | checkrad = ${sbindir}/ | ||
+ | |||
+ | # SECURITY CONFIGURATION | ||
+ | # | ||
+ | # There may be multiple methods of attacking on the server. | ||
+ | # section holds the configuration items which minimize the impact | ||
+ | # of those attacks | ||
+ | # | ||
+ | security { | ||
+ | # | ||
+ | # max_attributes: | ||
+ | # permitted in a RADIUS packet. | ||
+ | # than this number of attributes in them will be dropped. | ||
+ | # | ||
+ | # If this number is set too low, then no RADIUS packets | ||
+ | # will be accepted. | ||
+ | # | ||
+ | # If this number is set too high, then an attacker may be | ||
+ | # able to send a small number of packets which will cause | ||
+ | # the server to use all available memory on the machine. | ||
+ | # | ||
+ | # Setting this number to 0 means "allow any number of attributes" | ||
+ | max_attributes = 200 | ||
+ | |||
+ | # | ||
+ | # reject_delay: | ||
+ | # delayed for a few seconds. | ||
+ | # attack. | ||
+ | # crack a users password. | ||
+ | # | ||
+ | # Setting this number to 0 means "send rejects immediately" | ||
+ | # | ||
+ | # If this number is set higher than ' | ||
+ | # rejects will be sent at ' | ||
+ | # is deleted from the internal cache of requests. | ||
+ | # | ||
+ | # Useful ranges: 1 to 5 | ||
+ | reject_delay = 1 | ||
+ | |||
+ | # | ||
+ | # status_server: | ||
+ | # to Status-Server requests. | ||
+ | # | ||
+ | # When sent a Status-Server message, the server responds with | ||
+ | # an Access-Accept or Accounting-Response packet. | ||
+ | # | ||
+ | # This is mainly useful for administrators who want to " | ||
+ | # the server, without adding test users, or creating fake | ||
+ | # accounting packets. | ||
+ | # | ||
+ | # It's also useful when a NAS marks a RADIUS server " | ||
+ | # The NAS can periodically " | ||
+ | # packet. | ||
+ | # NAS can start using it for real requests. | ||
+ | # | ||
+ | # See also raddb/ | ||
+ | # | ||
+ | status_server = yes | ||
+ | |||
+ | # | ||
+ | # allow_vulnerable_openssl: | ||
+ | # versions of OpenSSL known to have critical vulnerabilities. | ||
+ | # | ||
+ | # This check is based on the version number reported by libssl | ||
+ | # and may not reflect patches applied to libssl by | ||
+ | # distribution maintainers. | ||
+ | # | ||
+ | allow_vulnerable_openssl = yes | ||
+ | } | ||
+ | |||
+ | # PROXY CONFIGURATION | ||
+ | # | ||
+ | # proxy_requests: | ||
+ | # | ||
+ | # The server has proxying turned on by default. | ||
+ | # set up to proxy requests to another server, then you can turn proxying | ||
+ | # off here. This will save a small amount of resources on the server. | ||
+ | # | ||
+ | # If you have proxying turned off, and your configuration files say | ||
+ | # to proxy a request, then an error message will be logged. | ||
+ | # | ||
+ | # To disable proxying, change the " | ||
+ | # $INCLUDE line. | ||
+ | # | ||
+ | # allowed values: {no, yes} | ||
+ | # | ||
+ | proxy_requests | ||
+ | $INCLUDE proxy.conf | ||
+ | |||
+ | |||
+ | # CLIENTS CONFIGURATION | ||
+ | # | ||
+ | # Client configuration is defined in " | ||
+ | # | ||
+ | |||
+ | # The ' | ||
+ | # ' | ||
+ | # do NOT use ' | ||
+ | # supported. | ||
+ | # | ||
+ | # Anything listed in ' | ||
+ | # information from the old-style configuration files. | ||
+ | # | ||
+ | | ||
+ | |||
+ | |||
+ | # THREAD POOL CONFIGURATION | ||
+ | # | ||
+ | # The thread pool is a long-lived group of threads which | ||
+ | # take turns (round-robin) handling any incoming requests. | ||
+ | # | ||
+ | # You probably want to have a few spare threads around, | ||
+ | # so that high-load situations can be handled immediately. | ||
+ | # don't have any spare threads, then the request handling will | ||
+ | # be delayed while a new thread is created, and added to the pool. | ||
+ | # | ||
+ | # You probably don't want too many spare threads around, | ||
+ | # otherwise they' | ||
+ | # not doing anything productive. | ||
+ | # | ||
+ | # The numbers given below should be adequate for most situations. | ||
+ | # | ||
+ | thread pool { | ||
+ | # Number of servers to start initially --- should be a reasonable | ||
+ | # ballpark figure. | ||
+ | start_servers = 5 | ||
+ | |||
+ | # Limit on the total number of servers running. | ||
+ | # | ||
+ | # If this limit is ever reached, clients will be LOCKED OUT, so it | ||
+ | # should NOT BE SET TOO LOW. It is intended mainly as a brake to | ||
+ | # keep a runaway server from taking the system with it as it spirals | ||
+ | # down... | ||
+ | # | ||
+ | # You may find that the server is regularly reaching the | ||
+ | # ' | ||
+ | # ' | ||
+ | # | ||
+ | # If this is the case, then the problem is MOST LIKELY that | ||
+ | # your back-end databases are taking too long to respond, and | ||
+ | # are preventing the server from responding in a timely manner. | ||
+ | # | ||
+ | # The solution is NOT do keep increasing the ' | ||
+ | # value, but instead to fix the underlying cause of the | ||
+ | # problem: slow database, or ' | ||
+ | # | ||
+ | # For more information, | ||
+ | # | ||
+ | max_servers = 32 | ||
+ | |||
+ | # Server-pool size regulation. | ||
+ | # how many servers you need, FreeRADIUS dynamically adapts to | ||
+ | # the load it sees, that is, it tries to maintain enough | ||
+ | # servers to handle the current load, plus a few spare | ||
+ | # servers to handle transient load spikes. | ||
+ | # | ||
+ | # It does this by periodically checking how many servers are | ||
+ | # waiting for a request. | ||
+ | # min_spare_servers, | ||
+ | # more than max_spare_servers, | ||
+ | # The default values are probably OK for most sites. | ||
+ | # | ||
+ | min_spare_servers = 3 | ||
+ | max_spare_servers = 10 | ||
+ | |||
+ | # When the server receives a packet, it places it onto an | ||
+ | # internal queue, where the worker threads (configured above) | ||
+ | # pick it up for processing. | ||
+ | # is given here. | ||
+ | # | ||
+ | # When the queue is full, any new packets will be silently | ||
+ | # discarded. | ||
+ | # | ||
+ | # The most common cause of the queue being full is that the | ||
+ | # server is dependent on a slow database, and it has received | ||
+ | # a large " | ||
+ | # very little you can do other than make sure the server | ||
+ | # receives less traffic, or make sure that the database can | ||
+ | # handle the load. | ||
+ | # | ||
+ | # | ||
+ | |||
+ | # There may be memory leaks or resource allocation problems with | ||
+ | # the server. | ||
+ | # resources will be cleaned up periodically. | ||
+ | # | ||
+ | # This should only be necessary if there are serious bugs in the | ||
+ | # server which have not yet been fixed. | ||
+ | # | ||
+ | # ' | ||
+ | # exit' | ||
+ | max_requests_per_server = 0 | ||
+ | } | ||
+ | |||
+ | # MODULE CONFIGURATION | ||
+ | # | ||
+ | # The names and configuration of each module is located in this section. | ||
+ | # | ||
+ | # After the modules are defined here, they may be referred to by name, | ||
+ | # in other sections of this configuration file. | ||
+ | # | ||
+ | modules { | ||
+ | # | ||
+ | # Each module has a configuration as follows: | ||
+ | # | ||
+ | # name [ instance ] { | ||
+ | # | ||
+ | # ... | ||
+ | # } | ||
+ | # | ||
+ | # The ' | ||
+ | # which implements the functionality of the module. | ||
+ | # | ||
+ | # The ' | ||
+ | # of a module, it first must be referred to by ' | ||
+ | # The different copies of the module are then created by | ||
+ | # inventing two ' | ||
+ | # | ||
+ | # The instance names can then be used in later configuration | ||
+ | # INSTEAD of the original ' | ||
+ | # for an example. | ||
+ | # | ||
+ | |||
+ | # | ||
+ | # As of 2.0.5, most of the module configurations are in a | ||
+ | # sub-directory. | ||
+ | # are loaded. | ||
+ | # referenced in a processing section, such as authorize, | ||
+ | # authenticate, | ||
+ | # | ||
+ | $INCLUDE ${confdir}/ | ||
+ | |||
+ | # Extensible Authentication Protocol | ||
+ | # | ||
+ | # For all EAP related authentications. | ||
+ | # Now in another file, because it is very large. | ||
+ | # | ||
+ | $INCLUDE eap.conf | ||
+ | |||
+ | # Include another file that has the SQL-related configuration. | ||
+ | # This is another file only because it tends to be big. | ||
+ | # | ||
+ | $INCLUDE sql.conf | ||
+ | |||
+ | # | ||
+ | # This module is an SQL enabled version of the counter module. | ||
+ | # | ||
+ | # Rather than maintaining seperate (GDBM) databases of | ||
+ | # accounting info for each counter, this module uses the data | ||
+ | # stored in the raddacct table by the sql modules. This | ||
+ | # module NEVER does any database INSERTs or UPDATEs. | ||
+ | # totally dependent on the SQL module to process Accounting | ||
+ | # packets. | ||
+ | # | ||
+ | $INCLUDE sql/ | ||
+ | |||
+ | # | ||
+ | # IP addresses managed in an SQL table. | ||
+ | # | ||
+ | # $INCLUDE sqlippool.conf | ||
+ | } | ||
+ | |||
+ | # Instantiation | ||
+ | # | ||
+ | # This section orders the loading of the modules. | ||
+ | # listed here will get loaded BEFORE the later sections like | ||
+ | # authorize, authenticate, | ||
+ | # | ||
+ | # This section is not strictly needed. | ||
+ | # authorize refers to a module, it's automatically loaded and | ||
+ | # initialized. | ||
+ | # of the following sections, so they can be listed here. | ||
+ | # | ||
+ | # Also, listing modules here ensures that you have control over | ||
+ | # the order in which they are initalized. | ||
+ | # something defined by another module, you can list them in order | ||
+ | # here, and ensure that the configuration will be OK. | ||
+ | # | ||
+ | instantiate { | ||
+ | # | ||
+ | # Allows the execution of external scripts. | ||
+ | # The entire command line (and output) must fit into 253 bytes. | ||
+ | # | ||
+ | # e.g. Framed-Pool = `%{exec:/ | ||
+ | exec | ||
+ | |||
+ | # | ||
+ | # The expression module doesn' | ||
+ | # authentication, | ||
+ | # translation, | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # This module needs to be instantiated, | ||
+ | # listed in any other section. | ||
+ | # more information. | ||
+ | # | ||
+ | # rlm_expr is also responsible for registering many | ||
+ | # other xlat functions such as md5, sha1 and lc. | ||
+ | # | ||
+ | # We do not recommend removing it's listing here. | ||
+ | expr | ||
+ | |||
+ | # | ||
+ | # We add the counter module here so that it registers | ||
+ | # the check-name attribute before any module which sets | ||
+ | # it | ||
+ | # daily | ||
+ | expiration | ||
+ | logintime | ||
+ | |||
+ | # subsections here can be thought of as " | ||
+ | # | ||
+ | # e.g. If you have two redundant SQL servers, and you want to | ||
+ | # use them in the authorize and accounting sections, you could | ||
+ | # place a " | ||
+ | # exact same text. Or, you could uncomment the following | ||
+ | # lines, and list " | ||
+ | # accounting sections. | ||
+ | # | ||
+ | #redundant redundant_sql { | ||
+ | # sql1 | ||
+ | # sql2 | ||
+ | #} | ||
+ | chillispot_max_bytes | ||
+ | noresetcounter | ||
+ | } | ||
+ | |||
+ | ###################################################################### | ||
+ | # | ||
+ | # Policies that can be applied in multiple places are listed | ||
+ | # | ||
+ | # to multiple times. | ||
+ | # | ||
+ | ###################################################################### | ||
+ | $INCLUDE policy.conf | ||
+ | |||
+ | ###################################################################### | ||
+ | # | ||
+ | # Load virtual servers. | ||
+ | # | ||
+ | # This next $INCLUDE line loads files in the directory that | ||
+ | # match the regular expression: / | ||
+ | # | ||
+ | # It allows you to define new virtual servers simply by placing | ||
+ | # a file into the raddb/ | ||
+ | # | ||
+ | $INCLUDE sites-enabled/ | ||
+ | |||
+ | ###################################################################### | ||
+ | # | ||
+ | # All of the other configuration sections like " | ||
+ | # | ||
+ | # the file: | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # This is the " | ||
+ | # | ||
+ | # | ||
+ | # edit it to create policies for your local site. | ||
+ | # | ||
+ | # For more documentation on virtual servers, see: | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | ###################################################################### | ||
+ | |||
+ | </ | ||
+ | sudo vi / | ||
+ | |||
+ | uncomment following includes if necessary: | ||
+ | '' | ||
+ | $INCLUDE sql.conf | ||
+ | $INCLUDE sql/ | ||
+ | |||
+ | Under the instantiate section add the following counter modules: | ||
+ | '' | ||
+ | noresetcounter'' | ||
+ | |||
+ | Configure the default virtual server under sites-available: | ||
+ | |||
+ | <code c default> | ||
+ | ###################################################################### | ||
+ | # | ||
+ | # As of 2.0.0, FreeRADIUS supports virtual hosts using the | ||
+ | # | ||
+ | # | ||
+ | # Virtual hosts should be put into the " | ||
+ | # | ||
+ | # directory to these files. | ||
+ | # | ||
+ | # If you are using 802.1X (EAP) authentication, | ||
+ | # the " | ||
+ | # that, too, for authentication to work. | ||
+ | # | ||
+ | # $Id: 520ccbc90f3a09cd6a80e1e3b16000b7ba94d884 $ | ||
+ | # | ||
+ | ###################################################################### | ||
+ | # | ||
+ | # Read "man radiusd" | ||
+ | # titled DEBUGGING. | ||
+ | # obtain the configuration you want, without running into | ||
+ | # | ||
+ | # of this file. | ||
+ | # | ||
+ | # This configuration is designed to work in the widest possible | ||
+ | # set of circumstances, | ||
+ | # | ||
+ | # need to make very few changes to this file. | ||
+ | # | ||
+ | # The best way to configure the server for your local system | ||
+ | # is to CAREFULLY edit this file. Most attempts to make large | ||
+ | # edits to this file will BREAK THE SERVER. | ||
+ | # be small, and tested by running the server with " | ||
+ | # Once the edits have been verified to work, save a copy of these | ||
+ | # | ||
+ | # make more edits, and test, as above. | ||
+ | # | ||
+ | # There are many " | ||
+ | # as ldap, sql, etc. These references serve as place-holders. | ||
+ | # If you need the functionality of that module, then configure | ||
+ | # it in radiusd.conf, | ||
+ | # this file. In most cases, those small changes will result | ||
+ | # in the server being able to connect to the DB, and to | ||
+ | # | ||
+ | # | ||
+ | ###################################################################### | ||
+ | |||
+ | # | ||
+ | # In 1.x, the " | ||
+ | # | ||
+ | # | ||
+ | # The server section with no virtual server name is the " | ||
+ | # | ||
+ | # | ||
+ | # We don't indent the rest of this file, because doing so | ||
+ | # would make it harder to read. | ||
+ | # | ||
+ | |||
+ | # Authorization. First preprocess (hints and huntgroups files), | ||
+ | # then realms, and finally look in the " | ||
+ | # | ||
+ | # Any changes made here should also be made to the " | ||
+ | # virtual server. | ||
+ | # | ||
+ | # The order of the realm modules will determine the order that | ||
+ | # we try to find a matching realm. | ||
+ | # | ||
+ | # Make *sure* that ' | ||
+ | # need to setup hints for the remote radius server | ||
+ | authorize { | ||
+ | # | ||
+ | # Security settings. | ||
+ | # checks on it, for spaces and other invalid characters. | ||
+ | # it looks like the user is trying to play games, reject it. | ||
+ | # | ||
+ | # This should probably be enabled by default. | ||
+ | # | ||
+ | # See policy.conf for the definition of the filter_username policy. | ||
+ | # | ||
+ | # | ||
+ | |||
+ | # | ||
+ | # The preprocess module takes care of sanitizing some bizarre | ||
+ | # attributes in the request, and turning them into attributes | ||
+ | # which are more standard. | ||
+ | # | ||
+ | # It takes care of processing the ' | ||
+ | # ' | ||
+ | # | ||
+ | |||
+ | # | ||
+ | # If you want to have a log of authentication requests, | ||
+ | # un-comment the following line, and the ' | ||
+ | # section, above. | ||
+ | auth_log | ||
+ | |||
+ | # | ||
+ | # The chap module will set ' | ||
+ | # handling a CHAP request and Auth-Type has not already been set | ||
+ | chap | ||
+ | |||
+ | # | ||
+ | # If the users are logging in with an MS-CHAP-Challenge | ||
+ | # attribute for authentication, | ||
+ | # the MS-CHAP-Challenge attribute, and add ' | ||
+ | # to the request, which will cause the server to then use | ||
+ | # the mschap module for authentication. | ||
+ | mschap | ||
+ | |||
+ | # | ||
+ | # If you have a Cisco SIP server authenticating against | ||
+ | # FreeRADIUS, uncomment the following line, and the ' | ||
+ | # line in the ' | ||
+ | digest | ||
+ | |||
+ | # | ||
+ | # The WiMAX specification says that the Calling-Station-Id | ||
+ | # is 6 octets of the MAC. This definition conflicts with | ||
+ | # RFC 3580, and all common RADIUS practices. | ||
+ | # the " | ||
+ | # Calling-Station-Id attribute to the normal format as | ||
+ | # specified in RFC 3580 Section 3.21 | ||
+ | # wimax | ||
+ | |||
+ | # | ||
+ | # Look for IPASS style ' | ||
+ | # ' | ||
+ | # that. | ||
+ | # IPASS | ||
+ | |||
+ | # | ||
+ | # If you are using multiple kinds of realms, you probably | ||
+ | # want to set " | ||
+ | # Otherwise, when the first style of realm doesn' | ||
+ | # the other styles won't be checked. | ||
+ | # | ||
+ | suffix | ||
+ | # | ||
+ | |||
+ | # | ||
+ | # This module takes care of EAP-MD5, EAP-TLS, and EAP-LEAP | ||
+ | # authentication. | ||
+ | # | ||
+ | # It also sets the EAP-Type attribute in the request | ||
+ | # attribute list to the EAP type from the packet. | ||
+ | # | ||
+ | # As of 2.0, the EAP module returns " | ||
+ | # for TTLS and PEAP. In 1.x, it never returned " | ||
+ | # this change is compatible with older configurations. | ||
+ | # | ||
+ | # The example below uses module failover to avoid querying all | ||
+ | # of the following modules if the EAP module returns " | ||
+ | # Therefore, your LDAP and/or SQL servers will not be queried | ||
+ | # for the many packets that go back and forth to set up TTLS | ||
+ | # or PEAP. The load on those servers will therefore be reduced. | ||
+ | # | ||
+ | eap { | ||
+ | ok = return | ||
+ | } | ||
+ | |||
+ | # | ||
+ | # Pull crypt' | ||
+ | # using the system API's to get the password. | ||
+ | # to read /etc/passwd or /etc/shadow directly, see the | ||
+ | # passwd module in radiusd.conf. | ||
+ | # | ||
+ | unix | ||
+ | |||
+ | # | ||
+ | # Read the ' | ||
+ | # files | ||
+ | |||
+ | # | ||
+ | # Look in an SQL database. | ||
+ | # is meant to mirror the " | ||
+ | # | ||
+ | # See " | ||
+ | sql | ||
+ | |||
+ | # | ||
+ | # If you are using / | ||
+ | # mschap authentication, | ||
+ | # configure the ' | ||
+ | # | ||
+ | |||
+ | # | ||
+ | # The ldap module will set Auth-Type to LDAP if it has not | ||
+ | # already been set | ||
+ | # ldap | ||
+ | |||
+ | # | ||
+ | # Enforce daily limits on time spent logged in. | ||
+ | # daily | ||
+ | |||
+ | # | ||
+ | # Use the checkval module | ||
+ | # | ||
+ | |||
+ | expiration | ||
+ | logintime | ||
+ | |||
+ | # | ||
+ | # If no other module has claimed responsibility for | ||
+ | # authentication, | ||
+ | # other modules listed above to add a "known good" password | ||
+ | # to the request, and to do nothing else. The PAP module | ||
+ | # will then see that password, and use it to do PAP | ||
+ | # authentication. | ||
+ | # | ||
+ | # This module should be listed last, so that the other modules | ||
+ | # get a chance to set Auth-Type for themselves. | ||
+ | # | ||
+ | pap | ||
+ | |||
+ | # | ||
+ | # If " | ||
+ | # through the following section, and ONLY the following section. | ||
+ | # This permits you to do DB queries, for example. | ||
+ | # listed here return " | ||
+ | # | ||
+ | # Autz-Type Status-Server { | ||
+ | # | ||
+ | # } | ||
+ | noresetcounter | ||
+ | chillispot_max_bytes | ||
+ | } | ||
+ | |||
+ | |||
+ | # Authentication. | ||
+ | # | ||
+ | # | ||
+ | # This section lists which modules are available for authentication. | ||
+ | # Note that it does NOT mean 'try each module in order' | ||
+ | # that a module from the ' | ||
+ | # attribute ' | ||
+ | # used to pick the apropriate module from the list below. | ||
+ | # | ||
+ | |||
+ | # In general, you SHOULD NOT set the Auth-Type attribute. | ||
+ | # will figure it out on its own, and will do the right thing. | ||
+ | # most common side effect of erroneously setting the Auth-Type | ||
+ | # attribute is that one authentication method will work, but the | ||
+ | # others will not. | ||
+ | # | ||
+ | # The common reasons to set the Auth-Type attribute by hand | ||
+ | # is to either forcibly reject the user (Auth-Type := Reject), | ||
+ | # or to or forcibly accept the user (Auth-Type := Accept). | ||
+ | # | ||
+ | # Note that Auth-Type := Accept will NOT work with EAP. | ||
+ | # | ||
+ | # Please do not put " | ||
+ | # section. | ||
+ | # the post-auth section is for. | ||
+ | # | ||
+ | authenticate { | ||
+ | # | ||
+ | # PAP authentication, | ||
+ | # in the ' | ||
+ | # password can be clear-text, or encrypted. | ||
+ | Auth-Type PAP { | ||
+ | pap | ||
+ | } | ||
+ | |||
+ | # | ||
+ | # Most people want CHAP authentication | ||
+ | # A back-end database listed in the ' | ||
+ | # MUST supply a CLEAR TEXT password. | ||
+ | # won't work. | ||
+ | Auth-Type CHAP { | ||
+ | chap | ||
+ | } | ||
+ | |||
+ | # | ||
+ | # MSCHAP authentication. | ||
+ | Auth-Type MS-CHAP { | ||
+ | mschap | ||
+ | } | ||
+ | |||
+ | # | ||
+ | # If you have a Cisco SIP server authenticating against | ||
+ | # FreeRADIUS, uncomment the following line, and the ' | ||
+ | # line in the ' | ||
+ | digest | ||
+ | |||
+ | # | ||
+ | # Pluggable Authentication Modules. | ||
+ | # pam | ||
+ | |||
+ | # | ||
+ | # See 'man getpwent' | ||
+ | # module checks the users password. | ||
+ | # containing CHAP-Password attributes CANNOT be authenticated | ||
+ | # against / | ||
+ | # | ||
+ | # For normal " | ||
+ | # be used instead of the " | ||
+ | # be used for authentication ONLY for compatibility with legacy | ||
+ | # FreeRADIUS configurations. | ||
+ | # | ||
+ | unix | ||
+ | |||
+ | # Uncomment it if you want to use ldap for authentication | ||
+ | # | ||
+ | # Note that this means "check plain-text password against | ||
+ | # the ldap database", | ||
+ | # as it does not supply a plain-text password. | ||
+ | # Auth-Type LDAP { | ||
+ | # ldap | ||
+ | # } | ||
+ | |||
+ | # | ||
+ | # Allow EAP authentication. | ||
+ | eap | ||
+ | |||
+ | # | ||
+ | # The older configurations sent a number of attributes in | ||
+ | # Access-Challenge packets, which wasn't strictly correct. | ||
+ | # If you want to filter out these attributes, uncomment | ||
+ | # the following lines. | ||
+ | # | ||
+ | # Auth-Type eap { | ||
+ | # eap { | ||
+ | # handled = 1 | ||
+ | # } | ||
+ | # if (handled && (Response-Packet-Type == Access-Challenge)) { | ||
+ | # | ||
+ | # | ||
+ | # } | ||
+ | # } | ||
+ | } | ||
+ | |||
+ | |||
+ | # | ||
+ | # Pre-accounting. | ||
+ | # | ||
+ | preacct { | ||
+ | preprocess | ||
+ | |||
+ | # | ||
+ | # Session start times are *implied* in RADIUS. | ||
+ | # The NAS never sends a "start time" | ||
+ | # a start packet, *possibly* with an Acct-Delay-Time. | ||
+ | # The server is supposed to conclude that the start time | ||
+ | # was " | ||
+ | # | ||
+ | # The code below creates an explicit start time, which can | ||
+ | # then be used in other modules. | ||
+ | # | ||
+ | # The start time is: NOW - delay - session_length | ||
+ | # | ||
+ | |||
+ | # update request { | ||
+ | # FreeRADIUS-Acct-Session-Start-Time = " | ||
+ | # } | ||
+ | |||
+ | |||
+ | # | ||
+ | # Ensure that we have a semi-unique identifier for every | ||
+ | # request, and many NAS boxes are broken. | ||
+ | acct_unique | ||
+ | |||
+ | # | ||
+ | # Look for IPASS-style ' | ||
+ | # ' | ||
+ | # that. | ||
+ | # | ||
+ | # Accounting requests are generally proxied to the same | ||
+ | # home server as authentication requests. | ||
+ | # IPASS | ||
+ | suffix | ||
+ | # | ||
+ | |||
+ | # | ||
+ | # Read the ' | ||
+ | files | ||
+ | } | ||
+ | |||
+ | # | ||
+ | # Accounting. | ||
+ | # | ||
+ | accounting { | ||
+ | # | ||
+ | # Create a ' | ||
+ | # Note that accounting requests which are proxied | ||
+ | # are also logged in the detail file. | ||
+ | detail | ||
+ | # daily | ||
+ | |||
+ | # Update the wtmp file | ||
+ | # | ||
+ | # If you don't use " | ||
+ | # unix | ||
+ | |||
+ | # | ||
+ | # For Simultaneous-Use tracking. | ||
+ | # | ||
+ | # Due to packet losses in the network, the data here | ||
+ | # may be incorrect. | ||
+ | radutmp | ||
+ | # | ||
+ | |||
+ | # Return an address to the IP Pool when we see a stop record. | ||
+ | # | ||
+ | |||
+ | # | ||
+ | # Log traffic to an SQL database. | ||
+ | # | ||
+ | # See " | ||
+ | sql | ||
+ | |||
+ | # | ||
+ | # If you receive stop packets with zero session length, | ||
+ | # they will NOT be logged in the database. | ||
+ | # will print a message (only in debugging mode), and will | ||
+ | # return " | ||
+ | # | ||
+ | # You can ignore these packets by uncommenting the following | ||
+ | # three lines. | ||
+ | # accounting request, and the NAS will retransmit. | ||
+ | # | ||
+ | # if (noop) { | ||
+ | # ok | ||
+ | # } | ||
+ | |||
+ | # | ||
+ | # Instead of sending the query to the SQL server, | ||
+ | # write it into a log file. | ||
+ | # | ||
+ | # sql_log | ||
+ | |||
+ | # Cisco VoIP specific bulk accounting | ||
+ | # | ||
+ | |||
+ | # For Exec-Program and Exec-Program-Wait | ||
+ | exec | ||
+ | |||
+ | # Filter attributes from the accounting response. | ||
+ | attr_filter.accounting_response | ||
+ | |||
+ | # | ||
+ | # See " | ||
+ | # | ||
+ | # Acct-Type Status-Server { | ||
+ | # | ||
+ | # } | ||
+ | } | ||
+ | |||
+ | |||
+ | # Session database, used for checking Simultaneous-Use. Either the radutmp | ||
+ | # or rlm_sql module can handle this. | ||
+ | # The rlm_sql module is *much* faster | ||
+ | session { | ||
+ | radutmp | ||
+ | |||
+ | # | ||
+ | # See " | ||
+ | sql | ||
+ | } | ||
+ | |||
+ | |||
+ | # Post-Authentication | ||
+ | # Once we KNOW that the user has been authenticated, | ||
+ | # additional steps we can take. | ||
+ | post-auth { | ||
+ | # Get an address from the IP Pool. | ||
+ | # | ||
+ | |||
+ | # | ||
+ | # If you want to have a log of authentication replies, | ||
+ | # un-comment the following line, and the ' | ||
+ | # section, above. | ||
+ | reply_log | ||
+ | |||
+ | # | ||
+ | # After authenticating the user, do another SQL query. | ||
+ | # | ||
+ | # See " | ||
+ | sql | ||
+ | |||
+ | # | ||
+ | # Instead of sending the query to the SQL server, | ||
+ | # write it into a log file. | ||
+ | # | ||
+ | # sql_log | ||
+ | |||
+ | # | ||
+ | # Un-comment the following if you have set | ||
+ | # ' | ||
+ | # the ' | ||
+ | # | ||
+ | # ldap | ||
+ | |||
+ | # For Exec-Program and Exec-Program-Wait | ||
+ | exec | ||
+ | |||
+ | # | ||
+ | # Calculate the various WiMAX keys. In order for this to work, | ||
+ | # you will need to define the WiMAX NAI, usually via | ||
+ | # | ||
+ | # update request { | ||
+ | # | ||
+ | # } | ||
+ | # | ||
+ | # If you want various keys to be calculated, you will need to | ||
+ | # update the reply with " | ||
+ | # this, and replace the template values with the correct ones | ||
+ | # taken from the cryptographic calculations. | ||
+ | # | ||
+ | # update reply { | ||
+ | # | ||
+ | # | ||
+ | # } | ||
+ | # | ||
+ | # You may want to delete the MS-MPPE-*-Keys from the reply, | ||
+ | # as some WiMAX clients behave badly when those attributes | ||
+ | # are included. | ||
+ | # entry " | ||
+ | # | ||
+ | # wimax | ||
+ | |||
+ | # If there is a client certificate (EAP-TLS, sometimes PEAP | ||
+ | # and TTLS), then some attributes are filled out after the | ||
+ | # certificate verification has been performed. | ||
+ | # MAY be available during the authentication, | ||
+ | # available only in the " | ||
+ | # | ||
+ | # The first set of attributes contains information about the | ||
+ | # issuing certificate which is being used. The second | ||
+ | # contains information about the client certificate (if | ||
+ | # available). | ||
+ | # | ||
+ | # update reply { | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # } | ||
+ | |||
+ | # MacSEC requires the use of EAP-Key-Name. | ||
+ | # want to send it for all EAP sessions. | ||
+ | # modules put required data into the EAP-Session-Id attribute. | ||
+ | # This attribute is never put into a request or reply packet. | ||
+ | # | ||
+ | # Uncomment the next few lines to copy the required data into | ||
+ | # the EAP-Key-Name attribute | ||
+ | # if (reply: | ||
+ | # update reply { | ||
+ | # | ||
+ | # } | ||
+ | # } | ||
+ | |||
+ | # If the WiMAX module did it's work, you may want to do more | ||
+ | # things here, like delete the MS-MPPE-*-Key attributes. | ||
+ | # | ||
+ | # if (updated) { | ||
+ | # update reply { | ||
+ | # | ||
+ | # | ||
+ | # } | ||
+ | # } | ||
+ | |||
+ | # | ||
+ | # Access-Reject packets are sent through the REJECT sub-section of the | ||
+ | # post-auth section. | ||
+ | # | ||
+ | # Add the ldap module name (or instance) if you have set | ||
+ | # ' | ||
+ | # | ||
+ | Post-Auth-Type REJECT { | ||
+ | # log failed authentications in SQL, too. | ||
+ | # sql | ||
+ | attr_filter.access_reject | ||
+ | } | ||
+ | } | ||
+ | |||
+ | # | ||
+ | # When the server decides to proxy a request to a home server, | ||
+ | # the proxied request is first passed through the pre-proxy | ||
+ | # stage. | ||
+ | # cancel the proxy. | ||
+ | # | ||
+ | # Only a few modules currently have this method. | ||
+ | # | ||
+ | pre-proxy { | ||
+ | # | ||
+ | |||
+ | # Uncomment the following line if you want to change attributes | ||
+ | # as defined in the preproxy_users file. | ||
+ | # files | ||
+ | |||
+ | # Uncomment the following line if you want to filter requests | ||
+ | # sent to remote servers based on the rules defined in the | ||
+ | # ' | ||
+ | # | ||
+ | |||
+ | # If you want to have a log of packets proxied to a home | ||
+ | # server, un-comment the following line, and the | ||
+ | # ' | ||
+ | # | ||
+ | } | ||
+ | |||
+ | # | ||
+ | # When the server receives a reply to a request it proxied | ||
+ | # to a home server, the request may be massaged here, in the | ||
+ | # post-proxy stage. | ||
+ | # | ||
+ | post-proxy { | ||
+ | |||
+ | # If you want to have a log of replies from a home server, | ||
+ | # un-comment the following line, and the ' | ||
+ | # section, above. | ||
+ | # | ||
+ | |||
+ | # | ||
+ | |||
+ | # Uncomment the following line if you want to filter replies from | ||
+ | # remote proxies based on the rules defined in the ' | ||
+ | # | ||
+ | |||
+ | # | ||
+ | # If you are proxying LEAP, you MUST configure the EAP | ||
+ | # module, and you MUST list it here, in the post-proxy | ||
+ | # stage. | ||
+ | # | ||
+ | # You MUST also use the ' | ||
+ | # configuration. | ||
+ | # in the proxied request will not match the user name | ||
+ | # hidden inside of the EAP packet, and the end server will | ||
+ | # reject the EAP request. | ||
+ | # | ||
+ | eap | ||
+ | |||
+ | # | ||
+ | # If the server tries to proxy a request and fails, then the | ||
+ | # request is processed through the modules in this section. | ||
+ | # | ||
+ | # The main use of this section is to permit robust proxying | ||
+ | # of accounting packets. | ||
+ | # proxy accounting packets as part of normal processing. | ||
+ | # Then, if the home server goes down, accounting packets can | ||
+ | # be logged to a local " | ||
+ | # radrelay. | ||
+ | # will read the detail file, and send the packets to the | ||
+ | # home server. | ||
+ | # | ||
+ | # With this configuration, | ||
+ | # Accounting-Requests from the NAS, but only writes | ||
+ | # accounting packets to disk if the home server is down. | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # } | ||
+ | } | ||
+ | </ | ||
+ | |||
+ | |||
+ | Under authorize section: | ||
+ | Comment the following: | ||
+ | ''# | ||
+ | # | ||
+ | |||
+ | Uncomment the following: | ||
+ | '' | ||
+ | unix'' | ||
+ | |||
+ | Change the following if necessary: | ||
+ | ''' | ||
+ | |||
+ | Add the following at the end of authorize section: | ||
+ | '' | ||
+ | noresetcounter'' | ||
+ | |||
+ | Next under accounting section, Uncomment the following: | ||
+ | '' | ||
+ | |||
+ | Change the following if necessary: | ||
+ | ''' | ||
+ | |||
+ | Next under session section, Uncomment the following: | ||
+ | '' | ||
+ | sql'' | ||
+ | |||
+ | Next under post-auth section, Uncomment the following: | ||
+ | '' | ||
+ | |||
+ | Change the following if necessary: | ||
+ | '' | ||
+ | |||
+ | Configure the inner tunnel requests virtual server under sites-available: | ||
+ | |||
+ | <code c inner-tunnel> | ||
+ | # -*- text -*- | ||
+ | ###################################################################### | ||
+ | # | ||
+ | # This is a virtual server that handles *only* inner tunnel | ||
+ | # requests for EAP-TTLS and PEAP types. | ||
+ | # | ||
+ | # $Id: bb0b93bc9cc9ade4e78725ea113d6f228937fef7 $ | ||
+ | # | ||
+ | ###################################################################### | ||
+ | |||
+ | server inner-tunnel { | ||
+ | |||
+ | # | ||
+ | # This next section is here to allow testing of the " | ||
+ | # authentication methods, independently from the " | ||
+ | # It is listening on " | ||
+ | # the same machine. | ||
+ | # | ||
+ | # $ radtest USER PASSWORD 127.0.0.1: | ||
+ | # | ||
+ | # If it works, you have configured the inner tunnel correctly. | ||
+ | # if PEAP will work, use: | ||
+ | # | ||
+ | # $ radtest -t mschap USER PASSWORD 127.0.0.1: | ||
+ | # | ||
+ | # If that works, PEAP should work. If that command doesn' | ||
+ | # | ||
+ | # FIX THE INNER TUNNEL CONFIGURATION SO THAT IT WORKS. | ||
+ | # | ||
+ | # Do NOT do any PEAP tests. | ||
+ | # on fixing the inner tunnel configuration. | ||
+ | # | ||
+ | listen { | ||
+ | | ||
+ | port = 18120 | ||
+ | type = auth | ||
+ | } | ||
+ | |||
+ | |||
+ | # Authorization. First preprocess (hints and huntgroups files), | ||
+ | # then realms, and finally look in the " | ||
+ | # | ||
+ | # The order of the realm modules will determine the order that | ||
+ | # we try to find a matching realm. | ||
+ | # | ||
+ | # Make *sure* that ' | ||
+ | # need to setup hints for the remote radius server | ||
+ | authorize { | ||
+ | # | ||
+ | # The chap module will set ' | ||
+ | # handling a CHAP request and Auth-Type has not already been set | ||
+ | chap | ||
+ | |||
+ | # | ||
+ | # If the users are logging in with an MS-CHAP-Challenge | ||
+ | # attribute for authentication, | ||
+ | # the MS-CHAP-Challenge attribute, and add ' | ||
+ | # to the request, which will cause the server to then use | ||
+ | # the mschap module for authentication. | ||
+ | mschap | ||
+ | |||
+ | # | ||
+ | # Pull crypt' | ||
+ | # using the system API's to get the password. | ||
+ | # to read /etc/passwd or /etc/shadow directly, see the | ||
+ | # passwd module, above. | ||
+ | # | ||
+ | # unix | ||
+ | |||
+ | # | ||
+ | # Look for IPASS style ' | ||
+ | # ' | ||
+ | # that. | ||
+ | # IPASS | ||
+ | |||
+ | # | ||
+ | # If you are using multiple kinds of realms, you probably | ||
+ | # want to set " | ||
+ | # Otherwise, when the first style of realm doesn' | ||
+ | # the other styles won't be checked. | ||
+ | # | ||
+ | # Note that proxying the inner tunnel authentication means | ||
+ | # that the user MAY use one identity in the outer session | ||
+ | # (e.g. " | ||
+ | # (e.g. " | ||
+ | # proxied elsewhere for authentication. | ||
+ | # careful, this means that the user can cause you to forward | ||
+ | # the authentication to another RADIUS server, and have the | ||
+ | # accounting logs *not* sent to the other server. | ||
+ | # it difficult to bill people for their network activity. | ||
+ | # | ||
+ | suffix | ||
+ | # | ||
+ | |||
+ | # | ||
+ | # The " | ||
+ | # (e.g. " | ||
+ | # next few lines ensure that the request is not proxied. | ||
+ | # | ||
+ | # If you want the inner tunnel request to be proxied, delete | ||
+ | # the next few lines. | ||
+ | # | ||
+ | update control { | ||
+ | | ||
+ | } | ||
+ | |||
+ | # | ||
+ | # This module takes care of EAP-MSCHAPv2 authentication. | ||
+ | # | ||
+ | # It also sets the EAP-Type attribute in the request | ||
+ | # attribute list to the EAP type from the packet. | ||
+ | # | ||
+ | # The example below uses module failover to avoid querying all | ||
+ | # of the following modules if the EAP module returns " | ||
+ | # Therefore, your LDAP and/or SQL servers will not be queried | ||
+ | # for the many packets that go back and forth to set up TTLS | ||
+ | # or PEAP. The load on those servers will therefore be reduced. | ||
+ | # | ||
+ | eap { | ||
+ | ok = return | ||
+ | } | ||
+ | |||
+ | # | ||
+ | # Read the ' | ||
+ | files | ||
+ | |||
+ | # | ||
+ | # Look in an SQL database. | ||
+ | # is meant to mirror the " | ||
+ | # | ||
+ | # See " | ||
+ | sql | ||
+ | |||
+ | # | ||
+ | # If you are using / | ||
+ | # mschap authentication, | ||
+ | # configure the ' | ||
+ | # | ||
+ | |||
+ | # | ||
+ | # The ldap module will set Auth-Type to LDAP if it has not | ||
+ | # already been set | ||
+ | # ldap | ||
+ | |||
+ | # | ||
+ | # Enforce daily limits on time spent logged in. | ||
+ | # daily | ||
+ | |||
+ | # | ||
+ | # Use the checkval module | ||
+ | # | ||
+ | |||
+ | expiration | ||
+ | logintime | ||
+ | |||
+ | # | ||
+ | # If no other module has claimed responsibility for | ||
+ | # authentication, | ||
+ | # other modules listed above to add a "known good" password | ||
+ | # to the request, and to do nothing else. The PAP module | ||
+ | # will then see that password, and use it to do PAP | ||
+ | # authentication. | ||
+ | # | ||
+ | # This module should be listed last, so that the other modules | ||
+ | # get a chance to set Auth-Type for themselves. | ||
+ | # | ||
+ | pap | ||
+ | noresetcounter | ||
+ | chillispot_max_bytes | ||
+ | } | ||
+ | |||
+ | |||
+ | # Authentication. | ||
+ | # | ||
+ | # | ||
+ | # This section lists which modules are available for authentication. | ||
+ | # Note that it does NOT mean 'try each module in order' | ||
+ | # that a module from the ' | ||
+ | # attribute ' | ||
+ | # used to pick the apropriate module from the list below. | ||
+ | # | ||
+ | |||
+ | # In general, you SHOULD NOT set the Auth-Type attribute. | ||
+ | # will figure it out on its own, and will do the right thing. | ||
+ | # most common side effect of erroneously setting the Auth-Type | ||
+ | # attribute is that one authentication method will work, but the | ||
+ | # others will not. | ||
+ | # | ||
+ | # The common reasons to set the Auth-Type attribute by hand | ||
+ | # is to either forcibly reject the user, or forcibly accept him. | ||
+ | # | ||
+ | authenticate { | ||
+ | # | ||
+ | # PAP authentication, | ||
+ | # in the ' | ||
+ | # password can be clear-text, or encrypted. | ||
+ | Auth-Type PAP { | ||
+ | pap | ||
+ | } | ||
+ | |||
+ | # | ||
+ | # Most people want CHAP authentication | ||
+ | # A back-end database listed in the ' | ||
+ | # MUST supply a CLEAR TEXT password. | ||
+ | # won't work. | ||
+ | Auth-Type CHAP { | ||
+ | chap | ||
+ | } | ||
+ | |||
+ | # | ||
+ | # MSCHAP authentication. | ||
+ | Auth-Type MS-CHAP { | ||
+ | mschap | ||
+ | } | ||
+ | |||
+ | # | ||
+ | # Pluggable Authentication Modules. | ||
+ | # pam | ||
+ | |||
+ | # | ||
+ | # See 'man getpwent' | ||
+ | # module checks the users password. | ||
+ | # containing CHAP-Password attributes CANNOT be authenticated | ||
+ | # against / | ||
+ | # | ||
+ | unix | ||
+ | |||
+ | # Uncomment it if you want to use ldap for authentication | ||
+ | # | ||
+ | # Note that this means "check plain-text password against | ||
+ | # the ldap database", | ||
+ | # as it does not supply a plain-text password. | ||
+ | # Auth-Type LDAP { | ||
+ | # ldap | ||
+ | # } | ||
+ | |||
+ | # | ||
+ | # Allow EAP authentication. | ||
+ | eap | ||
+ | } | ||
+ | |||
+ | ###################################################################### | ||
+ | # | ||
+ | # There are no accounting requests inside of EAP-TTLS or PEAP | ||
+ | # | ||
+ | # | ||
+ | ###################################################################### | ||
+ | |||
+ | |||
+ | # Session database, used for checking Simultaneous-Use. Either the radutmp | ||
+ | # or rlm_sql module can handle this. | ||
+ | # The rlm_sql module is *much* faster | ||
+ | session { | ||
+ | radutmp | ||
+ | |||
+ | # | ||
+ | # See " | ||
+ | sql | ||
+ | } | ||
+ | |||
+ | |||
+ | # Post-Authentication | ||
+ | # Once we KNOW that the user has been authenticated, | ||
+ | # additional steps we can take. | ||
+ | post-auth { | ||
+ | # Note that we do NOT assign IP addresses here. | ||
+ | # If you try to assign IP addresses for EAP authentication types, | ||
+ | # it WILL NOT WORK. You MUST use DHCP. | ||
+ | |||
+ | # | ||
+ | # If you want to have a log of authentication replies, | ||
+ | # un-comment the following line, and the ' | ||
+ | # section, above. | ||
+ | reply_log | ||
+ | |||
+ | # | ||
+ | # After authenticating the user, do another SQL query. | ||
+ | # | ||
+ | # See " | ||
+ | sql | ||
+ | |||
+ | # | ||
+ | # Instead of sending the query to the SQL server, | ||
+ | # write it into a log file. | ||
+ | # | ||
+ | # sql_log | ||
+ | |||
+ | # | ||
+ | # Un-comment the following if you have set | ||
+ | # ' | ||
+ | # the ' | ||
+ | # | ||
+ | # ldap | ||
+ | |||
+ | # | ||
+ | # Access-Reject packets are sent through the REJECT sub-section of the | ||
+ | # post-auth section. | ||
+ | # | ||
+ | # Add the ldap module name (or instance) if you have set | ||
+ | # ' | ||
+ | # | ||
+ | Post-Auth-Type REJECT { | ||
+ | # log failed authentications in SQL, too. | ||
+ | # sql | ||
+ | attr_filter.access_reject | ||
+ | } | ||
+ | |||
+ | # | ||
+ | # The example policy below updates the outer tunnel reply | ||
+ | # (usually Access-Accept) with the User-Name from the inner | ||
+ | # tunnel User-Name. | ||
+ | # context of the inner tunnel, " | ||
+ | # tunnel request", | ||
+ | # reply attributes" | ||
+ | # | ||
+ | # This example is most useful when the outer session contains | ||
+ | # a User-Name of " | ||
+ | # is enabled, the NAS SHOULD use the inner tunnel User-Name | ||
+ | # in subsequent accounting packets. | ||
+ | # track user sessions, as they will all be based on the real | ||
+ | # name, and not on " | ||
+ | # | ||
+ | # The problem with doing this is that it ALSO exposes the | ||
+ | # real user name to any intermediate proxies. | ||
+ | # " | ||
+ | # good reason: it gives them more privacy. | ||
+ | # to contain the real user name removes ALL privacy from | ||
+ | # their session. | ||
+ | # | ||
+ | # If you want privacy to remain, see the | ||
+ | # Chargeable-User-Identity attribute from RFC 4372. In order | ||
+ | # to use that attribute, you will have to allocate a | ||
+ | # per-session identifier for the user, and store it in a | ||
+ | # long-term database (e.g. SQL). You should also use that | ||
+ | # attribute INSTEAD of the configuration below. | ||
+ | # | ||
+ | #update outer.reply { | ||
+ | # | ||
+ | #} | ||
+ | |||
+ | } | ||
+ | |||
+ | # | ||
+ | # When the server decides to proxy a request to a home server, | ||
+ | # the proxied request is first passed through the pre-proxy | ||
+ | # stage. | ||
+ | # cancel the proxy. | ||
+ | # | ||
+ | # Only a few modules currently have this method. | ||
+ | # | ||
+ | pre-proxy { | ||
+ | # | ||
+ | |||
+ | # Uncomment the following line if you want to change attributes | ||
+ | # as defined in the preproxy_users file. | ||
+ | # files | ||
+ | |||
+ | # Uncomment the following line if you want to filter requests | ||
+ | # sent to remote servers based on the rules defined in the | ||
+ | # ' | ||
+ | # | ||
+ | |||
+ | # If you want to have a log of packets proxied to a home | ||
+ | # server, un-comment the following line, and the | ||
+ | # ' | ||
+ | # | ||
+ | } | ||
+ | |||
+ | # | ||
+ | # When the server receives a reply to a request it proxied | ||
+ | # to a home server, the request may be massaged here, in the | ||
+ | # post-proxy stage. | ||
+ | # | ||
+ | post-proxy { | ||
+ | |||
+ | # If you want to have a log of replies from a home server, | ||
+ | # un-comment the following line, and the ' | ||
+ | # section, above. | ||
+ | # | ||
+ | |||
+ | # | ||
+ | |||
+ | # Uncomment the following line if you want to filter replies from | ||
+ | # remote proxies based on the rules defined in the ' | ||
+ | # | ||
+ | |||
+ | # | ||
+ | # If you are proxying LEAP, you MUST configure the EAP | ||
+ | # module, and you MUST list it here, in the post-proxy | ||
+ | # stage. | ||
+ | # | ||
+ | # You MUST also use the ' | ||
+ | # configuration. | ||
+ | # in the proxied request will not match the user name | ||
+ | # hidden inside of the EAP packet, and the end server will | ||
+ | # reject the EAP request. | ||
+ | # | ||
+ | eap | ||
+ | |||
+ | # | ||
+ | # If the server tries to proxy a request and fails, then the | ||
+ | # request is processed through the modules in this section. | ||
+ | # | ||
+ | # The main use of this section is to permit robust proxying | ||
+ | # of accounting packets. | ||
+ | # proxy accounting packets as part of normal processing. | ||
+ | # Then, if the home server goes down, accounting packets can | ||
+ | # be logged to a local " | ||
+ | # radrelay. | ||
+ | # will read the detail file, and send the packets to the | ||
+ | # home server. | ||
+ | # | ||
+ | # With this configuration, | ||
+ | # Accounting-Requests from the NAS, but only writes | ||
+ | # accounting packets to disk if the home server is down. | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # } | ||
+ | |||
+ | } | ||
+ | |||
+ | } # inner-tunnel server block | ||
+ | |||
+ | </ | ||
+ | '' | ||
+ | |||
+ | Under authorize section, change the following if necessary: | ||
+ | ''' | ||
+ | |||
+ | Add the following at the end of authorize section: | ||
+ | '' | ||
+ | noresetcounter'' | ||
+ | |||
+ | Next under the session section, Uncomment the following: | ||
+ | '' | ||
+ | |||
+ | Next under post-auth section, Uncomment the following: | ||
+ | '' | ||
+ | |||
+ | Change the following if necessary: | ||
+ | ''' | ||
+ | |||
+ | Create Admin User in radius MySQL database: | ||
+ | '' | ||
+ | |||
+ | ====== Radius Test ====== | ||
+ | |||
+ | Start radius for initialization and testing purposes | ||
+ | '' | ||
+ | |||
+ | If you get a message like this one, then you are done with the minimal and required radius setup for the next steps: | ||
+ | '' | ||
+ | |||
+ | ====== User Management ====== | ||
+ | |||
+ | To add users so they can access the Internet using your hotspot, run the following command for each user. You can automate it using a script if you wish. | ||
+ | |||
+ | ====== Radius max total Octets ======= | ||
+ | '' | ||
+ | |||
+ | |||
+ | |||