Tuesday, November 16, 2010

Severe Bilirubin Increase



Obviously if you've arrived at this post is because you know what a Radius authentication server, so the explanations we will leave behind.
However, although there are many articles that address this issue, they do not always work first ^^!... Well, this post will try that our server is properly configured on the first try.

First utlized we should do the same repositories. Using other repositories might change slightly the configuration process described in this post. Well, let's get to the point, these are my repositories:
 # deb Repositories 
Free no http://http.us.debian.org/debian/ lenny main contrib non-free # Security


http://security deb . debian.org / lenny / updates main contrib deb-src
http://security.debian.org/ lenny / updates main contrib

# # # # Unstable (sid) deb
http://ftp.fi.debian .org / debian / unstable main contrib non-free deb-src
http://ftp.fi.debian.org/debian/ unstable main contrib non-free # deb http://mirrors.kernel.org/debian/
sid main contrib non-free # deb-src
http://mirrors.kernel.org/debian/ sid main contrib non-free

# # # # Testing deb
http://ftp.fi.debian.org/ debian / testing main contrib non-free # deb-src
http://ftp.fi.debian.org/debian/ testing main contrib non-free # deb http://security.debian.org/
testing / updates main contrib non-free

# # # # Experimental deb http://mirrors.kernel.org/debian/
experimental main contrib non-free # deb-src
http://mirrors.kernel.org/debian/ main experimental contrib non-free
Then run the following commands commands
 
apt-get clean apt-get install update

 required packages apt-get install apache2 
apt-get install mysql-server
apt-get install freeradius freeradius-mysql
Edit the user file (which would be the host oo end users who would authentication requests)
 gedit / etc / freeradius / users file 
In several examples of users. Uncomment (delete this symbol: # ) steve user that comes as an example. We would like this:
In this case I added the user and password toshiba is cisco. To prove that successfully authenticates the server must do the following:
In root as the first stop the service:
 / etc / init.d / freeradius stop 
begin debug mode
 freeradius-X 
verified the server-side authentication server steve
 radtest testing 
testing123 127.0.0.1 1812
We get something like this
 Sending Access-Request of id 115 to 127.0.0.1 port 1812 User-Name 
= "toshiba"
User-Password = "cisco NAS-IP-Address = 127.0.1.1 NAS-Port =
rad_recv
1812: Access-Accept packet from host 127.0.0.1 port 1812, id = 115, length = 38
Service-Type = Framed-User Framed-Protocol

= PPP Framed-Compression = Van-Jacobson-TCP-IP
This server would be ready for aunteticar using the default parameters brings. Obviously they must be changes and you should add some other features. In another post I will explain how to use our server to authenticate users stored in a MySQL database.

Greetings and I hope will be useful.

0 comments:

Post a Comment