Obviously if you've arrived at this post is because you know what a Radius authentication server, so the explanations we will leave behind.
However, although there are many articles that address this issue, they do not always work first ^^!... Well, this post will try that our server is properly configured on the first try.
First utlized we should do the same repositories. Using other repositories might change slightly the configuration process described in this post. Well, let's get to the point, these are my repositories:
# deb RepositoriesThen run the following commands commands
Free no http://http.us.debian.org/debian/ lenny main contrib non-free # Security
http://security deb . debian.org / lenny / updates main contrib deb-src
http://security.debian.org/ lenny / updates main contrib
# # # # Unstable (sid) deb
http://ftp.fi.debian .org / debian / unstable main contrib non-free deb-src
http://ftp.fi.debian.org/debian/ unstable main contrib non-free # deb http://mirrors.kernel.org/debian/
sid main contrib non-free # deb-src
http://mirrors.kernel.org/debian/ sid main contrib non-free
# # # # Testing deb
http://ftp.fi.debian.org/ debian / testing main contrib non-free # deb-src
http://ftp.fi.debian.org/debian/ testing main contrib non-free # deb http://security.debian.org/
testing / updates main contrib non-free
# # # # Experimental deb http://mirrors.kernel.org/debian/
experimental main contrib non-free # deb-src
http://mirrors.kernel.org/debian/ main experimental contrib non-free
apt-get clean apt-get install update
required packages apt-get install apache2Edit the user file (which would be the host oo end users who would authentication requests)
apt-get install mysql-server
apt-get install freeradius freeradius-mysql
gedit / etc / freeradius / users fileIn several examples of users. Uncomment (delete this symbol: # ) steve user that comes as an example. We would like this:
In this case I added the user and password toshiba is cisco. To prove that successfully authenticates the server must do the following:
In root as the first stop the service:
/ etc / init.d / freeradius stopbegin debug mode
freeradius-Xverified the server-side authentication server steve
radtest testingWe get something like this
testing123 127.0.0.1 1812
Sending Access-Request of id 115 to 127.0.0.1 port 1812 User-NameThis server would be ready for aunteticar using the default parameters brings. Obviously they must be changes and you should add some other features. In another post I will explain how to use our server to authenticate users stored in a MySQL database.
= "toshiba"
User-Password = "cisco NAS-IP-Address = 127.0.1.1 NAS-Port =
rad_recv
1812: Access-Accept packet from host 127.0.0.1 port 1812, id = 115, length = 38
Service-Type = Framed-User Framed-Protocol
= PPP Framed-Compression = Van-Jacobson-TCP-IP
Greetings and I hope will be useful.
0 comments:
Post a Comment