⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 readme.lucent

📁 This program is a RADIUS RFC-compliant daemon, which is derived from original Livingston Enterprise
💻 LUCENT
📖 第 1 页 / 共 2 页
字号:
the NAS.	Required Versions of RADIUSBoth the forwarding server and remote server must be running thisrelease of the Lucent Remote Access RADIUS server, or a current versionof Lucent PortAuthority(tm).Any other vendor's conforming RADIUS proxy server is likely to work aseither the forwarding server or remote server if that vendor hasimplemented proxy correctly. Lucent Remote Access RADIUS serverversions 2.0.1 and earlier do not support proxy RADIUS, but can stillbe used as a remote server through the use of the "old" flag in theproxy file on the forwarding server.	Port Numbers UsedThis RADIUS server listens on UDP port 1645 for access-requests and onUDP port 1646 for accounting-requests. It sends proxy requests from UDPports 1650 and 1651 and listens for proxy responses on those ports. Ifthe listening port is set with the -p flag to radiusd, then radiusddoes the following:* Listens on the specified UDP port for access-requests* Listens on the port numbered 1 higher for accounting-requests* Uses ports numbered 5 higher and 6 higher to send proxy requestsFor example, if you run "radiusd -p 1812", then radiusd uses UDPports 1812, 1813, 1817 and 1818.	VersatilityThe forwarding and remote RADIUS servers can run on different operatingsystems. A RADIUS server can function as both a forwarding server anda remote server, serving as a forwarding server for some realms and aremote server for other realms. Use care to avoid forwarding loops --a packet passed back and forth between two misconfigured forwardingservers. One forwarding server can forward to any number of remoteservers (one per realm). A remote server can have any number ofservers forwarding to it and can provide authentication for any numberof realms.	Proxy ScenarioThe following scenario illustrates the communication between aPortMaster and the forwarding and remote RADIUS servers:1.  A PortMaster sends its access-request to the forwarding server.2.  The forwarding server forwards the access-request to the remote server.3.  The remote server sends an access-accept, access-reject, or    access-challenge back to the forwarding server. For this example,    an access-accept is sent.4.  The forwarding server sends the access-accept to the PortMaster.5.  The PortMaster sends an accounting-request to the forwarding server.6.  The forwarding server logs the accounting-request and forwards it    to the remote server.7.  The remote server logs the accounting-request and sends an    accounting-response to the forwarding server.8.  The forwarding server sends the accounting-response to the    PortMaster.To set up proxy, create a proxy file in the /etc/raddb directory on theforwarding server. If named realms are used, a proxy file must alsoexist on the remote server. If only numbered realms are used, theremote server does not need a proxy file.To use proxy, you set up RADIUS as you do normally. In addition,to form the communication between the forwarding and remote servers,you must define the following information in the clients and proxyfiles in /etc/raddb:On the forwarding server:o The clients file must have an entry for the PortMaster hostname or   IP address and its shared secret.o The proxy file must have an entry for the remote RADIUS server's  hostname or IP address, its shared secret, and its realm. The shared  secret in the forwarding server's proxy file must match the shared  secret in the remote server's clients file.On the remote server:o The clients file must contain the forwarding server's hostname or  IP address and its shared secret. The shared secret must  match the shared secret in the forwarding server's proxy file.o If any named realms are used, the proxy file must contain the  hostname or IP address of the remote server itself, an unused shared  secret, and the realm this remote server is authoritative for. If  only numbered realms are used, then no proxy file needs to be defined  on the remote server.	Proxy File ExampleThe /etc/raddb/proxy file contains proxy server hostnames (or IPaddresses), shared secrets, and realms, all separated by spaces ortabs.  Each line describes one realm.  Here is a proxy file example:radius.edu.net  secretupto16char        edu.nets134.net.com    someothersec2ret        5551134net54.edu.net   bettersecretthan        5555454rad.edu.com     chsebetterth            edu.com 1645rad7.com.net    lx4zDFapa3ep            com.net 1645 1646 oldradius.edu.net  eajsdfljasep            5551234 1812 1813 secureeg.edu.net      e997asepdflj            edu.net old secureo The first field is a valid hostname or IP address.o The second field (separated by blanks or tabs) is the shared secret.o The third field is the named or numeric authentication realm.o The remaining fields can be empty, or can contain the RADIUS port  number of the remote server, the RADIUS accounting port number of the  remote server, and any of the following optional keywords:       old      Strips the realm from the username and does not attach                Proxy-State when forwarding. This keyword is useful for                forwarding requests to older RADIUS servers.    secure      Allows the remote server to authorize administrative                logins for your client. If this keyword is not present,                 access-accepts from the forwarding server that                grant Administrative or NAS-Prompt access are treated                as access-rejects instead. If you use this keyword,                you are allowing the remote server to let someone log                in to your NAS as an administrator, so use it with                caution!     ipass      Uses the iPass protocol (instead of RADIUS) to                communicate with the remote server. See                http:/www.ipass.com/ for more information.The optional fields can be specified in any order, separated by blanksor tabs, after the first three mandatory fields. If you specify asingle UDP port, it is used for the RADIUS port. If you specify twoports, they are used as the RADIUS port and RADIUS accounting port inthat order. If you specify no ports, they default to the same portsused by the RADIUS server itself.If "secure" is not specified for a remote server and it replies withService-Type = Administrative-User or NAS-Prompt-User, the forwardingserver treats it as an access-reject and logs the following message tosyslog:Jul 10 21:10:00 ra radius[14870]: remote server 192.168.96.6/1645.4returned insecure service for client 172.16.3.24/1039.17, sendingreject insteadIf the hostname (or IP address) listed in the proxy file is the same asthe primary hostname or IP address of the host running the RADIUSserver, and the UDP port in the entry matches the UDP port the messagewas received on, radiusd determines that the user is local, strips offthe "@domain" portion, and processes the request locally.	Special Named RealmsThe special named realm "DEFAULT" (all uppercase) matches any namedrealm not found in the proxy file. If more than one DEFAULT entryexists in the proxy file, only the last one is used. For example:center.com.net  e199aespfdx4    DEFAULTThe special named realm "NOREALM" (all uppercase) matches any user thathas no realm. If more than one NOREALM entry exists in the proxy file,only the last one is used. For example:others.com.net  e19aepsfd9x4    NOREALM	Example Configuration for Proxy RADIUSThe following example illustrates a typical proxy RADIUS topologyand the sample configuration of proxy and clients files.Equipment:o PortMaster named "pmtest" with IP address 192.168.10.1o Forwarding server named "forward" with an IP address of 192.168.10.2o Remote server named "remote" with an IP address of 172.16.25.5In a real configuration, you must use IP addresses or fullyqualified domain names as hostnames.1. Configure the contents of clients and proxy files of the servercalled "forward" as follows:/etc/raddb/clients------------------pmtest          sharedsecret/etc/raddb/proxy----------------remote          testsecret      com.net2. Configure the contents of clients and proxy files of the servercalled "remote" as follows:/etc/raddb/clients------------------forward         testsecret/etc/raddb/proxy----------------remote          doesntmatter    com.net3. On the PortMaster "pmtest", enter the following commands to set theauthentication and accounting servers:set authentic 192.168.10.2set secret sharedsecret set accounting 192.168.10.2save all4. For a user to be authenticated via the remote server, define aprofile for this user in the users file of the remote server.  A userprofile is defined in the following format.  Note that the remoteserver strips the named realm from the username before looking it up inthe users file.test    Password = "testing"        Service-Type = Framed-User,        Framed-Protocol = PPP,        Framed-IP-Address = 255.255.255.254,        Framed-Routing = NoneAlternatively, if the test user's password is stored in the /etc/passwdfile, the example user profile is the following:test    Auth-Type = System        Service-Type = Framed-User,        Framed-Protocol = PPP,        Framed-IP-Address = 255.255.255.254,        Framed-Routing = None5. Run the radiusd daemon on both "forward" and "remote" servers.The RADIUS accounting records are logged in the detail file of eachserver.A user dialing in to the PortMaster must enter "test@com.net"at the login prompt and a password at the password prompt.	Limitation of ProxyFor the RADIUS server to handle numbered realms for points of presence(POPs) from multiple area codes, the RADIUS server must be configured withthe area code of each PortMaster if that information is not included in theCalled-Station-Id. The ability to determine the area code is notincluded in RADIUS server 2.1.This limitation is a problem only if your situation includes ALL of thefollowing:* You use the same 7-digit telephone number in multiple area codes to  belong to different realms. * You use the same RADIUS forwarding server for all area codes and/or all  realms.* Your telephone company does not include the area code in the  Calling-Station-Id._______________ UpgradingRADIUS server 2.1 is available in source form atftp://ftp.livingston.com/pub/le/radius/radius21.tar.Z and in binary form for the following platforms atftp://ftp.livingston.com/pub/le/software/:IBM RS6000 AIX 4.2	aix/radius21.tar.ZAlpha Digital UNIX 4.0	alpha/radius21.tar.ZBSD/OS 3.0		bsdi/radius21.tar.Z HP/UX 10.20		hp/radius21.tar.Z Slackware Linux 2.0	linux/radslack21.tar.ZRedhat Linux 5.2	linux/radhat21.tar.ZSGI IRIX 6.3		sgi/radius21.tar.ZSunOS 4.1.4		sun4/radsun21.tar.ZSolaris 2.5.1		sun4/radsol21.tar.ZSolaris x86 2.5.1	sun86/radius21.tar.ZFor other flavors of UNIX, including Linux, FreeBSD, NetBSD, and BSD/OS 4.0, get the source and compile from that.  RADIUS 2.1 isnot available for Windows NT.To upgrade, do the following:1. Save a copy of your old dictionary file and radiusd daemon.2. Copy the new dictionary file to /etc/raddb or whatever directory you use.3. If you are using proxy, create a /etc/raddb/proxy file.4. Kill your existing radiusd, and run the new radiusd.    - If you are using SecurID or ActivCard for authentication,       run sradiusd instead of radiusd.    - If you are using iPass, run iradiusd instead of radiusd.    - If you are running iPass AND SecurID or ActivCard,       modify the Makefile to link all the appropriate libraries.      Contact support@livingston.com if you need assistance in doing so._________________________________________________________________	Copyright and TrademarksCopyright 1999 Lucent Technologies. All rights reserved.PortMaster, ComOS, and ChoiceNet are registered trademarks of LucentTechnologies Inc. PMVision, IRX, and PortAuthority are trademarks ofLucent Technologies Inc. PolicyFlow is a service mark of LucentTechnologies Inc. All other marks are the property of their respectiveowners.	NoticesLucent Technologies Inc. makes no representations or warranties withrespect to the contents or use of this publication, and specificallydisclaims any express or implied warranties of merchantability orfitness for any particular purpose. Further, Lucent Technologies, Inc.reserves the right to revise this publication and to make changes toits content, any time, without obligation to notify any person orentity of such revisions or changes.	Contacting Lucent Remote Access Technical SupportLucent Technologies Remote Access Business Unit (previously LivingstonEnterprises) provides technical support via voice, electronic mail, orthrough the World Wide Web at http://www.livingston.com/.Please include the output of radiusd -v and uname -a when reportingproblems with this release.Internet service providers (ISPs) and other end users in Europe, theMiddle East, Africa, India, and Pakistan should contact theirauthorized Lucent Remote Access sales channel partner for technicalsupport; see http://www.livingston.com/International/EMEA/distributors.html.For North and South America and Asia Pacific customers, technicalsupport is available Monday through Friday from 7 a.m. to 5 p.m. U.S.Pacific Time (GMT -8).  Dial 1-800-458-9966 within the United States(including Alaska and Hawaii), Canada, and the Caribbean and LatinAmerica (CALA), or 1-925-737-2100 from elsewhere, for voice support.For email support send to support@livingston.com(asia-support@livingston.com for Asia Pacific customers).

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -