siteadmin:radius_troubleshooting
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| siteadmin:radius_troubleshooting [2017/10/10 08:28] – admin | siteadmin:radius_troubleshooting [2019/08/28 13:32] (current) – admin | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| + | ======General Troubleshooting====== | ||
| + | |||
| + | =====Common Problems==== | ||
| + | |||
| + | * The govroam monitoring system should be sending ICMP and RADIUS requests to your servers quite frequently (several times every five minutes). So you should be able to see these in your firewall logs or using Wireshark on your server. If you can't then check your firewall settings to allow ICMP echo/ | ||
| + | |||
| + | * A log message similar to: " | ||
| ====Rejected authentication requests==== | ====Rejected authentication requests==== | ||
| Line 29: | Line 36: | ||
| Further to this Hans has looked into the attribute filters and determined that NPS should be configured not to filter out the following from a proxied request: | Further to this Hans has looked into the attribute filters and determined that NPS should be configured not to filter out the following from a proxied request: | ||
| - | NAS-Identifier | + | |
| - | NAS-Port | + | |
| - | NAS-Port-Type | + | NAS-Port |
| + | NAS-Port-Type | ||
| + | Service-Type | ||
| + | |||
| + | < | ||
| + | My interpretation is it that a RADIUS server will always see those | ||
| + | if the request comes direct from a NAS client (AP, wireless controller, | ||
| + | edge switch, ...) but not necessarily for a proxy request especially | ||
| + | of the visited site uses filtering. | ||
| + | </ | ||
| + | |||
| + | What isn't know at the moment is if this standard NPS policy or a configuration being placed on NPS by administrators. | ||
| + | |||
| + | ===A general note about attributes and filtering=== | ||
| + | |||
| + | The Govroam tech spec talks about attributes and what should be in the various packets and what shouldn' | ||
| + | |||
| + | < | ||
| + | The following RADIUS attributes MUST be forwarded unaltered by participants’ | ||
| + | ORPSs if present in RADIUS Access-Request, | ||
| + | or Access-Reject messages. | ||
| + | 13.1. User-Name | ||
| + | 13.2. Reply-Message | ||
| + | 13.3. State | ||
| + | 13.4. Class | ||
| + | 13.5. Message-Authenticator | ||
| + | 13.6. Proxy-State | ||
| + | 13.7. EAP-Message | ||
| + | 13.8. MS-MPPE-Send-Key | ||
| + | 13.9. MS-MPPE-Recv-Key | ||
| + | 13.10. Calling-Station-Id | ||
| + | 13.11. Operator-Name | ||
| + | 13.12. Chargeable-User-Identity | ||
| + | Participants’ ORPSs MUST log all RADIUS authentication requests exchanged | ||
| + | |||
| + | </ | ||
| + | |||
| + | which is fine but if RADIUS servers are expecting OTHER attributes, such as NAS-*, and rejecting if they' | ||
| + | |||
| + | < | ||
| + | The inclusion of spurious RADIUS attributes in packets exchanged between | ||
| + | organisations can have unexpected effects and result in problems. It is therefore best | ||
| + | practice to filter out unnecessary attributes. It is however essential that the key | ||
| + | attributes detailed in this specification are not filtered and must be retained in | ||
| + | forwarded packets. | ||
| + | |||
| + | </ | ||
| + | |||
| + | So the solution to the problem of failed authentications is to NOT filter out certain attributes and the spec says that they ought to be. Which is correct? The best advice is to filter out these attributes when proxing outwards but if there are any authentication issues with remote sites that you're struggling to fix then consider removing the filter to see what happens. | ||
| + | At the same time ensure that your RADIUS is NOT configured to expect these extra attributes. It WILL be possible to run a service with just the key attributes mentioned in the spec. | ||
siteadmin/radius_troubleshooting.1507624080.txt.gz · Last modified: 2017/10/10 08:28 by admin
