======Testing tools======
The main tool used for end-to-end RADIUS testing is **eapol_test**. This emulates a full 802.1x authentication from the client. There are other tools but they just emulate a simple RADIUS authentication.
We strongly recommend using this approach when doing initial RADIUS testing; there are too many idiosyncrasies with actual clients and wireless systems to be confident that you're testing properly.
Start by installing eapol_test on the same machine at your ORPS is running on and configuring your ORPS to accept authentication requests from localhost.
=====Downloads=====
====Windows====
Download the binary from here: [[https://github.com/janetuk/eapol_test/releases/|eapol_test git repo]]. This is a command line tool so there's no point in double clicking on it.
====Debian Linux====
Either
* Install the eapoltest package from the appropriate repo ('testing' at the current time).
* Follow [[http://deployingradius.com/scripts/eapol_test/|these instructions]] to compile it
====Centos Linux====
Install the 'eapol_test' package from the repos.
=====Configuration=====
Firstly create a configuration file that contains the relevant authentication information:
network={
eap=PEAP
eapol_flags=0
key_mgmt=IEEE8021X
identity="testaccount@some.realm"
password="password"
#ca_cert="/root/Radius/cacert.pem"
phase2="auth=MSCHAPV2"
anonymous_identity="@some.realm"
}
The above users PEAP/MS-CHAP-V2 to authenticate the user **testaccount** at the realm **some.realm**. The ''identity'' and ''anonymous_identity'' should have the same realm.
The ''ca_cert'' line can be commented out if you don't want to compare the server certificate with the Root CA.
=====Testing=====
The simpliest test command:
eapol_test -c file.txt -a 1.1.1.1 -s secret
''-c'' specifies the file created above.
''-a'' is the IP address of the RADIUS server.
''-s'' is the shared secret with the server.
The RADIUS server must be configured to accept request from the machine that eapol_test is being run on.
This should generate a rather long output ending in either SUCCESS or FAILURE. This output is notoriously hard to decipher so using the RADIUS server logs is generally the best approach.