===Changed files===
* clients.conf
* proxy.conf
* sites-available -> govroam
* mods-available -> govroam_logs
Delete any other links in the sites-enabled directory ('status' can be left/added if you're allowing status checks). Attempting to run 'govroam' and 'default' will likely result in problems starting the RADIUS server.
===clients.conf:===
# Configure a Network Access Server (e.g. wireless controller) to accept traffic from.
client NAS {
secret = something
ipaddr = 10.10.20.1
}
# Configure the JISC NRPS as a client as it will be sending request from your people abroad.
client roaming0 {
secret = something
ipaddr = 192.168.0.1
operator = "NRPS"
}
# Configure your local IdP as a client. (Omit for Visited Only ORPS)
client localidp1 {
secret = something
ipaddr = 10.10.10.31
operator = "1localnet"
}
proxy.conf:
# Blackhole (REJECT) where the realm is missing.
realm NULL {
}
# Realms that don't match any other listed send to the pool of govroam servers
realm "~^[^@\. ]([a-zA-Z0-9-]+\.)+[a-zA-Z]{2,6}$" {
auth_pool = govroam
nostrip
}
# Pool of govroam servers
home_server_pool govroam {
home_server = roaming0
type = client-port-balance
}
#Govroam server configuration
home_server roaming0 {
ipaddr = roaming0.govroam.uk
port = 1812
type = auth
secret = something
status_check = status-server # Checks status of govroam server
operator = "NRPS"
}
# Handle requests for the realm 'localnet'. (Omit for Visited Only ORPS)
realm localnet {
nostrip
auth_pool = ad_auth
}
server_pool ad_auth {
type = client-port-balance
home_server = localidp1
}
home_server localidp1 {
status_check = status-server
ipaddr = 10.10.10.31
secret = something
port = 1812
type = auth
operator = "1localnet"
}
===sites-available->govroam:===
server govroam {
# Listen on the default port on all IP addresses
listen {
type = auth
ipaddr = *
}
authorize {
preprocess
update request {
Operator-Name = 1your.domain # Adds the Operator Name attribute to the request, if it doesn't already exist.
}
auth_log
suffix # Identifies the realm
files
}
authenticate {
}
preacct {
preprocess
suffix
}
accounting {
detail
}
post-auth {
# Lots of logging
reply_log
# Only send F-TICKS to Jisc when proxying between sites.
if ( "%{home_server:operator}" != "NRPS" && "%{client:operator}" != "NRPS" && "%{request:Called-Station-Id}" =~ /:govroam$/) {
f_ticks
}
govroam_log
Post-Auth-Type REJECT {
attr_filter.access_reject
reply_log
}
}
pre-proxy {
pre_proxy_log
if("%{Packet-Type}" != "Accounting-Request") {
attr_filter.pre-proxy
}
}
post-proxy {
post_proxy_log
attr_filter.post-proxy
}
}
And then create a symlink from sites-enabled/govroam to sites-available/govroam.
===mods-available->govroam_logs:===
# F-TICKS - only appropriate for Regional Federation Operators
linelog f_ticks {
filename = syslog
format = ""
reference = "f_ticks.%{%{reply:Packet-Type}:-format}"
f_ticks {
Access-Accept ="F-TICKS/govroam/1.0#REALM=%{Realm}#VISCOUNTRY=GB#VISINST=%{Operator-Name}#CSI=%{Calling-Station-Id}#RESULT=OK#FEDID=XX#" # Replace XX with your supplied ID,
}
linelog govroam_log {
filename = syslog
format = ""
reference = "govroam_log.%{%{reply:Packet-Type}:-format}"
govroam_log {
Access-Accept = "govroam-auth#ORG=%{request:Realm}#USER=%{User-Name}#CSI=%{%{Calling-Station-Id}:-Unknown Caller Id}#NAS=%{%{Called-Station-Id}:-Unknown Access Point}#CUI=%{%{reply:Chargeable-User-Identity}:-Unknown}#MSG=%{%{EAP-Message}:-No EAP Message}#RESULT=OK#"
Access-Reject ="govroam-auth#ORG=%{request:Realm}#USER=%{User-Name}#CSI=%{%{Calling-Station-Id}:-Unknown Caller Id}#NAS=%{%{Called-Station-Id}:-Unknown Access Point}#CUI=%{%{reply:Chargeable-User-Identity}:-Unknown}#MSG=%{%{reply:Reply-Message}:-No Failure Reason}#RESULT=FAIL#"
}
}
And then create a symlink from mods-enabled/govroam_logs to mods-available/govroam_logs.
Use the **details.log** file in mods-available to configure how the local logs are formatted and stored. The format below stores the logs by date and time making it easier to use logrotate or similiar to archive off older logs.
detail auth_log {
detailfile = ${radacctdir}/%Y%m%d/request-detail-%H:00
header = "%{Packet-Src-IP-Address} - %t"
detailperm = 0600
suppress {
User-Password
}
}
detail reply_log {
detailfile = ${radacctdir}/%Y%m%d/reply-detail-%H:00
header = "%{Packet-Src-IP-Address} - %t"
detailperm = 0600
}
detail pre_proxy_log {
detailfile = ${radacctdir}/%Y%m%d/pre-proxy-detail-%H:00
header = "%{Packet-Src-IP-Address} - %t"
log_packet_header = yes
detailperm = 0600
suppress {
User-Password
}
}
detail post_proxy_log {
detailfile = ${radacctdir}/%Y%m%d/post-proxy-detail-%H:00
header = "%{Packet-Src-IP-Address} - %t"
detailperm = 0600
}
Once configured you can test using [[public:Testing Tools|eapol_test]]