public:implementing_govroam
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| public:implementing_govroam [2019/02/22 11:43] – [Govroam network] admin | public:implementing_govroam [2025/03/28 14:53] (current) – ↷ Links adapted because of a move operation admin | ||
|---|---|---|---|
| Line 54: | Line 54: | ||
| Recommended viewing - video of James Hooper' | Recommended viewing - video of James Hooper' | ||
| <note warning> | <note warning> | ||
| - | . For slideset, see 'Resources' | + | . For slideset, see [[: |
| ==== Consider Wi-Fi and Network Architecture if offering Visited Service ==== | ==== Consider Wi-Fi and Network Architecture if offering Visited Service ==== | ||
| - | All Govroam services require you to deploy a RADIUS service. Ideally this should be a resilient service and comprise two servers, which may be physical boxes or virtual machines. Selection of the RADIUS server software is covered in the following | + | All Govroam services require you to deploy a RADIUS service. Ideally this should be a resilient service and comprise two servers, which may be physical boxes or virtual machines. Selection of the [[: |
| Consider the technological aspects of the network you wish to offer Govroam over. To provide a reasonably standard experience for users and to try reduce the amount of changes to supplicant and application settings required from site to site, the Tech Spec currently defines a single sets of network parameters based on WPA2 ' | Consider the technological aspects of the network you wish to offer Govroam over. To provide a reasonably standard experience for users and to try reduce the amount of changes to supplicant and application settings required from site to site, the Tech Spec currently defines a single sets of network parameters based on WPA2 ' | ||
| Line 129: | Line 129: | ||
| * [[https:// | * [[https:// | ||
| * [[https:// | * [[https:// | ||
| - | Your ORPS may be [[jisc: | + | Your ORPS may be [[public: |
| ===== Network Architecture ===== | ===== Network Architecture ===== | ||
| Line 228: | Line 228: | ||
| ====== Support Server Section ====== | ====== Support Server Section ====== | ||
| + | <note important> | ||
| ====== Install Your RADIUS Server (ORPS) ====== | ====== Install Your RADIUS Server (ORPS) ====== | ||
| Line 335: | Line 336: | ||
| ====== Add your ORPS to the Govroam RADIUS Infrastructure and Add NRPS to your ORPS RADIUS config ====== | ====== Add your ORPS to the Govroam RADIUS Infrastructure and Add NRPS to your ORPS RADIUS config ====== | ||
| - | You now need to peer your ORPS(s) with the NRPSs so that they can exchange RADIUS communications. This requires the addition of your RADIUS servers as clients in the relevant RADIUS server configurations together with the shared secrets that will establish trust. As stated in [[section 6]], your ORPS needs to have a public facing IP address and a fully qualified domain name (an address record in DNS). Your ORPS will be configured in the NRPS clients tables with their IP addresses, but you need to provide us with the FQDNs. This reduces scope for error, facilitates IPv4 and v6 support and enables you to change the IP address in the future without needing to update Support. | + | You now need to peer your ORPS(s) with the NRPSs so that they can exchange RADIUS communications. This requires the addition of your RADIUS servers as clients in the relevant RADIUS server configurations together with the shared secrets that will establish trust. As stated in [[public: |
| Since a there are two ends of the RADIUS conversations there are two operations: | Since a there are two ends of the RADIUS conversations there are two operations: | ||
| Line 366: | Line 367: | ||
| Additional ORPS can be added to the clients config of the NRPS by following the same steps as described above. | Additional ORPS can be added to the clients config of the NRPS by following the same steps as described above. | ||
| - | Once an ORPS has been added the NRPSs will automatically communicate with it. NRPS send all traffic to the first ORPS in their config list until it stops responding, the NRPS then try the next ORPS in the list. The order of preference is the order which the ORPS were added to the Support server. | + | Once an ORPS has been added the NRPSs will automatically communicate with it. NRPS send all traffic to the first ORPS in their config list until it stops responding, the NRPS then try the next ORPS in the list. |
| Shared secrets for your additional ORPS: Normally every ORPS has a unique set of shared secrets for peering with the NRPS. This is best practice and the most secure way of employing shared secrets. This remains true even in scenarios in which peered realms contain multiple RADIUS servers. | Shared secrets for your additional ORPS: Normally every ORPS has a unique set of shared secrets for peering with the NRPS. This is best practice and the most secure way of employing shared secrets. This remains true even in scenarios in which peered realms contain multiple RADIUS servers. | ||
| Line 454: | Line 455: | ||
| The next stage is to configure the handling of RADIUS Access-Request packets from your network NAS systems (APs, WLCs and [if you support wired .1X connection] switches) by your ORPS. The aim is to handle Access-Request packets arising from your users authentication requests locally while Access-Requests arising from visiting users need to be forwarded to the NRPS servers. How you go about achieving this is dependent on the RADIUS platform you have deployed. FreeRADIUS and Radiator use unlang script language/ | The next stage is to configure the handling of RADIUS Access-Request packets from your network NAS systems (APs, WLCs and [if you support wired .1X connection] switches) by your ORPS. The aim is to handle Access-Request packets arising from your users authentication requests locally while Access-Requests arising from visiting users need to be forwarded to the NRPS servers. How you go about achieving this is dependent on the RADIUS platform you have deployed. FreeRADIUS and Radiator use unlang script language/ | ||
| - | Authentication of your own users should be considered as a separate logical process from Access-Request packet handling/' | + | Authentication of your own users should be considered as a separate logical process from Access-Request packet handling/' |
| To save having to revisit this part of your configuration at a later stage, it is worthwhile tackling the issue of dealing with badly-formed usernames during this setup stage. Due to the huge number of users of Govroam and explosive growth over recent years, this is an important topic. Dealing with badly formed usernames applies to both local authentication of your own users and forwarding of auth requests for visitors. The object of filtering invalid realms is covered in the separate advisory document [[https:// | To save having to revisit this part of your configuration at a later stage, it is worthwhile tackling the issue of dealing with badly-formed usernames during this setup stage. Due to the huge number of users of Govroam and explosive growth over recent years, this is an important topic. Dealing with badly formed usernames applies to both local authentication of your own users and forwarding of auth requests for visitors. The object of filtering invalid realms is covered in the separate advisory document [[https:// | ||
| Line 501: | Line 502: | ||
| Shared secrets check. In scenarios involving multiple ORPSs, it is advisable to test each ORPS independently for correct configuration. Shared secrets can be checked by simply running a command line test on each of the ORPS. Note that whilst FreeRADIUS, Radiator and MS NPS include utilities for cleartext password based authentication methods such as PAP, this is no longer supported by the Govroam infrastructure, | Shared secrets check. In scenarios involving multiple ORPSs, it is advisable to test each ORPS independently for correct configuration. Shared secrets can be checked by simply running a command line test on each of the ORPS. Note that whilst FreeRADIUS, Radiator and MS NPS include utilities for cleartext password based authentication methods such as PAP, this is no longer supported by the Govroam infrastructure, | ||
| - | a) If you have not hooked your Wi-Fi service in to your RADIUS server, the simplest test involves using a command line tool to try to send Access-Request packets to the NRPS for forwarding to the Govroam Support IdP for a test user belonging to the Govroam realm. (This is a command line variation of the standard visitor authentication simulation test - see [[section 12]] below). | + | a) If you have not hooked your Wi-Fi service in to your RADIUS server, the simplest test involves using a command line tool to try to send Access-Request packets to the NRPS for forwarding to the Govroam Support IdP for a test user belonging to the Govroam realm. (This is a command line variation of the standard visitor authentication simulation test - [[: |
| eapol_test is included in wpa_supplicant which is an opensource supplicant that can be acquired from [[http:// | eapol_test is included in wpa_supplicant which is an opensource supplicant that can be acquired from [[http:// | ||
| Line 744: | Line 745: | ||
| ====Govroam network==== | ====Govroam network==== | ||
| - | Visited organisations must implement one (or more) dedicated network/ | + | Visited organisations must implement one (or more) dedicated network/ |
| Most participating organisations permit their own users to connect via the organisation' | Most participating organisations permit their own users to connect via the organisation' | ||
| Line 770: | Line 771: | ||
| * WEP must not be implemented on the Govroam Wi-Fi service that connects to the Govroam network service | * WEP must not be implemented on the Govroam Wi-Fi service that connects to the Govroam network service | ||
| * TLS interception proxies/ | * TLS interception proxies/ | ||
| - | Visited organisations may implement IPv4 and IPv6 filtering between the visitor VLAN and other external networks, providing that this permits the forwarding protocols detailed in the [[Firewall Configuration | + | Visited organisations may implement IPv4 and IPv6 filtering between the visitor VLAN and other external networks, providing that this permits the forwarding protocols detailed in the [[: |
| ==== Resources: ==== | ==== Resources: ==== | ||
| Line 1054: | Line 1055: | ||
| * testuser@realm - handled locally and NOT forwarded to NRPS | * testuser@realm - handled locally and NOT forwarded to NRPS | ||
| * invalidtestuser@realm - rejected locally and NOT forwarded to NRPS | * invalidtestuser@realm - rejected locally and NOT forwarded to NRPS | ||
| - | The following section focusses | + | The following section focusses on invalid User-Name (ie those that do not conform to the Network Access Identifier standard). |
| **Username Handling Conformance Check** - of particular importance in deployments where a single SSID ' | **Username Handling Conformance Check** - of particular importance in deployments where a single SSID ' | ||
| Line 1066: | Line 1067: | ||
| * testuser@anyrealm. (ends with a dot) - authentication should be dropped (User-Name realm MUST NOT end with ' | * testuser@anyrealm. (ends with a dot) - authentication should be dropped (User-Name realm MUST NOT end with ' | ||
| * testuser@myorganisationname..ac.uk (contains double dot) - authentication should be dropped (User-Name realm MUST NOT contain double ' | * testuser@myorganisationname..ac.uk (contains double dot) - authentication should be dropped (User-Name realm MUST NOT contain double ' | ||
| - | **Govroam Information Web Site** - you must have an information web site as detailed in the {{ : | + | **Govroam Information Web Site** - you must have an information web site as detailed in the {{ : |
| - | <note important> | + | |
| - | . | + | |
| * Govroam information page on organisation web site - yes | * Govroam information page on organisation web site - yes | ||
| Line 1112: | Line 1111: | ||
| We would suggest that information on how to get started with campus network services includes information about Govroam. You might want to provide an open access captive portal network service for first time users that simply provides information about Govroam, links to your preferred Govroam setup tools and guidance on how to get IT support. | We would suggest that information on how to get started with campus network services includes information about Govroam. You might want to provide an open access captive portal network service for first time users that simply provides information about Govroam, links to your preferred Govroam setup tools and guidance on how to get IT support. | ||
| - | ===== Mapping App ===== | + | ====== Mapping App ====== |
| + | <note important> | ||
public/implementing_govroam.1550835834.txt.gz · Last modified: 2019/02/22 11:43 by admin
