mirror of
https://github.com/Telecominfraproject/wlan-docs.git
synced 2025-11-04 20:58:03 +00:00
description
| description |
|---|
| OpenWiFi 2.0 |
RADIUS Authenticated SSID
When authenticating clients with back office RADIUS systems, the configuration of OpenWiFi permits this on a per SSID basis.
{% tabs %} {% tab title="Simple RADIUS" %}
"interfaces": [
{
"name": "WAN",
"role": "upstream",
"ethernet": [
{
"select-ports": [
"WAN*"
]
}
],
"ipv4": {
"addressing": "dynamic"
},
"ssids": [
{
"name": "OpenWifi",
"wifi-bands": [
"5G"
],
"bss-mode": "ap",
"encryption": {
"proto": "wpa2",
"ieee80211w": "optional"
},
"radius": {
"authentication": {
"host": "192.168.178.192",
"port": 1812,
"secret": "secret"
},
"accounting": {
"host": "192.168.178.192",
"port": 1813,
"secret": "secret"
}
}
}
]
},
{% endtab %}
{% tab title="EAP-Local SSID" %}
"ssids": [
{
"name": "OpenWifi",
"wifi-bands": [
"2G"
],
"bss-mode": "ap",
"encryption": {
"proto": "wpa2",
"ieee80211w": "optional"
},
"certificates": {
"ca-certificate": "/etc/ucentral/cas.pem",
"certificate": "/etc/ucentral/cert.pem",
"private-key": "/etc/ucentral/key.pem"
},
"radius": {
"local": {
"server-identity": "OpenWiFi-Local-EAP",
"users": [
{
"user-name": "open",
"password": "wifi"
}
]
}
}
}
]
},
{% endtab %} {% endtabs %}
Many parameters are possible with RADIUS authentications given the many methods in use worldwide. Many of the EAP methods have configuration options described below.
| RADIUS Attribute | Description |
|---|---|
| nas-identifier | Unique NAS Id used with RADIUS server |
| chargeable-user-id | Chargeable User Entity per RFC4372 |
| local |
Local RADIUS within AP device
|
| authentication |
RADIUS server
Additional methods within Access-Request
|
| accounting |
RADIUS server
Additional methods within Access-Request sent in Accounting
|
| accounting | interval ( Interim accounting interval defined in seconds ) |