Setting up external Radius server for Hotspot authentication: Difference between revisions

From Teltonika Networks Wiki
mNo edit summary
No edit summary
 
(2 intermediate revisions by 2 users not shown)
Line 1: Line 1:
<p style="color:red">The information in this page is updated in accordance with [https://wiki.teltonika-networks.com/view/FW_%26_SDK_Downloads'''00.07.10'''] firmware version.</p>
__TOC__
__TOC__


Line 4: Line 5:


In this example we will perform a basic external Radius server configuration and test it with RUT device for Hotspot authentication. We will use ''freeradius'' package to set up a local Radius server on Ubuntu operating system. A router with a public IP address will be directly connected to the Radius server and forward authentication requests to a LAN IP address of the server via default Radius ports.
In this example we will perform a basic external Radius server configuration and test it with RUT device for Hotspot authentication. We will use ''freeradius'' package to set up a local Radius server on Ubuntu operating system. A router with a public IP address will be directly connected to the Radius server and forward authentication requests to a LAN IP address of the server via default Radius ports.
 
[[File:External_Radius_server_topology_v1.png|alt=|center|772x772px]]
[[File:External Radius server topology v1.png]]


==Prerequisites==
==Prerequisites==
Line 78: Line 78:


Firstly, let us set a static lease for the Ubuntu machine running Radius server and configure port forwarding:
Firstly, let us set a static lease for the Ubuntu machine running Radius server and configure port forwarding:
* Login to WebUI and navigate to Network → Interfaces LAN
* Login to WebUI and navigate to Network → DHCP Static Leases
[[File:Networking Radius server LAN edit v2.png|border|class=tlt-border|1097x1097px]]
#Press the '''ADD''' butoon.
* Add a static lease to the MAC address of Ubuntu machine.
#Select MAC address of Ubuntu machine.
[[File:Networking Radius server Static lease v1.png|border|class=tlt-border|1095x1095px]]
#Press the '''Save & Apply''' button.
[[File:Networking Radius server LAN edit v3.png|border|class=tlt-border|1097x1097px]]
* Navigate to Network → Firewall → Port Forwards and add two new rules to forward 1812 and 1813 ports from WAN to Radius server on the same ports.
* Navigate to Network → Firewall → Port Forwards and add two new rules to forward 1812 and 1813 ports from WAN to Radius server on the same ports.
[[File:Networking Radius server Port forwards v1.png|border|class=tlt-border|1095x1095px]]
#Enter the '''desired name'''.
 
#In the dropdown menu scroll down to the buttom and press enter, then write one of the ports.
#Select Radius server IP.
#Press the '''ADD''' button.
[[File:Networking Radius server Port forwards v3.png|border|class=tlt-border|1095x1095px]]
* In the newly opened tab:
# Enable the instance.
# Press '''Save & Apply'''.
[[File:Networking Radius server Port forwards part2 v3.png|border|class=tlt-border|1095x1095px]]
*Create second rule same as first rule was created just change the '''port'''.
Radius server is now set with basic configuration and ready to be tested with RUT2 to authenticate Hotspot users.
Radius server is now set with basic configuration and ready to be tested with RUT2 to authenticate Hotspot users.


Line 98: Line 107:
In order to start our Hotspot, we need to create a Wifi access point without a dedicated interface nor with any authentication:
In order to start our Hotspot, we need to create a Wifi access point without a dedicated interface nor with any authentication:
* Navigate to Network → Wireless and click add
* Navigate to Network → Wireless and click add
* Select "--No network--" in General setup → Network
* In General setup section:
[[File:Networking Radius server wireless general v1.png|border|class=tlt-border|1050x1050px]]
#Select "'''--No network--'''".
* Select "No encryption" in Wireless security → Encryption
[[File:Networking Radius server wireless general v2.png|border|class=tlt-border|1050x1050px]]
* Save & Apply
#Select "No encryption" in Wireless security → Encryption
[[File:Networking Radius server wireless security v1.png|border|class=tlt-border|1088x1088px]]
#Save & Apply
[[File:Networking Radius server wireless security v2.png|border|class=tlt-border|1088x1088px]]


* Navigate to Services → Hotspot (Or install the package if it is not present by navigating to Services → Package Manager)
* Navigate to Services → Hotspot (Or install the package if it is not present by navigating to Services → Package Manager)
* Add new Hotspot instance by selecting Wireless access point created earlier
* Add new Hotspot instance by selecting Wireless access point created earlier
[[File:Networking Radius server hotspot general part1 v1.png|border|1100px|class=tlt-border|692x692px]]
* Enable the Hotspot and select Radius as Authentication mode in General settings.
* Enable the Hotspot and select Radius as Authentication mode in General settings.
[[File:Networking Radius server hotspot general v1.png|border|class=tlt-border|692x692px]]
[[File:Networking Radius server hotspot general v2.png|border|class=tlt-border|692x692px]]
* Go to Radius menu, insert Public IP of the Radius server (RUT1 WAN IP address) and Radius secret key we created for the client before.
* Go to Radius menu.
[[File:Networking Radius server Radius hotspot settings v1.png|border|class=tlt-border|730x730px]]
#Insert Public IP of the Radius server (RUT1 WAN IP address).
#Radius secret key we created for the client before.
[[File:Networking Radius server Radius hotspot settings v2.png|border|class=tlt-border|730x730px]]


Our configuration is complete.
Our configuration is complete.
Line 143: Line 156:
* Logs should show Login OK message
* Logs should show Login OK message
[[File:Networking Radius server log message v1.png|border|class=tlt-border|864x864px]]
[[File:Networking Radius server log message v1.png|border|class=tlt-border|864x864px]]
[[Category:WIFI]]

Latest revision as of 09:35, 14 October 2024

Main Page > General Information > Configuration Examples > WIFI > Setting up external Radius server for Hotspot authentication

The information in this page is updated in accordance with 00.07.10 firmware version.

Summary

In this example we will perform a basic external Radius server configuration and test it with RUT device for Hotspot authentication. We will use freeradius package to set up a local Radius server on Ubuntu operating system. A router with a public IP address will be directly connected to the Radius server and forward authentication requests to a LAN IP address of the server via default Radius ports.

Prerequisites

  • RUT1 - Router with a Public IP address to make local server able to accept external authentication requests
  • Ubuntu machine - To host a local freeradius server
  • RUT2 - To configure Hotspot and test Radius authentication method using our installed server

Preparing Ubuntu machine

Installing the server


Firstly, update the package list and upgrade to the latest packages:

sudo apt update
sudo apt upgrade

Next, install freeradius package:

sudo apt install freeradius

Defining a Client


Client - Hotspot that will use freeradius to authenticate users. In order to add/edit clients, we need to access clients.conf file, use your favourite text editor to access it:

sudo nano /etc/freeradius/3.0/clients.conf

For this example we will add the following lines in order to accept any IP address as a client:

client 0.0.0.0/0 {
     secret = demosecret
     shortname = 0.0.0.0/0
}

Note: IP of a specific Public IP of the client can be used instead of 0.0.0.0/0

Defining a User and Password


Before we create a user and password, let us use MD5 encryption instead of a clear text password. We will generate MD5 encryption for demo123 password using the following command:

echo -n demo123| md5sum | awk '{print $1}'

We will now define credentials for user demo. Use your favourite text editor to open users file:

sudo nano /etc/freeradius/3.0/users

Add required lines to the file:

demo     MD5-Password:= "62cc2d8b4bf2d8728120d052163a77df"
        Reply-Message := "%{User-Name} authenticated successfully"

Once these changes are made, start the freeradius service:

sudo /etc/init.d/freeradius start

Preparing RUT1

Main requirements for RUT1:

  • Static Public IP address
  • Static lease set for Ubuntu server
  • Ports 1812 and 1813 forwarding to local Ubuntu server

Firstly, let us set a static lease for the Ubuntu machine running Radius server and configure port forwarding:

  • Login to WebUI and navigate to Network → DHCP → Static Leases
  1. Press the ADD butoon.
  2. Select MAC address of Ubuntu machine.
  3. Press the Save & Apply button.

  • Navigate to Network → Firewall → Port Forwards and add two new rules to forward 1812 and 1813 ports from WAN to Radius server on the same ports.
  1. Enter the desired name.
  2. In the dropdown menu scroll down to the buttom and press enter, then write one of the ports.
  3. Select Radius server IP.
  4. Press the ADD button.

  • In the newly opened tab:
  1. Enable the instance.
  2. Press Save & Apply.

  • Create second rule same as first rule was created just change the port.

Radius server is now set with basic configuration and ready to be tested with RUT2 to authenticate Hotspot users.

Preparing RUT2

Setting up Hotspot


Main requirements for RUT2:

  • Internet connection
  • Hotspot service

In order to start our Hotspot, we need to create a Wifi access point without a dedicated interface nor with any authentication:

  • Navigate to Network → Wireless and click add
  • In General setup section:
  1. Select "--No network--".

  1. Select "No encryption" in Wireless security → Encryption
  2. Save & Apply

  • Navigate to Services → Hotspot (Or install the package if it is not present by navigating to Services → Package Manager)
  • Add new Hotspot instance by selecting Wireless access point created earlier

  • Enable the Hotspot and select Radius as Authentication mode in General settings.

  • Go to Radius menu.
  1. Insert Public IP of the Radius server (RUT1 WAN IP address).
  2. Radius secret key we created for the client before.

Our configuration is complete.

Testing Authentication

Now that we have the setup configured, we can test if the server authenticates the users.

In order to see authentication requests on the server side:

a. Run radius server in debug mode by first disabling the freeradius service using command

sudo /etc/init.d/freeradius stop

and then running the following command:

sudo freeradius -X

b. Tail the log file using the following command:

sudo tail -f /var/log/freeradius/radius.log

Once we see the logs, we can connect to the Hotspot using user credentials defined from either a smartphone or another computer:

  • Connect to the wireless network

  • Login using credentials defined in the Radius server users

  • You should see authorization success window

  • Logs should show Login OK message