6.4.2 Verification of RADIUS installation
In order to verify the installation, the following set-up is configured (Figure ). When a user
authenticates a device, this device will send a message to the RADIUS server, which will
accept or reject the user depending on if this device is taken as a client for this server.
Figure 6-7: Set-up RADIUS for verifying the installation
6.4.3 RADIUS client configuration
Once the server is configured, the client must be configured as well. This section explains
how to do it on the WR-Z16.
The use of gpa_ctrl allows to configure ip and secret. These parameters can be found in
security module:
root@zen- 305:~# gpa_ ctrl - s security auth/radius/server1_ ip
172.17.5.39
root@zen-305:~# gpa_ctrl -s security auth/radius/server1_secret sev-
ensecret
And reboot to apply the changes.
Now that everything has been configured correctly, it is possible to access the WR-Z16
board with these new passwords which have been set in the users file. In addition, the com-
mand freeradius-X can be used in order to verbose the RADIUS access.
The following figure shows an access using the password that was configured in the users
file, but failing the first try. Looking at the output of freeradius at the host, it is possible to
get the information from the first failed attempt:
90
CHAPTER 6 • WR-Z16 User Manual Rev. v3.4
6.4 RADIUS