Designing your network for fail-over An essential part of good network design is to plan for failures. In a RADIUS ecosystem, one major requirement is that clients can always connect to a RADIUS server, and that the system can continue t... Network Security Best Practices
Email addresses are primary user identifiers? There is a lot of advice out there that email addresses are not identifiers . Even Internet2 has a document explaining why email is not an appropriate user identifier . What does this mean for RADIUS,... Network Security Best Practices
RADIUS design for internet service providers (ISPs) More than almost any other business, internet service providers (ISPs) need to provide their customers with fast, reliable internet connection to their computer network. Any downtime can be catastroph... Network Security Best Practices
Network design for multi-site RADIUS systems Some organizations and network operators such as ISPs can use a central RADIUS service for all of their RADIUS needs. This configuration is possible when there are a small number of users, or system l... Network Security Best Practices
PAP vs CHAP. Is PAP less secure? One of the most common questions about RADIUS security asks “Is PAP secure?” The usual answer is “no”, which is (in our opinion) seriously misleading. A better answer is “Here’s a comparison of PAP an... Network Security Best Practices Network Security Protocols