802.1X FreeRADIUS setup Undertaking 802.1X setup is a daunting experience for many organizations. There are detailed requirements on end-user PCs, switches, servers, certificates, and more. If any of these requirements are n... Network Security Best Practices
Client Case Study: Managing multiple RADIUS proxy servers was wasting this ISP’s time and money When an ISP is running a large number of systems at 99% idle capacity "just in case," you know there's room for optimization. We worked with a multi-service provider that had built four separate RADIU... Network Security Best Practices
How to configure a RADIUS server Even though clients may prefer to configure their own system, some clients are unsure of how to configure a RADIUS server. Although the process can be complex, clients can learn how to setup a RADIUS ... Network Security Best Practices
Client Case Study: 802.1X Setup One of our clients had customer-visible issues in their 802.1X deployment. We tracked the problem down to firmware issues and worked with multiple vendors to fix the issues and more. This meant that o... Network Security Best Practices
Client Case Study: Performance A case study on how we redesigned our client’s system to improve the RADIUS server’s database, which had lost performance over time. The database performance was restored, even with ten times the amou... Network Security Best Practices
Client Case Study: RADIUS SQL We were called in to help our client who had database performance issues with their custom schema and queries. We made updates to the database tables and indices and reconfigured the RADIUS server app... Network Security Best Practices
High availability and performance Building a RADIUS system that can handle 10 million users takes time. Our experienced team can work with you to design a customized solution using your desired hardware and Operating System to achieve... Network Security Best Practices
RADIUS Server Proxying We have extensive experience in the WiFi roaming arena, and we are actively involved in vendor forums. Proxying is a key part of most RADIUS infrastructures. We foster relationships with numerous comp... Network Security Best Practices
User Authentication Performance The current Covid-19 crisis has created an unprecedented situation for businesses. More people are working remotely than ever before, in order to maintain corporate productivity in the face of this cr... Network Security Best Practices
Optimizing SQL Most telecommunications companies and internet service providers (ISPs) use SQL databases to store the bulk of their user information. While we spend a lot of time on RADIUS, the reality is that any c... Network Security Best Practices
LDAP and Active Directory LDAP databases are most typicallyused by enterprises to store employee credentials, telephone numbers, etc. Some ISPs also use LDAP, but it's not as wide spread as the ISP use of SQL. The common imple... Network Security Best Practices