AI in network management: A hard look at real-world limitations Today, AI sits at the peak of the hype cycle, but AI in network management faces fundamental challenges that the industry seems reluctant to acknowledge. While it's revolutionizing certain fields, net... Network Security Best Practices
Don’t "set it and forget it" So you decided that whatever you were using for network security wasn’t getting the job done… either it didn’t scale with the growth in your user base, devices, or network design, or it was hindering ... Network Security Best Practices
RADIUS server installation: Expert solutions for enhanced network security Professional RADIUS server installation services RADIUS server installation is more involved than just setting up a few software packages. The default RADIUS products are intended to be the basis for ... Network Security Best Practices Network Security Protocols
What does a "Shared secret is incorrect" error mean? The root cause for both messages is the same, and is unambiguous: The shared secret on the RADIUS server and the NAS are not the same . However, there can be some confusion because, depending on what ...
Virtual servers with FreeRADIUS Virtual servers provide a powerful way to define unique policies for different traffic sources . When policy rules for each traffic source are defined in their own separate configuration file, it’s a ...
Configuring FreeRADIUS authentication with PAP (Password Authentication Protocol) Introduction to PAP authentication Password Authentication Protocol (PAP) is one of the most fundamental authentication methods used in Remote Authentication Dial-In User Service (RADIUS). Despite bei... Network Security Best Practices Network Security Protocols
Creating server certificates for FreeRADIUS Once the initial EAP testing has been performed, it's time to create the production-grade server certificates for your FreeRADIUS environment. These certificates form the foundation of secure communic... Network Security Best Practices
How one-time passwords work One-time passwords (OTP) and multi-factor authentication (MFA) are important mechanisms used to improve security. Both these strategies can combine the username and password credentials with a one-tim... Network Security Best Practices Network Security Protocols
RADIUS for Universities University environments present challenges for RADIUS system design. Every hour, on the hour, thousands of students close their laptops, move to a different location, and open them again. This unique ... Network Security Best Practices
What are TLS session tickets? In many environments, the same group of users will authenticate to the Wi-Finetwork multiple times a day. TLS session tickets help to streamline this process by doing a full authentication only once a... Network Security Best Practices
Scaling your RADIUS ecosystem Not all RADIUS systems are the same, and the system architecture can vary wildly. For example, a network design which works well for 10,000 users will likely not work well for 10,000,000 users. It can... Network Security Best Practices
Designing your network for fail-over An essential part of good network design is to plan for failures. In a RADIUS ecosystem, one major requirement is that clients can always connect to a RADIUS server, and that the system can continue t... Network Security Best Practices