freeradius mysql user group

Most Relevant Content

  • FreeRADIUS User Group Management with MySQL

    FreeRADIUS is a high performance RADIUS Server. A number of network devices can be used with freeRADIUS Server as a RADIUS Client including MikroTik Router. As a modular RADIUS suite, freeRADIUS accepts MySQL module to query user authentication and authorization and to store accounting data. In my previous article, I discussed how to install and configure FreeRADIUS MySQL module. I also discussed how to authenticate MikroTik Login with freeRADIUS MySQL user. In this article, we will talk about how to configure user group in MySQL module to categorize freeRADIUS user’s reply attributes. FreeRADIUS User Group Group is used to categorize some attributes those will be applied on some users. In freeRADIUS, these attribute are referred to as AVP. So, before going to configure user group, we should have clear concept on freeRADIUS AVP. Attribute Value Pair (AVP) AVP is the workhorse of the RADIUS Protocol. Communication between a RADIUS Server and RADIUS Client is done based on AVPs. AVP can be categorized either check or reply attributes. Check attributes are sent from the client to the server. Reply attributes are sent from the server to the client. Attributes serve as carriers of information between the RADIUS Client and Server. The [...]

    READ MORE »

  • More Similar Content

  • »

    FreeRADIUS MySQL Database GUI with phpMyAdmin on CentOS 7 |   January 30, 2019

    FreeRADIUS is a high performance RADIUS Server that accepts a large number of networking devices as RADIUS Client including MikroTik Router. MySQL is one of the best user sources for freeRADIUS server. In my previous article, I discussed how to install freeRADIUS server on CentOS 7 and how to integrate MySQL module with freeRADIUS server. I also discussed how to create user group and profile in MySQL database server and authenticate MikroTik PPPoE client with MySQL database user. I used [...]

    READ MORE »

  • »

    FreeRADIUS User Profile Configuration for MikroTik Router |   January 10, 2019

    FreeRADIUS is a high performance RADIUS application that accepts a large number of network devices as RADIUS Client including MikroTik Router. FreeRADIUS MySQL module helps to get user authentication and authorization information from database server and to store user accounting information in database server. Configuring MySQL user group and profile properly, freeRADIUS user restriction can easily be maintained. How to configure user group to apply user limitation was discussed in my previous article. In this article, I will discuss how [...]

    READ MORE »

  • »

    MikroTik Radius Configuration with FreeRADIUS and MySQL |   December 18, 2018

    FreeRADIUS is a modular RADIUS suite. A lot of modules such as Perl, python, MySQL etc. can be integrated with freeRADIUS to enrich freeRADIUS features. MySQL is one of the best user and client sources in freeRADIUS server. One of the important advantages of MySQL with freeRADIUS server is that MySQL can easily be controlled with a lot of programming languages including PHP. So, freeRADIUS users and their authentication, authorization and accounting can easily be controlled graphically using MySQL database [...]

    READ MORE »

  • »

    MikroTik Radius Configuration with FreeRADIUS |   December 7, 2018

    FreeRADIUS is a high performance RADIUS suite that provides authentication, authorization and accounting facility for a large number of network devices including MikroTik Router. Although MikroTik has user manager RADIUS service to provide authentication, authorization and accounting facility but it is not free for customization and not suitable for medium to large organization. On the other hand, freeRADIUS is free for customization according to your organization requirements. But freeRADIUS has to be customized by you. In my previous article, I [...]

    READ MORE »

  • You May Also Like

  • »

    How to Recover MikroTik User Password |   August 9, 2018

    MikroTik Wiki and Forum say that there is no way to recover MikroTik user password without losing MikroTik configuration. But if you have an unencrypted configuration file backup taken before, you will be able to recover your user password using MikroTik password recovery tools. How to Backup and Restore MikroTik configuration file manually was discussed in my previous article. I also discussed how to backup MikroTik configuration file automatically via Mail in another article and in this article I will [...]

    READ MORE »

  • »

    MikroTik CAPsMAN and CAP Basic Configuration using Winbox |   February 20, 2020

    MikroTik CAPsMAN (Controlled Access Point system Manager) is a centralized Access Point management application provided by MikroTik.  MikroTik introduces CAPsMAN from RouterOS v6.11 with CAPsMAN v1 and from RouterOS v6.22rc7 CAPsMAN v2 is running. If you have multiple MikroTik CAPs (Controlled Access Point) in your organization, CAPsMAN provides an easy way to maintain client data as well as CAPs configuration centrally. In my previous article, I discussed how to configure MikroTik Wireless Router as an Access Point. In this article, [...]

    READ MORE »

  • »

    MikroTik Site to Site GRE Tunnel Configuration with IPsec |   March 26, 2018

    VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides GRE (Generic Routing Encapsulation) tunnel that is used to create a site to site VPN tunnel. GRE tunneling protocol which can encapsulate a wide variety of protocols creating a virtual point-to-point link was [...]

    READ MORE »

  • »

    The Role of Computer Networking in Modern Surveillance and Security |   October 17, 2023

    In the present computerized age, computer networking is significant in ensuring modern surveillance and security frameworks are viable and productive. The progressions in innovation have prompted the improvement of innovative arrangements, for example, solar power cameras, that depend on computer networks to upgrade surveillance capacities. This article investigates the role of computer networking in modern surveillance and security frameworks, with a particular spotlight on integrating solar-powered cameras. What is Computer Networking? A computer network gathers interconnected hubs or computing gadgets that [...]

    READ MORE »

  • »

    Restrict Internet Access Based on MAC Address in MikroTik |   February 4, 2017

    MikroTik router has a lot of features by which a network administrator can design his network as he likes. As a network administrator, sometimes you may need to allow internet access some specific devices. If other devices try to access internet, they will be rejected by your router. For example, say, you have configured a simple network like below diagram. In this network, you have configured WAN, LAN, Gateway, DNS and NAT. Also you have created queue rules for limiting [...]

    READ MORE »