freeradius user group tutorial

Most Relevant Content

  • FreeRADIUS User Group Management with MySQL

    FreeRADIUS is a high performance RADIUS Server. A number of network devices can be used with freeRADIUS Server as a RADIUS Client including MikroTik Router. As a modular RADIUS suite, freeRADIUS accepts MySQL module to query user authentication and authorization and to store accounting data. In my previous article, I discussed how to install and configure FreeRADIUS MySQL module. I also discussed how to authenticate MikroTik Login with freeRADIUS MySQL user. In this article, we will talk about how to configure user group in MySQL module to categorize freeRADIUS user’s reply attributes. FreeRADIUS User Group Group is used to categorize some attributes those will be applied on some users. In freeRADIUS, these attribute are referred to as AVP. So, before going to configure user group, we should have clear concept on freeRADIUS AVP. Attribute Value Pair (AVP) AVP is the workhorse of the RADIUS Protocol. Communication between a RADIUS Server and RADIUS Client is done based on AVPs. AVP can be categorized either check or reply attributes. Check attributes are sent from the client to the server. Reply attributes are sent from the server to the client. Attributes serve as carriers of information between the RADIUS Client and Server. The [...]

    READ MORE »

  • More Similar Content

  • »

    Ubuntu RADIUS Server Configuration with freeRADIUS |   September 3, 2022

    Ubuntu Server is one of most popular open-source Linux Server distribution. It is stable and reliable than other Linux distributions. So, enterprise level application can be hosted on Ubuntu Server. Ubuntu RADIUS Server is popularly used for remote authentication and mostly used with the freeRADIUS open source RAIDUS application. freeRADIUS is one of the most popular and powerful AAA (Authorization, Authentication and Accounting) application. Any enterprise (specially ISP company) can use freeRADIUS for AAA solution and can develop billing system. [...]

    READ MORE »

  • You May Also Like

  • »

    MikroTik Unequal Dual WAN Load Balancing with Failover using ECMP |   September 15, 2019

    MikroTik Router is capable of doing Load Balancing with Failover over multiple gateways. Policy Based Routing, ECMP, PCC and NTH Load Balancing are the popular load balancing methods in MikroTik Router. Among these methods, ECMP is so easy to configure and provides almost 100% load balancing and link redundancy solution. In my previous article, I discussed how to configure Load Balancing and Link Redundancy using ECMP over two equal bandwidth gateways. ECMP method is also capable of doing load balancing [...]

    READ MORE »

  • »

    Mikrotik Router Basic Configuration Using Winbox |   August 24, 2015

    MikroTik is one of the most popular routers. MikroTik Router has a lot of networking services that help to build a stable and smooth network so easily. It is said that any ISP Company or any Enterprise Office cannot go a single day without MikroTik Router. So, system administrators who are not using MikroTik Router yet, they will soon start using MikroTik Router, I think. As a system administrator, I am also using MikroTik Router about 5 years in my network [...]

    READ MORE »

  • »

    LVM Management in CentOS/Red Hat 7 Linux |   March 15, 2019

    LVM (Logical Volume Manager) is the recommended partition method for CentOS/Red Hat 7 Linux. Specially, if we work on Mail Server, File Server, FTP Server, Web Proxy Server or any application where disk space changes frequently, the LVM partition is mandatory in this case. In my previous article, I discussed how to install CentOS 7.5 with LVM partitioning. If you are new here or CentOS 7 is not yet installed, I will suggest you to follow my previous article and [...]

    READ MORE »

  • »

    How to Block VPN Access with MikroTik Router |   May 14, 2019

    Sometimes system administrators create firewall rule to block unwanted websites. But VPN apps break these firewall rules and allow access to unwanted websites. For example, if Facebook is blocked with MikroTik Firewall and any expert user installs and enables VPN apps (such as OpenVPN, Hotspot Shield, ProtonVPN, NordVPN, PureVPN etc.), he can easily get access to Facebook. So, system administrators should also block popular VPN apps so that user cannot use those VPN servers. Blocking VPN apps is not so [...]

    READ MORE »

  • »

    Hardening MikroTik RouterOS by Limiting Login Services |   February 6, 2021

    MikroTik RouterOS is usually used as a bridge between WAN and LAN network. WAN network is always an insecure network because attackers always try to hack your RouterOS so that they can compromise it for their own benefit. As a network administrator of MikroTik RouterOS, we should always take anti hacking steps to secure our MikroTik RouterOS. There are a lot of security tasks those we should take care to secure our MikroTik RouterOS. Among these security tasks, we will [...]

    READ MORE »

  • »

    CentOS 8 Installation with Screenshots (Server with GUI) |   November 21, 2020

    Linux is a free and open source operating system developed by Linus Torvalds on September 17, 1991. It is mainly used as server environment. A lot of Linux distributions are present today. Among them, Red Hat Linux is used as enterprise Linux. Red Hat is also known as Red Hat commercial Linux that means Red Hat is a paid service program. CentOS (Community Enterprise Operating System) is another Linux distribution that provides a free and open source, enterprise-class, community-supported server platform functionally compatible with [...]

    READ MORE »

  • »

    Guest WiFi – How to Setup on MikroTik AP |   April 30, 2024

    Guest WiFi helps to keep your network safe and secure. Any sensitive wireless network should have a guest network. So, Guest WiFi is so essential for an office network. In a corporate office, guests or visitors frequently come and get connected to get internet for a few times. It is so much security issue to keep guest or visitor in the core network because among them someone can damage important network resources. So, to keep them isolated from the core [...]

    READ MORE »

  • »

    How to Clear Google Chrome History |   August 20, 2015

    Google Chrome is one of the most popular web browsers to online users. It provides a lot of features which help to use this browser smoothly and securely. Google Chrome history is one of the useful features in Google Chrome which helpfully caches or remembers a lot of browsing information specially username and password or login credential of your important web account when you visit various websites in internet. If you are the only user of your desktop or laptop, [...]

    READ MORE »