Remote Authentication System Analysis for RADIUS servers

Source: Internet
Author: User

This article describes the Remote Authentication System Analysis of the RADIUS server. Let's talk about how to choose a preferred multi-Wan port Broadband Router. The following several broadband routers with multiple WAN ports are carefully selected. The data obtained by professional evaluation ensures that you can select one suitable for you.

RADIUS: remote user dialing Authentication System

RADIUS: Remote Authentication Dial In User Service) RADIUS is a protocol for transmitting Authentication, authorization, and configuration information between Network Access Server (Network Access Server) and shared Authentication Server. RADIUS uses UDP as its transmission protocol. In addition, RADIUS is responsible for transmitting billing information between the network access server and the shared billing server.

RADIUS has the following features:

Customer/Server mode: the network access server, as the RADIUS client, is responsible for transmitting user information to the specified RADIUS server and then performing operations based on the returned information. The RADIUS server is responsible for receiving user connection requests. After the user is authenticated, all necessary configuration information is returned so that the client can provide services to the user.

The RADIUS server can act as a proxy for other RADIUS servers or Authentication servers. Network Security: communication between the client and the RADIUS accounting server is identified by the use of the shared key, which is not transmitted over the network.

In addition, any user password needs to be encrypted when sent between the client and the RADIUS server, so that no one can obtain the user password through sniffing the insecure network. Flexible authentication mechanism: the RADIUS server supports multiple user authentication methods.

After the user provides the user name and original password, the RADIUS server supports ppp pap or CHAP, UNIX logon, and other authentication mechanisms. Protocol Scalability: all transactions are composed of three tuples with different lengths: "Attribute-length-value. Adding new attribute values does not affect the execution of the original protocol.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.