17.2. RADIUS Authentication

Centralizing Authentication

In a larger network topology with a larger administration workload, it is often preferable to have a central authentication database on a dedicated server. When there is more than one Clavister NetShield Firewall in the network and thousands of users, maintaining separate authentication databases on each device becomes problematic. Instead, an external authentication server can validate username/password combinations by responding to requests from cOS Stream.

The RADIUS Solution

To provide a centralized external authentication source, cOS Stream supports the Remote Authentication Dial-in User Service (RADIUS) protocol. RADIUS is an Authentication, Authorization and Accounting (AAA) protocol widely used to implement the central database approach.

RADIUS Architecture

The RADIUS protocol is based on a client/server architecture. The Clavister NetShield Firewall acts as the client of the RADIUS server, creating and sending requests to a dedicated server(s). In RADIUS terminology, the firewall acts as the Network Access Server (NAS).

For user authentication, the RADIUS server receives authentication requests and then verifies the user's credentials by consulting its database. It then returns either an "accept" or "reject" reply to the requesting client.

Configuring RADIUS Servers

RADIUS servers are configured as separate objects in cOS Stream. A RADIUS server object's properties are:

Example 17.3. Configuring a RADIUS Server

In this example, a RADIUS server will be configured with an IPv4 address of 198.10.2.1 and the shared secret specified as mysecret.

Command-Line Interface

System:/> add RadiusServer IPAddress=198.10.2.1 SharedSecret=mysecret

Using RADIUS Authentication

A RADIUS server is used for authentication with the following steps:

  1. Create a RADIUS server object as described above.

  2. Create an Authentication Profile object that uses the RADIUS server as its Authentication Source.

  3. Associate the profile with an IP rule. When the IP rule triggers, authentication of user credentials will then be required to set up the traffic flow.