RouterOS with Radius Server for Android
|
|
- Raymond Sharp
- 8 years ago
- Views:
Transcription
1 RouterOS with Radius Server for Android PRESENTED BY MANA KAEWCHAROEN 22 MAY 2014 MUM in Bangkok, Thailand
2 About me Mana Kaewcharoen MikroTik user since May 2013 MikroTik Trainer since Feb 2014 Coordinator since Apr 2014 From Bangkok, Thailand. MTCNA, MTCRE, MTCTCE, MTCWE Mikrotik Academy Coordinator at Vongchavalitkul University ThaiMikroTik.com CONSULTANT CERTIFIED TRAINER COORDINATOR
3 About ThaiMikroTik Speedplus Technologysupply Co.,Ltd MikroTik Master Distributors since July 2013 MikroTik Training Centers since Feb 2014 Mikrotik Academy Coordinator since Apr Ayutthaya, Thailand. Distributors
4 Introduction RouterOS (Hotspot) A RouterOS (Hotspot) B RouterOS (Hotspot) C
5 Introduction RouterOS (Hotspot) A RouterOS (Hotspot) B RouterOS (Hotspot) C RouterOS (Hotspot) D RouterOS (Hotspot) E RouterOS (Hotspot) F ** More devices = More problems
6 Network Diagram ** Radius Server ** **ANDROID** RouterOS (Radius Client) INTERNET RouterOS (Radius Client)
7 Radius??? Remote Authentication Dial-In User Service RFC 2865 ( ) Protocol UDP 1812, UDP 1813 AAA Concept Authentication Authorization Accounting
8 Network Diagram ** Radius Server ** **ANDROID** RouterOS (Radius Client) INTERNET RouterOS (Radius Client)
9 Why we use android?? Mobility Easy to use Price Compatibility Development
10 Radius user,client,server User () tries to connect to the internet using username and password Client (RouterOS) looks for the user in local database and if it fails asks RADIUS server Server tell the client whether it should accept or reject the user ROS Radius Server
11 Radius request and response Username, Password MAC Address, IP Access-Request(1) Access-Accept(2) Or Access-Reject(3)
12 Radius Server - install Installation Of FreeRADIUS CentOS : yum y install httpd yum y install mysql-server yum y install freeradius freeradius-mysql freeradius-utils Script Install tar zxvf rd.tar.gz./install
13 Radius Attribute /usr/share/freeradius/dictionary.rfc2865 /usr/share/freeradius/dictionary.mikrotik ATTRIBUTE
14 Radius Attribute
15 Radius Client - Setup Script /radius add address= comment=mikrodroid secret=mikrotik service=hotspot timeout=5000ms
16 Hotspot Server - Setup Script /ip hotspot profile set hsprof1 use-radius=yes
17 How to connect with android Add user Add Package Security Code Add vouchers PHP File Download Script
18 Example: mikrodroid
19 Example: mikrodroid
20 Example: mikrodroid
21 THANKS FOR listening Credit to Android Developer : Songpob Jitpranee PHP Developer : Amnuay Pintong Linux Developer : Mana Kaewcharoen
netld External Authentication Setup Guide
netld External Authentication Setup Guide Overview netld is able to integrate with authentication servers such as Active Directory and FreeRADIUS. When using this integration, you do not need to create
More informationFreeRADIUS Install and Configuration. Joel Jaeggli 05/04/2006
FreeRADIUS Install and Configuration Joel Jaeggli 05/04/2006 What is RADIUS? A AAA protocol (Authentication, Authorization and Accounting). Authentication Confirmation that the user is who they say they
More informationRADIUS. - make life easier. by Daniel Starnowski
RADIUS - make life easier by Daniel Starnowski About me Daniel Starnowski Network administrator since 2000 MikroTik user since 2008 MikroTik Trainer since 2011 From Kraków, Poland 1038-1596 capital of
More informationSAS3 INSTALLATION MANUAL SNONO SYSTEMS 2015
SAS3 INSTALLATION MANUAL SNONO SYSTEMS 2015 FORWARD This document describes the installation procedure of SAS3 billing system on x86 64 bit host or virtual machine. The manual covers the installation and
More informationMIKROTIK NETWORK SIMULATOR
MIKROTIK NETWORK SIMULATOR PRESENTED BY ROFIQ FAUZI MUM Nov 2013 - Indonesia ABOUT ROFIQ FAUZI 2 Using MikroTik (v.2.97) since 2005, as Network Engineer at WISP. 2007, Network & Wireless Engineer at INDOSAT
More informationConfiguring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these
More informationPort Knocking for Security. 2010 LearnMikroTik.com 1
Port Knocking for Security 2010 LearnMikroTik.com 1 Introduction Steve Discher - LearnMikroTik.com MikroTik RouterOS training, including MTCNA, MTCRE, MTCTCE, MTCWE and MTCUME Own a WISP 2010 LearnMikroTik.com
More informationBuilding Effective Firewalls with MikroTik P R E S E N T E D B Y: R I C K F R E Y, N E T W O R K E N G I N E E R I P A R C H I T E C H S O P E R AT I
1-855-MIKRO-TIK Building Effective Firewalls with MikroTik P R E S E N T E D B Y: R I C K F R E Y, N E T W O R K E N G I N E E R I P A R C H I T E C H S O P E R AT I O N S Background Rick Frey 20+ years
More informationMikroTik Training Module Understanding VLAN Translation/Rewrites using Switches and Routers
1-855-MIKROTIK MikroTik Training Module Understanding VLAN Translation/Rewrites using Switches and Routers P R E S E N T E D B Y : KEVIN MYERS, NETWORK ARCHITECT / MANAGING PARTNER MTCINE #1409 I P A R
More informationBelnet Networking Conference 2013
Belnet Networking Conference 2013 Thursday 12 December 2013 @ http://events.belnet.be Workshop roaming services: eduroam / govroam Belnet Aris Adamantiadis, Nicolas Loriau Bruxelles 05 December 2013 Agenda
More informationUsing RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
More informationThe Use of Mikrotik Router Boards With Radius Server for ISPs.
The Use of Mikrotik Router Boards With Radius Server for ISPs. By Zaza Zviadadze, Irakli Nozadze. Intellcom Group, Georgia. RouterOS features for ISP s RouterOS reach features gives possibilities to ISP
More informationfreeradius A High Performance, Open Source, Pluggable, Scalable (but somewhat complex) RADIUS Server Aurélien Geron, Wifirst, January 7th 2011
freeradius A High Performance, Open Source, Pluggable, Scalable (but somewhat complex) RADIUS Server Aurélien Geron, Wifirst, January 7th 2011 freeradius is... Multiple protocoles : RADIUS, EAP... An Open-Source
More informationMikroTik User Meeting Larnaca, Cyprus, 12 th of June 2015. Hotspot using social accounts. Ionas Iona
MikroTik User Meeting Larnaca, Cyprus, 12 th of June 2015 Hotspot using social accounts Ionas Iona About me Company : JoinMyWifi Position : Co-founder, Chief Technical Officer (CTO) Product : Wifi Marketing
More informationBuilding scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF
Building scalable IPSec infrastructure with MikroTik IPSec, L2TP/IPSec, OSPF Presenter information Tomas Kirnak Network design Security, wireless Servers Virtualization MikroTik Certified Trainer Atris,
More information802.1X AUTHENTICATION IN ACKSYS BRIDGES AND ACCESS POINTS
APPLICATION NOTE Ref APNUS004 rev. A-0, March 08, 2007 802.1X AUTHENTICATION IN ACKSYS BRIDGES AND ACCESS POINTS Why? In addition to MAC address filtering, ACKSYS products support a more reliable authentication
More informationCommon VoIP problems, How to detect, correct and avoid them. Penny Tone LLC 1
Common VoIP problems, How to detect, correct and avoid them. Penny Tone LLC 1 Who am I? David Attias Installing VoIP systems for over 7 years Mikrotik user for 5 years Mikrotik certifications MTCNA, MTCRE
More informationINUVIKA OVD INSTALLING INUVIKA OVD ON RHEL 6
INUVIKA OVD INSTALLING INUVIKA OVD ON RHEL 6 Mathieu SCHIRES Version: 0.96.1 Published January 19, 2015 http://www.inuvika.com Contents 1 Prerequisites: RHEL 6 3 1.1 System Requirements...................................
More informationUnderstanding VLAN Translation/Rewrites using Switches and Routers
www.iparchitechs.com 1-855-MIKROTI(K) Understanding VLAN Translation/Rewrites using Switches and Routers KEVIN MYERS, NETWORK ARCHITECT / MANAGING PARTNER MTCINE #1409 MIKROTIK CERTIFIED TRAINER Kevin
More informationA Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2
A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2 1 Dept of CSE, P.A.College of Engineering 2 Dept of CSE, Srnivas institute
More informationAn Architectural Framework for Providing WLAN Roaming
An Architectural Framework for Providing WLAN Roaming D.Vassis, G.Kormentzas Dept. of Information and Communication Systems Engineering University of the Aegean GR-83200, Karlovassi, GREECE emails:{divas;
More informationRemote Access Technical Guide To Setting up RADIUS
Remote Access Technical Guide To Setting up RADIUS V 2.4 Published: 09 May 2006 1 Index 1 Index...2 1.1 Other Relevant Documents...2 2 Introduction...3 2.1 Authentication realms...3 2.2 Installing IAS...4
More informationSimple Installation of freeradius
PacketShaper & freeradius created by: Rainer Bemsel Version 1.0 Dated: DEC/06/2009 This document describes the steps to install freeradius under Fedora and prepare configuration to be used to authenticate
More informationCorporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer
Corporate VPN Using Mikrotik Cloud Feature By SOUMIL GUPTA BHAYA Mikortik Certified Trainer What is a VPN? A virtual private network (VPN) is a method for the extension of a private network across a public
More informationNetwork Architecture Validated designs utilizing MikroTik in the Data Center
1-855-MIKROTIK Network Architecture Validated designs utilizing MikroTik in the Data Center P R E S E N T E D B Y: K E V I N M Y E R S, N E T W O R K A R C H I T E C T / M A N AG I N G PA R T NER I P A
More informationManagement, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
More informationAuthentication, Authorization and Accounting (AAA) Protocols
Authentication, Authorization and Accounting (AAA) Protocols Agententechnologien in der Telekommunikation Sommersemester 2009 Babak Shafieian babak.shafieian@dai-labor.de 10.06.2009 Agententechnologien
More informationLecture 3. WPA and 802.11i
Lecture 3 WPA and 802.11i Lecture 3 WPA and 802.11i 1. Basic principles of 802.11i and WPA 2. IEEE 802.1X 3. Extensible Authentication Protocol 4. RADIUS 5. Efficient Handover Authentication 1 Lecture
More informationHigh Availability on MikroTik RouterOS
High Availability on MikroTik RouterOS GUILHERME RAMIRES About me Nome: Guilherme Ramires System Analyst CTO of Alive Solutions Trainings, Consulting and Network Projects CEO of Alive Store Resale of Mikrotik
More informationUNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU
UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU ITMS: 26140230008 DOPYTOVO ORIENTOVANÝ PROJEKT Moderné
More informationComputer Science and Engineering Linux Cisco VPN Client Installation and Setup Guide
Computer Science and Engineering Linux Cisco VPN Client Installation and Setup Guide Contents Installation: Ubuntu Linux 7.10 Gusty Gibbon:... 2 Installation: Redhat Enterprise 5 and Fedora 8 Linux:...
More informationFormación MTCUME. MikroTik Certified User Manager Engineer. Pre-requisitos: - Certificación MTCNA
Formación MTCUME MikroTik Certified User Manager Engineer Pre-requisitos: - Certificación MTCNA Objetivos de la Formación y la Certificación: - Proporcionar conocimiento especializado del sistema operativo
More informationVoice Over IP Information
Voice Over IP Information Basic CISCO information The links below contain information specific to Cisco about VoIP: Cisco RADIUS Vendor-Specific Attributes for VoIP Call Authorization http://www.cisco.com/warp/public/cc/so/neso/vvda/pctl/distrib/radus_ov.htm
More informationCreate Virtual AP for Network Campus with Mikrotik
Create Virtual AP for Network Campus with Mikrotik Mikrotik User Meeting Bali,June 14 2008 1 Introduction Name : Nicholaus Ola Malun,S.Si Nick Name : Nico Country : Jakarta, Indonesia Bachelor degree on
More informationVLAN in MikroTik. By Mohammed Khomeini Bin ABU MUM Indonesia, 2013
VLAN in MikroTik By Mohammed Khomeini Bin ABU MUM Indonesia, 2013 About Presentation To help you understand fundamental of Virtual Local Area Network (VLAN) and implementation in MikroTik router To explain
More informationIntegration Guide. Swivel Secure Authentication
Integration Guide Swivel Secure Authentication Revised: 21 February 2016 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating integration
More informationChongnonsee Yannawa Bangkok 10120
Mr. Kriangkrai Nammakote Personal Details General Manager of Jodoi IT&Service Co.,Ltd. Gender Marital Status Nationality Country of Residence Home Address Male Single Thai Thailand 295/2 Chueplerng Road
More informationBandwidth Management and QOS
Bandwidth Management and QOS PRESENTED BY : TEAV SOVANDARA (Dara) MUM April 2015 Phnom Penh ABOUT ME Network Engineer at MaxBIT ISP Working with MikroTik for few years with both core and edge network Certifications
More informationCloud Homework instructions for AWS default instance (Red Hat based)
Cloud Homework instructions for AWS default instance (Red Hat based) Automatic updates: Setting up automatic updates: by Manuel Corona $ sudo nano /etc/yum/yum-updatesd.conf Look for the line that says
More informationHow to Configure a BYOD Environment with the Unified AP in Standalone Mode
Configuration Guide How to Configure a BYOD Environment with the Unified AP in Standalone Mode Overview This guide describes how to configure and implement BYOD environment with the D-Link Unified Access
More informationHow To Set Up a RADIUS Server for User Authentication
How To Set Up a RADIUS Server for User Authentication Introduction This document provides information on how to set up a RADIUS server to authenticate users who access the device by Telnet or via the console
More informationNEC Corporation of America. Design Guide for Port Based Network Access Control (NAC)/802.1x and OpenFlow Network Integration. Version 3.
NEC Corporation of America Design Guide for Port Based Network Access Control (NAC)/802.1x and OpenFlow Network Integration Version 3.0 Table of Contents 1. Introduction Error Bookmark not defined. 1.1
More informationAuthenticate vsftpd (a secure FTP server for UNIXlike systems) with IDENTIKEY Authentication Sever
KB 160083 Authenticate vsftpd (a secure FTP server for UNIXlike systems) with IDENTIKEY Authentication Sever Creation date: 11/03/2016 Last Review: 11/03/2016 Revision number: 2 Document type: How To Security
More informationChapter 4: Security of the architecture, and lower layer security (network security) 1
Chapter 4: Security of the architecture, and lower layer security (network security) 1 Outline Security of the architecture Access control Lower layer security Data link layer VPN access Wireless access
More informationHow to Connect SSTP VPN from Windows Server 2008/Vista to Vigor2950
How to Connect SSTP VPN from Windows Server 2008/Vista to Vigor2950 Requirements Windows Server 2008, or Windows Vista SP1 Local Certificate (a online CA server on the Internet is required for some situation
More informationIP Filtering for Patton RAS Products
RAS Filtering: Applications and Functionality Security PLUS Service Differentiation Did you know you can use IP filtering to boost your revenues? Patton s Remote Access Server (RAS) provides IP Filtering
More informationInstall Cacti Network Monitoring Tool on CentOS 6.4 / RHEL 6.4 / Scientific Linux 6.4
Install Cacti Network Monitoring Tool on CentOS 6.4 / RHEL 6.4 / Scientific Linux 6.4 by SK Cacti is an open source, front-end for the data logging tool called RRDtool. It is a web based network monitoring
More informationInterlink Networks RAD-Series AAA Server and RSA Security Two-Factor Authentication
Interlink Networks RAD-Series AAA Server and RSA Security Two-Factor Authentication As the world increasingly depends on computers to do business, the need for safeguarding computer resources also increases.
More informationMobility Task Force. Deliverable F. Inventory of web-based solution for inter-nren roaming
Mobility Task Force Deliverable F Inventory of web-based solution for inter-nren roaming Version 1.1 Authors: Sami Keski-Kasari , Harri Huhtanen Contributions: James
More information» David Bisschoff» Durban, South Africa» Work at Kinsey Computers» Discovered MikroTik in 2011. Kinsey Computers cc
» David Bisschoff» Durban, South Africa» Work at Kinsey Computers» Discovered MikroTik in 2011 Kinsey Computers cc » Steve Discher MUM - USA Sep 2012 RouterOS by Example» Greg Sowell http://gregsowell.com»
More informationA Dude probing SNMP! Building custom probes and configuring equipment using SNMP with The Dude. Andrea Coppini AIR Wireless - Malta andrea@air.com.
A! Building custom probes and configuring equipment using SNMP with The Dude. Andrea Coppini AIR Wireless - Malta andrea@air.com.mt Agenda Background Overview of SNMP Creating custom probes Demo Using
More informationImplementation IPV6 in Mikrotik RouterOS. by Teddy Yuliswar
Implementation IPV6 in Mikrotik RouterOS by Teddy Yuliswar YOGYAKARTA, OCTOBER 09 10, 2015 TEDDY YULISWAR Introduction q MTCNA, MTCRE, MTCTCE, MTCINE q Place of Hanging out : - Politeknik Negeri Padang
More informationCAPsMAN Case Study. Uldis Cernevskis MikroTik, Latvia. MUM Pittsburgh September 2014
CAPsMAN Case Study Uldis Cernevskis MikroTik, Latvia MUM Pittsburgh September 2014 CAPsMAN Features Centralized management of RouterOS APs Dual Band AP support Provisioning of APs MAC and IP Layer communication
More informationMPLS for ISPs PPPoE over VPLS. MPLS, VPLS, PPPoE
MPLS for ISPs PPPoE over VPLS MPLS, VPLS, PPPoE Presenter information Tomas Kirnak Network design Security, wireless Servers Virtualization MikroTik Certified Trainer Atris, Slovakia Established 1991 Complete
More informationPort Server RADIUS Support (RFC 2865, 2866)
7409 SW Tech Center Drive, Suite 100 Tigard, OR 97223 USA http://www.faxback.com Port Server RADIUS Support (RFC 2865, 2866) Version 1.0 Last edited September 2, 2010 All rights reserved. No part of this
More informationYubiRADIUS Deployment Guide for corporate remote access. How to Guide
YubiRADIUS Deployment Guide for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship
More information7750 SR OS System Management Guide
7750 SR OS System Management Guide Software Version: 7750 SR OS 10.0 R4 July 2012 Document Part Number: 93-0071-09-02 *93-0071-09-02* This document is protected by copyright. Except as specifically permitted
More informationDIGIPASS Authentication for Cisco ASA 5500 Series
DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations
More informationQuality of Service in wireless Point-to-Point Links
Quality of Service in wireless Point-to-Point Links MikroTik User Meeting, St. Louis, MO, USA, September 19-20 2013 menschen.computer.netzwerke Bottenbacher Str. 78 57223 Kreuztal Tel: +49.2732.55856-0
More informationWISP 101. The DO s and DON T s of becoming a Wireless ISP
WISP 101 The DO s and DON T s of becoming a Wireless ISP WISP 101 topics Choosing your hardware Setting up the Highsite Hardware Software Security Wireless Backhaul Setting up the client Choosing your
More informationData Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology
Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and operation of secure remote access infrastructures Central creation of client configuration
More informationCHAPTER NO. TITLE PAGE NO.
xii CHAPTER NO. TITLE PAGE NO. 4 INTEGRATED DESIGN OF WEB SERVICE ACCOUNTING ARCHITECTURE 84 4.1 DESIGN OF INTEGRATED ACCOUNTING MODULES 84 4.1.1 Accounting Record Formats 87 4.1.2 WS-Radius Protocol 91
More informationLecture 4b AAA protocols (Authentication Authorization Accounting)
Lecture 4b AAA protocols (Authentication Authorization Accounting) Network security (19265400 / 201000086) Lecturers: Aiko Pras Pieter-Tjerk de Boer Anna Sperotto Ramin Sadre Georgios Karagiannis Lecture
More informationIntroduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks
Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England March 2-7, 2014 Presented by: Lionel Morand Co-authored
More information150-420. Brocade Certified Layer 4-7 Professional 2010. Version: Demo. Page <<1/8>>
150-420 Brocade Certified Layer 4-7 Professional 2010 Version: Demo Page QUESTION NO: 1 Given the command shown below, which statement is true? aaa authentication enable default radius local A.
More informationRADIUS Authentication and Accounting
5 RADIUS Authentication and Accounting Contents Overview...................................................... 5-2 Terminology................................................... 5-3 Switch Operating Rules
More informationConfiguring Internet Authentication Service on Microsoft Windows 2003 Server
Windows 2003 / Enhanced Configuring Internet Authentication Service on Microsoft Windows 2003 Server Introduction This technote describes how to setup the Internet Authentication service (IAS) on a Microsoft
More information1 Thunderbird v3 and IMAP/SMTP Configuration
1 Thunderbird v3 and IMAP/SMTP Configuration The following applies to Thunderbird v3 and later versions on Linux, Mac, and Windows. There are some minor differences in the menu structure between Thunderbird
More informationDIGIPASS Authentication for Check Point Connectra
DIGIPASS Authentication for Check Point Connectra With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 21 Disclaimer Disclaimer of Warranties and Limitations
More informationRouting and Remote Access Service
Routing and Remote Access Service (Week 15, Friday 4/21/2006) Abdou Illia, Spring 2006 1 Learning Objectives Introducing RRAS Enabling RRAS Configuring RRAS Monitoring RRAS Creating Remote Access Policies
More informationBGP as an IGP for Carrier/Enterprise Networks
BGP as an IGP for Carrier/Enterprise Networks Presented by: Kevin Myers, SENIOR NETWORK ENGINEER IP ArchiTECHS MANAGED SERVICES Background Kevin Myers 15 + years in IT/Network Engineering Designed and
More informationpfsense Captive Portal: Part One
pfsense Captive Portal: Part One Captive portal forces an HTTP client to see a special web page, usually for authentication purposes, before using the Internet normally. A captive portal turns a web browser
More informationBroadSoft BroadWorks ver. 17 SIP Configuration Guide
Valcom Session Initiation Protocol (SIP) VIP devices are compatible with BroadSoft s BroadWorks hosted SIP server. The Valcom device is defined as a Generic SIP Phone in the BroadWorks system. Authentication
More informationNCP Secure Enterprise Management Next Generation Network Access Technology
Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology Centrally Managed VPN fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and
More informationDualShield. for PAM RADIUS. Implementation Guide. (Version 5.4) Copyright 2012 Deepnet Security Limited
DualShield for Implementation Guide (Version 5.4) Copyright 2012 Deepnet Security Limited Copyright 2012, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID,
More informationWiNG 4.X / WiNG 5.X RADIUS Attributes
Configuration Guide for RFMS 3.0 Initial Configuration XXX-XXXXXX-XX WiNG 4.X / WiNG 5.X RADIUS Attributes Part No. TME-08-2011-01 Rev. C MOTOROLA and the Stylized M Logo are registered in the US Patent
More informationREMOTE ACCESS DDNS CONFIGURATION MANUAL
REMOTE ACCESS DDNS CONFIGURATION MANUAL Analog DVR Series 1 www.mezory.com INTRODUCTION TO REMOTE ACCESS As the World sinks into one global village, reliable connectivity is one of the most demanding facilities
More informationWhite Paper Captive Portal Configuration Guide
White Paper Captive Portal Configuration Guide June 2014 This document describes the protocol flow, configuration process and example use-cases for self-hosted captive portal (splash page) access, which
More informationIPSecuritas 3.x. Configuration Instructions. Collax Business Server. for
IPSecuritas 3.x Configuration Instructions for Lobotomo Software 27. juillet 2010 Legal Disclaimer Contents Lobotomo Software (subsequently called "Author") reserves the right not to be responsible for
More informationRadSec RADIUS improved. Stig Venaas venaas@uninett.no
RadSec RADIUS improved Stig Venaas venaas@uninett.no Overview RADIUS overview RadSec overview What is wrong with RADIUS RadSec benefits Radsec implementations, deployment and standardisation RADIUS overview
More informationSentral servers provide a wide range of services to school networks.
Wazza s QuickStart Publishing iweb Sites to a Sentral Server Background Mac OS X, Sentral, iweb 09 Sentral servers provide a wide range of services to school networks. A Sentral server provides a publishing
More informationHow to Install Multicraft on a VPS or Dedicated Server (Ubuntu 13.04 64 bit)
How to Install Multicraft on a VPS or Dedicated Server (Ubuntu 13.04 64 bit) Introduction Prerequisites This tutorial will show you step-by-step on how to install Multicraft 1.8.2 on a new VPS or dedicated
More informationServer Installation/Upgrade Guide
Server Installation/Upgrade Guide System Version 3.8 2001-2009 Echo 360, Inc. Echo360 is a trademark of Echo360, Inc. Echo360 is a registered trademark of Echo360 Inc. in Australia. All other trademarks
More informationAGLARBRI PROJECT AFRICAN GREAT LAKES RURAL BROADBAND RESEARCH INFRASTRUCTURE. RADIUS installation and configuration
AGLARBRI PROJECT AFRICAN GREAT LAKES RURAL BROADBAND RESEARCH INFRASTRUCTURE RADIUS installation and configuration Project Manager: Miguel Sosa (mesc@kth.se) Member Email Position and number of credits
More informationAlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts
AlienVault Unified Security Management (USM) 4.x-5.x Deploying HIDS Agents to Linux Hosts USM 4.x-5.x Deploying HIDS Agents to Linux Hosts, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. AlienVault,
More informationFireware How To Authentication
Fireware How To Authentication How do I configure my Firebox to authenticate users against my existing RADIUS authentication server? Introduction When you use Fireware s user authentication feature, you
More informationINTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass
INTEGRATION GUIDE DIGIPASS Authentication for F5 FirePass Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security
More informationReplacing legacy twofactor. with YubiRADIUS for corporate remote access. How to Guide
Replacing legacy twofactor authentication with YubiRADIUS for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection.
More informationAradial Converged VOIP Billing Overview http://www.aradial.com
Aradial Converged VOIP Billing Overview http://www.aradial.com 2009 Aradial This document contains proprietary and confidential information of Aradial and shall not be reproduced or transferred to other
More informationHow to Use? SKALICLOUD DEMO
How to Use? SKALICLOUD DEMO Account Login Page SkaliCloud Control Panel Overview Step 1: Click Add and Select Server Button to create your Server, add your Drive, Private Vlan or Static IP You are now
More informationMikroTik RouterOS Workshop Load Balancing Best Practice. Warsaw MUM Europe 2012
MikroTik RouterOS Workshop Load Balancing Best Practice Warsaw MUM Europe 2012 MikroTik 2012 About Me Jānis Meģis, MikroTik Jānis (Tehnical, Trainer, NOT Sales) Support & Training Engineer for almost 8
More informationwww.interlinknetworks.com
2002 Interlink Networks, Inc. Revision All Rights Reserved. This document is copyrighted by Interlink Networks Incorporated (Interlink Networks). The information contained within this document is subject
More informationBandwidth-based load-balancing with failover. The easy way. We need more bandwidth.
Bandwidth-based load-balancing with failover. The easy way. We need more bandwidth. Presenter information Tomas Kirnak Network design Security, wireless Servers, Virtualization Mikrotik Certified Trainer
More informationTransparent Identification of Users
Transparent Identification of Users Websense Web Security Solutions v7.5, v7.6 Transparent Identification of Users 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA
More informationSymantec VIP Integration with ISE
Symantec VIP Integration with ISE Table of Contents Overview... 3 Symantec VIP... 3 Cisco Identity Services Engine (ISE)... 3 Cisco Centralized Web Authentication... 4 VIP in Action... 4 ISE Configuration...
More informationConfiguring Single Sign-on for WebVPN
CHAPTER 8 This chapter presents example procedures for configuring SSO for WebVPN users. It includes the following sections: Using Single Sign-on with WebVPN, page 8-1 Configuring SSO Authentication Using
More informationLoad Balancing Using PCC & RouterOS
Load Balancing Using PCC & RouterOS About Me Steve Discher, from College Station, Texas, USA Class of 87 Texas A&M University Using MikroTik since early 2004 when I started my first WISP Author of the
More informationVPN: Virtual Private Network Setup Instructions
VPN: Virtual Private Network Setup Instructions Virtual Private Network (VPN): For e-journals and web-based databases, plus applications like EndNote's Online Search (formerly "Connect") and business systems.
More information7450 ESS OS System Management Guide. Software Version: 7450 ESS OS 10.0 R1 February 2012 Document Part Number: 93-0101-09-01 *93-0101-09-01*
7450 ESS OS System Management Guide Software Version: 7450 ESS OS 10.0 R1 February 2012 Document Part Number: 93-0101-09-01 *93-0101-09-01* This document is protected by copyright. Except as specifically
More informationInterlink Networks Secure.XS and Cisco Wireless Deployment Guide
Overview Interlink Networks Secure.XS and Cisco Wireless Deployment Guide (An AVVID certification required document) This document is intended to serve as a guideline to setup Interlink Networks Secure.XS
More information