RouterOS with Radius Server for Android

Size: px
Start display at page:

Download "RouterOS with Radius Server for Android"

Transcription

1 RouterOS with Radius Server for Android PRESENTED BY MANA KAEWCHAROEN 22 MAY 2014 MUM in Bangkok, Thailand

2 About me Mana Kaewcharoen MikroTik user since May 2013 MikroTik Trainer since Feb 2014 Coordinator since Apr 2014 From Bangkok, Thailand. MTCNA, MTCRE, MTCTCE, MTCWE Mikrotik Academy Coordinator at Vongchavalitkul University ThaiMikroTik.com CONSULTANT CERTIFIED TRAINER COORDINATOR

3 About ThaiMikroTik Speedplus Technologysupply Co.,Ltd MikroTik Master Distributors since July 2013 MikroTik Training Centers since Feb 2014 Mikrotik Academy Coordinator since Apr Ayutthaya, Thailand. Distributors

4 Introduction RouterOS (Hotspot) A RouterOS (Hotspot) B RouterOS (Hotspot) C

5 Introduction RouterOS (Hotspot) A RouterOS (Hotspot) B RouterOS (Hotspot) C RouterOS (Hotspot) D RouterOS (Hotspot) E RouterOS (Hotspot) F ** More devices = More problems

6 Network Diagram ** Radius Server ** **ANDROID** RouterOS (Radius Client) INTERNET RouterOS (Radius Client)

7 Radius??? Remote Authentication Dial-In User Service RFC 2865 ( ) Protocol UDP 1812, UDP 1813 AAA Concept Authentication Authorization Accounting

8 Network Diagram ** Radius Server ** **ANDROID** RouterOS (Radius Client) INTERNET RouterOS (Radius Client)

9 Why we use android?? Mobility Easy to use Price Compatibility Development

10 Radius user,client,server User () tries to connect to the internet using username and password Client (RouterOS) looks for the user in local database and if it fails asks RADIUS server Server tell the client whether it should accept or reject the user ROS Radius Server

11 Radius request and response Username, Password MAC Address, IP Access-Request(1) Access-Accept(2) Or Access-Reject(3)

12 Radius Server - install Installation Of FreeRADIUS CentOS : yum y install httpd yum y install mysql-server yum y install freeradius freeradius-mysql freeradius-utils Script Install tar zxvf rd.tar.gz./install

13 Radius Attribute /usr/share/freeradius/dictionary.rfc2865 /usr/share/freeradius/dictionary.mikrotik ATTRIBUTE

14 Radius Attribute

15 Radius Client - Setup Script /radius add address= comment=mikrodroid secret=mikrotik service=hotspot timeout=5000ms

16 Hotspot Server - Setup Script /ip hotspot profile set hsprof1 use-radius=yes

17 How to connect with android Add user Add Package Security Code Add vouchers PHP File Download Script

18 Example: mikrodroid

19 Example: mikrodroid

20 Example: mikrodroid

21 THANKS FOR listening Credit to Android Developer : Songpob Jitpranee PHP Developer : Amnuay Pintong Linux Developer : Mana Kaewcharoen

netld External Authentication Setup Guide

netld External Authentication Setup Guide netld External Authentication Setup Guide Overview netld is able to integrate with authentication servers such as Active Directory and FreeRADIUS. When using this integration, you do not need to create

More information

FreeRADIUS Install and Configuration. Joel Jaeggli 05/04/2006

FreeRADIUS Install and Configuration. Joel Jaeggli 05/04/2006 FreeRADIUS Install and Configuration Joel Jaeggli 05/04/2006 What is RADIUS? A AAA protocol (Authentication, Authorization and Accounting). Authentication Confirmation that the user is who they say they

More information

RADIUS. - make life easier. by Daniel Starnowski

RADIUS. - make life easier. by Daniel Starnowski RADIUS - make life easier by Daniel Starnowski About me Daniel Starnowski Network administrator since 2000 MikroTik user since 2008 MikroTik Trainer since 2011 From Kraków, Poland 1038-1596 capital of

More information

SAS3 INSTALLATION MANUAL SNONO SYSTEMS 2015

SAS3 INSTALLATION MANUAL SNONO SYSTEMS 2015 SAS3 INSTALLATION MANUAL SNONO SYSTEMS 2015 FORWARD This document describes the installation procedure of SAS3 billing system on x86 64 bit host or virtual machine. The manual covers the installation and

More information

MIKROTIK NETWORK SIMULATOR

MIKROTIK NETWORK SIMULATOR MIKROTIK NETWORK SIMULATOR PRESENTED BY ROFIQ FAUZI MUM Nov 2013 - Indonesia ABOUT ROFIQ FAUZI 2 Using MikroTik (v.2.97) since 2005, as Network Engineer at WISP. 2007, Network & Wireless Engineer at INDOSAT

More information

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these

More information

Port Knocking for Security. 2010 LearnMikroTik.com 1

Port Knocking for Security. 2010 LearnMikroTik.com 1 Port Knocking for Security 2010 LearnMikroTik.com 1 Introduction Steve Discher - LearnMikroTik.com MikroTik RouterOS training, including MTCNA, MTCRE, MTCTCE, MTCWE and MTCUME Own a WISP 2010 LearnMikroTik.com

More information

Building Effective Firewalls with MikroTik P R E S E N T E D B Y: R I C K F R E Y, N E T W O R K E N G I N E E R I P A R C H I T E C H S O P E R AT I

Building Effective Firewalls with MikroTik P R E S E N T E D B Y: R I C K F R E Y, N E T W O R K E N G I N E E R I P A R C H I T E C H S O P E R AT I 1-855-MIKRO-TIK Building Effective Firewalls with MikroTik P R E S E N T E D B Y: R I C K F R E Y, N E T W O R K E N G I N E E R I P A R C H I T E C H S O P E R AT I O N S Background Rick Frey 20+ years

More information

MikroTik Training Module Understanding VLAN Translation/Rewrites using Switches and Routers

MikroTik Training Module Understanding VLAN Translation/Rewrites using Switches and Routers 1-855-MIKROTIK MikroTik Training Module Understanding VLAN Translation/Rewrites using Switches and Routers P R E S E N T E D B Y : KEVIN MYERS, NETWORK ARCHITECT / MANAGING PARTNER MTCINE #1409 I P A R

More information

Belnet Networking Conference 2013

Belnet Networking Conference 2013 Belnet Networking Conference 2013 Thursday 12 December 2013 @ http://events.belnet.be Workshop roaming services: eduroam / govroam Belnet Aris Adamantiadis, Nicolas Loriau Bruxelles 05 December 2013 Agenda

More information

Using RADIUS Agent for Transparent User Identification

Using RADIUS Agent for Transparent User Identification Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your

More information

The Use of Mikrotik Router Boards With Radius Server for ISPs.

The Use of Mikrotik Router Boards With Radius Server for ISPs. The Use of Mikrotik Router Boards With Radius Server for ISPs. By Zaza Zviadadze, Irakli Nozadze. Intellcom Group, Georgia. RouterOS features for ISP s RouterOS reach features gives possibilities to ISP

More information

freeradius A High Performance, Open Source, Pluggable, Scalable (but somewhat complex) RADIUS Server Aurélien Geron, Wifirst, January 7th 2011

freeradius A High Performance, Open Source, Pluggable, Scalable (but somewhat complex) RADIUS Server Aurélien Geron, Wifirst, January 7th 2011 freeradius A High Performance, Open Source, Pluggable, Scalable (but somewhat complex) RADIUS Server Aurélien Geron, Wifirst, January 7th 2011 freeradius is... Multiple protocoles : RADIUS, EAP... An Open-Source

More information

MikroTik User Meeting Larnaca, Cyprus, 12 th of June 2015. Hotspot using social accounts. Ionas Iona

MikroTik User Meeting Larnaca, Cyprus, 12 th of June 2015. Hotspot using social accounts. Ionas Iona MikroTik User Meeting Larnaca, Cyprus, 12 th of June 2015 Hotspot using social accounts Ionas Iona About me Company : JoinMyWifi Position : Co-founder, Chief Technical Officer (CTO) Product : Wifi Marketing

More information

Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF

Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF Building scalable IPSec infrastructure with MikroTik IPSec, L2TP/IPSec, OSPF Presenter information Tomas Kirnak Network design Security, wireless Servers Virtualization MikroTik Certified Trainer Atris,

More information

802.1X AUTHENTICATION IN ACKSYS BRIDGES AND ACCESS POINTS

802.1X AUTHENTICATION IN ACKSYS BRIDGES AND ACCESS POINTS APPLICATION NOTE Ref APNUS004 rev. A-0, March 08, 2007 802.1X AUTHENTICATION IN ACKSYS BRIDGES AND ACCESS POINTS Why? In addition to MAC address filtering, ACKSYS products support a more reliable authentication

More information

Common VoIP problems, How to detect, correct and avoid them. Penny Tone LLC 1

Common VoIP problems, How to detect, correct and avoid them. Penny Tone LLC 1 Common VoIP problems, How to detect, correct and avoid them. Penny Tone LLC 1 Who am I? David Attias Installing VoIP systems for over 7 years Mikrotik user for 5 years Mikrotik certifications MTCNA, MTCRE

More information

INUVIKA OVD INSTALLING INUVIKA OVD ON RHEL 6

INUVIKA OVD INSTALLING INUVIKA OVD ON RHEL 6 INUVIKA OVD INSTALLING INUVIKA OVD ON RHEL 6 Mathieu SCHIRES Version: 0.96.1 Published January 19, 2015 http://www.inuvika.com Contents 1 Prerequisites: RHEL 6 3 1.1 System Requirements...................................

More information

Understanding VLAN Translation/Rewrites using Switches and Routers

Understanding VLAN Translation/Rewrites using Switches and Routers www.iparchitechs.com 1-855-MIKROTI(K) Understanding VLAN Translation/Rewrites using Switches and Routers KEVIN MYERS, NETWORK ARCHITECT / MANAGING PARTNER MTCINE #1409 MIKROTIK CERTIFIED TRAINER Kevin

More information

A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2

A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2 A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2 1 Dept of CSE, P.A.College of Engineering 2 Dept of CSE, Srnivas institute

More information

An Architectural Framework for Providing WLAN Roaming

An Architectural Framework for Providing WLAN Roaming An Architectural Framework for Providing WLAN Roaming D.Vassis, G.Kormentzas Dept. of Information and Communication Systems Engineering University of the Aegean GR-83200, Karlovassi, GREECE emails:{divas;

More information

Remote Access Technical Guide To Setting up RADIUS

Remote Access Technical Guide To Setting up RADIUS Remote Access Technical Guide To Setting up RADIUS V 2.4 Published: 09 May 2006 1 Index 1 Index...2 1.1 Other Relevant Documents...2 2 Introduction...3 2.1 Authentication realms...3 2.2 Installing IAS...4

More information

Simple Installation of freeradius

Simple Installation of freeradius PacketShaper & freeradius created by: Rainer Bemsel Version 1.0 Dated: DEC/06/2009 This document describes the steps to install freeradius under Fedora and prepare configuration to be used to authenticate

More information

Corporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer

Corporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer Corporate VPN Using Mikrotik Cloud Feature By SOUMIL GUPTA BHAYA Mikortik Certified Trainer What is a VPN? A virtual private network (VPN) is a method for the extension of a private network across a public

More information

Network Architecture Validated designs utilizing MikroTik in the Data Center

Network Architecture Validated designs utilizing MikroTik in the Data Center 1-855-MIKROTIK Network Architecture Validated designs utilizing MikroTik in the Data Center P R E S E N T E D B Y: K E V I N M Y E R S, N E T W O R K A R C H I T E C T / M A N AG I N G PA R T NER I P A

More information

Management, Logging and Troubleshooting

Management, Logging and Troubleshooting CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network

More information

Authentication, Authorization and Accounting (AAA) Protocols

Authentication, Authorization and Accounting (AAA) Protocols Authentication, Authorization and Accounting (AAA) Protocols Agententechnologien in der Telekommunikation Sommersemester 2009 Babak Shafieian babak.shafieian@dai-labor.de 10.06.2009 Agententechnologien

More information

Lecture 3. WPA and 802.11i

Lecture 3. WPA and 802.11i Lecture 3 WPA and 802.11i Lecture 3 WPA and 802.11i 1. Basic principles of 802.11i and WPA 2. IEEE 802.1X 3. Extensible Authentication Protocol 4. RADIUS 5. Efficient Handover Authentication 1 Lecture

More information

High Availability on MikroTik RouterOS

High Availability on MikroTik RouterOS High Availability on MikroTik RouterOS GUILHERME RAMIRES About me Nome: Guilherme Ramires System Analyst CTO of Alive Solutions Trainings, Consulting and Network Projects CEO of Alive Store Resale of Mikrotik

More information

UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU

UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU ITMS: 26140230008 DOPYTOVO ORIENTOVANÝ PROJEKT Moderné

More information

Computer Science and Engineering Linux Cisco VPN Client Installation and Setup Guide

Computer Science and Engineering Linux Cisco VPN Client Installation and Setup Guide Computer Science and Engineering Linux Cisco VPN Client Installation and Setup Guide Contents Installation: Ubuntu Linux 7.10 Gusty Gibbon:... 2 Installation: Redhat Enterprise 5 and Fedora 8 Linux:...

More information

Formación MTCUME. MikroTik Certified User Manager Engineer. Pre-requisitos: - Certificación MTCNA

Formación MTCUME. MikroTik Certified User Manager Engineer. Pre-requisitos: - Certificación MTCNA Formación MTCUME MikroTik Certified User Manager Engineer Pre-requisitos: - Certificación MTCNA Objetivos de la Formación y la Certificación: - Proporcionar conocimiento especializado del sistema operativo

More information

Voice Over IP Information

Voice Over IP Information Voice Over IP Information Basic CISCO information The links below contain information specific to Cisco about VoIP: Cisco RADIUS Vendor-Specific Attributes for VoIP Call Authorization http://www.cisco.com/warp/public/cc/so/neso/vvda/pctl/distrib/radus_ov.htm

More information

Create Virtual AP for Network Campus with Mikrotik

Create Virtual AP for Network Campus with Mikrotik Create Virtual AP for Network Campus with Mikrotik Mikrotik User Meeting Bali,June 14 2008 1 Introduction Name : Nicholaus Ola Malun,S.Si Nick Name : Nico Country : Jakarta, Indonesia Bachelor degree on

More information

VLAN in MikroTik. By Mohammed Khomeini Bin ABU MUM Indonesia, 2013

VLAN in MikroTik. By Mohammed Khomeini Bin ABU MUM Indonesia, 2013 VLAN in MikroTik By Mohammed Khomeini Bin ABU MUM Indonesia, 2013 About Presentation To help you understand fundamental of Virtual Local Area Network (VLAN) and implementation in MikroTik router To explain

More information

Integration Guide. Swivel Secure Authentication

Integration Guide. Swivel Secure Authentication Integration Guide Swivel Secure Authentication Revised: 21 February 2016 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating integration

More information

Chongnonsee Yannawa Bangkok 10120

Chongnonsee Yannawa Bangkok 10120 Mr. Kriangkrai Nammakote Personal Details General Manager of Jodoi IT&Service Co.,Ltd. Gender Marital Status Nationality Country of Residence Home Address Male Single Thai Thailand 295/2 Chueplerng Road

More information

Bandwidth Management and QOS

Bandwidth Management and QOS Bandwidth Management and QOS PRESENTED BY : TEAV SOVANDARA (Dara) MUM April 2015 Phnom Penh ABOUT ME Network Engineer at MaxBIT ISP Working with MikroTik for few years with both core and edge network Certifications

More information

Cloud Homework instructions for AWS default instance (Red Hat based)

Cloud Homework instructions for AWS default instance (Red Hat based) Cloud Homework instructions for AWS default instance (Red Hat based) Automatic updates: Setting up automatic updates: by Manuel Corona $ sudo nano /etc/yum/yum-updatesd.conf Look for the line that says

More information

How to Configure a BYOD Environment with the Unified AP in Standalone Mode

How to Configure a BYOD Environment with the Unified AP in Standalone Mode Configuration Guide How to Configure a BYOD Environment with the Unified AP in Standalone Mode Overview This guide describes how to configure and implement BYOD environment with the D-Link Unified Access

More information

How To Set Up a RADIUS Server for User Authentication

How To Set Up a RADIUS Server for User Authentication How To Set Up a RADIUS Server for User Authentication Introduction This document provides information on how to set up a RADIUS server to authenticate users who access the device by Telnet or via the console

More information

NEC Corporation of America. Design Guide for Port Based Network Access Control (NAC)/802.1x and OpenFlow Network Integration. Version 3.

NEC Corporation of America. Design Guide for Port Based Network Access Control (NAC)/802.1x and OpenFlow Network Integration. Version 3. NEC Corporation of America Design Guide for Port Based Network Access Control (NAC)/802.1x and OpenFlow Network Integration Version 3.0 Table of Contents 1. Introduction Error Bookmark not defined. 1.1

More information

Authenticate vsftpd (a secure FTP server for UNIXlike systems) with IDENTIKEY Authentication Sever

Authenticate vsftpd (a secure FTP server for UNIXlike systems) with IDENTIKEY Authentication Sever KB 160083 Authenticate vsftpd (a secure FTP server for UNIXlike systems) with IDENTIKEY Authentication Sever Creation date: 11/03/2016 Last Review: 11/03/2016 Revision number: 2 Document type: How To Security

More information

Chapter 4: Security of the architecture, and lower layer security (network security) 1

Chapter 4: Security of the architecture, and lower layer security (network security) 1 Chapter 4: Security of the architecture, and lower layer security (network security) 1 Outline Security of the architecture Access control Lower layer security Data link layer VPN access Wireless access

More information

How to Connect SSTP VPN from Windows Server 2008/Vista to Vigor2950

How to Connect SSTP VPN from Windows Server 2008/Vista to Vigor2950 How to Connect SSTP VPN from Windows Server 2008/Vista to Vigor2950 Requirements Windows Server 2008, or Windows Vista SP1 Local Certificate (a online CA server on the Internet is required for some situation

More information

IP Filtering for Patton RAS Products

IP Filtering for Patton RAS Products RAS Filtering: Applications and Functionality Security PLUS Service Differentiation Did you know you can use IP filtering to boost your revenues? Patton s Remote Access Server (RAS) provides IP Filtering

More information

Install Cacti Network Monitoring Tool on CentOS 6.4 / RHEL 6.4 / Scientific Linux 6.4

Install Cacti Network Monitoring Tool on CentOS 6.4 / RHEL 6.4 / Scientific Linux 6.4 Install Cacti Network Monitoring Tool on CentOS 6.4 / RHEL 6.4 / Scientific Linux 6.4 by SK Cacti is an open source, front-end for the data logging tool called RRDtool. It is a web based network monitoring

More information

Interlink Networks RAD-Series AAA Server and RSA Security Two-Factor Authentication

Interlink Networks RAD-Series AAA Server and RSA Security Two-Factor Authentication Interlink Networks RAD-Series AAA Server and RSA Security Two-Factor Authentication As the world increasingly depends on computers to do business, the need for safeguarding computer resources also increases.

More information

Mobility Task Force. Deliverable F. Inventory of web-based solution for inter-nren roaming

Mobility Task Force. Deliverable F. Inventory of web-based solution for inter-nren roaming Mobility Task Force Deliverable F Inventory of web-based solution for inter-nren roaming Version 1.1 Authors: Sami Keski-Kasari , Harri Huhtanen Contributions: James

More information

» David Bisschoff» Durban, South Africa» Work at Kinsey Computers» Discovered MikroTik in 2011. Kinsey Computers cc

» David Bisschoff» Durban, South Africa» Work at Kinsey Computers» Discovered MikroTik in 2011. Kinsey Computers cc » David Bisschoff» Durban, South Africa» Work at Kinsey Computers» Discovered MikroTik in 2011 Kinsey Computers cc » Steve Discher MUM - USA Sep 2012 RouterOS by Example» Greg Sowell http://gregsowell.com»

More information

A Dude probing SNMP! Building custom probes and configuring equipment using SNMP with The Dude. Andrea Coppini AIR Wireless - Malta andrea@air.com.

A Dude probing SNMP! Building custom probes and configuring equipment using SNMP with The Dude. Andrea Coppini AIR Wireless - Malta andrea@air.com. A! Building custom probes and configuring equipment using SNMP with The Dude. Andrea Coppini AIR Wireless - Malta andrea@air.com.mt Agenda Background Overview of SNMP Creating custom probes Demo Using

More information

Implementation IPV6 in Mikrotik RouterOS. by Teddy Yuliswar

Implementation IPV6 in Mikrotik RouterOS. by Teddy Yuliswar Implementation IPV6 in Mikrotik RouterOS by Teddy Yuliswar YOGYAKARTA, OCTOBER 09 10, 2015 TEDDY YULISWAR Introduction q MTCNA, MTCRE, MTCTCE, MTCINE q Place of Hanging out : - Politeknik Negeri Padang

More information

CAPsMAN Case Study. Uldis Cernevskis MikroTik, Latvia. MUM Pittsburgh September 2014

CAPsMAN Case Study. Uldis Cernevskis MikroTik, Latvia. MUM Pittsburgh September 2014 CAPsMAN Case Study Uldis Cernevskis MikroTik, Latvia MUM Pittsburgh September 2014 CAPsMAN Features Centralized management of RouterOS APs Dual Band AP support Provisioning of APs MAC and IP Layer communication

More information

MPLS for ISPs PPPoE over VPLS. MPLS, VPLS, PPPoE

MPLS for ISPs PPPoE over VPLS. MPLS, VPLS, PPPoE MPLS for ISPs PPPoE over VPLS MPLS, VPLS, PPPoE Presenter information Tomas Kirnak Network design Security, wireless Servers Virtualization MikroTik Certified Trainer Atris, Slovakia Established 1991 Complete

More information

Port Server RADIUS Support (RFC 2865, 2866)

Port Server RADIUS Support (RFC 2865, 2866) 7409 SW Tech Center Drive, Suite 100 Tigard, OR 97223 USA http://www.faxback.com Port Server RADIUS Support (RFC 2865, 2866) Version 1.0 Last edited September 2, 2010 All rights reserved. No part of this

More information

YubiRADIUS Deployment Guide for corporate remote access. How to Guide

YubiRADIUS Deployment Guide for corporate remote access. How to Guide YubiRADIUS Deployment Guide for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship

More information

7750 SR OS System Management Guide

7750 SR OS System Management Guide 7750 SR OS System Management Guide Software Version: 7750 SR OS 10.0 R4 July 2012 Document Part Number: 93-0071-09-02 *93-0071-09-02* This document is protected by copyright. Except as specifically permitted

More information

DIGIPASS Authentication for Cisco ASA 5500 Series

DIGIPASS Authentication for Cisco ASA 5500 Series DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations

More information

Quality of Service in wireless Point-to-Point Links

Quality of Service in wireless Point-to-Point Links Quality of Service in wireless Point-to-Point Links MikroTik User Meeting, St. Louis, MO, USA, September 19-20 2013 menschen.computer.netzwerke Bottenbacher Str. 78 57223 Kreuztal Tel: +49.2732.55856-0

More information

WISP 101. The DO s and DON T s of becoming a Wireless ISP

WISP 101. The DO s and DON T s of becoming a Wireless ISP WISP 101 The DO s and DON T s of becoming a Wireless ISP WISP 101 topics Choosing your hardware Setting up the Highsite Hardware Software Security Wireless Backhaul Setting up the client Choosing your

More information

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and operation of secure remote access infrastructures Central creation of client configuration

More information

CHAPTER NO. TITLE PAGE NO.

CHAPTER NO. TITLE PAGE NO. xii CHAPTER NO. TITLE PAGE NO. 4 INTEGRATED DESIGN OF WEB SERVICE ACCOUNTING ARCHITECTURE 84 4.1 DESIGN OF INTEGRATED ACCOUNTING MODULES 84 4.1.1 Accounting Record Formats 87 4.1.2 WS-Radius Protocol 91

More information

Lecture 4b AAA protocols (Authentication Authorization Accounting)

Lecture 4b AAA protocols (Authentication Authorization Accounting) Lecture 4b AAA protocols (Authentication Authorization Accounting) Network security (19265400 / 201000086) Lecturers: Aiko Pras Pieter-Tjerk de Boer Anna Sperotto Ramin Sadre Georgios Karagiannis Lecture

More information

Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks

Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England March 2-7, 2014 Presented by: Lionel Morand Co-authored

More information

150-420. Brocade Certified Layer 4-7 Professional 2010. Version: Demo. Page <<1/8>>

150-420. Brocade Certified Layer 4-7 Professional 2010. Version: Demo. Page <<1/8>> 150-420 Brocade Certified Layer 4-7 Professional 2010 Version: Demo Page QUESTION NO: 1 Given the command shown below, which statement is true? aaa authentication enable default radius local A.

More information

RADIUS Authentication and Accounting

RADIUS Authentication and Accounting 5 RADIUS Authentication and Accounting Contents Overview...................................................... 5-2 Terminology................................................... 5-3 Switch Operating Rules

More information

Configuring Internet Authentication Service on Microsoft Windows 2003 Server

Configuring Internet Authentication Service on Microsoft Windows 2003 Server Windows 2003 / Enhanced Configuring Internet Authentication Service on Microsoft Windows 2003 Server Introduction This technote describes how to setup the Internet Authentication service (IAS) on a Microsoft

More information

1 Thunderbird v3 and IMAP/SMTP Configuration

1 Thunderbird v3 and IMAP/SMTP Configuration 1 Thunderbird v3 and IMAP/SMTP Configuration The following applies to Thunderbird v3 and later versions on Linux, Mac, and Windows. There are some minor differences in the menu structure between Thunderbird

More information

DIGIPASS Authentication for Check Point Connectra

DIGIPASS Authentication for Check Point Connectra DIGIPASS Authentication for Check Point Connectra With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 21 Disclaimer Disclaimer of Warranties and Limitations

More information

Routing and Remote Access Service

Routing and Remote Access Service Routing and Remote Access Service (Week 15, Friday 4/21/2006) Abdou Illia, Spring 2006 1 Learning Objectives Introducing RRAS Enabling RRAS Configuring RRAS Monitoring RRAS Creating Remote Access Policies

More information

BGP as an IGP for Carrier/Enterprise Networks

BGP as an IGP for Carrier/Enterprise Networks BGP as an IGP for Carrier/Enterprise Networks Presented by: Kevin Myers, SENIOR NETWORK ENGINEER IP ArchiTECHS MANAGED SERVICES Background Kevin Myers 15 + years in IT/Network Engineering Designed and

More information

pfsense Captive Portal: Part One

pfsense Captive Portal: Part One pfsense Captive Portal: Part One Captive portal forces an HTTP client to see a special web page, usually for authentication purposes, before using the Internet normally. A captive portal turns a web browser

More information

BroadSoft BroadWorks ver. 17 SIP Configuration Guide

BroadSoft BroadWorks ver. 17 SIP Configuration Guide Valcom Session Initiation Protocol (SIP) VIP devices are compatible with BroadSoft s BroadWorks hosted SIP server. The Valcom device is defined as a Generic SIP Phone in the BroadWorks system. Authentication

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology Centrally Managed VPN fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and

More information

DualShield. for PAM RADIUS. Implementation Guide. (Version 5.4) Copyright 2012 Deepnet Security Limited

DualShield. for PAM RADIUS. Implementation Guide. (Version 5.4) Copyright 2012 Deepnet Security Limited DualShield for Implementation Guide (Version 5.4) Copyright 2012 Deepnet Security Limited Copyright 2012, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID,

More information

WiNG 4.X / WiNG 5.X RADIUS Attributes

WiNG 4.X / WiNG 5.X RADIUS Attributes Configuration Guide for RFMS 3.0 Initial Configuration XXX-XXXXXX-XX WiNG 4.X / WiNG 5.X RADIUS Attributes Part No. TME-08-2011-01 Rev. C MOTOROLA and the Stylized M Logo are registered in the US Patent

More information

REMOTE ACCESS DDNS CONFIGURATION MANUAL

REMOTE ACCESS DDNS CONFIGURATION MANUAL REMOTE ACCESS DDNS CONFIGURATION MANUAL Analog DVR Series 1 www.mezory.com INTRODUCTION TO REMOTE ACCESS As the World sinks into one global village, reliable connectivity is one of the most demanding facilities

More information

White Paper Captive Portal Configuration Guide

White Paper Captive Portal Configuration Guide White Paper Captive Portal Configuration Guide June 2014 This document describes the protocol flow, configuration process and example use-cases for self-hosted captive portal (splash page) access, which

More information

IPSecuritas 3.x. Configuration Instructions. Collax Business Server. for

IPSecuritas 3.x. Configuration Instructions. Collax Business Server. for IPSecuritas 3.x Configuration Instructions for Lobotomo Software 27. juillet 2010 Legal Disclaimer Contents Lobotomo Software (subsequently called "Author") reserves the right not to be responsible for

More information

RadSec RADIUS improved. Stig Venaas venaas@uninett.no

RadSec RADIUS improved. Stig Venaas venaas@uninett.no RadSec RADIUS improved Stig Venaas venaas@uninett.no Overview RADIUS overview RadSec overview What is wrong with RADIUS RadSec benefits Radsec implementations, deployment and standardisation RADIUS overview

More information

Sentral servers provide a wide range of services to school networks.

Sentral servers provide a wide range of services to school networks. Wazza s QuickStart Publishing iweb Sites to a Sentral Server Background Mac OS X, Sentral, iweb 09 Sentral servers provide a wide range of services to school networks. A Sentral server provides a publishing

More information

How to Install Multicraft on a VPS or Dedicated Server (Ubuntu 13.04 64 bit)

How to Install Multicraft on a VPS or Dedicated Server (Ubuntu 13.04 64 bit) How to Install Multicraft on a VPS or Dedicated Server (Ubuntu 13.04 64 bit) Introduction Prerequisites This tutorial will show you step-by-step on how to install Multicraft 1.8.2 on a new VPS or dedicated

More information

Server Installation/Upgrade Guide

Server Installation/Upgrade Guide Server Installation/Upgrade Guide System Version 3.8 2001-2009 Echo 360, Inc. Echo360 is a trademark of Echo360, Inc. Echo360 is a registered trademark of Echo360 Inc. in Australia. All other trademarks

More information

AGLARBRI PROJECT AFRICAN GREAT LAKES RURAL BROADBAND RESEARCH INFRASTRUCTURE. RADIUS installation and configuration

AGLARBRI PROJECT AFRICAN GREAT LAKES RURAL BROADBAND RESEARCH INFRASTRUCTURE. RADIUS installation and configuration AGLARBRI PROJECT AFRICAN GREAT LAKES RURAL BROADBAND RESEARCH INFRASTRUCTURE RADIUS installation and configuration Project Manager: Miguel Sosa (mesc@kth.se) Member Email Position and number of credits

More information

AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts

AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts AlienVault Unified Security Management (USM) 4.x-5.x Deploying HIDS Agents to Linux Hosts USM 4.x-5.x Deploying HIDS Agents to Linux Hosts, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. AlienVault,

More information

Fireware How To Authentication

Fireware How To Authentication Fireware How To Authentication How do I configure my Firebox to authenticate users against my existing RADIUS authentication server? Introduction When you use Fireware s user authentication feature, you

More information

INTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass

INTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass INTEGRATION GUIDE DIGIPASS Authentication for F5 FirePass Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security

More information

Replacing legacy twofactor. with YubiRADIUS for corporate remote access. How to Guide

Replacing legacy twofactor. with YubiRADIUS for corporate remote access. How to Guide Replacing legacy twofactor authentication with YubiRADIUS for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection.

More information

Aradial Converged VOIP Billing Overview http://www.aradial.com

Aradial Converged VOIP Billing Overview http://www.aradial.com Aradial Converged VOIP Billing Overview http://www.aradial.com 2009 Aradial This document contains proprietary and confidential information of Aradial and shall not be reproduced or transferred to other

More information

How to Use? SKALICLOUD DEMO

How to Use? SKALICLOUD DEMO How to Use? SKALICLOUD DEMO Account Login Page SkaliCloud Control Panel Overview Step 1: Click Add and Select Server Button to create your Server, add your Drive, Private Vlan or Static IP You are now

More information

MikroTik RouterOS Workshop Load Balancing Best Practice. Warsaw MUM Europe 2012

MikroTik RouterOS Workshop Load Balancing Best Practice. Warsaw MUM Europe 2012 MikroTik RouterOS Workshop Load Balancing Best Practice Warsaw MUM Europe 2012 MikroTik 2012 About Me Jānis Meģis, MikroTik Jānis (Tehnical, Trainer, NOT Sales) Support & Training Engineer for almost 8

More information

www.interlinknetworks.com

www.interlinknetworks.com 2002 Interlink Networks, Inc. Revision All Rights Reserved. This document is copyrighted by Interlink Networks Incorporated (Interlink Networks). The information contained within this document is subject

More information

Bandwidth-based load-balancing with failover. The easy way. We need more bandwidth.

Bandwidth-based load-balancing with failover. The easy way. We need more bandwidth. Bandwidth-based load-balancing with failover. The easy way. We need more bandwidth. Presenter information Tomas Kirnak Network design Security, wireless Servers, Virtualization Mikrotik Certified Trainer

More information

Transparent Identification of Users

Transparent Identification of Users Transparent Identification of Users Websense Web Security Solutions v7.5, v7.6 Transparent Identification of Users 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA

More information

Symantec VIP Integration with ISE

Symantec VIP Integration with ISE Symantec VIP Integration with ISE Table of Contents Overview... 3 Symantec VIP... 3 Cisco Identity Services Engine (ISE)... 3 Cisco Centralized Web Authentication... 4 VIP in Action... 4 ISE Configuration...

More information

Configuring Single Sign-on for WebVPN

Configuring Single Sign-on for WebVPN CHAPTER 8 This chapter presents example procedures for configuring SSO for WebVPN users. It includes the following sections: Using Single Sign-on with WebVPN, page 8-1 Configuring SSO Authentication Using

More information

Load Balancing Using PCC & RouterOS

Load Balancing Using PCC & RouterOS Load Balancing Using PCC & RouterOS About Me Steve Discher, from College Station, Texas, USA Class of 87 Texas A&M University Using MikroTik since early 2004 when I started my first WISP Author of the

More information

VPN: Virtual Private Network Setup Instructions

VPN: Virtual Private Network Setup Instructions VPN: Virtual Private Network Setup Instructions Virtual Private Network (VPN): For e-journals and web-based databases, plus applications like EndNote's Online Search (formerly "Connect") and business systems.

More information

7450 ESS OS System Management Guide. Software Version: 7450 ESS OS 10.0 R1 February 2012 Document Part Number: 93-0101-09-01 *93-0101-09-01*

7450 ESS OS System Management Guide. Software Version: 7450 ESS OS 10.0 R1 February 2012 Document Part Number: 93-0101-09-01 *93-0101-09-01* 7450 ESS OS System Management Guide Software Version: 7450 ESS OS 10.0 R1 February 2012 Document Part Number: 93-0101-09-01 *93-0101-09-01* This document is protected by copyright. Except as specifically

More information

Interlink Networks Secure.XS and Cisco Wireless Deployment Guide

Interlink Networks Secure.XS and Cisco Wireless Deployment Guide Overview Interlink Networks Secure.XS and Cisco Wireless Deployment Guide (An AVVID certification required document) This document is intended to serve as a guideline to setup Interlink Networks Secure.XS

More information