2G1701 Advanced Internetworking Group 5 : KiStaNEt ISP Project Report



Similar documents
Solaris Networking Guide. Stewart Watkiss. Volume. New User To Technical Expert Solaris Bookshelf. This document is currently under construction

Cork Institute of Technology Master of Science in Computing in Education National Framework of Qualifications Level 9

Lesson Plans Managing a Windows 2003 Network Infrastructure

Lab Configure Basic AP Security through IOS CLI

KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10

- Domain Name System -

Using Webmin and Bind9 to Setup DNS Sever on Linux

Building a Linux IPv6 DNS Server

Unified Access Point Administrator's Guide

Configuration Manual English version

Chapter 4 Customizing Your Network Settings

Tunnel Client FAQ. Table of Contents. Version 0v5, November 2014 Revised: Kate Lance Author: Karl Auer

HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeDNS. How To Guide

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering

Vantage RADIUS 50. Quick Start Guide Version 1.0 3/2005

Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1

Creating a master/slave DNS server combination for your Grid Infrastructure

Chapter 1 Configuring Internet Connectivity

Setting up a Raspberry Pi as a WiFi access point

estadium Project Lab 8: Wireless Mesh Network Setup with DD WRT

Lab Organizing CCENT Objectives by OSI Layer

Interconnecting Cisco Network Devices 1 Course, Class Outline

Domain Name System Security

CSIS 3230 Computer Networking Principles, Spring 2012 Lab 7 Domain Name System (DNS)

Quick Installation Guide

Configuring the BIND name server (named) Configuring the BIND resolver Constructing the name server database files

Home Networking In Linux

How To Guide Edge Network Appliance How To Guide:

How to Configure Split DNS

LAN TCP/IP and DHCP Setup

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router

Using Cisco UC320W with Windows Small Business Server

Networking Domain Name System

Skills Assessment Student Training Exam

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Interlink Networks Secure.XS and Cisco Wireless Deployment Guide

c. Securely insert the Ethernet cable from your cable or DSL modem into the Internet port (B) on the WGT634U. Broadband modem

Developing Network Security Strategies

Module 2. Configuring and Troubleshooting DNS. Contents:

Lab Diagramming External Traffic Flows

Chapter 1 Configuring Basic Connectivity

This chapter describes how to set up and manage VPN service in Mac OS X Server.

LinkProof DNS Quick Start Guide

netkit lab load balancer dns 1.2 Massimo Rimondini Version Author(s)

Wireless LAN Access Point. IEEE g 54Mbps. User s Manual

Copyright International Business Machines Corporation All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure

DNS Resolving using nslookup

Domain Name System (DNS) Services

Lab Configure Syslog on AP

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

ENHWI-N n Wireless Router

ECE 4321 Computer Networks. Network Programming

Lab Configuring Access Policies and DMZ Settings

Unified Access Point Administrator s Guide

Lab Configuring the PIX Firewall as a DHCP Server

LevelOne WBR-3405TX. User`s Manual. 11g Wireless AP Router

Mikrotik Router OS - Setup and Configuration Guide for Aradial Radius Server

LAB THREE STATIC ROUTING

Wifi Web Server Module w TF Socket User s Guide

Basic IPv6 WAN and LAN Configuration

Ruckus Wireless ZoneDirector Command Line Interface

MN-700 Base Station Configuration Guide

Configuring connection settings

Chapter 6 Using Network Monitoring Tools

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)

Chapter 6 Using Network Monitoring Tools

Networking Domain Name System

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

Nokia E61i Configuring connection settings

Savvius Insight Initial Configuration

Configuring DNS. Finding Feature Information

How To Check If Your Router Is Working Properly

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

About Me. Work at Jumping Bean. Developer & Trainer Contact Info: mark@jumpingbean.co.za

SI455 Advanced Computer Networking. Lab2: Adding DNS and Servers (v1.0) Due 6 Feb by start of class

Pre-lab and In-class Laboratory Exercise 10 (L10)

CCT vs. CCENT Skill Set Comparison

IP Address, Domain and Hostname for IM and Presence Service on Cisco Unified Communications Manager, Release 9.1(1)

Home Linux Networking Lab (202) This Howto shows how to recreate the CIS Lab environment at home.

APNIC IPv6 Deployment

Instructor Notes for Lab 3

Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led

Installing and Setting up Microsoft DNS Server

Technical Support Information Belkin internal use only

Lab Diagramming Intranet Traffic Flows

Integrating a Hitachi IP5000 Wireless IP Phone

DNS. Computer Networks. Seminar 12

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

Guideline for setting up a functional VPN

Chapter 4 Customizing Your Network Settings

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

Domain Name Server. Training Division National Informatics Centre New Delhi

How To Learn Cisco Cisco Ios And Cisco Vlan

Chapter 9 Monitoring System Performance

Configuring WAN Failover with a Cisco 881 Router and an AirLink ES440

Connecting with Computer Science, 2e. Chapter 5 The Internet

DSA-1000 / PRT-1000 Device Server / Thermal Printer

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Chapter 4 Managing Your Network

Cisco Networking Professional-6Months Project Based Training

Transcription:

2G1701 Advanced Internetworking Group 5 : KiStaNEt ISP Project Report Course staff : Group Members : Jon-Olov Vatn (Course Leader) Sermed Al-abbasi (Teaching Assistant) Zaheen Sherwani Carlos Loarca Xiong Si Wen-Jia Gan Abstract This report details what went behind the setting up of KiStaNet ISP, and our motivations behind our design decisions, and summarizes what we all have learnt in the process. i

Table of Contents Page Number 1. Introduction 1 2. Description of Services 1 3. Description of Setup 3 3.1 Detailed Setup Description of Individual Machines 4 4. Results 5 5. Individual Statements 5 6. Lessons Learned 6 7. Summary 6 8. References 6 Appendixes 7 Appendix A. : Verification Tests 7 Appendix B. : Configuration Files named.conf 8 db.kistanet.lab 9 db.10.5.0 9 db.127.0.0 10 dhcpd.conf 10 hostapd.conf 11 ii

1. Introduction The purpose of the project is to setup and run an Internet Service Provider (ISP) as a group. The tasks our group are to solve includes the mandatory services of Domain Name Services (DNS), web server, dynamic routing and dynamic address assignment. The selective service our group chose to do is Wireless LAN (WLAN), which enable hosts to connect and obtain IP address dynamically via cable or wirelessly. Due to manpower limitations of only 4 people in our group, our scope is limited to simple web server services. 2. Description of Services This section describes our services in more depth, and also how we have decided to provide the services. One major reason for the choice of implementations is due to the prior experiences and familiarity by the KSN technical staff. 2.1 Mandatory services DNS As the Internet's IP addresses are not generally user-friendly, Kistanet (KSN) domain name servers were used to resolve domain names to IP addresses. The relationship between IP addresses and domain names was managed by a primary domain name server (ns.kistanet.lab) and a secondary domain name server (ns2.kistanet.lab). KSN used the secondary DNS to provide redundancy to the customers. Users would otherwise not be able to access any Uniform Resource Locator (URL i.e. web page) if the primary DNS failed, unless the user knew the exact IP address. KSN is a start-up ISP company with not many resources. Therefore, KSN prefers to provide a DNS service using open source implementations (BIND) coordinated by The Internet Software Consortium. Meanwhile KSN will be trying to develop its own implementation to solve some security problems with BIND in the future. Web Server Our web server is running on Apache 2, which is the most popular web server implementation available today, together with PHP server side scripting and PostGreSQL database. Our ISP main webpage allows user login and authentication based on the above services. We have opted a rudimentary web server is provided instead of additional web services deployed due to manpower limitations. 1

Dynamic Routing KSN decided to use dynamic routing within the ISP setup ie on both interfaces of routers R1, R2, R3 and R4 to avoid the overhead of manually entering the static routes within the network. The link state Open Shortest Path First Protocol (OSPF) was selected for the dynamic routing protocol within the ISP network due to its low overhead and faster convergence time. OSPF is widely used in large networks such as ISP backbone and enterprise network. In order to provide dynamic routing, Zebra dynamic routing software package was used within the ISP setup. The advantage of using Zebra is that it provides a console based interface for the configuration of personal computer (PC) based routers running Linux environment. This interface is very similar to that developed by Cisco Systems for the configuration of their commercial routers. Since Zebra and OSPF process daemons are controlled through separate telnet sessions therefore a telnet server was also installed on these Linux machines. Dynamic Address Assignment There are many commercial Dynamic Host Configuration Protocol (DHCP) implementations available, such as Vicomsoft, 602ProLan Suite, IP Commander etc. We have chosen to use DHCP distribution from the Internet Software Consortium as it provides full functionality and is freely distributable. DHCP can be used by client machines in a plug-n-play fashion into our network and be assigned IP addresses with basically no configuration required on their part. 2.2 Selective services : Wireless LAN (WLAN) We chose Wireless LAN (WLAN) as our selective service as it is an up and coming field. Its setup had provided great learning value. WLAN services provided by ISPs is becoming popular as wireless hotspots usually located at cafes, restaurants, airports and hotels. 2

3. Description of Setup This section described our network design and machine setup. Our ISP s network topology is illustrated in Figure 1. Figure 1 : KiStaNet Network Topology Diagram ns 10.0.0.11/24 ns.lab 10.0.0.21/24 10.0.0.101/24 10.0.0.102/24 10.0.0.<100+N>/24 R1 ISP1 R2 ISP2 Sec. DNS R1 ISPN Internal network of ISP 1 Internal network of ISP 2 Internal network of ISP 5 10.0.0.105/24 Internal network of ISP N (WWW) (DNS) R1 ISP5 Del. DNS (Delegation DNS) 10.5.0.1/24 10.5.0.20/24 (add range 10.5.3.10-10.5.3.254) Dynamic IP WLAN H R2 10.5.0.2/24 10.5.0.3/24 R3 10.5.1.2/24 10.5.1.3/24 10.5.3.1/24 10.5.1.1/124 R4 (DHCP) 10.5.2.1/24 (add range 10.5.2.10-10.5.2.254) WLAN H Dynamic IP Dynamic IP Dynamic IP H H 10.0.0.101/24 3

3.1 Detailed Setup Description of Individual Machines This section describes how we have setup our services. DNS The domain contained: www www.kistanet.lab 10.5.0.1 mail mail.kistanet.lab 10.5.0.15 The KSN domain names hierarchy consisted of a primary DNS (R1) and a secondary DNS (hosted on another ISP) to give the IP address mapping to a name and vice versa. A delegation server was also added for controlling the sub-domain of the KTH University (ns.kth.kistanet.lab). It was advantageous to delegate control from the domain to the sub-domains to simplify name resolution, for example to cater for when the ISP company grows. This sub-domain contains: web www.kth.kistanet.lab 10.5.0.13 ftp ftp.kth.kistanet.lab 10.5.0.14 e-mail mail.kth.kistanet.lab 10.5.0.11 servers mail2.kth.kistanet.lab 10.5.0.12 Web Server R1 is running Apache 2 web server, PHP server side scripting and PostGreSQL database. Dynamic Address Assignment R4 is running DHCP server for subnet 10.5.2.0 (wired LAN) and 10.5.3.0 (wireless LAN). Wireless LAN We made R4 act as an Access Point (AP). It had one interface connected via wire to our ISP network, with another interface that has a Wireless LAN card running on a Intersil's Prism 2/2.5/3 chipset. This PC need to run a software called HostAP for it to take care of IEEE 802.11 management functions in the host computer and acts as an access point. Intersil's station firmware for Prism2 chipset supports a so called Host AP mode in which the firmware takes care of time critical tasks like beacon sending and frame acknowledging, but leaves other management tasks to host computer driver. Our PC providing WLAN runs Red Hat 9 with kernel version 2.4.20 and use the 0.0.3 stable release of HostAP. Using HostAP, the WLAN card is set as Master mode to enable it to function as an AP. It s Extended Service Set Identifier (ESSID) is set to WKSN (Wireless Kistanet) to differentiate our WLAN from others. Our AP has DHCP server to assign IP address dynamically, and also runs OSPF for dynamic routing. Access Control To implement access control, we ran hostapd, which is a user space daemon for extended IEEE 802.11 management, that came with the HostAP distribution. We implemented station MAC address-based authentication, and specified in the hostapd.conf configuration file to deny all stations unless of those MAC addresses listed in /etc/hostapd.accept accept list. 4

4. Results We first tested for connectivity to the web servers of the other ISPs from host machines in our ISP network, by pinging. We then proceeded to resolve domain names of other ISPs, as well as others being able to resolve ours, successfully. This included normal lookup and reverse lookup of addresses. We also used web browsers to access the web pages of the other ISP s web server. To test our dynamic routing, we disconnected one of the routers (R2 and R3). Our end hosts were still able to reach the other ISPs web server, while maintaining local network connectivity. We then changed over to the disconnected router, and achieved the same results. Our end hosts were able to get IP addresses dynamically, both on the wired LAN and wireless LAN. We also tested for wireless LAN access control by allowing connection to authorized hosts with registered MAC addresses. A wireless client from another ISP was also able to get a dynamic IP address from our access point and got connected to our network. 5. Individual Statements This section is where each student in the group individually confirms that we know how to setup each of the services that the group is required to do (the mandatory services as well as the selected service.) Carlos Loarca I confirm that I know how to set up the mandatory and selective services that our group is required to do. Wen-Jia Gan I confirm that I know how to set up the mandatory and selective services that our group is required to do. Xiong Si I confirm that I know how to set up the mandatory and selective services that our group is required to do. Zaheen Sherwani I confirm that I know how to set up the mandatory and selective services that our group is required to do. 5

6. Lessons Learnt Carlos Loarca The theory is very important since fits completely with the practical experiences generating the best learning environment. I was so sorry when I couldn't read every thing what I needed to read for a laboration, once. But when you have done it for sure you get a good knowledge. In the other hand, I feel more confident using on Linux now at days than before starting this course and also I'm encouraged to research and play with some other services on Linux. Wen-Jia Gan This project had given us the opportunity to hone our network design, and troubleshooting skills. The research and experimentations while doing the project had been most valuable. Xiong Si First, I realize that group cooperation is really important. Second, this project give me a lot of practical experiments, and combine the knowledge on book with practical applications. Zaheen Sherwani Apart from learning the subject, I realised the importance of working in groups. We learnt from each others weaknesses and strengths, and were able to achieve our goals through mutual cooperation. Secondly, at the beginning of the course I did not know much about Linux, now I am comfortable in it. 7. Summary In all, this ISP group project provided invaluable learning experience to us all, in both areas of practical work and teamwork. 8. References Guidelines for ISP Project Demonstration http://www.imit.kth.se/courses/2g1701/docs/protected/isp-info/ Guidelines for ISP Project Report http://www.imit.kth.se/courses/2g1701/docs/protected/isp-report/ Internet Software Consortium (ISC) Dynamic Host Configuration Protocol (DHCP) http://www.isc.org/products/dhcp/ Host AP driver for Intersil Prism2/2.5/3 http://hostap.epitest.fi Appendixes 6

A. Verification Tests This section describes how we verified that our different services work. DNS We looked up our dns with the following command to inquire the root name server for our web server. dig +trace www.kistanet.lab We are able to obtain answers from root, top level domain and local name servers. We did reverse lookup using : dig x 10.5.0.1 to get the domain name corresponding to this IP address. Web Server We opened a web browser to browse our webpage http://www.kistanet.lab using a host in our network, and also using a host in other ISP s host machines. Dynamic Routing First we listed our routing table to see which router (R2 or R3) was the default gateway of the end host. We then disconnected that the router. We noted that the default gateway was automatically changed to the other router. We then changed over to the disconnected router, and reachability to the other ISPs remained. Dynamic Address Assignment Our end hosts were able to get assigned IP addresses dynamically to their connected interfaces, on both the wired LAN and wireless LAN. We checked that the IP addresses assigned corresponded to the IP address range given. Wireless LAN Hosts with wireless LAN cards were able to detect the SSID ( WKSN ) of our Access Point, and get assigned dynamic IP addresses by the DHCP server. The hosts were also able to ping hosts in the other ISPs networks. 7

B. Configuration Files named.conf options { directory "/var/named"; forward first; forwarders { 10.0.0.105; 10.5.0.1; controls { inet 10.5.0.1 allow { 10.5.0.10; } keys { "rndc-key"; controls { inet 10.0.0.105 allow { 10.5.0.10; } keys { "rndc-key"; zone "." in { type hint; file "root.hints"; zone "0.0.127.in-addr.arpa" in { type master; file "kistanet/db.127.0.0"; zone "0.5.10.in-addr.arpa" in { type master; file "kistanet/db.10.5.0"; zone "0.0.10.in-addr.arpa" in { type master; file "kistanet/db.10.0.0"; zone "kistanet.lab" in { type master; file "kistanet/db.kistanet.lab"; # Start of rndc.conf key "rndc-key" { algorithm hmac-md5; secret "qnmtlajk4dcoqceot+a9+g=="; 8

db.kistanet.lab $TTL 3h @ IN SOA ns.kistanet.lab. staff5.kistanet.lab.( 031004 ; Serial 3h ; Refresh 1h ; Retry 1w ; Expire 1h) ; Negative TTL kistanet.lab. NS ns.kistanet.lab. NS ns2.kistanet.lab. MX 10 mail.kistanet.lab. ;delegation record kth.kistanet.lab. IN NS ns.kth.kistanet.lab. localhost IN A 127.0.0.1 ;name servers ns IN A 10.5.0.1 ns.kth.kistanet.lab. IN A 10.5.0.20 ;service servers www IN A 10.5.0.1 mail IN A 10.5.0.15 db.10.5.0 $TTL 3h @ IN SOA ns.kistanet.lab. staff5.kistanet.lab.( 1 ; Serial 3h ; Refresh 1h ; Retry 1w ; Expire 1h) ; Negative TTL IN NS ns.kistanet.lab. IN NS ns2.kistanet.lab. ; root name server 11.0.0.10 IN PTR ns. ; top domain server 21.0.0.10 IN PTR ns.lab. ; any type servers 1 IN PTR www.kistanet.lab. ;10 IN PTR ns2.kistanet.lab. 15 IN PTR mail.kistanet.lab. ; delegation server 11 IN NS ns.kth.kistanet.lab. 12 IN NS ns.kth.kistanet.lab. 13 IN NS ns.kth.kistanet.lab. 14 IN NS ns.kth.kistanet.lab. ns.kth.kistanet.lab. IN A 10.5.0.20 9

db.127.0.0 $TTL 3h @ IN SOA ns.kistanet.lab. staff5.kistanet.lab.( 1 ; Serial 3h ; Refresh 1h ; Retry 1w ; Expire 1h) ; Negative TTL NS ns.kistanet.lab. 1 PTR localhost. dhcpd.conf : Configuration file for DHCP server #ddns-update-style interim; ddns-update-style none; ignore client-updates; subnet 10.5.2.0 netmask 255.255.255.0 { range 10.5.2.10 10.5.2.254; # --- default gateway option routers 10.5.2.1; option subnet-mask 255.255.255.0; option domain-name "kistanet.lab"; option domain-name-servers 10.5.0.1; option domain-name-servers 10.5.0.20; } default-lease-time 120; max-lease-time 43200; subnet 10.5.3.0 netmask 255.255.255.0 { range 10.5.3.10 10.5.3.254; # --- default gateway option routers 10.5.2.1; option subnet-mask 255.255.255.0; option domain-name "kistanet.lab"; option domain-name-servers 10.5.0.1; option domain-name-servers 10.5.0.20; } default-lease-time 120; max-lease-time 43200; 10

hostapd.conf : Configuration file for HostAP daemon ##### hostapd configuration file ############################################## # Empty lines and lines starting with # are ignored # AP netdevice name (without 'ap' prefix, i.e., wlan0 uses wlan0ap for # management frames) interface=wlan0 # hostapd event logger configuration # # Two output method: syslog and stdout (only usable if not forking to # background). # # Module bitfield (ORed bitfield of modules that will be logged; -1 = all # modules): # bit 0 (1) = IEEE 802.11 # bit 1 (2) = IEEE 802.1X # bit 2 (4) = RADIUS # # Levels (minimum value for logged events): # 0 = verbose debugging # 1 = debugging # 2 = informational messages # 3 = notification # 4 = warning # logger_syslog=-1 logger_syslog_level=2 logger_stdout=-1 logger_stdout_level=2 # Debugging: 0 = no, 1 = minimal, 2 = verbose, 3 = msg dumps debug=0 # Dump file for state information (on SIGUSR1) dump_file=/tmp/hostapd.dump # Daemonize hostapd process (i.e., fork to background) daemonize=1 ##### IEEE 802.11 related configuration ####################################### # SSID to be used in IEEE 802.11 management frames #ssid=test ssid=wksn # Station MAC address -based authentication # 0 = accept unless in deny list # 1 = deny unless in accept list # 2 = use external RADIUS server (accept/deny lists are searched first) #macaddr_acl=0 macaddr_acl=1 11

# Accept/deny lists are read from separate files (containing list of # MAC addresses, one per line). Use absolute path name to make sure that the # files can be read on SIGHUP configuration reloads. accept_mac_file=/etc/hostapd.accept #deny_mac_file=/etc/hostapd.deny # IEEE 802.11 specifies two authentication algorithms. hostapd can be # configured to allow both of these or only one. Open system authentication # should be used with IEEE 802.1X. # Bit fields of allowed authentication algorithms: # bit 0 = Open System Authentication # bit 1 = Shared Key Authentication (requires WEP) auth_algs=3 # Associate as a station to another AP while still acting as an AP on the same # channel. #assoc_ap_addr=00:12:34:56:78:9a ##### IEEE 802.1X (and IEEE 802.1aa/D4) related configuration ################# # Require IEEE 802.1X authorization #ieee8021x=1 # Use internal minimal EAP Authentication Server for testing IEEE 802.1X. # This should only be used for testing since it authorizes all users that # suppot IEEE 802.1X without any keys or certificates. minimal_eap=0 # Optional displayable message sent with EAP Request-Identity eap_message=hello # WEP rekeying (disabled if key lengths are not set or are set to 0) # Key lengths for default/broadcast and individual/unicast keys: # 5 = 40-bit WEP (also known as 64-bit WEP with 40 secret bits) # 13 = 104-bit WEP (also known as 128-bit WEP with 104 secret bits) #wep_key_len_broadcast=5 #wep_key_len_unicast=5 # Rekeying period in seconds. 0 = do not rekey (i.e., set keys only once) #wep_rekey_period=300 # EAPOL-Key index workaround (set bit7) for WinXP Supplicant (needed only if # only broadcast keys are used) eapol_key_index_workaround=0 ##### IEEE 802.11f - Inter-Access Point Protocol (IAPP) ####################### 12

# Interface to be used for IAPP broadcast packets #iapp_interface=eth0 ##### RADIUS configuration #################################################### # for IEEE 802.1X with external Authentication Server, IEEE 802.11 # authentication with external ACL for MAC addresses, and accounting # The own IP address of the access point (used as NAS-IP-Address) own_ip_addr=127.0.0.1 # RADIUS authentication server #auth_server_addr=127.0.0.1 #auth_server_port=1812 #auth_server_shared_secret=secret # RADIUS accounting server #acct_server_addr=127.0.0.1 #acct_server_port=1813 #acct_server_shared_secret=secret # Secondary RADIUS servers; to be used if primary one does not reply to # RADIUS packets. These are optional and there can be more than one secondary # server listed. #auth_server_addr=127.0.0.2 #auth_server_port=1812 #auth_server_shared_secret=secret2 # #acct_server_addr=127.0.0.2 #acct_server_port=1813 #acct_server_shared_secret=secret2 # Retry interval for trying to return to the primary RADIUS server (in # seconds). RADIUS client code will automatically try to use the next server # when the current server is not replying to requests. If this interval is set, # primary server will be retried after configured amount of time even if the # currently used secondary server is still working. #radius_retry_primary_interval=600 13