Differences
This shows you the differences between two versions of the page.
| en:dpi:dpi_components:freeradius:local_auth [2025/12/18 07:37] – created elena.krasnobryzh | en:dpi:dpi_components:freeradius:local_auth [2025/12/18 07:39] (current) – elena.krasnobryzh | ||
|---|---|---|---|
| Line 7: | Line 7: | ||
| ===== FreeRADIUS configuration ===== | ===== FreeRADIUS configuration ===== | ||
| - **Disabling EAP.** within this build, disabling is not strictly required, but EAP may cause errors when enabling the '' | - **Disabling EAP.** within this build, disabling is not strictly required, but EAP may cause errors when enabling the '' | ||
| - | / | + | / |
| - | Disable EAP in the following sections: | + | |
| - | <code bash> | + | |
| authorize { | authorize { | ||
| # | # | ||
| Line 19: | Line 17: | ||
| post-proxy { | post-proxy { | ||
| # eap | # eap | ||
| - | </ | + | </ |
| - | If necessary, also remove EAP files from the modules ''/ | + | - **Client/ |
| - | - **Client/ | + | |
| - | If the FreeRADIUS server is deployed on the same node as fastPCRF, no additional configuration is required — it is enough to verify the default configuration in the file ''/ | + | |
| - | If a remote NAS needs to be defined, use the same file and add a client description, | + | |
| - | <code bash> | + | |
| client fastpcrf1 { | client fastpcrf1 { | ||
| ipaddr | ipaddr | ||
| secret | secret | ||
| require_message_authenticator = yes | require_message_authenticator = yes | ||
| - | } | + | }</ |
| - | </ | + | - **Subscriber authorization.** it is required to configure an Access-Accept template that will be generated by FreeRADIUS. to do this, add configuration to the file ''/ |
| - | - **Subscriber authorization.** it is required to configure an Access-Accept template that will be generated by FreeRADIUS. to do this, add configuration to the file ''/ | + | |
| - | <code bash> | + | |
| - | DEFAULT Auth-Type := Accept | + | |
| User-name = " | User-name = " | ||
| VasExperts-L2-User = 1, | VasExperts-L2-User = 1, | ||
| Line 44: | Line 35: | ||
| VasExperts-DHCP-DNS = " | VasExperts-DHCP-DNS = " | ||
| VasExperts-DHCP-DNS = " | VasExperts-DHCP-DNS = " | ||
| - | </ | + | </ |
| - | This template is suitable for all authorization types (DHCP, IPoE static L2, PPPoE). if the Framed-IP-Address attribute is absent in the Access-Request, | + | - **fastPCRF settings.** configure the RADIUS server. when using a standby server, specify it after the line with the primary '' |
| - | - **fastPCRF settings.** configure the RADIUS server. when using a standby server, specify it after the line with the primary '' | + | - **Verification.** first, check the FreeRADIUS configuration using the command '' |
| - | <code bash> | + | systemctl enable radiusd</ |
| - | radius_server=secret@127.0.0.1%lo: | + | |
| - | </ | + | |
| - | - **Verification.** first, check the FreeRADIUS configuration using the command '' | + | |
| - | Then start RADIUS in debug mode using '' | + | |
| - | Check authorization from the PCRF side in the file ''/ | + | |
| - | <code bash> | + | |
| - | systemctl start radiusd | + | |
| - | systemctl enable radiusd | + | |
| - | </ | + | |
| ===== Access-Accept template variants for different authorization types (L3, DHCP, PPPoE) ===== | ===== Access-Accept template variants for different authorization types (L3, DHCP, PPPoE) ===== | ||