<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>freeradius Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/freeradius/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Mon, 18 Feb 2019 10:11:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>OpenVPN authentication with freeRADIUS</title>
		<link>https://www.osradar.com/openvpn-authentication-with-freeradius/</link>
					<comments>https://www.osradar.com/openvpn-authentication-with-freeradius/#comments</comments>
		
		<dc:creator><![CDATA[osradar_editor]]></dc:creator>
		<pubDate>Mon, 18 Feb 2019 08:10:08 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[freeradius]]></category>
		<category><![CDATA[openvpn]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=10865</guid>

					<description><![CDATA[<p>So this post we will be working on integrating them together making them a very useful infrastructure that facilitate user authentication from OpenVPN to freeRadius. The advantage of this design is that it allows central user account administration inside mysql database for any incoming OpenVPN user logins. Couple of my last documents followed up on [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/openvpn-authentication-with-freeradius/">OpenVPN authentication with freeRADIUS</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>So this post we will be working on integrating them together making them a very useful infrastructure that facilitate user authentication from OpenVPN to freeRadius. The advantage of this design is that it allows central user account administration inside mysql database for any incoming OpenVPN user logins.</p>
<p>Couple of my last documents followed up on how to setup</p>
<ul>
<li><a href="https://www.osradar.com/setup-vpn-access-provisioning-server-on-top-of-ubuntu-18-04/">OpenVPN server.</a></li>
<li><a href="https://www.osradar.com/freeradius-with-mysql-backend/">freeRADIUS server.</a></li>
</ul>
<h2><strong>Getting Started</strong></h2>
<p>Note that through out the document, I will stick to Ubuntu 18.04 OS version.</p>
<h4><strong>Step 01</strong> — Required Package Installation</h4>
<pre># apt-get update
# apt-get install libgcrypt11-dev build-essential</pre>
<h4><strong>Step 02</strong> — build radius plugin that helps to communicate from OpenVPN to freeRadius</h4>
<p>Downloading and building</p>
<pre># wget http://www.nongnu.org/radiusplugin/radiusplugin_v2.1a_beta1.tar.gz
# tar xvf radiusplugin_v2.1a_beta1.tar.gz</pre>
<pre># cd radiusplugin_v2.1a_beta1
# make</pre>
<p>Copy the built plugin to appropriate location</p>
<pre># mkdir /etc/openvpn/radius
# cp -r radiusplugin.so /etc/openvpn/radius</pre>
<h4><strong>Step 03</strong> — Configure built Plugin to work with freeRadius server</h4>
<pre># vim /etc/openvpn/radius/radius.cnf</pre>
<pre>NAS-Identifier=anyName

# The service type which is sent to the RADIUS server
Service-Type=5

# The framed protocol which is sent to the RADIUS server
Framed-Protocol=1

# The NAS port type which is sent to the RADIUS server
NAS-Port-Type=5

# The NAS IP address which is sent to the RADIUS server
NAS-IP-Address=172.17.0.56

# Path to the OpenVPN configfile. The plugin searches there for
# client-config-dir PATH   (searches for the path)
# status FILE     		   (searches for the file, version must be 1)
# client-cert-not-required (if the option is used or not)
# username-as-common-name  (if the option is used or not)

# Path to our OpenVPN configuration file. Each OpenVPN configuration file needs its own radiusplugin configuration file as well
OpenVPNConfig=/etc/openvpn/server.conf


# Support for topology option in OpenVPN 2.1
# If you don't specify anything, option "net30" (default in OpenVPN) is used. 
# You can only <span class="hljs-operator"><span class="hljs-keyword">use</span> one <span class="hljs-keyword">of</span> the options <span class="hljs-keyword">at</span> the same <span class="hljs-keyword">time</span>.
# <span class="hljs-keyword">If</span> you <span class="hljs-keyword">use</span> topology <span class="hljs-keyword">option</span> <span class="hljs-string">"subnet"</span>, fill <span class="hljs-keyword">in</span> the <span class="hljs-keyword">right</span> netmask, <span class="hljs-keyword">e</span>.<span class="hljs-keyword">g</span>. <span class="hljs-keyword">from</span> OpenVPN <span class="hljs-keyword">option</span> <span class="hljs-string">"--server NETWORK NETMASK"</span>  
subnet=<span class="hljs-number">255.255</span><span class="hljs-number">.255</span><span class="hljs-number">.0</span>
# <span class="hljs-keyword">If</span> you <span class="hljs-keyword">use</span> topology <span class="hljs-keyword">option</span> <span class="hljs-string">"p2p"</span>, fill <span class="hljs-keyword">in</span> the <span class="hljs-keyword">right</span> network, <span class="hljs-keyword">e</span>.<span class="hljs-keyword">g</span>. <span class="hljs-keyword">from</span> OpenVPN <span class="hljs-keyword">option</span> <span class="hljs-string">"--server NETWORK NETMASK"</span>
# p2p=<span class="hljs-number">10.8</span><span class="hljs-number">.0</span><span class="hljs-number">.1</span>


# Allows the <span class="hljs-keyword">plugin</span> <span class="hljs-keyword">to</span> overwrite the <span class="hljs-keyword">client</span> config <span class="hljs-keyword">in</span> <span class="hljs-keyword">client</span> config <span class="hljs-keyword">file</span> <span class="hljs-keyword">directory</span>,
# <span class="hljs-keyword">default</span> <span class="hljs-keyword">is</span> <span class="hljs-literal">true</span>
overwriteccfiles=<span class="hljs-literal">true</span>

# Allows the <span class="hljs-keyword">plugin</span> <span class="hljs-keyword">to</span> <span class="hljs-keyword">use</span> auth control files <span class="hljs-keyword">if</span> OpenVPN (&gt;= <span class="hljs-number">2.1</span> rc8) provides them.
# <span class="hljs-keyword">default</span> <span class="hljs-keyword">is</span> <span class="hljs-literal">false</span>
# useauthcontrolfile=<span class="hljs-literal">false</span>

# <span class="hljs-keyword">Only</span> the accouting functionality <span class="hljs-keyword">is</span> used, <span class="hljs-keyword">if</span> <span class="hljs-keyword">no</span> <span class="hljs-keyword">user</span> <span class="hljs-keyword">name</span> <span class="hljs-keyword">to</span> forwarded <span class="hljs-keyword">to</span> the <span class="hljs-keyword">plugin</span>, the common <span class="hljs-keyword">name</span> <span class="hljs-keyword">of</span> certificate <span class="hljs-keyword">is</span> used
# <span class="hljs-keyword">as</span> <span class="hljs-keyword">user</span> <span class="hljs-keyword">name</span> <span class="hljs-keyword">for</span> radius accounting.
# <span class="hljs-keyword">default</span> <span class="hljs-keyword">is</span> <span class="hljs-literal">false</span>
# accountingonly=<span class="hljs-literal">false</span>


# <span class="hljs-keyword">If</span> the accounting <span class="hljs-keyword">is</span> non essential, nonfatalaccounting can be <span class="hljs-keyword">set</span> <span class="hljs-keyword">to</span> <span class="hljs-literal">true</span>. 
# <span class="hljs-keyword">If</span> <span class="hljs-keyword">set</span> <span class="hljs-keyword">to</span> <span class="hljs-literal">true</span> all <span class="hljs-keyword">errors</span> during the accounting <span class="hljs-keyword">procedure</span> <span class="hljs-keyword">are</span> ignored, which can be
# - radius accounting can fail
# - FramedRouted (<span class="hljs-keyword">if</span> configured) maybe <span class="hljs-keyword">not</span> configured correctly
# - <span class="hljs-keyword">errors</span> during vendor specific <span class="hljs-keyword">attributes</span> script execution <span class="hljs-keyword">are</span> ignored
# But <span class="hljs-keyword">if</span> <span class="hljs-keyword">set</span> <span class="hljs-keyword">to</span> <span class="hljs-literal">true</span> the <span class="hljs-keyword">performance</span> <span class="hljs-keyword">is</span> increased because OpenVPN does <span class="hljs-keyword">not</span> <span class="hljs-keyword">block</span> during the accounting <span class="hljs-keyword">procedure</span>.
# <span class="hljs-keyword">default</span> <span class="hljs-keyword">is</span> <span class="hljs-literal">false</span>
nonfatalaccounting=<span class="hljs-literal">false</span>

# <span class="hljs-keyword">Path</span> <span class="hljs-keyword">to</span> a script <span class="hljs-keyword">for</span> vendor specific <span class="hljs-keyword">attributes</span>.
# Leave it <span class="hljs-keyword">out</span> <span class="hljs-keyword">if</span> you don<span class="hljs-string">'t use an own script.
# vsascript=/root/workspace/radiusplugin_v2.0.5_beta/vsascript.pl

# Path to the pipe for communication with the vsascript.
# Leave it out if you don'</span><span class="hljs-keyword">t</span> <span class="hljs-keyword">use</span> an own script.
# vsanamedpipe=/tmp/vsapipe

# A radius <span class="hljs-keyword">server</span> definition, there could be more <span class="hljs-keyword">than</span> one.
# The <span class="hljs-keyword">priority</span> <span class="hljs-keyword">of</span> the <span class="hljs-keyword">server</span> depends <span class="hljs-keyword">on</span> the <span class="hljs-keyword">order</span> <span class="hljs-keyword">in</span> this <span class="hljs-keyword">file</span>. The <span class="hljs-keyword">first</span> one has the highest <span class="hljs-keyword">priority</span>.
<span class="hljs-keyword">server</span>
{
	# The UDP port <span class="hljs-keyword">for</span> radius accounting.
	acctport=<span class="hljs-number">1813</span>
	# The UDP port <span class="hljs-keyword">for</span> radius <span class="hljs-keyword">authentication</span>.
	authport=<span class="hljs-number">1812</span>
	# The <span class="hljs-keyword">name</span> <span class="hljs-keyword">or</span> ip address <span class="hljs-keyword">of</span> the radius <span class="hljs-keyword">server</span>.
	<span class="hljs-keyword">name</span>=172.17.0.55
	# How many times should the <span class="hljs-keyword">plugin</span> send the <span class="hljs-keyword">if</span> there <span class="hljs-keyword">is</span> <span class="hljs-keyword">no</span> response?
	retry=<span class="hljs-number">1</span>
	# How <span class="hljs-keyword">long</span> should the <span class="hljs-keyword">plugin</span> <span class="hljs-keyword">wait</span> <span class="hljs-keyword">for</span> a response?
	<span class="hljs-keyword">wait</span>=<span class="hljs-number">1</span>
	# The <span class="hljs-keyword">shared</span> secret.
	sharedsecret=mysecret
}</span></pre>
<p>&nbsp;</p>
<h4><strong>Step 04</strong> — Template OpenVPN server configuration file</h4>
<pre># vim /etc/openvpn/server.conf</pre>
<pre>port 443 
proto tcp 
dev tun 
server 10.11.0.0 255.255.255.0 
ca /etc/openvpn/easy-rsa/keys/ca.crt 
cert /etc/openvpn/easy-rsa/keys/server.crt 
key /etc/openvpn/easy-rsa/keys/server.key 
dh /etc/openvpn/easy-rsa/keys/dh2048.pem
plugin /etc/openvpn/radius/radiusplugin.so /etc/openvpn/radius/radius.cnf ifconfig-pool-persist ipp.txt persist-key 
persist-tun 
keepalive 10 60 
reneg-sec 0 
comp-lzo 
tun-mtu 1468 
tun-mtu-extra 32 
mssfix 1400 
push "persist-key" 
push "persist-tun" 
push "redirect-gateway def1" 
push "dhcp-option DNS 8.8.8.8" 
push "dhcp-option DNS 8.8.4.4" 
status /etc/openvpn/443.log 
verb 3
client-cert-not-required</pre>
<p>&nbsp;</p>
<h4><strong>Step 05</strong> — Service start up</h4>
<pre># systemctl start openvpn@server</pre>
<h2><strong>Client Work-Station End</strong></h2>
<h4><strong>Step 06</strong> — Required Package Installation</h4>
<pre># apt-get update &amp;&amp; apt-get install -y network-manager-openvpn</pre>
<h4><strong>Step 07</strong> — Launch `nm-connection-editor` &amp; create new VPN profile</h4>
<pre># nm-connection-editor</pre>
<p>Next, Click (+) sign &amp; Select &#8220;OpenVPN&#8221; from the drop-down menu</p>
<p><img loading="lazy" class="alignnone size-full wp-image-10917" src="https://www.osradar.com/wp-content/uploads/2019/02/vpnpassword.png" alt="" width="451" height="523" srcset="https://www.osradar.com/wp-content/uploads/2019/02/vpnpassword.png 451w, https://www.osradar.com/wp-content/uploads/2019/02/vpnpassword-259x300.png 259w, https://www.osradar.com/wp-content/uploads/2019/02/vpnpassword-362x420.png 362w" sizes="(max-width: 451px) 100vw, 451px" /><br />
Check my previous <a href="https://www.osradar.com/setup-vpn-access-provisioning-server-on-top-of-ubuntu-18-04/">post</a> on getting required certificate. Also, once the new VPN profile is saved, start the launch by clicking the configured Profile name. Note that prior to VPN establishment, your credentials are being passed to OpenVPN server which in turn redirect them to freeRadius. However, actual process of credential verification is being performed at mysql database where we setup user details.</p>
<h4><em><strong>&#8220;I hope this has been informative&#8221;</strong></em></h4>
<p>The post <a rel="nofollow" href="https://www.osradar.com/openvpn-authentication-with-freeradius/">OpenVPN authentication with freeRADIUS</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/openvpn-authentication-with-freeradius/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>FreeRadius with mysql Backend</title>
		<link>https://www.osradar.com/freeradius-with-mysql-backend/</link>
					<comments>https://www.osradar.com/freeradius-with-mysql-backend/#respond</comments>
		
		<dc:creator><![CDATA[osradar_editor]]></dc:creator>
		<pubDate>Sat, 16 Feb 2019 23:35:38 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[freeradius]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=10816</guid>

					<description><![CDATA[<p>What is Freeradius: FreeRADIUS is a yet another service that we can setup on Linux and the protocol by which &#8211; the RADIUS &#8211; we can take advantage of providing functionalities of authentication, authorization and accounting. It has been developing very long time back and yet its very powerful and modern enough to provide authentication [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/freeradius-with-mysql-backend/">FreeRadius with mysql Backend</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4><strong>What is Freeradius:</strong></h4>
<p>FreeRADIUS is a yet another service that we can setup on Linux and the protocol by which &#8211; the RADIUS &#8211; we can take advantage of providing functionalities of authentication, authorization and accounting. It has been developing very long time back and yet its very powerful and modern enough to provide authentication facility to systems &amp; applications, specially in networking.</p>
<p>In this article we focus on its authentication ability and even beyond taking &#8220;mysql&#8221; database as the source of database to retrieve authentication credentials. However, there are other sources you could integrated as well, such as openLDAP, simple flat file and etc.</p>
<p><strong>Now lets install FreeRadius with mysql Backend</strong></p>
<h2><strong>Getting Started.</strong></h2>
<p>Note that through out the document, I will stick to Ubuntu 18.04 OS version.</p>
<h4><strong>Step 01</strong> — Required Package Installation</h4>
<pre class="lang:sh decode:true"># apt-get update
# apt-get install -y freeradius freeradius-mysql freeradius-utils php-common php-gd php-curl php-mysql mysql-server mysql-client</pre>
<h4><strong>Step 02</strong> — Setting up password for mysql own ROOT user</h4>
<pre class="lang:sh decode:true "># mysql_secure_installation</pre>
<pre class="lang:sh decode:true ">Securing the MySQL server deployment.

Connecting to MySQL using a blank password.

VALIDATE PASSWORD PLUGIN can be used to test passwords
and improve security. It checks the strength of password
and allows the users to set only those passwords which are
secure enough. Would you like to setup VALIDATE PASSWORD plugin?

Press y|Y for Yes, any other key for No: y

There are three levels of password validation policy:

LOW    Length &gt;= 8
MEDIUM Length &gt;= 8, numeric, mixed case, and special characters
STRONG Length &gt;= 8, numeric, mixed case, special characters and dictionary                  file

Please enter 0 = LOW, 1 = MEDIUM and 2 = STRONG: 0
Please set the password for root here.

New password: 

Re-enter new password: 

Estimated strength of the password: 50 
Do you wish to continue with the password provided?(Press y|Y for Yes, any other key for No) : y
By default, a MySQL installation has an anonymous user,
allowing anyone to log into MySQL without having to have
a user account created for them. This is intended only for
testing, and to make the installation go a bit smoother.
You should remove them before moving into a production
environment.

Remove anonymous users? (Press y|Y for Yes, any other key for No) : y
Success.


Normally, root should only be allowed to connect from
'localhost'. This ensures that someone cannot guess at
the root password from the network.

Disallow root login remotely? (Press y|Y for Yes, any other key for No) : y
Success.

By default, MySQL comes with a database named 'test' that
anyone can access. This is also intended only for testing,
and should be removed before moving into a production
environment.


Remove test database and access to it? (Press y|Y for Yes, any other key for No) : y
 - Dropping test database...
Success.

 - Removing privileges on test database...
Success.

Reloading the privilege tables will ensure that all changes
made so far will take effect immediately.

Reload privilege tables now? (Press y|Y for Yes, any other key for No) : y
Success.

All done! 
</pre>
<h4><strong>Step 03</strong> — Create &#8216;radius&#8217; database and import required Schema which already available.</h4>
<pre class="lang:sh decode:true"># mysql -uroot -p
</pre>
<pre class="lang:sh decode:true">mysql&gt; uninstall plugin validate_password;
mysql&gt; ALTER USER 'root'@'localhost' IDENTIFIED WITH mysql_native_password BY 'password';
mysql&gt; CREATE DATABASE radius;
mysql&gt; exit</pre>
<pre class="lang:sh decode:true "># cd /etc/freeradius/3.0/mods-config/sql/main/mysql/

# mysql -uroot -pYourMysqlPass radius &lt; schema.sql
# mysql -uroot -pYourMysqlpass radius &lt; setup.sql</pre>
<p>&nbsp;</p>
<h4><strong>Step 04</strong> — Enable &#8216;sql&#8217; module to be used with</h4>
<pre class="lang:sh decode:true "># cd /etc/freeradius/3.0/mods-enabled
# ln -s ../mods-available/sql sql</pre>
<h4><strong>Step 05</strong> — Instruct freeRadius to use SQL as the backend store, rather local File</h4>
<p>To achieve this, for all the below sections, remove the “file” directive and add the “sql” instead</p>
<pre class="lang:sh decode:true crayon-selected">authorize {
...
}
accounting {
...
}
post-auth {
...
}
session{
...
}</pre>
<p>&nbsp;</p>
<h4><strong>Step 06</strong> — Reflect the correct details in Radius SQL module’s config</h4>
<pre># vim <span class="crayon-o">/</span><span class="crayon-v">etc</span><span class="crayon-o">/</span><span class="crayon-v">freeradius</span><span class="crayon-o">/</span><span class="crayon-cn">3.0</span><span class="crayon-o">/</span><span class="crayon-v">mods</span><span class="crayon-o">-</span><span class="crayon-e">available/sql</span></pre>
<pre>driver = "rlm_sql_mysql"
 
dialect = "mysql"
 
 server = "localhost"
 port = 3306
 login = "root"
 password = "password-which-we-setup-in-step2"
 radius_db = "radius"
read_clients = yes</pre>
<h4><strong>Step 07</strong> — Running freeRADIUS in foreground to check the status..</h4>
<pre># freeradius -X</pre>
<pre>Listening on auth address 127.0.0.1 port 18120 bound to server inner-tunnel
Listening on auth address * port 1812 bound to server default
Listening on acct address * port 1813 bound to server default
Listening on auth address :: port 1812 bound to server default
Listening on acct address :: port 1813 bound to server default
Listening on proxy address * port 59791
Listening on proxy address :: port 36140
Ready to process requests</pre>
<p>The output above is a good indication of a working configuration..</p>
<h4><strong>Step 08</strong> — For a testing purpose, add basic authentication details, such as username, password, NAS ip address, etc..</h4>
<pre># mysql -uroot -p</pre>
<pre>mysql&gt; INSERT INTO nas VALUES (NULL , '0.0.0.0/0', 'myNAS', 'other', NULL , 'mysecret', NULL , NULL , 'RADIUS Client');
mysql&gt; INSERT INTO radcheck (username, attribute, op, value) VALUES ('testuser', 'Cleartext-Password', ':=', 'testpassword');
mysql&gt; INSERT INTO radusergroup (username, groupname, priority) VALUES ('testuser', 'testgroup', '1');
mysql&gt; INSERT INTO radgroupreply (groupname, attribute, op, value) VALUES ('testgroup', 'Service-Type', ':=', 'Framed-User'), ('testgroup', 'Framed-Protocol', ':=', 'PPP'), ('testgroup', 'Framed-Compression', ':=', 'Van-Jacobsen-TCP-IP');</pre>
<h4>Lets check updated details by going through each mysql tables</h4>
<pre>mysql&gt; select * from nas;
+----+-----------+-----------+-------+-------+----------+--------+-----------+---------------+
| id | nasname   | shortname | type  | ports | secret   | server | community | description   |
+----+-----------+-----------+-------+-------+----------+--------+-----------+---------------+
|  1 | 0.0.0.0/0 | myNAS     | other |  NULL | mysecret | NULL   | NULL      | RADIUS Client |
+----+-----------+-----------+-------+-------+----------+--------+-----------+---------------+</pre>
<pre>mysql&gt; select * from radcheck;
+----+----------+--------------------+----+--------------+
| id | username | attribute          | op | value        |
+----+----------+--------------------+----+--------------+
|  1 | testuser | Cleartext-Password | := | testpassword |
+----+----------+---------------+----+-------------------+</pre>
<pre>mysql&gt; select * from radusergroup;
+----------+-----------+----------+
| username | groupname | priority |
+----------+-----------+----------+
| testuser | testgroup |        1 |
+----------+-----------+----------+</pre>
<pre>mysql&gt; select * from radgroupreply;
+----+-----------+--------------------+----+---------------------+
| id | groupname | attribute          | op | value               |
+----+-----------+--------------------+----+---------------------+
|  1 | testgroup | Service-Type       | := | Framed-User         |
|  2 | testgroup | Framed-Protocol    | := | PPP                 |
|  3 | testgroup | Framed-Compression | := | Van-Jacobsen-TCP-IP |
+----+-----------+--------------------+----+---------------------+</pre>
<h4><strong>Step 09</strong> — Ok. Finally lets verify the configured user using a &#8220;radclient&#8221; command</h4>
<pre># echo "User-Name=testuser,User-Password=testpassword" | radclient 127.0.0.1:1812 auth mysecret</pre>
<pre>Sent Access-Request Id 65 from 0.0.0.0:43879 to 172.17.0.55:1812 length 48
Received Access-Accept Id 65 from 172.17.0.55:1812 to 0.0.0.0:0 length 38</pre>
<p>Congradulations.! you have now working RADIUS service.</p>
<p>In order to run the service in background</p>
<pre># systemctl start freeradius
# systemctl enable freeradius</pre>
<h4><em><strong>&#8220;I hope this has been informative&#8221;</strong></em></h4>
<p>The post <a rel="nofollow" href="https://www.osradar.com/freeradius-with-mysql-backend/">FreeRadius with mysql Backend</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/freeradius-with-mysql-backend/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
