Logo

RADIUS Audit Logs

Menu path: Auditing.> RADIUS Audit Logs.

RADIUS messages use AVPs (attribute-value-pairs) to describe requests and responses. It is a mature set of specifications with a large number of AVPs. In most cases A3 displays a subset of the AVPs with authentication and A3-specific interpretation. A useful description of the most common RADIUS AVPs can be found at ftp://ftp.gnu.org/old-gnu/Manuals/radius/html_chapter/radius_16.html and the complete details may be found at https://freeradius.org/rfc/attributes.html.

The view offers selectable columns (with the symbol); the initial default columns are:

Audit log entries can be searched with a Simple Search or Advanced Search, based on the position of the slider. Simple searches consist of a search for MAC address or user name, whereas advanced searches use multiple search conditions.

Clicking on any entry displays information about that log entry, as discussed in RADIUS Log Entry.

RADIUS Log Entry

The RADIUS log entry columns that may be selected with the icon are shown below. Selecting an individual log entry will display the data for that entry in three tabs:

Client Information

Label Usage
MAC Address The MAC address of the client.
Auth Status The authentication status of the client. One of: Accept, Reject, Disconnect ACK, Disconnect NAK, or Reject.
Auth Type The authentication type used for the client. One of eap, no eap, or accept (used for MAC authentication).
Auto-Registration Indicates whether the client was automatically registered. See Connection Profiles.
Calling Station Identifier The MAC address of the client requesting access.
Computer Name The name of the computer requesting access, if applicable.
EAP Type The type of EAP used in the authentication. The A3-supported types are defined in RADIUS Configuration
IP Address The IP address of the client, if available in the RADIUS messages
Is a Phone Indicates whether the client is a VoIP phone.
Client Status The registration status of the client. One of: reg (registered), unreg (unregistered), or pending.
Domain The domain used for authentication.
Profile The connection profile used for the authentication.
Realm The realm used for the authentication.
Reason The description for an authentication failure.
Role The role for the client.
Source The authentication source used for the authentication.
Request Time The time of the RADIUS request.
User Name The full user name used for authentication.
Unique Identifier The unique RADIUS ID for the message.
Created At The date and time at which the log entry was made.

Device Information

Label Usage
Device identifier The IP address of the device used in authentication.
Device MAC Address The MAC address for the device used in authentication.
Device IP Address The IP address of the device used in authentication.
Called Station Identifier The MAC address of the destination that the client tried to reach as well as the SSID for wireless.
Connection type The connection mechanism. The possible values are Wireless-802.11-EAP, Wireless-802.11-NoEAP, Ethernet-EAP, Ethernet-NoEAP, SNMP-Traps, Inline, or Ethernet-NoEAP.
Ifindex Interface index on the device.
NAS Identifier An identifier for the device.
NAS IP Address The IP address of the device
NAS Port Identifier The port number on the device, if applicable.
NAS Port Type The type of port used on the device.
RADIUS Source IP Address The IP address of the client that received the RADIUS request.
Wi-Fi Network SSID For a wireless connection, the SSID used to connect to the client.

RADIUS

Label Usage
Request Time The time of the RADIUS request.
RADIUS Request The request message.
RADIUS Reply The reply message.

Simple Search

The simple search choice offers a straightforward means of searching user entries:

Advanced Search

Click the slider to access the advanced searches page. Multiple or conditions are joined together with and conjunctions. Each element of an or set may be deleted with the symbol or reordered by selecting the item's symbol. Reordering may occur across or sets.

Several facilities exist for saving and using saved searches:

Each condition has three parts:

Copyright © 2020 Extreme Networks. All rights reserved. Published December 2020.