Logo

Eduroam

Menu path: Configuration > Policies and Access Control > Authentication Sources > Exclusive > Eduroam.

Eduroam (education roaming) is a global example of realm-based authentication. The technology behind eduroam is based on the IEEE 802.1X standard and a hierarchy of RADIUS proxy servers. Eduroam is a secure, worldwide roaming access service developed for the international research and higher education community. An eligible organization can provide students, researchers, staff and faculty with wireless access at participating institutions through the use of their home institution credentials.

Eduroam is a worldwide federation of RADIUS servers that use IEEE 802.1x as the vehicle. When a user connects with any participating wireless network, the home RADIUS server does the authentication, while the host institution does the authorization.

An eduroam use case is provided in the "A3 Installation and Usage Guide".

The fields in a eduroam authentication source definition are:

Field Name Usage Example
Name The name of the authentication source. Eduroam
Description Optional description of the source. Eduroam authentication
Server 1 Address The name or IP address of one of the Eduroam top level domain (TLD) servers. This is obtained through successful Eduroam site registration.  
Eduroam Server 1 port Port number to contact server 1 on. 1812
Server 2 Address The name or IP address of a different one of the Eduroam top level domain (TLD) servers. This is obtained through successful Eduroam site registration.  
Eduroam Server 2 port Port number to contact server 1 on. 1812
RADIUS Shared Secret The Eduroam RADIUS shared secret.  
Authentication Listening Port The A3 Eduroam RADIUS virtual server authentication listening port. 11812
Reject Realms Realms that are to be rejected for Eduroam authentication.  
Local Realms Realms that will authenticate locally.  
Monitor If enabled, A3 will ping the Eduroam servers to ensure connectivity and availability. slider on icon
Authentication Rules Indicates the actions to be performed when the authentication is satisfied. Authentication rules are covered in detail in Authentication Rules.  

Copyright © 2021 Extreme Networks. All rights reserved. Published April 2021.