RADIUS Server Policy

A RADIUS server policy is a unique authentication and authorization configuration for client connection requests, authenticating users, and returning the configuration information necessary to deliver service to the requesting client and user. The client is the entity with authentication information requiring validation. The controller or service platform local RADIUS server has a database of authentication information used to validate the client's authentication request.

The RADIUS Server dashboard displays the following read-only configuration information:
Setting Description
RADIUS Server Lists the administrator assigned policy name defined upon creation of the server policy
RADIUS User Pools Lists the user pools assigned to the server policy. These are the client users who an administrator has assigned to each listed group. The users must adhere to the network access requirements before receiving access to controller or service platform resources
Default Source Displays the RADIUS resource designated for user authentication requests. Options include local (resident controller or service platform RADIUS server resources) or LDAP (designated remote LDAP resource)
Default Fallback States whether a fallback is enabled providing a option to revert to local RADIUS resources if the designated external LDAP resource were to fail or become unavailable. Fallback options include true or false. The default option is false for local source
Authentication Type Lists the local EAP authentication scheme used with this policy. The following EAP authentication types are supported by the local RADIUS and remote LDAP servers:
  • All – Enables both TTLS and PEAP
  • PEAP and GTC - The EAP type is PEAP with default authentication using GTC
  • PEAP and MSCHAPv2 - The EAP type is PEAP with default authentication using MSCHAPv2
  • TLS - Uses TLS as the EAP type
  • TTLS and MD5 - The EAP type is TTLS with default authentication using MD5
  • TTLS and MSCHAPv2 - The EAP type is TTLS with default authentication using MSCHAPv2
  • TTLS and PAP - The EAP type is TTLS with default authentication using PAP
CRL Validation Specifies whether a Certificate Revocation List (CRL) check is made. Options include true for CRL validation and false for CRL is deactivation