Solved

Implementing Radius in Data Center?

Posted on 2008-10-08
3
584 Views
Last Modified: 2010-04-21
Hi,

I want to implement Radius server for centralized authorization of all my network Infrastructure. I have mostly juniper gear but I would really appreciate if anyone can give me his case of Implementing Radius server. Precisely my questions are;

1- What is the benefit of centralized authorization, authentication and accounting?
2- What is the best product for Radius server (MS-based or Open-Source)?
3- How is Radius Implemented in your network?

Thanks in advance.
0
Comment
Question by:Kamran Arshad
  • 2
3 Comments
 
LVL 32

Accepted Solution

by:
harbor235 earned 500 total points
ID: 22670837


The benefits are centralized management, you do not need to add accounts, authorization, and accounting for each network device. You now manage all devices from a central server, this definitely lessens the administrative load and provides other benifts such as advanced network access control as well.

Juniper bought steel-belted radius a leader in radius servers;
http://www.juniper.net/products_and_services/aaa_and_802_1x/steel_belted_radius/

however, some of the other open source radius servers are fine as well.
http://freeradius.org/

Radius is implemented in my network to manage authentication of network admins, VPN users, command authorization for priviledge level users, and for tracking commands entered by users, it is also part of the
DOT1X implmentation. Must have from my view

harbor235 ;}
0
 
LVL 32

Author Comment

by:Kamran Arshad
ID: 22793038
Thanks for the update. Any help with configuration of freeradius?
0
 
LVL 32

Author Closing Comment

by:Kamran Arshad
ID: 31504325
thanks
0

Featured Post

DevOps Toolchain Recommendations

Read this Gartner Research Note and discover how your IT organization can automate and optimize DevOps processes using a toolchain architecture.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Transparency shows that a company is the kind of business that it wants people to think it is.
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question