Hello all,
we are pleased to announce a new Radiator module for Windows users.
The new AuthBy LSA module can authenticate PAP, CHAP, MSCHAP, MSCHAPV2,
PEAP, LEAP etc against Windows user passwords in Active Directory or NT Domain
Controllers. This means that you can authenticate secure Wireless
On 6/17/03 12:29 PM, Craig Gittens [EMAIL PROTECTED] wrote:
I am trying to implement a VPN solution using linux pppd and it is sending
the port type as Async. The problem is I don't want dialup customers able to
use this service as well. I was wondering if you could rewqrite NAS port
type
Saw the annoucement on the AuthBy LSA module and I wanted to make sure I
understood it's implications.
Does this module allow us to authenticate MSCHAP passwords against an
ActiveDirectory of NT domain controller?
This has been a big issue up to now and one reason why we've been
ignoring PEAP
Hi Robert -
Thanks for the excellent example.
Just for completeness (and the Perl way) you could also do this:
sub {
${$_[0]}-change_attr('NAS-Port-Type', 'VPN');
}
regards
Hugh
On Wednesday, Jun 18, 2003, at 22:55 Australia/Melbourne, Robert
Blayzor wrote:
On 6/17/03 12:29 PM,
Hello John,
On Thu, 19 Jun 2003 01:27 am, John McFadden wrote:
Saw the annoucement on the AuthBy LSA module and I wanted to make sure I
understood it's implications.
Does this module allow us to authenticate MSCHAP passwords against an
ActiveDirectory of NT domain controller?
Yes.
This
Hi All,
Has anyone compiled a list of wireless access points that do radius
authentication?
If so, would they like to share it??
If not, can anyone offer some advice as to those that do and work with
Radiator.
Thanks in advance,
Brian.
===
Archive at http://www.open.com.au/archives/radiator/
On Thu, 19 Jun 2003, Brian Morris wrote:
Hi All,
Has anyone compiled a list of wireless access points that do radius
authentication?
Cisco 350/352 series:
It works great in no auth, WEP only, MAC filtering and EAP auth. In MAC
filtering and EAP auth mode, it has radius
Title: Radiator Error Logging
Dear Sir,
Our radiator generates following messages:
INFO: AuthRADIUS: No reply after 0 retransmissions to 123.123.123.123:1813 for void (54)
Since our customer doesn't need to enter his username, remote access server sends out 'void' for default.
Can we
Hello Harrison -
The only way I can think of to do this is to write a NoReplyHook and have it log whatever message you require.
There are some example hooks in the file goodies/hooks.txt.
regards
Hugh
On Thursday, Jun 19, 2003, at 13:04 Australia/Melbourne, Harrison Ng wrote:
Dear Sir,