Now the server is running and ready to accept authentication requests from Wi-Fi users. If you’re opening a new terminal window, you’ll have to type ‘su’ first to run as root. Then type ‘/usr/sbin/radiusd -X’ again (or press the up arrow key) to start it. To stop the server, go to the terminal window and hit Ctrl + C. If you had FreeRADIUS running while you made the configuration changes you’ll have to restart the server for them to take effect. Restarting the Server to Load New Settings Then click the arrow to expand the Other Ports section. Click System > Administration > Security Level and Firewall. So in order for RADIUS traffic to reach FreeRADIUS, you must open up the ports it uses. Opening the FirewallĬentOS comes with a firewall enabled by default. Plus we’ll set up SQL so you can store your user and AP information in a database rather than text files. Then we’ll distribute the CA file to all the computers and configure them with the encryption and authentication settings. Now we’ll open the CentOS firewall and configure our access points (APs). Plus we created certificates for PEAP, configured the EAP settings, created user accounts, and inputted the AP details. We loaded our PC with CentOS 5.3 and installed FreeRADIUS version 2.1.6. In part one of this article, we installed FreeRADIUS to do 802.1 X/PEAP authentication, so we can run WPA or WPA2 enterprise encryption on our Wi-Fi network.
0 Comments
Leave a Reply. |