Skip to main content

RadSec

Last Updated: November 12, 2024

s
Written by shuochun su
Updated over 11 months ago

By default, RADIUS DOES NOT secure the transmission of user credentials and sensitive data between the client and server. This lack of encryption exposes the authentication process to potential eavesdropping attacks. Attackers can exploit this vulnerability through man-in-the-middle (MITM) attacks, intercepting traffic to steal user information. The risk amplifies when the RADIUS server is hosted remotely, increasing the imperative for securing these communications

RadSec: Securing RADIUS with TLS

RadSec stands for RADIUS over TLS, a robust method of encryption designed for the RADIUS protocol. This security mechanism enables RADIUS clients or Network Access Servers (NAS)—typically found in the form of access points (AP) or switches within networks—to conduct authentication, authorization, and accounting exchanges securely within a TLS-encrypted tunnel. By leveraging TLS, RadSec ensures that these critical network communications are protected from interception and tampering

An example of WPA-Enterprise (802.1x)

  1. EAP-TTLS/PEAP requires a certificate at the server end only, which is considered less secure

  2. EAP-TLS necessitates certificates for both the client and the RADIUS server, making it highly recommended due to its enhanced security

The security of the connection between the client and the RADIUS server relies solely on the EAP method used. There is no change to the end-client authentication process.

To enable a secure tunnel from the client to the RADIUS server, navigate to Configure > SSID List > Captive Portal > Advanced Settings and enable HTTPS Login to secure the client tunnel

Use case

Global roaming networks like OpenRoaming and EduRoam use RadSec to secure communications between RADIUS servers globally. By implementing RadSec on EnGenius access points (APs), we ensure comprehensive security for these networks.

EduRoam

EduRoam is a secure, worldwide roaming access service developed for the international research and education community. It allows students, researchers, faculty, and staff from participating institutions to securely access the internet at other member institutions using their home institution's credentials

Source: EduRoam.org

OpenRoaming

OpenRoaming is an initiative aimed at simplifying and enhancing Wi-Fi roaming capabilities across different networks and providers. Developed by the Wireless Broadband Alliance (WBA), OpenRoaming enables seamless and secure connectivity for users as they move between Wi-Fi networks, similar to how cellular roaming works

Source: WBA

Wireless Broadband Alliance (WBA) Membership and OpenRoaming

  • EnGenius has now become a member of the Wireless Broadband Alliance (WBA) as a "Technology Provider Vendor." For further information, please refer to the WBA's official website.

  • Access Points (APs) must support Hotspot 2.0 to connect to OpenRoaming. This capability is expected to be available around June.

RoamingIQ

OpenRoaming now supports a solution that enables a unique Pre-Shared Key (PSK) to roam across different WiFi Managed Service Providers (MSPs) or sites. Pls refer to RoamingIQ introduction & configuration guide

How to Configure

Uploading a RadSec Certificate from RADIUS Servers

To securely enhance your network's authentication, follow these steps to upload a RadSec certificate obtained from RADIUS servers

  1. Navigate to ORGANIZATION on the main menu

  2. Select Security > Certificates from the submenu

  3. Click on the Upload button to add your RadSec certificate

Ensure the certificate is in the correct format as specified by your RADIUS server documentation for a seamless upload process

To enable the RadSec function on your Access Points (APs) for enhanced security when using WPA2/3 Enterprise or Captive Portal access, follow these steps

For WPA2/3 Enterprise:

Navigate to CONFIGURE > AP > SSID > Wireless > WPA2/3 Enterprise > Custom RADIUS

To perform the test, you must have an account and password. The test includes a Test feature to check the RADIUS configuration's correctness. The Access Point (AP) will connect to the RADIUS server using the given IP address, port, and secret

For Captive Portal:

Navigate to CONFIGURE > AP > SSID > Captive Portal > Custom RADIUS

If Captive Portal > Custom Radius > Radius MAC-Auth is enabled, then an authorized MAC is required for the test

These settings activate RadSec, providing secure Radius communication

Upon enabling the RadSec feature, Access Points (APs) will automatically scan the organization's certificate repository to find and link suitable certificates with RADIUS servers

Did this answer your question?