FreeRADIUS hardware requirements A common question for people installing the server is “what are the hardware requirements for FreeRADIUS?” The answer is both simpler, and more complex than you would think. The performance of a RADIU... Network Security Best Practices
RADIUS for Universities University environments present challenges for RADIUS system design. Every hour, on the hour, thousands of students close their laptops, move to a different location, and open them again. This unique ... Network Security Best Practices
What are TLS session tickets? In many environments, the same group of users will authenticate to the Wi-Finetwork multiple times a day. TLS session tickets help to streamline this process by doing a full authentication only once a... Network Security Best Practices
Scaling your RADIUS ecosystem Not all RADIUS systems are the same, and the system architecture can vary wildly. For example, a network design which works well for 10,000 users will likely not work well for 10,000,000 users. It can... Network Security Best Practices
Designing your network for fail-over An essential part of good network design is to plan for failures. In a RADIUS ecosystem, one major requirement is that clients can always connect to a RADIUS server, and that the system can continue t... Network Security Best Practices
Enterprise ransomware prevention starts with network authentication When properly implemented, network authentication can serve as a powerful barrier against ransomware attacks, stopping bad actors before they gain the initial foothold they need. In 2024, the number o... Network Security Best Practices Security Threats and Vulnerabilities
The problem with RADIUS in the cloud The promise of cloud-hosted infrastructure sounds tempting. Someone else manages yourdatabase, you pay only for what you need, you may have better data security, and the database can scale up with you... Network Security Best Practices
Email addresses are primary user identifiers? There is a lot of advice out there that email addresses are not identifiers . Even Internet2 has a document explaining why email is not an appropriate user identifier . What does this mean for RADIUS,... Network Security Best Practices
Database design principles for RADIUS systems Database design is often overlooked as a critical element of a RADIUS ecosystem. In practice, when we work with our clients, we usually spend the bulk of our time optimizing the database architecture.... Network Security Best Practices
Preventing fraudulent logins with a session database In today's enterprise computer networks, credential sharing is a big problem for ISPs and companies with multiple locations. When an ISP runs RADIUS servers across different sites , new attack vectors... Network Security Best Practices
Disaster-proof your network critical infrastructure If you live in an earthquake zone, it’s important to engineer buildings to survive an earthquake. You don’t know when an earthquake will happen, or where exactly, or how big it’s going to be, but you ... Network Security Best Practices
How to set up a wireless RADIUS server for secure Wi-Fi authentication When setting up a Wi-Fi network at home, you typically set up an SSID and password, accept the defaults for any other options, and be done with it. (In some cases, these are done for you by your servi... Network Security Protocols