Manual Chapter :
Performing Radius Authentication and Accounting
Applies To:
Show VersionsBIG-IP LTM
- 17.1.2, 17.1.1, 17.1.0, 17.0.0, 16.1.5, 16.1.4, 16.1.3, 16.1.2, 16.1.1
BIG-IP PEM
- 17.1.2, 17.1.1, 17.1.0, 17.0.0, 16.1.5, 16.1.4, 16.1.3, 16.1.2, 16.1.1, 16.1.0
Performing Radius Authentication and Accounting
Overview: Performing RADIUS authentication and accounting
In Policy Enforcement Manager™, the RADIUS client has the ability to
initiate RADIUS authentication for a subscriber. You can configure the virtual servers that are
used to request for authentication of DHCPv4 and DHCPv6 discovered subscribers. The subscriber
authentication may be triggered by subscriber discovery based on other means, such as obtaining
RADIUS accounting messages. The ability to generate accounting messages helps to track subscriber
usage as a RADIUS client.
RADIUS authentication is initiated when PEM receives messages, showing that the subscribers are
attempting to connect to the network. The two factors of initiation are:
- The start of DHCP exchange showing that the subscriber attempts to obtain an IP address (fixed line deployments).
- When the RADIUS accounting start message indicates that the subscriber has passed through the initial phase of access but still needs authentication.
Task summary
Creating a RADIUS AAA profile for policy enforcement
Create a RADIUS profile, which contains the shared secret of the RADIUS server, the
transaction timeout, password, and retransmission timeout details, for configuring
the RADIUS authentication profile settings.
- On the Main tab, click.
- ClickCreate.The New Radius Profile screen opens.
- In theNamefield, type a unique name for the profile.
- In theDescriptionfield, type a descriptive text that identifies the profile.
- From theParent Profilelist, select the defaultradiusaaaprofile.
- Select theCustomcheck box.
- For theSecretsetting, select theCustomcheck box to enable this option. Type the shared secret of the RADIUS server used for authentication.
- For thePasswordsetting, select theCustomcheck box to enable this option. Type the password of the RADIUS AAA profile for RADIUS server authentication.
- For theTransaction Timeoutsetting, select theCustomcheck box to enable this option. Type the number, in seconds, of the time taken for server to respond.
- For theRetransmission Timeoutsetting, select theCustomcheck box to enable this option. Type the number of seconds to wait before resending authentication or accounting messages to the RADIUS server.
The RADIUS profile that you created can be chosen from the RADIUS profile in
, depending on the virtual server IP address type.Creating a listener for RADIUS AAA Virtual
You can create new RADIUS AAA virtuals to authenticate or send accounting information about the subscriber to the RADIUS server.
- On the Main tab, click.The Control Plane Listeners screen opens.
- From the AAA Virtuals area, clickAdd.The New RADIUS AAA Virtual screen opens.
- In theNamefield, type a unique name for the RADIUS AAA virtual.
- In theDescriptionfield, type a description of the listener.
- From theVLAN and Tunnel Trafficlist, selectEnabled on. Then, for theVLANs and Tunnelssetting, move the VLAN or VLANs on which you want to allow the virtual servers to share traffic from theAvailablelist to theSelectedlist.
- From theModelist, select theAuthenticationorAccountingto specify the type of RADIUS virtual you are creating.
- For theSecretsetting, select theCustomcheck box to enable this option. Type the shared secret of the RADIUS server used for authentication or accounting.
- For thePasswordsetting, select theCustomcheck box to enable this option. Type the password of the RADIUS AAA profile for RADIUS server authentication.
- For thePool Member Configurationsetting, add the RADIUS AAA virtual servers that are to be members of the pool. Type theMember IP AddressandPortnumber, then clickAdd.You can use port 1812 for RADIUS authentication and port 1813 for RADIUS accounting.
- ClickFinished.The Policy Enforcement Manager creates a RADIUS AAA virtual server, and displays in the authentication virtuals list.
When you create a RADIUS AAA virtual for a subscriber, the Policy Enforcement Manager initiates RADIUS authentication or sends accounting information, for that
subscriber. A RADIUS AAA profile is also created and is assigned to the virtual server automatically.
Creating policy rule for RADIUS accounting reports
Policy Enforcement Manager (PEM) allows
you to specify a RADIUS internal virtual server as a reporting destination. The
reporting thresholds are optional if RADIUS destination is selected.
Only one
reporting destination can be specified in a given rule.
- On the Main tab, click.The Policies screen opens.
- Click the name of the enforcement policy you want to add rules to.The properties screen for the policy opens.
- In the Policy Rules area, clickAdd.The New Rule screen opens.
- In theNamefield, type a name for the rule.
- In thePrecedencefield, type an integer that indicates the precedence for the rule in relation to the other rules. Number 1 has the highest precedence. Rules with higher precedence are evaluated before other rules with lower precedence.All rules in a policy are run concurrently. Precedence takes effect when there are conflicting rules. The conflict occurs when the traffic matches two rules and the policy actions from these rules differ. For example, if you have rule 1 with precedence 10 andGate Statusdisabled for a search engine, and you have rule 2 with precedence 11 andGate Statusenabled, then rule 1 is processed first because it has higher precedence. Rules conflict if they have identical or overlapping classification criteria (for the traffic that matches more than one rule). In some cases, different policy actions are not conflicting, and hence, applied in parallel.
- Use the Classification, URL, Flow, and Custom Criteria tabs to identify the traffic that you want to be affected by this rule.
- From theUsage Reportinglist, selectEnabled.
- From theReport Granularitylist, select from one the the granular reporting options:OptionDescriptionSessionSelectSessionto log details about subscribers and application sessions.FlowSelectFlow, for more granular reporting of every TCP connection.TransactionselectTransaction, for more granular reporting of every HTTP transaction.
- If you selectSessionorFlow, in theVolume Thresholdsetting, specify in octets, the threshold to send RADIUS reporting records. You can send reporting data from uplink traffic, to downlink traffic and the total traffic volume before logging the information.
- If you selectTransaction, in theAdditional HTTP Informationsetting, specify in bytes, the HTTPHostname, the HTTPUser Agentand the HTTPURI.
- In theDestinationsetting, Select theRADIUS Accountingoption from the destination.
- From theRADIUS AAA Virtuallist, select the RADIUS AAA virtual that you created earlier.
- ClickFinished.
You have created a RADIUS internal virtual server as a reporting destination.