Jump to:navigation, search
Wiki





























De.png
En.png
Fr.png









Radius authentication on the Securepoint UTM

New article with version: 12.7.0

notempty
This article refers to a Resellerpreview

Authentication Radius Authentication



General configuration

Ip or host name: 192.168.1.1 IP or host name to be used for Radius authentication Radius authentication UTMuser@firewall.name.fqdnAuthentication UTM v12.7.0 Radius Uebersicht-en.pngRadius configuration under Authentication Radius Authentication
Secret key: ●●●●●●●● Shared key to be used for Radius authentication


Radius with 2FA

With 2-factor authentication, it may be necessary to increase the timeout.
To adjust this, the Extc variable GLOB_RADIUS_TIMEOUT must be adjusted. This is possible via the Admin Interface or the CLI.


Admin Interface

Edit Extc-Variable UTMuser@firewall.name.fqdnExtras Factory settings UTM v12.6 Radius Variable anpassen-en.png

In the admin interface, the advanced settings must first be displayed with Ctrl + Alt + A.
The variable GLOB_RADIUS_TIMEOUT can then be adjusted under Extras Advanced settings  Area Extc-Variables. To ensure smooth use, it is recommended to set this to 60(seconds).



CLI

The following command can be used to adjust the variable GLOB_RADIUS_TIMEOUT using the CLI:
extc global set variable "GLOB_RADIUS_TIMEOUT" value 60


As a root user, the configured values for Radius authentication can be easily displayed:
notempty
It is strongly recommended to use a Support User, as this always has an expiration date.

spcli extc global get | grep RADIUS
A successful output could look like this:
GLOB_RADIUS_SERVER |192.168.1.1 GLOB_RADIUS_SERVER_KEY |insecure GLOB_RADIUS_TIMEOUT |60