Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Configuring RADIUS over TLS (RADSEC)

RADIUS over TLS is designed to provide secure communication of RADIUS requests using the Transport Secure Layer (TLS) protocol. RADIUS over TLS, also known as RADSEC, redirects regular RADIUS traffic to remote RADIUS servers connected over TLS. RADSEC allows RADIUS authentication, authorization, and accounting data to be passed safely across untrusted networks.

Configuring RADSEC over TLS Using an Existing Certificate

This section explains how to configure RADIUS over TLS (RADSEC) using an existing certificate.

Configure the RADSEC server

Use the following configuration example to add a RADIUS server named RADSEC.

Configure the Trusted CA Certificate

The trusted CA certificate is necessary to validate the incoming client certificate. Certificates are pasted in as a multi-line config. Create a certificate root named ca_root and paste the certificate file content into the command:

Note:

The trusted-ca-certificate is a list and may contain different CA roots used for different certificates. In that case, naming them all ca_root would not be suitable. In that case, choose a name that is meaningful to the user and CA, eg: globalsign_root

Configure a Client Certificate to be used for the RADIUS client

Repeat the previous certificate to create a client certificate named radsec

Configure the RADIUS server at the Authority level to use the configured client certificate

Associate the previously configured radsec client certificate to the radius server running on a specified node.

Note that the client certificate selected should match the appropriate IP/hostname of the node as seen from the RADIUS server.

validate and commit the changes.

Create a RADIUS User

Create a remotely authenticated RADIUS user. In this example, we create a user called test1

When the user logs into the node t327-dut1 via ssh, the authentication request is sent via RADSEC to the server 172.18.5.224 and the user is authenticated.

RADSEC Configuration - Generate Certificate

Use the following examples to generate a client certificate for use on the device.

RADSEC Configuration - Generate Certificate

Generate the Signing Request

Use the create certificate request client command to generate the signing request.

Configure the Trusted CA Certificate

The trusted CA certificate is necessary to validate the incoming client certificate. Certificates are pasted in, as a multi-line configuration. Create a root certificate named ca_root and paste the certificate file content into the command.

Import the Client Certificate

After the certificate is signed and returned, it is imported into the SSR for use by the client using the import certificate client command. It is validated against any trusted certificates entered using trusted-ca-certificate. See the following example that shows a valid self-signed certificate being imported.

Configure the Device to Accept the Client Certificate

Use this command to configure your device to accept the certificate.