Adding FreeRADIUS integration to VMware Edge Network Intelligence allows you to see the specific RADIUS authentication messages related to a devices network authentication. Without this integration RADIUS messages are not decoded and can only report the success or failure of an authentication request. This integration is accomplished by adding the crawler as a syslog logging target.
Minimum Supported Radius: 3.0.15
You can run radiusd -v to check the version of your freeradius.
Step 1:
Edit the Radius configuration file "radiusd.conf" as shown:
#logdir replace "/var/log/freeradius" by "syslog" ${localstatedir}/log/radius Under log settings: #destination - replace "files" by "syslog" destination = syslog #default is daemonsys log_facility = daemon stripped_names = no #Log authentication requests to the log file. auth = yes #Audit password if it's rejected. auth_badpass = no #Audit password if it's correct. auth_goodpass = no Add the format for msg_goodpass and msg_badpass as follows: For Aruba: msg_goodpass = "CallingStationId=%{Calling-Station-Id}, CalledStationId=%{Called-Station-Id}, ESSID=%{Essid-Name}, APName=%{AP-Name}, Subject=%{TLS-Client-Cert-Subject}" msg_badpass = "CallingStationId=%{Calling-Station-Id}, CalledStationId=%{Called-Station-Id}, ESSID=%{Essid-Name}, APName=%{AP-Name}, Subject=%{TLS-Client-Cert-Subject}" For Cisco: msg_goodpass = "CallingStationId=%{Calling-Station-Id}, CalledStationId=%{Called-Station-Id}" msg_badpass = "CallingStationId=%{Calling-Station-Id}, CalledStationId=%{Called-Station-Id}" Note - We support the following formats for CalledStationId - MAC address of the Access Point AP Name with ESSID separated by a colon, AP-name:ESSID
Step 2: Restart FreeRADIUS
If you're running Debian Linux or Ubuntu Linux: /etc/init.d/freeradius restart If you're running Red Hat Enterprise Linux service: radiusd restart If you're running FreeBSD operating system: /etc/rc.d/radiusd restart
Step 3 Edit /etc/rsyslog.conf file and add the following
#Enable UDP module $ModLoad imudp $UDPServerRun 514 #FreeRADIUS log daemon.* @<crawler_ip>
Step 4 Restart Rsyslog
If you're running Debian Linux or Ubuntu Linux: /etc/init.d/rsyslog restart If you're running Red Hat Enterprise Linux: service rsyslog restart If you're running FreeBSD operating system: /etc/rc.d/syslogd restart