Central Hardware Administration
Steel-Belted Radius works with the remote and wireless access equipment and methods you already have in place. Whether you have set up dial-up, Internet, VPN, outsourced, WLAN, or any other form of access, Steel-Belted Radius can manage the connections of all your remote and wireless users. This includes the following:
- Dial-up users who connect via remote access servers from 3Com, Cisco, Lucent, Nortel, and others.
- Internet users who connect via firewalls from Check Point, Cisco, and others.
- Tunnel/VPN users who connect via routers from 3Com, Microsoft, Nortel, Red Creek, V-One, and others.
- Remote users who connect via outsourced remote access services from ISPs and other service providers.
- Wireless LAN users who connect via access points from Cisco, 3Com, Avaya, Ericsson, Nokia and others.
- Users of any other device that supports the RADIUS protocols.
Moreover, Steel-Belted Radius supports a heterogeneous network, interfacing with remote and wireless access equipment from different vendors simultaneously. Steel-Belted Radius automatically communicates with each device in the language it understands, based on customized dictionaries that describe each vendor's extensions to the RADIUS protocol.
Authentication Methods
Steel-Belted Radius not only works with a wide variety of remote and wireless access equipment, but it also makes it possible to authenticate remote and WLAN users according to any authentication method or combination of methods you choose.
In addition to Steel-Belted Radius's native database of users and their passwords, Steel-Belted Radius supports "pass-through" authentication to information contained in the following:
- NT/2000, Unix, and NetWare security systems that you have already established for your LAN, including Windows 2000 Active Directory, NT Domains and Hosts, Unix Network Information Services (NIS) and NIS+, and NetWare NDS and Bindery users, groups, and organizational units. This saves countless hours by allowing you to use the same database to authenticate LAN, remote, and WLAN users.
- Token-based authentication systems such as RSA Security ACE/Server, CryptoCard, and VASCO DigiPass.
- SQL databases, including Oracle and Sybase, for Steel-Belted Radius running on Windows NT and Solaris. Steel-Belted Radius works with your existing SQL table structure, eliminating the need for database redesign, and can authenticate against one or more SQL databases, even if they're from different vendors.
- LDAP directories for Windows NT and Solaris versions of Steel-Belted Radius.
- Any ODBC-compliant database for Steel-Belted Radius for Windows NT.
- TACACS+ for Windows NT and Solaris versions of Steel-Belted Radius.
- Other RADIUS servers for proxy authentication against a RADIUS server at another site.
Steel-Belted Radius can simultaneously authenticate many users. If you are combining authentication methods, you can even specify the order in which each is checked. The result is streamlined administration, as well as one-stop authentication.
In this tutorial:
- Securing the WLAN
- Access Point-Based Security Measures
- MAC Filtering
- Controlling the Radiation Zone
- Defensive Security Through a DMZ
- Third-Party Security Methods
- VPNs
- Funk Steel-Belted Radius
- Central User Administration
- Central Hardware Administration
- Securing Your Wireless LAN
- RADIUS Accounting
- WLAN Protection Enhancements
- AES