Ich zeige euch wie ihr mit dem in der USG integriertem RADIUS Server eine WLAN Authentifizierung einrichten könnt. (See their in-depth and helpful guide Here’s a brief walkthrough of the steps I had to take to get my Ubuntu FreeRADIUS server working with my UniFi APs in my network.First, I installed FreeRADIUS using the following command:Next, I opened the default ports used for RADIUS Authentication (1812) and Accounting (1813). Setting up RADIUS with UniFi has never been easier. The Shared Secret is used to verify that the RADIUS client is allowed to process auth-requests through the RADIUS server. Many corporate networks use RADIUS- and for good reason. I’m using a Raspberry Pi 3 Model B running on Raspbian Lite to host the Freeradius 3, MariaDB, and UniFi controller.
One of these tools we have been able to better integrate with our UniFi products is RADIUS Authentication.
Stay tuned in future weeks as we’ll be adding to our RADIUS-related documentation. It then worked without a hitch. My clients.conf file was in the /etc/freeradius directory.To add my AP, I followed the instructions in this file. for USG… UniFi allows you to manage your network in every location no matter how remote and with RADIUS you can use the same login at each site. I added my UAP-AC-PRO, which again I named “apradius1”. These articles will provide added guidance on setting up accounting, troubleshooting failed authentication requests and more. Given that this setup is for a small home network, the Raspberry Pi has enough processing power to not cause an issue, if this were a bigger setup then you might want to either have multiple Raspberry Pi devices or to use a more powerful system.This guide doesn’t cover the setup of the Raspberry Pi, so I will jump str… These are:Define the Access Points/UniFi Switch as RADIUS Clients on your RADIUS Server and create a shared secret/password to be added into UniFi Settings.Add your RADIUS Server/RADIUS Proxy Server to your network in the UniFi Controller.I’ll show you how to do both in detail- through a Windows Server RADIUS Configuration through NPS as well as a Ubuntu Linux Authentication server.RADIUS Configurations in Windows can be set up through the Network Policy Server (NPS) which is a feature you can add to your Windows Server installation through NAP.
After creating these necessary firewall exceptions, I was ready to configure the server.To add an AP as a client, you will need to edit the clients.conf configuration file.
In this blog post I’ll explain how RADIUS works then show you how to integrate it with UniFi.RADIUS (Remote Authentication Dial In User Service) is a popular network protocol that provides for the AAA (Authentication, Authorization, and Accounting) needs of modern IT environments. I setup two servers (Linux and Windows) on my home network to act as authentication servers- and was able to confirm that only two steps are required to integrate a working RADIUS configuration with a UniFi-managed network. Right now I
UniFi and RADIUS work well together. ISP(proprietary Router) -> Switch -> AP I realize that i wont get the full scope of features without the USG (VLAN Tagging etc.) The accounting feature if enabled, provides administrators with additional information like session length and bandwidth.To demonstrate, I set up a new Windows Server 2012 R2 VM to act as my authentication server.To test my new RADIUS setup, I connected my mobile phone to my new network “TurtleRA1”.I selected PEAP (Protected Extensible Authentication Protocol), as I had already verified it was enabled on my RADIUS server.After entering test credentials, I clicked “Save”. How do I setup the Unifi Gateway without internet? Before proceeding with this article please make sure you are familiar with the contents of the Related Articles for USG, USW, and UAP.
A number of modules can be used to check user credentials against an encrypted user DB. At Ubiquiti, we are constantly working to empower our customers by making it easier to integrate our product with these technologies. When RADIUS-backed authentication is initiated, an authentication request and credentials are sent from the user’s device to the RADIUS client. Select any method you have authorized on your RADIUS server. I entered port 1812, and for the Password field, the shared secret I had created earlier.