Skip to content

Commit 177c21b

Browse files
Added RADSEC topic and linked to release notes
1 parent 67d7710 commit 177c21b

3 files changed

Lines changed: 85 additions & 10 deletions

File tree

docs/config_radsec.md

Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
---
2+
title: Configuring RADUIS over TLS
3+
sidebar_label: Configuring RADIUS over TLS
4+
---
5+
6+
RADIUS over TLS is designed to provide secure communication of RADIUS requests using the Transport Secure Layer (TLS) protocol. RADIUS over TLS, also known as RADSEC, redirects regular RADIUS traffic to remote RADIUS servers connected over TLS. RADSEC allows RADIUS authentication, authorization, and accounting data to be passed safely across untrusted networks.
7+
8+
In this section:
9+
- Configuring RADSEC
10+
- Signing and Importing Webserver Certificates
11+
- Syslog over TLS
12+
13+
## Configuring RADSEC
14+
15+
Use the following information to configure RADIUS over TLS (RADSEC).
16+
17+
#### 1. Configure the RADSEC server.
18+
19+
The following configuration example will add a radius server named `radsec`
20+
21+
```
22+
admin@t327-dut1.cond# configure authority radius-server radsec
23+
admin@t327-dut1.cond (radius-server[name=radsec])# address 172.18.5.224
24+
admin@t327-dut1.cond (radius-server[name=radsec])# port 2083
25+
admin@t327-dut1.cond (radius-server[name=radsec])# protocol tls
26+
admin@t327-dut1.cond (radius-server[name=radsec])# account-creation manual
27+
admin@t327-dut1.cond (radius-server[name=radsec])# ocsp strict
28+
admin@t327-dut1.cond (radius-server[name=radsec])# server-name t327-dut1.openstacklocal
29+
admin@t327-dut1.cond (radius-server[name=radsec])# top
30+
```
31+
32+
#### 2. Configure the trusted CA certificate.
33+
34+
The trusted CA certificate is necessary to validate the incoming client certificate. Certificates are pasted in as a multi-line config.
35+
36+
Create a certificate root named `ca_root` and paste the certificate file content into the command:
37+
38+
```
39+
admin@conductor-node-1.Conductor# config authority trusted-ca-certificate ca_root
40+
admin@conductor-node-1.Conductor (trusted-ca-certificate[name=ca_root])# content
41+
Enter plain for content (Press CTRL-D to finish):
42+
<paste-cert-file-content-here>
43+
```
44+
45+
#### 3. Configure a client certificate to be used for the RADIUS client.
46+
47+
Repeat the previous step to create a client certificate named `radsec`.
48+
49+
```
50+
admin@conductor-node-1.Conductor# config authority client-certificate radsec
51+
admin@conductor-node-1.Conductor (client-certificate[name=radsec])# content
52+
Enter plain for content (Press CTRL-D to finish):
53+
<paste-cert-file-content-here>
54+
```
55+
56+
#### 4. Configure the RADIUS server at the Authority level to use the configured client certificate.
57+
58+
Associate the previously configured `radsec` client certificate to the radius server running on a specified node.
59+
60+
`configure authority router cond node t327-dut1 radius client-certificate-name radsec`
61+
62+
Note that the client certificate selected should match the appropriate IP/hostname of the node as seen from the RADIUS server.
63+
64+
`validate` and `commit` the changes.
65+
66+
#### 5. Create a RADIUS User
67+
68+
Create a remotely authenticated RADIUS user. In this example we create user `test1`.
69+
70+
```
71+
*admin@conductor-node-1.Conductor# create user test1
72+
Full Name: test1
73+
Authentication Type (remote or local): remote
74+
Roles (space separated): admin
75+
Enabled (true or false): true
76+
Account 'test1' successfully created
77+
```
78+
79+
When the user logs into the node `t327-dut1` via ssh, the authentication request is sent via RADSEC to the server `172.18.5.224` and the user is authenticated.
80+
81+
82+

docs/release_notes_128t_6.3.md

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ Before upgrading please review the [**Upgrade Considerations**](intro_upgrade_co
7272
------
7373
- **I95-56337 / I95-56339 / I95-56341 REST API changes to better support BGP endpoints:** Updated BGP REST endpoints for better functionality, by adding pagination support to summary commands and altering json schema to use arrays where necessary to preserve ordering. Added `show bgp family-summary` to condense address-family information per peer into one entry.
7474
------
75-
- **I95-56723 TLS Client Support:** See CC docs, see Radius Server docs ---- **link here
75+
- **I95-56723 TLS Client Support:** RADIUS over TLS is designed to provide secure communication of RADIUS requests using the Transport Secure Layer (TLS) protocol. RADIUS authentication, authorization, and accounting data can now be passed safely across untrusted networks. For more information, see [Configuring RADUIS over TLS](config_radsec.md).
7676

7777
### Resolved Issues
7878

@@ -180,11 +180,3 @@ Before upgrading please review the [**Upgrade Considerations**](intro_upgrade_co
180180
- **I95-56628 Unable to upgrade second HA Conductor to 6.3.0:** After successfully upgrading the primary HA conductor, attempting to upgrade the second node using the GUI prompt fails. This is a known issue and is currently under investigation. Please see the Knowledgebase Article [Unable to upgrade second HA Conductor to 6.3.0](../kb/2024/08/30/I95-56628) for workaround information. <!-- markdown-link-check-enable -->
181181
------
182182
- **I95-57844 Software versions not listed for download from the GUI:** In rare failure scenarios when initiating a software download via the GUI, known software versions are missing from the upgrade list but no errors are reported to the user. If such a scenario is observed, it is recommended that you initiate a second download from the PCLI. In this case any errors are better reported and can be resolved.
183-
184-
185-
186-
187-
188-
189-
190-

sidebars.js

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ module.exports = {
8989
"install_conductor_overview",
9090
"bcp_conductor_deployment",
9191
"single_conductor_install",
92-
"ha_conductor_install",
92+
"ha_conductor_install",
9393
"single_conductor_config",
9494
"conductor_upgrade",
9595
"howto_conductor_migration",
@@ -285,6 +285,7 @@ module.exports = {
285285
"config_access_mgmt",
286286
"config_ldap",
287287
"config_radius",
288+
"config_radsec",
288289
"config_password_policies",
289290
"howto_reset_user_password",
290291
],

0 commit comments

Comments
 (0)