{"id":658,"date":"2025-08-19T15:15:54","date_gmt":"2025-08-19T14:15:54","guid":{"rendered":"https:\/\/www.shakral.de\/blog\/?p=658"},"modified":"2025-10-08T09:56:53","modified_gmt":"2025-10-08T08:56:53","slug":"radius-anmeldungen-an-switchen","status":"publish","type":"post","link":"https:\/\/www.shakral.de\/blog\/2025\/08\/19\/radius-anmeldungen-an-switchen\/","title":{"rendered":"RADIUS-Anmeldungen an Switchen"},"content":{"rendered":"<p>Demo-Lab Bericht f\u00fcr eine Kundenanfrage mit einem relativen Wildwuchs an Switchherstellern und Modellen. Durch diese Gegenheiten ist kein zentrales Management-Tool m\u00f6glich, daher die Idee durch zentrale RADIUS-User zumindest etwas Nachvollziehbarkeit anhand der Usernamen in die Log-Files zu bringen.  <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Aufbau<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"634\" height=\"669\" src=\"https:\/\/www.shakral.de\/blog\/wp-content\/uploads\/2025\/08\/Aufbau-Clean.png\" alt=\"\" class=\"wp-image-659\" style=\"width:349px;height:auto\" srcset=\"https:\/\/www.shakral.de\/blog\/wp-content\/uploads\/2025\/08\/Aufbau-Clean.png 634w, https:\/\/www.shakral.de\/blog\/wp-content\/uploads\/2025\/08\/Aufbau-Clean-284x300.png 284w\" sizes=\"auto, (max-width: 634px) 100vw, 634px\" \/><\/figure><\/div>\n\n\n<p>IPFire wurde als Test-VM auf VMware Workstation installiert mit zwei Netzwerkkarten, beide als Bridge mit NIC1 im MGMT-Netz und NIC2 im eigenen RADIUS-Netz. Beide Switche h\u00e4ngen eigenst\u00e4ndig im MGMT-Netz, das RADIUS-Netz ist zwischen den Switchen Daisy-Chained.<\/p>\n\n\n\n<p>DISCLAIMER: IPFire ist in Virtuellen Maschinen nur f\u00fcr Test-Installationen freigegeben. <\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">IPFire<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Installation &amp; Einrichtung<\/h3>\n\n\n\n<h3 class=\"wp-block-heading\">Paket-Installation<\/h3>\n\n\n\n<p>Im Pakfire Paketmanager einfach freeradius ausw\u00e4hlen, die weiteren Pakete als Abh\u00e4ngigkeiten werden automatisch mit installiert.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"974\" height=\"742\" src=\"https:\/\/www.shakral.de\/blog\/wp-content\/uploads\/2025\/08\/image.png\" alt=\"\" class=\"wp-image-660\" srcset=\"https:\/\/www.shakral.de\/blog\/wp-content\/uploads\/2025\/08\/image.png 974w, https:\/\/www.shakral.de\/blog\/wp-content\/uploads\/2025\/08\/image-300x229.png 300w, https:\/\/www.shakral.de\/blog\/wp-content\/uploads\/2025\/08\/image-768x585.png 768w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Konfig-Files<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><\/td><td>radiusd.conf<\/td><td>Hauptkonfigurationsdatei<\/td><\/tr><tr><td><\/td><td>clients.conf<\/td><td>Zugriffssteuerung der Switche<\/td><\/tr><tr><td>\/mods-config\/files<\/td><td>authorize<\/td><td>User-Verwaltung<\/td><\/tr><tr><td><\/td><td><\/td><td><\/td><\/tr><tr><td><\/td><td><\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Clients.conf<\/h4>\n\n\n\n<p>hier wird das Switch-Managment-Netz mit einem globalem Secret eingetragen. Mit dedizierten IP-Adressen kann man hier auch f\u00fcr jeden Switch ein eigenes Secret-Passwort vergeben, wie in private-Network-2 beispielshaft angegeben.<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; auto-links: false; highlight: [1,6]; title: ; notranslate\" title=\"\">\nclient private-network-1 {\n        ipaddr          = 192.168.172.0\/24\n        secret          = Netgear1234\n}\n\nclient private-network-2 {\n        ipaddr          = 192.168.173.172\n        secret          = EigenesSecretfuereinzelnenSwitch\n}\n<\/pre><\/div>\n\n\n<h4 class=\"wp-block-heading\">authorize<\/h4>\n\n\n\n<p>in dieser Datei werden die ganzen User angelegt und verwaltet.<\/p>\n\n\n\n<p>Im ersten Beispiel User Bob mit dem Klartext-Passwort.<br>Im zweiten Beispiel der md5user mit dem MD5-Verschl\u00fcsselten Kennwort.<\/p>\n\n\n\n<p>Beide mit Service-Type 6, was als Admin\/Manager User interpretiert wird (7 entspricht operator, ein View-Only-Account)<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; highlight: [1,3]; title: ; notranslate\" title=\"\">\nbob     Cleartext-Password := &quot;hello&quot;\n        Service-Type := 6\nmd5user MD5-Password := &quot;40050a6ca49538867149a76220e6ac7f&quot;\n        Service-Type := 6\n<\/pre><\/div>\n\n\n<h3 class=\"wp-block-heading\">Passwort verschl\u00fcsseln<\/h3>\n\n\n\n<p>mit folgendem Konsolen-Befehl kann das Passwort MD5-Verschl\u00fcsselt werden:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; highlight: [1]; title: ; notranslate\" title=\"\">\necho -n md5passwort| md5sum | awk &#039;{print $1}&#039;\n<\/pre><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"549\" height=\"41\" src=\"https:\/\/www.shakral.de\/blog\/wp-content\/uploads\/2025\/08\/image-2.png\" alt=\"\" class=\"wp-image-665\" srcset=\"https:\/\/www.shakral.de\/blog\/wp-content\/uploads\/2025\/08\/image-2.png 549w, https:\/\/www.shakral.de\/blog\/wp-content\/uploads\/2025\/08\/image-2-300x22.png 300w\" sizes=\"auto, (max-width: 549px) 100vw, 549px\" \/><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">Doing-Kniffe<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">Dienste starten<\/h4>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: bash; title: ; notranslate\" title=\"\">\n\/etc\/rc.d\/init.d\/freeradius {start|stop|reload|restart|status}\n<\/pre><\/div>\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"982\" height=\"760\" src=\"https:\/\/www.shakral.de\/blog\/wp-content\/uploads\/2025\/08\/image-1.png\" alt=\"\" class=\"wp-image-661\" style=\"width:533px;height:auto\" srcset=\"https:\/\/www.shakral.de\/blog\/wp-content\/uploads\/2025\/08\/image-1.png 982w, https:\/\/www.shakral.de\/blog\/wp-content\/uploads\/2025\/08\/image-1-300x232.png 300w, https:\/\/www.shakral.de\/blog\/wp-content\/uploads\/2025\/08\/image-1-768x594.png 768w\" sizes=\"auto, (max-width: 982px) 100vw, 982px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">UPD-Ports<\/h4>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; title: ; notranslate\" title=\"\">\n\n<\/pre><\/div>\n\n\n<h4 class=\"wp-block-heading\">Live-View Debugging<\/h4>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; title: ; notranslate\" title=\"\">\n\/usr\/sbin\/radiusd -X -d \/etc\/raddb\n<\/pre><\/div>\n\n\n<h4 class=\"wp-block-heading\">RADTEST <\/h4>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; title: ; notranslate\" title=\"\">\nradtest username password localhost 0 testing123\n<\/pre><\/div>\n\n\n<h4 class=\"wp-block-heading\">Logfiles<\/h4>\n\n\n\n<p>Logfiles:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\/var\/log\/freeradius\/radius.log<\/li>\n\n\n\n<li>\/var\/log\/radius\/radius.log.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Switch-Konfig<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Netgear M4250<\/h3>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; title: ; notranslate\" title=\"\">\naaa authentication login &quot;HGS11-Radius&quot; enable local radius line\nip http authentication radius local\nip https authentication radius local\n\nradius server host auth &quot;192.168.172.1&quot; name &quot;IPFire-VM&quot;\nradius server key auth &quot;192.168.172.1&quot; encrypted 7441de56fbccc31018440a2d7ebb6c6dca84c95e92e996fafa929edbed17c945e91fb2e8458168dec8786113759853556e7ab1033d6407b565cd14ca660e8a2d\nradius server primary &quot;192.168.172.1&quot;\naaa server radius dynamic-author\nexit\n\nline console\naaa authentication login &quot;HGS11-Radius&quot; enable local radius line\nip http authentication radius local\nip https authentication radius local\n\n\nradius server host auth &quot;192.168.172.1&quot; name &quot;IPFire-VM&quot;\nradius server key auth &quot;192.168.172.1&quot; encrypted 7441de56fbccc31018440a2d7ebb6c6dca84c95e92e996fafa929edbed17c945e91fb2e8458168dec8786113759853556e7ab1033d6407b565cd14ca660e8a2d\nradius server primary &quot;192.168.172.1&quot;\naaa server radius dynamic-author\nexit\nline console\nlogin authentication HGS11-Radius\nexit\n\nline telnet\nlogin authentication HGS11-Radius\nexit\n\nline ssh\nlogin authentication HGS11-Radius\nexit\n\nexit\n\nline telnet\nexit\n\nline ssh\nlogin authentication HGS11-Radius\nexit\n\n<\/pre><\/div>\n\n\n<h3 class=\"wp-block-heading\">Aruba-OS 2530<\/h3>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; title: ; notranslate\" title=\"\">\nradius-server host 192.168.172.1 key &quot;Netgear1234&quot;\n\naaa authentication login privilege-mode\naaa authentication web login radius local\naaa authentication ssh login radius local\naaa authentication ssh enable radius local\n<\/pre><\/div>","protected":false},"excerpt":{"rendered":"<p>Demo-Lab Bericht f\u00fcr eine Kundenanfrage mit einem relativen Wildwuchs an Switchherstellern und Modellen. Durch diese Gegenheiten ist kein zentrales Management-Tool m\u00f6glich, daher die Idee durch zentrale RADIUS-User zumindest etwas Nachvollziehbarkeit anhand der Usernamen in&#46;&#46;&#46;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,99,98],"tags":[122,43,92,127,128,125,121,126],"class_list":["post-658","post","type-post","status-publish","format-standard","hentry","category-allgemein","category-aruba","category-netzwerk","tag-aruba","tag-cli","tag-firewall","tag-ipfire","tag-labumgebung","tag-netgear","tag-netzwerk","tag-radius"],"_links":{"self":[{"href":"https:\/\/www.shakral.de\/blog\/wp-json\/wp\/v2\/posts\/658","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.shakral.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.shakral.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.shakral.de\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.shakral.de\/blog\/wp-json\/wp\/v2\/comments?post=658"}],"version-history":[{"count":4,"href":"https:\/\/www.shakral.de\/blog\/wp-json\/wp\/v2\/posts\/658\/revisions"}],"predecessor-version":[{"id":667,"href":"https:\/\/www.shakral.de\/blog\/wp-json\/wp\/v2\/posts\/658\/revisions\/667"}],"wp:attachment":[{"href":"https:\/\/www.shakral.de\/blog\/wp-json\/wp\/v2\/media?parent=658"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.shakral.de\/blog\/wp-json\/wp\/v2\/categories?post=658"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.shakral.de\/blog\/wp-json\/wp\/v2\/tags?post=658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}