WIFI HOTSPOT
PASSWORD
Maryam Namira
Public WiFi
Today, commercial areas have
free WiFi so it is unlikely
people will pay for something
they can get for free
Guest Wi-Fi is one of the most
important amenities for the
hospitality market. According
to TripAdvisor, a majority of the
hotel guests review the rating
for the WiFi service before
booking the property online.
People will get username and
password to benefit from you
WiFi signal
What is FreeRadius?
Once a device wanted to connect
to an access point, NAS will do
control to ensure proper security
This proper security is described
as AAA (Authentication,
Authorization, and Accounting)
• Authentication, step to gain access to a
network and service
• Authorization, control the usage of the
resources
• Accounting, measure the usage of
resources and connected users
WPA2
WPA2
Figure 1. WiFi access point with WPA2
enterprise security
RADIUS is a client/server protocol
(RF2865) which the communication
between Network Access Server (NAS)
and RADIUS server based User Datagram
Protocol (UDP) which is connectionless.
i
Why we need WiFi management?
It would be easier to manage WiFi bandwidth allocation in a company or in
a hotel i.e. different allocation for employee and guest
Serves higher level of security (AAA) because everyone got their own
username and password to obtain WiFi connection
Bandwidth allocation efficiency and reduced cost
Infrastructure of FreeRadius
1
2
3
How RADIUS works?
*Note: RADIUS server is on a UNIX/Windows NT machine. RADIUS client is a NAS
Modem
1
2
3
RADIUS
Client
4
5
RADIUS
Server
User initiates PPP authentication
to Network Access Server (NAS)
1
NAS prompts for username and
password
2
Radius client acts upon services
and services parameters bundled
with Accept or Reject
6
User replies3
RADIUS client sends username
and password to the RADIUS
server
4
RADIUS server responds with
Accept, Reject, or Challenge
5
How RADIUS works?
RADIUS server support various methods
to authenticate user, those are PPP, PAP or
CHAP, Unix login, etc
Packet type – Access Request
Username, password
Access-Accept/Access-Reject
User service, framed protocol
Access Challenge (optional)
Reply messageAccess
Server
Radius
Server
Figure 2. Authentication and Authorization
illustration.
When a user do a login, it sends a
query (Access-Request) from the NAS
to the RADIUS server
1
2
Radius protocol (RFC 2865) then assign
port number for RADIUS. Query is
presented in two modes, character
mode and packet mode
3
When RADIUS server receives Access-
Request, it searches a database for
username listed whether username
exist or not. If the username exist and
password is correct it will send Access-
Accept message
4 When RADIUS server receives Access-
Accept, it respond incl. service type,
protocol type, IP address, and access
list to apply
5 After user obtain access to the
internet, amount of resources such
as time, packets, bytes, etc then ISPs
will use RADIUS access control and
accounting software to meet special
security and billing. This also allow
data to be sent at the start until end
of session.
Important point when implementing
Where RADIUS is utilized?
Security
• Firewall
• Role-based
access control
• Profiling
• IDS/IPS
Capacity planning
Using WiFi management, it is
very important to plan what
kind of applications are
being used by guest or staff
in the organization.
Access point placement
Specify the best place
to place the access
point based on where
guest or staff spend
their time with the
connection.
Firewall with VPN
service
Access point with
WPA2 encryption
When MS connect to Telco
infrastructure using, equipment use
radius to gain internet access
THANK YOU

WiFi Hotspot Password

  • 1.
  • 2.
    Public WiFi Today, commercialareas have free WiFi so it is unlikely people will pay for something they can get for free Guest Wi-Fi is one of the most important amenities for the hospitality market. According to TripAdvisor, a majority of the hotel guests review the rating for the WiFi service before booking the property online. People will get username and password to benefit from you WiFi signal
  • 3.
    What is FreeRadius? Oncea device wanted to connect to an access point, NAS will do control to ensure proper security This proper security is described as AAA (Authentication, Authorization, and Accounting) • Authentication, step to gain access to a network and service • Authorization, control the usage of the resources • Accounting, measure the usage of resources and connected users WPA2 WPA2 Figure 1. WiFi access point with WPA2 enterprise security RADIUS is a client/server protocol (RF2865) which the communication between Network Access Server (NAS) and RADIUS server based User Datagram Protocol (UDP) which is connectionless. i
  • 4.
    Why we needWiFi management? It would be easier to manage WiFi bandwidth allocation in a company or in a hotel i.e. different allocation for employee and guest Serves higher level of security (AAA) because everyone got their own username and password to obtain WiFi connection Bandwidth allocation efficiency and reduced cost Infrastructure of FreeRadius 1 2 3
  • 5.
    How RADIUS works? *Note:RADIUS server is on a UNIX/Windows NT machine. RADIUS client is a NAS Modem 1 2 3 RADIUS Client 4 5 RADIUS Server User initiates PPP authentication to Network Access Server (NAS) 1 NAS prompts for username and password 2 Radius client acts upon services and services parameters bundled with Accept or Reject 6 User replies3 RADIUS client sends username and password to the RADIUS server 4 RADIUS server responds with Accept, Reject, or Challenge 5
  • 6.
    How RADIUS works? RADIUSserver support various methods to authenticate user, those are PPP, PAP or CHAP, Unix login, etc Packet type – Access Request Username, password Access-Accept/Access-Reject User service, framed protocol Access Challenge (optional) Reply messageAccess Server Radius Server Figure 2. Authentication and Authorization illustration. When a user do a login, it sends a query (Access-Request) from the NAS to the RADIUS server 1 2 Radius protocol (RFC 2865) then assign port number for RADIUS. Query is presented in two modes, character mode and packet mode 3 When RADIUS server receives Access- Request, it searches a database for username listed whether username exist or not. If the username exist and password is correct it will send Access- Accept message 4 When RADIUS server receives Access- Accept, it respond incl. service type, protocol type, IP address, and access list to apply 5 After user obtain access to the internet, amount of resources such as time, packets, bytes, etc then ISPs will use RADIUS access control and accounting software to meet special security and billing. This also allow data to be sent at the start until end of session.
  • 7.
    Important point whenimplementing Where RADIUS is utilized? Security • Firewall • Role-based access control • Profiling • IDS/IPS Capacity planning Using WiFi management, it is very important to plan what kind of applications are being used by guest or staff in the organization. Access point placement Specify the best place to place the access point based on where guest or staff spend their time with the connection. Firewall with VPN service Access point with WPA2 encryption When MS connect to Telco infrastructure using, equipment use radius to gain internet access
  • 8.

Editor's Notes

  • #4 Network Access Server (NAS) is referred to control access to a network
  • #7 * Access-Request contains username, encrypted password, NAS IP address, and port Port number 1812 RADIUS Protocol (RFC2865) Radius protocol is a client/server protocol which make use of UDP to communicate. Typical flow of data between the client and server consists of a single request from the client followed by a single reply from the server. Before successful communication between the client and server can be established, each has to define a shared secret. This is used to authenticate clients. Gambar bagan Two key components inside RADIUS packet: - The code (indicates the packet type) - Attributes (carry essential data used by RADIUS) - Character mode : “Service-Type = Exec-User” - Packet mode: “Service-Type = Framed User” and “Framed Type = PPP” If username doesn’t exist, It will sends Access-Reject message If username exist and the password is correct, it will sends an Access-Accept response incl. service type, protocol type, IP address, and access list to apply
  • #8 When Alice connects throught an existing Telco infrastructure using DSL, Telco equipment will use RADIUS to contact ISP server in order to determine if she can gain internet access throught DSL (proxying)