8000 GitHub - novalabsxyz/radsec-proxy
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

novalabsxyz/radsec-proxy

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Helium RadSecProxy Container

RADIUS messages used to authenticate users and for session accounting are transmitted unsecured and over UDP by default. By directing these messages internally in your secure network to a RadSecProxy, the UDP is then converted to a TLS protected TCP connection to the Helium Network core AAA servers.


Prerequisites

  • An intel based machine with Docker installed.
  • The intel based machine has a private IP in your network reachable from your Aruba Mobility Controller
  • ACLs or Firewalls allow Aruba Mobility Controller and Docker Container to communicate UDP on port 1812 and 1813
  • ACLs or Firewalls allow container/host to reach the internet on TCP ports 2083 and 3802.

Container Deployment

  1. Un-zip and untar the Helium_RadSec_Docker.tag.gz file into the directory of your choice on the host machine. This will unpack the following items:
    • Dockerfile - The docker instructions on how to build the container
    • Radsecproxy.conf - The radsecproxy config file prepopulated to connect to Helium Network AAA servers
    • docker-compose.yml - file to start and stop the container as a daemon.
# tar -xvzf  Helium_RadSec_Docker.tag.gz
  1. Into the same directory copy the 3 certificates obtained from Helium Network
    • ca.pem - the root CA certificate
    • cert.pem - the user certificate
    • key.pem - the key file matched to the certificate
  2. Start the container using:
# sudo docker compose up -d

4.If/when needed, stop the container using:

# sudo docker compose down

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •  
0