Hello<br><br>I use redundant-load-balance for ldap user auth to authenticate users to a pool of active directory servers for one service. That seems to work well.<br><br>I'm trying to think why I don't do that for ntlmauth (used inside mschap inner-tunnel) for another other service.<br>
<br>I've knocked that up to test it with mschap modules like (with N being 1,2,3,4,5)<br><br>mschap mschapadN {<br> with_ntdomain_hack = yes<br> ntlm_auth = "/usr/local/bin/mschap-ntlm_auth --request-nt-key --username=%{%{Stripped-User-Name}:-%{User-Name:-None}} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00} --configfile=/etc/samba/smb-adN.conf"<br>
}<br><br>where /etc/samba/smb-adN.conf is the same as the others except for "password server = adN.domain"<br><br>and then in the inner-tunnel site I have<br>authenticate {<br> Auth-Type MS-CHAP {<br> redundant-load-balance {<br>
mschapad1<br> mschapad2<br> ..<br> mschapadN<br> }<br> }<br>}<br><br>Is this along the lines that others follow? if not how does ntlmauth handle the AD server being down. Does ntlmauth/winbind handle AD being down so freeradius does not have to?<br>
<br>Thanks,<br><br>Neil<br>