IKEv2 vpn authenticate by freeradius
Alan DeKok
aland at deployingradius.com
Wed Jun 22 14:40:48 UTC 2022
On Jun 22, 2022, at 10:01 AM, 网络时代 via Freeradius-Users <freeradius-users at lists.freeradius.org> wrote:
> In the actual test, freeradius sends Access-Accept,See the last output section below. The router log shows that the authentication fails. MikroTik tech support can't find a reason so far.
Then blame Mikrotik. If FreeRADIUS sends an Access-Accept, and the router log shows failure, then the problem is the router.
> All certificates are created in freeradius and imported into ROS.
>
> [e_zhangiso at myradius ~]$ su Password: [root at myradius e_zhangiso]# radtest vtest1 zsl123 localhost 18120 testing123 Sent Access-Request Id 19 from 0.0.0.0:38185 to 127.0.0.1:1812 length 76 User-Name = "vtest1" User-Password = "zsl123" NAS-IP-Address = 93.191.168.52 NAS-Port = 18120 Message-Authenticator = 0x00 Cleartext-Password = "zsl123" Received Access-Accept Id 19 from 127.0.0.1:1812 to 127.0.0.1:38185 length 20 [root at myradius e_zhangiso]# cd /usr/local/bin/ [root at myradius bin]# ls dbus-cleanup-sockets radattr dbus-daemon radclient dbus-launch radcrypt dbus-monitor radeapclient dbus-run-session radlast dbus-send radsqlrelay dbus-test-tool radtest dbus-update-activation-environment radwho dbus-uuidgen radzap dhcpclient smbencrypt eapol_test ttls-eap-mschapv2.conf map_unit x86_64-unknown-linux-gnu-pkg-config peap-mschapv2.conf xmlwf pkg-config
That is completely unreadable.
But... if eapol_test works, and FreeRADIUS sends Access-Accept, then the problem isn't FreeRADIUS.
Alan DeKok.
More information about the Freeradius-Users
mailing list