Keywords:-

Keywords: Study, Security, Network, Server, Radius

Article Content:-

Abstract

Radius centralizes logins and passwords. This is a server protocol. It should be noted that the server, Radius, manages authentication for clients, routers and switches. Radius is simply a remote authentication protocol used to centralize authentication data and manage user connections to remote services.  This protocol relies primarily on a server (DARIUS server), linked to an identification base (database, LDAP directory, etc.). A Radius client, called NAS (Network Access Server), acting as intermediary between the end-user and the server. All transactions between the Radius client and the server are encrypted.

It works on the basis of a scenario similar to : a user sends a request to the NAS to authorize a remote connection. The NAS in turn forwards the request to the Radius server. The latter consults the requested identification database to find out the type of identification scenario requested for the user. Either the current scenario is suitable, or another identification method is requested from the user. This protocol thus returns one of the four responses we'll discuss in the rest of this article : ACCEPT : identification successful, REJECT : identification failed, CHALLENGE : the Radius server requests additional information from the user and proposes a challenge. Following the above authentication phase, an authentication phase begins, in which the server returns the user's authorizations.

In this article, as a network manager, we're concerned with setting up means of access control, and to do this, we have to square a kind of circle : simplicity for the user, reliability of the mechanisms, high level of security, all while using available standards as much as possible.

References:-

References

Ali MAHBOUB, Ali SENOUSSI, Gestion 13(02), 2019

A AMRI, FZ LAKEHAL, F SADOUKI, 2014

Amir Lamine, Editions Université Européennes, 2015

Ali Sadiqui ISTE GROUP, 2019

El Hadi Kenane, 2018

GUY Pojolle, Editions Eyrolles, 2014

http:/ /www.google.com/configuration of the Radius server under Windows server 2012, consulted on 02/05/2023;

http://www.certa.ssi.gouv.fr/site/CERTA-2008-ACT-047.pdf

http:/ /www.kismetwreless.net

Ilunga Mbuyamba Elisée, Kabuyaya Bahavira Patrick, International Journal of innovation and Applied studies 39(3), 2023

IT, AKademy, 2020

JUSTE Raimbault, University, Paris 7 Denis Diderot, 2018

Ken Chen ISTE GROUP, 2014

Maryline Laurent, Armen Khatchatourov, Signes de confiance, l'impact des labels sur la gestion des données personnelles, 2018

Olivier Fruchier, Philippe Egea, Faissal Bakati,

Ouelhadj Mohamed Amine, Université Mouloud Mammeri, 2015

Raphael Grevisse Yende, 2018

Rochdi Sarraj, Ecole Nationale Supérieure des Mines de Paris, 2013

Sylvain Métille, Jusletter, 2017, Huu Quynh Nguyen, Paris, ENST, 2008

Thierry Talbert, J3Ea21, 2008, 2022

PATRICE KADIONIK, ENSEIRB, 2002

Stefan Lueders, 2020

Jean Lucat, Global Security, 2016

Robin Heron, Stéphane Safin, Anne Bationo-Tillon EPIQUE, 2019

Wajih Abdallah, Sami Mnasri, Thierry Val Journées Nationales des communications Terrestres (JNCT 2019), 2019

Downloads

Citation Tools

How to Cite
Jean, K. K., Godelive, K. M., Erick, I. M., & Barthelemy, K. K. (2024). Study of Securing A Wireless Network with A Radius Server. International Journal Of Mathematics And Computer Research, 12(3), 4073-4090. https://doi.org/10.47191/ijmcr/v12i3.01