User Guide for FibeAir® IP-20 All-Outdoor Products, CeraOS 10.5
Page 401 of 825
Ceragon Proprietary and Confidential
Step 3
–
Specifying the RADIUS client
This step describes how to define a device as a RADIUS client. The RADIUS server
accepts attempts to connect to a device only if that is device is defined as a
RADIUS client.
To define a device as a RADIUS client:
1 In the
/etc/raddb/clients.conf
file, add the device according to the
following example.
◦
The example shows how to add an IP-20C device with IP address
192.168.1.118:
# IP20-C
client 192.168.1.118 {
secret = default_not_applicable
shortname = ceragon-ip-20C
}
◦
Keep in mind:
◦
The
secret
must be between 22 and 128 characters long. Note down
the secret because you will need to enter the same value in the Secret
field of the Radius Configuration
–
Edit page (Figure 295).
◦
The
shortname
is not mandatory, but should be added, and should be
different for each RADIUS client.
2 Save the changes to the
/etc/raddb/clients.conf
file.
Step 4
–
Restarting the RADIUS client
After configuring all of the above, restart the RADIUS process.
To restart the RADIUS process:
1 Stop the process by entering:
killall -9 radiusd
2 Start the process running in the background by entering:
radius
–
X &
Note:
To check the logs each time a user connects to the server, enter:
radius
–
X &
10.6
Configuring X.509 CSR Certificates and HTTPS
The web interface protocol for accessing IP-20 can be configured to HTTP (default)
or HTTPS. It cannot be set to both at the same time.
Before setting the protocol to HTTPS, you must:
1 Create and upload a CSR file. See
Generating a Certificate Signing Request
2 Download the certificate to the IP-20 and install the certificate. See