Educational Resource

Streamlining Network Security: A Guide to Configuring FreeRADIUS for NAC

April 3, 2024
3 min read
Expert Content

Published on

April 3, 2024

In today's digital landscape, ensuring robust network security is paramount for organizations of all sizes. Network Access Control (NAC) plays a crucial role in securing networks by regulating access based on predefined policies and in the following diagram we will guide you step-by-step through the process of configuring FreeRADIUS for NAC. 
Configure FreeRADIUS for NAC

 But before diving into the configuration process, it is essential to ensure that the following prerequisites are met: 

Prerequisites: 

  • Root Access: Ensure root access to the Linux machine, granting necessary permissions for system-level configurations. 

  • FreeRADIUS Installation: Install FreeRADIUS as a Linux service, commonly known as 'radiusd'.  

  • Firewall Configuration: Open UDP ports 1812 and 1813 to allow communication for RADIUS authentication.  

  • Upload and Configure 'getcrls' Script: Adapt and configure the 'getcrls' bash script to facilitate Certificate Revocation List (CRL) retrieval.  

Please note: This procedure has been tailored for EL 7/8/9 distributions. For other Linux distributions like Ubuntu, some parameters may require adaptation. 

Then, 

To enable EAP-TLS authentication, follow these steps:  

  1. Open the '/etc/raddb/mods-available/eap' file.  

  2. Change the default EAP type to TLS within the configuration.  

To set up TLS for secure communication, perform the following steps:  

  1. Open the '/etc/raddb/radiusd.conf' file.  

  2. Add a custom certificate directory parameter.  

  3. Generate a key, sign a Certificate Signing Request (CSR), and upload the signed certificate.  

    Want to implement these PKI practices?

    Get expert guidance on implementing secure PKI solutions for your organization.

    Get Expert Help
  4. Set proper permissions for the server key and certificate files.  

  5. Edit the '/etc/raddb/mods-enabled/eap' file to configure TLS settings.  

To configure Certificate Revocation List (CRL) retrieval as follows:  

  1. Import and adapt the 'getcrl.sh' bash script to match the client context.  

  2. Edit the '/etc/raddb/mods-enabled/eap' file to enable CRL checking.   

To configure Radius client settings by: 

  • Editing the '/etc/raddb/clients.conf' file.  

  • Adapt client blocks as needed, providing IP addresses and secret keys.  

To configure the access Policy: 

  1. Customize access policies based on client needs by editing the '/etc/raddb/sites-enabled/default' file. 

  2. Structure the file into sections corresponding to authentication, authorization, and accounting.  

Finally, for logs level: 

  1. Enable authentication logs by modifying the '/etc/raddb/radiusd.conf' file. 

  2. Adjust logging parameters to specify which events should be recorded in the log file.   

In conclusion, the meticulous implementation of FreeRADIUS on a Linux machine, following outlined procedures, significantly fortifies your organization's network security infrastructure. With robust authentication, authorization, and logging mechanisms established, secure access to network resources is assured while aligning with security policies.

By meticulously adapting procedures to specific Linux distributions, administrators effectively deploy FreeRADIUS for NAC, thereby enhancing network security and control. It's worth noting that while FreeRADIUS enables authentication of endpoints and users, issuing certificates for them is paramount. For this task, our solutions Horizon & Stream offer the most reliable and comprehensive approach.

Horizon and Stream

Was this helpful?
Back to Education Center

Table of Contents

Keep Learning

Get the latest educational content and PKI insights delivered to your inbox.

By subscribing you accept to receive our communications. You can unsubscribe at any moment.

Related Resources

Evertrust PQC

Are European enterprises ready for Post-Quantum Cryptography (PQC) migration? The gaps and the path forward

September 10, 2025
1 min

Explore why PQC adoption lags in Europe, the real blockers, and how to achieve quantum-safe security.

Read more
Evertrust PQC

NIST Releases New Post-Quantum Cryptography Standards

September 10, 2025
1 min

Discover NIST’s new Post-Quantum Cryptography standards (FIPS 203, 204, 205) and how Evertrust is preparing to integrate them for enhanced cybersecurity.

Read more
Evertrust ACME

ACME Clients on Linux

February 12, 2024
1 min

The ACME protocol is a network protocol designed to automate the process of domain validation, deliverance and renewal of X.509 certificates. The process is set up between an ACME server and an ACME client.

Read more

Ready to take back control over your certificates?

Talk to our experts and discover how Evertrust can help you implement best practices in PKI and certificate lifecycle management.

Talk to an expert