<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.basein.net/mediawiki_eng/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Shin</id>
	<title>imRAD N1 Wiki(eng) - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.basein.net/mediawiki_eng/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Shin"/>
	<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php/Special:Contributions/Shin"/>
	<updated>2026-05-01T13:13:50Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.35.0</generator>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Authentication_testing&amp;diff=2106</id>
		<title>RADIUS Authentication testing</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Authentication_testing&amp;diff=2106"/>
		<updated>2025-03-07T07:13:00Z</updated>

		<summary type="html">&lt;p&gt;Shin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Testing the RADIUS authentication depends on the operating system of a device and a android device needs to set phase 2 authentication.&lt;br /&gt;
&lt;br /&gt;
==== User Authentication in Local Database ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Operating system !! EAP !! CA Certificate !! phase 2 authentication&lt;br /&gt;
|-&lt;br /&gt;
| Android || TTLS or PEAP || Select &amp;quot;Do not validate&amp;quot; || TTLS-GTC, TTLS-PAP, TTLS-MSCHAPV2,&amp;lt;br&amp;gt;PEAP-GTC, or PEAP-MSCHAPV2&amp;lt;ref&amp;gt;&lt;br /&gt;
If you select the MSCHAPV2, you must add a user-password as clear-text or Windows NT hashed.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| IOS || - || Trust the Certificate || -&lt;br /&gt;
|-&lt;br /&gt;
| Windows 8, 10 || - || - || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== External Database / LDAP  ====&lt;br /&gt;
You can't use some phase 2 authentication methods because the user-password must be decrypted into the plaintext to authenticate the user credentials from a remove database or a LDAP server, &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Operating system !! EAP !! CA Certificate !! phase 2 authentication&lt;br /&gt;
|-&lt;br /&gt;
| Android || TTLS or PEAP || Select &amp;quot;Do not validate&amp;quot; || TTLS-GTC, TTLS-PAP, or PEAP-GTC&lt;br /&gt;
|-&lt;br /&gt;
| IOS || - || Trust the Certificate || -&lt;br /&gt;
|-&lt;br /&gt;
| Windows 10&amp;lt;ref&amp;gt;The older Microsoft Windows than version 10 does not support TTLS-GTC, TTLS-PAP, or PEAP-GTC&amp;lt;/ref&amp;gt; || - || - || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The hyphen(-) means &amp;quot;don't care.&amp;quot;&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Authentication_testing&amp;diff=2105</id>
		<title>RADIUS Authentication testing</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Authentication_testing&amp;diff=2105"/>
		<updated>2025-03-07T07:12:45Z</updated>

		<summary type="html">&lt;p&gt;Shin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Testing the RADIUS authentication depends on the operating system of a device and a android device needs to set phase 2 authentication.&lt;br /&gt;
&lt;br /&gt;
==== User Authentication in Local Database ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Operating system !! EAP !! CA Certificate !! phase 2 authentication&lt;br /&gt;
|-&lt;br /&gt;
| Android || TTLS or PEAP || Select &amp;quot;Do not validate&amp;quot; || TTLS-GTC, TTLS-PAP, TTLS-MSCHAPV2,&amp;lt;br&amp;gt;PEAP-GTC, or PEAP-MSCHAPV2&amp;lt;ref&amp;gt;&lt;br /&gt;
If you select the MSCHAPV2, you must add a user-password as clear-text or Windows NT hashed.&amp;lt;/ref&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| IOS || - || Trust the Certificate || -&lt;br /&gt;
|-&lt;br /&gt;
| Windows 8, 10 || - || - || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== External Database / LDAP  ====&lt;br /&gt;
You can't use some phase 2 authentication methods because the user-password must be decrypted into the plaintext to authenticate the user credentials from a remove database or a LDAP server, &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Operating system !! EAP !! CA Certificate !! phase 2 authentication&lt;br /&gt;
|-&lt;br /&gt;
| Android || TTLS or PEAP || Select &amp;quot;Do not validate&amp;quot; || TTLS-GTC, TTLS-PAP, or PEAP-GTC&lt;br /&gt;
|-&lt;br /&gt;
| IOS || - || Trust the &amp;quot;BaseinWPA Server Certificate&amp;quot; || -&lt;br /&gt;
|-&lt;br /&gt;
| Windows 10&amp;lt;ref&amp;gt;The older Microsoft Windows than version 10 does not support TTLS-GTC, TTLS-PAP, or PEAP-GTC&amp;lt;/ref&amp;gt; || - || - || -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The hyphen(-) means &amp;quot;don't care.&amp;quot;&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=ImRAD_RADIUS&amp;diff=2104</id>
		<title>ImRAD RADIUS</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=ImRAD_RADIUS&amp;diff=2104"/>
		<updated>2025-03-07T07:11:18Z</updated>

		<summary type="html">&lt;p&gt;Shin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS Overview ===&lt;br /&gt;
RADIUS(Remote Authentication Dial-In User Service) is a networking protocol, operating on ports 1812 and 1813, that provides centralized Authentication, Authorization, and Accounting (AAA or Triple-A) management for users who connect and use a network service.&amp;lt;ref name='radius-wiki'&amp;gt;https://en.wikipedia.org/wiki/RADIUS&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
RADIUS is a client/server protocol that runs in the application layer. Network access servers, which control access to a network, usually contain a RADIUS client component that communicates with the RADIUS server. RADIUS is often the back-end of choice for 802.1X&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IEEE_802.1X&amp;lt;/ref&amp;gt; authentication.&amp;lt;ref name='radius-wiki' /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
WPA-Enterprise is also referred to as WPA-802.1X mode, and sometimes just WPA (as opposed to WPA-PSK), this is designed for enterprise networks and requires a RADIUS authentication server to have users can use a network service.&amp;lt;ref name='wiki-wpa&amp;gt;https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access#WPA2&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The imRAD can be used on WPA, WPA2, and WPA3 Enterprise&amp;lt;ref name='wiki-wpa /&amp;gt; environments and supports EAP-TTLS&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Extensible_Authentication_Protocol#EAP_Tunneled_Transport_Layer_Security_(EAP-TTLS)&amp;lt;/ref&amp;gt; and EAP-PEAP&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Protected_Extensible_Authentication_Protocol&amp;lt;/ref&amp;gt;.&lt;br /&gt;
The EAP-TTLS is a default authentication method.&lt;br /&gt;
&lt;br /&gt;
RADIUS authentication consists of supplicant(user device), NAS(Network Access Server), and the RADIUS server. &lt;br /&gt;
The user or machine sends a request to a Network Access Server (NAS) to gain access to a particular network resource using access credentials. The NAS sends a RADIUS Access-Request message to the RADIUS server, requesting authorization to grant access via the RADIUS protocol. The RADIUS server checks that the information is correct.&lt;br /&gt;
&lt;br /&gt;
[[File:Drawing_RADIUS_1812.svg.png|400px|thumb|RADIUS Authentication and Authorization Flow&amp;lt;ref name='radius-wiki' /&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
The imRAD was developed based on the '''[https://wiki.freeradius.org/Home FreeRADIUS]''' and provides the most of RADIUS services.&lt;br /&gt;
Our system can authenticate a User-Name in a Local database, remote databases, or LDAP servers, and Proxy servers.&lt;br /&gt;
The following is the supporting remote DBMS or LDAP.&lt;br /&gt;
* MariaDB&lt;br /&gt;
* MySql&lt;br /&gt;
* Oracle 11g ~ 19c&lt;br /&gt;
* Microsoft SQL Server 2014 ~ 2019&lt;br /&gt;
* Tibero 6&lt;br /&gt;
* PostgreSQL 12&lt;br /&gt;
* SYBASE&lt;br /&gt;
* OpenLDAP&lt;br /&gt;
* Microsoft Active Directory Domain service(AD DS)&lt;br /&gt;
* Microsoft Active Directory Lightweight directory service(AD LDS)&lt;br /&gt;
&lt;br /&gt;
Using an '''[[Authentication DB | external Database]]''' makes it possible to authenticate directly a user through it(e.g, Customer employee database) without importing data from the remote database to the imRAD local database.&amp;lt;br&amp;gt;&lt;br /&gt;
In the environment of user authentication via an '''[[Authentication DB | external Database]]''', it may increase network traffic to the external database and slow down the database.&amp;lt;br&amp;gt;&lt;br /&gt;
To resolve this, the user credentials that were authenticated from an external database are saved into the local database for few days(You can set how many days the cached users are kept in the local database from the [[RADIUS Settings - General | RADIUS general settings]]). And then, authentication requests will not be sent to the external database but be completed in the local database. We called it &amp;quot;cached user&amp;quot;.&amp;lt;br&amp;gt;&lt;br /&gt;
To securely save the User-password into the local database, it is saved as hashed data using the strong hash algorithm(e.g, SHA256 with salt).&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:pta.png]]&lt;br /&gt;
&lt;br /&gt;
Supporting TLS(Transport Layer Security) version is between 1.0 and 1.3 and can be changed the minimum and the maximum version from the [[RADIUS Settings - General | RADIUS general settings]].&lt;br /&gt;
You must make sure the TLS version because some client operating systems still use TLS 1.0.&lt;br /&gt;
&lt;br /&gt;
RADIUS Proxying is that the server can proxy any request to other RADIUS servers and other RADIUS servers can authenticate the proxying request.&amp;lt;ref&amp;gt;https://wiki.freeradius.org/features/Proxy&amp;lt;/ref&amp;gt;&lt;br /&gt;
A famous proxying is eduroam(education roaming)&amp;lt;ref&amp;gt;https://www.eduroam.org/what-is-eduroam/&amp;lt;/ref&amp;gt; and a user can be authenticated at an eduroam server using the RADIUS Proxying.&lt;br /&gt;
&lt;br /&gt;
An [[Authentication DB | external database]] authentication and a RADIUS Proxying can be restricted by a NAS Identifier(NAS-ID) and you can also set this policy on RADIUS&amp;gt; Settings&amp;gt; [[Authentication DB]] or [[Realm and proxy|Realms/Proxys]] menu.&lt;br /&gt;
&lt;br /&gt;
=== Configuring RADIUS ===&lt;br /&gt;
===== Getting started =====&lt;br /&gt;
Basically, to authenticate a user's device that is in the 802.1x environment, Follow the below instruction.&lt;br /&gt;
&lt;br /&gt;
# Register the IP address of an imRAD N1 and the shared secret at a [[NAS]].&lt;br /&gt;
# Register the IP address of a [[NAS]] and the same shared secret at the [[NAS setting | RADIUS &amp;gt; settings &amp;gt; NAS]] .&lt;br /&gt;
&lt;br /&gt;
After doing the above, the imRAD RADIUS can process the requests from the [[NAS]] that was registered.&lt;br /&gt;
If you want to test a device(e.g, smartphone, tablet, laptop computer, and so on), please refer to the [[RADIUS Authentication testing]].&lt;br /&gt;
&lt;br /&gt;
=====  [[RADIUS Users|Users]]=====&lt;br /&gt;
It manages 802.1x Users.&lt;br /&gt;
&lt;br /&gt;
===== [[Reject2ban]] =====&lt;br /&gt;
It is designed to reduce the load on the databases from random requests of a malicious client.&lt;br /&gt;
&lt;br /&gt;
===== [[RADIUS Groups|Groups]]=====&lt;br /&gt;
It is the RADIUS User groups.&lt;br /&gt;
&lt;br /&gt;
=====[[Attributes]]=====&lt;br /&gt;
It provides a manager can search the attributes used in RADIUS.&lt;br /&gt;
&lt;br /&gt;
===== Log =====&lt;br /&gt;
* [[RADIUS Log | Accounting]]: It displays all Accounting.&lt;br /&gt;
* [[RADIUS Log | Post-Authentication]]: It displays all log after attempting authentication.&lt;br /&gt;
* [[Reject2ban]]: It displays the Reject2ban log.&lt;br /&gt;
&lt;br /&gt;
=====Settings=====&lt;br /&gt;
All settings for the RADIUS can be configured on this menu. After configuring something, the radiusd service will automatically apply the changed values in few seconds without an administrator manually restart the radiusd service.&lt;br /&gt;
If you want to radiusd service can forcibly apply the changed value, click the &amp;quot;Apply&amp;quot; button at the bottom of this menu.&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[RADIUS Settings - General | General]]======&lt;br /&gt;
You can configure Data Maintenance, Password complexity for RADIUS User-Password, EAP, RADIUS general configuration, and Reject2ban.&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[NAS setting | NAS]]======&lt;br /&gt;
As a feature for managing the Network Access Server, you can add or remove wireless LAN controllers or Access Points (APs).&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[Realm and proxy|Realm/Proxy]]======&lt;br /&gt;
It manages Proxy servers and Realm for the Proxy Authentication.&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[Authentication DB]]======&lt;br /&gt;
Configure local or external database connection attributes for user authentication.&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[LDAP]]======&lt;br /&gt;
Configure LDAP(Lightweight Directory Access Protocol) or AD(Active Directory) server connection attributes for user authentication.&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[NAS Identifier|NAS-ID]]======&lt;br /&gt;
It manages automatically collected NAS-ID (SSID).&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[Captive portal]]======&lt;br /&gt;
This is an interface that allows you to create pages for wireless LAN usage instructions and wireless LAN user registration when using Captive Portal.&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Captive_portal&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[RADIUS Authentication testing]]======&lt;br /&gt;
It shows several EAP methods for operating system-specific authentication tests.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=ImRAD_N1_overview&amp;diff=2103</id>
		<title>ImRAD N1 overview</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=ImRAD_N1_overview&amp;diff=2103"/>
		<updated>2024-06-01T09:18:09Z</updated>

		<summary type="html">&lt;p&gt;Shin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The imRAD® N1(v1.1.1) was developed by [https://www.basein.net Basein Networks, Inc.]&amp;lt;ref&amp;gt;https://www.basein.net&amp;lt;/ref&amp;gt; and provides the RADIUS(Remote Authentication Dial-In User Service) and DHCPv4/6 server services.&lt;br /&gt;
RADIUS provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service and it is the back-end of choice for 802.1X authentication as well&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/RADIUS&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
WPA(Wi-Fi Protected Access)-Enterprise is designed for enterprise networks and requires a RADIUS authentication server. This requires a more complicated setup but provides additional security (e.g. protection against dictionary attacks on short passwords). &amp;lt;br&amp;gt;&lt;br /&gt;
Various kinds of the Extensible Authentication Protocol (EAP) are used for authentication. WPA-Enterprise mode is available with both WPA and WPA2&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The imRAD® N1 also provides the Dynamic Host Configuration Protocol (DHCP) service to dynamically assign IP addresses to DHCP clients. With this DHCP server, you can experience new features such as &amp;quot;[[DHCP_Pool_configuration#DHCP_Reservation | Auto Reservation]]&amp;quot;, &amp;quot;[[DHCP_Pool_configuration#DHCP_Reservation | Username Reservation]]&amp;quot;, &amp;quot;[[DHCP_Settings_-_General | Cleanup Dormant Reservation]]&amp;quot;, &amp;quot;[[ImRAD_DHCP#Force_Release | Force release]]&amp;quot;, and so on.&lt;br /&gt;
{{note|You can operate both RADIUS and DHCP services, and you can also serve only one of them.}}&lt;br /&gt;
[[File:imrad-eng.png|700px]]&lt;br /&gt;
&lt;br /&gt;
[[RADIUS Overview | imRAD N1 RADIUS Overview]] and [[DHCP Overview | imRAD N1 DHCP Overview]] sections describe more technical overviews.&lt;br /&gt;
&lt;br /&gt;
[[:File:imRAD_catalogue_eng_v2.pdf]]&lt;br /&gt;
&lt;br /&gt;
For more about the imRAD®, Please send an email to [mailto:techqna@basein.net techqna@basein.net]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Users&amp;diff=2102</id>
		<title>RADIUS Users</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Users&amp;diff=2102"/>
		<updated>2023-12-18T02:43:10Z</updated>

		<summary type="html">&lt;p&gt;Shin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Users ===&lt;br /&gt;
You can add, update, or delete the usernames for the RADIUS authentication.&lt;br /&gt;
&lt;br /&gt;
==== Create New User ====&lt;br /&gt;
You can add a new user at the top right of the page and can create a user as either a Username authentication or a [[MAC Address]] authentication.&lt;br /&gt;
The Username authentication stores a User-Name and User-Password and the credentials are validated with the two attributes to authenticate an ACCESS-REQUEST.&amp;lt;br&amp;gt;&lt;br /&gt;
The MAC address authentication store a MAC address of a user machine and the credentials are validated with the address. The MAC address type is applied usually in the environment of an open wireless network.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Username / MAC Authentication&lt;br /&gt;
|-&lt;br /&gt;
! style='width:150px' | Item !! Required !! Description !! remarks&lt;br /&gt;
|-&lt;br /&gt;
| Username|| Yes || The multibyte characters(e.g, korean, japaneses) are not allowed. || username authentication  only&lt;br /&gt;
|-&lt;br /&gt;
| Status || Yes || Select &amp;quot;authorized&amp;quot; ||&lt;br /&gt;
|-&lt;br /&gt;
| User-Type || Yes || Select a user-type. An external user means that the username and password locates in an external database(normally a customer database). If you select the &amp;quot;external user&amp;quot;, you can't set the password because this username is used only for applying additional attributes.&amp;lt;ref&amp;gt;If you switch on the RADIUS &amp;gt; Settings &amp;gt; General&amp;gt; [[RADIUS Settings - General | cached user]], the user passwords will be filled using strong encryption algorithm and usernames are also used for authentication.&amp;lt;/ref&amp;gt; In other words, an external username is not authenticated by itself without connecting to an external authentication database.  || username authentication  only&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Password Type || Yes || It is the encryption method of a password. If a user machine is windows 10, the type must be either the Windows NT hashed passwords or clear-text passwords. || username authentication  only&lt;br /&gt;
|-&lt;br /&gt;
| Password&amp;lt;br&amp;gt;Confirm Password|| Yes || Input the password of a username. || username authentication only&lt;br /&gt;
|-&lt;br /&gt;
| MAC Address || Yes || The [[MAC Address]] of a user machine. The address is case-sensitive and also may include delimiters and you can find the format of the MAC address from the [[Accounting]]. || MAC authentication only&lt;br /&gt;
|-&lt;br /&gt;
| Expiration || No || Set the user authentication expiration date. || &lt;br /&gt;
|-&lt;br /&gt;
| Auto-Associate MAC Address || No || Refer to [[#mac-asso|&amp;quot;Auto-Associate MAC Address&amp;quot;]].&lt;br /&gt;
|-&lt;br /&gt;
| User Information || Optional || You can fill out the general user informations. The requirement of this field depends on &amp;quot;Environment &amp;gt; [[Environment | Custom Fields]]&amp;quot;. ||&lt;br /&gt;
|-&lt;br /&gt;
| Group || No || A group to which the user. || &lt;br /&gt;
|-&lt;br /&gt;
| Additional Attributes || No || You can add more attributes for authentication or reply. You done't need to add additional attributes at this step because they can be added after creating a user. ||&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== User Authorization, Updating, and Deleting ====&lt;br /&gt;
A username that was registered from the captive portal page will be added as an un-authorized one. You can authorize it by click the [[File:popup.png|23x]] icon in front of each row.&lt;br /&gt;
Within the same interface, you can also change other information and delete a user.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;span id='mac-asso'&amp;gt;Auto-Associate MAC Address&amp;lt;/span&amp;gt; ====&lt;br /&gt;
When a created user undergoes initial authentication, the MAC address (calling-station-id) of the client at that time is automatically included in the 'additional authentication attribute.' Using this function, when the MAC address is associated, user identification requires the initial authenticated client's MAC address to match, in addition to the username and password.&lt;br /&gt;
&lt;br /&gt;
Auto-Associate of MAC addresses is only done automatically when there is no existing calling-station-id. To add two or more MAC addresses (calling-station-id), use the 'additional attributes' or refer to the detailed information in the 'Recent Post-Authentication.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Additional Attributes ====&lt;br /&gt;
===== Authentication Attributes =====&lt;br /&gt;
Authentication attributes are pieces of information used in RADIUS authentication in addition to the basic information (User-Name, User-Password). For useful authentication attributes, refer to the [[Attributes]] section.&lt;br /&gt;
&lt;br /&gt;
===== Reply Attributes =====&lt;br /&gt;
Reply attributes refer to the attributes provided to the user after RADIUS authentication. For useful reply attributes, refer to the [[Attributes]] section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Recent Post-Authentication ====&lt;br /&gt;
It displays the user's recent approval/disapproval history, and clicking on the icon at the beginning of the list allows you to view detailed authentication processing information. Clicking the 'Associate MAC Address' button enables the registration of the calling-station-id as an additional authentication attribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Password Reset ====&lt;br /&gt;
You can reset the password of registered users.&lt;br /&gt;
&lt;br /&gt;
When a user's password is reset, the previous password becomes unusable, and a temporary password is issued. The use of such temporary passwords and the password reset feature can be configured in RADIUS &amp;gt; Settings &amp;gt; General &amp;gt; [[RADIUS Settings - General | Password Complexity Requirements for RADIUS User-Password]]. If the password reset feature is inactive (default state), users cannot use the password reset function.&lt;br /&gt;
&lt;br /&gt;
When a password is reset, the user must create a new password using the temporary password on the password change page. For more details, refer to RADIUS &amp;gt; Settings &amp;gt; General &amp;gt; [[RADIUS Settings - General | Password Complexity Requirements for RADIUS User-Password]].&lt;br /&gt;
&lt;br /&gt;
{{note|Passwords for users authenticated based on MAC address or stored in an external database as &amp;quot;[[RADIUS Settings - General | cached user]]&amp;quot; cannot be reset.}}&lt;br /&gt;
&lt;br /&gt;
==== Expiration ====&lt;br /&gt;
Users with a specified expiration time that has passed will not be granted authentication (Access-Reject), and this information will not be automatically deleted.&amp;quot;&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2101</id>
		<title>Attributes</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2101"/>
		<updated>2023-11-29T05:28:46Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* Useful User and Group Reply Attributes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Attributes ===&lt;br /&gt;
Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which are stored on the RADIUS program.&lt;br /&gt;
&lt;br /&gt;
RADIUS Internet Engineering Task Force (IETF) attributes are the original set of 255 standard attributes that are used to communicate AAA information between a client and a server. The IETF attributes are standard and the attribute data is predefined. All clients and servers that exchange AAA information using IETF attributes must agree on attribute data such as the exact meaning of the attributes and the general bounds of the values for each attribute.&amp;lt;ref&amp;gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_radatt/configuration/xe-16/sec-usr-radatt-xe-16-book/sec-rad-ov-ietf-attr.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can search for one or more attributes in this menu.&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Authentication Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Allow || := || 1 ||  When not using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to allow 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Deny || := || 1 || When using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to deny 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| Login-Time || += || text || The Login-Time attribute defines the time span during which a user may login to the system and can deny the authentication on specified days/times. It also allows for automatic termination of wireless LAN connections if they are already established after the specified end time. However, adding this attribute later to a device already connected to the wireless LAN may not result in automatic disconnection.&lt;br /&gt;
{{note| Wireless equipment needs to support Session-Timeout attribute for automatic disconnection.}}&lt;br /&gt;
You should define time strings using the &amp;quot;Day%H%M-Day%H%M&amp;quot; format. Days can be Mo, Tu, We, Th, Fr, Sa, or Su, with &amp;quot;Wk&amp;quot; for weekdays and &amp;quot;Any&amp;quot; for all days. &amp;lt;ref&amp;gt;https://networkradius.com/doc/current/raddb/mods-available/logintime.html&amp;lt;/ref&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;quot;%H&amp;quot; represents the hours in the range from 00 to 23, and &amp;quot;%M&amp;quot; represents the minutes in the range from 00 to 59.&amp;lt;br&amp;gt;&lt;br /&gt;
If you omit &amp;quot;%H&amp;quot; and &amp;quot;%M&amp;quot; in a time string format, it indicates &amp;quot;any time&amp;quot;, allowing for any hour and any minute.&lt;br /&gt;
&lt;br /&gt;
{{note|Multiple time strings may be a list of simple time strings separated by &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;}}&lt;br /&gt;
For examples) &lt;br /&gt;
* Wk0900-1800 // Authentication is possible from Monday to Friday, between 9:00 AM and 6:00 PM.&lt;br /&gt;
* Wk0900-1800, Sa0900-1200 // Authentication is possible from Monday to Friday between 9:00 AM and 6:00 PM and on Saturday only between 9:00 AM and 12:00 PM.&lt;br /&gt;
* Any0900-1800 // Authentication is possible everyday between 9:00 AM and 6:00 PM&lt;br /&gt;
* Any0900-1800, We2000-2100 //Authentication is possible everyday between 9:00 AM and 6:00 PM, and on Wednesday only between 8:00 PM and 9:00 PM.&lt;br /&gt;
* Sa // Authentication is possible every Saturday at any time.&lt;br /&gt;
* Any // Always(Default)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| User-Login-Time || := || text || It is similar to the Login-Time attribute. however, it is an exclusive attribute that does not affect users if they are part of a specific group with its own Login-Time attribute. &amp;lt;br&amp;gt; '''This attribute applies only to users.'''&lt;br /&gt;
|-&lt;br /&gt;
| Group-Login-Time || := || text || It is also similar to the Login-Time attribute but acts as an exclusive attribute that takes precedence over Login-Time attributes for users who are part of a group, even if they have their own Login-Time attribute. However, if a user has a User-Login-Time attribute, Group-Login-Time will not be applied (User-Login-Time takes the highest priority). &amp;lt;br&amp;gt; '''This attribute applies only to groups.'''&lt;br /&gt;
|-&lt;br /&gt;
| Login-Time-Nas-Identifier ||  ''':=''' || ssid ||  The attribute implies that time-based authentication is applied only when the user is connected through a specific SSID, and it can be defined as Login-Time, User-Login-Time, or Group-Login-Time. To define multiple SSIDs, use &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;.&amp;lt;br&amp;gt;&lt;br /&gt;
For examples)&lt;br /&gt;
* my-ssid-A &amp;lt;br&amp;gt;&lt;br /&gt;
* my-ssid-A &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; my-ssid-B&lt;br /&gt;
|-&lt;br /&gt;
| Calling-Station-Id || =~ || mac address1 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; mac address2 ... || It is used to include the user's device MAC address for user identification during authentication. If this attribute is included, user authentication requires a match in Username, User-Password, and MAC address. You can use the &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; symbol to define multiple MAC addresses. When entering MAC addresses, use lowercase letters without separators. &lt;br /&gt;
For examples)&lt;br /&gt;
* 0000aaaa2222&lt;br /&gt;
* 0000aaaa2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000aaaa3333 // 2 MAC addresses&lt;br /&gt;
* ^bbbb22 // MAC address begins with &amp;quot;bbbb22&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
* 0000bbbb2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; ^bbbb22 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 // Multiple MAC addresses&lt;br /&gt;
&lt;br /&gt;
{{note|MAC addresses are in hexadecimal, and you should enter them in lowercase without any separators. When including multiple MAC addresses, be sure to separate them using &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; within a single Calling-Station-Id attribute. If multiple MAC addresses are defined, authentication will succeed if any one of them matches.}}&lt;br /&gt;
|-&lt;br /&gt;
| Nas-Identifier || =~ || ssid || You can specify the SSID when authenticating individual users and users included in a group. In other words, authentication will only proceed if the user connects through a specific SSID. To define multiple SSIDs, use &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;.&amp;lt;br&amp;gt;&lt;br /&gt;
For examples)&lt;br /&gt;
* my-ssid-A&lt;br /&gt;
* my-ssid-A &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; my-ssid-B&lt;br /&gt;
|-&lt;br /&gt;
| Expiration || := || datetime || This can be set in user or group attributes and refers to the authentication expiration time. When the time for this attribute expires, authentication for the user with this attribute or users belonging to groups that include this attribute will be denied.&lt;br /&gt;
&lt;br /&gt;
The expiration time should be defined in the format &amp;quot;%b %d %Y %H:%M:%S %Z.&amp;quot; &amp;lt;br&amp;gt;&lt;br /&gt;
For example: Oct 20 2023 14:00:00 KST&lt;br /&gt;
&lt;br /&gt;
{{note | To set the expiration time for individual users, specify &amp;quot;Expiration&amp;quot; in the detailed information of the [[RADIUS Users]] page, and then this attribute will be automatically added, so use that interface.}}&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Reply Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Session-Timeout || := || 3600~86400(second) || It refers to the Session-Timeout of a user connected to the wireless LAN, and when this time elapses, a new wireless LAN encryption key is generated to maintain a secure wireless LAN connection. In a typical WPA-Enterprise environment through a wireless LAN authentication server, keys are generated securely to maintain an encrypted channel. However, to ensure an even more secure encrypted channel, you can use this attribute.&lt;br /&gt;
|-&lt;br /&gt;
| Tunnel-Medium-Type || := || 6 || 802 (includes all 802 media plus Ethernet “canonical format”)&lt;br /&gt;
|-&lt;br /&gt;
| Tunnel-Private-Group-Id || := || VLAN ID || It includes the VLAN ID or name and accommodates a string length of up&lt;br /&gt;
to 253 characters.&lt;br /&gt;
|-&lt;br /&gt;
| Tunnel-Type|| := || 13 || Virtual LANs (VLAN)&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
To assign a specific VLAN to a user or users in a group, include Tunnel-Medium-Type, Tunnel-Private-Group-Id, and Tunnel-Type in the repply attributes.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2100</id>
		<title>Attributes</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2100"/>
		<updated>2023-11-27T08:05:04Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* Useful User and Group Authentication Attributes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Attributes ===&lt;br /&gt;
Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which are stored on the RADIUS program.&lt;br /&gt;
&lt;br /&gt;
RADIUS Internet Engineering Task Force (IETF) attributes are the original set of 255 standard attributes that are used to communicate AAA information between a client and a server. The IETF attributes are standard and the attribute data is predefined. All clients and servers that exchange AAA information using IETF attributes must agree on attribute data such as the exact meaning of the attributes and the general bounds of the values for each attribute.&amp;lt;ref&amp;gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_radatt/configuration/xe-16/sec-usr-radatt-xe-16-book/sec-rad-ov-ietf-attr.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can search for one or more attributes in this menu.&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Authentication Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Allow || := || 1 ||  When not using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to allow 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Deny || := || 1 || When using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to deny 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| Login-Time || += || text || The Login-Time attribute defines the time span during which a user may login to the system and can deny the authentication on specified days/times. It also allows for automatic termination of wireless LAN connections if they are already established after the specified end time. However, adding this attribute later to a device already connected to the wireless LAN may not result in automatic disconnection.&lt;br /&gt;
{{note| Wireless equipment needs to support Session-Timeout attribute for automatic disconnection.}}&lt;br /&gt;
You should define time strings using the &amp;quot;Day%H%M-Day%H%M&amp;quot; format. Days can be Mo, Tu, We, Th, Fr, Sa, or Su, with &amp;quot;Wk&amp;quot; for weekdays and &amp;quot;Any&amp;quot; for all days. &amp;lt;ref&amp;gt;https://networkradius.com/doc/current/raddb/mods-available/logintime.html&amp;lt;/ref&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;quot;%H&amp;quot; represents the hours in the range from 00 to 23, and &amp;quot;%M&amp;quot; represents the minutes in the range from 00 to 59.&amp;lt;br&amp;gt;&lt;br /&gt;
If you omit &amp;quot;%H&amp;quot; and &amp;quot;%M&amp;quot; in a time string format, it indicates &amp;quot;any time&amp;quot;, allowing for any hour and any minute.&lt;br /&gt;
&lt;br /&gt;
{{note|Multiple time strings may be a list of simple time strings separated by &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;}}&lt;br /&gt;
For examples) &lt;br /&gt;
* Wk0900-1800 // Authentication is possible from Monday to Friday, between 9:00 AM and 6:00 PM.&lt;br /&gt;
* Wk0900-1800, Sa0900-1200 // Authentication is possible from Monday to Friday between 9:00 AM and 6:00 PM and on Saturday only between 9:00 AM and 12:00 PM.&lt;br /&gt;
* Any0900-1800 // Authentication is possible everyday between 9:00 AM and 6:00 PM&lt;br /&gt;
* Any0900-1800, We2000-2100 //Authentication is possible everyday between 9:00 AM and 6:00 PM, and on Wednesday only between 8:00 PM and 9:00 PM.&lt;br /&gt;
* Sa // Authentication is possible every Saturday at any time.&lt;br /&gt;
* Any // Always(Default)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| User-Login-Time || := || text || It is similar to the Login-Time attribute. however, it is an exclusive attribute that does not affect users if they are part of a specific group with its own Login-Time attribute. &amp;lt;br&amp;gt; '''This attribute applies only to users.'''&lt;br /&gt;
|-&lt;br /&gt;
| Group-Login-Time || := || text || It is also similar to the Login-Time attribute but acts as an exclusive attribute that takes precedence over Login-Time attributes for users who are part of a group, even if they have their own Login-Time attribute. However, if a user has a User-Login-Time attribute, Group-Login-Time will not be applied (User-Login-Time takes the highest priority). &amp;lt;br&amp;gt; '''This attribute applies only to groups.'''&lt;br /&gt;
|-&lt;br /&gt;
| Login-Time-Nas-Identifier ||  ''':=''' || ssid ||  The attribute implies that time-based authentication is applied only when the user is connected through a specific SSID, and it can be defined as Login-Time, User-Login-Time, or Group-Login-Time. To define multiple SSIDs, use &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;.&amp;lt;br&amp;gt;&lt;br /&gt;
For examples)&lt;br /&gt;
* my-ssid-A &amp;lt;br&amp;gt;&lt;br /&gt;
* my-ssid-A &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; my-ssid-B&lt;br /&gt;
|-&lt;br /&gt;
| Calling-Station-Id || =~ || mac address1 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; mac address2 ... || It is used to include the user's device MAC address for user identification during authentication. If this attribute is included, user authentication requires a match in Username, User-Password, and MAC address. You can use the &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; symbol to define multiple MAC addresses. When entering MAC addresses, use lowercase letters without separators. &lt;br /&gt;
For examples)&lt;br /&gt;
* 0000aaaa2222&lt;br /&gt;
* 0000aaaa2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000aaaa3333 // 2 MAC addresses&lt;br /&gt;
* ^bbbb22 // MAC address begins with &amp;quot;bbbb22&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
* 0000bbbb2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; ^bbbb22 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 // Multiple MAC addresses&lt;br /&gt;
&lt;br /&gt;
{{note|MAC addresses are in hexadecimal, and you should enter them in lowercase without any separators. When including multiple MAC addresses, be sure to separate them using &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; within a single Calling-Station-Id attribute. If multiple MAC addresses are defined, authentication will succeed if any one of them matches.}}&lt;br /&gt;
|-&lt;br /&gt;
| Nas-Identifier || =~ || ssid || You can specify the SSID when authenticating individual users and users included in a group. In other words, authentication will only proceed if the user connects through a specific SSID. To define multiple SSIDs, use &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;.&amp;lt;br&amp;gt;&lt;br /&gt;
For examples)&lt;br /&gt;
* my-ssid-A&lt;br /&gt;
* my-ssid-A &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; my-ssid-B&lt;br /&gt;
|-&lt;br /&gt;
| Expiration || := || datetime || This can be set in user or group attributes and refers to the authentication expiration time. When the time for this attribute expires, authentication for the user with this attribute or users belonging to groups that include this attribute will be denied.&lt;br /&gt;
&lt;br /&gt;
The expiration time should be defined in the format &amp;quot;%b %d %Y %H:%M:%S %Z.&amp;quot; &amp;lt;br&amp;gt;&lt;br /&gt;
For example: Oct 20 2023 14:00:00 KST&lt;br /&gt;
&lt;br /&gt;
{{note | To set the expiration time for individual users, specify &amp;quot;Expiration&amp;quot; in the detailed information of the [[RADIUS Users]] page, and then this attribute will be automatically added, so use that interface.}}&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Reply Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Session-Timeout || := || 3600~86400(second) || It refers to the Session-Timeout of a user connected to the wireless LAN, and when this time elapses, a new wireless LAN encryption key is generated to maintain a secure wireless LAN connection. In a typical WPA-Enterprise environment through a wireless LAN authentication server, keys are generated securely to maintain an encrypted channel. However, to ensure an even more secure encrypted channel, you can use this attribute.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=ImRAD_N1_overview&amp;diff=2099</id>
		<title>ImRAD N1 overview</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=ImRAD_N1_overview&amp;diff=2099"/>
		<updated>2023-11-27T02:41:41Z</updated>

		<summary type="html">&lt;p&gt;Shin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The imRAD® N1(v1.1.1) was developed by [https://www.basein.net Basein Networks, Inc.]&amp;lt;ref&amp;gt;https://www.basein.net&amp;lt;/ref&amp;gt; and provides the RADIUS(Remote Authentication Dial-In User Service) and DHCPv4/6 server services.&lt;br /&gt;
RADIUS provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service and it is the back-end of choice for 802.1X authentication as well&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/RADIUS&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
WPA(Wi-Fi Protected Access)-Enterprise is designed for enterprise networks and requires a RADIUS authentication server. This requires a more complicated setup but provides additional security (e.g. protection against dictionary attacks on short passwords). &amp;lt;br&amp;gt;&lt;br /&gt;
Various kinds of the Extensible Authentication Protocol (EAP) are used for authentication. WPA-Enterprise mode is available with both WPA and WPA2&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The imRAD® N1 also provides the Dynamic Host Configuration Protocol (DHCP) service to dynamically assign IP addresses to DHCP clients. With this DHCP server, you can experience new features such as &amp;quot;[[DHCP_Pool_configuration#DHCP_Reservation | Auto Reservation]]&amp;quot;, &amp;quot;[[DHCP_Pool_configuration#DHCP_Reservation | Username Reservation]]&amp;quot;, &amp;quot;[[DHCP_Settings_-_General | Cleanup Dormant Reservation]]&amp;quot;, &amp;quot;[[ImRAD_DHCP#Force_Release | Force release]]&amp;quot;, and so on.&lt;br /&gt;
{{note|You can operate both RADIUS and DHCP services, and you can also serve only one of them.}}&lt;br /&gt;
[[File:imrad-eng.png|700px]]&lt;br /&gt;
&lt;br /&gt;
[[RADIUS Overview | imRAD N1 RADIUS Overview]] and [[DHCP Overview | imRAD N1 DHCP Overview]] sections describe more technical overviews.&lt;br /&gt;
&lt;br /&gt;
[[:File:imRAD_catalogue_eng_v2.pdf]]&lt;br /&gt;
&lt;br /&gt;
For more about the imRAD®, Please send an email to [mailto:products_tech@basein.net products_tech@basein.net]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Captive_portal&amp;diff=2098</id>
		<title>Captive portal</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Captive_portal&amp;diff=2098"/>
		<updated>2023-11-27T02:36:35Z</updated>

		<summary type="html">&lt;p&gt;Shin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
=== RADIUS&amp;gt; Settings&amp;gt; Captive portal ===&lt;br /&gt;
We provide pages for wireless LAN usage guide, user sign-up, and changing user passwords using Captive Portal functionality, and administrators can directly edit these pages&lt;br /&gt;
&lt;br /&gt;
[[File:스크린샷 2023-11-08 오후 2.36.31.png|200px|thumb|Guide]]&lt;br /&gt;
[[File:스크린샷 2023-11-08 오후 2.36.43.png|200px|thumb|Sign-up]]&lt;br /&gt;
[[File:스크린샷 2023-11-08 오후 2.36.50.png|200px|thumb|Password-Edit]]&lt;br /&gt;
&lt;br /&gt;
==== Pages ====&lt;br /&gt;
* Guide: This is a page for wireless LAN usage instructions and guidance.&lt;br /&gt;
* User Sign-up: This is a page where wireless LAN users can register their username and password, and if you do not wish to use it, they can simply deselect it.&lt;br /&gt;
* Password Edit: This is a page where users can edit their password after it has been [[RADIUS Settings - General | reset]], and if you do not wish to use it, they can simply deselect it.&lt;br /&gt;
&lt;br /&gt;
==== Web server ====&lt;br /&gt;
You can specify the protocol and port for the URL to access through the captive portal. If you choose the HTTPS protocol, the user's browser may encounter a self-signed certificate connection error. Therefore, we recommend using HTTP. Even when using HTTP, the password generated during user registration is securely encrypted and sent to the server.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Sign-Up Approval / Expiration / Group ====&lt;br /&gt;
You can choose whether users will be automatically approved once they register or if an administrator will need to approve them(Manual). User accounts must be approved after registration for wireless authentication to be allowed.&lt;br /&gt;
&lt;br /&gt;
The expiration represents the expiration period of approved user accounts, and the expiration time is set based on the time of application.&lt;br /&gt;
&lt;br /&gt;
The group represents the group that will be automatically assigned to users upon creation. Administrators can predefine specific authentication attributes for the group, allowing them to uniformly apply additional authentication attributes to approved users via the Captive portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Color/Image ====&lt;br /&gt;
You can change the overall color scheme and the image in the top-left corner of the page. To set the color scheme, simply click on 'Details'.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Details&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;width:200px&amp;quot; | Name !! Description&lt;br /&gt;
|-&lt;br /&gt;
| main-bg-primary || Primary background color&lt;br /&gt;
|-&lt;br /&gt;
| main-bg-seondary || Secondary background color&lt;br /&gt;
|-&lt;br /&gt;
| main-h1-color || Title 1 color&lt;br /&gt;
|-&lt;br /&gt;
| main-h2-color || Title 2 color&lt;br /&gt;
|-&lt;br /&gt;
| btn-bg-primary || Button background color&lt;br /&gt;
|-&lt;br /&gt;
| btn-bg-active || Active button background color&lt;br /&gt;
|-&lt;br /&gt;
| btn-color || Button text color&lt;br /&gt;
|-&lt;br /&gt;
| btn-color-active || Active button color&lt;br /&gt;
|-&lt;br /&gt;
| formBox-color || frame box text color&lt;br /&gt;
|-&lt;br /&gt;
| formBox-bg-color || frame box background color&lt;br /&gt;
|-&lt;br /&gt;
| formBox-border-color || frame box border color&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Display Language ====&lt;br /&gt;
We provide Korean and English (additional languages require separate customization).&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;width:200px&amp;quot; | Name !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Title || This title appears at the top of the page and corresponds to the 'Wi-Fi(Wireless Newtwork) Guide' seen in the image. This title is displayed identically on the guide, user sign-up, and password edit pages.&lt;br /&gt;
|-&lt;br /&gt;
| Body || It represents the description below the title and corresponds to 'For a secure wireless...' seen in the image. This description is displayed identically on th guide, user registration, and password change pages.&lt;br /&gt;
|-&lt;br /&gt;
| Guide message || You can specify the content the 'Usage Guide' on the guide page. The content can be written using HTML tags.&lt;br /&gt;
|-&lt;br /&gt;
| Success message || This is the content displayed when 'User Registration' is successfully completed.&lt;br /&gt;
|-&lt;br /&gt;
| Failure message || This is the content displayed when an issue occurs after 'User Registration'.&lt;br /&gt;
|-&lt;br /&gt;
| User Information || These are the details to be collected during 'User Registration.' User ID, password, and password confirmation are mandatory information, and you can optionally configure to collect additional user personal information. &lt;br /&gt;
{{note|Any additional user personal information should be set the same as [[Environment|Custom Fields]] for the correct display of registered user information.}}&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Save / Preview / reset ====&lt;br /&gt;
* Save: it means saving the configured content to the database and generating HTML.&lt;br /&gt;
* Preview: it generates temporary HTML to display the configured content in a new tab. Changes must be saved by clicking the &amp;quot;Save&amp;quot; button to be retained.&lt;br /&gt;
* Reset: it restores all content to its initial state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Captive Portal setting ===&lt;br /&gt;
To set the Captive Portal page of this system on a wireless LAN controller, you should specify it as follows: &amp;lt;br&amp;gt;&lt;br /&gt;
{protocol}://a.b.c.d:{port}/&lt;br /&gt;
&lt;br /&gt;
If {protocol} is HTTP and {port} is 80, then specify it as follows:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&amp;lt;nowiki&amp;gt;http://a.b.c.d/&amp;lt;/nowiki&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To use the Sign-up page as the default, set it to &amp;lt;big&amp;gt;&amp;lt;nowiki&amp;gt;http://a.b.c.d/?2&amp;lt;/nowiki&amp;gt;&amp;lt;/big&amp;gt;, and to use the password edit page as the default, set it to &amp;lt;big&amp;gt;&amp;lt;nowiki&amp;gt;http://a.b.c.d/?4.&amp;lt;/nowiki&amp;gt;&amp;lt;/big&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2097</id>
		<title>Attributes</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2097"/>
		<updated>2023-11-27T02:22:46Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* Useful User and Group Authentication Attributes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Attributes ===&lt;br /&gt;
Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which are stored on the RADIUS program.&lt;br /&gt;
&lt;br /&gt;
RADIUS Internet Engineering Task Force (IETF) attributes are the original set of 255 standard attributes that are used to communicate AAA information between a client and a server. The IETF attributes are standard and the attribute data is predefined. All clients and servers that exchange AAA information using IETF attributes must agree on attribute data such as the exact meaning of the attributes and the general bounds of the values for each attribute.&amp;lt;ref&amp;gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_radatt/configuration/xe-16/sec-usr-radatt-xe-16-book/sec-rad-ov-ietf-attr.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can search for one or more attributes in this menu.&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Authentication Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Allow || := || 1 ||  When not using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to allow 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Deny || := || 1 || When using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to deny 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| Login-Time || += || text || The Login-Time attribute defines the time span during which a user may login to the system and can deny the authentication on specified days/times. It also allows for automatic termination of wireless LAN connections if they are already established after the specified end time. However, adding this attribute later to a device already connected to the wireless LAN may not result in automatic disconnection.&lt;br /&gt;
{{note| Wireless equipment needs to support Session-Timeout attribute for automatic disconnection.}}&lt;br /&gt;
You should define time strings using the &amp;quot;Day%H%M-Day%H%M&amp;quot; format. Days can be Mo, Tu, We, Th, Fr, Sa, or Su, with &amp;quot;Wk&amp;quot; for weekdays and &amp;quot;Any&amp;quot; for all days. &amp;lt;ref&amp;gt;https://networkradius.com/doc/current/raddb/mods-available/logintime.html&amp;lt;/ref&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;quot;%H&amp;quot; represents the hours in the range from 00 to 23, and &amp;quot;%M&amp;quot; represents the minutes in the range from 00 to 59.&amp;lt;br&amp;gt;&lt;br /&gt;
If you omit &amp;quot;%H&amp;quot; and &amp;quot;%M&amp;quot; in a time string format, it indicates &amp;quot;any time&amp;quot;, allowing for any hour and any minute.&lt;br /&gt;
&lt;br /&gt;
{{note|Multiple time strings may be a list of simple time strings separated by &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;}}&lt;br /&gt;
For examples) &lt;br /&gt;
* Wk0900-1800 // Authentication is possible from Monday to Friday, between 9:00 AM and 6:00 PM.&lt;br /&gt;
* Wk0900-1800, Sa0900-1200 // Authentication is possible from Monday to Friday between 9:00 AM and 6:00 PM and on Saturday only between 9:00 AM and 12:00 PM.&lt;br /&gt;
* Any0900-1800 // Authentication is possible everyday between 9:00 AM and 6:00 PM&lt;br /&gt;
* Any0900-1800, We2000-2100 //Authentication is possible everyday between 9:00 AM and 6:00 PM, and on Wednesday only between 8:00 PM and 9:00 PM.&lt;br /&gt;
* Sa // Authentication is possible every Saturday at any time.&lt;br /&gt;
* Any // Always(Default)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| User-Login-Time || := || text || It is similar to the Login-Time attribute. however, it is an exclusive attribute that does not affect users if they are part of a specific group with its own Login-Time attribute. &amp;lt;br&amp;gt; '''This attribute applies only to users.'''&lt;br /&gt;
|-&lt;br /&gt;
| Group-Login-Time || := || text || It is also similar to the Login-Time attribute but acts as an exclusive attribute that takes precedence over Login-Time attributes for users who are part of a group, even if they have their own Login-Time attribute. However, if a user has a User-Login-Time attribute, Group-Login-Time will not be applied (User-Login-Time takes the highest priority). &amp;lt;br&amp;gt; '''This attribute applies only to groups.'''&lt;br /&gt;
|-&lt;br /&gt;
| Login-Time-Nas-Identifier ||  ''':=''' || ssid ||  The attribute implies that time-based authentication is applied only when the user is connected through a specific SSID, and it can be defined as Login-Time, User-Login-Time, or Group-Login-Time. To define multiple SSIDs, use &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;.&amp;lt;br&amp;gt;&lt;br /&gt;
For examples)&lt;br /&gt;
* my-ssid-A &amp;lt;br&amp;gt;&lt;br /&gt;
* my-ssid-A &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; myssid-B&lt;br /&gt;
|-&lt;br /&gt;
| Calling-Station-Id || =~ || mac address1 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; mac address2 ... || It is used to include the user's device MAC address for user identification during authentication. If this attribute is included, user authentication requires a match in Username, User-Password, and MAC address. You can use the &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; symbol to define multiple MAC addresses. When entering MAC addresses, use lowercase letters without separators. &lt;br /&gt;
For examples)&lt;br /&gt;
* 0000aaaa2222&lt;br /&gt;
* 0000aaaa2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000aaaa3333 // 2 MAC addresses&lt;br /&gt;
* ^bbbb22 // MAC address begins with &amp;quot;bbbb22&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
* 0000bbbb2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; ^bbbb22 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 // Multiple MAC addresses&lt;br /&gt;
&lt;br /&gt;
{{note|MAC addresses are in hexadecimal, and you should enter them in lowercase without any separators. When including multiple MAC addresses, be sure to separate them using &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; within a single Calling-Station-Id attribute. If multiple MAC addresses are defined, authentication will succeed if any one of them matches.}}&lt;br /&gt;
|-&lt;br /&gt;
| Nas-Identifier || =~ || ssid || You can specify the SSID when authenticating individual users and users included in a group. In other words, authentication will only proceed if the user connects through a specific SSID. To define multiple SSIDs, use &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;.&amp;lt;br&amp;gt;&lt;br /&gt;
For examples)&lt;br /&gt;
* my-ssid-A&lt;br /&gt;
* my-ssid-A &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; myssid-B&lt;br /&gt;
|-&lt;br /&gt;
| Expiration || := || datetime || This can be set in user or group attributes and refers to the authentication expiration time. When the time for this attribute expires, authentication for the user with this attribute or users belonging to groups that include this attribute will be denied.&lt;br /&gt;
&lt;br /&gt;
The expiration time should be defined in the format &amp;quot;%b %d %Y %H:%M:%S %Z.&amp;quot; &amp;lt;br&amp;gt;&lt;br /&gt;
For example: Oct 20 2023 14:00:00 KST&lt;br /&gt;
&lt;br /&gt;
{{note | To set the expiration time for individual users, specify &amp;quot;Expiration&amp;quot; in the detailed information of the [[RADIUS Users]] page, and then this attribute will be automatically added, so use that interface.}}&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Reply Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Session-Timeout || := || 3600~86400(second) || It refers to the Session-Timeout of a user connected to the wireless LAN, and when this time elapses, a new wireless LAN encryption key is generated to maintain a secure wireless LAN connection. In a typical WPA-Enterprise environment through a wireless LAN authentication server, keys are generated securely to maintain an encrypted channel. However, to ensure an even more secure encrypted channel, you can use this attribute.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Captive_portal&amp;diff=2096</id>
		<title>Captive portal</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Captive_portal&amp;diff=2096"/>
		<updated>2023-11-08T08:39:46Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* Save / preview / reset */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
=== RADIUS&amp;gt; Settings&amp;gt; Captive portal ===&lt;br /&gt;
We provide pages for wireless LAN usage guide, user sign-up, and changing user passwords using Captive Portal functionality, and administrators can directly edit these pages&lt;br /&gt;
&lt;br /&gt;
[[File:스크린샷 2023-11-08 오후 2.36.31.png|200px|thumb|Guide]]&lt;br /&gt;
[[File:스크린샷 2023-11-08 오후 2.36.43.png|200px|thumb|Sign-up]]&lt;br /&gt;
[[File:스크린샷 2023-11-08 오후 2.36.50.png|200px|thumb|Password-Edit]]&lt;br /&gt;
&lt;br /&gt;
==== Pages ====&lt;br /&gt;
* Guide: This is a page for wireless LAN usage instructions and guidance.&lt;br /&gt;
* User Sign-up: This is a page where wireless LAN users can register their username and password, and if you do not wish to use it, they can simply deselect it.&lt;br /&gt;
* Password Edit: This is a page where users can edit their password after it has been [[RADIUS Settings - General | reset]], and if you do not wish to use it, they can simply deselect it.&lt;br /&gt;
&lt;br /&gt;
==== Web server ====&lt;br /&gt;
You can specify the protocol and port for the URL to access through the captive portal. If you choose the HTTPS protocol, the user's browser may encounter a self-signed certificate connection error. Therefore, we recommend using HTTP. Even when using HTTP, the password generated during user registration is securely encrypted and sent to the server.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Sign-Up Approval ====&lt;br /&gt;
You can choose whether users will be automatically approved once they register or if an administrator will need to approve them(Manual). User accounts must be approved after registration for wireless authentication to be allowed.&lt;br /&gt;
&lt;br /&gt;
The expiration represents the expiration period of approved user accounts, and the expiration time is set based on the time of application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Color/Image ====&lt;br /&gt;
You can change the overall color scheme and the image in the top-left corner of the page. To set the color scheme, simply click on 'Details'.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Details&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;width:200px&amp;quot; | Name !! Description&lt;br /&gt;
|-&lt;br /&gt;
| main-bg-primary || Primary background color&lt;br /&gt;
|-&lt;br /&gt;
| main-bg-seondary || Secondary background color&lt;br /&gt;
|-&lt;br /&gt;
| main-h1-color || Title 1 color&lt;br /&gt;
|-&lt;br /&gt;
| main-h2-color || Title 2 color&lt;br /&gt;
|-&lt;br /&gt;
| btn-bg-primary || Button background color&lt;br /&gt;
|-&lt;br /&gt;
| btn-bg-active || Active button background color&lt;br /&gt;
|-&lt;br /&gt;
| btn-color || Button text color&lt;br /&gt;
|-&lt;br /&gt;
| btn-color-active || Active button color&lt;br /&gt;
|-&lt;br /&gt;
| formBox-color || frame box text color&lt;br /&gt;
|-&lt;br /&gt;
| formBox-bg-color || frame box background color&lt;br /&gt;
|-&lt;br /&gt;
| formBox-border-color || frame box border color&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Display Language ====&lt;br /&gt;
We provide Korean and English (additional languages require separate customization).&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;width:200px&amp;quot; | Name !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Title || This title appears at the top of the page and corresponds to the 'Wi-Fi(Wireless Newtwork) Guide' seen in the image. This title is displayed identically on the guide, user sign-up, and password edit pages.&lt;br /&gt;
|-&lt;br /&gt;
| Body || It represents the description below the title and corresponds to 'For a secure wireless...' seen in the image. This description is displayed identically on th guide, user registration, and password change pages.&lt;br /&gt;
|-&lt;br /&gt;
| Guide message || You can specify the content the 'Usage Guide' on the guide page. The content can be written using HTML tags.&lt;br /&gt;
|-&lt;br /&gt;
| Success message || This is the content displayed when 'User Registration' is successfully completed.&lt;br /&gt;
|-&lt;br /&gt;
| Failure message || This is the content displayed when an issue occurs after 'User Registration'.&lt;br /&gt;
|-&lt;br /&gt;
| User Information || These are the details to be collected during 'User Registration.' User ID, password, and password confirmation are mandatory information, and you can optionally configure to collect additional user personal information. &lt;br /&gt;
{{note|Any additional user personal information should be set the same as [[Environment|Custom Fields]] for the correct display of registered user information.}}&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Save / Preview / reset ====&lt;br /&gt;
* Save: it means saving the configured content to the database and generating HTML.&lt;br /&gt;
* Preview: it generates temporary HTML to display the configured content in a new tab. Changes must be saved by clicking the &amp;quot;Save&amp;quot; button to be retained.&lt;br /&gt;
* Reset: it restores all content to its initial state.&lt;br /&gt;
&lt;br /&gt;
=== Captive Portal setting ===&lt;br /&gt;
To set the Captive Portal page of this system on a wireless LAN controller, you should specify it as follows: &amp;lt;br&amp;gt;&lt;br /&gt;
{protocol}://a.b.c.d:{port}/&lt;br /&gt;
&lt;br /&gt;
If {protocol} is HTTP and {port} is 80, then specify it as follows:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&amp;lt;nowiki&amp;gt;http://a.b.c.d/&amp;lt;/nowiki&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To use the Sign-up page as the default, set it to &amp;lt;big&amp;gt;&amp;lt;nowiki&amp;gt;http://a.b.c.d/?2&amp;lt;/nowiki&amp;gt;&amp;lt;/big&amp;gt;, and to use the password edit page as the default, set it to &amp;lt;big&amp;gt;&amp;lt;nowiki&amp;gt;http://a.b.c.d/?4.&amp;lt;/nowiki&amp;gt;&amp;lt;/big&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Captive_portal&amp;diff=2095</id>
		<title>Captive portal</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Captive_portal&amp;diff=2095"/>
		<updated>2023-11-08T08:38:17Z</updated>

		<summary type="html">&lt;p&gt;Shin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
=== RADIUS&amp;gt; Settings&amp;gt; Captive portal ===&lt;br /&gt;
We provide pages for wireless LAN usage guide, user sign-up, and changing user passwords using Captive Portal functionality, and administrators can directly edit these pages&lt;br /&gt;
&lt;br /&gt;
[[File:스크린샷 2023-11-08 오후 2.36.31.png|200px|thumb|Guide]]&lt;br /&gt;
[[File:스크린샷 2023-11-08 오후 2.36.43.png|200px|thumb|Sign-up]]&lt;br /&gt;
[[File:스크린샷 2023-11-08 오후 2.36.50.png|200px|thumb|Password-Edit]]&lt;br /&gt;
&lt;br /&gt;
==== Pages ====&lt;br /&gt;
* Guide: This is a page for wireless LAN usage instructions and guidance.&lt;br /&gt;
* User Sign-up: This is a page where wireless LAN users can register their username and password, and if you do not wish to use it, they can simply deselect it.&lt;br /&gt;
* Password Edit: This is a page where users can edit their password after it has been [[RADIUS Settings - General | reset]], and if you do not wish to use it, they can simply deselect it.&lt;br /&gt;
&lt;br /&gt;
==== Web server ====&lt;br /&gt;
You can specify the protocol and port for the URL to access through the captive portal. If you choose the HTTPS protocol, the user's browser may encounter a self-signed certificate connection error. Therefore, we recommend using HTTP. Even when using HTTP, the password generated during user registration is securely encrypted and sent to the server.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Sign-Up Approval ====&lt;br /&gt;
You can choose whether users will be automatically approved once they register or if an administrator will need to approve them(Manual). User accounts must be approved after registration for wireless authentication to be allowed.&lt;br /&gt;
&lt;br /&gt;
The expiration represents the expiration period of approved user accounts, and the expiration time is set based on the time of application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Color/Image ====&lt;br /&gt;
You can change the overall color scheme and the image in the top-left corner of the page. To set the color scheme, simply click on 'Details'.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Details&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;width:200px&amp;quot; | Name !! Description&lt;br /&gt;
|-&lt;br /&gt;
| main-bg-primary || Primary background color&lt;br /&gt;
|-&lt;br /&gt;
| main-bg-seondary || Secondary background color&lt;br /&gt;
|-&lt;br /&gt;
| main-h1-color || Title 1 color&lt;br /&gt;
|-&lt;br /&gt;
| main-h2-color || Title 2 color&lt;br /&gt;
|-&lt;br /&gt;
| btn-bg-primary || Button background color&lt;br /&gt;
|-&lt;br /&gt;
| btn-bg-active || Active button background color&lt;br /&gt;
|-&lt;br /&gt;
| btn-color || Button text color&lt;br /&gt;
|-&lt;br /&gt;
| btn-color-active || Active button color&lt;br /&gt;
|-&lt;br /&gt;
| formBox-color || frame box text color&lt;br /&gt;
|-&lt;br /&gt;
| formBox-bg-color || frame box background color&lt;br /&gt;
|-&lt;br /&gt;
| formBox-border-color || frame box border color&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Display Language ====&lt;br /&gt;
We provide Korean and English (additional languages require separate customization).&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;width:200px&amp;quot; | Name !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Title || This title appears at the top of the page and corresponds to the 'Wi-Fi(Wireless Newtwork) Guide' seen in the image. This title is displayed identically on the guide, user sign-up, and password edit pages.&lt;br /&gt;
|-&lt;br /&gt;
| Body || It represents the description below the title and corresponds to 'For a secure wireless...' seen in the image. This description is displayed identically on th guide, user registration, and password change pages.&lt;br /&gt;
|-&lt;br /&gt;
| Guide message || You can specify the content the 'Usage Guide' on the guide page. The content can be written using HTML tags.&lt;br /&gt;
|-&lt;br /&gt;
| Success message || This is the content displayed when 'User Registration' is successfully completed.&lt;br /&gt;
|-&lt;br /&gt;
| Failure message || This is the content displayed when an issue occurs after 'User Registration'.&lt;br /&gt;
|-&lt;br /&gt;
| User Information || These are the details to be collected during 'User Registration.' User ID, password, and password confirmation are mandatory information, and you can optionally configure to collect additional user personal information. &lt;br /&gt;
{{note|Any additional user personal information should be set the same as [[Environment|Custom Fields]] for the correct display of registered user information.}}&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Save / preview / reset ====&lt;br /&gt;
* Save: it means saving the configured content to the database and generating HTML.&lt;br /&gt;
* preview: it generates temporary HTML to display the configured content in a new tab. Changes must be saved by clicking the &amp;quot;Save&amp;quot; button to be retained.&lt;br /&gt;
* Reset: it restores all content to its initial state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Captive Portal setting ===&lt;br /&gt;
To set the Captive Portal page of this system on a wireless LAN controller, you should specify it as follows: &amp;lt;br&amp;gt;&lt;br /&gt;
{protocol}://a.b.c.d:{port}/&lt;br /&gt;
&lt;br /&gt;
If {protocol} is HTTP and {port} is 80, then specify it as follows:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&amp;lt;nowiki&amp;gt;http://a.b.c.d/&amp;lt;/nowiki&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To use the Sign-up page as the default, set it to &amp;lt;big&amp;gt;&amp;lt;nowiki&amp;gt;http://a.b.c.d/?2&amp;lt;/nowiki&amp;gt;&amp;lt;/big&amp;gt;, and to use the password edit page as the default, set it to &amp;lt;big&amp;gt;&amp;lt;nowiki&amp;gt;http://a.b.c.d/?4.&amp;lt;/nowiki&amp;gt;&amp;lt;/big&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Captive_portal&amp;diff=2094</id>
		<title>Captive portal</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Captive_portal&amp;diff=2094"/>
		<updated>2023-11-08T08:30:29Z</updated>

		<summary type="html">&lt;p&gt;Shin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
=== RADIUS&amp;gt; Settings&amp;gt; Captive portal ===&lt;br /&gt;
We provide pages for wireless LAN usage guide, user sign-up, and changing user passwords using Captive Portal functionality, and administrators can directly edit these pages&lt;br /&gt;
&lt;br /&gt;
[[File:스크린샷 2023-11-08 오후 2.36.31.png|200px|thumb|Guide]]&lt;br /&gt;
[[File:스크린샷 2023-11-08 오후 2.36.43.png|200px|thumb|Sign-up]]&lt;br /&gt;
[[File:스크린샷 2023-11-08 오후 2.36.50.png|200px|thumb|Password-Edit]]&lt;br /&gt;
&lt;br /&gt;
==== Pages ====&lt;br /&gt;
* Guide: This is a page for wireless LAN usage instructions and guidance.&lt;br /&gt;
* User Sign-up: This is a page where wireless LAN users can register their username and password, and if you do not wish to use it, they can simply deselect it.&lt;br /&gt;
* Password Edit: This is a page where users can edit their password after it has been [[RADIUS Settings - General | reset]], and if you do not wish to use it, they can simply deselect it.&lt;br /&gt;
&lt;br /&gt;
==== Web server ====&lt;br /&gt;
You can specify the protocol and port for the URL to access through the captive portal. If you choose the HTTPS protocol, the user's browser may encounter a self-signed certificate connection error. Therefore, we recommend using HTTP. Even when using HTTP, the password generated during user registration is securely encrypted and sent to the server.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Sign-Up Approval ====&lt;br /&gt;
You can choose whether users will be automatically approved once they register or if an administrator will need to approve them(Manual). User accounts must be approved after registration for wireless authentication to be allowed.&lt;br /&gt;
&lt;br /&gt;
The expiration represents the expiration period of approved user accounts, and the expiration time is set based on the time of application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Color/Image ====&lt;br /&gt;
You can change the overall color scheme and the image in the top-left corner of the page. To set the color scheme, simply click on 'Details'.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Details&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;width:200px&amp;quot; | Name !! Description&lt;br /&gt;
|-&lt;br /&gt;
| main-bg-primary || Primary background color&lt;br /&gt;
|-&lt;br /&gt;
| main-bg-seondary || Secondary background color&lt;br /&gt;
|-&lt;br /&gt;
| main-h1-color || Title 1 color&lt;br /&gt;
|-&lt;br /&gt;
| main-h2-color || Title 2 color&lt;br /&gt;
|-&lt;br /&gt;
| btn-bg-primary || Button background color&lt;br /&gt;
|-&lt;br /&gt;
| btn-bg-active || Active button background color&lt;br /&gt;
|-&lt;br /&gt;
| btn-color || Button text color&lt;br /&gt;
|-&lt;br /&gt;
| btn-color-active || Active button color&lt;br /&gt;
|-&lt;br /&gt;
| formBox-color || frame box text color&lt;br /&gt;
|-&lt;br /&gt;
| formBox-bg-color || frame box background color&lt;br /&gt;
|-&lt;br /&gt;
| formBox-border-color || frame box border color&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Display Language ====&lt;br /&gt;
We provide Korean and English (additional languages require separate customization).&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;width:200px&amp;quot; | Name !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Title || This title appears at the top of the page and corresponds to the 'Wi-Fi(Wireless Newtwork) Guide' seen in the image. This title is displayed identically on the guide, user sign-up, and password edit pages.&lt;br /&gt;
|-&lt;br /&gt;
| Body || It represents the description below the title and corresponds to 'For a secure wireless...' seen in the image. This description is displayed identically on th guide, user registration, and password change pages.&lt;br /&gt;
|-&lt;br /&gt;
| Guide message || You can specify the content the 'Usage Guide' on the guide page. The content can be written using HTML tags.&lt;br /&gt;
|-&lt;br /&gt;
| Success message || This is the content displayed when 'User Registration' is successfully completed.&lt;br /&gt;
|-&lt;br /&gt;
| Failure message || This is the content displayed when an issue occurs after 'User Registration'.&lt;br /&gt;
|-&lt;br /&gt;
| User Information || These are the details to be collected during 'User Registration.' User ID, password, and password confirmation are mandatory information, and you can optionally configure to collect additional user personal information. &lt;br /&gt;
{{note|Any additional user personal information should be set the same as [[Environment|Custom Fields]] for the correct display of registered user information.}}&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Save / Show preview / reset ====&lt;br /&gt;
* Save: it means saving the configured content to the database and generating HTML.&lt;br /&gt;
* Show preview: it generates temporary HTML to display the configured content in a new tab. Changes must be saved by clicking the &amp;quot;Save&amp;quot; button to be retained.&lt;br /&gt;
* Reset: it restores all content to its initial state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Captive Portal setting ===&lt;br /&gt;
To set the Captive Portal page of this system on a wireless LAN controller, you should specify it as follows: &amp;lt;br&amp;gt;&lt;br /&gt;
{protocol}://a.b.c.d:{port}/&lt;br /&gt;
&lt;br /&gt;
If {protocol} is HTTP and {port} is 80, then specify it as follows:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&amp;lt;nowiki&amp;gt;http://a.b.c.d/&amp;lt;/nowiki&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To use the Sign-up page as the default, set it to &amp;lt;big&amp;gt;&amp;lt;nowiki&amp;gt;http://a.b.c.d/?2&amp;lt;/nowiki&amp;gt;&amp;lt;/big&amp;gt;, and to use the password edit page as the default, set it to &amp;lt;big&amp;gt;&amp;lt;nowiki&amp;gt;http://a.b.c.d/?4.&amp;lt;/nowiki&amp;gt;&amp;lt;/big&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Captive_portal&amp;diff=2093</id>
		<title>Captive portal</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Captive_portal&amp;diff=2093"/>
		<updated>2023-11-08T07:57:07Z</updated>

		<summary type="html">&lt;p&gt;Shin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
=== RADIUS&amp;gt; Settings&amp;gt; Captive portal ===&lt;br /&gt;
We provide pages for wireless LAN usage guide, user sign-up, and changing user passwords using Captive Portal functionality, and administrators can directly edit these pages&lt;br /&gt;
&lt;br /&gt;
[[File:스크린샷 2023-11-08 오후 2.36.31.png|200px|thumb|Guide]]&lt;br /&gt;
[[File:스크린샷 2023-11-08 오후 2.36.43.png|200px|thumb|Sign-up]]&lt;br /&gt;
[[File:스크린샷 2023-11-08 오후 2.36.50.png|200px|thumb|Password-Edit]]&lt;br /&gt;
&lt;br /&gt;
==== Pages ====&lt;br /&gt;
* Guide: This is a page for wireless LAN usage instructions and guidance.&lt;br /&gt;
* User Sign-up: This is a page where wireless LAN users can register their username and password, and if you do not wish to use it, they can simply deselect it.&lt;br /&gt;
* Password Edit: This is a page where users can edit their password after it has been [[RADIUS Settings - General | reset]], and if you do not wish to use it, they can simply deselect it.&lt;br /&gt;
&lt;br /&gt;
==== Web server ====&lt;br /&gt;
You can specify the protocol and port for the URL to access through the captive portal. If you choose the HTTPS protocol, the user's browser may encounter a self-signed certificate connection error. Therefore, we recommend using HTTP. Even when using HTTP, the password generated during user registration is securely encrypted and sent to the server.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Sign-Up Approval ====&lt;br /&gt;
You can choose whether users will be automatically approved once they register or if an administrator will need to approve them(Manual). User accounts must be approved after registration for wireless authentication to be allowed.&lt;br /&gt;
&lt;br /&gt;
The expiration represents the expiration period of approved user accounts, and the expiration time is set based on the time of application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Color/Image ====&lt;br /&gt;
You can change the overall color scheme and the image in the top-left corner of the page. To set the color scheme, simply click on 'Details'.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Details&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;width:200px&amp;quot; | Name !! Description&lt;br /&gt;
|-&lt;br /&gt;
| main-bg-primary || Primary background color&lt;br /&gt;
|-&lt;br /&gt;
| main-bg-seondary || Secondary background color&lt;br /&gt;
|-&lt;br /&gt;
| main-color || Page header title color.&lt;br /&gt;
|-&lt;br /&gt;
| main-h1-color || Title 1 color&lt;br /&gt;
|-&lt;br /&gt;
| main-h2-color || Title 2 color&lt;br /&gt;
|-&lt;br /&gt;
| btn-bg-primary || Button background color&lt;br /&gt;
|-&lt;br /&gt;
| btn-bg-active || Active button background color&lt;br /&gt;
|-&lt;br /&gt;
| btn-color || Button color&lt;br /&gt;
|-&lt;br /&gt;
| btn-color-active || Active button color&lt;br /&gt;
|-&lt;br /&gt;
| formBox-color || Input box color&lt;br /&gt;
|-&lt;br /&gt;
| formBox-bg-color || Input box background color&lt;br /&gt;
|-&lt;br /&gt;
| formBox-border-color || Input box border color&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Display Language ====&lt;br /&gt;
We provide Korean and English (additional languages require separate customization).&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;width:200px&amp;quot; | Name !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Title || This title appears at the top of the page and corresponds to the 'Wi-Fi(Wireless Newtwork) Guide' seen in the image. This title is displayed identically on the guide, user sign-up, and password edit pages.&lt;br /&gt;
|-&lt;br /&gt;
| Body || It represents the description below the title and corresponds to 'For a secure wireless...' seen in the image. This description is displayed identically on th guide, user registration, and password change pages.&lt;br /&gt;
|-&lt;br /&gt;
| Guide message || You can specify the content the 'Usage Guide' on the guide page. The content can be written using HTML tags.&lt;br /&gt;
|-&lt;br /&gt;
| Success message || This is the content displayed when 'User Registration' is successfully completed.&lt;br /&gt;
|-&lt;br /&gt;
| Failure message || This is the content displayed when an issue occurs after 'User Registration'.&lt;br /&gt;
|-&lt;br /&gt;
| User Information || These are the details to be collected during 'User Registration.' User ID, password, and password confirmation are mandatory information, and you can optionally configure to collect additional user personal information. &lt;br /&gt;
{{note|Any additional user personal information should be set the same as [[Environment|Custom Fields]] for the correct display of registered user information.}}&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Save / Show preview / reset ====&lt;br /&gt;
* Save: it means saving the configured content to the database and generating HTML.&lt;br /&gt;
* Show preview: it generates temporary HTML to display the configured content in a new tab. Changes must be saved by clicking the &amp;quot;Save&amp;quot; button to be retained.&lt;br /&gt;
* Reset: it restores all content to its initial state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Captive Portal setting ===&lt;br /&gt;
To set the Captive Portal page of this system on a wireless LAN controller, you should specify it as follows: &amp;lt;br&amp;gt;&lt;br /&gt;
{protocol}://a.b.c.d:{port}/&lt;br /&gt;
&lt;br /&gt;
If {protocol} is HTTP and {port} is 80, then specify it as follows:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&amp;lt;nowiki&amp;gt;http://a.b.c.d/&amp;lt;/nowiki&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To use the Sign-up page as the default, set it to &amp;lt;big&amp;gt;&amp;lt;nowiki&amp;gt;http://a.b.c.d/?2&amp;lt;/nowiki&amp;gt;&amp;lt;/big&amp;gt;, and to use the password edit page as the default, set it to &amp;lt;big&amp;gt;&amp;lt;nowiki&amp;gt;http://a.b.c.d/?4.&amp;lt;/nowiki&amp;gt;&amp;lt;/big&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=File:%EC%8A%A4%ED%81%AC%EB%A6%B0%EC%83%B7_2023-11-08_%EC%98%A4%ED%9B%84_2.36.50.png&amp;diff=2092</id>
		<title>File:스크린샷 2023-11-08 오후 2.36.50.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=File:%EC%8A%A4%ED%81%AC%EB%A6%B0%EC%83%B7_2023-11-08_%EC%98%A4%ED%9B%84_2.36.50.png&amp;diff=2092"/>
		<updated>2023-11-08T07:25:28Z</updated>

		<summary type="html">&lt;p&gt;Shin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;password-edit&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=File:%EC%8A%A4%ED%81%AC%EB%A6%B0%EC%83%B7_2023-11-08_%EC%98%A4%ED%9B%84_2.36.43.png&amp;diff=2091</id>
		<title>File:스크린샷 2023-11-08 오후 2.36.43.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=File:%EC%8A%A4%ED%81%AC%EB%A6%B0%EC%83%B7_2023-11-08_%EC%98%A4%ED%9B%84_2.36.43.png&amp;diff=2091"/>
		<updated>2023-11-08T07:24:11Z</updated>

		<summary type="html">&lt;p&gt;Shin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;signup&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=File:%EC%8A%A4%ED%81%AC%EB%A6%B0%EC%83%B7_2023-11-08_%EC%98%A4%ED%9B%84_2.36.31.png&amp;diff=2090</id>
		<title>File:스크린샷 2023-11-08 오후 2.36.31.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=File:%EC%8A%A4%ED%81%AC%EB%A6%B0%EC%83%B7_2023-11-08_%EC%98%A4%ED%9B%84_2.36.31.png&amp;diff=2090"/>
		<updated>2023-11-08T07:23:47Z</updated>

		<summary type="html">&lt;p&gt;Shin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;guide&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=ImRAD_RADIUS&amp;diff=2089</id>
		<title>ImRAD RADIUS</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=ImRAD_RADIUS&amp;diff=2089"/>
		<updated>2023-11-08T07:22:07Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* &amp;amp;nbsp;&amp;amp;nbsp;Captive Portal */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS Overview ===&lt;br /&gt;
RADIUS(Remote Authentication Dial-In User Service) is a networking protocol, operating on ports 1812 and 1813, that provides centralized Authentication, Authorization, and Accounting (AAA or Triple-A) management for users who connect and use a network service.&amp;lt;ref name='radius-wiki'&amp;gt;https://en.wikipedia.org/wiki/RADIUS&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
RADIUS is a client/server protocol that runs in the application layer. Network access servers, which control access to a network, usually contain a RADIUS client component that communicates with the RADIUS server. RADIUS is often the back-end of choice for 802.1X&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IEEE_802.1X&amp;lt;/ref&amp;gt; authentication.&amp;lt;ref name='radius-wiki' /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
WPA-Enterprise is also referred to as WPA-802.1X mode, and sometimes just WPA (as opposed to WPA-PSK), this is designed for enterprise networks and requires a RADIUS authentication server to have users can use a network service.&amp;lt;ref name='wiki-wpa&amp;gt;https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access#WPA2&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The imRAD can be used on WPA, WPA2, and WPA3 Enterprise&amp;lt;ref name='wiki-wpa /&amp;gt; environments and supports EAP-TTLS&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Extensible_Authentication_Protocol#EAP_Tunneled_Transport_Layer_Security_(EAP-TTLS)&amp;lt;/ref&amp;gt; and EAP-PEAP&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Protected_Extensible_Authentication_Protocol&amp;lt;/ref&amp;gt;.&lt;br /&gt;
The EAP-TTLS is a default authentication method.&lt;br /&gt;
&lt;br /&gt;
RADIUS authentication consists of supplicant(user device), NAS(Network Access Server), and the RADIUS server. &lt;br /&gt;
The user or machine sends a request to a Network Access Server (NAS) to gain access to a particular network resource using access credentials. The NAS sends a RADIUS Access-Request message to the RADIUS server, requesting authorization to grant access via the RADIUS protocol. The RADIUS server checks that the information is correct.&lt;br /&gt;
&lt;br /&gt;
[[File:Drawing_RADIUS_1812.svg.png|400px|thumb|RADIUS Authentication and Authorization Flow&amp;lt;ref name='radius-wiki' /&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
The imRAD was developed based on the '''[https://wiki.freeradius.org/Home FreeRADIUS]''' and provides the most of RADIUS services.&lt;br /&gt;
Our system can authenticate a User-Name in a Local database, remote databases, or LDAP servers, and Proxy servers.&lt;br /&gt;
The following is the supporting remote DBMS or LDAP.&lt;br /&gt;
* MariaDB&lt;br /&gt;
* MySql&lt;br /&gt;
* Oracle 11g ~ 19c&lt;br /&gt;
* Microsoft SQL Server 2014 ~ 2019&lt;br /&gt;
* Tibero 6&lt;br /&gt;
* PostgreSQL 12&lt;br /&gt;
* SYBASE&lt;br /&gt;
* OpenLDAP&lt;br /&gt;
* Microsoft Active Directory Domain service(AD DS)&lt;br /&gt;
* Microsoft Active Directory Lightweight directory service(AD LDS)&lt;br /&gt;
&lt;br /&gt;
Using an '''[[Authentication DB | external Database]]''' makes it possible to authenticate directly a user through it(e.g, Customer employee database) without importing data from the remote database to the imRAD local database.&amp;lt;br&amp;gt;&lt;br /&gt;
In the environment of user authentication via an '''[[Authentication DB | external Database]]''', it may increase network traffic to the external database and slow down the database.&amp;lt;br&amp;gt;&lt;br /&gt;
To resolve this, the user credentials that were authenticated from an external database are saved into the local database for few days(You can set how many days the cached users are kept in the local database from the [[RADIUS Settings - General | RADIUS general settings]]). And then, authentication requests will not be sent to the external database but be completed in the local database. We called it &amp;quot;cached user&amp;quot;.&amp;lt;br&amp;gt;&lt;br /&gt;
To securely save the User-password into the local database, it is saved as hashed data using the strong hash algorithm(e.g, SHA256 with salt).&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:pta.png]]&lt;br /&gt;
&lt;br /&gt;
Supporting TLS(Transport Layer Security) version is between 1.0 and 1.3 and can be changed the minimum and the maximum version from the [[RADIUS Settings - General | RADIUS general settings]].&lt;br /&gt;
You must make sure the TLS version because some client operating systems still use TLS 1.0.&lt;br /&gt;
&lt;br /&gt;
RADIUS Proxying is that the server can proxy any request to other RADIUS servers and other RADIUS servers can authenticate the proxying request.&amp;lt;ref&amp;gt;https://wiki.freeradius.org/features/Proxy&amp;lt;/ref&amp;gt;&lt;br /&gt;
A famous proxying is eduroam(education roaming)&amp;lt;ref&amp;gt;https://www.eduroam.org/what-is-eduroam/&amp;lt;/ref&amp;gt; and a user can be authenticated at an eduroam server using the RADIUS Proxying.&lt;br /&gt;
&lt;br /&gt;
An [[Authentication DB | external database]] authentication and a RADIUS Proxying can be restricted by a NAS Identifier(NAS-ID) and you can also set this policy on RADIUS&amp;gt; Settings&amp;gt; [[Authentication DB]] or [[Realm and proxy|Realms/Proxys]] menu.&lt;br /&gt;
&lt;br /&gt;
=== Configuring RADIUS ===&lt;br /&gt;
===== Getting started =====&lt;br /&gt;
Basically, to authenticate a user's device basically that is in the 802.1x environment, Follow the below instruction.&lt;br /&gt;
&lt;br /&gt;
# Register the IP address of an imRAD and the shared secret at a [[NAS]].&lt;br /&gt;
# Register the IP address of a [[NAS]] and the same shared secret at the [[NAS setting | RADIUS &amp;gt; settings &amp;gt; NAS]] .&lt;br /&gt;
&lt;br /&gt;
After doing the above, the imRAD RADIUS can process the requests from the [[NAS]] that was registered.&lt;br /&gt;
If you want to test a device(e.g, smartphone, tablet, laptop computer, and so on), please refer to the [[RADIUS Authentication testing]].&lt;br /&gt;
&lt;br /&gt;
=====  [[RADIUS Users|Users]]=====&lt;br /&gt;
It manages 802.1x Users.&lt;br /&gt;
&lt;br /&gt;
===== [[Reject2ban]] =====&lt;br /&gt;
It is designed to reduce the load on the databases from random requests of a malicious client.&lt;br /&gt;
&lt;br /&gt;
===== [[RADIUS Groups|Groups]]=====&lt;br /&gt;
It is the RADIUS User groups.&lt;br /&gt;
&lt;br /&gt;
=====[[Attributes]]=====&lt;br /&gt;
It provides a manager can search the attributes used in RADIUS.&lt;br /&gt;
&lt;br /&gt;
===== Log =====&lt;br /&gt;
* [[RADIUS Log | Accounting]]: It displays all Accounting.&lt;br /&gt;
* [[RADIUS Log | Post-Authentication]]: It displays all log after attempting authentication.&lt;br /&gt;
* [[Reject2ban]]: It displays the Reject2ban log.&lt;br /&gt;
&lt;br /&gt;
=====Settings=====&lt;br /&gt;
All settings for the RADIUS can be configured on this menu. After configuring something, the radiusd service will automatically apply the changed values in few seconds without an administrator manually restart the radiusd service.&lt;br /&gt;
If you want to radiusd service can forcibly apply the changed value, click the &amp;quot;Apply&amp;quot; button at the bottom of this menu.&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[RADIUS Settings - General | General]]======&lt;br /&gt;
You can configure Data Maintenance, Password complexity for RADIUS User-Password, EAP, RADIUS general configuration, and Reject2ban.&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[NAS setting | NAS]]======&lt;br /&gt;
As a feature for managing the Network Access Server, you can add or remove wireless LAN controllers or Access Points (APs).&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[Realm and proxy|Realm/Proxy]]======&lt;br /&gt;
It manages Proxy servers and Realm for the Proxy Authentication.&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[Authentication DB]]======&lt;br /&gt;
Configure local or external database connection attributes for user authentication.&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[LDAP]]======&lt;br /&gt;
Configure LDAP(Lightweight Directory Access Protocol) or AD(Active Directory) server connection attributes for user authentication.&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[NAS Identifier|NAS-ID]]======&lt;br /&gt;
It manages automatically collected NAS-ID (SSID).&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[Captive portal]]======&lt;br /&gt;
This is an interface that allows you to create pages for wireless LAN usage instructions and wireless LAN user registration when using Captive Portal.&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Captive_portal&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[RADIUS Authentication testing]]======&lt;br /&gt;
It shows several EAP methods for operating system-specific authentication tests.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=ImRAD_RADIUS&amp;diff=2088</id>
		<title>ImRAD RADIUS</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=ImRAD_RADIUS&amp;diff=2088"/>
		<updated>2023-11-08T07:21:47Z</updated>

		<summary type="html">&lt;p&gt;Shin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS Overview ===&lt;br /&gt;
RADIUS(Remote Authentication Dial-In User Service) is a networking protocol, operating on ports 1812 and 1813, that provides centralized Authentication, Authorization, and Accounting (AAA or Triple-A) management for users who connect and use a network service.&amp;lt;ref name='radius-wiki'&amp;gt;https://en.wikipedia.org/wiki/RADIUS&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
RADIUS is a client/server protocol that runs in the application layer. Network access servers, which control access to a network, usually contain a RADIUS client component that communicates with the RADIUS server. RADIUS is often the back-end of choice for 802.1X&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IEEE_802.1X&amp;lt;/ref&amp;gt; authentication.&amp;lt;ref name='radius-wiki' /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
WPA-Enterprise is also referred to as WPA-802.1X mode, and sometimes just WPA (as opposed to WPA-PSK), this is designed for enterprise networks and requires a RADIUS authentication server to have users can use a network service.&amp;lt;ref name='wiki-wpa&amp;gt;https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access#WPA2&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The imRAD can be used on WPA, WPA2, and WPA3 Enterprise&amp;lt;ref name='wiki-wpa /&amp;gt; environments and supports EAP-TTLS&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Extensible_Authentication_Protocol#EAP_Tunneled_Transport_Layer_Security_(EAP-TTLS)&amp;lt;/ref&amp;gt; and EAP-PEAP&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Protected_Extensible_Authentication_Protocol&amp;lt;/ref&amp;gt;.&lt;br /&gt;
The EAP-TTLS is a default authentication method.&lt;br /&gt;
&lt;br /&gt;
RADIUS authentication consists of supplicant(user device), NAS(Network Access Server), and the RADIUS server. &lt;br /&gt;
The user or machine sends a request to a Network Access Server (NAS) to gain access to a particular network resource using access credentials. The NAS sends a RADIUS Access-Request message to the RADIUS server, requesting authorization to grant access via the RADIUS protocol. The RADIUS server checks that the information is correct.&lt;br /&gt;
&lt;br /&gt;
[[File:Drawing_RADIUS_1812.svg.png|400px|thumb|RADIUS Authentication and Authorization Flow&amp;lt;ref name='radius-wiki' /&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
The imRAD was developed based on the '''[https://wiki.freeradius.org/Home FreeRADIUS]''' and provides the most of RADIUS services.&lt;br /&gt;
Our system can authenticate a User-Name in a Local database, remote databases, or LDAP servers, and Proxy servers.&lt;br /&gt;
The following is the supporting remote DBMS or LDAP.&lt;br /&gt;
* MariaDB&lt;br /&gt;
* MySql&lt;br /&gt;
* Oracle 11g ~ 19c&lt;br /&gt;
* Microsoft SQL Server 2014 ~ 2019&lt;br /&gt;
* Tibero 6&lt;br /&gt;
* PostgreSQL 12&lt;br /&gt;
* SYBASE&lt;br /&gt;
* OpenLDAP&lt;br /&gt;
* Microsoft Active Directory Domain service(AD DS)&lt;br /&gt;
* Microsoft Active Directory Lightweight directory service(AD LDS)&lt;br /&gt;
&lt;br /&gt;
Using an '''[[Authentication DB | external Database]]''' makes it possible to authenticate directly a user through it(e.g, Customer employee database) without importing data from the remote database to the imRAD local database.&amp;lt;br&amp;gt;&lt;br /&gt;
In the environment of user authentication via an '''[[Authentication DB | external Database]]''', it may increase network traffic to the external database and slow down the database.&amp;lt;br&amp;gt;&lt;br /&gt;
To resolve this, the user credentials that were authenticated from an external database are saved into the local database for few days(You can set how many days the cached users are kept in the local database from the [[RADIUS Settings - General | RADIUS general settings]]). And then, authentication requests will not be sent to the external database but be completed in the local database. We called it &amp;quot;cached user&amp;quot;.&amp;lt;br&amp;gt;&lt;br /&gt;
To securely save the User-password into the local database, it is saved as hashed data using the strong hash algorithm(e.g, SHA256 with salt).&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:pta.png]]&lt;br /&gt;
&lt;br /&gt;
Supporting TLS(Transport Layer Security) version is between 1.0 and 1.3 and can be changed the minimum and the maximum version from the [[RADIUS Settings - General | RADIUS general settings]].&lt;br /&gt;
You must make sure the TLS version because some client operating systems still use TLS 1.0.&lt;br /&gt;
&lt;br /&gt;
RADIUS Proxying is that the server can proxy any request to other RADIUS servers and other RADIUS servers can authenticate the proxying request.&amp;lt;ref&amp;gt;https://wiki.freeradius.org/features/Proxy&amp;lt;/ref&amp;gt;&lt;br /&gt;
A famous proxying is eduroam(education roaming)&amp;lt;ref&amp;gt;https://www.eduroam.org/what-is-eduroam/&amp;lt;/ref&amp;gt; and a user can be authenticated at an eduroam server using the RADIUS Proxying.&lt;br /&gt;
&lt;br /&gt;
An [[Authentication DB | external database]] authentication and a RADIUS Proxying can be restricted by a NAS Identifier(NAS-ID) and you can also set this policy on RADIUS&amp;gt; Settings&amp;gt; [[Authentication DB]] or [[Realm and proxy|Realms/Proxys]] menu.&lt;br /&gt;
&lt;br /&gt;
=== Configuring RADIUS ===&lt;br /&gt;
===== Getting started =====&lt;br /&gt;
Basically, to authenticate a user's device basically that is in the 802.1x environment, Follow the below instruction.&lt;br /&gt;
&lt;br /&gt;
# Register the IP address of an imRAD and the shared secret at a [[NAS]].&lt;br /&gt;
# Register the IP address of a [[NAS]] and the same shared secret at the [[NAS setting | RADIUS &amp;gt; settings &amp;gt; NAS]] .&lt;br /&gt;
&lt;br /&gt;
After doing the above, the imRAD RADIUS can process the requests from the [[NAS]] that was registered.&lt;br /&gt;
If you want to test a device(e.g, smartphone, tablet, laptop computer, and so on), please refer to the [[RADIUS Authentication testing]].&lt;br /&gt;
&lt;br /&gt;
=====  [[RADIUS Users|Users]]=====&lt;br /&gt;
It manages 802.1x Users.&lt;br /&gt;
&lt;br /&gt;
===== [[Reject2ban]] =====&lt;br /&gt;
It is designed to reduce the load on the databases from random requests of a malicious client.&lt;br /&gt;
&lt;br /&gt;
===== [[RADIUS Groups|Groups]]=====&lt;br /&gt;
It is the RADIUS User groups.&lt;br /&gt;
&lt;br /&gt;
=====[[Attributes]]=====&lt;br /&gt;
It provides a manager can search the attributes used in RADIUS.&lt;br /&gt;
&lt;br /&gt;
===== Log =====&lt;br /&gt;
* [[RADIUS Log | Accounting]]: It displays all Accounting.&lt;br /&gt;
* [[RADIUS Log | Post-Authentication]]: It displays all log after attempting authentication.&lt;br /&gt;
* [[Reject2ban]]: It displays the Reject2ban log.&lt;br /&gt;
&lt;br /&gt;
=====Settings=====&lt;br /&gt;
All settings for the RADIUS can be configured on this menu. After configuring something, the radiusd service will automatically apply the changed values in few seconds without an administrator manually restart the radiusd service.&lt;br /&gt;
If you want to radiusd service can forcibly apply the changed value, click the &amp;quot;Apply&amp;quot; button at the bottom of this menu.&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[RADIUS Settings - General | General]]======&lt;br /&gt;
You can configure Data Maintenance, Password complexity for RADIUS User-Password, EAP, RADIUS general configuration, and Reject2ban.&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[NAS setting | NAS]]======&lt;br /&gt;
As a feature for managing the Network Access Server, you can add or remove wireless LAN controllers or Access Points (APs).&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[Realm and proxy|Realm/Proxy]]======&lt;br /&gt;
It manages Proxy servers and Realm for the Proxy Authentication.&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[Authentication DB]]======&lt;br /&gt;
Configure local or external database connection attributes for user authentication.&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[LDAP]]======&lt;br /&gt;
Configure LDAP(Lightweight Directory Access Protocol) or AD(Active Directory) server connection attributes for user authentication.&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[NAS Identifier|NAS-ID]]======&lt;br /&gt;
It manages automatically collected NAS-ID (SSID).&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[Captive Portal]]======&lt;br /&gt;
This is an interface that allows you to create pages for wireless LAN usage instructions and wireless LAN user registration when using Captive Portal.&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Captive_portal&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[RADIUS Authentication testing]]======&lt;br /&gt;
It shows several EAP methods for operating system-specific authentication tests.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Captive_portal&amp;diff=2087</id>
		<title>Captive portal</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Captive_portal&amp;diff=2087"/>
		<updated>2023-11-08T07:16:51Z</updated>

		<summary type="html">&lt;p&gt;Shin: Shin moved page Guest Page to Captive portal without leaving a redirect&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Our system provides users who want to use the wireless LAN can register their UserName (ID) and password. The interface for designing this page is accessible through RADIUS &amp;gt; Settings &amp;gt; Guest Page menu&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Users&amp;diff=2086</id>
		<title>RADIUS Users</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Users&amp;diff=2086"/>
		<updated>2023-11-01T01:23:46Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* Create New User */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Users ===&lt;br /&gt;
You can add, update, or delete the usernames for the RADIUS authentication.&lt;br /&gt;
&lt;br /&gt;
==== Create New User ====&lt;br /&gt;
You can add a new user at the top right of the page and can create a user as either a Username authentication or a [[MAC Address]] authentication.&lt;br /&gt;
The Username authentication stores a User-Name and User-Password and the credentials are validated with the two attributes to authenticate an ACCESS-REQUEST.&amp;lt;br&amp;gt;&lt;br /&gt;
The MAC address authentication store a MAC address of a user machine and the credentials are validated with the address. The MAC address type is applied usually in the environment of an open wireless network.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Username / MAC Authentication&lt;br /&gt;
|-&lt;br /&gt;
! style='width:150px' | Item !! Required !! Description !! remarks&lt;br /&gt;
|-&lt;br /&gt;
| Username|| Yes || The multibyte characters(e.g, korean, japaneses) are not allowed. || username authentication  only&lt;br /&gt;
|-&lt;br /&gt;
| Status || Yes || Select &amp;quot;authorized&amp;quot; ||&lt;br /&gt;
|-&lt;br /&gt;
| User-Type || Yes || Select a user-type. An external user means that the username and password locates in an external database(normally a customer database). If you select the &amp;quot;external user&amp;quot;, you can't set the password because this username is used only for applying additional attributes.&amp;lt;ref&amp;gt;If you switch on the RADIUS &amp;gt; Settings &amp;gt; General&amp;gt; [[RADIUS Settings - General | cached user]], the user passwords will be filled using strong encryption algorithm and usernames are also used for authentication.&amp;lt;/ref&amp;gt; In other words, an external username is not authenticated by itself without connecting to an external authentication database.  || username authentication  only&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Password Type || Yes || It is the encryption method of a password. If a user machine is windows 10, the type must be either the Windows NT hashed passwords or clear-text passwords. || username authentication  only&lt;br /&gt;
|-&lt;br /&gt;
| Password&amp;lt;br&amp;gt;Confirm Password|| Yes || Input the password of a username. || username authentication only&lt;br /&gt;
|-&lt;br /&gt;
| MAC Address || Yes || The [[MAC Address]] of a user machine. The address is case-sensitive and also may include delimiters and you can find the format of the MAC address from the [[Accounting]]. || MAC authentication only&lt;br /&gt;
|-&lt;br /&gt;
| Expiration || No || Set the user authentication expiration date. || &lt;br /&gt;
|-&lt;br /&gt;
| User Information || Optional || You can fill out the general user informations. The requirement of this field depends on &amp;quot;Environment &amp;gt; [[Environment | Custom Fields]]&amp;quot;. ||&lt;br /&gt;
|-&lt;br /&gt;
| Group || No || A group to which the user. || &lt;br /&gt;
|-&lt;br /&gt;
| Additional Attributes || No || You can add more attributes for authentication or reply. You done't need to add additional attributes at this step because they can be added after creating a user. ||&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== User Authorization, Updating, and Deleting ====&lt;br /&gt;
A username that was registered from the captive portal page will be added as an un-authorized one. You can authorize it by click the [[File:popup.png|23x]] icon in front of each row.&lt;br /&gt;
Within the same interface, you can also change other information and delete a user.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Additional Attributes ====&lt;br /&gt;
===== Authentication Attributes =====&lt;br /&gt;
Authentication attributes are pieces of information used in RADIUS authentication in addition to the basic information (User-Name, User-Password). For useful authentication attributes, refer to the [[Attributes]] section.&lt;br /&gt;
&lt;br /&gt;
===== Reply Attributes =====&lt;br /&gt;
Reply attributes refer to the attributes provided to the user after RADIUS authentication. For useful reply attributes, refer to the [[Attributes]] section.&lt;br /&gt;
&lt;br /&gt;
==== Password Reset ====&lt;br /&gt;
You can reset the password of registered users.&lt;br /&gt;
&lt;br /&gt;
When a user's password is reset, the previous password becomes unusable, and a temporary password is issued. The use of such temporary passwords and the password reset feature can be configured in RADIUS &amp;gt; Settings &amp;gt; General &amp;gt; [[RADIUS Settings - General | Password Complexity Requirements for RADIUS User-Password]]. If the password reset feature is inactive (default state), users cannot use the password reset function.&lt;br /&gt;
&lt;br /&gt;
When a password is reset, the user must create a new password using the temporary password on the password change page. For more details, refer to RADIUS &amp;gt; Settings &amp;gt; General &amp;gt; [[RADIUS Settings - General | Password Complexity Requirements for RADIUS User-Password]].&lt;br /&gt;
&lt;br /&gt;
{{note|Passwords for users authenticated based on MAC address or stored in an external database as &amp;quot;[[RADIUS Settings - General | cached user]]&amp;quot; cannot be reset.}}&lt;br /&gt;
&lt;br /&gt;
==== Expiration ====&lt;br /&gt;
Users with a specified expiration time that has passed will not be granted authentication (Access-Reject), and this information will not be automatically deleted.&amp;quot;&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Users&amp;diff=2085</id>
		<title>RADIUS Users</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Users&amp;diff=2085"/>
		<updated>2023-11-01T01:19:49Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* Create New User */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Users ===&lt;br /&gt;
You can add, update, or delete the usernames for the RADIUS authentication.&lt;br /&gt;
&lt;br /&gt;
==== Create New User ====&lt;br /&gt;
You can add a new user at the top right of the page and can create a user as either a Username authentication or a [[MAC Address]] authentication.&lt;br /&gt;
The Username authentication stores a User-Name and User-Password and the credentials are validated with the two attributes to authenticate an ACCESS-REQUEST.&amp;lt;br&amp;gt;&lt;br /&gt;
The MAC address authentication store a MAC address of a user machine and the credentials are validated with the address. The MAC address type is applied usually in the environment of an open wireless network.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Username / MAC Authentication&lt;br /&gt;
|-&lt;br /&gt;
! style='width:150px' | Item !! Required !! Description !! remarks&lt;br /&gt;
|-&lt;br /&gt;
| Username|| Yes || The multibyte characters(e.g, korean, japaneses) are not allowed. || username authentication  only&lt;br /&gt;
|-&lt;br /&gt;
| Status || Yes || Select &amp;quot;authorized&amp;quot; ||&lt;br /&gt;
|-&lt;br /&gt;
| User-Type || Yes || Select a user-type. An external user means that the username and password locates in an external database(normally a customer database). If you select the &amp;quot;external user&amp;quot;, you can't set the password because this username is used only for applying additional attributes.&amp;lt;ref&amp;gt;If you switch on the RADIUS &amp;gt; Settings &amp;gt; General&amp;gt; [[RADIUS Settings - General | cached user]], the user passwords will be filled using strong encryption algorithm and usernames are also used for authentication.&amp;lt;/ref&amp;gt; || username authentication  only&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Password Type || Yes || It is the encryption method of a password. If a user machine is windows 10, the type must be either the Windows NT hashed passwords or clear-text passwords. || username authentication  only&lt;br /&gt;
|-&lt;br /&gt;
| Password&amp;lt;br&amp;gt;Confirm Password|| Yes || Input the password of a username. || username authentication only&lt;br /&gt;
|-&lt;br /&gt;
| MAC Address || Yes || The [[MAC Address]] of a user machine. The address is case-sensitive and also may include delimiters and you can find the format of the MAC address from the [[Accounting]]. || MAC authentication only&lt;br /&gt;
|-&lt;br /&gt;
| Expiration || No || Set the user authentication expiration date. || &lt;br /&gt;
|-&lt;br /&gt;
| User Information || Optional || You can fill out the general user informations. The requirement of this field depends on &amp;quot;Environment &amp;gt; [[Environment | Custom Fields]]&amp;quot;. ||&lt;br /&gt;
|-&lt;br /&gt;
| Group || No || A group to which the user. || &lt;br /&gt;
|-&lt;br /&gt;
| Additional Attributes || No || You can add more attributes for authentication or reply. You done't need to add additional attributes at this step because they can be added after creating a user. ||&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== User Authorization, Updating, and Deleting ====&lt;br /&gt;
A username that was registered from the captive portal page will be added as an un-authorized one. You can authorize it by click the [[File:popup.png|23x]] icon in front of each row.&lt;br /&gt;
Within the same interface, you can also change other information and delete a user.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Additional Attributes ====&lt;br /&gt;
===== Authentication Attributes =====&lt;br /&gt;
Authentication attributes are pieces of information used in RADIUS authentication in addition to the basic information (User-Name, User-Password). For useful authentication attributes, refer to the [[Attributes]] section.&lt;br /&gt;
&lt;br /&gt;
===== Reply Attributes =====&lt;br /&gt;
Reply attributes refer to the attributes provided to the user after RADIUS authentication. For useful reply attributes, refer to the [[Attributes]] section.&lt;br /&gt;
&lt;br /&gt;
==== Password Reset ====&lt;br /&gt;
You can reset the password of registered users.&lt;br /&gt;
&lt;br /&gt;
When a user's password is reset, the previous password becomes unusable, and a temporary password is issued. The use of such temporary passwords and the password reset feature can be configured in RADIUS &amp;gt; Settings &amp;gt; General &amp;gt; [[RADIUS Settings - General | Password Complexity Requirements for RADIUS User-Password]]. If the password reset feature is inactive (default state), users cannot use the password reset function.&lt;br /&gt;
&lt;br /&gt;
When a password is reset, the user must create a new password using the temporary password on the password change page. For more details, refer to RADIUS &amp;gt; Settings &amp;gt; General &amp;gt; [[RADIUS Settings - General | Password Complexity Requirements for RADIUS User-Password]].&lt;br /&gt;
&lt;br /&gt;
{{note|Passwords for users authenticated based on MAC address or stored in an external database as &amp;quot;[[RADIUS Settings - General | cached user]]&amp;quot; cannot be reset.}}&lt;br /&gt;
&lt;br /&gt;
==== Expiration ====&lt;br /&gt;
Users with a specified expiration time that has passed will not be granted authentication (Access-Reject), and this information will not be automatically deleted.&amp;quot;&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Users&amp;diff=2084</id>
		<title>RADIUS Users</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Users&amp;diff=2084"/>
		<updated>2023-10-28T05:19:31Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* Create New User */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Users ===&lt;br /&gt;
You can add, update, or delete the usernames for the RADIUS authentication.&lt;br /&gt;
&lt;br /&gt;
==== Create New User ====&lt;br /&gt;
You can add a new user at the top right of the page and can create a user as either a Username authentication or a [[MAC Address]] authentication.&lt;br /&gt;
The Username authentication stores a User-Name and User-Password and the credentials are validated with the two attributes to authenticate an ACCESS-REQUEST.&amp;lt;br&amp;gt;&lt;br /&gt;
The MAC address authentication store a MAC address of a user machine and the credentials are validated with the address. The MAC address type is applied usually in the environment of an open wireless network.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Username / MAC Authentication&lt;br /&gt;
|-&lt;br /&gt;
! style='width:150px' | Item !! Required !! Description !! remarks&lt;br /&gt;
|-&lt;br /&gt;
| Username|| Yes || The multibyte characters(e.g, korean, japaneses) are not allowed. || username authentication  only&lt;br /&gt;
|-&lt;br /&gt;
| Status || Yes || Select &amp;quot;authorized&amp;quot; ||&lt;br /&gt;
|-&lt;br /&gt;
| User-Type || Yes || Select a user-type. An external user means that the username and password locates in an external database(normally a customer database). If you select the &amp;quot;external user&amp;quot;, you can't set the password because this username is used only for applying additional attributes.&lt;br /&gt;
{{note| If you switch on the RADIUS &amp;gt; Settings &amp;gt; General&amp;gt; [[RADIUS Settings - General | cached user]], the user password will be filled using strong encryption algorithm and this username is also used for authentication.}}. || username authentication  only.&lt;br /&gt;
|-&lt;br /&gt;
| Password Type || Yes || It is the encryption method of a password. If a user machine is windows 10, the type must be either the Windows NT hashed passwords or clear-text passwords. || username authentication  only&lt;br /&gt;
|-&lt;br /&gt;
| Password&amp;lt;br&amp;gt;Confirm Password|| Yes || Input the password of a username. || username authentication only&lt;br /&gt;
|-&lt;br /&gt;
| MAC Address || Yes || The [[MAC Address]] of a user machine. The address is case-sensitive and also may include delimiters and you can find the format of the MAC address from the [[Accounting]]. || MAC authentication only&lt;br /&gt;
|-&lt;br /&gt;
| Expiration || No || Set the user authentication expiration date. || &lt;br /&gt;
|-&lt;br /&gt;
| User Information || Optional || You can fill out the general user informations. The requirement of this field depends on &amp;quot;Environment &amp;gt; [[Environment | Custom Fields]]&amp;quot;. ||&lt;br /&gt;
|-&lt;br /&gt;
| Group || No || A group to which the user. || &lt;br /&gt;
|-&lt;br /&gt;
| Additional Attributes || No || You can add more attributes for authentication or reply. You done't need to add additional attributes at this step because they can be added after creating a user. ||&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== User Authorization, Updating, and Deleting ====&lt;br /&gt;
A username that was registered from the captive portal page will be added as an un-authorized one. You can authorize it by click the [[File:popup.png|23x]] icon in front of each row.&lt;br /&gt;
Within the same interface, you can also change other information and delete a user.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Additional Attributes ====&lt;br /&gt;
===== Authentication Attributes =====&lt;br /&gt;
Authentication attributes are pieces of information used in RADIUS authentication in addition to the basic information (User-Name, User-Password). For useful authentication attributes, refer to the [[Attributes]] section.&lt;br /&gt;
&lt;br /&gt;
===== Reply Attributes =====&lt;br /&gt;
Reply attributes refer to the attributes provided to the user after RADIUS authentication. For useful reply attributes, refer to the [[Attributes]] section.&lt;br /&gt;
&lt;br /&gt;
==== Password Reset ====&lt;br /&gt;
You can reset the password of registered users.&lt;br /&gt;
&lt;br /&gt;
When a user's password is reset, the previous password becomes unusable, and a temporary password is issued. The use of such temporary passwords and the password reset feature can be configured in RADIUS &amp;gt; Settings &amp;gt; General &amp;gt; [[RADIUS Settings - General | Password Complexity Requirements for RADIUS User-Password]]. If the password reset feature is inactive (default state), users cannot use the password reset function.&lt;br /&gt;
&lt;br /&gt;
When a password is reset, the user must create a new password using the temporary password on the password change page. For more details, refer to RADIUS &amp;gt; Settings &amp;gt; General &amp;gt; [[RADIUS Settings - General | Password Complexity Requirements for RADIUS User-Password]].&lt;br /&gt;
&lt;br /&gt;
{{note|Passwords for users authenticated based on MAC address or stored in an external database as &amp;quot;[[RADIUS Settings - General | cached user]]&amp;quot; cannot be reset.}}&lt;br /&gt;
&lt;br /&gt;
==== Expiration ====&lt;br /&gt;
Users with a specified expiration time that has passed will not be granted authentication (Access-Reject), and this information will not be automatically deleted.&amp;quot;&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Users&amp;diff=2083</id>
		<title>RADIUS Users</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Users&amp;diff=2083"/>
		<updated>2023-10-28T05:18:48Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* Create New User */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Users ===&lt;br /&gt;
You can add, update, or delete the usernames for the RADIUS authentication.&lt;br /&gt;
&lt;br /&gt;
==== Create New User ====&lt;br /&gt;
You can add a new user at the top right of the page and can create a user as either a Username authentication or a [[MAC Address]] authentication.&lt;br /&gt;
The Username authentication stores a User-Name and User-Password and the credentials are validated with the two attributes to authenticate an ACCESS-REQUEST.&amp;lt;br&amp;gt;&lt;br /&gt;
The MAC address authentication store a MAC address of a user machine and the credentials are validated with the address. The MAC address type is applied usually in the environment of an open wireless network.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Username / MAC Authentication&lt;br /&gt;
|-&lt;br /&gt;
! style='width:150px' | Item !! Required !! Description !! remarks&lt;br /&gt;
|-&lt;br /&gt;
| Username|| Yes || The multibyte characters(e.g, korean, japaneses) are not allowed. || username authentication  only&lt;br /&gt;
|-&lt;br /&gt;
| Status || Yes || Select &amp;quot;authorized&amp;quot; ||&lt;br /&gt;
|-&lt;br /&gt;
| User-Type || Yes || Select a user-type. An external user means that the username and password locates in an external database(normally a customer database). If you select the &amp;quot;external user&amp;quot;, you can't set the password because this username is used only for applying additional attributes.&lt;br /&gt;
{{note| If you switch on the RADIUS &amp;gt; Settings &amp;gt; General&amp;gt; [[RADIUS Settings - General | cached user]], the user password will be filled using strong encryption algorithm and this username is also used for authentication.}} || username authentication  only.&lt;br /&gt;
|-&lt;br /&gt;
| Password Type || Yes || It is the encryption method of a password. If a user machine is windows 10, the type must be either the Windows NT hashed passwords or clear-text passwords. || username authentication  only&lt;br /&gt;
|-&lt;br /&gt;
| Password&amp;lt;br&amp;gt;Confirm Password|| Yes || Input the password of a username. || username authentication only&lt;br /&gt;
|-&lt;br /&gt;
| MAC Address || Yes || The [[MAC Address]] of a user machine. The address is case-sensitive and also may include delimiters and you can find the format of the MAC address from the [[Accounting]]. || MAC authentication only&lt;br /&gt;
|-&lt;br /&gt;
| Expiration || No || Set the user authentication expiration date. || &lt;br /&gt;
|-&lt;br /&gt;
| User Information || Optional || You can fill out the general user informations. The requirement of this field depends on &amp;quot;Environment &amp;gt; [[Environment | Custom Fields]]&amp;quot;. ||&lt;br /&gt;
|-&lt;br /&gt;
| Group || No || A group to which the user. || &lt;br /&gt;
|-&lt;br /&gt;
| Additional Attributes || No || You can add more attributes for authentication or reply. You done't need to add additional attributes at this step because they can be added after creating a user. ||&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== User Authorization, Updating, and Deleting ====&lt;br /&gt;
A username that was registered from the captive portal page will be added as an un-authorized one. You can authorize it by click the [[File:popup.png|23x]] icon in front of each row.&lt;br /&gt;
Within the same interface, you can also change other information and delete a user.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Additional Attributes ====&lt;br /&gt;
===== Authentication Attributes =====&lt;br /&gt;
Authentication attributes are pieces of information used in RADIUS authentication in addition to the basic information (User-Name, User-Password). For useful authentication attributes, refer to the [[Attributes]] section.&lt;br /&gt;
&lt;br /&gt;
===== Reply Attributes =====&lt;br /&gt;
Reply attributes refer to the attributes provided to the user after RADIUS authentication. For useful reply attributes, refer to the [[Attributes]] section.&lt;br /&gt;
&lt;br /&gt;
==== Password Reset ====&lt;br /&gt;
You can reset the password of registered users.&lt;br /&gt;
&lt;br /&gt;
When a user's password is reset, the previous password becomes unusable, and a temporary password is issued. The use of such temporary passwords and the password reset feature can be configured in RADIUS &amp;gt; Settings &amp;gt; General &amp;gt; [[RADIUS Settings - General | Password Complexity Requirements for RADIUS User-Password]]. If the password reset feature is inactive (default state), users cannot use the password reset function.&lt;br /&gt;
&lt;br /&gt;
When a password is reset, the user must create a new password using the temporary password on the password change page. For more details, refer to RADIUS &amp;gt; Settings &amp;gt; General &amp;gt; [[RADIUS Settings - General | Password Complexity Requirements for RADIUS User-Password]].&lt;br /&gt;
&lt;br /&gt;
{{note|Passwords for users authenticated based on MAC address or stored in an external database as &amp;quot;[[RADIUS Settings - General | cached user]]&amp;quot; cannot be reset.}}&lt;br /&gt;
&lt;br /&gt;
==== Expiration ====&lt;br /&gt;
Users with a specified expiration time that has passed will not be granted authentication (Access-Reject), and this information will not be automatically deleted.&amp;quot;&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Users&amp;diff=2082</id>
		<title>RADIUS Users</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Users&amp;diff=2082"/>
		<updated>2023-10-28T05:01:14Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* Create New User */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Users ===&lt;br /&gt;
You can add, update, or delete the usernames for the RADIUS authentication.&lt;br /&gt;
&lt;br /&gt;
==== Create New User ====&lt;br /&gt;
You can add a new user at the top right of the page and can create a user as either a Username authentication or a [[MAC Address]] authentication.&lt;br /&gt;
The Username authentication stores a User-Name and User-Password and the credentials are validated with the two attributes to authenticate an ACCESS-REQUEST.&amp;lt;br&amp;gt;&lt;br /&gt;
The MAC address authentication store a MAC address of a user machine and the credentials are validated with the address. The MAC address type is applied usually in the environment of an open wireless network.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Username / MAC Authentication&lt;br /&gt;
|-&lt;br /&gt;
! style='width:150px' !! Item !! Required !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Username|| Yes || The multibyte characters(e.g, korean, japaneses) are not allowed.&lt;br /&gt;
|-&lt;br /&gt;
| Status || Yes || Select &amp;quot;authorized&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Password Type || Yes || It is the encryption method of a password. If a user machine is windows 10, the type must be either the Windows NT hashed passwords or clear-text passwords.&lt;br /&gt;
|-&lt;br /&gt;
| Password&amp;lt;br&amp;gt;Confirm Password|| Yes || Input the password of a username.&lt;br /&gt;
|-&lt;br /&gt;
| Expiration || No || Set the user authentication expiration date.&lt;br /&gt;
|-&lt;br /&gt;
| User Information || Optional || You can fill out the general user informations. The requirement of this field depends on &amp;quot;Environment &amp;gt; [[Environment | Custom Fields]]&amp;quot;.&lt;br /&gt;
|-&lt;br /&gt;
| Group || No || A group to which the user.&lt;br /&gt;
|-&lt;br /&gt;
| Additional Attributes || No || You can add more attributes for authentication or reply. You don't need to add additional attributes at this step because they can be added after creating a user.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ MAC Address Authentication&lt;br /&gt;
|-&lt;br /&gt;
!  style='width:150px' | Item !! Required !! Description&lt;br /&gt;
|-&lt;br /&gt;
| MAC Address || Yes || The [[MAC Address]] of a user machine. The address is case-sensitive and also may include delimiters and you can find the format of the MAC address from the [[Accounting]].&lt;br /&gt;
|-&lt;br /&gt;
| Expiration || No || Set the user authentication expiration date.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=3 | Others are same as the Username Authentication.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== User Authorization, Updating, and Deleting ====&lt;br /&gt;
A username that was registered from the captive portal page will be added as an un-authorized one. You can authorize it by click the [[File:popup.png|23x]] icon in front of each row.&lt;br /&gt;
Within the same interface, you can also change other information and delete a user.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Additional Attributes ====&lt;br /&gt;
===== Authentication Attributes =====&lt;br /&gt;
Authentication attributes are pieces of information used in RADIUS authentication in addition to the basic information (User-Name, User-Password). For useful authentication attributes, refer to the [[Attributes]] section.&lt;br /&gt;
&lt;br /&gt;
===== Reply Attributes =====&lt;br /&gt;
Reply attributes refer to the attributes provided to the user after RADIUS authentication. For useful reply attributes, refer to the [[Attributes]] section.&lt;br /&gt;
&lt;br /&gt;
==== Password Reset ====&lt;br /&gt;
You can reset the password of registered users.&lt;br /&gt;
&lt;br /&gt;
When a user's password is reset, the previous password becomes unusable, and a temporary password is issued. The use of such temporary passwords and the password reset feature can be configured in RADIUS &amp;gt; Settings &amp;gt; General &amp;gt; [[RADIUS Settings - General | Password Complexity Requirements for RADIUS User-Password]]. If the password reset feature is inactive (default state), users cannot use the password reset function.&lt;br /&gt;
&lt;br /&gt;
When a password is reset, the user must create a new password using the temporary password on the password change page. For more details, refer to RADIUS &amp;gt; Settings &amp;gt; General &amp;gt; [[RADIUS Settings - General | Password Complexity Requirements for RADIUS User-Password]].&lt;br /&gt;
&lt;br /&gt;
{{note|Passwords for users authenticated based on MAC address or stored in an external database as &amp;quot;[[RADIUS Settings - General | cached user]]&amp;quot; cannot be reset.}}&lt;br /&gt;
&lt;br /&gt;
==== Expiration ====&lt;br /&gt;
Users with a specified expiration time that has passed will not be granted authentication (Access-Reject), and this information will not be automatically deleted.&amp;quot;&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Users&amp;diff=2081</id>
		<title>RADIUS Users</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Users&amp;diff=2081"/>
		<updated>2023-10-28T04:58:20Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* Create New User */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Users ===&lt;br /&gt;
You can add, update, or delete the usernames for the RADIUS authentication.&lt;br /&gt;
&lt;br /&gt;
==== Create New User ====&lt;br /&gt;
You can add a new user at the top right of the page and can create a user as either a Username authentication or a [[MAC Address]] authentication.&lt;br /&gt;
The Username authentication stores a User-Name and User-Password and the credentials are validated with the two attributes to authenticate an ACCESS-REQUEST.&amp;lt;br&amp;gt;&lt;br /&gt;
The MAC address authentication store a MAC address of a user machine and the credentials are validated with the address. The MAC address type is applied usually in the environment of an open wireless network.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Username Authentication&lt;br /&gt;
|-&lt;br /&gt;
! style='width:150px' | Item !! Required !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Username|| Yes || The multibyte characters(e.g, korean, japaneses) are not allowed.&lt;br /&gt;
|-&lt;br /&gt;
| Status || Yes || Select &amp;quot;authorized&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Password Type || Yes || It is the encryption method of a password. If a user machine is windows 10, the type must be either the Windows NT hashed passwords or clear-text passwords.&lt;br /&gt;
|-&lt;br /&gt;
| Password&amp;lt;br&amp;gt;Confirm Password|| Yes || Input the password of a username.&lt;br /&gt;
|-&lt;br /&gt;
| Expiration || No || Set the user authentication expiration date.&lt;br /&gt;
|-&lt;br /&gt;
| User Information || Optional || You can fill out the general user informations. The requirement of this field depends on &amp;quot;Environment &amp;gt; [[Environment | Custom Fields]]&amp;quot;.&lt;br /&gt;
|-&lt;br /&gt;
| Group || No || A group to which the user.&lt;br /&gt;
|-&lt;br /&gt;
| Additional Attributes || No || You can add more attributes for authentication or reply. You don't need to add additional attributes at this step because they can be added after creating a user.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ MAC Address Authentication&lt;br /&gt;
|-&lt;br /&gt;
!  style='width:150px' | Item !! Required !! Description&lt;br /&gt;
|-&lt;br /&gt;
| MAC Address || Yes || The [[MAC Address]] of a user machine. The address is case-sensitive and also may include delimiters and you can find the format of the MAC address from the [[Accounting]].&lt;br /&gt;
|-&lt;br /&gt;
| Expiration || No || Set the user authentication expiration date.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=3 | Others are same as the Username Authentication.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== User Authorization, Updating, and Deleting ====&lt;br /&gt;
A username that was registered from the captive portal page will be added as an un-authorized one. You can authorize it by click the [[File:popup.png|23x]] icon in front of each row.&lt;br /&gt;
Within the same interface, you can also change other information and delete a user.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Additional Attributes ====&lt;br /&gt;
===== Authentication Attributes =====&lt;br /&gt;
Authentication attributes are pieces of information used in RADIUS authentication in addition to the basic information (User-Name, User-Password). For useful authentication attributes, refer to the [[Attributes]] section.&lt;br /&gt;
&lt;br /&gt;
===== Reply Attributes =====&lt;br /&gt;
Reply attributes refer to the attributes provided to the user after RADIUS authentication. For useful reply attributes, refer to the [[Attributes]] section.&lt;br /&gt;
&lt;br /&gt;
==== Password Reset ====&lt;br /&gt;
You can reset the password of registered users.&lt;br /&gt;
&lt;br /&gt;
When a user's password is reset, the previous password becomes unusable, and a temporary password is issued. The use of such temporary passwords and the password reset feature can be configured in RADIUS &amp;gt; Settings &amp;gt; General &amp;gt; [[RADIUS Settings - General | Password Complexity Requirements for RADIUS User-Password]]. If the password reset feature is inactive (default state), users cannot use the password reset function.&lt;br /&gt;
&lt;br /&gt;
When a password is reset, the user must create a new password using the temporary password on the password change page. For more details, refer to RADIUS &amp;gt; Settings &amp;gt; General &amp;gt; [[RADIUS Settings - General | Password Complexity Requirements for RADIUS User-Password]].&lt;br /&gt;
&lt;br /&gt;
{{note|Passwords for users authenticated based on MAC address or stored in an external database as &amp;quot;[[RADIUS Settings - General | cached user]]&amp;quot; cannot be reset.}}&lt;br /&gt;
&lt;br /&gt;
==== Expiration ====&lt;br /&gt;
Users with a specified expiration time that has passed will not be granted authentication (Access-Reject), and this information will not be automatically deleted.&amp;quot;&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Users&amp;diff=2080</id>
		<title>RADIUS Users</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Users&amp;diff=2080"/>
		<updated>2023-10-28T04:53:36Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* Create New User */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Users ===&lt;br /&gt;
You can add, update, or delete the usernames for the RADIUS authentication.&lt;br /&gt;
&lt;br /&gt;
==== Create New User ====&lt;br /&gt;
You can add a new user at the top right of the page and can create a user as either a Username authentication or a [[MAC Address]] authentication.&lt;br /&gt;
The Username authentication stores a User-Name and User-Password and the credentials are validated with the two attributes to authenticate an ACCESS-REQUEST.&amp;lt;br&amp;gt;&lt;br /&gt;
The MAC address authentication store a MAC address of a user machine and the credentials are validated with the address. The MAC address type is applied usually in the environment of an open wireless network.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Username Authentication&lt;br /&gt;
|-&lt;br /&gt;
! style='width:150px' | Item !! Required !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Username|| Yes || The multibyte characters(e.g, korean, japaneses) are not allowed.&lt;br /&gt;
|-&lt;br /&gt;
| Status || Yes || Select &amp;quot;authorized&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Password Type || Yes || It is the encryption method of a password. If a user machine is windows 10, the type must be either the Windows NT hashed passwords or clear-text passwords.&lt;br /&gt;
|-&lt;br /&gt;
| Password&amp;lt;br&amp;gt;Confirm Password|| Yes || Input the password of a username.&lt;br /&gt;
|-&lt;br /&gt;
| Expiration || No || Set the user authentication expiration date.&lt;br /&gt;
|-&lt;br /&gt;
| User Information || Optional || You can fill out the general user information. You can change the title of the form from the &amp;quot;Environment &amp;gt; [[Environment  | Custom Fields]]&amp;quot;.&lt;br /&gt;
|-&lt;br /&gt;
| Group || No || The group to which the user.&lt;br /&gt;
|-&lt;br /&gt;
| Additional Attributes || No || You can add more attributes for authentication or reply. You don't need to add additional attributes at this step because they can be added after creating a user.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ MAC Address Authentication&lt;br /&gt;
|-&lt;br /&gt;
!  style='width:150px' | Item !! Required !! Description&lt;br /&gt;
|-&lt;br /&gt;
| MAC Address || Yes || The [[MAC Address]] of a user machine. The address is case-sensitive and also may include delimiters and you can find the format of the MAC address from the [[Accounting]].&lt;br /&gt;
|-&lt;br /&gt;
| Expiration || No || Set the user authentication expiration date.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=3 | Others are same as the Username Authentication.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== User Authorization, Updating, and Deleting ====&lt;br /&gt;
A username that was registered from the captive portal page will be added as an un-authorized one. You can authorize it by click the [[File:popup.png|23x]] icon in front of each row.&lt;br /&gt;
Within the same interface, you can also change other information and delete a user.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Additional Attributes ====&lt;br /&gt;
===== Authentication Attributes =====&lt;br /&gt;
Authentication attributes are pieces of information used in RADIUS authentication in addition to the basic information (User-Name, User-Password). For useful authentication attributes, refer to the [[Attributes]] section.&lt;br /&gt;
&lt;br /&gt;
===== Reply Attributes =====&lt;br /&gt;
Reply attributes refer to the attributes provided to the user after RADIUS authentication. For useful reply attributes, refer to the [[Attributes]] section.&lt;br /&gt;
&lt;br /&gt;
==== Password Reset ====&lt;br /&gt;
You can reset the password of registered users.&lt;br /&gt;
&lt;br /&gt;
When a user's password is reset, the previous password becomes unusable, and a temporary password is issued. The use of such temporary passwords and the password reset feature can be configured in RADIUS &amp;gt; Settings &amp;gt; General &amp;gt; [[RADIUS Settings - General | Password Complexity Requirements for RADIUS User-Password]]. If the password reset feature is inactive (default state), users cannot use the password reset function.&lt;br /&gt;
&lt;br /&gt;
When a password is reset, the user must create a new password using the temporary password on the password change page. For more details, refer to RADIUS &amp;gt; Settings &amp;gt; General &amp;gt; [[RADIUS Settings - General | Password Complexity Requirements for RADIUS User-Password]].&lt;br /&gt;
&lt;br /&gt;
{{note|Passwords for users authenticated based on MAC address or stored in an external database as &amp;quot;[[RADIUS Settings - General | cached user]]&amp;quot; cannot be reset.}}&lt;br /&gt;
&lt;br /&gt;
==== Expiration ====&lt;br /&gt;
Users with a specified expiration time that has passed will not be granted authentication (Access-Reject), and this information will not be automatically deleted.&amp;quot;&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Messages&amp;diff=2079</id>
		<title>Messages</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Messages&amp;diff=2079"/>
		<updated>2023-10-28T04:44:53Z</updated>

		<summary type="html">&lt;p&gt;Shin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Operation Messages ===&lt;br /&gt;
All administrators and operators can write messages after clicking a 'comment' icon on the top right. You can share a message with everyone. Also, you can write a private message.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;change password&amp;quot; button on the top of messages enables that you change your login password(not for others). &lt;br /&gt;
It requires the current password and the new password cannot be the same as the current password.&lt;br /&gt;
&lt;br /&gt;
You can also see the message box by clicking on the 'Operational/Manager Name' on the left side menu.&lt;br /&gt;
&lt;br /&gt;
{{note | If you have administrator privileges and want to change the password of other maintenance accounts, go to the [[Maintenance | Maintenance &amp;gt; Accounts]] menu.}}&lt;br /&gt;
&lt;br /&gt;
=== System Messages ===&lt;br /&gt;
The System Messages are events for the imRAD system activities. The imRAD system notifies several messages when a job exceeds the specified threshold. you can configure it at the [[Environment]].&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Messages&amp;diff=2078</id>
		<title>Messages</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Messages&amp;diff=2078"/>
		<updated>2023-10-28T04:44:27Z</updated>

		<summary type="html">&lt;p&gt;Shin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Operation Messages ===&lt;br /&gt;
All administrators and operators can write messages after clicking a 'comment' icon on the top right. You can share a message with everyone. Also, you can write a private message.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;change password&amp;quot; button on the top of messages enables that you change your login password(not for others). &lt;br /&gt;
It requires the current password and the new password cannot be the same as the current password&lt;br /&gt;
&lt;br /&gt;
You can also see the message box by clicking on the 'Operational/Manager Name' on the left side menu.&lt;br /&gt;
&lt;br /&gt;
{{note | If you have administrator privileges and want to change the password of other maintenance accounts, go to the [[Maintenance | Maintenance &amp;gt; Accounts]] menu.}}&lt;br /&gt;
&lt;br /&gt;
=== System Messages ===&lt;br /&gt;
The System Messages are events for the imRAD system activities. The imRAD system notifies several messages when a job exceeds the specified threshold. you can configure it at the [[Environment]].&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Messages&amp;diff=2077</id>
		<title>Messages</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Messages&amp;diff=2077"/>
		<updated>2023-10-28T04:42:52Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* Operation Messages */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Operation Messages ===&lt;br /&gt;
All administrators and operators can write messages after clicking a 'comment' icon on the top right. You can share a message with everyone. Also, you can write a private message.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;change password&amp;quot; button on the top of messages enables that you change your login password(not for others). &lt;br /&gt;
you need to enter the current password and the new password. The new password cannot be the same as the current password&lt;br /&gt;
&lt;br /&gt;
You can also see the message box by clicking on the 'Operational/Manager Name' on the left side menu.&lt;br /&gt;
&lt;br /&gt;
{{note | If you have administrator privileges and want to change the password of other maintenance accounts, go to the [[Maintenance | Maintenance &amp;gt; Accounts]] menu.}}&lt;br /&gt;
&lt;br /&gt;
=== System Messages ===&lt;br /&gt;
The System Messages are events for the imRAD system activities. The imRAD system notifies several messages when a job exceeds the specified threshold. you can configure it at the [[Environment]].&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2076</id>
		<title>Attributes</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2076"/>
		<updated>2023-10-24T06:58:37Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* Useful User and Group Authentication Attributes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Attributes ===&lt;br /&gt;
Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which are stored on the RADIUS program.&lt;br /&gt;
&lt;br /&gt;
RADIUS Internet Engineering Task Force (IETF) attributes are the original set of 255 standard attributes that are used to communicate AAA information between a client and a server. The IETF attributes are standard and the attribute data is predefined. All clients and servers that exchange AAA information using IETF attributes must agree on attribute data such as the exact meaning of the attributes and the general bounds of the values for each attribute.&amp;lt;ref&amp;gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_radatt/configuration/xe-16/sec-usr-radatt-xe-16-book/sec-rad-ov-ietf-attr.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can search for one or more attributes in this menu.&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Authentication Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Allow || := || 1 ||  When not using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to allow 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Deny || := || 1 || When using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to deny 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| Login-Time || += || text || The Login-Time attribute defines the time span during which a user may login to the system and can deny the authentication on specified days/times. It also allows for automatic termination of wireless LAN connections if they are already established after the specified end time. However, adding this attribute later to a device already connected to the wireless LAN may not result in automatic disconnection.&lt;br /&gt;
{{note| Wireless equipment needs to support Session-Timeout attribute for automatic disconnection.}}&lt;br /&gt;
You should define time strings using the &amp;quot;Day%H%M-Day%H%M&amp;quot; format. Days can be Mo, Tu, We, Th, Fr, Sa, or Su, with &amp;quot;Wk&amp;quot; for weekdays and &amp;quot;Any&amp;quot; for all days. &amp;lt;ref&amp;gt;https://networkradius.com/doc/current/raddb/mods-available/logintime.html&amp;lt;/ref&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;quot;%H&amp;quot; represents the hours in the range from 00 to 23, and &amp;quot;%M&amp;quot; represents the minutes in the range from 00 to 59.&amp;lt;br&amp;gt;&lt;br /&gt;
If you omit &amp;quot;%H&amp;quot; and &amp;quot;%M&amp;quot; in a time string format, it indicates &amp;quot;any time&amp;quot;, allowing for any hour and any minute.&lt;br /&gt;
&lt;br /&gt;
{{note|Multiple time strings may be a list of simple time strings separated by &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;}}&lt;br /&gt;
For examples) &lt;br /&gt;
* Wk0900-1800 // Authentication is possible from Monday to Friday, between 9:00 AM and 6:00 PM.&lt;br /&gt;
* Wk0900-1800, Sa0900-1200 // Authentication is possible from Monday to Friday between 9:00 AM and 6:00 PM and on Saturday only between 9:00 AM and 12:00 PM.&lt;br /&gt;
* Any0900-1800 // Authentication is possible everyday between 9:00 AM and 6:00 PM&lt;br /&gt;
* Any0900-1800, We2000-2100 //Authentication is possible everyday between 9:00 AM and 6:00 PM, and on Wednesday only between 8:00 PM and 9:00 PM.&lt;br /&gt;
* Sa // Authentication is possible every Saturday at any time.&lt;br /&gt;
* Any // Always(Default)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| User-Login-Time || := || text || It is similar to the Login-Time attribute. however, it is an exclusive attribute that does not affect users if they are part of a specific group with its own Login-Time attribute. &amp;lt;br&amp;gt; '''This attribute applies only to users.'''&lt;br /&gt;
|-&lt;br /&gt;
| Group-Login-Time || := || text || It is also similar to the Login-Time attribute but acts as an exclusive attribute that takes precedence over Login-Time attributes for users who are part of a group, even if they have their own Login-Time attribute. However, if a user has a User-Login-Time attribute, Group-Login-Time will not be applied (User-Login-Time takes the highest priority). &amp;lt;br&amp;gt; '''This attribute applies only to groups.'''&lt;br /&gt;
|-&lt;br /&gt;
| Calling-Station-Id || =~ || mac address1 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; mac address2 ... || It is used to include the user's device MAC address for user identification during authentication. If this attribute is included, user authentication requires a match in Username, User-Password, and MAC address. You can use the &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; symbol to define multiple MAC addresses. When entering MAC addresses, use lowercase letters without separators. &lt;br /&gt;
For examples)&lt;br /&gt;
* 0000aaaa2222&lt;br /&gt;
* 0000aaaa2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000aaaa3333 // 2 MAC addresses&lt;br /&gt;
* ^bbbb22 // MAC address begins with &amp;quot;bbbb22&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
* 0000bbbb2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; ^bbbb22 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 // Multiple MAC addresses&lt;br /&gt;
&lt;br /&gt;
{{note|MAC addresses are in hexadecimal, and you should enter them in lowercase without any separators. When including multiple MAC addresses, be sure to separate them using &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; within a single Calling-Station-Id attribute. If multiple MAC addresses are defined, authentication will succeed if any one of them matches.}}&lt;br /&gt;
|-&lt;br /&gt;
| Nas-Identifier || =~ || ssid || You can specify the SSID when authenticating individual users and users included in a group. In other words, authentication will only proceed if the user connects through a specific SSID. To define multiple SSIDs, use &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;.&amp;lt;br&amp;gt;&lt;br /&gt;
For examples)&lt;br /&gt;
* my-ssid-A&lt;br /&gt;
* my-ssid-A &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; myssid-B&lt;br /&gt;
|-&lt;br /&gt;
| Expiration || := || datetime || This can be set in user or group attributes and refers to the authentication expiration time. When the time for this attribute expires, authentication for the user with this attribute or users belonging to groups that include this attribute will be denied.&lt;br /&gt;
&lt;br /&gt;
The expiration time should be defined in the format &amp;quot;%b %d %Y %H:%M:%S %Z.&amp;quot; &amp;lt;br&amp;gt;&lt;br /&gt;
For example: Oct 20 2023 14:00:00 KST&lt;br /&gt;
&lt;br /&gt;
{{note | To set the expiration time for individual users, specify &amp;quot;Expiration&amp;quot; in the detailed information of the [[RADIUS Users]] page, and then this attribute will be automatically added, so use that interface.}}&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Reply Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Session-Timeout || := || 3600~86400(second) || It refers to the Session-Timeout of a user connected to the wireless LAN, and when this time elapses, a new wireless LAN encryption key is generated to maintain a secure wireless LAN connection. In a typical WPA-Enterprise environment through a wireless LAN authentication server, keys are generated securely to maintain an encrypted channel. However, to ensure an even more secure encrypted channel, you can use this attribute.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2075</id>
		<title>Attributes</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2075"/>
		<updated>2023-10-24T06:58:18Z</updated>

		<summary type="html">&lt;p&gt;Shin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Attributes ===&lt;br /&gt;
Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which are stored on the RADIUS program.&lt;br /&gt;
&lt;br /&gt;
RADIUS Internet Engineering Task Force (IETF) attributes are the original set of 255 standard attributes that are used to communicate AAA information between a client and a server. The IETF attributes are standard and the attribute data is predefined. All clients and servers that exchange AAA information using IETF attributes must agree on attribute data such as the exact meaning of the attributes and the general bounds of the values for each attribute.&amp;lt;ref&amp;gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_radatt/configuration/xe-16/sec-usr-radatt-xe-16-book/sec-rad-ov-ietf-attr.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can search for one or more attributes in this menu.&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Authentication Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Allow || := || 1 ||  When not using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to allow 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Deny || := || 1 || When using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to deny 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| Login-Time || += || text || The Login-Time attribute defines the time span during which a user may login to the system and can deny the authentication on specified days/times. It also allows for automatic termination of wireless LAN connections if they are already established after the specified end time. However, adding this attribute later to a device already connected to the wireless LAN may not result in automatic disconnection.&lt;br /&gt;
{{note| Wireless equipment needs to support Session-Timeout attribute for automatic disconnection.}}&lt;br /&gt;
You should define time strings using the &amp;quot;Day%H%M-Day%H%M&amp;quot; format. Days can be Mo, Tu, We, Th, Fr, Sa, or Su, with &amp;quot;Wk&amp;quot; for weekdays and &amp;quot;Any&amp;quot; for all days. &amp;lt;ref&amp;gt;https://networkradius.com/doc/current/raddb/mods-available/logintime.html&amp;lt;/ref&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;quot;%H&amp;quot; represents the hours in the range from 00 to 23, and &amp;quot;%M&amp;quot; represents the minutes in the range from 00 to 59.&amp;lt;br&amp;gt;&lt;br /&gt;
If you omit &amp;quot;%H&amp;quot; and &amp;quot;%M&amp;quot; in a time string format, it indicates &amp;quot;any time&amp;quot;, allowing for any hour and any minute.&lt;br /&gt;
&lt;br /&gt;
{{note|Multiple time strings may be a list of simple time strings separated by &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;}}&lt;br /&gt;
For examples) &lt;br /&gt;
* Wk0900-1800 // Authentication is possible from Monday to Friday, between 9:00 AM and 6:00 PM.&lt;br /&gt;
* Wk0900-1800, Sa0900-1200 // Authentication is possible from Monday to Friday between 9:00 AM and 6:00 PM and on Saturday only between 9:00 AM and 12:00 PM.&lt;br /&gt;
* Any0900-1800 // Authentication is possible everyday between 9:00 AM and 6:00 PM&lt;br /&gt;
* Any0900-1800, We2000-2100 //Authentication is possible everyday between 9:00 AM and 6:00 PM, and on Wednesday only between 8:00 PM and 9:00 PM.&lt;br /&gt;
* Sa // Authentication is possible every Saturday at any time.&lt;br /&gt;
* Any // Always(Default)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| User-Login-Time || := || text || It is similar to the Login-Time attribute. however, it is an exclusive attribute that does not affect users if they are part of a specific group with its own Login-Time attribute. &amp;lt;br&amp;gt; '''This attribute applies only to users.'''&lt;br /&gt;
|-&lt;br /&gt;
| Group-Login-Time || := || text || It is also similar to the Login-Time attribute but acts as an exclusive attribute that takes precedence over Login-Time attributes for users who are part of a group, even if they have their own Login-Time attribute. However, if a user has a User-Login-Time attribute, Group-Login-Time will not be applied (User-Login-Time takes the highest priority). &amp;lt;br&amp;gt; '''This attribute applies only to groups.'''&lt;br /&gt;
|-&lt;br /&gt;
| Calling-Station-Id || =~ || mac address1 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; mac address2 ... || It is used to include the user's device MAC address for user identification during authentication. If this attribute is included, user authentication requires a match in Username, User-Password, and MAC address. You can use the &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; symbol to define multiple MAC addresses. When entering MAC addresses, use lowercase letters without separators. &lt;br /&gt;
For examples)&lt;br /&gt;
* 0000aaaa2222&lt;br /&gt;
* 0000aaaa2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000aaaa3333 // 2 MAC addresses&lt;br /&gt;
* ^bbbb22 // MAC address begins with &amp;quot;bbbb22&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
* 0000bbbb2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; ^bbbb22 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 // Multiple MAC addresses&lt;br /&gt;
&lt;br /&gt;
{{note|MAC addresses are in hexadecimal, and you should enter them in lowercase without any separators. When including multiple MAC addresses, be sure to separate them using &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; within a single Calling-Station-Id attribute. If multiple MAC addresses are defined, authentication will succeed if any one of them matches.}}&lt;br /&gt;
|-&lt;br /&gt;
| Nas-Identifier || =~ || ssid || You can specify the SSID when authenticating individual users and users included in a group. In other words, authentication will only proceed if the user connects through a specific SSID. To define multiple SSIDs, use &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;.&amp;lt;br&amp;gt;&lt;br /&gt;
For examples)&lt;br /&gt;
* my-ssid-A&lt;br /&gt;
* my-ssid-A &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; myssid-B&lt;br /&gt;
|-&lt;br /&gt;
| Expiration || := || time date || This can be set in user or group attributes and refers to the authentication expiration time. When the time for this attribute expires, authentication for the user with this attribute or users belonging to groups that include this attribute will be denied.&lt;br /&gt;
&lt;br /&gt;
The expiration time should be defined in the format &amp;quot;%b %d %Y %H:%M:%S %Z.&amp;quot; &amp;lt;br&amp;gt;&lt;br /&gt;
For example: Oct 20 2023 14:00:00 KST&lt;br /&gt;
&lt;br /&gt;
{{note | To set the expiration time for individual users, specify &amp;quot;Expiration&amp;quot; in the detailed information of the [[RADIUS Users]] page, and then this attribute will be automatically added, so use that interface.}}&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Reply Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Session-Timeout || := || 3600~86400(second) || It refers to the Session-Timeout of a user connected to the wireless LAN, and when this time elapses, a new wireless LAN encryption key is generated to maintain a secure wireless LAN connection. In a typical WPA-Enterprise environment through a wireless LAN authentication server, keys are generated securely to maintain an encrypted channel. However, to ensure an even more secure encrypted channel, you can use this attribute.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2074</id>
		<title>Attributes</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2074"/>
		<updated>2023-10-24T06:57:46Z</updated>

		<summary type="html">&lt;p&gt;Shin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Attributes ===&lt;br /&gt;
Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which are stored on the RADIUS program.&lt;br /&gt;
&lt;br /&gt;
RADIUS Internet Engineering Task Force (IETF) attributes are the original set of 255 standard attributes that are used to communicate AAA information between a client and a server. The IETF attributes are standard and the attribute data is predefined. All clients and servers that exchange AAA information using IETF attributes must agree on attribute data such as the exact meaning of the attributes and the general bounds of the values for each attribute.&amp;lt;ref&amp;gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_radatt/configuration/xe-16/sec-usr-radatt-xe-16-book/sec-rad-ov-ietf-attr.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can search for one or more attributes in this menu.&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Authentication Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Allow || := || 1 ||  When not using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to allow 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Deny || := || 1 || When using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to deny 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| Login-Time || += || text || The Login-Time attribute defines the time span during which a user may login to the system and can deny the authentication on specified days/times. It also allows for automatic termination of wireless LAN connections if they are already established after the specified end time. However, adding this attribute later to a device already connected to the wireless LAN may not result in automatic disconnection.&lt;br /&gt;
{{note| Wireless equipment needs to support Session-Timeout attribute for automatic disconnection.}}&lt;br /&gt;
You should define time strings using the &amp;quot;Day%H%M-Day%H%M&amp;quot; format. Days can be Mo, Tu, We, Th, Fr, Sa, or Su, with &amp;quot;Wk&amp;quot; for weekdays and &amp;quot;Any&amp;quot; for all days. &amp;lt;ref&amp;gt;https://networkradius.com/doc/current/raddb/mods-available/logintime.html&amp;lt;/ref&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;quot;%H&amp;quot; represents the hours in the range from 00 to 23, and &amp;quot;%M&amp;quot; represents the minutes in the range from 00 to 59.&amp;lt;br&amp;gt;&lt;br /&gt;
If you omit &amp;quot;%H&amp;quot; and &amp;quot;%M&amp;quot; in a time string format, it indicates &amp;quot;any time&amp;quot;, allowing for any hour and any minute.&lt;br /&gt;
&lt;br /&gt;
{{note|Multiple time strings may be a list of simple time strings separated by &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;}}&lt;br /&gt;
For examples) &lt;br /&gt;
* Wk0900-1800 // Authentication is possible from Monday to Friday, between 9:00 AM and 6:00 PM.&lt;br /&gt;
* Wk0900-1800, Sa0900-1200 // Authentication is possible from Monday to Friday between 9:00 AM and 6:00 PM and on Saturday only between 9:00 AM and 12:00 PM.&lt;br /&gt;
* Any0900-1800 // Authentication is possible everyday between 9:00 AM and 6:00 PM&lt;br /&gt;
* Any0900-1800, We2000-2100 //Authentication is possible everyday between 9:00 AM and 6:00 PM, and on Wednesday only between 8:00 PM and 9:00 PM.&lt;br /&gt;
* Sa // Authentication is possible every Saturday at any time.&lt;br /&gt;
* Any // Always(Default)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| User-Login-Time || := || text || It is similar to the Login-Time attribute. however, it is an exclusive attribute that does not affect users if they are part of a specific group with its own Login-Time attribute. &amp;lt;br&amp;gt; '''This attribute applies only to users.'''&lt;br /&gt;
|-&lt;br /&gt;
| Group-Login-Time || := || text || It is also similar to the Login-Time attribute but acts as an exclusive attribute that takes precedence over Login-Time attributes for users who are part of a group, even if they have their own Login-Time attribute. However, if a user has a User-Login-Time attribute, Group-Login-Time will not be applied (User-Login-Time takes the highest priority). &amp;lt;br&amp;gt; '''This attribute applies only to groups.'''&lt;br /&gt;
|-&lt;br /&gt;
| Calling-Station-Id || =~ || mac address1 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; mac address2 ... || It is used to include the user's device MAC address for user identification during authentication. If this attribute is included, user authentication requires a match in Username, User-Password, and MAC address. You can use the &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; symbol to define multiple MAC addresses. When entering MAC addresses, use lowercase letters without separators. &lt;br /&gt;
For examples)&lt;br /&gt;
* 0000aaaa2222&lt;br /&gt;
* 0000aaaa2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000aaaa3333 // 2 MAC addresses&lt;br /&gt;
* ^bbbb22 // MAC address begins with &amp;quot;bbbb22&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
* 0000bbbb2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; ^bbbb22 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 // Multiple MAC addresses&lt;br /&gt;
&lt;br /&gt;
{{note|MAC addresses are in hexadecimal, and you should enter them in lowercase without any separators. When including multiple MAC addresses, be sure to separate them using &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; within a single Calling-Station-Id attribute. If multiple MAC addresses are defined, authentication will succeed if any one of them matches.}}&lt;br /&gt;
|-&lt;br /&gt;
| Nas-Identifier || =~ || ssid || You can specify the SSID when authenticating individual users and users included in a group. In other words, authentication will only proceed if the user connects through a specific SSID. To define multiple SSIDs, use &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;.&amp;lt;br&amp;gt;&lt;br /&gt;
For examples)&lt;br /&gt;
* my-ssid-A&lt;br /&gt;
* my-ssid-A &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; myssid-B&lt;br /&gt;
|-&lt;br /&gt;
| Expiration || := || time || This can be set in user or group attributes and refers to the authentication expiration time. When the time for this attribute expires, authentication for the user with this attribute or users belonging to groups that include this attribute will be denied.&lt;br /&gt;
&lt;br /&gt;
The expiration time should be defined in the format &amp;quot;%b %d %Y %H:%M:%S %Z.&amp;quot; &amp;lt;br&amp;gt;&lt;br /&gt;
For example: Oct 20 2023 14:00:00 KST&lt;br /&gt;
&lt;br /&gt;
{{note | To set the expiration time for individual users, specify &amp;quot;Expiration&amp;quot; in the detailed information of the [[RADIUS Users]] page, and then this attribute will be automatically added, so use that interface.}}&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Reply Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Session-Timeout || := || 3600~86400(second) || It refers to the Session-Timeout of a user connected to the wireless LAN, and when this time elapses, a new wireless LAN encryption key is generated to maintain a secure wireless LAN connection. In a typical WPA-Enterprise environment through a wireless LAN authentication server, keys are generated securely to maintain an encrypted channel. However, to ensure an even more secure encrypted channel, you can use this attribute.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Users&amp;diff=2073</id>
		<title>RADIUS Users</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Users&amp;diff=2073"/>
		<updated>2023-10-24T06:55:30Z</updated>

		<summary type="html">&lt;p&gt;Shin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Users ===&lt;br /&gt;
You can add, update, or delete the usernames for the RADIUS authentication.&lt;br /&gt;
&lt;br /&gt;
==== Create New User ====&lt;br /&gt;
You can add a new user at the top right of the page and can create a user as either a Username authentication or a [[MAC Address]] authentication.&lt;br /&gt;
The Username authentication stores a User-Name and User-Password and the credentials are validated with the two attributes to authenticate an ACCESS-REQUEST.&amp;lt;br&amp;gt;&lt;br /&gt;
The MAC address authentication store a MAC address of a user machine and the credentials are validated with the address. The MAC address type is applied usually in the environment of an open wireless network.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Username Authentication&lt;br /&gt;
|-&lt;br /&gt;
! style='width:150px' | Item !! Required !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Username|| Yes || The multibyte characters(e.g, korean, japaneses) are not allowed.&lt;br /&gt;
|-&lt;br /&gt;
| Status || Yes || Select &amp;quot;authorized&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Password Type || Yes || It is the encryption method of a password. If a user machine is windows 10, the type must be either the Windows NT hashed passwords or clear-text passwords.&lt;br /&gt;
|-&lt;br /&gt;
| Password&amp;lt;br&amp;gt;Confirm Password|| Yes || Input the password of a username.&lt;br /&gt;
|-&lt;br /&gt;
| Expiration || No || Set the user authentication expiration date.&lt;br /&gt;
|-&lt;br /&gt;
| User Information || Optional || You can fill out the general user information. You can change the title of the form from the &amp;quot;Environment &amp;gt; [[Environment  | Custom Fields]]&amp;quot;.&lt;br /&gt;
|-&lt;br /&gt;
| Group || No || The group to which the user.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ MAC Address Authentication&lt;br /&gt;
|-&lt;br /&gt;
!  style='width:150px' | Item !! Required !! Description&lt;br /&gt;
|-&lt;br /&gt;
| MAC Address || Yes || The [[MAC Address]] of a user machine. The address is case-sensitive and also may include delimiters and you can find the format of the MAC address from the [[Accounting]].&lt;br /&gt;
|-&lt;br /&gt;
| Expiration || No || Set the user authentication expiration date.&lt;br /&gt;
|-&lt;br /&gt;
| colspan=3 | Others are same as the Username Authentication.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== User Authorization, Updating, and Deleting ====&lt;br /&gt;
A username that was registered from the captive portal page will be added as an un-authorized one. You can authorize it by click the [[File:popup.png|23x]] icon in front of each row.&lt;br /&gt;
Within the same interface, you can also change other information and delete a user.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Additional Attributes ====&lt;br /&gt;
===== Authentication Attributes =====&lt;br /&gt;
Authentication attributes are pieces of information used in RADIUS authentication in addition to the basic information (User-Name, User-Password). For useful authentication attributes, refer to the [[Attributes]] section.&lt;br /&gt;
&lt;br /&gt;
===== Reply Attributes =====&lt;br /&gt;
Reply attributes refer to the attributes provided to the user after RADIUS authentication. For useful reply attributes, refer to the [[Attributes]] section.&lt;br /&gt;
&lt;br /&gt;
==== Password Reset ====&lt;br /&gt;
You can reset the password of registered users.&lt;br /&gt;
&lt;br /&gt;
When a user's password is reset, the previous password becomes unusable, and a temporary password is issued. The use of such temporary passwords and the password reset feature can be configured in RADIUS &amp;gt; Settings &amp;gt; General &amp;gt; [[RADIUS Settings - General | Password Complexity Requirements for RADIUS User-Password]]. If the password reset feature is inactive (default state), users cannot use the password reset function.&lt;br /&gt;
&lt;br /&gt;
When a password is reset, the user must create a new password using the temporary password on the password change page. For more details, refer to RADIUS &amp;gt; Settings &amp;gt; General &amp;gt; [[RADIUS Settings - General | Password Complexity Requirements for RADIUS User-Password]].&lt;br /&gt;
&lt;br /&gt;
{{note|Passwords for users authenticated based on MAC address or stored in an external database as &amp;quot;[[RADIUS Settings - General | cached user]]&amp;quot; cannot be reset.}}&lt;br /&gt;
&lt;br /&gt;
==== Expiration ====&lt;br /&gt;
Users with a specified expiration time that has passed will not be granted authentication (Access-Reject), and this information will not be automatically deleted.&amp;quot;&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2072</id>
		<title>Attributes</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2072"/>
		<updated>2023-10-19T08:10:27Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* Useful User and Group Authentication Attributes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Attributes ===&lt;br /&gt;
Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which are stored on the RADIUS program.&lt;br /&gt;
&lt;br /&gt;
RADIUS Internet Engineering Task Force (IETF) attributes are the original set of 255 standard attributes that are used to communicate AAA information between a client and a server. The IETF attributes are standard and the attribute data is predefined. All clients and servers that exchange AAA information using IETF attributes must agree on attribute data such as the exact meaning of the attributes and the general bounds of the values for each attribute.&amp;lt;ref&amp;gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_radatt/configuration/xe-16/sec-usr-radatt-xe-16-book/sec-rad-ov-ietf-attr.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can search for one or more attributes in this menu.&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Authentication Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Allow || := || 1 ||  When not using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to allow 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Deny || := || 1 || When using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to deny 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| Login-Time || += || text || The Login-Time attribute defines the time span during which a user may login to the system and can deny the authentication on specified days/times. It also allows for automatic termination of wireless LAN connections if they are already established after the specified end time. However, adding this attribute later to a device already connected to the wireless LAN may not result in automatic disconnection.&lt;br /&gt;
{{note| Wireless equipment needs to support Session-Timeout attribute for automatic disconnection.}}&lt;br /&gt;
You should define time strings using the &amp;quot;Day%H%M-Day%H%M&amp;quot; format. Days can be Mo, Tu, We, Th, Fr, Sa, or Su, with &amp;quot;Wk&amp;quot; for weekdays and &amp;quot;Any&amp;quot; for all days. &amp;lt;ref&amp;gt;https://networkradius.com/doc/current/raddb/mods-available/logintime.html&amp;lt;/ref&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;quot;%H&amp;quot; represents the hours in the range from 00 to 23, and &amp;quot;%M&amp;quot; represents the minutes in the range from 00 to 59.&amp;lt;br&amp;gt;&lt;br /&gt;
If you omit &amp;quot;%H&amp;quot; and &amp;quot;%M&amp;quot; in a time string format, it indicates &amp;quot;any time&amp;quot;, allowing for any hour and any minute.&lt;br /&gt;
&lt;br /&gt;
{{note|Multiple time strings may be a list of simple time strings separated by &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;}}&lt;br /&gt;
For examples) &lt;br /&gt;
* Wk0900-1800 // Authentication is possible from Monday to Friday, between 9:00 AM and 6:00 PM.&lt;br /&gt;
* Wk0900-1800, Sa0900-1200 // Authentication is possible from Monday to Friday between 9:00 AM and 6:00 PM and on Saturday only between 9:00 AM and 12:00 PM.&lt;br /&gt;
* Any0900-1800 // Authentication is possible everyday between 9:00 AM and 6:00 PM&lt;br /&gt;
* Any0900-1800, We2000-2100 //Authentication is possible everyday between 9:00 AM and 6:00 PM, and on Wednesday only between 8:00 PM and 9:00 PM.&lt;br /&gt;
* Sa // Authentication is possible every Saturday at any time.&lt;br /&gt;
* Any // Always(Default)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| User-Login-Time || := || text || It is similar to the Login-Time attribute. however, it is an exclusive attribute that does not affect users if they are part of a specific group with its own Login-Time attribute. &amp;lt;br&amp;gt; '''This attribute applies only to users.'''&lt;br /&gt;
|-&lt;br /&gt;
| Group-Login-Time || := || text || It is also similar to the Login-Time attribute but acts as an exclusive attribute that takes precedence over Login-Time attributes for users who are part of a group, even if they have their own Login-Time attribute. However, if a user has a User-Login-Time attribute, Group-Login-Time will not be applied (User-Login-Time takes the highest priority). &amp;lt;br&amp;gt; '''This attribute applies only to groups.'''&lt;br /&gt;
|-&lt;br /&gt;
| Calling-Station-Id || =~ || mac address1 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; mac address2 ... || It is used to include the user's device MAC address for user identification during authentication. If this attribute is included, user authentication requires a match in Username, User-Password, and MAC address. You can use the &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; symbol to define multiple MAC addresses. When entering MAC addresses, use lowercase letters without separators. &lt;br /&gt;
For examples)&lt;br /&gt;
* 0000aaaa2222&lt;br /&gt;
* 0000aaaa2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000aaaa3333 // 2 MAC addresses&lt;br /&gt;
* ^bbbb22 // MAC address begins with &amp;quot;bbbb22&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
* 0000bbbb2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; ^bbbb22 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 // Multiple MAC addresses&lt;br /&gt;
&lt;br /&gt;
{{note|MAC addresses are in hexadecimal, and you should enter them in lowercase without any separators. When including multiple MAC addresses, be sure to separate them using &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; within a single Calling-Station-Id attribute. If multiple MAC addresses are defined, authentication will succeed if any one of them matches.}}&lt;br /&gt;
|-&lt;br /&gt;
| Nas-Identifier || =~ || ssid || You can specify the SSID when authenticating individual users and users included in a group. In other words, authentication will only proceed if the user connects through a specific SSID. To define multiple SSIDs, use &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;.&amp;lt;br&amp;gt;&lt;br /&gt;
For examples)&lt;br /&gt;
* my-ssid-A&lt;br /&gt;
* my-ssid-A &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; myssid-B&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Reply Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Session-Timeout || := || 3600~86400(second) || It refers to the Session-Timeout of a user connected to the wireless LAN, and when this time elapses, a new wireless LAN encryption key is generated to maintain a secure wireless LAN connection. In a typical WPA-Enterprise environment through a wireless LAN authentication server, keys are generated securely to maintain an encrypted channel. However, to ensure an even more secure encrypted channel, you can use this attribute.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2071</id>
		<title>Attributes</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2071"/>
		<updated>2023-10-19T08:07:24Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* RADIUS &amp;gt; Attributes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Attributes ===&lt;br /&gt;
Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which are stored on the RADIUS program.&lt;br /&gt;
&lt;br /&gt;
RADIUS Internet Engineering Task Force (IETF) attributes are the original set of 255 standard attributes that are used to communicate AAA information between a client and a server. The IETF attributes are standard and the attribute data is predefined. All clients and servers that exchange AAA information using IETF attributes must agree on attribute data such as the exact meaning of the attributes and the general bounds of the values for each attribute.&amp;lt;ref&amp;gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_radatt/configuration/xe-16/sec-usr-radatt-xe-16-book/sec-rad-ov-ietf-attr.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can search for one or more attributes in this menu.&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Authentication Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Allow || := || 1 ||  When not using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to allow 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Deny || := || 1 || When using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to deny 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| Login-Time || += || text || The Login-Time attribute defines the time span during which a user may login to the system and can deny the authentication on specified days/times. It also allows for automatic termination of wireless LAN connections if they are already established after the specified end time. However, adding this attribute later to a device already connected to the wireless LAN may not result in automatic disconnection.&lt;br /&gt;
{{note| Wireless equipment needs to support Session-Timeout attribute for automatic disconnection.}}&lt;br /&gt;
You should define time strings using the &amp;quot;Day%H%M-Day%H%M&amp;quot; format. Days can be Mo, Tu, We, Th, Fr, Sa, or Su, with &amp;quot;Wk&amp;quot; for weekdays and &amp;quot;Any&amp;quot; for all days. &amp;lt;ref&amp;gt;https://networkradius.com/doc/current/raddb/mods-available/logintime.html&amp;lt;/ref&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;quot;%H&amp;quot; represents the hours in the range from 00 to 23, and &amp;quot;%M&amp;quot; represents the minutes in the range from 00 to 59&lt;br /&gt;
&lt;br /&gt;
{{note|Multiple time strings may be a list of simple time strings separated by &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;}}&lt;br /&gt;
For examples) &lt;br /&gt;
* Wk0900-1800 // Authentication is possible from Monday to Friday, between 9:00 AM and 6:00 PM.&lt;br /&gt;
* Wk0900-1800, Sa0900-1200 // Authentication is possible from Monday to Friday between 9:00 AM and 6:00 PM and on Saturday only between 9:00 AM and 12:00 PM.&lt;br /&gt;
* Any0900-1800 // Authentication is possible everyday between 9:00 AM and 6:00 PM&lt;br /&gt;
* Any0900-1800, We2000-2100 //Authentication is possible everyday between 9:00 AM and 6:00 PM, and on Wednesday only between 8:00 PM and 9:00 PM.&lt;br /&gt;
* Sa // Authentication is possible every Saturday at any time.&lt;br /&gt;
* Any // Always(Default)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| User-Login-Time || := || text || It is similar to the Login-Time attribute. however, it is an exclusive attribute that does not affect users if they are part of a specific group with its own Login-Time attribute. &amp;lt;br&amp;gt; '''This attribute applies only to users.'''&lt;br /&gt;
|-&lt;br /&gt;
| Group-Login-Time || := || text || It is also similar to the Login-Time attribute but acts as an exclusive attribute that takes precedence over Login-Time attributes for users who are part of a group, even if they have their own Login-Time attribute. However, if a user has a User-Login-Time attribute, Group-Login-Time will not be applied (User-Login-Time takes the highest priority). &amp;lt;br&amp;gt; '''This attribute applies only to groups.'''&lt;br /&gt;
|-&lt;br /&gt;
| Calling-Station-Id || =~ || mac address1 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; mac address2 ... || It is used to include the user's device MAC address for user identification during authentication. If this attribute is included, user authentication requires a match in Username, User-Password, and MAC address. You can use the &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; symbol to define multiple MAC addresses. When entering MAC addresses, use lowercase letters without separators. &lt;br /&gt;
For examples)&lt;br /&gt;
* 0000aaaa2222&lt;br /&gt;
* 0000aaaa2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000aaaa3333 // 2 MAC addresses&lt;br /&gt;
* ^bbbb22 // MAC address begins with &amp;quot;bbbb22&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
* 0000bbbb2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; ^bbbb22 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 // Multiple MAC addresses&lt;br /&gt;
&lt;br /&gt;
{{note|MAC addresses are in hexadecimal, and you should enter them in lowercase without any separators. When including multiple MAC addresses, be sure to separate them using &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; within a single Calling-Station-Id attribute. If multiple MAC addresses are defined, authentication will succeed if any one of them matches.}}&lt;br /&gt;
|-&lt;br /&gt;
| Nas-Identifier || =~ || ssid || You can specify the SSID when authenticating individual users and users included in a group. In other words, authentication will only proceed if the user connects through a specific SSID. To define multiple SSIDs, use &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;.&amp;lt;br&amp;gt;&lt;br /&gt;
For examples)&lt;br /&gt;
* my-ssid-A&lt;br /&gt;
* my-ssid-A &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; myssid-B&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Reply Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Session-Timeout || := || 3600~86400(second) || It refers to the Session-Timeout of a user connected to the wireless LAN, and when this time elapses, a new wireless LAN encryption key is generated to maintain a secure wireless LAN connection. In a typical WPA-Enterprise environment through a wireless LAN authentication server, keys are generated securely to maintain an encrypted channel. However, to ensure an even more secure encrypted channel, you can use this attribute.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2070</id>
		<title>Attributes</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2070"/>
		<updated>2023-10-19T08:05:47Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* RADIUS &amp;gt; Attributes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Attributes ===&lt;br /&gt;
Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which are stored on the RADIUS program.&lt;br /&gt;
&lt;br /&gt;
RADIUS Internet Engineering Task Force (IETF) attributes are the original set of 255 standard attributes that are used to communicate AAA information between a client and a server. The IETF attributes are standard and the attribute data is predefined. All clients and servers that exchange AAA information using IETF attributes must agree on attribute data such as the exact meaning of the attributes and the general bounds of the values for each attribute.&amp;lt;ref&amp;gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_radatt/configuration/xe-16/sec-usr-radatt-xe-16-book/sec-rad-ov-ietf-attr.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can search for one or more attributes in this menu.&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Authentication Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Allow || := || 1 ||  When not using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to allow 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Deny || := || 1 || When using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to deny 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| Login-Time || += || text || The Login-Time attribute defines the time span during which a user may login to the system and can deny the authentication on specified days/times. It also allows for automatic termination of wireless LAN connections if they are already established after the specified end time. However, adding this attribute later to a device already connected to the wireless LAN may not result in automatic disconnection.&lt;br /&gt;
{{note| Wireless equipment needs to support Session-Timeout attribute for automatic disconnection.}}&lt;br /&gt;
You should define time strings using the &amp;quot;Day%H%M-Day%H%M&amp;quot; format. Days can be Mo, Tu, We, Th, Fr, Sa, or Su, with &amp;quot;Wk&amp;quot; for weekdays and &amp;quot;Any&amp;quot; for all days. &amp;lt;ref&amp;gt;https://networkradius.com/doc/current/raddb/mods-available/logintime.html&amp;lt;/ref&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;quot;%H&amp;quot; represents the hour in the range from 00 to 23, and &amp;quot;%M&amp;quot; represents the minutes in the range from 00 to 59&lt;br /&gt;
&lt;br /&gt;
{{note|Multiple time strings may be a list of simple time strings separated by &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;}}&lt;br /&gt;
For examples) &lt;br /&gt;
* Wk0900-1800 // Authentication is possible from Monday to Friday, between 9:00 AM and 6:00 PM.&lt;br /&gt;
* Wk0900-1800, Sa0900-1200 // Authentication is possible from Monday to Friday between 9:00 AM and 6:00 PM and on Saturday only between 9:00 AM and 12:00 PM.&lt;br /&gt;
* Any0900-1800 // Authentication is possible everyday between 9:00 AM and 6:00 PM&lt;br /&gt;
* Any0900-1800, We2000-2100 //Authentication is possible everyday between 9:00 AM and 6:00 PM, and on Wednesday only between 8:00 PM and 9:00 PM.&lt;br /&gt;
* Sa // Authentication is possible every Saturday at any time.&lt;br /&gt;
* Any // Always(Default)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| User-Login-Time || := || text || It is similar to the Login-Time attribute. however, it is an exclusive attribute that does not affect users if they are part of a specific group with its own Login-Time attribute. &amp;lt;br&amp;gt; '''This attribute applies only to users.'''&lt;br /&gt;
|-&lt;br /&gt;
| Group-Login-Time || := || text || It is also similar to the Login-Time attribute but acts as an exclusive attribute that takes precedence over Login-Time attributes for users who are part of a group, even if they have their own Login-Time attribute. However, if a user has a User-Login-Time attribute, Group-Login-Time will not be applied (User-Login-Time takes the highest priority). &amp;lt;br&amp;gt; '''This attribute applies only to groups.'''&lt;br /&gt;
|-&lt;br /&gt;
| Calling-Station-Id || =~ || mac address1 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; mac address2 ... || It is used to include the user's device MAC address for user identification during authentication. If this attribute is included, user authentication requires a match in Username, User-Password, and MAC address. You can use the &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; symbol to define multiple MAC addresses. When entering MAC addresses, use lowercase letters without separators. &lt;br /&gt;
For examples)&lt;br /&gt;
* 0000aaaa2222&lt;br /&gt;
* 0000aaaa2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000aaaa3333 // 2 MAC addresses&lt;br /&gt;
* ^bbbb22 // MAC address begins with &amp;quot;bbbb22&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
* 0000bbbb2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; ^bbbb22 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 // Multiple MAC addresses&lt;br /&gt;
&lt;br /&gt;
{{note|MAC addresses are in hexadecimal, and you should enter them in lowercase without any separators. When including multiple MAC addresses, be sure to separate them using &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; within a single Calling-Station-Id attribute. If multiple MAC addresses are defined, authentication will succeed if any one of them matches.}}&lt;br /&gt;
|-&lt;br /&gt;
| Nas-Identifier || =~ || ssid || You can specify the SSID when authenticating individual users and users included in a group. In other words, authentication will only proceed if the user connects through a specific SSID. To define multiple SSIDs, use &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;.&amp;lt;br&amp;gt;&lt;br /&gt;
For examples)&lt;br /&gt;
* my-ssid-A&lt;br /&gt;
* my-ssid-A &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; myssid-B&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Reply Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Session-Timeout || := || 3600~86400(second) || It refers to the Session-Timeout of a user connected to the wireless LAN, and when this time elapses, a new wireless LAN encryption key is generated to maintain a secure wireless LAN connection. In a typical WPA-Enterprise environment through a wireless LAN authentication server, keys are generated securely to maintain an encrypted channel. However, to ensure an even more secure encrypted channel, you can use this attribute.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2069</id>
		<title>Attributes</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2069"/>
		<updated>2023-10-19T07:48:06Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* Useful User and Group Authentication Attributes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Attributes ===&lt;br /&gt;
Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which are stored on the RADIUS program.&lt;br /&gt;
&lt;br /&gt;
RADIUS Internet Engineering Task Force (IETF) attributes are the original set of 255 standard attributes that are used to communicate AAA information between a client and a server. The IETF attributes are standard and the attribute data is predefined. All clients and servers that exchange AAA information using IETF attributes must agree on attribute data such as the exact meaning of the attributes and the general bounds of the values for each attribute.&amp;lt;ref&amp;gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_radatt/configuration/xe-16/sec-usr-radatt-xe-16-book/sec-rad-ov-ietf-attr.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can search for one or more attributes in this menu.&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Authentication Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Allow || := || 1 ||  When not using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to allow 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Deny || := || 1 || When using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to deny 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| Login-Time || += || text || The Login-Time attribute defines the time span during which a user may login to the system and can deny the authentication on specified days/times. It also allows for automatic termination of wireless LAN connections if they are already established after the specified end time. However, adding this attribute later to a device already connected to the wireless LAN may not result in automatic disconnection.&lt;br /&gt;
{{note| Wireless equipment needs to support Session-Timeout attribute for automatic disconnection.}}&lt;br /&gt;
You should define time strings using the &amp;quot;Day%H%M-Day%H%M&amp;quot; format. Days can be Mo, Tu, We, Th, Fr, Sa, or Su, with &amp;quot;Wk&amp;quot; for weekdays and &amp;quot;Any&amp;quot; for all days. &amp;lt;ref&amp;gt;https://networkradius.com/doc/current/raddb/mods-available/logintime.html&amp;lt;/ref&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
%H indicates hour(00..23) and %M indicates minutes(00..59).&lt;br /&gt;
&lt;br /&gt;
{{note|Multiple time strings may be a list of simple time strings separated by &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;}}&lt;br /&gt;
For examples) &lt;br /&gt;
* Wk0900-1800 // Authentication is possible from Monday to Friday, between 9:00 AM and 6:00 PM.&lt;br /&gt;
* Wk0900-1800, Sa0900-1200 // Authentication is possible from Monday to Friday between 9:00 AM and 6:00 PM and on Saturday only between 9:00 AM and 12:00 PM.&lt;br /&gt;
* Any0900-1800 // Authentication is possible everyday between 9:00 AM and 6:00 PM&lt;br /&gt;
* Any0900-1800, We2000-2100 //Authentication is possible everyday between 9:00 AM and 6:00 PM, and on Wednesday only between 8:00 PM and 9:00 PM.&lt;br /&gt;
* Sa // Authentication is possible every Saturday at any time.&lt;br /&gt;
* Any // Always(Default)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| User-Login-Time || := || text || It is similar to the Login-Time attribute. however, it is an exclusive attribute that does not affect users if they are part of a specific group with its own Login-Time attribute. &amp;lt;br&amp;gt; '''This attribute applies only to users.'''&lt;br /&gt;
|-&lt;br /&gt;
| Group-Login-Time || := || text || It is also similar to the Login-Time attribute but acts as an exclusive attribute that takes precedence over Login-Time attributes for users who are part of a group, even if they have their own Login-Time attribute. However, if a user has a User-Login-Time attribute, Group-Login-Time will not be applied (User-Login-Time takes the highest priority). &amp;lt;br&amp;gt; '''This attribute applies only to groups.'''&lt;br /&gt;
|-&lt;br /&gt;
| Calling-Station-Id || =~ || mac address1 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; mac address2 ... || It is used to include the user's device MAC address for user identification during authentication. If this attribute is included, user authentication requires a match in Username, User-Password, and MAC address. You can use the &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; symbol to define multiple MAC addresses. When entering MAC addresses, use lowercase letters without separators. &lt;br /&gt;
For examples)&lt;br /&gt;
* 0000aaaa2222&lt;br /&gt;
* 0000aaaa2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000aaaa3333 // 2 MAC addresses&lt;br /&gt;
* ^bbbb22 // MAC address begins with &amp;quot;bbbb22&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
* 0000bbbb2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; ^bbbb22 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 // Multiple MAC addresses&lt;br /&gt;
&lt;br /&gt;
{{note|MAC addresses are in hexadecimal, and you should enter them in lowercase without any separators. When including multiple MAC addresses, be sure to separate them using &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; within a single Calling-Station-Id attribute. If multiple MAC addresses are defined, authentication will succeed if any one of them matches.}}&lt;br /&gt;
|-&lt;br /&gt;
| Nas-Identifier || =~ || ssid || You can specify the SSID when authenticating individual users and users included in a group. In other words, authentication will only proceed if the user connects through a specific SSID. To define multiple SSIDs, use &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;.&amp;lt;br&amp;gt;&lt;br /&gt;
For examples)&lt;br /&gt;
* my-ssid-A&lt;br /&gt;
* my-ssid-A &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; myssid-B&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Reply Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Session-Timeout || := || 3600~86400(second) || It refers to the Session-Timeout of a user connected to the wireless LAN, and when this time elapses, a new wireless LAN encryption key is generated to maintain a secure wireless LAN connection. In a typical WPA-Enterprise environment through a wireless LAN authentication server, keys are generated securely to maintain an encrypted channel. However, to ensure an even more secure encrypted channel, you can use this attribute.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2068</id>
		<title>Attributes</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2068"/>
		<updated>2023-10-19T07:46:46Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* RADIUS &amp;gt; Attributes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Attributes ===&lt;br /&gt;
Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which are stored on the RADIUS program.&lt;br /&gt;
&lt;br /&gt;
RADIUS Internet Engineering Task Force (IETF) attributes are the original set of 255 standard attributes that are used to communicate AAA information between a client and a server. The IETF attributes are standard and the attribute data is predefined. All clients and servers that exchange AAA information using IETF attributes must agree on attribute data such as the exact meaning of the attributes and the general bounds of the values for each attribute.&amp;lt;ref&amp;gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_radatt/configuration/xe-16/sec-usr-radatt-xe-16-book/sec-rad-ov-ietf-attr.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can search for one or more attributes in this menu.&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Authentication Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Allow || := || 1 ||  When not using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to allow 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Deny || := || 1 || When using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to deny 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| Login-Time || += || text || The Login-Time attribute defines the time span during which a user may login to the system and can deny the authentication on specified days/times. It also allows for automatic termination of wireless LAN connections if they are already established after the specified end time. However, adding this attribute later to a device already connected to the wireless LAN may not result in automatic disconnection.&lt;br /&gt;
{{note| Wireless equipment needs to support Session-Timeout attribute for automatic disconnection.}}&lt;br /&gt;
You should define time strings using the &amp;quot;Day%H%M-Day%H%M&amp;quot; format. Days can be Mo, Tu, We, Th, Fr, Sa, or Su, with &amp;quot;Wk&amp;quot; for weekdays and &amp;quot;Any&amp;quot; for all days. &amp;lt;ref&amp;gt;https://networkradius.com/doc/current/raddb/mods-available/logintime.html&amp;lt;/ref&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
%H indicates hour(00..23) and %M indicates minutes(00..59).&lt;br /&gt;
&lt;br /&gt;
{{note|Multiple time strings may be a list of simple time strings separated by &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;}}&lt;br /&gt;
For examples) &lt;br /&gt;
* Wk0900-1800 // Authentication is possible from Monday to Friday, between 9:00 AM and 6:00 PM.&lt;br /&gt;
* Wk0900-1800, Sa0900-1200 // Authentication is possible from Monday to Friday between 9:00 AM and 6:00 PM and on Saturday only between 9:00 AM and 12:00 PM.&lt;br /&gt;
* Any0900-1800 // Authentication is possible everyday between 9:00 AM and 6:00 PM&lt;br /&gt;
* Any0900-1800, We2000-2100 //Authentication is possible everyday between 9:00 AM and 6:00 PM, and on Wednesday only between 8:00 PM and 9:00 PM.&lt;br /&gt;
* Any // Always(Default)&lt;br /&gt;
* Sa // Authentication is possible every Saturday at any time.&lt;br /&gt;
|-&lt;br /&gt;
| User-Login-Time || := || text || It is similar to the Login-Time attribute. however, it is an exclusive attribute that does not affect users if they are part of a specific group with its own Login-Time attribute. &amp;lt;br&amp;gt; '''This attribute applies only to users.'''&lt;br /&gt;
|-&lt;br /&gt;
| Group-Login-Time || := || text || It is also similar to the Login-Time attribute but acts as an exclusive attribute that takes precedence over Login-Time attributes for users who are part of a group, even if they have their own Login-Time attribute. However, if a user has a User-Login-Time attribute, Group-Login-Time will not be applied (User-Login-Time takes the highest priority). &amp;lt;br&amp;gt; '''This attribute applies only to groups.'''&lt;br /&gt;
|-&lt;br /&gt;
| Calling-Station-Id || =~ || mac address1 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; mac address2 ... || It is used to include the user's device MAC address for user identification during authentication. If this attribute is included, user authentication requires a match in Username, User-Password, and MAC address. You can use the &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; symbol to define multiple MAC addresses. When entering MAC addresses, use lowercase letters without separators. &lt;br /&gt;
For examples)&lt;br /&gt;
* 0000aaaa2222&lt;br /&gt;
* 0000aaaa2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000aaaa3333 // 2 MAC addresses&lt;br /&gt;
* ^bbbb22 // MAC address begins with &amp;quot;bbbb22&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
* 0000bbbb2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; ^bbbb22 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 // Multiple MAC addresses&lt;br /&gt;
&lt;br /&gt;
{{note|MAC addresses are in hexadecimal, and you should enter them in lowercase without any separators. When including multiple MAC addresses, be sure to separate them using &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; within a single Calling-Station-Id attribute. If multiple MAC addresses are defined, authentication will succeed if any one of them matches.}}&lt;br /&gt;
|-&lt;br /&gt;
| Nas-Identifier || =~ || ssid || You can specify the SSID when authenticating individual users and users included in a group. In other words, authentication will only proceed if the user connects through a specific SSID. To define multiple SSIDs, use &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;.&amp;lt;br&amp;gt;&lt;br /&gt;
For examples)&lt;br /&gt;
* my-ssid-A&lt;br /&gt;
* my-ssid-A &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; myssid-B&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Reply Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Session-Timeout || := || 3600~86400(second) || It refers to the Session-Timeout of a user connected to the wireless LAN, and when this time elapses, a new wireless LAN encryption key is generated to maintain a secure wireless LAN connection. In a typical WPA-Enterprise environment through a wireless LAN authentication server, keys are generated securely to maintain an encrypted channel. However, to ensure an even more secure encrypted channel, you can use this attribute.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2067</id>
		<title>Attributes</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2067"/>
		<updated>2023-10-19T07:46:28Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* Useful User and Group Authentication Attributes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Attributes ===&lt;br /&gt;
Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which are stored on the RADIUS program.&lt;br /&gt;
&lt;br /&gt;
RADIUS Internet Engineering Task Force (IETF) attributes are the original set of 255 standard attributes that are used to communicate AAA information between a client and a server. The IETF attributes are standard and the attribute data is predefined. All clients and servers that exchange AAA information using IETF attributes must agree on attribute data such as the exact meaning of the attributes and the general bounds of the values for each attribute.&amp;lt;ref&amp;gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_radatt/configuration/xe-16/sec-usr-radatt-xe-16-book/sec-rad-ov-ietf-attr.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can search for one or more attributes in this menu.&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Authentication Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Allow || := || 1 ||  When not using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to allow 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Deny || := || 1 || When using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to deny 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| Login-Time || += || text || The Login-Time attribute defines the time span during which a user may login to the system and can deny the authentication on specified days/times. It also allows for automatic termination of wireless LAN connections if they are already established after the specified end time. However, adding this attribute later to a device already connected to the wireless LAN may not result in automatic disconnection.&lt;br /&gt;
{{note| Wireless equipment needs to support Session-Timeout attribute for automatic disconnection.}}&lt;br /&gt;
You should define time strings using the &amp;quot;Day%H%M-Day%H%M&amp;quot; format. Days can be Mo, Tu, We, Th, Fr, Sa, or Su, with &amp;quot;Wk&amp;quot; for weekdays and &amp;quot;Any&amp;quot; for all days. &amp;lt;ref&amp;gt;https://networkradius.com/doc/current/raddb/mods-available/logintime.html&amp;lt;/ref&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
%H indicates hour(00..23) and %M indicates minutes(00..59).&lt;br /&gt;
&lt;br /&gt;
{{note|Multiple time strings may be a list of simple time strings separated by &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;}}&lt;br /&gt;
For examples) &lt;br /&gt;
* Wk0900-1800 // Authentication is possible from Monday to Friday, between 9:00 AM and 6:00 PM.&lt;br /&gt;
* Wk0900-1800, Sa0900-1200 // Authentication is possible from Monday to Friday between 9:00 AM and 6:00 PM and on Saturday only between 9:00 AM and 12:00 PM.&lt;br /&gt;
* Any0900-1800 // Authentication is possible everyday between 9:00 AM and 6:00 PM&lt;br /&gt;
* Any0900-1800, We2000-2100 //Authentication is possible everyday between 9:00 AM and 6:00 PM, and on Wednesday only between 8:00 PM and 9:00 PM.&lt;br /&gt;
* Any // Always(Default)&lt;br /&gt;
$ Sa // Authentication is possible every Saturday at any time.&lt;br /&gt;
|-&lt;br /&gt;
| User-Login-Time || := || text || It is similar to the Login-Time attribute. however, it is an exclusive attribute that does not affect users if they are part of a specific group with its own Login-Time attribute. &amp;lt;br&amp;gt; '''This attribute applies only to users.'''&lt;br /&gt;
|-&lt;br /&gt;
| Group-Login-Time || := || text || It is also similar to the Login-Time attribute but acts as an exclusive attribute that takes precedence over Login-Time attributes for users who are part of a group, even if they have their own Login-Time attribute. However, if a user has a User-Login-Time attribute, Group-Login-Time will not be applied (User-Login-Time takes the highest priority). &amp;lt;br&amp;gt; '''This attribute applies only to groups.'''&lt;br /&gt;
|-&lt;br /&gt;
| Calling-Station-Id || =~ || mac address1 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; mac address2 ... || It is used to include the user's device MAC address for user identification during authentication. If this attribute is included, user authentication requires a match in Username, User-Password, and MAC address. You can use the &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; symbol to define multiple MAC addresses. When entering MAC addresses, use lowercase letters without separators. &lt;br /&gt;
For examples)&lt;br /&gt;
* 0000aaaa2222&lt;br /&gt;
* 0000aaaa2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000aaaa3333 // 2 MAC addresses&lt;br /&gt;
* ^bbbb22 // MAC address begins with &amp;quot;bbbb22&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
* 0000bbbb2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; ^bbbb22 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 // Multiple MAC addresses&lt;br /&gt;
&lt;br /&gt;
{{note|MAC addresses are in hexadecimal, and you should enter them in lowercase without any separators. When including multiple MAC addresses, be sure to separate them using &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; within a single Calling-Station-Id attribute. If multiple MAC addresses are defined, authentication will succeed if any one of them matches.}}&lt;br /&gt;
|-&lt;br /&gt;
| Nas-Identifier || =~ || ssid || You can specify the SSID when authenticating individual users and users included in a group. In other words, authentication will only proceed if the user connects through a specific SSID. To define multiple SSIDs, use &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;.&amp;lt;br&amp;gt;&lt;br /&gt;
For examples)&lt;br /&gt;
* my-ssid-A&lt;br /&gt;
* my-ssid-A &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; myssid-B&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Reply Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Session-Timeout || := || 3600~86400(second) || It refers to the Session-Timeout of a user connected to the wireless LAN, and when this time elapses, a new wireless LAN encryption key is generated to maintain a secure wireless LAN connection. In a typical WPA-Enterprise environment through a wireless LAN authentication server, keys are generated securely to maintain an encrypted channel. However, to ensure an even more secure encrypted channel, you can use this attribute.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2066</id>
		<title>Attributes</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2066"/>
		<updated>2023-10-19T07:42:25Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* Useful User and Group Authentication Attributes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Attributes ===&lt;br /&gt;
Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which are stored on the RADIUS program.&lt;br /&gt;
&lt;br /&gt;
RADIUS Internet Engineering Task Force (IETF) attributes are the original set of 255 standard attributes that are used to communicate AAA information between a client and a server. The IETF attributes are standard and the attribute data is predefined. All clients and servers that exchange AAA information using IETF attributes must agree on attribute data such as the exact meaning of the attributes and the general bounds of the values for each attribute.&amp;lt;ref&amp;gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_radatt/configuration/xe-16/sec-usr-radatt-xe-16-book/sec-rad-ov-ietf-attr.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can search for one or more attributes in this menu.&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Authentication Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Allow || := || 1 ||  When not using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to allow 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Deny || := || 1 || When using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to deny 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| Login-Time || += || text || The Login-Time attribute defines the time span during which a user may login to the system and can deny the authentication on specified days/times. It also allows for automatic termination of wireless LAN connections if they are already established after the specified end time. However, adding this attribute later to a device already connected to the wireless LAN may not result in automatic disconnection.&lt;br /&gt;
{{note| Wireless equipment needs to support Session-Timeout attribute for automatic disconnection.}}&lt;br /&gt;
You should define time strings using the &amp;quot;Day%H%M-Day%H%M&amp;quot; format. Days can be Mo, Tu, We, Th, Fr, Sa, or Su, with &amp;quot;Wk&amp;quot; for weekdays and &amp;quot;Any&amp;quot; for all days. &amp;lt;ref&amp;gt;https://networkradius.com/doc/current/raddb/mods-available/logintime.html&amp;lt;/ref&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
%H indicates hour(00..23) and %M indicates minutes(00..59).&lt;br /&gt;
&lt;br /&gt;
{{note|Multiple time strings may be a list of simple time strings separated by &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;}}&lt;br /&gt;
For examples) &lt;br /&gt;
* Wk0900-1800 // Authentication is possible from Monday to Friday, between 9:00 AM and 6:00 PM.&lt;br /&gt;
* Wk0900-1800, Sa0900-1200 // Authentication is possible from Monday to Friday between 9:00 AM and 6:00 PM and on Saturday only between 9:00 AM and 12:00 PM.&lt;br /&gt;
* Any0900-1800 // Authentication is possible everyday between 9:00 AM and 6:00 PM&lt;br /&gt;
* Any0900-1800, We2000-2100 //Authentication is possible everyday between 9:00 AM and 6:00 PM, and on Wednesday only between 8:00 PM and 9:00 PM.&lt;br /&gt;
* Any // Always(Default)&lt;br /&gt;
|-&lt;br /&gt;
| User-Login-Time || := || text || It is similar to the Login-Time attribute. however, it is an exclusive attribute that does not affect users if they are part of a specific group with its own Login-Time attribute. &amp;lt;br&amp;gt; '''This attribute applies only to users.'''&lt;br /&gt;
|-&lt;br /&gt;
| Group-Login-Time || := || text || It is also similar to the Login-Time attribute but acts as an exclusive attribute that takes precedence over Login-Time attributes for users who are part of a group, even if they have their own Login-Time attribute. However, if a user has a User-Login-Time attribute, Group-Login-Time will not be applied (User-Login-Time takes the highest priority). &amp;lt;br&amp;gt; '''This attribute applies only to groups.'''&lt;br /&gt;
|-&lt;br /&gt;
| Calling-Station-Id || =~ || mac address1 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; mac address2 ... || It is used to include the user's device MAC address for user identification during authentication. If this attribute is included, user authentication requires a match in Username, User-Password, and MAC address. You can use the &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; symbol to define multiple MAC addresses. When entering MAC addresses, use lowercase letters without separators. &lt;br /&gt;
For examples)&lt;br /&gt;
* 0000aaaa2222&lt;br /&gt;
* 0000aaaa2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000aaaa3333 // 2 MAC addresses&lt;br /&gt;
* ^bbbb22 // MAC address begins with &amp;quot;bbbb22&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
* 0000bbbb2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; ^bbbb22 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 // Multiple MAC addresses&lt;br /&gt;
&lt;br /&gt;
{{note|MAC addresses are in hexadecimal, and you should enter them in lowercase without any separators. When including multiple MAC addresses, be sure to separate them using &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; within a single Calling-Station-Id attribute. If multiple MAC addresses are defined, authentication will succeed if any one of them matches.}}&lt;br /&gt;
|-&lt;br /&gt;
| Nas-Identifier || =~ || ssid || You can specify the SSID when authenticating individual users and users included in a group. In other words, authentication will only proceed if the user connects through a specific SSID. To define multiple SSIDs, use &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;.&amp;lt;br&amp;gt;&lt;br /&gt;
For examples)&lt;br /&gt;
* my-ssid-A&lt;br /&gt;
* my-ssid-A &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; myssid-B&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Reply Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Session-Timeout || := || 3600~86400(second) || It refers to the Session-Timeout of a user connected to the wireless LAN, and when this time elapses, a new wireless LAN encryption key is generated to maintain a secure wireless LAN connection. In a typical WPA-Enterprise environment through a wireless LAN authentication server, keys are generated securely to maintain an encrypted channel. However, to ensure an even more secure encrypted channel, you can use this attribute.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2065</id>
		<title>Attributes</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2065"/>
		<updated>2023-10-19T07:37:23Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* Useful User and Group Authentication Attributes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Attributes ===&lt;br /&gt;
Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which are stored on the RADIUS program.&lt;br /&gt;
&lt;br /&gt;
RADIUS Internet Engineering Task Force (IETF) attributes are the original set of 255 standard attributes that are used to communicate AAA information between a client and a server. The IETF attributes are standard and the attribute data is predefined. All clients and servers that exchange AAA information using IETF attributes must agree on attribute data such as the exact meaning of the attributes and the general bounds of the values for each attribute.&amp;lt;ref&amp;gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_radatt/configuration/xe-16/sec-usr-radatt-xe-16-book/sec-rad-ov-ietf-attr.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can search for one or more attributes in this menu.&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Authentication Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Allow || := || 1 ||  When not using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to allow 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Deny || := || 1 || When using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to deny 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| Login-Time || += || text || The Login-Time attribute defines the time span during which a user may login to the system and can deny the authentication on specified days/times. It also allows for automatic termination of wireless LAN connections if they are already established after the specified end time. However, adding this attribute later to a device already connected to the wireless LAN may not result in automatic disconnection.&lt;br /&gt;
{{note| Wireless equipment needs to support Session-Timeout attribute for automatic disconnection.}}&lt;br /&gt;
Multiple time strings can be defined using the &amp;quot;dayhh:mm-hh:mm&amp;quot; format. Days can be Mo, Tu, We, Th, Fr, Sa, or Su, with &amp;quot;Wk&amp;quot; for weekdays and &amp;quot;Any&amp;quot; for all days. &amp;lt;ref&amp;gt;https://networkradius.com/doc/current/raddb/mods-available/logintime.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{note|Multiple time strings may be a list of simple time strings separated by &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;}}&lt;br /&gt;
For examples) &lt;br /&gt;
* Wk0900-1800 // Authentication is possible from Monday to Friday, between 9:00 AM and 6:00 PM.&lt;br /&gt;
* Wk0900-1800, Sa0900-1200 // Authentication is possible from Monday to Friday between 9:00 AM and 6:00 PM and on Saturday only between 9:00 AM and 12:00 PM.&lt;br /&gt;
* Any0900-1800 // Authentication is possible everyday between 9:00 AM and 6:00 PM&lt;br /&gt;
* Any0900-1800, We2000-2100 //Authentication is possible everyday between 9:00 AM and 6:00 PM, and on Wednesday only between 8:00 PM and 9:00 PM.&lt;br /&gt;
* Any // Always(Default)&lt;br /&gt;
|-&lt;br /&gt;
| User-Login-Time || := || text || It is similar to the Login-Time attribute. however, it is an exclusive attribute that does not affect users if they are part of a specific group with its own Login-Time attribute. &amp;lt;br&amp;gt; '''This attribute applies only to users.'''&lt;br /&gt;
|-&lt;br /&gt;
| Group-Login-Time || := || text || It is also similar to the Login-Time attribute but acts as an exclusive attribute that takes precedence over Login-Time attributes for users who are part of a group, even if they have their own Login-Time attribute. However, if a user has a User-Login-Time attribute, Group-Login-Time will not be applied (User-Login-Time takes the highest priority). &amp;lt;br&amp;gt; '''This attribute applies only to groups.'''&lt;br /&gt;
|-&lt;br /&gt;
| Calling-Station-Id || =~ || mac address1 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; mac address2 ... || It is used to include the user's device MAC address for user identification during authentication. If this attribute is included, user authentication requires a match in Username, User-Password, and MAC address. You can use the &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; symbol to define multiple MAC addresses. When entering MAC addresses, use lowercase letters without separators. &lt;br /&gt;
For examples)&lt;br /&gt;
* 0000aaaa2222&lt;br /&gt;
* 0000aaaa2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000aaaa3333 // 2 MAC addresses&lt;br /&gt;
* ^bbbb22 // MAC address begins with &amp;quot;bbbb22&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
* 0000bbbb2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; ^bbbb22 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 // Multiple MAC addresses&lt;br /&gt;
&lt;br /&gt;
{{note|MAC addresses are in hexadecimal, and you should enter them in lowercase without any separators. When including multiple MAC addresses, be sure to separate them using &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; within a single Calling-Station-Id attribute. If multiple MAC addresses are defined, authentication will succeed if any one of them matches.}}&lt;br /&gt;
|-&lt;br /&gt;
| Nas-Identifier || =~ || ssid || You can specify the SSID when authenticating individual users and users included in a group. In other words, authentication will only proceed if the user connects through a specific SSID. To define multiple SSIDs, use &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;.&amp;lt;br&amp;gt;&lt;br /&gt;
For examples)&lt;br /&gt;
* my-ssid-A&lt;br /&gt;
* my-ssid-A &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; myssid-B&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Reply Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Session-Timeout || := || 3600~86400(second) || It refers to the Session-Timeout of a user connected to the wireless LAN, and when this time elapses, a new wireless LAN encryption key is generated to maintain a secure wireless LAN connection. In a typical WPA-Enterprise environment through a wireless LAN authentication server, keys are generated securely to maintain an encrypted channel. However, to ensure an even more secure encrypted channel, you can use this attribute.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2064</id>
		<title>Attributes</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2064"/>
		<updated>2023-10-19T07:35:00Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* RADIUS &amp;gt; Attributes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Attributes ===&lt;br /&gt;
Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which are stored on the RADIUS program.&lt;br /&gt;
&lt;br /&gt;
RADIUS Internet Engineering Task Force (IETF) attributes are the original set of 255 standard attributes that are used to communicate AAA information between a client and a server. The IETF attributes are standard and the attribute data is predefined. All clients and servers that exchange AAA information using IETF attributes must agree on attribute data such as the exact meaning of the attributes and the general bounds of the values for each attribute.&amp;lt;ref&amp;gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_radatt/configuration/xe-16/sec-usr-radatt-xe-16-book/sec-rad-ov-ietf-attr.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can search for one or more attributes in this menu.&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Authentication Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Allow || := || 1 ||  When not using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to allow 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Deny || := || 1 || When using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to deny 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| Login-Time || += || text || The Login-Time attribute defines the time span during which a user may login to the system and can deny the authentication on specified days/times. It also allows for automatic termination of wireless LAN connections if they are already established after the specified end time. However, adding this attribute later to a device already connected to the wireless LAN may not result in automatic disconnection.&lt;br /&gt;
{{note| Automatic disconnection requires support for Session-Timeout by wireless LAN equipment.}}&lt;br /&gt;
Multiple time strings can be defined using the &amp;quot;dayhh:mm-hh:mm&amp;quot; format. Days can be Mo, Tu, We, Th, Fr, Sa, or Su, with &amp;quot;Wk&amp;quot; for weekdays and &amp;quot;Any&amp;quot; for all days. &amp;lt;ref&amp;gt;https://networkradius.com/doc/current/raddb/mods-available/logintime.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{note|Multiple time strings may be a list of simple time strings separated by &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;}}&lt;br /&gt;
For examples) &lt;br /&gt;
* Wk0900-1800 // Authentication is possible from Monday to Friday, between 9:00 AM and 6:00 PM.&lt;br /&gt;
* Wk0900-1800, Sa0900-1200 // Authentication is possible from Monday to Friday between 9:00 AM and 6:00 PM and on Saturday only between 9:00 AM and 12:00 PM.&lt;br /&gt;
* Any0900-1800 // Authentication is possible everyday between 9:00 AM and 6:00 PM&lt;br /&gt;
* Any0900-1800, We2000-2100 //Authentication is possible everyday between 9:00 AM and 6:00 PM, and on Wednesday only between 8:00 PM and 9:00 PM.&lt;br /&gt;
* Any // Always(Default)&lt;br /&gt;
|-&lt;br /&gt;
| User-Login-Time || := || text || It is similar to the Login-Time attribute. however, it is an exclusive attribute that does not affect users if they are part of a specific group with its own Login-Time attribute. &amp;lt;br&amp;gt; '''This attribute applies only to users.'''&lt;br /&gt;
|-&lt;br /&gt;
| Group-Login-Time || := || text || It is also similar to the Login-Time attribute but acts as an exclusive attribute that takes precedence over Login-Time attributes for users who are part of a group, even if they have their own Login-Time attribute. However, if a user has a User-Login-Time attribute, Group-Login-Time will not be applied (User-Login-Time takes the highest priority). &amp;lt;br&amp;gt; '''This attribute applies only to groups.'''&lt;br /&gt;
|-&lt;br /&gt;
| Calling-Station-Id || =~ || mac address1 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; mac address2 ... || It is used to include the user's device MAC address for user identification during authentication. If this attribute is included, user authentication requires a match in Username, User-Password, and MAC address. You can use the &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; symbol to define multiple MAC addresses. When entering MAC addresses, use lowercase letters without separators. &lt;br /&gt;
For examples)&lt;br /&gt;
* 0000aaaa2222&lt;br /&gt;
* 0000aaaa2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000aaaa3333 // 2 MAC addresses&lt;br /&gt;
* ^bbbb22 // MAC address begins with &amp;quot;bbbb22&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
* 0000bbbb2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; ^bbbb22 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 // Multiple MAC addresses&lt;br /&gt;
&lt;br /&gt;
{{note|MAC addresses are in hexadecimal, and you should enter them in lowercase without any separators. When including multiple MAC addresses, be sure to separate them using &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; within a single Calling-Station-Id attribute. If multiple MAC addresses are defined, authentication will succeed if any one of them matches.}}&lt;br /&gt;
|-&lt;br /&gt;
| Nas-Identifier || =~ || ssid || You can specify the SSID when authenticating individual users and users included in a group. In other words, authentication will only proceed if the user connects through a specific SSID. To define multiple SSIDs, use &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;.&amp;lt;br&amp;gt;&lt;br /&gt;
For examples)&lt;br /&gt;
* my-ssid-A&lt;br /&gt;
* my-ssid-A &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; myssid-B&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Reply Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Session-Timeout || := || 3600~86400(second) || It refers to the Session-Timeout of a user connected to the wireless LAN, and when this time elapses, a new wireless LAN encryption key is generated to maintain a secure wireless LAN connection. In a typical WPA-Enterprise environment through a wireless LAN authentication server, keys are generated securely to maintain an encrypted channel. However, to ensure an even more secure encrypted channel, you can use this attribute.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Settings_-_General&amp;diff=2063</id>
		<title>RADIUS Settings - General</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Settings_-_General&amp;diff=2063"/>
		<updated>2023-10-17T07:20:09Z</updated>

		<summary type="html">&lt;p&gt;Shin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== RADIUS &amp;gt; Settings &amp;gt; General ===&lt;br /&gt;
==== Data Maintenance ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Items !! Description&lt;br /&gt;
|-&lt;br /&gt;
| style='width:200px' | Cached User || If you set this, the imRAD saves a username and its password into the imRAD local database. The password is encrypted with a hash function and can't be decrypted to a plaintext.&lt;br /&gt;
After that, the imRAD can authenticate a user not from a customer database but from the imRAD local database. This can reduce traffics to a customer database.&lt;br /&gt;
The imRAD will delete after a specified number of days after being saved.  &lt;br /&gt;
|-&lt;br /&gt;
| Local User || It will delete local users that are inactive for more than the specified day. Local user is a user that was created by an administrator.&lt;br /&gt;
|-&lt;br /&gt;
| NAS-ID || It automatically saves [[NAS Identifier | NAS-IDs ]] from the ACCESS-REQUEST and deletes the inactive NAS IDs for more than the specified day.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Password Complexity Requirements for Local User-Password ====&lt;br /&gt;
For security reasons, a minimum length of 8 characters is recommended, and it's advisable to mix all password combinations.&lt;br /&gt;
&lt;br /&gt;
===== Password Reset =====&lt;br /&gt;
Password reset involves resetting the password of users stored in the local database and comes in both PASSWORD and OTP (One-Time Password) methods.&lt;br /&gt;
&lt;br /&gt;
When a password is reset, a temporary password is issued, and the wireless LAN authentication for that user is temporarily denied. Wireless LAN users must connect the 'Password Change' page and sets a new password using the temporary password generated during the reset to regain wireless LAN access. The page that allows wireless LAN users to change their passwords can be configured in the [[Guest Page]] menu.&lt;br /&gt;
&lt;br /&gt;
PASSWORD: After a password reset, the temporary password is set to a designated password (the same for all users).&lt;br /&gt;
OTP: After a password reset, the temporary password is randomly generated as a 6-digit number (unique for each user).&lt;br /&gt;
&lt;br /&gt;
Here is the basic flow of the password reset process:&lt;br /&gt;
&lt;br /&gt;
# A wireless LAN user requests a password reset(directly via phone or other methods)&lt;br /&gt;
# The administrator informs the user of the temporary password generated after the password reset.&lt;br /&gt;
# The wireless LAN user accesses the password change page through the Captive Portal or another method.&lt;br /&gt;
# The user enters the temporary password and creates a new password, then saves it.&lt;br /&gt;
# The user connects to the wireless LAN using the new password after changing the SSID.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== EAP(Extensible Authentication Protocol) ==== &lt;br /&gt;
The basic EAP types include TTLS (Tunneled Transport Layer Security) and PEAP (Protected Extensible Authentication Protocol), and you can choose either one.&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Extensible_Authentication_Protocol&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If the phase 2 authentication PAP (Password Authentication Protocol) is not used, authentication may fail on Windows 10 or 11. To allow the use of PAP at the user or group level in such environments, you can use the PAP-Auth-Allow := 1 attribute in the user or group authentication properties. Conversely, if you want to restrict the use of PAP for specific users or groups while allowing phase 2 PAP authentication, you can add the PAP-Auth-Deny := 1 attribute.&lt;br /&gt;
&lt;br /&gt;
* Timer: A list is maintained to correlate EAP-Response packets with EAP-Request packets.  After a configurable length of time, entries in the list expire, and are deleted.&lt;br /&gt;
* Advanced&lt;br /&gt;
** TLS Cipher Suite: Set this option to specify the allowed TLS cipher suites.  The format is listed in https://www.openssl.org/docs/man1.0.2/man1/ciphers.html&lt;br /&gt;
** TLS version: Set min / max TLS version. Some operating systems still use TLS 1.0&lt;br /&gt;
&lt;br /&gt;
==== RADIUS configuration   ==== &lt;br /&gt;
The thread pool is a long-lived group of threads that take turns (round-robin) handling any incoming requests.&lt;br /&gt;
You probably want to have a few spare threads around, so that high-load situations can be handled immediately. If you don't have any spare threads, then the request handling will be delayed while a new thread is created, and added to the pool.&lt;br /&gt;
You probably don't want too many spare threads around, otherwise, they'll be sitting there taking up resources, and not doing anything productive.&lt;br /&gt;
{{note|We recommend having you use the default thread values.}}&lt;br /&gt;
&lt;br /&gt;
===== Reject delay ===== &lt;br /&gt;
When sending an Access-Reject, it can be delayed for a few seconds.&lt;br /&gt;
This may help slow down a DoS attack. It also helps to slow down people trying to brute-force crack a user's password.&lt;br /&gt;
Setting this number to 0 means &amp;quot;send rejects immediately&amp;quot;.&lt;br /&gt;
You can set the value between 0 and 5.&lt;br /&gt;
&lt;br /&gt;
===== Advanced =====&lt;br /&gt;
The port values of 1812 for authentication and 1813 for accounting are RADIUS standard ports defined by the Internet Engineering Task Force (IETF) in RFCs 2865 and 2866.&lt;br /&gt;
&lt;br /&gt;
The wildcard (i.e. *) in the address field indicates &amp;quot;any&amp;quot;. The 0 in the port field indicates &amp;quot;default&amp;quot;.&amp;lt;br&amp;gt;&lt;br /&gt;
You can only change the port to another.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Reject2ban ====&lt;br /&gt;
Please refer to [[Reject2ban]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Users&amp;diff=2062</id>
		<title>RADIUS Users</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Users&amp;diff=2062"/>
		<updated>2023-10-17T07:11:27Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* Password Reset */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Users ===&lt;br /&gt;
You can add, update, or delete the usernames for the RADIUS authentication.&lt;br /&gt;
&lt;br /&gt;
==== Create New User ====&lt;br /&gt;
You can add a new user at the top right of the page and can create a user as either a Username authentication or a [[MAC Address]] authentication.&lt;br /&gt;
The Username authentication stores a User-Name and User-Password and the credentials are validated with the two attributes to authenticate an ACCESS-REQUEST.&amp;lt;br&amp;gt;&lt;br /&gt;
The MAC address authentication store a MAC address of a user machine and the credentials are validated with the address. The MAC address type is applied usually in the environment of an open wireless network.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Username Authentication&lt;br /&gt;
|-&lt;br /&gt;
! style='width:150px' | Item !! Required !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Username|| Yes || The multibyte characters(e.g, korean, japaneses) are not allowed.&lt;br /&gt;
|-&lt;br /&gt;
| Status || Yes || Select &amp;quot;authorized&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Password Type || Yes || It is the encryption method of a password. If a user machine is windows 10, the type must be either the Windows NT hashed passwords or clear-text passwords.&lt;br /&gt;
|-&lt;br /&gt;
| Password&amp;lt;br&amp;gt;Confirm Password|| Yes || Input the password of a username.&lt;br /&gt;
|-&lt;br /&gt;
| User Information || Optional || You can fill out the general user information. You can change the title of the form from the &amp;quot;Environment &amp;gt; [[Environment  | Custom Fields]]&amp;quot;.&lt;br /&gt;
|-&lt;br /&gt;
| Group || No || The group to which the user.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ MAC Address Authentication&lt;br /&gt;
|-&lt;br /&gt;
!  style='width:150px' | Item !! Required !! Description&lt;br /&gt;
|-&lt;br /&gt;
| MAC Address || Yes || The [[MAC Address]] of a user machine. The address is case-sensitive and also may include delimiters and you can find the format of the MAC address from the [[Accounting]].&lt;br /&gt;
|-&lt;br /&gt;
| colspan=3 | Others are same as the Username Authentication.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== User Authorization, Updating, and Deleting ====&lt;br /&gt;
A username that was registered from the captive portal page will be added as an un-authorized one. You can authorize it by click the [[File:popup.png|23x]] icon in front of each row.&lt;br /&gt;
Within the same interface, you can also change other information and delete a user.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Additional Attributes ====&lt;br /&gt;
===== Authentication Attributes =====&lt;br /&gt;
Authentication attributes are pieces of information used in RADIUS authentication in addition to the basic information (User-Name, User-Password). For useful authentication attributes, refer to the [[Attributes]] section.&lt;br /&gt;
&lt;br /&gt;
===== Reply Attributes =====&lt;br /&gt;
Reply attributes refer to the attributes provided to the user after RADIUS authentication. For useful reply attributes, refer to the [[Attributes]] section.&lt;br /&gt;
&lt;br /&gt;
==== Password Reset ====&lt;br /&gt;
You can reset the password of registered users.&lt;br /&gt;
&lt;br /&gt;
When a user's password is reset, the previous password becomes unusable, and a temporary password is issued. The use of such temporary passwords and the password reset feature can be configured in RADIUS &amp;gt; Settings &amp;gt; General &amp;gt; [[RADIUS Settings - General | Password Complexity Requirements for RADIUS User-Password]]. If the password reset feature is inactive (default state), users cannot use the password reset function.&lt;br /&gt;
&lt;br /&gt;
When a password is reset, the user must create a new password using the temporary password on the password change page. For more details, refer to RADIUS &amp;gt; Settings &amp;gt; General &amp;gt; [[RADIUS Settings - General | Password Complexity Requirements for RADIUS User-Password]].&lt;br /&gt;
&lt;br /&gt;
{{note|Passwords for users authenticated based on MAC address or stored in an external database as &amp;quot;[[RADIUS Settings - General | cached user]]&amp;quot; cannot be reset.}}&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Users&amp;diff=2061</id>
		<title>RADIUS Users</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Users&amp;diff=2061"/>
		<updated>2023-10-17T07:09:21Z</updated>

		<summary type="html">&lt;p&gt;Shin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Users ===&lt;br /&gt;
You can add, update, or delete the usernames for the RADIUS authentication.&lt;br /&gt;
&lt;br /&gt;
==== Create New User ====&lt;br /&gt;
You can add a new user at the top right of the page and can create a user as either a Username authentication or a [[MAC Address]] authentication.&lt;br /&gt;
The Username authentication stores a User-Name and User-Password and the credentials are validated with the two attributes to authenticate an ACCESS-REQUEST.&amp;lt;br&amp;gt;&lt;br /&gt;
The MAC address authentication store a MAC address of a user machine and the credentials are validated with the address. The MAC address type is applied usually in the environment of an open wireless network.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Username Authentication&lt;br /&gt;
|-&lt;br /&gt;
! style='width:150px' | Item !! Required !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Username|| Yes || The multibyte characters(e.g, korean, japaneses) are not allowed.&lt;br /&gt;
|-&lt;br /&gt;
| Status || Yes || Select &amp;quot;authorized&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Password Type || Yes || It is the encryption method of a password. If a user machine is windows 10, the type must be either the Windows NT hashed passwords or clear-text passwords.&lt;br /&gt;
|-&lt;br /&gt;
| Password&amp;lt;br&amp;gt;Confirm Password|| Yes || Input the password of a username.&lt;br /&gt;
|-&lt;br /&gt;
| User Information || Optional || You can fill out the general user information. You can change the title of the form from the &amp;quot;Environment &amp;gt; [[Environment  | Custom Fields]]&amp;quot;.&lt;br /&gt;
|-&lt;br /&gt;
| Group || No || The group to which the user.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ MAC Address Authentication&lt;br /&gt;
|-&lt;br /&gt;
!  style='width:150px' | Item !! Required !! Description&lt;br /&gt;
|-&lt;br /&gt;
| MAC Address || Yes || The [[MAC Address]] of a user machine. The address is case-sensitive and also may include delimiters and you can find the format of the MAC address from the [[Accounting]].&lt;br /&gt;
|-&lt;br /&gt;
| colspan=3 | Others are same as the Username Authentication.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== User Authorization, Updating, and Deleting ====&lt;br /&gt;
A username that was registered from the captive portal page will be added as an un-authorized one. You can authorize it by click the [[File:popup.png|23x]] icon in front of each row.&lt;br /&gt;
Within the same interface, you can also change other information and delete a user.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Additional Attributes ====&lt;br /&gt;
===== Authentication Attributes =====&lt;br /&gt;
Authentication attributes are pieces of information used in RADIUS authentication in addition to the basic information (User-Name, User-Password). For useful authentication attributes, refer to the [[Attributes]] section.&lt;br /&gt;
&lt;br /&gt;
===== Reply Attributes =====&lt;br /&gt;
Reply attributes refer to the attributes provided to the user after RADIUS authentication. For useful reply attributes, refer to the [[Attributes]] section.&lt;br /&gt;
&lt;br /&gt;
==== Password Reset ====&lt;br /&gt;
You can reset the password of registered users.&lt;br /&gt;
&lt;br /&gt;
When a user's password is reset, the previous password becomes unusable, and a temporary password is issued. The use of such temporary passwords and the password reset feature can be configured in RADIUS &amp;gt; Settings &amp;gt; General &amp;gt; [[RADIUS Settings - General | Password Complexity Requirements for RADIUS User-Password]]. If the password reset feature is inactive (default state), users cannot use the password reset function.&lt;br /&gt;
&lt;br /&gt;
When a password is reset, the user must create a new password using the temporary password on the password change page. For more details, refer to RADIUS &amp;gt; Settings &amp;gt; General &amp;gt; [[RADIUS Settings - General | Password Complexity Requirements for RADIUS User-Password]].&lt;br /&gt;
&lt;br /&gt;
{{note|Passwords for users authenticated based on MAC address or stored in an external database as cache cannot be reset.}}&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Settings_-_General&amp;diff=2060</id>
		<title>RADIUS Settings - General</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=RADIUS_Settings_-_General&amp;diff=2060"/>
		<updated>2023-10-17T07:03:01Z</updated>

		<summary type="html">&lt;p&gt;Shin: /* Password Complexity Requirements for Local User-Password */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== RADIUS &amp;gt; Settings &amp;gt; General ===&lt;br /&gt;
==== Data Maintenance ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Items !! Description&lt;br /&gt;
|-&lt;br /&gt;
| style='width:200px' | Cached User || If you set this, the imRAD saves a username and its password into the imRAD local database. The password is encrypted with a hash function and can't be decrypted to a plaintext.&lt;br /&gt;
After that, the imRAD can authenticate a user not from a customer database but from the imRAD local database. This can reduce traffics to a customer database.&lt;br /&gt;
The imRAD will delete after a specified number of days after being saved.  &lt;br /&gt;
|-&lt;br /&gt;
| Local User || It will delete local users that are inactive for more than the specified day. Local user is a user that was created by an administrator.&lt;br /&gt;
|-&lt;br /&gt;
| NAS-ID || It automatically saves [[NAS Identifier | NAS-IDs ]] from the ACCESS-REQUEST and deletes the inactive NAS IDs for more than the specified day.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Password Complexity Requirements for Local User-Password ====&lt;br /&gt;
For security reasons, a minimum length of 8 characters is recommended, and it's advisable to mix all password combinations.&lt;br /&gt;
&lt;br /&gt;
===== Password Reset =====&lt;br /&gt;
Password reset involves resetting the password of users stored in the local database and comes in both PASSWORD and OTP (One-Time Password) methods.&lt;br /&gt;
&lt;br /&gt;
When a password is reset, a temporary password is issued, and the wireless LAN authentication for that user is temporarily denied. Wireless LAN users must connect the 'Password Change' page and sets a new password using the temporary password generated during the reset to regain wireless LAN access. The page that allows wireless LAN users to change their passwords can be configured in the [[Guest Page]] menu.&lt;br /&gt;
&lt;br /&gt;
PASSWORD: After a password reset, the temporary password is set to a designated password (the same for all users).&lt;br /&gt;
OTP: After a password reset, the temporary password is randomly generated as a 6-digit number (unique for each user).&lt;br /&gt;
&lt;br /&gt;
Here is the basic flow of the password reset process:&lt;br /&gt;
&lt;br /&gt;
# A wireless LAN user requests a password reset(directly via phone or other methods)&lt;br /&gt;
# The administrator informs the user of the temporary password generated after the password reset.&lt;br /&gt;
# The wireless LAN user accesses the password change page through the Captive Portal or another method.&lt;br /&gt;
# The user enters the temporary password and creates a new password, then saves it.&lt;br /&gt;
# The user connects to the wireless LAN using the new password after changing the SSID.&lt;br /&gt;
&lt;br /&gt;
==== Additional attributes for Multi-Factor Authentication ====&lt;br /&gt;
Please refer to [[Multi-Factor Authentication]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== EAP(Extensible Authentication Protocol) ==== &lt;br /&gt;
The basic EAP types include TTLS (Tunneled Transport Layer Security) and PEAP (Protected Extensible Authentication Protocol), and you can choose either one.&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Extensible_Authentication_Protocol&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If the phase 2 authentication PAP (Password Authentication Protocol) is not used, authentication may fail on Windows 10 or 11. To allow the use of PAP at the user or group level in such environments, you can use the PAP-Auth-Allow := 1 attribute in the user or group authentication properties. Conversely, if you want to restrict the use of PAP for specific users or groups while allowing phase 2 PAP authentication, you can add the PAP-Auth-Deny := 1 attribute.&lt;br /&gt;
&lt;br /&gt;
* Timer: A list is maintained to correlate EAP-Response packets with EAP-Request packets.  After a configurable length of time, entries in the list expire, and are deleted.&lt;br /&gt;
* Advanced&lt;br /&gt;
** TLS Cipher Suite: Set this option to specify the allowed TLS cipher suites.  The format is listed in https://www.openssl.org/docs/man1.0.2/man1/ciphers.html&lt;br /&gt;
** TLS version: Set min / max TLS version. Some operating systems still use TLS 1.0&lt;br /&gt;
&lt;br /&gt;
==== RADIUS configuration   ==== &lt;br /&gt;
The thread pool is a long-lived group of threads that take turns (round-robin) handling any incoming requests.&lt;br /&gt;
You probably want to have a few spare threads around, so that high-load situations can be handled immediately. If you don't have any spare threads, then the request handling will be delayed while a new thread is created, and added to the pool.&lt;br /&gt;
You probably don't want too many spare threads around, otherwise, they'll be sitting there taking up resources, and not doing anything productive.&lt;br /&gt;
{{note|We recommend having you use the default thread values.}}&lt;br /&gt;
&lt;br /&gt;
===== Reject delay ===== &lt;br /&gt;
When sending an Access-Reject, it can be delayed for a few seconds.&lt;br /&gt;
This may help slow down a DoS attack. It also helps to slow down people trying to brute-force crack a user's password.&lt;br /&gt;
Setting this number to 0 means &amp;quot;send rejects immediately&amp;quot;.&lt;br /&gt;
You can set the value between 0 and 5.&lt;br /&gt;
&lt;br /&gt;
===== Advanced =====&lt;br /&gt;
The port values of 1812 for authentication and 1813 for accounting are RADIUS standard ports defined by the Internet Engineering Task Force (IETF) in RFCs 2865 and 2866.&lt;br /&gt;
&lt;br /&gt;
The wildcard (i.e. *) in the address field indicates &amp;quot;any&amp;quot;. The 0 in the port field indicates &amp;quot;default&amp;quot;.&amp;lt;br&amp;gt;&lt;br /&gt;
You can only change the port to another.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Reject2ban ====&lt;br /&gt;
Please refer to [[Reject2ban]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=ImRAD_RADIUS&amp;diff=2059</id>
		<title>ImRAD RADIUS</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=ImRAD_RADIUS&amp;diff=2059"/>
		<updated>2023-10-17T06:23:49Z</updated>

		<summary type="html">&lt;p&gt;Shin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS Overview ===&lt;br /&gt;
RADIUS(Remote Authentication Dial-In User Service) is a networking protocol, operating on ports 1812 and 1813, that provides centralized Authentication, Authorization, and Accounting (AAA or Triple-A) management for users who connect and use a network service.&amp;lt;ref name='radius-wiki'&amp;gt;https://en.wikipedia.org/wiki/RADIUS&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
RADIUS is a client/server protocol that runs in the application layer. Network access servers, which control access to a network, usually contain a RADIUS client component that communicates with the RADIUS server. RADIUS is often the back-end of choice for 802.1X&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IEEE_802.1X&amp;lt;/ref&amp;gt; authentication.&amp;lt;ref name='radius-wiki' /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
WPA-Enterprise is also referred to as WPA-802.1X mode, and sometimes just WPA (as opposed to WPA-PSK), this is designed for enterprise networks and requires a RADIUS authentication server to have users can use a network service.&amp;lt;ref name='wiki-wpa&amp;gt;https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access#WPA2&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The imRAD can be used on WPA, WPA2, and WPA3 Enterprise&amp;lt;ref name='wiki-wpa /&amp;gt; environments and supports EAP-TTLS&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Extensible_Authentication_Protocol#EAP_Tunneled_Transport_Layer_Security_(EAP-TTLS)&amp;lt;/ref&amp;gt; and EAP-PEAP&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Protected_Extensible_Authentication_Protocol&amp;lt;/ref&amp;gt;.&lt;br /&gt;
The EAP-TTLS is a default authentication method.&lt;br /&gt;
&lt;br /&gt;
RADIUS authentication consists of supplicant(user device), NAS(Network Access Server), and the RADIUS server. &lt;br /&gt;
The user or machine sends a request to a Network Access Server (NAS) to gain access to a particular network resource using access credentials. The NAS sends a RADIUS Access-Request message to the RADIUS server, requesting authorization to grant access via the RADIUS protocol. The RADIUS server checks that the information is correct.&lt;br /&gt;
&lt;br /&gt;
[[File:Drawing_RADIUS_1812.svg.png|400px|thumb|RADIUS Authentication and Authorization Flow&amp;lt;ref name='radius-wiki' /&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
The imRAD was developed based on the '''[https://wiki.freeradius.org/Home FreeRADIUS]''' and provides the most of RADIUS services.&lt;br /&gt;
Our system can authenticate a User-Name in a Local database, remote databases, or LDAP servers, and Proxy servers.&lt;br /&gt;
The following is the supporting remote DBMS or LDAP.&lt;br /&gt;
* MariaDB&lt;br /&gt;
* MySql&lt;br /&gt;
* Oracle 11g ~ 19c&lt;br /&gt;
* Microsoft SQL Server 2014 ~ 2019&lt;br /&gt;
* Tibero 6&lt;br /&gt;
* PostgreSQL 12&lt;br /&gt;
* SYBASE&lt;br /&gt;
* OpenLDAP&lt;br /&gt;
* Microsoft Active Directory Domain service(AD DS)&lt;br /&gt;
* Microsoft Active Directory Lightweight directory service(AD LDS)&lt;br /&gt;
&lt;br /&gt;
Using an '''[[Authentication DB | external Database]]''' makes it possible to authenticate directly a user through it(e.g, Customer employee database) without importing data from the remote database to the imRAD local database.&amp;lt;br&amp;gt;&lt;br /&gt;
In the environment of user authentication via an '''[[Authentication DB | external Database]]''', it may increase network traffic to the external database and slow down the database.&amp;lt;br&amp;gt;&lt;br /&gt;
To resolve this, the user credentials that were authenticated from an external database are saved into the local database for few days(You can set how many days the cached users are kept in the local database from the [[RADIUS Settings - General | RADIUS general settings]]). And then, authentication requests will not be sent to the external database but be completed in the local database. We called it &amp;quot;cached user&amp;quot;.&amp;lt;br&amp;gt;&lt;br /&gt;
To securely save the User-password into the local database, it is saved as hashed data using the strong hash algorithm(e.g, SHA256 with salt).&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:pta.png]]&lt;br /&gt;
&lt;br /&gt;
Supporting TLS(Transport Layer Security) version is between 1.0 and 1.3 and can be changed the minimum and the maximum version from the [[RADIUS Settings - General | RADIUS general settings]].&lt;br /&gt;
You must make sure the TLS version because some client operating systems still use TLS 1.0.&lt;br /&gt;
&lt;br /&gt;
RADIUS Proxying is that the server can proxy any request to other RADIUS servers and other RADIUS servers can authenticate the proxying request.&amp;lt;ref&amp;gt;https://wiki.freeradius.org/features/Proxy&amp;lt;/ref&amp;gt;&lt;br /&gt;
A famous proxying is eduroam(education roaming)&amp;lt;ref&amp;gt;https://www.eduroam.org/what-is-eduroam/&amp;lt;/ref&amp;gt; and a user can be authenticated at an eduroam server using the RADIUS Proxying.&lt;br /&gt;
&lt;br /&gt;
An [[Authentication DB | external database]] authentication and a RADIUS Proxying can be restricted by a NAS Identifier(NAS-ID) and you can also set this policy on RADIUS&amp;gt; Settings&amp;gt; [[Authentication DB]] or [[Realm and proxy|Realms/Proxys]] menu.&lt;br /&gt;
&lt;br /&gt;
=== Configuring RADIUS ===&lt;br /&gt;
===== Getting started =====&lt;br /&gt;
Basically, to authenticate a user's device basically that is in the 802.1x environment, Follow the below instruction.&lt;br /&gt;
&lt;br /&gt;
# Register the IP address of an imRAD and the shared secret at a [[NAS]].&lt;br /&gt;
# Register the IP address of a [[NAS]] and the same shared secret at the [[NAS setting | RADIUS &amp;gt; settings &amp;gt; NAS]] .&lt;br /&gt;
&lt;br /&gt;
After doing the above, the imRAD RADIUS can process the requests from the [[NAS]] that was registered.&lt;br /&gt;
If you want to test a device(e.g, smartphone, tablet, laptop computer, and so on), please refer to the [[RADIUS Authentication testing]].&lt;br /&gt;
&lt;br /&gt;
=====  [[RADIUS Users|Users]]=====&lt;br /&gt;
It manages 802.1x Users.&lt;br /&gt;
&lt;br /&gt;
===== [[Reject2ban]] =====&lt;br /&gt;
It is designed to reduce the load on the databases from random requests of a malicious client.&lt;br /&gt;
&lt;br /&gt;
===== [[RADIUS Groups|Groups]]=====&lt;br /&gt;
It is the RADIUS User groups.&lt;br /&gt;
&lt;br /&gt;
=====[[Attributes]]=====&lt;br /&gt;
It provides a manager can search the attributes used in RADIUS.&lt;br /&gt;
&lt;br /&gt;
===== Log =====&lt;br /&gt;
* [[RADIUS Log | Accounting]]: It displays all Accounting.&lt;br /&gt;
* [[RADIUS Log | Post-Authentication]]: It displays all log after attempting authentication.&lt;br /&gt;
* [[Reject2ban]]: It displays the Reject2ban log.&lt;br /&gt;
&lt;br /&gt;
=====Settings=====&lt;br /&gt;
All settings for the RADIUS can be configured on this menu. After configuring something, the radiusd service will automatically apply the changed values in few seconds without an administrator manually restart the radiusd service.&lt;br /&gt;
If you want to radiusd service can forcibly apply the changed value, click the &amp;quot;Apply&amp;quot; button at the bottom of this menu.&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[RADIUS Settings - General | General]]======&lt;br /&gt;
You can configure Data Maintenance, Password complexity for RADIUS User-Password, EAP, RADIUS general configuration, and Reject2ban.&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[NAS setting | NAS]]======&lt;br /&gt;
As a feature for managing the Network Access Server, you can add or remove wireless LAN controllers or Access Points (APs).&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[Realm and proxy|Realm/Proxy]]======&lt;br /&gt;
It manages Proxy servers and Realm for the Proxy Authentication.&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[Authentication DB]]======&lt;br /&gt;
Configure local or external database connection attributes for user authentication.&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[LDAP]]======&lt;br /&gt;
Configure LDAP(Lightweight Directory Access Protocol) or AD(Active Directory) server connection attributes for user authentication.&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[NAS Identifier|NAS-ID]]======&lt;br /&gt;
It manages automatically collected NAS-ID (SSID).&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[Guest Page]]======&lt;br /&gt;
&lt;br /&gt;
======&amp;amp;nbsp;&amp;amp;nbsp;[[RADIUS Authentication testing]]======&lt;br /&gt;
It shows several EAP methods for operating system-specific authentication tests.&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Captive_portal&amp;diff=2058</id>
		<title>Captive portal</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Captive_portal&amp;diff=2058"/>
		<updated>2023-10-17T06:22:47Z</updated>

		<summary type="html">&lt;p&gt;Shin: Created page with &amp;quot;Our system provides users who want to use the wireless LAN can register their UserName (ID) and password. The interface for designing this page is accessible through RADIUS &amp;gt;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Our system provides users who want to use the wireless LAN can register their UserName (ID) and password. The interface for designing this page is accessible through RADIUS &amp;gt; Settings &amp;gt; Guest Page menu&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
	<entry>
		<id>https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2057</id>
		<title>Attributes</title>
		<link rel="alternate" type="text/html" href="https://wiki.basein.net/mediawiki_eng/index.php?title=Attributes&amp;diff=2057"/>
		<updated>2023-10-17T06:20:16Z</updated>

		<summary type="html">&lt;p&gt;Shin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=== RADIUS &amp;gt; Attributes ===&lt;br /&gt;
Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which are stored on the RADIUS program.&lt;br /&gt;
&lt;br /&gt;
RADIUS Internet Engineering Task Force (IETF) attributes are the original set of 255 standard attributes that are used to communicate AAA information between a client and a server. The IETF attributes are standard and the attribute data is predefined. All clients and servers that exchange AAA information using IETF attributes must agree on attribute data such as the exact meaning of the attributes and the general bounds of the values for each attribute.&amp;lt;ref&amp;gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_radatt/configuration/xe-16/sec-usr-radatt-xe-16-book/sec-rad-ov-ietf-attr.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can search for one or more attributes in this menu.&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Authentication Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Allow || := || 1 ||  When not using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to allow 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| PAP-Auth-Deny || := || 1 || When using [[RADIUS Settings - General|Phase 2 Authentication Using PAP]], use this attribute to deny 2-Step PAP authentication for specific users or groups.&lt;br /&gt;
|-&lt;br /&gt;
| Login-Time || := || text || The Login-Time attribute defines the time span during which a user may login to the system and can deny the authentication on specified days/times. It also allows for automatic termination of wireless LAN connections if they are already established after the specified end time. However, adding this attribute later to a device already connected to the wireless LAN may not result in automatic disconnection.&lt;br /&gt;
{{note| Automatic disconnection requires support for Session-Timeout by wireless LAN equipment.}}&lt;br /&gt;
Multiple time strings can be defined using the &amp;quot;dayhh:mm-hh:mm&amp;quot; format. Days can be Mo, Tu, We, Th, Fr, Sa, or Su, with &amp;quot;Wk&amp;quot; for weekdays and &amp;quot;Any&amp;quot; for all days. &amp;lt;ref&amp;gt;https://networkradius.com/doc/current/raddb/mods-available/logintime.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{note|Multiple time strings may be a list of simple time strings separated by &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;}}&lt;br /&gt;
For examples) &lt;br /&gt;
* Wk0900-1800 // Authentication is possible from Monday to Friday, between 9:00 AM and 6:00 PM.&lt;br /&gt;
* Wk0900-1800, Sa0900-1200 // Authentication is possible from Monday to Friday between 9:00 AM and 6:00 PM and on Saturday only between 9:00 AM and 12:00 PM.&lt;br /&gt;
* Any0900-1800 // Authentication is possible everyday between 9:00 AM and 6:00 PM&lt;br /&gt;
* Any0900-1800, We2000-2100 //Authentication is possible everyday between 9:00 AM and 6:00 PM, and on Wednesday only between 8:00 PM and 9:00 PM.&lt;br /&gt;
* Any // Always(Default)&lt;br /&gt;
|-&lt;br /&gt;
| User-Login-Time || := || text || It is similar to the Login-Time attribute. however, it is an exclusive attribute that does not affect users if they are part of a specific group with its own Login-Time attribute. &amp;lt;br&amp;gt; '''This attribute applies only to users.'''&lt;br /&gt;
|-&lt;br /&gt;
| Group-Login-Time || := || text || It is also similar to the Login-Time attribute but acts as an exclusive attribute that takes precedence over Login-Time attributes for users who are part of a group, even if they have their own Login-Time attribute. However, if a user has a User-Login-Time attribute, Group-Login-Time will not be applied (User-Login-Time takes the highest priority). &amp;lt;br&amp;gt; '''This attribute applies only to groups.'''&lt;br /&gt;
|-&lt;br /&gt;
| Calling-Station-Id || =~ || mac address1 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; mac address2 ... || It is used to include the user's device MAC address for user identification during authentication. If this attribute is included, user authentication requires a match in Username, User-Password, and MAC address. You can use the &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; symbol to define multiple MAC addresses. When entering MAC addresses, use lowercase letters without separators. &lt;br /&gt;
For examples)&lt;br /&gt;
* 0000aaaa2222&lt;br /&gt;
* 0000aaaa2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000aaaa3333 // 2 MAC addresses&lt;br /&gt;
* ^bbbb22 // MAC address begins with &amp;quot;bbbb22&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
* 0000bbbb2222 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; ^bbbb22 &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; 0000bbbb3333 // Multiple MAC addresses&lt;br /&gt;
&lt;br /&gt;
{{note|MAC addresses are in hexadecimal, and you should enter them in lowercase without any separators. When including multiple MAC addresses, be sure to separate them using &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt; within a single Calling-Station-Id attribute. If multiple MAC addresses are defined, authentication will succeed if any one of them matches.}}&lt;br /&gt;
|-&lt;br /&gt;
| Nas-Identifier || =~ || ssid || You can specify the SSID when authenticating individual users and users included in a group. In other words, authentication will only proceed if the user connects through a specific SSID. To define multiple SSIDs, use &amp;lt;nowiki&amp;gt;&amp;quot;|&amp;quot;&amp;lt;/nowiki&amp;gt;.&amp;lt;br&amp;gt;&lt;br /&gt;
For examples)&lt;br /&gt;
* my-ssid-A&lt;br /&gt;
* my-ssid-A &amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt; myssid-B&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Useful User and Group Reply Attributes ====&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | attribute !! Operator !! width=&amp;quot;100&amp;quot; | Value !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Session-Timeout || := || 3600~86400(second) || It refers to the Session-Timeout of a user connected to the wireless LAN, and when this time elapses, a new wireless LAN encryption key is generated to maintain a secure wireless LAN connection. In a typical WPA-Enterprise environment through a wireless LAN authentication server, keys are generated securely to maintain an encrypted channel. However, to ensure an even more secure encrypted channel, you can use this attribute.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== References ===&lt;/div&gt;</summary>
		<author><name>Shin</name></author>
	</entry>
</feed>