Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Review: Enterprise RADIUS Servers

If you have more than, say, 30 users connecting to your organization's network using dial-up, broadband and wireless over a range of public and private networks, managing these disparate systems while staying on top of AAA (authentication, authorization and accounting) can be a full-time job. The RADIUS (Remote Access Dial-In User Service) protocol was designed to solve the problem of centralized AAA across multiple, possibly heterogeneous, network-aggregation points--such as modem pools, switches, firewalls, VPN concentrators and wireless access points--through which remote users gain access to protected network resources. Once stereotyped as simply a password-authentication protocol, RADIUS has been thrust into the limelight by the wireless community, which realized its untapped potential in concentrating remote-access session configurations based on user access rights and accounting requirements.

We set out to evaluate enterprise RADIUS servers, requesting products that not only support Microsoft Active Directory and RSA Security SecureID, but also interface with multiple clients, aka NAS (network access server) devices, such as dial-up servers, VPN concentrators, WLAN access points and firewalls. Funk Software, IEA Software, Interlink Networks and Lucent Technologies sent their server software to our Syracuse University Real-World Labs. Vircom didn't participate because it's between revisions; XPerience Technologies' appliance didn't qualify for this review because it lacks SecureID authentication; and Secure Computing declined to participate.

Standard Standards
We figured standards compliance would be a given, and indeed, all the products meet RADIUS specifications and EAP (Extensible Authentication Protocol) definitions. But we dug deeper to discover the types of authentication mechanisms and back-end authentication stores supported. For interoperability, we looked at how well the server worked with an array of RADIUS clients, including access points, VPNs and dial-in servers. We scored configuration management based on how easily we could create user and group profiles and on the flexibility of configuring user-specific attributes. Security was a major concern as well. We wanted to see how the servers enabled and preserved integrity and communication with the NAS devices. In most cases, this boiled down to support for SSL certificates, but Funk and Interlink went beyond the call of duty in establishing shared secrets among multiple servers to ensure confidentiality. Interlink even makes shared secrets mandatory for remote configuration.

Of course, security features and policies won't work if you can't manage them. We evaluated the various rules that could be enforced through the server, with particular emphasis on time-of-day restrictions by user, group or role. All the products we tested except Funk's Steel-Belted Radius implement these restrictions. We also looked for time-quota enforcement, which lets you cap how long a user or group can access the network through the RADIUS server. Lucent's and Cisco's software support time quotas. All the products support restrictions based on the number of simultaneous logons, at the user or application level.

Most of the RADIUS servers we tested use a SQL database to store and access user profiles via ODBC or JDBC. Database integration is crucial for handling the masses of data collected for accounting and event logging. And what good is all that data if you can't slice, dice and report on it? We looked at the tools provided to present information, how dynamic that information is and what tasks can be performed with it.


Page:  1 | 2345678910  | Next Page »


Related Reading


More Insights


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers