|
|
|
Radius Log by bill jhonson
|
|
|
Radius Log |
|
|
|
Business
|
|
For the security minded network administrator, keeping on top of all potential security issues is first and foremost in their mind when any new server, network appliance or service is added to the existing infrastructure. Radius is well know for its use as an authentication method that is used in numerous network systems. It generally uses the UDP protocol to carry the radius data packets, and it can authenticate users to systems and file systems. Contained within the radius server is the radius log that will be home to all the transactions that happen to cross the radius server and are stored there for reference. The issue with reviewing a radius log a day or a week after the log has been written, is that security violations are long since in the past and by the time the radius log is read, the breach has already taken place. Monitoring the radius log real time is the best way to avoid these unnoticed issues. A monitoring service needs to read the data feed as it is written to the radius log and must be able to read it as it is present. Not only real, it needs to be parsed and interpreted in such a way that an admin can be notified if there are unwanted actions taking place on any of the systems that depend of radius for authentication. The radius log data can be stream to an analysis tool that can interpret the feed quickly and generate reports and even automated notifications to alert the correct people to the problem as it is happening. The radius log on its own and without any real time interpretation is a reference only. Using a radius log server that can parse the log immediately turns it into a real time monitoring tool that can help quickly avoid network authentication issues as they happen.
Related Articles -
radius, log,
|
Rate This Article |
|
|
|
Do you Agree or Disagree? Have a Comment? POST IT!
Reader Opinions |
|
|
|
|
|
|
|
|
Author Login |
|
|
Advertiser Login
ADVERTISE HERE NOW!
Limited Time $60 Offer!
90 Days-1.5 Million Views
|
|
TIM FAY
After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
|
|
|
|
|
LAURA JEEVES
At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
|
|
|
|
|
SUSAN FRIESEN
Susan Friesen, founder of the award-winning web development and digital marketing firm eVision Media...more
|
|
|
|
|
STEPHEN BYE
Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through the...more
|
|
|
|
|
GENE MYERS
Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
|
|
|
|
|
SHALINI MITTAL
A postgraduate in Fashion Technology. Shalini is a writer at heart! Writing for her is an expression...more
|
|
|
|
|
ADRIAN JOELE
I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
|
|
|
|
|
ALEX BELSEY
I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
|
|
|
|
|
JAMES KENNY
James is a Research Enthusiast that focuses on the understanding of how things work and can be impro...more
|
|
|
|