Skip to main content
Version: 7.4

RADIUS

The Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service. RADIUS is widely used by Internet Service Providers (ISPs) and enterprises to manage access to the internet, wireless networks, and other network services. The protocol enables a network service to send a user's credentials to a central RADIUS server, which then verifies those credentials and returns the information necessary to allow or deny access to the user. RADIUS is also used for managing user profiles, tracking usage, and ensuring secure network access control. This centralized approach simplifies network management and enhances security by allowing organizations to maintain user profiles in a single location.

RADIUS operates as a request/response protocol, particularly focusing on authentication and accounting requests. When a user attempts to connect to a network service, the service sends an AUTH request to the RADIUS server containing the user's credentials. The server then processes this request and sends back a response indicating whether the user is authorized to access the service. By analyzing the AUTH request and response messages across a network, network administrators can detect disruptions or anomalies in the RADIUS service. These analyses are crucial for identifying issues such as authentication failures, unauthorized access attempts, or server performance problems. Regular monitoring of these messages helps ensure the integrity and availability of the RADIUS service, which is essential for maintaining secure and efficient network operations.

Low RADIUS AUTH Request/Response Ratio

The Low RADIUS AUTH Request/Response Ratio anomaly detection job is tailored to monitor the frequency and ratio of AUTH request and response messages in the Remote Authentication Dial-In User Service (RADIUS) protocol. RADIUS is widely used for authentication, authorization, and accounting in network access scenarios. In a healthy network environment, there is a balanced and consistent exchange of AUTH requests from clients and corresponding AUTH responses from the RADIUS server.

An unusually low volume of RADIUS AUTH messages, or a significant discrepancy between the number of requests and responses, can indicate several types of issues:

  • RADIUS Server Performance Issues: A primary concern is the potential underperformance or failure of the RADIUS server. If the server is overwhelmed, malfunctioning, or incorrectly configured, it may not be able to process all incoming AUTH requests, leading to a lower number of responses. This can result in authentication delays or failures, impacting user access to network resources.

  • Network Connectivity or Configuration Problems: Issues in network connectivity can prevent AUTH requests from reaching the RADIUS server or block responses from reaching the clients. This could be due to misconfigured network devices (like routers or firewalls), failing network hardware, or disruptions in network infrastructure that affect the path of RADIUS traffic.

  • Security Threats: A low AUTH request/response ratio may also suggest potential security threats. For instance, a Denial of Service (DoS) attack targeting the RADIUS server could overwhelm it with a high volume of spurious requests, leading to legitimate requests being unanswered. Alternatively, network intrusions or unauthorized access attempts might disrupt normal RADIUS operations.

  • Client-Side Issues: Problems with client configurations or network access policies can lead to a decrease in AUTH requests. This might occur if a large number of clients are misconfigured, or if there are changes in access policies that inadvertently restrict or prevent clients from sending AUTH requests.

Attributes

AttributeInformation
Analysistemporal

Downloads

SchemaLink
CODEXelastiflow_codex_avail_radius_auth_resp_ratio_low
ECSelastiflow_ecs_avail_radius_auth_resp_ratio_low