Annotation of embedaddon/strongswan/conf/plugins/eap-radius.opt, revision 1.1
1.1 ! misho 1: charon.plugins.eap-radius.accounting = no
! 2: Send RADIUS accounting information to RADIUS servers.
! 3:
! 4: charon.plugins.eap-radius.accounting_close_on_timeout = yes
! 5: Close the IKE_SA if there is a timeout during interim RADIUS accounting
! 6: updates.
! 7:
! 8: charon.plugins.eap-radius.accounting_interval = 0
! 9: Interval in seconds for interim RADIUS accounting updates, if not specified
! 10: by the RADIUS server in the Access-Accept message.
! 11:
! 12: charon.plugins.eap-radius.accounting_requires_vip = no
! 13: If enabled, accounting is disabled unless an IKE_SA has at least one
! 14: virtual IP. Only for IKEv2, for IKEv1 a virtual IP is strictly necessary.
! 15:
! 16: charon.plugins.eap-radius.accounting_send_class = no
! 17: If enabled, adds the Class attributes received in Access-Accept message to
! 18: the RADIUS accounting messages.
! 19:
! 20: charon.plugins.eap-radius.class_group = no
! 21: Use class attributes in Access-Accept messages as group membership
! 22: information.
! 23:
! 24: Use the _class_ attribute sent in the RADIUS-Accept message as group
! 25: membership information that is compared to the groups specified in the
! 26: **rightgroups** option in **ipsec.conf**(5).
! 27:
! 28: charon.plugins.eap-radius.close_all_on_timeout = no
! 29: Closes all IKE_SAs if communication with the RADIUS server times out. If it
! 30: is not set only the current IKE_SA is closed.
! 31:
! 32: charon.plugins.eap-radius.dae.enable = no
! 33: Enables support for the Dynamic Authorization Extension (RFC 5176).
! 34:
! 35: charon.plugins.eap-radius.dae.listen = 0.0.0.0
! 36: Address to listen for DAE messages from the RADIUS server.
! 37:
! 38: charon.plugins.eap-radius.dae.port = 3799
! 39: Port to listen for DAE requests.
! 40:
! 41: charon.plugins.eap-radius.dae.secret
! 42: Shared secret used to verify/sign DAE messages. If set, make sure to adjust
! 43: the permissions of the config file accordingly.
! 44:
! 45: charon.plugins.eap-radius.eap_start = no
! 46: Send EAP-Start instead of EAP-Identity to start RADIUS conversation.
! 47:
! 48: charon.plugins.eap-radius.filter_id = no
! 49: Use filter_id attribute as group membership information.
! 50:
! 51: If the RADIUS _tunnel_type_ attribute with value **ESP** is received, use
! 52: the _filter_id_ attribute sent in the RADIUS-Accept message as group
! 53: membership information that is compared to the groups specified in the
! 54: **rightgroups** option in **ipsec.conf**(5).
! 55:
! 56: charon.plugins.eap-radius.forward.ike_to_radius
! 57: RADIUS attributes to be forwarded from IKEv2 to RADIUS.
! 58:
! 59: RADIUS attributes to be forwarded from IKEv2 to RADIUS (can be defined by
! 60: name or attribute number, a colon can be used to specify vendor-specific
! 61: attributes, e.g. Reply-Message, or 11, or 36906:12).
! 62:
! 63: charon.plugins.eap-radius.forward.radius_to_ike =
! 64: Same as ike_to_radius but from RADIUS to IKEv2.
! 65:
! 66: Same as _charon.plugins.eap-radius.forward.ike_to_radius_ but from RADIUS to
! 67: IKEv2, a strongSwan specific private notify (40969) is used to transmit the
! 68: attributes.
! 69:
! 70: charon.plugins.eap-radius.id_prefix
! 71: Prefix to EAP-Identity, some AAA servers use a IMSI prefix to select the
! 72: EAP method.
! 73:
! 74: charon.plugins.eap-radius.nas_identifier = strongSwan
! 75: NAS-Identifier to include in RADIUS messages.
! 76:
! 77: charon.plugins.eap-radius.port = 1812
! 78: Port of RADIUS server (authentication).
! 79:
! 80: charon.plugins.eap-radius.secret =
! 81: Shared secret between RADIUS and NAS. If set, make sure to adjust the
! 82: permissions of the config file accordingly.
! 83:
! 84: charon.plugins.eap-radius.server =
! 85: IP/Hostname of RADIUS server.
! 86:
! 87: charon.plugins.eap-radius.retransmit_base = 1.4
! 88: Base to use for calculating exponential back off.
! 89:
! 90: charon.plugins.eap-radius.retransmit_timeout = 2.0
! 91: Timeout in seconds before sending first retransmit.
! 92:
! 93: charon.plugins.eap-radius.retransmit_tries = 4
! 94: Number of times to retransmit a packet before giving up.
! 95:
! 96: charon.plugins.eap-radius.servers {}
! 97: Section to specify multiple RADIUS servers.
! 98:
! 99: Section to specify multiple RADIUS servers. The **nas_identifier**,
! 100: **secret**, **sockets** and **port** (or **auth_port**) options can be
! 101: specified for each server. A server's IP/Hostname can be configured using
! 102: the **address** option. The **acct_port** [1813] option can be used to
! 103: specify the port used for RADIUS accounting. For each RADIUS server a
! 104: priority can be specified using the **preference** [0] option. The
! 105: retransmission time for each server can set set using **retransmit_base**,
! 106: **retransmit_timeout** and **retransmit_tries**.
! 107:
! 108: charon.plugins.eap-radius.sockets = 1
! 109: Number of sockets (ports) to use, increase for high load.
! 110:
! 111: charon.plugins.eap-radius.station_id_with_port = yes
! 112: Whether to include the UDP port in the Called- and Calling-Station-Id
! 113: RADIUS attributes.
! 114:
! 115: charon.plugins.eap-radius.xauth {}
! 116: Section to configure multiple XAuth authentication rounds via RADIUS.
! 117:
! 118: Section to configure multiple XAuth authentication rounds via RADIUS.
! 119: The subsections define so called authentication profiles with arbitrary
! 120: names. In each profile section one or more XAuth types can be configured,
! 121: with an assigned message. For each type a separate XAuth exchange will be
! 122: initiated and all replies get concatenated into the User-Password attribute,
! 123: which then gets verified over RADIUS.
! 124:
! 125: Available XAuth types are **password**, **passcode**, **nextpin**, and
! 126: **answer**. This type is not relevant to strongSwan or the AAA server, but
! 127: the client may show a different dialog (along with the configured message).
! 128:
! 129: To use the configured profiles, they have to be configured in the respective
! 130: connection in **ipsec.conf**(5) by appending the profile name, separated by
! 131: a colon, to the **xauth-radius** XAauth backend configuration in _rightauth_
! 132: or _rightauth2_, for instance, _rightauth2=xauth-radius:profile_.
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>