3.3 Configuring a FreeRADIUS Server
Perform the following steps to configure the FreeRADIUS server:
- Download and install the RADIUS server 3.x version on a Linux® machine.
 - Modify the text
                    
allow_vulnerable_openssl = noin/usr/local/etc/raddb/radiusd.confto the following:"allow_vulnerable_openssl= 'CVE-2016-6304' - Open the file
                    
/usr/local/etc/raddb/client.confand provide the same AP IP address and shared key as mentioned in Authenticator - AP Configuration.For Example: client WINC1500 { ipaddr = 192.168.1.1 secret = 123456789 } - Generate the certificates and keys as
                mentioned in the Generating Certificates using
            
openssland copy to the/usr/local/etc/raddb/certspath. - Select EAP security for phase 1
                authentication in 
/usr/local/etc/raddb/mods-available/eapfile and modify the following in the EAP mode.- For
                        TTLS
default_eap_type = ttls - For
                        TLS
default_eap_type = tls - For
                        PEAP
default_eap_type = peap 
 - For
                        TTLS
 - Search for the string
                    
tls-config tls-commonin the/usr/local/etc/raddb/mods-available/eapfile and map the proper key file and certificate file as shown below. This is common for TLS, TTLS and PEAP.private_key_file = ${certdir}/server.key certificate_file = ${certdir}/server.crt ca_file = ${cadir}/radius_root.crt - For phase 2 authentication.
- For TTLS in ttls
                        mode
default_eap_type = mschapv2 - For PEAP in peap mode
default_eap_type = mschapv2 
 - For TTLS in ttls
                        mode
 - Configure the EAP users for the phase
                2 authentication in the file 
mods-config/files/authorizeused for MSCHAPv2.DEMO_USER Cleartext-Password := “DemoPassword” DEMO_AP Cleartest-Password := “12345678” - Run the RADIUS server using the
                    
radius –xcommand. 
