Creating a User Account with RADIUS Server Authentication

Remote Authentication Dial-In User Service (RADIUS) is an external authentication method that provides security and scalability by separating the authentication function from the access server.

With RADIUS, the Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. lets you control access privileges for authenticated RADIUS users, based on the administrator's assignment of users to RADIUS groups. These groups are used in the Security Rule BaseClosed All rules configured in a given Security Policy. Synonym: Rulebase. to restrict or give users access to specified resources. Users are unaware of the groups to which they belong.

The Security Gateway forwards authentication requests by remote users to the RADIUS server. The RADIUS server, which stores user account information, does the authentication.

The RADIUS protocol uses UDP to communicate with the Security Gateway.

To use RADIUS groups, you must define a return attribute in the RADIUS user profile of the RADIUS server. This attribute is returned to the Security Gateway and contains the group name (for example, RAD_<group to which the RADIUS users belong>) to which the users belong.

For the GaiaClosed Check Point security operating system that combines the strengths of both SecurePlatform and IPSO operating systems. operating system, use the attribute "Vendor-Specific" (26) - refer to RFC 2865.

To learn how to configure a RADIUS server, refer to the vendor documentation.

Users can perform RADIUS authentication through a RADIUS server or a RADIUS server group. A RADIUS server group is a high availability group of identical RADIUS servers which includes any or all the RADIUS servers in the system. When you create the group, you define a priority for each server in the group. If the server with the highest priority fails, the one with the next highest priority in the group takes over, and so on.

After you configure authentication with a RADIUS server, you can, in addition, configure authentication with a certificate file. The user can then authenticate to the Security Gateway with the RADIUS server or the certificate file.

To configure RADIUS server authentication for a user