Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

9

NameDescriptionStatusTools
1FirewallA layer 4 firewall MUST separate the internet-facing RADIUS server and the internal network. Access must be controlled and monitored.MUST
2Firewall ICMPFirewalls MUST permit ICMP to allow centralised monitoring of RADIUS serversMUST
3Admin accessSystem administration (RADIUS and aassociated associated systems) MUST be preformed over a private internal network ONLY.MUST
34DMZ connectivity4All protocols permitted access to the servers MUST be risk-assessed (e.g. SMB and RDP may present security risks)MUST
5External port accessA deny-all policy MUST be applied, permitting only the minimum ports necessary for authentication (e.g. UDP 1812, Status-Server 18121, TCP 2083 if RadSec is used). UDP 1645 MUST NOT be used.MUST
6Internal port accessA deny-all policy MUST be applied, permitting only the minimum ports necessary for administration functions (e.g. TCP 3389 for RDP or TCP 22 for SSH)MUST
7RadSecIf RadSec is used, X.509 certificates must be used to identify RADIUS serversMUST (optional)
8Network segmentationNetwork segmentation SHOULD be considered, placing roaming users into a separate segment to local organisation users.SHOULD
9VLAN spoofing countermeasuresthe visitor network design should prevent devices from mailiciously placing themselves into unauthorised VLANsSHOULD
10Penetration testingNROs SHOULD regularly conduct vulnerability assessment of internet-facing eduroam infrastructure.SHOULD
11



12



13



14



155678



4. References

eduroam Compliance Statement https://www.eduroam.org/support/eduroam_Compliance_Statement.pdf

...