Message-Authenticator Check Use Cases

The following scenarios document the use cases for configuring the Request Message Authenticator flag to check for the Message-Authenticator attribute in RADIUS packets. This flag is configurable when defining the following:

External Radius Server for AP/OmniSwitch (No UPAM)

An Access Point or OmniSwitch sends RADIUS AAA requests directly to a RADIUS server (on-premises or hosted elsewhere); UPAM is not involved in this scenario.

Access Point RADIUS Packets:

OmniSwitch RADIUS Packets:

By default,

To ensure that the OmniSwitch includes the Message-Authenticator in all RADIUS packets sent and also enforces validation of the Message-Authenticator attribute in all responses received from any RADIUS server, use the aaa radius message-authenticator CLI command on the switch. This CLI command is a global command supported on AOS 8.10R2 or higher. Note that you can also issue this command using the OmniVista CLI Scripting application.

Notes:

UPAM as Proxy between AP/OmniSwitch and External Radius

UPAM proxies incoming RADIUS requests from an Access Point or OmniSwitch to an external RADIUS server.

Note that UPAM always includes the Message-Authenticator attribute in RADIUS request packets sent to the external server, regardless of the Require Message Authenticator setting (enabled or disabled). It is up to the external RADIUS Server whether to check for the Message-Authenticator attribute in RADIUS request packets received from UPAM.

The default settings for the Require Message Authenticator flag for external RADIUS servers are as follows:

Enabling the Require Message Authenticator flag is highly recommended to prevent attempts to forge authentication responses by spoofing UDP-based RADIUS response packets.