Time for action setting up the AP with FreeRadius-WPE
Follow the given instructions to get started:
Connect one of the LAN ports of the access point to the Ethernet port on your machine running BackTrack. In our case, the interface is eth1. Bring up the interface and get an IP address by running DHCP as shown in the following screenshot:
Log in to the access point and set the Security Mode to WPA-Enterprise. Then, under the EAP (802.1x) section, enter the RADIUS server IP Address as 192.168.0.198. This is the same IP address allocated to our wired interface in step 1. The RADIUS server Shared Secret would be test as shown in the following screenshot:
Let us now open a new terminal and go to the directory /usr/local/etc/raddb. This is where all the FreeRadius-WPE configuration files are:
Open eap.conf, you will find that the default_eap_type is set to peap. Let us leave this as it is:
Open clients.conf. This is where we define the allowed list of clients that can connect to our RADIUS server. As you can interestingly note, the secret for clients in the range 192.168.0.0/16 defaults to test. This is exactly what we used in step 2.
We are now all set to start the Radius server with a radiusd s X:
Once you run this, you will see a lot of debug messages on the screen, but eventually the server will settle down to listen for requests. Awesome! The setup is now ready to start the lab sessions in this chapter:
What just happened?
We have successfully set up FreeRadius-WPE. We will use this in the rest of the experiments that we will do in this chapter.
Have a go hero playing with RADIUS
FreeRadius-WPE has tons of options. It may be a good idea to familiarize yourself with them. Most importantly, take time to check-out the different configuration files and how they all work together.