Closed edoput closed 7 years ago
Keys to evaluate
aaa.1.status
aaa.radius.acct.port
aaa.radius.acct.status
aaa.radius.auth.port
aaa.status
aaa.1.ssid #wpa2_personal
aaa.1.br.devname #?
aaa.1.devname # wpa2_personal
aaa.1.driver # wpa2_personal
aaa.1.radius.macacl.status # ?
aaa.1.wpa.1.pairwise
aaa.1.wpa.key.1.mgmt
aaa.1.wpa.mode
aaa.1.wpa.psk
Default keys are
aaa.1.radius.acct.1.port=1813
aaa.1.radius.acct.1.status=disabled
aaa.1.radius.auth.1.port=1812
aaa.1.status=disabled
aaa.status=disabled
As the first evaluation is approaching this is frozen with defaults
another key to investigate is
br.devname
it may be available only in bridge mode
the aaa
section is one of the most difficult as it is defined by wireless authentication and netmode. This leads to 2 (netmodes) 3 (authenticaion protocols) 2 (radio mode) = 12 possible configuration.
I've tried my best and they should be all covered in the tests but something may have sliiped by
The section under the namespace
aaa
provides the configuration for a radius server and wireless authentication usingwpa2_personal
protocol.Brainstorm
general
section in netjsonradius
in netjson