Title: RE: [VOP RADIUS] Filtering RADIUS attributes
Derrick,
 
What you say is very interesting.

I'm happy to elaborate if you want to hear it but I'm sure you just want the solution.

Please, tell me all the details. Specially about the bug in the current version. Should it affect my database authentication? >From what you posted, looks like it's related to text and NT authentication methods.

Profile="DEFAULT"
        Remove-attributes = 9,13,25

I would setup only the "DSL" profile to do that. It's perfect.

Then under the Radius Server tab click on "Text File/Unix Password file" and "Default PPP Service" and that should do it.  I was fortunate enough to have a non production Radius server to do testing on and a pretty good tech at Vircom to help.  I used to have "NT SAM" checked but due to the bug in Radius I had to do "Text File/Unix Password file".  Yes, it still uses your NT database to authenticate against but you must set it up this way.  You can use VOPtest that Vircom supplies to test that the attributes are stripped. 

So, even though I run based on a database (SQL, but it's not important), I should also check "text file/unix password file"? I could give it a try, but VOPTEST never worked for me. It always fails... Can't explain why.

--
Luiz Lima
Image Link Internet
http://www.imagelink.com.br

Reply via email to