Back to Blog
15 min read

What is RADIUS? The Complete Guide for IT Professionals

RADIUS is the backbone of network access control, handling billions of authentication requests every day. Whether you manage WiFi, VPN, or wired networks, understanding RADIUS is essential. This guide covers everything from protocol fundamentals to choosing the right RADIUS solution for your organization.

A RADIUS server (Remote Authentication Dial-In User Service) is a networking protocol server that provides centralized authentication, authorization, and accounting (AAA) for users and devices connecting to a network. It verifies credentials against a directory, then grants or denies access based on policies. RADIUS is the standard behind WPA2-Enterprise WiFi, VPN, and wired 802.1X authentication.

What is RADIUS?

RADIUS (Remote Authentication Dial-In User Service) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) for users and devices connecting to a network. It is the industry standard for controlling who gets access to WiFi networks, VPNs, wired Ethernet ports, and other network resources.

When a user tries to connect to a WiFi network secured with WPA-Enterprise, or logs into a VPN, the network equipment doesn't make the access decision on its own. Instead, it asks a RADIUS server whether to allow or deny the connection. This centralized model means you can manage authentication policies from one place, regardless of how many access points, switches, or VPN concentrators you operate.

Key Takeaway

RADIUS is the protocol that answers the question "should this user or device be allowed on the network?" It is defined in RFC 2865 (authentication/authorization) and RFC 2866 (accounting), and is supported by virtually every enterprise network device manufactured today.

History and Evolution of RADIUS

RADIUS was developed in 1991 by Livingston Enterprises to authenticate dial-up modem connections for the Merit Network, which operated the NSFnet backbone. At the time, Internet service providers needed a way to verify username/password combinations from thousands of modem ports across distributed points of presence.

The protocol proved so effective that the IETF standardized it in RFC 2058 (1997) and later updated it to RFC 2865 (2000), which remains the authoritative specification. Accounting was defined separately in RFC 2866.

Key Milestones

  • 1991: RADIUS created for dial-up authentication at Merit Network
  • 1997: IETF publishes RFC 2058, formalizing the protocol
  • 2000: RFC 2865/2866 published as the definitive RADIUS standard
  • 2004: EAP support added (RFC 3579), enabling 802.1X and WPA-Enterprise
  • 2012: RadSec (RADIUS over TLS) standardized in RFC 6614 for encrypted transport
  • 2020s: Cloud RADIUS services emerge, eliminating on-premise server requirements

Despite its age, RADIUS has proved remarkably adaptable. The core protocol is simple and extensible, which has allowed it to evolve from dial-up authentication to securing modern WiFi, VPN, and IoT networks without requiring protocol redesign.

How RADIUS Authentication Works

RADIUS authentication follows a three-party model involving a supplicant (the user or device), an authenticator (the network device), and the RADIUS server (the authentication authority).

The Authentication Flow

  1. Connection request: A user or device (the supplicant) attempts to connect to the network -- for example, associating with a WPA-Enterprise WiFi network or initiating a VPN session
  2. Authenticator forwards request: The network device (access point, switch, or VPN gateway) acts as a RADIUS client and sends an Access-Request packet to the RADIUS server, containing the user's credentials and connection metadata
  3. RADIUS server validates: The RADIUS server checks the credentials against its user database. This could be a local database, an LDAP directory like Active Directory, a SAML identity provider, or a certificate authority
  4. Challenge (optional): For EAP-based authentication, the server may issue Access-Challenge packets to perform multi-step authentication (certificate validation, MFA, etc.)
  5. Access decision: The RADIUS server responds with either an Access-Accept (granting access with specific policies) or an Access-Reject (denying access)
  6. Policy enforcement: If accepted, the response includes RADIUS attributes that tell the authenticator how to configure the connection -- which VLAN to assign, bandwidth limits, session timeouts, and other policies

Why This Matters

The centralized model means you change access policies in one place (the RADIUS server) and they apply everywhere -- across hundreds of access points, switches, and VPN endpoints. No need to configure each device individually.

Shared Secrets

Communication between the authenticator and the RADIUS server is protected by a shared secret -- a password known to both parties but never transmitted over the network. This shared secret is used to encrypt the user's password within the Access-Request packet and to generate the response authenticator field, which proves the response came from the legitimate RADIUS server.

RADIUS Packet Types

The RADIUS protocol defines several packet types, each serving a specific function in the AAA process:

Packet Type Code Purpose
Access-Request 1 Sent by the authenticator to request authentication for a user/device
Access-Accept 2 Sent by the RADIUS server to grant access, includes policy attributes
Access-Reject 3 Sent by the RADIUS server to deny access
Access-Challenge 11 Sent by the server to request additional information (used in EAP exchanges)
Accounting-Request 4 Sent by the authenticator to report session start, stop, or interim updates
Accounting-Response 5 Sent by the server to acknowledge the accounting record

The Access-Challenge packet is particularly important for modern authentication. When using EAP methods like EAP-TLS (certificate-based) or PEAP (username/password over TLS tunnel), the authentication process involves multiple round-trip exchanges between the supplicant and the RADIUS server, with each step carried in Access-Challenge and Access-Request packets.

RADIUS Attributes and Vendor-Specific Attributes (VSAs)

RADIUS packets carry attributes -- key-value pairs that communicate information between the authenticator and the RADIUS server. Attributes are how RADIUS delivers both identity data (who is authenticating) and policy data (what access they should receive).

Common Standard Attributes

  • User-Name (1): The identity being authenticated
  • User-Password (2): Encrypted password for PAP authentication
  • NAS-IP-Address (4): IP address of the network device making the request
  • NAS-Port (5): Physical or logical port the user is connecting through
  • Service-Type (6): Type of service requested (login, framed, etc.)
  • Framed-IP-Address (8): IP address to assign to the user
  • Filter-Id (11): Name of a filter list to apply
  • Session-Timeout (27): Maximum session duration in seconds
  • Tunnel-Type (64): Used for VLAN assignment
  • Tunnel-Private-Group-Id (81): VLAN ID to assign
  • EAP-Message (79): Encapsulates EAP protocol data

Vendor-Specific Attributes (VSAs)

RADIUS was designed to be extensible through Vendor-Specific Attributes (attribute type 26). VSAs allow equipment manufacturers to define custom attributes for their specific features. For example, Cisco uses VSAs to assign users to specific access control lists, while Aruba uses them for role-based access policies.

VSAs are identified by a vendor ID (assigned by IANA) and a vendor-specific attribute number. The RADIUS server must be configured to send the appropriate VSAs based on the target equipment manufacturer.

RADIUS vs LDAP: When to Use Which

RADIUS and LDAP are often mentioned together, but they serve fundamentally different purposes. Understanding the distinction is critical for designing network authentication correctly.

Aspect RADIUS LDAP
Primary function Network access authentication (AAA) Directory services (user/group storage and lookup)
Protocol type Authentication protocol Directory access protocol
802.1X support Native -- designed for 802.1X Not supported directly
EAP support Full EAP framework support No EAP capability
Policy delivery Returns VLAN, ACL, bandwidth policies Returns user data only
Accounting Built-in session accounting No accounting capability
Network device support Universal -- all enterprise equipment Limited -- few network devices query LDAP
Typical role Front-end authentication decision Back-end identity source

In practice, RADIUS and LDAP work together. The RADIUS server handles the network access protocol (communicating with access points and switches), then queries LDAP (such as Active Directory or Azure AD) as the back-end identity source to validate credentials. LDAP answers "does this user exist and is their password correct?" while RADIUS handles everything else -- the network protocol, policy delivery, and session accounting.

RADIUS vs TACACS+: Differences and Use Cases

RADIUS and TACACS+ are both AAA protocols, but they are designed for different purposes and operate differently at a technical level.

Aspect RADIUS TACACS+
Primary use case Network access (WiFi, VPN, wired NAC) Device administration (router/switch CLI access)
Transport UDP (ports 1812/1813) TCP (port 49)
Encryption Password field only Entire packet body
AAA separation Authentication + authorization combined Separates authentication, authorization, and accounting
Standards Open IETF standard (RFC 2865) Originally Cisco proprietary (now RFC 8907)
802.1X / EAP Full support Not supported
Command authorization Not supported Per-command authorization
Multi-vendor support Universal Primarily Cisco and select vendors

When to Use Each

Use RADIUS for network access control: WiFi authentication, VPN access, wired 802.1X, guest networks, and IoT device onboarding. Use TACACS+ for device administration: controlling who can log into routers, switches, and firewalls, and what commands they can execute. Many organizations use both protocols side by side.

RADIUS vs Diameter: The Next Generation

Diameter was developed as a successor to RADIUS, addressing several protocol limitations. The name is a play on RADIUS -- a diameter is twice the radius.

Aspect RADIUS Diameter
Transport UDP (unreliable) TCP or SCTP (reliable)
Architecture Client-server only Peer-to-peer (server can initiate requests)
Failover Application-level only Built-in failover and redirect
Attribute size Limited to 253 bytes per attribute Up to 16 MB per attribute
Security Shared secret (MD5-based) IPsec or TLS required
Primary adoption Enterprise WiFi, VPN, wired NAC Mobile/telecom (LTE, 5G, IMS)

Despite Diameter's technical advantages, RADIUS remains dominant for enterprise network access. Diameter found its primary adoption in the telecom industry (LTE/4G, 5G, IMS) rather than replacing RADIUS in enterprise environments. Enterprise access points, switches, and VPN gateways universally support RADIUS, and the transition cost to Diameter would be enormous with minimal practical benefit for most use cases.

For enterprise IT teams, investing in RADIUS remains the correct choice. The protocol's extension mechanisms (RadSec for TLS transport, new EAP methods, cloud RADIUS services) have addressed many of the original limitations without requiring a protocol change.

Common RADIUS Use Cases

WiFi Authentication (802.1X / WPA-Enterprise)

The most common RADIUS use case today. WPA-Enterprise requires a RADIUS server to authenticate users via EAP methods such as EAP-TLS (certificates), PEAP (username/password), or TTLS. This eliminates the shared password problem of WPA-Personal and gives each user unique credentials.

VPN Authentication

RADIUS authenticates remote users connecting through VPN concentrators. This provides centralized authentication regardless of VPN vendor and enables integration with multi-factor authentication (MFA) providers through RADIUS proxy chains.

Wired Network Access Control (NAC)

Switches use 802.1X with RADIUS to authenticate devices before granting port access. This prevents unauthorized devices from connecting to the wired network and enables dynamic VLAN assignment based on user identity or device type.

IoT Device Authentication

RADIUS handles IoT devices through MAC Authentication Bypass (MAB) for devices that cannot run an 802.1X supplicant, or EAP-TLS for certificate-capable devices. The RADIUS server maintains approved device lists and assigns IoT devices to isolated VLANs.

Guest Network Access

Captive portal systems use RADIUS to authenticate guest users who have registered through self-service portals, sponsor approval workflows, or social login. RADIUS accounting tracks guest session usage for compliance and reporting.

See Cloud RADIUS in Action

IronWiFi provides cloud-hosted RADIUS that works with any access point or switch. No servers to deploy, no software to maintain.

Explore Cloud RADIUS Schedule a Demo

On-Premise vs Cloud RADIUS

Organizations deploying RADIUS face a fundamental infrastructure decision: run your own RADIUS server or use a managed cloud service.

Factor On-Premise RADIUS Cloud RADIUS
Deployment time Days to weeks Minutes to hours
Server management You maintain hardware, OS, patches Fully managed by provider
High availability Requires redundant servers + configuration Built-in globally distributed HA
Scalability Limited by server capacity Elastic -- scales automatically
Identity integration Manual configuration for each IdP Native Azure AD, Google, Okta integration
Cost model Capital expense (hardware + licensing) Operating expense (subscription)
Multi-site Separate server at each site or backhauled traffic Global PoPs -- local authentication everywhere
Customization Full control over configuration Provider-defined feature set

On-Premise RADIUS Risk

A common failure mode for on-premise RADIUS is the "forgotten server" -- a critical RADIUS server running on aging hardware with an outdated OS, where the engineer who configured it has left the organization. When it fails, network authentication stops for the entire organization. Cloud RADIUS eliminates this risk entirely.

Setting Up Your First RADIUS Server

Whether you choose on-premise or cloud, the general steps for deploying RADIUS authentication are:

  1. Define your identity source: Decide where user accounts live -- Active Directory, Azure AD, Google Workspace, LDAP, or a local database. This determines which EAP methods and integrations you need
  2. Choose your RADIUS deployment: On-premise software (FreeRADIUS, Microsoft NPS, Cisco ISE) or a cloud RADIUS service. Cloud services are faster to deploy and eliminate server maintenance
  3. Configure RADIUS clients: Add each network device (access point, switch, VPN gateway) as a RADIUS client with a shared secret. For cloud RADIUS, point your equipment to the provider's server addresses
  4. Define authentication policies: Configure which EAP methods to accept (EAP-TLS for certificates, PEAP for username/password), which users/groups are authorized, and what network policies to apply (VLANs, bandwidth, session limits)
  5. Deploy certificates: For EAP-TLS or server certificate validation, deploy the RADIUS server certificate and configure trusted certificate authorities on client devices
  6. Test with a single device: Verify authentication works with one device before rolling out to the full network. Check RADIUS logs for successful authentication and correct policy application
  7. Configure accounting: Enable RADIUS accounting to track session starts, stops, and data usage. This provides audit trails for compliance and troubleshooting data for operations
  8. Roll out to production: Gradually migrate network segments to RADIUS authentication, monitoring logs for failures and adjusting policies as needed

Choosing a RADIUS Solution: What to Look For

When evaluating RADIUS solutions, consider these factors based on your organization's requirements:

Identity Provider Integration

Your RADIUS solution must integrate with your existing identity system. If your organization uses Azure AD, Google Workspace, or Okta, look for native integration rather than LDAP sync adapters, which add complexity and latency.

EAP Method Support

Ensure the solution supports the EAP methods your environment requires. EAP-TLS (certificate-based) provides the strongest security. PEAP and EAP-TTLS support username/password authentication through a TLS tunnel.

High Availability

RADIUS is a critical service -- if it goes down, nobody can connect to the network. Your solution needs redundancy. For on-premise, this means multiple servers with automatic failover. Cloud services should provide multiple global points of presence with SLA guarantees.

Multi-Site Support

If your organization operates multiple locations, consider authentication latency. Cloud RADIUS with distributed points of presence provides low-latency authentication regardless of location. On-premise solutions may need local servers at each site.

Certificate Management

If you plan to use certificate-based authentication (EAP-TLS), look for integrated PKI and SCEP support. Managing certificates separately adds significant operational overhead. Solutions with built-in certificate lifecycle management simplify deployment considerably.

Monitoring and Troubleshooting

RADIUS authentication failures can be difficult to diagnose. Look for detailed logging, real-time authentication dashboards, and the ability to search and filter authentication events by user, device, or result.

Ready to Deploy RADIUS?

IronWiFi Cloud RADIUS deploys in minutes, integrates with your identity provider, and includes built-in PKI for certificate-based authentication.

Start Free Trial Talk to an Expert

Trusted by 1,000+ organizations across 108 countries

Frequently Asked Questions

RADIUS stands for Remote Authentication Dial-In User Service. Despite the name referencing dial-in connections (reflecting its 1991 origins), RADIUS is used in modern networks for WiFi authentication, VPN access, wired network access control, and many other network services that require centralized authentication.
RADIUS uses UDP port 1812 for authentication and UDP port 1813 for accounting, as defined in RFC 2865 and RFC 2866. Older implementations may use ports 1645 and 1646 respectively. Many RADIUS servers listen on both port pairs for backward compatibility. RadSec (RADIUS over TLS) uses TCP port 2083.
Absolutely. RADIUS remains the dominant protocol for network access authentication. Every enterprise access point, switch, and VPN gateway supports RADIUS. The protocol has evolved through extensions (EAP support, RadSec, cloud delivery) while maintaining backward compatibility. There is no practical replacement for RADIUS in enterprise network access control.
RADIUS is an authentication protocol that makes network access decisions and delivers policies. LDAP is a directory protocol that stores and retrieves user information. They serve complementary roles: RADIUS handles the network access decision, often querying an LDAP directory (like Active Directory) as a backend identity source to validate credentials. You typically need both, not one or the other.
Yes. WPA-Enterprise (802.1X) requires a RADIUS server to authenticate users and devices. The access point acts as an authenticator, forwarding authentication requests to the RADIUS server, which validates credentials and returns an access decision. This can be an on-premise server (FreeRADIUS, Microsoft NPS, Cisco ISE) or a cloud RADIUS service like IronWiFi.
RADIUS is designed for network access authentication (WiFi, VPN, wired NAC) and uses UDP. TACACS+ is designed for device administration (router/switch management) and uses TCP. TACACS+ encrypts the entire packet body and supports per-command authorization, making it ideal for controlling administrator access to network equipment. Most enterprise networks use both protocols for their respective purposes.
Yes. RADIUS can authenticate IoT devices using MAC Authentication Bypass (MAB) for devices that do not support 802.1X, or using certificate-based authentication (EAP-TLS) for devices that support it. Cloud RADIUS solutions can maintain allow-lists of approved device MAC addresses for automated IoT onboarding and assign devices to isolated network segments for security.
Cloud RADIUS is a RADIUS server hosted and managed by a third-party provider, eliminating the need to deploy and maintain on-premise server hardware. Key advantages include: automatic high availability with built-in redundancy, global points of presence for low-latency authentication at any location, seamless software updates, and native integration with cloud identity providers like Azure AD, Google Workspace, and Okta. The RADIUS protocol itself works the same -- your network equipment connects to the cloud provider's servers instead of a local server.