Docs
test1test2
6.5
6.5
  • ElastiFlow Documentation
  • Unified Flow Collector
    • General Configuration
    • Changelog
    • Maxmind GeoIP2 and GeoLite2
    • RiskIQ PassiveTotal
    • Network Interfaces
    • User-Defined Metadata
    • Docker
    • Linux
    • Unified Flow Collector Introduction
    • System Requirements
    • Supported IEs
    • AWS VPC Flow Log IEs
    • IPFIX IEs
    • Netflow IEs
    • sFlow IEs
  • Unified SNMP Collector
    • Device Groups
    • Changelog
    • Devices
    • Downloading Definitions
    • Enumerations
    • Objects
    • Object Groups
    • User-Defined Metadata
    • Docker
    • Network Interfaces
    • United SNMP Collector Introduction
    • Linux
    • Scheduling Rediscovery
  • Monitoring ElastiFlow
    • Liveness & Readiness
    • Metrics
    • Prometheus & Grafana
  • Configuration Reference
    • YAML Configuration Files
    • Configuration Reference Overview
    • Common
      • API
      • Licensing
      • Overview
      • Logging
      • HTTP output
      • Elasticsearch output
      • Kafka output
      • Monitor output
      • OpenSearch output
      • Splunk output
      • stdout output
      • Processor
    • Unified Flow Collector
      • Overview
      • Community/Conversation IDs
      • EF_PROCESSOR_ENRICH_TOTALS_IF_NO_DELTAS
      • Overview
      • RiskIQ PassiveTotal
      • Maxmind
      • User-Defined Metadata
      • Overview
      • Overview
      • User-Defined Metadata
      • Overview
      • Benchmark Input
      • Netflow/IPFIX/sFlow (UDP)
      • Licensing
      • Decoder/Processor
      • Sample Rate
      • Configuration Changes
    • Unified SNMP Collector
      • User-Defined Metadata
      • Overview
      • Licensing
      • SNMP Poller
      • EF_PROCESSOR_SNMP_ENUM_DEFINITIONS_DIRECTORY_PATH
  • API Reference
    • API Reference Overview
    • SNMP Operations
  • Data Platforms
    • Elastic
      • Basic Cluster
      • Advanced Cluster
      • Single Server
      • Multi-Tier Cluster
      • Single "Lab" Server
      • Elasticsearch
      • ElastiFlow vs. Filebeat and Logstash
      • RHEL/CentOS
      • Ubuntu/Debian
      • Kibana
      • ML
        • Network Security
        • Machine Learning
        • Availability
          • Network Availability
          • DHCP
          • LDAP
          • DNS
          • NTP
          • RADIUS
          • TCP Sessions
        • Network Security Activity
          • Rare Autonomous System
          • Network Activity
          • Rare Conversation
          • Rare Geolocation
        • Network Security Brute Force
          • Brute Force CLI Access
          • Brute Force Remote Desktop Access
          • Brute Force Attacks
        • Network Security DDoS
          • Denial-of-Service
          • ICMP Flood Attack
          • SYN Flood Attack
          • TCP DDoS Attack
          • UDP Amplification Attack
        • Network Security Recon
          • ICMP Scan
          • Reconnaissance
          • Port Scan
        • Performance
          • Unusual ASN Traffic Volume
          • Unusual Network Interface Traffic Volume
          • Network Performance
    • Opensearch
      • Dashboards
      • Auth Sig V4
    • Splunk
      • Default Search Macro
      • Configuring Data Input & Index
      • Splunk App Installation
    • Output Configuration
  • Additional Guides
    • Catalyst (sFlow)
    • FortiGate
    • hsflowd
    • Configuring Flow Sampling on Juniper Routers
    • Junos OS (sFlow)
    • MikroTik RouterOS
    • OpenWRT (softflowd)
    • Ubiquiti EdgeRouter
    • SonicWall
    • Junos OS
    • Extending SNMP Device Support
    • Flow Device Support Overview
    • SNMP Device Support Overview
    • Generating A Support Bundle
  • FAQ
    • Flows stopped showing up in Kibana (Disk(s) Full)
    • Common reasons why you have discrepancies between ElastiFlow data & reality
    • What Are Snapshots?
    • Importing the wrong dashboards (No data)
  • Knowledge Base
    • Config
      • Elasticsearch Authentication Failure
      • CA Certificate Path Incorrect
      • license/error Invalid Segments
    • Flow
      • Bidirectional Flow Support
      • Configure the UDP Input
      • Flow Records Not Received
      • Netflow v9/IPFIX Template Not Receieved
      • Unsupported sFlow Structures
    • General
      • License Has Expired
      • License Agreement Not Accepted
    • Install
      • .deb Upgrade Fails File Overwrite
    • Operation
      • Flow Collector Queues 90% Full
      • Dashboard Updates
      • Change elastiflow-* Index Name?
  • Elastic Stack Deployment
  • Download Links
Powered by GitBook
On this page
  1. Data Platforms
  2. Elastic
  3. ML
  4. Availability

RADIUS

PreviousNTPNextTCP Sessions

The Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service. RADIUS is widely used by Internet Service Providers (ISPs) and enterprises to manage access to the internet, wireless networks, and other network services. The protocol enables a network service to send a user's credentials to a central RADIUS server, which then verifies those credentials and returns the information necessary to allow or deny access to the user. RADIUS is also used for managing user profiles, tracking usage, and ensuring secure network access control. This centralized approach simplifies network management and enhances security by allowing organizations to maintain user profiles in a single location.

RADIUS operates as a request/response protocol, particularly focusing on authentication and accounting requests. When a user attempts to connect to a network service, the service sends an AUTH request to the RADIUS server containing the user's credentials. The server then processes this request and sends back a response indicating whether the user is authorized to access the service. By analyzing the AUTH request and response messages across a network, network administrators can detect disruptions or anomalies in the RADIUS service. These analyses are crucial for identifying issues such as authentication failures, unauthorized access attempts, or server performance problems. Regular monitoring of these messages helps ensure the integrity and availability of the RADIUS service, which is essential for maintaining secure and efficient network operations.

Low RADIUS AUTH Request/Response Ratio

The Low RADIUS AUTH Request/Response Ratio anomaly detection job is tailored to monitor the frequency and ratio of AUTH request and response messages in the Remote Authentication Dial-In User Service (RADIUS) protocol. RADIUS is widely used for authentication, authorization, and accounting in network access scenarios. In a healthy network environment, there is a balanced and consistent exchange of AUTH requests from clients and corresponding AUTH responses from the RADIUS server.

An unusually low volume of RADIUS AUTH messages, or a significant discrepancy between the number of requests and responses, can indicate several types of issues:

  • RADIUS Server Performance Issues: A primary concern is the potential underperformance or failure of the RADIUS server. If the server is overwhelmed, malfunctioning, or incorrectly configured, it may not be able to process all incoming AUTH requests, leading to a lower number of responses. This can result in authentication delays or failures, impacting user access to network resources.

  • Network Connectivity or Configuration Problems: Issues in network connectivity can prevent AUTH requests from reaching the RADIUS server or block responses from reaching the clients. This could be due to misconfigured network devices (like routers or firewalls), failing network hardware, or disruptions in network infrastructure that affect the path of RADIUS traffic.

  • Security Threats: A low AUTH request/response ratio may also suggest potential security threats. For instance, a Denial of Service (DoS) attack targeting the RADIUS server could overwhelm it with a high volume of spurious requests, leading to legitimate requests being unanswered. Alternatively, network intrusions or unauthorized access attempts might disrupt normal RADIUS operations.

  • Client-Side Issues: Problems with client configurations or network access policies can lead to a decrease in AUTH requests. This might occur if a large number of clients are misconfigured, or if there are changes in access policies that inadvertently restrict or prevent clients from sending AUTH requests.

Attributes

Attribute
Information

Analysis

temporal

Downloads

Schema
Link

CODEX

ECS

elastiflow_codex_avail_radius_auth_resp_ratio_low
elastiflow_ecs_avail_radius_auth_resp_ratio_low