Realm: berkshire.nhs.uk Full

berkshire.nhs.uk/ORPS: berkshire-nhs-uk-0
berkshire.nhs.uk/berkshire-nhs-uk-0/NRPS: roaming0.govroam.uk (212.219.190.139) - Port 1812 Drop / Unknown Client / Bad Client Shared Secret /
berkshire.nhs.uk/berkshire-nhs-uk-0/roaming0.govroam.uk/ Ping
Output
PING OK - Packet loss = 0%, RTA = 9.06 ms
Last State Change
Thu May 15 06:36:45 2025
Last Check
Tue May 20 07:26:35 2025
Next Check
Tue May 20 07:36:35 2025
berkshire.nhs.uk/berkshire-nhs-uk-0/roaming0.govroam.uk/ RADIUS Port
Output
OK: Port 1812 is probably open, unless there's a DROP firewall
Last State Change
Thu May 15 06:33:41 2025
Last Check
Tue May 20 07:33:40 2025
Next Check
Tue May 20 07:43:40 2025
berkshire.nhs.uk/berkshire-nhs-uk-0/roaming0.govroam.uk/ Server Shared Secret
Output
OK: Good shared secret over last day
Last State Change
Thu May 15 06:32:46 2025
Last Check
Tue May 20 07:32:43 2025
Next Check
Tue May 20 07:42:43 2025
berkshire.nhs.uk/berkshire-nhs-uk-0/roaming0.govroam.uk/ Simple Authentication
Output
WARNING: Timeout. No response from RADIUS server
Last State Change
Thu May 15 06:37:30 2025
Last Check
Tue May 20 07:25:28 2025
Next Check
Tue May 20 07:35:28 2025
Meaning:
An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
Solution:
Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
berkshire.nhs.uk/berkshire-nhs-uk-0/roaming0.govroam.uk/ Zombie
Output
UNKNOWN: No Data. No data but not marked as down within the last week
Last State Change
Thu May 15 14:44:28 2025
Last Check
Tue May 20 07:34:26 2025
Next Check
Tue May 20 07:44:26 2025
berkshire.nhs.uk/berkshire-nhs-uk-0/NRPS: roaming1.govroam.uk (212.219.209.43) - Dropping Auth Requests / Port 1812 Drop / Unknown Client / Bad Client Shared Secret /
berkshire.nhs.uk/berkshire-nhs-uk-0/roaming1.govroam.uk/ Ping
Output
PING OK - Packet loss = 0%, RTA = 11.74 ms
Last State Change
Thu May 15 06:40:38 2025
Last Check
Tue May 20 07:30:27 2025
Next Check
Tue May 20 07:40:27 2025
berkshire.nhs.uk/berkshire-nhs-uk-0/roaming1.govroam.uk/ RADIUS Port
Output
OK: Port 1812 is probably open, unless there's a DROP firewall
Last State Change
Thu May 15 06:39:45 2025
Last Check
Tue May 20 07:29:43 2025
Next Check
Tue May 20 07:39:43 2025
berkshire.nhs.uk/berkshire-nhs-uk-0/roaming1.govroam.uk/ Server Shared Secret
Output
OK: Good shared secret over last day
Last State Change
Thu May 15 06:38:55 2025
Last Check
Tue May 20 07:28:54 2025
Next Check
Tue May 20 07:38:54 2025
berkshire.nhs.uk/berkshire-nhs-uk-0/roaming1.govroam.uk/ Simple Authentication
Output
WARNING: Timeout. No response from RADIUS server
Last State Change
Thu May 15 06:36:03 2025
Last Check
Tue May 20 07:34:03 2025
Next Check
Tue May 20 07:44:01 2025
Meaning:
An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
Solution:
Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
berkshire.nhs.uk/berkshire-nhs-uk-0/roaming1.govroam.uk/ Zombie
Output
CRITICAL: Marked as down within the last day
Last State Change
Mon May 19 11:45:06 2025
Last Check
Tue May 20 07:35:05 2025
Next Check
Tue May 20 07:45:05 2025
Meaning:
Over the last day, the ORPS has been marked as 'down' by the NRPS. A server is marked as 'down' (or a Zombie) if it doesn't respond to an authentication query within 30s. If the ORPS is serving a Federation then the chances are that one of the Federation members isn't responding to a proxied query. If the ORPS isn't serving a Federation then it's a problem with the local configuration.
Solution:
An independently connected site needs to fix the configuration to ensure that the ORPS is sending a response to ALL auth requests. A Federation Operator nedds to check their logs to determine which members aren't sending responses and help them correct their configuration.
berkshire.nhs.uk/berkshire-nhs-uk-0/NRPS: roaming2.govroam.uk (212.219.247.59) - Port 1812 Drop / Unknown Client / Bad Client Shared Secret /
berkshire.nhs.uk/berkshire-nhs-uk-0/roaming2.govroam.uk/ Ping
Output
PING OK - Packet loss = 0%, RTA = 14.19 ms
Last State Change
Thu May 15 06:36:50 2025
Last Check
Tue May 20 07:26:41 2025
Next Check
Tue May 20 07:36:41 2025
berkshire.nhs.uk/berkshire-nhs-uk-0/roaming2.govroam.uk/ RADIUS Port
Output
OK: Port 1812 is probably open, unless there's a DROP firewall
Last State Change
Thu May 15 06:40:05 2025
Last Check
Tue May 20 07:30:03 2025
Next Check
Tue May 20 07:40:03 2025
berkshire.nhs.uk/berkshire-nhs-uk-0/roaming2.govroam.uk/ Server Shared Secret
Output
OK: Good shared secret over last day
Last State Change
Thu May 15 06:36:59 2025
Last Check
Tue May 20 07:26:56 2025
Next Check
Tue May 20 07:36:56 2025
berkshire.nhs.uk/berkshire-nhs-uk-0/roaming2.govroam.uk/ Simple Authentication
Output
WARNING: Timeout. No response from RADIUS server
Last State Change
Thu May 15 06:37:44 2025
Last Check
Tue May 20 07:25:42 2025
Next Check
Tue May 20 07:35:42 2025
Meaning:
An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
Solution:
Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
berkshire.nhs.uk/berkshire-nhs-uk-0/roaming2.govroam.uk/ Zombie
Output
UNKNOWN: No Data. No data but not marked as down within the last week
Last State Change
Thu May 15 11:05:06 2025
Last Check
Tue May 20 07:35:05 2025
Next Check
Tue May 20 07:45:04 2025
berkshire.nhs.uk/berkshire-nhs-uk-0/NRPS: roaming3.govroam.uk (195.194.21.203) - Port 1812 Drop / Unknown Client / Bad Client Shared Secret /
berkshire.nhs.uk/berkshire-nhs-uk-0/roaming3.govroam.uk/ Ping
Output
PING OK - Packet loss = 0%, RTA = 16.32 ms
Last State Change
Thu May 15 06:37:06 2025
Last Check
Tue May 20 07:26:57 2025
Next Check
Tue May 20 07:36:56 2025
berkshire.nhs.uk/berkshire-nhs-uk-0/roaming3.govroam.uk/ RADIUS Port
Output
OK: Port 1812 is probably open, unless there's a DROP firewall
Last State Change
Thu May 15 06:36:52 2025
Last Check
Tue May 20 07:26:50 2025
Next Check
Tue May 20 07:36:50 2025
berkshire.nhs.uk/berkshire-nhs-uk-0/roaming3.govroam.uk/ Server Shared Secret
Output
OK: Good shared secret over last day
Last State Change
Thu May 15 06:38:29 2025
Last Check
Tue May 20 07:28:27 2025
Next Check
Tue May 20 07:38:27 2025
berkshire.nhs.uk/berkshire-nhs-uk-0/roaming3.govroam.uk/ Simple Authentication
Output
WARNING: Timeout. No response from RADIUS server
Last State Change
Thu May 15 06:39:14 2025
Last Check
Tue May 20 07:27:12 2025
Next Check
Tue May 20 07:37:12 2025
Meaning:
An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
Solution:
Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
berkshire.nhs.uk/berkshire-nhs-uk-0/roaming3.govroam.uk/ Zombie
Output
UNKNOWN: No Data. No data but not marked as down within the last week
Last State Change
Fri May 16 15:23:58 2025
Last Check
Tue May 20 07:33:58 2025
Next Check
Tue May 20 07:43:56 2025
berkshire.nhs.uk/ORPS: berkshire-nhs-uk-1
berkshire.nhs.uk/berkshire-nhs-uk-1/NRPS: roaming0.govroam.uk (212.219.190.139) - Port 1812 Drop / Unknown Client / Bad Client Shared Secret /
berkshire.nhs.uk/berkshire-nhs-uk-1/roaming0.govroam.uk/ Ping
Output
PING OK - Packet loss = 0%, RTA = 11.47 ms
Last State Change
Thu May 15 06:33:01 2025
Last Check
Tue May 20 07:32:52 2025
Next Check
Tue May 20 07:42:51 2025
berkshire.nhs.uk/berkshire-nhs-uk-1/roaming0.govroam.uk/ RADIUS Port
Output
OK: Port 1812 is probably open, unless there's a DROP firewall
Last State Change
Thu May 15 06:33:41 2025
Last Check
Tue May 20 07:33:40 2025
Next Check
Tue May 20 07:43:40 2025
berkshire.nhs.uk/berkshire-nhs-uk-1/roaming0.govroam.uk/ Server Shared Secret
Output
OK: Good shared secret over last day
Last State Change
Sun May 18 08:13:39 2025
Last Check
Tue May 20 07:33:37 2025
Next Check
Tue May 20 07:43:37 2025
berkshire.nhs.uk/berkshire-nhs-uk-1/roaming0.govroam.uk/ Simple Authentication
Output
WARNING: Timeout. No response from RADIUS server
Last State Change
Thu May 15 06:35:16 2025
Last Check
Tue May 20 07:33:15 2025
Next Check
Tue May 20 07:43:15 2025
Meaning:
An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
Solution:
Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
berkshire.nhs.uk/berkshire-nhs-uk-1/roaming0.govroam.uk/ Zombie
Output
UNKNOWN: No Data. No data but not marked as down within the last week
Last State Change
Thu May 15 06:33:32 2025
Last Check
Tue May 20 07:31:31 2025
Next Check
Tue May 20 07:41:30 2025
berkshire.nhs.uk/berkshire-nhs-uk-1/NRPS: roaming1.govroam.uk (212.219.209.43) - Dropping Auth Requests / Port 1812 Drop / Unknown Client / Bad Client Shared Secret /
berkshire.nhs.uk/berkshire-nhs-uk-1/roaming1.govroam.uk/ Ping
Output
PING OK - Packet loss = 0%, RTA = 8.90 ms
Last State Change
Thu May 15 06:36:10 2025
Last Check
Tue May 20 07:26:01 2025
Next Check
Tue May 20 07:36:00 2025
berkshire.nhs.uk/berkshire-nhs-uk-1/roaming1.govroam.uk/ RADIUS Port
Output
OK: Port 1812 is probably open, unless there's a DROP firewall
Last State Change
Thu May 15 06:37:32 2025
Last Check
Tue May 20 07:27:30 2025
Next Check
Tue May 20 07:37:30 2025
berkshire.nhs.uk/berkshire-nhs-uk-1/roaming1.govroam.uk/ Server Shared Secret
Output
OK: Good shared secret over last day
Last State Change
Sun May 18 08:13:45 2025
Last Check
Tue May 20 07:33:44 2025
Next Check
Tue May 20 07:43:44 2025
berkshire.nhs.uk/berkshire-nhs-uk-1/roaming1.govroam.uk/ Simple Authentication
Output
WARNING: Timeout. No response from RADIUS server
Last State Change
Thu May 15 06:39:36 2025
Last Check
Tue May 20 07:27:34 2025
Next Check
Tue May 20 07:37:34 2025
Meaning:
An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
Solution:
Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
berkshire.nhs.uk/berkshire-nhs-uk-1/roaming1.govroam.uk/ Zombie
Output
CRITICAL: Marked as down within the last day
Last State Change
Mon May 19 11:46:08 2025
Last Check
Tue May 20 07:26:07 2025
Next Check
Tue May 20 07:36:07 2025
Meaning:
Over the last day, the ORPS has been marked as 'down' by the NRPS. A server is marked as 'down' (or a Zombie) if it doesn't respond to an authentication query within 30s. If the ORPS is serving a Federation then the chances are that one of the Federation members isn't responding to a proxied query. If the ORPS isn't serving a Federation then it's a problem with the local configuration.
Solution:
An independently connected site needs to fix the configuration to ensure that the ORPS is sending a response to ALL auth requests. A Federation Operator nedds to check their logs to determine which members aren't sending responses and help them correct their configuration.
berkshire.nhs.uk/berkshire-nhs-uk-1/NRPS: roaming2.govroam.uk (212.219.247.59) - Dropping Auth Requests / Port 1812 Drop / Unknown Client / Bad Client Shared Secret /
berkshire.nhs.uk/berkshire-nhs-uk-1/roaming2.govroam.uk/ Ping
Output
PING OK - Packet loss = 0%, RTA = 14.76 ms
Last State Change
Thu May 15 06:38:28 2025
Last Check
Tue May 20 07:28:17 2025
Next Check
Tue May 20 07:38:17 2025
berkshire.nhs.uk/berkshire-nhs-uk-1/roaming2.govroam.uk/ RADIUS Port
Output
OK: Port 1812 is probably open, unless there's a DROP firewall
Last State Change
Thu May 15 06:36:37 2025
Last Check
Tue May 20 07:26:35 2025
Next Check
Tue May 20 07:36:35 2025
berkshire.nhs.uk/berkshire-nhs-uk-1/roaming2.govroam.uk/ Server Shared Secret
Output
OK: Good shared secret over last day
Last State Change
Sun May 18 08:16:17 2025
Last Check
Tue May 20 07:26:15 2025
Next Check
Tue May 20 07:36:15 2025
berkshire.nhs.uk/berkshire-nhs-uk-1/roaming2.govroam.uk/ Simple Authentication
Output
WARNING: Timeout. No response from RADIUS server
Last State Change
Thu May 15 06:39:16 2025
Last Check
Tue May 20 07:27:15 2025
Next Check
Tue May 20 07:37:15 2025
Meaning:
An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
Solution:
Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
berkshire.nhs.uk/berkshire-nhs-uk-1/roaming2.govroam.uk/ Zombie
Output
CRITICAL: Marked as down within the last day
Last State Change
Mon May 19 09:27:31 2025
Last Check
Tue May 20 07:27:29 2025
Next Check
Tue May 20 07:37:29 2025
Meaning:
Over the last day, the ORPS has been marked as 'down' by the NRPS. A server is marked as 'down' (or a Zombie) if it doesn't respond to an authentication query within 30s. If the ORPS is serving a Federation then the chances are that one of the Federation members isn't responding to a proxied query. If the ORPS isn't serving a Federation then it's a problem with the local configuration.
Solution:
An independently connected site needs to fix the configuration to ensure that the ORPS is sending a response to ALL auth requests. A Federation Operator nedds to check their logs to determine which members aren't sending responses and help them correct their configuration.
berkshire.nhs.uk/berkshire-nhs-uk-1/NRPS: roaming3.govroam.uk (195.194.21.203) - Port 1812 Drop / Unknown Client / Bad Client Shared Secret /
berkshire.nhs.uk/berkshire-nhs-uk-1/roaming3.govroam.uk/ Ping
Output
PING OK - Packet loss = 0%, RTA = 15.53 ms
Last State Change
Thu May 15 06:36:36 2025
Last Check
Tue May 20 07:26:26 2025
Next Check
Tue May 20 07:36:26 2025
berkshire.nhs.uk/berkshire-nhs-uk-1/roaming3.govroam.uk/ RADIUS Port
Output
OK: Port 1812 is probably open, unless there's a DROP firewall
Last State Change
Thu May 15 06:39:29 2025
Last Check
Tue May 20 07:29:27 2025
Next Check
Tue May 20 07:39:27 2025
berkshire.nhs.uk/berkshire-nhs-uk-1/roaming3.govroam.uk/ Server Shared Secret
Output
OK: Good shared secret over last day
Last State Change
Sun May 18 08:15:16 2025
Last Check
Tue May 20 07:35:14 2025
Next Check
Tue May 20 07:45:14 2025
berkshire.nhs.uk/berkshire-nhs-uk-1/roaming3.govroam.uk/ Simple Authentication
Output
WARNING: Timeout. No response from RADIUS server
Last State Change
Thu May 15 06:37:29 2025
Last Check
Tue May 20 07:25:27 2025
Next Check
Tue May 20 07:35:27 2025
Meaning:
An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
Solution:
Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
berkshire.nhs.uk/berkshire-nhs-uk-1/roaming3.govroam.uk/ Zombie
Output
UNKNOWN: No Data. No data but not marked as down within the last week
Last State Change
Thu May 15 06:40:18 2025
Last Check
Tue May 20 07:28:16 2025
Next Check
Tue May 20 07:38:16 2025
Called Station ID Check
Output
OK: 100% MAC format and SSID are good (last: 2025-05-20 05:53:34)
Last State Change
Tue May 6 06:10:33 2025
Last Check
Tue May 20 07:25:33 2025
Next Check
Tue May 20 07:40:31 2025
Calling Station ID Check
Output
OK: 100% MAC format is good, as of 2025-05-20 05:53:34
Last State Change
Tue May 6 06:11:27 2025
Last Check
Tue May 20 07:26:23 2025
Next Check
Tue May 20 07:41:22 2025
Operator Check
Output
WARNING: 100% Missing Operator-Name (last: 2025-05-20 05:53:34)
Last State Change
Tue May 6 06:12:17 2025
Last Check
Tue May 20 07:22:16 2025
Next Check
Tue May 20 07:37:15 2025
Meaning:
Operator-Name is missing from RADIUS requests. Operator-Name identifies the site sending the requests and is used by home sites in audit trails and in cases of mis-use.
Solution:
Where possible (FreeRADIUS, radsecproxy, RADIATOR) Operator-Name should be configured to send the site identifier (in the format 1realm.name e.g. 1holby.nhs.uk).
Realm Syntax Check
Output
CRITICAL: 8.8% Realm same as Operator (last: 2025-05-19 16:27:51)
Last State Change
Wed May 7 15:37:40 2025
Last Check
Tue May 20 07:22:38 2025
Next Check
Tue May 20 07:37:36 2025
Meaning:
The syntax of a realm proxied does not match what's acceptable. A realm should be in the format of 'realm.tld' or 'something.site.tld' and shouldn't have '..' or start or end with '.', shouldn't contain characters other than '0-9a-zA-Z-.', shouldn't be empty or missing. Since these realms are entered by end-users typos are possible. Obviously the NRPS should never see the site's own realm proxied as that could cause loops.
Solution:
Filter out syntactically invalid realms, don't proxy them.
VLAN Check
Output
OK: 100% No VLAN attr present (last: 2025-05-20 05:53:34)
Last State Change
Tue May 6 06:07:57 2025
Last Check
Tue May 20 07:22:57 2025
Next Check
Tue May 20 07:37:56 2025