Realm: clch.nhs.uk Full
clch.nhs.uk/clch-nhs-uk-2/NRPS: roaming0.govroam.uk
(212.219.190.139) -
No Route
/
Host Down
/
Config pending
/
IPS firewall
/
clch.nhs.uk/clch-nhs-uk-2/roaming0.govroam.uk/
Ping
- Output
- PING CRITICAL - Packet loss = 100%
- Last State Change
- Sat Apr 11 08:47:31 2026
- Last Check
- Mon Apr 13 08:34:29 2026
- Next Check
- Mon Apr 13 08:44:29 2026
- Meaning:
- A failed Ping test means that ICMP packets are either not getting to the server, or the responses aren't getting back.
- Solution:
- Check your firewall logs to see if the packets are arriving. If not, check your routing. If they are, then check to see if they're being DROPed or REJECTed. If you're confident that a response is being sent then please let Jisc know at govroam@jisc.ac.uk
clch.nhs.uk/clch-nhs-uk-2/roaming0.govroam.uk/
RADIUS Port
- Output
- CRITICAL: No response. Host down or firewall dropping new connections
- Last State Change
- Tue Apr 7 07:26:37 2026
- Last Check
- Mon Apr 13 08:34:34 2026
- Next Check
- Mon Apr 13 08:44:34 2026
- Meaning:
- A simple port scan of port 1812/udp was attempted and there was no response from the port. This implies that either the port is not open i.e. there isn't a daemon running on it, or that there is a firewall configured to not to respond to such scans. Dropping such packets isn't a problem as long as the server is able to respond to RADIUS auth requests.
- Solution:
- Check the state of the RADIUS daemon and ensure that it's up and running on port 1812/udp. If it is, then check your firewall(s) to see if they're configured to drop incoming connections.
clch.nhs.uk/clch-nhs-uk-2/roaming0.govroam.uk/
Server Shared Secret
- Output
- UNKNOWN: No Data. No logs to check for last day
- Last State Change
- Tue Apr 7 07:28:25 2026
- Last Check
- Mon Apr 13 08:36:23 2026
- Next Check
- Mon Apr 13 08:46:23 2026
clch.nhs.uk/clch-nhs-uk-2/roaming0.govroam.uk/
Simple Authentication
- Output
- WARNING: Timeout. No response from RADIUS server
- Last State Change
- Tue Apr 7 07:26:18 2026
- Last Check
- Mon Apr 13 08:34:14 2026
- Next Check
- Mon Apr 13 08:44:14 2026
- Meaning:
- An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
- Solution:
- Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
clch.nhs.uk/clch-nhs-uk-2/roaming0.govroam.uk/
Zombie
- Output
- UNKNOWN: No Data. No data but not marked as down within the last week
- Last State Change
- Tue Apr 7 07:26:19 2026
- Last Check
- Mon Apr 13 08:34:17 2026
- Next Check
- Mon Apr 13 08:44:17 2026
Sites
clch.nhs.uk/clch-nhs-uk-2/roaming0.govroam.uk/Sites/ riverside.nhs.uk
Misconfigured Site IdP
/
Misconfigured ORPS proxy
/
Unfiltered Attributes
/
Misconfigured RRPS proxy
/
clch.nhs.uk/clch-nhs-uk-2/roaming0.govroam.uk/Sites/riverside.nhs.uk/
Certificate in Realm riverside.nhs.uk
- Output
- UNKNOWN: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:26:28 2026
- Last Check
- Mon Apr 13 08:34:16 2026
- Next Check
- Mon Apr 13 08:44:16 2026
clch.nhs.uk/clch-nhs-uk-2/roaming0.govroam.uk/Sites/riverside.nhs.uk/
Tunnel Type in Realm riverside.nhs.uk
- Output
- CRITICAL: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:27:52 2026
- Last Check
- Mon Apr 13 08:35:47 2026
- Next Check
- Mon Apr 13 08:45:47 2026
- Meaning:
- No response was sent to the authentication request. The impact of this can be quite serious. The NRPS will mark this server as down for five minutes when it doesn't receive a response within 30s. If this is an RRPS for a Federation then that could knock out the service for all encompassed sites. So it's important for all RRPS and ORPS to always respond to an auth request.
- Solution:
- Reponses must be sent to all EAP requests.
clch.nhs.uk/clch-nhs-uk-2/roaming0.govroam.uk/Sites/riverside.nhs.uk/
User in Realm riverside.nhs.uk
- Output
- CRITICAL: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:25:53 2026
- Last Check
- Mon Apr 13 08:33:49 2026
- Next Check
- Mon Apr 13 08:43:49 2026
- Meaning:
- An authentication attempt was made using supplied credentials that should have been proxied to the appropriate site but there was no response. It's part of the Tech Spec that all proxied requests MUST receive a response. There are be serious consequences if sites silently drop authentication requests: RADIUS servers will mark servers down that fail to respond, ultimately disabling the entire site.
- Solution:
- Ensure that there is a working proxy path from your RRPS through to the appropriate site's IdP and that the IdP always responds to an authentication attempt.
clch.nhs.uk/clch-nhs-uk-2/NRPS: roaming1.govroam.uk
(212.219.209.43) -
No Route
/
Host Down
/
Config pending
/
IPS firewall
/
clch.nhs.uk/clch-nhs-uk-2/roaming1.govroam.uk/
Ping
- Output
- PING CRITICAL - Packet loss = 100%
- Last State Change
- Tue Apr 7 07:24:16 2026
- Last Check
- Mon Apr 13 08:31:16 2026
- Next Check
- Mon Apr 13 08:41:15 2026
- Meaning:
- A failed Ping test means that ICMP packets are either not getting to the server, or the responses aren't getting back.
- Solution:
- Check your firewall logs to see if the packets are arriving. If not, check your routing. If they are, then check to see if they're being DROPed or REJECTed. If you're confident that a response is being sent then please let Jisc know at govroam@jisc.ac.uk
clch.nhs.uk/clch-nhs-uk-2/roaming1.govroam.uk/
RADIUS Port
- Output
- CRITICAL: No response. Host down or firewall dropping new connections
- Last State Change
- Tue Apr 7 07:25:28 2026
- Last Check
- Mon Apr 13 08:33:23 2026
- Next Check
- Mon Apr 13 08:43:23 2026
- Meaning:
- A simple port scan of port 1812/udp was attempted and there was no response from the port. This implies that either the port is not open i.e. there isn't a daemon running on it, or that there is a firewall configured to not to respond to such scans. Dropping such packets isn't a problem as long as the server is able to respond to RADIUS auth requests.
- Solution:
- Check the state of the RADIUS daemon and ensure that it's up and running on port 1812/udp. If it is, then check your firewall(s) to see if they're configured to drop incoming connections.
clch.nhs.uk/clch-nhs-uk-2/roaming1.govroam.uk/
Server Shared Secret
- Output
- UNKNOWN: No Data. No logs to check for last day
- Last State Change
- Tue Apr 7 07:26:10 2026
- Last Check
- Mon Apr 13 08:34:08 2026
- Next Check
- Mon Apr 13 08:44:08 2026
clch.nhs.uk/clch-nhs-uk-2/roaming1.govroam.uk/
Simple Authentication
- Output
- WARNING: Timeout. No response from RADIUS server
- Last State Change
- Tue Apr 7 07:26:22 2026
- Last Check
- Mon Apr 13 08:34:18 2026
- Next Check
- Mon Apr 13 08:44:18 2026
- Meaning:
- An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
- Solution:
- Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
clch.nhs.uk/clch-nhs-uk-2/roaming1.govroam.uk/
Zombie
- Output
- UNKNOWN: No Data. No data but not marked as down within the last week
- Last State Change
- Tue Apr 7 07:25:11 2026
- Last Check
- Mon Apr 13 08:33:10 2026
- Next Check
- Mon Apr 13 08:43:10 2026
Sites
clch.nhs.uk/clch-nhs-uk-2/roaming1.govroam.uk/Sites/ riverside.nhs.uk
Misconfigured Site IdP
/
Misconfigured ORPS proxy
/
Unfiltered Attributes
/
Misconfigured RRPS proxy
/
clch.nhs.uk/clch-nhs-uk-2/roaming1.govroam.uk/Sites/riverside.nhs.uk/
Certificate in Realm riverside.nhs.uk
- Output
- UNKNOWN: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:25:51 2026
- Last Check
- Mon Apr 13 08:33:39 2026
- Next Check
- Mon Apr 13 08:43:39 2026
clch.nhs.uk/clch-nhs-uk-2/roaming1.govroam.uk/Sites/riverside.nhs.uk/
Tunnel Type in Realm riverside.nhs.uk
- Output
- CRITICAL: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:25:41 2026
- Last Check
- Mon Apr 13 08:33:36 2026
- Next Check
- Mon Apr 13 08:43:36 2026
- Meaning:
- No response was sent to the authentication request. The impact of this can be quite serious. The NRPS will mark this server as down for five minutes when it doesn't receive a response within 30s. If this is an RRPS for a Federation then that could knock out the service for all encompassed sites. So it's important for all RRPS and ORPS to always respond to an auth request.
- Solution:
- Reponses must be sent to all EAP requests.
clch.nhs.uk/clch-nhs-uk-2/roaming1.govroam.uk/Sites/riverside.nhs.uk/
User in Realm riverside.nhs.uk
- Output
- CRITICAL: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:24:09 2026
- Last Check
- Mon Apr 13 08:32:04 2026
- Next Check
- Mon Apr 13 08:42:04 2026
- Meaning:
- An authentication attempt was made using supplied credentials that should have been proxied to the appropriate site but there was no response. It's part of the Tech Spec that all proxied requests MUST receive a response. There are be serious consequences if sites silently drop authentication requests: RADIUS servers will mark servers down that fail to respond, ultimately disabling the entire site.
- Solution:
- Ensure that there is a working proxy path from your RRPS through to the appropriate site's IdP and that the IdP always responds to an authentication attempt.
clch.nhs.uk/clch-nhs-uk-2/NRPS: roaming2.govroam.uk
(212.219.247.59) -
No Route
/
Host Down
/
Config pending
/
IPS firewall
/
clch.nhs.uk/clch-nhs-uk-2/roaming2.govroam.uk/
Ping
- Output
- PING CRITICAL - Packet loss = 100%
- Last State Change
- Tue Apr 7 07:18:31 2026
- Last Check
- Mon Apr 13 08:35:30 2026
- Next Check
- Mon Apr 13 08:45:30 2026
- Meaning:
- A failed Ping test means that ICMP packets are either not getting to the server, or the responses aren't getting back.
- Solution:
- Check your firewall logs to see if the packets are arriving. If not, check your routing. If they are, then check to see if they're being DROPed or REJECTed. If you're confident that a response is being sent then please let Jisc know at govroam@jisc.ac.uk
clch.nhs.uk/clch-nhs-uk-2/roaming2.govroam.uk/
RADIUS Port
- Output
- CRITICAL: No response. Host down or firewall dropping new connections
- Last State Change
- Tue Apr 7 07:17:39 2026
- Last Check
- Mon Apr 13 08:35:34 2026
- Next Check
- Mon Apr 13 08:45:34 2026
- Meaning:
- A simple port scan of port 1812/udp was attempted and there was no response from the port. This implies that either the port is not open i.e. there isn't a daemon running on it, or that there is a firewall configured to not to respond to such scans. Dropping such packets isn't a problem as long as the server is able to respond to RADIUS auth requests.
- Solution:
- Check the state of the RADIUS daemon and ensure that it's up and running on port 1812/udp. If it is, then check your firewall(s) to see if they're configured to drop incoming connections.
clch.nhs.uk/clch-nhs-uk-2/roaming2.govroam.uk/
Server Shared Secret
- Output
- UNKNOWN: No Data. No logs to check for last day
- Last State Change
- Tue Apr 7 07:19:29 2026
- Last Check
- Mon Apr 13 08:37:27 2026
- Next Check
- Mon Apr 13 08:47:27 2026
clch.nhs.uk/clch-nhs-uk-2/roaming2.govroam.uk/
Simple Authentication
- Output
- WARNING: Timeout. No response from RADIUS server
- Last State Change
- Tue Apr 7 07:17:29 2026
- Last Check
- Mon Apr 13 08:35:26 2026
- Next Check
- Mon Apr 13 08:45:26 2026
- Meaning:
- An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
- Solution:
- Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
clch.nhs.uk/clch-nhs-uk-2/roaming2.govroam.uk/
Zombie
- Output
- UNKNOWN: No Data. No data but not marked as down within the last week
- Last State Change
- Tue Apr 7 07:19:40 2026
- Last Check
- Mon Apr 13 08:37:39 2026
- Next Check
- Mon Apr 13 08:47:38 2026
Sites
clch.nhs.uk/clch-nhs-uk-2/roaming2.govroam.uk/Sites/ riverside.nhs.uk
Misconfigured Site IdP
/
Misconfigured ORPS proxy
/
Unfiltered Attributes
/
Misconfigured RRPS proxy
/
clch.nhs.uk/clch-nhs-uk-2/roaming2.govroam.uk/Sites/riverside.nhs.uk/
Certificate in Realm riverside.nhs.uk
- Output
- UNKNOWN: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:18:49 2026
- Last Check
- Mon Apr 13 08:36:37 2026
- Next Check
- Mon Apr 13 08:46:37 2026
clch.nhs.uk/clch-nhs-uk-2/roaming2.govroam.uk/Sites/riverside.nhs.uk/
Tunnel Type in Realm riverside.nhs.uk
- Output
- CRITICAL: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:21:15 2026
- Last Check
- Mon Apr 13 08:29:10 2026
- Next Check
- Mon Apr 13 08:39:10 2026
- Meaning:
- No response was sent to the authentication request. The impact of this can be quite serious. The NRPS will mark this server as down for five minutes when it doesn't receive a response within 30s. If this is an RRPS for a Federation then that could knock out the service for all encompassed sites. So it's important for all RRPS and ORPS to always respond to an auth request.
- Solution:
- Reponses must be sent to all EAP requests.
clch.nhs.uk/clch-nhs-uk-2/roaming2.govroam.uk/Sites/riverside.nhs.uk/
User in Realm riverside.nhs.uk
- Output
- CRITICAL: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:19:12 2026
- Last Check
- Mon Apr 13 08:37:08 2026
- Next Check
- Mon Apr 13 08:47:08 2026
- Meaning:
- An authentication attempt was made using supplied credentials that should have been proxied to the appropriate site but there was no response. It's part of the Tech Spec that all proxied requests MUST receive a response. There are be serious consequences if sites silently drop authentication requests: RADIUS servers will mark servers down that fail to respond, ultimately disabling the entire site.
- Solution:
- Ensure that there is a working proxy path from your RRPS through to the appropriate site's IdP and that the IdP always responds to an authentication attempt.
clch.nhs.uk/clch-nhs-uk-2/NRPS: roaming3.govroam.uk
(195.194.21.203) -
No Route
/
Host Down
/
Config pending
/
IPS firewall
/
clch.nhs.uk/clch-nhs-uk-2/roaming3.govroam.uk/
Ping
- Output
- PING CRITICAL - Packet loss = 100%
- Last State Change
- Tue Apr 7 07:16:59 2026
- Last Check
- Mon Apr 13 08:33:58 2026
- Next Check
- Mon Apr 13 08:43:58 2026
- Meaning:
- A failed Ping test means that ICMP packets are either not getting to the server, or the responses aren't getting back.
- Solution:
- Check your firewall logs to see if the packets are arriving. If not, check your routing. If they are, then check to see if they're being DROPed or REJECTed. If you're confident that a response is being sent then please let Jisc know at govroam@jisc.ac.uk
clch.nhs.uk/clch-nhs-uk-2/roaming3.govroam.uk/
RADIUS Port
- Output
- CRITICAL: No response. Host down or firewall dropping new connections
- Last State Change
- Tue Apr 7 07:19:42 2026
- Last Check
- Mon Apr 13 08:37:37 2026
- Next Check
- Mon Apr 13 08:47:37 2026
- Meaning:
- A simple port scan of port 1812/udp was attempted and there was no response from the port. This implies that either the port is not open i.e. there isn't a daemon running on it, or that there is a firewall configured to not to respond to such scans. Dropping such packets isn't a problem as long as the server is able to respond to RADIUS auth requests.
- Solution:
- Check the state of the RADIUS daemon and ensure that it's up and running on port 1812/udp. If it is, then check your firewall(s) to see if they're configured to drop incoming connections.
clch.nhs.uk/clch-nhs-uk-2/roaming3.govroam.uk/
Server Shared Secret
- Output
- UNKNOWN: No Data. No logs to check for last day
- Last State Change
- Tue Apr 7 07:19:11 2026
- Last Check
- Mon Apr 13 08:37:09 2026
- Next Check
- Mon Apr 13 08:47:09 2026
clch.nhs.uk/clch-nhs-uk-2/roaming3.govroam.uk/
Simple Authentication
- Output
- WARNING: Timeout. No response from RADIUS server
- Last State Change
- Tue Apr 7 07:14:49 2026
- Last Check
- Mon Apr 13 08:32:46 2026
- Next Check
- Mon Apr 13 08:42:46 2026
- Meaning:
- An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
- Solution:
- Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
clch.nhs.uk/clch-nhs-uk-2/roaming3.govroam.uk/
Zombie
- Output
- UNKNOWN: No Data. No data but not marked as down within the last week
- Last State Change
- Tue Apr 7 07:15:56 2026
- Last Check
- Mon Apr 13 08:33:54 2026
- Next Check
- Mon Apr 13 08:43:54 2026
Sites
clch.nhs.uk/clch-nhs-uk-2/roaming3.govroam.uk/Sites/ riverside.nhs.uk
Misconfigured Site IdP
/
Misconfigured ORPS proxy
/
Unfiltered Attributes
/
Misconfigured RRPS proxy
/
clch.nhs.uk/clch-nhs-uk-2/roaming3.govroam.uk/Sites/riverside.nhs.uk/
Certificate in Realm riverside.nhs.uk
- Output
- UNKNOWN: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:16:14 2026
- Last Check
- Mon Apr 13 08:34:02 2026
- Next Check
- Mon Apr 13 08:44:02 2026
clch.nhs.uk/clch-nhs-uk-2/roaming3.govroam.uk/Sites/riverside.nhs.uk/
Tunnel Type in Realm riverside.nhs.uk
- Output
- CRITICAL: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:16:22 2026
- Last Check
- Mon Apr 13 08:34:17 2026
- Next Check
- Mon Apr 13 08:44:17 2026
- Meaning:
- No response was sent to the authentication request. The impact of this can be quite serious. The NRPS will mark this server as down for five minutes when it doesn't receive a response within 30s. If this is an RRPS for a Federation then that could knock out the service for all encompassed sites. So it's important for all RRPS and ORPS to always respond to an auth request.
- Solution:
- Reponses must be sent to all EAP requests.
clch.nhs.uk/clch-nhs-uk-2/roaming3.govroam.uk/Sites/riverside.nhs.uk/
User in Realm riverside.nhs.uk
- Output
- CRITICAL: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:16:29 2026
- Last Check
- Mon Apr 13 08:34:26 2026
- Next Check
- Mon Apr 13 08:44:25 2026
- Meaning:
- An authentication attempt was made using supplied credentials that should have been proxied to the appropriate site but there was no response. It's part of the Tech Spec that all proxied requests MUST receive a response. There are be serious consequences if sites silently drop authentication requests: RADIUS servers will mark servers down that fail to respond, ultimately disabling the entire site.
- Solution:
- Ensure that there is a working proxy path from your RRPS through to the appropriate site's IdP and that the IdP always responds to an authentication attempt.
clch.nhs.uk/clch-nhs-uk-3/NRPS: roaming0.govroam.uk
(212.219.190.139) -
No Route
/
Host Down
/
Config pending
/
IPS firewall
/
clch.nhs.uk/clch-nhs-uk-3/roaming0.govroam.uk/
Ping
- Output
- PING CRITICAL - Packet loss = 100%
- Last State Change
- Tue Apr 7 07:31:18 2026
- Last Check
- Mon Apr 13 08:28:17 2026
- Next Check
- Mon Apr 13 08:38:17 2026
- Meaning:
- A failed Ping test means that ICMP packets are either not getting to the server, or the responses aren't getting back.
- Solution:
- Check your firewall logs to see if the packets are arriving. If not, check your routing. If they are, then check to see if they're being DROPed or REJECTed. If you're confident that a response is being sent then please let Jisc know at govroam@jisc.ac.uk
clch.nhs.uk/clch-nhs-uk-3/roaming0.govroam.uk/
RADIUS Port
- Output
- CRITICAL: No response. Host down or firewall dropping new connections
- Last State Change
- Tue Apr 7 07:29:17 2026
- Last Check
- Mon Apr 13 08:37:13 2026
- Next Check
- Mon Apr 13 08:47:13 2026
- Meaning:
- A simple port scan of port 1812/udp was attempted and there was no response from the port. This implies that either the port is not open i.e. there isn't a daemon running on it, or that there is a firewall configured to not to respond to such scans. Dropping such packets isn't a problem as long as the server is able to respond to RADIUS auth requests.
- Solution:
- Check the state of the RADIUS daemon and ensure that it's up and running on port 1812/udp. If it is, then check your firewall(s) to see if they're configured to drop incoming connections.
clch.nhs.uk/clch-nhs-uk-3/roaming0.govroam.uk/
Server Shared Secret
- Output
- UNKNOWN: No Data. No logs to check for last day
- Last State Change
- Tue Apr 7 07:28:12 2026
- Last Check
- Mon Apr 13 08:36:10 2026
- Next Check
- Mon Apr 13 08:46:10 2026
clch.nhs.uk/clch-nhs-uk-3/roaming0.govroam.uk/
Simple Authentication
- Output
- WARNING: Timeout. No response from RADIUS server
- Last State Change
- Tue Apr 7 07:29:19 2026
- Last Check
- Mon Apr 13 08:37:16 2026
- Next Check
- Mon Apr 13 08:47:16 2026
- Meaning:
- An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
- Solution:
- Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
clch.nhs.uk/clch-nhs-uk-3/roaming0.govroam.uk/
Zombie
- Output
- UNKNOWN: No Data. No data but not marked as down within the last week
- Last State Change
- Tue Apr 7 07:27:16 2026
- Last Check
- Mon Apr 13 08:35:14 2026
- Next Check
- Mon Apr 13 08:45:14 2026
Sites
clch.nhs.uk/clch-nhs-uk-3/roaming0.govroam.uk/Sites/ riverside.nhs.uk
Misconfigured Site IdP
/
Misconfigured ORPS proxy
/
Unfiltered Attributes
/
Misconfigured RRPS proxy
/
clch.nhs.uk/clch-nhs-uk-3/roaming0.govroam.uk/Sites/riverside.nhs.uk/
Certificate in Realm riverside.nhs.uk
- Output
- UNKNOWN: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:26:01 2026
- Last Check
- Mon Apr 13 08:33:50 2026
- Next Check
- Mon Apr 13 08:43:50 2026
clch.nhs.uk/clch-nhs-uk-3/roaming0.govroam.uk/Sites/riverside.nhs.uk/
Tunnel Type in Realm riverside.nhs.uk
- Output
- CRITICAL: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:27:43 2026
- Last Check
- Mon Apr 13 08:35:38 2026
- Next Check
- Mon Apr 13 08:45:38 2026
- Meaning:
- No response was sent to the authentication request. The impact of this can be quite serious. The NRPS will mark this server as down for five minutes when it doesn't receive a response within 30s. If this is an RRPS for a Federation then that could knock out the service for all encompassed sites. So it's important for all RRPS and ORPS to always respond to an auth request.
- Solution:
- Reponses must be sent to all EAP requests.
clch.nhs.uk/clch-nhs-uk-3/roaming0.govroam.uk/Sites/riverside.nhs.uk/
User in Realm riverside.nhs.uk
- Output
- CRITICAL: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:28:04 2026
- Last Check
- Mon Apr 13 08:35:59 2026
- Next Check
- Mon Apr 13 08:45:59 2026
- Meaning:
- An authentication attempt was made using supplied credentials that should have been proxied to the appropriate site but there was no response. It's part of the Tech Spec that all proxied requests MUST receive a response. There are be serious consequences if sites silently drop authentication requests: RADIUS servers will mark servers down that fail to respond, ultimately disabling the entire site.
- Solution:
- Ensure that there is a working proxy path from your RRPS through to the appropriate site's IdP and that the IdP always responds to an authentication attempt.
clch.nhs.uk/clch-nhs-uk-3/NRPS: roaming1.govroam.uk
(212.219.209.43) -
No Route
/
Host Down
/
Config pending
/
IPS firewall
/
clch.nhs.uk/clch-nhs-uk-3/roaming1.govroam.uk/
Ping
- Output
- PING CRITICAL - Packet loss = 100%
- Last State Change
- Fri Apr 10 09:22:38 2026
- Last Check
- Mon Apr 13 08:29:38 2026
- Next Check
- Mon Apr 13 08:39:36 2026
- Meaning:
- A failed Ping test means that ICMP packets are either not getting to the server, or the responses aren't getting back.
- Solution:
- Check your firewall logs to see if the packets are arriving. If not, check your routing. If they are, then check to see if they're being DROPed or REJECTed. If you're confident that a response is being sent then please let Jisc know at govroam@jisc.ac.uk
clch.nhs.uk/clch-nhs-uk-3/roaming1.govroam.uk/
RADIUS Port
- Output
- CRITICAL: No response. Host down or firewall dropping new connections
- Last State Change
- Tue Apr 7 07:26:01 2026
- Last Check
- Mon Apr 13 08:33:57 2026
- Next Check
- Mon Apr 13 08:43:57 2026
- Meaning:
- A simple port scan of port 1812/udp was attempted and there was no response from the port. This implies that either the port is not open i.e. there isn't a daemon running on it, or that there is a firewall configured to not to respond to such scans. Dropping such packets isn't a problem as long as the server is able to respond to RADIUS auth requests.
- Solution:
- Check the state of the RADIUS daemon and ensure that it's up and running on port 1812/udp. If it is, then check your firewall(s) to see if they're configured to drop incoming connections.
clch.nhs.uk/clch-nhs-uk-3/roaming1.govroam.uk/
Server Shared Secret
- Output
- UNKNOWN: No Data. No logs to check for last day
- Last State Change
- Tue Apr 7 07:22:28 2026
- Last Check
- Mon Apr 13 08:30:25 2026
- Next Check
- Mon Apr 13 08:40:25 2026
clch.nhs.uk/clch-nhs-uk-3/roaming1.govroam.uk/
Simple Authentication
- Output
- WARNING: Timeout. No response from RADIUS server
- Last State Change
- Tue Apr 7 07:27:25 2026
- Last Check
- Mon Apr 13 08:35:21 2026
- Next Check
- Mon Apr 13 08:45:21 2026
- Meaning:
- An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
- Solution:
- Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
clch.nhs.uk/clch-nhs-uk-3/roaming1.govroam.uk/
Zombie
- Output
- UNKNOWN: No Data. No data but not marked as down within the last week
- Last State Change
- Tue Apr 7 07:22:33 2026
- Last Check
- Mon Apr 13 08:30:31 2026
- Next Check
- Mon Apr 13 08:40:31 2026
Sites
clch.nhs.uk/clch-nhs-uk-3/roaming1.govroam.uk/Sites/ riverside.nhs.uk
Misconfigured Site IdP
/
Misconfigured ORPS proxy
/
Unfiltered Attributes
/
Misconfigured RRPS proxy
/
clch.nhs.uk/clch-nhs-uk-3/roaming1.govroam.uk/Sites/riverside.nhs.uk/
Certificate in Realm riverside.nhs.uk
- Output
- UNKNOWN: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:22:40 2026
- Last Check
- Mon Apr 13 08:30:30 2026
- Next Check
- Mon Apr 13 08:40:29 2026
clch.nhs.uk/clch-nhs-uk-3/roaming1.govroam.uk/Sites/riverside.nhs.uk/
Tunnel Type in Realm riverside.nhs.uk
- Output
- CRITICAL: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:22:42 2026
- Last Check
- Mon Apr 13 08:30:38 2026
- Next Check
- Mon Apr 13 08:40:38 2026
- Meaning:
- No response was sent to the authentication request. The impact of this can be quite serious. The NRPS will mark this server as down for five minutes when it doesn't receive a response within 30s. If this is an RRPS for a Federation then that could knock out the service for all encompassed sites. So it's important for all RRPS and ORPS to always respond to an auth request.
- Solution:
- Reponses must be sent to all EAP requests.
clch.nhs.uk/clch-nhs-uk-3/roaming1.govroam.uk/Sites/riverside.nhs.uk/
User in Realm riverside.nhs.uk
- Output
- CRITICAL: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:25:00 2026
- Last Check
- Mon Apr 13 08:32:56 2026
- Next Check
- Mon Apr 13 08:42:56 2026
- Meaning:
- An authentication attempt was made using supplied credentials that should have been proxied to the appropriate site but there was no response. It's part of the Tech Spec that all proxied requests MUST receive a response. There are be serious consequences if sites silently drop authentication requests: RADIUS servers will mark servers down that fail to respond, ultimately disabling the entire site.
- Solution:
- Ensure that there is a working proxy path from your RRPS through to the appropriate site's IdP and that the IdP always responds to an authentication attempt.
clch.nhs.uk/clch-nhs-uk-3/NRPS: roaming2.govroam.uk
(212.219.247.59) -
No Route
/
Host Down
/
Config pending
/
IPS firewall
/
clch.nhs.uk/clch-nhs-uk-3/roaming2.govroam.uk/
Ping
- Output
- PING CRITICAL - Packet loss = 100%
- Last State Change
- Tue Apr 7 07:18:46 2026
- Last Check
- Mon Apr 13 08:35:45 2026
- Next Check
- Mon Apr 13 08:45:45 2026
- Meaning:
- A failed Ping test means that ICMP packets are either not getting to the server, or the responses aren't getting back.
- Solution:
- Check your firewall logs to see if the packets are arriving. If not, check your routing. If they are, then check to see if they're being DROPed or REJECTed. If you're confident that a response is being sent then please let Jisc know at govroam@jisc.ac.uk
clch.nhs.uk/clch-nhs-uk-3/roaming2.govroam.uk/
RADIUS Port
- Output
- CRITICAL: No response. Host down or firewall dropping new connections
- Last State Change
- Tue Apr 7 07:19:44 2026
- Last Check
- Mon Apr 13 08:37:39 2026
- Next Check
- Mon Apr 13 08:47:39 2026
- Meaning:
- A simple port scan of port 1812/udp was attempted and there was no response from the port. This implies that either the port is not open i.e. there isn't a daemon running on it, or that there is a firewall configured to not to respond to such scans. Dropping such packets isn't a problem as long as the server is able to respond to RADIUS auth requests.
- Solution:
- Check the state of the RADIUS daemon and ensure that it's up and running on port 1812/udp. If it is, then check your firewall(s) to see if they're configured to drop incoming connections.
clch.nhs.uk/clch-nhs-uk-3/roaming2.govroam.uk/
Server Shared Secret
- Output
- UNKNOWN: No Data. No logs to check for last day
- Last State Change
- Tue Apr 7 07:18:29 2026
- Last Check
- Mon Apr 13 08:36:28 2026
- Next Check
- Mon Apr 13 08:46:28 2026
clch.nhs.uk/clch-nhs-uk-3/roaming2.govroam.uk/
Simple Authentication
- Output
- WARNING: Timeout. No response from RADIUS server
- Last State Change
- Tue Apr 7 07:18:05 2026
- Last Check
- Mon Apr 13 08:36:01 2026
- Next Check
- Mon Apr 13 08:46:01 2026
- Meaning:
- An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
- Solution:
- Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
clch.nhs.uk/clch-nhs-uk-3/roaming2.govroam.uk/
Zombie
- Output
- UNKNOWN: No Data. No data but not marked as down within the last week
- Last State Change
- Tue Apr 7 07:19:41 2026
- Last Check
- Mon Apr 13 08:37:39 2026
- Next Check
- Mon Apr 13 08:47:39 2026
Sites
clch.nhs.uk/clch-nhs-uk-3/roaming2.govroam.uk/Sites/ riverside.nhs.uk
Misconfigured Site IdP
/
Misconfigured ORPS proxy
/
Unfiltered Attributes
/
Misconfigured RRPS proxy
/
clch.nhs.uk/clch-nhs-uk-3/roaming2.govroam.uk/Sites/riverside.nhs.uk/
Certificate in Realm riverside.nhs.uk
- Output
- UNKNOWN: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:17:39 2026
- Last Check
- Mon Apr 13 08:35:29 2026
- Next Check
- Mon Apr 13 08:45:28 2026
clch.nhs.uk/clch-nhs-uk-3/roaming2.govroam.uk/Sites/riverside.nhs.uk/
Tunnel Type in Realm riverside.nhs.uk
- Output
- CRITICAL: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:17:07 2026
- Last Check
- Mon Apr 13 08:35:02 2026
- Next Check
- Mon Apr 13 08:45:02 2026
- Meaning:
- No response was sent to the authentication request. The impact of this can be quite serious. The NRPS will mark this server as down for five minutes when it doesn't receive a response within 30s. If this is an RRPS for a Federation then that could knock out the service for all encompassed sites. So it's important for all RRPS and ORPS to always respond to an auth request.
- Solution:
- Reponses must be sent to all EAP requests.
clch.nhs.uk/clch-nhs-uk-3/roaming2.govroam.uk/Sites/riverside.nhs.uk/
User in Realm riverside.nhs.uk
- Output
- CRITICAL: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:21:26 2026
- Last Check
- Mon Apr 13 08:29:21 2026
- Next Check
- Mon Apr 13 08:39:21 2026
- Meaning:
- An authentication attempt was made using supplied credentials that should have been proxied to the appropriate site but there was no response. It's part of the Tech Spec that all proxied requests MUST receive a response. There are be serious consequences if sites silently drop authentication requests: RADIUS servers will mark servers down that fail to respond, ultimately disabling the entire site.
- Solution:
- Ensure that there is a working proxy path from your RRPS through to the appropriate site's IdP and that the IdP always responds to an authentication attempt.
clch.nhs.uk/clch-nhs-uk-3/NRPS: roaming3.govroam.uk
(195.194.21.203) -
No Route
/
Host Down
/
Config pending
/
IPS firewall
/
clch.nhs.uk/clch-nhs-uk-3/roaming3.govroam.uk/
Ping
- Output
- PING CRITICAL - Packet loss = 100%
- Last State Change
- Tue Apr 7 07:19:50 2026
- Last Check
- Mon Apr 13 08:36:49 2026
- Next Check
- Mon Apr 13 08:46:49 2026
- Meaning:
- A failed Ping test means that ICMP packets are either not getting to the server, or the responses aren't getting back.
- Solution:
- Check your firewall logs to see if the packets are arriving. If not, check your routing. If they are, then check to see if they're being DROPed or REJECTed. If you're confident that a response is being sent then please let Jisc know at govroam@jisc.ac.uk
clch.nhs.uk/clch-nhs-uk-3/roaming3.govroam.uk/
RADIUS Port
- Output
- CRITICAL: No response. Host down or firewall dropping new connections
- Last State Change
- Tue Apr 7 07:16:37 2026
- Last Check
- Mon Apr 13 08:34:33 2026
- Next Check
- Mon Apr 13 08:44:33 2026
- Meaning:
- A simple port scan of port 1812/udp was attempted and there was no response from the port. This implies that either the port is not open i.e. there isn't a daemon running on it, or that there is a firewall configured to not to respond to such scans. Dropping such packets isn't a problem as long as the server is able to respond to RADIUS auth requests.
- Solution:
- Check the state of the RADIUS daemon and ensure that it's up and running on port 1812/udp. If it is, then check your firewall(s) to see if they're configured to drop incoming connections.
clch.nhs.uk/clch-nhs-uk-3/roaming3.govroam.uk/
Server Shared Secret
- Output
- UNKNOWN: No Data. No logs to check for last day
- Last State Change
- Tue Apr 7 07:16:16 2026
- Last Check
- Mon Apr 13 08:34:14 2026
- Next Check
- Mon Apr 13 08:44:14 2026
clch.nhs.uk/clch-nhs-uk-3/roaming3.govroam.uk/
Simple Authentication
- Output
- WARNING: Timeout. No response from RADIUS server
- Last State Change
- Tue Apr 7 07:17:05 2026
- Last Check
- Mon Apr 13 08:35:01 2026
- Next Check
- Mon Apr 13 08:45:01 2026
- Meaning:
- An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
- Solution:
- Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
clch.nhs.uk/clch-nhs-uk-3/roaming3.govroam.uk/
Zombie
- Output
- UNKNOWN: No Data. No data but not marked as down within the last week
- Last State Change
- Tue Apr 7 07:17:25 2026
- Last Check
- Mon Apr 13 08:35:24 2026
- Next Check
- Mon Apr 13 08:45:24 2026
Sites
clch.nhs.uk/clch-nhs-uk-3/roaming3.govroam.uk/Sites/ riverside.nhs.uk
Misconfigured Site IdP
/
Misconfigured ORPS proxy
/
Unfiltered Attributes
/
Misconfigured RRPS proxy
/
clch.nhs.uk/clch-nhs-uk-3/roaming3.govroam.uk/Sites/riverside.nhs.uk/
Certificate in Realm riverside.nhs.uk
- Output
- UNKNOWN: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:18:32 2026
- Last Check
- Mon Apr 13 08:36:20 2026
- Next Check
- Mon Apr 13 08:46:20 2026
clch.nhs.uk/clch-nhs-uk-3/roaming3.govroam.uk/Sites/riverside.nhs.uk/
Tunnel Type in Realm riverside.nhs.uk
- Output
- CRITICAL: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:16:07 2026
- Last Check
- Mon Apr 13 08:34:02 2026
- Next Check
- Mon Apr 13 08:44:02 2026
- Meaning:
- No response was sent to the authentication request. The impact of this can be quite serious. The NRPS will mark this server as down for five minutes when it doesn't receive a response within 30s. If this is an RRPS for a Federation then that could knock out the service for all encompassed sites. So it's important for all RRPS and ORPS to always respond to an auth request.
- Solution:
- Reponses must be sent to all EAP requests.
clch.nhs.uk/clch-nhs-uk-3/roaming3.govroam.uk/Sites/riverside.nhs.uk/
User in Realm riverside.nhs.uk
- Output
- CRITICAL: Timeout. No response from site.
- Last State Change
- Tue Apr 7 07:16:27 2026
- Last Check
- Mon Apr 13 08:34:23 2026
- Next Check
- Mon Apr 13 08:44:23 2026
- Meaning:
- An authentication attempt was made using supplied credentials that should have been proxied to the appropriate site but there was no response. It's part of the Tech Spec that all proxied requests MUST receive a response. There are be serious consequences if sites silently drop authentication requests: RADIUS servers will mark servers down that fail to respond, ultimately disabling the entire site.
- Solution:
- Ensure that there is a working proxy path from your RRPS through to the appropriate site's IdP and that the IdP always responds to an authentication attempt.
Called Station ID Check
- Output
- UNKNOWN: No Data
- Last State Change
- Tue Apr 7 07:06:57 2026
- Last Check
- Mon Apr 13 08:31:54 2026
- Next Check
- Mon Apr 13 08:46:53 2026
Calling Station ID Check
- Output
- UNKNOWN: No Data
- Last State Change
- Tue Apr 7 07:07:39 2026
- Last Check
- Mon Apr 13 08:32:36 2026
- Next Check
- Mon Apr 13 08:47:35 2026
Operator Check
- Output
- UNKNOWN: No data
- Last State Change
- Tue Apr 7 07:08:53 2026
- Last Check
- Mon Apr 13 08:33:49 2026
- Next Check
- Mon Apr 13 08:48:49 2026
Realm Syntax Check
- Output
- UNKNOWN: No data
- Last State Change
- Tue Apr 7 07:06:16 2026
- Last Check
- Mon Apr 13 08:31:14 2026
- Next Check
- Mon Apr 13 08:46:14 2026
VLAN Check
- Output
- UNKNOWN: No Data
- Last State Change
- Tue Apr 7 07:07:07 2026
- Last Check
- Mon Apr 13 08:32:04 2026
- Next Check
- Mon Apr 13 08:47:03 2026