Realm: halton.gov.uk Full
halton.gov.uk/halton-gov-uk-0/NRPS: roaming0.govroam.uk
(212.219.190.139) -
ICMP Blocked
/
Dropping Auth Requests
/
IPS firewall
/
halton.gov.uk/halton-gov-uk-0/roaming0.govroam.uk/
Ping
- Output
- PING CRITICAL - Packet loss = 100%
- Last State Change
- Tue Feb 17 09:36:49 2026
- Last Check
- Wed Mar 11 19:23:48 2026
- Next Check
- Wed Mar 11 19:33:48 2026
- Meaning:
- A failed Ping test means that ICMP packets are either not getting to the server, or the responses aren't getting back.
- Solution:
- Check your firewall logs to see if the packets are arriving. If not, check your routing. If they are, then check to see if they're being DROPed or REJECTed. If you're confident that a response is being sent then please let Jisc know at govroam@jisc.ac.uk
halton.gov.uk/halton-gov-uk-0/roaming0.govroam.uk/
RADIUS Port
- Output
- CRITICAL: No response. Host down or firewall dropping new connections
- Last State Change
- Fri Feb 6 12:17:33 2026
- Last Check
- Wed Mar 11 19:25:28 2026
- Next Check
- Wed Mar 11 19:35:28 2026
- Meaning:
- A simple port scan of port 1812/udp was attempted and there was no response from the port. This implies that either the port is not open i.e. there isn't a daemon running on it, or that there is a firewall configured to not to respond to such scans. Dropping such packets isn't a problem as long as the server is able to respond to RADIUS auth requests.
- Solution:
- Check the state of the RADIUS daemon and ensure that it's up and running on port 1812/udp. If it is, then check your firewall(s) to see if they're configured to drop incoming connections.
halton.gov.uk/halton-gov-uk-0/roaming0.govroam.uk/
Server Shared Secret
- Output
- OK: Good shared secret over last day
- Last State Change
- Fri Feb 6 12:20:29 2026
- Last Check
- Wed Mar 11 19:30:27 2026
- Next Check
- Wed Mar 11 19:40:27 2026
halton.gov.uk/halton-gov-uk-0/roaming0.govroam.uk/
Simple Authentication
- Output
- OK: Got a response but the Message Authenticator is bad
- Last State Change
- Wed Mar 11 10:46:43 2026
- Last Check
- Wed Mar 11 19:26:42 2026
- Next Check
- Wed Mar 11 19:36:42 2026
halton.gov.uk/halton-gov-uk-0/roaming0.govroam.uk/
Zombie
- Output
- CRITICAL: Marked as down within the last day
- Last State Change
- Tue Mar 10 12:19:34 2026
- Last Check
- Wed Mar 11 19:29:32 2026
- Next Check
- Wed Mar 11 19:39:32 2026
- Meaning:
- Over the last day, the ORPS has been marked as 'down' by the NRPS. A server is marked as 'down' (or a Zombie) if it doesn't respond to an authentication query within 30s. If the ORPS is serving a Federation then the chances are that one of the Federation members isn't responding to a proxied query. If the ORPS isn't serving a Federation then it's a problem with the local configuration.
- Solution:
- An independently connected site needs to fix the configuration to ensure that the ORPS is sending a response to ALL auth requests. A Federation Operator nedds to check their logs to determine which members aren't sending responses and help them correct their configuration.
halton.gov.uk/halton-gov-uk-0/NRPS: roaming1.govroam.uk
(212.219.209.43) -
ICMP Blocked
/
Dropping Auth Requests
/
IPS firewall
/
halton.gov.uk/halton-gov-uk-0/roaming1.govroam.uk/
Ping
- Output
- PING CRITICAL - Packet loss = 100%
- Last State Change
- Mon Feb 23 07:26:59 2026
- Last Check
- Wed Mar 11 19:23:57 2026
- Next Check
- Wed Mar 11 19:33:57 2026
- Meaning:
- A failed Ping test means that ICMP packets are either not getting to the server, or the responses aren't getting back.
- Solution:
- Check your firewall logs to see if the packets are arriving. If not, check your routing. If they are, then check to see if they're being DROPed or REJECTed. If you're confident that a response is being sent then please let Jisc know at govroam@jisc.ac.uk
halton.gov.uk/halton-gov-uk-0/roaming1.govroam.uk/
RADIUS Port
- Output
- CRITICAL: No response. Host down or firewall dropping new connections
- Last State Change
- Fri Feb 6 12:19:52 2026
- Last Check
- Wed Mar 11 19:27:48 2026
- Next Check
- Wed Mar 11 19:37:48 2026
- Meaning:
- A simple port scan of port 1812/udp was attempted and there was no response from the port. This implies that either the port is not open i.e. there isn't a daemon running on it, or that there is a firewall configured to not to respond to such scans. Dropping such packets isn't a problem as long as the server is able to respond to RADIUS auth requests.
- Solution:
- Check the state of the RADIUS daemon and ensure that it's up and running on port 1812/udp. If it is, then check your firewall(s) to see if they're configured to drop incoming connections.
halton.gov.uk/halton-gov-uk-0/roaming1.govroam.uk/
Server Shared Secret
- Output
- OK: Good shared secret over last day
- Last State Change
- Fri Mar 6 15:24:48 2026
- Last Check
- Wed Mar 11 19:24:46 2026
- Next Check
- Wed Mar 11 19:34:46 2026
halton.gov.uk/halton-gov-uk-0/roaming1.govroam.uk/
Simple Authentication
- Output
- OK: Got a response but the Message Authenticator is bad
- Last State Change
- Wed Mar 11 18:20:48 2026
- Last Check
- Wed Mar 11 19:30:44 2026
- Next Check
- Wed Mar 11 19:40:44 2026
halton.gov.uk/halton-gov-uk-0/roaming1.govroam.uk/
Zombie
- Output
- CRITICAL: Marked as down within the last day
- Last State Change
- Tue Mar 10 12:30:33 2026
- Last Check
- Wed Mar 11 19:30:31 2026
- Next Check
- Wed Mar 11 19:40:31 2026
- Meaning:
- Over the last day, the ORPS has been marked as 'down' by the NRPS. A server is marked as 'down' (or a Zombie) if it doesn't respond to an authentication query within 30s. If the ORPS is serving a Federation then the chances are that one of the Federation members isn't responding to a proxied query. If the ORPS isn't serving a Federation then it's a problem with the local configuration.
- Solution:
- An independently connected site needs to fix the configuration to ensure that the ORPS is sending a response to ALL auth requests. A Federation Operator nedds to check their logs to determine which members aren't sending responses and help them correct their configuration.
halton.gov.uk/halton-gov-uk-0/NRPS: roaming2.govroam.uk
(212.219.247.59) -
ICMP Blocked
/
Dropping Auth Requests
/
IPS firewall
/
halton.gov.uk/halton-gov-uk-0/roaming2.govroam.uk/
Ping
- Output
- PING CRITICAL - Packet loss = 100%
- Last State Change
- Wed Feb 11 00:41:47 2026
- Last Check
- Wed Mar 11 19:28:46 2026
- Next Check
- Wed Mar 11 19:38:46 2026
- Meaning:
- A failed Ping test means that ICMP packets are either not getting to the server, or the responses aren't getting back.
- Solution:
- Check your firewall logs to see if the packets are arriving. If not, check your routing. If they are, then check to see if they're being DROPed or REJECTed. If you're confident that a response is being sent then please let Jisc know at govroam@jisc.ac.uk
halton.gov.uk/halton-gov-uk-0/roaming2.govroam.uk/
RADIUS Port
- Output
- CRITICAL: No response. Host down or firewall dropping new connections
- Last State Change
- Fri Feb 6 12:24:05 2026
- Last Check
- Wed Mar 11 19:32:00 2026
- Next Check
- Wed Mar 11 19:42:00 2026
- Meaning:
- A simple port scan of port 1812/udp was attempted and there was no response from the port. This implies that either the port is not open i.e. there isn't a daemon running on it, or that there is a firewall configured to not to respond to such scans. Dropping such packets isn't a problem as long as the server is able to respond to RADIUS auth requests.
- Solution:
- Check the state of the RADIUS daemon and ensure that it's up and running on port 1812/udp. If it is, then check your firewall(s) to see if they're configured to drop incoming connections.
halton.gov.uk/halton-gov-uk-0/roaming2.govroam.uk/
Server Shared Secret
- Output
- OK: Good shared secret over last day
- Last State Change
- Sat Mar 7 10:56:36 2026
- Last Check
- Wed Mar 11 19:26:35 2026
- Next Check
- Wed Mar 11 19:36:34 2026
halton.gov.uk/halton-gov-uk-0/roaming2.govroam.uk/
Simple Authentication
- Output
- OK: Got a response but the Message Authenticator is bad
- Last State Change
- Fri Feb 27 08:59:04 2026
- Last Check
- Wed Mar 11 19:29:02 2026
- Next Check
- Wed Mar 11 19:39:02 2026
halton.gov.uk/halton-gov-uk-0/roaming2.govroam.uk/
Zombie
- Output
- CRITICAL: Marked as down within the last day
- Last State Change
- Mon Mar 9 14:00:21 2026
- Last Check
- Wed Mar 11 19:30:19 2026
- Next Check
- Wed Mar 11 19:40:19 2026
- Meaning:
- Over the last day, the ORPS has been marked as 'down' by the NRPS. A server is marked as 'down' (or a Zombie) if it doesn't respond to an authentication query within 30s. If the ORPS is serving a Federation then the chances are that one of the Federation members isn't responding to a proxied query. If the ORPS isn't serving a Federation then it's a problem with the local configuration.
- Solution:
- An independently connected site needs to fix the configuration to ensure that the ORPS is sending a response to ALL auth requests. A Federation Operator nedds to check their logs to determine which members aren't sending responses and help them correct their configuration.
halton.gov.uk/halton-gov-uk-0/NRPS: roaming3.govroam.uk
(195.194.21.203) -
ICMP Blocked
/
IPS firewall
/
halton.gov.uk/halton-gov-uk-0/roaming3.govroam.uk/
Ping
- Output
- PING CRITICAL - Packet loss = 100%
- Last State Change
- Tue Feb 24 03:01:24 2026
- Last Check
- Wed Mar 11 19:28:22 2026
- Next Check
- Wed Mar 11 19:38:22 2026
- Meaning:
- A failed Ping test means that ICMP packets are either not getting to the server, or the responses aren't getting back.
- Solution:
- Check your firewall logs to see if the packets are arriving. If not, check your routing. If they are, then check to see if they're being DROPed or REJECTed. If you're confident that a response is being sent then please let Jisc know at govroam@jisc.ac.uk
halton.gov.uk/halton-gov-uk-0/roaming3.govroam.uk/
RADIUS Port
- Output
- CRITICAL: No response. Host down or firewall dropping new connections
- Last State Change
- Fri Feb 6 12:23:30 2026
- Last Check
- Wed Mar 11 19:31:25 2026
- Next Check
- Wed Mar 11 19:41:25 2026
- Meaning:
- A simple port scan of port 1812/udp was attempted and there was no response from the port. This implies that either the port is not open i.e. there isn't a daemon running on it, or that there is a firewall configured to not to respond to such scans. Dropping such packets isn't a problem as long as the server is able to respond to RADIUS auth requests.
- Solution:
- Check the state of the RADIUS daemon and ensure that it's up and running on port 1812/udp. If it is, then check your firewall(s) to see if they're configured to drop incoming connections.
halton.gov.uk/halton-gov-uk-0/roaming3.govroam.uk/
Server Shared Secret
- Output
- OK: Good shared secret over last day
- Last State Change
- Sat Mar 7 10:55:52 2026
- Last Check
- Wed Mar 11 19:25:50 2026
- Next Check
- Wed Mar 11 19:35:50 2026
halton.gov.uk/halton-gov-uk-0/roaming3.govroam.uk/
Simple Authentication
- Output
- OK: Got a response but the Message Authenticator is bad
- Last State Change
- Fri Feb 27 01:20:22 2026
- Last Check
- Wed Mar 11 19:30:20 2026
- Next Check
- Wed Mar 11 19:40:20 2026
halton.gov.uk/halton-gov-uk-0/roaming3.govroam.uk/
Zombie
- Output
- UNKNOWN: No Data. No data but not marked as down within the last week
- Last State Change
- Tue Feb 24 12:39:20 2026
- Last Check
- Wed Mar 11 19:29:18 2026
- Next Check
- Wed Mar 11 19:39:18 2026
Called Station ID Check
- Output
- WARNING: 19% Lower case characters in MAC (last: 2026-03-11 19:21:55). 16% Missing SSID, as of 2026-03-11 19:11:19. 16% MAC format wrong - should use a '-' to separate hex pairs (last: 2026-03-11 19:11:19)
- Last State Change
- Tue Feb 3 08:43:23 2026
- Last Check
- Wed Mar 11 19:23:22 2026
- Next Check
- Wed Mar 11 19:38:21 2026
- Meaning:
-
The Called-Station-ID contains the MAC address of the device the client
connects to as well as, potentially, the SSID of the wireless network it
connected to. The format of the MAC address is specified in RFC
3580 as
'XX-XX-XX-XX-XX-XX:SSID' with '-' being the only valid separator and all
upper case. The SSID should be appended.
Having the Called-Station-ID included in proxied requests makes it possible to ensure that the SSID being broadcast matches the service requirements. - Solution:
- Configure your wireless system to provide the CSI in the RFC3580 format.
Calling Station ID Check
- Output
- WARNING: 17% MAC format wrong, missing separator (last: 2026-03-11 19:11:19). 19% MAC format wrong, contains lower case (last: 2026-03-11 19:21:55)
- Last State Change
- Tue Feb 3 08:42:15 2026
- Last Check
- Wed Mar 11 19:22:15 2026
- Next Check
- Wed Mar 11 19:37:13 2026
- Meaning:
- Calling Station ID identifies the device making the connection and RFC 3580 states that the format should be XX-XX-XX-XX-XX-XX (i.e. '-' separated and upper case).
- Solution:
- Configure your wireless system to use upper case and '-' separated pairs.
Operator Check
- Output
- WARNING: 95% Missing Operator-Name (last: 2026-03-11 19:22:47)
- Last State Change
- Tue Feb 3 08:42:52 2026
- Last Check
- Wed Mar 11 19:22:49 2026
- Next Check
- Wed Mar 11 19:37:49 2026
- Meaning:
- Operator-Name is missing from RADIUS requests. Operator-Name identifies the site sending the requests and is used by home sites in audit trails and in cases of mis-use.
- Solution:
- Where possible (FreeRADIUS, radsecproxy, RADIATOR) Operator-Name should be configured to send the site identifier (in the format 1realm.name e.g. 1holby.nhs.uk).
Realm Syntax Check
- Output
- OK: 100.0% Good syntax (last: 2026-03-11 19:23:01)
- Last State Change
- Wed Mar 11 19:23:45 2026
- Last Check
- Wed Mar 11 19:23:42 2026
- Next Check
- Wed Mar 11 19:38:42 2026
VLAN Check
- Output
- OK: 100% No VLAN attr present (last: 2026-03-11 19:23:46)
- Last State Change
- Wed Mar 11 18:10:51 2026
- Last Check
- Wed Mar 11 19:25:50 2026
- Next Check
- Wed Mar 11 19:40:49 2026