Realm: hopwood.ac.uk Visited Only

hopwood.ac.uk/ORPS: hopwood-ac-uk-0
hopwood.ac.uk/hopwood-ac-uk-0/NRPS: roaming0.govroam.uk (212.219.190.139) - All good
hopwood.ac.uk/hopwood-ac-uk-0/roaming0.govroam.uk/ Ping
Output
PING OK - Packet loss = 0%, RTA = 8.54 ms
Last State Change
Thu Jan 8 09:14:27 2026
Last Check
Sat Jan 17 03:24:17 2026
Next Check
Sat Jan 17 03:34:16 2026
hopwood.ac.uk/hopwood-ac-uk-0/roaming0.govroam.uk/ RADIUS Port
Output
OK: Port 1812 is probably open, unless there's a DROP firewall
Last State Change
Sat Jan 17 01:58:53 2026
Last Check
Sat Jan 17 03:18:51 2026
Next Check
Sat Jan 17 03:28:51 2026
hopwood.ac.uk/hopwood-ac-uk-0/roaming0.govroam.uk/ Server Shared Secret
Output
OK: Good shared secret over last day
Last State Change
Mon Jan 12 08:40:08 2026
Last Check
Sat Jan 17 03:20:06 2026
Next Check
Sat Jan 17 03:30:06 2026
hopwood.ac.uk/hopwood-ac-uk-0/NRPS: roaming1.govroam.uk (212.219.209.43) - All good
hopwood.ac.uk/hopwood-ac-uk-0/roaming1.govroam.uk/ Ping
Output
PING OK - Packet loss = 0%, RTA = 8.56 ms
Last State Change
Thu Jan 8 09:13:52 2026
Last Check
Sat Jan 17 03:23:43 2026
Next Check
Sat Jan 17 03:33:43 2026
hopwood.ac.uk/hopwood-ac-uk-0/roaming1.govroam.uk/ RADIUS Port
Output
OK: Port 1812 is probably open, unless there's a DROP firewall
Last State Change
Sat Jan 17 01:59:02 2026
Last Check
Sat Jan 17 03:19:01 2026
Next Check
Sat Jan 17 03:29:01 2026
hopwood.ac.uk/hopwood-ac-uk-0/roaming1.govroam.uk/ Server Shared Secret
Output
OK: Good shared secret over last day
Last State Change
Mon Jan 12 07:51:42 2026
Last Check
Sat Jan 17 03:21:41 2026
Next Check
Sat Jan 17 03:31:41 2026
hopwood.ac.uk/hopwood-ac-uk-0/NRPS: roaming2.govroam.uk (212.219.247.59) - All good
hopwood.ac.uk/hopwood-ac-uk-0/roaming2.govroam.uk/ Ping
Output
PING OK - Packet loss = 0%, RTA = 2.40 ms
Last State Change
Thu Jan 8 09:19:37 2026
Last Check
Sat Jan 17 03:19:28 2026
Next Check
Sat Jan 17 03:29:27 2026
hopwood.ac.uk/hopwood-ac-uk-0/roaming2.govroam.uk/ RADIUS Port
Output
OK: Port 1812 is probably open, unless there's a DROP firewall
Last State Change
Sun Jan 11 12:38:30 2026
Last Check
Sat Jan 17 03:18:29 2026
Next Check
Sat Jan 17 03:28:29 2026
hopwood.ac.uk/hopwood-ac-uk-0/roaming2.govroam.uk/ Server Shared Secret
Output
OK: Good shared secret over last day
Last State Change
Mon Jan 12 08:32:33 2026
Last Check
Sat Jan 17 03:22:33 2026
Next Check
Sat Jan 17 03:32:32 2026
hopwood.ac.uk/hopwood-ac-uk-0/NRPS: roaming3.govroam.uk (195.194.21.203) - All good
hopwood.ac.uk/hopwood-ac-uk-0/roaming3.govroam.uk/ Ping
Output
PING OK - Packet loss = 0%, RTA = 2.56 ms
Last State Change
Thu Jan 8 09:55:21 2026
Last Check
Sat Jan 17 03:25:12 2026
Next Check
Sat Jan 17 03:35:12 2026
hopwood.ac.uk/hopwood-ac-uk-0/roaming3.govroam.uk/ RADIUS Port
Output
OK: Port 1812 is probably open, unless there's a DROP firewall
Last State Change
Sat Jan 17 01:57:58 2026
Last Check
Sat Jan 17 03:27:56 2026
Next Check
Sat Jan 17 03:37:56 2026
hopwood.ac.uk/hopwood-ac-uk-0/roaming3.govroam.uk/ Server Shared Secret
Output
OK: Good shared secret over last day
Last State Change
Mon Jan 12 08:39:33 2026
Last Check
Sat Jan 17 03:19:30 2026
Next Check
Sat Jan 17 03:29:30 2026
Called Station ID Check
Output
WARNING: 100% Lower case characters in MAC (last: 2026-01-16 17:31:40). 100% Missing SSID, as of 2026-01-16 17:31:40. 100% MAC format wrong - should use a '-' to separate hex pairs (last: 2026-01-16 17:31:40)
Last State Change
Mon Jan 12 07:44:53 2026
Last Check
Sat Jan 17 03:14:51 2026
Next Check
Sat Jan 17 03:29:50 2026
Meaning:
The Called-Station-ID contains the MAC address of the device the client connects to as well as, potentially, the SSID of the wireless network it connected to. The format of the MAC address is specified in RFC 3580 as 'XX-XX-XX-XX-XX-XX:SSID' with '-' being the only valid separator and all upper case. The SSID should be appended.
Having the Called-Station-ID included in proxied requests makes it possible to ensure that the SSID being broadcast matches the service requirements.
Solution:
Configure your wireless system to provide the CSI in the RFC3580 format.
Calling Station ID Check
Output
WARNING: 100% MAC format wrong, missing separator (last: 2026-01-16 17:31:40). 100% MAC format wrong, contains lower case (last: 2026-01-16 17:31:40)
Last State Change
Mon Jan 12 07:57:25 2026
Last Check
Sat Jan 17 03:27:23 2026
Next Check
Sat Jan 17 03:42:21 2026
Meaning:
Calling Station ID identifies the device making the connection and RFC 3580 states that the format should be XX-XX-XX-XX-XX-XX (i.e. '-' separated and upper case).
Solution:
Configure your wireless system to use upper case and '-' separated pairs.
Operator Check
Output
WARNING: 100% Missing Operator-Name (last: 2026-01-16 17:31:40)
Last State Change
Mon Jan 12 07:56:13 2026
Last Check
Sat Jan 17 03:26:12 2026
Next Check
Sat Jan 17 03:41:11 2026
Meaning:
Operator-Name is missing from RADIUS requests. Operator-Name identifies the site sending the requests and is used by home sites in audit trails and in cases of mis-use.
Solution:
Where possible (FreeRADIUS, radsecproxy, RADIATOR) Operator-Name should be configured to send the site identifier (in the format 1realm.name e.g. 1holby.nhs.uk).
Realm Syntax Check
Output
CRITICAL: 14.3% Realm same as Operator (last: 2026-01-16 17:31:40)
Last State Change
Mon Jan 12 09:59:45 2026
Last Check
Sat Jan 17 03:14:44 2026
Next Check
Sat Jan 17 03:29:43 2026
Meaning:
The syntax of a realm proxied does not match what's acceptable. A realm should be in the format of 'realm.tld' or 'something.site.tld' and shouldn't have '..' or start or end with '.', shouldn't contain characters other than '0-9a-zA-Z-.', shouldn't be empty or missing. Since these realms are entered by end-users typos are possible. Obviously the NRPS should never see the site's own realm proxied as that could cause loops.
Solution:
Filter out syntactically invalid realms, don't proxy them.