Realm: shft.nhs.uk Full
shft.nhs.uk/shft-nhs-uk-0/NRPS: roaming0.govroam.uk
(212.219.190.139) -
Port 1812 Drop
/
Bad Client Shared Secret
/
Unknown Client
/
shft.nhs.uk/shft-nhs-uk-0/roaming0.govroam.uk/
Ping
- Output
- PING OK - Packet loss = 0%, RTA = 4.68 ms
- Last State Change
- Thu Jul 3 11:56:25 2025
- Last Check
- Sun Jul 13 14:56:16 2025
- Next Check
- Sun Jul 13 15:06:16 2025
shft.nhs.uk/shft-nhs-uk-0/roaming0.govroam.uk/
RADIUS Port
- Output
- OK: Port 1812 is probably open, unless there's a DROP firewall
- Last State Change
- Thu Jul 3 11:53:50 2025
- Last Check
- Sun Jul 13 14:53:50 2025
- Next Check
- Sun Jul 13 15:03:49 2025
shft.nhs.uk/shft-nhs-uk-0/roaming0.govroam.uk/
Server Shared Secret
- Output
- OK: Good shared secret over last day
- Last State Change
- Thu Jul 3 11:53:25 2025
- Last Check
- Sun Jul 13 14:53:23 2025
- Next Check
- Sun Jul 13 15:03:23 2025
shft.nhs.uk/shft-nhs-uk-0/roaming0.govroam.uk/
Simple Authentication
- Output
- WARNING: Timeout. No response from RADIUS server
- Last State Change
- Thu Jul 3 11:52:08 2025
- Last Check
- Sun Jul 13 14:50:05 2025
- Next Check
- Sun Jul 13 15:00:05 2025
- Meaning:
- An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
- Solution:
- Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
shft.nhs.uk/shft-nhs-uk-0/roaming0.govroam.uk/
Zombie
- Output
- UNKNOWN: No Data. No data but not marked as down within the last week
- Last State Change
- Thu Jul 10 11:24:14 2025
- Last Check
- Sun Jul 13 14:54:12 2025
- Next Check
- Sun Jul 13 15:04:12 2025
shft.nhs.uk/shft-nhs-uk-0/NRPS: roaming1.govroam.uk
(212.219.209.43) -
Port 1812 Drop
/
Bad Client Shared Secret
/
Unknown Client
/
Dropping Auth Requests
/
shft.nhs.uk/shft-nhs-uk-0/roaming1.govroam.uk/
Ping
- Output
- PING OK - Packet loss = 0%, RTA = 4.63 ms
- Last State Change
- Thu Jul 3 11:56:53 2025
- Last Check
- Sun Jul 13 14:46:44 2025
- Next Check
- Sun Jul 13 14:56:44 2025
shft.nhs.uk/shft-nhs-uk-0/roaming1.govroam.uk/
RADIUS Port
- Output
- OK: Port 1812 is probably open, unless there's a DROP firewall
- Last State Change
- Thu Jul 3 11:58:17 2025
- Last Check
- Sun Jul 13 14:48:15 2025
- Next Check
- Sun Jul 13 14:58:15 2025
shft.nhs.uk/shft-nhs-uk-0/roaming1.govroam.uk/
Server Shared Secret
- Output
- OK: Good shared secret over last day
- Last State Change
- Thu Jul 3 11:55:16 2025
- Last Check
- Sun Jul 13 14:55:15 2025
- Next Check
- Sun Jul 13 15:05:15 2025
shft.nhs.uk/shft-nhs-uk-0/roaming1.govroam.uk/
Simple Authentication
- Output
- WARNING: Timeout. No response from RADIUS server
- Last State Change
- Thu Jul 3 11:54:43 2025
- Last Check
- Sun Jul 13 14:52:40 2025
- Next Check
- Sun Jul 13 15:02:40 2025
- Meaning:
- An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
- Solution:
- Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
shft.nhs.uk/shft-nhs-uk-0/roaming1.govroam.uk/
Zombie
- Output
- CRITICAL: Marked as down within the last day
- Last State Change
- Thu Jul 10 08:12:21 2025
- Last Check
- Sun Jul 13 14:52:19 2025
- Next Check
- Sun Jul 13 15:02:19 2025
- Meaning:
- Over the last day, the ORPS has been marked as 'down' by the NRPS. A server is marked as 'down' (or a Zombie) if it doesn't respond to an authentication query within 30s. If the ORPS is serving a Federation then the chances are that one of the Federation members isn't responding to a proxied query. If the ORPS isn't serving a Federation then it's a problem with the local configuration.
- Solution:
- An independently connected site needs to fix the configuration to ensure that the ORPS is sending a response to ALL auth requests. A Federation Operator nedds to check their logs to determine which members aren't sending responses and help them correct their configuration.
shft.nhs.uk/shft-nhs-uk-0/NRPS: roaming2.govroam.uk
(212.219.247.59) -
Port 1812 Drop
/
Bad Client Shared Secret
/
Unknown Client
/
shft.nhs.uk/shft-nhs-uk-0/roaming2.govroam.uk/
Ping
- Output
- PING OK - Packet loss = 0%, RTA = 9.97 ms
- Last State Change
- Thu Jul 3 11:56:55 2025
- Last Check
- Sun Jul 13 14:46:46 2025
- Next Check
- Sun Jul 13 14:56:46 2025
shft.nhs.uk/shft-nhs-uk-0/roaming2.govroam.uk/
RADIUS Port
- Output
- OK: Port 1812 is probably open, unless there's a DROP firewall
- Last State Change
- Thu Jul 3 11:57:53 2025
- Last Check
- Sun Jul 13 14:47:53 2025
- Next Check
- Sun Jul 13 14:57:52 2025
shft.nhs.uk/shft-nhs-uk-0/roaming2.govroam.uk/
Server Shared Secret
- Output
- OK: Good shared secret over last day
- Last State Change
- Thu Jul 3 11:58:25 2025
- Last Check
- Sun Jul 13 14:48:25 2025
- Next Check
- Sun Jul 13 14:58:24 2025
shft.nhs.uk/shft-nhs-uk-0/roaming2.govroam.uk/
Simple Authentication
- Output
- WARNING: Timeout. No response from RADIUS server
- Last State Change
- Thu Jul 3 11:58:53 2025
- Last Check
- Sun Jul 13 14:46:52 2025
- Next Check
- Sun Jul 13 14:56:52 2025
- Meaning:
- An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
- Solution:
- Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
shft.nhs.uk/shft-nhs-uk-0/roaming2.govroam.uk/
Zombie
- Output
- UNKNOWN: No Data. No data but not marked as down within the last week
- Last State Change
- Wed Jul 9 07:25:58 2025
- Last Check
- Sun Jul 13 14:55:57 2025
- Next Check
- Sun Jul 13 15:05:57 2025
shft.nhs.uk/shft-nhs-uk-0/NRPS: roaming3.govroam.uk
(195.194.21.203) -
Port 1812 Drop
/
Bad Client Shared Secret
/
Unknown Client
/
shft.nhs.uk/shft-nhs-uk-0/roaming3.govroam.uk/
Ping
- Output
- PING OK - Packet loss = 0%, RTA = 9.96 ms
- Last State Change
- Thu Jul 3 11:59:07 2025
- Last Check
- Sun Jul 13 14:48:57 2025
- Next Check
- Sun Jul 13 14:58:57 2025
shft.nhs.uk/shft-nhs-uk-0/roaming3.govroam.uk/
RADIUS Port
- Output
- OK: Port 1812 is probably open, unless there's a DROP firewall
- Last State Change
- Thu Jul 3 11:57:28 2025
- Last Check
- Sun Jul 13 14:47:26 2025
- Next Check
- Sun Jul 13 14:57:26 2025
shft.nhs.uk/shft-nhs-uk-0/roaming3.govroam.uk/
Server Shared Secret
- Output
- OK: Good shared secret over last day
- Last State Change
- Thu Jul 3 11:56:20 2025
- Last Check
- Sun Jul 13 14:56:18 2025
- Next Check
- Sun Jul 13 15:06:18 2025
shft.nhs.uk/shft-nhs-uk-0/roaming3.govroam.uk/
Simple Authentication
- Output
- WARNING: Timeout. No response from RADIUS server
- Last State Change
- Thu Jul 3 12:00:34 2025
- Last Check
- Sun Jul 13 14:48:32 2025
- Next Check
- Sun Jul 13 14:58:32 2025
- Meaning:
- An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
- Solution:
- Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
shft.nhs.uk/shft-nhs-uk-0/roaming3.govroam.uk/
Zombie
- Output
- UNKNOWN: No Data. No data but not marked as down within the last week
- Last State Change
- Thu Jul 10 07:24:38 2025
- Last Check
- Sun Jul 13 14:54:38 2025
- Next Check
- Sun Jul 13 15:04:37 2025
shft.nhs.uk/shft-nhs-uk-1/NRPS: roaming0.govroam.uk
(212.219.190.139) -
Port 1812 Drop
/
Bad Client Shared Secret
/
Unknown Client
/
Dropping Auth Requests
/
shft.nhs.uk/shft-nhs-uk-1/roaming0.govroam.uk/
Ping
- Output
- PING OK - Packet loss = 0%, RTA = 4.52 ms
- Last State Change
- Thu Jul 3 11:55:00 2025
- Last Check
- Sun Jul 13 14:54:49 2025
- Next Check
- Sun Jul 13 15:04:49 2025
shft.nhs.uk/shft-nhs-uk-1/roaming0.govroam.uk/
RADIUS Port
- Output
- OK: Port 1812 is probably open, unless there's a DROP firewall
- Last State Change
- Thu Jul 3 11:54:28 2025
- Last Check
- Sun Jul 13 14:54:27 2025
- Next Check
- Sun Jul 13 15:04:27 2025
shft.nhs.uk/shft-nhs-uk-1/roaming0.govroam.uk/
Server Shared Secret
- Output
- OK: Good shared secret over last day
- Last State Change
- Thu Jul 3 11:54:09 2025
- Last Check
- Sun Jul 13 14:54:07 2025
- Next Check
- Sun Jul 13 15:04:07 2025
shft.nhs.uk/shft-nhs-uk-1/roaming0.govroam.uk/
Simple Authentication
- Output
- WARNING: Timeout. No response from RADIUS server
- Last State Change
- Thu Jul 3 11:56:28 2025
- Last Check
- Sun Jul 13 14:54:27 2025
- Next Check
- Sun Jul 13 15:04:27 2025
- Meaning:
- An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
- Solution:
- Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
shft.nhs.uk/shft-nhs-uk-1/roaming0.govroam.uk/
Zombie
- Output
- CRITICAL: Marked as down within the last day
- Last State Change
- Thu Jul 10 18:20:30 2025
- Last Check
- Sun Jul 13 14:50:30 2025
- Next Check
- Sun Jul 13 15:00:29 2025
- Meaning:
- Over the last day, the ORPS has been marked as 'down' by the NRPS. A server is marked as 'down' (or a Zombie) if it doesn't respond to an authentication query within 30s. If the ORPS is serving a Federation then the chances are that one of the Federation members isn't responding to a proxied query. If the ORPS isn't serving a Federation then it's a problem with the local configuration.
- Solution:
- An independently connected site needs to fix the configuration to ensure that the ORPS is sending a response to ALL auth requests. A Federation Operator nedds to check their logs to determine which members aren't sending responses and help them correct their configuration.
shft.nhs.uk/shft-nhs-uk-1/NRPS: roaming1.govroam.uk
(212.219.209.43) -
Port 1812 Drop
/
Bad Client Shared Secret
/
Unknown Client
/
Dropping Auth Requests
/
shft.nhs.uk/shft-nhs-uk-1/roaming1.govroam.uk/
Ping
- Output
- PING OK - Packet loss = 0%, RTA = 4.68 ms
- Last State Change
- Thu Jul 3 11:57:11 2025
- Last Check
- Sun Jul 13 14:47:01 2025
- Next Check
- Sun Jul 13 14:57:01 2025
shft.nhs.uk/shft-nhs-uk-1/roaming1.govroam.uk/
RADIUS Port
- Output
- OK: Port 1812 is probably open, unless there's a DROP firewall
- Last State Change
- Thu Jul 3 11:58:04 2025
- Last Check
- Sun Jul 13 14:48:03 2025
- Next Check
- Sun Jul 13 14:58:02 2025
shft.nhs.uk/shft-nhs-uk-1/roaming1.govroam.uk/
Server Shared Secret
- Output
- OK: Good shared secret over last day
- Last State Change
- Thu Jul 3 11:55:54 2025
- Last Check
- Sun Jul 13 14:55:52 2025
- Next Check
- Sun Jul 13 15:05:52 2025
shft.nhs.uk/shft-nhs-uk-1/roaming1.govroam.uk/
Simple Authentication
- Output
- WARNING: Timeout. No response from RADIUS server
- Last State Change
- Thu Jul 3 11:55:08 2025
- Last Check
- Sun Jul 13 14:53:05 2025
- Next Check
- Sun Jul 13 15:03:05 2025
- Meaning:
- An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
- Solution:
- Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
shft.nhs.uk/shft-nhs-uk-1/roaming1.govroam.uk/
Zombie
- Output
- CRITICAL: Marked as down within the last day
- Last State Change
- Mon Jul 7 16:14:46 2025
- Last Check
- Sun Jul 13 14:54:44 2025
- Next Check
- Sun Jul 13 15:04:44 2025
- Meaning:
- Over the last day, the ORPS has been marked as 'down' by the NRPS. A server is marked as 'down' (or a Zombie) if it doesn't respond to an authentication query within 30s. If the ORPS is serving a Federation then the chances are that one of the Federation members isn't responding to a proxied query. If the ORPS isn't serving a Federation then it's a problem with the local configuration.
- Solution:
- An independently connected site needs to fix the configuration to ensure that the ORPS is sending a response to ALL auth requests. A Federation Operator nedds to check their logs to determine which members aren't sending responses and help them correct their configuration.
shft.nhs.uk/shft-nhs-uk-1/NRPS: roaming2.govroam.uk
(212.219.247.59) -
Port 1812 Drop
/
Bad Client Shared Secret
/
Unknown Client
/
Dropping Auth Requests
/
shft.nhs.uk/shft-nhs-uk-1/roaming2.govroam.uk/
Ping
- Output
- PING OK - Packet loss = 0%, RTA = 10.71 ms
- Last State Change
- Thu Jul 3 11:55:47 2025
- Last Check
- Sun Jul 13 14:55:37 2025
- Next Check
- Sun Jul 13 15:05:37 2025
shft.nhs.uk/shft-nhs-uk-1/roaming2.govroam.uk/
RADIUS Port
- Output
- OK: Port 1812 is probably open, unless there's a DROP firewall
- Last State Change
- Thu Jul 3 11:57:34 2025
- Last Check
- Sun Jul 13 14:47:33 2025
- Next Check
- Sun Jul 13 14:57:33 2025
shft.nhs.uk/shft-nhs-uk-1/roaming2.govroam.uk/
Server Shared Secret
- Output
- OK: Good shared secret over last day
- Last State Change
- Thu Jul 3 11:56:21 2025
- Last Check
- Sun Jul 13 14:56:19 2025
- Next Check
- Sun Jul 13 15:06:19 2025
shft.nhs.uk/shft-nhs-uk-1/roaming2.govroam.uk/
Simple Authentication
- Output
- WARNING: Timeout. No response from RADIUS server
- Last State Change
- Thu Jul 3 11:57:14 2025
- Last Check
- Sun Jul 13 14:55:11 2025
- Next Check
- Sun Jul 13 15:05:11 2025
- Meaning:
- An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
- Solution:
- Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
shft.nhs.uk/shft-nhs-uk-1/roaming2.govroam.uk/
Zombie
- Output
- CRITICAL: Marked as down within the last day
- Last State Change
- Thu Jul 3 11:55:25 2025
- Last Check
- Sun Jul 13 14:53:23 2025
- Next Check
- Sun Jul 13 15:03:22 2025
- Meaning:
- Over the last day, the ORPS has been marked as 'down' by the NRPS. A server is marked as 'down' (or a Zombie) if it doesn't respond to an authentication query within 30s. If the ORPS is serving a Federation then the chances are that one of the Federation members isn't responding to a proxied query. If the ORPS isn't serving a Federation then it's a problem with the local configuration.
- Solution:
- An independently connected site needs to fix the configuration to ensure that the ORPS is sending a response to ALL auth requests. A Federation Operator nedds to check their logs to determine which members aren't sending responses and help them correct their configuration.
shft.nhs.uk/shft-nhs-uk-1/NRPS: roaming3.govroam.uk
(195.194.21.203) -
Port 1812 Drop
/
Bad Client Shared Secret
/
Unknown Client
/
Dropping Auth Requests
/
shft.nhs.uk/shft-nhs-uk-1/roaming3.govroam.uk/
Ping
- Output
- PING OK - Packet loss = 0%, RTA = 9.99 ms
- Last State Change
- Thu Jul 3 11:59:40 2025
- Last Check
- Sun Jul 13 14:49:29 2025
- Next Check
- Sun Jul 13 14:59:29 2025
shft.nhs.uk/shft-nhs-uk-1/roaming3.govroam.uk/
RADIUS Port
- Output
- OK: Port 1812 is probably open, unless there's a DROP firewall
- Last State Change
- Thu Jul 3 11:58:56 2025
- Last Check
- Sun Jul 13 14:48:55 2025
- Next Check
- Sun Jul 13 14:58:55 2025
shft.nhs.uk/shft-nhs-uk-1/roaming3.govroam.uk/
Server Shared Secret
- Output
- OK: Good shared secret over last day
- Last State Change
- Thu Jul 3 11:59:18 2025
- Last Check
- Sun Jul 13 14:49:17 2025
- Next Check
- Sun Jul 13 14:59:17 2025
shft.nhs.uk/shft-nhs-uk-1/roaming3.govroam.uk/
Simple Authentication
- Output
- WARNING: Timeout. No response from RADIUS server
- Last State Change
- Thu Jul 3 11:56:43 2025
- Last Check
- Sun Jul 13 14:54:42 2025
- Next Check
- Sun Jul 13 15:04:42 2025
- Meaning:
- An authentication attempt has been made using generic credentials and no response was received. It's expected that a RADIUS server would respond to non-existent credentials with an Access-Reject and if it didn't then there might be a problem. It's not part of the Tech Spec that all requests should be responded to but it's desirable. It would help us keep better track of your system state. However, be aware that all proxied/EAP requests MUST be responded to.
- Solution:
- Check your RADIUS logs to see what's happening to these requests. The username is 'jisctest' so should stand out. If you can, please ensure that your RADIUS server responds to the requests (with an Access-Reject). Alternatively, enable Status-Server (FreeRADIUS, RADIATOR and radsecproxy support it).
shft.nhs.uk/shft-nhs-uk-1/roaming3.govroam.uk/
Zombie
- Output
- CRITICAL: Marked as down within the last day
- Last State Change
- Mon Jul 7 13:15:02 2025
- Last Check
- Sun Jul 13 14:55:01 2025
- Next Check
- Sun Jul 13 15:05:01 2025
- Meaning:
- Over the last day, the ORPS has been marked as 'down' by the NRPS. A server is marked as 'down' (or a Zombie) if it doesn't respond to an authentication query within 30s. If the ORPS is serving a Federation then the chances are that one of the Federation members isn't responding to a proxied query. If the ORPS isn't serving a Federation then it's a problem with the local configuration.
- Solution:
- An independently connected site needs to fix the configuration to ensure that the ORPS is sending a response to ALL auth requests. A Federation Operator nedds to check their logs to determine which members aren't sending responses and help them correct their configuration.
Called Station ID Check
- Output
- WARNING: 15% Lower case characters in MAC (last: 2025-07-13 13:42:31). 28% Missing SSID, as of 2025-07-13 14:23:19. 75% MAC format wrong - should use a '-' to separate hex pairs (last: 2025-07-13 14:23:19)
- Last State Change
- Tue Jul 1 19:57:20 2025
- Last Check
- Sun Jul 13 14:42:16 2025
- Next Check
- Sun Jul 13 14:57:16 2025
- Meaning:
-
The Called-Station-ID contains the MAC address of the device the client
connects to as well as, potentially, the SSID of the wireless network it
connected to. The format of the MAC address is specified in RFC
3580 as
'XX-XX-XX-XX-XX-XX:SSID' with '-' being the only valid separator and all
upper case. The SSID should be appended.
Having the Called-Station-ID included in proxied requests makes it possible to ensure that the SSID being broadcast matches the service requirements. - Solution:
- Configure your wireless system to provide the CSI in the RFC3580 format.
Calling Station ID Check
- Output
- WARNING: 74% MAC format wrong, missing separator (last: 2025-07-13 14:23:19). 15% MAC format wrong, contains lower case (last: 2025-07-13 13:42:31)
- Last State Change
- Fri Jun 13 10:33:02 2025
- Last Check
- Sun Jul 13 14:42:59 2025
- Next Check
- Sun Jul 13 14:57:59 2025
- Meaning:
- Calling Station ID identifies the device making the connection and RFC 3580 states that the format should be XX-XX-XX-XX-XX-XX (i.e. '-' separated and upper case).
- Solution:
- Configure your wireless system to use upper case and '-' separated pairs.
Operator Check
- Output
- WARNING: 27% Missing Operator-Name (last: 2025-07-13 13:52:01)
- Last State Change
- Fri Jun 13 10:33:50 2025
- Last Check
- Sun Jul 13 14:43:48 2025
- Next Check
- Sun Jul 13 14:58:47 2025
- Meaning:
- Operator-Name is missing from RADIUS requests. Operator-Name identifies the site sending the requests and is used by home sites in audit trails and in cases of mis-use.
- Solution:
- Where possible (FreeRADIUS, radsecproxy, RADIATOR) Operator-Name should be configured to send the site identifier (in the format 1realm.name e.g. 1holby.nhs.uk).
Realm Syntax Check
- Output
- CRITICAL: 12.5% Non word (a-zA-Z0-9.-) chars in realm (last: 2025-07-13 10:39:29)
- Last State Change
- Mon Jul 7 06:25:45 2025
- Last Check
- Sun Jul 13 14:55:42 2025
- Next Check
- Sun Jul 13 15:10:41 2025
- Meaning:
- The syntax of a realm proxied does not match what's acceptable. A realm should be in the format of 'realm.tld' or 'something.site.tld' and shouldn't have '..' or start or end with '.', shouldn't contain characters other than '0-9a-zA-Z-.', shouldn't be empty or missing. Since these realms are entered by end-users typos are possible. Obviously the NRPS should never see the site's own realm proxied as that could cause loops.
- Solution:
- Filter out syntactically invalid realms, don't proxy them.
VLAN Check
- Output
- OK: 100% No VLAN attr present (last: 2025-07-13 14:44:17)
- Last State Change
- Fri Jul 11 07:00:39 2025
- Last Check
- Sun Jul 13 14:45:36 2025
- Next Check
- Sun Jul 13 15:00:35 2025