Tag: Network Security

September 14, 2025
RADIUS Policy & Attribute Design: Dynamic Access Control

What You’ll Take Away How RADIUS policies and attributes drive real-time network access decisions How to design group-based, least-privilege access using dynamic VLANs and ACLs How to integrate identity provider...

September 14, 2025
RadSec (RADIUS over TLS): Secure and Scalable Authentication

1. Introduction SecureW2 offers RadSec functionality – RADIUS over TLS, facilitating the transmission of RADIUS messages through a TLS-encrypted channel to distant RADIUS servers. RadSec ensures mutual authentication between the...

September 14, 2025
Migrating to Cloud RADIUS from On-Prem

What You’ll Take Away Why enterprises move from on-prem RADIUS or Microsoft NPS to Cloud RADIUS How to design a migration that avoids downtime and preserves security How to integrate...

September 14, 2025
Enterprise RADIUS Fundamentals: Design, Integration, and Trust

What You’ll Take Away What RADIUS is and why it underpins enterprise Wi-Fi, VPN, and wired authentication How to design and deploy a high-availability RADIUS architecture How to integrate identity...

May 3, 2024
What is 802.1X Authentication? How it Works for Network Access

IEEE 802.1X Authentication Definition 802.1X authentication is an IEEE standard for port-based network access control (PNAC). It is a protocol that enables users and/or devices to be uniquely identified before...

September 26, 2023
Configuring Perimeter 81 for Device Certificate Check

Introduction Perimeter 81 is a network security application based on zero-trust architecture. This document helps you configure Perimeter 81 to check valid device and user certificates. Certificate Enrollment for Devices...

September 4, 2023
Configuring Certificate and SAML Based Authentication with Meraki AnyConnect VPN

Introduction SecureW2’s JoinNow Connector PKI can be used to issue certificates to devices via SAML to enable secure, passwordless authentication with Meraki’s AnyConnect VPN. This guide will show you how...

June 21, 2023
Palo Alto RADIUS Accounting Configuration Steps

1. Introduction This document explains the steps required to test RADIUS Accounting events forwarded to a Palo Alto firewall. 2. Prerequisites To forward Radius events to Palo Alto firewall port...

June 6, 2023
Configuring Network Segmentation Based on Intune/Azure Groups

Cyber attacks are getting more vicious, and a flat network that is not segmented is like an open invitation to hackers. Even a tiny loT device, such as a smart...

January 11, 2023
Configuring Certificate-Based Authentication (CBA) with Azure & Microsoft Defender for Cloud Apps

Azure AD CBA is Microsoft’s tool to enable your users to authenticate to any Azure AD application using an X.509 digital certificate instead of a username and password. This allows...

July 27, 2021
Azure MFA VPN Integration Guide

Introduction To safeguard access to data and applications, users can avail Azure AD multi-factor authentication (MFA) with SecureW2’s Cloud RADIUS and connect to a VPN. This guide helps you connect...

November 20, 2019
Configuring DPI SSL on SonicWall with SecureW2

SSL is a requirement for browsing today’s internet and, while it offers powerful protection, it’s not foolproof. It prevents unwanted parties from eavesdropping on the packets being sent back and...

November 8, 2019
Configuring Palo Alto for SSLI and VPN

Introduction SSL is vital to the health of the Internet as a whole, but when it comes to protecting your network and devices, additional measures are required. Malicious actors can...