Please wait a minute...
New Technology of Library and Information Service  2005, Vol. 21 Issue (7): 22-24    DOI: 10.11925/infotech.1003-3513.2005.07.06
Current Issue | Archive | Adv Search |
Design and Implement of Radius Server Using in VPN Authentication in Linux Environment
Huang Jizheng
(Library of Zhanjiang Normal College,Guangdong 524048,China)
Download: PDF (0 KB)  
Export: BibTeX | EndNote (RIS)      

The paper introduces the principles of Radius protocol,and describes the method that identifies the VPN user using Radius server which constructed from FreeRadius software in details.

Key wordsVPN      Authentication      Radius      FreeRadius     
Received: 15 March 2005      Published: 25 July 2005


Corresponding Authors: Huang Jizheng     E-mail:
About author:: Huang Jizheng

Cite this article:

Huang Jizheng. Design and Implement of Radius Server Using in VPN Authentication in Linux Environment. New Technology of Library and Information Service, 2005, 21(7): 22-24.

URL:     OR

1曹敬. RADIUS在远程接入安全认证中的应用. 计算机工程与应用,2003(7):134-136
2张书奎. 基于Radius的VPN设计与实现. 计算机工程, 2003(9):124-126
3Henning Stener. HOWTO:PPTP+MPPE+RADIUS+MySQL. (Accessed Jul2004)

[1] Guang Zhu, Mining Feng. Content Authentication for Video Resources of Libraries, Museums and Archives with Semi-fragile Watermarking[J]. 数据分析与知识发现, 2016, 32(12): 76-84.
[2] Gu Jiawei, Wang Shengqing, Zhao Danqun, Chen Wenguang. A Centralized Identity Authentication in the Cloud Service of Public Culture Digital Resources[J]. 现代图书情报技术, 2015, 31(2): 64-71.
[3] Ye Jian, Li Dan, Yan Xiaodi, Li Juan, Wei Qingshan, Han Meng, Xiao Xiaobo. Research and Implementation of Library WLAN Unified Authentication System[J]. 现代图书情报技术, 2012, 28(7): 121-126.
[4] Li Xin, Liu Dan. A Practice of Uniform Identity Authentication Against Multiple Authentication Sources Based on LDAP ——A Case Analysis of East China Normal University Library[J]. 现代图书情报技术, 2011, 27(4): 89-93.
[5] Wang Zexian. Design and Implementation of Unified User Authentication for VPN and ILAS III[J]. 现代图书情报技术, 2011, 27(12): 79-83.
[6] Zhu Guang, Yang Yongyue. Design of the Reading System for Card Identity Authentication Based on Image Recognition[J]. 现代图书情报技术, 2010, 26(12): 81-85.
[7] Su Dongchu. Construct Seamless University Library Office Network System by Using RouterOS[J]. 现代图书情报技术, 2007, 2(11): 84-86.
[8] Ye Jian,Shao Jing,Yan Xiaodi . Application of WLAN Security and Network Management  Technology in University Library[J]. 现代图书情报技术, 2006, 1(7): 85-88.
[9] Xue Ji,Ma Ziwei . The Analysis and Implementation of the Relative Theory and Technology in the Information Portal of Digital Library[J]. 现代图书情报技术, 2006, 1(6): 6-10.
[10] Huang Jizheng. Design for VPN Based on PPTP in Linux Environment and It’s Application in Library[J]. 现代图书情报技术, 2005, 21(8): 77-79.
[11] Zhao Liping. Application of VPN in Library Resource-Sharing[J]. 现代图书情报技术, 2005, 21(2): 87-89.
[12] Wang Lang. Parts of the Incorporate Library Link Each Other by Using VPN Technology[J]. 现代图书情报技术, 2004, 20(5): 35-37.
[13] Zhu Zhongming,Tang Runhuan. Application of Mobile IP to Digital Library[J]. 现代图书情报技术, 2004, 20(12): 10-13.
[14] Dong Li,Zheng Xiaohui,Jiang Airong. Research and Implementation of Resource Access Control in OCLC SiteSearch[J]. 现代图书情报技术, 2004, 20(1): 63-66.
[15] Jiang Jihong. The Network s Encryption and Authentication Technique[J]. 现代图书情报技术, 2003, 19(4): 78-80.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938