⚡ What is RADIUS?
RADIUS (Remote Authentication Dial-In User Service) is a networking protocol that provides centralised AAA — Authentication, Authorisation, and Accounting for users connecting to a network. It runs over UDP port 1812 (authentication) and UDP port 1813 (accounting). RADIUS is the standard for authenticating VPN users, Wi-Fi clients (via 802.1X), and remote access — rather than storing credentials on each device, RADIUS forwards them to a central server that makes the access decision.

AAA — the three functions RADIUS provides

RADIUS is described as an AAA protocol. Before diving into the mechanics, it helps to understand what each A stands for — these are tested individually on both Network+ and Security+:

A
Authentication
Who are you?
Verifying identity — confirming the user is who they claim to be via credentials, certificates, or tokens.
A
Authorisation
What can you access?
Determining what resources the authenticated user is permitted to access — VLANs, network segments, services, admin rights.
A
Accounting
What did you do?
Logging what the user did — session start/end times, bytes transferred, commands executed. Critical for auditing and compliance.

How RADIUS works

RADIUS introduces a three-party model: the supplicant (the user or device trying to connect), the NAS/authenticator (the network device — VPN gateway, wireless AP, switch), and the RADIUS server (the central authority that makes the access decision).

RADIUS authentication flow
Supplicant          NAS / Authenticator      RADIUS Server
(User / Device)     (VPN gateway / AP / Switch)  (Central auth)

     │                        │                        │
     │──── Connect request ──▶│                        │
     │                        │──── Access-Request ───▶│
     │                        │    (credentials,        │
     │                        │     NAS IP, port)       │
     │                        │                        │ Checks credentials
     │                        │                        │ against directory
     │                        │◀─── Access-Accept ─────│
     │                        │    (+ VLAN, policies)   │
     │◀─── Network access ────│                        │
     │                        │                        │
     │                        │──── Accounting-Start ──▶│ (session begins)
     │                        │                        │
     │──── Disconnect ────────▶│                       │
     │                        │──── Accounting-Stop ───▶│ (session logged)

The key insight is that the NAS never makes the access decision itself — it just proxies the credentials to the RADIUS server. The RADIUS server checks those credentials against a backend directory (Active Directory via LDAP, a local user database, or another source) and returns Access-Accept or Access-Reject. The NAS enforces whatever the RADIUS server decides.

⚡ RADIUS ports — cold recall

UDP 1812 — RADIUS authentication and authorisation (Access-Request, Access-Accept, Access-Reject).

UDP 1813 — RADIUS accounting (session start, stop, and interim updates).

Older implementations used UDP 1645 and 1646 respectively — the exam may reference these legacy ports. Know both pairs. RADIUS uses UDP (not TCP) because it handles its own retransmission logic.

RADIUS vs TACACS+

RADIUS and TACACS+ are both AAA protocols but serve different primary use cases. This comparison is one of the most commonly tested distinctions on Network+ and Security+:

FeatureRADIUSTACACS+
Developed by Open standard (RFC 2865) Cisco proprietary
Transport UDP 1812 / 1813 TCP 49
Encryption Password only — rest of packet unencrypted Full packet encryption — entire body encrypted
AAA separation Authentication and authorisation combined Authentication, authorisation, and accounting fully separated
Primary use Network access — VPN, Wi-Fi, 802.1X Device administration — router/switch command authorisation
Multiprotocol Originally for dial-up, now broadly used Excellent support for multiple protocols and shell access
Vendor support Universal — all vendors support RADIUS Primarily Cisco environments
⚡ RADIUS vs TACACS+ — the exam shortcut

RADIUS = network access control (who can connect to the network — VPN users, Wi-Fi clients). UDP. Encrypts password only.

TACACS+ = device administration (which commands can an admin run on a router or switch). TCP 49. Fully encrypted. Cisco environments.

Scenario: "An administrator wants to control which commands a network engineer can run on Cisco routers." → TACACS+. "A company needs to authenticate remote VPN users against Active Directory." → RADIUS.

802.1X — RADIUS for wired and wireless access control

802.1X is the IEEE standard for port-based network access control. It uses RADIUS as its backend authentication server. When a device plugs into a switch port or connects to a Wi-Fi network, 802.1X holds them in an unauthenticated state — a kind of quarantine — until RADIUS verifies their identity.

💻
Device trying to connect
Supplicant
The end user's device. Runs 802.1X client software (built into Windows, macOS, and most operating systems). Sends credentials to the authenticator when challenged.
📡
Network device
Authenticator
The switch port or wireless access point. Blocks all traffic except EAP authentication messages until RADIUS approves access. Forwards credentials to the RADIUS server.
🖥️
Central decision maker
Authentication Server (RADIUS)
Receives credentials from the authenticator, checks them against Active Directory or another directory, and returns Access-Accept or Access-Reject — plus VLAN and policy assignments.
🔒
Auth protocol
EAP (Extensible Auth Protocol)
The protocol used between the supplicant and authenticator. EAP is a framework with many methods — EAP-TLS (certificates), PEAP (password in TLS tunnel), EAP-TTLS. EAP-TLS is the most secure.
📌 Why 802.1X matters for Security+

Without 802.1X, anyone who physically plugs into a switch port gets network access. With 802.1X, every device must authenticate before any traffic is allowed — unauthenticated devices are placed in a quarantine VLAN or blocked entirely.

This is the standard defence against rogue device attacks — an attacker plugging a laptop into an empty switch port and accessing the internal network. 802.1X prevents this at the port level.

The exam may describe 802.1X as "port-based NAC (Network Access Control)" — this is the same thing.

EAP methods — what the exam tests

EAP MethodHow it authenticatesSecurity level
EAP-TLS Mutual certificate authentication — both client and server present certificates. Requires PKI infrastructure. Strongest — mutual auth, no password
PEAP Creates a TLS tunnel using the server's certificate, then authenticates the client with a password inside the tunnel. No client certificate needed. Strong — password protected by TLS tunnel
EAP-TTLS Similar to PEAP — TLS tunnel, then various authentication methods inside. More flexible than PEAP. Strong — TLS-protected inner auth
EAP-MD5 Password hashed with MD5. No server authentication — vulnerable to MITM attacks. Weak — MD5 is broken, no server auth
⚡ EAP-TLS is always the most secure answer

If the exam asks which EAP method provides the highest security, the answer is EAP-TLS — it uses certificates on both sides (mutual authentication), eliminates passwords entirely, and provides the strongest protection against MITM attacks.

The tradeoff is infrastructure cost — you need a PKI to issue client certificates. PEAP is the practical middle ground: strong security without requiring client certificates.

RADIUS in enterprise deployments

In production environments, RADIUS doesn't work in isolation. It connects to backend systems to check credentials and retrieve authorisation policies:

RADIUS enterprise architecture
User connects to Wi-Fi / VPN / switch port
          │
          ▼
Authenticator (AP / VPN gateway / switch)
          │  EAP over RADIUS (UDP 1812)
          ▼
RADIUS Server (e.g. Microsoft NPS, FreeRADIUS, Cisco ISE)
          │
          ├──▶ Active Directory / LDAP  (verify credentials)
          │
          ├──▶ Certificate Authority      (validate client certs for EAP-TLS)
          │
          └──▶ Policy engine             (assign VLAN, ACL, time restrictions)
                    │
                    └─▶ Access-Accept (+ VLAN tag, ACL) → user gets network access
                        Access-Reject → user blocked

Common RADIUS server implementations include Microsoft NPS (Network Policy Server — built into Windows Server), FreeRADIUS (open source, widely used on Linux), and Cisco ISE (Identity Services Engine — enterprise NAC platform).

Exam scenarios

💬 "A company wants to authenticate VPN users against Active Directory from a central server rather than storing credentials on the VPN appliance. Which protocol should they use?" → RADIUS — centralised AAA, forwards credentials to Active Directory for verification
💬 "Which protocol uses TCP port 49 and fully encrypts the entire authentication packet — commonly used for Cisco device administration?" → TACACS+
💬 "What are the three components of AAA?" → Authentication (who are you), Authorisation (what can you access), Accounting (what did you do)
💬 "Which IEEE standard provides port-based network access control, blocking unauthenticated devices at the switch port?" → 802.1X — uses RADIUS as the backend authentication server
💬 "Which EAP method requires certificates on both the client and server and provides the strongest authentication?" → EAP-TLS — mutual certificate authentication, no passwords
💬 "A security team wants to prevent rogue devices from connecting to switch ports. What technology should be implemented?" → 802.1X port-based NAC with RADIUS — unauthenticated devices are blocked or quarantined
💬 "What are the RADIUS ports for authentication and accounting?" → UDP 1812 (authentication) and UDP 1813 (accounting)
💬 "A network engineer needs to log every command an administrator executes on a Cisco router. Which AAA protocol best supports this?" → TACACS+ — separates authentication, authorisation, and accounting; supports per-command authorisation and full logging on Cisco devices

Studying for Network+ or Security+?

The study guides, practice exams, and free resources worth your time.

See Study Resources →

Related Articles