How to configure Cisco pppoe server with radius server authentication

Cisco Routing Linux Network Administrator System Administrator

Radius server configures:

First, need to assign IP address to Radius server

vi /etc/networks/interfaces

auto eth1
iface eth1 inet static

then save this file and restart network service

/etc/init.d/networking restart

Now we install freeradius package  for radius server

apt-get update
apt-get install freeradius

now move configuration file

mv /etc/freeradius/clients.conf /etc/freeradius/r-clients.conf

now edit configuration file


client {
secret = testuser
shortname = test
nastype = cisco

save the configuration file

now we edit authication file

mv /etc/freeradius/users /etc/freeradius/r-users

vi /etc/freeradius/r-users

DEFAULT Auth-Type := CHAP, Cleartext-Password := “pass1”
Framed-Protocol = PPP,
Framed-IP-Address =
foeh@fixed Auth-Type := CHAP, Cleartext-Password := “pass2”
Framed-Protocol = PPP,
Framed-IP-Address =

save and restart radius service

service freeradius restart

Now we configure cisco router


conf t

int e0/0

des To-Radius

no sh

ip address

int lo0

ip add

no sh

int e0/1

des To-Client

pppoe enable group global

no sh

interface Virtual-Template1
ip unnumbered Loopback0
peer default ip address pool localpool
ppp authentication chap

ip local pool localpool

aaa new-model
radius server ubuntu
address ipv4 auth-port 1812 acct-port 1813
key testuser

aaa authentication ppp default group radius
aaa authorization network default group radius


Note: You may want to configure some local usernames for access to the CLI and add “aaa authentication login default local” or similar.

At this point, your PPPoE Access Concentrator with RADIUS authentication is ready for use!





Leave a Reply

Your email address will not be published. Required fields are marked *