RADIUS Agent

By default, RADIUS Agent listens for authentication requests on the RADIUS authentication port. Filtering Service uses the information provided by RADIUS Agent to apply policies to remote users logged on to the network.

RADIUS Agent extracts the authentication request ID (a unique identifier), user name, and originating IP address. The Agent stores this data in a user name-to-IP- address map in local memory and in the RadiusAgent.bak file.

IP addresses are the key element in tracking logon sessions, because the same user may log on to the network from different locations. In cases where users share an IP address (as with Windows Terminal Services), your web protection software may not always be able to identify users. In this case, user requests receive computer or network policies, or the Default policy.

A RADIUS Agent installation typically includes the following files:

File name Location Functionality
RADIUSAgent.exe C:\Program Files\Websense\ Web Security\bin\ or /opt/Websense/

The RADIUS Agent executable.

Automatically sends new entries to Filtering Service, when queried.

wsradius.ini Websense\Web Security\bin\ or /opt/Websense/ Contains RADIUS Agent initialization parameters.
RadiusAgent.bak Websense\Web Security\bin\ or /opt/Websense/

Backup copy of RADIUS Agent’s user name-to-IP address map.

Read at startup.

ignore.txt

(optional)

Websense\Web Security\bin\ or /opt/Websense/ Contains list of user names for RADIUS Agent to ignore.