RADIUS Servers and Utilities for Administration of the RADIUS Daemon

RADIUS server architecture

The following list includes a few alternative RADIUS servers as well as several utilities for administration and user monitoring of the RADIUS daemon:

  • Cistron. This server has become widely used in the free software community and was written by Miquel van Smoorenburg ([email protected]) from the original Livingston source. The home page ( contains more information.
  • ICRADIUS. This is a variant of Cistron, with MySQL support, and a Web-based front end. The ICRADIUS home page ( has more information.
  • XtRADIUS. This is another Cistron variant, with extensions for running external programs for accounting or authentication. Details can be found at
  • OpenRADIUS. This is a completely new server implementation, controlled by pluggable modules. See its home page for more details (
  • GNU-radius. This is yet another Cistron variant. Much of the code has been rewritten. Details about the server can be found at the home page (
  • YARD RADIUS. This is derived from the open sources of Livingston Radius Server 2.1. It has an alternative configuration support and many extended features. The server can be downloaded at
  • Accounting logparser. This is a RADIUS accounting log analysis script that is coded in Perl and includes various reporting features. More information can be found at
  • RadiusReport. RadiusReport is a RADIUS log analysis program written in Perl. It allows you to produce many types of reports from one or several RADIUS log files. More information on its implementation can be found at
  • RadiusSplit. This script is designed to sort the RADIUS accounting files so they can be used with the RadiusReport tool. This substantially reduces the time taken for the log analysis process. The script can be downloaded at
  • RadiusContext. This set of utilities allows fast and efficient log analysis. It claims to work much faster with less memory usage than the RadiusReport script. It depends on Python and can found at

If you have any questions, please ask below!