1. Home
  2. Gateways & ATAs
  3. GXW4200 Series
  4. Security
  5. HT8xx / GXW42xx - User-Level Access Management
  1. Home
  2. Gateways & ATAs
  3. HT8xx Series
  4. Security
  5. HT8xx / GXW42xx - User-Level Access Management

HT8xx / GXW42xx - User-Level Access Management

This document describes the basic configuration to enhance security for the HT8XX and GXW42XX using a Remote Radius Authentication. This would authenticate multiple user accounts to access the device.

If the Radius authentication is not used, the login username and password are locally authenticated by the device with the locally available user accounts (Admin / User / Viewer).

In case the Radius authentication is used, the Radius server stores different login usernames, passwords, and access levels for each account. Those will be used to authenticate the entered credentials (Username and password) to access the device.

For setting up RADIUS support, the following needs to be done:

  • Set up a RADIUS server (third-party) to communicate with the device.
  • Configure the device as a RADIUS client for communication with the RADIUS server.
Figure 1: RADIUS Communication


This is an example of setting up a RADIUS server, FreeRADIUS. You can follow these instructions to install and configure the server. If you use a RADIUS server from a different vendor, refer to its appropriate documentation.

Create a RADIUS Client

Define the Grandstream devices as authorized clients of the RADIUS server, with the following:

  • Predefined shared secret (password used to secure communication between the device and the RADIUS server)
  • Vendor ID (42397 for Grandstream Networks Inc.)

Below is an example of the clients.conf file (FreeRADIUS client configuration):

client ht8xx {
        	ipaddr =
        	secret = Grandstream
client GXW {
        	ipaddr =
        	secret = Grandstream

Define Access Levels

If access levels are required, set up a Vendor-Specific Attributes (VSA) dictionary for the RADIUS server and select an attribute ID that represents each user’s access level. The example below shows a dictionary file for FreeRADIUS that defines the attribute “ACL-Auth-Level” with “ID=35”. For the device’s user access levels and their corresponding numeric representation in RADIUS servers, see the below table.

VENDOR Grandstream 42397
ATTRIBUTE ACL-Auth-Level 35 integer Grandstream
VALUE ACL-Auth-Level ACL-Auth-UserLevel 50
VALUE ACL-Auth-Level ACL-Auth-AdminLevel 100
VALUE ACL-Auth-Level ACL-Auth-SecurityAdminLevel 200

Device Access Levels

Numeric Representation in RADIUS Server


Security Administrator


Read-write privileges for all pages.



Read-write privileges for all pages except security-related pages, which are read-only.

User Monitor


No access to security-related and file-loading pages; read-only access to the other pages. This read-only access level is typically applied to the secondary Web user account.

No Access


No access to any page.

Define Users Authorized to use the devices

A list of the different users of the devices needs to be defined using a password authentication method.

The example below shows an example of the users configuration file on FreeRADIUS:

John	Auth-Type := Accept, User-Password == "admin"
        Service-Type = Login-User,
        ACL-Auth-Level = ACL-Auth-SecurityAdminLevel

Jane	Auth-Type := Accept, User-Password == "user"
        Service-Type = Login-User,
        ACL-Auth-Level = ACL-Auth-AdminLevel

Doe	Auth-Type := Accept, User-Password == "viewer"
        Service-Type = Login-User,
        ACL-Auth-Level = ACL-Auth-UserLevel


Access HT8XX/GXW42XX Web Interface and set the following:

  1. Set “Enable RADIUS Web Access Control” to “Yes”
  2. Set “Action upon Radius Auth Server Error” to “Authenticate Locally”
  3. Enter in “RADIUS Auth Server Address” the IP address of the RADIUS server
  4. Enter in “RADIUS Auth Server Port” the listening port if the RADIUS Server
  5. Enter the “RADIUS Shared Secret” (e.g. Grandstream as set in the Clients.conf file of the RADIUS Server)
  6. Enter the “RADIUS VSA Vendor ID” (e.g. 42397 as set in the dictionary file of the RADIUS Server)
  7. Enter the “RADIUS VSA Access Level Attribute”
  8. Press “Update” and “Apply”.
Figure 2: RADIUS Configuration on HT8XX (under ADVANCED SETTINGS)
Figure 3: GXW42XX RADIUS Configuration (under Maintenance 🡺 RADIUS)


Securing RADIUS Communication

To secure the RADIUS communication with HT8XX/GXW42XX, HTTPS web access needs to be enabled.

HT8XX Web Access Configuration

In the HT8XX web GUI under BASIC SETTINGS:

  1. Set Web access mode to HTTPS.
  2. Choose the HTTPS port to use.
Figure 4: HT8XX Web Access Configuration

GXW42XX Web Access Configuration

In the GXW42XX Web GUI under Maintenance 🡺 Web/SSH Access:

  1. Set Web access mode to HTTPS.
  2. Choose the HTTPS port to use.
Figure 5: GXW42XX Web Access Configuration

RADIUS Authentication

In the unit’s web interface: RADIUS authentication is done after the user accesses the Web interface by entering only the device’s IP address in the Web browser’s URL field (Example and then entering the username and password credentials in the Web interface login screen.

Figure 6: HT8XX Login Page
Figure 7: GXW42XX Login Page

Was this article helpful?

Related Articles

Need Support?
Can’t find the answer you’re looking for? Don’t worry we’re here to help!
Contact Support

Leave a Comment