The RADIUS server log scrolled like a heartbeat: connect, authenticate, reject, accept. Then it stopped. Nothing. You know the connection is solid. The packets are there. But without debug logging, you’re half-blind.
Radius debug logging access is the fastest path to see what’s really happening inside your authentication flow. It shows every request, every attribute, every check your RADIUS server makes before deciding to grant or deny access. With debug logging enabled, you can trace failures back to their cause in seconds instead of hours.
On most RADIUS implementations, debug logging is disabled by default to reduce noise and protect performance. To enable it, you must have administrative access to the server or configuration files. The exact command depends on your environment. For FreeRADIUS, running it in foreground mode with radiusd -X prints all debug output directly to your terminal. In other setups, you may need to add a debug = yes flag in the config and restart the service. Always make these changes in a staging or controlled environment first, as debug mode can expose sensitive information such as user credentials, shared secrets, or IPs.
Once enabled, debug output will show: