<html>
<head>
<style>
.hmmessage P
{
margin:0px;
padding:0px
}
body.hmmessage
{
font-size: 10pt;
font-family:Verdana
}
</style>
</head>
<body class='hmmessage'>
> > I'm sure that I'm not the only one that have NAS's behind dynamic IPs,<BR>> > and this would make radius traffic from such NAS's much more secure.<BR><BR>
OK, if you have Dynamic public IP you have two options:<BR>
1) use a DNS to identify the dynamic IP of your hotspot. It means that your DSL router or hotspot has capability to update its public IP every x minutes. You can use dyndns.org service. DSL routers normally have this feature.<BR>
<BR>
2) Install a VPN tunnel like PPPTP/L2TP/OVPN... and route all the autentication request for this range. For instance, you have your radius server with IP 10.200.0.11 and your NASes with 10.200.0.x range. All the auth request are sent by the tunnel, so all ones are valid.<BR>
<BR>
I tried both methods with good results. However second option is better because you have another way to access to your hotspots since you know which is hotspot IP (tunnel IP (10.200.0.x)).<BR>
<BR>
Santiago <BR><BR><br /><hr />Haz búsquedas con Live Search, <a href='http://www.buscalasuerte.com/' target='_new'>¡todas tus búsquedas tienen premio!</a></body>
</html>