<html><head></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">This is very interesting, really appreciate the replies.<div><br></div><div>Other than using a VPN, how do other wifi providers actually operate securely?</div><div><br></div><div>J</div><div><br><div><div>On 24 Oct 2011, at 21:04, Phil Mayers wrote:</div><br class="Apple-interchange-newline"><blockquote type="cite"><div>On 10/24/2011 08:45 PM, JennyBlunt wrote:<br><blockquote type="cite">Hello Phil<br></blockquote><blockquote type="cite"><br></blockquote><blockquote type="cite">I guess we don't need a per NAS secret but thought it might help block<br></blockquote><blockquote type="cite">any customers we don't need.<br></blockquote><blockquote type="cite"><br></blockquote><blockquote type="cite">We have a load of wifi hotspots on dynamic ips. We know all their nas<br></blockquote><br>Ok, that's about the hardest case I'm afraid.<br><br>If you have the option of using something like a tunnel (IPSec) to bring the NASes into your network and give them local IPs I would take it.<br><br>If not, then an out-of-band solution might work.<br><br>There's no easy answer here I'm afraid. It will depend on the numbers and vendor of your NAS, the capabilities they have and lots of other factors.<br><br>In an ideal world, radius-over-TLS (RadSec) would solve this problem but it's basically guaranteed your NASes don't support it (nothing does yet, and possibly never will for NAS->Server traffic).<br>-<br>List info/subscribe/unsubscribe? See <a href="http://www.freeradius.org/list/users.html">http://www.freeradius.org/list/users.html</a><br></div></blockquote></div><br></div></body></html>