Authorising Clients by Calling Station ID Not IP
Jennyanydots Napoleon Shoehorn
jennyshoehorn at me.com
Mon Oct 24 23:09:55 CEST 2011
This is very interesting, really appreciate the replies.
Other than using a VPN, how do other wifi providers actually operate securely?
J
On 24 Oct 2011, at 21:04, Phil Mayers wrote:
> On 10/24/2011 08:45 PM, JennyBlunt wrote:
>> Hello Phil
>>
>> I guess we don't need a per NAS secret but thought it might help block
>> any customers we don't need.
>>
>> We have a load of wifi hotspots on dynamic ips. We know all their nas
>
> Ok, that's about the hardest case I'm afraid.
>
> If you have the option of using something like a tunnel (IPSec) to bring the NASes into your network and give them local IPs I would take it.
>
> If not, then an out-of-band solution might work.
>
> There's no easy answer here I'm afraid. It will depend on the numbers and vendor of your NAS, the capabilities they have and lots of other factors.
>
> In an ideal world, radius-over-TLS (RadSec) would solve this problem but it's basically guaranteed your NASes don't support it (nothing does yet, and possibly never will for NAS->Server traffic).
> -
> List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20111024/83617b51/attachment.html>
More information about the Freeradius-Users
mailing list