perl examples

A.L.M.Buxey at A.L.M.Buxey at
Mon Apr 8 16:49:37 CEST 2013


> Why auth and not post-auth? I'm working on the basis that the stuff I do doesn't have anything to do with the actual auth process, in post-auth I'm doing things like setting session-timeouts. vlan assignments  etc. based upon whether it's an access-request or an access-reject.
> Is there something wrong with that logic?

no. post-auth in the inner-tunnel is where we do it.


More information about the Freeradius-Users mailing list