Hi,

> Why auth and not post-auth? I'm working on the basis that the stuff I do 
> doesn't have anything to do with the actual auth process, in post-auth I'm 
> doing things like setting session-timeouts. vlan assignments  etc. based upon 
> whether it's an access-request or an access-reject.
> 
> Is there something wrong with that logic?

no. post-auth in the inner-tunnel is where we do it.

alan
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to